1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000080)={&(0x7f0000000040)='./file0\x00', r0}, 0x10) write$cgroup_subtree(r1, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0x200600) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x6, 0x0, &(0x7f0000000240)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xd}, 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000280)={0x0, r0}, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x2da8020000000000, 0x500001c) sendmsg(r0, 0x0, 0x0) write$cgroup_type(r1, 0x0, 0x0) mkdir(0x0, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) close(0xffffffffffffffff) 10:17:33 executing program 3: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1000000040000001) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$FS_IOC_FSGETXATTR(r0, 0x802c550a, &(0x7f0000000100)={0x2, 0x0, 0x60, 0x740000, 0xf7ffffff7ff0bdbe}) 10:17:34 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x3, 0x3, &(0x7f0000000040)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x57, 0x72, 0xa, 0xffe5}}, &(0x7f00000000c0)='GPL\x00', 0x200000010001, 0xc3, &(0x7f0000000300)=""/195}, 0x48) [ 1577.127424] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1577.146329] RSP: 002b:00007fe46159dc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1577.154038] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457f29 [ 1577.161300] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003 [ 1577.168597] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1577.175882] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe46159e6d4 [ 1577.183148] R13: 00000000004c7481 R14: 00000000004dd080 R15: 00000000ffffffff [ 1577.249724] Mem-Info: [ 1577.252390] active_anon:71432 inactive_anon:194 isolated_anon:0 [ 1577.252390] active_file:18766 inactive_file:40093 isolated_file:0 [ 1577.252390] unevictable:6 dirty:896 writeback:0 unstable:0 [ 1577.252390] slab_reclaimable:15639 slab_unreclaimable:120366 [ 1577.252390] mapped:58977 shmem:256 pagetables:2072 bounce:0 [ 1577.252390] free:1232572 free_pcp:497 free_cma:0 [ 1577.310344] audit: type=1804 audit(1551953854.086:399): pid=4346 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir487917857/syzkaller.ffyQjJ/361/memory.events" dev="sda1" ino=16834 res=1 [ 1577.376235] usb usb5: Requested nonsensical USBDEVFS_URB_ZERO_PACKET. 10:17:34 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1000000040000001) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$FS_IOC_FSGETXATTR(r0, 0x802c550a, &(0x7f0000000100)={0x2, 0x0, 0x60, 0x740000, 0xf7ffffff7ff0bdbe}) [ 1577.417840] input: syz1 as /devices/virtual/input/input87 [ 1577.421718] vhci_hcd: invalid port number 255 [ 1577.478719] vhci_hcd: default hub control req: feff vffff i00ff l65535 [ 1577.517199] Node 0 active_anon:288588kB inactive_anon:772kB active_file:74928kB inactive_file:161112kB unevictable:24kB isolated(anon):0kB isolated(file):0kB mapped:235808kB dirty:3712kB writeback:0kB shmem:1028kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 165888kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no 10:17:34 executing program 2: mkdir(&(0x7f0000000a00)='./file0\x00', 0x48) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x0, 0x0) r0 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x2, 0x0) ioctl(r0, 0x0, &(0x7f0000000a80)="0d43671cfe81157a4328524278c325a86f82ca7a776bf35ad6435fc5d92cc7dd4ebee0d6a74b209788aad1bb0d9fdc631afc28787542538d04a3eedae846f66ef994e354dc1b6ca4a8c7430dafb69bf5684787f2bf739b6e90c60772b34b1acdfa94c903c7487d33b95fe0c631c63e2cbe03a9393ac9d7de9a3e31465b7ff322fb2b60d38f89954594056227e1da58f4b189845b962ee290") r2 = creat(&(0x7f0000000700)='./bus\x00', 0x0) setsockopt$netlink_NETLINK_RX_RING(r2, 0x10e, 0x6, &(0x7f0000000500)={0x7fffffff, 0x7fff, 0x200000000000000, 0x80000000}, 0xfffffe4b) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000380)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f00000002c0)) sched_setaffinity(0x0, 0x8, &(0x7f00000000c0)=0xd) setxattr$security_smack_entry(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000880)='security.SMACK64EXEC\x00', &(0x7f00000008c0)='syz1\x00', 0x5, 0x3) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) fchdir(r1) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)) setsockopt$inet6_udp_encap(r0, 0x11, 0x64, &(0x7f0000000200)=0x2, 0xffffffffffffff28) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000900)={{{@in6=@remote, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @broadcast}}, 0x0, @in=@empty}}, &(0x7f0000000b40)=0x5e) fchown(r3, r4, 0x0) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, &(0x7f0000000480)=@req3={0x0, 0x6, 0x14cbddd4, 0x0, 0x0, 0x0, 0x3}, 0x1c) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000140)={&(0x7f0000000740)=ANY=[]}}, 0x0) pivot_root(&(0x7f0000000240)='./file0\x00', &(0x7f0000000000)='./file0\x00') ftruncate(r2, 0x208200) r5 = getpid() sched_setscheduler(r5, 0x5, &(0x7f0000000000)) futex(&(0x7f0000000080)=0x2000000000000002, 0x6, 0x0, &(0x7f0000000b80), &(0x7f0000000bc0)=0x1, 0x0) write$uinput_user_dev(r1, &(0x7f0000000400)={'syz1\x00', {}, 0x25}, 0x45c) ioctl$UI_DEV_SETUP(r1, 0x5501, &(0x7f0000000300)={{}, 'syz0\x00'}) ioctl$UI_DEV_DESTROY(r1, 0x5502) fchdir(r0) mknod$loop(&(0x7f00000003c0)='./bus\x00', 0x2400, 0xffffffffffffffff) [ 1577.589777] usb usb5: Requested nonsensical USBDEVFS_URB_ZERO_PACKET. 10:17:34 executing program 3: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1000000040000001) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$FS_IOC_FSGETXATTR(r0, 0x802c550a, &(0x7f0000000100)={0x2, 0x0, 0x60, 0x740000, 0xf7ffffff7ff0bdbe}) [ 1577.638004] vhci_hcd: invalid port number 255 [ 1577.642599] vhci_hcd: default hub control req: feff vffff i00ff l65535 [ 1577.668155] Node 1 active_anon:0kB inactive_anon:0kB active_file:136kB inactive_file:0kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:0kB dirty:0kB writeback:0kB shmem:0kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 1577.746281] usb usb5: Requested nonsensical USBDEVFS_URB_ZERO_PACKET. [ 1577.774760] vhci_hcd: invalid port number 255 [ 1577.785230] vhci_hcd: default hub control req: feff vffff i00ff l65535 [ 1577.799551] Node 0 DMA free:15908kB min:220kB low:272kB high:324kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 1577.848401] lowmem_reserve[]: 0 2553 2555 2555 [ 1577.878206] Node 0 DMA32 free:1011748kB min:36232kB low:45288kB high:54344kB active_anon:287032kB inactive_anon:772kB active_file:74928kB inactive_file:162412kB unevictable:24kB writepending:3712kB present:3129332kB managed:2617976kB mlocked:0kB kernel_stack:9824kB pagetables:8276kB bounce:0kB free_pcp:1920kB local_pcp:1252kB free_cma:0kB [ 1577.955394] audit: type=1804 audit(1551953854.736:400): pid=4344 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir487917857/syzkaller.ffyQjJ/361/memory.events" dev="sda1" ino=16834 res=1 [ 1578.014859] lowmem_reserve[]: 0 0 2 2 [ 1578.019258] Node 0 Normal free:12kB min:28kB low:32kB high:36kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:786432kB managed:2204kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 1578.053046] audit: type=1804 audit(1551953854.836:401): pid=4344 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir487917857/syzkaller.ffyQjJ/361/memory.events" dev="sda1" ino=16834 res=1 [ 1578.084483] lowmem_reserve[]: 0 0 0 0 [ 1578.089611] Node 1 Normal free:3783684kB min:53624kB low:67028kB high:80432kB active_anon:0kB inactive_anon:0kB active_file:136kB inactive_file:0kB unevictable:0kB writepending:0kB present:3932160kB managed:3870184kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 1578.150594] lowmem_reserve[]: 0 0 0 0 [ 1578.158007] Node 0 DMA: 1*4kB (U) 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15908kB [ 1578.187855] Node 0 DMA32: 707*4kB (ME) 1515*8kB (ME) 422*16kB (ME) 67*32kB (UME) 37*64kB (ME) 156*128kB (ME) 162*256kB (ME) 231*512kB (UME) 119*1024kB (UME) 46*2048kB (UM) 121*4096kB (UM) = 917604kB [ 1578.222188] Node 0 Normal: 1*4kB (U) 1*8kB (U) 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 12kB [ 1578.242941] Node 1 Normal: 71*4kB (UME) 181*8kB (UE) 262*16kB (UE) 65*32kB (UM) 15*64kB (UME) 10*128kB (UE) 4*256kB (UM) 6*512kB (UME) 3*1024kB (ME) 1*2048kB (U) 919*4096kB (M) = 3783684kB [ 1578.277848] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 1578.297832] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 1578.327845] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 1578.347954] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 1578.356614] 59134 total pagecache pages [ 1578.367910] 0 pages in swap cache [ 1578.371499] Swap cache stats: add 0, delete 0, find 0/0 [ 1578.388493] Free swap = 0kB [ 1578.391620] Total swap = 0kB [ 1578.407844] 1965979 pages RAM [ 1578.411089] 0 pages HighMem/MovableOnly [ 1578.415148] 339411 pages reserved [ 1578.418868] 0 pages cma reserved 10:17:35 executing program 1: clone(0x4841ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, 0x0, 0x0) 10:17:35 executing program 3: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1000000040000001) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$FS_IOC_FSGETXATTR(r0, 0x802c550a, &(0x7f0000000100)={0x2, 0x0, 0x60, 0x740000, 0xf7ffffff7ff0bdbe}) 10:17:35 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1000000040000001) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$FS_IOC_FSGETXATTR(r0, 0x802c550a, &(0x7f0000000100)={0x2, 0x0, 0x60, 0x740000, 0xf7ffffff7ff0bdbe}) 10:17:35 executing program 2: mkdir(&(0x7f0000000a00)='./file0\x00', 0x48) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x0, 0x0) r0 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x2, 0x0) ioctl(r0, 0x0, &(0x7f0000000a80)="0d43671cfe81157a4328524278c325a86f82ca7a776bf35ad6435fc5d92cc7dd4ebee0d6a74b209788aad1bb0d9fdc631afc28787542538d04a3eedae846f66ef994e354dc1b6ca4a8c7430dafb69bf5684787f2bf739b6e90c60772b34b1acdfa94c903c7487d33b95fe0c631c63e2cbe03a9393ac9d7de9a3e31465b7ff322fb2b60d38f89954594056227e1da58f4b189845b962ee290") r2 = creat(&(0x7f0000000700)='./bus\x00', 0x0) setsockopt$netlink_NETLINK_RX_RING(r2, 0x10e, 0x6, &(0x7f0000000500)={0x7fffffff, 0x7fff, 0x200000000000000, 0x80000000}, 0xfffffe4b) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000380)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f00000002c0)) sched_setaffinity(0x0, 0x8, &(0x7f00000000c0)=0xd) setxattr$security_smack_entry(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000880)='security.SMACK64EXEC\x00', &(0x7f00000008c0)='syz1\x00', 0x5, 0x3) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) fchdir(r1) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)) setsockopt$inet6_udp_encap(r0, 0x11, 0x64, &(0x7f0000000200)=0x2, 0xffffffffffffff28) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000900)={{{@in6=@remote, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @broadcast}}, 0x0, @in=@empty}}, &(0x7f0000000b40)=0x5e) fchown(r3, r4, 0x0) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, &(0x7f0000000480)=@req3={0x0, 0x6, 0x14cbddd4, 0x0, 0x0, 0x0, 0x3}, 0x1c) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000140)={&(0x7f0000000740)=ANY=[]}}, 0x0) pivot_root(&(0x7f0000000240)='./file0\x00', &(0x7f0000000000)='./file0\x00') ftruncate(r2, 0x208200) r5 = getpid() sched_setscheduler(r5, 0x5, &(0x7f0000000000)) futex(&(0x7f0000000080)=0x2000000000000002, 0x6, 0x0, &(0x7f0000000b80), &(0x7f0000000bc0)=0x1, 0x0) write$uinput_user_dev(r1, &(0x7f0000000400)={'syz1\x00', {}, 0x25}, 0x45c) ioctl$UI_DEV_SETUP(r1, 0x5501, &(0x7f0000000300)={{}, 'syz0\x00'}) ioctl$UI_DEV_DESTROY(r1, 0x5502) fchdir(r0) mknod$loop(&(0x7f00000003c0)='./bus\x00', 0x2400, 0xffffffffffffffff) 10:17:35 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000080)={&(0x7f0000000040)='./file0\x00', r0}, 0x10) write$cgroup_subtree(r1, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0x200600) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x6, 0x0, &(0x7f0000000240)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xd}, 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000280)={0x0, r0}, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x2da8020000000000, 0x500001c) sendmsg(r0, 0x0, 0x0) write$cgroup_type(r1, 0x0, 0x0) mkdir(0x0, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) close(0xffffffffffffffff) 10:17:35 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000080)={&(0x7f0000000040)='./file0\x00', r0}, 0x10) write$cgroup_subtree(r1, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0x200600) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x6, 0x0, &(0x7f0000000240)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xd}, 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000280)={0x0, r0}, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x2da8020000000000, 0x500001c) sendmsg(r0, 0x0, 0x0) write$cgroup_type(r1, 0x0, 0x0) mkdir(0x0, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) close(0xffffffffffffffff) [ 1578.935394] syz-executor.1: vmalloc: allocation failure: 0 bytes, mode:0xcc0(GFP_KERNEL), nodemask=(null),cpuset=syz1,mems_allowed=0-1 [ 1578.975904] usb usb5: Requested nonsensical USBDEVFS_URB_ZERO_PACKET. [ 1578.995319] audit: type=1804 audit(1551953855.776:402): pid=4478 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir487917857/syzkaller.ffyQjJ/362/memory.events" dev="sda1" ino=17250 res=1 [ 1579.017033] CPU: 1 PID: 4475 Comm: syz-executor.1 Not tainted 5.0.0+ #10 [ 1579.029685] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1579.035904] vhci_hcd: invalid port number 255 [ 1579.039046] Call Trace: [ 1579.039066] dump_stack+0x172/0x1f0 [ 1579.039086] warn_alloc.cold+0x87/0x17f [ 1579.039101] ? zone_watermark_ok_safe+0x260/0x260 [ 1579.039116] ? lock_downgrade+0x880/0x880 [ 1579.039136] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1579.050935] vhci_hcd: default hub control req: feff vffff i00ff l65535 [ 1579.053779] ? avc_has_perm+0x404/0x610 [ 1579.063091] usb usb5: Requested nonsensical USBDEVFS_URB_ZERO_PACKET. [ 1579.068271] __vmalloc_node_range+0x48a/0x790 [ 1579.068293] ? sel_write_load+0x1de/0x470 [ 1579.068308] vmalloc+0x6b/0x90 [ 1579.068321] ? sel_write_load+0x1de/0x470 [ 1579.068333] sel_write_load+0x1de/0x470 [ 1579.068351] __vfs_write+0x116/0x8e0 [ 1579.079067] vhci_hcd: invalid port number 255 [ 1579.085573] ? sel_make_policy_nodes+0x1520/0x1520 [ 1579.085589] ? kernel_read+0x120/0x120 [ 1579.085628] ? rcu_read_lock_sched_held+0x110/0x130 [ 1579.085644] ? rcu_sync_lockdep_assert+0x73/0xb0 [ 1579.090567] vhci_hcd: default hub control req: feff vffff i00ff l65535 [ 1579.094262] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1579.144446] ? __sb_start_write+0x1ac/0x360 [ 1579.148771] vfs_write+0x20c/0x580 [ 1579.152314] ksys_write+0xea/0x1f0 [ 1579.155852] ? __ia32_sys_read+0xb0/0xb0 [ 1579.159926] ? do_syscall_64+0x26/0x610 [ 1579.163922] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1579.169279] ? do_syscall_64+0x26/0x610 [ 1579.173259] __x64_sys_write+0x73/0xb0 [ 1579.177161] do_syscall_64+0x103/0x610 [ 1579.181059] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1579.186300] RIP: 0033:0x457f29 [ 1579.189494] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1579.208393] RSP: 002b:00007fe46159dc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1579.216083] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457f29 10:17:36 executing program 2: mkdir(&(0x7f0000000a00)='./file0\x00', 0x48) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x0, 0x0) r0 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x2, 0x0) ioctl(r0, 0x0, &(0x7f0000000a80)="0d43671cfe81157a4328524278c325a86f82ca7a776bf35ad6435fc5d92cc7dd4ebee0d6a74b209788aad1bb0d9fdc631afc28787542538d04a3eedae846f66ef994e354dc1b6ca4a8c7430dafb69bf5684787f2bf739b6e90c60772b34b1acdfa94c903c7487d33b95fe0c631c63e2cbe03a9393ac9d7de9a3e31465b7ff322fb2b60d38f89954594056227e1da58f4b189845b962ee290") r2 = creat(&(0x7f0000000700)='./bus\x00', 0x0) setsockopt$netlink_NETLINK_RX_RING(r2, 0x10e, 0x6, &(0x7f0000000500)={0x7fffffff, 0x7fff, 0x200000000000000, 0x80000000}, 0xfffffe4b) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000380)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f00000002c0)) sched_setaffinity(0x0, 0x8, &(0x7f00000000c0)=0xd) setxattr$security_smack_entry(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000880)='security.SMACK64EXEC\x00', &(0x7f00000008c0)='syz1\x00', 0x5, 0x3) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) fchdir(r1) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)) setsockopt$inet6_udp_encap(r0, 0x11, 0x64, &(0x7f0000000200)=0x2, 0xffffffffffffff28) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000900)={{{@in6=@remote, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @broadcast}}, 0x0, @in=@empty}}, &(0x7f0000000b40)=0x5e) fchown(r3, r4, 0x0) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, &(0x7f0000000480)=@req3={0x0, 0x6, 0x14cbddd4, 0x0, 0x0, 0x0, 0x3}, 0x1c) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000140)={&(0x7f0000000740)=ANY=[]}}, 0x0) pivot_root(&(0x7f0000000240)='./file0\x00', &(0x7f0000000000)='./file0\x00') ftruncate(r2, 0x208200) r5 = getpid() sched_setscheduler(r5, 0x5, &(0x7f0000000000)) futex(&(0x7f0000000080)=0x2000000000000002, 0x6, 0x0, &(0x7f0000000b80), &(0x7f0000000bc0)=0x1, 0x0) write$uinput_user_dev(r1, &(0x7f0000000400)={'syz1\x00', {}, 0x25}, 0x45c) ioctl$UI_DEV_SETUP(r1, 0x5501, &(0x7f0000000300)={{}, 'syz0\x00'}) ioctl$UI_DEV_DESTROY(r1, 0x5502) fchdir(r0) mknod$loop(&(0x7f00000003c0)='./bus\x00', 0x2400, 0xffffffffffffffff) [ 1579.223335] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003 [ 1579.230589] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1579.237882] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe46159e6d4 [ 1579.245134] R13: 00000000004c7481 R14: 00000000004dd080 R15: 00000000ffffffff [ 1579.262880] Mem-Info: [ 1579.265477] active_anon:72440 inactive_anon:194 isolated_anon:0 [ 1579.265477] active_file:18766 inactive_file:40154 isolated_file:0 [ 1579.265477] unevictable:6 dirty:933 writeback:0 unstable:0 [ 1579.265477] slab_reclaimable:15664 slab_unreclaimable:120306 [ 1579.265477] mapped:58948 shmem:256 pagetables:2070 bounce:0 [ 1579.265477] free:1243310 free_pcp:516 free_cma:0 [ 1579.299892] Node 0 active_anon:289760kB inactive_anon:776kB active_file:74928kB inactive_file:160716kB unevictable:24kB isolated(anon):0kB isolated(file):0kB mapped:235792kB dirty:3732kB writeback:0kB shmem:1024kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 157696kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 1579.328665] Node 1 active_anon:0kB inactive_anon:0kB active_file:136kB inactive_file:0kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:0kB dirty:0kB writeback:0kB shmem:0kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 1579.333281] audit: type=1804 audit(1551953856.116:403): pid=4482 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir035644212/syzkaller.yjejvs/35/memory.events" dev="sda1" ino=17346 res=1 [ 1579.355082] Node 0 DMA free:15908kB min:220kB low:272kB high:324kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 1579.448119] lowmem_reserve[]: 0 2553 2555 2555 [ 1579.453018] Node 0 DMA32 free:1171920kB min:36232kB low:45288kB high:54344kB active_anon:291912kB inactive_anon:776kB active_file:74928kB inactive_file:161316kB unevictable:24kB writepending:3732kB present:3129332kB managed:2617976kB mlocked:0kB kernel_stack:10048kB pagetables:8280kB bounce:0kB free_pcp:1824kB local_pcp:1368kB free_cma:0kB 10:17:36 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000080)={&(0x7f0000000040)='./file0\x00', r0}, 0x10) write$cgroup_subtree(r1, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0x200600) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x6, 0x0, &(0x7f0000000240)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xd}, 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000280)={0x0, r0}, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x2da8020000000000, 0x500001c) sendmsg(r0, 0x0, 0x0) write$cgroup_type(r1, 0x0, 0x0) mkdir(0x0, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) close(0xffffffffffffffff) 10:17:36 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1000000040000001) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$FS_IOC_FSGETXATTR(r0, 0x802c550a, &(0x7f0000000100)={0x2, 0x0, 0x60, 0x740000, 0xf7ffffff7ff0bdbe}) [ 1579.669490] lowmem_reserve[]: 0 0 2 2 [ 1579.693666] Node 0 Normal free:12kB min:28kB low:32kB high:36kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:786432kB managed:2204kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB 10:17:36 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000080)={&(0x7f0000000040)='./file0\x00', r0}, 0x10) write$cgroup_subtree(r1, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0x200600) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x6, 0x0, &(0x7f0000000240)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xd}, 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000280)={0x0, r0}, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x2da8020000000000, 0x500001c) sendmsg(r0, 0x0, 0x0) write$cgroup_type(r1, 0x0, 0x0) mkdir(0x0, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) close(0xffffffffffffffff) [ 1579.788375] usb usb5: Requested nonsensical USBDEVFS_URB_ZERO_PACKET. [ 1579.795547] vhci_hcd: invalid port number 255 [ 1579.824665] audit: type=1804 audit(1551953856.606:404): pid=4495 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir096658226/syzkaller.d8JTRp/101/memory.events" dev="sda1" ino=17196 res=1 [ 1579.853495] lowmem_reserve[]: 0 0 0 0 [ 1579.854936] vhci_hcd: default hub control req: feff vffff i00ff l65535 [ 1579.882491] Node 1 Normal free:3783684kB min:53624kB low:67028kB high:80432kB active_anon:0kB inactive_anon:0kB active_file:136kB inactive_file:0kB unevictable:0kB writepending:0kB present:3932160kB managed:3870184kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB 10:17:36 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000080)={&(0x7f0000000040)='./file0\x00', r0}, 0x10) write$cgroup_subtree(r1, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0x200600) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x6, 0x0, &(0x7f0000000240)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xd}, 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000280)={0x0, r0}, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x2da8020000000000, 0x500001c) sendmsg(r0, 0x0, 0x0) write$cgroup_type(r1, 0x0, 0x0) mkdir(0x0, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) close(0xffffffffffffffff) [ 1579.969461] audit: type=1804 audit(1551953856.726:405): pid=4498 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir459614559/syzkaller.x4jDKN/95/memory.events" dev="sda1" ino=16597 res=1 10:17:36 executing program 4: mkdir(&(0x7f0000000a00)='./file0\x00', 0x48) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x0, 0x0) r0 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x2, 0x0) ioctl(r0, 0x0, &(0x7f0000000a80)="0d43671cfe81157a4328524278c325a86f82ca7a776bf35ad6435fc5d92cc7dd4ebee0d6a74b209788aad1bb0d9fdc631afc28787542538d04a3eedae846f66ef994e354dc1b6ca4a8c7430dafb69bf5684787f2bf739b6e90c60772b34b1acdfa94c903c7487d33b95fe0c631c63e2cbe03a9393ac9d7de9a3e31465b7ff322fb2b60d38f89954594056227e1da58f4b189845b962ee290") r2 = creat(&(0x7f0000000700)='./bus\x00', 0x0) setsockopt$netlink_NETLINK_RX_RING(r2, 0x10e, 0x6, &(0x7f0000000500)={0x7fffffff, 0x7fff, 0x200000000000000, 0x80000000}, 0xfffffe4b) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000380)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f00000002c0)) sched_setaffinity(0x0, 0x8, &(0x7f00000000c0)=0xd) setxattr$security_smack_entry(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000880)='security.SMACK64EXEC\x00', &(0x7f00000008c0)='syz1\x00', 0x5, 0x3) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) fchdir(r1) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)) setsockopt$inet6_udp_encap(r0, 0x11, 0x64, &(0x7f0000000200)=0x2, 0xffffffffffffff28) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000900)={{{@in6=@remote, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @broadcast}}, 0x0, @in=@empty}}, &(0x7f0000000b40)=0x5e) fchown(r3, r4, 0x0) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, &(0x7f0000000480)=@req3={0x0, 0x6, 0x14cbddd4, 0x0, 0x0, 0x0, 0x3}, 0x1c) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000140)={&(0x7f0000000740)=ANY=[]}}, 0x0) pivot_root(&(0x7f0000000240)='./file0\x00', &(0x7f0000000000)='./file0\x00') ftruncate(r2, 0x208200) r5 = getpid() sched_setscheduler(r5, 0x5, &(0x7f0000000000)) futex(&(0x7f0000000080)=0x2000000000000002, 0x6, 0x0, &(0x7f0000000b80), &(0x7f0000000bc0)=0x1, 0x0) write$uinput_user_dev(r1, &(0x7f0000000400)={'syz1\x00', {}, 0x25}, 0x45c) ioctl$UI_DEV_SETUP(r1, 0x5501, &(0x7f0000000300)={{}, 'syz0\x00'}) ioctl$UI_DEV_DESTROY(r1, 0x5502) fchdir(r0) mknod$loop(&(0x7f00000003c0)='./bus\x00', 0x2400, 0xffffffffffffffff) [ 1580.235682] lowmem_reserve[]: 0 0 0 0 [ 1580.261104] audit: type=1804 audit(1551953857.036:406): pid=4503 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir487917857/syzkaller.ffyQjJ/363/memory.events" dev="sda1" ino=16834 res=1 [ 1580.273401] Node 0 DMA: 1*4kB (U) 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15908kB [ 1580.379908] input: syz1 as /devices/virtual/input/input88 [ 1580.501832] Node 0 DMA32: 1224*4kB (UE) 5041*8kB (UME) 2372*16kB (UME) 1117*32kB (UME) 725*64kB (UME) 580*128kB (UME) 423*256kB (UME) 237*512kB (UME) 112*1024kB (UME) 43*2048kB (UM) 121*4096kB (UM) = 1167560kB [ 1580.622060] Node 0 Normal: 1*4kB (U) 1*8kB (U) 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 12kB [ 1580.694019] Node 1 Normal: 71*4kB (UME) 181*8kB (UE) 262*16kB (UE) 65*32kB (UM) 15*64kB (UME) 10*128kB (UE) 4*256kB (UM) 6*512kB (UME) 3*1024kB (ME) 1*2048kB (U) 919*4096kB (M) = 3783684kB [ 1580.778594] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 1580.787473] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 1580.827820] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 1580.867878] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB 10:17:37 executing program 4: mkdir(&(0x7f0000000a00)='./file0\x00', 0x48) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x0, 0x0) r0 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x2, 0x0) ioctl(r0, 0x0, &(0x7f0000000a80)="0d43671cfe81157a4328524278c325a86f82ca7a776bf35ad6435fc5d92cc7dd4ebee0d6a74b209788aad1bb0d9fdc631afc28787542538d04a3eedae846f66ef994e354dc1b6ca4a8c7430dafb69bf5684787f2bf739b6e90c60772b34b1acdfa94c903c7487d33b95fe0c631c63e2cbe03a9393ac9d7de9a3e31465b7ff322fb2b60d38f89954594056227e1da58f4b189845b962ee290") r2 = creat(&(0x7f0000000700)='./bus\x00', 0x0) setsockopt$netlink_NETLINK_RX_RING(r2, 0x10e, 0x6, &(0x7f0000000500)={0x7fffffff, 0x7fff, 0x200000000000000, 0x80000000}, 0xfffffe4b) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000380)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f00000002c0)) sched_setaffinity(0x0, 0x8, &(0x7f00000000c0)=0xd) setxattr$security_smack_entry(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000880)='security.SMACK64EXEC\x00', &(0x7f00000008c0)='syz1\x00', 0x5, 0x3) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) fchdir(r1) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)) setsockopt$inet6_udp_encap(r0, 0x11, 0x64, &(0x7f0000000200)=0x2, 0xffffffffffffff28) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000900)={{{@in6=@remote, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @broadcast}}, 0x0, @in=@empty}}, &(0x7f0000000b40)=0x5e) fchown(r3, r4, 0x0) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, &(0x7f0000000480)=@req3={0x0, 0x6, 0x14cbddd4, 0x0, 0x0, 0x0, 0x3}, 0x1c) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000140)={&(0x7f0000000740)=ANY=[]}}, 0x0) pivot_root(&(0x7f0000000240)='./file0\x00', &(0x7f0000000000)='./file0\x00') ftruncate(r2, 0x208200) r5 = getpid() sched_setscheduler(r5, 0x5, &(0x7f0000000000)) futex(&(0x7f0000000080)=0x2000000000000002, 0x6, 0x0, &(0x7f0000000b80), &(0x7f0000000bc0)=0x1, 0x0) write$uinput_user_dev(r1, &(0x7f0000000400)={'syz1\x00', {}, 0x25}, 0x45c) ioctl$UI_DEV_SETUP(r1, 0x5501, &(0x7f0000000300)={{}, 'syz0\x00'}) ioctl$UI_DEV_DESTROY(r1, 0x5502) fchdir(r0) mknod$loop(&(0x7f00000003c0)='./bus\x00', 0x2400, 0xffffffffffffffff) 10:17:37 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000080)={&(0x7f0000000040)='./file0\x00', r0}, 0x10) write$cgroup_subtree(r1, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0x200600) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x6, 0x0, &(0x7f0000000240)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xd}, 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000280)={0x0, r0}, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x2da8020000000000, 0x500001c) sendmsg(r0, 0x0, 0x0) write$cgroup_type(r1, 0x0, 0x0) mkdir(0x0, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) close(0xffffffffffffffff) 10:17:37 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000080)={&(0x7f0000000040)='./file0\x00', r0}, 0x10) write$cgroup_subtree(r1, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0x200600) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x6, 0x0, &(0x7f0000000240)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xd}, 