0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(0x0, 0x0, 0x100) sendto$inet(r1, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x652b, 0xc, 0x0, 0x27) 22:42:09 executing program 5: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000003000)=@abs={0x1}, 0x8) bind$unix(r0, &(0x7f0000000000)=@abs={0x1}, 0x2) [ 311.536265] SELinux: failed to load policy 22:42:09 executing program 3: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_int(r0, 0x29, 0x24, &(0x7f0000000000)=0x7ffffffe, 0x4) syz_emit_ethernet(0xa7, &(0x7f0000000100)={@link_local, @random="9f789bae12cf", [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0xffffff3a, 0x0, @ipv4={[0x3580], [], @multicast2}, @mcast2, {[], @icmpv6=@time_exceed={0xffffff80, 0x0, 0x0, 0x0, [0x9, 0x4], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 22:42:09 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) open(&(0x7f0000000240)='./file0\x00', 0x551000, 0x0) ioctl$SNDRV_TIMER_IOCTL_STOP(0xffffffffffffffff, 0x54a1) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000000180)={0x0, 0x25}, &(0x7f00000001c0)) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="400000000000000008001b000000"], 0x30}}, 0x0) writev(r0, &(0x7f0000000680)=[{&(0x7f0000000280)="8584e2ebc46e0bf7db67357e179fb5c3fe8855e7551eefe5b3102c5888929e34054ababdaa12fe7fba1a272ea01782cf9b5dba0fc2ad8a2183b6911ffdc177d8d536cc6c5c6467b788ab902f35a4ab581cca065b3b16cc24a5e3507e2597614cc9fd255c2fad980b0e989bd4698e2cac5d1909da10f2f66a0f85e1a5f93d89d710fe408b171b6394a2a4248058c9085bd202a6a65daa680b5262ea2f60481ca1fcdb221e2831801bce0905ac712f1125ddd1bbfc653f0bd5f8ba486895cb3e9205e964f3bd89d966ccc10bd16abdacaed4dc082bac5c196e7e3ccf4406222769dc4a25403d8b7a12b44ea16e35", 0xed}, {&(0x7f0000000200)="2e980d6a284f5c59c31a8cfe0037e94b37e6c79759a312729c3f5834e6ba99bacedd5b111f4c8900e261ec3d28a12f09ab376a5436444e09a35b19b4d6", 0x3d}, {&(0x7f0000000380)}, {&(0x7f0000000440)="4856f91984e182df3263e2764d7d90b8cd1d3dd4158492de995ea5fab34feb1738148f59844a6bff27e8655edd21c827a00c3ce1299380f8a7a3408637bb5fa0", 0x40}, {&(0x7f0000000500)="e444e0f1dde9077f024c4dd0ba9543def2cdd0a782ca2565f1de83d15c63ecc9c91549d9cd776ce3bd20c683c5fdb28f571e9c0527c62c437a3fb7bbd2", 0x3d}, {0x0}], 0x6) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/load\x00', 0x2, 0x0) write(r2, &(0x7f0000000080)="f9", 0x1) 22:42:09 executing program 5: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getgid() sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000000)={&(0x7f0000ffe000/0x1000)=nil, 0x1000}, &(0x7f0000000040)=0x10) r0 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'sit0\x00', 0x0}) bind$packet(r0, &(0x7f0000000300)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="65ed59501ed8"}, 0x14) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$IPT_SO_GET_REVISION_MATCH(r0, 0x0, 0x42, 0x0, &(0x7f0000000140)) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 22:42:09 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) sendto$inet6(r0, 0x0, 0x0, 0xc001, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$inet6_udp_int(r0, 0x11, 0x65, &(0x7f0000000000)=0x80000000, 0x4) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) 22:42:09 executing program 2: syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) setsockopt$IP_VS_SO_SET_DEL(r0, 0x0, 0x484, &(0x7f0000000140)={0x0, @rand_addr=0xfffffffffffffbff, 0x4e24, 0x0, 'nq\x00', 0x20, 0x8}, 0x2c) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe6}]}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(0x0, 0x0, 0x100) sendto$inet(r1, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x652b, 0xc, 0x0, 0x27) 22:42:09 executing program 3: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_int(r0, 0x29, 0x24, &(0x7f0000000000)=0x7ffffffe, 0x4) syz_emit_ethernet(0xa7, &(0x7f0000000100)={@link_local, @random="9f789bae12cf", [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0xffffff3a, 0x0, @ipv4={[0x3580], [], @multicast2}, @mcast2, {[], @icmpv6=@time_exceed={0xffffff80, 0x0, 0x0, 0x0, [0x9, 0x4], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 311.676940] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. [ 311.774645] SELinux: failed to load policy 22:42:09 executing program 2: syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) setsockopt$IP_VS_SO_SET_DEL(r0, 0x0, 0x484, &(0x7f0000000140)={0x0, @rand_addr=0xfffffffffffffbff, 0x4e24, 0x0, 'nq\x00', 0x20, 0x8}, 0x2c) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe6}]}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(0x0, 0x0, 0x100) sendto$inet(r1, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x652b, 0xc, 0x0, 0x27) 22:42:09 executing program 2: r0 = socket(0x10, 0x200000000080003, 0xc) write(r0, &(0x7f0000000000)="1f00000001057ffffd3f00c007110000f30501000b00060000b67aca310000", 0x1f) [ 314.392055] bridge0: port 2(bridge_slave_1) entered disabled state [ 314.398628] bridge0: port 1(bridge_slave_0) entered disabled state [ 316.923280] net_ratelimit: 21 callbacks suppressed [ 316.923288] protocol 88fb is buggy, dev hsr_slave_0 [ 316.933414] protocol 88fb is buggy, dev hsr_slave_1 [ 317.243344] protocol 88fb is buggy, dev hsr_slave_0 [ 317.248470] protocol 88fb is buggy, dev hsr_slave_1 [ 317.403247] protocol 88fb is buggy, dev hsr_slave_0 [ 317.408318] protocol 88fb is buggy, dev hsr_slave_1 [ 317.573240] protocol 88fb is buggy, dev hsr_slave_0 [ 317.578409] protocol 88fb is buggy, dev hsr_slave_1 [ 317.733280] protocol 88fb is buggy, dev hsr_slave_0 [ 317.738363] protocol 88fb is buggy, dev hsr_slave_1 22:42:15 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) open(&(0x7f0000000240)='./file0\x00', 0x551000, 0x0) ioctl$SNDRV_TIMER_IOCTL_STOP(0xffffffffffffffff, 0x54a1) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000000180)={0x0, 0x25}, &(0x7f00000001c0)) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="400000000000000008001b000000"], 0x30}}, 0x0) writev(r0, &(0x7f0000000680)=[{&(0x7f0000000280)="8584e2ebc46e0bf7db67357e179fb5c3fe8855e7551eefe5b3102c5888929e34054ababdaa12fe7fba1a272ea01782cf9b5dba0fc2ad8a2183b6911ffdc177d8d536cc6c5c6467b788ab902f35a4ab581cca065b3b16cc24a5e3507e2597614cc9fd255c2fad980b0e989bd4698e2cac5d1909da10f2f66a0f85e1a5f93d89d710fe408b171b6394a2a4248058c9085bd202a6a65daa680b5262ea2f60481ca1fcdb221e2831801bce0905ac712f1125ddd1bbfc653f0bd5f8ba486895cb3e9205e964f3bd89d966ccc10bd16abdacaed4dc082bac5c196e7e3ccf4406222769dc4a25403d8b7a12b44ea16e35", 0xed}, {&(0x7f0000000200)="2e980d6a284f5c59c31a8cfe0037e94b37e6c79759a312729c3f5834e6ba99bacedd5b111f4c8900e261ec3d28a12f09ab376a5436444e09a35b19b4d6", 0x3d}, {&(0x7f0000000380)}, {&(0x7f0000000440)="4856f91984e182df3263e2764d7d90b8cd1d3dd4158492de995ea5fab34feb1738148f59844a6bff27e8655edd21c827a00c3ce1299380f8a7a3408637bb5fa0", 0x40}, {&(0x7f0000000500)="e444e0f1dde9077f024c4dd0ba9543def2cdd0a782ca2565f1de83d15c63ecc9c91549d9cd776ce3bd20c683c5fdb28f571e9c0527c62c437a3fb7bbd2", 0x3d}, {0x0}], 0x6) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/load\x00', 0x2, 0x0) write(r2, &(0x7f0000000080)="f9", 0x1) 22:42:15 executing program 2: r0 = socket(0x10, 0x200000000080003, 0xc) write(r0, &(0x7f0000000000)="1f00000001057ffffd3f00c007110000f30501000b00060000b67aca310000", 0x1f) 22:42:15 executing program 5: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getgid() sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000000)={&(0x7f0000ffe000/0x1000)=nil, 0x1000}, &(0x7f0000000040)=0x10) r0 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'sit0\x00', 0x0}) bind$packet(r0, &(0x7f0000000300)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="65ed59501ed8"}, 0x14) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$IPT_SO_GET_REVISION_MATCH(r0, 0x0, 0x42, 0x0, &(0x7f0000000140)) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 22:42:15 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) open(&(0x7f0000000240)='./file0\x00', 0x551000, 0x0) ioctl$SNDRV_TIMER_IOCTL_STOP(0xffffffffffffffff, 0x54a1) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000000180)={0x0, 0x25}, &(0x7f00000001c0)) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="400000000000000008001b000000"], 0x30}}, 0x0) writev(r0, &(0x7f0000000680)=[{&(0x7f0000000280)="8584e2ebc46e0bf7db67357e179fb5c3fe8855e7551eefe5b3102c5888929e34054ababdaa12fe7fba1a272ea01782cf9b5dba0fc2ad8a2183b6911ffdc177d8d536cc6c5c6467b788ab902f35a4ab581cca065b3b16cc24a5e3507e2597614cc9fd255c2fad980b0e989bd4698e2cac5d1909da10f2f66a0f85e1a5f93d89d710fe408b171b6394a2a4248058c9085bd202a6a65daa680b5262ea2f60481ca1fcdb221e2831801bce0905ac712f1125ddd1bbfc653f0bd5f8ba486895cb3e9205e964f3bd89d966ccc10bd16abdacaed4dc082bac5c196e7e3ccf4406222769dc4a25403d8b7a12b44ea16e35", 0xed}, {&(0x7f0000000200)="2e980d6a284f5c59c31a8cfe0037e94b37e6c79759a312729c3f5834e6ba99bacedd5b111f4c8900e261ec3d28a12f09ab376a5436444e09a35b19b4d6", 0x3d}, {&(0x7f0000000380)}, {&(0x7f0000000440)="4856f91984e182df3263e2764d7d90b8cd1d3dd4158492de995ea5fab34feb1738148f59844a6bff27e8655edd21c827a00c3ce1299380f8a7a3408637bb5fa0", 0x40}, {&(0x7f0000000500)="e444e0f1dde9077f024c4dd0ba9543def2cdd0a782ca2565f1de83d15c63ecc9c91549d9cd776ce3bd20c683c5fdb28f571e9c0527c62c437a3fb7bbd2", 0x3d}, {0x0}], 0x6) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/load\x00', 0x2, 0x0) write(r2, &(0x7f0000000080)="f9", 0x1) 22:42:15 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) sendto$inet6(r0, 0x0, 0x0, 0xc001, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$inet6_udp_int(r0, 0x11, 0x65, &(0x7f0000000000)=0x80000000, 0x4) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) [ 318.198042] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. 22:42:15 executing program 3: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_int(r0, 0x29, 0x24, &(0x7f0000000000)=0x7ffffffe, 0x4) syz_emit_ethernet(0xa7, &(0x7f0000000100)={@link_local, @random="9f789bae12cf", [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0xffffff3a, 0x0, @ipv4={[0x3580], [], @multicast2}, @mcast2, {[], @icmpv6=@time_exceed={0xffffff80, 0x0, 0x0, 0x0, [0x9, 0x4], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 22:42:15 executing program 2: r0 = socket(0x10, 0x200000000080003, 0xc) write(r0, &(0x7f0000000000)="1f00000001057ffffd3f00c007110000f30501000b00060000b67aca310000", 0x1f) 22:42:15 executing program 3: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_int(r0, 0x29, 0x24, &(0x7f0000000000)=0x7ffffffe, 0x4) syz_emit_ethernet(0xa7, &(0x7f0000000100)={@link_local, @random="9f789bae12cf", [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0xffffff3a, 0x0, @ipv4={[0x3580], [], @multicast2}, @mcast2, {[], @icmpv6=@time_exceed={0xffffff80, 0x0, 0x0, 0x0, [0x9, 0x4], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 318.316789] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. [ 318.347584] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. 22:42:15 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000080)={0x0, 0x5d, &(0x7f0000000300)={&(0x7f0000000040)={0x14, 0x29, 0x7, 0x0, 0x0, {0x4, 0x2}}, 0x14}}, 0x0) 22:42:15 executing program 2: r0 = socket(0x10, 0x200000000080003, 0xc) write(r0, &(0x7f0000000000)="1f00000001057ffffd3f00c007110000f30501000b00060000b67aca310000", 0x1f) [ 318.397223] SELinux: failed to load policy 22:42:15 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) open(&(0x7f0000000240)='./file0\x00', 0x551000, 0x0) ioctl$SNDRV_TIMER_IOCTL_STOP(0xffffffffffffffff, 0x54a1) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000000180)={0x0, 0x25}, &(0x7f00000001c0)) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="400000000000000008001b000000"], 0x30}}, 0x0) writev(r0, &(0x7f0000000680)=[{&(0x7f0000000280)="8584e2ebc46e0bf7db67357e179fb5c3fe8855e7551eefe5b3102c5888929e34054ababdaa12fe7fba1a272ea01782cf9b5dba0fc2ad8a2183b6911ffdc177d8d536cc6c5c6467b788ab902f35a4ab581cca065b3b16cc24a5e3507e2597614cc9fd255c2fad980b0e989bd4698e2cac5d1909da10f2f66a0f85e1a5f93d89d710fe408b171b6394a2a4248058c9085bd202a6a65daa680b5262ea2f60481ca1fcdb221e2831801bce0905ac712f1125ddd1bbfc653f0bd5f8ba486895cb3e9205e964f3bd89d966ccc10bd16abdacaed4dc082bac5c196e7e3ccf4406222769dc4a25403d8b7a12b44ea16e35", 0xed}, {&(0x7f0000000200)="2e980d6a284f5c59c31a8cfe0037e94b37e6c79759a312729c3f5834e6ba99bacedd5b111f4c8900e261ec3d28a12f09ab376a5436444e09a35b19b4d6", 0x3d}, {&(0x7f0000000380)}, {&(0x7f0000000440)="4856f91984e182df3263e2764d7d90b8cd1d3dd4158492de995ea5fab34feb1738148f59844a6bff27e8655edd21c827a00c3ce1299380f8a7a3408637bb5fa0", 0x40}, {&(0x7f0000000500)="e444e0f1dde9077f024c4dd0ba9543def2cdd0a782ca2565f1de83d15c63ecc9c91549d9cd776ce3bd20c683c5fdb28f571e9c0527c62c437a3fb7bbd2", 0x3d}, {0x0}], 0x6) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/load\x00', 0x2, 0x0) write(r2, &(0x7f0000000080)="f9", 0x1) 22:42:15 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x13}) 22:42:15 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$bt_sco_SCO_OPTIONS(r0, 0x11, 0x1, 0x0, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000107, 0x6031, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f00000005c0)='/dev/uinput\x00', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x0, 0x11, r1, 0x0) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x7, 0x0, "20ed0bbf7312239652c407c20b6654878dfa1b", 0x7fff, 0x1}) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, 0x0, 0x0, 0x2000000000002) 22:42:15 executing program 2: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$inet6_int(r0, 0x29, 0x40000000024, 0x0, &(0x7f0000000080)) [ 318.548378] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. 22:42:16 executing program 5: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getgid() sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000000)={&(0x7f0000ffe000/0x1000)=nil, 0x1000}, &(0x7f0000000040)=0x10) r0 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'sit0\x00', 0x0}) bind$packet(r0, &(0x7f0000000300)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="65ed59501ed8"}, 0x14) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$IPT_SO_GET_REVISION_MATCH(r0, 0x0, 0x42, 0x0, &(0x7f0000000140)) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 22:42:16 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000080)={0x0, 0x5d, &(0x7f0000000300)={&(0x7f0000000040)={0x14, 0x29, 0x7, 0x0, 0x0, {0x4, 0x2}}, 0x14}}, 0x0) 22:42:16 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x13}) 22:42:16 executing program 2: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$inet6_int(r0, 0x29, 0x40000000024, 0x0, &(0x7f0000000080)) 22:42:16 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000980)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000140)=0xd) syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0xffffffffffffffff, 0x2) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, 0x0, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 22:42:16 executing program 2: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$inet6_int(r0, 0x29, 0x40000000024, 0x0, &(0x7f0000000080)) 22:42:16 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x13}) 22:42:16 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000080)={0x0, 0x5d, &(0x7f0000000300)={&(0x7f0000000040)={0x14, 0x29, 0x7, 0x0, 0x0, {0x4, 0x2}}, 0x14}}, 0x0) 22:42:16 executing program 2: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$inet6_int(r0, 0x29, 0x40000000024, 0x0, &(0x7f0000000080)) 22:42:16 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000080)={0x0, 0x5d, &(0x7f0000000300)={&(0x7f0000000040)={0x14, 0x29, 0x7, 0x0, 0x0, {0x4, 0x2}}, 0x14}}, 0x0) 22:42:17 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$bt_sco_SCO_OPTIONS(r0, 0x11, 0x1, 0x0, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000107, 0x6031, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f00000005c0)='/dev/uinput\x00', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x0, 0x11, r1, 0x0) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x7, 0x0, "20ed0bbf7312239652c407c20b6654878dfa1b", 0x7fff, 0x1}) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, 0x0, 0x0, 0x2000000000002) 22:42:17 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x13}) 22:42:17 executing program 2: ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000040)=0x0) r1 = getpid() rt_tgsigqueueinfo(r0, r1, 0x3f, &(0x7f0000000080)) syz_open_dev$evdev(0x0, 0xfffffffffffffc01, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndctrl(0x0, 0x0, 0x0) r2 = open(0x0, 0x0, 0x0) fcntl$setlease(r2, 0x400, 0x0) unlink(0x0) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, 0x0, 0x0, 0x70bd2a, 0x25dfdbfc, {}, ["", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24000810}, 0x40040) r3 = socket$rxrpc(0x21, 0x2, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r3, 0x110, 0x3, 0x0, 0xc0) mbind(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x0, 0xffffffffffffffff, 0x0) epoll_create(0xfb) ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) write$RDMA_USER_CM_CMD_GET_EVENT(r2, &(0x7f0000000240)={0xc, 0x8, 0xfa00, {&(0x7f0000000380)}}, 0x10) gettid() clock_gettime(0x0, 0x0) ioctl$TIOCGPTLCK(r2, 0x80045439, &(0x7f0000000280)) syz_extract_tcp_res$synack(&(0x7f0000000000), 0x1, 0x0) ioctl$LOOP_SET_BLOCK_SIZE(r2, 0x4c09, 0x7) ioctl$TCSETAF(r2, 0x5408, 0x0) unshare(0x40000000) 22:42:17 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000040)={@link_local={0x1, 0x80, 0xc2, 0x72010000, 0x700000000000000}, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, "08de06", 0x38, 0x3a, 0x0, @ipv4={[], [], @multicast2}, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0xffffff88, 0x0, @loopback, @loopback, [], "fca967e17f791010"}}}}}}}, 0x0) 22:42:17 executing program 5: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getgid() sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000000)={&(0x7f0000ffe000/0x1000)=nil, 0x1000}, &(0x7f0000000040)=0x10) r0 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'sit0\x00', 0x0}) bind$packet(r0, &(0x7f0000000300)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="65ed59501ed8"}, 0x14) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$IPT_SO_GET_REVISION_MATCH(r0, 0x0, 0x42, 0x0, &(0x7f0000000140)) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 22:42:17 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000980)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000140)=0xd) syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0xffffffffffffffff, 0x2) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, 0x0, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 22:42:17 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000040)={@link_local={0x1, 0x80, 0xc2, 0x72010000, 0x700000000000000}, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, "08de06", 0x38, 0x3a, 0x0, @ipv4={[], [], @multicast2}, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0xffffff88, 0x0, @loopback, @loopback, [], "fca967e17f791010"}}}}}}}, 0x0) [ 319.746904] IPVS: ftp: loaded support on port[0] = 21 22:42:17 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000980)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000140)=0xd) syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0xffffffffffffffff, 0x2) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, 0x0, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 22:42:17 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000040)={@link_local={0x1, 0x80, 0xc2, 0x72010000, 0x700000000000000}, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, "08de06", 0x38, 0x3a, 0x0, @ipv4={[], [], @multicast2}, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0xffffff88, 0x0, @loopback, @loopback, [], "fca967e17f791010"}}}}}}}, 0x0) 22:42:17 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000040)={@link_local={0x1, 0x80, 0xc2, 0x72010000, 0x700000000000000}, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, "08de06", 0x38, 0x3a, 0x0, @ipv4={[], [], @multicast2}, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0xffffff88, 0x0, @loopback, @loopback, [], "fca967e17f791010"}}}}}}}, 0x0) [ 320.322130] IPVS: ftp: loaded support on port[0] = 21 22:42:17 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000980)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000140)=0xd) syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0xffffffffffffffff, 0x2) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, 0x0, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 22:42:17 executing program 2: ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000040)=0x0) r1 = getpid() rt_tgsigqueueinfo(r0, r1, 0x3f, &(0x7f0000000080)) syz_open_dev$evdev(0x0, 0xfffffffffffffc01, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndctrl(0x0, 0x0, 0x0) r2 = open(0x0, 0x0, 0x0) fcntl$setlease(r2, 0x400, 0x0) unlink(0x0) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, 0x0, 0x0, 0x70bd2a, 0x25dfdbfc, {}, ["", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24000810}, 0x40040) r3 = socket$rxrpc(0x21, 0x2, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r3, 0x110, 0x3, 0x0, 0xc0) mbind(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x0, 0xffffffffffffffff, 0x0) epoll_create(0xfb) ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) write$RDMA_USER_CM_CMD_GET_EVENT(r2, &(0x7f0000000240)={0xc, 0x8, 0xfa00, {&(0x7f0000000380)}}, 0x10) gettid() clock_gettime(0x0, 0x0) ioctl$TIOCGPTLCK(r2, 0x80045439, &(0x7f0000000280)) syz_extract_tcp_res$synack(&(0x7f0000000000), 0x1, 0x0) ioctl$LOOP_SET_BLOCK_SIZE(r2, 0x4c09, 0x7) ioctl$TCSETAF(r2, 0x5408, 0x0) unshare(0x40000000) 22:42:18 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000980)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000140)=0xd) syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0xffffffffffffffff, 0x2) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, 0x0, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 22:42:18 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$bt_sco_SCO_OPTIONS(r0, 0x11, 0x1, 0x0, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000107, 0x6031, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f00000005c0)='/dev/uinput\x00', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x0, 0x11, r1, 0x0) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x7, 0x0, "20ed0bbf7312239652c407c20b6654878dfa1b", 0x7fff, 0x1}) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, 0x0, 0x0, 0x2000000000002) 22:42:18 executing program 5: ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000040)=0x0) r1 = getpid() rt_tgsigqueueinfo(r0, r1, 0x3f, &(0x7f0000000080)) syz_open_dev$evdev(0x0, 0xfffffffffffffc01, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndctrl(0x0, 0x0, 0x0) r2 = open(0x0, 0x0, 0x0) fcntl$setlease(r2, 0x400, 0x0) unlink(0x0) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, 0x0, 0x0, 0x70bd2a, 0x25dfdbfc, {}, ["", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24000810}, 0x40040) r3 = socket$rxrpc(0x21, 0x2, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r3, 0x110, 0x3, 0x0, 0xc0) mbind(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x0, 0xffffffffffffffff, 0x0) epoll_create(0xfb) ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) write$RDMA_USER_CM_CMD_GET_EVENT(r2, &(0x7f0000000240)={0xc, 0x8, 0xfa00, {&(0x7f0000000380)}}, 0x10) gettid() clock_gettime(0x0, 0x0) ioctl$TIOCGPTLCK(r2, 0x80045439, &(0x7f0000000280)) syz_extract_tcp_res$synack(&(0x7f0000000000), 0x1, 0x0) ioctl$LOOP_SET_BLOCK_SIZE(r2, 0x4c09, 0x7) ioctl$TCSETAF(r2, 0x5408, 0x0) unshare(0x40000000) 22:42:18 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000980)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000140)=0xd) syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0xffffffffffffffff, 0x2) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, 0x0, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 22:42:18 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000980)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000140)=0xd) syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0xffffffffffffffff, 0x2) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, 0x0, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 22:42:19 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000980)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000140)=0xd) syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0xffffffffffffffff, 0x2) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, 0x0, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 22:42:19 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000980)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000140)=0xd) syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0xffffffffffffffff, 0x2) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, 0x0, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 22:42:19 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000980)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000140)=0xd) syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0xffffffffffffffff, 0x2) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, 0x0, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 22:42:19 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$bt_sco_SCO_OPTIONS(r0, 0x11, 0x1, 0x0, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000107, 0x6031, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f00000005c0)='/dev/uinput\x00', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x0, 0x11, r1, 0x0) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x7, 0x0, "20ed0bbf7312239652c407c20b6654878dfa1b", 0x7fff, 0x1}) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, 0x0, 0x0, 0x2000000000002) 22:42:20 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$bt_sco_SCO_OPTIONS(r0, 0x11, 0x1, 0x0, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000107, 0x6031, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f00000005c0)='/dev/uinput\x00', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x0, 0x11, r1, 0x0) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x7, 0x0, "20ed0bbf7312239652c407c20b6654878dfa1b", 0x7fff, 0x1}) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, 0x0, 0x0, 0x2000000000002) 22:42:20 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$bt_sco_SCO_OPTIONS(r0, 0x11, 0x1, 0x0, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000107, 0x6031, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f00000005c0)='/dev/uinput\x00', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x0, 0x11, r1, 0x0) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x7, 0x0, "20ed0bbf7312239652c407c20b6654878dfa1b", 0x7fff, 0x1}) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, 0x0, 0x0, 0x2000000000002) [ 323.163662] net_ratelimit: 16 callbacks suppressed [ 323.163730] protocol 88fb is buggy, dev hsr_slave_0 [ 323.174277] protocol 88fb is buggy, dev hsr_slave_1 [ 323.653257] protocol 88fb is buggy, dev hsr_slave_0 [ 323.658336] protocol 88fb is buggy, dev hsr_slave_1 [ 323.803558] protocol 88fb is buggy, dev hsr_slave_0 [ 323.808970] protocol 88fb is buggy, dev hsr_slave_1 [ 323.964077] protocol 88fb is buggy, dev hsr_slave_0 [ 323.969546] protocol 88fb is buggy, dev hsr_slave_1 22:42:22 executing program 2: ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000040)=0x0) r1 = getpid() rt_tgsigqueueinfo(r0, r1, 0x3f, &(0x7f0000000080)) syz_open_dev$evdev(0x0, 0xfffffffffffffc01, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndctrl(0x0, 0x0, 0x0) r2 = open(0x0, 0x0, 0x0) fcntl$setlease(r2, 0x400, 0x0) unlink(0x0) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, 0x0, 0x0, 0x70bd2a, 0x25dfdbfc, {}, ["", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24000810}, 0x40040) r3 = socket$rxrpc(0x21, 0x2, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r3, 0x110, 0x3, 0x0, 0xc0) mbind(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x0, 0xffffffffffffffff, 0x0) epoll_create(0xfb) ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) write$RDMA_USER_CM_CMD_GET_EVENT(r2, &(0x7f0000000240)={0xc, 0x8, 0xfa00, {&(0x7f0000000380)}}, 0x10) gettid() clock_gettime(0x0, 0x0) ioctl$TIOCGPTLCK(r2, 0x80045439, &(0x7f0000000280)) syz_extract_tcp_res$synack(&(0x7f0000000000), 0x1, 0x0) ioctl$LOOP_SET_BLOCK_SIZE(r2, 0x4c09, 0x7) ioctl$TCSETAF(r2, 0x5408, 0x0) unshare(0x40000000) 22:42:22 executing program 1: r0 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0xd, 0x0) ioctl$VIDIOC_ENUM_FREQ_BANDS(r0, 0xc0405665, &(0x7f0000000000)={0x0, 0x2}) 22:42:22 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$bt_sco_SCO_OPTIONS(r0, 0x11, 0x1, 0x0, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000107, 0x6031, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f00000005c0)='/dev/uinput\x00', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x0, 0x11, r1, 0x0) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x7, 0x0, "20ed0bbf7312239652c407c20b6654878dfa1b", 0x7fff, 0x1}) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, 0x0, 0x0, 0x2000000000002) 22:42:22 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'lo\x00', &(0x7f0000000380)=ANY=[@ANYBLOB='&\x00\x00\x00\x00\x00\x00\b']}) 22:42:22 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$bt_sco_SCO_OPTIONS(r0, 0x11, 0x1, 0x0, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000107, 0x6031, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f00000005c0)='/dev/uinput\x00', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x0, 0x11, r1, 0x0) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x7, 0x0, "20ed0bbf7312239652c407c20b6654878dfa1b", 0x7fff, 0x1}) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, 0x0, 0x0, 0x2000000000002) 22:42:22 executing program 5: ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000040)=0x0) r1 = getpid() rt_tgsigqueueinfo(r0, r1, 0x3f, &(0x7f0000000080)) syz_open_dev$evdev(0x0, 0xfffffffffffffc01, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndctrl(0x0, 0x0, 0x0) r2 = open(0x0, 0x0, 0x0) fcntl$setlease(r2, 0x400, 0x0) unlink(0x0) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, 0x0, 0x0, 0x70bd2a, 0x25dfdbfc, {}, ["", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24000810}, 0x40040) r3 = socket$rxrpc(0x21, 0x2, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r3, 0x110, 0x3, 0x0, 0xc0) mbind(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x0, 0xffffffffffffffff, 0x0) epoll_create(0xfb) ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) write$RDMA_USER_CM_CMD_GET_EVENT(r2, &(0x7f0000000240)={0xc, 0x8, 0xfa00, {&(0x7f0000000380)}}, 0x10) gettid() clock_gettime(0x0, 0x0) ioctl$TIOCGPTLCK(r2, 0x80045439, &(0x7f0000000280)) syz_extract_tcp_res$synack(&(0x7f0000000000), 0x1, 0x0) ioctl$LOOP_SET_BLOCK_SIZE(r2, 0x4c09, 0x7) ioctl$TCSETAF(r2, 0x5408, 0x0) unshare(0x40000000) 22:42:22 executing program 1: r0 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0xd, 0x0) ioctl$VIDIOC_ENUM_FREQ_BANDS(r0, 0xc0405665, &(0x7f0000000000)={0x0, 0x2}) 22:42:22 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'lo\x00', &(0x7f0000000380)=ANY=[@ANYBLOB='&\x00\x00\x00\x00\x00\x00\b']}) 22:42:22 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'lo\x00', &(0x7f0000000380)=ANY=[@ANYBLOB='&\x00\x00\x00\x00\x00\x00\b']}) 22:42:22 executing program 1: r0 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0xd, 0x0) ioctl$VIDIOC_ENUM_FREQ_BANDS(r0, 0xc0405665, &(0x7f0000000000)={0x0, 0x2}) 22:42:22 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'lo\x00', &(0x7f0000000380)=ANY=[@ANYBLOB='&\x00\x00\x00\x00\x00\x00\b']}) 22:42:22 executing program 1: r0 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0xd, 0x0) ioctl$VIDIOC_ENUM_FREQ_BANDS(r0, 0xc0405665, &(0x7f0000000000)={0x0, 0x2}) [ 325.254137] protocol 88fb is buggy, dev hsr_slave_0 [ 325.259567] protocol 88fb is buggy, dev hsr_slave_1 22:42:24 executing program 2: ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000040)=0x0) r1 = getpid() rt_tgsigqueueinfo(r0, r1, 0x3f, &(0x7f0000000080)) syz_open_dev$evdev(0x0, 0xfffffffffffffc01, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndctrl(0x0, 0x0, 0x0) r2 = open(0x0, 0x0, 0x0) fcntl$setlease(r2, 0x400, 0x0) unlink(0x0) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, 0x0, 0x0, 0x70bd2a, 0x25dfdbfc, {}, ["", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24000810}, 0x40040) r3 = socket$rxrpc(0x21, 0x2, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r3, 0x110, 0x3, 0x0, 0xc0) mbind(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x0, 0xffffffffffffffff, 0x0) epoll_create(0xfb) ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) write$RDMA_USER_CM_CMD_GET_EVENT(r2, &(0x7f0000000240)={0xc, 0x8, 0xfa00, {&(0x7f0000000380)}}, 0x10) gettid() clock_gettime(0x0, 0x0) ioctl$TIOCGPTLCK(r2, 0x80045439, &(0x7f0000000280)) syz_extract_tcp_res$synack(&(0x7f0000000000), 0x1, 0x0) ioctl$LOOP_SET_BLOCK_SIZE(r2, 0x4c09, 0x7) ioctl$TCSETAF(r2, 0x5408, 0x0) unshare(0x40000000) 22:42:24 executing program 1: r0 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x0, 0x2) read$alg(r0, &(0x7f0000000340)=""/4096, 0x1000) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000240)={0x0, 0x0, 0x1, {0xb, @sdr}}) 22:42:24 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='oom_adj\x00') sendfile(r0, r0, 0x0, 0x104) 22:42:24 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$bt_sco_SCO_OPTIONS(r0, 0x11, 0x1, 0x0, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000107, 0x6031, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f00000005c0)='/dev/uinput\x00', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x0, 0x11, r1, 0x0) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x7, 0x0, "20ed0bbf7312239652c407c20b6654878dfa1b", 0x7fff, 0x1}) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, 0x0, 0x0, 0x2000000000002) 22:42:24 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$bt_sco_SCO_OPTIONS(r0, 0x11, 0x1, 0x0, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000107, 0x6031, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f00000005c0)='/dev/uinput\x00', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x0, 0x11, r1, 0x0) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x7, 0x0, "20ed0bbf7312239652c407c20b6654878dfa1b", 0x7fff, 0x1}) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, 0x0, 0x0, 0x2000000000002) 22:42:24 executing program 5: ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000040)=0x0) r1 = getpid() rt_tgsigqueueinfo(r0, r1, 0x3f, &(0x7f0000000080)) syz_open_dev$evdev(0x0, 0xfffffffffffffc01, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndctrl(0x0, 0x0, 0x0) r2 = open(0x0, 0x0, 0x0) fcntl$setlease(r2, 0x400, 0x0) unlink(0x0) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, 0x0, 0x0, 0x70bd2a, 0x25dfdbfc, {}, ["", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24000810}, 0x40040) r3 = socket$rxrpc(0x21, 0x2, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r3, 0x110, 0x3, 0x0, 0xc0) mbind(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x0, 0xffffffffffffffff, 0x0) epoll_create(0xfb) ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) write$RDMA_USER_CM_CMD_GET_EVENT(r2, &(0x7f0000000240)={0xc, 0x8, 0xfa00, {&(0x7f0000000380)}}, 0x10) gettid() clock_gettime(0x0, 0x0) ioctl$TIOCGPTLCK(r2, 0x80045439, &(0x7f0000000280)) syz_extract_tcp_res$synack(&(0x7f0000000000), 0x1, 0x0) ioctl$LOOP_SET_BLOCK_SIZE(r2, 0x4c09, 0x7) ioctl$TCSETAF(r2, 0x5408, 0x0) unshare(0x40000000) [ 326.808999] IPVS: ftp: loaded support on port[0] = 21 22:42:24 executing program 3: unshare(0x600) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='task\x00') fanotify_mark(r0, 0x80, 0x0, 0xffffffffffffffff, 0x0) 22:42:24 executing program 1: r0 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x0, 0x2) read$alg(r0, &(0x7f0000000340)=""/4096, 0x1000) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000240)={0x0, 0x0, 0x1, {0xb, @sdr}}) 22:42:24 executing program 3: unshare(0x600) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='task\x00') fanotify_mark(r0, 0x80, 0x0, 0xffffffffffffffff, 0x0) 22:42:24 executing program 1: r0 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x0, 0x2) read$alg(r0, &(0x7f0000000340)=""/4096, 0x1000) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000240)={0x0, 0x0, 0x1, {0xb, @sdr}}) 22:42:24 executing program 3: unshare(0x600) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='task\x00') fanotify_mark(r0, 0x80, 0x0, 0xffffffffffffffff, 0x0) 22:42:24 executing program 1: r0 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x0, 0x2) read$alg(r0, &(0x7f0000000340)=""/4096, 0x1000) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000240)={0x0, 0x0, 0x1, {0xb, @sdr}}) [ 327.396779] IPVS: ftp: loaded support on port[0] = 21 22:42:26 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_PPC_ALLOCATE_HTAB(0xffffffffffffffff, 0xc004aea7, &(0x7f0000a1cffc)) madvise(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x10200000004) 22:42:26 executing program 3: unshare(0x600) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='task\x00') fanotify_mark(r0, 0x80, 0x0, 0xffffffffffffffff, 0x0) 22:42:26 executing program 1: r0 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x0, 0x2) read$alg(r0, &(0x7f0000000340)=""/4096, 0x1000) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000240)={0x0, 0x0, 0x1, {0xb, @sdr}}) 22:42:26 executing program 5: syz_emit_ethernet(0x7e, &(0x7f00000000c0)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0xc, 0x4, 0x0, 0x0, 0x0, 0x7000000000000000, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4021, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) 22:42:26 executing program 4: socketpair$unix(0x1, 0x40000000005, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f00000033c0)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1, 0x2c}]}, &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0xf}, 0x48) 22:42:26 executing program 0: r0 = socket$inet(0x2, 0x5000000000000001, 0x0) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x483, &(0x7f00000000c0)={0x11, @remote, 0x0, 0x0, 'lc\x00'}, 0x2c) 22:42:26 executing program 5: syz_emit_ethernet(0x7e, &(0x7f00000000c0)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0xc, 0x4, 0x0, 0x0, 0x0, 0x7000000000000000, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4021, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) 22:42:26 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) pipe2(&(0x7f0000000300), 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000000740)={0x0, 0x2, 0x0, 0x1000, &(0x7f0000000000/0x1000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_PIT2(0xffffffffffffffff, 0x4070aea0, &(0x7f00000004c0)={[{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, {0x3, 0xffffffffd927d9bc, 0x0, 0x0, 0x0, 0x0, 0x62c, 0x3, 0x0, 0x0, 0xffffffff, 0x0, 0x100000000}]}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) write$FUSE_STATFS(0xffffffffffffffff, &(0x7f0000000180)={0x60, 0x0, 0x0, {{0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x6}}}, 0x60) sendmsg$TIPC_NL_NET_SET(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000540)=ANY=[]}}, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0xfb]}) syz_genetlink_get_family_id$tipc(&(0x7f0000000540)='TIPC\x00') ioctl$KVM_SET_REGS(0xffffffffffffffff, 0x4090ae82, &(0x7f0000000580)={[0x0, 0x8969, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3], 0x4}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 22:42:26 executing program 0: r0 = syz_open_dev$dri(&(0x7f0000000240)='/dev/dri/card#\x00', 0x7fffffef, 0x0) ioctl$DRM_IOCTL_GET_CAP(r0, 0xc010640c, &(0x7f0000000000)={0x9}) 22:42:26 executing program 1: r0 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x0, 0x2) read$alg(r0, &(0x7f0000000340)=""/4096, 0x1000) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000240)={0x0, 0x0, 0x1, {0xb, @sdr}}) 22:42:26 executing program 4: socketpair$unix(0x1, 0x40000000005, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f00000033c0)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1, 0x2c}]}, &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0xf}, 0x48) 22:42:26 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_PPC_ALLOCATE_HTAB(0xffffffffffffffff, 0xc004aea7, &(0x7f0000a1cffc)) madvise(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x10200000004) 22:42:26 executing program 0: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x0, 0x0) 22:42:26 executing program 5: syz_emit_ethernet(0x7e, &(0x7f00000000c0)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0xc, 0x4, 0x0, 0x0, 0x0, 0x7000000000000000, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4021, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) 22:42:26 executing program 3: syz_mount_image$btrfs(&(0x7f00000000c0)='btrfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000009c0)={[{@device={'device', 0x3d, './file1'}}]}) 22:42:26 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_PPC_ALLOCATE_HTAB(0xffffffffffffffff, 0xc004aea7, &(0x7f0000a1cffc)) madvise(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x10200000004) 22:42:26 executing program 1: r0 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x0, 0x2) read$alg(r0, &(0x7f0000000340)=""/4096, 0x1000) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000240)={0x0, 0x0, 0x1, {0xb, @sdr}}) 22:42:26 executing program 4: socketpair$unix(0x1, 0x40000000005, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f00000033c0)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1, 0x2c}]}, &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0xf}, 0x48) 22:42:26 executing program 0: timerfd_settime(0xffffffffffffffff, 0x554c5718c8f8b0d7, &(0x7f00000000c0)={{0x77359400}}, 0x0) 22:42:26 executing program 5: syz_emit_ethernet(0x7e, &(0x7f00000000c0)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0xc, 0x4, 0x0, 0x0, 0x0, 0x7000000000000000, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4021, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) 22:42:26 executing program 3: rt_sigprocmask(0x0, &(0x7f0000a9a000)={0xfffffffffffffffe}, 0x0, 0x8) setrlimit(0x1, &(0x7f0000011000)) r0 = memfd_create(&(0x7f0000000080)='Et\x00', 0x0) ioctl$TCSETA(r0, 0x4030582a, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000d8}) 22:42:26 executing program 0: timerfd_settime(0xffffffffffffffff, 0x554c5718c8f8b0d7, &(0x7f00000000c0)={{0x77359400}}, 0x0) [ 329.403295] net_ratelimit: 14 callbacks suppressed [ 329.403301] protocol 88fb is buggy, dev hsr_slave_0 [ 329.413472] protocol 88fb is buggy, dev hsr_slave_1 22:42:26 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_PPC_ALLOCATE_HTAB(0xffffffffffffffff, 0xc004aea7, &(0x7f0000a1cffc)) madvise(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x10200000004) 22:42:26 executing program 4: socketpair$unix(0x1, 0x40000000005, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f00000033c0)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1, 0x2c}]}, &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0xf}, 0x48) 22:42:26 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000280)={@empty}, 0x14) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000280)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000000)) 22:42:27 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xb2) r0 = syz_open_procfs(0x0, &(0x7f00000004c0)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x199, 0x0) 22:42:27 executing program 0: timerfd_settime(0xffffffffffffffff, 0x554c5718c8f8b0d7, &(0x7f00000000c0)={{0x77359400}}, 0x0) 22:42:27 executing program 3: rt_sigprocmask(0x0, &(0x7f0000a9a000)={0xfffffffffffffffe}, 0x0, 0x8) setrlimit(0x1, &(0x7f0000011000)) r0 = memfd_create(&(0x7f0000000080)='Et\x00', 0x0) ioctl$TCSETA(r0, 0x4030582a, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000d8}) 22:42:27 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) setsockopt$inet_opts(r0, 0x0, 0x4, 0x0, 0x0) 22:42:27 executing program 0: timerfd_settime(0xffffffffffffffff, 0x554c5718c8f8b0d7, &(0x7f00000000c0)={{0x77359400}}, 0x0) 22:42:27 executing program 3: rt_sigprocmask(0x0, &(0x7f0000a9a000)={0xfffffffffffffffe}, 0x0, 0x8) setrlimit(0x1, &(0x7f0000011000)) r0 = memfd_create(&(0x7f0000000080)='Et\x00', 0x0) ioctl$TCSETA(r0, 0x4030582a, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000d8}) 22:42:27 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000080)) 22:42:27 executing program 0: r0 = socket(0x10, 0x0, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, 0x0, 0x0) r1 = getpgid(0x0) ptrace$pokeuser(0x6, r1, 0x0, 0x0) clock_getres(0x6, 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$sndctrl(&(0x7f0000006000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r2, 0x40045532, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x0, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x100) ioctl$LOOP_SET_BLOCK_SIZE(r3, 0x4c09, 0x3) socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000080)=ANY=[]}}, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x10000, 0x0) r4 = openat$audio(0xffffffffffffff9c, &(0x7f0000000280)='/dev/audio\x00', 0x140202, 0x0) r5 = syz_open_dev$sndpcmp(0x0, 0x0, 0x405) dup2(r5, r4) syz_genetlink_get_family_id$ipvs(0x0) write(0xffffffffffffffff, &(0x7f0000000040)="240000001a005f0214f9f407000904001100", 0x12) 22:42:27 executing program 3: rt_sigprocmask(0x0, &(0x7f0000a9a000)={0xfffffffffffffffe}, 0x0, 0x8) setrlimit(0x1, &(0x7f0000011000)) r0 = memfd_create(&(0x7f0000000080)='Et\x00', 0x0) ioctl$TCSETA(r0, 0x4030582a, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000d8}) 22:42:27 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x0, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000040)={0x0, 0x0, "3b3defe73dd90ad6d71d26cfe329f136ae48051e3f9020c3"}) 22:42:27 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x6, 0x0) ioctl$VIDIOC_TRY_FMT(r0, 0xc0d05604, &(0x7f0000000240)={0xa, @sdr}) 22:42:27 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, 0x0, 0x800, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) [ 329.883787] protocol 88fb is buggy, dev hsr_slave_0 [ 329.889364] protocol 88fb is buggy, dev hsr_slave_1 [ 330.043320] protocol 88fb is buggy, dev hsr_slave_0 [ 330.048547] protocol 88fb is buggy, dev hsr_slave_1 22:42:27 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xb2) r0 = syz_open_procfs(0x0, &(0x7f00000004c0)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x199, 0x0) 22:42:27 executing program 4: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f00000000c0)={[{0x2d, 'pids'}]}, 0x6) write$cgroup_subtree(r1, 0x0, 0x0) 22:42:27 executing program 2: r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1005, 0x88101) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000100)) ioctl$int_in(r0, 0x800060c0045006, &(0x7f0000000040)=0x100000035) [ 330.204017] protocol 88fb is buggy, dev hsr_slave_0 [ 330.209506] protocol 88fb is buggy, dev hsr_slave_1 22:42:27 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) setsockopt$inet_opts(r0, 0x0, 0x4, 0x0, 0x0) 22:42:27 executing program 0: r0 = socket(0x10, 0x0, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, 0x0, 0x0) r1 = getpgid(0x0) ptrace$pokeuser(0x6, r1, 0x0, 0x0) clock_getres(0x6, 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$sndctrl(&(0x7f0000006000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r2, 0x40045532, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x0, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x100) ioctl$LOOP_SET_BLOCK_SIZE(r3, 0x4c09, 0x3) socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000080)=ANY=[]}}, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x10000, 0x0) r4 = openat$audio(0xffffffffffffff9c, &(0x7f0000000280)='/dev/audio\x00', 0x140202, 0x0) r5 = syz_open_dev$sndpcmp(0x0, 0x0, 0x405) dup2(r5, r4) syz_genetlink_get_family_id$ipvs(0x0) write(0xffffffffffffffff, &(0x7f0000000040)="240000001a005f0214f9f407000904001100", 0x12) 22:42:27 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, 0x0, 0x800, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) 22:42:27 executing program 2: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x24800002}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)={0x44, 0x0, 0x400, 0x0, 0x25dfdbfe, {}, [@FOU_ATTR_PEER_V4={0x8, 0x8, @multicast2}, @FOU_ATTR_PEER_PORT={0x8, 0xa, 0x4e23}, @FOU_ATTR_PEER_PORT={0x8, 0xa, 0x4e21}, @FOU_ATTR_AF={0x8, 0x2, 0xa}, @FOU_ATTR_PEER_PORT={0x8, 0xa, 0x4e21}, @FOU_ATTR_PEER_PORT={0x8, 0xa, 0x4e20}]}, 0x44}, 0x1, 0x0, 0x0, 0x11}, 0x4040000) socket(0x200000000000011, 0x4000000000080002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x40000000015, 0x5, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @loopback}, 0x10) bind$inet(r0, &(0x7f0000000340)={0x2, 0x4e20, @loopback}, 0x10) sendmsg$xdp(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000000380)="fe", 0x1a000}], 0x1}, 0x0) 22:42:27 executing program 4: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f00000000c0)={[{0x2d, 'pids'}]}, 0x6) write$cgroup_subtree(r1, 0x0, 0x0) 22:42:28 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, 0x0, 0x800, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) 22:42:28 executing program 2: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x24800002}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)={0x44, 0x0, 0x400, 0x0, 0x25dfdbfe, {}, [@FOU_ATTR_PEER_V4={0x8, 0x8, @multicast2}, @FOU_ATTR_PEER_PORT={0x8, 0xa, 0x4e23}, @FOU_ATTR_PEER_PORT={0x8, 0xa, 0x4e21}, @FOU_ATTR_AF={0x8, 0x2, 0xa}, @FOU_ATTR_PEER_PORT={0x8, 0xa, 0x4e21}, @FOU_ATTR_PEER_PORT={0x8, 0xa, 0x4e20}]}, 0x44}, 0x1, 0x0, 0x0, 0x11}, 0x4040000) socket(0x200000000000011, 0x4000000000080002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x40000000015, 0x5, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @loopback}, 0x10) bind$inet(r0, &(0x7f0000000340)={0x2, 0x4e20, @loopback}, 0x10) sendmsg$xdp(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000000380)="fe", 0x1a000}], 0x1}, 0x0) 22:42:28 executing program 4: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f00000000c0)={[{0x2d, 'pids'}]}, 0x6) write$cgroup_subtree(r1, 0x0, 0x0) 22:42:28 executing program 0: r0 = socket(0x10, 0x0, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, 0x0, 0x0) r1 = getpgid(0x0) ptrace$pokeuser(0x6, r1, 0x0, 0x0) clock_getres(0x6, 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$sndctrl(&(0x7f0000006000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r2, 0x40045532, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x0, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x100) ioctl$LOOP_SET_BLOCK_SIZE(r3, 0x4c09, 0x3) socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000080)=ANY=[]}}, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x10000, 0x0) r4 = openat$audio(0xffffffffffffff9c, &(0x7f0000000280)='/dev/audio\x00', 0x140202, 0x0) r5 = syz_open_dev$sndpcmp(0x0, 0x0, 0x405) dup2(r5, r4) syz_genetlink_get_family_id$ipvs(0x0) write(0xffffffffffffffff, &(0x7f0000000040)="240000001a005f0214f9f407000904001100", 0x12) 22:42:28 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xb2) r0 = syz_open_procfs(0x0, &(0x7f00000004c0)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x199, 0x0) 22:42:28 executing program 2: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x24800002}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)={0x44, 0x0, 0x400, 0x0, 0x25dfdbfe, {}, [@FOU_ATTR_PEER_V4={0x8, 0x8, @multicast2}, @FOU_ATTR_PEER_PORT={0x8, 0xa, 0x4e23}, @FOU_ATTR_PEER_PORT={0x8, 0xa, 0x4e21}, @FOU_ATTR_AF={0x8, 0x2, 0xa}, @FOU_ATTR_PEER_PORT={0x8, 0xa, 0x4e21}, @FOU_ATTR_PEER_PORT={0x8, 0xa, 0x4e20}]}, 0x44}, 0x1, 0x0, 0x0, 0x11}, 0x4040000) socket(0x200000000000011, 0x4000000000080002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x40000000015, 0x5, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @loopback}, 0x10) bind$inet(r0, &(0x7f0000000340)={0x2, 0x4e20, @loopback}, 0x10) sendmsg$xdp(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000000380)="fe", 0x1a000}], 0x1}, 0x0) 22:42:28 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, 0x0, 0x800, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) 22:42:28 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) setsockopt$inet_opts(r0, 0x0, 0x4, 0x0, 0x0) 22:42:28 executing program 4: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f00000000c0)={[{0x2d, 'pids'}]}, 0x6) write$cgroup_subtree(r1, 0x0, 0x0) 22:42:28 executing program 0: r0 = socket(0x10, 0x0, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, 0x0, 0x0) r1 = getpgid(0x0) ptrace$pokeuser(0x6, r1, 0x0, 0x0) clock_getres(0x6, 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$sndctrl(&(0x7f0000006000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r2, 0x40045532, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x0, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x100) ioctl$LOOP_SET_BLOCK_SIZE(r3, 0x4c09, 0x3) socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000080)=ANY=[]}}, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x10000, 0x0) r4 = openat$audio(0xffffffffffffff9c, &(0x7f0000000280)='/dev/audio\x00', 0x140202, 0x0) r5 = syz_open_dev$sndpcmp(0x0, 0x0, 0x405) dup2(r5, r4) syz_genetlink_get_family_id$ipvs(0x0) write(0xffffffffffffffff, &(0x7f0000000040)="240000001a005f0214f9f407000904001100", 0x12) 22:42:28 executing program 2: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x24800002}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)={0x44, 0x0, 0x400, 0x0, 0x25dfdbfe, {}, [@FOU_ATTR_PEER_V4={0x8, 0x8, @multicast2}, @FOU_ATTR_PEER_PORT={0x8, 0xa, 0x4e23}, @FOU_ATTR_PEER_PORT={0x8, 0xa, 0x4e21}, @FOU_ATTR_AF={0x8, 0x2, 0xa}, @FOU_ATTR_PEER_PORT={0x8, 0xa, 0x4e21}, @FOU_ATTR_PEER_PORT={0x8, 0xa, 0x4e20}]}, 0x44}, 0x1, 0x0, 0x0, 0x11}, 0x4040000) socket(0x200000000000011, 0x4000000000080002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x40000000015, 0x5, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @loopback}, 0x10) bind$inet(r0, &(0x7f0000000340)={0x2, 0x4e20, @loopback}, 0x10) sendmsg$xdp(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000000380)="fe", 0x1a000}], 0x1}, 0x0) 22:42:28 executing program 3: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x24800002}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)={0x44, 0x0, 0x400, 0x0, 0x25dfdbfe, {}, [@FOU_ATTR_PEER_V4={0x8, 0x8, @multicast2}, @FOU_ATTR_PEER_PORT={0x8, 0xa, 0x4e23}, @FOU_ATTR_PEER_PORT={0x8, 0xa, 0x4e21}, @FOU_ATTR_AF={0x8, 0x2, 0xa}, @FOU_ATTR_PEER_PORT={0x8, 0xa, 0x4e21}, @FOU_ATTR_PEER_PORT={0x8, 0xa, 0x4e20}]}, 0x44}, 0x1, 0x0, 0x0, 0x11}, 0x4040000) socket(0x200000000000011, 0x4000000000080002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x40000000015, 0x5, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @loopback}, 0x10) bind$inet(r0, &(0x7f0000000340)={0x2, 0x4e20, @loopback}, 0x10) sendmsg$xdp(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000000380)="fe", 0x1a000}], 0x1}, 0x0) 22:42:28 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xb2) r0 = syz_open_procfs(0x0, &(0x7f00000004c0)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x199, 0x0) [ 331.483251] protocol 88fb is buggy, dev hsr_slave_0 [ 331.488522] protocol 88fb is buggy, dev hsr_slave_1 22:42:29 executing program 3: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x24800002}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)={0x44, 0x0, 0x400, 0x0, 0x25dfdbfe, {}, [@FOU_ATTR_PEER_V4={0x8, 0x8, @multicast2}, @FOU_ATTR_PEER_PORT={0x8, 0xa, 0x4e23}, @FOU_ATTR_PEER_PORT={0x8, 0xa, 0x4e21}, @FOU_ATTR_AF={0x8, 0x2, 0xa}, @FOU_ATTR_PEER_PORT={0x8, 0xa, 0x4e21}, @FOU_ATTR_PEER_PORT={0x8, 0xa, 0x4e20}]}, 0x44}, 0x1, 0x0, 0x0, 0x11}, 0x4040000) socket(0x200000000000011, 0x4000000000080002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x40000000015, 0x5, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @loopback}, 0x10) bind$inet(r0, &(0x7f0000000340)={0x2, 0x4e20, @loopback}, 0x10) sendmsg$xdp(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000000380)="fe", 0x1a000}], 0x1}, 0x0) 22:42:29 executing program 0: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f00000000c0)={[{0x2d, 'pids'}]}, 0x6) write$cgroup_subtree(r1, 0x0, 0x0) 22:42:29 executing program 4: rt_sigprocmask(0x1, &(0x7f0000000000), 0x0, 0x8) 22:42:29 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r3, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000000000/0x18000)=nil, 0x0, 0xfefd, 0x0, 0x0, 0xfffffffffffffd9c) sendmsg$SEG6_CMD_DUMPHMAC(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0xa0000000}, 0xc, 0x0}, 0x0) ioctl$KVM_NMI(r4, 0xae9a) ioctl$KVM_RUN(r4, 0xae80, 0x0) 22:42:29 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = dup2(r0, r0) ioctl$KVM_ASSIGN_SET_MSIX_NR(r1, 0x400448ca, 0x0) 22:42:29 executing program 0: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f00000000c0)={[{0x2d, 'pids'}]}, 0x6) write$cgroup_subtree(r1, 0x0, 0x0) 22:42:29 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) setsockopt$inet_opts(r0, 0x0, 0x4, 0x0, 0x0) 22:42:29 executing program 4: rt_sigprocmask(0x1, &(0x7f0000000000), 0x0, 0x8) 22:42:29 executing program 3: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x24800002}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)={0x44, 0x0, 0x400, 0x0, 0x25dfdbfe, {}, [@FOU_ATTR_PEER_V4={0x8, 0x8, @multicast2}, @FOU_ATTR_PEER_PORT={0x8, 0xa, 0x4e23}, @FOU_ATTR_PEER_PORT={0x8, 0xa, 0x4e21}, @FOU_ATTR_AF={0x8, 0x2, 0xa}, @FOU_ATTR_PEER_PORT={0x8, 0xa, 0x4e21}, @FOU_ATTR_PEER_PORT={0x8, 0xa, 0x4e20}]}, 0x44}, 0x1, 0x0, 0x0, 0x11}, 0x4040000) socket(0x200000000000011, 0x4000000000080002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x40000000015, 0x5, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @loopback}, 0x10) bind$inet(r0, &(0x7f0000000340)={0x2, 0x4e20, @loopback}, 0x10) sendmsg$xdp(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000000380)="fe", 0x1a000}], 0x1}, 0x0) 22:42:29 executing program 2: r0 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000000)='/dev/capi20\x00', 0x0, 0x0) capset(&(0x7f0000000040)={0x20080522}, &(0x7f0000000000)) ioctl$CAPI_MANUFACTURER_CMD(r0, 0xc0104320, 0x0) 22:42:29 executing program 0: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f00000000c0)={[{0x2d, 'pids'}]}, 0x6) write$cgroup_subtree(r1, 0x0, 0x0) 22:42:29 executing program 1: r0 = gettid() r1 = epoll_create1(0x0) fcntl$lock(r1, 0x6, &(0x7f0000000000)) fcntl$lock(r1, 0x26, &(0x7f0000000200)={0x1}) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) uname(&(0x7f00000000c0)=""/13) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) socketpair$unix(0x1, 0x8000000000001, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) tkill(r0, 0x14) 22:42:29 executing program 4: rt_sigprocmask(0x1, &(0x7f0000000000), 0x0, 0x8) 22:42:29 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'xcbc(aes)\x00'}, 0x58) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="0affefff7f000000001e6ea64aa8e1c9", 0x10) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$inet6(r2, &(0x7f0000005040)=[{{0x0, 0x0, &(0x7f0000003640)=[{&(0x7f0000001400)="12455195eb71686b04823f3e55fcee521cb5e8878269a586dd732702e41bd897b80151fdbfc38234e805a4da1a559f2c95a756c7832cc35c354ec9146c6b13aaad7b3113d9ddc24d3f446477a102150088", 0x51}], 0x1}}], 0x1, 0x0) 22:42:29 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) 22:42:29 executing program 4: rt_sigprocmask(0x1, &(0x7f0000000000), 0x0, 0x8) 22:42:29 executing program 1: r0 = gettid() r1 = epoll_create1(0x0) fcntl$lock(r1, 0x6, &(0x7f0000000000)) fcntl$lock(r1, 0x26, &(0x7f0000000200)={0x1}) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) uname(&(0x7f00000000c0)=""/13) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) socketpair$unix(0x1, 0x8000000000001, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) tkill(r0, 0x14) 22:42:29 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)={0x28, r1, 0x821, 0x0, 0x0, {0x4}, [@TIPC_NLA_BEARER={0x14, 0x1, [@TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz2\x00'}]}]}, 0x28}}, 0x0) 22:42:30 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) 22:42:30 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'xcbc(aes)\x00'}, 0x58) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="0affefff7f000000001e6ea64aa8e1c9", 0x10) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$inet6(r2, &(0x7f0000005040)=[{{0x0, 0x0, &(0x7f0000003640)=[{&(0x7f0000001400)="12455195eb71686b04823f3e55fcee521cb5e8878269a586dd732702e41bd897b80151fdbfc38234e805a4da1a559f2c95a756c7832cc35c354ec9146c6b13aaad7b3113d9ddc24d3f446477a102150088", 0x51}], 0x1}}], 0x1, 0x0) 22:42:30 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, &(0x7f0000000640)={"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"}) ioctl$KVM_SET_MP_STATE(r2, 0x4004ae99, &(0x7f0000000080)=0x10000000002) ioctl$KVM_SET_VCPU_EVENTS(r2, 0x4040aea0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x0, 0x3}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 22:42:30 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)={0x28, r1, 0x821, 0x0, 0x0, {0x4}, [@TIPC_NLA_BEARER={0x14, 0x1, [@TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz2\x00'}]}]}, 0x28}}, 0x0) 22:42:30 executing program 1: r0 = gettid() r1 = epoll_create1(0x0) fcntl$lock(r1, 0x6, &(0x7f0000000000)) fcntl$lock(r1, 0x26, &(0x7f0000000200)={0x1}) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) uname(&(0x7f00000000c0)=""/13) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) socketpair$unix(0x1, 0x8000000000001, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) tkill(r0, 0x14) 22:42:30 executing program 5: r0 = syz_open_dev$swradio(&(0x7f0000000180)='/dev/swradio#\x00', 0x0, 0x2) ioctl$VIDIOC_G_TUNER(r0, 0xc054561d, &(0x7f00000001c0)={0x0, "736e98a7181322625a76bf911e32886f95e0e6ede037eb068367149098d346cf"}) 22:42:30 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)={0x28, r1, 0x821, 0x0, 0x0, {0x4}, [@TIPC_NLA_BEARER={0x14, 0x1, [@TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz2\x00'}]}]}, 0x28}}, 0x0) 22:42:30 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(r2, 0x200004) sendfile(r0, r2, 0x0, 0x80001d00c0d0) 22:42:30 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'xcbc(aes)\x00'}, 0x58) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="0affefff7f000000001e6ea64aa8e1c9", 0x10) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$inet6(r2, &(0x7f0000005040)=[{{0x0, 0x0, &(0x7f0000003640)=[{&(0x7f0000001400)="12455195eb71686b04823f3e55fcee521cb5e8878269a586dd732702e41bd897b80151fdbfc38234e805a4da1a559f2c95a756c7832cc35c354ec9146c6b13aaad7b3113d9ddc24d3f446477a102150088", 0x51}], 0x1}}], 0x1, 0x0) 22:42:30 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) 22:42:30 executing program 1: r0 = gettid() r1 = epoll_create1(0x0) fcntl$lock(r1, 0x6, &(0x7f0000000000)) fcntl$lock(r1, 0x26, &(0x7f0000000200)={0x1}) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) uname(&(0x7f00000000c0)=""/13) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) socketpair$unix(0x1, 0x8000000000001, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) tkill(r0, 0x14) 22:42:30 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000040)={0x0, 0x10, &(0x7f0000000000)=[@in={0x2, 0x0, @dev}]}, &(0x7f00000000c0)=0x10) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x9, &(0x7f00000001c0)={r1}, &(0x7f0000000200)=0x1ef) 22:42:30 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) 22:42:30 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)={0x28, r1, 0x821, 0x0, 0x0, {0x4}, [@TIPC_NLA_BEARER={0x14, 0x1, [@TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz2\x00'}]}]}, 0x28}}, 0x0) 22:42:30 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'xcbc(aes)\x00'}, 0x58) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="0affefff7f000000001e6ea64aa8e1c9", 0x10) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$inet6(r2, &(0x7f0000005040)=[{{0x0, 0x0, &(0x7f0000003640)=[{&(0x7f0000001400)="12455195eb71686b04823f3e55fcee521cb5e8878269a586dd732702e41bd897b80151fdbfc38234e805a4da1a559f2c95a756c7832cc35c354ec9146c6b13aaad7b3113d9ddc24d3f446477a102150088", 0x51}], 0x1}}], 0x1, 0x0) 22:42:30 executing program 0: prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f00000001c0)={&(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, 0x0}, 0x68) prctl$PR_SET_MM(0x23, 0x9, &(0x7f0000fff000/0x1000)=nil) 22:42:30 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$team(&(0x7f00000002c0)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000200)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_OPTIONS_SET(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000017740)={0x58, r2, 0x1, 0x0, 0x0, {0x1, 0x0, 0xa000000}, [{{0x8, 0x1, r3}, {0x3c, 0x2, [{0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8}}}]}}]}, 0x58}}, 0x0) 22:42:30 executing program 3: openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/avc/hash_stats\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f00000000c0)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\x03\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x870x0, 0x10, &(0x7f0000000000)=[@in={0x2, 0x0, @dev}]}, &(0x7f00000000c0)=0x10) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x9, &(0x7f00000001c0)={r1}, &(0x7f0000000200)=0x1ef) [ 333.485387] netlink: 'syz-executor.1': attribute type 3 has an invalid length. 22:42:31 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r0, 0xc008ae88, &(0x7f0000000040)={0x7b, 0x0, [0x600000485]}) 22:42:31 executing program 2: getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r1) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000180), 0x127) dup2(r0, r2) msgrcv(0x0, 0x0, 0x0, 0x0, 0x0) 22:42:31 executing program 3: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f0000000dc0)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x3a01]}}, 0x80, 0x0}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local={0xa}}, 0x101d8, &(0x7f0000000640), 0x98, &(0x7f0000000180)=[{0x20}], 0x20}, 0x0) 22:42:31 executing program 0: prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f00000001c0)={&(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, 0x0}, 0x68) prctl$PR_SET_MM(0x23, 0x9, &(0x7f0000fff000/0x1000)=nil) 22:42:31 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000040)={0x0, 0x10, &(0x7f0000000000)=[@in={0x2, 0x0, @dev}]}, &(0x7f00000000c0)=0x10) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x9, &(0x7f00000001c0)={r1}, &(0x7f0000000200)=0x1ef) 22:42:31 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$team(&(0x7f00000002c0)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000200)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_OPTIONS_SET(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000017740)={0x58, r2, 0x1, 0x0, 0x0, {0x1, 0x0, 0xa000000}, [{{0x8, 0x1, r3}, {0x3c, 0x2, [{0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8}}}]}}]}, 0x58}}, 0x0) 22:42:31 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000040)={0x0, 0x10, &(0x7f0000000000)=[@in={0x2, 0x0, @dev}]}, &(0x7f00000000c0)=0x10) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x9, &(0x7f00000001c0)={r1}, &(0x7f0000000200)=0x1ef) 22:42:31 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() rt_tgsigqueueinfo(0x0, r1, 0x0, 0x0) keyctl$set_reqkey_keyring(0xe, 0x3) getcwd(0x0, 0x0) sendmsg$IPVS_CMD_NEW_DEST(0xffffffffffffffff, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000380)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DEST(r2, &(0x7f00000004c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x400004}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4000000}, 0x880) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'eql\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00', 0x2a13}) socket$nl_route(0x10, 0x3, 0x0) pipe2(&(0x7f0000000080), 0x0) syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x6, 0x0) [ 333.649749] netlink: 'syz-executor.1': attribute type 3 has an invalid length. 22:42:31 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$team(&(0x7f00000002c0)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000200)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_OPTIONS_SET(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000017740)={0x58, r2, 0x1, 0x0, 0x0, {0x1, 0x0, 0xa000000}, [{{0x8, 0x1, r3}, {0x3c, 0x2, [{0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8}}}]}}]}, 0x58}}, 0x0) 22:42:31 executing program 2: r0 = memfd_create(&(0x7f00000003c0)='/dev/net/tun\x00r\a\x04zn\x94\xc0\xac\xdf3M\x99\x89\x7fM\x95\x16.\xe8\a\xd5\x8bJe\x8f\xa8\x1c`y\x87\x88d\xacK\x19\x84r\xfb\xa8\fb\xb6*\x94*zD\xaf\xa9\xc9\xbc\xef:\x83\xc0\x17\xc2\xb4\xdb\x83\xd9\xf1_v\xcd\x04\x8f\x19c\x1a\x13\xd0\x9a\xbav\xfd\xdf\xbf\xbe\t\xca\x0fx\xdc\xd6@\x8c\xb7\x02\xbe\xa8\x12\xfa\xedu\xb5\xb9\xe1\xfa\x05\xa0=\\SK@5D\xd8\xfa\x91\xcd\xa5/\xa9\xb9/4\xb0\xbb\xf4\x15\xee\x8c\x1f\x9d6\xfb\xf7\x14=\xa9\xde.Bh{Q:\x8cGZc\x91\xf7\xc1\xb1[\xf3\x00\x00\x00\x00\x00\x00\x00', 0x6) fallocate(r0, 0x3, 0x0, 0x9) 22:42:31 executing program 0: prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f00000001c0)={&(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, 0x0}, 0x68) prctl$PR_SET_MM(0x23, 0x9, &(0x7f0000fff000/0x1000)=nil) 22:42:31 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() rt_tgsigqueueinfo(0x0, r1, 0x0, 0x0) keyctl$set_reqkey_keyring(0xe, 0x3) getcwd(0x0, 0x0) sendmsg$IPVS_CMD_NEW_DEST(0xffffffffffffffff, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000380)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DEST(r2, &(0x7f00000004c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x400004}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4000000}, 0x880) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'eql\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00', 0x2a13}) socket$nl_route(0x10, 0x3, 0x0) pipe2(&(0x7f0000000080), 0x0) syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x6, 0x0) 22:42:31 executing program 3: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f0000000dc0)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x3a01]}}, 0x80, 0x0}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local={0xa}}, 0x101d8, &(0x7f0000000640), 0x98, &(0x7f0000000180)=[{0x20}], 0x20}, 0x0) 22:42:31 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() rt_tgsigqueueinfo(0x0, r1, 0x0, 0x0) keyctl$set_reqkey_keyring(0xe, 0x3) getcwd(0x0, 0x0) sendmsg$IPVS_CMD_NEW_DEST(0xffffffffffffffff, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000380)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DEST(r2, &(0x7f00000004c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x400004}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4000000}, 0x880) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'eql\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00', 0x2a13}) socket$nl_route(0x10, 0x3, 0x0) pipe2(&(0x7f0000000080), 0x0) syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x6, 0x0) 22:42:31 executing program 0: prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f00000001c0)={&(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, 0x0}, 0x68) prctl$PR_SET_MM(0x23, 0x9, &(0x7f0000fff000/0x1000)=nil) [ 333.800958] netlink: 'syz-executor.1': attribute type 3 has an invalid length. 22:42:31 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$team(&(0x7f00000002c0)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000200)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_OPTIONS_SET(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000017740)={0x58, r2, 0x1, 0x0, 0x0, {0x1, 0x0, 0xa000000}, [{{0x8, 0x1, r3}, {0x3c, 0x2, [{0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8}}}]}}]}, 0x58}}, 0x0) 22:42:31 executing program 2: r0 = memfd_create(&(0x7f00000003c0)='/dev/net/tun\x00r\a\x04zn\x94\xc0\xac\xdf3M\x99\x89\x7fM\x95\x16.\xe8\a\xd5\x8bJe\x8f\xa8\x1c`y\x87\x88d\xacK\x19\x84r\xfb\xa8\fb\xb6*\x94*zD\xaf\xa9\xc9\xbc\xef:\x83\xc0\x17\xc2\xb4\xdb\x83\xd9\xf1_v\xcd\x04\x8f\x19c\x1a\x13\xd0\x9a\xbav\xfd\xdf\xbf\xbe\t\xca\x0fx\xdc\xd6@\x8c\xb7\x02\xbe\xa8\x12\xfa\xedu\xb5\xb9\xe1\xfa\x05\xa0=\\SK@5D\xd8\xfa\x91\xcd\xa5/\xa9\xb9/4\xb0\xbb\xf4\x15\xee\x8c\x1f\x9d6\xfb\xf7\x14=\xa9\xde.Bh{Q:\x8cGZc\x91\xf7\xc1\xb1[\xf3\x00\x00\x00\x00\x00\x00\x00', 0x6) fallocate(r0, 0x3, 0x0, 0x9) 22:42:31 executing program 3: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f0000000dc0)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x3a01]}}, 0x80, 0x0}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local={0xa}}, 0x101d8, &(0x7f0000000640), 0x98, &(0x7f0000000180)=[{0x20}], 0x20}, 0x0) 22:42:31 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() rt_tgsigqueueinfo(0x0, r1, 0x0, 0x0) keyctl$set_reqkey_keyring(0xe, 0x3) getcwd(0x0, 0x0) sendmsg$IPVS_CMD_NEW_DEST(0xffffffffffffffff, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000380)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DEST(r2, &(0x7f00000004c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x400004}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4000000}, 0x880) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'eql\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00', 0x2a13}) socket$nl_route(0x10, 0x3, 0x0) pipe2(&(0x7f0000000080), 0x0) syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x6, 0x0) 22:42:31 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() rt_tgsigqueueinfo(0x0, r1, 0x0, 0x0) keyctl$set_reqkey_keyring(0xe, 0x3) getcwd(0x0, 0x0) sendmsg$IPVS_CMD_NEW_DEST(0xffffffffffffffff, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000380)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DEST(r2, &(0x7f00000004c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x400004}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4000000}, 0x880) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'eql\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00', 0x2a13}) socket$nl_route(0x10, 0x3, 0x0) pipe2(&(0x7f0000000080), 0x0) syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x6, 0x0) [ 333.950545] netlink: 'syz-executor.1': attribute type 3 has an invalid length. 22:42:31 executing program 2: r0 = memfd_create(&(0x7f00000003c0)='/dev/net/tun\x00r\a\x04zn\x94\xc0\xac\xdf3M\x99\x89\x7fM\x95\x16.\xe8\a\xd5\x8bJe\x8f\xa8\x1c`y\x87\x88d\xacK\x19\x84r\xfb\xa8\fb\xb6*\x94*zD\xaf\xa9\xc9\xbc\xef:\x83\xc0\x17\xc2\xb4\xdb\x83\xd9\xf1_v\xcd\x04\x8f\x19c\x1a\x13\xd0\x9a\xbav\xfd\xdf\xbf\xbe\t\xca\x0fx\xdc\xd6@\x8c\xb7\x02\xbe\xa8\x12\xfa\xedu\xb5\xb9\xe1\xfa\x05\xa0=\\SK@5D\xd8\xfa\x91\xcd\xa5/\xa9\xb9/4\xb0\xbb\xf4\x15\xee\x8c\x1f\x9d6\xfb\xf7\x14=\xa9\xde.Bh{Q:\x8cGZc\x91\xf7\xc1\xb1[\xf3\x00\x00\x00\x00\x00\x00\x00', 0x6) fallocate(r0, 0x3, 0x0, 0x9) 22:42:31 executing program 1: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) close(r0) syz_open_dev$sndpcmc(&(0x7f0000000200)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000780)) 22:42:31 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() rt_tgsigqueueinfo(0x0, r1, 0x0, 0x0) keyctl$set_reqkey_keyring(0xe, 0x3) getcwd(0x0, 0x0) sendmsg$IPVS_CMD_NEW_DEST(0xffffffffffffffff, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000380)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DEST(r2, &(0x7f00000004c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x400004}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4000000}, 0x880) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'eql\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00', 0x2a13}) socket$nl_route(0x10, 0x3, 0x0) pipe2(&(0x7f0000000080), 0x0) syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x6, 0x0) 22:42:31 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() rt_tgsigqueueinfo(0x0, r1, 0x0, 0x0) keyctl$set_reqkey_keyring(0xe, 0x3) getcwd(0x0, 0x0) sendmsg$IPVS_CMD_NEW_DEST(0xffffffffffffffff, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000380)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DEST(r2, &(0x7f00000004c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x400004}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4000000}, 0x880) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'eql\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00', 0x2a13}) socket$nl_route(0x10, 0x3, 0x0) pipe2(&(0x7f0000000080), 0x0) syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x6, 0x0) 22:42:31 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() rt_tgsigqueueinfo(0x0, r1, 0x0, 0x0) keyctl$set_reqkey_keyring(0xe, 0x3) getcwd(0x0, 0x0) sendmsg$IPVS_CMD_NEW_DEST(0xffffffffffffffff, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000380)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DEST(r2, &(0x7f00000004c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x400004}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4000000}, 0x880) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'eql\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00', 0x2a13}) socket$nl_route(0x10, 0x3, 0x0) pipe2(&(0x7f0000000080), 0x0) syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x6, 0x0) 22:42:31 executing program 3: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f0000000dc0)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x3a01]}}, 0x80, 0x0}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local={0xa}}, 0x101d8, &(0x7f0000000640), 0x98, &(0x7f0000000180)=[{0x20}], 0x20}, 0x0) 22:42:31 executing program 2: r0 = memfd_create(&(0x7f00000003c0)='/dev/net/tun\x00r\a\x04zn\x94\xc0\xac\xdf3M\x99\x89\x7fM\x95\x16.\xe8\a\xd5\x8bJe\x8f\xa8\x1c`y\x87\x88d\xacK\x19\x84r\xfb\xa8\fb\xb6*\x94*zD\xaf\xa9\xc9\xbc\xef:\x83\xc0\x17\xc2\xb4\xdb\x83\xd9\xf1_v\xcd\x04\x8f\x19c\x1a\x13\xd0\x9a\xbav\xfd\xdf\xbf\xbe\t\xca\x0fx\xdc\xd6@\x8c\xb7\x02\xbe\xa8\x12\xfa\xedu\xb5\xb9\xe1\xfa\x05\xa0=\\SK@5D\xd8\xfa\x91\xcd\xa5/\xa9\xb9/4\xb0\xbb\xf4\x15\xee\x8c\x1f\x9d6\xfb\xf7\x14=\xa9\xde.Bh{Q:\x8cGZc\x91\xf7\xc1\xb1[\xf3\x00\x00\x00\x00\x00\x00\x00', 0x6) fallocate(r0, 0x3, 0x0, 0x9) 22:42:31 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() rt_tgsigqueueinfo(0x0, r1, 0x0, 0x0) keyctl$set_reqkey_keyring(0xe, 0x3) getcwd(0x0, 0x0) sendmsg$IPVS_CMD_NEW_DEST(0xffffffffffffffff, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000380)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DEST(r2, &(0x7f00000004c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x400004}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4000000}, 0x880) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'eql\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00', 0x2a13}) socket$nl_route(0x10, 0x3, 0x0) pipe2(&(0x7f0000000080), 0x0) syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x6, 0x0) 22:42:31 executing program 1: r0 = socket(0x11, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'bond0\x00'}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() syz_open_procfs(0x0, &(0x7f0000000240)='ns\x00') socketpair(0x1, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'bond0\x00\x05\x00\x00\x00\x00\x00\x00\x00\x00\x03', 0xffb}) 22:42:31 executing program 2: r0 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$unlink(0x9, r0, 0xfffffffffffffffd) 22:42:31 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() rt_tgsigqueueinfo(0x0, r1, 0x0, 0x0) keyctl$set_reqkey_keyring(0xe, 0x3) getcwd(0x0, 0x0) sendmsg$IPVS_CMD_NEW_DEST(0xffffffffffffffff, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000380)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DEST(r2, &(0x7f00000004c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x400004}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4000000}, 0x880) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'eql\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00', 0x2a13}) socket$nl_route(0x10, 0x3, 0x0) pipe2(&(0x7f0000000080), 0x0) syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x6, 0x0) 22:42:31 executing program 4: clone(0x41bc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f00000001c0)) ptrace(0x4206, r0) ptrace(0x4208, r0) ptrace$getsig(0x4202, r0, 0x0, 0x0) 22:42:31 executing program 0: bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000400)=0xfffffffffffffddc, 0x4) 22:42:31 executing program 2: r0 = syz_open_dev$ndb(&(0x7f00000001c0)='/dev/nbd#\x00', 0x0, 0x0) ioctl$NBD_SET_TIMEOUT(r0, 0xab09, 0x3) [ 334.412093] device bond0 entered promiscuous mode [ 334.420094] device bond_slave_0 entered promiscuous mode [ 334.443903] device bond_slave_1 entered promiscuous mode 22:42:31 executing program 0: bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000400)=0xfffffffffffffddc, 0x4) 22:42:31 executing program 3: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x200001000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") setsockopt(r1, 0x10d, 0x800000000d, &(0x7f0000000440)="02", 0x1) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) 22:42:31 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) io_setup(0x8, &(0x7f00000000c0)=0x0) io_submit(r1, 0x2, &(0x7f00000004c0)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0}, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x3, 0x0, r0, &(0x7f0000000280)}]) [ 334.477411] 8021q: adding VLAN 0 to HW filter on device bond0 22:42:32 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x40000000, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e00000022008151e00f80ecdb4cb904034865160b00010010000000000000140e0006001500cd5edc2976d153b4", 0x2e}], 0x1}, 0x0) 22:42:32 executing program 0: bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000400)=0xfffffffffffffddc, 0x4) 22:42:32 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x40000000, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e00000022008151e00f80ecdb4cb904034865160b00010010000000000000140e0006001500cd5edc2976d153b4", 0x2e}], 0x1}, 0x0) [ 334.535288] device bond0 left promiscuous mode [ 334.543920] device bond_slave_0 left promiscuous mode [ 334.567928] device bond_slave_1 left promiscuous mode [ 334.573082] netlink: 'syz-executor.5': attribute type 6 has an invalid length. [ 334.632188] netlink: 'syz-executor.5': attribute type 6 has an invalid length. [ 334.778503] device bond0 entered promiscuous mode [ 334.784392] device bond_slave_0 entered promiscuous mode [ 334.789980] device bond_slave_1 entered promiscuous mode [ 334.797413] 8021q: adding VLAN 0 to HW filter on device bond0 22:42:32 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) io_setup(0x8, &(0x7f00000000c0)=0x0) io_submit(r1, 0x2, &(0x7f00000004c0)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0}, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x3, 0x0, r0, &(0x7f0000000280)}]) 22:42:32 executing program 0: bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000400)=0xfffffffffffffddc, 0x4) 22:42:32 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x40000000, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e00000022008151e00f80ecdb4cb904034865160b00010010000000000000140e0006001500cd5edc2976d153b4", 0x2e}], 0x1}, 0x0) [ 334.878678] netlink: 'syz-executor.5': attribute type 6 has an invalid length. 22:42:32 executing program 4: clone(0x41bc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f00000001c0)) ptrace(0x4206, r0) ptrace(0x4208, r0) ptrace$getsig(0x4202, r0, 0x0, 0x0) 22:42:32 executing program 1: r0 = socket(0x11, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'bond0\x00'}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() syz_open_procfs(0x0, &(0x7f0000000240)='ns\x00') socketpair(0x1, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'bond0\x00\x05\x00\x00\x00\x00\x00\x00\x00\x00\x03', 0xffb}) 22:42:32 executing program 3: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x200001000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") setsockopt(r1, 0x10d, 0x800000000d, &(0x7f0000000440)="02", 0x1) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) 22:42:32 executing program 0: prctl$PR_SET_MM_MAP(0x23, 0xe, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x240080, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x1b, &(0x7f0000000100)={@empty}, 0x1c5) ioctl$VIDIOC_S_CROP(r0, 0x4014563c, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_INTERVAL(r0, 0xc040564b, &(0x7f00000001c0)={0x6, 0x0, 0x1007, 0x4, 0x9, {0x5e7cc339}}) clock_getres(0x5, &(0x7f00000002c0)) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/anycast6\x00') ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000300)={'bond_slave_0\x00', 0x200}) preadv(r2, &(0x7f00000017c0), 0x3a8, 0x7a) 22:42:32 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x40000000, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e00000022008151e00f80ecdb4cb904034865160b00010010000000000000140e0006001500cd5edc2976d153b4", 0x2e}], 0x1}, 0x0) 22:42:32 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) io_setup(0x8, &(0x7f00000000c0)=0x0) io_submit(r1, 0x2, &(0x7f00000004c0)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0}, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x3, 0x0, r0, &(0x7f0000000280)}]) 22:42:32 executing program 5: clone(0x41bc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f00000001c0)) ptrace(0x4206, r0) ptrace(0x4208, r0) ptrace$getsig(0x4202, r0, 0x0, 0x0) [ 335.315289] netlink: 'syz-executor.5': attribute type 6 has an invalid length. [ 335.325306] device bond0 left promiscuous mode [ 335.337901] device bond_slave_0 left promiscuous mode [ 335.345218] device bond_slave_1 left promiscuous mode 22:42:32 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) io_setup(0x8, &(0x7f00000000c0)=0x0) io_submit(r1, 0x2, &(0x7f00000004c0)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0}, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x3, 0x0, r0, &(0x7f0000000280)}]) 22:42:33 executing program 3: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x200001000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") setsockopt(r1, 0x10d, 0x800000000d, &(0x7f0000000440)="02", 0x1) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) 22:42:33 executing program 2: openat$nullb(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000000200500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x20000080000000, 0x0) 22:42:33 executing program 3: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x200001000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") setsockopt(r1, 0x10d, 0x800000000d, &(0x7f0000000440)="02", 0x1) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) 22:42:33 executing program 0: prctl$PR_SET_MM_MAP(0x23, 0xe, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x240080, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x1b, &(0x7f0000000100)={@empty}, 0x1c5) ioctl$VIDIOC_S_CROP(r0, 0x4014563c, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_INTERVAL(r0, 0xc040564b, &(0x7f00000001c0)={0x6, 0x0, 0x1007, 0x4, 0x9, {0x5e7cc339}}) clock_getres(0x5, &(0x7f00000002c0)) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/anycast6\x00') ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000300)={'bond_slave_0\x00', 0x200}) preadv(r2, &(0x7f00000017c0), 0x3a8, 0x7a) [ 335.522683] device bond0 entered promiscuous mode [ 335.541821] device bond_slave_0 entered promiscuous mode [ 335.548561] device bond_slave_1 entered promiscuous mode [ 335.562558] 8021q: adding VLAN 0 to HW filter on device bond0 [ 335.643264] net_ratelimit: 14 callbacks suppressed [ 335.643270] protocol 88fb is buggy, dev hsr_slave_0 [ 335.653612] protocol 88fb is buggy, dev hsr_slave_1 22:42:33 executing program 4: clone(0x41bc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f00000001c0)) ptrace(0x4206, r0) ptrace(0x4208, r0) ptrace$getsig(0x4202, r0, 0x0, 0x0) 22:42:33 executing program 0: prctl$PR_SET_MM_MAP(0x23, 0xe, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x240080, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x1b, &(0x7f0000000100)={@empty}, 0x1c5) ioctl$VIDIOC_S_CROP(r0, 0x4014563c, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_INTERVAL(r0, 0xc040564b, &(0x7f00000001c0)={0x6, 0x0, 0x1007, 0x4, 0x9, {0x5e7cc339}}) clock_getres(0x5, &(0x7f00000002c0)) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/anycast6\x00') ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000300)={'bond_slave_0\x00', 0x200}) preadv(r2, &(0x7f00000017c0), 0x3a8, 0x7a) 22:42:33 executing program 1: r0 = socket(0x11, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'bond0\x00'}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() syz_open_procfs(0x0, &(0x7f0000000240)='ns\x00') socketpair(0x1, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'bond0\x00\x05\x00\x00\x00\x00\x00\x00\x00\x00\x03', 0xffb}) 22:42:33 executing program 2: openat$nullb(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000000200500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x20000080000000, 0x0) 22:42:33 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(r0, 0x0, 0x482, &(0x7f0000000040)=""/8, &(0x7f0000000000)=0x8) [ 336.123262] protocol 88fb is buggy, dev hsr_slave_0 [ 336.128600] protocol 88fb is buggy, dev hsr_slave_1 22:42:33 executing program 5: clone(0x41bc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f00000001c0)) ptrace(0x4206, r0) ptrace(0x4208, r0) ptrace$getsig(0x4202, r0, 0x0, 0x0) 22:42:33 executing program 2: openat$nullb(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000000200500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x20000080000000, 0x0) [ 336.164825] device bond0 left promiscuous mode 22:42:33 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(r0, 0x0, 0x482, &(0x7f0000000040)=""/8, &(0x7f0000000000)=0x8) [ 336.187183] device bond_slave_0 left promiscuous mode [ 336.199920] device bond_slave_1 left promiscuous mode 22:42:33 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(r0, 0x0, 0x482, &(0x7f0000000040)=""/8, &(0x7f0000000000)=0x8) 22:42:33 executing program 2: openat$nullb(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000000200500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x20000080000000, 0x0) 22:42:33 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(r0, 0x0, 0x482, &(0x7f0000000040)=""/8, &(0x7f0000000000)=0x8) 22:42:33 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x8000000004) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x0, 0x7c}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) [ 336.283288] protocol 88fb is buggy, dev hsr_slave_0 [ 336.288540] protocol 88fb is buggy, dev hsr_slave_1 [ 336.443287] protocol 88fb is buggy, dev hsr_slave_0 [ 336.448526] protocol 88fb is buggy, dev hsr_slave_1 [ 336.469162] device bond0 entered promiscuous mode [ 336.477862] device bond_slave_0 entered promiscuous mode [ 336.484503] device bond_slave_1 entered promiscuous mode [ 336.495112] 8021q: adding VLAN 0 to HW filter on device bond0 22:42:34 executing program 4: clone(0x41bc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f00000001c0)) ptrace(0x4206, r0) ptrace(0x4208, r0) ptrace$getsig(0x4202, r0, 0x0, 0x0) 22:42:34 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$vcsa(0x0, 0x65, 0x502) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, 0x0, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00\x01\xa1\x1a\xb0\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(r0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) rmdir(&(0x7f0000000200)='./file0\x00') ioctl$KVM_S390_UCAS_UNMAP(0xffffffffffffffff, 0x4018ae51, 0x0) 22:42:34 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x8000000004) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x0, 0x7c}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 22:42:34 executing program 0: prctl$PR_SET_MM_MAP(0x23, 0xe, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x240080, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x1b, &(0x7f0000000100)={@empty}, 0x1c5) ioctl$VIDIOC_S_CROP(r0, 0x4014563c, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_INTERVAL(r0, 0xc040564b, &(0x7f00000001c0)={0x6, 0x0, 0x1007, 0x4, 0x9, {0x5e7cc339}}) clock_getres(0x5, &(0x7f00000002c0)) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/anycast6\x00') ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000300)={'bond_slave_0\x00', 0x200}) preadv(r2, &(0x7f00000017c0), 0x3a8, 0x7a) 22:42:34 executing program 1: r0 = socket(0x11, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'bond0\x00'}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() syz_open_procfs(0x0, &(0x7f0000000240)='ns\x00') socketpair(0x1, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'bond0\x00\x05\x00\x00\x00\x00\x00\x00\x00\x00\x03', 0xffb}) 22:42:34 executing program 5: clone(0x41bc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f00000001c0)) ptrace(0x4206, r0) ptrace(0x4208, r0) ptrace$getsig(0x4202, r0, 0x0, 0x0) [ 337.023330] device bond0 left promiscuous mode [ 337.039683] device bond_slave_0 left promiscuous mode [ 337.045215] device bond_slave_1 left promiscuous mode 22:42:34 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$vcsa(0x0, 0x65, 0x502) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, 0x0, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00\x01\xa1\x1a\xb0\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(r0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) rmdir(&(0x7f0000000200)='./file0\x00') ioctl$KVM_S390_UCAS_UNMAP(0xffffffffffffffff, 0x4018ae51, 0x0) 22:42:34 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$vcsa(0x0, 0x65, 0x502) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, 0x0, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00\x01\xa1\x1a\xb0\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(r0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) rmdir(&(0x7f0000000200)='./file0\x00') ioctl$KVM_S390_UCAS_UNMAP(0xffffffffffffffff, 0x4018ae51, 0x0) [ 337.287333] device bond0 entered promiscuous mode [ 337.299008] device bond_slave_0 entered promiscuous mode [ 337.314784] device bond_slave_1 entered promiscuous mode [ 337.331841] 8021q: adding VLAN 0 to HW filter on device bond0 22:42:34 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$vcsa(0x0, 0x65, 0x502) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, 0x0, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00\x01\xa1\x1a\xb0\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(r0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) rmdir(&(0x7f0000000200)='./file0\x00') ioctl$KVM_S390_UCAS_UNMAP(0xffffffffffffffff, 0x4018ae51, 0x0) 22:42:34 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$vcsa(0x0, 0x65, 0x502) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, 0x0, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00\x01\xa1\x1a\xb0\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(r0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) rmdir(&(0x7f0000000200)='./file0\x00') ioctl$KVM_S390_UCAS_UNMAP(0xffffffffffffffff, 0x4018ae51, 0x0) 22:42:34 executing program 1: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000000)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x40000000015, 0x5, 0x0) setsockopt$SO_RDS_TRANSPORT(r1, 0x114, 0x8, &(0x7f00000007c0)=0x800000000000002, 0x4) bind$inet(r1, &(0x7f0000000840)={0x2, 0x4e20, @loopback}, 0x10) sendto$inet(r1, &(0x7f0000000a00)="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", 0x3f1, 0x0, &(0x7f000069affb)={0x2, 0x0, @loopback}, 0x10) 22:42:34 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000480), 0x80000) ioctl$sock_inet_SIOCRTMSG(r2, 0x890d, &(0x7f0000000500)={0x0, {0x2, 0x4e21, @loopback}, {0x2, 0x4e21, @remote}, {0x2, 0x4e24, @loopback}, 0x4, 0x0, 0x0, 0x0, 0x5, &(0x7f00000004c0)='ip6erspan0\x00', 0x1, 0x9}) r3 = dup(r1) setsockopt$IP_VS_SO_SET_DELDEST(r3, 0x0, 0x488, &(0x7f0000000180)={{0x0, @multicast2, 0x4e20, 0x2, 'none\x00', 0x0, 0xe85, 0x13}, {@dev={0xac, 0x14, 0x14, 0x2b}, 0x4e21, 0x2000, 0x8000, 0x9, 0x5}}, 0x44) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt(r0, 0x9, 0x58391201, &(0x7f0000000240)="490b0eaa684a01c63281d5e5253090c1c2e3bbf2ba914c9b2c146172c041a91467195a4b325e80a5905d676bef0b1efb95eb4356050e938c4b9fdd44ad42a0e4a729c8c3c274", 0x46) socket$inet_udplite(0x2, 0x2, 0x88) r4 = socket$inet_udp(0x2, 0x2, 0x0) memfd_create(&(0x7f0000000200)='syz', 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r4, 0x0, 0x2a, &(0x7f00000003c0)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) setsockopt$inet_group_source_req(r4, 0x0, 0x0, &(0x7f0000000000)={0x400, {{0x2, 0x4e21}}, {{0x2, 0x0, @remote}}}, 0x108) write$binfmt_elf64(r2, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x7, 0x2, 0x0, 0x4, 0x3, 0x3, 0x3, 0x6, 0xa0, 0x40, 0x1b4, 0x6e, 0x4, 0x38, 0x1, 0x1000, 0x4, 0x9}, [{0x6, 0x5, 0xffff, 0x2, 0x7, 0xb0, 0x3, 0x12f}], "cd95370d41f87a7b18625edd87ef52f1bfbb1a93deb19255564b05e2844a37357efe46a6ae5caa1b28a871e590ab339d26436f5b76c7d8f66d2b0f40c72b86b1a16728f0c90764128ce29b1f0f29d25573aa132a73b10f893587dddbbc785dec77ee7dc7944402ec66884b0e2718a234340f3879c637e3d672972d30dd65c307f9b5f9a6c2b0a3328aebbeaa5786b274df364f9412e9807dfe415c783e54df18e2a931efad6e16aecd0e52f25bf48e652f8166b4223b", [[]]}, 0x22e) getsockopt$inet_int(r3, 0x0, 0x3, &(0x7f0000000300), &(0x7f0000000340)=0x4) prctl$PR_GET_KEEPCAPS(0x7) clone(0x12102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) fcntl$F_SET_FILE_RW_HINT(r2, 0x40e, &(0x7f00000008c0)=0x5) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f00000002c0), &(0x7f00000007c0)=0xc) request_key(&(0x7f0000001540)='user\x00', &(0x7f0000000140)={'syz'}, &(0x7f0000001580), 0x0) [ 337.723279] protocol 88fb is buggy, dev hsr_slave_0 [ 337.728565] protocol 88fb is buggy, dev hsr_slave_1 22:42:35 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000480), 0x80000) ioctl$sock_inet_SIOCRTMSG(r2, 0x890d, &(0x7f0000000500)={0x0, {0x2, 0x4e21, @loopback}, {0x2, 0x4e21, @remote}, {0x2, 0x4e24, @loopback}, 0x4, 0x0, 0x0, 0x0, 0x5, &(0x7f00000004c0)='ip6erspan0\x00', 0x1, 0x9}) r3 = dup(r1) setsockopt$IP_VS_SO_SET_DELDEST(r3, 0x0, 0x488, &(0x7f0000000180)={{0x0, @multicast2, 0x4e20, 0x2, 'none\x00', 0x0, 0xe85, 0x13}, {@dev={0xac, 0x14, 0x14, 0x2b}, 0x4e21, 0x2000, 0x8000, 0x9, 0x5}}, 0x44) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt(r0, 0x9, 0x58391201, &(0x7f0000000240)="490b0eaa684a01c63281d5e5253090c1c2e3bbf2ba914c9b2c146172c041a91467195a4b325e80a5905d676bef0b1efb95eb4356050e938c4b9fdd44ad42a0e4a729c8c3c274", 0x46) socket$inet_udplite(0x2, 0x2, 0x88) r4 = socket$inet_udp(0x2, 0x2, 0x0) memfd_create(&(0x7f0000000200)='syz', 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r4, 0x0, 0x2a, &(0x7f00000003c0)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) setsockopt$inet_group_source_req(r4, 0x0, 0x0, &(0x7f0000000000)={0x400, {{0x2, 0x4e21}}, {{0x2, 0x0, @remote}}}, 0x108) write$binfmt_elf64(r2, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x7, 0x2, 0x0, 0x4, 0x3, 0x3, 0x3, 0x6, 0xa0, 0x40, 0x1b4, 0x6e, 0x4, 0x38, 0x1, 0x1000, 0x4, 0x9}, [{0x6, 0x5, 0xffff, 0x2, 0x7, 0xb0, 0x3, 0x12f}], "cd95370d41f87a7b18625edd87ef52f1bfbb1a93deb19255564b05e2844a37357efe46a6ae5caa1b28a871e590ab339d26436f5b76c7d8f66d2b0f40c72b86b1a16728f0c90764128ce29b1f0f29d25573aa132a73b10f893587dddbbc785dec77ee7dc7944402ec66884b0e2718a234340f3879c637e3d672972d30dd65c307f9b5f9a6c2b0a3328aebbeaa5786b274df364f9412e9807dfe415c783e54df18e2a931efad6e16aecd0e52f25bf48e652f8166b4223b", [[]]}, 0x22e) getsockopt$inet_int(r3, 0x0, 0x3, &(0x7f0000000300), &(0x7f0000000340)=0x4) prctl$PR_GET_KEEPCAPS(0x7) clone(0x12102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) fcntl$F_SET_FILE_RW_HINT(r2, 0x40e, &(0x7f00000008c0)=0x5) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f00000002c0), &(0x7f00000007c0)=0xc) request_key(&(0x7f0000001540)='user\x00', &(0x7f0000000140)={'syz'}, &(0x7f0000001580), 0x0) 22:42:35 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$vcsa(0x0, 0x65, 0x502) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, 0x0, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00\x01\xa1\x1a\xb0\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(r0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) rmdir(&(0x7f0000000200)='./file0\x00') ioctl$KVM_S390_UCAS_UNMAP(0xffffffffffffffff, 0x4018ae51, 0x0) 22:42:37 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x8000000004) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x0, 0x7c}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 22:42:37 executing program 1: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000000)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x40000000015, 0x5, 0x0) setsockopt$SO_RDS_TRANSPORT(r1, 0x114, 0x8, &(0x7f00000007c0)=0x800000000000002, 0x4) bind$inet(r1, &(0x7f0000000840)={0x2, 0x4e20, @loopback}, 0x10) sendto$inet(r1, &(0x7f0000000a00)="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", 0x3f1, 0x0, &(0x7f000069affb)={0x2, 0x0, @loopback}, 0x10) 22:42:37 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000480), 0x80000) ioctl$sock_inet_SIOCRTMSG(r2, 0x890d, &(0x7f0000000500)={0x0, {0x2, 0x4e21, @loopback}, {0x2, 0x4e21, @remote}, {0x2, 0x4e24, @loopback}, 0x4, 0x0, 0x0, 0x0, 0x5, &(0x7f00000004c0)='ip6erspan0\x00', 0x1, 0x9}) r3 = dup(r1) setsockopt$IP_VS_SO_SET_DELDEST(r3, 0x0, 0x488, &(0x7f0000000180)={{0x0, @multicast2, 0x4e20, 0x2, 'none\x00', 0x0, 0xe85, 0x13}, {@dev={0xac, 0x14, 0x14, 0x2b}, 0x4e21, 0x2000, 0x8000, 0x9, 0x5}}, 0x44) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt(r0, 0x9, 0x58391201, &(0x7f0000000240)="490b0eaa684a01c63281d5e5253090c1c2e3bbf2ba914c9b2c146172c041a91467195a4b325e80a5905d676bef0b1efb95eb4356050e938c4b9fdd44ad42a0e4a729c8c3c274", 0x46) socket$inet_udplite(0x2, 0x2, 0x88) r4 = socket$inet_udp(0x2, 0x2, 0x0) memfd_create(&(0x7f0000000200)='syz', 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r4, 0x0, 0x2a, &(0x7f00000003c0)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) setsockopt$inet_group_source_req(r4, 0x0, 0x0, &(0x7f0000000000)={0x400, {{0x2, 0x4e21}}, {{0x2, 0x0, @remote}}}, 0x108) write$binfmt_elf64(r2, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x7, 0x2, 0x0, 0x4, 0x3, 0x3, 0x3, 0x6, 0xa0, 0x40, 0x1b4, 0x6e, 0x4, 0x38, 0x1, 0x1000, 0x4, 0x9}, [{0x6, 0x5, 0xffff, 0x2, 0x7, 0xb0, 0x3, 0x12f}], "cd95370d41f87a7b18625edd87ef52f1bfbb1a93deb19255564b05e2844a37357efe46a6ae5caa1b28a871e590ab339d26436f5b76c7d8f66d2b0f40c72b86b1a16728f0c90764128ce29b1f0f29d25573aa132a73b10f893587dddbbc785dec77ee7dc7944402ec66884b0e2718a234340f3879c637e3d672972d30dd65c307f9b5f9a6c2b0a3328aebbeaa5786b274df364f9412e9807dfe415c783e54df18e2a931efad6e16aecd0e52f25bf48e652f8166b4223b", [[]]}, 0x22e) getsockopt$inet_int(r3, 0x0, 0x3, &(0x7f0000000300), &(0x7f0000000340)=0x4) prctl$PR_GET_KEEPCAPS(0x7) clone(0x12102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) fcntl$F_SET_FILE_RW_HINT(r2, 0x40e, &(0x7f00000008c0)=0x5) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f00000002c0), &(0x7f00000007c0)=0xc) request_key(&(0x7f0000001540)='user\x00', &(0x7f0000000140)={'syz'}, &(0x7f0000001580), 0x0) 22:42:37 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x1f7, &(0x7f0000000140)={&(0x7f0000000180)=@ipv6_newaddr={0x84, 0x14, 0x205, 0x0, 0x0, {}, [@IFA_ADDRESS={0x14, 0x1, @local}, @IFA_CACHEINFO={0x14}, @IFA_LOCAL={0x1c, 0x2, @local}, @IFA_ADDRESS={0x14, 0x1, @local}, @IFA_CACHEINFO={0x14}, @IFA_FLAGS={0x8}]}, 0x84}}, 0x0) 22:42:37 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000480), 0x80000) ioctl$sock_inet_SIOCRTMSG(r2, 0x890d, &(0x7f0000000500)={0x0, {0x2, 0x4e21, @loopback}, {0x2, 0x4e21, @remote}, {0x2, 0x4e24, @loopback}, 0x4, 0x0, 0x0, 0x0, 0x5, &(0x7f00000004c0)='ip6erspan0\x00', 0x1, 0x9}) r3 = dup(r1) setsockopt$IP_VS_SO_SET_DELDEST(r3, 0x0, 0x488, &(0x7f0000000180)={{0x0, @multicast2, 0x4e20, 0x2, 'none\x00', 0x0, 0xe85, 0x13}, {@dev={0xac, 0x14, 0x14, 0x2b}, 0x4e21, 0x2000, 0x8000, 0x9, 0x5}}, 0x44) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt(r0, 0x9, 0x58391201, &(0x7f0000000240)="490b0eaa684a01c63281d5e5253090c1c2e3bbf2ba914c9b2c146172c041a91467195a4b325e80a5905d676bef0b1efb95eb4356050e938c4b9fdd44ad42a0e4a729c8c3c274", 0x46) socket$inet_udplite(0x2, 0x2, 0x88) r4 = socket$inet_udp(0x2, 0x2, 0x0) memfd_create(&(0x7f0000000200)='syz', 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r4, 0x0, 0x2a, &(0x7f00000003c0)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) setsockopt$inet_group_source_req(r4, 0x0, 0x0, &(0x7f0000000000)={0x400, {{0x2, 0x4e21}}, {{0x2, 0x0, @remote}}}, 0x108) write$binfmt_elf64(r2, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x7, 0x2, 0x0, 0x4, 0x3, 0x3, 0x3, 0x6, 0xa0, 0x40, 0x1b4, 0x6e, 0x4, 0x38, 0x1, 0x1000, 0x4, 0x9}, [{0x6, 0x5, 0xffff, 0x2, 0x7, 0xb0, 0x3, 0x12f}], "cd95370d41f87a7b18625edd87ef52f1bfbb1a93deb19255564b05e2844a37357efe46a6ae5caa1b28a871e590ab339d26436f5b76c7d8f66d2b0f40c72b86b1a16728f0c90764128ce29b1f0f29d25573aa132a73b10f893587dddbbc785dec77ee7dc7944402ec66884b0e2718a234340f3879c637e3d672972d30dd65c307f9b5f9a6c2b0a3328aebbeaa5786b274df364f9412e9807dfe415c783e54df18e2a931efad6e16aecd0e52f25bf48e652f8166b4223b", [[]]}, 0x22e) getsockopt$inet_int(r3, 0x0, 0x3, &(0x7f0000000300), &(0x7f0000000340)=0x4) prctl$PR_GET_KEEPCAPS(0x7) clone(0x12102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) fcntl$F_SET_FILE_RW_HINT(r2, 0x40e, &(0x7f00000008c0)=0x5) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f00000002c0), &(0x7f00000007c0)=0xc) request_key(&(0x7f0000001540)='user\x00', &(0x7f0000000140)={'syz'}, &(0x7f0000001580), 0x0) 22:42:37 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$vcsa(0x0, 0x65, 0x502) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, 0x0, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00\x01\xa1\x1a\xb0\xe0l*\xc0[\x0e', 0x200002, 0x0) fchdir(r0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) rmdir(&(0x7f0000000200)='./file0\x00') ioctl$KVM_S390_UCAS_UNMAP(0xffffffffffffffff, 0x4018ae51, 0x0) 22:42:37 executing program 1: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000000)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x40000000015, 0x5, 0x0) setsockopt$SO_RDS_TRANSPORT(r1, 0x114, 0x8, &(0x7f00000007c0)=0x800000000000002, 0x4) bind$inet(r1, &(0x7f0000000840)={0x2, 0x4e20, @loopback}, 0x10) sendto$inet(r1, &(0x7f0000000a00)="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", 0x3f1, 0x0, &(0x7f000069affb)={0x2, 0x0, @loopback}, 0x10) [ 340.039782] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.5'. 22:42:37 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000480), 0x80000) ioctl$sock_inet_SIOCRTMSG(r2, 0x890d, &(0x7f0000000500)={0x0, {0x2, 0x4e21, @loopback}, {0x2, 0x4e21, @remote}, {0x2, 0x4e24, @loopback}, 0x4, 0x0, 0x0, 0x0, 0x5, &(0x7f00000004c0)='ip6erspan0\x00', 0x1, 0x9}) r3 = dup(r1) setsockopt$IP_VS_SO_SET_DELDEST(r3, 0x0, 0x488, &(0x7f0000000180)={{0x0, @multicast2, 0x4e20, 0x2, 'none\x00', 0x0, 0xe85, 0x13}, {@dev={0xac, 0x14, 0x14, 0x2b}, 0x4e21, 0x2000, 0x8000, 0x9, 0x5}}, 0x44) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt(r0, 0x9, 0x58391201, &(0x7f0000000240)="490b0eaa684a01c63281d5e5253090c1c2e3bbf2ba914c9b2c146172c041a91467195a4b325e80a5905d676bef0b1efb95eb4356050e938c4b9fdd44ad42a0e4a729c8c3c274", 0x46) socket$inet_udplite(0x2, 0x2, 0x88) r4 = socket$inet_udp(0x2, 0x2, 0x0) memfd_create(&(0x7f0000000200)='syz', 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r4, 0x0, 0x2a, &(0x7f00000003c0)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) setsockopt$inet_group_source_req(r4, 0x0, 0x0, &(0x7f0000000000)={0x400, {{0x2, 0x4e21}}, {{0x2, 0x0, @remote}}}, 0x108) write$binfmt_elf64(r2, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x7, 0x2, 0x0, 0x4, 0x3, 0x3, 0x3, 0x6, 0xa0, 0x40, 0x1b4, 0x6e, 0x4, 0x38, 0x1, 0x1000, 0x4, 0x9}, [{0x6, 0x5, 0xffff, 0x2, 0x7, 0xb0, 0x3, 0x12f}], "cd95370d41f87a7b18625edd87ef52f1bfbb1a93deb19255564b05e2844a37357efe46a6ae5caa1b28a871e590ab339d26436f5b76c7d8f66d2b0f40c72b86b1a16728f0c90764128ce29b1f0f29d25573aa132a73b10f893587dddbbc785dec77ee7dc7944402ec66884b0e2718a234340f3879c637e3d672972d30dd65c307f9b5f9a6c2b0a3328aebbeaa5786b274df364f9412e9807dfe415c783e54df18e2a931efad6e16aecd0e52f25bf48e652f8166b4223b", [[]]}, 0x22e) getsockopt$inet_int(r3, 0x0, 0x3, &(0x7f0000000300), &(0x7f0000000340)=0x4) prctl$PR_GET_KEEPCAPS(0x7) clone(0x12102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) fcntl$F_SET_FILE_RW_HINT(r2, 0x40e, &(0x7f00000008c0)=0x5) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f00000002c0), &(0x7f00000007c0)=0xc) request_key(&(0x7f0000001540)='user\x00', &(0x7f0000000140)={'syz'}, &(0x7f0000001580), 0x0) 22:42:37 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000480), 0x80000) ioctl$sock_inet_SIOCRTMSG(r2, 0x890d, &(0x7f0000000500)={0x0, {0x2, 0x4e21, @loopback}, {0x2, 0x4e21, @remote}, {0x2, 0x4e24, @loopback}, 0x4, 0x0, 0x0, 0x0, 0x5, &(0x7f00000004c0)='ip6erspan0\x00', 0x1, 0x9}) r3 = dup(r1) setsockopt$IP_VS_SO_SET_DELDEST(r3, 0x0, 0x488, &(0x7f0000000180)={{0x0, @multicast2, 0x4e20, 0x2, 'none\x00', 0x0, 0xe85, 0x13}, {@dev={0xac, 0x14, 0x14, 0x2b}, 0x4e21, 0x2000, 0x8000, 0x9, 0x5}}, 0x44) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt(r0, 0x9, 0x58391201, &(0x7f0000000240)="490b0eaa684a01c63281d5e5253090c1c2e3bbf2ba914c9b2c146172c041a91467195a4b325e80a5905d676bef0b1efb95eb4356050e938c4b9fdd44ad42a0e4a729c8c3c274", 0x46) socket$inet_udplite(0x2, 0x2, 0x88) r4 = socket$inet_udp(0x2, 0x2, 0x0) memfd_create(&(0x7f0000000200)='syz', 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r4, 0x0, 0x2a, &(0x7f00000003c0)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) setsockopt$inet_group_source_req(r4, 0x0, 0x0, &(0x7f0000000000)={0x400, {{0x2, 0x4e21}}, {{0x2, 0x0, @remote}}}, 0x108) write$binfmt_elf64(r2, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x7, 0x2, 0x0, 0x4, 0x3, 0x3, 0x3, 0x6, 0xa0, 0x40, 0x1b4, 0x6e, 0x4, 0x38, 0x1, 0x1000, 0x4, 0x9}, [{0x6, 0x5, 0xffff, 0x2, 0x7, 0xb0, 0x3, 0x12f}], "cd95370d41f87a7b18625edd87ef52f1bfbb1a93deb19255564b05e2844a37357efe46a6ae5caa1b28a871e590ab339d26436f5b76c7d8f66d2b0f40c72b86b1a16728f0c90764128ce29b1f0f29d25573aa132a73b10f893587dddbbc785dec77ee7dc7944402ec66884b0e2718a234340f3879c637e3d672972d30dd65c307f9b5f9a6c2b0a3328aebbeaa5786b274df364f9412e9807dfe415c783e54df18e2a931efad6e16aecd0e52f25bf48e652f8166b4223b", [[]]}, 0x22e) getsockopt$inet_int(r3, 0x0, 0x3, &(0x7f0000000300), &(0x7f0000000340)=0x4) prctl$PR_GET_KEEPCAPS(0x7) clone(0x12102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) fcntl$F_SET_FILE_RW_HINT(r2, 0x40e, &(0x7f00000008c0)=0x5) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f00000002c0), &(0x7f00000007c0)=0xc) request_key(&(0x7f0000001540)='user\x00', &(0x7f0000000140)={'syz'}, &(0x7f0000001580), 0x0) 22:42:37 executing program 1: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000000)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x40000000015, 0x5, 0x0) setsockopt$SO_RDS_TRANSPORT(r1, 0x114, 0x8, &(0x7f00000007c0)=0x800000000000002, 0x4) bind$inet(r1, &(0x7f0000000840)={0x2, 0x4e20, @loopback}, 0x10) sendto$inet(r1, &(0x7f0000000a00)="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", 0x3f1, 0x0, &(0x7f000069affb)={0x2, 0x0, @loopback}, 0x10) 22:42:37 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x1f7, &(0x7f0000000140)={&(0x7f0000000180)=@ipv6_newaddr={0x84, 0x14, 0x205, 0x0, 0x0, {}, [@IFA_ADDRESS={0x14, 0x1, @local}, @IFA_CACHEINFO={0x14}, @IFA_LOCAL={0x1c, 0x2, @local}, @IFA_ADDRESS={0x14, 0x1, @local}, @IFA_CACHEINFO={0x14}, @IFA_FLAGS={0x8}]}, 0x84}}, 0x0) 22:42:37 executing program 0: pipe2$9p(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000640)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@posixacl='posixacl'}]}}) [ 340.268612] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.5'. [ 341.883265] net_ratelimit: 14 callbacks suppressed [ 341.883271] protocol 88fb is buggy, dev hsr_slave_0 [ 341.893379] protocol 88fb is buggy, dev hsr_slave_1 [ 342.363245] protocol 88fb is buggy, dev hsr_slave_0 [ 342.368327] protocol 88fb is buggy, dev hsr_slave_1 [ 342.523247] protocol 88fb is buggy, dev hsr_slave_0 [ 342.528419] protocol 88fb is buggy, dev hsr_slave_1 [ 342.683262] protocol 88fb is buggy, dev hsr_slave_0 [ 342.689421] protocol 88fb is buggy, dev hsr_slave_1 22:42:40 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x8000000004) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x0, 0x7c}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 22:42:40 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000480), 0x80000) ioctl$sock_inet_SIOCRTMSG(r2, 0x890d, &(0x7f0000000500)={0x0, {0x2, 0x4e21, @loopback}, {0x2, 0x4e21, @remote}, {0x2, 0x4e24, @loopback}, 0x4, 0x0, 0x0, 0x0, 0x5, &(0x7f00000004c0)='ip6erspan0\x00', 0x1, 0x9}) r3 = dup(r1) setsockopt$IP_VS_SO_SET_DELDEST(r3, 0x0, 0x488, &(0x7f0000000180)={{0x0, @multicast2, 0x4e20, 0x2, 'none\x00', 0x0, 0xe85, 0x13}, {@dev={0xac, 0x14, 0x14, 0x2b}, 0x4e21, 0x2000, 0x8000, 0x9, 0x5}}, 0x44) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt(r0, 0x9, 0x58391201, &(0x7f0000000240)="490b0eaa684a01c63281d5e5253090c1c2e3bbf2ba914c9b2c146172c041a91467195a4b325e80a5905d676bef0b1efb95eb4356050e938c4b9fdd44ad42a0e4a729c8c3c274", 0x46) socket$inet_udplite(0x2, 0x2, 0x88) r4 = socket$inet_udp(0x2, 0x2, 0x0) memfd_create(&(0x7f0000000200)='syz', 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r4, 0x0, 0x2a, &(0x7f00000003c0)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) setsockopt$inet_group_source_req(r4, 0x0, 0x0, &(0x7f0000000000)={0x400, {{0x2, 0x4e21}}, {{0x2, 0x0, @remote}}}, 0x108) write$binfmt_elf64(r2, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x7, 0x2, 0x0, 0x4, 0x3, 0x3, 0x3, 0x6, 0xa0, 0x40, 0x1b4, 0x6e, 0x4, 0x38, 0x1, 0x1000, 0x4, 0x9}, [{0x6, 0x5, 0xffff, 0x2, 0x7, 0xb0, 0x3, 0x12f}], "cd95370d41f87a7b18625edd87ef52f1bfbb1a93deb19255564b05e2844a37357efe46a6ae5caa1b28a871e590ab339d26436f5b76c7d8f66d2b0f40c72b86b1a16728f0c90764128ce29b1f0f29d25573aa132a73b10f893587dddbbc785dec77ee7dc7944402ec66884b0e2718a234340f3879c637e3d672972d30dd65c307f9b5f9a6c2b0a3328aebbeaa5786b274df364f9412e9807dfe415c783e54df18e2a931efad6e16aecd0e52f25bf48e652f8166b4223b", [[]]}, 0x22e) getsockopt$inet_int(r3, 0x0, 0x3, &(0x7f0000000300), &(0x7f0000000340)=0x4) prctl$PR_GET_KEEPCAPS(0x7) clone(0x12102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) fcntl$F_SET_FILE_RW_HINT(r2, 0x40e, &(0x7f00000008c0)=0x5) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f00000002c0), &(0x7f00000007c0)=0xc) request_key(&(0x7f0000001540)='user\x00', &(0x7f0000000140)={'syz'}, &(0x7f0000001580), 0x0) 22:42:40 executing program 3: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000200)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0x80045113, &(0x7f0000000100)) 22:42:40 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000080)={0xa, 0x4e20}, 0x1b) listen(r1, 0x400009) syz_emit_ethernet(0x74, &(0x7f0000000100)={@local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)=ANY=[@ANYBLOB="aaaaaaaaaaaa0180c200000086dd60d8652b00140600fe8000000000000000000d00000000aafe8002000000000000000000000000aa00004e20", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB], 0x0) 22:42:40 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x1f7, &(0x7f0000000140)={&(0x7f0000000180)=@ipv6_newaddr={0x84, 0x14, 0x205, 0x0, 0x0, {}, [@IFA_ADDRESS={0x14, 0x1, @local}, @IFA_CACHEINFO={0x14}, @IFA_LOCAL={0x1c, 0x2, @local}, @IFA_ADDRESS={0x14, 0x1, @local}, @IFA_CACHEINFO={0x14}, @IFA_FLAGS={0x8}]}, 0x84}}, 0x0) 22:42:40 executing program 0: pipe2$9p(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000640)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@posixacl='posixacl'}]}}) 22:42:40 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000498000)={0x0, 0xfe95, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="1c0000000002afba0000680000000000000000000400030004000200"], 0x1c}}, 0x0) 22:42:40 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x1f7, &(0x7f0000000140)={&(0x7f0000000180)=@ipv6_newaddr={0x84, 0x14, 0x205, 0x0, 0x0, {}, [@IFA_ADDRESS={0x14, 0x1, @local}, @IFA_CACHEINFO={0x14}, @IFA_LOCAL={0x1c, 0x2, @local}, @IFA_ADDRESS={0x14, 0x1, @local}, @IFA_CACHEINFO={0x14}, @IFA_FLAGS={0x8}]}, 0x84}}, 0x0) [ 343.095996] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.5'. 22:42:40 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") getresgid(&(0x7f0000000600), &(0x7f0000000640)=0x0, &(0x7f0000000680)) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000800)=ANY=[@ANYBLOB='noquota,usrquota,gid=', @ANYRESHEX=r1, @ANYBLOB=',discard']) 22:42:40 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) pipe2(&(0x7f0000000300), 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000000000/0x1000)=nil}) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_PIT2(0xffffffffffffffff, 0x4070aea0, &(0x7f00000004c0)={[{0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x2, 0x8}, {0x3, 0xffffffffd927d9bc, 0x0, 0x0, 0x0, 0x0, 0x62c, 0x3, 0x0, 0x0, 0xffffffff, 0x0, 0x100000000}, {0x0, 0x0, 0x0, 0x6}]}) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) write$FUSE_STATFS(0xffffffffffffffff, &(0x7f0000000180)={0x60, 0x0, 0x0, {{0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x6}}}, 0x60) ioctl$KVM_SET_SREGS(0xffffffffffffffff, 0x4138ae84, &(0x7f0000000780)={{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0xe4}}) sendmsg$TIPC_NL_NET_SET(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000540)=ANY=[]}}, 0x0) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0xfb]}) syz_genetlink_get_family_id$tipc(&(0x7f0000000480)='TIPC\x00') ioctl$KVM_SET_REGS(0xffffffffffffffff, 0x4090ae82, &(0x7f0000000580)={[0x0, 0x8969, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3], 0x4}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_NMI(r3, 0xae9a) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000380)) ioctl$KVM_RUN(r3, 0xae80, 0x0) 22:42:40 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000498000)={0x0, 0xfe95, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="1c0000000002afba0000680000000000000000000400030004000200"], 0x1c}}, 0x0) [ 343.232068] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.5'. 22:42:40 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = fanotify_init(0x100000017, 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x0, 0x0) r3 = fanotify_init(0x4, 0x0) fanotify_mark(r3, 0x11, 0x20, r2, 0x0) fanotify_mark(r1, 0x45, 0x8000020, r0, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) [ 343.963270] protocol 88fb is buggy, dev hsr_slave_0 [ 343.968406] protocol 88fb is buggy, dev hsr_slave_1 22:42:43 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = fanotify_init(0x100000017, 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x0, 0x0) r3 = fanotify_init(0x4, 0x0) fanotify_mark(r3, 0x11, 0x20, r2, 0x0) fanotify_mark(r1, 0x45, 0x8000020, r0, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 22:42:43 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) close(r1) openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x32e) 22:42:43 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") getresgid(&(0x7f0000000600), &(0x7f0000000640)=0x0, &(0x7f0000000680)) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000800)=ANY=[@ANYBLOB='noquota,usrquota,gid=', @ANYRESHEX=r1, @ANYBLOB=',discard']) 22:42:43 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x7fffdf00f000, 0xa, 0x13012, r1, 0x0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x4042, 0x0) r3 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2a, 0x0, 0x8, 0x1f, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) shmget$private(0x0, 0x2000, 0x20, &(0x7f0000ffe000/0x2000)=nil) fcntl$F_GET_FILE_RW_HINT(r3, 0x40d, &(0x7f0000000080)) r4 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x80000, 0x0) fsetxattr$security_smack_entry(r3, &(0x7f0000000000)='security.SMACK64IPOUT\x00', &(0x7f0000000040)='[\x00', 0x2, 0x3) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r5, 0x0, 0x482, &(0x7f0000000300)={0x100000011, @multicast2, 0x11, 0x11000000, 'lblc\x00'}, 0x2c) r6 = socket(0xa, 0x4000000001, 0x0) setsockopt$IP_VS_SO_SET_ADD(r6, 0x0, 0x482, &(0x7f0000000000)={0x11, @rand_addr, 0x0, 0x0, 'lblcr\x00'}, 0x2c) getsockopt$inet_pktinfo(r4, 0x0, 0x8, &(0x7f0000001580)={0x0, @dev, @broadcast}, &(0x7f00000015c0)=0xc) setsockopt$inet_pktinfo(r4, 0x0, 0x8, &(0x7f0000000300)={r7, @loopback, @remote}, 0xc) getsockopt$inet_pktinfo(r4, 0x0, 0x8, &(0x7f00000000c0)={0x0, @remote, @empty}, &(0x7f0000000100)=0xc) setsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f0000000140)={r8, @remote, @loopback}, 0xc) ustat(0x0, 0x0) r9 = fcntl$getown(r5, 0x9) fcntl$lock(r4, 0x27, &(0x7f0000000280)={0x4, 0x3, 0x5ba, 0x3f, r9}) setsockopt$sock_timeval(r4, 0x1, 0x14, &(0x7f00000002c0)={0x77359400}, 0x8) setsockopt$EBT_SO_SET_COUNTERS(r4, 0x0, 0x81, &(0x7f00000004c0)=ANY=[@ANYBLOB="665e6c74657200000000000000001200000000000000000000000000000000000000000000000000000000000000000000080000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000000000002edb301e5d4bde4a0a56018d22677961b2adbd05f8aeadc8c18e9ebc", @ANYPTR=&(0x7f0000000240)=ANY=[@ANYBLOB="0000f56987245b0559197e371a59e28482730359bab9fa6a"], @ANYBLOB="00000000000000000000000000000000000000000000000000000000614400000000584380ed8eb71cee3dd5637827b6364017c0a938d4422708d587d5c7f04a76ec2050f57acf8b4d37123de2446ccc5baea2532544e2136373cd36fee8c88268350382c029a5d4954856f3d4a7b17751a9ed5159e9fde44bc629ca25bd3a4f79993cc4f44f0d729860f189660e871c816c5f9033b4e68eee9eb520419880"], 0x70) ioctl$FICLONE(r1, 0x40049409, r5) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(r2, 0xc0305602, &(0x7f0000000040)={0x0, 0x3, 0x2024, 0x1}) preadv(r0, &(0x7f0000000140)=[{&(0x7f0000000080)=""/163, 0xa3}], 0x1, 0x0) 22:42:43 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000498000)={0x0, 0xfe95, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="1c0000000002afba0000680000000000000000000400030004000200"], 0x1c}}, 0x0) 22:42:43 executing program 0: pipe2$9p(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000640)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@posixacl='posixacl'}]}}) 22:42:43 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") getresgid(&(0x7f0000000600), &(0x7f0000000640)=0x0, &(0x7f0000000680)) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000800)=ANY=[@ANYBLOB='noquota,usrquota,gid=', @ANYRESHEX=r1, @ANYBLOB=',discard']) 22:42:43 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = fanotify_init(0x100000017, 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x0, 0x0) r3 = fanotify_init(0x4, 0x0) fanotify_mark(r3, 0x11, 0x20, r2, 0x0) fanotify_mark(r1, 0x45, 0x8000020, r0, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 22:42:43 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000498000)={0x0, 0xfe95, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="1c0000000002afba0000680000000000000000000400030004000200"], 0x1c}}, 0x0) 22:42:43 executing program 4: getsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000300)={@local={0xfe, 0x80, [0xa4ffffff]}}, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x303, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) rename(0x0, &(0x7f00000001c0)='./file0\x00') syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x2c3, 0x400}], 0x1, 0x0) 22:42:43 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") getresgid(&(0x7f0000000600), &(0x7f0000000640)=0x0, &(0x7f0000000680)) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000800)=ANY=[@ANYBLOB='noquota,usrquota,gid=', @ANYRESHEX=r1, @ANYBLOB=',discard']) 22:42:43 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000040)=0x480100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() r2 = fcntl$dupfd(r0, 0x0, r0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f00000000c0)={@loopback, 0x0, 0x1, 0x0, 0x5}, 0x20) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x10010000000035) getsockopt$IP_VS_SO_GET_TIMEOUT(r0, 0x0, 0x486, &(0x7f0000000140), &(0x7f0000000180)=0xc) 22:42:43 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = fanotify_init(0x100000017, 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x0, 0x0) r3 = fanotify_init(0x4, 0x0) fanotify_mark(r3, 0x11, 0x20, r2, 0x0) fanotify_mark(r1, 0x45, 0x8000020, r0, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 22:42:43 executing program 4: semop(0x0, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_pts(r0, 0x0) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) ioctl$TCSETA(r1, 0x5406, &(0x7f00000000c0)={0xfffffffffffffffd, 0x0, 0x0, 0x100000009b4b62e, 0x2, 0x0, 0x0, 0x40, 0x0, 0x4}) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)={0x17, 0x5b03}) time(&(0x7f0000000440)) r2 = socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f0000000680)={0xfffffffffffffffd, 0x70, 0x3, 0x0, 0x9, 0x0, 0x0, 0x2, 0x4804, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, @perf_bp, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$vcsn(&(0x7f0000000140)='/dev/vcs#\x00', 0x3, 0x0) accept(r2, &(0x7f0000000a40)=@caif=@dgm, &(0x7f00000002c0)=0x80) r4 = syz_open_dev$vcsa(&(0x7f00000004c0)='/dev/vcsa#\x00', 0x6, 0x8000) ioctl$sock_inet_tcp_SIOCATMARK(r4, 0x40247007, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000640)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r5}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, 0x7, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x10000, 0x0, 0x69435c71, 0x4000000000000000, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x48}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000400)='mountinfo\x00') ioctl$TIOCGETD(r6, 0x5424, &(0x7f0000000580)) set_thread_area(&(0x7f0000000340)={0x6, 0x20001800, 0x4000, 0x200, 0x10000000000ffff, 0x8000000000000001, 0x4000000080101, 0x2, 0xffffffff, 0x3}) rename(&(0x7f00000003c0)='./file0\x00', &(0x7f00000005c0)='./file0\x00') write$FUSE_NOTIFY_STORE(r3, &(0x7f0000000480)=ANY=[@ANYBLOB="0a0000e7f0511f0000000000000000000100000000000000be00000000000000fcfe0000000000000000"], 0x2a) mount(&(0x7f0000000c00)=ANY=[@ANYPTR64=&(0x7f0000000ac0)=ANY=[@ANYBLOB="f4d1784996c194946d4861257209c91bd8eeff1ffb27923b781eb47f4071d175679f2ec75e005193da3f58fa5d6f25b06d", @ANYPTR]], 0x0, 0x0, 0x801010, 0x0) mount(&(0x7f00000008c0)=ANY=[@ANYBLOB='/d%v/md0\x00'], 0x0, 0x0, 0x2000023, 0x0) mount(&(0x7f0000000940)=ANY=[@ANYBLOB="969957b52d30fea3a6945a209691fd3e214cb9dcc33db7762efad2628dcef5d3b6364e061019df973b2f53d859e769464fe2a2410d59da45d13169add1c55847f5c9f3efe3c9b2e151b4c4a2bdac535d60eb398d4d6952a19e3d52a29749828eb1d6ff4558ca709d9c13c28a2da129717e838eb618c9886828e09a944bc03f33827c69c3fbb70d4b5fba995326c48cedf607660f2b85e3cd0d67bc0cccd8dfba547fe5e36524ef742126514000d7cf7126e2536307a8290af7f78189fa963bfaf8cf0dee8d84a76599366358414b18f32d01f7a3d0b4802a4d7000"/229], 0x0, 0x0, 0x80010, 0x0) mount(&(0x7f0000000700)=ANY=[@ANYBLOB="3040abf7d58436d7496072d88d9f01000000f65251c2210ce6c3275cf63ee466a17abdb3f6b1325bbc9556b9ba20d4df40a9db69d15d3308712819f3cff27695155ef2b719bc4fcb5d38c46f71f14089eea8a3bb9dfa1e774fccee35dc618d63aa608e8d3f0421aabde758c08399866dd6f0c9c72140b2f6694a000000000000000000ade5b6bfd9af5cea1ab63390b1cae4e7b5b56697dd414840056f00c68acc071050d5d498d1a8f0f4c385a517a32f77336ef24e76de96a78d048747d2d3927b57511732b048ee3744eb86af3897ab9d0c"], 0x0, 0x0, 0x80000, 0x0) r7 = dup2(r4, r0) ioctl$TCSBRKP(r1, 0x5425, 0x3) write$FUSE_OPEN(r7, &(0x7f0000000380)={0x20, 0x0, 0x8, {0x0, 0x1}}, 0x20) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount(&(0x7f0000000500)=ANY=[], &(0x7f0000000540)='./file0\x00', &(0x7f0000000800)='devtmpfs\x00', 0x847, &(0x7f0000000780)) 22:42:43 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) listen(r0, 0x0) listen(r0, 0x0) 22:42:43 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x7fffdf00f000, 0xa, 0x13012, r1, 0x0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x4042, 0x0) r3 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2a, 0x0, 0x8, 0x1f, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) shmget$private(0x0, 0x2000, 0x20, &(0x7f0000ffe000/0x2000)=nil) fcntl$F_GET_FILE_RW_HINT(r3, 0x40d, &(0x7f0000000080)) r4 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x80000, 0x0) fsetxattr$security_smack_entry(r3, &(0x7f0000000000)='security.SMACK64IPOUT\x00', &(0x7f0000000040)='[\x00', 0x2, 0x3) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r5, 0x0, 0x482, &(0x7f0000000300)={0x100000011, @multicast2, 0x11, 0x11000000, 'lblc\x00'}, 0x2c) r6 = socket(0xa, 0x4000000001, 0x0) setsockopt$IP_VS_SO_SET_ADD(r6, 0x0, 0x482, &(0x7f0000000000)={0x11, @rand_addr, 0x0, 0x0, 'lblcr\x00'}, 0x2c) getsockopt$inet_pktinfo(r4, 0x0, 0x8, &(0x7f0000001580)={0x0, @dev, @broadcast}, &(0x7f00000015c0)=0xc) setsockopt$inet_pktinfo(r4, 0x0, 0x8, &(0x7f0000000300)={r7, @loopback, @remote}, 0xc) getsockopt$inet_pktinfo(r4, 0x0, 0x8, &(0x7f00000000c0)={0x0, @remote, @empty}, &(0x7f0000000100)=0xc) setsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f0000000140)={r8, @remote, @loopback}, 0xc) ustat(0x0, 0x0) r9 = fcntl$getown(r5, 0x9) fcntl$lock(r4, 0x27, &(0x7f0000000280)={0x4, 0x3, 0x5ba, 0x3f, r9}) setsockopt$sock_timeval(r4, 0x1, 0x14, &(0x7f00000002c0)={0x77359400}, 0x8) setsockopt$EBT_SO_SET_COUNTERS(r4, 0x0, 0x81, &(0x7f00000004c0)=ANY=[@ANYBLOB="665e6c74657200000000000000001200000000000000000000000000000000000000000000000000000000000000000000080000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000000000002edb301e5d4bde4a0a56018d22677961b2adbd05f8aeadc8c18e9ebc", @ANYPTR=&(0x7f0000000240)=ANY=[@ANYBLOB="0000f56987245b0559197e371a59e28482730359bab9fa6a"], @ANYBLOB="00000000000000000000000000000000000000000000000000000000614400000000584380ed8eb71cee3dd5637827b6364017c0a938d4422708d587d5c7f04a76ec2050f57acf8b4d37123de2446ccc5baea2532544e2136373cd36fee8c88268350382c029a5d4954856f3d4a7b17751a9ed5159e9fde44bc629ca25bd3a4f79993cc4f44f0d729860f189660e871c816c5f9033b4e68eee9eb520419880"], 0x70) ioctl$FICLONE(r1, 0x40049409, r5) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(r2, 0xc0305602, &(0x7f0000000040)={0x0, 0x3, 0x2024, 0x1}) preadv(r0, &(0x7f0000000140)=[{&(0x7f0000000080)=""/163, 0xa3}], 0x1, 0x0) 22:42:43 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x7fffdf00f000, 0xa, 0x13012, r1, 0x0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x4042, 0x0) r3 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2a, 0x0, 0x8, 0x1f, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) shmget$private(0x0, 0x2000, 0x20, &(0x7f0000ffe000/0x2000)=nil) fcntl$F_GET_FILE_RW_HINT(r3, 0x40d, &(0x7f0000000080)) r4 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x80000, 0x0) fsetxattr$security_smack_entry(r3, &(0x7f0000000000)='security.SMACK64IPOUT\x00', &(0x7f0000000040)='[\x00', 0x2, 0x3) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r5, 0x0, 0x482, &(0x7f0000000300)={0x100000011, @multicast2, 0x11, 0x11000000, 'lblc\x00'}, 0x2c) r6 = socket(0xa, 0x4000000001, 0x0) setsockopt$IP_VS_SO_SET_ADD(r6, 0x0, 0x482, &(0x7f0000000000)={0x11, @rand_addr, 0x0, 0x0, 'lblcr\x00'}, 0x2c) getsockopt$inet_pktinfo(r4, 0x0, 0x8, &(0x7f0000001580)={0x0, @dev, @broadcast}, &(0x7f00000015c0)=0xc) setsockopt$inet_pktinfo(r4, 0x0, 0x8, &(0x7f0000000300)={r7, @loopback, @remote}, 0xc) getsockopt$inet_pktinfo(r4, 0x0, 0x8, &(0x7f00000000c0)={0x0, @remote, @empty}, &(0x7f0000000100)=0xc) setsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f0000000140)={r8, @remote, @loopback}, 0xc) ustat(0x0, 0x0) r9 = fcntl$getown(r5, 0x9) fcntl$lock(r4, 0x27, &(0x7f0000000280)={0x4, 0x3, 0x5ba, 0x3f, r9}) setsockopt$sock_timeval(r4, 0x1, 0x14, &(0x7f00000002c0)={0x77359400}, 0x8) setsockopt$EBT_SO_SET_COUNTERS(r4, 0x0, 0x81, &(0x7f00000004c0)=ANY=[@ANYBLOB="665e6c74657200000000000000001200000000000000000000000000000000000000000000000000000000000000000000080000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000000000002edb301e5d4bde4a0a56018d22677961b2adbd05f8aeadc8c18e9ebc", @ANYPTR=&(0x7f0000000240)=ANY=[@ANYBLOB="0000f56987245b0559197e371a59e28482730359bab9fa6a"], @ANYBLOB="00000000000000000000000000000000000000000000000000000000614400000000584380ed8eb71cee3dd5637827b6364017c0a938d4422708d587d5c7f04a76ec2050f57acf8b4d37123de2446ccc5baea2532544e2136373cd36fee8c88268350382c029a5d4954856f3d4a7b17751a9ed5159e9fde44bc629ca25bd3a4f79993cc4f44f0d729860f189660e871c816c5f9033b4e68eee9eb520419880"], 0x70) ioctl$FICLONE(r1, 0x40049409, r5) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(r2, 0xc0305602, &(0x7f0000000040)={0x0, 0x3, 0x2024, 0x1}) preadv(r0, &(0x7f0000000140)=[{&(0x7f0000000080)=""/163, 0xa3}], 0x1, 0x0) 22:42:43 executing program 0: pipe2$9p(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000640)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@posixacl='posixacl'}]}}) 22:42:43 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) listen(r0, 0x0) listen(r0, 0x0) [ 346.508517] audit: type=1400 audit(1566168163.958:530): avc: denied { accept } for pid=17548 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 22:42:44 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x7fffdf00f000, 0xa, 0x13012, r1, 0x0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x4042, 0x0) r3 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2a, 0x0, 0x8, 0x1f, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) shmget$private(0x0, 0x2000, 0x20, &(0x7f0000ffe000/0x2000)=nil) fcntl$F_GET_FILE_RW_HINT(r3, 0x40d, &(0x7f0000000080)) r4 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x80000, 0x0) fsetxattr$security_smack_entry(r3, &(0x7f0000000000)='security.SMACK64IPOUT\x00', &(0x7f0000000040)='[\x00', 0x2, 0x3) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r5, 0x0, 0x482, &(0x7f0000000300)={0x100000011, @multicast2, 0x11, 0x11000000, 'lblc\x00'}, 0x2c) r6 = socket(0xa, 0x4000000001, 0x0) setsockopt$IP_VS_SO_SET_ADD(r6, 0x0, 0x482, &(0x7f0000000000)={0x11, @rand_addr, 0x0, 0x0, 'lblcr\x00'}, 0x2c) getsockopt$inet_pktinfo(r4, 0x0, 0x8, &(0x7f0000001580)={0x0, @dev, @broadcast}, &(0x7f00000015c0)=0xc) setsockopt$inet_pktinfo(r4, 0x0, 0x8, &(0x7f0000000300)={r7, @loopback, @remote}, 0xc) getsockopt$inet_pktinfo(r4, 0x0, 0x8, &(0x7f00000000c0)={0x0, @remote, @empty}, &(0x7f0000000100)=0xc) setsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f0000000140)={r8, @remote, @loopback}, 0xc) ustat(0x0, 0x0) r9 = fcntl$getown(r5, 0x9) fcntl$lock(r4, 0x27, &(0x7f0000000280)={0x4, 0x3, 0x5ba, 0x3f, r9}) setsockopt$sock_timeval(r4, 0x1, 0x14, &(0x7f00000002c0)={0x77359400}, 0x8) setsockopt$EBT_SO_SET_COUNTERS(r4, 0x0, 0x81, &(0x7f00000004c0)=ANY=[@ANYBLOB="665e6c74657200000000000000001200000000000000000000000000000000000000000000000000000000000000000000080000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000000000002edb301e5d4bde4a0a56018d22677961b2adbd05f8aeadc8c18e9ebc", @ANYPTR=&(0x7f0000000240)=ANY=[@ANYBLOB="0000f56987245b0559197e371a59e28482730359bab9fa6a"], @ANYBLOB="00000000000000000000000000000000000000000000000000000000614400000000584380ed8eb71cee3dd5637827b6364017c0a938d4422708d587d5c7f04a76ec2050f57acf8b4d37123de2446ccc5baea2532544e2136373cd36fee8c88268350382c029a5d4954856f3d4a7b17751a9ed5159e9fde44bc629ca25bd3a4f79993cc4f44f0d729860f189660e871c816c5f9033b4e68eee9eb520419880"], 0x70) ioctl$FICLONE(r1, 0x40049409, r5) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(r2, 0xc0305602, &(0x7f0000000040)={0x0, 0x3, 0x2024, 0x1}) preadv(r0, &(0x7f0000000140)=[{&(0x7f0000000080)=""/163, 0xa3}], 0x1, 0x0) 22:42:44 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x7fffdf00f000, 0xa, 0x13012, r1, 0x0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x4042, 0x0) r3 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2a, 0x0, 0x8, 0x1f, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) shmget$private(0x0, 0x2000, 0x20, &(0x7f0000ffe000/0x2000)=nil) fcntl$F_GET_FILE_RW_HINT(r3, 0x40d, &(0x7f0000000080)) r4 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x80000, 0x0) fsetxattr$security_smack_entry(r3, &(0x7f0000000000)='security.SMACK64IPOUT\x00', &(0x7f0000000040)='[\x00', 0x2, 0x3) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r5, 0x0, 0x482, &(0x7f0000000300)={0x100000011, @multicast2, 0x11, 0x11000000, 'lblc\x00'}, 0x2c) r6 = socket(0xa, 0x4000000001, 0x0) setsockopt$IP_VS_SO_SET_ADD(r6, 0x0, 0x482, &(0x7f0000000000)={0x11, @rand_addr, 0x0, 0x0, 'lblcr\x00'}, 0x2c) getsockopt$inet_pktinfo(r4, 0x0, 0x8, &(0x7f0000001580)={0x0, @dev, @broadcast}, &(0x7f00000015c0)=0xc) setsockopt$inet_pktinfo(r4, 0x0, 0x8, &(0x7f0000000300)={r7, @loopback, @remote}, 0xc) getsockopt$inet_pktinfo(r4, 0x0, 0x8, &(0x7f00000000c0)={0x0, @remote, @empty}, &(0x7f0000000100)=0xc) setsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f0000000140)={r8, @remote, @loopback}, 0xc) ustat(0x0, 0x0) r9 = fcntl$getown(r5, 0x9) fcntl$lock(r4, 0x27, &(0x7f0000000280)={0x4, 0x3, 0x5ba, 0x3f, r9}) setsockopt$sock_timeval(r4, 0x1, 0x14, &(0x7f00000002c0)={0x77359400}, 0x8) setsockopt$EBT_SO_SET_COUNTERS(r4, 0x0, 0x81, &(0x7f00000004c0)=ANY=[@ANYBLOB="665e6c74657200000000000000001200000000000000000000000000000000000000000000000000000000000000000000080000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000000000002edb301e5d4bde4a0a56018d22677961b2adbd05f8aeadc8c18e9ebc", @ANYPTR=&(0x7f0000000240)=ANY=[@ANYBLOB="0000f56987245b0559197e371a59e28482730359bab9fa6a"], @ANYBLOB="00000000000000000000000000000000000000000000000000000000614400000000584380ed8eb71cee3dd5637827b6364017c0a938d4422708d587d5c7f04a76ec2050f57acf8b4d37123de2446ccc5baea2532544e2136373cd36fee8c88268350382c029a5d4954856f3d4a7b17751a9ed5159e9fde44bc629ca25bd3a4f79993cc4f44f0d729860f189660e871c816c5f9033b4e68eee9eb520419880"], 0x70) ioctl$FICLONE(r1, 0x40049409, r5) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(r2, 0xc0305602, &(0x7f0000000040)={0x0, 0x3, 0x2024, 0x1}) preadv(r0, &(0x7f0000000140)=[{&(0x7f0000000080)=""/163, 0xa3}], 0x1, 0x0) 22:42:44 executing program 4: semop(0x0, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_pts(r0, 0x0) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) ioctl$TCSETA(r1, 0x5406, &(0x7f00000000c0)={0xfffffffffffffffd, 0x0, 0x0, 0x100000009b4b62e, 0x2, 0x0, 0x0, 0x40, 0x0, 0x4}) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)={0x17, 0x5b03}) time(&(0x7f0000000440)) r2 = socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f0000000680)={0xfffffffffffffffd, 0x70, 0x3, 0x0, 0x9, 0x0, 0x0, 0x2, 0x4804, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, @perf_bp, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$vcsn(&(0x7f0000000140)='/dev/vcs#\x00', 0x3, 0x0) accept(r2, &(0x7f0000000a40)=@caif=@dgm, &(0x7f00000002c0)=0x80) r4 = syz_open_dev$vcsa(&(0x7f00000004c0)='/dev/vcsa#\x00', 0x6, 0x8000) ioctl$sock_inet_tcp_SIOCATMARK(r4, 0x40247007, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000640)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r5}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, 0x7, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x10000, 0x0, 0x69435c71, 0x4000000000000000, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x48}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000400)='mountinfo\x00') ioctl$TIOCGETD(r6, 0x5424, &(0x7f0000000580)) set_thread_area(&(0x7f0000000340)={0x6, 0x20001800, 0x4000, 0x200, 0x10000000000ffff, 0x8000000000000001, 0x4000000080101, 0x2, 0xffffffff, 0x3}) rename(&(0x7f00000003c0)='./file0\x00', &(0x7f00000005c0)='./file0\x00') write$FUSE_NOTIFY_STORE(r3, &(0x7f0000000480)=ANY=[@ANYBLOB="0a0000e7f0511f0000000000000000000100000000000000be00000000000000fcfe0000000000000000"], 0x2a) mount(&(0x7f0000000c00)=ANY=[@ANYPTR64=&(0x7f0000000ac0)=ANY=[@ANYBLOB="f4d1784996c194946d4861257209c91bd8eeff1ffb27923b781eb47f4071d175679f2ec75e005193da3f58fa5d6f25b06d", @ANYPTR]], 0x0, 0x0, 0x801010, 0x0) mount(&(0x7f00000008c0)=ANY=[@ANYBLOB='/d%v/md0\x00'], 0x0, 0x0, 0x2000023, 0x0) mount(&(0x7f0000000940)=ANY=[@ANYBLOB="969957b52d30fea3a6945a209691fd3e214cb9dcc33db7762efad2628dcef5d3b6364e061019df973b2f53d859e769464fe2a2410d59da45d13169add1c55847f5c9f3efe3c9b2e151b4c4a2bdac535d60eb398d4d6952a19e3d52a29749828eb1d6ff4558ca709d9c13c28a2da129717e838eb618c9886828e09a944bc03f33827c69c3fbb70d4b5fba995326c48cedf607660f2b85e3cd0d67bc0cccd8dfba547fe5e36524ef742126514000d7cf7126e2536307a8290af7f78189fa963bfaf8cf0dee8d84a76599366358414b18f32d01f7a3d0b4802a4d7000"/229], 0x0, 0x0, 0x80010, 0x0) mount(&(0x7f0000000700)=ANY=[@ANYBLOB="3040abf7d58436d7496072d88d9f01000000f65251c2210ce6c3275cf63ee466a17abdb3f6b1325bbc9556b9ba20d4df40a9db69d15d3308712819f3cff27695155ef2b719bc4fcb5d38c46f71f14089eea8a3bb9dfa1e774fccee35dc618d63aa608e8d3f0421aabde758c08399866dd6f0c9c72140b2f6694a000000000000000000ade5b6bfd9af5cea1ab63390b1cae4e7b5b56697dd414840056f00c68acc071050d5d498d1a8f0f4c385a517a32f77336ef24e76de96a78d048747d2d3927b57511732b048ee3744eb86af3897ab9d0c"], 0x0, 0x0, 0x80000, 0x0) r7 = dup2(r4, r0) ioctl$TCSBRKP(r1, 0x5425, 0x3) write$FUSE_OPEN(r7, &(0x7f0000000380)={0x20, 0x0, 0x8, {0x0, 0x1}}, 0x20) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount(&(0x7f0000000500)=ANY=[], &(0x7f0000000540)='./file0\x00', &(0x7f0000000800)='devtmpfs\x00', 0x847, &(0x7f0000000780)) 22:42:44 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) listen(r0, 0x0) listen(r0, 0x0) 22:42:44 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000040)=0x480100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() r2 = fcntl$dupfd(r0, 0x0, r0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f00000000c0)={@loopback, 0x0, 0x1, 0x0, 0x5}, 0x20) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x10010000000035) getsockopt$IP_VS_SO_GET_TIMEOUT(r0, 0x0, 0x486, &(0x7f0000000140), &(0x7f0000000180)=0xc) 22:42:44 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) listen(r0, 0x0) listen(r0, 0x0) 22:42:44 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x7fffdf00f000, 0xa, 0x13012, r1, 0x0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x4042, 0x0) r3 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2a, 0x0, 0x8, 0x1f, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) shmget$private(0x0, 0x2000, 0x20, &(0x7f0000ffe000/0x2000)=nil) fcntl$F_GET_FILE_RW_HINT(r3, 0x40d, &(0x7f0000000080)) r4 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x80000, 0x0) fsetxattr$security_smack_entry(r3, &(0x7f0000000000)='security.SMACK64IPOUT\x00', &(0x7f0000000040)='[\x00', 0x2, 0x3) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r5, 0x0, 0x482, &(0x7f0000000300)={0x100000011, @multicast2, 0x11, 0x11000000, 'lblc\x00'}, 0x2c) r6 = socket(0xa, 0x4000000001, 0x0) setsockopt$IP_VS_SO_SET_ADD(r6, 0x0, 0x482, &(0x7f0000000000)={0x11, @rand_addr, 0x0, 0x0, 'lblcr\x00'}, 0x2c) getsockopt$inet_pktinfo(r4, 0x0, 0x8, &(0x7f0000001580)={0x0, @dev, @broadcast}, &(0x7f00000015c0)=0xc) setsockopt$inet_pktinfo(r4, 0x0, 0x8, &(0x7f0000000300)={r7, @loopback, @remote}, 0xc) getsockopt$inet_pktinfo(r4, 0x0, 0x8, &(0x7f00000000c0)={0x0, @remote, @empty}, &(0x7f0000000100)=0xc) setsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f0000000140)={r8, @remote, @loopback}, 0xc) ustat(0x0, 0x0) r9 = fcntl$getown(r5, 0x9) fcntl$lock(r4, 0x27, &(0x7f0000000280)={0x4, 0x3, 0x5ba, 0x3f, r9}) setsockopt$sock_timeval(r4, 0x1, 0x14, &(0x7f00000002c0)={0x77359400}, 0x8) setsockopt$EBT_SO_SET_COUNTERS(r4, 0x0, 0x81, &(0x7f00000004c0)=ANY=[@ANYBLOB="665e6c74657200000000000000001200000000000000000000000000000000000000000000000000000000000000000000080000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000000000002edb301e5d4bde4a0a56018d22677961b2adbd05f8aeadc8c18e9ebc", @ANYPTR=&(0x7f0000000240)=ANY=[@ANYBLOB="0000f56987245b0559197e371a59e28482730359bab9fa6a"], @ANYBLOB="00000000000000000000000000000000000000000000000000000000614400000000584380ed8eb71cee3dd5637827b6364017c0a938d4422708d587d5c7f04a76ec2050f57acf8b4d37123de2446ccc5baea2532544e2136373cd36fee8c88268350382c029a5d4954856f3d4a7b17751a9ed5159e9fde44bc629ca25bd3a4f79993cc4f44f0d729860f189660e871c816c5f9033b4e68eee9eb520419880"], 0x70) ioctl$FICLONE(r1, 0x40049409, r5) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(r2, 0xc0305602, &(0x7f0000000040)={0x0, 0x3, 0x2024, 0x1}) preadv(r0, &(0x7f0000000140)=[{&(0x7f0000000080)=""/163, 0xa3}], 0x1, 0x0) 22:42:44 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x7fffdf00f000, 0xa, 0x13012, r1, 0x0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x4042, 0x0) r3 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2a, 0x0, 0x8, 0x1f, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) shmget$private(0x0, 0x2000, 0x20, &(0x7f0000ffe000/0x2000)=nil) fcntl$F_GET_FILE_RW_HINT(r3, 0x40d, &(0x7f0000000080)) r4 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x80000, 0x0) fsetxattr$security_smack_entry(r3, &(0x7f0000000000)='security.SMACK64IPOUT\x00', &(0x7f0000000040)='[\x00', 0x2, 0x3) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r5, 0x0, 0x482, &(0x7f0000000300)={0x100000011, @multicast2, 0x11, 0x11000000, 'lblc\x00'}, 0x2c) r6 = socket(0xa, 0x4000000001, 0x0) setsockopt$IP_VS_SO_SET_ADD(r6, 0x0, 0x482, &(0x7f0000000000)={0x11, @rand_addr, 0x0, 0x0, 'lblcr\x00'}, 0x2c) getsockopt$inet_pktinfo(r4, 0x0, 0x8, &(0x7f0000001580)={0x0, @dev, @broadcast}, &(0x7f00000015c0)=0xc) setsockopt$inet_pktinfo(r4, 0x0, 0x8, &(0x7f0000000300)={r7, @loopback, @remote}, 0xc) getsockopt$inet_pktinfo(r4, 0x0, 0x8, &(0x7f00000000c0)={0x0, @remote, @empty}, &(0x7f0000000100)=0xc) setsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f0000000140)={r8, @remote, @loopback}, 0xc) ustat(0x0, 0x0) r9 = fcntl$getown(r5, 0x9) fcntl$lock(r4, 0x27, &(0x7f0000000280)={0x4, 0x3, 0x5ba, 0x3f, r9}) setsockopt$sock_timeval(r4, 0x1, 0x14, &(0x7f00000002c0)={0x77359400}, 0x8) setsockopt$EBT_SO_SET_COUNTERS(r4, 0x0, 0x81, &(0x7f00000004c0)=ANY=[@ANYBLOB="665e6c74657200000000000000001200000000000000000000000000000000000000000000000000000000000000000000080000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000000000002edb301e5d4bde4a0a56018d22677961b2adbd05f8aeadc8c18e9ebc", @ANYPTR=&(0x7f0000000240)=ANY=[@ANYBLOB="0000f56987245b0559197e371a59e28482730359bab9fa6a"], @ANYBLOB="00000000000000000000000000000000000000000000000000000000614400000000584380ed8eb71cee3dd5637827b6364017c0a938d4422708d587d5c7f04a76ec2050f57acf8b4d37123de2446ccc5baea2532544e2136373cd36fee8c88268350382c029a5d4954856f3d4a7b17751a9ed5159e9fde44bc629ca25bd3a4f79993cc4f44f0d729860f189660e871c816c5f9033b4e68eee9eb520419880"], 0x70) ioctl$FICLONE(r1, 0x40049409, r5) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(r2, 0xc0305602, &(0x7f0000000040)={0x0, 0x3, 0x2024, 0x1}) preadv(r0, &(0x7f0000000140)=[{&(0x7f0000000080)=""/163, 0xa3}], 0x1, 0x0) 22:42:44 executing program 4: semop(0x0, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_pts(r0, 0x0) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) ioctl$TCSETA(r1, 0x5406, &(0x7f00000000c0)={0xfffffffffffffffd, 0x0, 0x0, 0x100000009b4b62e, 0x2, 0x0, 0x0, 0x40, 0x0, 0x4}) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)={0x17, 0x5b03}) time(&(0x7f0000000440)) r2 = socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f0000000680)={0xfffffffffffffffd, 0x70, 0x3, 0x0, 0x9, 0x0, 0x0, 0x2, 0x4804, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, @perf_bp, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$vcsn(&(0x7f0000000140)='/dev/vcs#\x00', 0x3, 0x0) accept(r2, &(0x7f0000000a40)=@caif=@dgm, &(0x7f00000002c0)=0x80) r4 = syz_open_dev$vcsa(&(0x7f00000004c0)='/dev/vcsa#\x00', 0x6, 0x8000) ioctl$sock_inet_tcp_SIOCATMARK(r4, 0x40247007, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000640)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r5}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, 0x7, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x10000, 0x0, 0x69435c71, 0x4000000000000000, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x48}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000400)='mountinfo\x00') ioctl$TIOCGETD(r6, 0x5424, &(0x7f0000000580)) set_thread_area(&(0x7f0000000340)={0x6, 0x20001800, 0x4000, 0x200, 0x10000000000ffff, 0x8000000000000001, 0x4000000080101, 0x2, 0xffffffff, 0x3}) rename(&(0x7f00000003c0)='./file0\x00', &(0x7f00000005c0)='./file0\x00') write$FUSE_NOTIFY_STORE(r3, &(0x7f0000000480)=ANY=[@ANYBLOB="0a0000e7f0511f0000000000000000000100000000000000be00000000000000fcfe0000000000000000"], 0x2a) mount(&(0x7f0000000c00)=ANY=[@ANYPTR64=&(0x7f0000000ac0)=ANY=[@ANYBLOB="f4d1784996c194946d4861257209c91bd8eeff1ffb27923b781eb47f4071d175679f2ec75e005193da3f58fa5d6f25b06d", @ANYPTR]], 0x0, 0x0, 0x801010, 0x0) mount(&(0x7f00000008c0)=ANY=[@ANYBLOB='/d%v/md0\x00'], 0x0, 0x0, 0x2000023, 0x0) mount(&(0x7f0000000940)=ANY=[@ANYBLOB="969957b52d30fea3a6945a209691fd3e214cb9dcc33db7762efad2628dcef5d3b6364e061019df973b2f53d859e769464fe2a2410d59da45d13169add1c55847f5c9f3efe3c9b2e151b4c4a2bdac535d60eb398d4d6952a19e3d52a29749828eb1d6ff4558ca709d9c13c28a2da129717e838eb618c9886828e09a944bc03f33827c69c3fbb70d4b5fba995326c48cedf607660f2b85e3cd0d67bc0cccd8dfba547fe5e36524ef742126514000d7cf7126e2536307a8290af7f78189fa963bfaf8cf0dee8d84a76599366358414b18f32d01f7a3d0b4802a4d7000"/229], 0x0, 0x0, 0x80010, 0x0) mount(&(0x7f0000000700)=ANY=[@ANYBLOB="3040abf7d58436d7496072d88d9f01000000f65251c2210ce6c3275cf63ee466a17abdb3f6b1325bbc9556b9ba20d4df40a9db69d15d3308712819f3cff27695155ef2b719bc4fcb5d38c46f71f14089eea8a3bb9dfa1e774fccee35dc618d63aa608e8d3f0421aabde758c08399866dd6f0c9c72140b2f6694a000000000000000000ade5b6bfd9af5cea1ab63390b1cae4e7b5b56697dd414840056f00c68acc071050d5d498d1a8f0f4c385a517a32f77336ef24e76de96a78d048747d2d3927b57511732b048ee3744eb86af3897ab9d0c"], 0x0, 0x0, 0x80000, 0x0) r7 = dup2(r4, r0) ioctl$TCSBRKP(r1, 0x5425, 0x3) write$FUSE_OPEN(r7, &(0x7f0000000380)={0x20, 0x0, 0x8, {0x0, 0x1}}, 0x20) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount(&(0x7f0000000500)=ANY=[], &(0x7f0000000540)='./file0\x00', &(0x7f0000000800)='devtmpfs\x00', 0x847, &(0x7f0000000780)) 22:42:44 executing program 0: semop(0x0, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_pts(r0, 0x0) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) ioctl$TCSETA(r1, 0x5406, &(0x7f00000000c0)={0xfffffffffffffffd, 0x0, 0x0, 0x100000009b4b62e, 0x2, 0x0, 0x0, 0x40, 0x0, 0x4}) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)={0x17, 0x5b03}) time(&(0x7f0000000440)) r2 = socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f0000000680)={0xfffffffffffffffd, 0x70, 0x3, 0x0, 0x9, 0x0, 0x0, 0x2, 0x4804, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, @perf_bp, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$vcsn(&(0x7f0000000140)='/dev/vcs#\x00', 0x3, 0x0) accept(r2, &(0x7f0000000a40)=@caif=@dgm, &(0x7f00000002c0)=0x80) r4 = syz_open_dev$vcsa(&(0x7f00000004c0)='/dev/vcsa#\x00', 0x6, 0x8000) ioctl$sock_inet_tcp_SIOCATMARK(r4, 0x40247007, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000640)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r5}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, 0x7, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x10000, 0x0, 0x69435c71, 0x4000000000000000, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x48}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000400)='mountinfo\x00') ioctl$TIOCGETD(r6, 0x5424, &(0x7f0000000580)) set_thread_area(&(0x7f0000000340)={0x6, 0x20001800, 0x4000, 0x200, 0x10000000000ffff, 0x8000000000000001, 0x4000000080101, 0x2, 0xffffffff, 0x3}) rename(&(0x7f00000003c0)='./file0\x00', &(0x7f00000005c0)='./file0\x00') write$FUSE_NOTIFY_STORE(r3, &(0x7f0000000480)=ANY=[@ANYBLOB="0a0000e7f0511f0000000000000000000100000000000000be00000000000000fcfe0000000000000000"], 0x2a) mount(&(0x7f0000000c00)=ANY=[@ANYPTR64=&(0x7f0000000ac0)=ANY=[@ANYBLOB="f4d1784996c194946d4861257209c91bd8eeff1ffb27923b781eb47f4071d175679f2ec75e005193da3f58fa5d6f25b06d", @ANYPTR]], 0x0, 0x0, 0x801010, 0x0) mount(&(0x7f00000008c0)=ANY=[@ANYBLOB='/d%v/md0\x00'], 0x0, 0x0, 0x2000023, 0x0) mount(&(0x7f0000000940)=ANY=[@ANYBLOB="969957b52d30fea3a6945a209691fd3e214cb9dcc33db7762efad2628dcef5d3b6364e061019df973b2f53d859e769464fe2a2410d59da45d13169add1c55847f5c9f3efe3c9b2e151b4c4a2bdac535d60eb398d4d6952a19e3d52a29749828eb1d6ff4558ca709d9c13c28a2da129717e838eb618c9886828e09a944bc03f33827c69c3fbb70d4b5fba995326c48cedf607660f2b85e3cd0d67bc0cccd8dfba547fe5e36524ef742126514000d7cf7126e2536307a8290af7f78189fa963bfaf8cf0dee8d84a76599366358414b18f32d01f7a3d0b4802a4d7000"/229], 0x0, 0x0, 0x80010, 0x0) mount(&(0x7f0000000700)=ANY=[@ANYBLOB="3040abf7d58436d7496072d88d9f01000000f65251c2210ce6c3275cf63ee466a17abdb3f6b1325bbc9556b9ba20d4df40a9db69d15d3308712819f3cff27695155ef2b719bc4fcb5d38c46f71f14089eea8a3bb9dfa1e774fccee35dc618d63aa608e8d3f0421aabde758c08399866dd6f0c9c72140b2f6694a000000000000000000ade5b6bfd9af5cea1ab63390b1cae4e7b5b56697dd414840056f00c68acc071050d5d498d1a8f0f4c385a517a32f77336ef24e76de96a78d048747d2d3927b57511732b048ee3744eb86af3897ab9d0c"], 0x0, 0x0, 0x80000, 0x0) r7 = dup2(r4, r0) ioctl$TCSBRKP(r1, 0x5425, 0x3) write$FUSE_OPEN(r7, &(0x7f0000000380)={0x20, 0x0, 0x8, {0x0, 0x1}}, 0x20) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount(&(0x7f0000000500)=ANY=[], &(0x7f0000000540)='./file0\x00', &(0x7f0000000800)='devtmpfs\x00', 0x847, &(0x7f0000000780)) 22:42:44 executing program 1: semop(0x0, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_pts(r0, 0x0) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) ioctl$TCSETA(r1, 0x5406, &(0x7f00000000c0)={0xfffffffffffffffd, 0x0, 0x0, 0x100000009b4b62e, 0x2, 0x0, 0x0, 0x40, 0x0, 0x4}) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)={0x17, 0x5b03}) time(&(0x7f0000000440)) r2 = socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f0000000680)={0xfffffffffffffffd, 0x70, 0x3, 0x0, 0x9, 0x0, 0x0, 0x2, 0x4804, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, @perf_bp, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$vcsn(&(0x7f0000000140)='/dev/vcs#\x00', 0x3, 0x0) accept(r2, &(0x7f0000000a40)=@caif=@dgm, &(0x7f00000002c0)=0x80) r4 = syz_open_dev$vcsa(&(0x7f00000004c0)='/dev/vcsa#\x00', 0x6, 0x8000) ioctl$sock_inet_tcp_SIOCATMARK(r4, 0x40247007, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000640)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r5}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, 0x7, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x10000, 0x0, 0x69435c71, 0x4000000000000000, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x48}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000400)='mountinfo\x00') ioctl$TIOCGETD(r6, 0x5424, &(0x7f0000000580)) set_thread_area(&(0x7f0000000340)={0x6, 0x20001800, 0x4000, 0x200, 0x10000000000ffff, 0x8000000000000001, 0x4000000080101, 0x2, 0xffffffff, 0x3}) rename(&(0x7f00000003c0)='./file0\x00', &(0x7f00000005c0)='./file0\x00') write$FUSE_NOTIFY_STORE(r3, &(0x7f0000000480)=ANY=[@ANYBLOB="0a0000e7f0511f0000000000000000000100000000000000be00000000000000fcfe0000000000000000"], 0x2a) mount(&(0x7f0000000c00)=ANY=[@ANYPTR64=&(0x7f0000000ac0)=ANY=[@ANYBLOB="f4d1784996c194946d4861257209c91bd8eeff1ffb27923b781eb47f4071d175679f2ec75e005193da3f58fa5d6f25b06d", @ANYPTR]], 0x0, 0x0, 0x801010, 0x0) mount(&(0x7f00000008c0)=ANY=[@ANYBLOB='/d%v/md0\x00'], 0x0, 0x0, 0x2000023, 0x0) mount(&(0x7f0000000940)=ANY=[@ANYBLOB="969957b52d30fea3a6945a209691fd3e214cb9dcc33db7762efad2628dcef5d3b6364e061019df973b2f53d859e769464fe2a2410d59da45d13169add1c55847f5c9f3efe3c9b2e151b4c4a2bdac535d60eb398d4d6952a19e3d52a29749828eb1d6ff4558ca709d9c13c28a2da129717e838eb618c9886828e09a944bc03f33827c69c3fbb70d4b5fba995326c48cedf607660f2b85e3cd0d67bc0cccd8dfba547fe5e36524ef742126514000d7cf7126e2536307a8290af7f78189fa963bfaf8cf0dee8d84a76599366358414b18f32d01f7a3d0b4802a4d7000"/229], 0x0, 0x0, 0x80010, 0x0) mount(&(0x7f0000000700)=ANY=[@ANYBLOB="3040abf7d58436d7496072d88d9f01000000f65251c2210ce6c3275cf63ee466a17abdb3f6b1325bbc9556b9ba20d4df40a9db69d15d3308712819f3cff27695155ef2b719bc4fcb5d38c46f71f14089eea8a3bb9dfa1e774fccee35dc618d63aa608e8d3f0421aabde758c08399866dd6f0c9c72140b2f6694a000000000000000000ade5b6bfd9af5cea1ab63390b1cae4e7b5b56697dd414840056f00c68acc071050d5d498d1a8f0f4c385a517a32f77336ef24e76de96a78d048747d2d3927b57511732b048ee3744eb86af3897ab9d0c"], 0x0, 0x0, 0x80000, 0x0) r7 = dup2(r4, r0) ioctl$TCSBRKP(r1, 0x5425, 0x3) write$FUSE_OPEN(r7, &(0x7f0000000380)={0x20, 0x0, 0x8, {0x0, 0x1}}, 0x20) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount(&(0x7f0000000500)=ANY=[], &(0x7f0000000540)='./file0\x00', &(0x7f0000000800)='devtmpfs\x00', 0x847, &(0x7f0000000780)) 22:42:44 executing program 5: semop(0x0, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_pts(r0, 0x0) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) ioctl$TCSETA(r1, 0x5406, &(0x7f00000000c0)={0xfffffffffffffffd, 0x0, 0x0, 0x100000009b4b62e, 0x2, 0x0, 0x0, 0x40, 0x0, 0x4}) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)={0x17, 0x5b03}) time(&(0x7f0000000440)) r2 = socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f0000000680)={0xfffffffffffffffd, 0x70, 0x3, 0x0, 0x9, 0x0, 0x0, 0x2, 0x4804, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, @perf_bp, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$vcsn(&(0x7f0000000140)='/dev/vcs#\x00', 0x3, 0x0) accept(r2, &(0x7f0000000a40)=@caif=@dgm, &(0x7f00000002c0)=0x80) r4 = syz_open_dev$vcsa(&(0x7f00000004c0)='/dev/vcsa#\x00', 0x6, 0x8000) ioctl$sock_inet_tcp_SIOCATMARK(r4, 0x40247007, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000640)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r5}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, 0x7, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x10000, 0x0, 0x69435c71, 0x4000000000000000, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x48}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000400)='mountinfo\x00') ioctl$TIOCGETD(r6, 0x5424, &(0x7f0000000580)) set_thread_area(&(0x7f0000000340)={0x6, 0x20001800, 0x4000, 0x200, 0x10000000000ffff, 0x8000000000000001, 0x4000000080101, 0x2, 0xffffffff, 0x3}) rename(&(0x7f00000003c0)='./file0\x00', &(0x7f00000005c0)='./file0\x00') write$FUSE_NOTIFY_STORE(r3, &(0x7f0000000480)=ANY=[@ANYBLOB="0a0000e7f0511f0000000000000000000100000000000000be00000000000000fcfe0000000000000000"], 0x2a) mount(&(0x7f0000000c00)=ANY=[@ANYPTR64=&(0x7f0000000ac0)=ANY=[@ANYBLOB="f4d1784996c194946d4861257209c91bd8eeff1ffb27923b781eb47f4071d175679f2ec75e005193da3f58fa5d6f25b06d", @ANYPTR]], 0x0, 0x0, 0x801010, 0x0) mount(&(0x7f00000008c0)=ANY=[@ANYBLOB='/d%v/md0\x00'], 0x0, 0x0, 0x2000023, 0x0) mount(&(0x7f0000000940)=ANY=[@ANYBLOB="969957b52d30fea3a6945a209691fd3e214cb9dcc33db7762efad2628dcef5d3b6364e061019df973b2f53d859e769464fe2a2410d59da45d13169add1c55847f5c9f3efe3c9b2e151b4c4a2bdac535d60eb398d4d6952a19e3d52a29749828eb1d6ff4558ca709d9c13c28a2da129717e838eb618c9886828e09a944bc03f33827c69c3fbb70d4b5fba995326c48cedf607660f2b85e3cd0d67bc0cccd8dfba547fe5e36524ef742126514000d7cf7126e2536307a8290af7f78189fa963bfaf8cf0dee8d84a76599366358414b18f32d01f7a3d0b4802a4d7000"/229], 0x0, 0x0, 0x80010, 0x0) mount(&(0x7f0000000700)=ANY=[@ANYBLOB="3040abf7d58436d7496072d88d9f01000000f65251c2210ce6c3275cf63ee466a17abdb3f6b1325bbc9556b9ba20d4df40a9db69d15d3308712819f3cff27695155ef2b719bc4fcb5d38c46f71f14089eea8a3bb9dfa1e774fccee35dc618d63aa608e8d3f0421aabde758c08399866dd6f0c9c72140b2f6694a000000000000000000ade5b6bfd9af5cea1ab63390b1cae4e7b5b56697dd414840056f00c68acc071050d5d498d1a8f0f4c385a517a32f77336ef24e76de96a78d048747d2d3927b57511732b048ee3744eb86af3897ab9d0c"], 0x0, 0x0, 0x80000, 0x0) r7 = dup2(r4, r0) ioctl$TCSBRKP(r1, 0x5425, 0x3) write$FUSE_OPEN(r7, &(0x7f0000000380)={0x20, 0x0, 0x8, {0x0, 0x1}}, 0x20) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount(&(0x7f0000000500)=ANY=[], &(0x7f0000000540)='./file0\x00', &(0x7f0000000800)='devtmpfs\x00', 0x847, &(0x7f0000000780)) 22:42:44 executing program 2: semop(0x0, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_pts(r0, 0x0) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) ioctl$TCSETA(r1, 0x5406, &(0x7f00000000c0)={0xfffffffffffffffd, 0x0, 0x0, 0x100000009b4b62e, 0x2, 0x0, 0x0, 0x40, 0x0, 0x4}) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)={0x17, 0x5b03}) time(&(0x7f0000000440)) r2 = socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f0000000680)={0xfffffffffffffffd, 0x70, 0x3, 0x0, 0x9, 0x0, 0x0, 0x2, 0x4804, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, @perf_bp, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$vcsn(&(0x7f0000000140)='/dev/vcs#\x00', 0x3, 0x0) accept(r2, &(0x7f0000000a40)=@caif=@dgm, &(0x7f00000002c0)=0x80) r4 = syz_open_dev$vcsa(&(0x7f00000004c0)='/dev/vcsa#\x00', 0x6, 0x8000) ioctl$sock_inet_tcp_SIOCATMARK(r4, 0x40247007, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000640)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r5}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, 0x7, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x10000, 0x0, 0x69435c71, 0x4000000000000000, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x48}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000400)='mountinfo\x00') ioctl$TIOCGETD(r6, 0x5424, &(0x7f0000000580)) set_thread_area(&(0x7f0000000340)={0x6, 0x20001800, 0x4000, 0x200, 0x10000000000ffff, 0x8000000000000001, 0x4000000080101, 0x2, 0xffffffff, 0x3}) rename(&(0x7f00000003c0)='./file0\x00', &(0x7f00000005c0)='./file0\x00') write$FUSE_NOTIFY_STORE(r3, &(0x7f0000000480)=ANY=[@ANYBLOB="0a0000e7f0511f0000000000000000000100000000000000be00000000000000fcfe0000000000000000"], 0x2a) mount(&(0x7f0000000c00)=ANY=[@ANYPTR64=&(0x7f0000000ac0)=ANY=[@ANYBLOB="f4d1784996c194946d4861257209c91bd8eeff1ffb27923b781eb47f4071d175679f2ec75e005193da3f58fa5d6f25b06d", @ANYPTR]], 0x0, 0x0, 0x801010, 0x0) mount(&(0x7f00000008c0)=ANY=[@ANYBLOB='/d%v/md0\x00'], 0x0, 0x0, 0x2000023, 0x0) mount(&(0x7f0000000940)=ANY=[@ANYBLOB="969957b52d30fea3a6945a209691fd3e214cb9dcc33db7762efad2628dcef5d3b6364e061019df973b2f53d859e769464fe2a2410d59da45d13169add1c55847f5c9f3efe3c9b2e151b4c4a2bdac535d60eb398d4d6952a19e3d52a29749828eb1d6ff4558ca709d9c13c28a2da129717e838eb618c9886828e09a944bc03f33827c69c3fbb70d4b5fba995326c48cedf607660f2b85e3cd0d67bc0cccd8dfba547fe5e36524ef742126514000d7cf7126e2536307a8290af7f78189fa963bfaf8cf0dee8d84a76599366358414b18f32d01f7a3d0b4802a4d7000"/229], 0x0, 0x0, 0x80010, 0x0) mount(&(0x7f0000000700)=ANY=[@ANYBLOB="3040abf7d58436d7496072d88d9f01000000f65251c2210ce6c3275cf63ee466a17abdb3f6b1325bbc9556b9ba20d4df40a9db69d15d3308712819f3cff27695155ef2b719bc4fcb5d38c46f71f14089eea8a3bb9dfa1e774fccee35dc618d63aa608e8d3f0421aabde758c08399866dd6f0c9c72140b2f6694a000000000000000000ade5b6bfd9af5cea1ab63390b1cae4e7b5b56697dd414840056f00c68acc071050d5d498d1a8f0f4c385a517a32f77336ef24e76de96a78d048747d2d3927b57511732b048ee3744eb86af3897ab9d0c"], 0x0, 0x0, 0x80000, 0x0) r7 = dup2(r4, r0) ioctl$TCSBRKP(r1, 0x5425, 0x3) write$FUSE_OPEN(r7, &(0x7f0000000380)={0x20, 0x0, 0x8, {0x0, 0x1}}, 0x20) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount(&(0x7f0000000500)=ANY=[], &(0x7f0000000540)='./file0\x00', &(0x7f0000000800)='devtmpfs\x00', 0x847, &(0x7f0000000780)) 22:42:44 executing program 4: semop(0x0, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_pts(r0, 0x0) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) ioctl$TCSETA(r1, 0x5406, &(0x7f00000000c0)={0xfffffffffffffffd, 0x0, 0x0, 0x100000009b4b62e, 0x2, 0x0, 0x0, 0x40, 0x0, 0x4}) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)={0x17, 0x5b03}) time(&(0x7f0000000440)) r2 = socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f0000000680)={0xfffffffffffffffd, 0x70, 0x3, 0x0, 0x9, 0x0, 0x0, 0x2, 0x4804, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, @perf_bp, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$vcsn(&(0x7f0000000140)='/dev/vcs#\x00', 0x3, 0x0) accept(r2, &(0x7f0000000a40)=@caif=@dgm, &(0x7f00000002c0)=0x80) r4 = syz_open_dev$vcsa(&(0x7f00000004c0)='/dev/vcsa#\x00', 0x6, 0x8000) ioctl$sock_inet_tcp_SIOCATMARK(r4, 0x40247007, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000640)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r5}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, 0x7, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x10000, 0x0, 0x69435c71, 0x4000000000000000, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x48}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000400)='mountinfo\x00') ioctl$TIOCGETD(r6, 0x5424, &(0x7f0000000580)) set_thread_area(&(0x7f0000000340)={0x6, 0x20001800, 0x4000, 0x200, 0x10000000000ffff, 0x8000000000000001, 0x4000000080101, 0x2, 0xffffffff, 0x3}) rename(&(0x7f00000003c0)='./file0\x00', &(0x7f00000005c0)='./file0\x00') write$FUSE_NOTIFY_STORE(r3, &(0x7f0000000480)=ANY=[@ANYBLOB="0a0000e7f0511f0000000000000000000100000000000000be00000000000000fcfe0000000000000000"], 0x2a) mount(&(0x7f0000000c00)=ANY=[@ANYPTR64=&(0x7f0000000ac0)=ANY=[@ANYBLOB="f4d1784996c194946d4861257209c91bd8eeff1ffb27923b781eb47f4071d175679f2ec75e005193da3f58fa5d6f25b06d", @ANYPTR]], 0x0, 0x0, 0x801010, 0x0) mount(&(0x7f00000008c0)=ANY=[@ANYBLOB='/d%v/md0\x00'], 0x0, 0x0, 0x2000023, 