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000280)={0x0, r0}, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x2da8020000000000, 0x500001c) sendmsg(r0, 0x0, 0x0) write$cgroup_type(r1, 0x0, 0x0) mkdir(0x0, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) close(0xffffffffffffffff) 10:17:37 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000080)={&(0x7f0000000040)='./file0\x00', r0}, 0x10) write$cgroup_subtree(r1, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0x200600) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x6, 0x0, &(0x7f0000000240)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xd}, 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000280)={0x0, r0}, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x2da8020000000000, 0x500001c) sendmsg(r0, 0x0, 0x0) write$cgroup_type(r1, 0x0, 0x0) mkdir(0x0, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) close(0xffffffffffffffff) [ 1580.886534] 59694 total pagecache pages [ 1580.890653] 0 pages in swap cache [ 1580.894186] Swap cache stats: add 0, delete 0, find 0/0 [ 1580.908113] Free swap = 0kB [ 1580.911202] Total swap = 0kB [ 1580.916885] 1965979 pages RAM [ 1580.923047] 0 pages HighMem/MovableOnly [ 1580.927093] 339411 pages reserved [ 1580.930691] 0 pages cma reserved 10:17:37 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000080)={&(0x7f0000000040)='./file0\x00', r0}, 0x10) write$cgroup_subtree(r1, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0x200600) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x6, 0x0, &(0x7f0000000240)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xd}, 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000280)={0x0, r0}, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x2da8020000000000, 0x500001c) sendmsg(r0, 0x0, 0x0) write$cgroup_type(r1, 0x0, 0x0) mkdir(0x0, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) close(0xffffffffffffffff) 10:17:37 executing program 1: mkdir(&(0x7f0000000a00)='./file0\x00', 0x48) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x0, 0x0) r0 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x2, 0x0) ioctl(r0, 0x0, &(0x7f0000000a80)="0d43671cfe81157a4328524278c325a86f82ca7a776bf35ad6435fc5d92cc7dd4ebee0d6a74b209788aad1bb0d9fdc631afc28787542538d04a3eedae846f66ef994e354dc1b6ca4a8c7430dafb69bf5684787f2bf739b6e90c60772b34b1acdfa94c903c7487d33b95fe0c631c63e2cbe03a9393ac9d7de9a3e31465b7ff322fb2b60d38f89954594056227e1da58f4b189845b962ee290") r2 = creat(&(0x7f0000000700)='./bus\x00', 0x0) setsockopt$netlink_NETLINK_RX_RING(r2, 0x10e, 0x6, &(0x7f0000000500)={0x7fffffff, 0x7fff, 0x200000000000000, 0x80000000}, 0xfffffe4b) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000380)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f00000002c0)) sched_setaffinity(0x0, 0x8, &(0x7f00000000c0)=0xd) setxattr$security_smack_entry(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000880)='security.SMACK64EXEC\x00', &(0x7f00000008c0)='syz1\x00', 0x5, 0x3) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) fchdir(r1) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)) setsockopt$inet6_udp_encap(r0, 0x11, 0x64, &(0x7f0000000200)=0x2, 0xffffffffffffff28) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000900)={{{@in6=@remote, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @broadcast}}, 0x0, @in=@empty}}, &(0x7f0000000b40)=0x5e) fchown(r3, r4, 0x0) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, &(0x7f0000000480)=@req3={0x0, 0x6, 0x14cbddd4, 0x0, 0x0, 0x0, 0x3}, 0x1c) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000140)={&(0x7f0000000740)=ANY=[]}}, 0x0) pivot_root(&(0x7f0000000240)='./file0\x00', &(0x7f0000000000)='./file0\x00') ftruncate(r2, 0x208200) r5 = getpid() sched_setscheduler(r5, 0x5, &(0x7f0000000000)) futex(&(0x7f0000000080)=0x2000000000000002, 0x6, 0x0, &(0x7f0000000b80), &(0x7f0000000bc0)=0x1, 0x0) write$uinput_user_dev(r1, &(0x7f0000000400)={'syz1\x00', {}, 0x25}, 0x45c) ioctl$UI_DEV_SETUP(r1, 0x5501, &(0x7f0000000300)={{}, 'syz0\x00'}) ioctl$UI_DEV_DESTROY(r1, 0x5502) fchdir(r0) mknod$loop(&(0x7f00000003c0)='./bus\x00', 0x2400, 0xffffffffffffffff) [ 1581.045462] audit: type=1804 audit(1551953857.826:407): pid=4522 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir035644212/syzkaller.yjejvs/36/memory.events" dev="sda1" ino=16741 res=1 10:17:38 executing program 4: mkdir(&(0x7f0000000a00)='./file0\x00', 0x48) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x0, 0x0) r0 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x2, 0x0) ioctl(r0, 0x0, &(0x7f0000000a80)="0d43671cfe81157a4328524278c325a86f82ca7a776bf35ad6435fc5d92cc7dd4ebee0d6a74b209788aad1bb0d9fdc631afc28787542538d04a3eedae846f66ef994e354dc1b6ca4a8c7430dafb69bf5684787f2bf739b6e90c60772b34b1acdfa94c903c7487d33b95fe0c631c63e2cbe03a9393ac9d7de9a3e31465b7ff322fb2b60d38f89954594056227e1da58f4b189845b962ee290") r2 = creat(&(0x7f0000000700)='./bus\x00', 0x0) setsockopt$netlink_NETLINK_RX_RING(r2, 0x10e, 0x6, &(0x7f0000000500)={0x7fffffff, 0x7fff, 0x200000000000000, 0x80000000}, 0xfffffe4b) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000380)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f00000002c0)) sched_setaffinity(0x0, 0x8, &(0x7f00000000c0)=0xd) setxattr$security_smack_entry(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000880)='security.SMACK64EXEC\x00', &(0x7f00000008c0)='syz1\x00', 0x5, 0x3) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) fchdir(r1) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)) setsockopt$inet6_udp_encap(r0, 0x11, 0x64, &(0x7f0000000200)=0x2, 0xffffffffffffff28) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000900)={{{@in6=@remote, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @broadcast}}, 0x0, @in=@empty}}, &(0x7f0000000b40)=0x5e) fchown(r3, r4, 0x0) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, &(0x7f0000000480)=@req3={0x0, 0x6, 0x14cbddd4, 0x0, 0x0, 0x0, 0x3}, 0x1c) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000140)={&(0x7f0000000740)=ANY=[]}}, 0x0) pivot_root(&(0x7f0000000240)='./file0\x00', &(0x7f0000000000)='./file0\x00') ftruncate(r2, 0x208200) r5 = getpid() sched_setscheduler(r5, 0x5, &(0x7f0000000000)) futex(&(0x7f0000000080)=0x2000000000000002, 0x6, 0x0, &(0x7f0000000b80), &(0x7f0000000bc0)=0x1, 0x0) write$uinput_user_dev(r1, &(0x7f0000000400)={'syz1\x00', {}, 0x25}, 0x45c) ioctl$UI_DEV_SETUP(r1, 0x5501, &(0x7f0000000300)={{}, 'syz0\x00'}) ioctl$UI_DEV_DESTROY(r1, 0x5502) fchdir(r0) mknod$loop(&(0x7f00000003c0)='./bus\x00', 0x2400, 0xffffffffffffffff) [ 1581.230247] input: syz1 as /devices/virtual/input/input89 [ 1581.249410] audit: type=1804 audit(1551953857.866:408): pid=4525 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir096658226/syzkaller.d8JTRp/102/memory.events" dev="sda1" ino=16834 res=1 10:17:38 executing program 1: mkdir(&(0x7f0000000a00)='./file0\x00', 0x48) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x0, 0x0) r0 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x2, 0x0) ioctl(r0, 0x0, &(0x7f0000000a80)="0d43671cfe81157a4328524278c325a86f82ca7a776bf35ad6435fc5d92cc7dd4ebee0d6a74b209788aad1bb0d9fdc631afc28787542538d04a3eedae846f66ef994e354dc1b6ca4a8c7430dafb69bf5684787f2bf739b6e90c60772b34b1acdfa94c903c7487d33b95fe0c631c63e2cbe03a9393ac9d7de9a3e31465b7ff322fb2b60d38f89954594056227e1da58f4b189845b962ee290") r2 = creat(&(0x7f0000000700)='./bus\x00', 0x0) setsockopt$netlink_NETLINK_RX_RING(r2, 0x10e, 0x6, &(0x7f0000000500)={0x7fffffff, 0x7fff, 0x200000000000000, 0x80000000}, 0xfffffe4b) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000380)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f00000002c0)) sched_setaffinity(0x0, 0x8, &(0x7f00000000c0)=0xd) setxattr$security_smack_entry(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000880)='security.SMACK64EXEC\x00', &(0x7f00000008c0)='syz1\x00', 0x5, 0x3) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) fchdir(r1) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)) setsockopt$inet6_udp_encap(r0, 0x11, 0x64, &(0x7f0000000200)=0x2, 0xffffffffffffff28) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000900)={{{@in6=@remote, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @broadcast}}, 0x0, @in=@empty}}, &(0x7f0000000b40)=0x5e) fchown(r3, r4, 0x0) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, &(0x7f0000000480)=@req3={0x0, 0x6, 0x14cbddd4, 0x0, 0x0, 0x0, 0x3}, 0x1c) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000140)={&(0x7f0000000740)=ANY=[]}}, 0x0) pivot_root(&(0x7f0000000240)='./file0\x00', &(0x7f0000000000)='./file0\x00') ftruncate(r2, 0x208200) r5 = getpid() sched_setscheduler(r5, 0x5, &(0x7f0000000000)) futex(&(0x7f0000000080)=0x2000000000000002, 0x6, 0x0, &(0x7f0000000b80), &(0x7f0000000bc0)=0x1, 0x0) write$uinput_user_dev(r1, &(0x7f0000000400)={'syz1\x00', {}, 0x25}, 0x45c) ioctl$UI_DEV_SETUP(r1, 0x5501, &(0x7f0000000300)={{}, 'syz0\x00'}) ioctl$UI_DEV_DESTROY(r1, 0x5502) fchdir(r0) mknod$loop(&(0x7f00000003c0)='./bus\x00', 0x2400, 0xffffffffffffffff) 10:17:38 executing program 4: mkdir(&(0x7f0000000a00)='./file0\x00', 0x48) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x0, 0x0) r0 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x2, 0x0) ioctl(r0, 0x0, &(0x7f0000000a80)="0d43671cfe81157a4328524278c325a86f82ca7a776bf35ad6435fc5d92cc7dd4ebee0d6a74b209788aad1bb0d9fdc631afc28787542538d04a3eedae846f66ef994e354dc1b6ca4a8c7430dafb69bf5684787f2bf739b6e90c60772b34b1acdfa94c903c7487d33b95fe0c631c63e2cbe03a9393ac9d7de9a3e31465b7ff322fb2b60d38f89954594056227e1da58f4b189845b962ee290") r2 = creat(&(0x7f0000000700)='./bus\x00', 0x0) setsockopt$netlink_NETLINK_RX_RING(r2, 0x10e, 0x6, &(0x7f0000000500)={0x7fffffff, 0x7fff, 0x200000000000000, 0x80000000}, 0xfffffe4b) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000380)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f00000002c0)) sched_setaffinity(0x0, 0x8, &(0x7f00000000c0)=0xd) setxattr$security_smack_entry(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000880)='security.SMACK64EXEC\x00', &(0x7f00000008c0)='syz1\x00', 0x5, 0x3) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) fchdir(r1) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)) setsockopt$inet6_udp_encap(r0, 0x11, 0x64, &(0x7f0000000200)=0x2, 0xffffffffffffff28) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000900)={{{@in6=@remote, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @broadcast}}, 0x0, @in=@empty}}, &(0x7f0000000b40)=0x5e) fchown(r3, r4, 0x0) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, &(0x7f0000000480)=@req3={0x0, 0x6, 0x14cbddd4, 0x0, 0x0, 0x0, 0x3}, 0x1c) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000140)={&(0x7f0000000740)=ANY=[]}}, 0x0) pivot_root(&(0x7f0000000240)='./file0\x00', &(0x7f0000000000)='./file0\x00') ftruncate(r2, 0x208200) r5 = getpid() sched_setscheduler(r5, 0x5, &(0x7f0000000000)) futex(&(0x7f0000000080)=0x2000000000000002, 0x6, 0x0, &(0x7f0000000b80), &(0x7f0000000bc0)=0x1, 0x0) write$uinput_user_dev(r1, &(0x7f0000000400)={'syz1\x00', {}, 0x25}, 0x45c) ioctl$UI_DEV_SETUP(r1, 0x5501, &(0x7f0000000300)={{}, 'syz0\x00'}) ioctl$UI_DEV_DESTROY(r1, 0x5502) fchdir(r0) mknod$loop(&(0x7f00000003c0)='./bus\x00', 0x2400, 0xffffffffffffffff) 10:17:38 executing program 1: mkdir(&(0x7f0000000a00)='./file0\x00', 0x48) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x0, 0x0) r0 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x2, 0x0) ioctl(r0, 0x0, &(0x7f0000000a80)="0d43671cfe81157a4328524278c325a86f82ca7a776bf35ad6435fc5d92cc7dd4ebee0d6a74b209788aad1bb0d9fdc631afc28787542538d04a3eedae846f66ef994e354dc1b6ca4a8c7430dafb69bf5684787f2bf739b6e90c60772b34b1acdfa94c903c7487d33b95fe0c631c63e2cbe03a9393ac9d7de9a3e31465b7ff322fb2b60d38f89954594056227e1da58f4b189845b962ee290") r2 = creat(&(0x7f0000000700)='./bus\x00', 0x0) setsockopt$netlink_NETLINK_RX_RING(r2, 0x10e, 0x6, &(0x7f0000000500)={0x7fffffff, 0x7fff, 0x200000000000000, 0x80000000}, 0xfffffe4b) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000380)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f00000002c0)) sched_setaffinity(0x0, 0x8, &(0x7f00000000c0)=0xd) setxattr$security_smack_entry(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000880)='security.SMACK64EXEC\x00', &(0x7f00000008c0)='syz1\x00', 0x5, 0x3) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) fchdir(r1) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)) setsockopt$inet6_udp_encap(r0, 0x11, 0x64, &(0x7f0000000200)=0x2, 0xffffffffffffff28) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000900)={{{@in6=@remote, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @broadcast}}, 0x0, @in=@empty}}, &(0x7f0000000b40)=0x5e) fchown(r3, r4, 0x0) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, &(0x7f0000000480)=@req3={0x0, 0x6, 0x14cbddd4, 0x0, 0x0, 0x0, 0x3}, 0x1c) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000140)={&(0x7f0000000740)=ANY=[]}}, 0x0) pivot_root(&(0x7f0000000240)='./file0\x00', &(0x7f0000000000)='./file0\x00') ftruncate(r2, 0x208200) r5 = getpid() sched_setscheduler(r5, 0x5, &(0x7f0000000000)) futex(&(0x7f0000000080)=0x2000000000000002, 0x6, 0x0, &(0x7f0000000b80), &(0x7f0000000bc0)=0x1, 0x0) write$uinput_user_dev(r1, &(0x7f0000000400)={'syz1\x00', {}, 0x25}, 0x45c) ioctl$UI_DEV_SETUP(r1, 0x5501, &(0x7f0000000300)={{}, 'syz0\x00'}) ioctl$UI_DEV_DESTROY(r1, 0x5502) fchdir(r0) mknod$loop(&(0x7f00000003c0)='./bus\x00', 0x2400, 0xffffffffffffffff) 10:17:38 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000080)={&(0x7f0000000040)='./file0\x00', r0}, 0x10) write$cgroup_subtree(r1, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0x200600) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x6, 0x0, &(0x7f0000000240)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xd}, 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000280)={0x0, r0}, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x2da8020000000000, 0x500001c) sendmsg(r0, 0x0, 0x0) write$cgroup_type(r1, 0x0, 0x0) mkdir(0x0, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) close(0xffffffffffffffff) 10:17:38 executing program 4: mkdir(&(0x7f0000000a00)='./file0\x00', 0x48) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x0, 0x0) r0 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x2, 0x0) ioctl(r0, 0x0, &(0x7f0000000a80)="0d43671cfe81157a4328524278c325a86f82ca7a776bf35ad6435fc5d92cc7dd4ebee0d6a74b209788aad1bb0d9fdc631afc28787542538d04a3eedae846f66ef994e354dc1b6ca4a8c7430dafb69bf5684787f2bf739b6e90c60772b34b1acdfa94c903c7487d33b95fe0c631c63e2cbe03a9393ac9d7de9a3e31465b7ff322fb2b60d38f89954594056227e1da58f4b189845b962ee290") r2 = creat(&(0x7f0000000700)='./bus\x00', 0x0) setsockopt$netlink_NETLINK_RX_RING(r2, 0x10e, 0x6, &(0x7f0000000500)={0x7fffffff, 0x7fff, 0x200000000000000, 0x80000000}, 0xfffffe4b) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000380)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f00000002c0)) sched_setaffinity(0x0, 0x8, &(0x7f00000000c0)=0xd) setxattr$security_smack_entry(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000880)='security.SMACK64EXEC\x00', &(0x7f00000008c0)='syz1\x00', 0x5, 0x3) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) fchdir(r1) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)) setsockopt$inet6_udp_encap(r0, 0x11, 0x64, &(0x7f0000000200)=0x2, 0xffffffffffffff28) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000900)={{{@in6=@remote, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @broadcast}}, 0x0, @in=@empty}}, &(0x7f0000000b40)=0x5e) fchown(r3, r4, 0x0) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, &(0x7f0000000480)=@req3={0x0, 0x6, 0x14cbddd4, 0x0, 0x0, 0x0, 0x3}, 0x1c) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000140)={&(0x7f0000000740)=ANY=[]}}, 0x0) pivot_root(&(0x7f0000000240)='./file0\x00', &(0x7f0000000000)='./file0\x00') ftruncate(r2, 0x208200) r5 = getpid() sched_setscheduler(r5, 0x5, &(0x7f0000000000)) futex(&(0x7f0000000080)=0x2000000000000002, 0x6, 0x0, &(0x7f0000000b80), &(0x7f0000000bc0)=0x1, 0x0) write$uinput_user_dev(r1, &(0x7f0000000400)={'syz1\x00', {}, 0x25}, 0x45c) ioctl$UI_DEV_SETUP(r1, 0x5501, &(0x7f0000000300)={{}, 'syz0\x00'}) ioctl$UI_DEV_DESTROY(r1, 0x5502) fchdir(r0) mknod$loop(&(0x7f00000003c0)='./bus\x00', 0x2400, 0xffffffffffffffff) 10:17:38 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000080)={&(0x7f0000000040)='./file0\x00', r0}, 0x10) write$cgroup_subtree(r1, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0x200600) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x6, 0x0, &(0x7f0000000240)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xd}, 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000280)={0x0, r0}, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x2da8020000000000, 0x500001c) sendmsg(r0, 0x0, 0x0) write$cgroup_type(r1, 0x0, 0x0) mkdir(0x0, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) close(0xffffffffffffffff) 10:17:38 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000080)={&(0x7f0000000040)='./file0\x00', r0}, 0x10) write$cgroup_subtree(r1, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0x200600) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x6, 0x0, &(0x7f0000000240)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xd}, 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000280)={0x0, r0}, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x2da8020000000000, 0x500001c) sendmsg(r0, 0x0, 0x0) write$cgroup_type(r1, 0x0, 0x0) mkdir(0x0, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) close(0xffffffffffffffff) 10:17:38 executing program 5: mkdir(&(0x7f0000000a00)='./file0\x00', 0x48) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x0, 0x0) r0 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x2, 0x0) ioctl(r0, 0x0, &(0x7f0000000a80)="0d43671cfe81157a4328524278c325a86f82ca7a776bf35ad6435fc5d92cc7dd4ebee0d6a74b209788aad1bb0d9fdc631afc28787542538d04a3eedae846f66ef994e354dc1b6ca4a8c7430dafb69bf5684787f2bf739b6e90c60772b34b1acdfa94c903c7487d33b95fe0c631c63e2cbe03a9393ac9d7de9a3e31465b7ff322fb2b60d38f89954594056227e1da58f4b189845b962ee290") r2 = creat(&(0x7f0000000700)='./bus\x00', 0x0) setsockopt$netlink_NETLINK_RX_RING(r2, 0x10e, 0x6, &(0x7f0000000500)={0x7fffffff, 0x7fff, 0x200000000000000, 0x80000000}, 0xfffffe4b) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000380)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f00000002c0)) sched_setaffinity(0x0, 0x8, &(0x7f00000000c0)=0xd) setxattr$security_smack_entry(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000880)='security.SMACK64EXEC\x00', &(0x7f00000008c0)='syz1\x00', 0x5, 0x3) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) fchdir(r1) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)) setsockopt$inet6_udp_encap(r0, 0x11, 0x64, &(0x7f0000000200)=0x2, 0xffffffffffffff28) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000900)={{{@in6=@remote, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @broadcast}}, 0x0, @in=@empty}}, &(0x7f0000000b40)=0x5e) fchown(r3, r4, 0x0) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, &(0x7f0000000480)=@req3={0x0, 0x6, 0x14cbddd4, 0x0, 0x0, 0x0, 0x3}, 0x1c) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000140)={&(0x7f0000000740)=ANY=[]}}, 0x0) pivot_root(&(0x7f0000000240)='./file0\x00', &(0x7f0000000000)='./file0\x00') ftruncate(r2, 0x208200) r5 = getpid() sched_setscheduler(r5, 0x5, &(0x7f0000000000)) futex(&(0x7f0000000080)=0x2000000000000002, 0x6, 0x0, &(0x7f0000000b80), &(0x7f0000000bc0)=0x1, 0x0) write$uinput_user_dev(r1, &(0x7f0000000400)={'syz1\x00', {}, 0x25}, 0x45c) ioctl$UI_DEV_SETUP(r1, 0x5501, &(0x7f0000000300)={{}, 'syz0\x00'}) ioctl$UI_DEV_DESTROY(r1, 0x5502) fchdir(r0) mknod$loop(&(0x7f00000003c0)='./bus\x00', 0x2400, 0xffffffffffffffff) 10:17:39 executing program 4: mkdir(&(0x7f0000000a00)='./file0\x00', 0x48) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x0, 0x0) r0 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x2, 0x0) ioctl(r0, 0x0, &(0x7f0000000a80)="0d43671cfe81157a4328524278c325a86f82ca7a776bf35ad6435fc5d92cc7dd4ebee0d6a74b209788aad1bb0d9fdc631afc28787542538d04a3eedae846f66ef994e354dc1b6ca4a8c7430dafb69bf5684787f2bf739b6e90c60772b34b1acdfa94c903c7487d33b95fe0c631c63e2cbe03a9393ac9d7de9a3e31465b7ff322fb2b60d38f89954594056227e1da58f4b189845b962ee290") r2 = creat(&(0x7f0000000700)='./bus\x00', 0x0) setsockopt$netlink_NETLINK_RX_RING(r2, 0x10e, 0x6, &(0x7f0000000500)={0x7fffffff, 0x7fff, 0x200000000000000, 0x80000000}, 0xfffffe4b) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000380)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f00000002c0)) sched_setaffinity(0x0, 0x8, &(0x7f00000000c0)=0xd) setxattr$security_smack_entry(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000880)='security.SMACK64EXEC\x00', &(0x7f00000008c0)='syz1\x00', 0x5, 0x3) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) fchdir(r1) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)) setsockopt$inet6_udp_encap(r0, 0x11, 0x64, &(0x7f0000000200)=0x2, 0xffffffffffffff28) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000900)={{{@in6=@remote, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @broadcast}}, 0x0, @in=@empty}}, &(0x7f0000000b40)=0x5e) fchown(r3, r4, 0x0) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, &(0x7f0000000480)=@req3={0x0, 0x6, 0x14cbddd4, 0x0, 0x0, 0x0, 0x3}, 0x1c) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000140)={&(0x7f0000000740)=ANY=[]}}, 0x0) pivot_root(&(0x7f0000000240)='./file0\x00', &(0x7f0000000000)='./file0\x00') ftruncate(r2, 0x208200) r5 = getpid() sched_setscheduler(r5, 0x5, &(0x7f0000000000)) futex(&(0x7f0000000080)=0x2000000000000002, 0x6, 0x0, &(0x7f0000000b80), &(0x7f0000000bc0)=0x1, 0x0) write$uinput_user_dev(r1, &(0x7f0000000400)={'syz1\x00', {}, 0x25}, 0x45c) ioctl$UI_DEV_SETUP(r1, 0x5501, &(0x7f0000000300)={{}, 'syz0\x00'}) ioctl$UI_DEV_DESTROY(r1, 0x5502) fchdir(r0) mknod$loop(&(0x7f00000003c0)='./bus\x00', 0x2400, 0xffffffffffffffff) [ 1582.365609] kauditd_printk_skb: 4 callbacks suppressed [ 1582.365623] audit: type=1804 audit(1551953859.146:413): pid=4552 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir035644212/syzkaller.yjejvs/37/memory.events" dev="sda1" ino=17393 res=1 10:17:39 executing program 1: mkdir(&(0x7f0000000a00)='./file0\x00', 0x48) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x0, 0x0) r0 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x2, 0x0) ioctl(r0, 0x0, &(0x7f0000000a80)="0d43671cfe81157a4328524278c325a86f82ca7a776bf35ad6435fc5d92cc7dd4ebee0d6a74b209788aad1bb0d9fdc631afc28787542538d04a3eedae846f66ef994e354dc1b6ca4a8c7430dafb69bf5684787f2bf739b6e90c60772b34b1acdfa94c903c7487d33b95fe0c631c63e2cbe03a9393ac9d7de9a3e31465b7ff322fb2b60d38f89954594056227e1da58f4b189845b962ee290") r2 = creat(&(0x7f0000000700)='./bus\x00', 0x0) setsockopt$netlink_NETLINK_RX_RING(r2, 0x10e, 0x6, &(0x7f0000000500)={0x7fffffff, 0x7fff, 0x200000000000000, 0x80000000}, 0xfffffe4b) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000380)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f00000002c0)) sched_setaffinity(0x0, 0x8, &(0x7f00000000c0)=0xd) setxattr$security_smack_entry(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000880)='security.SMACK64EXEC\x00', &(0x7f00000008c0)='syz1\x00', 0x5, 0x3) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) fchdir(r1) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)) setsockopt$inet6_udp_encap(r0, 0x11, 0x64, &(0x7f0000000200)=0x2, 0xffffffffffffff28) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000900)={{{@in6=@remote, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @broadcast}}, 0x0, @in=@empty}}, &(0x7f0000000b40)=0x5e) fchown(r3, r4, 0x0) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, &(0x7f0000000480)=@req3={0x0, 0x6, 0x14cbddd4, 0x0, 0x0, 0x0, 0x3}, 0x1c) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000140)={&(0x7f0000000740)=ANY=[]}}, 0x0) pivot_root(&(0x7f0000000240)='./file0\x00', &(0x7f0000000000)='./file0\x00') ftruncate(r2, 0x208200) r5 = getpid() sched_setscheduler(r5, 0x5, &(0x7f0000000000)) futex(&(0x7f0000000080)=0x2000000000000002, 0x6, 0x0, &(0x7f0000000b80), &(0x7f0000000bc0)=0x1, 0x0) write$uinput_user_dev(r1, &(0x7f0000000400)={'syz1\x00', {}, 0x25}, 0x45c) ioctl$UI_DEV_SETUP(r1, 0x5501, &(0x7f0000000300)={{}, 'syz0\x00'}) ioctl$UI_DEV_DESTROY(r1, 0x5502) fchdir(r0) mknod$loop(&(0x7f00000003c0)='./bus\x00', 0x2400, 0xffffffffffffffff) [ 1582.464028] input: syz1 as /devices/virtual/input/input90 10:17:39 executing program 4: mkdir(&(0x7f0000000a00)='./file0\x00', 0x48) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x0, 0x0) r0 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x2, 0x0) ioctl(r0, 0x0, &(0x7f0000000a80)="0d43671cfe81157a4328524278c325a86f82ca7a776bf35ad6435fc5d92cc7dd4ebee0d6a74b209788aad1bb0d9fdc631afc28787542538d04a3eedae846f66ef994e354dc1b6ca4a8c7430dafb69bf5684787f2bf739b6e90c60772b34b1acdfa94c903c7487d33b95fe0c631c63e2cbe03a9393ac9d7de9a3e31465b7ff322fb2b60d38f89954594056227e1da58f4b189845b962ee290") r2 = creat(&(0x7f0000000700)='./bus\x00', 0x0) setsockopt$netlink_NETLINK_RX_RING(r2, 0x10e, 0x6, &(0x7f0000000500)={0x7fffffff, 0x7fff, 0x200000000000000, 0x80000000}, 0xfffffe4b) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000380)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f00000002c0)) sched_setaffinity(0x0, 0x8, &(0x7f00000000c0)=0xd) setxattr$security_smack_entry(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000880)='security.SMACK64EXEC\x00', &(0x7f00000008c0)='syz1\x00', 0x5, 0x3) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) fchdir(r1) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)) setsockopt$inet6_udp_encap(r0, 0x11, 0x64, &(0x7f0000000200)=0x2, 0xffffffffffffff28) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000900)={{{@in6=@remote, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @broadcast}}, 0x0, @in=@empty}}, &(0x7f0000000b40)=0x5e) fchown(r3, r4, 0x0) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, &(0x7f0000000480)=@req3={0x0, 0x6, 0x14cbddd4, 0x0, 0x0, 0x0, 0x3}, 0x1c) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000140)={&(0x7f0000000740)=ANY=[]}}, 0x0) pivot_root(&(0x7f0000000240)='./file0\x00', &(0x7f0000000000)='./file0\x00') ftruncate(r2, 0x208200) r5 = getpid() sched_setscheduler(r5, 0x5, &(0x7f0000000000)) futex(&(0x7f0000000080)=0x2000000000000002, 0x6, 0x0, &(0x7f0000000b80), &(0x7f0000000bc0)=0x1, 0x0) write$uinput_user_dev(r1, &(0x7f0000000400)={'syz1\x00', {}, 0x25}, 0x45c) ioctl$UI_DEV_SETUP(r1, 0x5501, &(0x7f0000000300)={{}, 'syz0\x00'}) ioctl$UI_DEV_DESTROY(r1, 0x5502) fchdir(r0) mknod$loop(&(0x7f00000003c0)='./bus\x00', 0x2400, 0xffffffffffffffff) 10:17:39 executing program 5: mkdir(&(0x7f0000000a00)='./file0\x00', 0x48) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x0, 0x0) r0 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x2, 0x0) ioctl(r0, 0x0, &(0x7f0000000a80)="0d43671cfe81157a4328524278c325a86f82ca7a776bf35ad6435fc5d92cc7dd4ebee0d6a74b209788aad1bb0d9fdc631afc28787542538d04a3eedae846f66ef994e354dc1b6ca4a8c7430dafb69bf5684787f2bf739b6e90c60772b34b1acdfa94c903c7487d33b95fe0c631c63e2cbe03a9393ac9d7de9a3e31465b7ff322fb2b60d38f89954594056227e1da58f4b189845b962ee290") r2 = creat(&(0x7f0000000700)='./bus\x00', 0x0) setsockopt$netlink_NETLINK_RX_RING(r2, 0x10e, 0x6, &(0x7f0000000500)={0x7fffffff, 0x7fff, 0x200000000000000, 0x80000000}, 0xfffffe4b) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000380)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f00000002c0)) sched_setaffinity(0x0, 0x8, &(0x7f00000000c0)=0xd) setxattr$security_smack_entry(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000880)='security.SMACK64EXEC\x00', &(0x7f00000008c0)='syz1\x00', 0x5, 0x3) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) fchdir(r1) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)) setsockopt$inet6_udp_encap(r0, 0x11, 0x64, &(0x7f0000000200)=0x2, 0xffffffffffffff28) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000900)={{{@in6=@remote, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @broadcast}}, 0x0, @in=@empty}}, &(0x7f0000000b40)=0x5e) fchown(r3, r4, 0x0) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, &(0x7f0000000480)=@req3={0x0, 0x6, 0x14cbddd4, 0x0, 0x0, 0x0, 0x3}, 0x1c) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000140)={&(0x7f0000000740)=ANY=[]}}, 0x0) pivot_root(&(0x7f0000000240)='./file0\x00', &(0x7f0000000000)='./file0\x00') ftruncate(r2, 0x208200) r5 = getpid() sched_setscheduler(r5, 0x5, &(0x7f0000000000)) futex(&(0x7f0000000080)=0x2000000000000002, 0x6, 0x0, &(0x7f0000000b80), &(0x7f0000000bc0)=0x1, 0x0) write$uinput_user_dev(r1, &(0x7f0000000400)={'syz1\x00', {}, 0x25}, 0x45c) ioctl$UI_DEV_SETUP(r1, 0x5501, &(0x7f0000000300)={{}, 'syz0\x00'}) ioctl$UI_DEV_DESTROY(r1, 0x5502) fchdir(r0) mknod$loop(&(0x7f00000003c0)='./bus\x00', 0x2400, 0xffffffffffffffff) 10:17:39 executing program 1: mkdir(&(0x7f0000000a00)='./file0\x00', 0x48) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x0, 0x0) r0 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x2, 0x0) ioctl(r0, 0x0, &(0x7f0000000a80)="0d43671cfe81157a4328524278c325a86f82ca7a776bf35ad6435fc5d92cc7dd4ebee0d6a74b209788aad1bb0d9fdc631afc28787542538d04a3eedae846f66ef994e354dc1b6ca4a8c7430dafb69bf5684787f2bf739b6e90c60772b34b1acdfa94c903c7487d33b95fe0c631c63e2cbe03a9393ac9d7de9a3e31465b7ff322fb2b60d38f89954594056227e1da58f4b189845b962ee290") r2 = creat(&(0x7f0000000700)='./bus\x00', 0x0) setsockopt$netlink_NETLINK_RX_RING(r2, 0x10e, 0x6, &(0x7f0000000500)={0x7fffffff, 0x7fff, 0x200000000000000, 0x80000000}, 0xfffffe4b) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000380)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f00000002c0)) sched_setaffinity(0x0, 0x8, &(0x7f00000000c0)=0xd) setxattr$security_smack_entry(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000880)='security.SMACK64EXEC\x00', &(0x7f00000008c0)='syz1\x00', 0x5, 0x3) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) fchdir(r1) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)) setsockopt$inet6_udp_encap(r0, 0x11, 0x64, &(0x7f0000000200)=0x2, 0xffffffffffffff28) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000900)={{{@in6=@remote, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @broadcast}}, 0x0, @in=@empty}}, &(0x7f0000000b40)=0x5e) fchown(r3, r4, 0x0) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, &(0x7f0000000480)=@req3={0x0, 0x6, 0x14cbddd4, 0x0, 0x0, 0x0, 0x3}, 0x1c) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000140)={&(0x7f0000000740)=ANY=[]}}, 0x0) pivot_root(&(0x7f0000000240)='./file0\x00', &(0x7f0000000000)='./file0\x00') ftruncate(r2, 0x208200) r5 = getpid() sched_setscheduler(r5, 0x5, &(0x7f0000000000)) futex(&(0x7f0000000080)=0x2000000000000002, 0x6, 0x0, &(0x7f0000000b80), &(0x7f0000000bc0)=0x1, 0x0) write$uinput_user_dev(r1, &(0x7f0000000400)={'syz1\x00', {}, 0x25}, 0x45c) ioctl$UI_DEV_SETUP(r1, 0x5501, &(0x7f0000000300)={{}, 'syz0\x00'}) ioctl$UI_DEV_DESTROY(r1, 0x5502) fchdir(r0) mknod$loop(&(0x7f00000003c0)='./bus\x00', 0x2400, 0xffffffffffffffff) 10:17:39 executing program 4: mkdir(&(0x7f0000000a00)='./file0\x00', 0x48) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x0, 0x0) r0 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x2, 0x0) ioctl(r0, 0x0, &(0x7f0000000a80)="0d43671cfe81157a4328524278c325a86f82ca7a776bf35ad6435fc5d92cc7dd4ebee0d6a74b209788aad1bb0d9fdc631afc28787542538d04a3eedae846f66ef994e354dc1b6ca4a8c7430dafb69bf5684787f2bf739b6e90c60772b34b1acdfa94c903c7487d33b95fe0c631c63e2cbe03a9393ac9d7de9a3e31465b7ff322fb2b60d38f89954594056227e1da58f4b189845b962ee290") r2 = creat(&(0x7f0000000700)='./bus\x00', 0x0) setsockopt$netlink_NETLINK_RX_RING(r2, 0x10e, 0x6, &(0x7f0000000500)={0x7fffffff, 0x7fff, 0x200000000000000, 0x80000000}, 0xfffffe4b) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000380)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f00000002c0)) sched_setaffinity(0x0, 0x8, &(0x7f00000000c0)=0xd) setxattr$security_smack_entry(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000880)='security.SMACK64EXEC\x00', &(0x7f00000008c0)='syz1\x00', 0x5, 0x3) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) fchdir(r1) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)) setsockopt$inet6_udp_encap(r0, 0x11, 0x64, &(0x7f0000000200)=0x2, 0xffffffffffffff28) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000900)={{{@in6=@remote, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @broadcast}}, 0x0, @in=@empty}}, &(0x7f0000000b40)=0x5e) fchown(r3, r4, 0x0) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, &(0x7f0000000480)=@req3={0x0, 0x6, 0x14cbddd4, 0x0, 0x0, 0x0, 0x3}, 0x1c) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000140)={&(0x7f0000000740)=ANY=[]}}, 0x0) pivot_root(&(0x7f0000000240)='./file0\x00', &(0x7f0000000000)='./file0\x00') ftruncate(r2, 0x208200) r5 = getpid() sched_setscheduler(r5, 0x5, &(0x7f0000000000)) futex(&(0x7f0000000080)=0x2000000000000002, 0x6, 0x0, &(0x7f0000000b80), &(0x7f0000000bc0)=0x1, 0x0) write$uinput_user_dev(r1, &(0x7f0000000400)={'syz1\x00', {}, 0x25}, 0x45c) ioctl$UI_DEV_SETUP(r1, 0x5501, &(0x7f0000000300)={{}, 'syz0\x00'}) ioctl$UI_DEV_DESTROY(r1, 0x5502) fchdir(r0) mknod$loop(&(0x7f00000003c0)='./bus\x00', 0x2400, 0xffffffffffffffff) 10:17:39 executing program 5: mkdir(&(0x7f0000000a00)='./file0\x00', 0x48) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x0, 0x0) r0 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x2, 0x0) ioctl(r0, 0x0, &(0x7f0000000a80)="0d43671cfe81157a4328524278c325a86f82ca7a776bf35ad6435fc5d92cc7dd4ebee0d6a74b209788aad1bb0d9fdc631afc28787542538d04a3eedae846f66ef994e354dc1b6ca4a8c7430dafb69bf5684787f2bf739b6e90c60772b34b1acdfa94c903c7487d33b95fe0c631c63e2cbe03a9393ac9d7de9a3e31465b7ff322fb2b60d38f89954594056227e1da58f4b189845b962ee290") r2 = creat(&(0x7f0000000700)='./bus\x00', 0x0) setsockopt$netlink_NETLINK_RX_RING(r2, 0x10e, 0x6, &(0x7f0000000500)={0x7fffffff, 0x7fff, 0x200000000000000, 0x80000000}, 0xfffffe4b) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000380)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f00000002c0)) sched_setaffinity(0x0, 0x8, &(0x7f00000000c0)=0xd) setxattr$security_smack_entry(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000880)='security.SMACK64EXEC\x00', &(0x7f00000008c0)='syz1\x00', 0x5, 0x3) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) fchdir(r1) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)) setsockopt$inet6_udp_encap(r0, 0x11, 0x64, &(0x7f0000000200)=0x2, 0xffffffffffffff28) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000900)={{{@in6=@remote, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @broadcast}}, 0x0, @in=@empty}}, &(0x7f0000000b40)=0x5e) fchown(r3, r4, 0x0) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, &(0x7f0000000480)=@req3={0x0, 0x6, 0x14cbddd4, 0x0, 0x0, 0x0, 0x3}, 0x1c) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000140)={&(0x7f0000000740)=ANY=[]}}, 0x0) pivot_root(&(0x7f0000000240)='./file0\x00', &(0x7f0000000000)='./file0\x00') ftruncate(r2, 0x208200) r5 = getpid() sched_setscheduler(r5, 0x5, &(0x7f0000000000)) futex(&(0x7f0000000080)=0x2000000000000002, 0x6, 0x0, &(0x7f0000000b80), &(0x7f0000000bc0)=0x1, 0x0) write$uinput_user_dev(r1, &(0x7f0000000400)={'syz1\x00', {}, 0x25}, 0x45c) ioctl$UI_DEV_SETUP(r1, 0x5501, &(0x7f0000000300)={{}, 'syz0\x00'}) ioctl$UI_DEV_DESTROY(r1, 0x5502) fchdir(r0) mknod$loop(&(0x7f00000003c0)='./bus\x00', 0x2400, 0xffffffffffffffff) 10:17:39 executing program 2: mkdir(&(0x7f0000000a00)='./file0\x00', 0x48) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x0, 0x0) r0 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x2, 0x0) ioctl(r0, 0x0, &(0x7f0000000a80)="0d43671cfe81157a4328524278c325a86f82ca7a776bf35ad6435fc5d92cc7dd4ebee0d6a74b209788aad1bb0d9fdc631afc28787542538d04a3eedae846f66ef994e354dc1b6ca4a8c7430dafb69bf5684787f2bf739b6e90c60772b34b1acdfa94c903c7487d33b95fe0c631c63e2cbe03a9393ac9d7de9a3e31465b7ff322fb2b60d38f89954594056227e1da58f4b189845b962ee290") r2 = creat(&(0x7f0000000700)='./bus\x00', 0x0) setsockopt$netlink_NETLINK_RX_RING(r2, 0x10e, 0x6, &(0x7f0000000500)={0x7fffffff, 0x7fff, 0x200000000000000, 0x80000000}, 0xfffffe4b) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000380)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f00000002c0)) sched_setaffinity(0x0, 0x8, &(0x7f00000000c0)=0xd) setxattr$security_smack_entry(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000880)='security.SMACK64EXEC\x00', &(0x7f00000008c0)='syz1\x00', 0x5, 0x3) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) fchdir(r1) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)) setsockopt$inet6_udp_encap(r0, 0x11, 0x64, &(0x7f0000000200)=0x2, 0xffffffffffffff28) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000900)={{{@in6=@remote, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @broadcast}}, 0x0, @in=@empty}}, &(0x7f0000000b40)=0x5e) fchown(r3, r4, 0x0) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, &(0x7f0000000480)=@req3={0x0, 0x6, 0x14cbddd4, 0x0, 0x0, 0x0, 0x3}, 0x1c) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000140)={&(0x7f0000000740)=ANY=[]}}, 0x0) pivot_root(&(0x7f0000000240)='./file0\x00', &(0x7f0000000000)='./file0\x00') ftruncate(r2, 0x208200) r5 = getpid() sched_setscheduler(r5, 0x5, &(0x7f0000000000)) futex(&(0x7f0000000080)=0x2000000000000002, 0x6, 0x0, &(0x7f0000000b80), &(0x7f0000000bc0)=0x1, 0x0) write$uinput_user_dev(r1, &(0x7f0000000400)={'syz1\x00', {}, 0x25}, 0x45c) ioctl$UI_DEV_SETUP(r1, 0x5501, &(0x7f0000000300)={{}, 'syz0\x00'}) ioctl$UI_DEV_DESTROY(r1, 0x5502) fchdir(r0) mknod$loop(&(0x7f00000003c0)='./bus\x00', 0x2400, 0xffffffffffffffff) 10:17:39 executing program 1: mkdir(&(0x7f0000000a00)='./file0\x00', 0x48) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x0, 0x0) r0 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x2, 0x0) ioctl(r0, 0x0, &(0x7f0000000a80)="0d43671cfe81157a4328524278c325a86f82ca7a776bf35ad6435fc5d92cc7dd4ebee0d6a74b209788aad1bb0d9fdc631afc28787542538d04a3eedae846f66ef994e354dc1b6ca4a8c7430dafb69bf5684787f2bf739b6e90c60772b34b1acdfa94c903c7487d33b95fe0c631c63e2cbe03a9393ac9d7de9a3e31465b7ff322fb2b60d38f89954594056227e1da58f4b189845b962ee290") r2 = creat(&(0x7f0000000700)='./bus\x00', 0x0) setsockopt$netlink_NETLINK_RX_RING(r2, 0x10e, 0x6, &(0x7f0000000500)={0x7fffffff, 0x7fff, 0x200000000000000, 0x80000000}, 0xfffffe4b) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000380)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f00000002c0)) sched_setaffinity(0x0, 0x8, &(0x7f00000000c0)=0xd) setxattr$security_smack_entry(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000880)='security.SMACK64EXEC\x00', &(0x7f00000008c0)='syz1\x00', 0x5, 0x3) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) fchdir(r1) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)) setsockopt$inet6_udp_encap(r0, 0x11, 0x64, &(0x7f0000000200)=0x2, 0xffffffffffffff28) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000900)={{{@in6=@remote, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @broadcast}}, 0x0, @in=@empty}}, &(0x7f0000000b40)=0x5e) fchown(r3, r4, 0x0) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, &(0x7f0000000480)=@req3={0x0, 0x6, 0x14cbddd4, 0x0, 0x0, 0x0, 0x3}, 0x1c) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000140)={&(0x7f0000000740)=ANY=[]}}, 0x0) pivot_root(&(0x7f0000000240)='./file0\x00', &(0x7f0000000000)='./file0\x00') ftruncate(r2, 0x208200) r5 = getpid() sched_setscheduler(r5, 0x5, &(0x7f0000000000)) futex(&(0x7f0000000080)=0x2000000000000002, 0x6, 0x0, &(0x7f0000000b80), &(0x7f0000000bc0)=0x1, 0x0) write$uinput_user_dev(r1, &(0x7f0000000400)={'syz1\x00', {}, 0x25}, 0x45c) ioctl$UI_DEV_SETUP(r1, 0x5501, &(0x7f0000000300)={{}, 'syz0\x00'}) ioctl$UI_DEV_DESTROY(r1, 0x5502) fchdir(r0) mknod$loop(&(0x7f00000003c0)='./bus\x00', 0x2400, 0xffffffffffffffff) 10:17:40 executing program 4: mkdir(&(0x7f0000000a00)='./file0\x00', 0x48) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x0, 0x0) r0 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x2, 0x0) ioctl(r0, 0x0, &(0x7f0000000a80)="0d43671cfe81157a4328524278c325a86f82ca7a776bf35ad6435fc5d92cc7dd4ebee0d6a74b209788aad1bb0d9fdc631afc28787542538d04a3eedae846f66ef994e354dc1b6ca4a8c7430dafb69bf5684787f2bf739b6e90c60772b34b1acdfa94c903c7487d33b95fe0c631c63e2cbe03a9393ac9d7de9a3e31465b7ff322fb2b60d38f89954594056227e1da58f4b189845b962ee290") r2 = creat(&(0x7f0000000700)='./bus\x00', 0x0) setsockopt$netlink_NETLINK_RX_RING(r2, 0x10e, 0x6, &(0x7f0000000500)={0x7fffffff, 0x7fff, 0x200000000000000, 0x80000000}, 0xfffffe4b) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000380)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f00000002c0)) sched_setaffinity(0x0, 0x8, &(0x7f00000000c0)=0xd) setxattr$security_smack_entry(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000880)='security.SMACK64EXEC\x00', &(0x7f00000008c0)='syz1\x00', 0x5, 0x3) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) fchdir(r1) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)) setsockopt$inet6_udp_encap(r0, 0x11, 0x64, &(0x7f0000000200)=0x2, 0xffffffffffffff28) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000900)={{{@in6=@remote, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @broadcast}}, 0x0, @in=@empty}}, &(0x7f0000000b40)=0x5e) fchown(r3, r4, 0x0) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, &(0x7f0000000480)=@req3={0x0, 0x6, 0x14cbddd4, 0x0, 0x0, 0x0, 0x3}, 0x1c) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000140)={&(0x7f0000000740)=ANY=[]}}, 0x0) pivot_root(&(0x7f0000000240)='./file0\x00', &(0x7f0000000000)='./file0\x00') ftruncate(r2, 0x208200) r5 = getpid() sched_setscheduler(r5, 0x5, &(0x7f0000000000)) futex(&(0x7f0000000080)=0x2000000000000002, 0x6, 0x0, &(0x7f0000000b80), &(0x7f0000000bc0)=0x1, 0x0) write$uinput_user_dev(r1, &(0x7f0000000400)={'syz1\x00', {}, 0x25}, 0x45c) ioctl$UI_DEV_SETUP(r1, 0x5501, &(0x7f0000000300)={{}, 'syz0\x00'}) ioctl$UI_DEV_DESTROY(r1, 0x5502) fchdir(r0) mknod$loop(&(0x7f00000003c0)='./bus\x00', 0x2400, 0xffffffffffffffff) 10:17:40 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x200) ioctl$SG_GET_SCSI_ID(r0, 0x2276, &(0x7f0000000240)) r1 = socket(0x1e, 0x2, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000040)=@req3={0x80000000, 0x0, 0x2}, 0xfeda) r2 = socket(0x1e, 0x805, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f0000000040)=@req3={0x80000000}, 0xfeda) sendmsg(r1, &(0x7f0000000140)={&(0x7f00004f5000)=@generic={0x10000000001e, "0200000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, 0x0}, 0x0) r4 = gettid() r5 = dup3(r3, r1, 0x0) timer_create(0x40000000000000, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000340)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) tkill(r4, 0x401104000000016) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000200)={'bridge0\x00', 0x800000000000}) accept4$packet(r2, 0x0, &(0x7f0000000300), 0x80800) ioctl$TUNSETIFINDEX(r5, 0x400454da, &(0x7f0000000680)) accept4$x25(r2, &(0x7f0000000080), &(0x7f00000000c0)=0x12, 0x800) ioctl$VIDIOC_QUERYCAP(0xffffffffffffffff, 0x80685600, &(0x7f0000000380)) syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') 10:17:40 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x2, 0x0) ioctl$sock_inet_udp_SIOCINQ(r1, 0x541b, &(0x7f0000000000)) bind(0xffffffffffffffff, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) 10:17:40 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x2, 0x0) ioctl$sock_inet_udp_SIOCINQ(r1, 0x541b, &(0x7f0000000000)) bind(0xffffffffffffffff, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) 10:17:40 executing program 2: mkdir(&(0x7f0000000a00)='./file0\x00', 0x48) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x0, 0x0) r0 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x2, 0x0) ioctl(r0, 0x0, &(0x7f0000000a80)="0d43671cfe81157a4328524278c325a86f82ca7a776bf35ad6435fc5d92cc7dd4ebee0d6a74b209788aad1bb0d9fdc631afc28787542538d04a3eedae846f66ef994e354dc1b6ca4a8c7430dafb69bf5684787f2bf739b6e90c60772b34b1acdfa94c903c7487d33b95fe0c631c63e2cbe03a9393ac9d7de9a3e31465b7ff322fb2b60d38f89954594056227e1da58f4b189845b962ee290") r2 = creat(&(0x7f0000000700)='./bus\x00', 0x0) setsockopt$netlink_NETLINK_RX_RING(r2, 0x10e, 0x6, &(0x7f0000000500)={0x7fffffff, 0x7fff, 0x200000000000000, 0x80000000}, 0xfffffe4b) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000380)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f00000002c0)) sched_setaffinity(0x0, 0x8, &(0x7f00000000c0)=0xd) setxattr$security_smack_entry(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000880)='security.SMACK64EXEC\x00', &(0x7f00000008c0)='syz1\x00', 0x5, 0x3) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) fchdir(r1) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)) setsockopt$inet6_udp_encap(r0, 0x11, 0x64, &(0x7f0000000200)=0x2, 0xffffffffffffff28) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000900)={{{@in6=@remote, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @broadcast}}, 0x0, @in=@empty}}, &(0x7f0000000b40)=0x5e) fchown(r3, r4, 0x0) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, &(0x7f0000000480)=@req3={0x0, 0x6, 0x14cbddd4, 0x0, 0x0, 0x0, 0x3}, 0x1c) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000140)={&(0x7f0000000740)=ANY=[]}}, 0x0) pivot_root(&(0x7f0000000240)='./file0\x00', &(0x7f0000000000)='./file0\x00') ftruncate(r2, 0x208200) r5 = getpid() sched_setscheduler(r5, 0x5, &(0x7f0000000000)) futex(&(0x7f0000000080)=0x2000000000000002, 0x6, 0x0, &(0x7f0000000b80), &(0x7f0000000bc0)=0x1, 0x0) write$uinput_user_dev(r1, &(0x7f0000000400)={'syz1\x00', {}, 0x25}, 0x45c) ioctl$UI_DEV_SETUP(r1, 0x5501, &(0x7f0000000300)={{}, 'syz0\x00'}) ioctl$UI_DEV_DESTROY(r1, 0x5502) fchdir(r0) mknod$loop(&(0x7f00000003c0)='./bus\x00', 0x2400, 0xffffffffffffffff) 10:17:40 executing program 4: r0 = socket$kcm(0xa, 0x2, 0x73) recvmmsg(r0, &(0x7f00000056c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x63, 0x0) 10:17:40 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) setsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x71, &(0x7f0000000080), 0x8) close(r2) close(r1) 10:17:40 executing program 1: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x0) fallocate(r0, 0x20, 0x0, 0xfffffeff000) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) pwritev(r1, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) fallocate(r2, 0x0, 0x40000000, 0x10000101) 10:17:40 executing program 4: r0 = socket$kcm(0xa, 0x2, 0x73) recvmmsg(r0, &(0x7f00000056c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x63, 0x0) 10:17:40 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x2, 0x0) ioctl$sock_inet_udp_SIOCINQ(r1, 0x541b, &(0x7f0000000000)) bind(0xffffffffffffffff, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) 10:17:40 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x200) ioctl$SG_GET_SCSI_ID(r0, 0x2276, &(0x7f0000000240)) r1 = socket(0x1e, 0x2, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000040)=@req3={0x80000000, 0x0, 0x2}, 0xfeda) r2 = socket(0x1e, 0x805, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f0000000040)=@req3={0x80000000}, 0xfeda) sendmsg(r1, &(0x7f0000000140)={&(0x7f00004f5000)=@generic={0x10000000001e, "0200000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, 0x0}, 0x0) r4 = gettid() r5 = dup3(r3, r1, 0x0) timer_create(0x40000000000000, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000340)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) tkill(r4, 0x401104000000016) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000200)={'bridge0\x00', 0x800000000000}) accept4$packet(r2, 0x0, &(0x7f0000000300), 0x80800) ioctl$TUNSETIFINDEX(r5, 0x400454da, &(0x7f0000000680)) accept4$x25(r2, &(0x7f0000000080), &(0x7f00000000c0)=0x12, 0x800) ioctl$VIDIOC_QUERYCAP(0xffffffffffffffff, 0x80685600, &(0x7f0000000380)) syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') 10:17:40 executing program 2: mkdir(&(0x7f0000000a00)='./file0\x00', 0x48) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x0, 0x0) r0 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x2, 0x0) ioctl(r0, 0x0, &(0x7f0000000a80)="0d43671cfe81157a4328524278c325a86f82ca7a776bf35ad6435fc5d92cc7dd4ebee0d6a74b209788aad1bb0d9fdc631afc28787542538d04a3eedae846f66ef994e354dc1b6ca4a8c7430dafb69bf5684787f2bf739b6e90c60772b34b1acdfa94c903c7487d33b95fe0c631c63e2cbe03a9393ac9d7de9a3e31465b7ff322fb2b60d38f89954594056227e1da58f4b189845b962ee290") r2 = creat(&(0x7f0000000700)='./bus\x00', 0x0) setsockopt$netlink_NETLINK_RX_RING(r2, 0x10e, 0x6, &(0x7f0000000500)={0x7fffffff, 0x7fff, 0x200000000000000, 0x80000000}, 0xfffffe4b) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000380)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f00000002c0)) sched_setaffinity(0x0, 0x8, &(0x7f00000000c0)=0xd) setxattr$security_smack_entry(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000880)='security.SMACK64EXEC\x00', &(0x7f00000008c0)='syz1\x00', 0x5, 0x3) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) fchdir(r1) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)) setsockopt$inet6_udp_encap(r0, 0x11, 0x64, &(0x7f0000000200)=0x2, 0xffffffffffffff28) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000900)={{{@in6=@remote, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @broadcast}}, 0x0, @in=@empty}}, &(0x7f0000000b40)=0x5e) fchown(r3, r4, 0x0) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, &(0x7f0000000480)=@req3={0x0, 0x6, 0x14cbddd4, 0x0, 0x0, 0x0, 0x3}, 0x1c) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000140)={&(0x7f0000000740)=ANY=[]}}, 0x0) pivot_root(&(0x7f0000000240)='./file0\x00', &(0x7f0000000000)='./file0\x00') ftruncate(r2, 0x208200) r5 = getpid() sched_setscheduler(r5, 0x5, &(0x7f0000000000)) futex(&(0x7f0000000080)=0x2000000000000002, 0x6, 0x0, &(0x7f0000000b80), &(0x7f0000000bc0)=0x1, 0x0) write$uinput_user_dev(r1, &(0x7f0000000400)={'syz1\x00', {}, 0x25}, 0x45c) ioctl$UI_DEV_SETUP(r1, 0x5501, &(0x7f0000000300)={{}, 'syz0\x00'}) ioctl$UI_DEV_DESTROY(r1, 0x5502) fchdir(r0) mknod$loop(&(0x7f00000003c0)='./bus\x00', 0x2400, 0xffffffffffffffff) 10:17:40 executing program 4: r0 = socket$kcm(0xa, 0x2, 0x73) recvmmsg(r0, &(0x7f00000056c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x63, 0x0) 10:17:40 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x2, 0x0) ioctl$sock_inet_udp_SIOCINQ(r1, 0x541b, &(0x7f0000000000)) bind(0xffffffffffffffff, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) 10:17:40 executing program 4: r0 = socket$kcm(0xa, 0x2, 0x73) recvmmsg(r0, &(0x7f00000056c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x63, 0x0) 10:17:40 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) setsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x71, &(0x7f0000000080), 0x8) close(r2) close(r1) 10:17:40 executing program 1: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x0) fallocate(r0, 0x20, 0x0, 0xfffffeff000) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) pwritev(r1, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) fallocate(r2, 0x0, 0x40000000, 0x10000101) 10:17:40 executing program 3: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x0) fallocate(r0, 0x20, 0x0, 0xfffffeff000) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) pwritev(r1, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) fallocate(r2, 0x0, 0x40000000, 0x10000101) 10:17:40 executing program 4: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x0) fallocate(r0, 0x20, 0x0, 0xfffffeff000) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) pwritev(r1, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) fallocate(r2, 0x0, 0x40000000, 0x10000101) 10:17:40 executing program 2: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x0) fallocate(r0, 0x20, 0x0, 0xfffffeff000) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) pwritev(r1, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) fallocate(r2, 0x0, 0x40000000, 0x10000101) 10:17:40 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x200) ioctl$SG_GET_SCSI_ID(r0, 0x2276, &(0x7f0000000240)) r1 = socket(0x1e, 0x2, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000040)=@req3={0x80000000, 0x0, 0x2}, 0xfeda) r2 = socket(0x1e, 0x805, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f0000000040)=@req3={0x80000000}, 0xfeda) sendmsg(r1, &(0x7f0000000140)={&(0x7f00004f5000)=@generic={0x10000000001e, "0200000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, 0x0}, 0x0) r4 = gettid() r5 = dup3(r3, r1, 0x0) timer_create(0x40000000000000, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000340)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) tkill(r4, 0x401104000000016) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000200)={'bridge0\x00', 0x800000000000}) accept4$packet(r2, 0x0, &(0x7f0000000300), 0x80800) ioctl$TUNSETIFINDEX(r5, 0x400454da, &(0x7f0000000680)) accept4$x25(r2, &(0x7f0000000080), &(0x7f00000000c0)=0x12, 0x800) ioctl$VIDIOC_QUERYCAP(0xffffffffffffffff, 0x80685600, &(0x7f0000000380)) syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') 10:17:41 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) setsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x71, &(0x7f0000000080), 0x8) close(r2) close(r1) 10:17:41 executing program 3: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x0) fallocate(r0, 0x20, 0x0, 0xfffffeff000) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) pwritev(r1, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) fallocate(r2, 0x0, 0x40000000, 0x10000101) [ 1584.390748] device bridge_slave_1 left promiscuous mode [ 1584.396327] bridge0: port 2(bridge_slave_1) entered disabled state 10:17:41 executing program 4: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x0) fallocate(r0, 0x20, 0x0, 0xfffffeff000) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) pwritev(r1, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) fallocate(r2, 0x0, 0x40000000, 0x10000101) [ 1584.499334] device bridge_slave_0 left promiscuous mode [ 1584.505014] bridge0: port 1(bridge_slave_0) entered disabled state 10:17:41 executing program 1: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x0) fallocate(r0, 0x20, 0x0, 0xfffffeff000) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) pwritev(r1, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) fallocate(r2, 0x0, 0x40000000, 0x10000101) 10:17:41 executing program 2: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x0) fallocate(r0, 0x20, 0x0, 0xfffffeff000) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) pwritev(r1, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) fallocate(r2, 0x0, 0x40000000, 0x10000101) 10:17:41 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x200) ioctl$SG_GET_SCSI_ID(r0, 0x2276, &(0x7f0000000240)) r1 = socket(0x1e, 0x2, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000040)=@req3={0x80000000, 0x0, 0x2}, 0xfeda) r2 = socket(0x1e, 0x805, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f0000000040)=@req3={0x80000000}, 0xfeda) sendmsg(r1, &(0x7f0000000140)={&(0x7f00004f5000)=@generic={0x10000000001e, "0200000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, 0x0}, 0x0) r4 = gettid() r5 = dup3(r3, r1, 0x0) timer_create(0x40000000000000, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000340)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) tkill(r4, 0x401104000000016) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000200)={'bridge0\x00', 0x800000000000}) accept4$packet(r2, 0x0, &(0x7f0000000300), 0x80800) ioctl$TUNSETIFINDEX(r5, 0x400454da, &(0x7f0000000680)) accept4$x25(r2, &(0x7f0000000080), &(0x7f00000000c0)=0x12, 0x800) ioctl$VIDIOC_QUERYCAP(0xffffffffffffffff, 0x80685600, &(0x7f0000000380)) syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') 10:17:41 executing program 3: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x0) fallocate(r0, 0x20, 0x0, 0xfffffeff000) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) pwritev(r1, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) fallocate(r2, 0x0, 0x40000000, 0x10000101) 10:17:41 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x200) ioctl$SG_GET_SCSI_ID(r0, 0x2276, &(0x7f0000000240)) r1 = socket(0x1e, 0x2, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000040)=@req3={0x80000000, 0x0, 0x2}, 0xfeda) r2 = socket(0x1e, 0x805, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f0000000040)=@req3={0x80000000}, 0xfeda) sendmsg(r1, &(0x7f0000000140)={&(0x7f00004f5000)=@generic={0x10000000001e, "0200000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, 0x0}, 0x0) r4 = gettid() r5 = dup3(r3, r1, 0x0) timer_create(0x40000000000000, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000340)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) tkill(r4, 0x401104000000016) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000200)={'bridge0\x00', 0x800000000000}) accept4$packet(r2, 0x0, &(0x7f0000000300), 0x80800) ioctl$TUNSETIFINDEX(r5, 0x400454da, &(0x7f0000000680)) accept4$x25(r2, &(0x7f0000000080), &(0x7f00000000c0)=0x12, 0x800) ioctl$VIDIOC_QUERYCAP(0xffffffffffffffff, 0x80685600, &(0x7f0000000380)) syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') 10:17:41 executing program 1: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x0) fallocate(r0, 0x20, 0x0, 0xfffffeff000) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) pwritev(r1, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) fallocate(r2, 0x0, 0x40000000, 0x10000101) 10:17:41 executing program 2: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x0) fallocate(r0, 0x20, 0x0, 0xfffffeff000) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) pwritev(r1, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) fallocate(r2, 0x0, 0x40000000, 0x10000101) 10:17:41 executing program 4: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x0) fallocate(r0, 0x20, 0x0, 0xfffffeff000) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) pwritev(r1, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) fallocate(r2, 0x0, 0x40000000, 0x10000101) 10:17:42 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x200) ioctl$SG_GET_SCSI_ID(r0, 0x2276, &(0x7f0000000240)) r1 = socket(0x1e, 0x2, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000040)=@req3={0x80000000, 0x0, 0x2}, 0xfeda) r2 = socket(0x1e, 0x805, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f0000000040)=@req3={0x80000000}, 0xfeda) sendmsg(r1, &(0x7f0000000140)={&(0x7f00004f5000)=@generic={0x10000000001e, "0200000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, 0x0}, 0x0) r4 = gettid() r5 = dup3(r3, r1, 