0x0) mount(&(0x7f0000000940)=ANY=[@ANYBLOB="969957b52d30fea3a6945a209691fd3e214cb9dcc33db7762efad2628dcef5d3b6364e061019df973b2f53d859e769464fe2a2410d59da45d13169add1c55847f5c9f3efe3c9b2e151b4c4a2bdac535d60eb398d4d6952a19e3d52a29749828eb1d6ff4558ca709d9c13c28a2da129717e838eb618c9886828e09a944bc03f33827c69c3fbb70d4b5fba995326c48cedf607660f2b85e3cd0d67bc0cccd8dfba547fe5e36524ef742126514000d7cf7126e2536307a8290af7f78189fa963bfaf8cf0dee8d84a76599366358414b18f32d01f7a3d0b4802a4d7000"/229], 0x0, 0x0, 0x80010, 0x0) mount(&(0x7f0000000700)=ANY=[@ANYBLOB="3040abf7d58436d7496072d88d9f01000000f65251c2210ce6c3275cf63ee466a17abdb3f6b1325bbc9556b9ba20d4df40a9db69d15d3308712819f3cff27695155ef2b719bc4fcb5d38c46f71f14089eea8a3bb9dfa1e774fccee35dc618d63aa608e8d3f0421aabde758c08399866dd6f0c9c72140b2f6694a000000000000000000ade5b6bfd9af5cea1ab63390b1cae4e7b5b56697dd414840056f00c68acc071050d5d498d1a8f0f4c385a517a32f77336ef24e76de96a78d048747d2d3927b57511732b048ee3744eb86af3897ab9d0c"], 0x0, 0x0, 0x80000, 0x0) r7 = dup2(r4, r0) ioctl$TCSBRKP(r1, 0x5425, 0x3) write$FUSE_OPEN(r7, &(0x7f0000000380)={0x20, 0x0, 0x8, {0x0, 0x1}}, 0x20) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount(&(0x7f0000000500)=ANY=[], &(0x7f0000000540)='./file0\x00', &(0x7f0000000800)='devtmpfs\x00', 0x847, &(0x7f0000000780)) 22:42:44 executing program 0: semop(0x0, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_pts(r0, 0x0) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) ioctl$TCSETA(r1, 0x5406, &(0x7f00000000c0)={0xfffffffffffffffd, 0x0, 0x0, 0x100000009b4b62e, 0x2, 0x0, 0x0, 0x40, 0x0, 0x4}) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)={0x17, 0x5b03}) time(&(0x7f0000000440)) r2 = socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f0000000680)={0xfffffffffffffffd, 0x70, 0x3, 0x0, 0x9, 0x0, 0x0, 0x2, 0x4804, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, @perf_bp, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$vcsn(&(0x7f0000000140)='/dev/vcs#\x00', 0x3, 0x0) accept(r2, &(0x7f0000000a40)=@caif=@dgm, &(0x7f00000002c0)=0x80) r4 = syz_open_dev$vcsa(&(0x7f00000004c0)='/dev/vcsa#\x00', 0x6, 0x8000) ioctl$sock_inet_tcp_SIOCATMARK(r4, 0x40247007, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000640)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r5}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, 0x7, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x10000, 0x0, 0x69435c71, 0x4000000000000000, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x48}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000400)='mountinfo\x00') ioctl$TIOCGETD(r6, 0x5424, &(0x7f0000000580)) set_thread_area(&(0x7f0000000340)={0x6, 0x20001800, 0x4000, 0x200, 0x10000000000ffff, 0x8000000000000001, 0x4000000080101, 0x2, 0xffffffff, 0x3}) rename(&(0x7f00000003c0)='./file0\x00', &(0x7f00000005c0)='./file0\x00') write$FUSE_NOTIFY_STORE(r3, &(0x7f0000000480)=ANY=[@ANYBLOB="0a0000e7f0511f0000000000000000000100000000000000be00000000000000fcfe0000000000000000"], 0x2a) mount(&(0x7f0000000c00)=ANY=[@ANYPTR64=&(0x7f0000000ac0)=ANY=[@ANYBLOB="f4d1784996c194946d4861257209c91bd8eeff1ffb27923b781eb47f4071d175679f2ec75e005193da3f58fa5d6f25b06d", @ANYPTR]], 0x0, 0x0, 0x801010, 0x0) mount(&(0x7f00000008c0)=ANY=[@ANYBLOB='/d%v/md0\x00'], 0x0, 0x0, 0x2000023, 0x0) mount(&(0x7f0000000940)=ANY=[@ANYBLOB="969957b52d30fea3a6945a209691fd3e214cb9dcc33db7762efad2628dcef5d3b6364e061019df973b2f53d859e769464fe2a2410d59da45d13169add1c55847f5c9f3efe3c9b2e151b4c4a2bdac535d60eb398d4d6952a19e3d52a29749828eb1d6ff4558ca709d9c13c28a2da129717e838eb618c9886828e09a944bc03f33827c69c3fbb70d4b5fba995326c48cedf607660f2b85e3cd0d67bc0cccd8dfba547fe5e36524ef742126514000d7cf7126e2536307a8290af7f78189fa963bfaf8cf0dee8d84a76599366358414b18f32d01f7a3d0b4802a4d7000"/229], 0x0, 0x0, 0x80010, 0x0) mount(&(0x7f0000000700)=ANY=[@ANYBLOB="3040abf7d58436d7496072d88d9f01000000f65251c2210ce6c3275cf63ee466a17abdb3f6b1325bbc9556b9ba20d4df40a9db69d15d3308712819f3cff27695155ef2b719bc4fcb5d38c46f71f14089eea8a3bb9dfa1e774fccee35dc618d63aa608e8d3f0421aabde758c08399866dd6f0c9c72140b2f6694a000000000000000000ade5b6bfd9af5cea1ab63390b1cae4e7b5b56697dd414840056f00c68acc071050d5d498d1a8f0f4c385a517a32f77336ef24e76de96a78d048747d2d3927b57511732b048ee3744eb86af3897ab9d0c"], 0x0, 0x0, 0x80000, 0x0) r7 = dup2(r4, r0) ioctl$TCSBRKP(r1, 0x5425, 0x3) write$FUSE_OPEN(r7, &(0x7f0000000380)={0x20, 0x0, 0x8, {0x0, 0x1}}, 0x20) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount(&(0x7f0000000500)=ANY=[], &(0x7f0000000540)='./file0\x00', &(0x7f0000000800)='devtmpfs\x00', 0x847, &(0x7f0000000780)) 22:42:44 executing program 5: semop(0x0, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_pts(r0, 0x0) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) ioctl$TCSETA(r1, 0x5406, &(0x7f00000000c0)={0xfffffffffffffffd, 0x0, 0x0, 0x100000009b4b62e, 0x2, 0x0, 0x0, 0x40, 0x0, 0x4}) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)={0x17, 0x5b03}) time(&(0x7f0000000440)) r2 = socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f0000000680)={0xfffffffffffffffd, 0x70, 0x3, 0x0, 0x9, 0x0, 0x0, 0x2, 0x4804, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, @perf_bp, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$vcsn(&(0x7f0000000140)='/dev/vcs#\x00', 0x3, 0x0) accept(r2, &(0x7f0000000a40)=@caif=@dgm, &(0x7f00000002c0)=0x80) r4 = syz_open_dev$vcsa(&(0x7f00000004c0)='/dev/vcsa#\x00', 0x6, 0x8000) ioctl$sock_inet_tcp_SIOCATMARK(r4, 0x40247007, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000640)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r5}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, 0x7, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x10000, 0x0, 0x69435c71, 0x4000000000000000, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x48}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000400)='mountinfo\x00') ioctl$TIOCGETD(r6, 0x5424, &(0x7f0000000580)) set_thread_area(&(0x7f0000000340)={0x6, 0x20001800, 0x4000, 0x200, 0x10000000000ffff, 0x8000000000000001, 0x4000000080101, 0x2, 0xffffffff, 0x3}) rename(&(0x7f00000003c0)='./file0\x00', &(0x7f00000005c0)='./file0\x00') write$FUSE_NOTIFY_STORE(r3, &(0x7f0000000480)=ANY=[@ANYBLOB="0a0000e7f0511f0000000000000000000100000000000000be00000000000000fcfe0000000000000000"], 0x2a) mount(&(0x7f0000000c00)=ANY=[@ANYPTR64=&(0x7f0000000ac0)=ANY=[@ANYBLOB="f4d1784996c194946d4861257209c91bd8eeff1ffb27923b781eb47f4071d175679f2ec75e005193da3f58fa5d6f25b06d", @ANYPTR]], 0x0, 0x0, 0x801010, 0x0) mount(&(0x7f00000008c0)=ANY=[@ANYBLOB='/d%v/md0\x00'], 0x0, 0x0, 0x2000023, 0x0) mount(&(0x7f0000000940)=ANY=[@ANYBLOB="969957b52d30fea3a6945a209691fd3e214cb9dcc33db7762efad2628dcef5d3b6364e061019df973b2f53d859e769464fe2a2410d59da45d13169add1c55847f5c9f3efe3c9b2e151b4c4a2bdac535d60eb398d4d6952a19e3d52a29749828eb1d6ff4558ca709d9c13c28a2da129717e838eb618c9886828e09a944bc03f33827c69c3fbb70d4b5fba995326c48cedf607660f2b85e3cd0d67bc0cccd8dfba547fe5e36524ef742126514000d7cf7126e2536307a8290af7f78189fa963bfaf8cf0dee8d84a76599366358414b18f32d01f7a3d0b4802a4d7000"/229], 0x0, 0x0, 0x80010, 0x0) mount(&(0x7f0000000700)=ANY=[@ANYBLOB="3040abf7d58436d7496072d88d9f01000000f65251c2210ce6c3275cf63ee466a17abdb3f6b1325bbc9556b9ba20d4df40a9db69d15d3308712819f3cff27695155ef2b719bc4fcb5d38c46f71f14089eea8a3bb9dfa1e774fccee35dc618d63aa608e8d3f0421aabde758c08399866dd6f0c9c72140b2f6694a000000000000000000ade5b6bfd9af5cea1ab63390b1cae4e7b5b56697dd414840056f00c68acc071050d5d498d1a8f0f4c385a517a32f77336ef24e76de96a78d048747d2d3927b57511732b048ee3744eb86af3897ab9d0c"], 0x0, 0x0, 0x80000, 0x0) r7 = dup2(r4, r0) ioctl$TCSBRKP(r1, 0x5425, 0x3) write$FUSE_OPEN(r7, &(0x7f0000000380)={0x20, 0x0, 0x8, {0x0, 0x1}}, 0x20) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount(&(0x7f0000000500)=ANY=[], &(0x7f0000000540)='./file0\x00', &(0x7f0000000800)='devtmpfs\x00', 0x847, &(0x7f0000000780)) [ 348.123283] net_ratelimit: 14 callbacks suppressed [ 348.123291] protocol 88fb is buggy, dev hsr_slave_0 [ 348.133491] protocol 88fb is buggy, dev hsr_slave_1 [ 348.603291] protocol 88fb is buggy, dev hsr_slave_0 [ 348.608409] protocol 88fb is buggy, dev hsr_slave_1 [ 348.763264] protocol 88fb is buggy, dev hsr_slave_0 [ 348.768470] protocol 88fb is buggy, dev hsr_slave_1 [ 348.923274] protocol 88fb is buggy, dev hsr_slave_0 [ 348.928384] protocol 88fb is buggy, dev hsr_slave_1 22:42:47 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000040)=0x480100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() r2 = fcntl$dupfd(r0, 0x0, r0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f00000000c0)={@loopback, 0x0, 0x1, 0x0, 0x5}, 0x20) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x10010000000035) getsockopt$IP_VS_SO_GET_TIMEOUT(r0, 0x0, 0x486, &(0x7f0000000140), &(0x7f0000000180)=0xc) 22:42:47 executing program 1: semop(0x0, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_pts(r0, 0x0) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) ioctl$TCSETA(r1, 0x5406, &(0x7f00000000c0)={0xfffffffffffffffd, 0x0, 0x0, 0x100000009b4b62e, 0x2, 0x0, 0x0, 0x40, 0x0, 0x4}) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)={0x17, 0x5b03}) time(&(0x7f0000000440)) r2 = socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f0000000680)={0xfffffffffffffffd, 0x70, 0x3, 0x0, 0x9, 0x0, 0x0, 0x2, 0x4804, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, @perf_bp, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$vcsn(&(0x7f0000000140)='/dev/vcs#\x00', 0x3, 0x0) accept(r2, &(0x7f0000000a40)=@caif=@dgm, &(0x7f00000002c0)=0x80) r4 = syz_open_dev$vcsa(&(0x7f00000004c0)='/dev/vcsa#\x00', 0x6, 0x8000) ioctl$sock_inet_tcp_SIOCATMARK(r4, 0x40247007, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000640)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r5}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, 0x7, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x10000, 0x0, 0x69435c71, 0x4000000000000000, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x48}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000400)='mountinfo\x00') ioctl$TIOCGETD(r6, 0x5424, &(0x7f0000000580)) set_thread_area(&(0x7f0000000340)={0x6, 0x20001800, 0x4000, 0x200, 0x10000000000ffff, 0x8000000000000001, 0x4000000080101, 0x2, 0xffffffff, 0x3}) rename(&(0x7f00000003c0)='./file0\x00', &(0x7f00000005c0)='./file0\x00') write$FUSE_NOTIFY_STORE(r3, &(0x7f0000000480)=ANY=[@ANYBLOB="0a0000e7f0511f0000000000000000000100000000000000be00000000000000fcfe0000000000000000"], 0x2a) mount(&(0x7f0000000c00)=ANY=[@ANYPTR64=&(0x7f0000000ac0)=ANY=[@ANYBLOB="f4d1784996c194946d4861257209c91bd8eeff1ffb27923b781eb47f4071d175679f2ec75e005193da3f58fa5d6f25b06d", @ANYPTR]], 0x0, 0x0, 0x801010, 0x0) mount(&(0x7f00000008c0)=ANY=[@ANYBLOB='/d%v/md0\x00'], 0x0, 0x0, 0x2000023, 0x0) mount(&(0x7f0000000940)=ANY=[@ANYBLOB="969957b52d30fea3a6945a209691fd3e214cb9dcc33db7762efad2628dcef5d3b6364e061019df973b2f53d859e769464fe2a2410d59da45d13169add1c55847f5c9f3efe3c9b2e151b4c4a2bdac535d60eb398d4d6952a19e3d52a29749828eb1d6ff4558ca709d9c13c28a2da129717e838eb618c9886828e09a944bc03f33827c69c3fbb70d4b5fba995326c48cedf607660f2b85e3cd0d67bc0cccd8dfba547fe5e36524ef742126514000d7cf7126e2536307a8290af7f78189fa963bfaf8cf0dee8d84a76599366358414b18f32d01f7a3d0b4802a4d7000"/229], 0x0, 0x0, 0x80010, 0x0) mount(&(0x7f0000000700)=ANY=[@ANYBLOB="3040abf7d58436d7496072d88d9f01000000f65251c2210ce6c3275cf63ee466a17abdb3f6b1325bbc9556b9ba20d4df40a9db69d15d3308712819f3cff27695155ef2b719bc4fcb5d38c46f71f14089eea8a3bb9dfa1e774fccee35dc618d63aa608e8d3f0421aabde758c08399866dd6f0c9c72140b2f6694a000000000000000000ade5b6bfd9af5cea1ab63390b1cae4e7b5b56697dd414840056f00c68acc071050d5d498d1a8f0f4c385a517a32f77336ef24e76de96a78d048747d2d3927b57511732b048ee3744eb86af3897ab9d0c"], 0x0, 0x0, 0x80000, 0x0) r7 = dup2(r4, r0) ioctl$TCSBRKP(r1, 0x5425, 0x3) write$FUSE_OPEN(r7, &(0x7f0000000380)={0x20, 0x0, 0x8, {0x0, 0x1}}, 0x20) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount(&(0x7f0000000500)=ANY=[], &(0x7f0000000540)='./file0\x00', &(0x7f0000000800)='devtmpfs\x00', 0x847, &(0x7f0000000780)) 22:42:47 executing program 2: semop(0x0, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_pts(r0, 0x0) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) ioctl$TCSETA(r1, 0x5406, &(0x7f00000000c0)={0xfffffffffffffffd, 0x0, 0x0, 0x100000009b4b62e, 0x2, 0x0, 0x0, 0x40, 0x0, 0x4}) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)={0x17, 0x5b03}) time(&(0x7f0000000440)) r2 = socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f0000000680)={0xfffffffffffffffd, 0x70, 0x3, 0x0, 0x9, 0x0, 0x0, 0x2, 0x4804, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, @perf_bp, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$vcsn(&(0x7f0000000140)='/dev/vcs#\x00', 0x3, 0x0) accept(r2, &(0x7f0000000a40)=@caif=@dgm, &(0x7f00000002c0)=0x80) r4 = syz_open_dev$vcsa(&(0x7f00000004c0)='/dev/vcsa#\x00', 0x6, 0x8000) ioctl$sock_inet_tcp_SIOCATMARK(r4, 0x40247007, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000640)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r5}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, 0x7, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x10000, 0x0, 0x69435c71, 0x4000000000000000, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x48}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000400)='mountinfo\x00') ioctl$TIOCGETD(r6, 0x5424, &(0x7f0000000580)) set_thread_area(&(0x7f0000000340)={0x6, 0x20001800, 0x4000, 0x200, 0x10000000000ffff, 0x8000000000000001, 0x4000000080101, 0x2, 0xffffffff, 0x3}) rename(&(0x7f00000003c0)='./file0\x00', &(0x7f00000005c0)='./file0\x00') write$FUSE_NOTIFY_STORE(r3, &(0x7f0000000480)=ANY=[@ANYBLOB="0a0000e7f0511f0000000000000000000100000000000000be00000000000000fcfe0000000000000000"], 0x2a) mount(&(0x7f0000000c00)=ANY=[@ANYPTR64=&(0x7f0000000ac0)=ANY=[@ANYBLOB="f4d1784996c194946d4861257209c91bd8eeff1ffb27923b781eb47f4071d175679f2ec75e005193da3f58fa5d6f25b06d", @ANYPTR]], 0x0, 0x0, 0x801010, 0x0) mount(&(0x7f00000008c0)=ANY=[@ANYBLOB='/d%v/md0\x00'], 0x0, 0x0, 0x2000023, 0x0) mount(&(0x7f0000000940)=ANY=[@ANYBLOB="969957b52d30fea3a6945a209691fd3e214cb9dcc33db7762efad2628dcef5d3b6364e061019df973b2f53d859e769464fe2a2410d59da45d13169add1c55847f5c9f3efe3c9b2e151b4c4a2bdac535d60eb398d4d6952a19e3d52a29749828eb1d6ff4558ca709d9c13c28a2da129717e838eb618c9886828e09a944bc03f33827c69c3fbb70d4b5fba995326c48cedf607660f2b85e3cd0d67bc0cccd8dfba547fe5e36524ef742126514000d7cf7126e2536307a8290af7f78189fa963bfaf8cf0dee8d84a76599366358414b18f32d01f7a3d0b4802a4d7000"/229], 0x0, 0x0, 0x80010, 0x0) mount(&(0x7f0000000700)=ANY=[@ANYBLOB="3040abf7d58436d7496072d88d9f01000000f65251c2210ce6c3275cf63ee466a17abdb3f6b1325bbc9556b9ba20d4df40a9db69d15d3308712819f3cff27695155ef2b719bc4fcb5d38c46f71f14089eea8a3bb9dfa1e774fccee35dc618d63aa608e8d3f0421aabde758c08399866dd6f0c9c72140b2f6694a000000000000000000ade5b6bfd9af5cea1ab63390b1cae4e7b5b56697dd414840056f00c68acc071050d5d498d1a8f0f4c385a517a32f77336ef24e76de96a78d048747d2d3927b57511732b048ee3744eb86af3897ab9d0c"], 0x0, 0x0, 0x80000, 0x0) r7 = dup2(r4, r0) ioctl$TCSBRKP(r1, 0x5425, 0x3) write$FUSE_OPEN(r7, &(0x7f0000000380)={0x20, 0x0, 0x8, {0x0, 0x1}}, 0x20) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount(&(0x7f0000000500)=ANY=[], &(0x7f0000000540)='./file0\x00', &(0x7f0000000800)='devtmpfs\x00', 0x847, &(0x7f0000000780)) 22:42:47 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x7fffdf00f000, 0xa, 0x13012, r1, 0x0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x4042, 0x0) r3 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2a, 0x0, 0x8, 0x1f, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) shmget$private(0x0, 0x2000, 0x20, &(0x7f0000ffe000/0x2000)=nil) fcntl$F_GET_FILE_RW_HINT(r3, 0x40d, &(0x7f0000000080)) r4 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x80000, 0x0) fsetxattr$security_smack_entry(r3, &(0x7f0000000000)='security.SMACK64IPOUT\x00', &(0x7f0000000040)='[\x00', 0x2, 0x3) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r5, 0x0, 0x482, &(0x7f0000000300)={0x100000011, @multicast2, 0x11, 0x11000000, 'lblc\x00'}, 0x2c) r6 = socket(0xa, 0x4000000001, 0x0) setsockopt$IP_VS_SO_SET_ADD(r6, 0x0, 0x482, &(0x7f0000000000)={0x11, @rand_addr, 0x0, 0x0, 'lblcr\x00'}, 0x2c) getsockopt$inet_pktinfo(r4, 0x0, 0x8, &(0x7f0000001580)={0x0, @dev, @broadcast}, &(0x7f00000015c0)=0xc) setsockopt$inet_pktinfo(r4, 0x0, 0x8, &(0x7f0000000300)={r7, @loopback, @remote}, 0xc) getsockopt$inet_pktinfo(r4, 0x0, 0x8, &(0x7f00000000c0)={0x0, @remote, @empty}, &(0x7f0000000100)=0xc) setsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f0000000140)={r8, @remote, @loopback}, 0xc) ustat(0x0, 0x0) r9 = fcntl$getown(r5, 0x9) fcntl$lock(r4, 0x27, &(0x7f0000000280)={0x4, 0x3, 0x5ba, 0x3f, r9}) setsockopt$sock_timeval(r4, 0x1, 0x14, &(0x7f00000002c0)={0x77359400}, 0x8) setsockopt$EBT_SO_SET_COUNTERS(r4, 0x0, 0x81, &(0x7f00000004c0)=ANY=[@ANYBLOB="665e6c74657200000000000000001200000000000000000000000000000000000000000000000000000000000000000000080000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000000000002edb301e5d4bde4a0a56018d22677961b2adbd05f8aeadc8c18e9ebc", @ANYPTR=&(0x7f0000000240)=ANY=[@ANYBLOB="0000f56987245b0559197e371a59e28482730359bab9fa6a"], @ANYBLOB="00000000000000000000000000000000000000000000000000000000614400000000584380ed8eb71cee3dd5637827b6364017c0a938d4422708d587d5c7f04a76ec2050f57acf8b4d37123de2446ccc5baea2532544e2136373cd36fee8c88268350382c029a5d4954856f3d4a7b17751a9ed5159e9fde44bc629ca25bd3a4f79993cc4f44f0d729860f189660e871c816c5f9033b4e68eee9eb520419880"], 0x70) ioctl$FICLONE(r1, 0x40049409, r5) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(r2, 0xc0305602, &(0x7f0000000040)={0x0, 0x3, 0x2024, 0x1}) preadv(r0, &(0x7f0000000140)=[{&(0x7f0000000080)=""/163, 0xa3}], 0x1, 0x0) 22:42:47 executing program 0: semop(0x0, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_pts(r0, 0x0) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) ioctl$TCSETA(r1, 0x5406, &(0x7f00000000c0)={0xfffffffffffffffd, 0x0, 0x0, 0x100000009b4b62e, 0x2, 0x0, 0x0, 0x40, 0x0, 0x4}) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)={0x17, 0x5b03}) time(&(0x7f0000000440)) r2 = socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f0000000680)={0xfffffffffffffffd, 0x70, 0x3, 0x0, 0x9, 0x0, 0x0, 0x2, 0x4804, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, @perf_bp, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$vcsn(&(0x7f0000000140)='/dev/vcs#\x00', 0x3, 0x0) accept(r2, &(0x7f0000000a40)=@caif=@dgm, &(0x7f00000002c0)=0x80) r4 = syz_open_dev$vcsa(&(0x7f00000004c0)='/dev/vcsa#\x00', 0x6, 0x8000) ioctl$sock_inet_tcp_SIOCATMARK(r4, 0x40247007, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000640)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r5}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, 0x7, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x10000, 0x0, 0x69435c71, 0x4000000000000000, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x48}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000400)='mountinfo\x00') ioctl$TIOCGETD(r6, 0x5424, &(0x7f0000000580)) set_thread_area(&(0x7f0000000340)={0x6, 0x20001800, 0x4000, 0x200, 0x10000000000ffff, 0x8000000000000001, 0x4000000080101, 0x2, 0xffffffff, 0x3}) rename(&(0x7f00000003c0)='./file0\x00', &(0x7f00000005c0)='./file0\x00') write$FUSE_NOTIFY_STORE(r3, &(0x7f0000000480)=ANY=[@ANYBLOB="0a0000e7f0511f0000000000000000000100000000000000be00000000000000fcfe0000000000000000"], 0x2a) mount(&(0x7f0000000c00)=ANY=[@ANYPTR64=&(0x7f0000000ac0)=ANY=[@ANYBLOB="f4d1784996c194946d4861257209c91bd8eeff1ffb27923b781eb47f4071d175679f2ec75e005193da3f58fa5d6f25b06d", @ANYPTR]], 0x0, 0x0, 0x801010, 0x0) mount(&(0x7f00000008c0)=ANY=[@ANYBLOB='/d%v/md0\x00'], 0x0, 0x0, 0x2000023, 0x0) mount(&(0x7f0000000940)=ANY=[@ANYBLOB="969957b52d30fea3a6945a209691fd3e214cb9dcc33db7762efad2628dcef5d3b6364e061019df973b2f53d859e769464fe2a2410d59da45d13169add1c55847f5c9f3efe3c9b2e151b4c4a2bdac535d60eb398d4d6952a19e3d52a29749828eb1d6ff4558ca709d9c13c28a2da129717e838eb618c9886828e09a944bc03f33827c69c3fbb70d4b5fba995326c48cedf607660f2b85e3cd0d67bc0cccd8dfba547fe5e36524ef742126514000d7cf7126e2536307a8290af7f78189fa963bfaf8cf0dee8d84a76599366358414b18f32d01f7a3d0b4802a4d7000"/229], 0x0, 0x0, 0x80010, 0x0) mount(&(0x7f0000000700)=ANY=[@ANYBLOB="3040abf7d58436d7496072d88d9f01000000f65251c2210ce6c3275cf63ee466a17abdb3f6b1325bbc9556b9ba20d4df40a9db69d15d3308712819f3cff27695155ef2b719bc4fcb5d38c46f71f14089eea8a3bb9dfa1e774fccee35dc618d63aa608e8d3f0421aabde758c08399866dd6f0c9c72140b2f6694a000000000000000000ade5b6bfd9af5cea1ab63390b1cae4e7b5b56697dd414840056f00c68acc071050d5d498d1a8f0f4c385a517a32f77336ef24e76de96a78d048747d2d3927b57511732b048ee3744eb86af3897ab9d0c"], 0x0, 0x0, 0x80000, 0x0) r7 = dup2(r4, r0) ioctl$TCSBRKP(r1, 0x5425, 0x3) write$FUSE_OPEN(r7, &(0x7f0000000380)={0x20, 0x0, 0x8, {0x0, 0x1}}, 0x20) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount(&(0x7f0000000500)=ANY=[], &(0x7f0000000540)='./file0\x00', &(0x7f0000000800)='devtmpfs\x00', 0x847, &(0x7f0000000780)) 22:42:47 executing program 5: semop(0x0, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_pts(r0, 0x0) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) ioctl$TCSETA(r1, 0x5406, &(0x7f00000000c0)={0xfffffffffffffffd, 0x0, 0x0, 0x100000009b4b62e, 0x2, 0x0, 0x0, 0x40, 0x0, 0x4}) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)={0x17, 0x5b03}) time(&(0x7f0000000440)) r2 = socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f0000000680)={0xfffffffffffffffd, 0x70, 0x3, 0x0, 0x9, 0x0, 0x0, 0x2, 0x4804, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, @perf_bp, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$vcsn(&(0x7f0000000140)='/dev/vcs#\x00', 0x3, 0x0) accept(r2, &(0x7f0000000a40)=@caif=@dgm, &(0x7f00000002c0)=0x80) r4 = syz_open_dev$vcsa(&(0x7f00000004c0)='/dev/vcsa#\x00', 0x6, 0x8000) ioctl$sock_inet_tcp_SIOCATMARK(r4, 0x40247007, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000640)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r5}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, 0x7, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x10000, 0x0, 0x69435c71, 0x4000000000000000, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x48}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000400)='mountinfo\x00') ioctl$TIOCGETD(r6, 0x5424, &(0x7f0000000580)) set_thread_area(&(0x7f0000000340)={0x6, 0x20001800, 0x4000, 0x200, 0x10000000000ffff, 0x8000000000000001, 0x4000000080101, 0x2, 0xffffffff, 0x3}) rename(&(0x7f00000003c0)='./file0\x00', &(0x7f00000005c0)='./file0\x00') write$FUSE_NOTIFY_STORE(r3, &(0x7f0000000480)=ANY=[@ANYBLOB="0a0000e7f0511f0000000000000000000100000000000000be00000000000000fcfe0000000000000000"], 0x2a) mount(&(0x7f0000000c00)=ANY=[@ANYPTR64=&(0x7f0000000ac0)=ANY=[@ANYBLOB="f4d1784996c194946d4861257209c91bd8eeff1ffb27923b781eb47f4071d175679f2ec75e005193da3f58fa5d6f25b06d", @ANYPTR]], 0x0, 0x0, 0x801010, 0x0) mount(&(0x7f00000008c0)=ANY=[@ANYBLOB='/d%v/md0\x00'], 0x0, 0x0, 0x2000023, 0x0) mount(&(0x7f0000000940)=ANY=[@ANYBLOB="969957b52d30fea3a6945a209691fd3e214cb9dcc33db7762efad2628dcef5d3b6364e061019df973b2f53d859e769464fe2a2410d59da45d13169add1c55847f5c9f3efe3c9b2e151b4c4a2bdac535d60eb398d4d6952a19e3d52a29749828eb1d6ff4558ca709d9c13c28a2da129717e838eb618c9886828e09a944bc03f33827c69c3fbb70d4b5fba995326c48cedf607660f2b85e3cd0d67bc0cccd8dfba547fe5e36524ef742126514000d7cf7126e2536307a8290af7f78189fa963bfaf8cf0dee8d84a76599366358414b18f32d01f7a3d0b4802a4d7000"/229], 0x0, 0x0, 0x80010, 0x0) mount(&(0x7f0000000700)=ANY=[@ANYBLOB="3040abf7d58436d7496072d88d9f01000000f65251c2210ce6c3275cf63ee466a17abdb3f6b1325bbc9556b9ba20d4df40a9db69d15d3308712819f3cff27695155ef2b719bc4fcb5d38c46f71f14089eea8a3bb9dfa1e774fccee35dc618d63aa608e8d3f0421aabde758c08399866dd6f0c9c72140b2f6694a000000000000000000ade5b6bfd9af5cea1ab63390b1cae4e7b5b56697dd414840056f00c68acc071050d5d498d1a8f0f4c385a517a32f77336ef24e76de96a78d048747d2d3927b57511732b048ee3744eb86af3897ab9d0c"], 0x0, 0x0, 0x80000, 0x0) r7 = dup2(r4, r0) ioctl$TCSBRKP(r1, 0x5425, 0x3) write$FUSE_OPEN(r7, &(0x7f0000000380)={0x20, 0x0, 0x8, {0x0, 0x1}}, 0x20) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount(&(0x7f0000000500)=ANY=[], &(0x7f0000000540)='./file0\x00', &(0x7f0000000800)='devtmpfs\x00', 0x847, &(0x7f0000000780)) 22:42:47 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x7fffdf00f000, 0xa, 0x13012, r1, 0x0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x4042, 0x0) r3 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2a, 0x0, 0x8, 0x1f, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) shmget$private(0x0, 0x2000, 0x20, &(0x7f0000ffe000/0x2000)=nil) fcntl$F_GET_FILE_RW_HINT(r3, 0x40d, &(0x7f0000000080)) r4 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x80000, 0x0) fsetxattr$security_smack_entry(r3, &(0x7f0000000000)='security.SMACK64IPOUT\x00', &(0x7f0000000040)='[\x00', 0x2, 0x3) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r5, 0x0, 0x482, &(0x7f0000000300)={0x100000011, @multicast2, 0x11, 0x11000000, 'lblc\x00'}, 0x2c) r6 = socket(0xa, 0x4000000001, 0x0) setsockopt$IP_VS_SO_SET_ADD(r6, 0x0, 0x482, &(0x7f0000000000)={0x11, @rand_addr, 0x0, 0x0, 'lblcr\x00'}, 0x2c) getsockopt$inet_pktinfo(r4, 0x0, 0x8, &(0x7f0000001580)={0x0, @dev, @broadcast}, &(0x7f00000015c0)=0xc) setsockopt$inet_pktinfo(r4, 0x0, 0x8, &(0x7f0000000300)={r7, @loopback, @remote}, 0xc) getsockopt$inet_pktinfo(r4, 0x0, 0x8, &(0x7f00000000c0)={0x0, @remote, @empty}, &(0x7f0000000100)=0xc) setsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f0000000140)={r8, @remote, @loopback}, 0xc) ustat(0x0, 0x0) r9 = fcntl$getown(r5, 0x9) fcntl$lock(r4, 0x27, &(0x7f0000000280)={0x4, 0x3, 0x5ba, 0x3f, r9}) setsockopt$sock_timeval(r4, 0x1, 0x14, &(0x7f00000002c0)={0x77359400}, 0x8) setsockopt$EBT_SO_SET_COUNTERS(r4, 0x0, 0x81, &(0x7f00000004c0)=ANY=[@ANYBLOB="665e6c74657200000000000000001200000000000000000000000000000000000000000000000000000000000000000000080000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000000000002edb301e5d4bde4a0a56018d22677961b2adbd05f8aeadc8c18e9ebc", @ANYPTR=&(0x7f0000000240)=ANY=[@ANYBLOB="0000f56987245b0559197e371a59e28482730359bab9fa6a"], @ANYBLOB="00000000000000000000000000000000000000000000000000000000614400000000584380ed8eb71cee3dd5637827b6364017c0a938d4422708d587d5c7f04a76ec2050f57acf8b4d37123de2446ccc5baea2532544e2136373cd36fee8c88268350382c029a5d4954856f3d4a7b17751a9ed5159e9fde44bc629ca25bd3a4f79993cc4f44f0d729860f189660e871c816c5f9033b4e68eee9eb520419880"], 0x70) ioctl$FICLONE(r1, 0x40049409, r5) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(r2, 0xc0305602, &(0x7f0000000040)={0x0, 0x3, 0x2024, 0x1}) preadv(r0, &(0x7f0000000140)=[{&(0x7f0000000080)=""/163, 0xa3}], 0x1, 0x0) 22:42:47 executing program 2: semop(0x0, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_pts(r0, 0x0) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) ioctl$TCSETA(r1, 0x5406, &(0x7f00000000c0)={0xfffffffffffffffd, 0x0, 0x0, 0x100000009b4b62e, 0x2, 0x0, 0x0, 0x40, 0x0, 0x4}) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)={0x17, 0x5b03}) time(&(0x7f0000000440)) r2 = socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f0000000680)={0xfffffffffffffffd, 0x70, 0x3, 0x0, 0x9, 0x0, 0x0, 0x2, 0x4804, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, @perf_bp, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$vcsn(&(0x7f0000000140)='/dev/vcs#\x00', 0x3, 0x0) accept(r2, &(0x7f0000000a40)=@caif=@dgm, &(0x7f00000002c0)=0x80) r4 = syz_open_dev$vcsa(&(0x7f00000004c0)='/dev/vcsa#\x00', 0x6, 0x8000) ioctl$sock_inet_tcp_SIOCATMARK(r4, 0x40247007, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000640)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r5}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, 0x7, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x10000, 0x0, 0x69435c71, 0x4000000000000000, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x48}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000400)='mountinfo\x00') ioctl$TIOCGETD(r6, 0x5424, &(0x7f0000000580)) set_thread_area(&(0x7f0000000340)={0x6, 0x20001800, 0x4000, 0x200, 0x10000000000ffff, 0x8000000000000001, 0x4000000080101, 0x2, 0xffffffff, 0x3}) rename(&(0x7f00000003c0)='./file0\x00', &(0x7f00000005c0)='./file0\x00') write$FUSE_NOTIFY_STORE(r3, &(0x7f0000000480)=ANY=[@ANYBLOB="0a0000e7f0511f0000000000000000000100000000000000be00000000000000fcfe0000000000000000"], 0x2a) mount(&(0x7f0000000c00)=ANY=[@ANYPTR64=&(0x7f0000000ac0)=ANY=[@ANYBLOB="f4d1784996c194946d4861257209c91bd8eeff1ffb27923b781eb47f4071d175679f2ec75e005193da3f58fa5d6f25b06d", @ANYPTR]], 0x0, 0x0, 0x801010, 0x0) mount(&(0x7f00000008c0)=ANY=[@ANYBLOB='/d%v/md0\x00'], 0x0, 0x0, 0x2000023, 0x0) mount(&(0x7f0000000940)=ANY=[@ANYBLOB="969957b52d30fea3a6945a209691fd3e214cb9dcc33db7762efad2628dcef5d3b6364e061019df973b2f53d859e769464fe2a2410d59da45d13169add1c55847f5c9f3efe3c9b2e151b4c4a2bdac535d60eb398d4d6952a19e3d52a29749828eb1d6ff4558ca709d9c13c28a2da129717e838eb618c9886828e09a944bc03f33827c69c3fbb70d4b5fba995326c48cedf607660f2b85e3cd0d67bc0cccd8dfba547fe5e36524ef742126514000d7cf7126e2536307a8290af7f78189fa963bfaf8cf0dee8d84a76599366358414b18f32d01f7a3d0b4802a4d7000"/229], 0x0, 0x0, 0x80010, 0x0) mount(&(0x7f0000000700)=ANY=[@ANYBLOB="3040abf7d58436d7496072d88d9f01000000f65251c2210ce6c3275cf63ee466a17abdb3f6b1325bbc9556b9ba20d4df40a9db69d15d3308712819f3cff27695155ef2b719bc4fcb5d38c46f71f14089eea8a3bb9dfa1e774fccee35dc618d63aa608e8d3f0421aabde758c08399866dd6f0c9c72140b2f6694a000000000000000000ade5b6bfd9af5cea1ab63390b1cae4e7b5b56697dd414840056f00c68acc071050d5d498d1a8f0f4c385a517a32f77336ef24e76de96a78d048747d2d3927b57511732b048ee3744eb86af3897ab9d0c"], 0x0, 0x0, 0x80000, 0x0) r7 = dup2(r4, r0) ioctl$TCSBRKP(r1, 0x5425, 0x3) write$FUSE_OPEN(r7, &(0x7f0000000380)={0x20, 0x0, 0x8, {0x0, 0x1}}, 0x20) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount(&(0x7f0000000500)=ANY=[], &(0x7f0000000540)='./file0\x00', &(0x7f0000000800)='devtmpfs\x00', 0x847, &(0x7f0000000780)) 22:42:47 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x7fffdf00f000, 0xa, 0x13012, r1, 0x0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x4042, 0x0) r3 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2a, 0x0, 0x8, 0x1f, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) shmget$private(0x0, 0x2000, 0x20, &(0x7f0000ffe000/0x2000)=nil) fcntl$F_GET_FILE_RW_HINT(r3, 0x40d, &(0x7f0000000080)) r4 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x80000, 0x0) fsetxattr$security_smack_entry(r3, &(0x7f0000000000)='security.SMACK64IPOUT\x00', &(0x7f0000000040)='[\x00', 0x2, 0x3) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r5, 0x0, 0x482, &(0x7f0000000300)={0x100000011, @multicast2, 0x11, 0x11000000, 'lblc\x00'}, 0x2c) r6 = socket(0xa, 0x4000000001, 0x0) setsockopt$IP_VS_SO_SET_ADD(r6, 0x0, 0x482, &(0x7f0000000000)={0x11, @rand_addr, 0x0, 0x0, 'lblcr\x00'}, 0x2c) getsockopt$inet_pktinfo(r4, 0x0, 0x8, &(0x7f0000001580)={0x0, @dev, @broadcast}, &(0x7f00000015c0)=0xc) setsockopt$inet_pktinfo(r4, 0x0, 0x8, &(0x7f0000000300)={r7, @loopback, @remote}, 0xc) getsockopt$inet_pktinfo(r4, 0x0, 0x8, &(0x7f00000000c0)={0x0, @remote, @empty}, &(0x7f0000000100)=0xc) setsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f0000000140)={r8, @remote, @loopback}, 0xc) ustat(0x0, 0x0) r9 = fcntl$getown(r5, 0x9) fcntl$lock(r4, 0x27, &(0x7f0000000280)={0x4, 0x3, 0x5ba, 0x3f, r9}) setsockopt$sock_timeval(r4, 0x1, 0x14, &(0x7f00000002c0)={0x77359400}, 0x8) setsockopt$EBT_SO_SET_COUNTERS(r4, 0x0, 0x81, &(0x7f00000004c0)=ANY=[@ANYBLOB="665e6c74657200000000000000001200000000000000000000000000000000000000000000000000000000000000000000080000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000000000002edb301e5d4bde4a0a56018d22677961b2adbd05f8aeadc8c18e9ebc", @ANYPTR=&(0x7f0000000240)=ANY=[@ANYBLOB="0000f56987245b0559197e371a59e28482730359bab9fa6a"], @ANYBLOB="00000000000000000000000000000000000000000000000000000000614400000000584380ed8eb71cee3dd5637827b6364017c0a938d4422708d587d5c7f04a76ec2050f57acf8b4d37123de2446ccc5baea2532544e2136373cd36fee8c88268350382c029a5d4954856f3d4a7b17751a9ed5159e9fde44bc629ca25bd3a4f79993cc4f44f0d729860f189660e871c816c5f9033b4e68eee9eb520419880"], 0x70) ioctl$FICLONE(r1, 0x40049409, r5) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(r2, 0xc0305602, &(0x7f0000000040)={0x0, 0x3, 0x2024, 0x1}) preadv(r0, &(0x7f0000000140)=[{&(0x7f0000000080)=""/163, 0xa3}], 0x1, 0x0) 22:42:47 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x7fffdf00f000, 0xa, 0x13012, r1, 0x0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x4042, 0x0) r3 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2a, 0x0, 0x8, 0x1f, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) shmget$private(0x0, 0x2000, 0x20, &(0x7f0000ffe000/0x2000)=nil) fcntl$F_GET_FILE_RW_HINT(r3, 0x40d, &(0x7f0000000080)) r4 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x80000, 0x0) fsetxattr$security_smack_entry(r3, &(0x7f0000000000)='security.SMACK64IPOUT\x00', &(0x7f0000000040)='[\x00', 0x2, 0x3) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r5, 0x0, 0x482, &(0x7f0000000300)={0x100000011, @multicast2, 0x11, 0x11000000, 'lblc\x00'}, 0x2c) r6 = socket(0xa, 0x4000000001, 0x0) setsockopt$IP_VS_SO_SET_ADD(r6, 0x0, 0x482, &(0x7f0000000000)={0x11, @rand_addr, 0x0, 0x0, 'lblcr\x00'}, 0x2c) getsockopt$inet_pktinfo(r4, 0x0, 0x8, &(0x7f0000001580)={0x0, @dev, @broadcast}, &(0x7f00000015c0)=0xc) setsockopt$inet_pktinfo(r4, 0x0, 0x8, &(0x7f0000000300)={r7, @loopback, @remote}, 0xc) getsockopt$inet_pktinfo(r4, 0x0, 0x8, &(0x7f00000000c0)={0x0, @remote, @empty}, &(0x7f0000000100)=0xc) setsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f0000000140)={r8, @remote, @loopback}, 0xc) ustat(0x0, 0x0) r9 = fcntl$getown(r5, 0x9) fcntl$lock(r4, 0x27, &(0x7f0000000280)={0x4, 0x3, 0x5ba, 0x3f, r9}) setsockopt$sock_timeval(r4, 0x1, 0x14, &(0x7f00000002c0)={0x77359400}, 0x8) setsockopt$EBT_SO_SET_COUNTERS(r4, 0x0, 0x81, &(0x7f00000004c0)=ANY=[@ANYBLOB="665e6c74657200000000000000001200000000000000000000000000000000000000000000000000000000000000000000080000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000000000002edb301e5d4bde4a0a56018d22677961b2adbd05f8aeadc8c18e9ebc", @ANYPTR=&(0x7f0000000240)=ANY=[@ANYBLOB="0000f56987245b0559197e371a59e28482730359bab9fa6a"], @ANYBLOB="00000000000000000000000000000000000000000000000000000000614400000000584380ed8eb71cee3dd5637827b6364017c0a938d4422708d587d5c7f04a76ec2050f57acf8b4d37123de2446ccc5baea2532544e2136373cd36fee8c88268350382c029a5d4954856f3d4a7b17751a9ed5159e9fde44bc629ca25bd3a4f79993cc4f44f0d729860f189660e871c816c5f9033b4e68eee9eb520419880"], 0x70) ioctl$FICLONE(r1, 0x40049409, r5) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(r2, 0xc0305602, &(0x7f0000000040)={0x0, 0x3, 0x2024, 0x1}) preadv(r0, &(0x7f0000000140)=[{&(0x7f0000000080)=""/163, 0xa3}], 0x1, 0x0) 22:42:47 executing program 1: semop(0x0, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_pts(r0, 0x0) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) ioctl$TCSETA(r1, 0x5406, &(0x7f00000000c0)={0xfffffffffffffffd, 0x0, 0x0, 0x100000009b4b62e, 0x2, 0x0, 0x0, 0x40, 0x0, 0x4}) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)={0x17, 0x5b03}) time(&(0x7f0000000440)) r2 = socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f0000000680)={0xfffffffffffffffd, 0x70, 0x3, 0x0, 0x9, 0x0, 0x0, 0x2, 0x4804, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, @perf_bp, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$vcsn(&(0x7f0000000140)='/dev/vcs#\x00', 0x3, 0x0) accept(r2, &(0x7f0000000a40)=@caif=@dgm, &(0x7f00000002c0)=0x80) r4 = syz_open_dev$vcsa(&(0x7f00000004c0)='/dev/vcsa#\x00', 0x6, 0x8000) ioctl$sock_inet_tcp_SIOCATMARK(r4, 0x40247007, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000640)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r5}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, 0x7, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x10000, 0x0, 0x69435c71, 0x4000000000000000, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x48}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000400)='mountinfo\x00') ioctl$TIOCGETD(r6, 0x5424, &(0x7f0000000580)) set_thread_area(&(0x7f0000000340)={0x6, 0x20001800, 0x4000, 0x200, 0x10000000000ffff, 0x8000000000000001, 0x4000000080101, 0x2, 0xffffffff, 0x3}) rename(&(0x7f00000003c0)='./file0\x00', &(0x7f00000005c0)='./file0\x00') write$FUSE_NOTIFY_STORE(r3, &(0x7f0000000480)=ANY=[@ANYBLOB="0a0000e7f0511f0000000000000000000100000000000000be00000000000000fcfe0000000000000000"], 0x2a) mount(&(0x7f0000000c00)=ANY=[@ANYPTR64=&(0x7f0000000ac0)=ANY=[@ANYBLOB="f4d1784996c194946d4861257209c91bd8eeff1ffb27923b781eb47f4071d175679f2ec75e005193da3f58fa5d6f25b06d", @ANYPTR]], 0x0, 0x0, 0x801010, 0x0) mount(&(0x7f00000008c0)=ANY=[@ANYBLOB='/d%v/md0\x00'], 0x0, 0x0, 0x2000023, 0x0) mount(&(0x7f0000000940)=ANY=[@ANYBLOB="969957b52d30fea3a6945a209691fd3e214cb9dcc33db7762efad2628dcef5d3b6364e061019df973b2f53d859e769464fe2a2410d59da45d13169add1c55847f5c9f3efe3c9b2e151b4c4a2bdac535d60eb398d4d6952a19e3d52a29749828eb1d6ff4558ca709d9c13c28a2da129717e838eb618c9886828e09a944bc03f33827c69c3fbb70d4b5fba995326c48cedf607660f2b85e3cd0d67bc0cccd8dfba547fe5e36524ef742126514000d7cf7126e2536307a8290af7f78189fa963bfaf8cf0dee8d84a76599366358414b18f32d01f7a3d0b4802a4d7000"/229], 0x0, 0x0, 0x80010, 0x0) mount(&(0x7f0000000700)=ANY=[@ANYBLOB="3040abf7d58436d7496072d88d9f01000000f65251c2210ce6c3275cf63ee466a17abdb3f6b1325bbc9556b9ba20d4df40a9db69d15d3308712819f3cff27695155ef2b719bc4fcb5d38c46f71f14089eea8a3bb9dfa1e774fccee35dc618d63aa608e8d3f0421aabde758c08399866dd6f0c9c72140b2f6694a000000000000000000ade5b6bfd9af5cea1ab63390b1cae4e7b5b56697dd414840056f00c68acc071050d5d498d1a8f0f4c385a517a32f77336ef24e76de96a78d048747d2d3927b57511732b048ee3744eb86af3897ab9d0c"], 0x0, 0x0, 0x80000, 0x0) r7 = dup2(r4, r0) ioctl$TCSBRKP(r1, 0x5425, 0x3) write$FUSE_OPEN(r7, &(0x7f0000000380)={0x20, 0x0, 0x8, {0x0, 0x1}}, 0x20) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount(&(0x7f0000000500)=ANY=[], &(0x7f0000000540)='./file0\x00', &(0x7f0000000800)='devtmpfs\x00', 0x847, &(0x7f0000000780)) 22:42:47 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x7fffdf00f000, 0xa, 0x13012, r1, 0x0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x4042, 0x0) r3 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2a, 0x0, 0x8, 0x1f, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) shmget$private(0x0, 0x2000, 0x20, &(0x7f0000ffe000/0x2000)=nil) fcntl$F_GET_FILE_RW_HINT(r3, 0x40d, &(0x7f0000000080)) r4 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x80000, 0x0) fsetxattr$security_smack_entry(r3, &(0x7f0000000000)='security.SMACK64IPOUT\x00', &(0x7f0000000040)='[\x00', 0x2, 0x3) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r5, 0x0, 0x482, &(0x7f0000000300)={0x100000011, @multicast2, 0x11, 0x11000000, 'lblc\x00'}, 0x2c) r6 = socket(0xa, 0x4000000001, 0x0) setsockopt$IP_VS_SO_SET_ADD(r6, 0x0, 0x482, &(0x7f0000000000)={0x11, @rand_addr, 0x0, 0x0, 'lblcr\x00'}, 0x2c) getsockopt$inet_pktinfo(r4, 0x0, 0x8, &(0x7f0000001580)={0x0, @dev, @broadcast}, &(0x7f00000015c0)=0xc) setsockopt$inet_pktinfo(r4, 0x0, 0x8, &(0x7f0000000300)={r7, @loopback, @remote}, 0xc) getsockopt$inet_pktinfo(r4, 0x0, 0x8, &(0x7f00000000c0)={0x0, @remote, @empty}, &(0x7f0000000100)=0xc) setsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f0000000140)={r8, @remote, @loopback}, 0xc) ustat(0x0, 0x0) r9 = fcntl$getown(r5, 0x9) fcntl$lock(r4, 0x27, &(0x7f0000000280)={0x4, 0x3, 0x5ba, 0x3f, r9}) setsockopt$sock_timeval(r4, 0x1, 0x14, &(0x7f00000002c0)={0x77359400}, 0x8) setsockopt$EBT_SO_SET_COUNTERS(r4, 0x0, 0x81, &(0x7f00000004c0)=ANY=[@ANYBLOB="665e6c74657200000000000000001200000000000000000000000000000000000000000000000000000000000000000000080000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000000000002edb301e5d4bde4a0a56018d22677961b2adbd05f8aeadc8c18e9ebc", @ANYPTR=&(0x7f0000000240)=ANY=[@ANYBLOB="0000f56987245b0559197e371a59e28482730359bab9fa6a"], @ANYBLOB="00000000000000000000000000000000000000000000000000000000614400000000584380ed8eb71cee3dd5637827b6364017c0a938d4422708d587d5c7f04a76ec2050f57acf8b4d37123de2446ccc5baea2532544e2136373cd36fee8c88268350382c029a5d4954856f3d4a7b17751a9ed5159e9fde44bc629ca25bd3a4f79993cc4f44f0d729860f189660e871c816c5f9033b4e68eee9eb520419880"], 0x70) ioctl$FICLONE(r1, 0x40049409, r5) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(r2, 0xc0305602, &(0x7f0000000040)={0x0, 0x3, 0x2024, 0x1}) preadv(r0, &(0x7f0000000140)=[{&(0x7f0000000080)=""/163, 0xa3}], 0x1, 0x0) [ 350.203272] protocol 88fb is buggy, dev hsr_slave_0 [ 350.208454] protocol 88fb is buggy, dev hsr_slave_1 22:42:50 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000040)=0x480100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() r2 = fcntl$dupfd(r0, 0x0, r0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f00000000c0)={@loopback, 0x0, 0x1, 0x0, 0x5}, 0x20) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x10010000000035) getsockopt$IP_VS_SO_GET_TIMEOUT(r0, 0x0, 0x486, &(0x7f0000000140), &(0x7f0000000180)=0xc) 22:42:50 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x7fffdf00f000, 0xa, 0x13012, r1, 0x0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x4042, 0x0) r3 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2a, 0x0, 0x8, 0x1f, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) shmget$private(0x0, 0x2000, 0x20, &(0x7f0000ffe000/0x2000)=nil) fcntl$F_GET_FILE_RW_HINT(r3, 0x40d, &(0x7f0000000080)) r4 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x80000, 0x0) fsetxattr$security_smack_entry(r3, &(0x7f0000000000)='security.SMACK64IPOUT\x00', &(0x7f0000000040)='[\x00', 0x2, 0x3) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r5, 0x0, 0x482, &(0x7f0000000300)={0x100000011, @multicast2, 0x11, 0x11000000, 'lblc\x00'}, 0x2c) r6 = socket(0xa, 0x4000000001, 0x0) setsockopt$IP_VS_SO_SET_ADD(r6, 0x0, 0x482, &(0x7f0000000000)={0x11, @rand_addr, 0x0, 0x0, 'lblcr\x00'}, 0x2c) getsockopt$inet_pktinfo(r4, 0x0, 0x8, &(0x7f0000001580)={0x0, @dev, @broadcast}, &(0x7f00000015c0)=0xc) setsockopt$inet_pktinfo(r4, 0x0, 0x8, &(0x7f0000000300)={r7, @loopback, @remote}, 0xc) getsockopt$inet_pktinfo(r4, 0x0, 0x8, &(0x7f00000000c0)={0x0, @remote, @empty}, &(0x7f0000000100)=0xc) setsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f0000000140)={r8, @remote, @loopback}, 0xc) ustat(0x0, 0x0) r9 = fcntl$getown(r5, 0x9) fcntl$lock(r4, 0x27, &(0x7f0000000280)={0x4, 0x3, 0x5ba, 0x3f, r9}) setsockopt$sock_timeval(r4, 0x1, 0x14, &(0x7f00000002c0)={0x77359400}, 0x8) setsockopt$EBT_SO_SET_COUNTERS(r4, 0x0, 0x81, &(0x7f00000004c0)=ANY=[@ANYBLOB="665e6c74657200000000000000001200000000000000000000000000000000000000000000000000000000000000000000080000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000000000002edb301e5d4bde4a0a56018d22677961b2adbd05f8aeadc8c18e9ebc", @ANYPTR=&(0x7f0000000240)=ANY=[@ANYBLOB="0000f56987245b0559197e371a59e28482730359bab9fa6a"], @ANYBLOB="00000000000000000000000000000000000000000000000000000000614400000000584380ed8eb71cee3dd5637827b6364017c0a938d4422708d587d5c7f04a76ec2050f57acf8b4d37123de2446ccc5baea2532544e2136373cd36fee8c88268350382c029a5d4954856f3d4a7b17751a9ed5159e9fde44bc629ca25bd3a4f79993cc4f44f0d729860f189660e871c816c5f9033b4e68eee9eb520419880"], 0x70) ioctl$FICLONE(r1, 0x40049409, r5) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(r2, 0xc0305602, &(0x7f0000000040)={0x0, 0x3, 0x2024, 0x1}) preadv(r0, &(0x7f0000000140)=[{&(0x7f0000000080)=""/163, 0xa3}], 0x1, 0x0) 22:42:50 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x7fffdf00f000, 0xa, 0x13012, r1, 0x0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x4042, 0x0) r3 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2a, 0x0, 0x8, 0x1f, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) shmget$private(0x0, 0x2000, 0x20, &(0x7f0000ffe000/0x2000)=nil) fcntl$F_GET_FILE_RW_HINT(r3, 0x40d, &(0x7f0000000080)) r4 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x80000, 0x0) fsetxattr$security_smack_entry(r3, &(0x7f0000000000)='security.SMACK64IPOUT\x00', &(0x7f0000000040)='[\x00', 0x2, 0x3) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r5, 0x0, 0x482, &(0x7f0000000300)={0x100000011, @multicast2, 0x11, 0x11000000, 'lblc\x00'}, 0x2c) r6 = socket(0xa, 0x4000000001, 0x0) setsockopt$IP_VS_SO_SET_ADD(r6, 0x0, 0x482, &(0x7f0000000000)={0x11, @rand_addr, 0x0, 0x0, 'lblcr\x00'}, 0x2c) getsockopt$inet_pktinfo(r4, 0x0, 0x8, &(0x7f0000001580)={0x0, @dev, @broadcast}, &(0x7f00000015c0)=0xc) setsockopt$inet_pktinfo(r4, 0x0, 0x8, &(0x7f0000000300)={r7, @loopback, @remote}, 0xc) getsockopt$inet_pktinfo(r4, 0x0, 0x8, &(0x7f00000000c0)={0x0, @remote, @empty}, &(0x7f0000000100)=0xc) setsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f0000000140)={r8, @remote, @loopback}, 0xc) ustat(0x0, 0x0) r9 = fcntl$getown(r5, 0x9) fcntl$lock(r4, 0x27, &(0x7f0000000280)={0x4, 0x3, 0x5ba, 0x3f, r9}) setsockopt$sock_timeval(r4, 0x1, 0x14, &(0x7f00000002c0)={0x77359400}, 0x8) setsockopt$EBT_SO_SET_COUNTERS(r4, 0x0, 0x81, &(0x7f00000004c0)=ANY=[@ANYBLOB="665e6c74657200000000000000001200000000000000000000000000000000000000000000000000000000000000000000080000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000000000002edb301e5d4bde4a0a56018d22677961b2adbd05f8aeadc8c18e9ebc", @ANYPTR=&(0x7f0000000240)=ANY=[@ANYBLOB="0000f56987245b0559197e371a59e28482730359bab9fa6a"], @ANYBLOB="00000000000000000000000000000000000000000000000000000000614400000000584380ed8eb71cee3dd5637827b6364017c0a938d4422708d587d5c7f04a76ec2050f57acf8b4d37123de2446ccc5baea2532544e2136373cd36fee8c88268350382c029a5d4954856f3d4a7b17751a9ed5159e9fde44bc629ca25bd3a4f79993cc4f44f0d729860f189660e871c816c5f9033b4e68eee9eb520419880"], 0x70) ioctl$FICLONE(r1, 0x40049409, r5) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(r2, 0xc0305602, &(0x7f0000000040)={0x0, 0x3, 0x2024, 0x1}) preadv(r0, &(0x7f0000000140)=[{&(0x7f0000000080)=""/163, 0xa3}], 0x1, 0x0) 22:42:50 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x4, &(0x7f0000000080), &(0x7f0000000200)=0x8) 22:42:50 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000000100)=@framed={{}, [@alu={0x8000000201a7f19, 0x5, 0x7, 0x0, 0x1, 0x8}]}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) 22:42:50 executing program 4: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000002c0)=[{&(0x7f0000000080), 0x3b7}], 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x262, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000540)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_QUERY(r2, &(0x7f0000000080)={0x13, 0x10, 0xfa00, {&(0x7f00000001c0)}}, 0x18) move_pages(0x0, 0x1, &(0x7f0000000000)=[&(0x7f0000005000/0x2000)=nil], &(0x7f0000000380)=[0x1], 0x0, 0x0) socket$pppoe(0x18, 0x1, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000280)=ANY=[@ANYRES32=0x0], &(0x7f0000000300)=0x1) getsockopt$inet_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000340)={0x0, 0x400, 0x0, 0x2000000000, 0x6}, 0x0) getsockopt$SO_COOKIE(r1, 0x1, 0x39, &(0x7f00000000c0), &(0x7f0000000100)=0x8) ioctl$EXT4_IOC_MIGRATE(r0, 0x6609) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, 0x0, &(0x7f0000000240)) ioctl$TUNSETOWNER(r1, 0x400454cc, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000004400), 0x0, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(r0, 0x0, 0x48a, &(0x7f0000000400)={0x1, 0x337d, 0xaa8b}, 0xc) 22:42:50 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x4, &(0x7f0000000080), &(0x7f0000000200)=0x8) 22:42:50 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x7fffdf00f000, 0xa, 0x13012, r1, 0x0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x4042, 0x0) r3 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2a, 0x0, 0x8, 0x1f, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) shmget$private(0x0, 0x2000, 0x20, &(0x7f0000ffe000/0x2000)=nil) fcntl$F_GET_FILE_RW_HINT(r3, 0x40d, &(0x7f0000000080)) r4 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x80000, 0x0) fsetxattr$security_smack_entry(r3, &(0x7f0000000000)='security.SMACK64IPOUT\x00', &(0x7f0000000040)='[\x00', 0x2, 0x3) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r5, 0x0, 0x482, &(0x7f0000000300)={0x100000011, @multicast2, 0x11, 0x11000000, 'lblc\x00'}, 0x2c) r6 = socket(0xa, 0x4000000001, 0x0) setsockopt$IP_VS_SO_SET_ADD(r6, 0x0, 0x482, &(0x7f0000000000)={0x11, @rand_addr, 0x0, 0x0, 'lblcr\x00'}, 0x2c) getsockopt$inet_pktinfo(r4, 0x0, 0x8, &(0x7f0000001580)={0x0, @dev, @broadcast}, &(0x7f00000015c0)=0xc) setsockopt$inet_pktinfo(r4, 0x0, 0x8, &(0x7f0000000300)={r7, @loopback, @remote}, 0xc) getsockopt$inet_pktinfo(r4, 0x0, 0x8, &(0x7f00000000c0)={0x0, @remote, @empty}, &(0x7f0000000100)=0xc) setsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f0000000140)={r8, @remote, @loopback}, 0xc) ustat(0x0, 0x0) r9 = fcntl$getown(r5, 0x9) fcntl$lock(r4, 0x27, &(0x7f0000000280)={0x4, 0x3, 0x5ba, 0x3f, r9}) setsockopt$sock_timeval(r4, 0x1, 0x14, &(0x7f00000002c0)={0x77359400}, 0x8) setsockopt$EBT_SO_SET_COUNTERS(r4, 0x0, 0x81, &(0x7f00000004c0)=ANY=[@ANYBLOB="665e6c74657200000000000000001200000000000000000000000000000000000000000000000000000000000000000000080000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000000000002edb301e5d4bde4a0a56018d22677961b2adbd05f8aeadc8c18e9ebc", @ANYPTR=&(0x7f0000000240)=ANY=[@ANYBLOB="0000f56987245b0559197e371a59e28482730359bab9fa6a"], @ANYBLOB="00000000000000000000000000000000000000000000000000000000614400000000584380ed8eb71cee3dd5637827b6364017c0a938d4422708d587d5c7f04a76ec2050f57acf8b4d37123de2446ccc5baea2532544e2136373cd36fee8c88268350382c029a5d4954856f3d4a7b17751a9ed5159e9fde44bc629ca25bd3a4f79993cc4f44f0d729860f189660e871c816c5f9033b4e68eee9eb520419880"], 0x70) ioctl$FICLONE(r1, 0x40049409, r5) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(r2, 0xc0305602, &(0x7f0000000040)={0x0, 0x3, 0x2024, 0x1}) preadv(r0, &(0x7f0000000140)=[{&(0x7f0000000080)=""/163, 0xa3}], 0x1, 0x0) 22:42:50 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000000100)=@framed={{}, [@alu={0x8000000201a7f19, 0x5, 0x7, 0x0, 0x1, 0x8}]}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) 22:42:50 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x7fffdf00f000, 0xa, 0x13012, r1, 0x0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x4042, 0x0) r3 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2a, 0x0, 0x8, 0x1f, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) shmget$private(0x0, 0x2000, 0x20, &(0x7f0000ffe000/0x2000)=nil) fcntl$F_GET_FILE_RW_HINT(r3, 0x40d, &(0x7f0000000080)) r4 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x80000, 0x0) fsetxattr$security_smack_entry(r3, &(0x7f0000000000)='security.SMACK64IPOUT\x00', &(0x7f0000000040)='[\x00', 0x2, 0x3) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r5, 0x0, 0x482, &(0x7f0000000300)={0x100000011, @multicast2, 0x11, 0x11000000, 'lblc\x00'}, 0x2c) r6 = socket(0xa, 0x4000000001, 0x0) setsockopt$IP_VS_SO_SET_ADD(r6, 0x0, 0x482, &(0x7f0000000000)={0x11, @rand_addr, 0x0, 0x0, 'lblcr\x00'}, 0x2c) getsockopt$inet_pktinfo(r4, 0x0, 0x8, &(0x7f0000001580)={0x0, @dev, @broadcast}, &(0x7f00000015c0)=0xc) setsockopt$inet_pktinfo(r4, 0x0, 0x8, &(0x7f0000000300)={r7, @loopback, @remote}, 0xc) getsockopt$inet_pktinfo(r4, 0x0, 0x8, &(0x7f00000000c0)={0x0, @remote, @empty}, &(0x7f0000000100)=0xc) setsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f0000000140)={r8, @remote, @loopback}, 0xc) ustat(0x0, 0x0) r9 = fcntl$getown(r5, 0x9) fcntl$lock(r4, 0x27, &(0x7f0000000280)={0x4, 0x3, 0x5ba, 0x3f, r9}) setsockopt$sock_timeval(r4, 0x1, 0x14, &(0x7f00000002c0)={0x77359400}, 0x8) setsockopt$EBT_SO_SET_COUNTERS(r4, 0x0, 0x81, &(0x7f00000004c0)=ANY=[@ANYBLOB="665e6c74657200000000000000001200000000000000000000000000000000000000000000000000000000000000000000080000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000000000002edb301e5d4bde4a0a56018d22677961b2adbd05f8aeadc8c18e9ebc", @ANYPTR=&(0x7f0000000240)=ANY=[@ANYBLOB="0000f56987245b0559197e371a59e28482730359bab9fa6a"], @ANYBLOB="00000000000000000000000000000000000000000000000000000000614400000000584380ed8eb71cee3dd5637827b6364017c0a938d4422708d587d5c7f04a76ec2050f57acf8b4d37123de2446ccc5baea2532544e2136373cd36fee8c88268350382c029a5d4954856f3d4a7b17751a9ed5159e9fde44bc629ca25bd3a4f79993cc4f44f0d729860f189660e871c816c5f9033b4e68eee9eb520419880"], 0x70) ioctl$FICLONE(r1, 0x40049409, r5) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(r2, 0xc0305602, &(0x7f0000000040)={0x0, 0x3, 0x2024, 0x1}) preadv(r0, &(0x7f0000000140)=[{&(0x7f0000000080)=""/163, 0xa3}], 0x1, 0x0) 22:42:50 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000000100)=@framed={{}, [@alu={0x8000000201a7f19, 0x5, 0x7, 0x0, 0x1, 0x8}]}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) 22:42:50 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x4, &(0x7f0000000080), &(0x7f0000000200)=0x8) [ 354.363322] net_ratelimit: 14 callbacks suppressed [ 354.363330] protocol 88fb is buggy, dev hsr_slave_0 [ 354.373411] protocol 88fb is buggy, dev hsr_slave_1 [ 354.843260] protocol 88fb is buggy, dev hsr_slave_0 [ 354.848324] protocol 88fb is buggy, dev hsr_slave_1 [ 355.003233] protocol 88fb is buggy, dev hsr_slave_0 [ 355.008287] protocol 88fb is buggy, dev hsr_slave_1 [ 355.163264] protocol 88fb is buggy, dev hsr_slave_0 [ 355.168502] protocol 88fb is buggy, dev hsr_slave_1 22:42:53 executing program 5: r0 = getpgid(0x0) r1 = inotify_init1(0x0) fcntl$setown(r1, 0x8, 0xffffffffffffffff) fcntl$getownex(r1, 0x10, &(0x7f000045fff8)={0x0, 0x0}) kcmp(r0, r2, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) 22:42:53 executing program 4: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000002c0)=[{&(0x7f0000000080), 0x3b7}], 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x262, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000540)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_QUERY(r2, &(0x7f0000000080)={0x13, 0x10, 0xfa00, {&(0x7f00000001c0)}}, 0x18) move_pages(0x0, 0x1, &(0x7f0000000000)=[&(0x7f0000005000/0x2000)=nil], &(0x7f0000000380)=[0x1], 0x0, 0x0) socket$pppoe(0x18, 0x1, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000280)=ANY=[@ANYRES32=0x0], &(0x7f0000000300)=0x1) getsockopt$inet_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000340)={0x0, 0x400, 0x0, 0x2000000000, 0x6}, 0x0) getsockopt$SO_COOKIE(r1, 0x1, 0x39, &(0x7f00000000c0), &(0x7f0000000100)=0x8) ioctl$EXT4_IOC_MIGRATE(r0, 0x6609) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, 0x0, &(0x7f0000000240)) ioctl$TUNSETOWNER(r1, 0x400454cc, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000004400), 0x0, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(r0, 0x0, 0x48a, &(0x7f0000000400)={0x1, 0x337d, 0xaa8b}, 0xc) 22:42:53 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x4, &(0x7f0000000080), &(0x7f0000000200)=0x8) 22:42:53 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_DEV_CREATE(r0, 0x5501) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x0) 22:42:53 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000000100)=@framed={{}, [@alu={0x8000000201a7f19, 0x5, 0x7, 0x0, 0x1, 0x8}]}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) 22:42:53 executing program 3: r0 = socket(0x10, 0x4000000000000002, 0xc) write(r0, &(0x7f0000000100)="1f0000000104ff00fd4354c007110000f30501000a000100010423dcffdf00", 0x1f) write(r0, &(0x7f0000000240)="1f0000000104fffffd3b543407110000f34501000b000200038c5000000002", 0x1f) 22:42:53 executing program 0: open$dir(0x0, 0x0, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0xc9012, 0xffffffffffffffff, 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$cec(0x0, 0x3, 0x2) clock_gettime(0x0, 0x0) mq_timedreceive(0xffffffffffffffff, 0x0, 0x0, 0x80000000, &(0x7f0000000a00)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000040)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x66060000) 22:42:53 executing program 5: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_WKALM_RD(r0, 0x80247008, &(0x7f0000000100)) 22:42:53 executing program 2: r0 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000240)={'hsr0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="65ed59501ed8"}, 0x14) sendmsg$key(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRESDEC=r1], 0x14}}, 0x0) 22:42:53 executing program 1: getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, 0x0, &(0x7f0000000100)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) lsetxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) ioctl$KVM_GET_MP_STATE(0xffffffffffffffff, 0x8004ae98, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, 0x0, &(0x7f00000001c0)) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) 22:42:53 executing program 3: r0 = socket(0x10, 0x4000000000000002, 0xc) write(r0, &(0x7f0000000100)="1f0000000104ff00fd4354c007110000f30501000a000100010423dcffdf00", 0x1f) write(r0, &(0x7f0000000240)="1f0000000104fffffd3b543407110000f34501000b000200038c5000000002", 0x1f) 22:42:53 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x3, 0x0) socket$kcm(0x29, 0x5, 0x0) openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000240)='rdma') openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgrowp.cpu\x00', 0x200002, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000a80)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000380)=0x46ca) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x80, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)='.\x00\x00\x00>\x00', 0x6}], 0x1}, 0x0) r3 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r2, &(0x7f00000002c0)=ANY=[], 0x0) openat$cgroup_ro(r1, &(0x7f0000000040)='cpuacct.usage_percpu\x00', 0x0, 0x0) socket$kcm(0x29, 0x2, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000003c0)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8984413869d6e3ae, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r1, &(0x7f00000000c0)={[{0x33, 'c\x86\xdd'}]}, 0xfdef) perf_event_open(&(0x7f0000000800)={0x2, 0x70, 0x6, 0x4, 0x5, 0xa26, 0x0, 0x6, 0x40104, 0x9, 0x1ff, 0x1, 0x0, 0x5, 0xffffffffffffff7f, 0x3, 0x40, 0x7ff800, 0xfffffffffffffffc, 0x4, 0x3, 0xffffffffffffff59, 0xc, 0x69d4, 0x2, 0x3f, 0x5, 0xffffffff, 0x9, 0xff, 0x0, 0x81, 0x7fffffff, 0x9, 0x7, 0xfffffffffffffff9, 0x6, 0x7, 0x0, 0x200, 0xc33623b12dd20fa, @perf_bp={&(0x7f00000002c0), 0x2}, 0x14000, 0x6, 0x2, 0x0, 0x5, 0x3, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) 22:42:53 executing program 4: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000002c0)=[{&(0x7f0000000080), 0x3b7}], 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x262, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000540)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_QUERY(r2, &(0x7f0000000080)={0x13, 0x10, 0xfa00, {&(0x7f00000001c0)}}, 0x18) move_pages(0x0, 0x1, &(0x7f0000000000)=[&(0x7f0000005000/0x2000)=nil], &(0x7f0000000380)=[0x1], 0x0, 0x0) socket$pppoe(0x18, 0x1, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000280)=ANY=[@ANYRES32=0x0], &(0x7f0000000300)=0x1) getsockopt$inet_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000340)={0x0, 0x400, 0x0, 0x2000000000, 0x6}, 0x0) getsockopt$SO_COOKIE(r1, 0x1, 0x39, &(0x7f00000000c0), &(0x7f0000000100)=0x8) ioctl$EXT4_IOC_MIGRATE(r0, 0x6609) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, 0x0, &(0x7f0000000240)) ioctl$TUNSETOWNER(r1, 0x400454cc, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000004400), 0x0, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(r0, 0x0, 0x48a, &(0x7f0000000400)={0x1, 0x337d, 0xaa8b}, 0xc) 22:42:53 executing program 2: r0 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000240)={'hsr0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="65ed59501ed8"}, 0x14) sendmsg$key(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRESDEC=r1], 0x14}}, 0x0) [ 356.215861] IPVS: ftp: loaded support on port[0] = 21 22:42:53 executing program 3: r0 = socket(0x10, 0x4000000000000002, 0xc) write(r0, &(0x7f0000000100)="1f0000000104ff00fd4354c007110000f30501000a000100010423dcffdf00", 0x1f) write(r0, &(0x7f0000000240)="1f0000000104fffffd3b543407110000f34501000b000200038c5000000002", 0x1f) 22:42:53 executing program 5: r0 = socket(0x40000000015, 0x805, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) getsockopt(r0, 0x114, 0x271c, 0x0, &(0x7f000033bffc)) 22:42:53 executing program 2: r0 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000240)={'hsr0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="65ed59501ed8"}, 0x14) sendmsg$key(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRESDEC=r1], 0x14}}, 0x0) 22:42:53 executing program 3: r0 = socket(0x10, 0x4000000000000002, 0xc) write(r0, &(0x7f0000000100)="1f0000000104ff00fd4354c007110000f30501000a000100010423dcffdf00", 0x1f) write(r0, &(0x7f0000000240)="1f0000000104fffffd3b543407110000f34501000b000200038c5000000002", 0x1f) [ 356.443579] protocol 88fb is buggy, dev hsr_slave_0 [ 356.449065] protocol 88fb is buggy, dev hsr_slave_1 [ 356.541566] IPVS: ftp: loaded support on port[0] = 21 22:42:54 executing program 0: open$dir(0x0, 0x0, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0xc9012, 0xffffffffffffffff, 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$cec(0x0, 0x3, 0x2) clock_gettime(0x0, 0x0) mq_timedreceive(0xffffffffffffffff, 0x0, 0x0, 0x80000000, &(0x7f0000000a00)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000040)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x66060000) 22:42:54 executing program 4: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000002c0)=[{&(0x7f0000000080), 0x3b7}], 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x262, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000540)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_QUERY(r2, &(0x7f0000000080)={0x13, 0x10, 0xfa00, {&(0x7f00000001c0)}}, 0x18) move_pages(0x0, 0x1, &(0x7f0000000000)=[&(0x7f0000005000/0x2000)=nil], &(0x7f0000000380)=[0x1], 0x0, 0x0) socket$pppoe(0x18, 0x1, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000280)=ANY=[@ANYRES32=0x0], &(0x7f0000000300)=0x1) getsockopt$inet_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000340)={0x0, 0x400, 0x0, 0x2000000000, 0x6}, 0x0) getsockopt$SO_COOKIE(r1, 0x1, 0x39, &(0x7f00000000c0), &(0x7f0000000100)=0x8) ioctl$EXT4_IOC_MIGRATE(r0, 0x6609) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, 0x0, &(0x7f0000000240)) ioctl$TUNSETOWNER(r1, 0x400454cc, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000004400), 0x0, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(r0, 0x0, 0x48a, &(0x7f0000000400)={0x1, 0x337d, 0xaa8b}, 0xc) 22:42:54 executing program 1: getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, 0x0, &(0x7f0000000100)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) lsetxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) ioctl$KVM_GET_MP_STATE(0xffffffffffffffff, 0x8004ae98, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, 0x0, &(0x7f00000001c0)) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) 22:42:54 executing program 5: r0 = socket(0x40000000015, 0x805, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) getsockopt(r0, 0x114, 0x271c, 0x0, &(0x7f000033bffc)) 22:42:54 executing program 2: r0 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000240)={'hsr0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="65ed59501ed8"}, 0x14) sendmsg$key(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRESDEC=r1], 0x14}}, 0x0) 22:42:54 executing program 3: getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, 0x0, &(0x7f0000000100)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) lsetxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) ioctl$KVM_GET_MP_STATE(0xffffffffffffffff, 0x8004ae98, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, 0x0, &(0x7f00000001c0)) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) 22:42:54 executing program 5: r0 = socket(0x40000000015, 0x805, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) getsockopt(r0, 0x114, 0x271c, 0x0, &(0x7f000033bffc)) 22:42:54 executing program 2: open$dir(0x0, 0x0, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0xc9012, 0xffffffffffffffff, 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$cec(0x0, 0x3, 0x2) clock_gettime(0x0, 0x0) mq_timedreceive(0xffffffffffffffff, 0x0, 0x0, 0x80000000, &(0x7f0000000a00)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000040)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x66060000) [ 356.739506] IPVS: ftp: loaded support on port[0] = 21 22:42:54 executing program 5: r0 = socket(0x40000000015, 0x805, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) getsockopt(r0, 0x114, 0x271c, 0x0, &(0x7f000033bffc)) [ 356.827486] IPVS: ftp: loaded support on port[0] = 21 22:42:54 executing program 3: getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, 0x0, &(0x7f0000000100)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) lsetxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) ioctl$KVM_GET_MP_STATE(0xffffffffffffffff, 0x8004ae98, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, 0x0, &(0x7f00000001c0)) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) 22:42:54 executing program 1: getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, 0x0, &(0x7f0000000100)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) lsetxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) ioctl$KVM_GET_MP_STATE(0xffffffffffffffff, 0x8004ae98, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, 0x0, &(0x7f00000001c0)) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) 22:42:54 executing program 4: getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, 0x0, &(0x7f0000000100)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) lsetxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) ioctl$KVM_GET_MP_STATE(0xffffffffffffffff, 0x8004ae98, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, 0x0, &(0x7f00000001c0)) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) 22:42:54 executing program 0: open$dir(0x0, 0x0, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0xc9012, 0xffffffffffffffff, 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$cec(0x0, 0x3, 0x2) clock_gettime(0x0, 0x0) mq_timedreceive(0xffffffffffffffff, 0x0, 0x0, 0x80000000, &(0x7f0000000a00)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000040)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x66060000) 22:42:54 executing program 5: getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, 0x0, &(0x7f0000000100)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) lsetxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) ioctl$KVM_GET_MP_STATE(0xffffffffffffffff, 0x8004ae98, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, 0x0, &(0x7f00000001c0)) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) 22:42:54 executing program 3: getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, 0x0, &(0x7f0000000100)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) lsetxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) ioctl$KVM_GET_MP_STATE(0xffffffffffffffff, 0x8004ae98, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, 0x0, &(0x7f00000001c0)) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) 22:42:54 executing program 4: getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, 0x0, &(0x7f0000000100)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) lsetxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) ioctl$KVM_GET_MP_STATE(0xffffffffffffffff, 0x8004ae98, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, 0x0, &(0x7f00000001c0)) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) 22:42:54 executing program 1: getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, 0x0, &(0x7f0000000100)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) lsetxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) ioctl$KVM_GET_MP_STATE(0xffffffffffffffff, 0x8004ae98, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, 0x0, &(0x7f00000001c0)) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) [ 357.321382] IPVS: ftp: loaded support on port[0] = 21 22:42:54 executing program 2: open$dir(0x0, 0x0, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0xc9012, 0xffffffffffffffff, 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$cec(0x0, 0x3, 0x2) clock_gettime(0x0, 0x0) mq_timedreceive(0xffffffffffffffff, 0x0, 0x0, 0x80000000, &(0x7f0000000a00)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000040)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x66060000) 22:42:55 executing program 3: getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, 0x0, &(0x7f0000000100)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) lsetxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) ioctl$KVM_GET_MP_STATE(0xffffffffffffffff, 0x8004ae98, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, 0x0, &(0x7f00000001c0)) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) 22:42:55 executing program 5: getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, 0x0, &(0x7f0000000100)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) lsetxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) ioctl$KVM_GET_MP_STATE(0xffffffffffffffff, 0x8004ae98, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, 0x0, &(0x7f00000001c0)) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) 22:42:55 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'team_slave_0\x00', 0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x7e, 0x3, 0x9, 0x0, 0xffffffffffffffff, 0x0, [], r1, 0xffffffffffffffff, 0x8000000000000000}, 0x3c) 22:42:55 executing program 4: getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, 0x0, &(0x7f0000000100)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) lsetxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) ioctl$KVM_GET_MP_STATE(0xffffffffffffffff, 0x8004ae98, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, 0x0, &(0x7f00000001c0)) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) [ 357.660954] IPVS: ftp: loaded support on port[0] = 21 22:42:55 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'team_slave_0\x00', 0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x7e, 0x3, 0x9, 0x0, 0xffffffffffffffff, 0x0, [], r1, 0xffffffffffffffff, 0x8000000000000000}, 0x3c) 22:42:55 executing program 0: open$dir(0x0, 0x0, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0xc9012, 0xffffffffffffffff, 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$cec(0x0, 0x3, 0x2) clock_gettime(0x0, 0x0) mq_timedreceive(0xffffffffffffffff, 0x0, 0x0, 0x80000000, &(0x7f0000000a00)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000040)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x66060000) 22:42:55 executing program 3: getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, 0x0, &(0x7f0000000100)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) lsetxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) ioctl$KVM_GET_MP_STATE(0xffffffffffffffff, 0x8004ae98, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, 0x0, &(0x7f00000001c0)) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) [ 357.905879] IPVS: ftp: loaded support on port[0] = 21 22:42:55 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'team_slave_0\x00', 0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x7e, 0x3, 0x9, 0x0, 0xffffffffffffffff, 0x0, [], r1, 0xffffffffffffffff, 0x8000000000000000}, 0x3c) 22:42:55 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ifreq(r1, 0x890b, &(0x7f0000000100)={'veth0\x00\x00\x00\x02\x00', @ifru_settings={0x0, 0x0, @fr=0x0}}) 22:42:55 executing program 5: getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, 0x0, &(0x7f0000000100)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) lsetxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) ioctl$KVM_GET_MP_STATE(0xffffffffffffffff, 0x8004ae98, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, 0x0, &(0x7f00000001c0)) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) 22:42:55 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'team_slave_0\x00', 0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x7e, 0x3, 0x9, 0x0, 0xffffffffffffffff, 0x0, [], r1, 0xffffffffffffffff, 0x8000000000000000}, 0x3c) 22:42:55 executing program 2: open$dir(0x0, 0x0, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0xc9012, 0xffffffffffffffff, 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$cec(0x0, 0x3, 0x2) clock_gettime(0x0, 0x0) mq_timedreceive(0xffffffffffffffff, 0x0, 0x0, 0x80000000, &(0x7f0000000a00)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000040)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x66060000) 22:42:55 executing program 3: getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, 0x0, &(0x7f0000000100)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) lsetxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) ioctl$KVM_GET_MP_STATE(0xffffffffffffffff, 0x8004ae98, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, 0x0, &(0x7f00000001c0)) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) 22:42:55 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ifreq(r1, 0x890b, &(0x7f0000000100)={'veth0\x00\x00\x00\x02\x00', @ifru_settings={0x0, 0x0, @fr=0x0}}) 22:42:55 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000180)={0x0, 0x0}) 22:42:55 executing program 1: r0 = open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) fcntl$setlease(r0, 0x400, 0x0) rt_sigprocmask(0x0, &(0x7f0000da1000)={0xfffffffffffffffe}, 0x0, 0x8) rt_sigtimedwait(&(0x7f0000061000)={0xfffffffffffffffd}, 0x0, 0x0, 0x8) truncate(&(0x7f0000000080)='./file0\x00', 0x0) ioctl$int_out(r0, 0x5460, &(0x7f00000000c0)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) 22:42:55 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000012000/0x18000)=nil, &(0x7f0000000240)=[@text16={0x10, &(0x7f00000001c0)="0f8e92636766c7442400000000806766c7442402005000006766c744240600000000670f011c24660f08ba4000b000ee67f30f092e6626f2a780360078040f9c55db0fc733b867008ec8", 0x4a}], 0x1, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000015000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 358.434563] IPVS: ftp: loaded support on port[0] = 21 22:42:55 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ifreq(r1, 0x890b, &(0x7f0000000100)={'veth0\x00\x00\x00\x02\x00', @ifru_settings={0x0, 0x0, @fr=0x0}}) 22:42:55 executing program 0: ioctl$TCSETAW(0xffffffffffffffff, 0x5407, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x7ff}) r0 = socket(0xa, 0x1, 0x0) getsockopt$inet6_int(r0, 0x6, 0x23, &(0x7f0000000100), &(0x7f0000013000)=0x10) 22:42:55 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0xd) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(&(0x7f0000000080)='./file1\x00', 0x81fe, 0x0) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f0000000140)={0x0, 0x0, 0x800000000000055, 0x0, 0x0, [{}]}) 22:42:56 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ifreq(r1, 0x890b, &(0x7f0000000100)={'veth0\x00\x00\x00\x02\x00', @ifru_settings={0x0, 0x0, @fr=0x0}}) 22:42:56 executing program 5: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="44da718f1d0edbff3b63a3a3e0000015e08000006c41f0e900000000f84d1b2e110000fc0c089891880000000000000000a4b57d0dfd2e2396"], 0x1}}, 0x0) r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x38) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 22:42:56 executing program 0: ioctl$TCSETAW(0xffffffffffffffff, 0x5407, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x7ff}) r0 = socket(0xa, 0x1, 0x0) getsockopt$inet6_int(r0, 0x6, 0x23, &(0x7f0000000100), &(0x7f0000013000)=0x10) 22:42:56 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$inet6(0xa, 0x1000000000002, 0x40000000088) setsockopt$inet6_udp_int(r1, 0x11, 0x1, &(0x7f0000000100)=0x3, 0x4) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f00000000c0)=0x7, 0x4) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f0000000000)={0xa, 0x4e21, 0x0, @ipv4}, 0x1c) setsockopt$inet6_udp_int(r1, 0x11, 0x1, &(0x7f0000000080), 0x4) 22:42:56 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0x0, 0x0) ioctl$int_out(r0, 0x8100b10080004522, 0x0) 22:42:56 executing program 0: ioctl$TCSETAW(0xffffffffffffffff, 0x5407, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x7ff}) r0 = socket(0xa, 0x1, 0x0) getsockopt$inet6_int(r0, 0x6, 0x23, &(0x7f0000000100), &(0x7f0000013000)=0x10) 22:42:56 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f00000006c0)=ANY=[@ANYRES32=0x0, @ANYBLOB="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"], &(0x7f0000000140)=0x2) getsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000000180)={0x0, 0x8, 0x9, 0x401}, &(0x7f00000001c0)=0x10) getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000240)={r1, 0x7, 0x0, 0xa72, 0x0, 0x0, 0x8, 0x4, {r2, @in6={{0xa, 0x0, 0xd17, @mcast1, 0x1}}, 0xffffffffffffff15, 0xf044, 0xffffffffffffffc1, 0x0, 0x3}}, &(0x7f0000000300)=0xb0) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, &(0x7f00000000c0)={0xfffffffffffff000, 0x7fffffff, 0x1ff, 0xc6, 0x1}) syz_open_dev$adsp(0x0, 0x0, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000000)=0x32, 0x4) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000080)=0x3ffe, 0x4) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) 22:42:56 executing program 1: r0 = open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) fcntl$setlease(r0, 0x400, 0x0) rt_sigprocmask(0x0, &(0x7f0000da1000)={0xfffffffffffffffe}, 0x0, 0x8) rt_sigtimedwait(&(0x7f0000061000)={0xfffffffffffffffd}, 0x0, 0x0, 0x8) truncate(&(0x7f0000000080)='./file0\x00', 0x0) ioctl$int_out(r0, 0x5460, &(0x7f00000000c0)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) 22:42:56 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$inet6(0xa, 0x1000000000002, 0x40000000088) setsockopt$inet6_udp_int(r1, 0x11, 0x1, &(0x7f0000000100)=0x3, 0x4) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f00000000c0)=0x7, 0x4) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f0000000000)={0xa, 0x4e21, 0x0, @ipv4}, 0x1c) setsockopt$inet6_udp_int(r1, 0x11, 0x1, &(0x7f0000000080), 0x4) 22:42:56 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = getpgid(0x0) prctl$PR_SET_PTRACER(0x59616d61, r1) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x38) ptrace$cont(0x18, r2, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x46ec, 0x2, 0x8b}) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) 22:42:56 executing program 0: ioctl$TCSETAW(0xffffffffffffffff, 0x5407, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x7ff}) r0 = socket(0xa, 0x1, 0x0) getsockopt$inet6_int(r0, 0x6, 0x23, &(0x7f0000000100), &(0x7f0000013000)=0x10) 22:42:56 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f00000006c0)=ANY=[@ANYRES32=0x0, @ANYBLOB="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"], &(0x7f0000000140)=0x2) getsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000000180)={0x0, 0x8, 0x9, 0x401}, &(0x7f00000001c0)=0x10) getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000240)={r1, 0x7, 0x0, 0xa72, 0x0, 0x0, 0x8, 0x4, {r2, @in6={{0xa, 0x0, 0xd17, @mcast1, 0x1}}, 0xffffffffffffff15, 0xf044, 0xffffffffffffffc1, 0x0, 0x3}}, &(0x7f0000000300)=0xb0) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, &(0x7f00000000c0)={0xfffffffffffff000, 0x7fffffff, 0x1ff, 0xc6, 0x1}) syz_open_dev$adsp(0x0, 0x0, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000000)=0x32, 0x4) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000080)=0x3ffe, 0x4) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) 22:42:56 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = getpgid(0x0) prctl$PR_SET_PTRACER(0x59616d61, r1) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x38) ptrace$cont(0x18, r2, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x46ec, 0x2, 0x8b}) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) [ 360.603279] net_ratelimit: 14 callbacks suppressed [ 360.603286] protocol 88fb is buggy, dev hsr_slave_0 [ 360.613390] protocol 88fb is buggy, dev hsr_slave_1 [ 361.083244] protocol 88fb is buggy, dev hsr_slave_0 [ 361.088341] protocol 88fb is buggy, dev hsr_slave_1 [ 361.243266] protocol 88fb is buggy, dev hsr_slave_0 [ 361.248362] protocol 88fb is buggy, dev hsr_slave_1 [ 361.413265] protocol 88fb is buggy, dev hsr_slave_0 [ 361.418317] protocol 88fb is buggy, dev hsr_slave_1 22:42:59 executing program 5: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="44da718f1d0edbff3b63a3a3e0000015e08000006c41f0e900000000f84d1b2e110000fc0c089891880000000000000000a4b57d0dfd2e2396"], 0x1}}, 0x0) r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x38) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 22:42:59 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$inet6(0xa, 0x1000000000002, 0x40000000088) setsockopt$inet6_udp_int(r1, 0x11, 0x1, &(0x7f0000000100)=0x3, 0x4) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f00000000c0)=0x7, 0x4) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f0000000000)={0xa, 0x4e21, 0x0, @ipv4}, 0x1c) setsockopt$inet6_udp_int(r1, 0x11, 0x1, &(0x7f0000000080), 0x4) 22:42:59 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_read_part_table(0x0, 0x1, &(0x7f0000002540)=[{&(0x7f0000001540)="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", 0x200}]) 22:42:59 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f00000006c0)=ANY=[@ANYRES32=0x0, @ANYBLOB="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"], &(0x7f0000000140)=0x2) getsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000000180)={0x0, 0x8, 0x9, 0x401}, &(0x7f00000001c0)=0x10) getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000240)={r1, 0x7, 0x0, 0xa72, 0x0, 0x0, 0x8, 0x4, {r2, @in6={{0xa, 0x0, 0xd17, @mcast1, 0x1}}, 0xffffffffffffff15, 0xf044, 0xffffffffffffffc1, 0x0, 0x3}}, &(0x7f0000000300)=0xb0) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, &(0x7f00000000c0)={0xfffffffffffff000, 0x7fffffff, 0x1ff, 0xc6, 0x1}) syz_open_dev$adsp(0x0, 0x0, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000000)=0x32, 0x4) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000080)=0x3ffe, 0x4) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) 22:42:59 executing program 1: r0 = open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) fcntl$setlease(r0, 0x400, 0x0) rt_sigprocmask(0x0, &(0x7f0000da1000)={0xfffffffffffffffe}, 0x0, 0x8) rt_sigtimedwait(&(0x7f0000061000)={0xfffffffffffffffd}, 0x0, 0x0, 0x8) truncate(&(0x7f0000000080)='./file0\x00', 0x0) ioctl$int_out(r0, 0x5460, &(0x7f00000000c0)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) 22:42:59 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$inet6(0xa, 0x1000000000002, 0x40000000088) setsockopt$inet6_udp_int(r1, 0x11, 0x1, &(0x7f0000000100)=0x3, 0x4) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f00000000c0)=0x7, 0x4) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f0000000000)={0xa, 0x4e21, 0x0, @ipv4}, 0x1c) setsockopt$inet6_udp_int(r1, 0x11, 0x1, &(0x7f0000000080), 0x4) 22:42:59 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video35\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f00000000c0)={0x0, 0x0, "72515afdbb9417ae90cb5674e4fb8cb06c10948faab5842a0f75d6ded67b611c", 0x0, 0x0, 0x0, 0x0, 0x200}) 22:42:59 executing program 5: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="44da718f1d0edbff3b63a3a3e0000015e08000006c41f0e900000000f84d1b2e110000fc0c089891880000000000000000a4b57d0dfd2e2396"], 0x1}}, 0x0) r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x38) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 22:42:59 executing program 4: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f00000002c0)={0x0, 0x400, 0x2, {0x1, @win={{}, 0x0, 0x9, 0x0, 0x0, 0x0}}}) 22:42:59 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) close(r0) openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0x0, 0x0) io_setup(0xd30, &(0x7f0000000500)=0x0) io_submit(r1, 0x1, &(0x7f0000000040)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1000800000000005, 0x0, r0, 0x0}]) 22:42:59 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100006c000000000000000300000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 22:42:59 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = getpgid(0x0) prctl$PR_SET_PTRACER(0x59616d61, r1) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x38) ptrace$cont(0x18, r2, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x46ec, 0x2, 0x8b}) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) 22:42:59 executing program 0: r0 = syz_open_dev$binder(&(0x7f0000000040)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0xc0046209, 0x716000) 22:42:59 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x1b, 0x0, &(0x7f00000000c0)="b9ff0300000d698cb89e40f086dd01000005a4004000ffa377fbac", 0x0, 0x100}, 0x28) 22:42:59 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f00000006c0)=ANY=[@ANYRES32=0x0, @ANYBLOB="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"], &(0x7f0000000140)=0x2) getsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000000180)={0x0, 0x8, 0x9, 0x401}, &(0x7f00000001c0)=0x10) getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000240)={r1, 0x7, 0x0, 0xa72, 0x0, 0x0, 0x8, 0x4, {r2, @in6={{0xa, 0x0, 0xd17, @mcast1, 0x1}}, 0xffffffffffffff15, 0xf044, 0xffffffffffffffc1, 0x0, 0x3}}, &(0x7f0000000300)=0xb0) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, &(0x7f00000000c0)={0xfffffffffffff000, 0x7fffffff, 0x1ff, 0xc6, 0x1}) syz_open_dev$adsp(0x0, 0x0, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000000)=0x32, 0x4) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000080)=0x3ffe, 0x4) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) 22:42:59 executing program 1: r0 = open(&(0x7f0000000000)='./file0\x00', 0x80040, 0x0) fcntl$setlease(r0, 0x400, 0x0) rt_sigprocmask(0x0, &(0x7f0000da1000)={0xfffffffffffffffe}, 0x0, 0x8) rt_sigtimedwait(&(0x7f0000061000)={0xfffffffffffffffd}, 0x0, 0x0, 0x8) truncate(&(0x7f0000000080)='./file0\x00', 0x0) ioctl$int_out(r0, 0x5460, &(0x7f00000000c0)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) 22:42:59 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x18, 0x2f, 0x305, 0x0, 0x0, {0x20c, 0x1000000}, [@nested={0x4, 0x3}]}, 0x18}, 0x1, 0xffffff7f0e000000}, 0x0) 22:43:00 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x18, 0x2f, 0x305, 0x0, 0x0, {0x20c, 0x1000000}, [@nested={0x4, 0x3}]}, 0x18}, 0x1, 0xffffff7f0e000000}, 0x0) 22:43:00 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x1b, 0x0, &(0x7f00000000c0)="b9ff0300000d698cb89e40f086dd01000005a4004000ffa377fbac", 0x0, 0x100}, 0x28) [ 362.691955] protocol 88fb is buggy, dev hsr_slave_0 [ 362.697288] protocol 88fb is buggy, dev hsr_slave_1 22:43:02 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x18, 0x2f, 0x305, 0x0, 0x0, {0x20c, 0x1000000}, [@nested={0x4, 0x3}]}, 0x18}, 0x1, 0xffffff7f0e000000}, 0x0) 22:43:02 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x1b, 0x0, &(0x7f00000000c0)="b9ff0300000d698cb89e40f086dd01000005a4004000ffa377fbac", 0x0, 0x100}, 0x28) 22:43:02 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") fsetxattr$security_evm(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r1, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000040)='bbr\x00', 0x4) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f00000003c0), 0x4) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0x2bcf) shutdown(r1, 0x1) recvmsg(r1, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0xf99e}], 0x1, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x100) 22:43:02 executing program 5: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="44da718f1d0edbff3b63a3a3e0000015e08000006c41f0e900000000f84d1b2e110000fc0c089891880000000000000000a4b57d0dfd2e2396"], 0x1}}, 0x0) r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x38) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 22:43:03 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = getpgid(0x0) prctl$PR_SET_PTRACER(0x59616d61, r1) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x38) ptrace$cont(0x18, r2, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x46ec, 0x2, 0x8b}) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) 22:43:03 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000000)="2e00000022008151e00f80ecdb4cb904014865160b0001410100000000010019f000000003000000000000000000", 0x2e}], 0x1}, 0x0) 22:43:03 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @remote}, 0x10) 22:43:03 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x18, 0x2f, 0x305, 0x0, 0x0, {0x20c, 0x1000000}, [@nested={0x4, 0x3}]}, 0x18}, 0x1, 0xffffff7f0e000000}, 0x0) 22:43:03 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x1b, 0x0, &(0x7f00000000c0)="b9ff0300000d698cb89e40f086dd01000005a4004000ffa377fbac", 0x0, 0x100}, 0x28) 22:43:03 executing program 0: r0 = socket$inet(0x2, 0x3, 0x7) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@dev}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000280)={@multicast2, @local, 0x0, 0x2}, 0x3f6) [ 365.586740] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.1'. [ 365.611016] mac80211_hwsim: wmediumd released netlink socket, switching to perfect channel medium [ 365.627734] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.1'. 22:43:03 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @remote}, 0x10) 22:43:03 executing program 1: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = epoll_create1(0x0) r1 = syz_open_dev$swradio(&(0x7f0000000280)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000000)={0x4000201f, 0x3f000002}) close(r1) [ 365.638986] mac80211_hwsim: wmediumd released netlink socket, switching to perfect channel medium 22:43:03 executing program 0: r0 = socket$inet(0x2, 0x3, 0x7) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@dev}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000280)={@multicast2, @local, 0x0, 0x2}, 0x3f6) 22:43:03 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @remote}, 0x10) 22:43:03 executing program 1: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = epoll_create1(0x0) r1 = syz_open_dev$swradio(&(0x7f0000000280)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000000)={0x4000201f, 0x3f000002}) close(r1) [ 366.843295] net_ratelimit: 14 callbacks suppressed [ 366.843302] protocol 88fb is buggy, dev hsr_slave_0 [ 366.853545] protocol 88fb is buggy, dev hsr_slave_1 [ 367.323277] protocol 88fb is buggy, dev hsr_slave_0 [ 367.328392] protocol 88fb is buggy, dev hsr_slave_1 [ 367.483253] protocol 88fb is buggy, dev hsr_slave_0 [ 367.488336] protocol 88fb is buggy, dev hsr_slave_1 [ 367.643308] protocol 88fb is buggy, dev hsr_slave_0 [ 367.648425] protocol 88fb is buggy, dev hsr_slave_1 22:43:05 executing program 1: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = epoll_create1(0x0) r1 = syz_open_dev$swradio(&(0x7f0000000280)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000000)={0x4000201f, 0x3f000002}) close(r1) 22:43:06 executing program 1: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = epoll_create1(0x0) r1 = syz_open_dev$swradio(&(0x7f0000000280)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000000)={0x4000201f, 0x3f000002}) close(r1) 22:43:06 executing program 0: r0 = socket$inet(0x2, 0x3, 0x7) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@dev}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000280)={@multicast2, @local, 0x0, 0x2}, 0x3f6) 22:43:06 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @remote}, 0x10) 22:43:06 executing program 4: r0 = socket$inet(0x2, 0x3, 0x7) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@dev}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000280)={@multicast2, @local, 0x0, 0x2}, 0x3f6) 22:43:06 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000080)={0x0}, &(0x7f00000000c0)=0x10d) prlimit64(r1, 0x0, 0x0, &(0x7f0000000040)) 22:43:06 executing program 3: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x10, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(r0, 0xc040565f, &(0x7f00000000c0)={0xa, 0x0, 0x1, @stepwise}) 22:43:06 executing program 3: r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x0) read$rfkill(r0, &(0x7f0000000100), 0x8) ioctl$int_in(r0, 0x20800800c0045003, &(0x7f00000000c0)=0x8000000000003) 22:43:06 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) [ 368.666092] audit: type=1400 audit(1566168186.118:531): avc: denied { getrlimit } for pid=17924 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=process permissive=1 22:43:06 executing program 4: r0 = socket$inet(0x2, 0x3, 0x7) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@dev}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000280)={@multicast2, @local, 0x0, 0x2}, 0x3f6) 22:43:06 executing program 0: r0 = socket$inet(0x2, 0x3, 0x7) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@dev}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000280)={@multicast2, @local, 0x0, 0x2}, 0x3f6) 22:43:06 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000080)={0x0}, &(0x7f00000000c0)=0x10d) prlimit64(r1, 0x0, 0x0, &(0x7f0000000040)) 22:43:06 executing program 2: r0 = socket$inet6(0xa, 0x8000000000080001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000fca000)={0x100000001, {{0xa, 0x0, 0x0, @mcast1}}}, 0x88) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x310) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000180)={0x1, {{0xa, 0x0, 0x0, @mcast1}}}, 0x90) 22:43:06 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000080)={0x0}, &(0x7f00000000c0)=0x10d) prlimit64(r1, 0x0, 0x0, &(0x7f0000000040)) 22:43:06 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'michael_mic\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) io_setup(0x20000000001005, &(0x7f0000000880)=0x0) io_submit(r2, 0x1, &(0x7f0000000000)=[&(0x7f0000000200)={0x5004000, 0x0, 0x700000000000000, 0x8, 0x0, r1, 0x0}]) 22:43:06 executing program 4: r0 = socket$inet(0x2, 0x3, 0x7) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@dev}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000280)={@multicast2, @local, 0x0, 0x2}, 0x3f6) 22:43:06 executing program 0: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_TRY_FMT(r0, 0x40045644, &(0x7f0000000140)={0x2, @sliced}) 22:43:06 executing program 2: r0 = socket$inet6(0xa, 0x8000000000080001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000fca000)={0x100000001, {{0xa, 0x0, 0x0, @mcast1}}}, 0x88) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x310) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000180)={0x1, {{0xa, 0x0, 0x0, @mcast1}}}, 0x90) 22:43:06 executing program 1: r0 = socket$inet6(0xa, 0x8000000000080001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000fca000)={0x100000001, {{0xa, 0x0, 0x0, @mcast1}}}, 0x88) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x310) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000180)={0x1, {{0xa, 0x0, 0x0, @mcast1}}}, 0x90) 22:43:06 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000080)={0x0}, &(0x7f00000000c0)=0x10d) prlimit64(r1, 0x0, 0x0, &(0x7f0000000040)) 22:43:06 executing program 4: getpgrp(0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$bt_sco_SCO_OPTIONS(0xffffffffffffffff, 0x11, 0x1, &(0x7f0000000380)=""/241, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_T4(r0, 0x103, 0x7, &(0x7f0000000040), 0x4) 22:43:06 executing program 1: r0 = socket$inet6(0xa, 0x8000000000080001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000fca000)={0x100000001, {{0xa, 0x0, 0x0, @mcast1}}}, 0x88) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x310) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000180)={0x1, {{0xa, 0x0, 0x0, @mcast1}}}, 0x90) 22:43:06 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r0, r1) 22:43:06 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'michael_mic\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) io_setup(0x20000000001005, &(0x7f0000000880)=0x0) io_submit(r2, 0x1, &(0x7f0000000000)=[&(0x7f0000000200)={0x5004000, 0x0, 0x700000000000000, 0x8, 0x0, r1, 0x0}]) [ 368.923257] protocol 88fb is buggy, dev hsr_slave_0 [ 368.928470] protocol 88fb is buggy, dev hsr_slave_1 22:43:06 executing program 2: r0 = socket$inet6(0xa, 0x8000000000080001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000fca000)={0x100000001, {{0xa, 0x0, 0x0, @mcast1}}}, 0x88) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x310) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000180)={0x1, {{0xa, 0x0, 0x0, @mcast1}}}, 0x90) 22:43:06 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$rxrpc(0x21, 0x2, 0xa) bind$rxrpc(r2, &(0x7f00000000c0)=@in6={0x21, 0x3, 0x2, 0x1c, {0xa, 0x0, 0x0, @loopback}}, 0x24) listen(r2, 0x9) dup2(r1, r2) 22:43:06 executing program 1: r0 = socket$inet6(0xa, 0x8000000000080001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000fca000)={0x100000001, {{0xa, 0x0, 0x0, @mcast1}}}, 0x88) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000cc0)=ANY=[@ANYBLOB="01000000000000000a00000000000080ff010000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000050000000a00000000000000ff02000000000000000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a00000000000000ff0100000000000000000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e2ffffff00000000000000000000000000000000000000000000000000000000000000000000000000000000000a00000000000000ff01000000000000000000000000000100000000000000000000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a00000000000000ff0200000000000000000e9700000001000000000800000000000000000000000000000000000000000000000000000a00000000000000000000000000000000000000000000000000000000000000000000000000000000000000d542fe67602db0e60000000000000000000000000000000000000000000a00000000000000ff01000000000000000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000404110061ca7c53a5e42d81d1e234c789375b23d36d0b7bd15e04e813cd723f47ce56dffa04c1f203e51942829b769c021a132a47ccf4ac88c150bfed88c8aa4db6efaf6839814663b22c44fc5c577657253c50de4d1797c8a8195d482f8537d4f9aeaf495c01d5a31348917325b55b4136f49a20b50d881350d03870439d9749097585033743069099a0c14b7ca9b9fdbba4b31e8658d38d801fc0741fd6d09437d0c202fb169986510e42a9013102247ae529fe94b9529742c76d1825a441f8205c765deabf00d73bdca2a24edd06413885408b3e6ac5064c0c2ca8030c651abbfe7fe8803ff6a2a5de91470a21ed3a29fbe853bf2625e006004540a74b2b69d9add19c110c2cccfccdf7f99ea69994f81d903641120915cdcf49efeed42a2054e0544b5f53f43e4f7ab5b6037071e14229606aa0c3d7b7313232a904dbaedc6bd9fe7a1e54afc699624941b6c58fe24ca2338d97bbae7b60c350e72039f84328e39fdf444997aa080a882a81da9162e311a3a1317751ce8a5a5a9276d80d8755a310a02b4672670b0a15fe589cd39df71a78759639b0796a7cc3197bc9a302638b11c817f5e9c871f6303b6853bb5099353ad8935215303c1e9d381b97a3df7cdbca40ab1690206a71011634dde3cd1269561a4b2d88fcbac4c24079681734cd4e7cc81527da3f06586283b1c703f6f6baf8a533112d2ad0b26b033a612cf0a5e072a496b5da1634054452418062b5f3c51e14d137414fdff9b8569b80fa4b3571e80465660cfbc54d37cdc11484c13f70ecf4b894988764b3a606a2a84396a65228"], 0x310) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000180)={0x1, {{0xa, 0x0, 0x0, @mcast1}}}, 0x90) 22:43:06 executing program 4: getpgrp(0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$bt_sco_SCO_OPTIONS(0xffffffffffffffff, 0x11, 0x1, &(0x7f0000000380)=""/241, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_T4(r0, 0x103, 0x7, &(0x7f0000000040), 0x4) 22:43:06 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r0, r1) 22:43:06 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'michael_mic\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) io_setup(0x20000000001005, &(0x7f0000000880)=0x0) io_submit(r2, 0x1, &(0x7f0000000000)=[&(0x7f0000000200)={0x5004000, 0x0, 0x700000000000000, 0x8, 0x0, r1, 0x0}]) 22:43:06 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$rxrpc(0x21, 0x2, 0xa) bind$rxrpc(r2, &(0x7f00000000c0)=@in6={0x21, 0x3, 0x2, 0x1c, {0xa, 0x0, 0x0, @loopback}}, 0x24) listen(r2, 0x9) dup2(r1, r2) 22:43:06 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$rxrpc(0x21, 0x2, 0xa) bind$rxrpc(r2, &(0x7f00000000c0)=@in6={0x21, 0x3, 0x2, 0x1c, {0xa, 0x0, 0x0, @loopback}}, 0x24) listen(r2, 0x9) dup2(r1, r2) 22:43:06 executing program 2: r0 = socket$inet6(0xa, 0x8000000000080001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000fca000)={0x100000001, {{0xa, 0x0, 0x0, @mcast1}}}, 0x88) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x310) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000180)={0x1, {{0xa, 0x0, 0x0, @mcast1}}}, 0x90) 22:43:06 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r0, r1) 22:43:06 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$rxrpc(0x21, 0x2, 0xa) bind$rxrpc(r2, &(0x7f00000000c0)=@in6={0x21, 0x3, 0x2, 0x1c, {0xa, 0x0, 0x0, @loopback}}, 0x24) listen(r2, 0x9) dup2(r1, r2) 22:43:06 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$rxrpc(0x21, 0x2, 0xa) bind$rxrpc(r2, &(0x7f00000000c0)=@in6={0x21, 0x3, 0x2, 0x1c, {0xa, 0x0, 0x0, @loopback}}, 0x24) listen(r2, 0x9) dup2(r1, r2) 22:43:06 executing program 2: r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000100)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, 0x0, 0x0) 22:43:06 executing program 4: getpgrp(0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$bt_sco_SCO_OPTIONS(0xffffffffffffffff, 0x11, 0x1, &(0x7f0000000380)=""/241, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_T4(r0, 0x103, 0x7, &(0x7f0000000040), 0x4) 22:43:06 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'michael_mic\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) io_setup(0x20000000001005, &(0x7f0000000880)=0x0) io_submit(r2, 0x1, &(0x7f0000000000)=[&(0x7f0000000200)={0x5004000, 0x0, 0x700000000000000, 0x8, 0x0, r1, 0x0}]) 22:43:06 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r0, r1) 22:43:06 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$rxrpc(0x21, 0x2, 0xa) bind$rxrpc(r2, &(0x7f00000000c0)=@in6={0x21, 0x3, 0x2, 0x1c, {0xa, 0x0, 0x0, @loopback}}, 0x24) listen(r2, 0x9) dup2(r1, r2) 22:43:06 executing program 0: syz_open_procfs(0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x0, 0x0) creat(0x0, 0x6857b21ff1155d91) open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000100)=ANY=[], 0x225) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, &(0x7f0000000300), 0x7fff) 22:43:06 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$rxrpc(0x21, 0x2, 0xa) bind$rxrpc(r2, &(0x7f00000000c0)=@in6={0x21, 0x3, 0x2, 0x1c, {0xa, 0x0, 0x0, @loopback}}, 0x24) listen(r2, 0x9) dup2(r1, r2) 22:43:06 executing program 2: bind$alg(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r0, r1) 22:43:06 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='attr/prev\x00') write$char_usb(r0, 0x0, 0x0) 22:43:06 executing program 1: mmap(&(0x7f0000000000/0xff7000)=nil, 0xff7000, 0x5, 0x31, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_opts(r0, 0x0, 0xc, &(0x7f00000000c0)='D', 0x1) 22:43:06 executing program 4: getpgrp(0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$bt_sco_SCO_OPTIONS(0xffffffffffffffff, 0x11, 0x1, &(0x7f0000000380)=""/241, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_T4(r0, 0x103, 0x7, &(0x7f0000000040), 0x4) 22:43:07 executing program 3: fcntl$getown(0xffffffffffffffff, 0x9) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x8) creat(&(0x7f00000008c0)='./file0\x00', 0x10100) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) socket$inet(0x10, 0x3, 0xc) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000500)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000880)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000700)={0x2c, r0, 0x0, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x4}, @TIPC_NLA_MEDIA={0x4}, @TIPC_NLA_NODE={0x8, 0x6, [@TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_NODE={0x4}, @TIPC_NLA_MON={0x4}]}, 0x2c}}, 0x20004014) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, 0x0, 0x0) semget$private(0x0, 0x2, 0x200) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000580)={{{@in=@multicast1, @in=@multicast2}}, {{@in=@initdev}, 0x0, @in=@broadcast}}, &(0x7f0000000080)=0xe8) fstat(0xffffffffffffffff, 0x0) iopl(0x8) semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f0000000480)={{0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x81f, 0x0, 0x2}) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x24, &(0x7f00000002c0), 0x4) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, &(0x7f0000000340)={0x0, 0x0}) 22:43:07 executing program 5: r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x40000000806, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0xd) ioctl$UI_SET_RELBIT(0xffffffffffffffff, 0x40045566, 0x8) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x0, 0x0) getuid() fsetxattr$trusted_overlay_upper(r1, &(0x7f0000000a80)='trusted.overlay.upper\x00', &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0x1, 0x2) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000180)) fcntl$getown(r0, 0x9) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000b80)) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) r2 = getpgid(0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000001040)={{{@in=@loopback, @in6=@ipv4={[], [], @remote}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000f00)=0xfffffffffffffd81) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f00000009c0)='./file0\x00', &(0x7f0000000280)='\rAanon_inodefs\x00', 0x3fe, 0x0) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, 0x0, 0x0) getpgid(r2) io_setup(0x4, &(0x7f0000000240)=0x0) io_submit(r5, 0x1, &(0x7f0000000a00)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x99d9, 0xffffffffffffffff, &(0x7f00000003c0)="cdc2185b2083", 0x6, 0xffffffffffffefff, 0x0, 0x1, r1}]) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x1) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000900), &(0x7f0000000100)=0x14) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) ioctl$UI_SET_RELBIT(r0, 0x40045566, 0x4) writev(r4, &(0x7f0000001240)=[{&(0x7f0000001140)="f915877a3a6225bc315439956a7137a52348344248ef9546ad7fbeb8cdd6482a9a85a5cc0ddd358d82add4a8a9f8fd7ed47ba8c9c647bea582c83fb915c94754380b4e73197fe4b2e78bf8e826ff3f071b50e22f257cfb739e3a97abed3328ec61e7ea4dd9f5cdef61e319b50f3daece11390d20632fb9c63280c8296509cc68ca26ea9604739efbda199a5d01c00d97f4cd057c4d1277ccf2af1c880d63d3b7835f8222ad06d15508aa82854ddbabe24ac7721fff46c62f4f995018ce55ce5189af49b75b28fcf95b0f1db7d8e7a301c1672179", 0xd4}], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000a40)={0xb, 0xffffffff, 0x2, 0x0, 0x0, r0, 0x4, [], r3}, 0x3c) syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000000)=0x2a2692a4) 22:43:07 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0xa00000000000000, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x1, 0x948, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff010000000b00000000000000000062726964676530000000000000000000626f6e645f736c6176655f3000000000736974300000000000000000000000007465716c3000000000000000000000000000000000000000000000000180c20000000000000000000000b8080000b8080000e8080000616d6f6e670000000000000000000000000000000000000000000400000000001804000000000000000000000c000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007b46fecfb2a7db6e0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d6599200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000053cbf7eee533b170000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fffffffffffffff8000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000072656469726563740000000000000000000000000000000000000000000000000800"/2376]}, 0x9c0) [ 369.627677] ebt_among: src integrity fail: 155 22:43:07 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0xa00000000000000, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x1, 0x948, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff010000000b00000000000000000062726964676530000000000000000000626f6e645f736c6176655f3000000000736974300000000000000000000000007465716c3000000000000000000000000000000000000000000000000180c20000000000000000000000b8080000b8080000e8080000616d6f6e670000000000000000000000000000000000000000000400000000001804000000000000000000000c000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007b46fecfb2a7db6e0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d6599200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000053cbf7eee533b170000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fffffffffffffff8000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000072656469726563740000000000000000000000000000000000000000000000000800"/2376]}, 0x9c0) [ 369.649818] ebt_among: src integrity fail: 155 22:43:07 executing program 1: mmap(&(0x7f0000000000/0xff7000)=nil, 0xff7000, 0x5, 0x31, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_opts(r0, 0x0, 0xc, &(0x7f00000000c0)='D', 0x1) [ 369.719016] ebt_among: src integrity fail: 155 22:43:07 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)={[{@largeio='largeio'}, {@mtpt='mtpt'}]}) 22:43:07 executing program 4: r0 = socket(0x1e, 0x4, 0x0) r1 = socket(0x1e, 0x2, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, 0x0, &(0x7f00000007c0)) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000080)=@req={0x3fc}, 0x10) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x2}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f0000000a40), 0x8000000000000b0, 0x101d0) 22:43:07 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0xa00000000000000, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x1, 0x948, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff010000000b00000000000000000062726964676530000000000000000000626f6e645f736c6176655f3000000000736974300000000000000000000000007465716c3000000000000000000000000000000000000000000000000180c20000000000000000000000b8080000b8080000e8080000616d6f6e670000000000000000000000000000000000000000000400000000001804000000000000000000000c000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007b46fecfb2a7db6e0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d6599200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000053cbf7eee533b170000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fffffffffffffff8000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000072656469726563740000000000000000000000000000000000000000000000000800"/2376]}, 0x9c0) 22:43:07 executing program 5: r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x40000000806, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0xd) ioctl$UI_SET_RELBIT(0xffffffffffffffff, 0x40045566, 0x8) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x0, 0x0) getuid() fsetxattr$trusted_overlay_upper(r1, &(0x7f0000000a80)='trusted.overlay.upper\x00', &(0x7f0000000400)=ANY=[@ANYBLOB="80fb110107d3f7c938c71552ddfe3badced0701e219c04ab50a4669892cf284d0a895104617a4e3a262c4ecd25a6df5ab9a7e4ef4feb788b0b68bfec72fb55992e2f032600e5108ab161ba562828500d00002af8a9e0d3684bbf9dfbd457a8f64f969cb0a162aac4dfd3c0409ec6730101000000001f00f459e0cd5478cf1bd40f26945f6478b87863e6f4ee9748f03f383ff8439d89d3200384ee36691267ba7341e3dc29d087b5c19ce9645e6edc832e1c3d93a0d6e30ea54a6da46f928a051098c36fa25ada979d9821e4d5c6c0a62bf325f86146a62891c998a10d28f38048f5c7d4b57505effcec0be72061a386fdec00003edd0b04a6536473f5e0f055fe0103189bfb8d6079466eaaaa836c807d3bb00b13c068684d18ab92a3bdec9bb1fd11762070e5885d000000c706a27d5d527ff7953f230abbd9ae1dc7c1bd41f6e2f8b556042f0a0626dd72dd721acdf00a174dda9569df8681b4cab93e5a4b0e8ba1c099ece10229cb4df94e1d5933b581f8ce5a829a00ff13d1fc5059c86dcadefbcdb66604e903941bba898e1712022d08f7b96623522b5c8c266a9d362799fa5e907053c4b38a8aab50b083f64c0b9f6ecf000000000000000000842c4cc2adda4502243fc87b6746869853accd1eeb793822d5fe56258ab09c4aac58a559d315d277157d8ea29a501027d2feb281833a9adf590507ea3ed3ea"], 0x1, 0x2) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000180)) fcntl$getown(r0, 0x9) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000b80)) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) r2 = getpgid(0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000001040)={{{@in=@loopback, @in6=@ipv4={[], [], @remote}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000f00)=0xfffffffffffffd81) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f00000009c0)='./file0\x00', &(0x7f0000000280)='\rAanon_inodefs\x00', 0x3fe, 0x0) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, 0x0, 0x0) getpgid(r2) io_setup(0x4, &(0x7f0000000240)=0x0) io_submit(r5, 0x1, &(0x7f0000000a00)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x99d9, 0xffffffffffffffff, &(0x7f00000003c0)="cdc2185b2083", 0x6, 0xffffffffffffefff, 0x0, 0x1, r1}]) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x1) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000900), &(0x7f0000000100)=0x14) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) ioctl$UI_SET_RELBIT(r0, 0x40045566, 0x4) writev(r4, &(0x7f0000001240)=[{&(0x7f0000001140)="f915877a3a6225bc315439956a7137a52348344248ef9546ad7fbeb8cdd6482a9a85a5cc0ddd358d82add4a8a9f8fd7ed47ba8c9c647bea582c83fb915c94754380b4e73197fe4b2e78bf8e826ff3f071b50e22f257cfb739e3a97abed3328ec61e7ea4dd9f5cdef61e319b50f3daece11390d20632fb9c63280c8296509cc68ca26ea9604739efbda199a5d01c00d97f4cd057c4d1277ccf2af1c880d63d3b7835f8222ad06d15508aa82854ddbabe24ac7721fff46c62f4f995018ce55ce5189af49b75b28fcf95b0f1db7d8e7a301c1672179", 0xd4}], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000a40)={0xb, 0xffffffff, 0x2, 0x0, 0x0, r0, 0x4, [], r3}, 0x3c) syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000000)=0x2a2692a4) 22:43:07 executing program 1: mmap(&(0x7f0000000000/0xff7000)=nil, 0xff7000, 0x5, 0x31, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_opts(r0, 0x0, 0xc, &(0x7f00000000c0)='D', 0x1) 22:43:07 executing program 3: r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x40000000806, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0xd) ioctl$UI_SET_RELBIT(0xffffffffffffffff, 0x40045566, 0x8) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x0, 0x0) getuid() fsetxattr$trusted_overlay_upper(r1, &(0x7f0000000a80)='trusted.overlay.upper\x00', &(0x7f0000000400)=ANY=[@ANYBLOB="80fb110107d3f7c938c71552ddfe3badced0701e219c04ab50a4669892cf284d0a895104617a4e3a262c4ecd25a6df5ab9a7e4ef4feb788b0b68bfec72fb55992e2f032600e5108ab161ba562828500d00002af8a9e0d3684bbf9dfbd457a8f64f969cb0a162aac4dfd3c0409ec6730101000000001f00f459e0cd5478cf1bd40f26945f6478b87863e6f4ee9748f03f383ff8439d89d3200384ee36691267ba7341e3dc29d087b5c19ce9645e6edc832e1c3d93a0d6e30ea54a6da46f928a051098c36fa25ada979d9821e4d5c6c0a62bf325f86146a62891c998a10d28f38048f5c7d4b57505effcec0be72061a386fdec00003edd0b04a6536473f5e0f055fe0103189bfb8d6079466eaaaa836c807d3bb00b13c068684d18ab92a3bdec9bb1fd11762070e5885d000000c706a27d5d527ff7953f230abbd9ae1dc7c1bd41f6e2f8b556042f0a0626dd72dd721acdf00a174dda9569df8681b4cab93e5a4b0e8ba1c099ece10229cb4df94e1d5933b581f8ce5a829a00ff13d1fc5059c86dcadefbcdb66604e903941bba898e1712022d08f7b96623522b5c8c266a9d362799fa5e907053c4b38a8aab50b083f64c0b9f6ecf000000000000000000842c4cc2adda4502243fc87b6746869853accd1eeb793822d5fe56258ab09c4aac58a559d315d277157d8ea29a501027d2feb281833a9adf590507ea3ed3ea"], 0x1, 0x2) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000180)) fcntl$getown(r0, 0x9) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000b80)) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) r2 = getpgid(0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000001040)={{{@in=@loopback, @in6=@ipv4={[], [], @remote}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000f00)=0xfffffffffffffd81) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f00000009c0)='./file0\x00', &(0x7f0000000280)='\rAanon_inodefs\x00', 0x3fe, 0x0) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, 0x0, 0x0) getpgid(r2) io_setup(0x4, &(0x7f0000000240)=0x0) io_submit(r5, 0x1, &(0x7f0000000a00)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x99d9, 0xffffffffffffffff, &(0x7f00000003c0)="cdc2185b2083", 0x6, 0xffffffffffffefff, 0x0, 0x1, r1}]) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x1) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000900), &(0x7f0000000100)=0x14) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) ioctl$UI_SET_RELBIT(r0, 0x40045566, 0x4) writev(r4, &(0x7f0000001240)=[{&(0x7f0000001140)="f915877a3a6225bc315439956a7137a52348344248ef9546ad7fbeb8cdd6482a9a85a5cc0ddd358d82add4a8a9f8fd7ed47ba8c9c647bea582c83fb915c94754380b4e73197fe4b2e78bf8e826ff3f071b50e22f257cfb739e3a97abed3328ec61e7ea4dd9f5cdef61e319b50f3daece11390d20632fb9c63280c8296509cc68ca26ea9604739efbda199a5d01c00d97f4cd057c4d1277ccf2af1c880d63d3b7835f8222ad06d15508aa82854ddbabe24ac7721fff46c62f4f995018ce55ce5189af49b75b28fcf95b0f1db7d8e7a301c1672179", 0xd4}], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000a40)={0xb, 0xffffffff, 0x2, 0x0, 0x0, r0, 0x4, [], r3}, 0x3c) syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000000)=0x2a2692a4) 22:43:07 executing program 0: syz_open_procfs(0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x0, 0x0) creat(0x0, 0x6857b21ff1155d91) open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000100)=ANY=[], 0x225) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, &(0x7f0000000300), 0x7fff) 22:43:07 executing program 1: mmap(&(0x7f0000000000/0xff7000)=nil, 0xff7000, 0x5, 0x31, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_opts(r0, 0x0, 0xc, &(0x7f00000000c0)='D', 0x1) [ 370.071990] ebt_among: src integrity fail: 155 22:43:07 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0xa00000000000000, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x1, 0x948, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff010000000b00000000000000000062726964676530000000000000000000626f6e645f736c6176655f3000000000736974300000000000000000000000007465716c3000000000000000000000000000000000000000000000000180c20000000000000000000000b8080000b8080000e8080000616d6f6e670000000000000000000000000000000000000000000400000000001804000000000000000000000c000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007b46fecfb2a7db6e0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d6599200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000053cbf7eee533b170000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fffffffffffffff8000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000072656469726563740000000000000000000000000000000000000000000000000800"/2376]}, 0x9c0) 22:43:07 executing program 4: r0 = socket(0x1e, 0x4, 0x0) r1 = socket(0x1e, 0x2, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, 0x0, &(0x7f00000007c0)) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000080)=@req={0x3fc}, 0x10) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x2}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f0000000a40), 0x8000000000000b0, 0x101d0) 22:43:07 executing program 3: r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x40000000806, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0xd) ioctl$UI_SET_RELBIT(0xffffffffffffffff, 0x40045566, 0x8) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x0, 0x0) getuid() fsetxattr$trusted_overlay_upper(r1, &(0x7f0000000a80)='trusted.overlay.upper\x00', &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0x1, 0x2) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000180)) fcntl$getown(r0, 0x9) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000b80)) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) r2 = getpgid(0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000001040)={{{@in=@loopback, @in6=@ipv4={[], [], @remote}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000f00)=0xfffffffffffffd81) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f00000009c0)='./file0\x00', &(0x7f0000000280)='\rAanon_inodefs\x00', 0x3fe, 0x0) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, 0x0, 0x0) getpgid(r2) io_setup(0x4, &(0x7f0000000240)=0x0) io_submit(r5, 0x1, &(0x7f0000000a00)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x99d9, 0xffffffffffffffff, &(0x7f00000003c0)="cdc2185b2083", 0x6, 0xffffffffffffefff, 0x0, 0x1, r1}]) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x1) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000900), &(0x7f0000000100)=0x14) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) ioctl$UI_SET_RELBIT(r0, 0x40045566, 0x4) writev(r4, &(0x7f0000001240)=[{&(0x7f0000001140)="f915877a3a6225bc315439956a7137a52348344248ef9546ad7fbeb8cdd6482a9a85a5cc0ddd358d82add4a8a9f8fd7ed47ba8c9c647bea582c83fb915c94754380b4e73197fe4b2e78bf8e826ff3f071b50e22f257cfb739e3a97abed3328ec61e7ea4dd9f5cdef61e319b50f3daece11390d20632fb9c63280c8296509cc68ca26ea9604739efbda199a5d01c00d97f4cd057c4d1277ccf2af1c880d63d3b7835f8222ad06d15508aa82854ddbabe24ac7721fff46c62f4f995018ce55ce5189af49b75b28fcf95b0f1db7d8e7a301c1672179", 0xd4}], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000a40)={0xb, 0xffffffff, 0x2, 0x0, 0x0, r0, 0x4, [], r3}, 0x3c) syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000000)=0x2a2692a4) [ 370.203043] ebt_among: src integrity fail: 155 22:43:07 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x40000000806, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0xd) ioctl$UI_SET_RELBIT(0xffffffffffffffff, 0x40045566, 0x8) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x0, 0x0) getuid() fsetxattr$trusted_overlay_upper(r1, &(0x7f0000000a80)='trusted.overlay.upper\x00', &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0x1, 0x2) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000180)) fcntl$getown(r0, 0x9) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000b80)) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) r2 = getpgid(0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000001040)={{{@in=@loopback, @in6=@ipv4={[], [], @remote}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000f00)=0xfffffffffffffd81) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f00000009c0)='./file0\x00', &(0x7f0000000280)='\rAanon_inodefs\x00', 0x3fe, 0x0) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, 0x0, 0x0) getpgid(r2) io_setup(0x4, &(0x7f0000000240)=0x0) io_submit(r5, 0x1, &(0x7f0000000a00)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x99d9, 0xffffffffffffffff, &(0x7f00000003c0)="cdc2185b2083", 0x6, 0xffffffffffffefff, 0x0, 0x1, r1}]) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x1) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000900), &(0x7f0000000100)=0x14) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) ioctl$UI_SET_RELBIT(r0, 0x40045566, 0x4) writev(r4, &(0x7f0000001240)=[{&(0x7f0000001140)="f915877a3a6225bc315439956a7137a52348344248ef9546ad7fbeb8cdd6482a9a85a5cc0ddd358d82add4a8a9f8fd7ed47ba8c9c647bea582c83fb915c94754380b4e73197fe4b2e78bf8e826ff3f071b50e22f257cfb739e3a97abed3328ec61e7ea4dd9f5cdef61e319b50f3daece11390d20632fb9c63280c8296509cc68ca26ea9604739efbda199a5d01c00d97f4cd057c4d1277ccf2af1c880d63d3b7835f8222ad06d15508aa82854ddbabe24ac7721fff46c62f4f995018ce55ce5189af49b75b28fcf95b0f1db7d8e7a301c1672179", 0xd4}], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000a40)={0xb, 0xffffffff, 0x2, 0x0, 0x0, r0, 0x4, [], r3}, 0x3c) syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000000)=0x2a2692a4) 22:43:07 executing program 5: r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x40000000806, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0xd) ioctl$UI_SET_RELBIT(0xffffffffffffffff, 0x40045566, 0x8) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x0, 0x0) getuid() fsetxattr$trusted_overlay_upper(r1, &(0x7f0000000a80)='trusted.overlay.upper\x00', &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0x1, 0x2) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000180)) fcntl$getown(r0, 0x9) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000b80)) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) r2 = getpgid(0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000001040)={{{@in=@loopback, @in6=@ipv4={[], [], @remote}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000f00)=0xfffffffffffffd81) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f00000009c0)='./file0\x00', &(0x7f0000000280)='\rAanon_inodefs\x00', 0x3fe, 0x0) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, 0x0, 0x0) getpgid(r2) io_setup(0x4, &(0x7f0000000240)=0x0) io_submit(r5, 0x1, &(0x7f0000000a00)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x99d9, 0xffffffffffffffff, &(0x7f00000003c0)="cdc2185b2083", 0x6, 0xffffffffffffefff, 0x0, 0x1, r1}]) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x1) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000900), &(0x7f0000000100)=0x14) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) ioctl$UI_SET_RELBIT(r0, 0x40045566, 0x4) writev(r4, &(0x7f0000001240)=[{&(0x7f0000001140)="f915877a3a6225bc315439956a7137a52348344248ef9546ad7fbeb8cdd6482a9a85a5cc0ddd358d82add4a8a9f8fd7ed47ba8c9c647bea582c83fb915c94754380b4e73197fe4b2e78bf8e826ff3f071b50e22f257cfb739e3a97abed3328ec61e7ea4dd9f5cdef61e319b50f3daece11390d20632fb9c63280c8296509cc68ca26ea9604739efbda199a5d01c00d97f4cd057c4d1277ccf2af1c880d63d3b7835f8222ad06d15508aa82854ddbabe24ac7721fff46c62f4f995018ce55ce5189af49b75b28fcf95b0f1db7d8e7a301c1672179", 0xd4}], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000a40)={0xb, 0xffffffff, 0x2, 0x0, 0x0, r0, 0x4, [], r3}, 0x3c) syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000000)=0x2a2692a4) 22:43:07 executing program 4: r0 = socket(0x1e, 0x4, 0x0) r1 = socket(0x1e, 0x2, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, 0x0, &(0x7f00000007c0)) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000080)=@req={0x3fc}, 0x10) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x2}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f0000000a40), 0x8000000000000b0, 0x101d0) 22:43:07 executing program 2: r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x40000000806, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0xd) ioctl$UI_SET_RELBIT(0xffffffffffffffff, 0x40045566, 0x8) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x0, 0x0) getuid() fsetxattr$trusted_overlay_upper(r1, &(0x7f0000000a80)='trusted.overlay.upper\x00', &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0x1, 0x2) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000180)) fcntl$getown(r0, 0x9) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000b80)) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) r2 = getpgid(0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000001040)={{{@in=@loopback, @in6=@ipv4={[], [], @remote}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000f00)=0xfffffffffffffd81) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f00000009c0)='./file0\x00', &(0x7f0000000280)='\rAanon_inodefs\x00', 0x3fe, 0x0) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, 0x0, 0x0) getpgid(r2) io_setup(0x4, &(0x7f0000000240)=0x0) io_submit(r5, 0x1, &(0x7f0000000a00)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x99d9, 0xffffffffffffffff, &(0x7f00000003c0)="cdc2185b2083", 0x6, 0xffffffffffffefff, 0x0, 0x1, r1}]) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x1) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000900), &(0x7f0000000100)=0x14) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) ioctl$UI_SET_RELBIT(r0, 0x40045566, 0x4) writev(r4, &(0x7f0000001240)=[{&(0x7f0000001140)="f915877a3a6225bc315439956a7137a52348344248ef9546ad7fbeb8cdd6482a9a85a5cc0ddd358d82add4a8a9f8fd7ed47ba8c9c647bea582c83fb915c94754380b4e73197fe4b2e78bf8e826ff3f071b50e22f257cfb739e3a97abed3328ec61e7ea4dd9f5cdef61e319b50f3daece11390d20632fb9c63280c8296509cc68ca26ea9604739efbda199a5d01c00d97f4cd057c4d1277ccf2af1c880d63d3b7835f8222ad06d15508aa82854ddbabe24ac7721fff46c62f4f995018ce55ce5189af49b75b28fcf95b0f1db7d8e7a301c1672179", 0xd4}], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000a40)={0xb, 0xffffffff, 0x2, 0x0, 0x0, r0, 0x4, [], r3}, 0x3c) syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000000)=0x2a2692a4) 22:43:08 executing program 3: r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x40000000806, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0xd) ioctl$UI_SET_RELBIT(0xffffffffffffffff, 0x40045566, 0x8) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x0, 0x0) getuid() fsetxattr$trusted_overlay_upper(r1, &(0x7f0000000a80)='trusted.overlay.upper\x00', &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0x1, 0x2) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000180)) fcntl$getown(r0, 0x9) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000b80)) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) r2 = getpgid(0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000001040)={{{@in=@loopback, @in6=@ipv4={[], [], @remote}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000f00)=0xfffffffffffffd81) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f00000009c0)='./file0\x00', &(0x7f0000000280)='\rAanon_inodefs\x00', 0x3fe, 0x0) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, 0x0, 0x0) getpgid(r2) io_setup(0x4, &(0x7f0000000240)=0x0) io_submit(r5, 0x1, &(0x7f0000000a00)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x99d9, 0xffffffffffffffff, &(0x7f00000003c0)="cdc2185b2083", 0x6, 0xffffffffffffefff, 0x0, 0x1, r1}]) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x1) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000900), &(0x7f0000000100)=0x14) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) ioctl$UI_SET_RELBIT(r0, 0x40045566, 0x4) writev(r4, &(0x7f0000001240)=[{&(0x7f0000001140)="f915877a3a6225bc315439956a7137a52348344248ef9546ad7fbeb8cdd6482a9a85a5cc0ddd358d82add4a8a9f8fd7ed47ba8c9c647bea582c83fb915c94754380b4e73197fe4b2e78bf8e826ff3f071b50e22f257cfb739e3a97abed3328ec61e7ea4dd9f5cdef61e319b50f3daece11390d20632fb9c63280c8296509cc68ca26ea9604739efbda199a5d01c00d97f4cd057c4d1277ccf2af1c880d63d3b7835f8222ad06d15508aa82854ddbabe24ac7721fff46c62f4f995018ce55ce5189af49b75b28fcf95b0f1db7d8e7a301c1672179", 0xd4}], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000a40)={0xb, 0xffffffff, 0x2, 0x0, 0x0, r0, 0x4, [], r3}, 0x3c) syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000000)=0x2a2692a4) 22:43:08 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x40000000806, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0xd) ioctl$UI_SET_RELBIT(0xffffffffffffffff, 0x40045566, 0x8) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x0, 0x0) getuid() fsetxattr$trusted_overlay_upper(r1, &(0x7f0000000a80)='trusted.overlay.upper\x00', &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0x1, 0x2) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000180)) fcntl$getown(r0, 0x9) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000b80)) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) r2 = getpgid(0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000001040)={{{@in=@loopback, @in6=@ipv4={[], [], @remote}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000f00)=0xfffffffffffffd81) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f00000009c0)='./file0\x00', &(0x7f0000000280)='\rAanon_inodefs\x00', 0x3fe, 0x0) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, 0x0, 0x0) getpgid(r2) io_setup(0x4, &(0x7f0000000240)=0x0) io_submit(r5, 0x1, &(0x7f0000000a00)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x99d9, 0xffffffffffffffff, &(0x7f00000003c0)="cdc2185b2083", 0x6, 0xffffffffffffefff, 0x0, 0x1, r1}]) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x1) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000900), &(0x7f0000000100)=0x14) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) ioctl$UI_SET_RELBIT(r0, 0x40045566, 0x4) writev(r4, &(0x7f0000001240)=[{&(0x7f0000001140)="f915877a3a6225bc315439956a7137a52348344248ef9546ad7fbeb8cdd6482a9a85a5cc0ddd358d82add4a8a9f8fd7ed47ba8c9c647bea582c83fb915c94754380b4e73197fe4b2e78bf8e826ff3f071b50e22f257cfb739e3a97abed3328ec61e7ea4dd9f5cdef61e319b50f3daece11390d20632fb9c63280c8296509cc68ca26ea9604739efbda199a5d01c00d97f4cd057c4d1277ccf2af1c880d63d3b7835f8222ad06d15508aa82854ddbabe24ac7721fff46c62f4f995018ce55ce5189af49b75b28fcf95b0f1db7d8e7a301c1672179", 0xd4}], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000a40)={0xb, 0xffffffff, 0x2, 0x0, 0x0, r0, 0x4, [], r3}, 0x3c) syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000000)=0x2a2692a4) 22:43:08 executing program 5: r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x40000000806, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0xd) ioctl$UI_SET_RELBIT(0xffffffffffffffff, 0x40045566, 0x8) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x0, 0x0) getuid() fsetxattr$trusted_overlay_upper(r1, &(0x7f0000000a80)='trusted.overlay.upper\x00', &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0x1, 0x2) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000180)) fcntl$getown(r0, 0x9) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000b80)) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) r2 = getpgid(0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000001040)={{{@in=@loopback, @in6=@ipv4={[], [], @remote}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000f00)=0xfffffffffffffd81) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f00000009c0)='./file0\x00', &(0x7f0000000280)='\rAanon_inodefs\x00', 0x3fe, 0x0) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, 0x0, 0x0) getpgid(r2) io_setup(0x4, &(0x7f0000000240)=0x0) io_submit(r5, 0x1, &(0x7f0000000a00)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x99d9, 0xffffffffffffffff, &(0x7f00000003c0)="cdc2185b2083", 0x6, 0xffffffffffffefff, 0x0, 0x1, r1}]) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x1) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000900), &(0x7f0000000100)=0x14) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) ioctl$UI_SET_RELBIT(r0, 0x40045566, 0x4) writev(r4, &(0x7f0000001240)=[{&(0x7f0000001140)="f915877a3a6225bc315439956a7137a52348344248ef9546ad7fbeb8cdd6482a9a85a5cc0ddd358d82add4a8a9f8fd7ed47ba8c9c647bea582c83fb915c94754380b4e73197fe4b2e78bf8e826ff3f071b50e22f257cfb739e3a97abed3328ec61e7ea4dd9f5cdef61e319b50f3daece11390d20632fb9c63280c8296509cc68ca26ea9604739efbda199a5d01c00d97f4cd057c4d1277ccf2af1c880d63d3b7835f8222ad06d15508aa82854ddbabe24ac7721fff46c62f4f995018ce55ce5189af49b75b28fcf95b0f1db7d8e7a301c1672179", 0xd4}], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000a40)={0xb, 0xffffffff, 0x2, 0x0, 0x0, r0, 0x4, [], r3}, 0x3c) syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000000)=0x2a2692a4) 22:43:08 executing program 0: syz_open_procfs(0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x0, 0x0) creat(0x0, 0x6857b21ff1155d91) open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000100)=ANY=[], 0x225) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, &(0x7f0000000300), 0x7fff) 22:43:08 executing program 4: r0 = socket(0x1e, 0x4, 0x0) r1 = socket(0x1e, 0x2, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, 0x0, &(0x7f00000007c0)) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000080)=@req={0x3fc}, 0x10) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x2}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f0000000a40), 0x8000000000000b0, 0x101d0) 22:43:08 executing program 2: r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x40000000806, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0xd) ioctl$UI_SET_RELBIT(0xffffffffffffffff, 0x40045566, 0x8) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x0, 0x0) getuid() fsetxattr$trusted_overlay_upper(r1, &(0x7f0000000a80)='trusted.overlay.upper\x00', &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0x1, 0x2) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000180)) fcntl$getown(r0, 0x9) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000b80)) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) r2 = getpgid(0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000001040)={{{@in=@loopback, @in6=@ipv4={[], [], @remote}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000f00)=0xfffffffffffffd81) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f00000009c0)='./file0\x00', &(0x7f0000000280)='\rAanon_inodefs\x00', 0x3fe, 0x0) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, 0x0, 0x0) getpgid(r2) io_setup(0x4, &(0x7f0000000240)=0x0) io_submit(r5, 0x1, &(0x7f0000000a00)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x99d9, 0xffffffffffffffff, &(0x7f00000003c0)="cdc2185b2083", 0x6, 0xffffffffffffefff, 0x0, 0x1, r1}]) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x1) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000900), &(0x7f0000000100)=0x14) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) ioctl$UI_SET_RELBIT(r0, 0x40045566, 0x4) writev(r4, &(0x7f0000001240)=[{&(0x7f0000001140)="f915877a3a6225bc315439956a7137a52348344248ef9546ad7fbeb8cdd6482a9a85a5cc0ddd358d82add4a8a9f8fd7ed47ba8c9c647bea582c83fb915c94754380b4e73197fe4b2e78bf8e826ff3f071b50e22f257cfb739e3a97abed3328ec61e7ea4dd9f5cdef61e319b50f3daece11390d20632fb9c63280c8296509cc68ca26ea9604739efbda199a5d01c00d97f4cd057c4d1277ccf2af1c880d63d3b7835f8222ad06d15508aa82854ddbabe24ac7721fff46c62f4f995018ce55ce5189af49b75b28fcf95b0f1db7d8e7a301c1672179", 0xd4}], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000a40)={0xb, 0xffffffff, 0x2, 0x0, 0x0, r0, 0x4, [], r3}, 0x3c) syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000000)=0x2a2692a4) 22:43:08 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) r4 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x1) ioctl$KVM_SET_LAPIC(r4, 0x4400ae8f, &(0x7f0000000340)={"6cdd4237dd245c8404721efdc9c8dc1964125fa96fa42b761c6ec25b2bec0ba4c81036c93a40c8a4d4412a763b00040000000000003c5ca206c047ecee377abaece6b88378e3d63a98fc191f361d264ffa8b46485f02baee1ab6b8154252066178868d1ef4b5365c5dc26ca097ddda7c21a984c2b9ca4bbb7a87165c0c1dbc75d7ea4df10000174a3ac8694525952f44500a1f0db509c32cc7ace842c28f37f06e4ea9f1e5f0c6c379f9cc58bf69fcde318ead4825aa1b6a832d4e48cc41bb5a6baa41d614f6c8941bee805954a62d196a4e8d41f6b21224b57f530d0000c1ff53bf79a1f5c5dc34b2262d66ae793b6304a30b97077f1c131045cbc11c4562d22db88d0edc5daee171cc04d96d9ec2db07478f347edbd6404923ad4a5672b1b285c7988c4ec0922c655ff600000000c00dc290d936d93236051fadfb4b95d02c0bda7ce38dabb7cd103fe4d0c9c963cd717a77f8df8d46099b1f58e068af6afbbc19db161c6df3e7c9c71bc08a282fc2c142856b5e4caff4c0a4f72445ef10dcd2c569319d6e9bb2058d023f669a64fc7d9684b45b00000000364673dcfa9235ea5a2ff23c4bb5c5acb290e8976dcac779ff000000000000003d4e185afe28b774b99d3890bd37428617de4cdd6f53c419ce31054182fd098af7b7f1b1152c691611f897558d4b755cb783978d9859b0537b05b623dcb5c4ca9317471a40fa4998cca80e961efffb4e1aa25d8a17deef0c8694c4395fc99be3c3fe7aeb8af4929ce7d346ca62b25d48fda5d10146702f78b233b5208752726ed9f0c340d494b92d19cc930bb8a5f8b4da8f4603ac0c3b698384e17a570dc8524823ed15af4ecfabb4b2541d3c114b7bba1c21a845c9cf0d1cc24aba47e30f558b2246ad95ccf7d2f80cc0ab26f08336ea1a33b79cf35b898837016eb211a1734c7af076e15451e33519fc978f66df7df4557c91024a8dc130a28ef5f63ad07b39c8d23b85cf434e065e8a29a800655d127de6f6347b4951f97b5703dc78b1ca9d74ea6a9ae12ab367c0de2659cc38d2f33ddd86e0597d33361eada119b5132145fa4525c488c7fffd6ceda6e9a02ebd97ced6b0161f2cc84615ceb8b18883299c636e9e46724a9a0600a8bb02f3e489631d522019a35fe12a33caf9dd8768ddbc02a484c345c3eff254297b1dbb04989c3f9f3c7b3c985c39b1d313018068d3809bac8c657e39f4f692613e28387e955722908dd88b56163be8312ff47c5b6f280472935af74e97a5a8110a4d74496f4c8ec82ddb56d9b962d2fc43fa01a047526865c84f7cff36056cc4ac258021e1581d43badaaec6cc5a2ef989de9801fed6d4be2bfcfe07a69c46bffbe9dd03970800000000000000d372bdd6d89dc1ecf63c23d506114d0fba2bd1c69e8f7e3fccdcda85ce975ec1381b1cec6ddaa76e186719d8191643"}) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_X86_SET_MCE(r4, 0x5000aea5, &(0x7f0000000200)) dup2(r0, r4) 22:43:08 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) futex(0x0, 0x8c, 0x1, 0x0, 0x0, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) r2 = openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x4021c0, 0x0) ioctl$VT_OPENQRY(r2, 0x5600, &(0x7f0000000280)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000200)) getpgrp(0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, 0x0, &(0x7f00000004c0)) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f00000002c0)) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) setfsgid(r3) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x100000000000000, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) getegid() mmap(&(0x7f00006a4000/0x1000)=nil, 0x1000, 0x0, 0x2053, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r4, 0xc0086420, &(0x7f0000000240)) ioctl$sock_inet6_SIOCADDRT(r1, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @empty, @loopback}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(0xffffffffffffffff, 0x28, 0x1, 0x0, 0x0) prctl$PR_SET_MM_AUXV(0x23, 0xc, &(0x7f0000000b80)="6ff3dbaff5d6c485c04bba198730f72986e532f22d7569e10f661567144a1f8cf977635abec35bd74d1ba2f7880287f82129b69681d8637cc53b0dc21b8003d69219ff35e07320b5e4ebcc021c700e280c519cd03ab900000000000d1416492cf703000000000000008fa54dcf8838c357f59c2d6773c2cf0a1d200ec21e6ca195cbcf71e9353b952ab7b1", 0x8b) setsockopt$XDP_TX_RING(r1, 0x11b, 0x3, &(0x7f0000000180)=0x200812, 0x4) pipe2(&(0x7f0000000000), 0x84000) bind$inet6(r0, &(0x7f0000000100), 0x1c) listen(r0, 0x0) timer_create(0x0, &(0x7f0000000100)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000000)) 22:43:08 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x40000000806, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0xd) ioctl$UI_SET_RELBIT(0xffffffffffffffff, 0x40045566, 0x8) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x0, 0x0) getuid() fsetxattr$trusted_overlay_upper(r1, &(0x7f0000000a80)='trusted.overlay.upper\x00', &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0x1, 0x2) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000180)) fcntl$getown(r0, 0x9) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000b80)) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) r2 = getpgid(0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000001040)={{{@in=@loopback, @in6=@ipv4={[], [], @remote}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000f00)=0xfffffffffffffd81) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f00000009c0)='./file0\x00', &(0x7f0000000280)='\rAanon_inodefs\x00', 0x3fe, 0x0) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, 0x0, 0x0) getpgid(r2) io_setup(0x4, &(0x7f0000000240)=0x0) io_submit(r5, 0x1, &(0x7f0000000a00)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x99d9, 0xffffffffffffffff, &(0x7f00000003c0)="cdc2185b2083", 0x6, 0xffffffffffffefff, 0x0, 0x1, r1}]) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x1) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000900), &(0x7f0000000100)=0x14) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) ioctl$UI_SET_RELBIT(r0, 0x40045566, 0x4) writev(r4, &(0x7f0000001240)=[{&(0x7f0000001140)="f915877a3a6225bc315439956a7137a52348344248ef9546ad7fbeb8cdd6482a9a85a5cc0ddd358d82add4a8a9f8fd7ed47ba8c9c647bea582c83fb915c94754380b4e73197fe4b2e78bf8e826ff3f071b50e22f257cfb739e3a97abed3328ec61e7ea4dd9f5cdef61e319b50f3daece11390d20632fb9c63280c8296509cc68ca26ea9604739efbda199a5d01c00d97f4cd057c4d1277ccf2af1c880d63d3b7835f8222ad06d15508aa82854ddbabe24ac7721fff46c62f4f995018ce55ce5189af49b75b28fcf95b0f1db7d8e7a301c1672179", 0xd4}], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000a40)={0xb, 0xffffffff, 0x2, 0x0, 0x0, r0, 0x4, [], r3}, 0x3c) syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000000)=0x2a2692a4) 22:43:08 executing program 2: r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x40000000806, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0xd) ioctl$UI_SET_RELBIT(0xffffffffffffffff, 0x40045566, 0x8) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x0, 0x0) getuid() fsetxattr$trusted_overlay_upper(r1, &(0x7f0000000a80)='trusted.overlay.upper\x00', &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0x1, 0x2) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000180)) fcntl$getown(r0, 0x9) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000b80)) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) r2 = getpgid(0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000001040)={{{@in=@loopback, @in6=@ipv4={[], [], @remote}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000f00)=0xfffffffffffffd81) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f00000009c0)='./file0\x00', &(0x7f0000000280)='\rAanon_inodefs\x00', 0x3fe, 0x0) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, 0x0, 0x0) getpgid(r2) io_setup(0x4, &(0x7f0000000240)=0x0) io_submit(r5, 0x1, &(0x7f0000000a00)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x99d9, 0xffffffffffffffff, &(0x7f00000003c0)="cdc2185b2083", 0x6, 0xffffffffffffefff, 0x0, 0x1, r1}]) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x1) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000900), &(0x7f0000000100)=0x14) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) ioctl$UI_SET_RELBIT(r0, 0x40045566, 0x4) writev(r4, &(0x7f0000001240)=[{&(0x7f0000001140)="f915877a3a6225bc315439956a7137a52348344248ef9546ad7fbeb8cdd6482a9a85a5cc0ddd358d82add4a8a9f8fd7ed47ba8c9c647bea582c83fb915c94754380b4e73197fe4b2e78bf8e826ff3f071b50e22f257cfb739e3a97abed3328ec61e7ea4dd9f5cdef61e319b50f3daece11390d20632fb9c63280c8296509cc68ca26ea9604739efbda199a5d01c00d97f4cd057c4d1277ccf2af1c880d63d3b7835f8222ad06d15508aa82854ddbabe24ac7721fff46c62f4f995018ce55ce5189af49b75b28fcf95b0f1db7d8e7a301c1672179", 0xd4}], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000a40)={0xb, 0xffffffff, 0x2, 0x0, 0x0, r0, 0x4, [], r3}, 0x3c) syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000000)=0x2a2692a4) 22:43:08 executing program 3: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f0000000280)={0x0, 0x0, 0x187, 0x0, [], [{}, {0x801}]}) 22:43:08 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) futex(0x0, 0x8c, 0x1, 0x0, 0x0, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) r2 = openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x4021c0, 0x0) ioctl$VT_OPENQRY(r2, 0x5600, &(0x7f0000000280)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000200)) getpgrp(0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, 0x0, &(0x7f00000004c0)) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f00000002c0)) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) setfsgid(r3) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x100000000000000, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) getegid() mmap(&(0x7f00006a4000/0x1000)=nil, 0x1000, 0x0, 0x2053, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r4, 0xc0086420, &(0x7f0000000240)) ioctl$sock_inet6_SIOCADDRT(r1, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @empty, @loopback}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(0xffffffffffffffff, 0x28, 0x1, 0x0, 0x0) prctl$PR_SET_MM_AUXV(0x23, 0xc, &(0x7f0000000b80)="6ff3dbaff5d6c485c04bba198730f72986e532f22d7569e10f661567144a1f8cf977635abec35bd74d1ba2f7880287f82129b69681d8637cc53b0dc21b8003d69219ff35e07320b5e4ebcc021c700e280c519cd03ab900000000000d1416492cf703000000000000008fa54dcf8838c357f59c2d6773c2cf0a1d200ec21e6ca195cbcf71e9353b952ab7b1", 0x8b) setsockopt$XDP_TX_RING(r1, 0x11b, 0x3, &(0x7f0000000180)=0x200812, 0x4) pipe2(&(0x7f0000000000), 0x84000) bind$inet6(r0, &(0x7f0000000100), 0x1c) listen(r0, 0x0) timer_create(0x0, &(0x7f0000000100)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000000)) 22:43:08 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) futex(0x0, 0x8c, 0x1, 0x0, 0x0, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) r2 = openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x4021c0, 0x0) ioctl$VT_OPENQRY(r2, 0x5600, &(0x7f0000000280)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000200)) getpgrp(0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, 0x0, &(0x7f00000004c0)) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f00000002c0)) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) setfsgid(r3) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x100000000000000, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) getegid() mmap(&(0x7f00006a4000/0x1000)=nil, 0x1000, 0x0, 0x2053, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r4, 0xc0086420, &(0x7f0000000240)) ioctl$sock_inet6_SIOCADDRT(r1, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @empty, @loopback}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(0xffffffffffffffff, 0x28, 0x1, 0x0, 0x0) prctl$PR_SET_MM_AUXV(0x23, 0xc, &(0x7f0000000b80)="6ff3dbaff5d6c485c04bba198730f72986e532f22d7569e10f661567144a1f8cf977635abec35bd74d1ba2f7880287f82129b69681d8637cc53b0dc21b8003d69219ff35e07320b5e4ebcc021c700e280c519cd03ab900000000000d1416492cf703000000000000008fa54dcf8838c357f59c2d6773c2cf0a1d200ec21e6ca195cbcf71e9353b952ab7b1", 0x8b) setsockopt$XDP_TX_RING(r1, 0x11b, 0x3, &(0x7f0000000180)=0x200812, 0x4) pipe2(&(0x7f0000000000), 0x84000) bind$inet6(r0, &(0x7f0000000100), 0x1c) listen(r0, 0x0) timer_create(0x0, &(0x7f0000000100)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000000)) 22:43:08 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) futex(0x0, 0x8c, 0x1, 0x0, 0x0, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) r2 = openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x4021c0, 0x0) ioctl$VT_OPENQRY(r2, 0x5600, &(0x7f0000000280)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000200)) getpgrp(0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, 0x0, &(0x7f00000004c0)) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f00000002c0)) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) setfsgid(r3) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x100000000000000, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) getegid() mmap(&(0x7f00006a4000/0x1000)=nil, 0x1000, 0x0, 0x2053, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r4, 0xc0086420, &(0x7f0000000240)) ioctl$sock_inet6_SIOCADDRT(r1, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @empty, @loopback}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(0xffffffffffffffff, 0x28, 0x1, 0x0, 0x0) prctl$PR_SET_MM_AUXV(0x23, 0xc, &(0x7f0000000b80)="6ff3dbaff5d6c485c04bba198730f72986e532f22d7569e10f661567144a1f8cf977635abec35bd74d1ba2f7880287f82129b69681d8637cc53b0dc21b8003d69219ff35e07320b5e4ebcc021c700e280c519cd03ab900000000000d1416492cf703000000000000008fa54dcf8838c357f59c2d6773c2cf0a1d200ec21e6ca195cbcf71e9353b952ab7b1", 0x8b) setsockopt$XDP_TX_RING(r1, 0x11b, 0x3, &(0x7f0000000180)=0x200812, 0x4) pipe2(&(0x7f0000000000), 0x84000) bind$inet6(r0, &(0x7f0000000100), 0x1c) listen(r0, 0x0) timer_create(0x0, &(0x7f0000000100)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000000)) 22:43:08 executing program 2: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000008c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r1, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000900)}, 0x80) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000a00)={0xffffffffffffffff, 0x10, &(0x7f0000000900)={&(0x7f0000000980)=""/67, 0x43, 0x0}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000a40)=r3, 0x4) r4 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r4, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r4, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{0x0}], 0x1}, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1f, 0x2, 0xfffffffffffffff8, 0x2, 0x10, r2, 0x1d74, [], 0x0, 0xffffffffffffff9c, 0x3, 0x5}, 0x3c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r5, 0x0, 0x0, 0x7}, 0xfffffffffffffef7) r6 = openat$cgroup_ro(r0, &(0x7f0000000200)='memory.events\x00', 0x0, 0x0) r7 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r7, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r7, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0xfffffe45) socket$kcm(0x11, 0x0, 0x0) r8 = openat$cgroup_int(r2, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) write$cgroup_int(r8, 0x0, 0x0) recvmsg$kcm(r6, &(0x7f0000000880)={&(0x7f0000000280)=@isdn, 0x80, &(0x7f00000007c0)=[{&(0x7f0000000300)=""/44, 0x2c}, {&(0x7f0000000340)=""/5, 0x5}, {&(0x7f0000000380)=""/167, 0xa7}, {&(0x7f0000000440)=""/21, 0x15}, {&(0x7f0000000580)=""/198, 0xc6}, {&(0x7f0000000480)=""/48, 0x30}, {&(0x7f00000004c0)=""/45, 0x2d}, {&(0x7f0000000680)=""/237, 0xed}, {&(0x7f0000000500)=""/35, 0x23}, {&(0x7f0000000780)=""/43, 0x2b}], 0xa}, 0x40002021) 22:43:08 executing program 0: syz_open_procfs(0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x0, 0x0) creat(0x0, 0x6857b21ff1155d91) open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000100)=ANY=[], 0x225) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, &(0x7f0000000300), 0x7fff) 22:43:08 executing program 3: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f0000000280)={0x0, 0x0, 0x187, 0x0, [], [{}, {0x801}]}) 22:43:08 executing program 2: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000008c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r1, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000900)}, 0x80) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000a00)={0xffffffffffffffff, 0x10, &(0x7f0000000900)={&(0x7f0000000980)=""/67, 0x43, 0x0}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000a40)=r3, 0x4) r4 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r4, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r4, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{0x0}], 0x1}, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1f, 0x2, 0xfffffffffffffff8, 0x2, 0x10, r2, 0x1d74, [], 0x0, 0xffffffffffffff9c, 0x3, 0x5}, 0x3c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r5, 0x0, 0x0, 0x7}, 0xfffffffffffffef7) r6 = openat$cgroup_ro(r0, &(0x7f0000000200)='memory.events\x00', 0x0, 0x0) r7 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r7, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r7, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0xfffffe45) socket$kcm(0x11, 0x0, 0x0) r8 = openat$cgroup_int(r2, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) write$cgroup_int(r8, 0x0, 0x0) recvmsg$kcm(r6, &(0x7f0000000880)={&(0x7f0000000280)=@isdn, 0x80, &(0x7f00000007c0)=[{&(0x7f0000000300)=""/44, 0x2c}, {&(0x7f0000000340)=""/5, 0x5}, {&(0x7f0000000380)=""/167, 0xa7}, {&(0x7f0000000440)=""/21, 0x15}, {&(0x7f0000000580)=""/198, 0xc6}, {&(0x7f0000000480)=""/48, 0x30}, {&(0x7f00000004c0)=""/45, 0x2d}, {&(0x7f0000000680)=""/237, 0xed}, {&(0x7f0000000500)=""/35, 0x23}, {&(0x7f0000000780)=""/43, 0x2b}], 0xa}, 0x40002021) 22:43:08 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) futex(0x0, 0x8c, 0x1, 0x0, 0x0, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) r2 = openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x4021c0, 0x0) ioctl$VT_OPENQRY(r2, 0x5600, &(0x7f0000000280)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000200)) getpgrp(0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, 0x0, &(0x7f00000004c0)) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f00000002c0)) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) setfsgid(r3) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x100000000000000, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) getegid() mmap(&(0x7f00006a4000/0x1000)=nil, 0x1000, 0x0, 0x2053, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r4, 0xc0086420, &(0x7f0000000240)) ioctl$sock_inet6_SIOCADDRT(r1, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @empty, @loopback}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(0xffffffffffffffff, 0x28, 0x1, 0x0, 0x0) prctl$PR_SET_MM_AUXV(0x23, 0xc, &(0x7f0000000b80)="6ff3dbaff5d6c485c04bba198730f72986e532f22d7569e10f661567144a1f8cf977635abec35bd74d1ba2f7880287f82129b69681d8637cc53b0dc21b8003d69219ff35e07320b5e4ebcc021c700e280c519cd03ab900000000000d1416492cf703000000000000008fa54dcf8838c357f59c2d6773c2cf0a1d200ec21e6ca195cbcf71e9353b952ab7b1", 0x8b) setsockopt$XDP_TX_RING(r1, 0x11b, 0x3, &(0x7f0000000180)=0x200812, 0x4) pipe2(&(0x7f0000000000), 0x84000) bind$inet6(r0, &(0x7f0000000100), 0x1c) listen(r0, 0x0) timer_create(0x0, &(0x7f0000000100)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000000)) 22:43:08 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) futex(0x0, 0x8c, 0x1, 0x0, 0x0, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) r2 = openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x4021c0, 0x0) ioctl$VT_OPENQRY(r2, 0x5600, &(0x7f0000000280)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000200)) getpgrp(0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, 0x0, &(0x7f00000004c0)) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f00000002c0)) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) setfsgid(r3) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x100000000000000, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) getegid() mmap(&(0x7f00006a4000/0x1000)=nil, 0x1000, 0x0, 0x2053, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r4, 0xc0086420, &(0x7f0000000240)) ioctl$sock_inet6_SIOCADDRT(r1, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @empty, @loopback}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(0xffffffffffffffff, 0x28, 0x1, 0x0, 0x0) prctl$PR_SET_MM_AUXV(0x23, 0xc, &(0x7f0000000b80)="6ff3dbaff5d6c485c04bba198730f72986e532f22d7569e10f661567144a1f8cf977635abec35bd74d1ba2f7880287f82129b69681d8637cc53b0dc21b8003d69219ff35e07320b5e4ebcc021c700e280c519cd03ab900000000000d1416492cf703000000000000008fa54dcf8838c357f59c2d6773c2cf0a1d200ec21e6ca195cbcf71e9353b952ab7b1", 0x8b) setsockopt$XDP_TX_RING(r1, 0x11b, 0x3, &(0x7f0000000180)=0x200812, 0x4) pipe2(&(0x7f0000000000), 0x84000) bind$inet6(r0, &(0x7f0000000100), 0x1c) listen(r0, 0x0) timer_create(0x0, &(0x7f0000000100)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000000)) 22:43:08 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) futex(0x0, 0x8c, 0x1, 0x0, 0x0, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) r2 = openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x4021c0, 0x0) ioctl$VT_OPENQRY(r2, 0x5600, &(0x7f0000000280)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000200)) getpgrp(0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, 0x0, &(0x7f00000004c0)) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f00000002c0)) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) setfsgid(r3) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x100000000000000, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) getegid() mmap(&(0x7f00006a4000/0x1000)=nil, 0x1000, 0x0, 0x2053, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r4, 0xc0086420, &(0x7f0000000240)) ioctl$sock_inet6_SIOCADDRT(r1, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @empty, @loopback}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(0xffffffffffffffff, 0x28, 0x1, 0x0, 0x0) prctl$PR_SET_MM_AUXV(0x23, 0xc, &(0x7f0000000b80)="6ff3dbaff5d6c485c04bba198730f72986e532f22d7569e10f661567144a1f8cf977635abec35bd74d1ba2f7880287f82129b69681d8637cc53b0dc21b8003d69219ff35e07320b5e4ebcc021c700e280c519cd03ab900000000000d1416492cf703000000000000008fa54dcf8838c357f59c2d6773c2cf0a1d200ec21e6ca195cbcf71e9353b952ab7b1", 0x8b) setsockopt$XDP_TX_RING(r1, 0x11b, 0x3, &(0x7f0000000180)=0x200812, 0x4) pipe2(&(0x7f0000000000), 0x84000) bind$inet6(r0, &(0x7f0000000100), 0x1c) listen(r0, 0x0) timer_create(0x0, &(0x7f0000000100)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000000)) 22:43:09 executing program 3: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f0000000280)={0x0, 0x0, 0x187, 0x0, [], [{}, {0x801}]}) 22:43:09 executing program 2: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000008c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r1, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000900)}, 0x80) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000a00)={0xffffffffffffffff, 0x10, &(0x7f0000000900)={&(0x7f0000000980)=""/67, 0x43, 0x0}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000a40)=r3, 0x4) r4 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r4, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r4, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{0x0}], 0x1}, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1f, 0x2, 0xfffffffffffffff8, 0x2, 0x10, r2, 0x1d74, [], 0x0, 0xffffffffffffff9c, 0x3, 0x5}, 0x3c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r5, 0x0, 0x0, 0x7}, 0xfffffffffffffef7) r6 = openat$cgroup_ro(r0, &(0x7f0000000200)='memory.events\x00', 0x0, 0x0) r7 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r7, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r7, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0xfffffe45) socket$kcm(0x11, 0x0, 0x0) r8 = openat$cgroup_int(r2, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) write$cgroup_int(r8, 0x0, 0x0) recvmsg$kcm(r6, &(0x7f0000000880)={&(0x7f0000000280)=@isdn, 0x80, &(0x7f00000007c0)=[{&(0x7f0000000300)=""/44, 0x2c}, {&(0x7f0000000340)=""/5, 0x5}, {&(0x7f0000000380)=""/167, 0xa7}, {&(0x7f0000000440)=""/21, 0x15}, {&(0x7f0000000580)=""/198, 0xc6}, {&(0x7f0000000480)=""/48, 0x30}, {&(0x7f00000004c0)=""/45, 0x2d}, {&(0x7f0000000680)=""/237, 0xed}, {&(0x7f0000000500)=""/35, 0x23}, {&(0x7f0000000780)=""/43, 0x2b}], 0xa}, 0x40002021) 22:43:09 executing program 3: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f0000000280)={0x0, 0x0, 0x187, 0x0, [], [{}, {0x801}]}) 22:43:09 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) futex(0x0, 0x8c, 0x1, 0x0, 0x0, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) r2 = openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x4021c0, 0x0) ioctl$VT_OPENQRY(r2, 0x5600, &(0x7f0000000280)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000200)) getpgrp(0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, 0x0, &(0x7f00000004c0)) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f00000002c0)) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) setfsgid(r3) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x100000000000000, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) getegid() mmap(&(0x7f00006a4000/0x1000)=nil, 0x1000, 0x0, 0x2053, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r4, 0xc0086420, &(0x7f0000000240)) ioctl$sock_inet6_SIOCADDRT(r1, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @empty, @loopback}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(0xffffffffffffffff, 0x28, 0x1, 0x0, 0x0) prctl$PR_SET_MM_AUXV(0x23, 0xc, &(0x7f0000000b80)="6ff3dbaff5d6c485c04bba198730f72986e532f22d7569e10f661567144a1f8cf977635abec35bd74d1ba2f7880287f82129b69681d8637cc53b0dc21b8003d69219ff35e07320b5e4ebcc021c700e280c519cd03ab900000000000d1416492cf703000000000000008fa54dcf8838c357f59c2d6773c2cf0a1d200ec21e6ca195cbcf71e9353b952ab7b1", 0x8b) setsockopt$XDP_TX_RING(r1, 0x11b, 0x3, &(0x7f0000000180)=0x200812, 0x4) pipe2(&(0x7f0000000000), 0x84000) bind$inet6(r0, &(0x7f0000000100), 0x1c) listen(r0, 0x0) timer_create(0x0, &(0x7f0000000100)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000000)) 22:43:09 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) futex(0x0, 0x8c, 0x1, 0x0, 0x0, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) r2 = openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x4021c0, 0x0) ioctl$VT_OPENQRY(r2, 0x5600, &(0x7f0000000280)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000200)) getpgrp(0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, 0x0, &(0x7f00000004c0)) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f00000002c0)) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) setfsgid(r3) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x100000000000000, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) getegid() mmap(&(0x7f00006a4000/0x1000)=nil, 0x1000, 0x0, 0x2053, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r4, 0xc0086420, &(0x7f0000000240)) ioctl$sock_inet6_SIOCADDRT(r1, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @empty, @loopback}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(0xffffffffffffffff, 0x28, 0x1, 0x0, 0x0) prctl$PR_SET_MM_AUXV(0x23, 0xc, &(0x7f0000000b80)="6ff3dbaff5d6c485c04bba198730f72986e532f22d7569e10f661567144a1f8cf977635abec35bd74d1ba2f7880287f82129b69681d8637cc53b0dc21b8003d69219ff35e07320b5e4ebcc021c700e280c519cd03ab900000000000d1416492cf703000000000000008fa54dcf8838c357f59c2d6773c2cf0a1d200ec21e6ca195cbcf71e9353b952ab7b1", 0x8b) setsockopt$XDP_TX_RING(r1, 0x11b, 0x3, &(0x7f0000000180)=0x200812, 0x4) pipe2(&(0x7f0000000000), 0x84000) bind$inet6(r0, &(0x7f0000000100), 0x1c) listen(r0, 0x0) timer_create(0x0, &(0x7f0000000100)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000000)) 22:43:09 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) futex(0x0, 0x8c, 0x1, 0x0, 0x0, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) r2 = openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x4021c0, 0x0) ioctl$VT_OPENQRY(r2, 0x5600, &(0x7f0000000280)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000200)) getpgrp(0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, 0x0, &(0x7f00000004c0)) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f00000002c0)) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) setfsgid(r3) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x100000000000000, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) getegid() mmap(&(0x7f00006a4000/0x1000)=nil, 