0x0) timer_create(0x40000000000000, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000340)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) tkill(r4, 0x401104000000016) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000200)={'bridge0\x00', 0x800000000000}) accept4$packet(r2, 0x0, &(0x7f0000000300), 0x80800) ioctl$TUNSETIFINDEX(r5, 0x400454da, &(0x7f0000000680)) accept4$x25(r2, &(0x7f0000000080), &(0x7f00000000c0)=0x12, 0x800) ioctl$VIDIOC_QUERYCAP(0xffffffffffffffff, 0x80685600, &(0x7f0000000380)) syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') [ 1587.352500] bond4 (unregistering): Released all slaves [ 1587.365305] bond3 (unregistering): Released all slaves [ 1587.378663] bond2 (unregistering): Released all slaves [ 1587.391549] bond1 (unregistering): Released all slaves [ 1587.421097] device hsr_slave_1 left promiscuous mode [ 1587.464139] device hsr_slave_0 left promiscuous mode [ 1587.541070] team0 (unregistering): Port device team_slave_1 removed [ 1587.554319] team0 (unregistering): Port device team_slave_0 removed [ 1587.565276] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1587.603645] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1587.703985] bond0 (unregistering): Released all slaves 10:17:44 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) setsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x71, &(0x7f0000000080), 0x8) close(r2) close(r1) 10:17:44 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x200) ioctl$SG_GET_SCSI_ID(r0, 0x2276, &(0x7f0000000240)) r1 = socket(0x1e, 0x2, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000040)=@req3={0x80000000, 0x0, 0x2}, 0xfeda) r2 = socket(0x1e, 0x805, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f0000000040)=@req3={0x80000000}, 0xfeda) sendmsg(r1, &(0x7f0000000140)={&(0x7f00004f5000)=@generic={0x10000000001e, "0200000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, 0x0}, 0x0) r4 = gettid() r5 = dup3(r3, r1, 0x0) timer_create(0x40000000000000, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000340)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) tkill(r4, 0x401104000000016) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000200)={'bridge0\x00', 0x800000000000}) accept4$packet(r2, 0x0, &(0x7f0000000300), 0x80800) ioctl$TUNSETIFINDEX(r5, 0x400454da, &(0x7f0000000680)) accept4$x25(r2, &(0x7f0000000080), &(0x7f00000000c0)=0x12, 0x800) ioctl$VIDIOC_QUERYCAP(0xffffffffffffffff, 0x80685600, &(0x7f0000000380)) syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') 10:17:44 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x200) ioctl$SG_GET_SCSI_ID(r0, 0x2276, &(0x7f0000000240)) r1 = socket(0x1e, 0x2, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000040)=@req3={0x80000000, 0x0, 0x2}, 0xfeda) r2 = socket(0x1e, 0x805, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f0000000040)=@req3={0x80000000}, 0xfeda) sendmsg(r1, &(0x7f0000000140)={&(0x7f00004f5000)=@generic={0x10000000001e, "0200000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, 0x0}, 0x0) r4 = gettid() r5 = dup3(r3, r1, 0x0) timer_create(0x40000000000000, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000340)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) tkill(r4, 0x401104000000016) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000200)={'bridge0\x00', 0x800000000000}) accept4$packet(r2, 0x0, &(0x7f0000000300), 0x80800) ioctl$TUNSETIFINDEX(r5, 0x400454da, &(0x7f0000000680)) accept4$x25(r2, &(0x7f0000000080), &(0x7f00000000c0)=0x12, 0x800) ioctl$VIDIOC_QUERYCAP(0xffffffffffffffff, 0x80685600, &(0x7f0000000380)) syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') 10:17:44 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x200) ioctl$SG_GET_SCSI_ID(r0, 0x2276, &(0x7f0000000240)) r1 = socket(0x1e, 0x2, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000040)=@req3={0x80000000, 0x0, 0x2}, 0xfeda) r2 = socket(0x1e, 0x805, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f0000000040)=@req3={0x80000000}, 0xfeda) sendmsg(r1, &(0x7f0000000140)={&(0x7f00004f5000)=@generic={0x10000000001e, "0200000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, 0x0}, 0x0) r4 = gettid() r5 = dup3(r3, r1, 0x0) timer_create(0x40000000000000, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000340)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) tkill(r4, 0x401104000000016) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000200)={'bridge0\x00', 0x800000000000}) accept4$packet(r2, 0x0, &(0x7f0000000300), 0x80800) ioctl$TUNSETIFINDEX(r5, 0x400454da, &(0x7f0000000680)) accept4$x25(r2, &(0x7f0000000080), &(0x7f00000000c0)=0x12, 0x800) ioctl$VIDIOC_QUERYCAP(0xffffffffffffffff, 0x80685600, &(0x7f0000000380)) syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') 10:17:44 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x200) ioctl$SG_GET_SCSI_ID(r0, 0x2276, &(0x7f0000000240)) r1 = socket(0x1e, 0x2, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000040)=@req3={0x80000000, 0x0, 0x2}, 0xfeda) r2 = socket(0x1e, 0x805, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f0000000040)=@req3={0x80000000}, 0xfeda) sendmsg(r1, &(0x7f0000000140)={&(0x7f00004f5000)=@generic={0x10000000001e, "0200000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, 0x0}, 0x0) r4 = gettid() r5 = dup3(r3, r1, 0x0) timer_create(0x40000000000000, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000340)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) tkill(r4, 0x401104000000016) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000200)={'bridge0\x00', 0x800000000000}) accept4$packet(r2, 0x0, &(0x7f0000000300), 0x80800) ioctl$TUNSETIFINDEX(r5, 0x400454da, &(0x7f0000000680)) accept4$x25(r2, &(0x7f0000000080), &(0x7f00000000c0)=0x12, 0x800) ioctl$VIDIOC_QUERYCAP(0xffffffffffffffff, 0x80685600, &(0x7f0000000380)) syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') 10:17:44 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x200) ioctl$SG_GET_SCSI_ID(r0, 0x2276, &(0x7f0000000240)) r1 = socket(0x1e, 0x2, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000040)=@req3={0x80000000, 0x0, 0x2}, 0xfeda) r2 = socket(0x1e, 0x805, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f0000000040)=@req3={0x80000000}, 0xfeda) sendmsg(r1, &(0x7f0000000140)={&(0x7f00004f5000)=@generic={0x10000000001e, "0200000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, 0x0}, 0x0) r4 = gettid() r5 = dup3(r3, r1, 0x0) timer_create(0x40000000000000, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000340)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) tkill(r4, 0x401104000000016) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000200)={'bridge0\x00', 0x800000000000}) accept4$packet(r2, 0x0, &(0x7f0000000300), 0x80800) ioctl$TUNSETIFINDEX(r5, 0x400454da, &(0x7f0000000680)) accept4$x25(r2, &(0x7f0000000080), &(0x7f00000000c0)=0x12, 0x800) ioctl$VIDIOC_QUERYCAP(0xffffffffffffffff, 0x80685600, &(0x7f0000000380)) syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') 10:17:44 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x200) ioctl$SG_GET_SCSI_ID(r0, 0x2276, &(0x7f0000000240)) r1 = socket(0x1e, 0x2, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000040)=@req3={0x80000000, 0x0, 0x2}, 0xfeda) r2 = socket(0x1e, 0x805, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f0000000040)=@req3={0x80000000}, 0xfeda) sendmsg(r1, &(0x7f0000000140)={&(0x7f00004f5000)=@generic={0x10000000001e, "0200000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, 0x0}, 0x0) r4 = gettid() r5 = dup3(r3, r1, 0x0) timer_create(0x40000000000000, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000340)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) tkill(r4, 0x401104000000016) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000200)={'bridge0\x00', 0x800000000000}) accept4$packet(r2, 0x0, &(0x7f0000000300), 0x80800) ioctl$TUNSETIFINDEX(r5, 0x400454da, &(0x7f0000000680)) accept4$x25(r2, &(0x7f0000000080), &(0x7f00000000c0)=0x12, 0x800) ioctl$VIDIOC_QUERYCAP(0xffffffffffffffff, 0x80685600, &(0x7f0000000380)) syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') 10:17:44 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x200) ioctl$SG_GET_SCSI_ID(r0, 0x2276, &(0x7f0000000240)) r1 = socket(0x1e, 0x2, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000040)=@req3={0x80000000, 0x0, 0x2}, 0xfeda) r2 = socket(0x1e, 0x805, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f0000000040)=@req3={0x80000000}, 0xfeda) sendmsg(r1, &(0x7f0000000140)={&(0x7f00004f5000)=@generic={0x10000000001e, "0200000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, 0x0}, 0x0) r4 = gettid() r5 = dup3(r3, r1, 0x0) timer_create(0x40000000000000, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000340)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) tkill(r4, 0x401104000000016) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000200)={'bridge0\x00', 0x800000000000}) accept4$packet(r2, 0x0, &(0x7f0000000300), 0x80800) ioctl$TUNSETIFINDEX(r5, 0x400454da, &(0x7f0000000680)) accept4$x25(r2, &(0x7f0000000080), &(0x7f00000000c0)=0x12, 0x800) ioctl$VIDIOC_QUERYCAP(0xffffffffffffffff, 0x80685600, &(0x7f0000000380)) syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') 10:17:44 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x200) ioctl$SG_GET_SCSI_ID(r0, 0x2276, &(0x7f0000000240)) r1 = socket(0x1e, 0x2, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000040)=@req3={0x80000000, 0x0, 0x2}, 0xfeda) r2 = socket(0x1e, 0x805, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f0000000040)=@req3={0x80000000}, 0xfeda) sendmsg(r1, &(0x7f0000000140)={&(0x7f00004f5000)=@generic={0x10000000001e, "0200000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, 0x0}, 0x0) r4 = gettid() r5 = dup3(r3, r1, 0x0) timer_create(0x40000000000000, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000340)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) tkill(r4, 0x401104000000016) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000200)={'bridge0\x00', 0x800000000000}) accept4$packet(r2, 0x0, &(0x7f0000000300), 0x80800) ioctl$TUNSETIFINDEX(r5, 0x400454da, &(0x7f0000000680)) accept4$x25(r2, &(0x7f0000000080), &(0x7f00000000c0)=0x12, 0x800) ioctl$VIDIOC_QUERYCAP(0xffffffffffffffff, 0x80685600, &(0x7f0000000380)) syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') 10:17:44 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x200) ioctl$SG_GET_SCSI_ID(r0, 0x2276, &(0x7f0000000240)) r1 = socket(0x1e, 0x2, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000040)=@req3={0x80000000, 0x0, 0x2}, 0xfeda) r2 = socket(0x1e, 0x805, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f0000000040)=@req3={0x80000000}, 0xfeda) sendmsg(r1, &(0x7f0000000140)={&(0x7f00004f5000)=@generic={0x10000000001e, "0200000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, 0x0}, 0x0) r4 = gettid() r5 = dup3(r3, r1, 0x0) timer_create(0x40000000000000, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000340)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) tkill(r4, 0x401104000000016) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000200)={'bridge0\x00', 0x800000000000}) accept4$packet(r2, 0x0, &(0x7f0000000300), 0x80800) ioctl$TUNSETIFINDEX(r5, 0x400454da, &(0x7f0000000680)) accept4$x25(r2, &(0x7f0000000080), &(0x7f00000000c0)=0x12, 0x800) ioctl$VIDIOC_QUERYCAP(0xffffffffffffffff, 0x80685600, &(0x7f0000000380)) syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') 10:17:45 executing program 5: r0 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x1, &(0x7f00000001c0)=[&(0x7f0000f9a000/0x5000)=nil], 0x0, 0x0, 0x0) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ion\x00', 0x0, 0x0) ioctl$KDGKBTYPE(r0, 0x4b33, &(0x7f0000000100)) ioctl$ION_IOC_HEAP_QUERY(r2, 0xc0184908, &(0x7f0000000300)={0x34, 0x0, &(0x7f0000000240)}) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r1) request_key(&(0x7f0000000000)='cifs.spnego\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0xfffffffffffffff8) add_key$keyring(&(0x7f0000001a00)='keyring\x00', &(0x7f0000001a40)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f00000004c0)={0x1000000a, 0xfffbffffffffffff, 0x1, 0xffffffffffffffff}) recvmmsg(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x2, &(0x7f00000007c0)) ioctl$VIDIOC_SUBDEV_G_DV_TIMINGS(r0, 0xc0845658, &(0x7f00000016c0)={0x0, @bt={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x3, 0x6, 0x101, 0x0, 0x31}}) mmap(&(0x7f0000bfe000/0x400000)=nil, 0x400000, 0x6, 0x811, r3, 0x0) r4 = syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r4, 0x404c534a, &(0x7f0000000140)={0x0, 0x0, {0xffffffffffffffff}}) 10:17:45 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x200) ioctl$SG_GET_SCSI_ID(r0, 0x2276, &(0x7f0000000240)) r1 = socket(0x1e, 0x2, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000040)=@req3={0x80000000, 0x0, 0x2}, 0xfeda) r2 = socket(0x1e, 0x805, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f0000000040)=@req3={0x80000000}, 0xfeda) sendmsg(r1, &(0x7f0000000140)={&(0x7f00004f5000)=@generic={0x10000000001e, "0200000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, 0x0}, 0x0) r4 = gettid() r5 = dup3(r3, r1, 0x0) timer_create(0x40000000000000, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000340)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) tkill(r4, 0x401104000000016) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000200)={'bridge0\x00', 0x800000000000}) accept4$packet(r2, 0x0, &(0x7f0000000300), 0x80800) ioctl$TUNSETIFINDEX(r5, 0x400454da, &(0x7f0000000680)) accept4$x25(r2, &(0x7f0000000080), &(0x7f00000000c0)=0x12, 0x800) ioctl$VIDIOC_QUERYCAP(0xffffffffffffffff, 0x80685600, &(0x7f0000000380)) syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') 10:17:45 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x200) ioctl$SG_GET_SCSI_ID(r0, 0x2276, &(0x7f0000000240)) r1 = socket(0x1e, 0x2, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000040)=@req3={0x80000000, 0x0, 0x2}, 0xfeda) r2 = socket(0x1e, 0x805, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f0000000040)=@req3={0x80000000}, 0xfeda) sendmsg(r1, &(0x7f0000000140)={&(0x7f00004f5000)=@generic={0x10000000001e, "0200000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, 0x0}, 0x0) r4 = gettid() r5 = dup3(r3, r1, 0x0) timer_create(0x40000000000000, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000340)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) tkill(r4, 0x401104000000016) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000200)={'bridge0\x00', 0x800000000000}) accept4$packet(r2, 0x0, &(0x7f0000000300), 0x80800) ioctl$TUNSETIFINDEX(r5, 0x400454da, &(0x7f0000000680)) accept4$x25(r2, &(0x7f0000000080), &(0x7f00000000c0)=0x12, 0x800) ioctl$VIDIOC_QUERYCAP(0xffffffffffffffff, 0x80685600, &(0x7f0000000380)) syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') 10:17:45 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x200) ioctl$SG_GET_SCSI_ID(r0, 0x2276, &(0x7f0000000240)) r1 = socket(0x1e, 0x2, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000040)=@req3={0x80000000, 0x0, 0x2}, 0xfeda) r2 = socket(0x1e, 0x805, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f0000000040)=@req3={0x80000000}, 0xfeda) sendmsg(r1, &(0x7f0000000140)={&(0x7f00004f5000)=@generic={0x10000000001e, "0200000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, 0x0}, 0x0) r4 = gettid() r5 = dup3(r3, r1, 0x0) timer_create(0x40000000000000, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000340)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) tkill(r4, 0x401104000000016) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000200)={'bridge0\x00', 0x800000000000}) accept4$packet(r2, 0x0, &(0x7f0000000300), 0x80800) ioctl$TUNSETIFINDEX(r5, 0x400454da, &(0x7f0000000680)) accept4$x25(r2, &(0x7f0000000080), &(0x7f00000000c0)=0x12, 0x800) ioctl$VIDIOC_QUERYCAP(0xffffffffffffffff, 0x80685600, &(0x7f0000000380)) syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') 10:17:45 executing program 5: r0 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x1, &(0x7f00000001c0)=[&(0x7f0000f9a000/0x5000)=nil], 0x0, 0x0, 0x0) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ion\x00', 0x0, 0x0) ioctl$KDGKBTYPE(r0, 0x4b33, &(0x7f0000000100)) ioctl$ION_IOC_HEAP_QUERY(r2, 0xc0184908, &(0x7f0000000300)={0x34, 0x0, &(0x7f0000000240)}) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r1) request_key(&(0x7f0000000000)='cifs.spnego\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0xfffffffffffffff8) add_key$keyring(&(0x7f0000001a00)='keyring\x00', &(0x7f0000001a40)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f00000004c0)={0x1000000a, 0xfffbffffffffffff, 0x1, 0xffffffffffffffff}) recvmmsg(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x2, &(0x7f00000007c0)) ioctl$VIDIOC_SUBDEV_G_DV_TIMINGS(r0, 0xc0845658, &(0x7f00000016c0)={0x0, @bt={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x3, 0x6, 0x101, 0x0, 0x31}}) mmap(&(0x7f0000bfe000/0x400000)=nil, 0x400000, 0x6, 0x811, r3, 0x0) r4 = syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r4, 0x404c534a, &(0x7f0000000140)={0x0, 0x0, {0xffffffffffffffff}}) 10:17:45 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x200) ioctl$SG_GET_SCSI_ID(r0, 0x2276, &(0x7f0000000240)) r1 = socket(0x1e, 0x2, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000040)=@req3={0x80000000, 0x0, 0x2}, 0xfeda) r2 = socket(0x1e, 0x805, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f0000000040)=@req3={0x80000000}, 0xfeda) sendmsg(r1, &(0x7f0000000140)={&(0x7f00004f5000)=@generic={0x10000000001e, "0200000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, 0x0}, 0x0) r4 = gettid() r5 = dup3(r3, r1, 0x0) timer_create(0x40000000000000, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000340)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) tkill(r4, 0x401104000000016) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000200)={'bridge0\x00', 0x800000000000}) accept4$packet(r2, 0x0, &(0x7f0000000300), 0x80800) ioctl$TUNSETIFINDEX(r5, 0x400454da, &(0x7f0000000680)) accept4$x25(r2, &(0x7f0000000080), &(0x7f00000000c0)=0x12, 0x800) ioctl$VIDIOC_QUERYCAP(0xffffffffffffffff, 0x80685600, &(0x7f0000000380)) syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') 10:17:45 executing program 0: r0 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x1, &(0x7f00000001c0)=[&(0x7f0000f9a000/0x5000)=nil], 0x0, 0x0, 0x0) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ion\x00', 0x0, 0x0) ioctl$KDGKBTYPE(r0, 0x4b33, &(0x7f0000000100)) ioctl$ION_IOC_HEAP_QUERY(r2, 0xc0184908, &(0x7f0000000300)={0x34, 0x0, &(0x7f0000000240)}) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r1) request_key(&(0x7f0000000000)='cifs.spnego\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0xfffffffffffffff8) add_key$keyring(&(0x7f0000001a00)='keyring\x00', &(0x7f0000001a40)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f00000004c0)={0x1000000a, 0xfffbffffffffffff, 0x1, 0xffffffffffffffff}) recvmmsg(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x2, &(0x7f00000007c0)) ioctl$VIDIOC_SUBDEV_G_DV_TIMINGS(r0, 0xc0845658, &(0x7f00000016c0)={0x0, @bt={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x3, 0x6, 0x101, 0x0, 0x31}}) mmap(&(0x7f0000bfe000/0x400000)=nil, 0x400000, 0x6, 0x811, r3, 0x0) r4 = syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r4, 0x404c534a, &(0x7f0000000140)={0x0, 0x0, {0xffffffffffffffff}}) 10:17:45 executing program 3: r0 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x1, &(0x7f00000001c0)=[&(0x7f0000f9a000/0x5000)=nil], 0x0, 0x0, 0x0) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ion\x00', 0x0, 0x0) ioctl$KDGKBTYPE(r0, 0x4b33, &(0x7f0000000100)) ioctl$ION_IOC_HEAP_QUERY(r2, 0xc0184908, &(0x7f0000000300)={0x34, 0x0, &(0x7f0000000240)}) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r1) request_key(&(0x7f0000000000)='cifs.spnego\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0xfffffffffffffff8) add_key$keyring(&(0x7f0000001a00)='keyring\x00', &(0x7f0000001a40)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f00000004c0)={0x1000000a, 0xfffbffffffffffff, 0x1, 0xffffffffffffffff}) recvmmsg(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x2, &(0x7f00000007c0)) ioctl$VIDIOC_SUBDEV_G_DV_TIMINGS(r0, 0xc0845658, &(0x7f00000016c0)={0x0, @bt={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x3, 0x6, 0x101, 0x0, 0x31}}) mmap(&(0x7f0000bfe000/0x400000)=nil, 0x400000, 0x6, 0x811, r3, 0x0) r4 = syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r4, 0x404c534a, &(0x7f0000000140)={0x0, 0x0, {0xffffffffffffffff}}) 10:17:45 executing program 5: r0 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x1, &(0x7f00000001c0)=[&(0x7f0000f9a000/0x5000)=nil], 0x0, 0x0, 0x0) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ion\x00', 0x0, 0x0) ioctl$KDGKBTYPE(r0, 0x4b33, &(0x7f0000000100)) ioctl$ION_IOC_HEAP_QUERY(r2, 0xc0184908, &(0x7f0000000300)={0x34, 0x0, &(0x7f0000000240)}) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r1) request_key(&(0x7f0000000000)='cifs.spnego\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0xfffffffffffffff8) add_key$keyring(&(0x7f0000001a00)='keyring\x00', &(0x7f0000001a40)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f00000004c0)={0x1000000a, 0xfffbffffffffffff, 0x1, 0xffffffffffffffff}) recvmmsg(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x2, &(0x7f00000007c0)) ioctl$VIDIOC_SUBDEV_G_DV_TIMINGS(r0, 0xc0845658, &(0x7f00000016c0)={0x0, @bt={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x3, 0x6, 0x101, 0x0, 0x31}}) mmap(&(0x7f0000bfe000/0x400000)=nil, 0x400000, 0x6, 0x811, r3, 0x0) r4 = syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r4, 0x404c534a, &(0x7f0000000140)={0x0, 0x0, {0xffffffffffffffff}}) 10:17:45 executing program 4: r0 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x1, &(0x7f00000001c0)=[&(0x7f0000f9a000/0x5000)=nil], 0x0, 0x0, 0x0) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ion\x00', 0x0, 0x0) ioctl$KDGKBTYPE(r0, 0x4b33, &(0x7f0000000100)) ioctl$ION_IOC_HEAP_QUERY(r2, 0xc0184908, &(0x7f0000000300)={0x34, 0x0, &(0x7f0000000240)}) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r1) request_key(&(0x7f0000000000)='cifs.spnego\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0xfffffffffffffff8) add_key$keyring(&(0x7f0000001a00)='keyring\x00', &(0x7f0000001a40)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f00000004c0)={0x1000000a, 0xfffbffffffffffff, 0x1, 0xffffffffffffffff}) recvmmsg(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x2, &(0x7f00000007c0)) ioctl$VIDIOC_SUBDEV_G_DV_TIMINGS(r0, 0xc0845658, &(0x7f00000016c0)={0x0, @bt={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x3, 0x6, 0x101, 0x0, 0x31}}) mmap(&(0x7f0000bfe000/0x400000)=nil, 0x400000, 0x6, 0x811, r3, 0x0) r4 = syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r4, 0x404c534a, &(0x7f0000000140)={0x0, 0x0, {0xffffffffffffffff}}) 10:17:45 executing program 2: r0 = inotify_init() ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000000)) 10:17:45 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f000051cff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000943ffc)=0x8) readv(r0, &(0x7f00000000c0)=[{&(0x7f0000cd8000)=""/1, 0x1}], 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000080)) 10:17:45 executing program 5: r0 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x1, &(0x7f00000001c0)=[&(0x7f0000f9a000/0x5000)=nil], 0x0, 0x0, 0x0) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ion\x00', 0x0, 0x0) ioctl$KDGKBTYPE(r0, 0x4b33, &(0x7f0000000100)) ioctl$ION_IOC_HEAP_QUERY(r2, 0xc0184908, &(0x7f0000000300)={0x34, 0x0, &(0x7f0000000240)}) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r1) request_key(&(0x7f0000000000)='cifs.spnego\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0xfffffffffffffff8) add_key$keyring(&(0x7f0000001a00)='keyring\x00', &(0x7f0000001a40)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f00000004c0)={0x1000000a, 0xfffbffffffffffff, 0x1, 0xffffffffffffffff}) recvmmsg(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x2, &(0x7f00000007c0)) ioctl$VIDIOC_SUBDEV_G_DV_TIMINGS(r0, 0xc0845658, &(0x7f00000016c0)={0x0, @bt={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x3, 0x6, 0x101, 0x0, 0x31}}) mmap(&(0x7f0000bfe000/0x400000)=nil, 0x400000, 0x6, 0x811, r3, 0x0) r4 = syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r4, 0x404c534a, &(0x7f0000000140)={0x0, 0x0, {0xffffffffffffffff}}) 10:17:45 executing program 2: r0 = inotify_init() ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000000)) 10:17:46 executing program 4: r0 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x1, &(0x7f00000001c0)=[&(0x7f0000f9a000/0x5000)=nil], 0x0, 0x0, 0x0) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ion\x00', 0x0, 0x0) ioctl$KDGKBTYPE(r0, 0x4b33, &(0x7f0000000100)) ioctl$ION_IOC_HEAP_QUERY(r2, 0xc0184908, &(0x7f0000000300)={0x34, 0x0, &(0x7f0000000240)}) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r1) request_key(&(0x7f0000000000)='cifs.spnego\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0xfffffffffffffff8) add_key$keyring(&(0x7f0000001a00)='keyring\x00', &(0x7f0000001a40)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f00000004c0)={0x1000000a, 0xfffbffffffffffff, 0x1, 0xffffffffffffffff}) recvmmsg(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x2, &(0x7f00000007c0)) ioctl$VIDIOC_SUBDEV_G_DV_TIMINGS(r0, 0xc0845658, &(0x7f00000016c0)={0x0, @bt={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x3, 0x6, 0x101, 0x0, 0x31}}) mmap(&(0x7f0000bfe000/0x400000)=nil, 0x400000, 0x6, 0x811, r3, 0x0) r4 = syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r4, 0x404c534a, &(0x7f0000000140)={0x0, 0x0, {0xffffffffffffffff}}) 10:17:46 executing program 1: mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000080)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 10:17:46 executing program 5: timer_create(0x0, &(0x7f0000000080)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000240)) gettid() socket$netlink(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) r1 = syz_open_dev$sndpcmc(&(0x7f0000000440)='/dev/snd/pcmC#D#c\x00', 0x148, 0x30080) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000480)={0x7, 0x0, 0x6, 0x9}, 0x8) r2 = syz_open_dev$mouse(0x0, 0x10000, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(0xffffffffffffffff, 0x84, 0x1c, 0x0, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000340)={r2, 0x10, &(0x7f00000002c0)={&(0x7f0000000140)=""/9, 0x9, 0x0}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380)=r3, 0x4) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_INTERVAL(0xffffffffffffffff, 0xc040564b, 0x0) r4 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="c7da5f1a", 0x4) accept$alg(0xffffffffffffffff, 0x0, 0x0) fcntl$setstatus(r4, 0x4, 0x2000) r5 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r4, r5, &(0x7f0000000040), 0x10000000000443) writev(r4, &(0x7f00000006c0)=[{&(0x7f0000000600), 0x60020}], 0x1) read(r4, &(0x7f00000003c0)=""/72, 0x100000104) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000540)={{{@in6=@ipv4={[], [], @loopback}, @in=@initdev}}, {{@in=@empty}, 0x0, @in6=@dev}}, &(0x7f0000000640)=0x94) sendmsg$xdp(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000180)="9d", 0x1}], 0x1}, 0x0) syz_emit_ethernet(0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="96040066c5911061ee7368a1e3aec4c5494a61ebc3f759515544941300ef5ddc8d59d208067876f0b5f657f6193d9e7a7066eb8d531e9262e4e2317f67"], 0x0) setsockopt$inet_sctp_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) getsockname$unix(r4, &(0x7f00000001c0)=@abs, &(0x7f0000000000)=0x6e) r6 = socket$inet6(0xa, 0x0, 0x0) bind$inet6(r6, &(0x7f0000000080)={0xa, 0x4e20}, 0x1b) 10:17:46 executing program 2: r0 = inotify_init() ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000000)) 10:17:46 executing program 0: r0 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x1, &(0x7f00000001c0)=[&(0x7f0000f9a000/0x5000)=nil], 0x0, 0x0, 0x0) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ion\x00', 0x0, 0x0) ioctl$KDGKBTYPE(r0, 0x4b33, &(0x7f0000000100)) ioctl$ION_IOC_HEAP_QUERY(r2, 0xc0184908, &(0x7f0000000300)={0x34, 0x0, &(0x7f0000000240)}) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r1) request_key(&(0x7f0000000000)='cifs.spnego\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0xfffffffffffffff8) add_key$keyring(&(0x7f0000001a00)='keyring\x00', &(0x7f0000001a40)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f00000004c0)={0x1000000a, 0xfffbffffffffffff, 0x1, 0xffffffffffffffff}) recvmmsg(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x2, &(0x7f00000007c0)) ioctl$VIDIOC_SUBDEV_G_DV_TIMINGS(r0, 0xc0845658, &(0x7f00000016c0)={0x0, @bt={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x3, 0x6, 0x101, 0x0, 0x31}}) mmap(&(0x7f0000bfe000/0x400000)=nil, 0x400000, 0x6, 0x811, r3, 0x0) r4 = syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r4, 0x404c534a, &(0x7f0000000140)={0x0, 0x0, {0xffffffffffffffff}}) 10:17:46 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0x5, 0x800000008, 0x7fff, 0x8000000001}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x400000077fffb, 0x0, 0x820000, 0x0, 0x1a0}, 0x2c) 10:17:46 executing program 3: r0 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x1, &(0x7f00000001c0)=[&(0x7f0000f9a000/0x5000)=nil], 0x0, 0x0, 0x0) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ion\x00', 