0x1000, 0x0, 0x2053, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r4, 0xc0086420, &(0x7f0000000240)) ioctl$sock_inet6_SIOCADDRT(r1, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @empty, @loopback}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(0xffffffffffffffff, 0x28, 0x1, 0x0, 0x0) prctl$PR_SET_MM_AUXV(0x23, 0xc, &(0x7f0000000b80)="6ff3dbaff5d6c485c04bba198730f72986e532f22d7569e10f661567144a1f8cf977635abec35bd74d1ba2f7880287f82129b69681d8637cc53b0dc21b8003d69219ff35e07320b5e4ebcc021c700e280c519cd03ab900000000000d1416492cf703000000000000008fa54dcf8838c357f59c2d6773c2cf0a1d200ec21e6ca195cbcf71e9353b952ab7b1", 0x8b) setsockopt$XDP_TX_RING(r1, 0x11b, 0x3, &(0x7f0000000180)=0x200812, 0x4) pipe2(&(0x7f0000000000), 0x84000) bind$inet6(r0, &(0x7f0000000100), 0x1c) listen(r0, 0x0) timer_create(0x0, &(0x7f0000000100)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000000)) 22:43:09 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(0xffffffffffffffff, 0xc0605345, &(0x7f0000000280)={0x2, 0x1, {0x0, 0x2, 0x8}}) clock_nanosleep(0x0, 0x0, 0x0, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x8, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140), 0x0, 0x0, 0xffffffffffffff3d}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bcsh0\x00', 0x21}) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='ns\x00') getdents(r0, &(0x7f0000000040)=""/46, 0x2e) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPVS_CMD_GET_INFO(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') 22:43:09 executing program 2: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000008c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r1, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000900)}, 0x80) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000a00)={0xffffffffffffffff, 0x10, &(0x7f0000000900)={&(0x7f0000000980)=""/67, 0x43, 0x0}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000a40)=r3, 0x4) r4 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r4, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r4, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{0x0}], 0x1}, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1f, 0x2, 0xfffffffffffffff8, 0x2, 0x10, r2, 0x1d74, [], 0x0, 0xffffffffffffff9c, 0x3, 0x5}, 0x3c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r5, 0x0, 0x0, 0x7}, 0xfffffffffffffef7) r6 = openat$cgroup_ro(r0, &(0x7f0000000200)='memory.events\x00', 0x0, 0x0) r7 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r7, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r7, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0xfffffe45) socket$kcm(0x11, 0x0, 0x0) r8 = openat$cgroup_int(r2, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) write$cgroup_int(r8, 0x0, 0x0) recvmsg$kcm(r6, &(0x7f0000000880)={&(0x7f0000000280)=@isdn, 0x80, &(0x7f00000007c0)=[{&(0x7f0000000300)=""/44, 0x2c}, {&(0x7f0000000340)=""/5, 0x5}, {&(0x7f0000000380)=""/167, 0xa7}, {&(0x7f0000000440)=""/21, 0x15}, {&(0x7f0000000580)=""/198, 0xc6}, {&(0x7f0000000480)=""/48, 0x30}, {&(0x7f00000004c0)=""/45, 0x2d}, {&(0x7f0000000680)=""/237, 0xed}, {&(0x7f0000000500)=""/35, 0x23}, {&(0x7f0000000780)=""/43, 0x2b}], 0xa}, 0x40002021) 22:43:09 executing program 3: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000008c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r1, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000900)}, 0x80) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000a00)={0xffffffffffffffff, 0x10, &(0x7f0000000900)={&(0x7f0000000980)=""/67, 0x43, 0x0}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000a40)=r3, 0x4) r4 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r4, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r4, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{0x0}], 0x1}, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1f, 0x2, 0xfffffffffffffff8, 0x2, 0x10, r2, 0x1d74, [], 0x0, 0xffffffffffffff9c, 0x3, 0x5}, 0x3c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r5, 0x0, 0x0, 0x7}, 0xfffffffffffffef7) r6 = openat$cgroup_ro(r0, &(0x7f0000000200)='memory.events\x00', 0x0, 0x0) r7 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r7, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r7, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0xfffffe45) socket$kcm(0x11, 0x0, 0x0) r8 = openat$cgroup_int(r2, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) write$cgroup_int(r8, 0x0, 0x0) recvmsg$kcm(r6, &(0x7f0000000880)={&(0x7f0000000280)=@isdn, 0x80, &(0x7f00000007c0)=[{&(0x7f0000000300)=""/44, 0x2c}, {&(0x7f0000000340)=""/5, 0x5}, {&(0x7f0000000380)=""/167, 0xa7}, {&(0x7f0000000440)=""/21, 0x15}, {&(0x7f0000000580)=""/198, 0xc6}, {&(0x7f0000000480)=""/48, 0x30}, {&(0x7f00000004c0)=""/45, 0x2d}, {&(0x7f0000000680)=""/237, 0xed}, {&(0x7f0000000500)=""/35, 0x23}, {&(0x7f0000000780)=""/43, 0x2b}], 0xa}, 0x40002021) 22:43:09 executing program 4: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000008c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r1, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000900)}, 0x80) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000a00)={0xffffffffffffffff, 0x10, &(0x7f0000000900)={&(0x7f0000000980)=""/67, 0x43, 0x0}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000a40)=r3, 0x4) r4 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r4, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r4, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{0x0}], 0x1}, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1f, 0x2, 0xfffffffffffffff8, 0x2, 0x10, r2, 0x1d74, [], 0x0, 0xffffffffffffff9c, 0x3, 0x5}, 0x3c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r5, 0x0, 0x0, 0x7}, 0xfffffffffffffef7) r6 = openat$cgroup_ro(r0, &(0x7f0000000200)='memory.events\x00', 0x0, 0x0) r7 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r7, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r7, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0xfffffe45) socket$kcm(0x11, 0x0, 0x0) r8 = openat$cgroup_int(r2, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) write$cgroup_int(r8, 0x0, 0x0) recvmsg$kcm(r6, &(0x7f0000000880)={&(0x7f0000000280)=@isdn, 0x80, &(0x7f00000007c0)=[{&(0x7f0000000300)=""/44, 0x2c}, {&(0x7f0000000340)=""/5, 0x5}, {&(0x7f0000000380)=""/167, 0xa7}, {&(0x7f0000000440)=""/21, 0x15}, {&(0x7f0000000580)=""/198, 0xc6}, {&(0x7f0000000480)=""/48, 0x30}, {&(0x7f00000004c0)=""/45, 0x2d}, {&(0x7f0000000680)=""/237, 0xed}, {&(0x7f0000000500)=""/35, 0x23}, {&(0x7f0000000780)=""/43, 0x2b}], 0xa}, 0x40002021) 22:43:09 executing program 3: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000008c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r1, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000900)}, 0x80) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000a00)={0xffffffffffffffff, 0x10, &(0x7f0000000900)={&(0x7f0000000980)=""/67, 0x43, 0x0}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000a40)=r3, 0x4) r4 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r4, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r4, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{0x0}], 0x1}, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1f, 0x2, 0xfffffffffffffff8, 0x2, 0x10, r2, 0x1d74, [], 0x0, 0xffffffffffffff9c, 0x3, 0x5}, 0x3c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r5, 0x0, 0x0, 0x7}, 0xfffffffffffffef7) r6 = openat$cgroup_ro(r0, &(0x7f0000000200)='memory.events\x00', 0x0, 0x0) r7 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r7, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r7, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0xfffffe45) socket$kcm(0x11, 0x0, 0x0) r8 = openat$cgroup_int(r2, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) write$cgroup_int(r8, 0x0, 0x0) recvmsg$kcm(r6, &(0x7f0000000880)={&(0x7f0000000280)=@isdn, 0x80, &(0x7f00000007c0)=[{&(0x7f0000000300)=""/44, 0x2c}, {&(0x7f0000000340)=""/5, 0x5}, {&(0x7f0000000380)=""/167, 0xa7}, {&(0x7f0000000440)=""/21, 0x15}, {&(0x7f0000000580)=""/198, 0xc6}, {&(0x7f0000000480)=""/48, 0x30}, {&(0x7f00000004c0)=""/45, 0x2d}, {&(0x7f0000000680)=""/237, 0xed}, {&(0x7f0000000500)=""/35, 0x23}, {&(0x7f0000000780)=""/43, 0x2b}], 0xa}, 0x40002021) 22:43:09 executing program 1: syz_genetlink_get_family_id$tipc2(&(0x7f0000000780)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, 0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x4, &(0x7f00000000c0)={&(0x7f0000000240)={0x14, 0x1, 0x1, 0xffffffffffffffff}, 0x14}}, 0x0) 22:43:09 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0x5, 0x1000000000000914, 0x4000000005}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xd, 0x81, 0x4, 0x4, 0x0, r0}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x7, 0x5, &(0x7f00000000c0)=@framed={{}, [@map={0x18, 0x0, 0x1, 0x0, r1}]}, &(0x7f0000000180)='GPL\x00', 0x80000001, 0x1000, &(0x7f0000000400)=""/4096}, 0x48) 22:43:09 executing program 2: syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x0, 0x0) dup2(r0, r1) 22:43:09 executing program 4: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000008c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r1, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000900)}, 0x80) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000a00)={0xffffffffffffffff, 0x10, &(0x7f0000000900)={&(0x7f0000000980)=""/67, 0x43, 0x0}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000a40)=r3, 0x4) r4 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r4, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r4, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{0x0}], 0x1}, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1f, 0x2, 0xfffffffffffffff8, 0x2, 0x10, r2, 0x1d74, [], 0x0, 0xffffffffffffff9c, 0x3, 0x5}, 0x3c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r5, 0x0, 0x0, 0x7}, 0xfffffffffffffef7) r6 = openat$cgroup_ro(r0, &(0x7f0000000200)='memory.events\x00', 0x0, 0x0) r7 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r7, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r7, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0xfffffe45) socket$kcm(0x11, 0x0, 0x0) r8 = openat$cgroup_int(r2, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) write$cgroup_int(r8, 0x0, 0x0) recvmsg$kcm(r6, &(0x7f0000000880)={&(0x7f0000000280)=@isdn, 0x80, &(0x7f00000007c0)=[{&(0x7f0000000300)=""/44, 0x2c}, {&(0x7f0000000340)=""/5, 0x5}, {&(0x7f0000000380)=""/167, 0xa7}, {&(0x7f0000000440)=""/21, 0x15}, {&(0x7f0000000580)=""/198, 0xc6}, {&(0x7f0000000480)=""/48, 0x30}, {&(0x7f00000004c0)=""/45, 0x2d}, {&(0x7f0000000680)=""/237, 0xed}, {&(0x7f0000000500)=""/35, 0x23}, {&(0x7f0000000780)=""/43, 0x2b}], 0xa}, 0x40002021) 22:43:09 executing program 4: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000008c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r1, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000900)}, 0x80) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000a00)={0xffffffffffffffff, 0x10, &(0x7f0000000900)={&(0x7f0000000980)=""/67, 0x43, 0x0}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000a40)=r3, 0x4) r4 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r4, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r4, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{0x0}], 0x1}, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1f, 0x2, 0xfffffffffffffff8, 0x2, 0x10, r2, 0x1d74, [], 0x0, 0xffffffffffffff9c, 0x3, 0x5}, 0x3c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r5, 0x0, 0x0, 0x7}, 0xfffffffffffffef7) r6 = openat$cgroup_ro(r0, &(0x7f0000000200)='memory.events\x00', 0x0, 0x0) r7 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r7, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r7, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0xfffffe45) socket$kcm(0x11, 0x0, 0x0) r8 = openat$cgroup_int(r2, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) write$cgroup_int(r8, 0x0, 0x0) recvmsg$kcm(r6, &(0x7f0000000880)={&(0x7f0000000280)=@isdn, 0x80, &(0x7f00000007c0)=[{&(0x7f0000000300)=""/44, 0x2c}, {&(0x7f0000000340)=""/5, 0x5}, {&(0x7f0000000380)=""/167, 0xa7}, {&(0x7f0000000440)=""/21, 0x15}, {&(0x7f0000000580)=""/198, 0xc6}, {&(0x7f0000000480)=""/48, 0x30}, {&(0x7f00000004c0)=""/45, 0x2d}, {&(0x7f0000000680)=""/237, 0xed}, {&(0x7f0000000500)=""/35, 0x23}, {&(0x7f0000000780)=""/43, 0x2b}], 0xa}, 0x40002021) 22:43:09 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0x5, 0x1000000000000914, 0x4000000005}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xd, 0x81, 0x4, 0x4, 0x0, r0}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x7, 0x5, &(0x7f00000000c0)=@framed={{}, [@map={0x18, 0x0, 0x1, 0x0, r1}]}, &(0x7f0000000180)='GPL\x00', 0x80000001, 0x1000, &(0x7f0000000400)=""/4096}, 0x48) 22:43:09 executing program 3: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000008c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r1, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000900)}, 0x80) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000a00)={0xffffffffffffffff, 0x10, &(0x7f0000000900)={&(0x7f0000000980)=""/67, 0x43, 0x0}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000a40)=r3, 0x4) r4 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r4, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r4, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{0x0}], 0x1}, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1f, 0x2, 0xfffffffffffffff8, 0x2, 0x10, r2, 0x1d74, [], 0x0, 0xffffffffffffff9c, 0x3, 0x5}, 0x3c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r5, 0x0, 0x0, 0x7}, 0xfffffffffffffef7) r6 = openat$cgroup_ro(r0, &(0x7f0000000200)='memory.events\x00', 0x0, 0x0) r7 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r7, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r7, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0xfffffe45) socket$kcm(0x11, 0x0, 0x0) r8 = openat$cgroup_int(r2, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) write$cgroup_int(r8, 0x0, 0x0) recvmsg$kcm(r6, &(0x7f0000000880)={&(0x7f0000000280)=@isdn, 0x80, &(0x7f00000007c0)=[{&(0x7f0000000300)=""/44, 0x2c}, {&(0x7f0000000340)=""/5, 0x5}, {&(0x7f0000000380)=""/167, 0xa7}, {&(0x7f0000000440)=""/21, 0x15}, {&(0x7f0000000580)=""/198, 0xc6}, {&(0x7f0000000480)=""/48, 0x30}, {&(0x7f00000004c0)=""/45, 0x2d}, {&(0x7f0000000680)=""/237, 0xed}, {&(0x7f0000000500)=""/35, 0x23}, {&(0x7f0000000780)=""/43, 0x2b}], 0xa}, 0x40002021) 22:43:10 executing program 5: mincore(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000015000/0x18000)=nil, &(0x7f0000000180)=[@text16={0x10, &(0x7f0000000040)="baa000ec3e3e3e0f2b75ee65f30f008f6300a6aff4660f3a62227d0f20e06635000040000f22e0260f0350000f01cf", 0x2f}], 0x1, 0x0, 0x0, 0x238) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000100)={'nlmon\t\x00\x7f\xed\xb1[\xe5\xa3\xcd\xb6\x00'}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000001c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_IRQ_LINE_STATUS(r1, 0xc008ae67, &(0x7f0000000280)={0xc, 0xba8e}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 22:43:10 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000300)='/dev/sg#\x00', 0x0, 0x2) write$binfmt_script(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="0700000067c63a7f670d7b51e33746a0594fd6aea9a41792d14700000000000000000011000000000000"], 0x2a) ioctl$SG_IO(r0, 0x2285, 0x0) write$binfmt_script(r0, &(0x7f0000000340)=ANY=[@ANYBLOB='#! ./file0 (posix_acl_access+ /dev/sg#\x00 /dev/sg#'], 0x30) ioctl$SG_GET_REQUEST_TABLE(r0, 0x227d, &(0x7f0000000000)) 22:43:10 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_int(r0, 0x1, 0x30, 0x0, &(0x7f0000000280)) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) 22:43:10 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0x5, 0x1000000000000914, 0x4000000005}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xd, 0x81, 0x4, 0x4, 0x0, r0}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x7, 0x5, &(0x7f00000000c0)=@framed={{}, [@map={0x18, 0x0, 0x1, 0x0, r1}]}, &(0x7f0000000180)='GPL\x00', 0x80000001, 0x1000, &(0x7f0000000400)=""/4096}, 0x48) 22:43:10 executing program 3: syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x0, 0x2) clone(0x700, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000080)='dns_resolver\x00', &(0x7f00000000c0), &(0x7f0000000100), 0x390, 0xfffffffffffffffb) 22:43:10 executing program 1: syz_genetlink_get_family_id$tipc2(&(0x7f0000000780)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, 0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x4, &(0x7f00000000c0)={&(0x7f0000000240)={0x14, 0x1, 0x1, 0xffffffffffffffff}, 0x14}}, 0x0) 22:43:10 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$ndb(0x0, 0x0, 0x0) unshare(0x600) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000280)={'bond_slave_0\x00'}) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000000)={'bond_slave_0\x00', {0x2, 0x0, @loopback}}) bind$alg(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) 22:43:10 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4309(morus640)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="69bef7", 0x3) 22:43:10 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_int(r0, 0x1, 0x30, 0x0, &(0x7f0000000280)) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) 22:43:10 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0x5, 0x1000000000000914, 0x4000000005}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xd, 0x81, 0x4, 0x4, 0x0, r0}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x7, 0x5, &(0x7f00000000c0)=@framed={{}, [@map={0x18, 0x0, 0x1, 0x0, r1}]}, &(0x7f0000000180)='GPL\x00', 0x80000001, 0x1000, &(0x7f0000000400)=""/4096}, 0x48) 22:43:10 executing program 3: syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x0, 0x2) clone(0x700, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000080)='dns_resolver\x00', &(0x7f00000000c0), &(0x7f0000000100), 0x390, 0xfffffffffffffffb) [ 372.778104] Invalid option length (898) for dns_resolver key 22:43:10 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$ndb(0x0, 0x0, 0x0) unshare(0x600) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000280)={'bond_slave_0\x00'}) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000000)={'bond_slave_0\x00', {0x2, 0x0, @loopback}}) bind$alg(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) 22:43:10 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$ndb(0x0, 0x0, 0x0) unshare(0x600) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000280)={'bond_slave_0\x00'}) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000000)={'bond_slave_0\x00', {0x2, 0x0, @loopback}}) bind$alg(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) 22:43:10 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_int(r0, 0x1, 0x30, 0x0, &(0x7f0000000280)) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) 22:43:10 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_int(r0, 0x1, 0x30, 0x0, &(0x7f0000000280)) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) [ 372.941074] Invalid option length (898) for dns_resolver key 22:43:10 executing program 3: syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x0, 0x2) clone(0x700, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000080)='dns_resolver\x00', &(0x7f00000000c0), &(0x7f0000000100), 0x390, 0xfffffffffffffffb) 22:43:10 executing program 3: syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x0, 0x2) clone(0x700, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000080)='dns_resolver\x00', &(0x7f00000000c0), &(0x7f0000000100), 0x390, 0xfffffffffffffffb) [ 373.129136] Invalid option length (898) for dns_resolver key [ 373.250449] Invalid option length (898) for dns_resolver key [ 373.282176] net_ratelimit: 14 callbacks suppressed [ 373.282234] protocol 88fb is buggy, dev hsr_slave_0 [ 373.293236] protocol 88fb is buggy, dev hsr_slave_1 22:43:10 executing program 1: syz_genetlink_get_family_id$tipc2(&(0x7f0000000780)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, 0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x4, &(0x7f00000000c0)={&(0x7f0000000240)={0x14, 0x1, 0x1, 0xffffffffffffffff}, 0x14}}, 0x0) 22:43:10 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='task\x00') getdents64(r1, &(0x7f0000000500)=""/175, 0x5d) exit(0x0) getdents64(r1, &(0x7f0000000000)=""/35, 0x23) 22:43:10 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x1) ioctl$KVM_SET_LAPIC(r4, 0x4400ae8f, &(0x7f0000000340)={"6cdd4237dd245c8404721efdc9c8dc1964125fa96fa42b761c6ec25b2bec0ba4c81036c93a40c8a4d4412a763b00040000000000003c5ca206c047ecee377abaece6b88378e3d63a98fc191f361d264ffa8b46485f02baee1ab6b8154252066178868d1ef4b5365c5dc26ca097ddda7c21a984c2b9ca4bbb7a87165c0c1dbc75d7ea4df10000174a3ac8694525952f44500a1f0db509c32cc7ace842c28f37f06e4ea9f1e5f0c6c379f9cc58bf69fcde318ead4825aa1b6a832d4e48cc41bb5a6baa41d614f6c8941bee805954a62d196a4e8d41f6b21224b57f530d0000c1ff53bf79a1f5c5dc34b2262d66ae793b6304a30b97077f1c131045cbc11c4562d22db88d0edc5daee171cc04d96d9ec2db07478f347edbd6404923ad4a5672b1b285c7988c4ec0922c655ff600000000c00dc290d936d93236051fadfb4b95d02c0bda7ce38dabb7cd103fe4d0c9c963cd717a77f8df8d46099b1f58e068af6afbbc19db161c6df3e7c9c71bc08a282fc2c142856b5e4caff4c0a4f72445ef10dcd2c569319d6e9bb2058d023f669a64fc7d9684b45b00000000364673dcfa9235ea5a2ff23c4bb5c5acb290e8976dcac779ff000000000000003d4e185afe28b774b99d3890bd37428617de4cdd6f53c419ce31054182fd098af7b7f1b1152c691611f897558d4b755cb783978d9859b0537b05b623dcb5c4ca9317471a40fa4998cca80e961efffb4e1aa25d8a17deef0c8694c4395fc99be3c3fe7aeb8af4929ce7d346ca62b25d48fda5d10146702f78b233b5208752726ed9f0c340d494b92d19cc930bb8a5f8b4da8f4603ac0c3b698384e17a570dc8524823ed15af4ecfabb4b2541d3c114b7bba1c21a845c9cf0d1cc24aba47e30f558b2246ad95ccf7d2f80cc0ab26f08336ea1a33b79cf35b898837016eb211a1734c7af076e15451e33519fc978f66df7df4557c91024a8dc130a28ef5f63ad07b39c8d23b85cf434e065e8a29a800655d127de6f6347b4951f97b5703dc78b1ca9d74ea6a9ae12ab367c0de2659cc38d2f33ddd86e0597d33361eada119b5132145fa4525c488c7fffd6ceda6e9a02ebd97ced6b0161f2cc84615ceb8b18883299c636e9e46724a9a0600a8bb02f3e489631d522019a35fe12a33caf9dd8768ddbc02a484c345c3eff254297b1dbb04989c3f9f3c7b3c985c39b1d313018068d3809bac8c657e39f4f692613e28387e955722908dd88b56163be8312ff47c5b6f280472935af74e97a5a8110a4d74496f4c8ec82ddb56d9b962d2fc43fa01a047526865c84f7cff36056cc4ac258021e1581d43badaaec6cc5a2ef989de9801fed6d4be2bfcfe07a69c46bffbe9dd03970800000000000000d372bdd6d89dc1ecf63c23d506114d0fba2bd1c69e8f7e3fccdcda85ce975ec1381b1cec6ddaa76e186719d8191643"}) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_X86_SET_MCE(r4, 0x4008ae93, &(0x7f0000000200)={0x10}) dup2(r1, r4) 22:43:10 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000dddfc8)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="2c00000004080501ff0080fffdfffbae3ee3fb000c0003002100001c7d0a00010c000200000afa17711104a6"], 0x2c}}, 0x0) [ 373.563251] protocol 88fb is buggy, dev hsr_slave_0 [ 373.568356] protocol 88fb is buggy, dev hsr_slave_1 [ 373.723853] protocol 88fb is buggy, dev hsr_slave_0 [ 373.729359] protocol 88fb is buggy, dev hsr_slave_1 [ 373.741565] netlink: 'syz-executor.2': attribute type 3 has an invalid length. 22:43:11 executing program 1: syz_genetlink_get_family_id$tipc2(&(0x7f0000000780)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, 0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x4, &(0x7f00000000c0)={&(0x7f0000000240)={0x14, 0x1, 0x1, 0xffffffffffffffff}, 0x14}}, 0x0) 22:43:11 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000dddfc8)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="2c00000004080501ff0080fffdfffbae3ee3fb000c0003002100001c7d0a00010c000200000afa17711104a6"], 0x2c}}, 0x0) [ 373.768536] netlink: 'syz-executor.2': attribute type 2 has an invalid length. [ 373.883600] protocol 88fb is buggy, dev hsr_slave_0 [ 373.889430] protocol 88fb is buggy, dev hsr_slave_1 [ 374.166574] netlink: 'syz-executor.2': attribute type 3 has an invalid length. 22:43:11 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$ndb(0x0, 0x0, 0x0) unshare(0x600) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000280)={'bond_slave_0\x00'}) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000000)={'bond_slave_0\x00', {0x2, 0x0, @loopback}}) bind$alg(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) [ 374.265278] netlink: 'syz-executor.2': attribute type 2 has an invalid length. 22:43:11 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$ndb(0x0, 0x0, 0x0) unshare(0x600) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000280)={'bond_slave_0\x00'}) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000000)={'bond_slave_0\x00', {0x2, 0x0, @loopback}}) bind$alg(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) 22:43:11 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000300)={0x4, 0x0, &(0x7f0000000080)={&(0x7f0000001400)={0x2, 0x4, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe000000a}}, @sadb_sa={0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}, 0x1, 0x2000000000000000}, 0x0) 22:43:11 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) gettid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) getpid() prctl$PR_SET_SECCOMP(0x16, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x10b) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) 22:43:11 executing program 5: mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mount(0x0, &(0x7f0000000480)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000500)='sysfs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @ipv4={[], [], @loopback}}, 0x1c) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)}, 0x0) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) symlink(&(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f00000002c0)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) sendmmsg$sock(0xffffffffffffffff, &(0x7f0000000100)=[{{&(0x7f00000001c0)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x4e23, 0x200, @mcast2, 0x1000}}, 0x80, &(0x7f0000000240)=[{&(0x7f0000000000)="7cd23e32b893fd18cb25b4d2f8bcc6dee1e27ff96d5164765a1be3f9bf0a72f75b4d97", 0x23}, {0x0}, {&(0x7f0000000300)="153c92440b8360640921d66c82c0ed85422c87f0300a3b9c24eadf4c5c8ecc7194bdfeca156d7af07a5ae445b690609448ee870e7bc022d64c7d1ac1d7cef06d80c294ed39545d8f350a756734b00716bcba25b2781a412fe53566386d79753f2720fca4f4bce6b9a5270d72f972", 0x6e}, {&(0x7f00000003c0)="fa8cb4bcc981dd3a3c2e52a9466f3a63b5f1db9cdfda3239c9ebb7a4f424c4782a5320fde4884a5433f1a9b53582e7f0fd45ea8b6cddc04899d358a473375b569c1aee365fadc889d0b3743d944f5c02be47d5b105e8b3605842e040893ce2f050908d995f2a46c86ef0ab", 0x6b}, {&(0x7f0000000540)="422393c9241083ad35d8d06ee8a454f1c2427f16e09556df6bcc25e75e2e67ab51bd02a8b662fd76c7761799fe3d2204952bbf64f7645928260fa7b038bdddcf4d854bcb6cdb5155db872bbf7ef6f43b75f244f1844539884f0f51267f878a7b6ce5e3a40e98dc35b271569d733607990e36ef08c94bfa12eb945c2c9e38b0dfd768fb8ecb1229384d16b3", 0x8b}, {&(0x7f0000000600)="6d7efbc111fca13003bd10910c9c3f40f202b5e5cc3c02798ae759ea26b713698620ed57a61d5b779e5da1bc89d9c4ee79df15a74aa7d361317b717e97a5f24108fc02f129e444d91d178baeb6251ecd62cccc18bd44e03a16608e96d74e7326caffcab76aa054bced96544fbc0e0268875f069be3225ee914757bc9397a0d965cb767233758719c8188e6aa7ae8607423a68937b702d89f59526714e61f98b58d5a269395ae5a04", 0xa8}, {&(0x7f00000006c0)="073871101c3abfdbaa10b887a3ef9fbfcb598f6f5c9849869c2824ccf5ab8213e32e8fd28279fcfaac6e3856250de1a53a0396ae15c9d975d14aaf28b07dbe70dafb55f5f0952fd6bdf385815d2ca5f97a6f79305a1214132ff11139ca10462f9cd8de8ea71f7c0b180fb4138f67e5d6457a70b5b66edad0d842c36c5ecb67a34cf91c3a2d40901afd7a99d080a50d4a836578aa4361f2e287d5260a78ebabe14d97cddde8d6342af3cffc7d123b5027e0783fca4654166cf13589f04be37586d4935eb136dd8aff0373ad6061ceafa55928f19ee60dce24b4d6d227a8c4d7cbf8c1e347629f1b838f9b51dc0ac4c89bcb78ee0e82", 0xf5}, {&(0x7f00000007c0)="2b061886d7736371f7800d5f249948620a4100dd90f54aa6ce50a869b2b94cdb4e0e7c233880a8cd34d200f43add50d704a6700fe8630f52d9183b5e3e843c49508bc19856cb2bd7eb99c0c6c1afbbe17470271459e8fa89fee4022c3295e983c8c8f5c4fcc7ed66690b783df948073b6b12ca22802c64b693681e053a0fee7052b25f545ac407b7068ab3190ad1016e3c5a300c43f78b8a2ce90ef6fd1fddbe295bce73390e741c1b", 0xa9}], 0x8}}], 0x1, 0x200400c0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000880)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(r2, &(0x7f0000000940)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x4040000}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x2c, r3, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0x4102, 0x0, {0x10, 0x13, @l2={'ib', 0x3a, 'ip6_vti0\x00'}}}, ["", "", "", ""]}, 0x2c}, 0x1, 0x0, 0x0, 0x14}, 0x8001) unlink(&(0x7f0000000040)='./file0\x00') 22:43:11 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000dddfc8)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="2c00000004080501ff0080fffdfffbae3ee3fb000c0003002100001c7d0a00010c000200000afa17711104a6"], 0x2c}}, 0x0) [ 374.446300] netlink: 'syz-executor.2': attribute type 3 has an invalid length. 22:43:11 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$ndb(0x0, 0x0, 0x0) unshare(0x600) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000280)={'bond_slave_0\x00'}) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000000)={'bond_slave_0\x00', {0x2, 0x0, @loopback}}) bind$alg(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) [ 374.506569] netlink: 'syz-executor.2': attribute type 2 has an invalid length. 22:43:12 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000300)={0x4, 0x0, &(0x7f0000000080)={&(0x7f0000001400)={0x2, 0x4, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe000000a}}, @sadb_sa={0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}, 0x1, 0x2000000000000000}, 0x0) 22:43:12 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000dddfc8)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="2c00000004080501ff0080fffdfffbae3ee3fb000c0003002100001c7d0a00010c000200000afa17711104a6"], 0x2c}}, 0x0) 22:43:12 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$ndb(0x0, 0x0, 0x0) unshare(0x600) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000280)={'bond_slave_0\x00'}) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000000)={'bond_slave_0\x00', {0x2, 0x0, @loopback}}) bind$alg(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) [ 374.680894] netlink: 'syz-executor.2': attribute type 3 has an invalid length. [ 374.688819] netlink: 'syz-executor.2': attribute type 2 has an invalid length. 22:43:12 executing program 2: r0 = socket$inet6(0xa, 0x100000000000001, 0x84) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$bt_hci(r0, 0x84, 0x72, &(0x7f0000000080)=""/4096, &(0x7f0000001140)=0x1000) mmap(&(0x7f0000000000/0xef9000)=nil, 0xef9000, 0x2, 0x32, 0xffffffffffffffff, 0x0) 22:43:12 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000300)={0x4, 0x0, &(0x7f0000000080)={&(0x7f0000001400)={0x2, 0x4, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe000000a}}, @sadb_sa={0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}, 0x1, 0x2000000000000000}, 0x0) 22:43:12 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000300)={0x4, 0x0, &(0x7f0000000080)={&(0x7f0000001400)={0x2, 0x4, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe000000a}}, @sadb_sa={0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}, 0x1, 0x2000000000000000}, 0x0) 22:43:12 executing program 2: r0 = socket$inet6(0xa, 0x100000000000001, 0x84) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$bt_hci(r0, 0x84, 0x72, &(0x7f0000000080)=""/4096, &(0x7f0000001140)=0x1000) mmap(&(0x7f0000000000/0xef9000)=nil, 0xef9000, 0x2, 0x32, 0xffffffffffffffff, 0x0) 22:43:12 executing program 3: r0 = socket$inet6(0xa, 0x100000000000001, 0x84) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$bt_hci(r0, 0x84, 0x72, &(0x7f0000000080)=""/4096, &(0x7f0000001140)=0x1000) mmap(&(0x7f0000000000/0xef9000)=nil, 0xef9000, 0x2, 0x32, 0xffffffffffffffff, 0x0) 22:43:12 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) gettid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) getpid() prctl$PR_SET_SECCOMP(0x16, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x10b) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) [ 375.323306] protocol 88fb is buggy, dev hsr_slave_0 [ 375.328562] protocol 88fb is buggy, dev hsr_slave_1 22:43:13 executing program 5: mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mount(0x0, &(0x7f0000000480)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000500)='sysfs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @ipv4={[], [], @loopback}}, 0x1c) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)}, 0x0) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) symlink(&(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f00000002c0)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) sendmmsg$sock(0xffffffffffffffff, &(0x7f0000000100)=[{{&(0x7f00000001c0)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x4e23, 0x200, @mcast2, 0x1000}}, 0x80, &(0x7f0000000240)=[{&(0x7f0000000000)="7cd23e32b893fd18cb25b4d2f8bcc6dee1e27ff96d5164765a1be3f9bf0a72f75b4d97", 0x23}, {0x0}, {&(0x7f0000000300)="153c92440b8360640921d66c82c0ed85422c87f0300a3b9c24eadf4c5c8ecc7194bdfeca156d7af07a5ae445b690609448ee870e7bc022d64c7d1ac1d7cef06d80c294ed39545d8f350a756734b00716bcba25b2781a412fe53566386d79753f2720fca4f4bce6b9a5270d72f972", 0x6e}, {&(0x7f00000003c0)="fa8cb4bcc981dd3a3c2e52a9466f3a63b5f1db9cdfda3239c9ebb7a4f424c4782a5320fde4884a5433f1a9b53582e7f0fd45ea8b6cddc04899d358a473375b569c1aee365fadc889d0b3743d944f5c02be47d5b105e8b3605842e040893ce2f050908d995f2a46c86ef0ab", 0x6b}, {&(0x7f0000000540)="422393c9241083ad35d8d06ee8a454f1c2427f16e09556df6bcc25e75e2e67ab51bd02a8b662fd76c7761799fe3d2204952bbf64f7645928260fa7b038bdddcf4d854bcb6cdb5155db872bbf7ef6f43b75f244f1844539884f0f51267f878a7b6ce5e3a40e98dc35b271569d733607990e36ef08c94bfa12eb945c2c9e38b0dfd768fb8ecb1229384d16b3", 0x8b}, {&(0x7f0000000600)="6d7efbc111fca13003bd10910c9c3f40f202b5e5cc3c02798ae759ea26b713698620ed57a61d5b779e5da1bc89d9c4ee79df15a74aa7d361317b717e97a5f24108fc02f129e444d91d178baeb6251ecd62cccc18bd44e03a16608e96d74e7326caffcab76aa054bced96544fbc0e0268875f069be3225ee914757bc9397a0d965cb767233758719c8188e6aa7ae8607423a68937b702d89f59526714e61f98b58d5a269395ae5a04", 0xa8}, {&(0x7f00000006c0)="073871101c3abfdbaa10b887a3ef9fbfcb598f6f5c9849869c2824ccf5ab8213e32e8fd28279fcfaac6e3856250de1a53a0396ae15c9d975d14aaf28b07dbe70dafb55f5f0952fd6bdf385815d2ca5f97a6f79305a1214132ff11139ca10462f9cd8de8ea71f7c0b180fb4138f67e5d6457a70b5b66edad0d842c36c5ecb67a34cf91c3a2d40901afd7a99d080a50d4a836578aa4361f2e287d5260a78ebabe14d97cddde8d6342af3cffc7d123b5027e0783fca4654166cf13589f04be37586d4935eb136dd8aff0373ad6061ceafa55928f19ee60dce24b4d6d227a8c4d7cbf8c1e347629f1b838f9b51dc0ac4c89bcb78ee0e82", 0xf5}, {&(0x7f00000007c0)="2b061886d7736371f7800d5f249948620a4100dd90f54aa6ce50a869b2b94cdb4e0e7c233880a8cd34d200f43add50d704a6700fe8630f52d9183b5e3e843c49508bc19856cb2bd7eb99c0c6c1afbbe17470271459e8fa89fee4022c3295e983c8c8f5c4fcc7ed66690b783df948073b6b12ca22802c64b693681e053a0fee7052b25f545ac407b7068ab3190ad1016e3c5a300c43f78b8a2ce90ef6fd1fddbe295bce73390e741c1b", 0xa9}], 0x8}}], 0x1, 0x200400c0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000880)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(r2, &(0x7f0000000940)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x4040000}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x2c, r3, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0x4102, 0x0, {0x10, 0x13, @l2={'ib', 0x3a, 'ip6_vti0\x00'}}}, ["", "", "", ""]}, 0x2c}, 0x1, 0x0, 0x0, 0x14}, 0x8001) unlink(&(0x7f0000000040)='./file0\x00') 22:43:13 executing program 3: r0 = socket$inet6(0xa, 0x100000000000001, 0x84) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$bt_hci(r0, 0x84, 0x72, &(0x7f0000000080)=""/4096, &(0x7f0000001140)=0x1000) mmap(&(0x7f0000000000/0xef9000)=nil, 0xef9000, 0x2, 0x32, 0xffffffffffffffff, 0x0) 22:43:13 executing program 2: r0 = socket$inet6(0xa, 0x100000000000001, 0x84) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$bt_hci(r0, 0x84, 0x72, &(0x7f0000000080)=""/4096, &(0x7f0000001140)=0x1000) mmap(&(0x7f0000000000/0xef9000)=nil, 0xef9000, 0x2, 0x32, 0xffffffffffffffff, 0x0) 22:43:13 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) gettid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) getpid() prctl$PR_SET_SECCOMP(0x16, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x10b) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) 22:43:13 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) gettid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) getpid() prctl$PR_SET_SECCOMP(0x16, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000580)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000e5be38f71f653f0ffb09f0d536b52ef47357d39c32ab00fe53be639e6454e6cac250d8e2df526b7649a855bdc81e6068176202ab7ec18dbddec9b14c3af4080989a1caf45705a64b208ef83365cf6323d1b58bb74d0a3290076e872bd19ae875908bf97ab38c3eba1e28797fa312d43d9d7f1790a49bcf019fc5145b57b15e0e0f3bc99e5104534cf3e791889142ec4eee7057e5f50d6007e78b9d327a1ca829d1c859eba3281d3ab27c0d81d1aea15bdd73aeb8eb68213657ef4528e693c1f23f5120960b38f66e1d1e831235927c7c8cf85395e926ec86be96bf9483ce1e5594f3d40bca3e63"], 0x10b) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) 22:43:14 executing program 2: r0 = socket$inet6(0xa, 0x100000000000001, 0x84) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$bt_hci(r0, 0x84, 0x72, &(0x7f0000000080)=""/4096, &(0x7f0000001140)=0x1000) mmap(&(0x7f0000000000/0xef9000)=nil, 0xef9000, 0x2, 0x32, 0xffffffffffffffff, 0x0) 22:43:14 executing program 3: r0 = socket$inet6(0xa, 0x100000000000001, 0x84) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$bt_hci(r0, 0x84, 0x72, &(0x7f0000000080)=""/4096, &(0x7f0000001140)=0x1000) mmap(&(0x7f0000000000/0xef9000)=nil, 0xef9000, 0x2, 0x32, 0xffffffffffffffff, 0x0) 22:43:14 executing program 0: mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mount(0x0, &(0x7f0000000480)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000500)='sysfs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @ipv4={[], [], @loopback}}, 0x1c) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)}, 0x0) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) symlink(&(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f00000002c0)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) sendmmsg$sock(0xffffffffffffffff, &(0x7f0000000100)=[{{&(0x7f00000001c0)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x4e23, 0x200, @mcast2, 0x1000}}, 0x80, &(0x7f0000000240)=[{&(0x7f0000000000)="7cd23e32b893fd18cb25b4d2f8bcc6dee1e27ff96d5164765a1be3f9bf0a72f75b4d97", 0x23}, {0x0}, {&(0x7f0000000300)="153c92440b8360640921d66c82c0ed85422c87f0300a3b9c24eadf4c5c8ecc7194bdfeca156d7af07a5ae445b690609448ee870e7bc022d64c7d1ac1d7cef06d80c294ed39545d8f350a756734b00716bcba25b2781a412fe53566386d79753f2720fca4f4bce6b9a5270d72f972", 0x6e}, {&(0x7f00000003c0)="fa8cb4bcc981dd3a3c2e52a9466f3a63b5f1db9cdfda3239c9ebb7a4f424c4782a5320fde4884a5433f1a9b53582e7f0fd45ea8b6cddc04899d358a473375b569c1aee365fadc889d0b3743d944f5c02be47d5b105e8b3605842e040893ce2f050908d995f2a46c86ef0ab", 0x6b}, {&(0x7f0000000540)="422393c9241083ad35d8d06ee8a454f1c2427f16e09556df6bcc25e75e2e67ab51bd02a8b662fd76c7761799fe3d2204952bbf64f7645928260fa7b038bdddcf4d854bcb6cdb5155db872bbf7ef6f43b75f244f1844539884f0f51267f878a7b6ce5e3a40e98dc35b271569d733607990e36ef08c94bfa12eb945c2c9e38b0dfd768fb8ecb1229384d16b3", 0x8b}, {&(0x7f0000000600)="6d7efbc111fca13003bd10910c9c3f40f202b5e5cc3c02798ae759ea26b713698620ed57a61d5b779e5da1bc89d9c4ee79df15a74aa7d361317b717e97a5f24108fc02f129e444d91d178baeb6251ecd62cccc18bd44e03a16608e96d74e7326caffcab76aa054bced96544fbc0e0268875f069be3225ee914757bc9397a0d965cb767233758719c8188e6aa7ae8607423a68937b702d89f59526714e61f98b58d5a269395ae5a04", 0xa8}, {&(0x7f00000006c0)="073871101c3abfdbaa10b887a3ef9fbfcb598f6f5c9849869c2824ccf5ab8213e32e8fd28279fcfaac6e3856250de1a53a0396ae15c9d975d14aaf28b07dbe70dafb55f5f0952fd6bdf385815d2ca5f97a6f79305a1214132ff11139ca10462f9cd8de8ea71f7c0b180fb4138f67e5d6457a70b5b66edad0d842c36c5ecb67a34cf91c3a2d40901afd7a99d080a50d4a836578aa4361f2e287d5260a78ebabe14d97cddde8d6342af3cffc7d123b5027e0783fca4654166cf13589f04be37586d4935eb136dd8aff0373ad6061ceafa55928f19ee60dce24b4d6d227a8c4d7cbf8c1e347629f1b838f9b51dc0ac4c89bcb78ee0e82", 0xf5}, {&(0x7f00000007c0)="2b061886d7736371f7800d5f249948620a4100dd90f54aa6ce50a869b2b94cdb4e0e7c233880a8cd34d200f43add50d704a6700fe8630f52d9183b5e3e843c49508bc19856cb2bd7eb99c0c6c1afbbe17470271459e8fa89fee4022c3295e983c8c8f5c4fcc7ed66690b783df948073b6b12ca22802c64b693681e053a0fee7052b25f545ac407b7068ab3190ad1016e3c5a300c43f78b8a2ce90ef6fd1fddbe295bce73390e741c1b", 0xa9}], 0x8}}], 0x1, 0x200400c0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000880)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(r2, &(0x7f0000000940)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x4040000}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x2c, r3, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0x4102, 0x0, {0x10, 0x13, @l2={'ib', 0x3a, 'ip6_vti0\x00'}}}, ["", "", "", ""]}, 0x2c}, 0x1, 0x0, 0x0, 0x14}, 0x8001) unlink(&(0x7f0000000040)='./file0\x00') 22:43:14 executing program 2: mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mount(0x0, &(0x7f0000000480)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000500)='sysfs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @ipv4={[], [], @loopback}}, 0x1c) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)}, 0x0) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) symlink(&(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f00000002c0)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) sendmmsg$sock(0xffffffffffffffff, &(0x7f0000000100)=[{{&(0x7f00000001c0)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x4e23, 0x200, @mcast2, 0x1000}}, 0x80, &(0x7f0000000240)=[{&(0x7f0000000000)="7cd23e32b893fd18cb25b4d2f8bcc6dee1e27ff96d5164765a1be3f9bf0a72f75b4d97", 0x23}, {0x0}, {&(0x7f0000000300)="153c92440b8360640921d66c82c0ed85422c87f0300a3b9c24eadf4c5c8ecc7194bdfeca156d7af07a5ae445b690609448ee870e7bc022d64c7d1ac1d7cef06d80c294ed39545d8f350a756734b00716bcba25b2781a412fe53566386d79753f2720fca4f4bce6b9a5270d72f972", 0x6e}, {&(0x7f00000003c0)="fa8cb4bcc981dd3a3c2e52a9466f3a63b5f1db9cdfda3239c9ebb7a4f424c4782a5320fde4884a5433f1a9b53582e7f0fd45ea8b6cddc04899d358a473375b569c1aee365fadc889d0b3743d944f5c02be47d5b105e8b3605842e040893ce2f050908d995f2a46c86ef0ab", 0x6b}, {&(0x7f0000000540)="422393c9241083ad35d8d06ee8a454f1c2427f16e09556df6bcc25e75e2e67ab51bd02a8b662fd76c7761799fe3d2204952bbf64f7645928260fa7b038bdddcf4d854bcb6cdb5155db872bbf7ef6f43b75f244f1844539884f0f51267f878a7b6ce5e3a40e98dc35b271569d733607990e36ef08c94bfa12eb945c2c9e38b0dfd768fb8ecb1229384d16b3", 0x8b}, {&(0x7f0000000600)="6d7efbc111fca13003bd10910c9c3f40f202b5e5cc3c02798ae759ea26b713698620ed57a61d5b779e5da1bc89d9c4ee79df15a74aa7d361317b717e97a5f24108fc02f129e444d91d178baeb6251ecd62cccc18bd44e03a16608e96d74e7326caffcab76aa054bced96544fbc0e0268875f069be3225ee914757bc9397a0d965cb767233758719c8188e6aa7ae8607423a68937b702d89f59526714e61f98b58d5a269395ae5a04", 0xa8}, {&(0x7f00000006c0)="073871101c3abfdbaa10b887a3ef9fbfcb598f6f5c9849869c2824ccf5ab8213e32e8fd28279fcfaac6e3856250de1a53a0396ae15c9d975d14aaf28b07dbe70dafb55f5f0952fd6bdf385815d2ca5f97a6f79305a1214132ff11139ca10462f9cd8de8ea71f7c0b180fb4138f67e5d6457a70b5b66edad0d842c36c5ecb67a34cf91c3a2d40901afd7a99d080a50d4a836578aa4361f2e287d5260a78ebabe14d97cddde8d6342af3cffc7d123b5027e0783fca4654166cf13589f04be37586d4935eb136dd8aff0373ad6061ceafa55928f19ee60dce24b4d6d227a8c4d7cbf8c1e347629f1b838f9b51dc0ac4c89bcb78ee0e82", 0xf5}, {&(0x7f00000007c0)="2b061886d7736371f7800d5f249948620a4100dd90f54aa6ce50a869b2b94cdb4e0e7c233880a8cd34d200f43add50d704a6700fe8630f52d9183b5e3e843c49508bc19856cb2bd7eb99c0c6c1afbbe17470271459e8fa89fee4022c3295e983c8c8f5c4fcc7ed66690b783df948073b6b12ca22802c64b693681e053a0fee7052b25f545ac407b7068ab3190ad1016e3c5a300c43f78b8a2ce90ef6fd1fddbe295bce73390e741c1b", 0xa9}], 0x8}}], 0x1, 0x200400c0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000880)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(r2, &(0x7f0000000940)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x4040000}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x2c, r3, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0x4102, 0x0, {0x10, 0x13, @l2={'ib', 0x3a, 'ip6_vti0\x00'}}}, ["", "", "", ""]}, 0x2c}, 0x1, 0x0, 0x0, 0x14}, 0x8001) unlink(&(0x7f0000000040)='./file0\x00') 22:43:14 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) gettid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) getpid() prctl$PR_SET_SECCOMP(0x16, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x10b) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) 22:43:14 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) gettid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) getpid() prctl$PR_SET_SECCOMP(0x16, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x10b) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) 22:43:15 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x6800000000000000}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x18}]}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) 22:43:15 executing program 5: mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mount(0x0, &(0x7f0000000480)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000500)='sysfs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @ipv4={[], [], @loopback}}, 0x1c) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)}, 0x0) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) symlink(&(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f00000002c0)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) sendmmsg$sock(0xffffffffffffffff, &(0x7f0000000100)=[{{&(0x7f00000001c0)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x4e23, 0x200, @mcast2, 0x1000}}, 0x80, &(0x7f0000000240)=[{&(0x7f0000000000)="7cd23e32b893fd18cb25b4d2f8bcc6dee1e27ff96d5164765a1be3f9bf0a72f75b4d97", 0x23}, {0x0}, {&(0x7f0000000300)="153c92440b8360640921d66c82c0ed85422c87f0300a3b9c24eadf4c5c8ecc7194bdfeca156d7af07a5ae445b690609448ee870e7bc022d64c7d1ac1d7cef06d80c294ed39545d8f350a756734b00716bcba25b2781a412fe53566386d79753f2720fca4f4bce6b9a5270d72f972", 0x6e}, {&(0x7f00000003c0)="fa8cb4bcc981dd3a3c2e52a9466f3a63b5f1db9cdfda3239c9ebb7a4f424c4782a5320fde4884a5433f1a9b53582e7f0fd45ea8b6cddc04899d358a473375b569c1aee365fadc889d0b3743d944f5c02be47d5b105e8b3605842e040893ce2f050908d995f2a46c86ef0ab", 0x6b}, {&(0x7f0000000540)="422393c9241083ad35d8d06ee8a454f1c2427f16e09556df6bcc25e75e2e67ab51bd02a8b662fd76c7761799fe3d2204952bbf64f7645928260fa7b038bdddcf4d854bcb6cdb5155db872bbf7ef6f43b75f244f1844539884f0f51267f878a7b6ce5e3a40e98dc35b271569d733607990e36ef08c94bfa12eb945c2c9e38b0dfd768fb8ecb1229384d16b3", 0x8b}, {&(0x7f0000000600)="6d7efbc111fca13003bd10910c9c3f40f202b5e5cc3c02798ae759ea26b713698620ed57a61d5b779e5da1bc89d9c4ee79df15a74aa7d361317b717e97a5f24108fc02f129e444d91d178baeb6251ecd62cccc18bd44e03a16608e96d74e7326caffcab76aa054bced96544fbc0e0268875f069be3225ee914757bc9397a0d965cb767233758719c8188e6aa7ae8607423a68937b702d89f59526714e61f98b58d5a269395ae5a04", 0xa8}, {&(0x7f00000006c0)="073871101c3abfdbaa10b887a3ef9fbfcb598f6f5c9849869c2824ccf5ab8213e32e8fd28279fcfaac6e3856250de1a53a0396ae15c9d975d14aaf28b07dbe70dafb55f5f0952fd6bdf385815d2ca5f97a6f79305a1214132ff11139ca10462f9cd8de8ea71f7c0b180fb4138f67e5d6457a70b5b66edad0d842c36c5ecb67a34cf91c3a2d40901afd7a99d080a50d4a836578aa4361f2e287d5260a78ebabe14d97cddde8d6342af3cffc7d123b5027e0783fca4654166cf13589f04be37586d4935eb136dd8aff0373ad6061ceafa55928f19ee60dce24b4d6d227a8c4d7cbf8c1e347629f1b838f9b51dc0ac4c89bcb78ee0e82", 0xf5}, {&(0x7f00000007c0)="2b061886d7736371f7800d5f249948620a4100dd90f54aa6ce50a869b2b94cdb4e0e7c233880a8cd34d200f43add50d704a6700fe8630f52d9183b5e3e843c49508bc19856cb2bd7eb99c0c6c1afbbe17470271459e8fa89fee4022c3295e983c8c8f5c4fcc7ed66690b783df948073b6b12ca22802c64b693681e053a0fee7052b25f545ac407b7068ab3190ad1016e3c5a300c43f78b8a2ce90ef6fd1fddbe295bce73390e741c1b", 0xa9}], 0x8}}], 0x1, 0x200400c0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000880)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(r2, &(0x7f0000000940)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x4040000}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x2c, r3, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0x4102, 0x0, {0x10, 0x13, @l2={'ib', 0x3a, 'ip6_vti0\x00'}}}, ["", "", "", ""]}, 0x2c}, 0x1, 0x0, 0x0, 0x14}, 0x8001) unlink(&(0x7f0000000040)='./file0\x00') 22:43:15 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x6800000000000000}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x18}]}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) 22:43:15 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) gettid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) getpid() prctl$PR_SET_SECCOMP(0x16, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x10b) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) 22:43:15 executing program 0: mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mount(0x0, &(0x7f0000000480)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000500)='sysfs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @ipv4={[], [], @loopback}}, 0x1c) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)}, 0x0) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) symlink(&(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f00000002c0)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) sendmmsg$sock(0xffffffffffffffff, &(0x7f0000000100)=[{{&(0x7f00000001c0)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x4e23, 0x200, @mcast2, 0x1000}}, 0x80, &(0x7f0000000240)=[{&(0x7f0000000000)="7cd23e32b893fd18cb25b4d2f8bcc6dee1e27ff96d5164765a1be3f9bf0a72f75b4d97", 0x23}, {0x0}, {&(0x7f0000000300)="153c92440b8360640921d66c82c0ed85422c87f0300a3b9c24eadf4c5c8ecc7194bdfeca156d7af07a5ae445b690609448ee870e7bc022d64c7d1ac1d7cef06d80c294ed39545d8f350a756734b00716bcba25b2781a412fe53566386d79753f2720fca4f4bce6b9a5270d72f972", 0x6e}, {&(0x7f00000003c0)="fa8cb4bcc981dd3a3c2e52a9466f3a63b5f1db9cdfda3239c9ebb7a4f424c4782a5320fde4884a5433f1a9b53582e7f0fd45ea8b6cddc04899d358a473375b569c1aee365fadc889d0b3743d944f5c02be47d5b105e8b3605842e040893ce2f050908d995f2a46c86ef0ab", 0x6b}, {&(0x7f0000000540)="422393c9241083ad35d8d06ee8a454f1c2427f16e09556df6bcc25e75e2e67ab51bd02a8b662fd76c7761799fe3d2204952bbf64f7645928260fa7b038bdddcf4d854bcb6cdb5155db872bbf7ef6f43b75f244f1844539884f0f51267f878a7b6ce5e3a40e98dc35b271569d733607990e36ef08c94bfa12eb945c2c9e38b0dfd768fb8ecb1229384d16b3", 0x8b}, {&(0x7f0000000600)="6d7efbc111fca13003bd10910c9c3f40f202b5e5cc3c02798ae759ea26b713698620ed57a61d5b779e5da1bc89d9c4ee79df15a74aa7d361317b717e97a5f24108fc02f129e444d91d178baeb6251ecd62cccc18bd44e03a16608e96d74e7326caffcab76aa054bced96544fbc0e0268875f069be3225ee914757bc9397a0d965cb767233758719c8188e6aa7ae8607423a68937b702d89f59526714e61f98b58d5a269395ae5a04", 0xa8}, {&(0x7f00000006c0)="073871101c3abfdbaa10b887a3ef9fbfcb598f6f5c9849869c2824ccf5ab8213e32e8fd28279fcfaac6e3856250de1a53a0396ae15c9d975d14aaf28b07dbe70dafb55f5f0952fd6bdf385815d2ca5f97a6f79305a1214132ff11139ca10462f9cd8de8ea71f7c0b180fb4138f67e5d6457a70b5b66edad0d842c36c5ecb67a34cf91c3a2d40901afd7a99d080a50d4a836578aa4361f2e287d5260a78ebabe14d97cddde8d6342af3cffc7d123b5027e0783fca4654166cf13589f04be37586d4935eb136dd8aff0373ad6061ceafa55928f19ee60dce24b4d6d227a8c4d7cbf8c1e347629f1b838f9b51dc0ac4c89bcb78ee0e82", 0xf5}, {&(0x7f00000007c0)="2b061886d7736371f7800d5f249948620a4100dd90f54aa6ce50a869b2b94cdb4e0e7c233880a8cd34d200f43add50d704a6700fe8630f52d9183b5e3e843c49508bc19856cb2bd7eb99c0c6c1afbbe17470271459e8fa89fee4022c3295e983c8c8f5c4fcc7ed66690b783df948073b6b12ca22802c64b693681e053a0fee7052b25f545ac407b7068ab3190ad1016e3c5a300c43f78b8a2ce90ef6fd1fddbe295bce73390e741c1b", 0xa9}], 0x8}}], 0x1, 0x200400c0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000880)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(r2, &(0x7f0000000940)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x4040000}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x2c, r3, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0x4102, 0x0, {0x10, 0x13, @l2={'ib', 0x3a, 'ip6_vti0\x00'}}}, ["", "", "", ""]}, 0x2c}, 0x1, 0x0, 0x0, 0x14}, 0x8001) unlink(&(0x7f0000000040)='./file0\x00') 22:43:16 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) dup2(r0, r1) 22:43:16 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x6800000000000000}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x18}]}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) 22:43:16 executing program 1: r0 = syz_open_dev$swradio(&(0x7f0000000240)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_S_EXT_CTRLS(r0, 0xc0205648, &(0x7f0000000080)={0x0, 0x1, 0x0, [0x0, 0x800000000000000], &(0x7f0000000000)={0x98f90a, 0xd408, [], @p_u32=&(0x7f0000000040)}}) 22:43:16 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x6800000000000000}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x18}]}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) 22:43:16 executing program 2: mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mount(0x0, &(0x7f0000000480)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000500)='sysfs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @ipv4={[], [], @loopback}}, 0x1c) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)}, 0x0) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) symlink(&(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f00000002c0)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) sendmmsg$sock(0xffffffffffffffff, &(0x7f0000000100)=[{{&(0x7f00000001c0)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x4e23, 0x200, @mcast2, 0x1000}}, 0x80, &(0x7f0000000240)=[{&(0x7f0000000000)="7cd23e32b893fd18cb25b4d2f8bcc6dee1e27ff96d5164765a1be3f9bf0a72f75b4d97", 0x23}, {0x0}, {&(0x7f0000000300)="153c92440b8360640921d66c82c0ed85422c87f0300a3b9c24eadf4c5c8ecc7194bdfeca156d7af07a5ae445b690609448ee870e7bc022d64c7d1ac1d7cef06d80c294ed39545d8f350a756734b00716bcba25b2781a412fe53566386d79753f2720fca4f4bce6b9a5270d72f972", 0x6e}, {&(0x7f00000003c0)="fa8cb4bcc981dd3a3c2e52a9466f3a63b5f1db9cdfda3239c9ebb7a4f424c4782a5320fde4884a5433f1a9b53582e7f0fd45ea8b6cddc04899d358a473375b569c1aee365fadc889d0b3743d944f5c02be47d5b105e8b3605842e040893ce2f050908d995f2a46c86ef0ab", 0x6b}, {&(0x7f0000000540)="422393c9241083ad35d8d06ee8a454f1c2427f16e09556df6bcc25e75e2e67ab51bd02a8b662fd76c7761799fe3d2204952bbf64f7645928260fa7b038bdddcf4d854bcb6cdb5155db872bbf7ef6f43b75f244f1844539884f0f51267f878a7b6ce5e3a40e98dc35b271569d733607990e36ef08c94bfa12eb945c2c9e38b0dfd768fb8ecb1229384d16b3", 0x8b}, {&(0x7f0000000600)="6d7efbc111fca13003bd10910c9c3f40f202b5e5cc3c02798ae759ea26b713698620ed57a61d5b779e5da1bc89d9c4ee79df15a74aa7d361317b717e97a5f24108fc02f129e444d91d178baeb6251ecd62cccc18bd44e03a16608e96d74e7326caffcab76aa054bced96544fbc0e0268875f069be3225ee914757bc9397a0d965cb767233758719c8188e6aa7ae8607423a68937b702d89f59526714e61f98b58d5a269395ae5a04", 0xa8}, {&(0x7f00000006c0)="073871101c3abfdbaa10b887a3ef9fbfcb598f6f5c9849869c2824ccf5ab8213e32e8fd28279fcfaac6e3856250de1a53a0396ae15c9d975d14aaf28b07dbe70dafb55f5f0952fd6bdf385815d2ca5f97a6f79305a1214132ff11139ca10462f9cd8de8ea71f7c0b180fb4138f67e5d6457a70b5b66edad0d842c36c5ecb67a34cf91c3a2d40901afd7a99d080a50d4a836578aa4361f2e287d5260a78ebabe14d97cddde8d6342af3cffc7d123b5027e0783fca4654166cf13589f04be37586d4935eb136dd8aff0373ad6061ceafa55928f19ee60dce24b4d6d227a8c4d7cbf8c1e347629f1b838f9b51dc0ac4c89bcb78ee0e82", 0xf5}, {&(0x7f00000007c0)="2b061886d7736371f7800d5f249948620a4100dd90f54aa6ce50a869b2b94cdb4e0e7c233880a8cd34d200f43add50d704a6700fe8630f52d9183b5e3e843c49508bc19856cb2bd7eb99c0c6c1afbbe17470271459e8fa89fee4022c3295e983c8c8f5c4fcc7ed66690b783df948073b6b12ca22802c64b693681e053a0fee7052b25f545ac407b7068ab3190ad1016e3c5a300c43f78b8a2ce90ef6fd1fddbe295bce73390e741c1b", 0xa9}], 0x8}}], 0x1, 0x200400c0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000880)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(r2, &(0x7f0000000940)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x4040000}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x2c, r3, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0x4102, 0x0, {0x10, 0x13, @l2={'ib', 0x3a, 'ip6_vti0\x00'}}}, ["", "", "", ""]}, 0x2c}, 0x1, 0x0, 0x0, 0x14}, 0x8001) unlink(&(0x7f0000000040)='./file0\x00') 22:43:16 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000440)={'bridge_slave_0\x00', 0x0}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") sendmsg$nl_route(r1, &(0x7f0000000040)={&(0x7f0000000280)={0x10, 0xf000}, 0x59, &(0x7f0000000200)={&(0x7f0000000240)=@bridge_delneigh={0x28, 0x1c, 0xf07, 0x0, 0x0, {0x7, 0x0, 0x0, r2, 0x2, 0xffffff9e}, [@NDA_LLADDR={0xa, 0x2, @local}]}, 0x42e}}, 0x0) 22:43:16 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="f2a6bad004b00fee0f090f3036f30f1a970000660f3806581e0f08bad004b0beeef30f2af8baa100b000ee", 0x2b}], 0xaaaaaaaaaaaad77, 0x0, 0x0, 0x188) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000040)=0x96d1, 0x4) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) accept4(0xffffffffffffffff, &(0x7f0000000480)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @dev}}, &(0x7f0000000000)=0x80, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x40000004, 0x0, 0x0, 0x0, 0x4cb], 0x100000}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 22:43:16 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) futex(&(0x7f0000000240)=0x2, 0x0, 0x0, 0x0, 0x0, 0x0) [ 379.483304] net_ratelimit: 14 callbacks suppressed [ 379.483312] protocol 88fb is buggy, dev hsr_slave_0 [ 379.493498] protocol 88fb is buggy, dev hsr_slave_1 22:43:17 executing program 5: mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mount(0x0, &(0x7f0000000480)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000500)='sysfs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @ipv4={[], [], @loopback}}, 0x1c) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)}, 0x0) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) symlink(&(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f00000002c0)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) sendmmsg$sock(0xffffffffffffffff, &(0x7f0000000100)=[{{&(0x7f00000001c0)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x4e23, 0x200, @mcast2, 0x1000}}, 0x80, &(0x7f0000000240)=[{&(0x7f0000000000)="7cd23e32b893fd18cb25b4d2f8bcc6dee1e27ff96d5164765a1be3f9bf0a72f75b4d97", 0x23}, {0x0}, {&(0x7f0000000300)="153c92440b8360640921d66c82c0ed85422c87f0300a3b9c24eadf4c5c8ecc7194bdfeca156d7af07a5ae445b690609448ee870e7bc022d64c7d1ac1d7cef06d80c294ed39545d8f350a756734b00716bcba25b2781a412fe53566386d79753f2720fca4f4bce6b9a5270d72f972", 0x6e}, {&(0x7f00000003c0)="fa8cb4bcc981dd3a3c2e52a9466f3a63b5f1db9cdfda3239c9ebb7a4f424c4782a5320fde4884a5433f1a9b53582e7f0fd45ea8b6cddc04899d358a473375b569c1aee365fadc889d0b3743d944f5c02be47d5b105e8b3605842e040893ce2f050908d995f2a46c86ef0ab", 0x6b}, {&(0x7f0000000540)="422393c9241083ad35d8d06ee8a454f1c2427f16e09556df6bcc25e75e2e67ab51bd02a8b662fd76c7761799fe3d2204952bbf64f7645928260fa7b038bdddcf4d854bcb6cdb5155db872bbf7ef6f43b75f244f1844539884f0f51267f878a7b6ce5e3a40e98dc35b271569d733607990e36ef08c94bfa12eb945c2c9e38b0dfd768fb8ecb1229384d16b3", 0x8b}, {&(0x7f0000000600)="6d7efbc111fca13003bd10910c9c3f40f202b5e5cc3c02798ae759ea26b713698620ed57a61d5b779e5da1bc89d9c4ee79df15a74aa7d361317b717e97a5f24108fc02f129e444d91d178baeb6251ecd62cccc18bd44e03a16608e96d74e7326caffcab76aa054bced96544fbc0e0268875f069be3225ee914757bc9397a0d965cb767233758719c8188e6aa7ae8607423a68937b702d89f59526714e61f98b58d5a269395ae5a04", 0xa8}, {&(0x7f00000006c0)="073871101c3abfdbaa10b887a3ef9fbfcb598f6f5c9849869c2824ccf5ab8213e32e8fd28279fcfaac6e3856250de1a53a0396ae15c9d975d14aaf28b07dbe70dafb55f5f0952fd6bdf385815d2ca5f97a6f79305a1214132ff11139ca10462f9cd8de8ea71f7c0b180fb4138f67e5d6457a70b5b66edad0d842c36c5ecb67a34cf91c3a2d40901afd7a99d080a50d4a836578aa4361f2e287d5260a78ebabe14d97cddde8d6342af3cffc7d123b5027e0783fca4654166cf13589f04be37586d4935eb136dd8aff0373ad6061ceafa55928f19ee60dce24b4d6d227a8c4d7cbf8c1e347629f1b838f9b51dc0ac4c89bcb78ee0e82", 0xf5}, {&(0x7f00000007c0)="2b061886d7736371f7800d5f249948620a4100dd90f54aa6ce50a869b2b94cdb4e0e7c233880a8cd34d200f43add50d704a6700fe8630f52d9183b5e3e843c49508bc19856cb2bd7eb99c0c6c1afbbe17470271459e8fa89fee4022c3295e983c8c8f5c4fcc7ed66690b783df948073b6b12ca22802c64b693681e053a0fee7052b25f545ac407b7068ab3190ad1016e3c5a300c43f78b8a2ce90ef6fd1fddbe295bce73390e741c1b", 0xa9}], 0x8}}], 0x1, 0x200400c0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000880)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(r2, &(0x7f0000000940)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x4040000}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x2c, r3, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0x4102, 0x0, {0x10, 0x13, @l2={'ib', 0x3a, 'ip6_vti0\x00'}}}, ["", "", "", ""]}, 0x2c}, 0x1, 0x0, 0x0, 0x14}, 0x8001) unlink(&(0x7f0000000040)='./file0\x00') [ 379.803277] protocol 88fb is buggy, dev hsr_slave_0 [ 379.808405] protocol 88fb is buggy, dev hsr_slave_1 22:43:17 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000000000000dc1338d54400009b84", 0x3c}], 0x1}, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000280)=@filter={'filter\x00', 0xe, 0x4, 0x2f0, 0x0, 0x0, 0x1c8, 0x0, 0x1c8, 0x288, 0x288, 0x288, 0x288, 0x288, 0x4, 0x0, {[{{@uncond, 0x0, 0x98, 0xc0}, @REJECT={0x28, 'REJECT\x00'}}, {{@uncond, 0x0, 0x98, 0xd8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "2682a009acb913b0ac12803afcbe9ab35adef43f9fd0adf2e89bd0a69a42"}}}, {{@ip={@multicast2, @broadcast, 0x0, 0x0, 'veth1_to_bond\x00', 'bcsf0\x00'}, 0x0, 0x98, 0xc0}, @REJECT={0x28, 'REJECT\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x350) 22:43:17 executing program 1: r0 = open(&(0x7f0000000080)='./file0\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r0, 0x0) ftruncate(r0, 0x1045) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000001000)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @remote}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x7]}, 0x5c) setsockopt$inet_int(r1, 0x0, 0x80000000040, &(0x7f0000000ffc), 0x4) 22:43:17 executing program 0: mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mount(0x0, &(0x7f0000000480)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000500)='sysfs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @ipv4={[], [], @loopback}}, 0x1c) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)}, 0x0) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) symlink(&(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f00000002c0)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) sendmmsg$sock(0xffffffffffffffff, &(0x7f0000000100)=[{{&(0x7f00000001c0)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x4e23, 0x200, @mcast2, 0x1000}}, 0x80, &(0x7f0000000240)=[{&(0x7f0000000000)="7cd23e32b893fd18cb25b4d2f8bcc6dee1e27ff96d5164765a1be3f9bf0a72f75b4d97", 0x23}, {0x0}, {&(0x7f0000000300)="153c92440b8360640921d66c82c0ed85422c87f0300a3b9c24eadf4c5c8ecc7194bdfeca156d7af07a5ae445b690609448ee870e7bc022d64c7d1ac1d7cef06d80c294ed39545d8f350a756734b00716bcba25b2781a412fe53566386d79753f2720fca4f4bce6b9a5270d72f972", 0x6e}, {&(0x7f00000003c0)="fa8cb4bcc981dd3a3c2e52a9466f3a63b5f1db9cdfda3239c9ebb7a4f424c4782a5320fde4884a5433f1a9b53582e7f0fd45ea8b6cddc04899d358a473375b569c1aee365fadc889d0b3743d944f5c02be47d5b105e8b3605842e040893ce2f050908d995f2a46c86ef0ab", 0x6b}, {&(0x7f0000000540)="422393c9241083ad35d8d06ee8a454f1c2427f16e09556df6bcc25e75e2e67ab51bd02a8b662fd76c7761799fe3d2204952bbf64f7645928260fa7b038bdddcf4d854bcb6cdb5155db872bbf7ef6f43b75f244f1844539884f0f51267f878a7b6ce5e3a40e98dc35b271569d733607990e36ef08c94bfa12eb945c2c9e38b0dfd768fb8ecb1229384d16b3", 0x8b}, {&(0x7f0000000600)="6d7efbc111fca13003bd10910c9c3f40f202b5e5cc3c02798ae759ea26b713698620ed57a61d5b779e5da1bc89d9c4ee79df15a74aa7d361317b717e97a5f24108fc02f129e444d91d178baeb6251ecd62cccc18bd44e03a16608e96d74e7326caffcab76aa054bced96544fbc0e0268875f069be3225ee914757bc9397a0d965cb767233758719c8188e6aa7ae8607423a68937b702d89f59526714e61f98b58d5a269395ae5a04", 0xa8}, {&(0x7f00000006c0)="073871101c3abfdbaa10b887a3ef9fbfcb598f6f5c9849869c2824ccf5ab8213e32e8fd28279fcfaac6e3856250de1a53a0396ae15c9d975d14aaf28b07dbe70dafb55f5f0952fd6bdf385815d2ca5f97a6f79305a1214132ff11139ca10462f9cd8de8ea71f7c0b180fb4138f67e5d6457a70b5b66edad0d842c36c5ecb67a34cf91c3a2d40901afd7a99d080a50d4a836578aa4361f2e287d5260a78ebabe14d97cddde8d6342af3cffc7d123b5027e0783fca4654166cf13589f04be37586d4935eb136dd8aff0373ad6061ceafa55928f19ee60dce24b4d6d227a8c4d7cbf8c1e347629f1b838f9b51dc0ac4c89bcb78ee0e82", 0xf5}, {&(0x7f00000007c0)="2b061886d7736371f7800d5f249948620a4100dd90f54aa6ce50a869b2b94cdb4e0e7c233880a8cd34d200f43add50d704a6700fe8630f52d9183b5e3e843c49508bc19856cb2bd7eb99c0c6c1afbbe17470271459e8fa89fee4022c3295e983c8c8f5c4fcc7ed66690b783df948073b6b12ca22802c64b693681e053a0fee7052b25f545ac407b7068ab3190ad1016e3c5a300c43f78b8a2ce90ef6fd1fddbe295bce73390e741c1b", 0xa9}], 0x8}}], 0x1, 0x200400c0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000880)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(r2, &(0x7f0000000940)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x4040000}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x2c, r3, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0x4102, 0x0, {0x10, 0x13, @l2={'ib', 0x3a, 'ip6_vti0\x00'}}}, ["", "", "", ""]}, 0x2c}, 0x1, 0x0, 0x0, 0x14}, 0x8001) unlink(&(0x7f0000000040)='./file0\x00') 22:43:17 executing program 4: mbind(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc000, 0x0, 0x0, 0x0) 22:43:17 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000000000000dc1338d54400009b84", 0x3c}], 0x1}, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000280)=@filter={'filter\x00', 0xe, 0x4, 0x2f0, 0x0, 0x0, 0x1c8, 0x0, 0x1c8, 0x288, 0x288, 0x288, 0x288, 0x288, 0x4, 0x0, {[{{@uncond, 0x0, 0x98, 0xc0}, @REJECT={0x28, 'REJECT\x00'}}, {{@uncond, 0x0, 0x98, 0xd8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "2682a009acb913b0ac12803afcbe9ab35adef43f9fd0adf2e89bd0a69a42"}}}, {{@ip={@multicast2, @broadcast, 0x0, 0x0, 'veth1_to_bond\x00', 'bcsf0\x00'}, 0x0, 0x98, 0xc0}, @REJECT={0x28, 'REJECT\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x350) 22:43:17 executing program 4: mbind(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc000, 0x0, 0x0, 0x0) [ 379.963273] protocol 88fb is buggy, dev hsr_slave_0 [ 379.968391] protocol 88fb is buggy, dev hsr_slave_1 22:43:17 executing program 1: r0 = open(&(0x7f0000000080)='./file0\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r0, 0x0) ftruncate(r0, 0x1045) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000001000)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @remote}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x7]}, 0x5c) setsockopt$inet_int(r1, 0x0, 0x80000000040, &(0x7f0000000ffc), 0x4) [ 380.123624] protocol 88fb is buggy, dev hsr_slave_0 [ 380.128835] protocol 88fb is buggy, dev hsr_slave_1 22:43:18 executing program 2: mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mount(0x0, &(0x7f0000000480)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000500)='sysfs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @ipv4={[], [], @loopback}}, 0x1c) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)}, 0x0) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) symlink(&(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f00000002c0)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) sendmmsg$sock(0xffffffffffffffff, &(0x7f0000000100)=[{{&(0x7f00000001c0)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x4e23, 0x200, @mcast2, 0x1000}}, 0x80, &(0x7f0000000240)=[{&(0x7f0000000000)="7cd23e32b893fd18cb25b4d2f8bcc6dee1e27ff96d5164765a1be3f9bf0a72f75b4d97", 0x23}, {0x0}, {&(0x7f0000000300)="153c92440b8360640921d66c82c0ed85422c87f0300a3b9c24eadf4c5c8ecc7194bdfeca156d7af07a5ae445b690609448ee870e7bc022d64c7d1ac1d7cef06d80c294ed39545d8f350a756734b00716bcba25b2781a412fe53566386d79753f2720fca4f4bce6b9a5270d72f972", 0x6e}, {&(0x7f00000003c0)="fa8cb4bcc981dd3a3c2e52a9466f3a63b5f1db9cdfda3239c9ebb7a4f424c4782a5320fde4884a5433f1a9b53582e7f0fd45ea8b6cddc04899d358a473375b569c1aee365fadc889d0b3743d944f5c02be47d5b105e8b3605842e040893ce2f050908d995f2a46c86ef0ab", 0x6b}, {&(0x7f0000000540)="422393c9241083ad35d8d06ee8a454f1c2427f16e09556df6bcc25e75e2e67ab51bd02a8b662fd76c7761799fe3d2204952bbf64f7645928260fa7b038bdddcf4d854bcb6cdb5155db872bbf7ef6f43b75f244f1844539884f0f51267f878a7b6ce5e3a40e98dc35b271569d733607990e36ef08c94bfa12eb945c2c9e38b0dfd768fb8ecb1229384d16b3", 0x8b}, {&(0x7f0000000600)="6d7efbc111fca13003bd10910c9c3f40f202b5e5cc3c02798ae759ea26b713698620ed57a61d5b779e5da1bc89d9c4ee79df15a74aa7d361317b717e97a5f24108fc02f129e444d91d178baeb6251ecd62cccc18bd44e03a16608e96d74e7326caffcab76aa054bced96544fbc0e0268875f069be3225ee914757bc9397a0d965cb767233758719c8188e6aa7ae8607423a68937b702d89f59526714e61f98b58d5a269395ae5a04", 0xa8}, {&(0x7f00000006c0)="073871101c3abfdbaa10b887a3ef9fbfcb598f6f5c9849869c2824ccf5ab8213e32e8fd28279fcfaac6e3856250de1a53a0396ae15c9d975d14aaf28b07dbe70dafb55f5f0952fd6bdf385815d2ca5f97a6f79305a1214132ff11139ca10462f9cd8de8ea71f7c0b180fb4138f67e5d6457a70b5b66edad0d842c36c5ecb67a34cf91c3a2d40901afd7a99d080a50d4a836578aa4361f2e287d5260a78ebabe14d97cddde8d6342af3cffc7d123b5027e0783fca4654166cf13589f04be37586d4935eb136dd8aff0373ad6061ceafa55928f19ee60dce24b4d6d227a8c4d7cbf8c1e347629f1b838f9b51dc0ac4c89bcb78ee0e82", 0xf5}, {&(0x7f00000007c0)="2b061886d7736371f7800d5f249948620a4100dd90f54aa6ce50a869b2b94cdb4e0e7c233880a8cd34d200f43add50d704a6700fe8630f52d9183b5e3e843c49508bc19856cb2bd7eb99c0c6c1afbbe17470271459e8fa89fee4022c3295e983c8c8f5c4fcc7ed66690b783df948073b6b12ca22802c64b693681e053a0fee7052b25f545ac407b7068ab3190ad1016e3c5a300c43f78b8a2ce90ef6fd1fddbe295bce73390e741c1b", 0xa9}], 0x8}}], 0x1, 0x200400c0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000880)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(r2, &(0x7f0000000940)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x4040000}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x2c, r3, 0x400, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0x4102, 0x0, {0x10, 0x13, @l2={'ib', 0x3a, 'ip6_vti0\x00'}}}, ["", "", "", ""]}, 0x2c}, 0x1, 0x0, 0x0, 0x14}, 0x8001) unlink(&(0x7f0000000040)='./file0\x00') 22:43:18 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000000000000dc1338d54400009b84", 0x3c}], 0x1}, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000280)=@filter={'filter\x00', 0xe, 0x4, 0x2f0, 0x0, 0x0, 0x1c8, 0x0, 0x1c8, 0x288, 0x288, 0x288, 0x288, 0x288, 0x4, 0x0, {[{{@uncond, 0x0, 0x98, 0xc0}, @REJECT={0x28, 'REJECT\x00'}}, {{@uncond, 0x0, 0x98, 0xd8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "2682a009acb913b0ac12803afcbe9ab35adef43f9fd0adf2e89bd0a69a42"}}}, {{@ip={@multicast2, @broadcast, 0x0, 0x0, 'veth1_to_bond\x00', 'bcsf0\x00'}, 0x0, 0x98, 0xc0}, @REJECT={0x28, 'REJECT\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x350) 22:43:18 executing program 4: mbind(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc000, 0x0, 0x0, 0x0) 22:43:18 executing program 1: r0 = open(&(0x7f0000000080)='./file0\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r0, 0x0) ftruncate(r0, 0x1045) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000001000)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @remote}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x7]}, 0x5c) setsockopt$inet_int(r1, 0x0, 0x80000000040, &(0x7f0000000ffc), 0x4) 22:43:18 executing program 4: mbind(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc000, 0x0, 0x0, 0x0) 22:43:18 executing program 1: r0 = open(&(0x7f0000000080)='./file0\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r0, 0x0) ftruncate(r0, 0x1045) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000001000)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @remote}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x7]}, 0x5c) setsockopt$inet_int(r1, 0x0, 0x80000000040, &(0x7f0000000ffc), 0x4) 22:43:18 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000300)="5500000018007f5300fe01b2a4a280930a600000ffa84306910000003900070035000c0006ffffffffffffff00000000000000dc1338d54400009b84", 0x3c}], 0x1}, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000280)=@filter={'filter\x00', 0xe, 0x4, 0x2f0, 0x0, 0x0, 0x1c8, 0x0, 0x1c8, 0x288, 0x288, 0x288, 0x288, 0x288, 0x4, 0x0, {[{{@uncond, 0x0, 0x98, 0xc0}, @REJECT={0x28, 'REJECT\x00'}}, {{@uncond, 0x0, 0x98, 0xd8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "2682a009acb913b0ac12803afcbe9ab35adef43f9fd0adf2e89bd0a69a42"}}}, {{@ip={@multicast2, @broadcast, 0x0, 0x0, 'veth1_to_bond\x00', 'bcsf0\x00'}, 0x0, 0x98, 0xc0}, @REJECT={0x28, 'REJECT\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x350) 22:43:18 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x3, 0x0) openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgrowp.cpu\x00', 0x200002, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x80, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)='.\x00\x00\x00>\x00', 0x6}], 0x1}, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[], 0x0) openat$cgroup_ro(r0, &(0x7f0000000040)='cpuacct.usage_percpu\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000003c0)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8984413869d6e3ae, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x33, 'c\x86\xdd'}]}, 0xfdef) perf_event_open(&(0x7f0000000800)={0x2, 0x70, 0x6, 0x0, 0x5, 0xa26, 0x0, 0x6, 0x40104, 0x9, 0x0, 0x1, 0x0, 0x5, 0xffffffffffffff7f, 0x3, 0x0, 0x7ff800, 0xfffffffffffffffc, 0x4, 0x3, 0xffffffffffffff59, 0x0, 0x69d4, 0x0, 0x0, 0x5, 0xffffffff, 0x9, 0x0, 0x0, 0x81, 0x7fffffff, 0x9, 0x7, 0xfffffffffffffff9, 0x6, 0x7, 0x0, 0x200, 0xc33623b12dd20fa, @perf_bp={&(0x7f00000002c0), 0x2}, 0x14000, 0x6, 0x2, 0x2, 0x5, 0x3, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) 22:43:18 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000840)={0x0, {}, {0x2, 0x0, @local}, {0x2, 0x0, @local}, 0x10e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000000)=0xa00, 0x4) socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) sendto$llc(r1, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x1a, 0x304, 0x0, 0x0, 0x0, 0x0, @random="0387945b9f37"}, 0x10) recvmmsg(r1, &(0x7f00000077c0)=[{{&(0x7f0000005a80)=@isdn, 0x80, &(0x7f0000000c40)=[{&(0x7f0000005b00)=""/92, 0x5c}, {&(0x7f0000000a80)=""/197, 0x5f}], 0x230}, 0x1}, {{&(0x7f0000005c80)=@xdp, 0x80, &(0x7f0000005f00)=[{&(0x7f0000000140)=""/97, 0x61}, {&(0x7f0000005d80)=""/171, 0xab}, {&(0x7f0000005e40)=""/128, 0x80}, {&(0x7f0000005ec0)}], 0x4, &(0x7f0000005f40)=""/183, 0xb7}, 0x1}, {{&(0x7f0000000340)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000006500)=[{&(0x7f0000006080)=""/99, 0x63}, {&(0x7f0000006100)=""/254, 0xfe}, {&(0x7f0000000b80)=""/136, 0x88}, {&(0x7f00000062c0)=""/115, 0x318}, {&(0x7f0000006340)=""/117, 0x75}, {&(0x7f00000063c0)=""/63, 0x3f}, {&(0x7f0000006400)=""/106, 0x6a}, {&(0x7f0000000d00)=""/128, 0xfffffffffffffe3e}], 0x8, &(0x7f0000006580)=""/4096, 0x1000}, 0x200}, {{&(0x7f0000007580)=@x25={0x9, @remote}, 0xffffff8e, &(0x7f0000007780)}, 0x10001}], 0x4, 0x203e, &(0x7f0000000d80)) 22:43:18 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000000)={0x0, 0x8001, 0x0, 0x1ff}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000080)={0xd}) 22:43:18 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) read$FUSE(r0, &(0x7f0000002000), 0x1204) lstat(&(0x7f0000000000)='./file0/file1\x00', &(0x7f0000000140)) write$FUSE_INIT(r0, &(0x7f0000000080)={0x50, 0x0, 0x1}, 0x50) read$FUSE(r0, &(0x7f0000003000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000000340)={0x90, 0x0, 0x2, {0x400000000001, 0x0, 0xfffffffffffffffe, 0x7ff, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1bd4}}}, 0x90) 22:43:18 executing program 3: setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000002000)={{0xa, 0x1}, {0xa, 0x0, 0x0, @empty, 0x1}}, 0x5c) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x40, &(0x7f0000001fde), 0x4) [ 381.563276] protocol 88fb is buggy, dev hsr_slave_0 [ 381.568418] protocol 88fb is buggy, dev hsr_slave_1 22:43:19 executing program 1: getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000001c0)={0x0, @in6={{0xa, 0x0, 0x0, @rand_addr="d5b1e8fb7a7313c81104fec73fdfc7f4", 0xffffffffa5f6dfee}}, [0x0, 0x0, 0x6, 0x0, 0x4, 0x0, 0x8, 0x400001, 0x0, 0x1, 0x400, 0x0, 0x3]}, &(0x7f0000000000)=0x100) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000380)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_sha512\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140), 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = accept$alg(r0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x34e, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) 22:43:19 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000840)={0x0, {}, {0x2, 0x0, @local}, {0x2, 0x0, @local}, 0x10e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000000)=0xa00, 0x4) socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) sendto$llc(r1, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x1a, 0x304, 0x0, 0x0, 0x0, 0x0, @random="0387945b9f37"}, 0x10) recvmmsg(r1, &(0x7f00000077c0)=[{{&(0x7f0000005a80)=@isdn, 0x80, &(0x7f0000000c40)=[{&(0x7f0000005b00)=""/92, 0x5c}, {&(0x7f0000000a80)=""/197, 0x5f}], 0x230}, 0x1}, {{&(0x7f0000005c80)=@xdp, 0x80, &(0x7f0000005f00)=[{&(0x7f0000000140)=""/97, 0x61}, {&(0x7f0000005d80)=""/171, 0xab}, {&(0x7f0000005e40)=""/128, 0x80}, {&(0x7f0000005ec0)}], 0x4, &(0x7f0000005f40)=""/183, 0xb7}, 0x1}, {{&(0x7f0000000340)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000006500)=[{&(0x7f0000006080)=""/99, 0x63}, {&(0x7f0000006100)=""/254, 0xfe}, {&(0x7f0000000b80)=""/136, 0x88}, {&(0x7f00000062c0)=""/115, 0x318}, {&(0x7f0000006340)=""/117, 0x75}, {&(0x7f00000063c0)=""/63, 0x3f}, {&(0x7f0000006400)=""/106, 0x6a}, {&(0x7f0000000d00)=""/128, 0xfffffffffffffe3e}], 0x8, &(0x7f0000006580)=""/4096, 0x1000}, 0x200}, {{&(0x7f0000007580)=@x25={0x9, @remote}, 0xffffff8e, &(0x7f0000007780)}, 0x10001}], 0x4, 0x203e, &(0x7f0000000d80)) 22:43:19 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x3, 0x0) openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgrowp.cpu\x00', 0x200002, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x80, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)='.\x00\x00\x00>\x00', 0x6}], 0x1}, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[], 0x0) openat$cgroup_ro(r0, &(0x7f0000000040)='cpuacct.usage_percpu\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000003c0)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8984413869d6e3ae, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x33, 'c\x86\xdd'}]}, 0xfdef) perf_event_open(&(0x7f0000000800)={0x2, 0x70, 0x6, 0x0, 0x5, 0xa26, 0x0, 0x6, 0x40104, 0x9, 0x0, 0x1, 0x0, 0x5, 0xffffffffffffff7f, 0x3, 0x0, 0x7ff800, 0xfffffffffffffffc, 0x4, 0x3, 0xffffffffffffff59, 0x0, 0x69d4, 0x0, 0x0, 0x5, 0xffffffff, 0x9, 0x0, 0x0, 0x81, 0x7fffffff, 0x9, 0x7, 0xfffffffffffffff9, 0x6, 0x7, 0x0, 0x200, 0xc33623b12dd20fa, @perf_bp={&(0x7f00000002c0), 0x2}, 0x14000, 0x6, 0x2, 0x2, 0x5, 0x3, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) 22:43:19 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-camellia-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a9119aad5265df5cf1cdd8b43", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000001100)=[{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000000)="ace8659f062fed2a386199fa5ee56c93", 0x10}], 0x1, &(0x7f0000000340)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000003980)=[{{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000180)=""/176, 0x7ffff000}], 0x1}}], 0x1, 0x0, 0x0) 22:43:19 executing program 3: setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000002000)={{0xa, 0x1}, {0xa, 0x0, 0x0, @empty, 0x1}}, 0x5c) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x40, &(0x7f0000001fde), 0x4) 22:43:19 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x79, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_config_ext={0x0, 0xc2}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f000000a680)=[{&(0x7f00000006c0)={0x8c4, 0x0, 0x0, 0x0, 0x0, "", [@nested={0x8b4, 0x0, [@typed={0x8, 0x0, @uid}, @typed={0x8a8, 0x0, @binary="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"}]}]}, 0x8c4}], 0x1}, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000015000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 22:43:19 executing program 3: setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000002000)={{0xa, 0x1}, {0xa, 0x0, 0x0, @empty, 0x1}}, 0x5c) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x40, &(0x7f0000001fde), 0x4) 22:43:19 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000840)={0x0, {}, {0x2, 0x0, @local}, {0x2, 0x0, @local}, 0x10e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000000)=0xa00, 0x4) socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) sendto$llc(r1, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x1a, 0x304, 0x0, 0x0, 0x0, 0x0, @random="0387945b9f37"}, 0x10) recvmmsg(r1, &(0x7f00000077c0)=[{{&(0x7f0000005a80)=@isdn, 0x80, &(0x7f0000000c40)=[{&(0x7f0000005b00)=""/92, 0x5c}, {&(0x7f0000000a80)=""/197, 0x5f}], 0x230}, 0x1}, {{&(0x7f0000005c80)=@xdp, 0x80, &(0x7f0000005f00)=[{&(0x7f0000000140)=""/97, 0x61}, {&(0x7f0000005d80)=""/171, 0xab}, {&(0x7f0000005e40)=""/128, 0x80}, {&(0x7f0000005ec0)}], 0x4, &(0x7f0000005f40)=""/183, 0xb7}, 0x1}, {{&(0x7f0000000340)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000006500)=[{&(0x7f0000006080)=""/99, 0x63}, {&(0x7f0000006100)=""/254, 0xfe}, {&(0x7f0000000b80)=""/136, 0x88}, {&(0x7f00000062c0)=""/115, 0x318}, {&(0x7f0000006340)=""/117, 0x75}, {&(0x7f00000063c0)=""/63, 0x3f}, {&(0x7f0000006400)=""/106, 0x6a}, {&(0x7f0000000d00)=""/128, 0xfffffffffffffe3e}], 0x8, &(0x7f0000006580)=""/4096, 0x1000}, 0x200}, {{&(0x7f0000007580)=@x25={0x9, @remote}, 0xffffff8e, &(0x7f0000007780)}, 0x10001}], 0x4, 0x203e, &(0x7f0000000d80)) 22:43:19 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000003c0)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r0, &(0x7f0000000080), 0x297ef) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f00000000c0)=0x3, 0x4) r1 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_int(r1, 0x0, 0x2, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000440)=ANY=[]) 22:43:19 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-camellia-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a9119aad5265df5cf1cdd8b43", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000001100)=[{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000000)="ace8659f062fed2a386199fa5ee56c93", 0x10}], 0x1, &(0x7f0000000340)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000003980)=[{{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000180)=""/176, 0x7ffff000}], 0x1}}], 0x1, 0x0, 0x0) 22:43:19 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x3, 0x0) openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgrowp.cpu\x00', 0x200002, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x80, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)='.\x00\x00\x00>\x00', 0x6}], 0x1}, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[], 0x0) openat$cgroup_ro(r0, &(0x7f0000000040)='cpuacct.usage_percpu\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000003c0)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8984413869d6e3ae, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x33, 'c\x86\xdd'}]}, 0xfdef) perf_event_open(&(0x7f0000000800)={0x2, 0x70, 0x6, 0x0, 0x5, 0xa26, 0x0, 0x6, 0x40104, 0x9, 0x0, 0x1, 0x0, 0x5, 0xffffffffffffff7f, 0x3, 0x0, 0x7ff800, 0xfffffffffffffffc, 0x4, 0x3, 0xffffffffffffff59, 0x0, 0x69d4, 0x0, 0x0, 0x5, 0xffffffff, 0x9, 0x0, 0x0, 0x81, 0x7fffffff, 0x9, 0x7, 0xfffffffffffffff9, 0x6, 0x7, 0x0, 0x200, 0xc33623b12dd20fa, @perf_bp={&(0x7f00000002c0), 0x2}, 0x14000, 0x6, 0x2, 0x2, 0x5, 0x3, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) 22:43:19 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000003c0)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r0, &(0x7f0000000080), 0x297ef) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f00000000c0)=0x3, 0x4) r1 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_int(r1, 0x0, 0x2, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000440)=ANY=[]) 22:43:19 executing program 1: getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000001c0)={0x0, @in6={{0xa, 0x0, 0x0, @rand_addr="d5b1e8fb7a7313c81104fec73fdfc7f4", 0xffffffffa5f6dfee}}, [0x0, 0x0, 0x6, 0x0, 0x4, 0x0, 0x8, 0x400001, 0x0, 0x1, 0x400, 0x0, 0x3]}, &(0x7f0000000000)=0x100) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000380)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_sha512\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140), 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = accept$alg(r0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x34e, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) 22:43:19 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000840)={0x0, {}, {0x2, 0x0, @local}, {0x2, 0x0, @local}, 0x10e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000000)=0xa00, 0x4) socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) sendto$llc(r1, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x1a, 0x304, 0x0, 0x0, 0x0, 0x0, @random="0387945b9f37"}, 0x10) recvmmsg(r1, &(0x7f00000077c0)=[{{&(0x7f0000005a80)=@isdn, 0x80, &(0x7f0000000c40)=[{&(0x7f0000005b00)=""/92, 0x5c}, {&(0x7f0000000a80)=""/197, 0x5f}], 0x230}, 0x1}, {{&(0x7f0000005c80)=@xdp, 0x80, &(0x7f0000005f00)=[{&(0x7f0000000140)=""/97, 0x61}, {&(0x7f0000005d80)=""/171, 0xab}, {&(0x7f0000005e40)=""/128, 0x80}, {&(0x7f0000005ec0)}], 0x4, &(0x7f0000005f40)=""/183, 0xb7}, 0x1}, {{&(0x7f0000000340)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000006500)=[{&(0x7f0000006080)=""/99, 0x63}, {&(0x7f0000006100)=""/254, 0xfe}, {&(0x7f0000000b80)=""/136, 0x88}, {&(0x7f00000062c0)=""/115, 0x318}, {&(0x7f0000006340)=""/117, 0x75}, {&(0x7f00000063c0)=""/63, 0x3f}, {&(0x7f0000006400)=""/106, 0x6a}, {&(0x7f0000000d00)=""/128, 0xfffffffffffffe3e}], 0x8, &(0x7f0000006580)=""/4096, 0x1000}, 0x200}, {{&(0x7f0000007580)=@x25={0x9, @remote}, 0xffffff8e, &(0x7f0000007780)}, 0x10001}], 0x4, 0x203e, &(0x7f0000000d80)) 22:43:19 executing program 3: setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000002000)={{0xa, 0x1}, {0xa, 0x0, 0x0, @empty, 0x1}}, 0x5c) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x40, &(0x7f0000001fde), 0x4) 22:43:19 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-camellia-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a9119aad5265df5cf1cdd8b43", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000001100)=[{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000000)="ace8659f062fed2a386199fa5ee56c93", 0x10}], 0x1, &(0x7f0000000340)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000003980)=[{{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000180)=""/176, 0x7ffff000}], 0x1}}], 0x1, 0x0, 0x0) 22:43:19 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000003c0)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r0, &(0x7f0000000080), 0x297ef) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f00000000c0)=0x3, 0x4) r1 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_int(r1, 0x0, 0x2, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000440)=ANY=[]) 22:43:19 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x3, 0x0) openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgrowp.cpu\x00', 0x200002, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x80, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)='.\x00\x00\x00>\x00', 0x6}], 0x1}, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[], 0x0) openat$cgroup_ro(r0, &(0x7f0000000040)='cpuacct.usage_percpu\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000003c0)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8984413869d6e3ae, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x33, 'c\x86\xdd'}]}, 0xfdef) perf_event_open(&(0x7f0000000800)={0x2, 0x70, 0x6, 0x0, 0x5, 0xa26, 0x0, 0x6, 0x40104, 0x9, 0x0, 0x1, 0x0, 0x5, 0xffffffffffffff7f, 0x3, 0x0, 0x7ff800, 0xfffffffffffffffc, 0x4, 0x3, 0xffffffffffffff59, 0x0, 0x69d4, 0x0, 0x0, 0x5, 0xffffffff, 0x9, 0x0, 0x0, 0x81, 0x7fffffff, 0x9, 0x7, 0xfffffffffffffff9, 0x6, 0x7, 0x0, 0x200, 0xc33623b12dd20fa, @perf_bp={&(0x7f00000002c0), 0x2}, 0x14000, 0x6, 0x2, 0x2, 0x5, 0x3, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) 22:43:19 executing program 5: getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000001c0)={0x0, @in6={{0xa, 0x0, 0x0, @rand_addr="d5b1e8fb7a7313c81104fec73fdfc7f4", 0xffffffffa5f6dfee}}, [0x0, 0x0, 0x6, 0x0, 0x4, 0x0, 0x8, 0x400001, 0x0, 0x1, 0x400, 0x0, 0x3]}, &(0x7f0000000000)=0x100) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000380)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_sha512\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140), 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = accept$alg(r0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x34e, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) 22:43:19 executing program 3: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote={0xac, 0x2}}, 0x10, 0x0, 0x0, &(0x7f0000000780)=[@rdma_args={0x48, 0x114, 0x1, {{}, {0x0}, 0x0}}], 0x48}, 0x0) 22:43:19 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000003c0)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r0, &(0x7f0000000080), 0x297ef) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f00000000c0)=0x3, 0x4) r1 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_int(r1, 0x0, 0x2, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000440)=ANY=[]) 22:43:19 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-camellia-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a9119aad5265df5cf1cdd8b43", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000001100)=[{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000000)="ace8659f062fed2a386199fa5ee56c93", 0x10}], 0x1, &(0x7f0000000340)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000003980)=[{{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000180)=""/176, 0x7ffff000}], 0x1}}], 0x1, 0x0, 0x0) 22:43:19 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(r0, &(0x7f00000009c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x28, r1, 0x1, 0x0, 0x0, {0x5}, [@TIPC_NLA_BEARER={0x14, 0x1, [@TIPC_NLA_BEARER_NAME={0x4, 0x1, @udp='udp:syz0\x00'}]}]}, 0x28}}, 0x0) 22:43:19 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_emit_ethernet(0xfffffffffffffdfe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x6, 0x4, 0x0, 0x0, 0x224, 0x0, 0x0, 0x0, 0x4032, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, &(0x7f0000000100)={0x0, 0x3, [0x0, 0xc0, 0xd77]}) 22:43:19 executing program 1: getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000001c0)={0x0, @in6={{0xa, 0x0, 0x0, @rand_addr="d5b1e8fb7a7313c81104fec73fdfc7f4", 0xffffffffa5f6dfee}}, [0x0, 0x0, 0x6, 0x0, 0x4, 0x0, 0x8, 0x400001, 0x0, 0x1, 0x400, 0x0, 0x3]}, &(0x7f0000000000)=0x100) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000380)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_sha512\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140), 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = accept$alg(r0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x34e, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) 22:43:19 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x6000) io_setup(0x2, &(0x7f00000004c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x2, 0x1, 0x0, r0, &(0x7f0000000000), 0x208200}]) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f00000002c0)={0x0, 0x6}, &(0x7f0000000300)=0x8) setsockopt$inet_sctp_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000000340)=@assoc_value={r2, 0x8}, 0x8) syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') getsockopt$rose(0xffffffffffffffff, 0x104, 0x0, &(0x7f00000001c0), &(0x7f0000000200)=0x4) sendmsg$TIPC_CMD_GET_LINKS(r0, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1800}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x24, 0x0, 0x6854f863e4611e89, 0x70bd2b, 0x25dfdbfe, {{}, 0x0, 0x4, 0x0, {0x8, 0x11, 0x48}}, [""]}, 0x24}, 0x1, 0x0, 0x0, 0x20000000}, 0x24000001) 22:43:19 executing program 3: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote={0xac, 0x2}}, 0x10, 0x0, 0x0, &(0x7f0000000780)=[@rdma_args={0x48, 0x114, 0x1, {{}, {0x0}, 0x0}}], 0x48}, 0x0) 22:43:19 executing program 5: getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000001c0)={0x0, @in6={{0xa, 0x0, 0x0, @rand_addr="d5b1e8fb7a7313c81104fec73fdfc7f4", 0xffffffffa5f6dfee}}, [0x0, 0x0, 0x6, 0x0, 0x4, 0x0, 0x8, 0x400001, 0x0, 0x1, 0x400, 0x0, 0x3]}, &(0x7f0000000000)=0x100) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000380)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_sha512\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140), 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = accept$alg(r0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x34e, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) 22:43:19 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_emit_ethernet(0xfffffffffffffdfe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x6, 0x4, 0x0, 0x0, 0x224, 0x0, 0x0, 0x0, 0x4032, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, &(0x7f0000000100)={0x0, 0x3, [0x0, 0xc0, 0xd77]}) 22:43:19 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(r0, &(0x7f00000009c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x28, r1, 0x1, 0x0, 0x0, {0x5}, [@TIPC_NLA_BEARER={0x14, 0x1, [@TIPC_NLA_BEARER_NAME={0x4, 0x1, @udp='udp:syz0\x00'}]}]}, 0x28}}, 0x0) 22:43:19 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_emit_ethernet(0xfffffffffffffdfe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x6, 0x4, 0x0, 0x0, 0x224, 0x0, 0x0, 0x0, 0x4032, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, &(0x7f0000000100)={0x0, 0x3, [0x0, 0xc0, 0xd77]}) 22:43:20 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(r0, &(0x7f00000009c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x28, r1, 0x1, 0x0, 0x0, {0x5}, [@TIPC_NLA_BEARER={0x14, 0x1, [@TIPC_NLA_BEARER_NAME={0x4, 0x1, @udp='udp:syz0\x00'}]}]}, 0x28}}, 0x0) 22:43:20 executing program 3: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote={0xac, 0x2}}, 0x10, 0x0, 0x0, &(0x7f0000000780)=[@rdma_args={0x48, 0x114, 0x1, {{}, {0x0}, 0x0}}], 0x48}, 0x0) 22:43:20 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_emit_ethernet(0xfffffffffffffdfe, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x6, 0x4, 0x0, 0x0, 0x224, 0x0, 0x0, 0x0, 0x4032, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, &(0x7f0000000100)={0x0, 0x3, [0x0, 0xc0, 0xd77]}) 22:43:20 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x6000) io_setup(0x2, &(0x7f00000004c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x2, 0x1, 0x0, r0, &(0x7f0000000000), 0x208200}]) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f00000002c0)={0x0, 0x6}, &(0x7f0000000300)=0x8) setsockopt$inet_sctp_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000000340)=@assoc_value={r2, 0x8}, 0x8) syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') getsockopt$rose(0xffffffffffffffff, 0x104, 0x0, &(0x7f00000001c0), &(0x7f0000000200)=0x4) sendmsg$TIPC_CMD_GET_LINKS(r0, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1800}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x24, 0x0, 0x6854f863e4611e89, 0x70bd2b, 0x25dfdbfe, {{}, 0x0, 0x4, 0x0, {0x8, 0x11, 0x48}}, [""]}, 0x24}, 0x1, 0x0, 0x0, 0x20000000}, 0x24000001) 22:43:20 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(r0, &(0x7f00000009c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x28, r1, 0x1, 0x0, 0x0, {0x5}, [@TIPC_NLA_BEARER={0x14, 0x1, [@TIPC_NLA_BEARER_NAME={0x4, 0x1, @udp='udp:syz0\x00'}]}]}, 0x28}}, 0x0) 22:43:20 executing program 1: getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000001c0)={0x0, @in6={{0xa, 0x0, 0x0, @rand_addr="d5b1e8fb7a7313c81104fec73fdfc7f4", 0xffffffffa5f6dfee}}, [0x0, 0x0, 0x6, 0x0, 0x4, 0x0, 0x8, 0x400001, 0x0, 0x1, 0x400, 0x0, 0x3]}, &(0x7f0000000000)=0x100) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000380)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_sha512\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140), 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = accept$alg(r0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x34e, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) 22:43:20 executing program 3: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote={0xac, 0x2}}, 0x10, 0x0, 0x0, &(0x7f0000000780)=[@rdma_args={0x48, 0x114, 0x1, {{}, {0x0}, 0x0}}], 0x48}, 0x0) 22:43:20 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x6000) io_setup(0x2, &(0x7f00000004c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x2, 0x1, 0x0, r0, &(0x7f0000000000), 0x208200}]) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f00000002c0)={0x0, 0x6}, &(0x7f0000000300)=0x8) setsockopt$inet_sctp_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000000340)=@assoc_value={r2, 0x8}, 0x8) syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') getsockopt$rose(0xffffffffffffffff, 0x104, 0x0, &(0x7f00000001c0), &(0x7f0000000200)=0x4) sendmsg$TIPC_CMD_GET_LINKS(r0, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1800}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x24, 0x0, 0x6854f863e4611e89, 0x70bd2b, 0x25dfdbfe, {{}, 0x0, 0x4, 0x0, {0x8, 0x11, 0x48}}, [""]}, 0x24}, 0x1, 0x0, 0x0, 0x20000000}, 0x24000001) 22:43:20 executing program 5: getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000001c0)={0x0, @in6={{0xa, 0x0, 0x0, @rand_addr="d5b1e8fb7a7313c81104fec73fdfc7f4", 0xffffffffa5f6dfee}}, [0x0, 0x0, 0x6, 0x0, 0x4, 0x0, 0x8, 0x400001, 0x0, 0x1, 0x400, 0x0, 0x3]}, &(0x7f0000000000)=0x100) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000380)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_sha512\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140), 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = accept$alg(r0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x34e, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) 22:43:20 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x6000) io_setup(0x2, &(0x7f00000004c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x2, 0x1, 0x0, r0, &(0x7f0000000000), 0x208200}]) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f00000002c0)={0x0, 0x6}, &(0x7f0000000300)=0x8) setsockopt$inet_sctp_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000000340)=@assoc_value={r2, 0x8}, 0x8) syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') getsockopt$rose(0xffffffffffffffff, 0x104, 0x0, &(0x7f00000001c0), &(0x7f0000000200)=0x4) sendmsg$TIPC_CMD_GET_LINKS(r0, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1800}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x24, 0x0, 0x6854f863e4611e89, 0x70bd2b, 0x25dfdbfe, {{}, 0x0, 0x4, 0x0, {0x8, 0x11, 0x48}}, [""]}, 0x24}, 0x1, 0x0, 0x0, 0x20000000}, 0x24000001) 22:43:20 executing program 3: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x1bae, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndtimer(&(0x7f0000000140)='/dev/snd/timer\x00', 0x0, 0x0) syz_open_dev$evdev(0x0, 0x0, 0x0) 22:43:20 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x6000) io_setup(0x2, &(0x7f00000004c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x2, 0x1, 0x0, r0, &(0x7f0000000000), 0x208200}]) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f00000002c0)={0x0, 0x6}, &(0x7f0000000300)=0x8) setsockopt$inet_sctp_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000000340)=@assoc_value={r2, 0x8}, 0x8) syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') getsockopt$rose(0xffffffffffffffff, 0x104, 0x0, &(0x7f00000001c0), &(0x7f0000000200)=0x4) sendmsg$TIPC_CMD_GET_LINKS(r0, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1800}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x24, 0x0, 0x6854f863e4611e89, 0x70bd2b, 0x25dfdbfe, {{}, 0x0, 0x4, 0x0, {0x8, 0x11, 0x48}}, [""]}, 0x24}, 0x1, 0x0, 0x0, 0x20000000}, 0x24000001) 22:43:20 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x6000) io_setup(0x2, &(0x7f00000004c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x2, 0x1, 0x0, r0, &(0x7f0000000000), 0x208200}]) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f00000002c0)={0x0, 0x6}, &(0x7f0000000300)=0x8) setsockopt$inet_sctp_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000000340)=@assoc_value={r2, 0x8}, 0x8) syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') getsockopt$rose(0xffffffffffffffff, 0x104, 0x0, &(0x7f00000001c0), &(0x7f0000000200)=0x4) sendmsg$TIPC_CMD_GET_LINKS(r0, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1800}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x24, 0x0, 0x6854f863e4611e89, 0x70bd2b, 0x25dfdbfe, {{}, 0x0, 0x4, 0x0, {0x8, 0x11, 0x48}}, [""]}, 0x24}, 0x1, 0x0, 0x0, 0x20000000}, 0x24000001) 22:43:20 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f00000008c0)={0x53, 0x0, 0x6, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000080)="323861f095fd", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}) 22:43:20 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x6000) io_setup(0x2, &(0x7f00000004c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x2, 0x1, 0x0, r0, &(0x7f0000000000), 0x208200}]) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f00000002c0)={0x0, 0x6}, &(0x7f0000000300)=0x8) setsockopt$inet_sctp_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000000340)=@assoc_value={r2, 0x8}, 0x8) syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') getsockopt$rose(0xffffffffffffffff, 0x104, 0x0, &(0x7f00000001c0), &(0x7f0000000200)=0x4) sendmsg$TIPC_CMD_GET_LINKS(r0, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1800}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x24, 0x0, 0x6854f863e4611e89, 0x70bd2b, 0x25dfdbfe, {{}, 0x0, 0x4, 0x0, {0x8, 0x11, 0x48}}, [""]}, 0x24}, 0x1, 0x0, 0x0, 0x20000000}, 0x24000001) 22:43:20 executing program 5: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)='devtmpfs\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, &(0x7f0000000280)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) r2 = open$dir(&(0x7f0000000300)='./file0/file0\x00', 0x0, 0x0) getdents64(r2, 0x0, 0x0) dup3(r0, r2, 0x0) 22:43:20 executing program 3: r0 = socket$kcm(0x10, 0x200000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000000)="2e000000110081aee405d10200000e00fa076b000a00000000f3ff500befccd77f00000000081c5eda00b0eba06a", 0x2e}], 0x1}, 0x0) 22:43:20 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x6000) io_setup(0x2, &(0x7f00000004c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x2, 0x1, 0x0, r0, &(0x7f0000000000), 0x208200}]) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f00000002c0)={0x0, 0x6}, &(0x7f0000000300)=0x8) setsockopt$inet_sctp_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000000340)=@assoc_value={r2, 0x8}, 0x8) syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') getsockopt$rose(0xffffffffffffffff, 0x104, 0x0, &(0x7f00000001c0), &(0x7f0000000200)=0x4) sendmsg$TIPC_CMD_GET_LINKS(r0, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1800}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x24, 0x0, 0x6854f863e4611e89, 0x70bd2b, 0x25dfdbfe, {{}, 0x0, 0x4, 0x0, {0x8, 0x11, 0x48}}, [""]}, 0x24}, 0x1, 0x0, 0x0, 0x20000000}, 0x24000001) 22:43:20 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x6000) io_setup(0x2, &(0x7f00000004c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x2, 0x1, 0x0, r0, &(0x7f0000000000), 0x208200}]) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f00000002c0)={0x0, 0x6}, &(0x7f0000000300)=0x8) setsockopt$inet_sctp_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000000340)=@assoc_value={r2, 0x8}, 0x8) syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') getsockopt$rose(0xffffffffffffffff, 0x104, 0x0, &(0x7f00000001c0), &(0x7f0000000200)=0x4) sendmsg$TIPC_CMD_GET_LINKS(r0, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1800}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x24, 0x0, 0x6854f863e4611e89, 0x70bd2b, 0x25dfdbfe, {{}, 0x0, 0x4, 0x0, {0x8, 0x11, 0x48}}, [""]}, 0x24}, 0x1, 0x0, 0x0, 0x20000000}, 0x24000001) 22:43:20 executing program 5: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)='devtmpfs\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, &(0x7f0000000280)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) r2 = open$dir(&(0x7f0000000300)='./file0/file0\x00', 0x0, 0x0) getdents64(r2, 0x0, 0x0) dup3(r0, r2, 0x0) 22:43:20 executing program 1: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)='devtmpfs\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, &(0x7f0000000280)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) r2 = open$dir(&(0x7f0000000300)='./file0/file0\x00', 0x0, 0x0) getdents64(r2, 0x0, 0x0) dup3(r0, r2, 0x0) [ 383.357921] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.3'. 22:43:20 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x6000) io_setup(0x2, &(0x7f00000004c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x2, 0x1, 0x0, r0, &(0x7f0000000000), 0x208200}]) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f00000002c0)={0x0, 0x6}, &(0x7f0000000300)=0x8) setsockopt$inet_sctp_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000000340)=@assoc_value={r2, 0x8}, 0x8) syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') getsockopt$rose(0xffffffffffffffff, 0x104, 0x0, &(0x7f00000001c0), &(0x7f0000000200)=0x4) sendmsg$TIPC_CMD_GET_LINKS(r0, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1800}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x24, 0x0, 0x6854f863e4611e89, 0x70bd2b, 0x25dfdbfe, {{}, 0x0, 0x4, 0x0, {0x8, 0x11, 0x48}}, [""]}, 0x24}, 0x1, 0x0, 0x0, 0x20000000}, 0x24000001) 22:43:20 executing program 1: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)='devtmpfs\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, &(0x7f0000000280)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) r2 = open$dir(&(0x7f0000000300)='./file0/file0\x00', 0x0, 0x0) getdents64(r2, 0x0, 0x0) dup3(r0, r2, 0x0) 22:43:20 executing program 3: r0 = socket$kcm(0x10, 0x200000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000000)="2e000000110081aee405d10200000e00fa076b000a00000000f3ff500befccd77f00000000081c5eda00b0eba06a", 0x2e}], 0x1}, 0x0) 22:43:21 executing program 3: r0 = socket$kcm(0x10, 0x200000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000000)="2e000000110081aee405d10200000e00fa076b000a00000000f3ff500befccd77f00000000081c5eda00b0eba06a", 0x2e}], 0x1}, 0x0) [ 383.506528] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.3'. 22:43:21 executing program 1: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)='devtmpfs\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, &(0x7f0000000280)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) r2 = open$dir(&(0x7f0000000300)='./file0/file0\x00', 0x0, 0x0) getdents64(r2, 0x0, 0x0) dup3(r0, r2, 0x0) 22:43:21 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") unshare(0x400) ioctl$IOC_PR_PREEMPT(r0, 0x401870cb, 0x0) 22:43:21 executing program 5: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)='devtmpfs\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, &(0x7f0000000280)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) r2 = open$dir(&(0x7f0000000300)='./file0/file0\x00', 0x0, 0x0) getdents64(r2, 0x0, 0x0) dup3(r0, r2, 0x0) 22:43:21 executing program 3: r0 = socket$kcm(0x10, 0x200000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000000)="2e000000110081aee405d10200000e00fa076b000a00000000f3ff500befccd77f00000000081c5eda00b0eba06a", 0x2e}], 0x1}, 0x0) [ 383.608106] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.3'. 22:43:21 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$int_out(r0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = fcntl$dupfd(r0, 0x0, r0) bind$bt_rfcomm(r3, &(0x7f0000000000)={0x1f, {0xffffffffffffffff, 0x1ff}}, 0xa) [ 383.668921] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.3'. 22:43:21 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndtimer(&(0x7f0000000000)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000001000)={{0x0, 0x1}}) r1 = syz_open_dev$sndtimer(0x0, 0x0, 0x0) dup2(r1, r0) 22:43:21 executing program 0: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000280)='/dev/snapshot\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") ioctl$VHOST_SET_VRING_KICK(r0, 0x400c330d, 0x0) 22:43:21 executing program 1: r0 = socket$inet(0xa, 0x801, 0x84) connect$inet(r0, &(0x7f0000004cc0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) setsockopt$inet_sctp_SCTP_RECVNXTINFO(r0, 0x84, 0x21, &(0x7f00000001c0)=0xc9, 0x4) listen(r0, 0xfc0004) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf3}, 0xb) recvmmsg(r1, &(0x7f0000007d00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 22:43:21 executing program 2: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_int(r0, 0x10d, 0xc, 0x0, &(0x7f0000000000)=0x1a0) 22:43:21 executing program 5: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)='devtmpfs\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, &(0x7f0000000280)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) r2 = open$dir(&(0x7f0000000300)='./file0/file0\x00', 0x0, 0x0) getdents64(r2, 0x0, 0x0) dup3(r0, r2, 0x0) 22:43:21 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000), 0x1c) r1 = socket$packet(0x11, 0x3, 0x300) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x14}}}, 0x1c) recvmmsg(r1, &(0x7f0000000300), 0x121, 0x0, 0x0) setsockopt$packet_int(r1, 0x107, 0x8, &(0x7f00000000c0)=0x100, 0x4) sendmmsg(r0, &(0x7f00000092c0), 0x4000000000001b9, 0x0) 22:43:21 executing program 0: r0 = socket$kcm(0x10, 0x20000000003, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000001900)="2e0000001d008104e00f80ecdb4cb9d902631912140202003b00000012000108150600c301d819a90600150000ff", 0x2e}], 0x1}, 0x0) 22:43:21 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000300)="240000001d0007021dfffd946f610500070000000100000000000400080002000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 22:43:21 executing program 1: r0 = socket$inet(0xa, 0x801, 0x84) connect$inet(r0, &(0x7f0000004cc0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) setsockopt$inet_sctp_SCTP_RECVNXTINFO(r0, 0x84, 0x21, &(0x7f00000001c0)=0xc9, 0x4) listen(r0, 0xfc0004) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf3}, 0xb) recvmmsg(r1, &(0x7f0000007d00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 22:43:21 executing program 2: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_int(r0, 0x10d, 0xc, 0x0, &(0x7f0000000000)=0x1a0) 22:43:21 executing program 0: r0 = socket$kcm(0x10, 0x20000000003, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000001900)="2e0000001d008104e00f80ecdb4cb9d902631912140202003b00000012000108150600c301d819a90600150000ff", 0x2e}], 0x1}, 0x0) [ 383.864864] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.0'. [ 383.894424] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. 22:43:21 executing program 2: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_int(r0, 0x10d, 0xc, 0x0, &(0x7f0000000000)=0x1a0) 22:43:21 executing program 1: r0 = socket$inet(0xa, 0x801, 0x84) connect$inet(r0, &(0x7f0000004cc0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) setsockopt$inet_sctp_SCTP_RECVNXTINFO(r0, 0x84, 0x21, &(0x7f00000001c0)=0xc9, 0x4) listen(r0, 0xfc0004) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf3}, 0xb) recvmmsg(r1, &(0x7f0000007d00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) [ 383.944378] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.0'. 22:43:21 executing program 5: openat$hwrng(0xffffffffffffff9c, 0x0, 0x20000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(0xffffffffffffffff, 0xc0605345, 0x0) clock_nanosleep(0x0, 0x0, 0x0, 0x0) splice(0xffffffffffffffff, 0x0, r0, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140), 0x0, 0x0, 0xffffffffffffff3d}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bcsh0\x00', 0x21}) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='ns\x00') getdents(r1, &(0x7f0000000040)=""/46, 0x2e) getsockopt$IP_VS_SO_GET_VERSION(r1, 0x0, 0x480, 0x0, 0x0) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') 22:43:21 executing program 2: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_int(r0, 0x10d, 0xc, 0x0, &(0x7f0000000000)=0x1a0) 22:43:21 executing program 0: r0 = socket$kcm(0x10, 0x20000000003, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000001900)="2e0000001d008104e00f80ecdb4cb9d902631912140202003b00000012000108150600c301d819a90600150000ff", 0x2e}], 0x1}, 0x0) 22:43:21 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000300)="240000001d0007021dfffd946f610500070000000100000000000400080002000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 384.090730] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.0'. 22:43:21 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000), 0x1c) r1 = socket$packet(0x11, 0x3, 0x300) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x14}}}, 0x1c) recvmmsg(r1, &(0x7f0000000300), 0x121, 0x0, 0x0) setsockopt$packet_int(r1, 0x107, 0x8, &(0x7f00000000c0)=0x100, 0x4) sendmmsg(r0, &(0x7f00000092c0), 0x4000000000001b9, 0x0) 22:43:21 executing program 1: r0 = socket$inet(0xa, 0x801, 0x84) connect$inet(r0, &(0x7f0000004cc0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) setsockopt$inet_sctp_SCTP_RECVNXTINFO(r0, 0x84, 0x21, &(0x7f00000001c0)=0xc9, 0x4) listen(r0, 0xfc0004) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf3}, 0xb) recvmmsg(r1, &(0x7f0000007d00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 22:43:21 executing program 2: socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, 0x0) r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x9) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000000180)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = accept4(r0, 0x0, 0x0, 0x0) close(r2) recvmmsg(r1, &(0x7f0000000080), 0x43, 0x0, 0x0) 22:43:21 executing program 0: r0 = socket$kcm(0x10, 0x20000000003, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000001900)="2e0000001d008104e00f80ecdb4cb9d902631912140202003b00000012000108150600c301d819a90600150000ff", 0x2e}], 0x1}, 0x0) 22:43:21 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000300)="240000001d0007021dfffd946f610500070000000100000000000400080002000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 384.135926] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. 22:43:21 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000d80)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000100)='/dev/hwrng\x00', 0x0, 0x0) r2 = syz_open_pts(r0, 0x103080) close(r0) dup2(r1, r2) 22:43:21 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) pipe2(&(0x7f0000000300), 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000000000/0x1000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_PIT2(0xffffffffffffffff, 0x4070aea0, &(0x7f00000004c0)={[{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8, 0x0, 0x0, 0x0, 0x70}, {0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x6}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}]}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) sendmsg$TIPC_NL_NET_SET(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000540)=ANY=[@ANYBLOB], 0x1}}, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0xfb]}) syz_genetlink_get_family_id$tipc(&(0x7f0000000480)='TIPC\x00') ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_NMI(r2, 0xae9a) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 384.205202] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.0'. 22:43:21 executing program 1: r0 = socket$kcm(0x11, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={&(0x7f0000000100)=@llc={0x1a, 0x543, 0xa, 0x0, 0x0, 0x0, @random="16b29a3288a8"}, 0xea91f05536b33e3b, 0x0}, 0x0) 22:43:21 executing program 5: r0 = socket(0x1000000000010, 0x80003, 0x0) write(r0, &(0x7f0000000040)="240000001a0099f0003bf90000ed190e020008160004000000ba008008001d007f196be0", 0x24) 22:43:21 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000300)="240000001d0007021dfffd946f610500070000000100000000000400080002000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 22:43:21 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f00000032c0)=[{{&(0x7f0000000140)={0xa, 0x4e24, 0x0, @mcast1}, 0x1c, 0x0}}], 0x1, 0x24008040) setsockopt$inet6_IPV6_ADDRFORM(r0, 0x29, 0x1, &(0x7f00000000c0), 0x4) 22:43:21 executing program 2: socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, 0x0) r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x9) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000000180)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = accept4(r0, 0x0, 0x0, 0x0) close(r2) recvmmsg(r1, &(0x7f0000000080), 0x43, 0x0, 0x0) [ 384.321327] netlink: 'syz-executor.5': attribute type 29 has an invalid length. 22:43:22 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000), 0x1c) r1 = socket$packet(0x11, 0x3, 0x300) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x14}}}, 0x1c) recvmmsg(r1, &(0x7f0000000300), 0x121, 0x0, 0x0) setsockopt$packet_int(r1, 0x107, 0x8, &(0x7f00000000c0)=0x100, 0x4) sendmmsg(r0, &(0x7f00000092c0), 0x4000000000001b9, 0x0) 22:43:22 executing program 5: r0 = socket(0x1000000000010, 0x80003, 0x0) write(r0, &(0x7f0000000040)="240000001a0099f0003bf90000ed190e020008160004000000ba008008001d007f196be0", 0x24) 22:43:22 executing program 1: socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, 0x0) r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x9) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000000180)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = accept4(r0, 0x0, 0x0, 0x0) close(r2) recvmmsg(r1, &(0x7f0000000080), 0x43, 0x0, 0x0) 22:43:22 executing program 4: socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, 0x0) r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x9) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000000180)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = accept4(r0, 0x0, 0x0, 0x0) close(r2) recvmmsg(r1, &(0x7f0000000080), 0x43, 0x0, 0x0) 22:43:22 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f00000032c0)=[{{&(0x7f0000000140)={0xa, 0x4e24, 0x0, @mcast1}, 0x1c, 0x0}}], 0x1, 0x24008040) setsockopt$inet6_IPV6_ADDRFORM(r0, 0x29, 0x1, &(0x7f00000000c0), 0x4) 22:43:22 executing program 2: socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, 0x0) r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x9) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000000180)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = accept4(r0, 0x0, 0x0, 0x0) close(r2) recvmmsg(r1, &(0x7f0000000080), 0x43, 0x0, 0x0) 22:43:22 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f00000032c0)=[{{&(0x7f0000000140)={0xa, 0x4e24, 0x0, @mcast1}, 0x1c, 0x0}}], 0x1, 0x24008040) setsockopt$inet6_IPV6_ADDRFORM(r0, 0x29, 0x1, &(0x7f00000000c0), 0x4) 22:43:22 executing program 5: r0 = socket(0x1000000000010, 0x80003, 0x0) write(r0, &(0x7f0000000040)="240000001a0099f0003bf90000ed190e020008160004000000ba008008001d007f196be0", 0x24) [ 384.595403] netlink: 'syz-executor.5': attribute type 29 has an invalid length. 22:43:22 executing program 4: socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, 0x0) r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x9) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000000180)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = accept4(r0, 0x0, 0x0, 0x0) close(r2) recvmmsg(r1, &(0x7f0000000080), 0x43, 0x0, 0x0) 22:43:22 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f00000032c0)=[{{&(0x7f0000000140)={0xa, 0x4e24, 0x0, @mcast1}, 0x1c, 0x0}}], 0x1, 0x24008040) setsockopt$inet6_IPV6_ADDRFORM(r0, 0x29, 0x1, &(0x7f00000000c0), 0x4) 22:43:22 executing program 1: socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, 0x0) r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x9) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000000180)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = accept4(r0, 0x0, 0x0, 0x0) close(r2) recvmmsg(r1, &(0x7f0000000080), 0x43, 0x0, 0x0) 22:43:22 executing program 2: socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, 0x0) r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x9) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000000180)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = accept4(r0, 0x0, 0x0, 0x0) close(r2) recvmmsg(r1, &(0x7f0000000080), 0x43, 0x0, 0x0) [ 384.718112] netlink: 'syz-executor.5': attribute type 29 has an invalid length. 22:43:22 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000), 0x1c) r1 = socket$packet(0x11, 0x3, 0x300) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x14}}}, 0x1c) recvmmsg(r1, &(0x7f0000000300), 0x121, 0x0, 0x0) setsockopt$packet_int(r1, 0x107, 0x8, &(0x7f00000000c0)=0x100, 0x4) sendmmsg(r0, &(0x7f00000092c0), 0x4000000000001b9, 0x0) 22:43:22 executing program 4: socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, 0x0) r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x9) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000000180)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = accept4(r0, 0x0, 0x0, 0x0) close(r2) recvmmsg(r1, &(0x7f0000000080), 0x43, 0x0, 0x0) 22:43:22 executing program 5: r0 = socket(0x1000000000010, 0x80003, 0x0) write(r0, &(0x7f0000000040)="240000001a0099f0003bf90000ed190e020008160004000000ba008008001d007f196be0", 0x24) 22:43:22 executing program 0: socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, 0x0) r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x9) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000000180)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = accept4(r0, 0x0, 0x0, 0x0) close(r2) recvmmsg(r1, &(0x7f0000000080), 0x43, 0x0, 0x0) 22:43:22 executing program 1: socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, 0x0) r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x9) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000000180)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = accept4(r0, 0x0, 0x0, 0x0) close(r2) recvmmsg(r1, &(0x7f0000000080), 0x43, 0x0, 0x0) 22:43:22 executing program 2: creat(&(0x7f0000000700)='./bus\x00', 0x0) r0 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x200004) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r0, 0x0) fadvise64(r0, 0x0, 0x0, 0x4) 22:43:22 executing program 5: r0 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x40000fffffd, 0x200800000000042) ioctl$TCSBRKP(r0, 0x80045503, 0x717002) 22:43:22 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f000001b000)={@multicast2, @remote, @loopback}, 0xc) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/mcfilter\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) [ 385.012731] netlink: 'syz-executor.5': attribute type 29 has an invalid length. 22:43:22 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r1 = syz_open_pts(r0, 0x0) setuid(0xee01) ioctl$TIOCSLCKTRMIOS(r1, 0x5457, 0x0) 22:43:22 executing program 0: socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, 0x0) r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x9) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000000180)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = accept4(r0, 0x0, 0x0, 0x0) close(r2) recvmmsg(r1, &(0x7f0000000080), 0x43, 0x0, 0x0) 22:43:22 executing program 1: mkdir(&(0x7f0000000480)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000040)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000240)='./file0\x00') creat(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = open$dir(&(0x7f0000000080)='.\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000200)='./file1\x00', 0x0) symlink(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file1/file0\x00') renameat2(r0, &(0x7f0000001700)='./file0\x00', r0, &(0x7f00000016c0)='./file1/file0\x00', 0x2) 22:43:22 executing program 2: creat(&(0x7f0000000700)='./bus\x00', 0x0) r0 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x200004) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r0, 0x0) fadvise64(r0, 0x0, 0x0, 0x4) 22:43:22 executing program 0: socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, 0x0) r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x9) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000000180)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = accept4(r0, 0x0, 0x0, 0x0) close(r2) recvmmsg(r1, &(0x7f0000000080), 0x43, 0x0, 0x0) 22:43:22 executing program 5: syz_emit_ethernet(0x66, &(0x7f0000000440)={@local, @link_local={0x1, 0x80, 0xc2, 0x689, 0x3}, [], {@ipv6={0x86dd, {0x0, 0x6, 'v`Q', 0x30, 0x3a, 0x86ddffff, @remote={0xfe, 0x80, [0x3, 0x543, 0x700, 0x5, 0x50000000000000d, 0x8848000000f0ffff], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [0x0, 0xfffffffffffff000]}, {[], @icmpv6=@dest_unreach={0xffffff88, 0x0, 0x0, 0x0, [0x7, 0xffffca88], {0x0, 0x6, "c5961e", 0x0, 0x0, 0x0, @mcast1={0x3, 0x4, [0x0, 0x80ffffff, 0x28, 0x0, 0x0, 0x0, 0x18, 0x2, 0x0, 0x0, 0x5]}, @mcast2={0x11, 0x5}}}}}}}}, 0x0) 22:43:22 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xd, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x63, 0x11, 0x1a0010000a4}, [@ldst={0x5}]}, &(0x7f0000000080)='GPL\x00', 0x4, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 22:43:22 executing program 1: mkdir(&(0x7f0000000480)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000040)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000240)='./file0\x00') creat(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = open$dir(&(0x7f0000000080)='.\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000200)='./file1\x00', 0x0) symlink(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file1/file0\x00') renameat2(r0, &(0x7f0000001700)='./file0\x00', r0, &(0x7f00000016c0)='./file1/file0\x00', 0x2) 22:43:22 executing program 2: creat(&(0x7f0000000700)='./bus\x00', 0x0) r0 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x200004) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r0, 0x0) fadvise64(r0, 0x0, 0x0, 0x4) 22:43:22 executing program 3: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000200)={0x4002, 0x100000012, 0x0, 0xffffffffffffffff}) close(r1) 22:43:22 executing program 5: syz_emit_ethernet(0x66, &(0x7f0000000440)={@local, @link_local={0x1, 0x80, 0xc2, 0x689, 0x3}, [], {@ipv6={0x86dd, {0x0, 0x6, 'v`Q', 0x30, 0x3a, 0x86ddffff, @remote={0xfe, 0x80, [0x3, 0x543, 0x700, 0x5, 0x50000000000000d, 0x8848000000f0ffff], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [0x0, 0xfffffffffffff000]}, {[], @icmpv6=@dest_unreach={0xffffff88, 0x0, 0x0, 0x0, [0x7, 0xffffca88], {0x0, 0x6, "c5961e", 0x0, 0x0, 0x0, @mcast1={0x3, 0x4, [0x0, 0x80ffffff, 0x28, 0x0, 0x0, 0x0, 0x18, 0x2, 0x0, 0x0, 0x5]}, @mcast2={0x11, 0x5}}}}}}}}, 0x0) 22:43:22 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xd, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x63, 0x11, 0x1a0010000a4}, [@ldst={0x5}]}, &(0x7f0000000080)='GPL\x00', 0x4, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 22:43:22 executing program 1: mkdir(&(0x7f0000000480)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000040)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000240)='./file0\x00') creat(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = open$dir(&(0x7f0000000080)='.\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000200)='./file1\x00', 0x0) symlink(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file1/file0\x00') renameat2(r0, &(0x7f0000001700)='./file0\x00', r0, &(0x7f00000016c0)='./file1/file0\x00', 0x2) 22:43:23 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) connect$netlink(r0, &(0x7f0000000000)=@kern={0x10, 0x0, 0x0, 0x14800008}, 0xc) 22:43:23 executing program 5: syz_emit_ethernet(0x66, &(0x7f0000000440)={@local, @link_local={0x1, 0x80, 0xc2, 0x689, 0x3}, [], {@ipv6={0x86dd, {0x0, 0x6, 'v`Q', 0x30, 0x3a, 0x86ddffff, @remote={0xfe, 0x80, [0x3, 0x543, 0x700, 0x5, 0x50000000000000d, 0x8848000000f0ffff], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [0x0, 0xfffffffffffff000]}, {[], @icmpv6=@dest_unreach={0xffffff88, 0x0, 0x0, 0x0, [0x7, 0xffffca88], {0x0, 0x6, "c5961e", 0x0, 0x0, 0x0, @mcast1={0x3, 0x4, [0x0, 0x80ffffff, 0x28, 0x0, 0x0, 0x0, 0x18, 0x2, 0x0, 0x0, 0x5]}, @mcast2={0x11, 0x5}}}}}}}}, 0x0) 22:43:23 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) write$FUSE_WRITE(r0, &(0x7f0000000240)={0x18, 0x0, 0x7, {0xfffffffffffffffd}}, 0x18) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) syz_genetlink_get_family_id$ipvs(0x0) mprotect(&(0x7f0000ff0000/0xd000)=nil, 0xd000, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') sendfile(r1, 0xffffffffffffffff, &(0x7f0000000bc0), 0x9) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @initdev}, &(0x7f0000000180)=0x1c) syz_mount_image$f2fs(&(0x7f0000000480)='f2fs\x00', 0x0, 0x7, 0x0, 0x0, 0x10080, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{0x0}], 0x0, &(0x7f0000000700)=ANY=[]) r2 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_NAME(r2, 0x41007701, &(0x7f0000000180)='%\x00') openat$ashmem(0xffffffffffffff9c, 0x0, 0xe3f1b74c991c0272, 0x0) r3 = syz_open_dev$mice(&(0x7f0000000180)='/dev/input/mice\x00', 0x0, 0x1) r4 = socket$inet(0x2b, 0x1, 0x0) epoll_create(0x5) bind$inet(r4, &(0x7f0000000000)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_mtu(r4, 0x0, 0xa, &(0x7f0000000040)=0x5, 0x4) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$PPPIOCSCOMPRESS(r3, 0x4010744d) connect$inet(r4, &(0x7f0000000080)={0x2, 0x4e23, @local}, 0x50) close(r4) 22:43:23 executing program 5: syz_emit_ethernet(0x66, &(0x7f0000000440)={@local, @link_local={0x1, 0x80, 0xc2, 0x689, 0x3}, [], {@ipv6={0x86dd, {0x0, 0x6, 'v`Q', 0x30, 0x3a, 0x86ddffff, @remote={0xfe, 0x80, [0x3, 0x543, 0x700, 0x5, 0x50000000000000d, 0x8848000000f0ffff], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [0x0, 0xfffffffffffff000]}, {[], @icmpv6=@dest_unreach={0xffffff88, 0x0, 0x0, 0x0, [0x7, 0xffffca88], {0x0, 0x6, "c5961e", 0x0, 0x0, 0x0, @mcast1={0x3, 0x4, [0x0, 0x80ffffff, 0x28, 0x0, 0x0, 0x0, 0x18, 0x2, 0x0, 0x0, 0x5]}, @mcast2={0x11, 0x5}}}}}}}}, 0x0) 22:43:23 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xd, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x63, 0x11, 0x1a0010000a4}, [@ldst={0x5}]}, &(0x7f0000000080)='GPL\x00', 0x4, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 22:43:23 executing program 2: creat(&(0x7f0000000700)='./bus\x00', 0x0) r0 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x200004) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r0, 0x0) fadvise64(r0, 0x0, 0x0, 0x4) 22:43:23 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) connect$netlink(r0, &(0x7f0000000000)=@kern={0x10, 0x0, 0x0, 0x14800008}, 0xc) 22:43:23 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xd, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x63, 0x11, 0x1a0010000a4}, [@ldst={0x5}]}, &(0x7f0000000080)='GPL\x00', 0x4, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 22:43:23 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) connect$netlink(r0, &(0x7f0000000000)=@kern={0x10, 0x0, 0x0, 0x14800008}, 0xc) 22:43:23 executing program 1: mkdir(&(0x7f0000000480)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000040)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000240)='./file0\x00') creat(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = open$dir(&(0x7f0000000080)='.\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000200)='./file1\x00', 0x0) symlink(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file1/file0\x00') renameat2(r0, &(0x7f0000001700)='./file0\x00', r0, &(0x7f00000016c0)='./file1/file0\x00', 0x2) [ 385.723258] net_ratelimit: 14 callbacks suppressed [ 385.723265] protocol 88fb is buggy, dev hsr_slave_0 [ 385.733504] protocol 88fb is buggy, dev hsr_slave_1 22:43:23 executing program 5: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25CALLACCPTAPPRV(r0, 0x89e8) 22:43:23 executing program 5: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x0, 0x31, 0xffffffffffffffff, 0x0) madvise(&(0x7f00005b7000/0x4000)=nil, 0x4000, 0xa) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0xe0fb00, 0x0, 0x0, 0x0) 22:43:23 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) connect$netlink(r0, &(0x7f0000000000)=@kern={0x10, 0x0, 0x0, 0x14800008}, 0xc) 22:43:23 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) write$FUSE_WRITE(r0, &(0x7f0000000240)={0x18, 0x0, 0x7, {0xfffffffffffffffd}}, 0x18) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) syz_genetlink_get_family_id$ipvs(0x0) mprotect(&(0x7f0000ff0000/0xd000)=nil, 0xd000, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') sendfile(r1, 0xffffffffffffffff, &(0x7f0000000bc0), 0x9) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @initdev}, &(0x7f0000000180)=0x1c) syz_mount_image$f2fs(&(0x7f0000000480)='f2fs\x00', 0x0, 0x7, 0x0, 0x0, 0x10080, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{0x0}], 0x0, &(0x7f0000000700)=ANY=[]) r2 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_NAME(r2, 0x41007701, &(0x7f0000000180)='%\x00') openat$ashmem(0xffffffffffffff9c, 0x0, 0xe3f1b74c991c0272, 0x0) r3 = syz_open_dev$mice(&(0x7f0000000180)='/dev/input/mice\x00', 0x0, 0x1) r4 = socket$inet(0x2b, 0x1, 0x0) epoll_create(0x5) bind$inet(r4, &(0x7f0000000000)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_mtu(r4, 0x0, 0xa, &(0x7f0000000040)=0x5, 0x4) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$PPPIOCSCOMPRESS(r3, 0x4010744d) connect$inet(r4, &(0x7f0000000080)={0x2, 0x4e23, @local}, 0x50) close(r4) 22:43:23 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) write$FUSE_WRITE(r0, &(0x7f0000000240)={0x18, 0x0, 0x7, {0xfffffffffffffffd}}, 0x18) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) syz_genetlink_get_family_id$ipvs(0x0) mprotect(&(0x7f0000ff0000/0xd000)=nil, 0xd000, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') sendfile(r1, 0xffffffffffffffff, &(0x7f0000000bc0), 0x9) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @initdev}, &(0x7f0000000180)=0x1c) syz_mount_image$f2fs(&(0x7f0000000480)='f2fs\x00', 0x0, 0x7, 0x0, 0x0, 0x10080, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{0x0}], 0x0, &(0x7f0000000700)=ANY=[]) r2 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_NAME(r2, 0x41007701, &(0x7f0000000180)='%\x00') openat$ashmem(0xffffffffffffff9c, 0x0, 0xe3f1b74c991c0272, 0x0) r3 = syz_open_dev$mice(&(0x7f0000000180)='/dev/input/mice\x00', 0x0, 0x1) r4 = socket$inet(0x2b, 0x1, 0x0) epoll_create(0x5) bind$inet(r4, &(0x7f0000000000)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_mtu(r4, 0x0, 0xa, &(0x7f0000000040)=0x5, 0x4) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$PPPIOCSCOMPRESS(r3, 0x4010744d) connect$inet(r4, &(0x7f0000000080)={0x2, 0x4e23, @local}, 0x50) close(r4) 22:43:23 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) write$FUSE_WRITE(r0, &(0x7f0000000240)={0x18, 0x0, 0x7, {0xfffffffffffffffd}}, 0x18) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) syz_genetlink_get_family_id$ipvs(0x0) mprotect(&(0x7f0000ff0000/0xd000)=nil, 0xd000, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') sendfile(r1, 0xffffffffffffffff, &(0x7f0000000bc0), 0x9) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @initdev}, &(0x7f0000000180)=0x1c) syz_mount_image$f2fs(&(0x7f0000000480)='f2fs\x00', 0x0, 0x7, 0x0, 0x0, 0x10080, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{0x0}], 0x0, &(0x7f0000000700)=ANY=[]) r2 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_NAME(r2, 0x41007701, &(0x7f0000000180)='%\x00') openat$ashmem(0xffffffffffffff9c, 0x0, 0xe3f1b74c991c0272, 0x0) r3 = syz_open_dev$mice(&(0x7f0000000180)='/dev/input/mice\x00', 0x0, 0x1) r4 = socket$inet(0x2b, 0x1, 0x0) epoll_create(0x5) bind$inet(r4, &(0x7f0000000000)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_mtu(r4, 0x0, 0xa, &(0x7f0000000040)=0x5, 0x4) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$PPPIOCSCOMPRESS(r3, 0x4010744d) connect$inet(r4, &(0x7f0000000080)={0x2, 0x4e23, @local}, 0x50) close(r4) 22:43:23 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) write$FUSE_WRITE(r0, &(0x7f0000000240)={0x18, 0x0, 0x7, {0xfffffffffffffffd}}, 0x18) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) syz_genetlink_get_family_id$ipvs(0x0) mprotect(&(0x7f0000ff0000/0xd000)=nil, 0xd000, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') sendfile(r1, 0xffffffffffffffff, &(0x7f0000000bc0), 0x9) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @initdev}, &(0x7f0000000180)=0x1c) syz_mount_image$f2fs(&(0x7f0000000480)='f2fs\x00', 0x0, 0x7, 0x0, 0x0, 0x10080, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{0x0}], 0x0, &(0x7f0000000700)=ANY=[]) r2 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_NAME(r2, 0x41007701, &(0x7f0000000180)='%\x00') openat$ashmem(0xffffffffffffff9c, 0x0, 0xe3f1b74c991c0272, 0x0) r3 = syz_open_dev$mice(&(0x7f0000000180)='/dev/input/mice\x00', 0x0, 0x1) r4 = socket$inet(0x2b, 0x1, 0x0) epoll_create(0x5) bind$inet(r4, &(0x7f0000000000)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_mtu(r4, 0x0, 0xa, &(0x7f0000000040)=0x5, 0x4) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$PPPIOCSCOMPRESS(r3, 0x4010744d) connect$inet(r4, &(0x7f0000000080)={0x2, 0x4e23, @local}, 0x50) close(r4) 22:43:23 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) write$FUSE_WRITE(r0, &(0x7f0000000240)={0x18, 0x0, 0x7, {0xfffffffffffffffd}}, 0x18) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) syz_genetlink_get_family_id$ipvs(0x0) mprotect(&(0x7f0000ff0000/0xd000)=nil, 0xd000, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') sendfile(r1, 0xffffffffffffffff, &(0x7f0000000bc0), 0x9) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @initdev}, &(0x7f0000000180)=0x1c) syz_mount_image$f2fs(&(0x7f0000000480)='f2fs\x00', 0x0, 0x7, 0x0, 0x0, 0x10080, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{0x0}], 0x0, &(0x7f0000000700)=ANY=[]) r2 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_NAME(r2, 0x41007701, &(0x7f0000000180)='%\x00') openat$ashmem(0xffffffffffffff9c, 0x0, 0xe3f1b74c991c0272, 0x0) r3 = syz_open_dev$mice(&(0x7f0000000180)='/dev/input/mice\x00', 0x0, 0x1) r4 = socket$inet(0x2b, 0x1, 0x0) epoll_create(0x5) bind$inet(r4, &(0x7f0000000000)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_mtu(r4, 0x0, 0xa, &(0x7f0000000040)=0x5, 0x4) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$PPPIOCSCOMPRESS(r3, 0x4010744d) connect$inet(r4, &(0x7f0000000080)={0x2, 0x4e23, @local}, 0x50) close(r4) 22:43:23 executing program 5: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x0, 0x31, 0xffffffffffffffff, 0x0) madvise(&(0x7f00005b7000/0x4000)=nil, 0x4000, 0xa) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0xe0fb00, 0x0, 0x0, 0x0) [ 386.043256] protocol 88fb is buggy, dev hsr_slave_0 [ 386.048452] protocol 88fb is buggy, dev hsr_slave_1 22:43:23 executing program 5: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x0, 0x31, 0xffffffffffffffff, 0x0) madvise(&(0x7f00005b7000/0x4000)=nil, 0x4000, 0xa) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0xe0fb00, 0x0, 0x0, 0x0) 22:43:23 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) write$FUSE_WRITE(r0, &(0x7f0000000240)={0x18, 0x0, 0x7, {0xfffffffffffffffd}}, 0x18) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) syz_genetlink_get_family_id$ipvs(0x0) mprotect(&(0x7f0000ff0000/0xd000)=nil, 0xd000, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') sendfile(r1, 0xffffffffffffffff, &(0x7f0000000bc0), 0x9) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @initdev}, &(0x7f0000000180)=0x1c) syz_mount_image$f2fs(&(0x7f0000000480)='f2fs\x00', 0x0, 0x7, 0x0, 0x0, 0x10080, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{0x0}], 0x0, &(0x7f0000000700)=ANY=[]) r2 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_NAME(r2, 0x41007701, &(0x7f0000000180)='%\x00') openat$ashmem(0xffffffffffffff9c, 0x0, 0xe3f1b74c991c0272, 0x0) r3 = syz_open_dev$mice(&(0x7f0000000180)='/dev/input/mice\x00', 0x0, 0x1) r4 = socket$inet(0x2b, 0x1, 0x0) epoll_create(0x5) bind$inet(r4, &(0x7f0000000000)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_mtu(r4, 0x0, 0xa, &(0x7f0000000040)=0x5, 0x4) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$PPPIOCSCOMPRESS(r3, 0x4010744d) connect$inet(r4, &(0x7f0000000080)={0x2, 0x4e23, @local}, 0x50) close(r4) 22:43:23 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) write$FUSE_WRITE(r0, &(0x7f0000000240)={0x18, 0x0, 0x7, {0xfffffffffffffffd}}, 0x18) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) syz_genetlink_get_family_id$ipvs(0x0) mprotect(&(0x7f0000ff0000/0xd000)=nil, 0xd000, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') sendfile(r1, 0xffffffffffffffff, &(0x7f0000000bc0), 0x9) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @initdev}, &(0x7f0000000180)=0x1c) syz_mount_image$f2fs(&(0x7f0000000480)='f2fs\x00', 0x0, 0x7, 0x0, 0x0, 0x10080, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{0x0}], 0x0, &(0x7f0000000700)=ANY=[]) r2 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_NAME(r2, 0x41007701, &(0x7f0000000180)='%\x00') openat$ashmem(0xffffffffffffff9c, 0x0, 0xe3f1b74c991c0272, 0x0) r3 = syz_open_dev$mice(&(0x7f0000000180)='/dev/input/mice\x00', 0x0, 0x1) r4 = socket$inet(0x2b, 0x1, 0x0) epoll_create(0x5) bind$inet(r4, &(0x7f0000000000)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_mtu(r4, 0x0, 0xa, &(0x7f0000000040)=0x5, 0x4) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$PPPIOCSCOMPRESS(r3, 0x4010744d) connect$inet(r4, &(0x7f0000000080)={0x2, 0x4e23, @local}, 0x50) close(r4) 22:43:23 executing program 5: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x0, 0x31, 0xffffffffffffffff, 0x0) madvise(&(0x7f00005b7000/0x4000)=nil, 0x4000, 0xa) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0xe0fb00, 0x0, 0x0, 0x0) [ 386.203253] protocol 88fb is buggy, dev hsr_slave_0 [ 386.208352] protocol 88fb is buggy, dev hsr_slave_1 22:43:23 executing program 5: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x0, 0x31, 0xffffffffffffffff, 0x0) madvise(&(0x7f00005b7000/0x4000)=nil, 0x4000, 0xa) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0xe0fb00, 0x0, 0x0, 0x0) [ 386.363282] protocol 88fb is buggy, dev hsr_slave_0 [ 386.368359] protocol 88fb is buggy, dev hsr_slave_1 22:43:23 executing program 5: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x0, 0x31, 0xffffffffffffffff, 0x0) madvise(&(0x7f00005b7000/0x4000)=nil, 0x4000, 0xa) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0xe0fb00, 0x0, 0x0, 0x0) [ 387.803285] protocol 88fb is buggy, dev hsr_slave_0 [ 387.808462] protocol 88fb is buggy, dev hsr_slave_1 22:43:26 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) write$FUSE_WRITE(r0, &(0x7f0000000240)={0x18, 0x0, 0x7, {0xfffffffffffffffd}}, 0x18) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) syz_genetlink_get_family_id$ipvs(0x0) mprotect(&(0x7f0000ff0000/0xd000)=nil, 0xd000, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') sendfile(r1, 0xffffffffffffffff, &(0x7f0000000bc0), 0x9) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @initdev}, &(0x7f0000000180)=0x1c) syz_mount_image$f2fs(&(0x7f0000000480)='f2fs\x00', 0x0, 0x7, 0x0, 0x0, 0x10080, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{0x0}], 0x0, &(0x7f0000000700)=ANY=[]) r2 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_NAME(r2, 0x41007701, &(0x7f0000000180)='%\x00') openat$ashmem(0xffffffffffffff9c, 0x0, 0xe3f1b74c991c0272, 0x0) r3 = syz_open_dev$mice(&(0x7f0000000180)='/dev/input/mice\x00', 0x0, 0x1) r4 = socket$inet(0x2b, 0x1, 0x0) epoll_create(0x5) bind$inet(r4, &(0x7f0000000000)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_mtu(r4, 0x0, 0xa, &(0x7f0000000040)=0x5, 0x4) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$PPPIOCSCOMPRESS(r3, 0x4010744d) connect$inet(r4, &(0x7f0000000080)={0x2, 0x4e23, @local}, 0x50) close(r4) 22:43:26 executing program 5: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x0, 0x31, 0xffffffffffffffff, 0x0) madvise(&(0x7f00005b7000/0x4000)=nil, 0x4000, 0xa) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0xe0fb00, 0x0, 0x0, 0x0) 22:43:26 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) write$FUSE_WRITE(r0, &(0x7f0000000240)={0x18, 0x0, 0x7, {0xfffffffffffffffd}}, 0x18) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) syz_genetlink_get_family_id$ipvs(0x0) mprotect(&(0x7f0000ff0000/0xd000)=nil, 0xd000, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') sendfile(r1, 0xffffffffffffffff, &(0x7f0000000bc0), 0x9) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @initdev}, &(0x7f0000000180)=0x1c) syz_mount_image$f2fs(&(0x7f0000000480)='f2fs\x00', 0x0, 0x7, 0x0, 0x0, 0x10080, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{0x0}], 0x0, &(0x7f0000000700)=ANY=[]) r2 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_NAME(r2, 0x41007701, &(0x7f0000000180)='%\x00') openat$ashmem(0xffffffffffffff9c, 0x0, 0xe3f1b74c991c0272, 0x0) r3 = syz_open_dev$mice(&(0x7f0000000180)='/dev/input/mice\x00', 0x0, 0x1) r4 = socket$inet(0x2b, 0x1, 0x0) epoll_create(0x5) bind$inet(r4, &(0x7f0000000000)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_mtu(r4, 0x0, 0xa, &(0x7f0000000040)=0x5, 0x4) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$PPPIOCSCOMPRESS(r3, 0x4010744d) connect$inet(r4, &(0x7f0000000080)={0x2, 0x4e23, @local}, 0x50) close(r4) 22:43:26 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) write$FUSE_WRITE(r0, &(0x7f0000000240)={0x18, 0x0, 0x7, {0xfffffffffffffffd}}, 0x18) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) syz_genetlink_get_family_id$ipvs(0x0) mprotect(&(0x7f0000ff0000/0xd000)=nil, 0xd000, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') sendfile(r1, 0xffffffffffffffff, &(0x7f0000000bc0), 0x9) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @initdev}, &(0x7f0000000180)=0x1c) syz_mount_image$f2fs(&(0x7f0000000480)='f2fs\x00', 0x0, 0x7, 0x0, 0x0, 0x10080, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{0x0}], 0x0, &(0x7f0000000700)=ANY=[]) r2 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_NAME(r2, 0x41007701, &(0x7f0000000180)='%\x00') openat$ashmem(0xffffffffffffff9c, 0x0, 0xe3f1b74c991c0272, 0x0) r3 = syz_open_dev$mice(&(0x7f0000000180)='/dev/input/mice\x00', 0x0, 0x1) r4 = socket$inet(0x2b, 0x1, 0x0) epoll_create(0x5) bind$inet(r4, &(0x7f0000000000)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_mtu(r4, 0x0, 0xa, &(0x7f0000000040)=0x5, 0x4) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$PPPIOCSCOMPRESS(r3, 0x4010744d) connect$inet(r4, &(0x7f0000000080)={0x2, 0x4e23, @local}, 0x50) close(r4) 22:43:26 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) write$FUSE_WRITE(r0, &(0x7f0000000240)={0x18, 0x0, 0x7, {0xfffffffffffffffd}}, 0x18) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) syz_genetlink_get_family_id$ipvs(0x0) mprotect(&(0x7f0000ff0000/0xd000)=nil, 0xd000, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') sendfile(r1, 0xffffffffffffffff, &(0x7f0000000bc0), 0x9) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @initdev}, &(0x7f0000000180)=0x1c) syz_mount_image$f2fs(&(0x7f0000000480)='f2fs\x00', 0x0, 0x7, 0x0, 0x0, 0x10080, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{0x0}], 0x0, &(0x7f0000000700)=ANY=[]) r2 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_NAME(r2, 0x41007701, &(0x7f0000000180)='%\x00') openat$ashmem(0xffffffffffffff9c, 0x0, 0xe3f1b74c991c0272, 0x0) r3 = syz_open_dev$mice(&(0x7f0000000180)='/dev/input/mice\x00', 0x0, 0x1) r4 = socket$inet(0x2b, 0x1, 0x0) epoll_create(0x5) bind$inet(r4, &(0x7f0000000000)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_mtu(r4, 0x0, 0xa, &(0x7f0000000040)=0x5, 0x4) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$PPPIOCSCOMPRESS(r3, 0x4010744d) connect$inet(r4, &(0x7f0000000080)={0x2, 0x4e23, @local}, 0x50) close(r4) 22:43:26 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) write$FUSE_WRITE(r0, &(0x7f0000000240)={0x18, 0x0, 0x7, {0xfffffffffffffffd}}, 0x18) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) syz_genetlink_get_family_id$ipvs(0x0) mprotect(&(0x7f0000ff0000/0xd000)=nil, 0xd000, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') sendfile(r1, 0xffffffffffffffff, &(0x7f0000000bc0), 0x9) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @initdev}, &(0x7f0000000180)=0x1c) syz_mount_image$f2fs(&(0x7f0000000480)='f2fs\x00', 0x0, 0x7, 0x0, 0x0, 0x10080, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{0x0}], 0x0, &(0x7f0000000700)=ANY=[]) r2 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_NAME(r2, 0x41007701, &(0x7f0000000180)='%\x00') openat$ashmem(0xffffffffffffff9c, 0x0, 0xe3f1b74c991c0272, 0x0) r3 = syz_open_dev$mice(&(0x7f0000000180)='/dev/input/mice\x00', 0x0, 0x1) r4 = socket$inet(0x2b, 0x1, 0x0) epoll_create(0x5) bind$inet(r4, &(0x7f0000000000)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_mtu(r4, 0x0, 0xa, &(0x7f0000000040)=0x5, 0x4) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$PPPIOCSCOMPRESS(r3, 0x4010744d) connect$inet(r4, &(0x7f0000000080)={0x2, 0x4e23, @local}, 0x50) close(r4) 22:43:26 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) write$FUSE_WRITE(r0, &(0x7f0000000240)={0x18, 0x0, 0x7, {0xfffffffffffffffd}}, 0x18) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) syz_genetlink_get_family_id$ipvs(0x0) mprotect(&(0x7f0000ff0000/0xd000)=nil, 0xd000, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') sendfile(r1, 0xffffffffffffffff, &(0x7f0000000bc0), 0x9) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @initdev}, &(0x7f0000000180)=0x1c) syz_mount_image$f2fs(&(0x7f0000000480)='f2fs\x00', 0x0, 0x7, 0x0, 0x0, 0x10080, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{0x0}], 0x0, &(0x7f0000000700)=ANY=[]) r2 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_NAME(r2, 0x41007701, &(0x7f0000000180)='%\x00') openat$ashmem(0xffffffffffffff9c, 0x0, 0xe3f1b74c991c0272, 0x0) r3 = syz_open_dev$mice(&(0x7f0000000180)='/dev/input/mice\x00', 0x0, 0x1) r4 = socket$inet(0x2b, 0x1, 0x0) epoll_create(0x5) bind$inet(r4, &(0x7f0000000000)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_mtu(r4, 0x0, 0xa, &(0x7f0000000040)=0x5, 0x4) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$PPPIOCSCOMPRESS(r3, 0x4010744d) connect$inet(r4, &(0x7f0000000080)={0x2, 0x4e23, @local}, 0x50) close(r4) 22:43:26 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) write$FUSE_WRITE(r0, &(0x7f0000000240)={0x18, 0x0, 0x7, {0xfffffffffffffffd}}, 0x18) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) syz_genetlink_get_family_id$ipvs(0x0) mprotect(&(0x7f0000ff0000/0xd000)=nil, 0xd000, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') sendfile(r1, 0xffffffffffffffff, &(0x7f0000000bc0), 0x9) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @initdev}, &(0x7f0000000180)=0x1c) syz_mount_image$f2fs(&(0x7f0000000480)='f2fs\x00', 0x0, 0x7, 0x0, 0x0, 0x10080, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{0x0}], 0x0, &(0x7f0000000700)=ANY=[]) r2 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_NAME(r2, 0x41007701, &(0x7f0000000180)='%\x00') openat$ashmem(0xffffffffffffff9c, 0x0, 0xe3f1b74c991c0272, 0x0) r3 = syz_open_dev$mice(&(0x7f0000000180)='/dev/input/mice\x00', 0x0, 0x1) r4 = socket$inet(0x2b, 0x1, 0x0) epoll_create(0x5) bind$inet(r4, &(0x7f0000000000)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_mtu(r4, 0x0, 0xa, &(0x7f0000000040)=0x5, 0x4) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$PPPIOCSCOMPRESS(r3, 0x4010744d) connect$inet(r4, &(0x7f0000000080)={0x2, 0x4e23, @local}, 0x50) close(r4) 22:43:26 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) write$FUSE_WRITE(r0, &(0x7f0000000240)={0x18, 0x0, 0x7, {0xfffffffffffffffd}}, 0x18) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) syz_genetlink_get_family_id$ipvs(0x0) mprotect(&(0x7f0000ff0000/0xd000)=nil, 0xd000, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') sendfile(r1, 0xffffffffffffffff, &(0x7f0000000bc0), 0x9) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @initdev}, &(0x7f0000000180)=0x1c) syz_mount_image$f2fs(&(0x7f0000000480)='f2fs\x00', 0x0, 0x7, 0x0, 0x0, 0x10080, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{0x0}], 0x0, &(0x7f0000000700)=ANY=[]) r2 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_NAME(r2, 0x41007701, &(0x7f0000000180)='%\x00') openat$ashmem(0xffffffffffffff9c, 0x0, 0xe3f1b74c991c0272, 0x0) r3 = syz_open_dev$mice(&(0x7f0000000180)='/dev/input/mice\x00', 0x0, 0x1) r4 = socket$inet(0x2b, 0x1, 0x0) epoll_create(0x5) bind$inet(r4, &(0x7f0000000000)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_mtu(r4, 0x0, 0xa, &(0x7f0000000040)=0x5, 0x4) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$PPPIOCSCOMPRESS(r3, 0x4010744d) connect$inet(r4, &(0x7f0000000080)={0x2, 0x4e23, @local}, 0x50) close(r4) 22:43:26 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x1, 0x0) ioctl$DRM_IOCTL_GET_CAP(r0, 0xc010640c, &(0x7f0000000040)={0x8}) 22:43:26 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) write$FUSE_WRITE(r0, &(0x7f0000000240)={0x18, 0x0, 0x7, {0xfffffffffffffffd}}, 0x18) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) syz_genetlink_get_family_id$ipvs(0x0) mprotect(&(0x7f0000ff0000/0xd000)=nil, 0xd000, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') sendfile(r1, 0xffffffffffffffff, &(0x7f0000000bc0), 0x9) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @initdev}, &(0x7f0000000180)=0x1c) syz_mount_image$f2fs(&(0x7f0000000480)='f2fs\x00', 0x0, 0x7, 0x0, 0x0, 0x10080, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{0x0}], 0x0, &(0x7f0000000700)=ANY=[]) r2 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_NAME(r2, 0x41007701, &(0x7f0000000180)='%\x00') openat$ashmem(0xffffffffffffff9c, 0x0, 0xe3f1b74c991c0272, 0x0) r3 = syz_open_dev$mice(&(0x7f0000000180)='/dev/input/mice\x00', 0x0, 0x1) r4 = socket$inet(0x2b, 0x1, 0x0) epoll_create(0x5) bind$inet(r4, &(0x7f0000000000)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_mtu(r4, 0x0, 0xa, &(0x7f0000000040)=0x5, 0x4) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$PPPIOCSCOMPRESS(r3, 0x4010744d) connect$inet(r4, &(0x7f0000000080)={0x2, 0x4e23, @local}, 0x50) close(r4) 22:43:26 executing program 2: mkdir(&(0x7f0000000440)='./file0\x00', 0x0) openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x0, 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000880)={{{@in6=@mcast2, @in=@broadcast}}, {{@in=@loopback}, 0x0, @in6=@empty}}, 0x0) getuid() getgroups(0x0, 0x0) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='tmpfs\x00', 0x0, 0x0) 22:43:26 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000000)={0x0, 0x4, [@dev={[], 0xe}, @link_local, @empty, @remote]}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 22:43:27 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) write$FUSE_WRITE(r0, &(0x7f0000000240)={0x18, 0x0, 0x7, {0xfffffffffffffffd}}, 0x18) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) syz_genetlink_get_family_id$ipvs(0x0) mprotect(&(0x7f0000ff0000/0xd000)=nil, 0xd000, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') sendfile(r1, 0xffffffffffffffff, &(0x7f0000000bc0), 0x9) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @initdev}, &(0x7f0000000180)=0x1c) syz_mount_image$f2fs(&(0x7f0000000480)='f2fs\x00', 0x0, 0x7, 0x0, 0x0, 0x10080, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{0x0}], 0x0, &(0x7f0000000700)=ANY=[]) r2 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_NAME(r2, 0x41007701, &(0x7f0000000180)='%\x00') openat$ashmem(0xffffffffffffff9c, 0x0, 0xe3f1b74c991c0272, 0x0) r3 = syz_open_dev$mice(&(0x7f0000000180)='/dev/input/mice\x00', 0x0, 0x1) r4 = socket$inet(0x2b, 0x1, 0x0) epoll_create(0x5) bind$inet(r4, &(0x7f0000000000)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_mtu(r4, 0x0, 0xa, &(0x7f0000000040)=0x5, 0x4) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$PPPIOCSCOMPRESS(r3, 0x4010744d) connect$inet(r4, &(0x7f0000000080)={0x2, 0x4e23, @local}, 0x50) close(r4) 22:43:27 executing program 1: r0 = timerfd_create(0x0, 0x0) timerfd_settime(r0, 0x0, &(0x7f0000007000)={{0x0, 0x4}, {0x0, 0x5}}, 0x0) timerfd_gettime(r0, &(0x7f0000000100)) 22:43:28 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) write$FUSE_WRITE(r0, &(0x7f0000000240)={0x18, 0x0, 0x7, {0xfffffffffffffffd}}, 0x18) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) syz_genetlink_get_family_id$ipvs(0x0) mprotect(&(0x7f0000ff0000/0xd000)=nil, 0xd000, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') sendfile(r1, 0xffffffffffffffff, &(0x7f0000000bc0), 0x9) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @initdev}, &(0x7f0000000180)=0x1c) syz_mount_image$f2fs(&(0x7f0000000480)='f2fs\x00', 0x0, 0x7, 0x0, 0x0, 0x10080, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{0x0}], 0x0, &(0x7f0000000700)=ANY=[]) r2 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_NAME(r2, 0x41007701, &(0x7f0000000180)='%\x00') openat$ashmem(0xffffffffffffff9c, 0x0, 0xe3f1b74c991c0272, 0x0) r3 = syz_open_dev$mice(&(0x7f0000000180)='/dev/input/mice\x00', 0x0, 0x1) r4 = socket$inet(0x2b, 0x1, 0x0) epoll_create(0x5) bind$inet(r4, &(0x7f0000000000)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_mtu(r4, 0x0, 0xa, &(0x7f0000000040)=0x5, 0x4) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$PPPIOCSCOMPRESS(r3, 0x4010744d) connect$inet(r4, &(0x7f0000000080)={0x2, 0x4e23, @local}, 0x50) close(r4) [ 391.259014] IPVS: ftp: loaded support on port[0] = 21 [ 391.262161] IPVS: ftp: loaded support on port[0] = 21 [ 391.276443] IPVS: ftp: loaded support on port[0] = 21 [ 391.286379] IPVS: ftp: loaded support on port[0] = 21 [ 391.295116] IPVS: ftp: loaded support on port[0] = 21 22:43:28 executing program 5: r0 = socket(0x400020000000010, 0x2, 0x0) write(r0, &(0x7f0000a1cf6c)="1f00000054000d0000000000fc07ff1b070404390000000007000100010039", 0x1f) [ 391.765951] chnl_net:caif_netlink_parms(): no params data found [ 392.087988] chnl_net:caif_netlink_parms(): no params data found [ 392.096488] chnl_net:caif_netlink_parms(): no params data found [ 392.117851] bridge0: port 1(bridge_slave_0) entered blocking state [ 392.125285] bridge0: port 1(bridge_slave_0) entered disabled state [ 392.132132] device bridge_slave_0 entered promiscuous mode [ 392.143692] chnl_net:caif_netlink_parms(): no params data found [ 392.157861] device bridge_slave_1 left promiscuous mode [ 392.164381] bridge0: port 2(bridge_slave_1) entered disabled state [ 392.194159] device bridge_slave_0 left promiscuous mode [ 392.199600] bridge0: port 1(bridge_slave_0) entered disabled state [ 395.045662] device hsr_slave_1 left promiscuous mode [ 395.087267] device hsr_slave_0 left promiscuous mode [ 395.147403] team0 (unregistering): Port device team_slave_1 removed [ 395.157791] team0 (unregistering): Port device team_slave_0 removed [ 395.167416] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 395.216062] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 395.292874] bond0 (unregistering): Released all slaves [ 395.358835] bridge0: port 2(bridge_slave_1) entered blocking state [ 395.365642] bridge0: port 2(bridge_slave_1) entered disabled state [ 395.372411] device bridge_slave_1 entered promiscuous mode [ 395.397660] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 395.423792] bridge0: port 1(bridge_slave_0) entered blocking state [ 395.430141] bridge0: port 1(bridge_slave_0) entered disabled state [ 395.437305] device bridge_slave_0 entered promiscuous mode [ 395.460140] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 395.477690] IPVS: ftp: loaded support on port[0] = 21 [ 395.493736] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 395.500862] team0: Port device team_slave_0 added [ 395.507322] bridge0: port 2(bridge_slave_1) entered blocking state [ 395.513767] bridge0: port 2(bridge_slave_1) entered disabled state [ 395.520520] device bridge_slave_1 entered promiscuous mode [ 395.550619] chnl_net:caif_netlink_parms(): no params data found [ 395.559869] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 395.567317] team0: Port device team_slave_1 added [ 395.576129] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 395.593352] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 395.600370] bridge0: port 1(bridge_slave_0) entered blocking state [ 395.610294] bridge0: port 1(bridge_slave_0) entered disabled state [ 395.617343] device bridge_slave_0 entered promiscuous mode [ 395.695623] device hsr_slave_0 entered promiscuous mode [ 395.743592] device hsr_slave_1 entered promiscuous mode [ 395.788664] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 395.799003] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 395.808280] bridge0: port 2(bridge_slave_1) entered blocking state [ 395.808299] bridge0: port 2(bridge_slave_1) entered disabled state [ 395.808969] device bridge_slave_1 entered promiscuous mode [ 395.829885] bridge0: port 1(bridge_slave_0) entered blocking state [ 395.836541] bridge0: port 1(bridge_slave_0) entered disabled state [ 395.843551] device bridge_slave_0 entered promiscuous mode [ 395.850933] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 395.865322] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 395.886607] bridge0: port 2(bridge_slave_1) entered blocking state [ 395.892931] bridge0: port 2(bridge_slave_1) entered disabled state [ 395.899830] device bridge_slave_1 entered promiscuous mode [ 395.978521] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 395.989826] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 396.038429] bridge0: port 1(bridge_slave_0) entered blocking state [ 396.047694] bridge0: port 1(bridge_slave_0) entered disabled state [ 396.061409] device bridge_slave_0 entered promiscuous mode [ 396.071721] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 396.091915] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 396.100378] team0: Port device team_slave_0 added [ 396.112864] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 396.120737] bridge0: port 2(bridge_slave_1) entered blocking state [ 396.127648] bridge0: port 2(bridge_slave_1) entered disabled state [ 396.135021] device bridge_slave_1 entered promiscuous mode [ 396.151505] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 396.160535] team0: Port device team_slave_0 added [ 396.166036] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 396.182150] team0: Port device team_slave_1 added [ 396.188861] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 396.219096] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 396.227829] team0: Port device team_slave_1 added [ 396.233004] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 396.265450] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 396.313570] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 396.326999] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 396.342703] 8021q: adding VLAN 0 to HW filter on device bond0 [ 396.349524] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 396.375266] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 396.382485] team0: Port device team_slave_0 added [ 396.389140] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 396.405259] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 396.414774] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 396.435585] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 396.442920] team0: Port device team_slave_1 added [ 396.454803] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 396.461667] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 396.483941] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 396.490003] 8021q: adding VLAN 0 to HW filter on device team0 [ 396.545809] device hsr_slave_0 entered promiscuous mode [ 396.613473] device hsr_slave_1 entered promiscuous mode [ 396.673658] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 396.680523] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 396.697008] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 396.708911] chnl_net:caif_netlink_parms(): no params data found [ 396.766014] device hsr_slave_0 entered promiscuous mode [ 396.813448] device hsr_slave_1 entered promiscuous mode [ 396.873829] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 396.881075] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 