0x0, 0x0) ioctl$KDGKBTYPE(r0, 0x4b33, &(0x7f0000000100)) ioctl$ION_IOC_HEAP_QUERY(r2, 0xc0184908, &(0x7f0000000300)={0x34, 0x0, &(0x7f0000000240)}) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r1) request_key(&(0x7f0000000000)='cifs.spnego\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0xfffffffffffffff8) add_key$keyring(&(0x7f0000001a00)='keyring\x00', &(0x7f0000001a40)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f00000004c0)={0x1000000a, 0xfffbffffffffffff, 0x1, 0xffffffffffffffff}) recvmmsg(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x2, &(0x7f00000007c0)) ioctl$VIDIOC_SUBDEV_G_DV_TIMINGS(r0, 0xc0845658, &(0x7f00000016c0)={0x0, @bt={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x3, 0x6, 0x101, 0x0, 0x31}}) mmap(&(0x7f0000bfe000/0x400000)=nil, 0x400000, 0x6, 0x811, r3, 0x0) r4 = syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r4, 0x404c534a, &(0x7f0000000140)={0x0, 0x0, {0xffffffffffffffff}}) 10:17:46 executing program 4: r0 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x1, &(0x7f00000001c0)=[&(0x7f0000f9a000/0x5000)=nil], 0x0, 0x0, 0x0) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ion\x00', 0x0, 0x0) ioctl$KDGKBTYPE(r0, 0x4b33, &(0x7f0000000100)) ioctl$ION_IOC_HEAP_QUERY(r2, 0xc0184908, &(0x7f0000000300)={0x34, 0x0, &(0x7f0000000240)}) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r1) request_key(&(0x7f0000000000)='cifs.spnego\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0xfffffffffffffff8) add_key$keyring(&(0x7f0000001a00)='keyring\x00', &(0x7f0000001a40)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f00000004c0)={0x1000000a, 0xfffbffffffffffff, 0x1, 0xffffffffffffffff}) recvmmsg(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x2, &(0x7f00000007c0)) ioctl$VIDIOC_SUBDEV_G_DV_TIMINGS(r0, 0xc0845658, &(0x7f00000016c0)={0x0, @bt={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x3, 0x6, 0x101, 0x0, 0x31}}) mmap(&(0x7f0000bfe000/0x400000)=nil, 0x400000, 0x6, 0x811, r3, 0x0) r4 = syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r4, 0x404c534a, &(0x7f0000000140)={0x0, 0x0, {0xffffffffffffffff}}) 10:17:46 executing program 2: r0 = inotify_init() ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000000)) 10:17:46 executing program 5: timer_create(0x0, &(0x7f0000000080)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000240)) gettid() socket$netlink(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) r1 = syz_open_dev$sndpcmc(&(0x7f0000000440)='/dev/snd/pcmC#D#c\x00', 0x148, 0x30080) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000480)={0x7, 0x0, 0x6, 0x9}, 0x8) r2 = syz_open_dev$mouse(0x0, 0x10000, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(0xffffffffffffffff, 0x84, 0x1c, 0x0, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000340)={r2, 0x10, &(0x7f00000002c0)={&(0x7f0000000140)=""/9, 0x9, 0x0}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380)=r3, 0x4) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_INTERVAL(0xffffffffffffffff, 0xc040564b, 0x0) r4 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="c7da5f1a", 0x4) accept$alg(0xffffffffffffffff, 0x0, 0x0) fcntl$setstatus(r4, 0x4, 0x2000) r5 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r4, r5, &(0x7f0000000040), 0x10000000000443) writev(r4, &(0x7f00000006c0)=[{&(0x7f0000000600), 0x60020}], 0x1) read(r4, &(0x7f00000003c0)=""/72, 0x100000104) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000540)={{{@in6=@ipv4={[], [], @loopback}, @in=@initdev}}, {{@in=@empty}, 0x0, @in6=@dev}}, &(0x7f0000000640)=0x94) sendmsg$xdp(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000180)="9d", 0x1}], 0x1}, 0x0) syz_emit_ethernet(0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="96040066c5911061ee7368a1e3aec4c5494a61ebc3f759515544941300ef5ddc8d59d208067876f0b5f657f6193d9e7a7066eb8d531e9262e4e2317f67"], 0x0) setsockopt$inet_sctp_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) getsockname$unix(r4, &(0x7f00000001c0)=@abs, &(0x7f0000000000)=0x6e) r6 = socket$inet6(0xa, 0x0, 0x0) bind$inet6(r6, &(0x7f0000000080)={0xa, 0x4e20}, 0x1b) 10:17:47 executing program 2: timer_create(0x0, &(0x7f0000000080)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000240)) gettid() socket$netlink(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) r1 = syz_open_dev$sndpcmc(&(0x7f0000000440)='/dev/snd/pcmC#D#c\x00', 0x148, 0x30080) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000480)={0x7, 0x0, 0x6, 0x9}, 0x8) r2 = syz_open_dev$mouse(0x0, 0x10000, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(0xffffffffffffffff, 0x84, 0x1c, 0x0, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000340)={r2, 0x10, &(0x7f00000002c0)={&(0x7f0000000140)=""/9, 0x9, 0x0}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380)=r3, 0x4) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_INTERVAL(0xffffffffffffffff, 0xc040564b, 0x0) r4 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="c7da5f1a", 0x4) accept$alg(0xffffffffffffffff, 0x0, 0x0) fcntl$setstatus(r4, 0x4, 0x2000) r5 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r4, r5, &(0x7f0000000040), 0x10000000000443) writev(r4, &(0x7f00000006c0)=[{&(0x7f0000000600), 0x60020}], 0x1) read(r4, &(0x7f00000003c0)=""/72, 0x100000104) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000540)={{{@in6=@ipv4={[], [], @loopback}, @in=@initdev}}, {{@in=@empty}, 0x0, @in6=@dev}}, &(0x7f0000000640)=0x94) sendmsg$xdp(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000180)="9d", 0x1}], 0x1}, 0x0) syz_emit_ethernet(0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="96040066c5911061ee7368a1e3aec4c5494a61ebc3f759515544941300ef5ddc8d59d208067876f0b5f657f6193d9e7a7066eb8d531e9262e4e2317f67"], 0x0) setsockopt$inet_sctp_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) getsockname$unix(r4, &(0x7f00000001c0)=@abs, &(0x7f0000000000)=0x6e) r6 = socket$inet6(0xa, 0x0, 0x0) bind$inet6(r6, &(0x7f0000000080)={0xa, 0x4e20}, 0x1b) 10:17:47 executing program 4: timer_create(0x0, &(0x7f0000000080)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000240)) gettid() socket$netlink(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) r1 = syz_open_dev$sndpcmc(&(0x7f0000000440)='/dev/snd/pcmC#D#c\x00', 0x148, 0x30080) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000480)={0x7, 0x0, 0x6, 0x9}, 0x8) r2 = syz_open_dev$mouse(0x0, 0x10000, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(0xffffffffffffffff, 0x84, 0x1c, 0x0, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000340)={r2, 0x10, &(0x7f00000002c0)={&(0x7f0000000140)=""/9, 0x9, 0x0}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380)=r3, 0x4) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_INTERVAL(0xffffffffffffffff, 0xc040564b, 0x0) r4 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="c7da5f1a", 0x4) accept$alg(0xffffffffffffffff, 0x0, 0x0) fcntl$setstatus(r4, 0x4, 0x2000) r5 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r4, r5, &(0x7f0000000040), 0x10000000000443) writev(r4, &(0x7f00000006c0)=[{&(0x7f0000000600), 0x60020}], 0x1) read(r4, &(0x7f00000003c0)=""/72, 0x100000104) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000540)={{{@in6=@ipv4={[], [], @loopback}, @in=@initdev}}, {{@in=@empty}, 0x0, @in6=@dev}}, &(0x7f0000000640)=0x94) sendmsg$xdp(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000180)="9d", 0x1}], 0x1}, 0x0) syz_emit_ethernet(0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="96040066c5911061ee7368a1e3aec4c5494a61ebc3f759515544941300ef5ddc8d59d208067876f0b5f657f6193d9e7a7066eb8d531e9262e4e2317f67"], 0x0) setsockopt$inet_sctp_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) getsockname$unix(r4, &(0x7f00000001c0)=@abs, &(0x7f0000000000)=0x6e) r6 = socket$inet6(0xa, 0x0, 0x0) bind$inet6(r6, &(0x7f0000000080)={0xa, 0x4e20}, 0x1b) 10:17:47 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0x5, 0x800000008, 0x7fff, 0x8000000001}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x400000077fffb, 0x0, 0x820000, 0x0, 0x1a0}, 0x2c) 10:17:47 executing program 5: timer_create(0x0, &(0x7f0000000080)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000240)) gettid() socket$netlink(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) r1 = syz_open_dev$sndpcmc(&(0x7f0000000440)='/dev/snd/pcmC#D#c\x00', 0x148, 0x30080) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000480)={0x7, 0x0, 0x6, 0x9}, 0x8) r2 = syz_open_dev$mouse(0x0, 0x10000, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(0xffffffffffffffff, 0x84, 0x1c, 0x0, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000340)={r2, 0x10, &(0x7f00000002c0)={&(0x7f0000000140)=""/9, 0x9, 0x0}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380)=r3, 0x4) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_INTERVAL(0xffffffffffffffff, 0xc040564b, 0x0) r4 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="c7da5f1a", 0x4) accept$alg(0xffffffffffffffff, 0x0, 0x0) fcntl$setstatus(r4, 0x4, 0x2000) r5 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r4, r5, &(0x7f0000000040), 0x10000000000443) writev(r4, &(0x7f00000006c0)=[{&(0x7f0000000600), 0x60020}], 0x1) read(r4, &(0x7f00000003c0)=""/72, 0x100000104) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000540)={{{@in6=@ipv4={[], [], @loopback}, @in=@initdev}}, {{@in=@empty}, 0x0, @in6=@dev}}, &(0x7f0000000640)=0x94) sendmsg$xdp(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000180)="9d", 0x1}], 0x1}, 0x0) syz_emit_ethernet(0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="96040066c5911061ee7368a1e3aec4c5494a61ebc3f759515544941300ef5ddc8d59d208067876f0b5f657f6193d9e7a7066eb8d531e9262e4e2317f67"], 0x0) setsockopt$inet_sctp_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) getsockname$unix(r4, &(0x7f00000001c0)=@abs, &(0x7f0000000000)=0x6e) r6 = socket$inet6(0xa, 0x0, 0x0) bind$inet6(r6, &(0x7f0000000080)={0xa, 0x4e20}, 0x1b) 10:17:47 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0x5, 0x800000008, 0x7fff, 0x8000000001}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x400000077fffb, 0x0, 0x820000, 0x0, 0x1a0}, 0x2c) 10:17:47 executing program 4: timer_create(0x0, &(0x7f0000000080)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000240)) gettid() socket$netlink(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) r1 = syz_open_dev$sndpcmc(&(0x7f0000000440)='/dev/snd/pcmC#D#c\x00', 0x148, 0x30080) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000480)={0x7, 0x0, 0x6, 0x9}, 0x8) r2 = syz_open_dev$mouse(0x0, 0x10000, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(0xffffffffffffffff, 0x84, 0x1c, 0x0, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000340)={r2, 0x10, &(0x7f00000002c0)={&(0x7f0000000140)=""/9, 0x9, 0x0}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380)=r3, 0x4) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_INTERVAL(0xffffffffffffffff, 0xc040564b, 0x0) r4 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="c7da5f1a", 0x4) accept$alg(0xffffffffffffffff, 0x0, 0x0) fcntl$setstatus(r4, 0x4, 0x2000) r5 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r4, r5, &(0x7f0000000040), 0x10000000000443) writev(r4, &(0x7f00000006c0)=[{&(0x7f0000000600), 0x60020}], 0x1) read(r4, &(0x7f00000003c0)=""/72, 0x100000104) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000540)={{{@in6=@ipv4={[], [], @loopback}, @in=@initdev}}, {{@in=@empty}, 0x0, @in6=@dev}}, &(0x7f0000000640)=0x94) sendmsg$xdp(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000180)="9d", 0x1}], 0x1}, 0x0) syz_emit_ethernet(0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="96040066c5911061ee7368a1e3aec4c5494a61ebc3f759515544941300ef5ddc8d59d208067876f0b5f657f6193d9e7a7066eb8d531e9262e4e2317f67"], 0x0) setsockopt$inet_sctp_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) getsockname$unix(r4, &(0x7f00000001c0)=@abs, &(0x7f0000000000)=0x6e) r6 = socket$inet6(0xa, 0x0, 0x0) bind$inet6(r6, &(0x7f0000000080)={0xa, 0x4e20}, 0x1b) 10:17:47 executing program 0: r0 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x1, &(0x7f00000001c0)=[&(0x7f0000f9a000/0x5000)=nil], 0x0, 0x0, 0x0) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ion\x00', 0x0, 0x0) ioctl$KDGKBTYPE(r0, 0x4b33, &(0x7f0000000100)) ioctl$ION_IOC_HEAP_QUERY(r2, 0xc0184908, &(0x7f0000000300)={0x34, 0x0, &(0x7f0000000240)}) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r1) request_key(&(0x7f0000000000)='cifs.spnego\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0xfffffffffffffff8) add_key$keyring(&(0x7f0000001a00)='keyring\x00', &(0x7f0000001a40)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f00000004c0)={0x1000000a, 0xfffbffffffffffff, 0x1, 0xffffffffffffffff}) recvmmsg(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x2, &(0x7f00000007c0)) ioctl$VIDIOC_SUBDEV_G_DV_TIMINGS(r0, 0xc0845658, &(0x7f00000016c0)={0x0, @bt={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x3, 0x6, 0x101, 0x0, 0x31}}) mmap(&(0x7f0000bfe000/0x400000)=nil, 0x400000, 0x6, 0x811, r3, 0x0) r4 = syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r4, 0x404c534a, &(0x7f0000000140)={0x0, 0x0, {0xffffffffffffffff}}) 10:17:47 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0x5, 0x800000008, 0x7fff, 0x8000000001}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x400000077fffb, 0x0, 0x820000, 0x0, 0x1a0}, 0x2c) 10:17:48 executing program 3: r0 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x1, &(0x7f00000001c0)=[&(0x7f0000f9a000/0x5000)=nil], 0x0, 0x0, 0x0) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ion\x00', 0x0, 0x0) ioctl$KDGKBTYPE(r0, 0x4b33, &(0x7f0000000100)) ioctl$ION_IOC_HEAP_QUERY(r2, 0xc0184908, &(0x7f0000000300)={0x34, 0x0, &(0x7f0000000240)}) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r1) request_key(&(0x7f0000000000)='cifs.spnego\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0xfffffffffffffff8) add_key$keyring(&(0x7f0000001a00)='keyring\x00', &(0x7f0000001a40)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f00000004c0)={0x1000000a, 0xfffbffffffffffff, 0x1, 0xffffffffffffffff}) recvmmsg(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x2, &(0x7f00000007c0)) ioctl$VIDIOC_SUBDEV_G_DV_TIMINGS(r0, 0xc0845658, &(0x7f00000016c0)={0x0, @bt={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x3, 0x6, 0x101, 0x0, 0x31}}) mmap(&(0x7f0000bfe000/0x400000)=nil, 0x400000, 0x6, 0x811, r3, 0x0) r4 = syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r4, 0x404c534a, &(0x7f0000000140)={0x0, 0x0, {0xffffffffffffffff}}) 10:17:48 executing program 2: timer_create(0x0, &(0x7f0000000080)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000240)) gettid() socket$netlink(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) r1 = syz_open_dev$sndpcmc(&(0x7f0000000440)='/dev/snd/pcmC#D#c\x00', 0x148, 0x30080) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000480)={0x7, 0x0, 0x6, 0x9}, 0x8) r2 = syz_open_dev$mouse(0x0, 0x10000, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(0xffffffffffffffff, 0x84, 0x1c, 0x0, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000340)={r2, 0x10, &(0x7f00000002c0)={&(0x7f0000000140)=""/9, 0x9, 0x0}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380)=r3, 0x4) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_INTERVAL(0xffffffffffffffff, 0xc040564b, 0x0) r4 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="c7da5f1a", 0x4) accept$alg(0xffffffffffffffff, 0x0, 0x0) fcntl$setstatus(r4, 0x4, 0x2000) r5 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r4, r5, &(0x7f0000000040), 0x10000000000443) writev(r4, &(0x7f00000006c0)=[{&(0x7f0000000600), 0x60020}], 0x1) read(r4, &(0x7f00000003c0)=""/72, 0x100000104) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000540)={{{@in6=@ipv4={[], [], @loopback}, @in=@initdev}}, {{@in=@empty}, 0x0, @in6=@dev}}, &(0x7f0000000640)=0x94) sendmsg$xdp(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000180)="9d", 0x1}], 0x1}, 0x0) syz_emit_ethernet(0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="96040066c5911061ee7368a1e3aec4c5494a61ebc3f759515544941300ef5ddc8d59d208067876f0b5f657f6193d9e7a7066eb8d531e9262e4e2317f67"], 0x0) setsockopt$inet_sctp_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) getsockname$unix(r4, &(0x7f00000001c0)=@abs, &(0x7f0000000000)=0x6e) r6 = socket$inet6(0xa, 0x0, 0x0) bind$inet6(r6, &(0x7f0000000080)={0xa, 0x4e20}, 0x1b) 10:17:48 executing program 5: timer_create(0x0, &(0x7f0000000080)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000240)) gettid() socket$netlink(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) r1 = syz_open_dev$sndpcmc(&(0x7f0000000440)='/dev/snd/pcmC#D#c\x00', 0x148, 0x30080) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000480)={0x7, 0x0, 0x6, 0x9}, 0x8) r2 = syz_open_dev$mouse(0x0, 0x10000, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(0xffffffffffffffff, 0x84, 0x1c, 0x0, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000340)={r2, 0x10, &(0x7f00000002c0)={&(0x7f0000000140)=""/9, 0x9, 0x0}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380)=r3, 0x4) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_INTERVAL(0xffffffffffffffff, 0xc040564b, 0x0) r4 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="c7da5f1a", 0x4) accept$alg(0xffffffffffffffff, 0x0, 0x0) fcntl$setstatus(r4, 0x4, 0x2000) r5 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r4, r5, &(0x7f0000000040), 0x10000000000443) writev(r4, &(0x7f00000006c0)=[{&(0x7f0000000600), 0x60020}], 0x1) read(r4, &(0x7f00000003c0)=""/72, 0x100000104) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000540)={{{@in6=@ipv4={[], [], @loopback}, @in=@initdev}}, {{@in=@empty}, 0x0, @in6=@dev}}, &(0x7f0000000640)=0x94) sendmsg$xdp(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000180)="9d", 0x1}], 0x1}, 0x0) syz_emit_ethernet(0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="96040066c5911061ee7368a1e3aec4c5494a61ebc3f759515544941300ef5ddc8d59d208067876f0b5f657f6193d9e7a7066eb8d531e9262e4e2317f67"], 0x0) setsockopt$inet_sctp_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) getsockname$unix(r4, &(0x7f00000001c0)=@abs, &(0x7f0000000000)=0x6e) r6 = socket$inet6(0xa, 0x0, 0x0) bind$inet6(r6, &(0x7f0000000080)={0xa, 0x4e20}, 0x1b) 10:17:48 executing program 4: timer_create(0x0, &(0x7f0000000080)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000240)) gettid() socket$netlink(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) r1 = syz_open_dev$sndpcmc(&(0x7f0000000440)='/dev/snd/pcmC#D#c\x00', 0x148, 0x30080) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000480)={0x7, 0x0, 0x6, 0x9}, 0x8) r2 = syz_open_dev$mouse(0x0, 0x10000, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(0xffffffffffffffff, 0x84, 0x1c, 0x0, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000340)={r2, 0x10, &(0x7f00000002c0)={&(0x7f0000000140)=""/9, 0x9, 0x0}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380)=r3, 0x4) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_INTERVAL(0xffffffffffffffff, 0xc040564b, 0x0) r4 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="c7da5f1a", 0x4) accept$alg(0xffffffffffffffff, 0x0, 0x0) fcntl$setstatus(r4, 0x4, 0x2000) r5 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r4, r5, &(0x7f0000000040), 0x10000000000443) writev(r4, &(0x7f00000006c0)=[{&(0x7f0000000600), 0x60020}], 0x1) read(r4, &(0x7f00000003c0)=""/72, 0x100000104) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000540)={{{@in6=@ipv4={[], [], @loopback}, @in=@initdev}}, {{@in=@empty}, 0x0, @in6=@dev}}, &(0x7f0000000640)=0x94) sendmsg$xdp(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000180)="9d", 0x1}], 0x1}, 0x0) syz_emit_ethernet(0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="96040066c5911061ee7368a1e3aec4c5494a61ebc3f759515544941300ef5ddc8d59d208067876f0b5f657f6193d9e7a7066eb8d531e9262e4e2317f67"], 0x0) setsockopt$inet_sctp_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) getsockname$unix(r4, &(0x7f00000001c0)=@abs, &(0x7f0000000000)=0x6e) r6 = socket$inet6(0xa, 0x0, 0x0) bind$inet6(r6, &(0x7f0000000080)={0xa, 0x4e20}, 0x1b) 10:17:48 executing program 1: timer_create(0x0, &(0x7f0000000080)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000240)) gettid() socket$netlink(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) r1 = syz_open_dev$sndpcmc(&(0x7f0000000440)='/dev/snd/pcmC#D#c\x00', 0x148, 0x30080) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000480)={0x7, 0x0, 0x6, 0x9}, 0x8) r2 = syz_open_dev$mouse(0x0, 0x10000, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(0xffffffffffffffff, 0x84, 0x1c, 0x0, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000340)={r2, 0x10, &(0x7f00000002c0)={&(0x7f0000000140)=""/9, 0x9, 0x0}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380)=r3, 0x4) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_INTERVAL(0xffffffffffffffff, 0xc040564b, 0x0) r4 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="c7da5f1a", 0x4) accept$alg(0xffffffffffffffff, 0x0, 0x0) fcntl$setstatus(r4, 0x4, 0x2000) r5 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r4, r5, &(0x7f0000000040), 0x10000000000443) writev(r4, &(0x7f00000006c0)=[{&(0x7f0000000600), 0x60020}], 0x1) read(r4, &(0x7f00000003c0)=""/72, 0x100000104) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000540)={{{@in6=@ipv4={[], [], @loopback}, @in=@initdev}}, {{@in=@empty}, 0x0, @in6=@dev}}, &(0x7f0000000640)=0x94) sendmsg$xdp(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000180)="9d", 0x1}], 0x1}, 0x0) syz_emit_ethernet(0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="96040066c5911061ee7368a1e3aec4c5494a61ebc3f759515544941300ef5ddc8d59d208067876f0b5f657f6193d9e7a7066eb8d531e9262e4e2317f67"], 0x0) setsockopt$inet_sctp_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) getsockname$unix(r4, &(0x7f00000001c0)=@abs, &(0x7f0000000000)=0x6e) r6 = socket$inet6(0xa, 0x0, 0x0) bind$inet6(r6, &(0x7f0000000080)={0xa, 0x4e20}, 0x1b) 10:17:48 executing program 1: timer_create(0x0, &(0x7f0000000080)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000240)) gettid() socket$netlink(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) r1 = syz_open_dev$sndpcmc(&(0x7f0000000440)='/dev/snd/pcmC#D#c\x00', 0x148, 0x30080) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000480)={0x7, 0x0, 0x6, 0x9}, 0x8) r2 = syz_open_dev$mouse(0x0, 0x10000, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(0xffffffffffffffff, 0x84, 0x1c, 0x0, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000340)={r2, 0x10, &(0x7f00000002c0)={&(0x7f0000000140)=""/9, 0x9, 0x0}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380)=r3, 0x4) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_INTERVAL(0xffffffffffffffff, 0xc040564b, 0x0) r4 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="c7da5f1a", 0x4) accept$alg(0xffffffffffffffff, 0x0, 0x0) fcntl$setstatus(r4, 0x4, 0x2000) r5 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r4, r5, &(0x7f0000000040), 0x10000000000443) writev(r4, &(0x7f00000006c0)=[{&(0x7f0000000600), 0x60020}], 0x1) read(r4, &(0x7f00000003c0)=""/72, 0x100000104) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000540)={{{@in6=@ipv4={[], [], @loopback}, @in=@initdev}}, {{@in=@empty}, 0x0, @in6=@dev}}, &(0x7f0000000640)=0x94) sendmsg$xdp(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000180)="9d", 0x1}], 0x1}, 0x0) syz_emit_ethernet(0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="96040066c5911061ee7368a1e3aec4c5494a61ebc3f759515544941300ef5ddc8d59d208067876f0b5f657f6193d9e7a7066eb8d531e9262e4e2317f67"], 0x0) setsockopt$inet_sctp_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) getsockname$unix(r4, &(0x7f00000001c0)=@abs, &(0x7f0000000000)=0x6e) r6 = socket$inet6(0xa, 0x0, 0x0) bind$inet6(r6, &(0x7f0000000080)={0xa, 0x4e20}, 0x1b) 10:17:48 executing program 2: timer_create(0x0, &(0x7f0000000080)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000240)) gettid() socket$netlink(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) r1 = syz_open_dev$sndpcmc(&(0x7f0000000440)='/dev/snd/pcmC#D#c\x00', 0x148, 0x30080) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000480)={0x7, 0x0, 0x6, 0x9}, 0x8) r2 = syz_open_dev$mouse(0x0, 0x10000, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(0xffffffffffffffff, 0x84, 0x1c, 0x0, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000340)={r2, 0x10, &(0x7f00000002c0)={&(0x7f0000000140)=""/9, 0x9, 0x0}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380)=r3, 0x4) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_INTERVAL(0xffffffffffffffff, 0xc040564b, 0x0) r4 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="c7da5f1a", 0x4) accept$alg(0xffffffffffffffff, 0x0, 0x0) fcntl$setstatus(r4, 0x4, 0x2000) r5 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r4, r5, &(0x7f0000000040), 0x10000000000443) writev(r4, &(0x7f00000006c0)=[{&(0x7f0000000600), 0x60020}], 0x1) read(r4, &(0x7f00000003c0)=""/72, 0x100000104) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000540)={{{@in6=@ipv4={[], [], @loopback}, @in=@initdev}}, {{@in=@empty}, 0x0, @in6=@dev}}, &(0x7f0000000640)=0x94) sendmsg$xdp(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000180)="9d", 0x1}], 0x1}, 0x0) syz_emit_ethernet(0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="96040066c5911061ee7368a1e3aec4c5494a61ebc3f759515544941300ef5ddc8d59d208067876f0b5f657f6193d9e7a7066eb8d531e9262e4e2317f67"], 0x0) setsockopt$inet_sctp_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) getsockname$unix(r4, &(0x7f00000001c0)=@abs, &(0x7f0000000000)=0x6e) r6 = socket$inet6(0xa, 0x0, 0x0) bind$inet6(r6, &(0x7f0000000080)={0xa, 0x4e20}, 0x1b) 10:17:48 executing program 4: timer_create(0x0, &(0x7f0000000080)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000240)) gettid() socket$netlink(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) r1 = syz_open_dev$sndpcmc(&(0x7f0000000440)='/dev/snd/pcmC#D#c\x00', 0x148, 0x30080) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000480)={0x7, 0x0, 0x6, 0x9}, 0x8) r2 = syz_open_dev$mouse(0x0, 0x10000, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(0xffffffffffffffff, 0x84, 0x1c, 0x0, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000340)={r2, 0x10, &(0x7f00000002c0)={&(0x7f0000000140)=""/9, 0x9, 0x0}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380)=r3, 0x4) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_INTERVAL(0xffffffffffffffff, 0xc040564b, 0x0) r4 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="c7da5f1a", 0x4) accept$alg(0xffffffffffffffff, 0x0, 0x0) fcntl$setstatus(r4, 0x4, 0x2000) r5 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r4, r5, &(0x7f0000000040), 0x10000000000443) writev(r4, &(0x7f00000006c0)=[{&(0x7f0000000600), 0x60020}], 0x1) read(r4, &(0x7f00000003c0)=""/72, 0x100000104) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000540)={{{@in6=@ipv4={[], [], @loopback}, @in=@initdev}}, {{@in=@empty}, 0x0, @in6=@dev}}, &(0x7f0000000640)=0x94) sendmsg$xdp(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000180)="9d", 0x1}], 0x1}, 0x0) syz_emit_ethernet(0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="96040066c5911061ee7368a1e3aec4c5494a61ebc3f759515544941300ef5ddc8d59d208067876f0b5f657f6193d9e7a7066eb8d531e9262e4e2317f67"], 0x0) setsockopt$inet_sctp_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) getsockname$unix(r4, &(0x7f00000001c0)=@abs, &(0x7f0000000000)=0x6e) r6 = socket$inet6(0xa, 0x0, 0x0) bind$inet6(r6, &(0x7f0000000080)={0xa, 0x4e20}, 0x1b) 10:17:48 executing program 5: timer_create(0x0, &(0x7f0000000080)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000240)) gettid() socket$netlink(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) r1 = syz_open_dev$sndpcmc(&(0x7f0000000440)='/dev/snd/pcmC#D#c\x00', 0x148, 0x30080) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000480)={0x7, 0x0, 0x6, 0x9}, 0x8) r2 = syz_open_dev$mouse(0x0, 0x10000, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(0xffffffffffffffff, 0x84, 0x1c, 0x0, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000340)={r2, 0x10, &(0x7f00000002c0)={&(0x7f0000000140)=""/9, 0x9, 0x0}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380)=r3, 0x4) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_INTERVAL(0xffffffffffffffff, 0xc040564b, 0x0) r4 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="c7da5f1a", 0x4) accept$alg(0xffffffffffffffff, 0x0, 0x0) fcntl$setstatus(r4, 0x4, 0x2000) r5 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r4, r5, &(0x7f0000000040), 0x10000000000443) writev(r4, &(0x7f00000006c0)=[{&(0x7f0000000600), 0x60020}], 0x1) read(r4, &(0x7f00000003c0)=""/72, 0x100000104) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000540)={{{@in6=@ipv4={[], [], @loopback}, @in=@initdev}}, {{@in=@empty}, 0x0, @in6=@dev}}, &(0x7f0000000640)=0x94) sendmsg$xdp(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000180)="9d", 0x1}], 0x1}, 0x0) syz_emit_ethernet(0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="96040066c5911061ee7368a1e3aec4c5494a61ebc3f759515544941300ef5ddc8d59d208067876f0b5f657f6193d9e7a7066eb8d531e9262e4e2317f67"], 0x0) setsockopt$inet_sctp_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) getsockname$unix(r4, &(0x7f00000001c0)=@abs, &(0x7f0000000000)=0x6e) r6 = socket$inet6(0xa, 0x0, 0x0) bind$inet6(r6, &(0x7f0000000080)={0xa, 0x4e20}, 0x1b) 10:17:49 executing program 1: timer_create(0x0, &(0x7f0000000080)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000240)) gettid() socket$netlink(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) r1 = syz_open_dev$sndpcmc(&(0x7f0000000440)='/dev/snd/pcmC#D#c\x00', 0x148, 0x30080) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000480)={0x7, 0x0, 0x6, 0x9}, 0x8) r2 = syz_open_dev$mouse(0x0, 0x10000, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(0xffffffffffffffff, 0x84, 0x1c, 0x0, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000340)={r2, 0x10, &(0x7f00000002c0)={&(0x7f0000000140)=""/9, 0x9, 0x0}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380)=r3, 0x4) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_INTERVAL(0xffffffffffffffff, 0xc040564b, 0x0) r4 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="c7da5f1a", 0x4) accept$alg(0xffffffffffffffff, 0x0, 0x0) fcntl$setstatus(r4, 0x4, 0x2000) r5 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r4, r5, &(0x7f0000000040), 0x10000000000443) writev(r4, &(0x7f00000006c0)=[{&(0x7f0000000600), 0x60020}], 0x1) read(r4, &(0x7f00000003c0)=""/72, 0x100000104) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000540)={{{@in6=@ipv4={[], [], @loopback}, @in=@initdev}}, {{@in=@empty}, 0x0, @in6=@dev}}, &(0x7f0000000640)=0x94) sendmsg$xdp(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000180)="9d", 0x1}], 0x1}, 0x0) syz_emit_ethernet(0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="96040066c5911061ee7368a1e3aec4c5494a61ebc3f759515544941300ef5ddc8d59d208067876f0b5f657f6193d9e7a7066eb8d531e9262e4e2317f67"], 0x0) setsockopt$inet_sctp_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) getsockname$unix(r4, &(0x7f00000001c0)=@abs, &(0x7f0000000000)=0x6e) r6 = socket$inet6(0xa, 0x0, 0x0) bind$inet6(r6, &(0x7f0000000080)={0xa, 0x4e20}, 0x1b) 10:17:49 executing program 4: timer_create(0x0, &(0x7f0000000080)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000240)) gettid() socket$netlink(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) r1 = syz_open_dev$sndpcmc(&(0x7f0000000440)='/dev/snd/pcmC#D#c\x00', 0x148, 0x30080) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000480)={0x7, 0x0, 0x6, 0x9}, 0x8) r2 = syz_open_dev$mouse(0x0, 0x10000, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(0xffffffffffffffff, 0x84, 0x1c, 0x0, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000340)={r2, 0x10, &(0x7f00000002c0)={&(0x7f0000000140)=""/9, 0x9, 0x0}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380)=r3, 0x4) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_INTERVAL(0xffffffffffffffff, 0xc040564b, 0x0) r4 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="c7da5f1a", 0x4) accept$alg(0xffffffffffffffff, 0x0, 0x0) fcntl$setstatus(r4, 0x4, 0x2000) r5 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r4, r5, &(0x7f0000000040), 0x10000000000443) writev(r4, &(0x7f00000006c0)=[{&(0x7f0000000600), 0x60020}], 0x1) read(r4, &(0x7f00000003c0)=""/72, 0x100000104) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000540)={{{@in6=@ipv4={[], [], @loopback}, @in=@initdev}}, {{@in=@empty}, 0x0, @in6=@dev}}, &(0x7f0000000640)=0x94) sendmsg$xdp(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000180)="9d", 0x1}], 0x1}, 0x0) syz_emit_ethernet(0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="96040066c5911061ee7368a1e3aec4c5494a61ebc3f759515544941300ef5ddc8d59d208067876f0b5f657f6193d9e7a7066eb8d531e9262e4e2317f67"], 0x0) setsockopt$inet_sctp_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) getsockname$unix(r4, &(0x7f00000001c0)=@abs, &(0x7f0000000000)=0x6e) r6 = socket$inet6(0xa, 0x0, 0x0) bind$inet6(r6, &(0x7f0000000080)={0xa, 0x4e20}, 0x1b) 10:17:49 executing program 0: timer_create(0x0, &(0x7f0000000080)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000240)) gettid() socket$netlink(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) r1 = syz_open_dev$sndpcmc(&(0x7f0000000440)='/dev/snd/pcmC#D#c\x00', 0x148, 0x30080) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000480)={0x7, 0x0, 0x6, 0x9}, 0x8) r2 = syz_open_dev$mouse(0x0, 0x10000, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(0xffffffffffffffff, 0x84, 0x1c, 0x0, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000340)={r2, 0x10, &(0x7f00000002c0)={&(0x7f0000000140)=""/9, 0x9, 0x0}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380)=r3, 0x4) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_INTERVAL(0xffffffffffffffff, 0xc040564b, 0x0) r4 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="c7da5f1a", 0x4) accept$alg(0xffffffffffffffff, 0x0, 0x0) fcntl$setstatus(r4, 0x4, 0x2000) r5 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r4, r5, &(0x7f0000000040), 0x10000000000443) writev(r4, &(0x7f00000006c0)=[{&(0x7f0000000600), 0x60020}], 0x1) read(r4, &(0x7f00000003c0)=""/72, 0x100000104) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000540)={{{@in6=@ipv4={[], [], @loopback}, @in=@initdev}}, {{@in=@empty}, 0x0, @in6=@dev}}, &(0x7f0000000640)=0x94) sendmsg$xdp(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000180)="9d", 0x1}], 0x1}, 0x0) syz_emit_ethernet(0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="96040066c5911061ee7368a1e3aec4c5494a61ebc3f759515544941300ef5ddc8d59d208067876f0b5f657f6193d9e7a7066eb8d531e9262e4e2317f67"], 0x0) setsockopt$inet_sctp_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) getsockname$unix(r4, &(0x7f00000001c0)=@abs, &(0x7f0000000000)=0x6e) r6 = socket$inet6(0xa, 0x0, 0x0) bind$inet6(r6, &(0x7f0000000080)={0xa, 0x4e20}, 0x1b) 10:17:49 executing program 5: timer_create(0x0, &(0x7f0000000080)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000240)) gettid() socket$netlink(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) r1 = syz_open_dev$sndpcmc(&(0x7f0000000440)='/dev/snd/pcmC#D#c\x00', 0x148, 0x30080) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000480)={0x7, 0x0, 0x6, 0x9}, 0x8) r2 = syz_open_dev$mouse(0x0, 0x10000, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(0xffffffffffffffff, 0x84, 0x1c, 0x0, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000340)={r2, 0x10, &(0x7f00000002c0)={&(0x7f0000000140)=""/9, 0x9, 0x0}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380)=r3, 0x4) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_INTERVAL(0xffffffffffffffff, 0xc040564b, 0x0) r4 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="c7da5f1a", 0x4) accept$alg(0xffffffffffffffff, 0x0, 0x0) fcntl$setstatus(r4, 0x4, 0x2000) r5 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r4, r5, &(0x7f0000000040), 0x10000000000443) writev(r4, &(0x7f00000006c0)=[{&(0x7f0000000600), 0x60020}], 0x1) read(r4, &(0x7f00000003c0)=""/72, 0x100000104) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000540)={{{@in6=@ipv4={[], [], @loopback}, @in=@initdev}}, {{@in=@empty}, 0x0, @in6=@dev}}, &(0x7f0000000640)=0x94) sendmsg$xdp(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000180)="9d", 0x1}], 0x1}, 0x0) syz_emit_ethernet(0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="96040066c5911061ee7368a1e3aec4c5494a61ebc3f759515544941300ef5ddc8d59d208067876f0b5f657f6193d9e7a7066eb8d531e9262e4e2317f67"], 0x0) setsockopt$inet_sctp_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) getsockname$unix(r4, &(0x7f00000001c0)=@abs, &(0x7f0000000000)=0x6e) r6 = socket$inet6(0xa, 0x0, 0x0) bind$inet6(r6, &(0x7f0000000080)={0xa, 0x4e20}, 0x1b) 10:17:49 executing program 1: timer_create(0x0, &(0x7f0000000080)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000240)) gettid() socket$netlink(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) r1 = syz_open_dev$sndpcmc(&(0x7f0000000440)='/dev/snd/pcmC#D#c\x00', 0x148, 0x30080) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000480)={0x7, 0x0, 0x6, 0x9}, 0x8) r2 = syz_open_dev$mouse(0x0, 0x10000, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(0xffffffffffffffff, 0x84, 0x1c, 0x0, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000340)={r2, 0x10, &(0x7f00000002c0)={&(0x7f0000000140)=""/9, 0x9, 0x0}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380)=r3, 0x4) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_INTERVAL(0xffffffffffffffff, 0xc040564b, 0x0) r4 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="c7da5f1a", 0x4) accept$alg(0xffffffffffffffff, 0x0, 0x0) fcntl$setstatus(r4, 0x4, 0x2000) r5 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r4, r5, &(0x7f0000000040), 0x10000000000443) writev(r4, &(0x7f00000006c0)=[{&(0x7f0000000600), 0x60020}], 0x1) read(r4, &(0x7f00000003c0)=""/72, 0x100000104) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000540)={{{@in6=@ipv4={[], [], @loopback}, @in=@initdev}}, {{@in=@empty}, 0x0, @in6=@dev}}, &(0x7f0000000640)=0x94) sendmsg$xdp(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000180)="9d", 0x1}], 0x1}, 0x0) syz_emit_ethernet(0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="96040066c5911061ee7368a1e3aec4c5494a61ebc3f759515544941300ef5ddc8d59d208067876f0b5f657f6193d9e7a7066eb8d531e9262e4e2317f67"], 0x0) setsockopt$inet_sctp_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) getsockname$unix(r4, &(0x7f00000001c0)=@abs, &(0x7f0000000000)=0x6e) r6 = socket$inet6(0xa, 0x0, 0x0) bind$inet6(r6, &(0x7f0000000080)={0xa, 0x4e20}, 0x1b) 10:17:49 executing program 2: timer_create(0x0, &(0x7f0000000080)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000240)) gettid() socket$netlink(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) r1 = syz_open_dev$sndpcmc(&(0x7f0000000440)='/dev/snd/pcmC#D#c\x00', 0x148, 0x30080) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000480)={0x7, 0x0, 0x6, 0x9}, 0x8) r2 = syz_open_dev$mouse(0x0, 0x10000, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(0xffffffffffffffff, 0x84, 0x1c, 0x0, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000340)={r2, 0x10, &(0x7f00000002c0)={&(0x7f0000000140)=""/9, 0x9, 0x0}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380)=r3, 0x4) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_INTERVAL(0xffffffffffffffff, 0xc040564b, 0x0) r4 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="c7da5f1a", 0x4) accept$alg(0xffffffffffffffff, 0x0, 0x0) fcntl$setstatus(r4, 0x4, 0x2000) r5 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r4, r5, &(0x7f0000000040), 0x10000000000443) writev(r4, &(0x7f00000006c0)=[{&(0x7f0000000600), 0x60020}], 0x1) read(r4, &(0x7f00000003c0)=""/72, 0x100000104) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000540)={{{@in6=@ipv4={[], [], @loopback}, @in=@initdev}}, {{@in=@empty}, 0x0, @in6=@dev}}, &(0x7f0000000640)=0x94) sendmsg$xdp(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000180)="9d", 0x1}], 0x1}, 0x0) syz_emit_ethernet(0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="96040066c5911061ee7368a1e3aec4c5494a61ebc3f759515544941300ef5ddc8d59d208067876f0b5f657f6193d9e7a7066eb8d531e9262e4e2317f67"], 0x0) setsockopt$inet_sctp_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) getsockname$unix(r4, &(0x7f00000001c0)=@abs, &(0x7f0000000000)=0x6e) r6 = socket$inet6(0xa, 0x0, 0x0) bind$inet6(r6, &(0x7f0000000080)={0xa, 0x4e20}, 0x1b) 10:17:49 executing program 3: timer_create(0x0, &(0x7f0000000080)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000240)) gettid() socket$netlink(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) r1 = syz_open_dev$sndpcmc(&(0x7f0000000440)='/dev/snd/pcmC#D#c\x00', 0x148, 0x30080) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000480)={0x7, 0x0, 0x6, 0x9}, 0x8) r2 = syz_open_dev$mouse(0x0, 0x10000, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(0xffffffffffffffff, 0x84, 0x1c, 0x0, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000340)={r2, 0x10, &(0x7f00000002c0)={&(0x7f0000000140)=""/9, 0x9, 0x0}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380)=r3, 0x4) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_INTERVAL(0xffffffffffffffff, 0xc040564b, 0x0) r4 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="c7da5f1a", 0x4) accept$alg(0xffffffffffffffff, 0x0, 0x0) fcntl$setstatus(r4, 0x4, 0x2000) r5 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r4, r5, &(0x7f0000000040), 0x10000000000443) writev(r4, &(0x7f00000006c0)=[{&(0x7f0000000600), 0x60020}], 0x1) read(r4, &(0x7f00000003c0)=""/72, 0x100000104) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000540)={{{@in6=@ipv4={[], [], @loopback}, @in=@initdev}}, {{@in=@empty}, 0x0, @in6=@dev}}, &(0x7f0000000640)=0x94) sendmsg$xdp(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000180)="9d", 0x1}], 0x1}, 0x0) syz_emit_ethernet(0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="96040066c5911061ee7368a1e3aec4c5494a61ebc3f759515544941300ef5ddc8d59d208067876f0b5f657f6193d9e7a7066eb8d531e9262e4e2317f67"], 0x0) setsockopt$inet_sctp_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) getsockname$unix(r4, &(0x7f00000001c0)=@abs, &(0x7f0000000000)=0x6e) r6 = socket$inet6(0xa, 0x0, 0x0) bind$inet6(r6, &(0x7f0000000080)={0xa, 0x4e20}, 0x1b) 10:17:49 executing program 1: timer_create(0x0, &(0x7f0000000080)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000240)) gettid() socket$netlink(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) r1 = syz_open_dev$sndpcmc(&(0x7f0000000440)='/dev/snd/pcmC#D#c\x00', 0x148, 0x30080) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000480)={0x7, 0x0, 0x6, 0x9}, 0x8) r2 = syz_open_dev$mouse(0x0, 0x10000, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(0xffffffffffffffff, 0x84, 0x1c, 0x0, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000340)={r2, 0x10, &(0x7f00000002c0)={&(0x7f0000000140)=""/9, 0x9, 0x0}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380)=r3, 0x4) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_INTERVAL(0xffffffffffffffff, 0xc040564b, 0x0) r4 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="c7da5f1a", 0x4) accept$alg(0xffffffffffffffff, 0x0, 0x0) fcntl$setstatus(r4, 0x4, 0x2000) r5 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r4, r5, &(0x7f0000000040), 0x10000000000443) writev(r4, &(0x7f00000006c0)=[{&(0x7f0000000600), 0x60020}], 0x1) read(r4, &(0x7f00000003c0)=""/72, 0x100000104) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000540)={{{@in6=@ipv4={[], [], @loopback}, @in=@initdev}}, {{@in=@empty}, 0x0, @in6=@dev}}, &(0x7f0000000640)=0x94) sendmsg$xdp(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000180)="9d", 0x1}], 0x1}, 0x0) syz_emit_ethernet(0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="96040066c5911061ee7368a1e3aec4c5494a61ebc3f759515544941300ef5ddc8d59d208067876f0b5f657f6193d9e7a7066eb8d531e9262e4e2317f67"], 0x0) setsockopt$inet_sctp_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) getsockname$unix(r4, &(0x7f00000001c0)=@abs, &(0x7f0000000000)=0x6e) r6 = socket$inet6(0xa, 0x0, 0x0) bind$inet6(r6, &(0x7f0000000080)={0xa, 0x4e20}, 0x1b) 10:17:50 executing program 4: timer_create(0x0, &(0x7f0000000080)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000240)) gettid() socket$netlink(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) r1 = syz_open_dev$sndpcmc(&(0x7f0000000440)='/dev/snd/pcmC#D#c\x00', 0x148, 0x30080) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000480)={0x7, 0x0, 0x6, 0x9}, 0x8) r2 = syz_open_dev$mouse(0x0, 0x10000, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(0xffffffffffffffff, 0x84, 0x1c, 0x0, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000340)={r2, 0x10, &(0x7f00000002c0)={&(0x7f0000000140)=""/9, 0x9, 0x0}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380)=r3, 0x4) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_INTERVAL(0xffffffffffffffff, 0xc040564b, 0x0) r4 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="c7da5f1a", 0x4) accept$alg(0xffffffffffffffff, 0x0, 0x0) fcntl$setstatus(r4, 0x4, 0x2000) r5 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r4, r5, &(0x7f0000000040), 0x10000000000443) writev(r4, &(0x7f00000006c0)=[{&(0x7f0000000600), 0x60020}], 0x1) read(r4, &(0x7f00000003c0)=""/72, 0x100000104) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000540)={{{@in6=@ipv4={[], [], @loopback}, @in=@initdev}}, {{@in=@empty}, 0x0, @in6=@dev}}, &(0x7f0000000640)=0x94) sendmsg$xdp(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000180)="9d", 0x1}], 0x1}, 0x0) syz_emit_ethernet(0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="96040066c5911061ee7368a1e3aec4c5494a61ebc3f759515544941300ef5ddc8d59d208067876f0b5f657f6193d9e7a7066eb8d531e9262e4e2317f67"], 0x0) setsockopt$inet_sctp_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) getsockname$unix(r4, &(0x7f00000001c0)=@abs, &(0x7f0000000000)=0x6e) r6 = socket$inet6(0xa, 0x0, 0x0) bind$inet6(r6, &(0x7f0000000080)={0xa, 0x4e20}, 0x1b) 10:17:50 executing program 5: timer_create(0x0, &(0x7f0000000080)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000240)) gettid() socket$netlink(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) r1 = syz_open_dev$sndpcmc(&(0x7f0000000440)='/dev/snd/pcmC#D#c\x00', 0x148, 0x30080) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000480)={0x7, 0x0, 0x6, 0x9}, 0x8) r2 = syz_open_dev$mouse(0x0, 0x10000, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(0xffffffffffffffff, 0x84, 0x1c, 0x0, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000340)={r2, 0x10, &(0x7f00000002c0)={&(0x7f0000000140)=""/9, 0x9, 0x0}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380)=r3, 0x4) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_INTERVAL(0xffffffffffffffff, 0xc040564b, 0x0) r4 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="c7da5f1a", 0x4) accept$alg(0xffffffffffffffff, 0x0, 0x0) fcntl$setstatus(r4, 0x4, 0x2000) r5 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r4, r5, &(0x7f0000000040), 0x10000000000443) writev(r4, &(0x7f00000006c0)=[{&(0x7f0000000600), 0x60020}], 0x1) read(r4, &(0x7f00000003c0)=""/72, 0x100000104) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000540)={{{@in6=@ipv4={[], [], @loopback}, @in=@initdev}}, {{@in=@empty}, 0x0, @in6=@dev}}, &(0x7f0000000640)=0x94) sendmsg$xdp(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000180)="9d", 0x1}], 0x1}, 0x0) syz_emit_ethernet(0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="96040066c5911061ee7368a1e3aec4c5494a61ebc3f759515544941300ef5ddc8d59d208067876f0b5f657f6193d9e7a7066eb8d531e9262e4e2317f67"], 0x0) setsockopt$inet_sctp_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) getsockname$unix(r4, &(0x7f00000001c0)=@abs, &(0x7f0000000000)=0x6e) r6 = socket$inet6(0xa, 0x0, 0x0) bind$inet6(r6, &(0x7f0000000080)={0xa, 0x4e20}, 0x1b) 10:17:50 executing program 2: timer_create(0x0, &(0x7f0000000080)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000240)) gettid() socket$netlink(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) r1 = syz_open_dev$sndpcmc(&(0x7f0000000440)='/dev/snd/pcmC#D#c\x00', 0x148, 0x30080) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000480)={0x7, 0x0, 0x6, 0x9}, 0x8) r2 = syz_open_dev$mouse(0x0, 0x10000, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(0xffffffffffffffff, 0x84, 0x1c, 0x0, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000340)={r2, 0x10, &(0x7f00000002c0)={&(0x7f0000000140)=""/9, 0x9, 0x0}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380)=r3, 0x4) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_INTERVAL(0xffffffffffffffff, 0xc040564b, 0x0) r4 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="c7da5f1a", 0x4) accept$alg(0xffffffffffffffff, 0x0, 0x0) fcntl$setstatus(r4, 0x4, 0x2000) r5 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r4, r5, &(0x7f0000000040), 0x10000000000443) writev(r4, &(0x7f00000006c0)=[{&(0x7f0000000600), 0x60020}], 0x1) read(r4, &(0x7f00000003c0)=""/72, 0x100000104) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000540)={{{@in6=@ipv4={[], [], @loopback}, @in=@initdev}}, {{@in=@empty}, 0x0, @in6=@dev}}, &(0x7f0000000640)=0x94) sendmsg$xdp(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000180)="9d", 0x1}], 0x1}, 0x0) syz_emit_ethernet(0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="96040066c5911061ee7368a1e3aec4c5494a61ebc3f759515544941300ef5ddc8d59d208067876f0b5f657f6193d9e7a7066eb8d531e9262e4e2317f67"], 0x0) setsockopt$inet_sctp_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) getsockname$unix(r4, &(0x7f00000001c0)=@abs, &(0x7f0000000000)=0x6e) r6 = socket$inet6(0xa, 0x0, 0x0) bind$inet6(r6, &(0x7f0000000080)={0xa, 0x4e20}, 0x1b) 10:17:50 executing program 3: timer_create(0x0, &(0x7f0000000080)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000240)) gettid() socket$netlink(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) r1 = syz_open_dev$sndpcmc(&(0x7f0000000440)='/dev/snd/pcmC#D#c\x00', 0x148, 0x30080) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000480)={0x7, 0x0, 0x6, 0x9}, 0x8) r2 = syz_open_dev$mouse(0x0, 0x10000, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(0xffffffffffffffff, 0x84, 0x1c, 0x0, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000340)={r2, 0x10, &(0x7f00000002c0)={&(0x7f0000000140)=""/9, 0x9, 0x0}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380)=r3, 0x4) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_INTERVAL(0xffffffffffffffff, 0xc040564b, 0x0) r4 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="c7da5f1a", 0x4) accept$alg(0xffffffffffffffff, 0x0, 0x0) fcntl$setstatus(r4, 0x4, 0x2000) r5 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r4, r5, &(0x7f0000000040), 0x10000000000443) writev(r4, &(0x7f00000006c0)=[{&(0x7f0000000600), 0x60020}], 0x1) read(r4, &(0x7f00000003c0)=""/72, 0x100000104) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000540)={{{@in6=@ipv4={[], [], @loopback}, @in=@initdev}}, {{@in=@empty}, 0x0, @in6=@dev}}, &(0x7f0000000640)=0x94) sendmsg$xdp(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000180)="9d", 0x1}], 0x1}, 0x0) syz_emit_ethernet(0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="96040066c5911061ee7368a1e3aec4c5494a61ebc3f759515544941300ef5ddc8d59d208067876f0b5f657f6193d9e7a7066eb8d531e9262e4e2317f67"], 0x0) setsockopt$inet_sctp_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) getsockname$unix(r4, &(0x7f00000001c0)=@abs, &(0x7f0000000000)=0x6e) r6 = socket$inet6(0xa, 0x0, 0x0) bind$inet6(r6, &(0x7f0000000080)={0xa, 0x4e20}, 0x1b) 10:17:50 executing program 0: timer_create(0x0, &(0x7f0000000080)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000240)) gettid() socket$netlink(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) r1 = syz_open_dev$sndpcmc(&(0x7f0000000440)='/dev/snd/pcmC#D#c\x00', 0x148, 0x30080) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000480)={0x7, 0x0, 0x6, 0x9}, 0x8) r2 = syz_open_dev$mouse(0x0, 0x10000, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(0xffffffffffffffff, 0x84, 0x1c, 0x0, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000340)={r2, 0x10, &(0x7f00000002c0)={&(0x7f0000000140)=""/9, 0x9, 0x0}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380)=r3, 0x4) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_INTERVAL(0xffffffffffffffff, 0xc040564b, 0x0) r4 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="c7da5f1a", 0x4) accept$alg(0xffffffffffffffff, 0x0, 0x0) fcntl$setstatus(r4, 0x4, 0x2000) r5 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r4, r5, &(0x7f0000000040), 0x10000000000443) writev(r4, &(0x7f00000006c0)=[{&(0x7f0000000600), 0x60020}], 0x1) read(r4, &(0x7f00000003c0)=""/72, 0x100000104) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000540)={{{@in6=@ipv4={[], [], @loopback}, @in=@initdev}}, {{@in=@empty}, 0x0, @in6=@dev}}, &(0x7f0000000640)=0x94) sendmsg$xdp(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000180)="9d", 0x1}], 0x1}, 0x0) syz_emit_ethernet(0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="96040066c5911061ee7368a1e3aec4c5494a61ebc3f759515544941300ef5ddc8d59d208067876f0b5f657f6193d9e7a7066eb8d531e9262e4e2317f67"], 0x0) setsockopt$inet_sctp_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) getsockname$unix(r4, &(0x7f00000001c0)=@abs, &(0x7f0000000000)=0x6e) r6 = socket$inet6(0xa, 0x0, 0x0) bind$inet6(r6, &(0x7f0000000080)={0xa, 0x4e20}, 0x1b) 10:17:50 executing program 1: timer_create(0x0, &(0x7f0000000080)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000240)) gettid() socket$netlink(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) r1 = syz_open_dev$sndpcmc(&(0x7f0000000440)='/dev/snd/pcmC#D#c\x00', 0x148, 0x30080) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000480)={0x7, 0x0, 0x6, 0x9}, 0x8) r2 = syz_open_dev$mouse(0x0, 0x10000, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(0xffffffffffffffff, 0x84, 0x1c, 0x0, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000340)={r2, 0x10, &(0x7f00000002c0)={&(0x7f0000000140)=""/9, 0x9, 0x0}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380)=r3, 0x4) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_INTERVAL(0xffffffffffffffff, 0xc040564b, 0x0) r4 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="c7da5f1a", 0x4) accept$alg(0xffffffffffffffff, 0x0, 0x0) fcntl$setstatus(r4, 0x4, 0x2000) r5 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r4, r5, &(0x7f0000000040), 0x10000000000443) writev(r4, &(0x7f00000006c0)=[{&(0x7f0000000600), 0x60020}], 0x1) read(r4, &(0x7f00000003c0)=""/72, 0x100000104) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000540)={{{@in6=@ipv4={[], [], @loopback}, @in=@initdev}}, {{@in=@empty}, 0x0, @in6=@dev}}, &(0x7f0000000640)=0x94) sendmsg$xdp(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000180)="9d", 0x1}], 0x1}, 0x0) syz_emit_ethernet(0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="96040066c5911061ee7368a1e3aec4c5494a61ebc3f759515544941300ef5ddc8d59d208067876f0b5f657f6193d9e7a7066eb8d531e9262e4e2317f67"], 0x0) setsockopt$inet_sctp_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) getsockname$unix(r4, &(0x7f00000001c0)=@abs, &(0x7f0000000000)=0x6e) r6 = socket$inet6(0xa, 0x0, 0x0) bind$inet6(r6, &(0x7f0000000080)={0xa, 0x4e20}, 0x1b) 10:17:50 executing program 2: timer_create(0x0, &(0x7f0000000080)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000240)) gettid() socket$netlink(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) r1 = syz_open_dev$sndpcmc(&(0x7f0000000440)='/dev/snd/pcmC#D#c\x00', 0x148, 0x30080) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000480)={0x7, 0x0, 0x6, 0x9}, 0x8) r2 = syz_open_dev$mouse(0x0, 0x10000, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(0xffffffffffffffff, 0x84, 0x1c, 0x0, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000340)={r2, 0x10, &(0x7f00000002c0)={&(0x7f0000000140)=""/9, 0x9, 0x0}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380)=r3, 0x4) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_INTERVAL(0xffffffffffffffff, 0xc040564b, 0x0) r4 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="c7da5f1a", 0x4) accept$alg(0xffffffffffffffff, 0x0, 0x0) fcntl$setstatus(r4, 0x4, 0x2000) r5 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r4, r5, &(0x7f0000000040), 0x10000000000443) writev(r4, &(0x7f00000006c0)=[{&(0x7f0000000600), 0x60020}], 0x1) read(r4, &(0x7f00000003c0)=""/72, 0x100000104) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000540)={{{@in6=@ipv4={[], [], @loopback}, @in=@initdev}}, {{@in=@empty}, 0x0, @in6=@dev}}, &(0x7f0000000640)=0x94) sendmsg$xdp(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000180)="9d", 0x1}], 0x1}, 0x0) syz_emit_ethernet(0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="96040066c5911061ee7368a1e3aec4c5494a61ebc3f759515544941300ef5ddc8d59d208067876f0b5f657f6193d9e7a7066eb8d531e9262e4e2317f67"], 0x0) setsockopt$inet_sctp_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) getsockname$unix(r4, &(0x7f00000001c0)=@abs, &(0x7f0000000000)=0x6e) r6 = socket$inet6(0xa, 0x0, 0x0) bind$inet6(r6, &(0x7f0000000080)={0xa, 0x4e20}, 0x1b) 10:17:50 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0xfffffd27, &(0x7f0000000100)={&(0x7f0000000000)={0x2c, 0x35, 0x835, 0x0, 0x0, {0x2801, 0x1000000}, [@nested={0x18, 0x0, [@typed={0x14, 0x1, @ipv6=@loopback={0xffffffff00000000}}]}]}, 0x2c}}, 0x0) 10:17:50 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) listen(r0, 0x6) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x1e, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @local}], 0x1c) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000100), 0x4) openat$misdntimer(0xffffffffffffff9c, 0x0, 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) socket$tipc(0x1e, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x0, 0x0) exit_group(0x0) [ 1593.964137] net_ratelimit: 24 callbacks suppressed [ 1593.964146] netlink: set zone limit has 4 unknown bytes 10:17:50 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0xfffffd27, &(0x7f0000000100)={&(0x7f0000000000)={0x2c, 0x35, 0x835, 0x0, 0x0, {0x2801, 0x1000000}, [@nested={0x18, 0x0, [@typed={0x14, 0x1, @ipv6=@loopback={0xffffffff00000000}}]}]}, 0x2c}}, 0x0) 10:17:50 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) listen(r0, 0x6) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x1e, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @local}], 0x1c) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000100), 0x4) openat$misdntimer(0xffffffffffffff9c, 0x0, 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) socket$tipc(0x1e, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x0, 