396.888472] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 396.896008] team0: Port device team_slave_0 added [ 396.908415] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 396.917045] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 396.936438] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 396.944648] team0: Port device team_slave_1 added [ 396.950701] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 396.961173] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 396.973354] bridge0: port 1(bridge_slave_0) entered blocking state [ 396.979766] bridge0: port 1(bridge_slave_0) entered forwarding state [ 397.005952] bridge0: port 1(bridge_slave_0) entered blocking state [ 397.014318] bridge0: port 1(bridge_slave_0) entered disabled state [ 397.021531] device bridge_slave_0 entered promiscuous mode [ 397.028254] bridge0: port 2(bridge_slave_1) entered blocking state [ 397.034921] bridge0: port 2(bridge_slave_1) entered disabled state [ 397.041723] device bridge_slave_1 entered promiscuous mode [ 397.048686] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 397.056234] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 397.063887] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 397.072234] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 397.114756] device hsr_slave_0 entered promiscuous mode [ 397.153524] device hsr_slave_1 entered promiscuous mode [ 397.195151] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 397.202154] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 397.224148] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 397.231906] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 397.239722] bridge0: port 2(bridge_slave_1) entered blocking state [ 397.246139] bridge0: port 2(bridge_slave_1) entered forwarding state [ 397.258769] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 397.273883] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 397.286517] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 397.295834] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 397.305730] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 397.334541] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 397.342315] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 397.351813] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 397.361431] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 397.415676] device hsr_slave_0 entered promiscuous mode [ 397.453659] device hsr_slave_1 entered promiscuous mode [ 397.494114] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 397.501120] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 397.527578] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 397.535403] team0: Port device team_slave_0 added [ 397.546428] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 397.562485] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 397.570323] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 397.581456] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 397.588637] team0: Port device team_slave_1 added [ 397.599164] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 397.621274] 8021q: adding VLAN 0 to HW filter on device bond0 [ 397.633472] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 397.640476] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 397.649304] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 397.671934] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 397.680559] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 397.691261] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 397.701856] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 397.715407] 8021q: adding VLAN 0 to HW filter on device bond0 [ 397.724542] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 397.730726] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 397.739475] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 397.751690] 8021q: adding VLAN 0 to HW filter on device bond0 [ 397.758151] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 397.766984] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 397.775656] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 397.782818] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 397.794650] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 397.800668] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 397.810122] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 397.828480] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 397.841026] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 397.849568] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 397.856574] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 397.863822] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 397.870586] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 397.879235] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 397.885548] 8021q: adding VLAN 0 to HW filter on device team0 [ 397.894112] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 397.906417] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 397.934862] device hsr_slave_0 entered promiscuous mode [ 397.983785] device hsr_slave_1 entered promiscuous mode [ 398.038515] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 398.049988] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 398.057573] bridge0: port 1(bridge_slave_0) entered blocking state [ 398.063955] bridge0: port 1(bridge_slave_0) entered forwarding state [ 398.075779] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 398.730685] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 399.073795] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 399.079894] 8021q: adding VLAN 0 to HW filter on device team0 [ 399.087531] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 399.096062] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 399.104103] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 399.111587] bridge0: port 2(bridge_slave_1) entered blocking state [ 399.117939] bridge0: port 2(bridge_slave_1) entered forwarding state [ 399.133352] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 399.140183] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 399.158004] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 399.502094] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 399.510207] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 399.517580] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 399.527721] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 399.541013] 8021q: adding VLAN 0 to HW filter on device bond0 [ 399.548901] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 399.560231] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 399.567490] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 399.575409] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 399.583053] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 399.590813] bridge0: port 1(bridge_slave_0) entered blocking state [ 399.597179] bridge0: port 1(bridge_slave_0) entered forwarding state [ 399.605216] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 399.612830] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 399.620502] bridge0: port 2(bridge_slave_1) entered blocking state [ 399.626836] bridge0: port 2(bridge_slave_1) entered forwarding state [ 399.634788] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 399.640844] 8021q: adding VLAN 0 to HW filter on device team0 [ 399.650121] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 399.979575] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 399.988927] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 399.996710] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 400.005000] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 400.012016] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 400.019854] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 400.030509] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 400.040775] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 400.052614] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 400.059527] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 400.068384] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 400.076166] bridge0: port 1(bridge_slave_0) entered blocking state [ 400.082489] bridge0: port 1(bridge_slave_0) entered forwarding state [ 400.089450] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 400.097121] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 400.104834] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 400.112639] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 400.122572] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 400.135626] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 400.145130] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 400.152827] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 400.520610] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 400.528435] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 400.535782] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 400.542784] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 400.550951] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 400.559825] bridge0: port 2(bridge_slave_1) entered blocking state [ 400.566191] bridge0: port 2(bridge_slave_1) entered forwarding state [ 400.574211] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 400.583515] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 400.591841] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 400.603074] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 400.609377] 8021q: adding VLAN 0 to HW filter on device team0 [ 400.618342] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 400.630504] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 400.640131] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 400.648345] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 400.656344] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 400.664660] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 400.674457] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 400.680488] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 400.690213] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 400.699631] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 400.719197] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 400.732159] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 400.753323] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 400.760904] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 400.768996] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 401.130206] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 401.138330] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 401.151085] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 401.201284] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready [ 401.212980] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 401.221577] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 401.229649] bridge0: port 1(bridge_slave_0) entered blocking state [ 401.236054] bridge0: port 1(bridge_slave_0) entered forwarding state [ 401.243819] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 401.251640] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 401.261416] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 401.274917] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 401.284636] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 401.292178] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 401.299598] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready [ 401.647845] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 401.655984] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 401.662858] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 401.670975] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 401.678563] bridge0: port 2(bridge_slave_1) entered blocking state [ 401.684902] bridge0: port 2(bridge_slave_1) entered forwarding state [ 401.692024] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 401.699997] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 401.707549] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 401.715112] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 401.722377] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 401.730234] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 401.752210] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 401.762800] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 402.125939] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 402.134451] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 402.142085] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 402.152148] 8021q: adding VLAN 0 to HW filter on device bond0 [ 402.165161] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 402.184940] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 402.193036] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 402.212557] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 402.220627] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 402.228267] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 402.235959] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 402.243380] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 402.251693] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 402.257862] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 402.267245] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 402.275601] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 402.281608] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 402.603042] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 402.609904] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 402.617944] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 402.631660] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 402.643462] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 402.650512] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 402.657007] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 402.669576] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 402.676631] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 402.685286] IPVS: stopping backup sync thread 7508 ... [ 402.687994] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 402.703774] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 402.712662] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 402.719718] 8021q: adding VLAN 0 to HW filter on device team0 [ 402.735497] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 402.742820] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 402.750451] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 402.763978] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 402.772765] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 402.781534] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 402.789985] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 402.806745] bridge0: port 1(bridge_slave_0) entered blocking state [ 402.813209] bridge0: port 1(bridge_slave_0) entered forwarding state [ 402.820167] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 402.827818] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 402.888044] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 402.896835] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 402.910133] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 402.925538] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 402.937015] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 402.944923] bridge0: port 2(bridge_slave_1) entered blocking state [ 402.951237] bridge0: port 2(bridge_slave_1) entered forwarding state [ 402.958379] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 402.966061] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 402.985250] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 402.993747] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 402.999762] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 403.022282] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 403.037220] overlayfs: lowerdir is in-use as upperdir/workdir [ 403.052876] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 403.081534] overlayfs: workdir and upperdir must reside under the same mount [ 403.107984] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 403.124534] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 403.134071] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 403.141792] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 403.150325] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 403.225779] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 403.232611] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 403.240520] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 403.251024] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 403.259908] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 403.316694] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 403.325109] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 403.334622] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 403.344572] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 403.351386] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 403.359156] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 403.367446] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 403.373721] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 403.442778] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready 22:43:40 executing program 1: r0 = timerfd_create(0x0, 0x0) timerfd_settime(r0, 0x0, &(0x7f0000007000)={{0x0, 0x4}, {0x0, 0x5}}, 0x0) timerfd_gettime(r0, &(0x7f0000000100)) 22:43:40 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000000)={0x0, 0x4, [@dev={[], 0xe}, @link_local, @empty, @remote]}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') [ 403.492317] 8021q: adding VLAN 0 to HW filter on device batadv0 22:43:41 executing program 2: mkdir(&(0x7f0000000440)='./file0\x00', 0x0) openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x0, 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000880)={{{@in6=@mcast2, @in=@broadcast}}, {{@in=@loopback}, 0x0, @in6=@empty}}, 0x0) getuid() getgroups(0x0, 0x0) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='tmpfs\x00', 0x0, 0x0) 22:43:41 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x1, 0x0) ioctl$DRM_IOCTL_GET_CAP(r0, 0xc010640c, &(0x7f0000000040)={0x8}) 22:43:41 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open$dir(&(0x7f0000000080)='./file1\x00', 0x81fe, 0x0) ioctl$FIDEDUPERANGE(r0, 0xc0189436, &(0x7f0000000140)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00U\x00\x00\x00\x00\x00\x00\x00']) 22:43:41 executing program 1: r0 = timerfd_create(0x0, 0x0) timerfd_settime(r0, 0x0, &(0x7f0000007000)={{0x0, 0x4}, {0x0, 0x5}}, 0x0) timerfd_gettime(r0, &(0x7f0000000100)) 22:43:41 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x1, 0x0) ioctl$DRM_IOCTL_GET_CAP(r0, 0xc010640c, &(0x7f0000000040)={0x8}) 22:43:41 executing program 1: r0 = timerfd_create(0x0, 0x0) timerfd_settime(r0, 0x0, &(0x7f0000007000)={{0x0, 0x4}, {0x0, 0x5}}, 0x0) timerfd_gettime(r0, &(0x7f0000000100)) 22:43:41 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x1, 0x0) ioctl$DRM_IOCTL_GET_CAP(r0, 0xc010640c, &(0x7f0000000040)={0x8}) 22:43:41 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x6}]}}}]}, 0x3c}}, 0x0) 22:43:41 executing program 2: mkdir(&(0x7f0000000440)='./file0\x00', 0x0) openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x0, 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000880)={{{@in6=@mcast2, @in=@broadcast}}, {{@in=@loopback}, 0x0, @in6=@empty}}, 0x0) getuid() getgroups(0x0, 0x0) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='tmpfs\x00', 0x0, 0x0) 22:43:41 executing program 5: r0 = socket(0x400020000000010, 0x2, 0x0) write(r0, &(0x7f0000a1cf6c)="1f00000054000d0000000000fc07ff1b070404390000000007000100010039", 0x1f) 22:43:41 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) r2 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x400004e21, 0x0, @empty}, 0x1c) setsockopt$inet6_int(r2, 0x29, 0x43, &(0x7f0000000080)=0xf5, 0x4) connect$inet6(r2, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) write$binfmt_misc(r1, &(0x7f0000000000)={'syz0'}, 0x10098) [ 404.077477] PF_BRIDGE: br_mdb_parse() with invalid ifindex [ 404.152302] overlayfs: lowerdir is in-use as upperdir/workdir [ 404.256829] netlink: 'syz-executor.1': attribute type 6 has an invalid length. [ 404.303631] PF_BRIDGE: br_mdb_parse() with invalid ifindex [ 404.685450] device bridge_slave_1 left promiscuous mode [ 404.690939] bridge0: port 2(bridge_slave_1) entered disabled state [ 404.743996] device bridge_slave_0 left promiscuous mode [ 404.749453] bridge0: port 1(bridge_slave_0) entered disabled state [ 404.785531] device bridge_slave_1 left promiscuous mode [ 404.790973] bridge0: port 2(bridge_slave_1) entered disabled state [ 404.833897] device bridge_slave_0 left promiscuous mode [ 404.839301] bridge0: port 1(bridge_slave_0) entered disabled state [ 404.888539] device bridge_slave_1 left promiscuous mode [ 404.894425] bridge0: port 2(bridge_slave_1) entered disabled state [ 404.943999] device bridge_slave_0 left promiscuous mode [ 404.949451] bridge0: port 1(bridge_slave_0) entered disabled state [ 405.004465] device bridge_slave_1 left promiscuous mode [ 405.009871] bridge0: port 2(bridge_slave_1) entered disabled state [ 405.044154] device bridge_slave_0 left promiscuous mode [ 405.049594] bridge0: port 1(bridge_slave_0) entered disabled state [ 405.094253] device bridge_slave_1 left promiscuous mode [ 405.099671] bridge0: port 2(bridge_slave_1) entered disabled state [ 405.153956] device bridge_slave_0 left promiscuous mode [ 405.159451] bridge0: port 1(bridge_slave_0) entered disabled state [ 413.886838] device hsr_slave_1 left promiscuous mode [ 413.927592] device hsr_slave_0 left promiscuous mode [ 413.967549] team0 (unregistering): Port device team_slave_1 removed [ 413.977746] team0 (unregistering): Port device team_slave_0 removed [ 413.987230] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 414.028477] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 414.121026] bond0 (unregistering): Released all slaves [ 414.275390] device hsr_slave_1 left promiscuous mode [ 414.317186] device hsr_slave_0 left promiscuous mode [ 414.366441] team0 (unregistering): Port device team_slave_1 removed [ 414.377084] team0 (unregistering): Port device team_slave_0 removed [ 414.386325] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 414.424031] device bond_slave_1 left promiscuous mode [ 414.432652] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 414.474040] device bond_slave_0 left promiscuous mode [ 414.510128] bond0 (unregistering): Released all slaves [ 414.905632] device hsr_slave_1 left promiscuous mode [ 414.977244] device hsr_slave_0 left promiscuous mode [ 415.026073] team0 (unregistering): Port device team_slave_1 removed [ 415.036474] team0 (unregistering): Port device team_slave_0 removed [ 415.046739] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 415.076528] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 415.151151] bond0 (unregistering): Released all slaves [ 415.215701] device hsr_slave_1 left promiscuous mode [ 415.255782] device hsr_slave_0 left promiscuous mode [ 415.316445] team0 (unregistering): Port device team_slave_1 removed [ 415.327361] team0 (unregistering): Port device team_slave_0 removed [ 415.337053] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 415.366604] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 415.431108] bond0 (unregistering): Released all slaves [ 415.545024] device hsr_slave_1 left promiscuous mode [ 415.597467] device hsr_slave_0 left promiscuous mode [ 415.646046] team0 (unregistering): Port device team_slave_1 removed [ 415.658418] team0 (unregistering): Port device team_slave_0 removed [ 415.667784] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 415.707270] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 415.776659] bond0 (unregistering): Released all slaves [ 415.838301] IPVS: ftp: loaded support on port[0] = 21 [ 415.899549] chnl_net:caif_netlink_parms(): no params data found [ 415.929814] bridge0: port 1(bridge_slave_0) entered blocking state [ 415.936255] bridge0: port 1(bridge_slave_0) entered disabled state [ 415.943009] device bridge_slave_0 entered promiscuous mode [ 415.949773] bridge0: port 2(bridge_slave_1) entered blocking state [ 415.956209] bridge0: port 2(bridge_slave_1) entered disabled state [ 415.963039] device bridge_slave_1 entered promiscuous mode [ 415.978097] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 415.987234] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 416.001633] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 416.008845] team0: Port device team_slave_0 added [ 416.015042] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 416.022181] team0: Port device team_slave_1 added [ 416.027462] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 416.034732] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 416.094825] device hsr_slave_0 entered promiscuous mode [ 416.133444] device hsr_slave_1 entered promiscuous mode [ 416.193781] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 416.200645] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 416.215939] bridge0: port 2(bridge_slave_1) entered blocking state [ 416.222256] bridge0: port 2(bridge_slave_1) entered forwarding state [ 416.228884] bridge0: port 1(bridge_slave_0) entered blocking state [ 416.235234] bridge0: port 1(bridge_slave_0) entered forwarding state [ 416.269746] 8021q: adding VLAN 0 to HW filter on device bond0 [ 416.277755] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 416.287159] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 416.294916] bridge0: port 1(bridge_slave_0) entered disabled state [ 416.301648] bridge0: port 2(bridge_slave_1) entered disabled state [ 416.311007] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 416.317682] 8021q: adding VLAN 0 to HW filter on device team0 [ 416.329988] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 416.337758] bridge0: port 1(bridge_slave_0) entered blocking state [ 416.344132] bridge0: port 1(bridge_slave_0) entered forwarding state [ 416.354348] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 416.361913] bridge0: port 2(bridge_slave_1) entered blocking state [ 416.368268] bridge0: port 2(bridge_slave_1) entered forwarding state [ 416.385080] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 416.392588] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 416.409520] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 416.417110] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 416.428069] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 416.438382] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 416.445698] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 416.452854] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 416.467263] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 416.476693] 8021q: adding VLAN 0 to HW filter on device batadv0 22:43:54 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000000)={0x0, 0x4, [@dev={[], 0xe}, @link_local, @empty, @remote]}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 22:43:54 executing program 2: mkdir(&(0x7f0000000440)='./file0\x00', 0x0) openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x0, 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000880)={{{@in6=@mcast2, @in=@broadcast}}, {{@in=@loopback}, 0x0, @in6=@empty}}, 0x0) getuid() getgroups(0x0, 0x0) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='tmpfs\x00', 0x0, 0x0) 22:43:54 executing program 0: r0 = socket$inet6(0xa, 0x6, 0x0) close(r0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = open(&(0x7f000000cc80)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x87ffd) sendfile(r0, r1, 0x0, 0x800000000024) 22:43:54 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x6}]}}}]}, 0x3c}}, 0x0) [ 416.540105] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready [ 416.571119] syz-executor.4 (18912) used greatest stack depth: 21472 bytes left 22:43:54 executing program 5: r0 = socket(0x400020000000010, 0x2, 0x0) write(r0, &(0x7f0000a1cf6c)="1f00000054000d0000000000fc07ff1b070404390000000007000100010039", 0x1f) 22:43:54 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) r2 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x400004e21, 0x0, @empty}, 0x1c) setsockopt$inet6_int(r2, 0x29, 0x43, &(0x7f0000000080)=0xf5, 0x4) connect$inet6(r2, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) write$binfmt_misc(r1, &(0x7f0000000000)={'syz0'}, 0x10098) [ 416.670755] overlayfs: lowerdir is in-use as upperdir/workdir [ 416.685306] PF_BRIDGE: br_mdb_parse() with invalid ifindex [ 416.695488] netlink: 'syz-executor.1': attribute type 6 has an invalid length. 22:43:54 executing program 5: r0 = socket(0x400020000000010, 0x2, 0x0) write(r0, &(0x7f0000a1cf6c)="1f00000054000d0000000000fc07ff1b070404390000000007000100010039", 0x1f) 22:43:54 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x6}]}}}]}, 0x3c}}, 0x0) 22:43:54 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) bind$inet(r0, &(0x7f00000003c0)={0x2, 0x200000000004e23}, 0x10) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000480)={@in={{0x2, 0x0, @multicast1}}, 0x0, 0x40, 0x0, "41a0a84bd459485bb116e00349e915b1bc54791da97f7049816b1e6516915fd10c58883d497ba9829ceeabe4544c06d1f287834f279d7a9030cad94ec3e61787a7227dd3f2baa5acff93dc92fdb85fd7"}, 0xd8) connect$inet(0xffffffffffffffff, 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, 0x0, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) getgid() setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0xd7) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x44) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100), 0x4) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, 0x0) ioctl$sock_inet_SIOCRTMSG(0xffffffffffffffff, 0x890d, 0x0) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000280)=ANY=[@ANYRES32=r0], 0x100000530) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") [ 416.844610] PF_BRIDGE: br_mdb_parse() with invalid ifindex 22:43:54 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) r2 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x400004e21, 0x0, @empty}, 0x1c) setsockopt$inet6_int(r2, 0x29, 0x43, &(0x7f0000000080)=0xf5, 0x4) connect$inet6(r2, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) write$binfmt_misc(r1, &(0x7f0000000000)={'syz0'}, 0x10098) 22:43:54 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x4e22, 0x0, @ipv4={[], [], @multicast1}}, 0x1c) sendmmsg(r0, &(0x7f00000002c0), 0x4000000000000ce, 0x0) [ 416.924571] netlink: 'syz-executor.1': attribute type 6 has an invalid length. 22:43:54 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000000)={0x0, 0x4, [@dev={[], 0xe}, @link_local, @empty, @remote]}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 22:43:54 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x6}]}}}]}, 0x3c}}, 0x0) 22:43:54 executing program 5: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25SFACILITIES(r0, 0x89e3, &(0x7f0000000040)={0x9, 0x0, 0x4, 0x7, 0x73f}) [ 417.212946] netlink: 'syz-executor.1': attribute type 6 has an invalid length. [ 417.955699] IPVS: ftp: loaded support on port[0] = 21 [ 418.051615] chnl_net:caif_netlink_parms(): no params data found [ 418.097051] bridge0: port 1(bridge_slave_0) entered blocking state [ 418.109245] bridge0: port 1(bridge_slave_0) entered disabled state [ 418.117395] device bridge_slave_0 entered promiscuous mode [ 418.132035] bridge0: port 2(bridge_slave_1) entered blocking state [ 418.139463] bridge0: port 2(bridge_slave_1) entered disabled state [ 418.152230] device bridge_slave_1 entered promiscuous mode [ 418.177433] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 418.186818] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 418.207486] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 418.214979] team0: Port device team_slave_0 added [ 418.220460] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 418.227892] team0: Port device team_slave_1 added [ 418.233163] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 418.240597] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 418.312172] device hsr_slave_0 entered promiscuous mode [ 418.369813] device hsr_slave_1 entered promiscuous mode [ 418.424634] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 418.431583] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 418.458274] bridge0: port 2(bridge_slave_1) entered blocking state [ 418.464647] bridge0: port 2(bridge_slave_1) entered forwarding state [ 418.471248] bridge0: port 1(bridge_slave_0) entered blocking state [ 418.477622] bridge0: port 1(bridge_slave_0) entered forwarding state [ 418.534103] 8021q: adding VLAN 0 to HW filter on device bond0 [ 418.541800] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 418.550284] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 418.557348] bridge0: port 1(bridge_slave_0) entered disabled state [ 418.564248] bridge0: port 2(bridge_slave_1) entered disabled state [ 418.573106] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 418.579258] 8021q: adding VLAN 0 to HW filter on device team0 [ 418.592158] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 418.599728] bridge0: port 1(bridge_slave_0) entered blocking state [ 418.606061] bridge0: port 1(bridge_slave_0) entered forwarding state [ 418.612814] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 418.620675] bridge0: port 2(bridge_slave_1) entered blocking state [ 418.627030] bridge0: port 2(bridge_slave_1) entered forwarding state [ 418.645257] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 418.660912] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 418.672386] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 418.682877] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 418.689794] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 418.697284] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 418.705466] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 418.712985] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 418.720450] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 418.737427] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 418.746807] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 418.809465] ucma_write: process 2 (syz-executor.0) changed security contexts after opening file descriptor, this is not allowed. 22:43:56 executing program 0: r0 = socket$inet6(0xa, 0x6, 0x0) close(r0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = open(&(0x7f000000cc80)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x87ffd) sendfile(r0, r1, 0x0, 0x800000000024) 22:43:56 executing program 4: r0 = perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x1) 22:43:56 executing program 5: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25SFACILITIES(r0, 0x89e3, &(0x7f0000000040)={0x9, 0x0, 0x4, 0x7, 0x73f}) 22:43:56 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) bind$inet(r0, &(0x7f00000003c0)={0x2, 0x200000000004e23}, 0x10) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000480)={@in={{0x2, 0x0, @multicast1}}, 0x0, 0x40, 0x0, "41a0a84bd459485bb116e00349e915b1bc54791da97f7049816b1e6516915fd10c58883d497ba9829ceeabe4544c06d1f287834f279d7a9030cad94ec3e61787a7227dd3f2baa5acff93dc92fdb85fd7"}, 0xd8) connect$inet(0xffffffffffffffff, 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, 0x0, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) getgid() setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0xd7) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x44) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100), 0x4) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, 0x0) ioctl$sock_inet_SIOCRTMSG(0xffffffffffffffff, 0x890d, 0x0) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000280)=ANY=[@ANYRES32=r0], 0x100000530) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") 22:43:56 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) r2 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x400004e21, 0x0, @empty}, 0x1c) setsockopt$inet6_int(r2, 0x29, 0x43, &(0x7f0000000080)=0xf5, 0x4) connect$inet6(r2, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) write$binfmt_misc(r1, &(0x7f0000000000)={'syz0'}, 0x10098) 22:43:56 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='nv\x00', 0x3) getsockopt$inet_tcp_buf(r0, 0x6, 0x1a, 0x0, &(0x7f0000000040)) [ 418.840457] audit: type=1800 audit(1566168236.288:532): pid=18968 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed comm="syz-executor.0" name="bus" dev="sda1" ino=16596 res=0 22:43:56 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='nv\x00', 0x3) getsockopt$inet_tcp_buf(r0, 0x6, 0x1a, 0x0, &(0x7f0000000040)) 22:43:56 executing program 5: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25SFACILITIES(r0, 0x89e3, &(0x7f0000000040)={0x9, 0x0, 0x4, 0x7, 0x73f}) 22:43:56 executing program 0: r0 = socket$inet6(0xa, 0x6, 0x0) close(r0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = open(&(0x7f000000cc80)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x87ffd) sendfile(r0, r1, 0x0, 0x800000000024) 22:43:56 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='nv\x00', 0x3) getsockopt$inet_tcp_buf(r0, 0x6, 0x1a, 0x0, &(0x7f0000000040)) 22:43:56 executing program 5: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25SFACILITIES(r0, 0x89e3, &(0x7f0000000040)={0x9, 0x0, 0x4, 0x7, 0x73f}) 22:43:56 executing program 0: r0 = socket$inet6(0xa, 0x6, 0x0) close(r0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = open(&(0x7f000000cc80)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x87ffd) sendfile(r0, r1, 0x0, 0x800000000024) 22:43:56 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) bind$inet(r0, &(0x7f00000003c0)={0x2, 0x200000000004e23}, 0x10) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000480)={@in={{0x2, 0x0, @multicast1}}, 0x0, 0x40, 0x0, "41a0a84bd459485bb116e00349e915b1bc54791da97f7049816b1e6516915fd10c58883d497ba9829ceeabe4544c06d1f287834f279d7a9030cad94ec3e61787a7227dd3f2baa5acff93dc92fdb85fd7"}, 0xd8) connect$inet(0xffffffffffffffff, 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, 0x0, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) getgid() setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0xd7) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x44) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100), 0x4) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, 0x0) ioctl$sock_inet_SIOCRTMSG(0xffffffffffffffff, 0x890d, 0x0) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000280)=ANY=[@ANYRES32=r0], 0x100000530) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") [ 419.774650] device bridge_slave_1 left promiscuous mode [ 419.780101] bridge0: port 2(bridge_slave_1) entered disabled state [ 419.824092] device bridge_slave_0 left promiscuous mode [ 419.829508] bridge0: port 1(bridge_slave_0) entered disabled state [ 419.894298] device bridge_slave_1 left promiscuous mode [ 419.899718] bridge0: port 2(bridge_slave_1) entered disabled state [ 419.964068] device bridge_slave_0 left promiscuous mode [ 419.969648] bridge0: port 1(bridge_slave_0) entered disabled state [ 420.015647] device bridge_slave_1 left promiscuous mode [ 420.021121] bridge0: port 2(bridge_slave_1) entered disabled state [ 420.073923] device bridge_slave_0 left promiscuous mode [ 420.079366] bridge0: port 1(bridge_slave_0) entered disabled state [ 420.230761] device hsr_slave_1 left promiscuous mode [ 420.277510] device hsr_slave_0 left promiscuous mode [ 420.318833] team0 (unregistering): Port device team_slave_1 removed [ 420.328509] team0 (unregistering): Port device team_slave_0 removed [ 420.338091] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 420.375998] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 420.440471] bond0 (unregistering): Released all slaves [ 420.545412] device hsr_slave_1 left promiscuous mode [ 420.586578] device hsr_slave_0 left promiscuous mode [ 420.627168] team0 (unregistering): Port device team_slave_1 removed [ 420.638271] team0 (unregistering): Port device team_slave_0 removed [ 420.648135] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 420.697819] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 420.773046] bond0 (unregistering): Released all slaves [ 420.895153] device hsr_slave_1 left promiscuous mode [ 420.935729] device hsr_slave_0 left promiscuous mode [ 420.996212] team0 (unregistering): Port device team_slave_1 removed [ 421.007047] team0 (unregistering): Port device team_slave_0 removed [ 421.017516] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 421.046585] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 421.128571] bond0 (unregistering): Released all slaves [ 421.196282] IPVS: ftp: loaded support on port[0] = 21 [ 421.256968] chnl_net:caif_netlink_parms(): no params data found [ 421.286190] bridge0: port 1(bridge_slave_0) entered blocking state [ 421.292540] bridge0: port 1(bridge_slave_0) entered disabled state [ 421.299609] device bridge_slave_0 entered promiscuous mode [ 421.306598] bridge0: port 2(bridge_slave_1) entered blocking state [ 421.312963] bridge0: port 2(bridge_slave_1) entered disabled state [ 421.319778] device bridge_slave_1 entered promiscuous mode [ 421.333821] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 421.342506] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 421.357780] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 421.365151] team0: Port device team_slave_0 added [ 421.370402] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 421.377600] team0: Port device team_slave_1 added [ 421.382723] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 421.390048] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 421.434622] device hsr_slave_0 entered promiscuous mode [ 421.473440] device hsr_slave_1 entered promiscuous mode [ 421.543780] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 421.550596] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 421.565736] bridge0: port 2(bridge_slave_1) entered blocking state [ 421.572084] bridge0: port 2(bridge_slave_1) entered forwarding state [ 421.578727] bridge0: port 1(bridge_slave_0) entered blocking state [ 421.585098] bridge0: port 1(bridge_slave_0) entered forwarding state [ 421.611925] 8021q: adding VLAN 0 to HW filter on device bond0 [ 421.619836] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 421.628497] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 421.636265] bridge0: port 1(bridge_slave_0) entered disabled state [ 421.642825] bridge0: port 2(bridge_slave_1) entered disabled state [ 421.652454] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 421.659024] 8021q: adding VLAN 0 to HW filter on device team0 [ 421.667974] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 421.675963] bridge0: port 1(bridge_slave_0) entered blocking state [ 421.682306] bridge0: port 1(bridge_slave_0) entered forwarding state [ 421.693748] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 421.701249] bridge0: port 2(bridge_slave_1) entered blocking state [ 421.707593] bridge0: port 2(bridge_slave_1) entered forwarding state [ 421.720310] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 421.729046] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 421.881903] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 421.901712] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 421.911620] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 421.927405] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 421.935040] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 421.942900] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 421.960960] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 421.970794] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 421.987951] 8021q: adding VLAN 0 to HW filter on device batadv0 22:43:59 executing program 4: r0 = perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x1) 22:43:59 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='nv\x00', 0x3) getsockopt$inet_tcp_buf(r0, 0x6, 0x1a, 0x0, &(0x7f0000000040)) 22:43:59 executing program 5: r0 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000140)='/dev/capi20\x00', 0x80806, 0x0) ioctl$CAPI_REGISTER(r0, 0x400c4301, &(0x7f0000000240)={0x0, 0x0, 0x79c0}) read(r0, 0x0, 0x0) 22:43:59 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000280)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f0006000000070000003c9f0300000000000000c27ed0e81f00030000000000000067681bfd070000000000000000fb6c7a2ce29af91ad4861daf1b0d020000004314524ade761922"}, 0x5f) 22:43:59 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) bind$inet(r0, &(0x7f00000003c0)={0x2, 0x200000000004e23}, 0x10) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000480)={@in={{0x2, 0x0, @multicast1}}, 0x0, 0x40, 0x0, "41a0a84bd459485bb116e00349e915b1bc54791da97f7049816b1e6516915fd10c58883d497ba9829ceeabe4544c06d1f287834f279d7a9030cad94ec3e61787a7227dd3f2baa5acff93dc92fdb85fd7"}, 0xd8) connect$inet(0xffffffffffffffff, 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, 0x0, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) getgid() setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0xd7) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x44) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100), 0x4) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, 0x0) ioctl$sock_inet_SIOCRTMSG(0xffffffffffffffff, 0x890d, 0x0) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000280)=ANY=[@ANYRES32=r0], 0x100000530) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") 22:43:59 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) bind$inet(r0, &(0x7f00000003c0)={0x2, 0x200000000004e23}, 0x10) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000480)={@in={{0x2, 0x0, @multicast1}}, 0x0, 0x40, 0x0, "41a0a84bd459485bb116e00349e915b1bc54791da97f7049816b1e6516915fd10c58883d497ba9829ceeabe4544c06d1f287834f279d7a9030cad94ec3e61787a7227dd3f2baa5acff93dc92fdb85fd7"}, 0xd8) connect$inet(0xffffffffffffffff, 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, 0x0, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) getgid() setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0xd7) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x44) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100), 0x4) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, 0x0) ioctl$sock_inet_SIOCRTMSG(0xffffffffffffffff, 0x890d, 0x0) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000280)=ANY=[@ANYRES32=r0], 0x100000530) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") [ 422.242727] SELinux: failed to load policy 22:43:59 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000080), 0x4) syz_emit_ethernet(0x42, &(0x7f0000000380)={@local, @dev, [{}], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0x0, 0x0, @remote, @local, {[], @udp={0x0, 0x0, 0x8}}}}}}, 0x0) 22:43:59 executing program 5: r0 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000140)='/dev/capi20\x00', 0x80806, 0x0) ioctl$CAPI_REGISTER(r0, 0x400c4301, &(0x7f0000000240)={0x0, 0x0, 0x79c0}) read(r0, 0x0, 0x0) 22:43:59 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000280)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f0006000000070000003c9f0300000000000000c27ed0e81f00030000000000000067681bfd070000000000000000fb6c7a2ce29af91ad4861daf1b0d020000004314524ade761922"}, 0x5f) 22:43:59 executing program 4: r0 = perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x1) [ 422.419042] SELinux: failed to load policy 22:43:59 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000280)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f0006000000070000003c9f0300000000000000c27ed0e81f00030000000000000067681bfd070000000000000000fb6c7a2ce29af91ad4861daf1b0d020000004314524ade761922"}, 0x5f) 22:43:59 executing program 5: r0 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000140)='/dev/capi20\x00', 0x80806, 0x0) ioctl$CAPI_REGISTER(r0, 0x400c4301, &(0x7f0000000240)={0x0, 0x0, 0x79c0}) read(r0, 0x0, 0x0) 22:43:59 executing program 4: r0 = perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x1) 22:43:59 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000080), 0x4) syz_emit_ethernet(0x42, &(0x7f0000000380)={@local, @dev, [{}], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0x0, 0x0, @remote, @local, {[], @udp={0x0, 0x0, 0x8}}}}}}, 0x0) [ 422.560767] SELinux: failed to load policy 22:44:00 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000280)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f0006000000070000003c9f0300000000000000c27ed0e81f00030000000000000067681bfd070000000000000000fb6c7a2ce29af91ad4861daf1b0d020000004314524ade761922"}, 0x5f) 22:44:00 executing program 5: r0 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000140)='/dev/capi20\x00', 0x80806, 0x0) ioctl$CAPI_REGISTER(r0, 0x400c4301, &(0x7f0000000240)={0x0, 0x0, 0x79c0}) read(r0, 0x0, 0x0) [ 422.690135] SELinux: failed to load policy 22:44:00 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x10, &(0x7f0000000000)=[@in={0x2, 0x0, @dev}]}, &(0x7f0000000100)=0x10) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000080)={r1}, &(0x7f00000000c0)=0x8) 22:44:00 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000080), 0x4) syz_emit_ethernet(0x42, &(0x7f0000000380)={@local, @dev, [{}], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0x0, 0x0, @remote, @local, {[], @udp={0x0, 0x0, 0x8}}}}}}, 0x0) 22:44:00 executing program 5: pipe2$9p(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) write$P9_RLERRORu(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="1c00000007ffff0c00"], 0x9) clone(0x2020104, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@noextend='noextend'}]}}) 22:44:00 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) bind$inet(r0, &(0x7f00000003c0)={0x2, 0x200000000004e23}, 0x10) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000480)={@in={{0x2, 0x0, @multicast1}}, 0x0, 0x40, 0x0, "41a0a84bd459485bb116e00349e915b1bc54791da97f7049816b1e6516915fd10c58883d497ba9829ceeabe4544c06d1f287834f279d7a9030cad94ec3e61787a7227dd3f2baa5acff93dc92fdb85fd7"}, 0xd8) connect$inet(0xffffffffffffffff, 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, 0x0, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) getgid() setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0xd7) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x44) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100), 0x4) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, 0x0) ioctl$sock_inet_SIOCRTMSG(0xffffffffffffffff, 0x890d, 0x0) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000280)=ANY=[@ANYRES32=r0], 0x100000530) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") 22:44:00 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socket$inet_udplite(0x2, 0x2, 0x88) openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) r1 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000300)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r1, &(0x7f0000000340)={0x0, 'syz0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xec\xff\xff\xff\xff\xff\xff\xff\x00', 'syz0\x00', 'syz0\x00', &(0x7f0000000480)=""/195, 0xbe}, 0x4d6) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) writev(r1, &(0x7f0000000180)=[{&(0x7f0000000040), 0xb5}], 0x8) 22:44:00 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) bind$inet(r0, &(0x7f00000003c0)={0x2, 0x200000000004e23}, 0x10) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000480)={@in={{0x2, 0x0, @multicast1}}, 0x0, 0x40, 0x0, "41a0a84bd459485bb116e00349e915b1bc54791da97f7049816b1e6516915fd10c58883d497ba9829ceeabe4544c06d1f287834f279d7a9030cad94ec3e61787a7227dd3f2baa5acff93dc92fdb85fd7"}, 0xd8) connect$inet(0xffffffffffffffff, 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, 0x0, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) getgid() setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0xd7) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x44) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100), 0x4) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, 0x0) ioctl$sock_inet_SIOCRTMSG(0xffffffffffffffff, 0x890d, 0x0) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000280)=ANY=[@ANYRES32=r0], 0x100000530) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") 22:44:00 executing program 5: pipe2$9p(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) write$P9_RLERRORu(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="1c00000007ffff0c00"], 0x9) clone(0x2020104, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@noextend='noextend'}]}}) [ 423.122542] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 423.158176] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 22:44:00 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000080), 0x4) syz_emit_ethernet(0x42, &(0x7f0000000380)={@local, @dev, [{}], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0x0, 0x0, @remote, @local, {[], @udp={0x0, 0x0, 0x8}}}}}}, 0x0) 22:44:00 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x10, &(0x7f0000000000)=[@in={0x2, 0x0, @dev}]}, &(0x7f0000000100)=0x10) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000080)={r1}, &(0x7f00000000c0)=0x8) [ 423.201593] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 423.242859] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 423.265174] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 22:44:00 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x10, &(0x7f0000000000)=[@in={0x2, 0x0, @dev}]}, &(0x7f0000000100)=0x10) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000080)={r1}, &(0x7f00000000c0)=0x8) 22:44:00 executing program 5: pipe2$9p(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) write$P9_RLERRORu(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="1c00000007ffff0c00"], 0x9) clone(0x2020104, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@noextend='noextend'}]}}) [ 423.297450] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 423.308529] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 423.329852] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 423.334138] 9pnet: p9_errstr2errno: server reported unknown error  [ 423.368429] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 423.399759] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 22:44:00 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @dev}, 0x10) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240)='/dev/hwrng\x00', 0x81, 0x0) openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/policy\x00', 0x0, 0x0) 22:44:00 executing program 5: pipe2$9p(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) write$P9_RLERRORu(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="1c00000007ffff0c00"], 0x9) clone(0x2020104, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@noextend='noextend'}]}}) [ 423.427821] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 423.456545] 9pnet: p9_errstr2errno: server reported unknown error  [ 423.480584] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 423.509261] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 423.527709] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 423.547743] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 423.557935] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 423.575948] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 423.609075] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 423.627971] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 423.642480] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 22:44:01 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x10, &(0x7f0000000000)=[@in={0x2, 0x0, @dev}]}, &(0x7f0000000100)=0x10) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000080)={r1}, &(0x7f00000000c0)=0x8) 22:44:01 executing program 5: pipe2(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000080)={0x15}, 0xfffffe6c) [ 423.659643] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 423.670143] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 423.679389] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 423.737472] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 423.760858] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 423.779067] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 423.790050] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 423.798590] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 423.809801] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 423.817875] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 423.833275] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 423.840167] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 423.846873] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 423.853573] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 423.860230] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 423.866937] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 423.873621] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 423.880269] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 423.887351] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 423.894069] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 423.900728] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 423.907417] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 423.914151] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 423.920810] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 423.927616] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 423.934322] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 423.940987] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 423.947710] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 423.954390] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 423.961063] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 423.968050] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 423.974777] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 423.981449] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 423.988165] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 423.994869] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 424.001529] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 424.008262] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 424.014975] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 424.021639] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 424.028353] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 22:44:01 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @dev}, 0x10) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240)='/dev/hwrng\x00', 0x81, 0x0) openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/policy\x00', 0x0, 0x0) [ 424.035067] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 424.041731] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 424.048502] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 424.055268] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 424.062036] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 424.071951] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 424.093846] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 424.100652] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 424.110163] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 424.117163] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 424.134984] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 424.149416] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 424.167699] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 424.174727] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 424.189953] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 424.197030] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 424.207101] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 424.214094] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 424.220955] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 424.230999] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 424.237960] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 424.248134] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 424.256106] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 424.274235] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 424.281145] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 424.291241] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 424.298261] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 424.308402] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 424.315414] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 424.322203] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 424.332459] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 424.339515] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 424.349722] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 424.356754] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 424.369191] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 424.376239] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 424.383055] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 424.393358] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 424.400195] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 424.410369] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 424.417441] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 424.427609] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 424.434656] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 424.441502] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 424.451926] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 424.458976] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 424.470549] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 424.477477] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 424.489535] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 424.496678] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 424.507895] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 424.514852] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 424.521527] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 424.531719] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 424.538446] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 424.549792] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 424.556545] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 424.567751] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 424.574491] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 424.581162] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 424.590360] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 424.597059] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 424.603948] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 424.610611] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 424.617299] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 424.624005] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 424.630656] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 424.637359] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 424.644062] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 424.650724] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 424.657423] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 424.664120] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 424.670775] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 424.677462] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 424.684156] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 424.690808] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 424.697495] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 424.704199] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 424.710852] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 424.717541] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 424.724218] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 424.730866] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 424.737553] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 424.744247] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 424.750901] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 424.757594] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 424.764363] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 424.771017] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 424.777726] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 424.784437] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 424.791118] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 424.797831] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 424.804549] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 424.811220] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 424.817922] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 424.824732] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 424.831412] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 424.838166] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 424.844848] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 424.851497] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 424.858185] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 424.864867] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 424.871540] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 424.878250] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 424.884930] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 424.891575] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 424.898293] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 424.905000] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 424.911649] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 424.918343] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 424.925194] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 424.931847] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 424.938550] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 424.945230] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 424.951878] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 424.958590] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 424.965391] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 424.972049] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 424.978772] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 424.985456] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 424.992109] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 424.998811] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 425.005589] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 425.012260] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 425.018957] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 425.025652] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 425.032313] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 425.039019] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 425.045714] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 22:44:02 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socket$inet_udplite(0x2, 0x2, 0x88) openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) r1 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000300)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r1, &(0x7f0000000340)={0x0, 'syz0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xec\xff\xff\xff\xff\xff\xff\xff\x00', 'syz0\x00', 'syz0\x00', &(0x7f0000000480)=""/195, 0xbe}, 0x4d6) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) writev(r1, &(0x7f0000000180)=[{&(0x7f0000000040), 0xb5}], 0x8) 22:44:02 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @dev}, 0x10) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240)='/dev/hwrng\x00', 0x81, 0x0) openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/policy\x00', 0x0, 0x0) 22:44:02 executing program 3: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x231, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_INFO(r0, 0x29, 0x40, &(0x7f0000000000)={'raw\x00'}, &(0x7f0000000080)=0x54) 22:44:02 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x20011, r2, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 22:44:02 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @dev}, 0x10) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240)='/dev/hwrng\x00', 0x81, 0x0) openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/policy\x00', 0x0, 0x0) 22:44:02 executing program 5: pipe2(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000080)={0x15}, 0xfffffe6c) [ 425.052365] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 425.059977] hid-generic 0000:0000:0000.0002: hidraw0: HID v0.00 Device [syz0] on syz0 [ 425.134514] IPVS: ftp: loaded support on port[0] = 21 [ 425.139783] audit: type=1400 audit(1566168242.588:533): avc: denied { map } for pid=19151 comm="syz-executor.2" path="/dev/sg0" dev="devtmpfs" ino=16698 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:scsi_generic_device_t:s0 tclass=chr_file permissive=1 [ 425.194088] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 425.200862] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 22:44:02 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @dev}, 0x10) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240)='/dev/hwrng\x00', 0x81, 0x0) openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/policy\x00', 0x0, 0x0) 22:44:02 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @dev}, 0x10) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240)='/dev/hwrng\x00', 0x81, 0x0) openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/policy\x00', 0x0, 0x0) [ 425.237524] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 425.262546] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 425.281823] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 425.419590] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 425.426578] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 425.433309] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 425.439978] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 425.446774] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 425.453882] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 425.460562] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 22:44:02 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @dev}, 0x10) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240)='/dev/hwrng\x00', 0x81, 0x0) openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/policy\x00', 0x0, 0x0) [ 425.467323] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 425.474064] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 425.481044] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 425.487816] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 425.494902] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 425.501606] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 22:44:03 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x3, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c000000000061138c0000000000bf200000000000001500000008ffffffad0301000000000095000000000000006926000000000000bf67000000000000170600000fff07006706000002000000070600000ee60000bf050000000000001f650000000000006507010002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) [ 425.517162] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 425.528724] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 425.541594] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 425.550243] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 425.561441] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 425.569347] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 425.581375] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 425.595008] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 22:44:03 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x3, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c000000000061138c0000000000bf200000000000001500000008ffffffad0301000000000095000000000000006926000000000000bf67000000000000170600000fff07006706000002000000070600000ee60000bf050000000000001f650000000000006507010002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) 22:44:03 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x3, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c000000000061138c0000000000bf200000000000001500000008ffffffad0301000000000095000000000000006926000000000000bf67000000000000170600000fff07006706000002000000070600000ee60000bf050000000000001f650000000000006507010002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) [ 425.736417] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 425.743271] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 425.749939] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 425.756718] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 425.763448] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 425.770134] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 425.776921] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 425.783635] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 425.790301] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 425.797017] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 425.803968] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 425.810633] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 425.810664] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 425.810679] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 425.810694] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 425.810710] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 425.810724] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 425.810738] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 425.810752] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 425.810766] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 425.810781] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 425.810794] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 425.851342] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 425.851362] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 425.851382] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 425.888725] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 425.917267] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 425.924122] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 425.930784] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 425.945733] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 425.956657] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 425.968129] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 425.974868] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 425.981536] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 425.988679] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 425.995387] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 426.002156] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 426.008881] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 426.015613] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 426.022305] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 426.029043] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 426.035746] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 426.042412] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 426.042432] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 426.055834] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 426.055852] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 426.055869] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 426.055887] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 426.069231] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 426.082549] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 426.082569] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 426.095935] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 426.095953] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 426.095971] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 426.095987] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 426.096009] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 426.109423] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 426.122729] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 426.122751] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 426.136175] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 426.136192] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 426.149574] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 426.162873] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 426.176261] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 426.176278] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 426.176295] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 426.176312] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 426.189679] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 426.209800] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 426.223012] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 426.229739] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 426.236529] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 426.243310] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 426.250034] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 426.250051] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 426.263455] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 426.263472] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 426.263488] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 426.263512] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 426.276913] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 426.297034] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 426.303792] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 426.310607] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 426.317332] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 426.324081] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 426.330794] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 426.337545] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 426.344305] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 426.344321] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 426.357695] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 426.357712] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 426.371131] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 426.377862] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 426.384608] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 426.384625] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 426.398016] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 426.404750] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 426.411404] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 426.418094] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 426.424788] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 426.431440] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 426.438130] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 426.444839] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 426.444855] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 426.444872] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 426.444904] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 426.444920] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 426.458242] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 426.484937] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 426.491614] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 426.498312] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 426.498330] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 426.498347] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 426.498365] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 426.498382] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 426.498400] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 426.511730] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 426.511746] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 426.511762] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 426.525229] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 426.538553] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 426.551946] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 426.565321] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 426.565339] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 426.565355] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 426.578716] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 426.592016] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 426.605697] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 426.619361] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 426.626304] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 426.633012] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 426.639882] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 426.646599] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 426.653297] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 426.659959] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 426.659981] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 426.673895] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 426.680602] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 426.687867] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 426.694580] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 426.694596] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 426.694613] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 426.694630] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 426.694647] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 