0x0) exit_group(0x0) [ 1594.276541] netlink: set zone limit has 4 unknown bytes 10:17:51 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) listen(r0, 0x6) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x1e, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @local}], 0x1c) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000100), 0x4) openat$misdntimer(0xffffffffffffff9c, 0x0, 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) socket$tipc(0x1e, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x0, 0x0) exit_group(0x0) 10:17:51 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) 10:17:51 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0xfffffd27, &(0x7f0000000100)={&(0x7f0000000000)={0x2c, 0x35, 0x835, 0x0, 0x0, {0x2801, 0x1000000}, [@nested={0x18, 0x0, [@typed={0x14, 0x1, @ipv6=@loopback={0xffffffff00000000}}]}]}, 0x2c}}, 0x0) 10:17:51 executing program 0: timer_create(0x0, &(0x7f0000000080)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000240)) gettid() socket$netlink(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) r1 = syz_open_dev$sndpcmc(&(0x7f0000000440)='/dev/snd/pcmC#D#c\x00', 0x148, 0x30080) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000480)={0x7, 0x0, 0x6, 0x9}, 0x8) r2 = syz_open_dev$mouse(0x0, 0x10000, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(0xffffffffffffffff, 0x84, 0x1c, 0x0, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000340)={r2, 0x10, &(0x7f00000002c0)={&(0x7f0000000140)=""/9, 0x9, 0x0}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380)=r3, 0x4) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_INTERVAL(0xffffffffffffffff, 0xc040564b, 0x0) r4 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="c7da5f1a", 0x4) accept$alg(0xffffffffffffffff, 0x0, 0x0) fcntl$setstatus(r4, 0x4, 0x2000) r5 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r4, r5, &(0x7f0000000040), 0x10000000000443) writev(r4, &(0x7f00000006c0)=[{&(0x7f0000000600), 0x60020}], 0x1) read(r4, &(0x7f00000003c0)=""/72, 0x100000104) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000540)={{{@in6=@ipv4={[], [], @loopback}, @in=@initdev}}, {{@in=@empty}, 0x0, @in6=@dev}}, &(0x7f0000000640)=0x94) sendmsg$xdp(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000180)="9d", 0x1}], 0x1}, 0x0) syz_emit_ethernet(0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="96040066c5911061ee7368a1e3aec4c5494a61ebc3f759515544941300ef5ddc8d59d208067876f0b5f657f6193d9e7a7066eb8d531e9262e4e2317f67"], 0x0) setsockopt$inet_sctp_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) getsockname$unix(r4, &(0x7f00000001c0)=@abs, &(0x7f0000000000)=0x6e) r6 = socket$inet6(0xa, 0x0, 0x0) bind$inet6(r6, &(0x7f0000000080)={0xa, 0x4e20}, 0x1b) 10:17:51 executing program 3: timer_create(0x0, &(0x7f0000000080)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000240)) gettid() socket$netlink(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) r1 = syz_open_dev$sndpcmc(&(0x7f0000000440)='/dev/snd/pcmC#D#c\x00', 0x148, 0x30080) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000480)={0x7, 0x0, 0x6, 0x9}, 0x8) r2 = syz_open_dev$mouse(0x0, 0x10000, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(0xffffffffffffffff, 0x84, 0x1c, 0x0, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000340)={r2, 0x10, &(0x7f00000002c0)={&(0x7f0000000140)=""/9, 0x9, 0x0}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380)=r3, 0x4) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_INTERVAL(0xffffffffffffffff, 0xc040564b, 0x0) r4 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="c7da5f1a", 0x4) accept$alg(0xffffffffffffffff, 0x0, 0x0) fcntl$setstatus(r4, 0x4, 0x2000) r5 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r4, r5, &(0x7f0000000040), 0x10000000000443) writev(r4, &(0x7f00000006c0)=[{&(0x7f0000000600), 0x60020}], 0x1) read(r4, &(0x7f00000003c0)=""/72, 0x100000104) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000540)={{{@in6=@ipv4={[], [], @loopback}, @in=@initdev}}, {{@in=@empty}, 0x0, @in6=@dev}}, &(0x7f0000000640)=0x94) sendmsg$xdp(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000180)="9d", 0x1}], 0x1}, 0x0) syz_emit_ethernet(0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="96040066c5911061ee7368a1e3aec4c5494a61ebc3f759515544941300ef5ddc8d59d208067876f0b5f657f6193d9e7a7066eb8d531e9262e4e2317f67"], 0x0) setsockopt$inet_sctp_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) getsockname$unix(r4, &(0x7f00000001c0)=@abs, &(0x7f0000000000)=0x6e) r6 = socket$inet6(0xa, 0x0, 0x0) bind$inet6(r6, &(0x7f0000000080)={0xa, 0x4e20}, 0x1b) 10:17:51 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) 10:17:51 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) listen(r0, 0x6) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x1e, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @local}], 0x1c) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000100), 0x4) openat$misdntimer(0xffffffffffffff9c, 0x0, 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) socket$tipc(0x1e, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x0, 0x0) exit_group(0x0) [ 1594.530887] netlink: set zone limit has 4 unknown bytes 10:17:51 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0xfffffd27, &(0x7f0000000100)={&(0x7f0000000000)={0x2c, 0x35, 0x835, 0x0, 0x0, {0x2801, 0x1000000}, [@nested={0x18, 0x0, [@typed={0x14, 0x1, @ipv6=@loopback={0xffffffff00000000}}]}]}, 0x2c}}, 0x0) 10:17:51 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) listen(r0, 0x6) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x1e, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @local}], 0x1c) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000100), 0x4) openat$misdntimer(0xffffffffffffff9c, 0x0, 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) socket$tipc(0x1e, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x0, 0x0) exit_group(0x0) 10:17:51 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) [ 1594.745892] netlink: set zone limit has 4 unknown bytes 10:17:51 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) 10:17:51 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) listen(r0, 0x6) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x1e, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @local}], 0x1c) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000100), 0x4) openat$misdntimer(0xffffffffffffff9c, 0x0, 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) socket$tipc(0x1e, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x0, 0x0) exit_group(0x0) 10:17:51 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000080)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) r2 = socket$l2tp(0x18, 0x1, 0x1) io_pgetevents(0x0, 0x7fff, 0x0, &(0x7f0000000140), &(0x7f00000001c0)={0x77359400}, &(0x7f00000002c0)={&(0x7f0000000280), 0x8}) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x20601, 0x0) write$evdev(0xffffffffffffffff, &(0x7f0000000400), 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0xffffffffffffffff, r3, 0x0, 0x2, &(0x7f0000000240)='\\\x00'}, 0x30) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r0, 0xc1105511, &(0x7f00000003c0)={{0x8, 0x0, 0x400, 0x5, 'syz1\x00', 0x3}, 0x1, 0x20000000, 0x2, r4, 0x0, 0x2, 'syz0\x00', 0x0, 0x0, [], [0x40, 0x30, 0x8001, 0x2]}) ioctl$VIDIOC_G_INPUT(r5, 0x80045626, &(0x7f0000000640)) r6 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x10000000080, 0x0) perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0x4, 0x5, 0x8, 0x5, 0x0, 0x7, 0x3200, 0x8, 0x8000, 0x7f, 0x0, 0x20, 0x4, 0x9, 0x38000000000000, 0x5, 0xffff, 0x6756, 0x47a7, 0xd167, 0x2, 0x3, 0x9, 0x1, 0x62e, 0xce22, 0x0, 0x100000000, 0x9, 0x870, 0x4, 0x0, 0x6, 0x101, 0x2, 0x4, 0x0, 0x100000000, 0x4, @perf_bp={0x0, 0x2}, 0x10059, 0x0, 0x3ff, 0x1, 0x76a7, 0x310d7fff80, 0x7f}, r4, 0xd, 0xffffffffffffffff, 0x2) ioctl$BLKBSZSET(r6, 0x40081271, &(0x7f00000008c0)=0x3) ioctl$EVIOCGABS20(r3, 0x80184560, &(0x7f00000005c0)=""/68) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000700), 0x111, 0xe}}, 0x20) r7 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000000380), 0x80800) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_settime(0x0, 0x1, &(0x7f0000000040)={{0x0, 0x989680}}, &(0x7f00000000c0)) ioctl$FS_IOC_SETVERSION(r7, 0x40087602, &(0x7f0000000080)=0x7) ioctl$UI_END_FF_UPLOAD(r7, 0x406855c9, &(0x7f00000007c0)={0x5, 0x6, {0x56, 0x10001, 0xfffffffffffffffd, {0x5}, {0x80000001, 0x5}, @const={0xffffffffffff66e5, {0x9, 0x7, 0x81, 0x80}}}, {0x54, 0x75, 0x10001, {0x5, 0x80000001}, {0x2, 0x5}, @ramp={0x6920000000000000, 0x0, {0x3, 0xffffffff, 0xfffffffffffffffe, 0xbf53}}}}) close(r3) arch_prctl$ARCH_GET_FS(0x1003, &(0x7f0000000840)) utimensat(0xffffffffffffffff, 0x0, &(0x7f00000016c0), 0x0) connect$l2tp(r2, &(0x7f00000000c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}, 0x4, 0x8}}, 0x2e) dup3(r1, r2, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000900)=ANY=[@ANYBLOB="67e9b8ad27439b16daf1782ae17d840289f4c4fd0a934c896dc7c0ab7ce112a1a1c7d1f8c6d7220c90f3b5c94e93bfdcfc1ceb1f681cec2378dd66fc5d0e5581b58dd0e6d618a5b80f7a555a765246d680aabf84e47742d97dfc8c4eb0cd5e82d0b316bfb939fbac404473de8cf80c05babba5126b43728e3f3b9137aa45042a0f60715c3224e4397339b2aec80fe665407848108d283d5214cc46ceab956ffbf85573", @ANYRESOCT]) r8 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x111800, 0x0) getdents64(r8, &(0x7f0000000200)=""/189, 0xbd) 10:17:51 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) 10:17:51 executing program 3: openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x40000000000, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x40000000, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x4, 0x4, 0x400000000004, 0x9}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_LINKINFO={0x14, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0x4}}}]}, 0x3c}}, 0x0) add_key(&(0x7f0000000080)='dns_resolver\x00', &(0x7f00000000c0)={'\x02\x00'}, &(0x7f0000000100), 0xfffff, 0xfffffffffffffffb) 10:17:51 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) listen(r0, 0x6) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x1e, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @local}], 0x1c) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000100), 0x4) openat$misdntimer(0xffffffffffffff9c, 0x0, 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) socket$tipc(0x1e, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x0, 0x0) exit_group(0x0) 10:17:51 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) 10:17:52 executing program 1: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={0xffffffffffffffff, &(0x7f0000000080), 0x0}, 0x70) 10:17:52 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) 10:17:52 executing program 2: write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="0ee0e191f9ff000000002d00670d7b066f66db683bd51f36d633ae3c37ff48bc044926e4ce2e727af44b3a0046e708000800007ab1b89b86be"], 0x1) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2b) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x1, 0x0, 0x9}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 10:17:52 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000140)='cpuset.sched_load_balance\x00', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendfile(r1, r1, 0x0, 0x200001) [ 1595.405563] hfs: unable to parse mount options 10:17:52 executing program 1: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={0xffffffffffffffff, &(0x7f0000000080), 0x0}, 0x70) 10:17:52 executing program 3: openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x40000000000, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x40000000, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x4, 0x4, 0x400000000004, 0x9}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_LINKINFO={0x14, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0x4}}}]}, 0x3c}}, 0x0) add_key(&(0x7f0000000080)='dns_resolver\x00', &(0x7f00000000c0)={'\x02\x00'}, &(0x7f0000000100), 0xfffff, 0xfffffffffffffffb) 10:17:52 executing program 4: openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x40000000000, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x40000000, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x4, 0x4, 0x400000000004, 0x9}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_LINKINFO={0x14, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0x4}}}]}, 0x3c}}, 0x0) add_key(&(0x7f0000000080)='dns_resolver\x00', &(0x7f00000000c0)={'\x02\x00'}, &(0x7f0000000100), 0xfffff, 0xfffffffffffffffb) [ 1595.605696] hfs: unable to parse mount options [ 1595.630594] audit: type=1400 audit(1551953872.406:414): avc: denied { mmap_zero } for pid=5423 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=memprotect permissive=1 10:17:52 executing program 1: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={0xffffffffffffffff, &(0x7f0000000080), 0x0}, 0x70) 10:17:52 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000080)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) r2 = socket$l2tp(0x18, 0x1, 0x1) io_pgetevents(0x0, 0x7fff, 0x0, &(0x7f0000000140), &(0x7f00000001c0)={0x77359400}, &(0x7f00000002c0)={&(0x7f0000000280), 0x8}) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x20601, 0x0) write$evdev(0xffffffffffffffff, &(0x7f0000000400), 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0xffffffffffffffff, r3, 0x0, 0x2, &(0x7f0000000240)='\\\x00'}, 0x30) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r0, 0xc1105511, &(0x7f00000003c0)={{0x8, 0x0, 0x400, 0x5, 'syz1\x00', 0x3}, 0x1, 0x20000000, 0x2, r4, 0x0, 0x2, 'syz0\x00', 0x0, 0x0, [], [0x40, 0x30, 0x8001, 0x2]}) ioctl$VIDIOC_G_INPUT(r5, 0x80045626, &(0x7f0000000640)) r6 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x10000000080, 0x0) perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0x4, 0x5, 0x8, 0x5, 0x0, 0x7, 0x3200, 0x8, 0x8000, 0x7f, 0x0, 0x20, 0x4, 0x9, 0x38000000000000, 0x5, 0xffff, 0x6756, 0x47a7, 0xd167, 0x2, 0x3, 0x9, 0x1, 0x62e, 0xce22, 0x0, 0x100000000, 0x9, 0x870, 0x4, 0x0, 0x6, 0x101, 0x2, 0x4, 0x0, 0x100000000, 0x4, @perf_bp={0x0, 0x2}, 0x10059, 0x0, 0x3ff, 0x1, 0x76a7, 0x310d7fff80, 0x7f}, r4, 0xd, 0xffffffffffffffff, 0x2) ioctl$BLKBSZSET(r6, 0x40081271, &(0x7f00000008c0)=0x3) ioctl$EVIOCGABS20(r3, 0x80184560, &(0x7f00000005c0)=""/68) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000700), 0x111, 0xe}}, 0x20) r7 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000000380), 0x80800) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_settime(0x0, 0x1, &(0x7f0000000040)={{0x0, 0x989680}}, &(0x7f00000000c0)) ioctl$FS_IOC_SETVERSION(r7, 0x40087602, &(0x7f0000000080)=0x7) ioctl$UI_END_FF_UPLOAD(r7, 0x406855c9, &(0x7f00000007c0)={0x5, 0x6, {0x56, 0x10001, 0xfffffffffffffffd, {0x5}, {0x80000001, 0x5}, @const={0xffffffffffff66e5, {0x9, 0x7, 0x81, 0x80}}}, {0x54, 0x75, 0x10001, {0x5, 0x80000001}, {0x2, 0x5}, @ramp={0x6920000000000000, 0x0, {0x3, 0xffffffff, 0xfffffffffffffffe, 0xbf53}}}}) close(r3) arch_prctl$ARCH_GET_FS(0x1003, &(0x7f0000000840)) utimensat(0xffffffffffffffff, 0x0, &(0x7f00000016c0), 0x0) connect$l2tp(r2, &(0x7f00000000c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}, 0x4, 0x8}}, 0x2e) dup3(r1, r2, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000900)=ANY=[@ANYBLOB="67e9b8ad27439b16daf1782ae17d840289f4c4fd0a934c896dc7c0ab7ce112a1a1c7d1f8c6d7220c90f3b5c94e93bfdcfc1ceb1f681cec2378dd66fc5d0e5581b58dd0e6d618a5b80f7a555a765246d680aabf84e47742d97dfc8c4eb0cd5e82d0b316bfb939fbac404473de8cf80c05babba5126b43728e3f3b9137aa45042a0f60715c3224e4397339b2aec80fe665407848108d283d5214cc46ceab956ffbf85573", @ANYRESOCT]) r8 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x111800, 0x0) getdents64(r8, &(0x7f0000000200)=""/189, 0xbd) 10:17:52 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000080)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) r2 = socket$l2tp(0x18, 0x1, 0x1) io_pgetevents(0x0, 0x7fff, 0x0, &(0x7f0000000140), &(0x7f00000001c0)={0x77359400}, &(0x7f00000002c0)={&(0x7f0000000280), 0x8}) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x20601, 0x0) write$evdev(0xffffffffffffffff, &(0x7f0000000400), 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0xffffffffffffffff, r3, 0x0, 0x2, &(0x7f0000000240)='\\\x00'}, 0x30) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r0, 0xc1105511, &(0x7f00000003c0)={{0x8, 0x0, 0x400, 0x5, 'syz1\x00', 0x3}, 0x1, 0x20000000, 0x2, r4, 0x0, 0x2, 'syz0\x00', 0x0, 0x0, [], [0x40, 0x30, 0x8001, 0x2]}) ioctl$VIDIOC_G_INPUT(r5, 0x80045626, &(0x7f0000000640)) r6 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x10000000080, 0x0) perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0x4, 0x5, 0x8, 0x5, 0x0, 0x7, 0x3200, 0x8, 0x8000, 0x7f, 0x0, 0x20, 0x4, 0x9, 0x38000000000000, 0x5, 0xffff, 0x6756, 0x47a7, 0xd167, 0x2, 0x3, 0x9, 0x1, 0x62e, 0xce22, 0x0, 0x100000000, 0x9, 0x870, 0x4, 0x0, 0x6, 0x101, 0x2, 0x4, 0x0, 0x100000000, 0x4, @perf_bp={0x0, 0x2}, 0x10059, 0x0, 0x3ff, 0x1, 0x76a7, 0x310d7fff80, 0x7f}, r4, 0xd, 0xffffffffffffffff, 0x2) ioctl$BLKBSZSET(r6, 0x40081271, &(0x7f00000008c0)=0x3) ioctl$EVIOCGABS20(r3, 0x80184560, &(0x7f00000005c0)=""/68) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000700), 0x111, 0xe}}, 0x20) r7 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000000380), 0x80800) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_settime(0x0, 0x1, &(0x7f0000000040)={{0x0, 0x989680}}, &(0x7f00000000c0)) ioctl$FS_IOC_SETVERSION(r7, 0x40087602, &(0x7f0000000080)=0x7) ioctl$UI_END_FF_UPLOAD(r7, 0x406855c9, &(0x7f00000007c0)={0x5, 0x6, {0x56, 0x10001, 0xfffffffffffffffd, {0x5}, {0x80000001, 0x5}, @const={0xffffffffffff66e5, {0x9, 0x7, 0x81, 0x80}}}, {0x54, 0x75, 0x10001, {0x5, 0x80000001}, {0x2, 0x5}, @ramp={0x6920000000000000, 0x0, {0x3, 0xffffffff, 0xfffffffffffffffe, 0xbf53}}}}) close(r3) arch_prctl$ARCH_GET_FS(0x1003, &(0x7f0000000840)) utimensat(0xffffffffffffffff, 0x0, &(0x7f00000016c0), 0x0) connect$l2tp(r2, &(0x7f00000000c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}, 0x4, 0x8}}, 0x2e) dup3(r1, r2, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000900)=ANY=[@ANYBLOB="67e9b8ad27439b16daf1782ae17d840289f4c4fd0a934c896dc7c0ab7ce112a1a1c7d1f8c6d7220c90f3b5c94e93bfdcfc1ceb1f681cec2378dd66fc5d0e5581b58dd0e6d618a5b80f7a555a765246d680aabf84e47742d97dfc8c4eb0cd5e82d0b316bfb939fbac404473de8cf80c05babba5126b43728e3f3b9137aa45042a0f60715c3224e4397339b2aec80fe665407848108d283d5214cc46ceab956ffbf85573", @ANYRESOCT]) r8 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x111800, 0x0) getdents64(r8, &(0x7f0000000200)=""/189, 0xbd) 10:17:52 executing program 1: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={0xffffffffffffffff, &(0x7f0000000080), 0x0}, 0x70) 10:17:52 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000080)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) r2 = socket$l2tp(0x18, 0x1, 0x1) io_pgetevents(0x0, 0x7fff, 0x0, &(0x7f0000000140), &(0x7f00000001c0)={0x77359400}, &(0x7f00000002c0)={&(0x7f0000000280), 0x8}) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x20601, 0x0) write$evdev(0xffffffffffffffff, &(0x7f0000000400), 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0xffffffffffffffff, r3, 0x0, 0x2, &(0x7f0000000240)='\\\x00'}, 0x30) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r0, 0xc1105511, &(0x7f00000003c0)={{0x8, 0x0, 0x400, 0x5, 'syz1\x00', 0x3}, 0x1, 0x20000000, 0x2, r4, 0x0, 0x2, 'syz0\x00', 0x0, 0x0, [], [0x40, 0x30, 0x8001, 0x2]}) ioctl$VIDIOC_G_INPUT(r5, 0x80045626, &(0x7f0000000640)) r6 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x10000000080, 0x0) perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0x4, 0x5, 0x8, 0x5, 0x0, 0x7, 0x3200, 0x8, 0x8000, 0x7f, 0x0, 0x20, 0x4, 0x9, 0x38000000000000, 0x5, 0xffff, 0x6756, 0x47a7, 0xd167, 0x2, 0x3, 0x9, 0x1, 0x62e, 0xce22, 0x0, 0x100000000, 0x9, 0x870, 0x4, 0x0, 0x6, 0x101, 0x2, 0x4, 0x0, 0x100000000, 0x4, @perf_bp={0x0, 0x2}, 0x10059, 0x0, 0x3ff, 0x1, 0x76a7, 0x310d7fff80, 0x7f}, r4, 0xd, 0xffffffffffffffff, 0x2) ioctl$BLKBSZSET(r6, 0x40081271, &(0x7f00000008c0)=0x3) ioctl$EVIOCGABS20(r3, 0x80184560, &(0x7f00000005c0)=""/68) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000700), 0x111, 0xe}}, 0x20) r7 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000000380), 0x80800) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_settime(0x0, 0x1, &(0x7f0000000040)={{0x0, 0x989680}}, &(0x7f00000000c0)) ioctl$FS_IOC_SETVERSION(r7, 0x40087602, &(0x7f0000000080)=0x7) ioctl$UI_END_FF_UPLOAD(r7, 0x406855c9, &(0x7f00000007c0)={0x5, 0x6, {0x56, 0x10001, 0xfffffffffffffffd, {0x5}, {0x80000001, 0x5}, @const={0xffffffffffff66e5, {0x9, 0x7, 0x81, 0x80}}}, {0x54, 0x75, 0x10001, {0x5, 0x80000001}, {0x2, 0x5}, @ramp={0x6920000000000000, 0x0, {0x3, 0xffffffff, 0xfffffffffffffffe, 0xbf53}}}}) close(r3) arch_prctl$ARCH_GET_FS(0x1003, &(0x7f0000000840)) utimensat(0xffffffffffffffff, 0x0, &(0x7f00000016c0), 0x0) connect$l2tp(r2, &(0x7f00000000c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}, 0x4, 0x8}}, 0x2e) dup3(r1, r2, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000900)=ANY=[@ANYBLOB="67e9b8ad27439b16daf1782ae17d840289f4c4fd0a934c896dc7c0ab7ce112a1a1c7d1f8c6d7220c90f3b5c94e93bfdcfc1ceb1f681cec2378dd66fc5d0e5581b58dd0e6d618a5b80f7a555a765246d680aabf84e47742d97dfc8c4eb0cd5e82d0b316bfb939fbac404473de8cf80c05babba5126b43728e3f3b9137aa45042a0f60715c3224e4397339b2aec80fe665407848108d283d5214cc46ceab956ffbf85573", @ANYRESOCT]) r8 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x111800, 0x0) getdents64(r8, &(0x7f0000000200)=""/189, 0xbd) [ 1596.111864] hfs: unable to parse mount options 10:17:53 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000080)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) r2 = socket$l2tp(0x18, 0x1, 0x1) io_pgetevents(0x0, 0x7fff, 0x0, &(0x7f0000000140), &(0x7f00000001c0)={0x77359400}, &(0x7f00000002c0)={&(0x7f0000000280), 0x8}) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x20601, 0x0) write$evdev(0xffffffffffffffff, &(0x7f0000000400), 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0xffffffffffffffff, r3, 0x0, 0x2, &(0x7f0000000240)='\\\x00'}, 0x30) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r0, 0xc1105511, &(0x7f00000003c0)={{0x8, 0x0, 0x400, 0x5, 'syz1\x00', 0x3}, 0x1, 0x20000000, 0x2, r4, 0x0, 0x2, 'syz0\x00', 0x0, 0x0, [], [0x40, 0x30, 0x8001, 0x2]}) ioctl$VIDIOC_G_INPUT(r5, 0x80045626, &(0x7f0000000640)) r6 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x10000000080, 0x0) perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0x4, 0x5, 0x8, 0x5, 0x0, 0x7, 0x3200, 0x8, 0x8000, 0x7f, 0x0, 0x20, 0x4, 0x9, 0x38000000000000, 0x5, 0xffff, 0x6756, 0x47a7, 0xd167, 0x2, 0x3, 0x9, 0x1, 0x62e, 0xce22, 0x0, 0x100000000, 0x9, 0x870, 0x4, 0x0, 0x6, 0x101, 0x2, 0x4, 0x0, 0x100000000, 0x4, @perf_bp={0x0, 0x2}, 0x10059, 0x0, 0x3ff, 0x1, 0x76a7, 0x310d7fff80, 0x7f}, r4, 0xd, 0xffffffffffffffff, 0x2) ioctl$BLKBSZSET(r6, 0x40081271, &(0x7f00000008c0)=0x3) ioctl$EVIOCGABS20(r3, 0x80184560, &(0x7f00000005c0)=""/68) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000700), 0x111, 0xe}}, 0x20) r7 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000000380), 0x80800) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_settime(0x0, 0x1, &(0x7f0000000040)={{0x0, 0x989680}}, &(0x7f00000000c0)) ioctl$FS_IOC_SETVERSION(r7, 0x40087602, &(0x7f0000000080)=0x7) ioctl$UI_END_FF_UPLOAD(r7, 0x406855c9, &(0x7f00000007c0)={0x5, 0x6, {0x56, 0x10001, 0xfffffffffffffffd, {0x5}, {0x80000001, 0x5}, @const={0xffffffffffff66e5, {0x9, 0x7, 0x81, 0x80}}}, {0x54, 0x75, 0x10001, {0x5, 0x80000001}, {0x2, 0x5}, @ramp={0x6920000000000000, 0x0, {0x3, 0xffffffff, 0xfffffffffffffffe, 0xbf53}}}}) close(r3) arch_prctl$ARCH_GET_FS(0x1003, &(0x7f0000000840)) utimensat(0xffffffffffffffff, 0x0, &(0x7f00000016c0), 0x0) connect$l2tp(r2, &(0x7f00000000c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}, 0x4, 0x8}}, 0x2e) dup3(r1, r2, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000900)=ANY=[@ANYBLOB="67e9b8ad27439b16daf1782ae17d840289f4c4fd0a934c896dc7c0ab7ce112a1a1c7d1f8c6d7220c90f3b5c94e93bfdcfc1ceb1f681cec2378dd66fc5d0e5581b58dd0e6d618a5b80f7a555a765246d680aabf84e47742d97dfc8c4eb0cd5e82d0b316bfb939fbac404473de8cf80c05babba5126b43728e3f3b9137aa45042a0f60715c3224e4397339b2aec80fe665407848108d283d5214cc46ceab956ffbf85573", @ANYRESOCT]) r8 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x111800, 0x0) getdents64(r8, &(0x7f0000000200)=""/189, 0xbd) 10:17:53 executing program 3: openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x40000000000, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x40000000, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x4, 0x4, 0x400000000004, 0x9}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_LINKINFO={0x14, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0x4}}}]}, 0x3c}}, 0x0) add_key(&(0x7f0000000080)='dns_resolver\x00', &(0x7f00000000c0)={'\x02\x00'}, &(0x7f0000000100), 0xfffff, 0xfffffffffffffffb) [ 1596.743976] hfs: unable to parse mount options 10:17:55 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000080)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) r2 = socket$l2tp(0x18, 0x1, 0x1) io_pgetevents(0x0, 0x7fff, 0x0, &(0x7f0000000140), &(0x7f00000001c0)={0x77359400}, &(0x7f00000002c0)={&(0x7f0000000280), 0x8}) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x20601, 0x0) write$evdev(0xffffffffffffffff, &(0x7f0000000400), 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0xffffffffffffffff, r3, 0x0, 0x2, &(0x7f0000000240)='\\\x00'}, 0x30) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r0, 0xc1105511, &(0x7f00000003c0)={{0x8, 0x0, 0x400, 0x5, 'syz1\x00', 0x3}, 0x1, 0x20000000, 0x2, r4, 0x0, 0x2, 'syz0\x00', 0x0, 0x0, [], [0x40, 0x30, 0x8001, 0x2]}) ioctl$VIDIOC_G_INPUT(r5, 0x80045626, &(0x7f0000000640)) r6 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x10000000080, 0x0) perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0x4, 0x5, 0x8, 0x5, 0x0, 0x7, 0x3200, 0x8, 0x8000, 0x7f, 0x0, 0x20, 0x4, 0x9, 0x38000000000000, 0x5, 0xffff, 0x6756, 0x47a7, 0xd167, 0x2, 0x3, 0x9, 0x1, 0x62e, 0xce22, 0x0, 0x100000000, 0x9, 0x870, 0x4, 0x0, 0x6, 0x101, 0x2, 0x4, 0x0, 0x100000000, 0x4, @perf_bp={0x0, 0x2}, 0x10059, 0x0, 0x3ff, 0x1, 0x76a7, 0x310d7fff80, 0x7f}, r4, 0xd, 0xffffffffffffffff, 0x2) ioctl$BLKBSZSET(r6, 0x40081271, &(0x7f00000008c0)=0x3) ioctl$EVIOCGABS20(r3, 0x80184560, &(0x7f00000005c0)=""/68) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000700), 0x111, 0xe}}, 0x20) r7 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000000380), 0x80800) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_settime(0x0, 0x1, &(0x7f0000000040)={{0x0, 0x989680}}, &(0x7f00000000c0)) ioctl$FS_IOC_SETVERSION(r7, 0x40087602, &(0x7f0000000080)=0x7) ioctl$UI_END_FF_UPLOAD(r7, 0x406855c9, &(0x7f00000007c0)={0x5, 0x6, {0x56, 0x10001, 0xfffffffffffffffd, {0x5}, {0x80000001, 0x5}, @const={0xffffffffffff66e5, {0x9, 0x7, 0x81, 0x80}}}, {0x54, 0x75, 0x10001, {0x5, 0x80000001}, {0x2, 0x5}, @ramp={0x6920000000000000, 0x0, {0x3, 0xffffffff, 0xfffffffffffffffe, 0xbf53}}}}) close(r3) arch_prctl$ARCH_GET_FS(0x1003, &(0x7f0000000840)) utimensat(0xffffffffffffffff, 0x0, &(0x7f00000016c0), 0x0) connect$l2tp(r2, &(0x7f00000000c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}, 0x4, 0x8}}, 0x2e) dup3(r1, r2, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000900)=ANY=[@ANYBLOB="67e9b8ad27439b16daf1782ae17d840289f4c4fd0a934c896dc7c0ab7ce112a1a1c7d1f8c6d7220c90f3b5c94e93bfdcfc1ceb1f681cec2378dd66fc5d0e5581b58dd0e6d618a5b80f7a555a765246d680aabf84e47742d97dfc8c4eb0cd5e82d0b316bfb939fbac404473de8cf80c05babba5126b43728e3f3b9137aa45042a0f60715c3224e4397339b2aec80fe665407848108d283d5214cc46ceab956ffbf85573", @ANYRESOCT]) r8 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x111800, 0x0) getdents64(r8, &(0x7f0000000200)=""/189, 0xbd) 10:17:55 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000080)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) r2 = socket$l2tp(0x18, 0x1, 0x1) io_pgetevents(0x0, 0x7fff, 0x0, &(0x7f0000000140), &(0x7f00000001c0)={0x77359400}, &(0x7f00000002c0)={&(0x7f0000000280), 0x8}) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x20601, 0x0) write$evdev(0xffffffffffffffff, &(0x7f0000000400), 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0xffffffffffffffff, r3, 0x0, 0x2, &(0x7f0000000240)='\\\x00'}, 0x30) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r0, 0xc1105511, &(0x7f00000003c0)={{0x8, 0x0, 0x400, 0x5, 'syz1\x00', 0x3}, 0x1, 0x20000000, 0x2, r4, 0x0, 0x2, 'syz0\x00', 0x0, 0x0, [], [0x40, 0x30, 0x8001, 0x2]}) ioctl$VIDIOC_G_INPUT(r5, 0x80045626, &(0x7f0000000640)) r6 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x10000000080, 0x0) perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0x4, 0x5, 0x8, 0x5, 0x0, 0x7, 0x3200, 0x8, 0x8000, 0x7f, 0x0, 0x20, 0x4, 0x9, 0x38000000000000, 0x5, 0xffff, 0x6756, 0x47a7, 0xd167, 0x2, 0x3, 0x9, 0x1, 0x62e, 0xce22, 0x0, 0x100000000, 0x9, 0x870, 0x4, 0x0, 0x6, 0x101, 0x2, 0x4, 0x0, 0x100000000, 0x4, @perf_bp={0x0, 0x2}, 0x10059, 0x0, 0x3ff, 0x1, 0x76a7, 0x310d7fff80, 0x7f}, r4, 0xd, 0xffffffffffffffff, 0x2) ioctl$BLKBSZSET(r6, 0x40081271, &(0x7f00000008c0)=0x3) ioctl$EVIOCGABS20(r3, 0x80184560, &(0x7f00000005c0)=""/68) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000700), 0x111, 0xe}}, 0x20) r7 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000000380), 