426.694664] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 426.694681] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 426.694697] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 426.694714] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 426.694730] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 426.694747] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 426.694762] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 426.694779] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 426.694795] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 426.694811] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 426.694828] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 426.694844] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 426.694860] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 426.694877] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 426.694894] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 426.694911] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 426.694930] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 426.708277] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 22:44:04 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socket$inet_udplite(0x2, 0x2, 0x88) openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) r1 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000300)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r1, &(0x7f0000000340)={0x0, 'syz0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xec\xff\xff\xff\xff\xff\xff\xff\x00', 'syz0\x00', 'syz0\x00', &(0x7f0000000480)=""/195, 0xbe}, 0x4d6) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) writev(r1, &(0x7f0000000180)=[{&(0x7f0000000040), 0xb5}], 0x8) 22:44:04 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x3, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c000000000061138c0000000000bf200000000000001500000008ffffffad0301000000000095000000000000006926000000000000bf67000000000000170600000fff07006706000002000000070600000ee60000bf050000000000001f650000000000006507010002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) 22:44:04 executing program 3: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x231, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_INFO(r0, 0x29, 0x40, &(0x7f0000000000)={'raw\x00'}, &(0x7f0000000080)=0x54) 22:44:04 executing program 0: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x231, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_INFO(r0, 0x29, 0x40, &(0x7f0000000000)={'raw\x00'}, &(0x7f0000000080)=0x54) 22:44:04 executing program 5: pipe2(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000080)={0x15}, 0xfffffe6c) 22:44:04 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x20011, r2, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) [ 426.723248] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 426.738746] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 426.862914] hid-generic 0000:0000:0000.0003: hidraw0: HID v0.00 Device [syz0] on syz0 [ 426.929522] IPVS: ftp: loaded support on port[0] = 21 [ 426.938425] IPVS: ftp: loaded support on port[0] = 21 22:44:04 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000013c0)={{{@in6=@remote, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x32}, 0x0, @in6, 0x0, 0x0, 0x0, 0x5}}, 0xe8) connect$inet6(r0, &(0x7f0000000140)={0xa, 0xffffffffffffffff, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x1c) sendmmsg(r0, &(0x7f0000000240), 0x5c3, 0x0) 22:44:04 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x20011, r2, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 22:44:04 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socket$inet_udplite(0x2, 0x2, 0x88) openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) r1 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000300)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r1, &(0x7f0000000340)={0x0, 'syz0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xec\xff\xff\xff\xff\xff\xff\xff\x00', 'syz0\x00', 'syz0\x00', &(0x7f0000000480)=""/195, 0xbe}, 0x4d6) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) writev(r1, &(0x7f0000000180)=[{&(0x7f0000000040), 0xb5}], 0x8) [ 427.198309] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 427.217264] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 427.243609] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 427.273487] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 427.294651] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 427.315960] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 427.339356] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 427.366751] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 22:44:04 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000013c0)={{{@in6=@remote, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x32}, 0x0, @in6, 0x0, 0x0, 0x0, 0x5}}, 0xe8) connect$inet6(r0, &(0x7f0000000140)={0xa, 0xffffffffffffffff, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x1c) sendmmsg(r0, &(0x7f0000000240), 0x5c3, 0x0) [ 427.385973] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 427.428593] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 427.447782] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 427.467119] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 427.498846] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 427.519403] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 427.539056] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 427.571057] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 427.595654] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 22:44:05 executing program 3: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x231, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_INFO(r0, 0x29, 0x40, &(0x7f0000000000)={'raw\x00'}, &(0x7f0000000080)=0x54) [ 427.622908] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 22:44:05 executing program 5: pipe2(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000080)={0x15}, 0xfffffe6c) 22:44:05 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000013c0)={{{@in6=@remote, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x32}, 0x0, @in6, 0x0, 0x0, 0x0, 0x5}}, 0xe8) connect$inet6(r0, &(0x7f0000000140)={0xa, 0xffffffffffffffff, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x1c) sendmmsg(r0, &(0x7f0000000240), 0x5c3, 0x0) [ 427.666805] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 427.700199] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 427.747297] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 427.756406] IPVS: ftp: loaded support on port[0] = 21 [ 427.776613] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 22:44:05 executing program 0: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x231, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_INFO(r0, 0x29, 0x40, &(0x7f0000000000)={'raw\x00'}, &(0x7f0000000080)=0x54) [ 427.795493] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 427.812058] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 427.839742] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 427.857256] IPVS: ftp: loaded support on port[0] = 21 [ 427.866046] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 427.877257] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 427.905136] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 427.927357] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 427.950264] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 427.972939] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 427.993122] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 22:44:05 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000013c0)={{{@in6=@remote, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x32}, 0x0, @in6, 0x0, 0x0, 0x0, 0x5}}, 0xe8) connect$inet6(r0, &(0x7f0000000140)={0xa, 0xffffffffffffffff, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x1c) sendmmsg(r0, &(0x7f0000000240), 0x5c3, 0x0) [ 428.015738] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 428.042514] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 428.082959] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 428.111284] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 428.129150] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 428.152268] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 428.172130] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 428.191915] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 428.210669] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 428.241747] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 428.261754] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 428.281534] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 428.298889] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 428.305925] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 428.312676] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 428.324126] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 428.330969] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 428.341524] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 22:44:05 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000013c0)={{{@in6=@remote, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x32}, 0x0, @in6, 0x0, 0x0, 0x0, 0x5}}, 0xe8) connect$inet6(r0, &(0x7f0000000140)={0xa, 0xffffffffffffffff, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x1c) sendmmsg(r0, &(0x7f0000000240), 0x5c3, 0x0) [ 428.350644] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 428.362940] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 428.372702] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 428.379607] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 428.386465] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 428.393323] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 428.400079] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 428.406942] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 428.413798] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 428.420551] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 428.427502] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 428.454434] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 428.461123] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 428.494497] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 428.501187] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 428.508072] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 428.515111] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 428.521901] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 428.528972] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 428.535851] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 428.542633] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 428.549522] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 428.556402] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 428.563281] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 428.570065] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 428.577015] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 428.583899] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 428.590678] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 428.597572] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 428.605091] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 428.611880] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 428.618770] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 428.625665] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 428.632447] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 428.639433] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 428.673864] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 428.680532] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 428.687386] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 428.699322] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 428.706319] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 428.712995] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 428.724385] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 428.731058] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 428.740872] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 428.749173] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 428.758930] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 428.767250] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 22:44:06 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000013c0)={{{@in6=@remote, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x32}, 0x0, @in6, 0x0, 0x0, 0x0, 0x5}}, 0xe8) connect$inet6(r0, &(0x7f0000000140)={0xa, 0xffffffffffffffff, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x1c) sendmmsg(r0, &(0x7f0000000240), 0x5c3, 0x0) [ 428.777090] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 428.785469] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 428.792317] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 428.802585] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 428.811697] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 428.821910] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 428.830602] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 428.841262] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 428.850006] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 428.860154] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 428.868932] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 428.879115] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 428.887791] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 428.898059] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 428.906675] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 428.916803] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 428.925530] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 428.932374] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 428.942534] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 428.951194] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 428.961313] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 428.970051] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 428.980032] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 428.988655] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 428.998908] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 429.007552] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 429.017709] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 429.026388] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 429.036548] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 429.045375] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 429.052240] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 429.062481] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 429.071174] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 429.081405] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 429.090062] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 429.100483] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 429.109221] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 429.119551] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 429.128231] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 429.138490] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 429.147235] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 429.157446] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 429.166924] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 429.177110] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 429.186032] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 429.192919] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 429.203156] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 429.211938] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 429.222215] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 429.230944] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 429.241145] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 429.250736] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 429.260966] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 429.269761] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 22:44:06 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000013c0)={{{@in6=@remote, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x32}, 0x0, @in6, 0x0, 0x0, 0x0, 0x5}}, 0xe8) connect$inet6(r0, &(0x7f0000000140)={0xa, 0xffffffffffffffff, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x1c) sendmmsg(r0, &(0x7f0000000240), 0x5c3, 0x0) [ 429.279897] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 429.288333] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 429.298296] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 429.307319] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 429.317214] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 429.325409] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 429.332112] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 429.373830] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 429.380601] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 429.387418] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 429.394359] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 429.401078] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 429.407923] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 429.415841] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 429.425838] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 429.432655] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 429.441084] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 429.450953] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 429.459316] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 429.469177] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 429.477629] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 429.488052] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 429.496414] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 429.506425] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 429.513146] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 429.521558] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 429.531429] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 429.539777] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 429.549831] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 429.558451] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 429.568712] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 429.577426] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 429.587705] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 429.596466] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 429.606717] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 429.615586] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 429.622482] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 429.632711] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 429.641458] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 429.653943] hid-generic 0000:0000:0000.0004: hidraw0: HID v0.00 Device [syz0] on syz0 22:44:07 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}]}}) read$FUSE(r0, &(0x7f0000001500), 0x1000) 22:44:07 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x20011, r2, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 22:44:07 executing program 4: r0 = memfd_create(&(0x7f0000000880)='#em1#+\x00', 0x0) write$eventfd(r0, &(0x7f0000000240)=0x7, 0x8) write(r0, &(0x7f0000000040)="0600", 0x2) sendfile(r0, r0, &(0x7f00000000c0), 0xfeff) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f000002eff0)={0x264, &(0x7f0000000000)=[{}]}, 0x10) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, 0x0) 22:44:07 executing program 5: openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x2, 0x0) bind$unix(r0, &(0x7f00000006c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) setsockopt$SO_TIMESTAMP(r0, 0x1, 0x1d, &(0x7f0000000040)=0x3, 0x4) connect$unix(r0, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg(r0, &(0x7f0000002dc0), 0x307017fdb7a66cb, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000007140)=[{{&(0x7f0000001340)=@nl=@unspec, 0x80, 0x0}}], 0x1, 0x0, 0x0) 22:44:09 executing program 3: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x231, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_INFO(r0, 0x29, 0x40, &(0x7f0000000000)={'raw\x00'}, &(0x7f0000000080)=0x54) 22:44:09 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}]}}) read$FUSE(r0, &(0x7f0000001500), 0x1000) 22:44:09 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}]}}) read$FUSE(r0, &(0x7f0000001500), 0x1000) [ 431.909920] IPVS: ftp: loaded support on port[0] = 21 22:44:09 executing program 0: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x231, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_INFO(r0, 0x29, 0x40, &(0x7f0000000000)={'raw\x00'}, &(0x7f0000000080)=0x54) 22:44:09 executing program 4: r0 = memfd_create(&(0x7f0000000880)='#em1#+\x00', 0x0) write$eventfd(r0, &(0x7f0000000240)=0x7, 0x8) write(r0, &(0x7f0000000040)="0600", 0x2) sendfile(r0, r0, &(0x7f00000000c0), 0xfeff) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f000002eff0)={0x264, &(0x7f0000000000)=[{}]}, 0x10) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, 0x0) 22:44:09 executing program 5: openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x2, 0x0) bind$unix(r0, &(0x7f00000006c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) setsockopt$SO_TIMESTAMP(r0, 0x1, 0x1d, &(0x7f0000000040)=0x3, 0x4) connect$unix(r0, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg(r0, &(0x7f0000002dc0), 0x307017fdb7a66cb, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000007140)=[{{&(0x7f0000001340)=@nl=@unspec, 0x80, 0x0}}], 0x1, 0x0, 0x0) 22:44:09 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}]}}) read$FUSE(r0, &(0x7f0000001500), 0x1000) 22:44:09 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}]}}) read$FUSE(r0, &(0x7f0000001500), 0x1000) [ 432.073852] IPVS: ftp: loaded support on port[0] = 21 22:44:09 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}]}}) read$FUSE(r0, &(0x7f0000001500), 0x1000) 22:44:09 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}]}}) read$FUSE(r0, &(0x7f0000001500), 0x1000) 22:44:09 executing program 5: openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x2, 0x0) bind$unix(r0, &(0x7f00000006c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) setsockopt$SO_TIMESTAMP(r0, 0x1, 0x1d, &(0x7f0000000040)=0x3, 0x4) connect$unix(r0, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg(r0, &(0x7f0000002dc0), 0x307017fdb7a66cb, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000007140)=[{{&(0x7f0000001340)=@nl=@unspec, 0x80, 0x0}}], 0x1, 0x0, 0x0) 22:44:09 executing program 1: openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x2, 0x0) bind$unix(r0, &(0x7f00000006c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) setsockopt$SO_TIMESTAMP(r0, 0x1, 0x1d, &(0x7f0000000040)=0x3, 0x4) connect$unix(r0, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg(r0, &(0x7f0000002dc0), 0x307017fdb7a66cb, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000007140)=[{{&(0x7f0000001340)=@nl=@unspec, 0x80, 0x0}}], 0x1, 0x0, 0x0) 22:44:10 executing program 1: openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x2, 0x0) bind$unix(r0, &(0x7f00000006c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) setsockopt$SO_TIMESTAMP(r0, 0x1, 0x1d, &(0x7f0000000040)=0x3, 0x4) connect$unix(r0, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg(r0, &(0x7f0000002dc0), 0x307017fdb7a66cb, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000007140)=[{{&(0x7f0000001340)=@nl=@unspec, 0x80, 0x0}}], 0x1, 0x0, 0x0) 22:44:10 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$SNDRV_TIMER_IOCTL_STATUS(r1, 0x80605414, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup3(r2, r1, 0x0) 22:44:10 executing program 2: openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x2, 0x0) bind$unix(r0, &(0x7f00000006c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) setsockopt$SO_TIMESTAMP(r0, 0x1, 0x1d, &(0x7f0000000040)=0x3, 0x4) connect$unix(r0, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg(r0, &(0x7f0000002dc0), 0x307017fdb7a66cb, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000007140)=[{{&(0x7f0000001340)=@nl=@unspec, 0x80, 0x0}}], 0x1, 0x0, 0x0) 22:44:10 executing program 5: openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x2, 0x0) bind$unix(r0, &(0x7f00000006c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) setsockopt$SO_TIMESTAMP(r0, 0x1, 0x1d, &(0x7f0000000040)=0x3, 0x4) connect$unix(r0, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg(r0, &(0x7f0000002dc0), 0x307017fdb7a66cb, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000007140)=[{{&(0x7f0000001340)=@nl=@unspec, 0x80, 0x0}}], 0x1, 0x0, 0x0) 22:44:10 executing program 4: r0 = memfd_create(&(0x7f0000000880)='#em1#+\x00', 0x0) write$eventfd(r0, &(0x7f0000000240)=0x7, 0x8) write(r0, &(0x7f0000000040)="0600", 0x2) sendfile(r0, r0, &(0x7f00000000c0), 0xfeff) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f000002eff0)={0x264, &(0x7f0000000000)=[{}]}, 0x10) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, 0x0) 22:44:10 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000008000)={0x15, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="b70000000000000007000000000000009500000000000000ac3bd88791c22bc5d2373563face1c1ab87bea1fef1f92e1ebb567520508ac9c8e4cc8f06f75d8fecb99dbef76a44900f1b517182ffbe3ce1acacb761b0aab08c990bbaac0964100c2e2a5d23c53f97f9a9900"/117], &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0xc3, &(0x7f00000002c0)=""/195}, 0x48) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_int(r1, 0x1, 0x1000000000000f, &(0x7f0000000180)=0x57bb, 0x3c) setsockopt$sock_attach_bpf(r1, 0x1, 0x34, &(0x7f00000000c0)=r0, 0x4) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) 22:44:10 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$SNDRV_TIMER_IOCTL_STATUS(r1, 0x80605414, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup3(r2, r1, 0x0) 22:44:10 executing program 1: openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x2, 0x0) bind$unix(r0, &(0x7f00000006c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) setsockopt$SO_TIMESTAMP(r0, 0x1, 0x1d, &(0x7f0000000040)=0x3, 0x4) connect$unix(r0, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg(r0, &(0x7f0000002dc0), 0x307017fdb7a66cb, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000007140)=[{{&(0x7f0000001340)=@nl=@unspec, 0x80, 0x0}}], 0x1, 0x0, 0x0) 22:44:10 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$SNDRV_TIMER_IOCTL_STATUS(r1, 0x80605414, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup3(r2, r1, 0x0) 22:44:10 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000008000)={0x15, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="b70000000000000007000000000000009500000000000000ac3bd88791c22bc5d2373563face1c1ab87bea1fef1f92e1ebb567520508ac9c8e4cc8f06f75d8fecb99dbef76a44900f1b517182ffbe3ce1acacb761b0aab08c990bbaac0964100c2e2a5d23c53f97f9a9900"/117], &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0xc3, &(0x7f00000002c0)=""/195}, 0x48) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_int(r1, 0x1, 0x1000000000000f, &(0x7f0000000180)=0x57bb, 0x3c) setsockopt$sock_attach_bpf(r1, 0x1, 0x34, &(0x7f00000000c0)=r0, 0x4) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) 22:44:10 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$SNDRV_TIMER_IOCTL_STATUS(r1, 0x80605414, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup3(r2, r1, 0x0) 22:44:10 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000008000)={0x15, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="b70000000000000007000000000000009500000000000000ac3bd88791c22bc5d2373563face1c1ab87bea1fef1f92e1ebb567520508ac9c8e4cc8f06f75d8fecb99dbef76a44900f1b517182ffbe3ce1acacb761b0aab08c990bbaac0964100c2e2a5d23c53f97f9a9900"/117], &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0xc3, &(0x7f00000002c0)=""/195}, 0x48) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_int(r1, 0x1, 0x1000000000000f, &(0x7f0000000180)=0x57bb, 0x3c) setsockopt$sock_attach_bpf(r1, 0x1, 0x34, &(0x7f00000000c0)=r0, 0x4) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) 22:44:10 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000008000)={0x15, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="b70000000000000007000000000000009500000000000000ac3bd88791c22bc5d2373563face1c1ab87bea1fef1f92e1ebb567520508ac9c8e4cc8f06f75d8fecb99dbef76a44900f1b517182ffbe3ce1acacb761b0aab08c990bbaac0964100c2e2a5d23c53f97f9a9900"/117], &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0xc3, &(0x7f00000002c0)=""/195}, 0x48) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_int(r1, 0x1, 0x1000000000000f, &(0x7f0000000180)=0x57bb, 0x3c) setsockopt$sock_attach_bpf(r1, 0x1, 0x34, &(0x7f00000000c0)=r0, 0x4) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) 22:44:10 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x200001000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x2, 0x0) clock_gettime(0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0xd) write$binfmt_aout(r1, &(0x7f0000000040)=ANY=[], 0x1d7) read(r1, &(0x7f00000011c0)=""/200, 0xc8) 22:44:11 executing program 2: openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x2, 0x0) bind$unix(r0, &(0x7f00000006c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) setsockopt$SO_TIMESTAMP(r0, 0x1, 0x1d, &(0x7f0000000040)=0x3, 0x4) connect$unix(r0, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg(r0, &(0x7f0000002dc0), 0x307017fdb7a66cb, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000007140)=[{{&(0x7f0000001340)=@nl=@unspec, 0x80, 0x0}}], 0x1, 0x0, 0x0) 22:44:11 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000008000)={0x15, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="b70000000000000007000000000000009500000000000000ac3bd88791c22bc5d2373563face1c1ab87bea1fef1f92e1ebb567520508ac9c8e4cc8f06f75d8fecb99dbef76a44900f1b517182ffbe3ce1acacb761b0aab08c990bbaac0964100c2e2a5d23c53f97f9a9900"/117], &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0xc3, &(0x7f00000002c0)=""/195}, 0x48) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_int(r1, 0x1, 0x1000000000000f, &(0x7f0000000180)=0x57bb, 0x3c) setsockopt$sock_attach_bpf(r1, 0x1, 0x34, &(0x7f00000000c0)=r0, 0x4) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) 22:44:11 executing program 4: r0 = memfd_create(&(0x7f0000000880)='#em1#+\x00', 0x0) write$eventfd(r0, &(0x7f0000000240)=0x7, 0x8) write(r0, &(0x7f0000000040)="0600", 0x2) sendfile(r0, r0, &(0x7f00000000c0), 0xfeff) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f000002eff0)={0x264, &(0x7f0000000000)=[{}]}, 0x10) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, 0x0) 22:44:11 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000008000)={0x15, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="b70000000000000007000000000000009500000000000000ac3bd88791c22bc5d2373563face1c1ab87bea1fef1f92e1ebb567520508ac9c8e4cc8f06f75d8fecb99dbef76a44900f1b517182ffbe3ce1acacb761b0aab08c990bbaac0964100c2e2a5d23c53f97f9a9900"/117], &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0xc3, &(0x7f00000002c0)=""/195}, 0x48) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_int(r1, 0x1, 0x1000000000000f, &(0x7f0000000180)=0x57bb, 0x3c) setsockopt$sock_attach_bpf(r1, 0x1, 0x34, &(0x7f00000000c0)=r0, 0x4) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) 22:44:11 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x200001000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x2, 0x0) clock_gettime(0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0xd) write$binfmt_aout(r1, &(0x7f0000000040)=ANY=[], 0x1d7) read(r1, &(0x7f00000011c0)=""/200, 0xc8) 22:44:11 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x200001000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x2, 0x0) clock_gettime(0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0xd) write$binfmt_aout(r1, &(0x7f0000000040)=ANY=[], 0x1d7) read(r1, &(0x7f00000011c0)=""/200, 0xc8) 22:44:11 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000008000)={0x15, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="b70000000000000007000000000000009500000000000000ac3bd88791c22bc5d2373563face1c1ab87bea1fef1f92e1ebb567520508ac9c8e4cc8f06f75d8fecb99dbef76a44900f1b517182ffbe3ce1acacb761b0aab08c990bbaac0964100c2e2a5d23c53f97f9a9900"/117], &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0xc3, &(0x7f00000002c0)=""/195}, 0x48) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_int(r1, 0x1, 0x1000000000000f, &(0x7f0000000180)=0x57bb, 0x3c) setsockopt$sock_attach_bpf(r1, 0x1, 0x34, &(0x7f00000000c0)=r0, 0x4) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) 22:44:11 executing program 0: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0xa0002, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") write$sndseq(r0, &(0x7f000086afd0)=[{0x10081, 0x3}], 0x30) 22:44:11 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x12, 0x100, 0x4, 0x403, 0x0, 0x1}, 0x3c) socket$rxrpc(0x21, 0x2, 0xa) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x1d4) connect$inet6(r0, &(0x7f0000000140), 0x1c) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5}, 0x3c) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") bpf$MAP_CREATE(0x4, &(0x7f0000000880)={0x3, 0x0, 0x0, 0x0, 0x711000, 0x0}, 0x1d) 22:44:11 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x7f, 0x7, 0x5, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000000040), &(0x7f0000000080)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000000)={r0, 0x0, 0x0}, 0x18) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r0, &(0x7f00000000c0), &(0x7f0000000200)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000080)={r0, 0x0, &(0x7f00000003c0)=""/140}, 0x18) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r0, &(0x7f0000000000), &(0x7f0000000080)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000000c0)={r0, &(0x7f00000003c0), 0x0}, 0x18) 22:44:11 executing program 0: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0xa0002, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") write$sndseq(r0, &(0x7f000086afd0)=[{0x10081, 0x3}], 0x30) 22:44:11 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x200001000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x2, 0x0) clock_gettime(0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0xd) write$binfmt_aout(r1, &(0x7f0000000040)=ANY=[], 0x1d7) read(r1, &(0x7f00000011c0)=""/200, 0xc8) 22:44:11 executing program 2: openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x2, 0x0) bind$unix(r0, &(0x7f00000006c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) setsockopt$SO_TIMESTAMP(r0, 0x1, 0x1d, &(0x7f0000000040)=0x3, 0x4) connect$unix(r0, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg(r0, &(0x7f0000002dc0), 0x307017fdb7a66cb, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000007140)=[{{&(0x7f0000001340)=@nl=@unspec, 0x80, 0x0}}], 0x1, 0x0, 0x0) 22:44:11 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x12, 0x100, 0x4, 0x403, 0x0, 0x1}, 0x3c) socket$rxrpc(0x21, 0x2, 0xa) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x1d4) connect$inet6(r0, &(0x7f0000000140), 0x1c) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5}, 0x3c) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") bpf$MAP_CREATE(0x4, &(0x7f0000000880)={0x3, 0x0, 0x0, 0x0, 0x711000, 0x0}, 0x1d) 22:44:11 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x7f, 0x7, 0x5, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000000040), &(0x7f0000000080)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000000)={r0, 0x0, 0x0}, 0x18) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r0, &(0x7f00000000c0), &(0x7f0000000200)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000080)={r0, 0x0, &(0x7f00000003c0)=""/140}, 0x18) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r0, &(0x7f0000000000), &(0x7f0000000080)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000000c0)={r0, &(0x7f00000003c0), 0x0}, 0x18) 22:44:11 executing program 0: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0xa0002, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") write$sndseq(r0, &(0x7f000086afd0)=[{0x10081, 0x3}], 0x30) 22:44:11 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x12, 0x100, 0x4, 0x403, 0x0, 0x1}, 0x3c) socket$rxrpc(0x21, 0x2, 0xa) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x1d4) connect$inet6(r0, &(0x7f0000000140), 0x1c) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5}, 0x3c) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") bpf$MAP_CREATE(0x4, &(0x7f0000000880)={0x3, 0x0, 0x0, 0x0, 0x711000, 0x0}, 0x1d) 22:44:11 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x7f, 0x7, 0x5, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000000040), &(0x7f0000000080)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000000)={r0, 0x0, 0x0}, 0x18) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r0, &(0x7f00000000c0), &(0x7f0000000200)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000080)={r0, 0x0, &(0x7f00000003c0)=""/140}, 0x18) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r0, &(0x7f0000000000), &(0x7f0000000080)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000000c0)={r0, &(0x7f00000003c0), 0x0}, 0x18) 22:44:11 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x7f, 0x7, 0x5, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000000040), &(0x7f0000000080)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000000)={r0, 0x0, 0x0}, 0x18) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r0, &(0x7f00000000c0), &(0x7f0000000200)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000080)={r0, 0x0, &(0x7f00000003c0)=""/140}, 0x18) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r0, &(0x7f0000000000), &(0x7f0000000080)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000000c0)={r0, &(0x7f00000003c0), 0x0}, 0x18) 22:44:11 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x12, 0x100, 0x4, 0x403, 0x0, 0x1}, 0x3c) socket$rxrpc(0x21, 0x2, 0xa) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x1d4) connect$inet6(r0, &(0x7f0000000140), 0x1c) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5}, 0x3c) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") bpf$MAP_CREATE(0x4, &(0x7f0000000880)={0x3, 0x0, 0x0, 0x0, 0x711000, 0x0}, 0x1d) 22:44:12 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x7f, 0x7, 0x5, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000000040), &(0x7f0000000080)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000000)={r0, 0x0, 0x0}, 0x18) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r0, &(0x7f00000000c0), &(0x7f0000000200)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000080)={r0, 0x0, &(0x7f00000003c0)=""/140}, 0x18) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r0, &(0x7f0000000000), &(0x7f0000000080)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000000c0)={r0, &(0x7f00000003c0), 0x0}, 0x18) 22:44:12 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x7f, 0x7, 0x5, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000000040), &(0x7f0000000080)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000000)={r0, 0x0, 0x0}, 0x18) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r0, &(0x7f00000000c0), &(0x7f0000000200)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000080)={r0, 0x0, &(0x7f00000003c0)=""/140}, 0x18) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r0, &(0x7f0000000000), &(0x7f0000000080)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000000c0)={r0, &(0x7f00000003c0), 0x0}, 0x18) 22:44:12 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x7f, 0x7, 0x5, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000000040), &(0x7f0000000080)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000000)={r0, 0x0, 0x0}, 0x18) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r0, &(0x7f00000000c0), &(0x7f0000000200)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000080)={r0, 0x0, &(0x7f00000003c0)=""/140}, 0x18) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r0, &(0x7f0000000000), &(0x7f0000000080)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000000c0)={r0, &(0x7f00000003c0), 0x0}, 0x18) 22:44:12 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x12, 0x100, 0x4, 0x403, 0x0, 0x1}, 0x3c) socket$rxrpc(0x21, 0x2, 0xa) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x1d4) connect$inet6(r0, &(0x7f0000000140), 0x1c) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5}, 0x3c) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") bpf$MAP_CREATE(0x4, &(0x7f0000000880)={0x3, 0x0, 0x0, 0x0, 0x711000, 0x0}, 0x1d) 22:44:12 executing program 0: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0xa0002, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") write$sndseq(r0, &(0x7f000086afd0)=[{0x10081, 0x3}], 0x30) 22:44:12 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x12, 0x100, 0x4, 0x403, 0x0, 0x1}, 0x3c) socket$rxrpc(0x21, 0x2, 0xa) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x1d4) connect$inet6(r0, &(0x7f0000000140), 0x1c) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5}, 0x3c) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") bpf$MAP_CREATE(0x4, &(0x7f0000000880)={0x3, 0x0, 0x0, 0x0, 0x711000, 0x0}, 0x1d) 22:44:12 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x7f, 0x7, 0x5, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000000040), &(0x7f0000000080)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000000)={r0, 0x0, 0x0}, 0x18) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r0, &(0x7f00000000c0), &(0x7f0000000200)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000080)={r0, 0x0, &(0x7f00000003c0)=""/140}, 0x18) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r0, &(0x7f0000000000), &(0x7f0000000080)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000000c0)={r0, &(0x7f00000003c0), 0x0}, 0x18) 22:44:12 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x7f, 0x7, 0x5, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000000040), &(0x7f0000000080)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000000)={r0, 0x0, 0x0}, 0x18) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r0, &(0x7f00000000c0), &(0x7f0000000200)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000080)={r0, 0x0, &(0x7f00000003c0)=""/140}, 0x18) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r0, &(0x7f0000000000), &(0x7f0000000080)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000000c0)={r0, &(0x7f00000003c0), 0x0}, 0x18) 22:44:12 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x7f, 0x7, 0x5, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000000040), &(0x7f0000000080)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000000)={r0, 0x0, 0x0}, 0x18) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r0, &(0x7f00000000c0), &(0x7f0000000200)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000080)={r0, 0x0, &(0x7f00000003c0)=""/140}, 0x18) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r0, &(0x7f0000000000), &(0x7f0000000080)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000000c0)={r0, &(0x7f00000003c0), 0x0}, 0x18) 22:44:12 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) setresgid(0x0, 0x0, 0x0) 22:44:12 executing program 0: r0 = syz_open_dev$sndtimer(&(0x7f00000000c0)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000040)={{0x1}}) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r0, 0x40505412, 0x0) 22:44:12 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_procfs(0x0, &(0x7f0000000340)='setgroups\x00') dup2(r0, r2) 22:44:12 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x12, 0x100, 0x4, 0x403, 0x0, 0x1}, 0x3c) socket$rxrpc(0x21, 0x2, 0xa) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x1d4) connect$inet6(r0, &(0x7f0000000140), 0x1c) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5}, 0x3c) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") bpf$MAP_CREATE(0x4, &(0x7f0000000880)={0x3, 0x0, 0x0, 0x0, 0x711000, 0x0}, 0x1d) 22:44:12 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000300)='/dev/snapshot\x00', 0x30002, 0x0) r0 = syz_open_dev$dspn(0x0, 0x7, 0x10000) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, 0x0, 0x0) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/btrfs-control\x00', 0x80000, 0x0) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000ac0)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_EVBIT(r2, 0x40045564, 0x11) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r3 = socket$netlink(0x10, 0x3, 0x0) syz_open_dev$sndctrl(0x0, 0x100000000, 0x400881) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)) getsockopt$inet_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000240)={0x0, 0x0, 0x5, 0x5, 0x5, 0x1}, &(0x7f0000000280)=0x14) write$uinput_user_dev(r2, &(0x7f0000000640)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7], [0x0, 0x0, 0x3]}, 0x45c) sendmsg$IPVS_CMD_ZERO(r3, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000b00)=ANY=[@ANYBLOB="9400000008767610997ab017521b1d3e651587b7a0bd6844890dcaeafe6e976132c9c95e92bfa7a00c2a1c46fd6bc466f5fb574a03ce2f4fe40d326ce1284eec07d5ecbad481709131a14e2661945464ea832e2f5a2a4c1108827ca47f2b19e3", @ANYRES16, @ANYBLOB="11042abd7000fddbdf2510000000040002005400030014000200736974300000000000000000000000000800010001000000140006000000000000000000000000000000000008000300010000000800080006000000e83407004e21000008000800020000000c00020008000e004e2400001400030008000300000000000800030004000000080006003b3bffffda073fae5671f0307b648de1469fae9b824f1a57725fadd2344e127eb82ad9d1612bb99ca5f11f8e95796a298ba387c1f533715215fe8d230861744aab4e95e5bd8fe4647a927fff82a04025aaac6a5375eae2392d27ad8b477c92c482b1124ca71a8323387be11d21b633510e07fdb1eef60935a5d6126bc539e295d7aa8ff94e4dc77058d93a693794647bdd2ad2e4"], 0x3}}, 0x1) ioctl$UI_DEV_CREATE(r2, 0x5501) dup2(0xffffffffffffffff, r2) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180)) 22:44:12 executing program 5: openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) epoll_create1(0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='fdinfo/4\x00') preadv(r0, &(0x7f0000000700)=[{&(0x7f0000000600)=""/246, 0xf6}], 0x385, 0x40) 22:44:12 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000380)="bd0703e6ee63a560fa928a0b972e", 0x0, 0x100, 0xf2ffffff}, 0x28) 22:44:12 executing program 0: r0 = syz_open_dev$sndtimer(&(0x7f00000000c0)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000040)={{0x1}}) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r0, 0x40505412, 0x0) 22:44:12 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x2, 0x0) ioctl$EVIOCSCLOCKID(r0, 0x80284504, &(0x7f0000000080)) 22:44:12 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_procfs(0x0, &(0x7f0000000340)='setgroups\x00') dup2(r0, r2) 22:44:12 executing program 0: r0 = syz_open_dev$sndtimer(&(0x7f00000000c0)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000040)={{0x1}}) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r0, 0x40505412, 0x0) [ 435.124912] input: syz1 as /devices/virtual/input/input10 [ 435.152263] input: failed to attach handler leds to device input10, error: -6 22:44:12 executing program 5: openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) epoll_create1(0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='fdinfo/4\x00') preadv(r0, &(0x7f0000000700)=[{&(0x7f0000000600)=""/246, 0xf6}], 0x385, 0x40) 22:44:12 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000580)=ANY=[@ANYBLOB="b702000014000000bfa30000000000000703000000dfffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000e3a333a0daf2f73451c0e17a606fe530cb7d7f933eda020000000000000000e60077d4dd90123d27e7cf43548ee85857ad4a77cb56e07dfbe93adfd4e7540ebec677d6ac14c2c794f72cbf5fe31789e70233bfd8115efd90c8c48258f8dbe82e16cf8db95f5b068a9e00000000000000000000000000000000000000000000000000000000040000974ce5de4d473ed488526b6aa631a7b38f5f73e857156d3724e72a5a23538dac16dc6fb6abc73ecd94132145c79b143f6d23a553334986aec1027515efed5be7ab942f8e99e92f5fedc7cae3a1d9311391da5ccc69f90816487a9a53da61297099da5bd1174c958112f841eded4f85020a416bfa25852ae863d0b3d76fea3f7db44ee534a0ef9964aea5217ffcb3bcfaee582c7e55a2584d48dddebab23558c0e34b0a4f697b73f81b6f5723e2ee384e0162c34ec0"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000380)="bd0703e6ee63a560fa928a0b972e", 0x0, 0x100, 0xf2ffffff}, 0x28) 22:44:12 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x2, 0x0) ioctl$EVIOCSCLOCKID(r0, 0x80284504, &(0x7f0000000080)) [ 435.253711] selinux_nlmsg_perm: 310 callbacks suppressed [ 435.253759] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=19485 comm=syz-executor.2 22:44:12 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_procfs(0x0, &(0x7f0000000340)='setgroups\x00') dup2(r0, r2) 22:44:12 executing program 0: r0 = syz_open_dev$sndtimer(&(0x7f00000000c0)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000040)={{0x1}}) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r0, 0x40505412, 0x0) 22:44:12 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000300)='/dev/snapshot\x00', 0x30002, 0x0) r0 = syz_open_dev$dspn(0x0, 0x7, 0x10000) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, 0x0, 0x0) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/btrfs-control\x00', 0x80000, 0x0) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000ac0)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_EVBIT(r2, 0x40045564, 0x11) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r3 = socket$netlink(0x10, 0x3, 0x0) syz_open_dev$sndctrl(0x0, 0x100000000, 0x400881) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)) getsockopt$inet_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000240)={0x0, 0x0, 0x5, 0x5, 0x5, 0x1}, &(0x7f0000000280)=0x14) write$uinput_user_dev(r2, &(0x7f0000000640)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7], [0x0, 0x0, 0x3]}, 0x45c) sendmsg$IPVS_CMD_ZERO(r3, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000b00)=ANY=[@ANYBLOB="9400000008767610997ab017521b1d3e651587b7a0bd6844890dcaeafe6e976132c9c95e92bfa7a00c2a1c46fd6bc466f5fb574a03ce2f4fe40d326ce1284eec07d5ecbad481709131a14e2661945464ea832e2f5a2a4c1108827ca47f2b19e3", @ANYRES16, @ANYBLOB="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"], 0x3}}, 0x1) ioctl$UI_DEV_CREATE(r2, 0x5501) dup2(0xffffffffffffffff, r2) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180)) 22:44:12 executing program 5: openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) epoll_create1(0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='fdinfo/4\x00') preadv(r0, &(0x7f0000000700)=[{&(0x7f0000000600)=""/246, 0xf6}], 0x385, 0x40) 22:44:12 executing program 0: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000300)='/dev/snapshot\x00', 0x30002, 0x0) r0 = syz_open_dev$dspn(0x0, 0x7, 0x10000) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, 0x0, 0x0) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/btrfs-control\x00', 0x80000, 0x0) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000ac0)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_EVBIT(r2, 0x40045564, 0x11) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r3 = socket$netlink(0x10, 0x3, 0x0) syz_open_dev$sndctrl(0x0, 0x100000000, 0x400881) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)) getsockopt$inet_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000240)={0x0, 0x0, 0x5, 0x5, 0x5, 0x1}, &(0x7f0000000280)=0x14) write$uinput_user_dev(r2, &(0x7f0000000640)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7], [0x0, 0x0, 0x3]}, 0x45c) sendmsg$IPVS_CMD_ZERO(r3, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000b00)=ANY=[@ANYBLOB="9400000008767610997ab017521b1d3e651587b7a0bd6844890dcaeafe6e976132c9c95e92bfa7a00c2a1c46fd6bc466f5fb574a03ce2f4fe40d326ce1284eec07d5ecbad481709131a14e2661945464ea832e2f5a2a4c1108827ca47f2b19e3", @ANYRES16, @ANYBLOB="11042abd7000fddbdf2510000000040002005400030014000200736974300000000000000000000000000800010001000000140006000000000000000000000000000000000008000300010000000800080006000000e83407004e21000008000800020000000c00020008000e004e2400001400030008000300000000000800030004000000080006003b3bffffda073fae5671f0307b648de1469fae9b824f1a57725fadd2344e127eb82ad9d1612bb99ca5f11f8e95796a298ba387c1f533715215fe8d230861744aab4e95e5bd8fe4647a927fff82a04025aaac6a5375eae2392d27ad8b477c92c482b1124ca71a8323387be11d21b633510e07fdb1eef60935a5d6126bc539e295d7aa8ff94e4dc77058d93a693794647bdd2ad2e4"], 0x3}}, 0x1) ioctl$UI_DEV_CREATE(r2, 0x5501) dup2(0xffffffffffffffff, r2) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180)) 22:44:12 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x2, 0x0) ioctl$EVIOCSCLOCKID(r0, 0x80284504, &(0x7f0000000080)) 22:44:12 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_procfs(0x0, &(0x7f0000000340)='setgroups\x00') dup2(r0, r2) 22:44:13 executing program 5: openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) epoll_create1(0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='fdinfo/4\x00') preadv(r0, &(0x7f0000000700)=[{&(0x7f0000000600)=""/246, 0xf6}], 0x385, 0x40) 22:44:13 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x2, 0x0) ioctl$EVIOCSCLOCKID(r0, 0x80284504, &(0x7f0000000080)) [ 435.599056] input: syz1 as /devices/virtual/input/input11 [ 435.615248] input: failed to attach handler leds to device input11, error: -6 22:44:13 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000380)="bd0703e6ee63a560fa928a0b972e", 0x0, 0x100, 0xf2ffffff}, 0x28) 22:44:13 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000000)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0xfebff000) 22:44:13 executing program 0: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000300)='/dev/snapshot\x00', 0x30002, 0x0) r0 = syz_open_dev$dspn(0x0, 0x7, 0x10000) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, 0x0, 0x0) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/btrfs-control\x00', 0x80000, 0x0) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000ac0)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_EVBIT(r2, 0x40045564, 0x11) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r3 = socket$netlink(0x10, 0x3, 0x0) syz_open_dev$sndctrl(0x0, 0x100000000, 0x400881) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)) getsockopt$inet_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000240)={0x0, 0x0, 0x5, 0x5, 0x5, 0x1}, &(0x7f0000000280)=0x14) write$uinput_user_dev(r2, &(0x7f0000000640)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7], [0x0, 0x0, 0x3]}, 0x45c) sendmsg$IPVS_CMD_ZERO(r3, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000b00)=ANY=[@ANYBLOB="9400000008767610997ab017521b1d3e651587b7a0bd6844890dcaeafe6e976132c9c95e92bfa7a00c2a1c46fd6bc466f5fb574a03ce2f4fe40d326ce1284eec07d5ecbad481709131a14e2661945464ea832e2f5a2a4c1108827ca47f2b19e3", @ANYRES16, @ANYBLOB="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"], 0x3}}, 0x1) ioctl$UI_DEV_CREATE(r2, 0x5501) dup2(0xffffffffffffffff, r2) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180)) 22:44:13 executing program 4: r0 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x3, 0x2) ioctl$VIDIOC_ENUM_FREQ_BANDS(r0, 0xc0405665, &(0x7f0000000080)={0x7, 0x1}) 22:44:13 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000000)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0xfebff000) 22:44:13 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000300)='/dev/snapshot\x00', 0x30002, 0x0) r0 = syz_open_dev$dspn(0x0, 0x7, 0x10000) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, 0x0, 0x0) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/btrfs-control\x00', 0x80000, 0x0) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000ac0)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_EVBIT(r2, 0x40045564, 0x11) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r3 = socket$netlink(0x10, 0x3, 0x0) syz_open_dev$sndctrl(0x0, 0x100000000, 0x400881) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)) getsockopt$inet_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000240)={0x0, 0x0, 0x5, 0x5, 0x5, 0x1}, &(0x7f0000000280)=0x14) write$uinput_user_dev(r2, &(0x7f0000000640)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7], [0x0, 0x0, 0x3]}, 0x45c) sendmsg$IPVS_CMD_ZERO(r3, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000b00)=ANY=[@ANYBLOB="9400000008767610997ab017521b1d3e651587b7a0bd6844890dcaeafe6e976132c9c95e92bfa7a00c2a1c46fd6bc466f5fb574a03ce2f4fe40d326ce1284eec07d5ecbad481709131a14e2661945464ea832e2f5a2a4c1108827ca47f2b19e3", @ANYRES16, @ANYBLOB="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"], 0x3}}, 0x1) ioctl$UI_DEV_CREATE(r2, 0x5501) dup2(0xffffffffffffffff, r2) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180)) 22:44:13 executing program 4: r0 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x3, 0x2) ioctl$VIDIOC_ENUM_FREQ_BANDS(r0, 0xc0405665, &(0x7f0000000080)={0x7, 0x1}) 22:44:13 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000380)="bd0703e6ee63a560fa928a0b972e", 0x0, 0x100, 0xf2ffffff}, 0x28) 22:44:13 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000000)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0xfebff000) 22:44:13 executing program 0: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000300)='/dev/snapshot\x00', 0x30002, 0x0) r0 = syz_open_dev$dspn(0x0, 0x7, 0x10000) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, 0x0, 0x0) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/btrfs-control\x00', 0x80000, 0x0) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000ac0)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_EVBIT(r2, 0x40045564, 0x11) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r3 = socket$netlink(0x10, 0x3, 0x0) syz_open_dev$sndctrl(0x0, 0x100000000, 0x400881) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)) getsockopt$inet_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000240)={0x0, 0x0, 0x5, 0x5, 0x5, 0x1}, &(0x7f0000000280)=0x14) write$uinput_user_dev(r2, &(0x7f0000000640)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7], [0x0, 0x0, 0x3]}, 0x45c) sendmsg$IPVS_CMD_ZERO(r3, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000b00)=ANY=[@ANYBLOB="9400000008767610997ab017521b1d3e651587b7a0bd6844890dcaeafe6e976132c9c95e92bfa7a00c2a1c46fd6bc466f5fb574a03ce2f4fe40d326ce1284eec07d5ecbad481709131a14e2661945464ea832e2f5a2a4c1108827ca47f2b19e3", @ANYRES16, @ANYBLOB="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"], 0x3}}, 0x1) ioctl$UI_DEV_CREATE(r2, 0x5501) dup2(0xffffffffffffffff, r2) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180)) 22:44:13 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000080)={0x0, 0x0, 0xffffffffffffeffc}, 0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000240)="11dca5055e0bcfe47bf070") syz_emit_ethernet(0xc0, &(0x7f0000000280)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaa000800490000280000216a00009078ac141400ac1423bb0702907800000000000000000000000000000000c9ebedbdfa37dbbd45928b7d2237ac1d83f547aef25b4926728ca2846e70e5453642ff2beb21f805164a5622df5aa32c8b725ee5caa515a37a801da11cb78d0dfe099e8b16fee51a1559fb65f00e863ae327f1ffff14678c0505f5a8e63f414fc6efd55e"], 0x0) 22:44:13 executing program 4: r0 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x3, 0x2) ioctl$VIDIOC_ENUM_FREQ_BANDS(r0, 0xc0405665, &(0x7f0000000080)={0x7, 0x1}) 22:44:13 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000000)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0xfebff000) 22:44:13 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000300)='/dev/snapshot\x00', 0x30002, 0x0) r0 = syz_open_dev$dspn(0x0, 0x7, 0x10000) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, 0x0, 0x0) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/btrfs-control\x00', 0x80000, 0x0) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000ac0)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_EVBIT(r2, 0x40045564, 0x11) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r3 = socket$netlink(0x10, 0x3, 0x0) syz_open_dev$sndctrl(0x0, 0x100000000, 0x400881) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)) getsockopt$inet_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000240)={0x0, 0x0, 0x5, 0x5, 0x5, 0x1}, &(0x7f0000000280)=0x14) write$uinput_user_dev(r2, &(0x7f0000000640)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], [0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7], [0x0, 0x0, 0x3]}, 0x45c) sendmsg$IPVS_CMD_ZERO(r3, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000b00)=ANY=[@ANYBLOB="9400000008767610997ab017521b1d3e651587b7a0bd6844890dcaeafe6e976132c9c95e92bfa7a00c2a1c46fd6bc466f5fb574a03ce2f4fe40d326ce1284eec07d5ecbad481709131a14e2661945464ea832e2f5a2a4c1108827ca47f2b19e3", @ANYRES16, @ANYBLOB="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"], 0x3}}, 0x1) ioctl$UI_DEV_CREATE(r2, 0x5501) dup2(0xffffffffffffffff, r2) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180)) 22:44:13 executing program 4: r0 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x3, 0x2) ioctl$VIDIOC_ENUM_FREQ_BANDS(r0, 0xc0405665, &(0x7f0000000080)={0x7, 0x1}) 22:44:13 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = perf_event_open(&(0x7f0000000200)={0x2000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x1}}, 0xffffffffffffffff, 0x0, r1, 0x0) perf_event_open(&(0x7f00000000c0)={0x8, 0x70, 0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000000000, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, r1, 0x0) 22:44:13 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000080)={0x0, 0x0, 0xffffffffffffeffc}, 0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000240)="11dca5055e0bcfe47bf070") syz_emit_ethernet(0xc0, &(0x7f0000000280)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaa000800490000280000216a00009078ac141400ac1423bb0702907800000000000000000000000000000000c9ebedbdfa37dbbd45928b7d2237ac1d83f547aef25b4926728ca2846e70e5453642ff2beb21f805164a5622df5aa32c8b725ee5caa515a37a801da11cb78d0dfe099e8b16fee51a1559fb65f00e863ae327f1ffff14678c0505f5a8e63f414fc6efd55e"], 0x0) 22:44:13 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) r1 = dup(r0) r2 = syz_genetlink_get_family_id$nbd(&(0x7f0000000040)='nbd\x00') sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20800000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, r2, 0x0, 0x70bd29}, 0x14}}, 0x40000) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) mincore(&(0x7f0000000000/0x400000)=nil, 0x400000, &(0x7f0000000140)=""/177) 22:44:13 executing program 4: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000240)='/dev/video35\x00', 0x2, 0x0) syz_emit_ethernet(0x1, &(0x7f0000000340)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaaaa"], 0x0) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000480)={0x0, 0xffffffff, 0x2, {0x2, @raw_data="c5d57e1409c8c8bfc4b0a6a486e6759ec6b71794ff0adc9ee376a40807fdd9774aece3e8b95da34ee175d3529bc03c3401cbd467e3a00b3f565d83fcdaa18e1364954192aa37c8b5d52de4df78b6ea9e89a2c13f92b9f7650b89fdf12ca7c48762bc81646f92b9f2270c1a324c9820fd0525a8c381ced94247dfa06a9362cdade36c5ee4e0463288dced378801a8dad713036ecfa51add03337e4cc1d3d7cdea599d986641334404b67bd660b034ebd565d306b651d8b3a7d05256fd53039928498f4aa480448183"}}) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc058565d, &(0x7f0000000300)={0x0, 0x2, 0x0, {0x0, @pix={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x400000}}}) 22:44:13 executing program 1: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000240)='/dev/video35\x00', 0x2, 0x0) syz_emit_ethernet(0x1, &(0x7f0000000340)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaaaa"], 0x0) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000480)={0x0, 0xffffffff, 0x2, {0x2, @raw_data="c5d57e1409c8c8bfc4b0a6a486e6759ec6b71794ff0adc9ee376a40807fdd9774aece3e8b95da34ee175d3529bc03c3401cbd467e3a00b3f565d83fcdaa18e1364954192aa37c8b5d52de4df78b6ea9e89a2c13f92b9f7650b89fdf12ca7c48762bc81646f92b9f2270c1a324c9820fd0525a8c381ced94247dfa06a9362cdade36c5ee4e0463288dced378801a8dad713036ecfa51add03337e4cc1d3d7cdea599d986641334404b67bd660b034ebd565d306b651d8b3a7d05256fd53039928498f4aa480448183"}}) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc058565d, &(0x7f0000000300)={0x0, 0x2, 0x0, {0x0, @pix={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x100000}}}) [ 436.473459] use of bytesused == 0 is deprecated and will be removed in the future, 22:44:13 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000080)={0x0, 0x0, 0xffffffffffffeffc}, 0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000240)="11dca5055e0bcfe47bf070") syz_emit_ethernet(0xc0, &(0x7f0000000280)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaa000800490000280000216a00009078ac141400ac1423bb0702907800000000000000000000000000000000c9ebedbdfa37dbbd45928b7d2237ac1d83f547aef25b4926728ca2846e70e5453642ff2beb21f805164a5622df5aa32c8b725ee5caa515a37a801da11cb78d0dfe099e8b16fee51a1559fb65f00e863ae327f1ffff14678c0505f5a8e63f414fc6efd55e"], 0x0) [ 436.535707] use the actual size instead. 22:44:14 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000080)={0x0, 0x0, 0xffffffffffffeffc}, 0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000240)="11dca5055e0bcfe47bf070") syz_emit_ethernet(0xc0, &(0x7f0000000280)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaa000800490000280000216a00009078ac141400ac1423bb0702907800000000000000000000000000000000c9ebedbdfa37dbbd45928b7d2237ac1d83f547aef25b4926728ca2846e70e5453642ff2beb21f805164a5622df5aa32c8b725ee5caa515a37a801da11cb78d0dfe099e8b16fee51a1559fb65f00e863ae327f1ffff14678c0505f5a8e63f414fc6efd55e"], 0x0) 22:44:14 executing program 4: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000240)='/dev/video35\x00', 0x2, 0x0) syz_emit_ethernet(0x1, &(0x7f0000000340)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaaaa"], 0x0) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000480)={0x0, 0xffffffff, 0x2, {0x2, @raw_data="c5d57e1409c8c8bfc4b0a6a486e6759ec6b71794ff0adc9ee376a40807fdd9774aece3e8b95da34ee175d3529bc03c3401cbd467e3a00b3f565d83fcdaa18e1364954192aa37c8b5d52de4df78b6ea9e89a2c13f92b9f7650b89fdf12ca7c48762bc81646f92b9f2270c1a324c9820fd0525a8c381ced94247dfa06a9362cdade36c5ee4e0463288dced378801a8dad713036ecfa51add03337e4cc1d3d7cdea599d986641334404b67bd660b034ebd565d306b651d8b3a7d05256fd53039928498f4aa480448183"}}) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc058565d, &(0x7f0000000300)={0x0, 0x2, 0x0, {0x0, @pix={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x400000}}}) 22:44:14 executing program 1: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000240)='/dev/video35\x00', 0x2, 0x0) syz_emit_ethernet(0x1, &(0x7f0000000340)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaaaa"], 0x0) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000480)={0x0, 0xffffffff, 0x2, {0x2, @raw_data="c5d57e1409c8c8bfc4b0a6a486e6759ec6b71794ff0adc9ee376a40807fdd9774aece3e8b95da34ee175d3529bc03c3401cbd467e3a00b3f565d83fcdaa18e1364954192aa37c8b5d52de4df78b6ea9e89a2c13f92b9f7650b89fdf12ca7c48762bc81646f92b9f2270c1a324c9820fd0525a8c381ced94247dfa06a9362cdade36c5ee4e0463288dced378801a8dad713036ecfa51add03337e4cc1d3d7cdea599d986641334404b67bd660b034ebd565d306b651d8b3a7d05256fd53039928498f4aa480448183"}}) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc058565d, &(0x7f0000000300)={0x0, 0x2, 0x0, {0x0, @pix={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x100000}}}) 22:44:14 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) r1 = dup(r0) r2 = syz_genetlink_get_family_id$nbd(&(0x7f0000000040)='nbd\x00') sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20800000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, r2, 0x0, 0x70bd29}, 0x14}}, 0x40000) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) mincore(&(0x7f0000000000/0x400000)=nil, 0x400000, &(0x7f0000000140)=""/177) [ 437.728473] IPVS: ftp: loaded support on port[0] = 21 [ 437.876370] chnl_net:caif_netlink_parms(): no params data found [ 437.901818] bridge0: port 1(bridge_slave_0) entered blocking state [ 437.909049] bridge0: port 1(bridge_slave_0) entered disabled state [ 437.916066] device bridge_slave_0 entered promiscuous mode [ 438.042610] bridge0: port 2(bridge_slave_1) entered blocking state [ 438.050281] bridge0: port 2(bridge_slave_1) entered disabled state [ 438.057523] device bridge_slave_1 entered promiscuous mode [ 438.074581] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 438.179186] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 438.190637] IPVS: ftp: loaded support on port[0] = 21 [ 438.201334] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 438.209358] team0: Port device team_slave_0 added [ 438.214952] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 438.222153] team0: Port device team_slave_1 added [ 438.228972] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 438.345660] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 438.414654] device hsr_slave_0 entered promiscuous mode [ 438.453609] device hsr_slave_1 entered promiscuous mode [ 438.493762] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 438.502256] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 438.510322] device bridge_slave_1 left promiscuous mode [ 438.516154] bridge0: port 2(bridge_slave_1) entered disabled state [ 438.564157] device bridge_slave_0 left promiscuous mode [ 438.569653] bridge0: port 1(bridge_slave_0) entered disabled state [ 438.624798] device bridge_slave_1 left promiscuous mode [ 438.630212] bridge0: port 2(bridge_slave_1) entered disabled state [ 438.684100] device bridge_slave_0 left promiscuous mode [ 438.689515] bridge0: port 1(bridge_slave_0) entered disabled state [ 441.275991] device hsr_slave_1 left promiscuous mode [ 441.335747] device hsr_slave_0 left promiscuous mode [ 441.375606] team0 (unregistering): Port device team_slave_1 removed [ 441.385574] team0 (unregistering): Port device team_slave_0 removed [ 441.394981] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 441.436479] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 441.518928] bond0 (unregistering): Released all slaves [ 441.605681] device hsr_slave_1 left promiscuous mode [ 441.647320] device hsr_slave_0 left promiscuous mode [ 441.687299] team0 (unregistering): Port device team_slave_1 removed [ 441.696993] team0 (unregistering): Port device team_slave_0 removed [ 441.707440] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 441.748540] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 441.829695] bond0 (unregistering): Released all slaves [ 441.908465] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 441.950899] chnl_net:caif_netlink_parms(): no params data found [ 441.992422] bridge0: port 1(bridge_slave_0) entered blocking state [ 441.999143] bridge0: port 1(bridge_slave_0) entered disabled state [ 442.006299] device bridge_slave_0 entered promiscuous mode [ 442.015688] bridge0: port 2(bridge_slave_1) entered blocking state [ 442.022057] bridge0: port 2(bridge_slave_1) entered disabled state [ 442.028925] device bridge_slave_1 entered promiscuous mode [ 442.047536] 8021q: adding VLAN 0 to HW filter on device bond0 [ 442.054980] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 442.064391] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 442.080549] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 442.089010] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 442.096256] team0: Port device team_slave_0 added [ 442.102139] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 442.108893] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 442.115988] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 442.122894] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 442.130372] team0: Port device team_slave_1 added [ 442.137122] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 442.144249] 8021q: adding VLAN 0 to HW filter on device team0 [ 442.150471] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 442.157832] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 442.172712] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 442.184121] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 442.192026] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 442.199531] bridge0: port 1(bridge_slave_0) entered blocking state [ 442.205894] bridge0: port 1(bridge_slave_0) entered forwarding state [ 442.254647] device hsr_slave_0 entered promiscuous mode [ 442.293514] device hsr_slave_1 entered promiscuous mode [ 442.373845] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 442.380862] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 442.390747] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 442.398807] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 442.408048] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 442.415635] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 442.424103] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 442.431580] bridge0: port 2(bridge_slave_1) entered blocking state [ 442.437926] bridge0: port 2(bridge_slave_1) entered forwarding state [ 442.444806] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 442.544112] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 442.645269] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 442.652863] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 442.665440] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 442.677164] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 442.688566] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 442.700169] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 442.710802] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 442.728732] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 442.740588] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 442.758354] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 442.768465] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 442.780023] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 442.802465] 8021q: adding VLAN 0 to HW filter on device bond0 [ 442.810268] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 442.832070] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 442.843052] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 442.854006] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 442.869587] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 442.876122] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 442.883072] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 442.896745] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 442.902811] 8021q: adding VLAN 0 to HW filter on device team0 [ 442.917630] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 442.935140] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 442.949747] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 442.957013] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 442.970609] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 442.979356] bridge0: port 1(bridge_slave_0) entered blocking state [ 442.985829] bridge0: port 1(bridge_slave_0) entered forwarding state [ 442.998362] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 443.007038] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 443.019618] bridge0: port 2(bridge_slave_1) entered blocking state [ 443.025981] bridge0: port 2(bridge_slave_1) entered forwarding state [ 443.034693] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 443.048672] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 443.056458] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 443.068733] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 443.077374] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 443.098777] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 443.109063] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 443.135831] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 443.142761] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 443.163873] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 443.171448] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 443.189585] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 443.203751] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 443.221706] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 443.249710] input: syz1 as /devices/virtual/input/input12 [ 443.267479] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 443.275736] input: failed to attach handler leds to device input12, error: -6 [ 443.283792] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 443.298267] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 443.308376] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 443.321282] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 443.359221] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 443.366277] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 443.388865] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 443.408345] 8021q: adding VLAN 0 to HW filter on device batadv0 22:44:20 executing program 1: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000240)='/dev/video35\x00', 0x2, 0x0) syz_emit_ethernet(0x1, &(0x7f0000000340)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaaaa"], 0x0) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000480)={0x0, 0xffffffff, 0x2, {0x2, @raw_data="c5d57e1409c8c8bfc4b0a6a486e6759ec6b71794ff0adc9ee376a40807fdd9774aece3e8b95da34ee175d3529bc03c3401cbd467e3a00b3f565d83fcdaa18e1364954192aa37c8b5d52de4df78b6ea9e89a2c13f92b9f7650b89fdf12ca7c48762bc81646f92b9f2270c1a324c9820fd0525a8c381ced94247dfa06a9362cdade36c5ee4e0463288dced378801a8dad713036ecfa51add03337e4cc1d3d7cdea599d986641334404b67bd660b034ebd565d306b651d8b3a7d05256fd53039928498f4aa480448183"}}) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc058565d, &(0x7f0000000300)={0x0, 0x2, 0x0, {0x0, @pix={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x100000}}}) 22:44:20 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128l-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a01002356ba602dff05000b", 0x10) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000003f40)=""/190, 0xbe}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x228, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) [ 443.584806] WARNING: CPU: 0 PID: 19617 at kernel/events/core.c:1833 perf_group_attach+0x3f6/0x4c0 [ 443.594248] Kernel panic - not syncing: panic_on_warn set ... [ 443.594248] [ 443.601617] CPU: 0 PID: 19617 Comm: syz-executor.0 Not tainted 4.19.67 #41 [ 443.608618] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 443.617946] Call Trace: [ 443.620514] dump_stack+0x172/0x1f0 [ 443.624153] panic+0x263/0x507 [ 443.627322] ? __warn_printk+0xf3/0xf3 [ 443.631198] ? perf_group_attach+0x3f6/0x4c0 [ 443.635602] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 443.641115] ? __warn.cold+0x5/0x4a [ 443.644743] ? perf_group_attach+0x3f6/0x4c0 [ 443.649125] __warn.cold+0x20/0x4a [ 443.652640] ? perf_group_attach+0x3f6/0x4c0 [ 443.657026] report_bug+0x263/0x2b0 [ 443.660663] do_error_trap+0x204/0x360 [ 443.664530] ? math_error+0x340/0x340 [ 443.668319] ? mark_held_locks+0x100/0x100 [ 443.672539] ? error_entry+0x7c/0xe0 [ 443.676269] ? trace_hardirqs_off_caller+0x65/0x220 [ 443.681275] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 443.686094] do_invalid_op+0x1b/0x20 [ 443.689783] invalid_op+0x14/0x20 [ 443.693221] RIP: 0010:perf_group_attach+0x3f6/0x4c0 [ 443.698209] Code: ff 48 8d 7b 10 48 89 f8 48 c1 e8 03 42 80 3c 28 00 75 57 48 8b 5b 10 48 83 eb 10 49 39 dc 75 d4 e9 27 ff ff ff e8 ba 37 ec ff <0f> 0b e9 5c fd ff ff e8 ee ca 22 00 e9 b9 fc ff ff 48 c7 c7 c0 fa [ 443.717179] RSP: 0018:ffff888062d37a70 EFLAGS: 00010016 [ 443.722517] RAX: 0000000000040000 RBX: ffff8880a5598d00 RCX: ffffc9000dca6000 [ 443.729763] RDX: 0000000000000604 RSI: ffffffff817f2776 RDI: ffff8880a5598f18 [ 443.737008] RBP: ffff888062d37aa0 R08: ffff888099720100 R09: ffffed1015d064c2 [ 443.744258] R10: ffffed1015d064c1 R11: ffff8880ae83260b R12: ffff88806a668d00 [ 443.751511] R13: ffffe8ffffc143d0 R14: 0000000000000000 R15: ffff8880ae832608 [ 443.758763] ? perf_group_attach+0x3f6/0x4c0 [ 443.763176] __perf_install_in_context+0x4b5/0x960 [ 443.768086] ? __perf_event_enable+0x910/0x910 [ 443.772661] ? perf_duration_warn+0x40/0x40 [ 443.776957] remote_function+0x129/0x1a0 [ 443.781082] generic_exec_single+0x27c/0x490 [ 443.785592] smp_call_function_single+0x12d/0x420 [ 443.790408] ? perf_duration_warn+0x40/0x40 [ 443.794713] ? generic_exec_single+0x490/0x490 [ 443.799302] ? __lock_is_held+0xb6/0x140 [ 443.803342] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 443.808939] ? exclusive_event_installable+0x257/0x320 [ 443.814192] perf_install_in_context+0x39d/0x400 [ 443.818923] ? list_add_event+0xeb0/0xeb0 [ 443.823052] ? __perf_event_enable+0x910/0x910 [ 443.827610] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 443.833123] __do_sys_perf_event_open+0x1b4e/0x2a70 [ 443.838117] ? perf_event_set_output+0x4e0/0x4e0 [ 443.843089] ? put_timespec64+0xda/0x140 [ 443.847143] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 443.851876] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 443.856610] ? do_syscall_64+0x26/0x620 [ 443.860558] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 443.865898] ? do_syscall_64+0x26/0x620 [ 443.869849] __x64_sys_perf_event_open+0xbe/0x150 [ 443.874675] do_syscall_64+0xfd/0x620 [ 443.878551] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 443.883713] RIP: 0033:0x459829 [ 443.886890] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 443.905765] RSP: 002b:00007f81b6f22c78 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 443.913453] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 0000000000459829 [ 443.920696] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000000 [ 443.928038] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 443.935285] R10: 0000000000000005 R11: 0000000000000246 R12: 00007f81b6f236d4 [ 443.942527] R13: 00000000004c6694 R14: 00000000004db6d0 R15: 00000000ffffffff [ 443.951283] Kernel Offset: disabled [ 443.955136] Rebooting in 86400 seconds..