0x80800) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_settime(0x0, 0x1, &(0x7f0000000040)={{0x0, 0x989680}}, &(0x7f00000000c0)) ioctl$FS_IOC_SETVERSION(r7, 0x40087602, &(0x7f0000000080)=0x7) ioctl$UI_END_FF_UPLOAD(r7, 0x406855c9, &(0x7f00000007c0)={0x5, 0x6, {0x56, 0x10001, 0xfffffffffffffffd, {0x5}, {0x80000001, 0x5}, @const={0xffffffffffff66e5, {0x9, 0x7, 0x81, 0x80}}}, {0x54, 0x75, 0x10001, {0x5, 0x80000001}, {0x2, 0x5}, @ramp={0x6920000000000000, 0x0, {0x3, 0xffffffff, 0xfffffffffffffffe, 0xbf53}}}}) close(r3) arch_prctl$ARCH_GET_FS(0x1003, &(0x7f0000000840)) utimensat(0xffffffffffffffff, 0x0, &(0x7f00000016c0), 0x0) connect$l2tp(r2, &(0x7f00000000c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}, 0x4, 0x8}}, 0x2e) dup3(r1, r2, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000900)=ANY=[@ANYBLOB="67e9b8ad27439b16daf1782ae17d840289f4c4fd0a934c896dc7c0ab7ce112a1a1c7d1f8c6d7220c90f3b5c94e93bfdcfc1ceb1f681cec2378dd66fc5d0e5581b58dd0e6d618a5b80f7a555a765246d680aabf84e47742d97dfc8c4eb0cd5e82d0b316bfb939fbac404473de8cf80c05babba5126b43728e3f3b9137aa45042a0f60715c3224e4397339b2aec80fe665407848108d283d5214cc46ceab956ffbf85573", @ANYRESOCT]) r8 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x111800, 0x0) getdents64(r8, &(0x7f0000000200)=""/189, 0xbd) 10:17:55 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000080)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) r2 = socket$l2tp(0x18, 0x1, 0x1) io_pgetevents(0x0, 0x7fff, 0x0, &(0x7f0000000140), &(0x7f00000001c0)={0x77359400}, &(0x7f00000002c0)={&(0x7f0000000280), 0x8}) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x20601, 0x0) write$evdev(0xffffffffffffffff, &(0x7f0000000400), 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0xffffffffffffffff, r3, 0x0, 0x2, &(0x7f0000000240)='\\\x00'}, 0x30) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r0, 0xc1105511, &(0x7f00000003c0)={{0x8, 0x0, 0x400, 0x5, 'syz1\x00', 0x3}, 0x1, 0x20000000, 0x2, r4, 0x0, 0x2, 'syz0\x00', 0x0, 0x0, [], [0x40, 0x30, 0x8001, 0x2]}) ioctl$VIDIOC_G_INPUT(r5, 0x80045626, &(0x7f0000000640)) r6 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x10000000080, 0x0) perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0x4, 0x5, 0x8, 0x5, 0x0, 0x7, 0x3200, 0x8, 0x8000, 0x7f, 0x0, 0x20, 0x4, 0x9, 0x38000000000000, 0x5, 0xffff, 0x6756, 0x47a7, 0xd167, 0x2, 0x3, 0x9, 0x1, 0x62e, 0xce22, 0x0, 0x100000000, 0x9, 0x870, 0x4, 0x0, 0x6, 0x101, 0x2, 0x4, 0x0, 0x100000000, 0x4, @perf_bp={0x0, 0x2}, 0x10059, 0x0, 0x3ff, 0x1, 0x76a7, 0x310d7fff80, 0x7f}, r4, 0xd, 0xffffffffffffffff, 0x2) ioctl$BLKBSZSET(r6, 0x40081271, &(0x7f00000008c0)=0x3) ioctl$EVIOCGABS20(r3, 0x80184560, &(0x7f00000005c0)=""/68) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000700), 0x111, 0xe}}, 0x20) r7 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000000380), 0x80800) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_settime(0x0, 0x1, &(0x7f0000000040)={{0x0, 0x989680}}, &(0x7f00000000c0)) ioctl$FS_IOC_SETVERSION(r7, 0x40087602, &(0x7f0000000080)=0x7) ioctl$UI_END_FF_UPLOAD(r7, 0x406855c9, &(0x7f00000007c0)={0x5, 0x6, {0x56, 0x10001, 0xfffffffffffffffd, {0x5}, {0x80000001, 0x5}, @const={0xffffffffffff66e5, {0x9, 0x7, 0x81, 0x80}}}, {0x54, 0x75, 0x10001, {0x5, 0x80000001}, {0x2, 0x5}, @ramp={0x6920000000000000, 0x0, {0x3, 0xffffffff, 0xfffffffffffffffe, 0xbf53}}}}) close(r3) arch_prctl$ARCH_GET_FS(0x1003, &(0x7f0000000840)) utimensat(0xffffffffffffffff, 0x0, &(0x7f00000016c0), 0x0) connect$l2tp(r2, &(0x7f00000000c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}, 0x4, 0x8}}, 0x2e) dup3(r1, r2, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000900)=ANY=[@ANYBLOB="67e9b8ad27439b16daf1782ae17d840289f4c4fd0a934c896dc7c0ab7ce112a1a1c7d1f8c6d7220c90f3b5c94e93bfdcfc1ceb1f681cec2378dd66fc5d0e5581b58dd0e6d618a5b80f7a555a765246d680aabf84e47742d97dfc8c4eb0cd5e82d0b316bfb939fbac404473de8cf80c05babba5126b43728e3f3b9137aa45042a0f60715c3224e4397339b2aec80fe665407848108d283d5214cc46ceab956ffbf85573", @ANYRESOCT]) r8 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x111800, 0x0) getdents64(r8, &(0x7f0000000200)=""/189, 0xbd) 10:17:55 executing program 3: openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x40000000000, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x40000000, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x4, 0x4, 0x400000000004, 0x9}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_LINKINFO={0x14, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0x4}}}]}, 0x3c}}, 0x0) add_key(&(0x7f0000000080)='dns_resolver\x00', &(0x7f00000000c0)={'\x02\x00'}, &(0x7f0000000100), 0xfffff, 0xfffffffffffffffb) 10:17:55 executing program 4: openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x40000000000, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x40000000, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x4, 0x4, 0x400000000004, 0x9}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_LINKINFO={0x14, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0x4}}}]}, 0x3c}}, 0x0) add_key(&(0x7f0000000080)='dns_resolver\x00', &(0x7f00000000c0)={'\x02\x00'}, &(0x7f0000000100), 0xfffff, 0xfffffffffffffffb) 10:17:55 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000080)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) r2 = socket$l2tp(0x18, 0x1, 0x1) io_pgetevents(0x0, 0x7fff, 0x0, &(0x7f0000000140), &(0x7f00000001c0)={0x77359400}, &(0x7f00000002c0)={&(0x7f0000000280), 0x8}) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x20601, 0x0) write$evdev(0xffffffffffffffff, &(0x7f0000000400), 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0xffffffffffffffff, r3, 0x0, 0x2, &(0x7f0000000240)='\\\x00'}, 0x30) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r0, 0xc1105511, &(0x7f00000003c0)={{0x8, 0x0, 0x400, 0x5, 'syz1\x00', 0x3}, 0x1, 0x20000000, 0x2, r4, 0x0, 0x2, 'syz0\x00', 0x0, 0x0, [], [0x40, 0x30, 0x8001, 0x2]}) ioctl$VIDIOC_G_INPUT(r5, 0x80045626, &(0x7f0000000640)) r6 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x10000000080, 0x0) perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0x4, 0x5, 0x8, 0x5, 0x0, 0x7, 0x3200, 0x8, 0x8000, 0x7f, 0x0, 0x20, 0x4, 0x9, 0x38000000000000, 0x5, 0xffff, 0x6756, 0x47a7, 0xd167, 0x2, 0x3, 0x9, 0x1, 0x62e, 0xce22, 0x0, 0x100000000, 0x9, 0x870, 0x4, 0x0, 0x6, 0x101, 0x2, 0x4, 0x0, 0x100000000, 0x4, @perf_bp={0x0, 0x2}, 0x10059, 0x0, 0x3ff, 0x1, 0x76a7, 0x310d7fff80, 0x7f}, r4, 0xd, 0xffffffffffffffff, 0x2) ioctl$BLKBSZSET(r6, 0x40081271, &(0x7f00000008c0)=0x3) ioctl$EVIOCGABS20(r3, 0x80184560, &(0x7f00000005c0)=""/68) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000700), 0x111, 0xe}}, 0x20) r7 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000000380), 0x80800) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_settime(0x0, 0x1, &(0x7f0000000040)={{0x0, 0x989680}}, &(0x7f00000000c0)) ioctl$FS_IOC_SETVERSION(r7, 0x40087602, &(0x7f0000000080)=0x7) ioctl$UI_END_FF_UPLOAD(r7, 0x406855c9, &(0x7f00000007c0)={0x5, 0x6, {0x56, 0x10001, 0xfffffffffffffffd, {0x5}, {0x80000001, 0x5}, @const={0xffffffffffff66e5, {0x9, 0x7, 0x81, 0x80}}}, {0x54, 0x75, 0x10001, {0x5, 0x80000001}, {0x2, 0x5}, @ramp={0x6920000000000000, 0x0, {0x3, 0xffffffff, 0xfffffffffffffffe, 0xbf53}}}}) close(r3) arch_prctl$ARCH_GET_FS(0x1003, &(0x7f0000000840)) utimensat(0xffffffffffffffff, 0x0, &(0x7f00000016c0), 0x0) connect$l2tp(r2, &(0x7f00000000c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}, 0x4, 0x8}}, 0x2e) dup3(r1, r2, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000900)=ANY=[@ANYBLOB="67e9b8ad27439b16daf1782ae17d840289f4c4fd0a934c896dc7c0ab7ce112a1a1c7d1f8c6d7220c90f3b5c94e93bfdcfc1ceb1f681cec2378dd66fc5d0e5581b58dd0e6d618a5b80f7a555a765246d680aabf84e47742d97dfc8c4eb0cd5e82d0b316bfb939fbac404473de8cf80c05babba5126b43728e3f3b9137aa45042a0f60715c3224e4397339b2aec80fe665407848108d283d5214cc46ceab956ffbf85573", @ANYRESOCT]) r8 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x111800, 0x0) getdents64(r8, &(0x7f0000000200)=""/189, 0xbd) 10:17:55 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000080)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) r2 = socket$l2tp(0x18, 0x1, 0x1) io_pgetevents(0x0, 0x7fff, 0x0, &(0x7f0000000140), &(0x7f00000001c0)={0x77359400}, &(0x7f00000002c0)={&(0x7f0000000280), 0x8}) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x20601, 0x0) write$evdev(0xffffffffffffffff, &(0x7f0000000400), 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0xffffffffffffffff, r3, 0x0, 0x2, &(0x7f0000000240)='\\\x00'}, 0x30) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r0, 0xc1105511, &(0x7f00000003c0)={{0x8, 0x0, 0x400, 0x5, 'syz1\x00', 0x3}, 0x1, 0x20000000, 0x2, r4, 0x0, 0x2, 'syz0\x00', 0x0, 0x0, [], [0x40, 0x30, 0x8001, 0x2]}) ioctl$VIDIOC_G_INPUT(r5, 0x80045626, &(0x7f0000000640)) r6 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x10000000080, 0x0) perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0x4, 0x5, 0x8, 0x5, 0x0, 0x7, 0x3200, 0x8, 0x8000, 0x7f, 0x0, 0x20, 0x4, 0x9, 0x38000000000000, 0x5, 0xffff, 0x6756, 0x47a7, 0xd167, 0x2, 0x3, 0x9, 0x1, 0x62e, 0xce22, 0x0, 0x100000000, 0x9, 0x870, 0x4, 0x0, 0x6, 0x101, 0x2, 0x4, 0x0, 0x100000000, 0x4, @perf_bp={0x0, 0x2}, 0x10059, 0x0, 0x3ff, 0x1, 0x76a7, 0x310d7fff80, 0x7f}, r4, 0xd, 0xffffffffffffffff, 0x2) ioctl$BLKBSZSET(r6, 0x40081271, &(0x7f00000008c0)=0x3) ioctl$EVIOCGABS20(r3, 0x80184560, &(0x7f00000005c0)=""/68) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000700), 0x111, 0xe}}, 0x20) r7 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000000380), 0x80800) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_settime(0x0, 0x1, &(0x7f0000000040)={{0x0, 0x989680}}, &(0x7f00000000c0)) ioctl$FS_IOC_SETVERSION(r7, 0x40087602, &(0x7f0000000080)=0x7) ioctl$UI_END_FF_UPLOAD(r7, 0x406855c9, &(0x7f00000007c0)={0x5, 0x6, {0x56, 0x10001, 0xfffffffffffffffd, {0x5}, {0x80000001, 0x5}, @const={0xffffffffffff66e5, {0x9, 0x7, 0x81, 0x80}}}, {0x54, 0x75, 0x10001, {0x5, 0x80000001}, {0x2, 0x5}, @ramp={0x6920000000000000, 0x0, {0x3, 0xffffffff, 0xfffffffffffffffe, 0xbf53}}}}) close(r3) arch_prctl$ARCH_GET_FS(0x1003, &(0x7f0000000840)) utimensat(0xffffffffffffffff, 0x0, &(0x7f00000016c0), 0x0) connect$l2tp(r2, &(0x7f00000000c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}, 0x4, 0x8}}, 0x2e) dup3(r1, r2, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000900)=ANY=[@ANYBLOB="67e9b8ad27439b16daf1782ae17d840289f4c4fd0a934c896dc7c0ab7ce112a1a1c7d1f8c6d7220c90f3b5c94e93bfdcfc1ceb1f681cec2378dd66fc5d0e5581b58dd0e6d618a5b80f7a555a765246d680aabf84e47742d97dfc8c4eb0cd5e82d0b316bfb939fbac404473de8cf80c05babba5126b43728e3f3b9137aa45042a0f60715c3224e4397339b2aec80fe665407848108d283d5214cc46ceab956ffbf85573", @ANYRESOCT]) r8 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x111800, 0x0) getdents64(r8, &(0x7f0000000200)=""/189, 0xbd) 10:17:55 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000080)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) r2 = socket$l2tp(0x18, 0x1, 0x1) io_pgetevents(0x0, 0x7fff, 0x0, &(0x7f0000000140), &(0x7f00000001c0)={0x77359400}, &(0x7f00000002c0)={&(0x7f0000000280), 0x8}) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x20601, 0x0) write$evdev(0xffffffffffffffff, &(0x7f0000000400), 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0xffffffffffffffff, r3, 0x0, 0x2, &(0x7f0000000240)='\\\x00'}, 0x30) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r0, 0xc1105511, &(0x7f00000003c0)={{0x8, 0x0, 0x400, 0x5, 'syz1\x00', 0x3}, 0x1, 0x20000000, 0x2, r4, 0x0, 0x2, 'syz0\x00', 0x0, 0x0, [], [0x40, 0x30, 0x8001, 0x2]}) ioctl$VIDIOC_G_INPUT(r5, 0x80045626, &(0x7f0000000640)) r6 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x10000000080, 0x0) perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0x4, 0x5, 0x8, 0x5, 0x0, 0x7, 0x3200, 0x8, 0x8000, 0x7f, 0x0, 0x20, 0x4, 0x9, 0x38000000000000, 0x5, 0xffff, 0x6756, 0x47a7, 0xd167, 0x2, 0x3, 0x9, 0x1, 0x62e, 0xce22, 0x0, 0x100000000, 0x9, 0x870, 0x4, 0x0, 0x6, 0x101, 0x2, 0x4, 0x0, 0x100000000, 0x4, @perf_bp={0x0, 0x2}, 0x10059, 0x0, 0x3ff, 0x1, 0x76a7, 0x310d7fff80, 0x7f}, r4, 0xd, 0xffffffffffffffff, 0x2) ioctl$BLKBSZSET(r6, 0x40081271, &(0x7f00000008c0)=0x3) ioctl$EVIOCGABS20(r3, 0x80184560, &(0x7f00000005c0)=""/68) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000700), 0x111, 0xe}}, 0x20) r7 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000000380), 0x80800) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_settime(0x0, 0x1, &(0x7f0000000040)={{0x0, 0x989680}}, &(0x7f00000000c0)) ioctl$FS_IOC_SETVERSION(r7, 0x40087602, &(0x7f0000000080)=0x7) ioctl$UI_END_FF_UPLOAD(r7, 0x406855c9, &(0x7f00000007c0)={0x5, 0x6, {0x56, 0x10001, 0xfffffffffffffffd, {0x5}, {0x80000001, 0x5}, @const={0xffffffffffff66e5, {0x9, 0x7, 0x81, 0x80}}}, {0x54, 0x75, 0x10001, {0x5, 0x80000001}, {0x2, 0x5}, @ramp={0x6920000000000000, 0x0, {0x3, 0xffffffff, 0xfffffffffffffffe, 0xbf53}}}}) close(r3) arch_prctl$ARCH_GET_FS(0x1003, &(0x7f0000000840)) utimensat(0xffffffffffffffff, 0x0, &(0x7f00000016c0), 0x0) connect$l2tp(r2, &(0x7f00000000c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}, 0x4, 0x8}}, 0x2e) dup3(r1, r2, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000900)=ANY=[@ANYBLOB="67e9b8ad27439b16daf1782ae17d840289f4c4fd0a934c896dc7c0ab7ce112a1a1c7d1f8c6d7220c90f3b5c94e93bfdcfc1ceb1f681cec2378dd66fc5d0e5581b58dd0e6d618a5b80f7a555a765246d680aabf84e47742d97dfc8c4eb0cd5e82d0b316bfb939fbac404473de8cf80c05babba5126b43728e3f3b9137aa45042a0f60715c3224e4397339b2aec80fe665407848108d283d5214cc46ceab956ffbf85573", @ANYRESOCT]) r8 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x111800, 0x0) getdents64(r8, &(0x7f0000000200)=""/189, 0xbd) [ 1598.918384] hfs: unable to parse mount options 10:17:55 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000080)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) r2 = socket$l2tp(0x18, 0x1, 0x1) io_pgetevents(0x0, 0x7fff, 0x0, &(0x7f0000000140), &(0x7f00000001c0)={0x77359400}, &(0x7f00000002c0)={&(0x7f0000000280), 0x8}) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x20601, 0x0) write$evdev(0xffffffffffffffff, &(0x7f0000000400), 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0xffffffffffffffff, r3, 0x0, 0x2, &(0x7f0000000240)='\\\x00'}, 0x30) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r0, 0xc1105511, &(0x7f00000003c0)={{0x8, 0x0, 0x400, 0x5, 'syz1\x00', 0x3}, 0x1, 0x20000000, 0x2, r4, 0x0, 0x2, 'syz0\x00', 0x0, 0x0, [], [0x40, 0x30, 0x8001, 0x2]}) ioctl$VIDIOC_G_INPUT(r5, 0x80045626, &(0x7f0000000640)) r6 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x10000000080, 0x0) perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0x4, 0x5, 0x8, 0x5, 0x0, 0x7, 0x3200, 0x8, 0x8000, 0x7f, 0x0, 0x20, 0x4, 0x9, 0x38000000000000, 0x5, 0xffff, 0x6756, 0x47a7, 0xd167, 0x2, 0x3, 0x9, 0x1, 0x62e, 0xce22, 0x0, 0x100000000, 0x9, 0x870, 0x4, 0x0, 0x6, 0x101, 0x2, 0x4, 0x0, 0x100000000, 0x4, @perf_bp={0x0, 0x2}, 0x10059, 0x0, 0x3ff, 0x1, 0x76a7, 0x310d7fff80, 0x7f}, r4, 0xd, 0xffffffffffffffff, 0x2) ioctl$BLKBSZSET(r6, 0x40081271, &(0x7f00000008c0)=0x3) ioctl$EVIOCGABS20(r3, 0x80184560, &(0x7f00000005c0)=""/68) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000700), 0x111, 0xe}}, 0x20) r7 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000000380), 0x80800) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_settime(0x0, 0x1, &(0x7f0000000040)={{0x0, 0x989680}}, &(0x7f00000000c0)) ioctl$FS_IOC_SETVERSION(r7, 0x40087602, &(0x7f0000000080)=0x7) ioctl$UI_END_FF_UPLOAD(r7, 0x406855c9, &(0x7f00000007c0)={0x5, 0x6, {0x56, 0x10001, 0xfffffffffffffffd, {0x5}, {0x80000001, 0x5}, @const={0xffffffffffff66e5, {0x9, 0x7, 0x81, 0x80}}}, {0x54, 0x75, 0x10001, {0x5, 0x80000001}, {0x2, 0x5}, @ramp={0x6920000000000000, 0x0, {0x3, 0xffffffff, 0xfffffffffffffffe, 0xbf53}}}}) close(r3) arch_prctl$ARCH_GET_FS(0x1003, &(0x7f0000000840)) utimensat(0xffffffffffffffff, 0x0, &(0x7f00000016c0), 0x0) connect$l2tp(r2, &(0x7f00000000c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}, 0x4, 0x8}}, 0x2e) dup3(r1, r2, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000900)=ANY=[@ANYBLOB="67e9b8ad27439b16daf1782ae17d840289f4c4fd0a934c896dc7c0ab7ce112a1a1c7d1f8c6d7220c90f3b5c94e93bfdcfc1ceb1f681cec2378dd66fc5d0e5581b58dd0e6d618a5b80f7a555a765246d680aabf84e47742d97dfc8c4eb0cd5e82d0b316bfb939fbac404473de8cf80c05babba5126b43728e3f3b9137aa45042a0f60715c3224e4397339b2aec80fe665407848108d283d5214cc46ceab956ffbf85573", @ANYRESOCT]) r8 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x111800, 0x0) getdents64(r8, &(0x7f0000000200)=""/189, 0xbd) 10:17:56 executing program 4: openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x40000000000, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x40000000, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x4, 0x4, 0x400000000004, 0x9}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_LINKINFO={0x14, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0x4}}}]}, 0x3c}}, 0x0) add_key(&(0x7f0000000080)='dns_resolver\x00', &(0x7f00000000c0)={'\x02\x00'}, &(0x7f0000000100), 0xfffff, 0xfffffffffffffffb) 10:17:56 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000080)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) r2 = socket$l2tp(0x18, 0x1, 0x1) io_pgetevents(0x0, 0x7fff, 0x0, &(0x7f0000000140), &(0x7f00000001c0)={0x77359400}, &(0x7f00000002c0)={&(0x7f0000000280), 0x8}) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x20601, 0x0) write$evdev(0xffffffffffffffff, &(0x7f0000000400), 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0xffffffffffffffff, r3, 0x0, 0x2, &(0x7f0000000240)='\\\x00'}, 0x30) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r0, 0xc1105511, &(0x7f00000003c0)={{0x8, 0x0, 0x400, 0x5, 'syz1\x00', 0x3}, 0x1, 0x20000000, 0x2, r4, 0x0, 0x2, 'syz0\x00', 0x0, 0x0, [], [0x40, 0x30, 0x8001, 0x2]}) ioctl$VIDIOC_G_INPUT(r5, 0x80045626, &(0x7f0000000640)) r6 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x10000000080, 0x0) perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0x4, 0x5, 0x8, 0x5, 0x0, 0x7, 0x3200, 0x8, 0x8000, 0x7f, 0x0, 0x20, 0x4, 0x9, 0x38000000000000, 0x5, 0xffff, 0x6756, 0x47a7, 0xd167, 0x2, 0x3, 0x9, 0x1, 0x62e, 0xce22, 0x0, 0x100000000, 0x9, 0x870, 0x4, 0x0, 0x6, 0x101, 0x2, 0x4, 0x0, 0x100000000, 0x4, @perf_bp={0x0, 0x2}, 0x10059, 0x0, 0x3ff, 0x1, 0x76a7, 0x310d7fff80, 0x7f}, r4, 0xd, 0xffffffffffffffff, 0x2) ioctl$BLKBSZSET(r6, 0x40081271, &(0x7f00000008c0)=0x3) ioctl$EVIOCGABS20(r3, 0x80184560, &(0x7f00000005c0)=""/68) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000700), 0x111, 0xe}}, 0x20) r7 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000000380), 0x80800) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_settime(0x0, 0x1, &(0x7f0000000040)={{0x0, 0x989680}}, &(0x7f00000000c0)) ioctl$FS_IOC_SETVERSION(r7, 0x40087602, &(0x7f0000000080)=0x7) ioctl$UI_END_FF_UPLOAD(r7, 0x406855c9, &(0x7f00000007c0)={0x5, 0x6, {0x56, 0x10001, 0xfffffffffffffffd, {0x5}, {0x80000001, 0x5}, @const={0xffffffffffff66e5, {0x9, 0x7, 0x81, 0x80}}}, {0x54, 0x75, 0x10001, {0x5, 0x80000001}, {0x2, 0x5}, @ramp={0x6920000000000000, 0x0, {0x3, 0xffffffff, 0xfffffffffffffffe, 0xbf53}}}}) close(r3) arch_prctl$ARCH_GET_FS(0x1003, &(0x7f0000000840)) utimensat(0xffffffffffffffff, 0x0, &(0x7f00000016c0), 0x0) connect$l2tp(r2, &(0x7f00000000c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}, 0x4, 0x8}}, 0x2e) dup3(r1, r2, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000900)=ANY=[@ANYBLOB="67e9b8ad27439b16daf1782ae17d840289f4c4fd0a934c896dc7c0ab7ce112a1a1c7d1f8c6d7220c90f3b5c94e93bfdcfc1ceb1f681cec2378dd66fc5d0e5581b58dd0e6d618a5b80f7a555a765246d680aabf84e47742d97dfc8c4eb0cd5e82d0b316bfb939fbac404473de8cf80c05babba5126b43728e3f3b9137aa45042a0f60715c3224e4397339b2aec80fe665407848108d283d5214cc46ceab956ffbf85573", @ANYRESOCT]) r8 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x111800, 0x0) getdents64(r8, &(0x7f0000000200)=""/189, 0xbd) 10:17:56 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000080)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) r2 = socket$l2tp(0x18, 0x1, 0x1) io_pgetevents(0x0, 0x7fff, 0x0, &(0x7f0000000140), &(0x7f00000001c0)={0x77359400}, &(0x7f00000002c0)={&(0x7f0000000280), 0x8}) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x20601, 0x0) write$evdev(0xffffffffffffffff, &(0x7f0000000400), 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0xffffffffffffffff, r3, 0x0, 0x2, &(0x7f0000000240)='\\\x00'}, 0x30) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r0, 0xc1105511, &(0x7f00000003c0)={{0x8, 0x0, 0x400, 0x5, 'syz1\x00', 0x3}, 0x1, 0x20000000, 0x2, r4, 0x0, 0x2, 'syz0\x00', 0x0, 0x0, [], [0x40, 0x30, 0x8001, 0x2]}) ioctl$VIDIOC_G_INPUT(r5, 0x80045626, &(0x7f0000000640)) r6 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x10000000080, 0x0) perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0x4, 0x5, 0x8, 0x5, 0x0, 0x7, 0x3200, 0x8, 0x8000, 0x7f, 0x0, 0x20, 0x4, 0x9, 0x38000000000000, 0x5, 0xffff, 0x6756, 0x47a7, 0xd167, 0x2, 0x3, 0x9, 0x1, 0x62e, 0xce22, 0x0, 0x100000000, 0x9, 0x870, 0x4, 0x0, 0x6, 0x101, 0x2, 0x4, 0x0, 0x100000000, 0x4, @perf_bp={0x0, 0x2}, 0x10059, 0x0, 0x3ff, 0x1, 0x76a7, 0x310d7fff80, 0x7f}, r4, 0xd, 0xffffffffffffffff, 0x2) ioctl$BLKBSZSET(r6, 0x40081271, &(0x7f00000008c0)=0x3) ioctl$EVIOCGABS20(r3, 0x80184560, &(0x7f00000005c0)=""/68) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000700), 0x111, 0xe}}, 0x20) r7 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000000380), 0x80800) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_settime(0x0, 0x1, &(0x7f0000000040)={{0x0, 0x989680}}, &(0x7f00000000c0)) ioctl$FS_IOC_SETVERSION(r7, 0x40087602, &(0x7f0000000080)=0x7) ioctl$UI_END_FF_UPLOAD(r7, 0x406855c9, &(0x7f00000007c0)={0x5, 0x6, {0x56, 0x10001, 0xfffffffffffffffd, {0x5}, {0x80000001, 0x5}, @const={0xffffffffffff66e5, {0x9, 0x7, 0x81, 0x80}}}, {0x54, 0x75, 0x10001, {0x5, 0x80000001}, {0x2, 0x5}, @ramp={0x6920000000000000, 0x0, {0x3, 0xffffffff, 0xfffffffffffffffe, 0xbf53}}}}) close(r3) arch_prctl$ARCH_GET_FS(0x1003, &(0x7f0000000840)) utimensat(0xffffffffffffffff, 0x0, &(0x7f00000016c0), 0x0) connect$l2tp(r2, &(0x7f00000000c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}, 0x4, 0x8}}, 0x2e) dup3(r1, r2, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000900)=ANY=[@ANYBLOB="67e9b8ad27439b16daf1782ae17d840289f4c4fd0a934c896dc7c0ab7ce112a1a1c7d1f8c6d7220c90f3b5c94e93bfdcfc1ceb1f681cec2378dd66fc5d0e5581b58dd0e6d618a5b80f7a555a765246d680aabf84e47742d97dfc8c4eb0cd5e82d0b316bfb939fbac404473de8cf80c05babba5126b43728e3f3b9137aa45042a0f60715c3224e4397339b2aec80fe665407848108d283d5214cc46ceab956ffbf85573", @ANYRESOCT]) r8 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x111800, 0x0) getdents64(r8, &(0x7f0000000200)=""/189, 0xbd) 10:17:56 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000080)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) r2 = socket$l2tp(0x18, 0x1, 0x1) io_pgetevents(0x0, 0x7fff, 0x0, &(0x7f0000000140), &(0x7f00000001c0)={0x77359400}, &(0x7f00000002c0)={&(0x7f0000000280), 0x8}) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x20601, 0x0) write$evdev(0xffffffffffffffff, &(0x7f0000000400), 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0xffffffffffffffff, r3, 0x0, 0x2, &(0x7f0000000240)='\\\x00'}, 0x30) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r0, 0xc1105511, &(0x7f00000003c0)={{0x8, 0x0, 0x400, 0x5, 'syz1\x00', 0x3}, 0x1, 0x20000000, 0x2, r4, 0x0, 0x2, 'syz0\x00', 0x0, 0x0, [], [0x40, 0x30, 0x8001, 0x2]}) ioctl$VIDIOC_G_INPUT(r5, 0x80045626, &(0x7f0000000640)) r6 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x10000000080, 0x0) perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0x4, 0x5, 0x8, 0x5, 0x0, 0x7, 0x3200, 0x8, 0x8000, 0x7f, 0x0, 0x20, 0x4, 0x9, 0x38000000000000, 0x5, 0xffff, 0x6756, 0x47a7, 0xd167, 0x2, 0x3, 0x9, 0x1, 0x62e, 0xce22, 0x0, 0x100000000, 0x9, 0x870, 0x4, 0x0, 0x6, 0x101, 0x2, 0x4, 0x0, 0x100000000, 0x4, @perf_bp={0x0, 0x2}, 0x10059, 0x0, 0x3ff, 0x1, 0x76a7, 0x310d7fff80, 0x7f}, r4, 0xd, 0xffffffffffffffff, 0x2) ioctl$BLKBSZSET(r6, 0x40081271, &(0x7f00000008c0)=0x3) ioctl$EVIOCGABS20(r3, 0x80184560, &(0x7f00000005c0)=""/68) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000700), 0x111, 0xe}}, 0x20) r7 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000000380), 0x80800) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_settime(0x0, 0x1, &(0x7f0000000040)={{0x0, 0x989680}}, &(0x7f00000000c0)) ioctl$FS_IOC_SETVERSION(r7, 0x40087602, &(0x7f0000000080)=0x7) ioctl$UI_END_FF_UPLOAD(r7, 0x406855c9, &(0x7f00000007c0)={0x5, 0x6, {0x56, 0x10001, 0xfffffffffffffffd, {0x5}, {0x80000001, 0x5}, @const={0xffffffffffff66e5, {0x9, 0x7, 0x81, 0x80}}}, {0x54, 0x75, 0x10001, {0x5, 0x80000001}, {0x2, 0x5}, @ramp={0x6920000000000000, 0x0, {0x3, 0xffffffff, 0xfffffffffffffffe, 0xbf53}}}}) close(r3) arch_prctl$ARCH_GET_FS(0x1003, &(0x7f0000000840)) utimensat(0xffffffffffffffff, 0x0, &(0x7f00000016c0), 0x0) connect$l2tp(r2, &(0x7f00000000c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}, 0x4, 0x8}}, 0x2e) dup3(r1, r2, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000900)=ANY=[@ANYBLOB="67e9b8ad27439b16daf1782ae17d840289f4c4fd0a934c896dc7c0ab7ce112a1a1c7d1f8c6d7220c90f3b5c94e93bfdcfc1ceb1f681cec2378dd66fc5d0e5581b58dd0e6d618a5b80f7a555a765246d680aabf84e47742d97dfc8c4eb0cd5e82d0b316bfb939fbac404473de8cf80c05babba5126b43728e3f3b9137aa45042a0f60715c3224e4397339b2aec80fe665407848108d283d5214cc46ceab956ffbf85573", @ANYRESOCT]) r8 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x111800, 0x0) getdents64(r8, &(0x7f0000000200)=""/189, 0xbd) 10:17:56 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000080)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) r2 = socket$l2tp(0x18, 0x1, 0x1) io_pgetevents(0x0, 0x7fff, 0x0, &(0x7f0000000140), &(0x7f00000001c0)={0x77359400}, &(0x7f00000002c0)={&(0x7f0000000280), 0x8}) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x20601, 0x0) write$evdev(0xffffffffffffffff, &(0x7f0000000400), 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0xffffffffffffffff, r3, 0x0, 0x2, &(0x7f0000000240)='\\\x00'}, 0x30) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r0, 0xc1105511, &(0x7f00000003c0)={{0x8, 0x0, 0x400, 0x5, 'syz1\x00', 0x3}, 0x1, 0x20000000, 0x2, r4, 0x0, 0x2, 'syz0\x00', 0x0, 0x0, [], [0x40, 0x30, 0x8001, 0x2]}) ioctl$VIDIOC_G_INPUT(r5, 0x80045626, &(0x7f0000000640)) r6 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x10000000080, 0x0) perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0x4, 0x5, 0x8, 0x5, 0x0, 0x7, 0x3200, 0x8, 0x8000, 0x7f, 0x0, 0x20, 0x4, 0x9, 0x38000000000000, 0x5, 0xffff, 0x6756, 0x47a7, 0xd167, 0x2, 0x3, 0x9, 0x1, 0x62e, 0xce22, 0x0, 0x100000000, 0x9, 0x870, 0x4, 0x0, 0x6, 0x101, 0x2, 0x4, 0x0, 0x100000000, 0x4, @perf_bp={0x0, 0x2}, 0x10059, 0x0, 0x3ff, 0x1, 0x76a7, 0x310d7fff80, 0x7f}, r4, 0xd, 0xffffffffffffffff, 0x2) ioctl$BLKBSZSET(r6, 0x40081271, &(0x7f00000008c0)=0x3) ioctl$EVIOCGABS20(r3, 0x80184560, &(0x7f00000005c0)=""/68) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000700), 0x111, 0xe}}, 0x20) r7 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000000380), 0x80800) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_settime(0x0, 0x1, &(0x7f0000000040)={{0x0, 0x989680}}, &(0x7f00000000c0)) ioctl$FS_IOC_SETVERSION(r7, 0x40087602, &(0x7f0000000080)=0x7) ioctl$UI_END_FF_UPLOAD(r7, 0x406855c9, &(0x7f00000007c0)={0x5, 0x6, {0x56, 0x10001, 0xfffffffffffffffd, {0x5}, {0x80000001, 0x5}, @const={0xffffffffffff66e5, {0x9, 0x7, 0x81, 0x80}}}, {0x54, 0x75, 0x10001, {0x5, 0x80000001}, {0x2, 0x5}, @ramp={0x6920000000000000, 0x0, {0x3, 0xffffffff, 0xfffffffffffffffe, 0xbf53}}}}) close(r3) arch_prctl$ARCH_GET_FS(0x1003, &(0x7f0000000840)) utimensat(0xffffffffffffffff, 0x0, &(0x7f00000016c0), 0x0) connect$l2tp(r2, &(0x7f00000000c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}, 0x4, 0x8}}, 0x2e) dup3(r1, r2, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000900)=ANY=[@ANYBLOB="67e9b8ad27439b16daf1782ae17d840289f4c4fd0a934c896dc7c0ab7ce112a1a1c7d1f8c6d7220c90f3b5c94e93bfdcfc1ceb1f681cec2378dd66fc5d0e5581b58dd0e6d618a5b80f7a555a765246d680aabf84e47742d97dfc8c4eb0cd5e82d0b316bfb939fbac404473de8cf80c05babba5126b43728e3f3b9137aa45042a0f60715c3224e4397339b2aec80fe665407848108d283d5214cc46ceab956ffbf85573", @ANYRESOCT]) r8 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x111800, 0x0) getdents64(r8, &(0x7f0000000200)=""/189, 0xbd) 10:17:56 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000080)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) r2 = socket$l2tp(0x18, 0x1, 0x1) io_pgetevents(0x0, 0x7fff, 0x0, &(0x7f0000000140), &(0x7f00000001c0)={0x77359400}, &(0x7f00000002c0)={&(0x7f0000000280), 0x8}) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x20601, 0x0) write$evdev(0xffffffffffffffff, &(0x7f0000000400), 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0xffffffffffffffff, r3, 0x0, 0x2, &(0x7f0000000240)='\\\x00'}, 0x30) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r0, 0xc1105511, &(0x7f00000003c0)={{0x8, 0x0, 0x400, 0x5, 'syz1\x00', 0x3}, 0x1, 0x20000000, 0x2, r4, 0x0, 0x2, 'syz0\x00', 0x0, 0x0, [], [0x40, 0x30, 0x8001, 0x2]}) ioctl$VIDIOC_G_INPUT(r5, 0x80045626, &(0x7f0000000640)) r6 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x10000000080, 0x0) perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0x4, 0x5, 0x8, 0x5, 0x0, 0x7, 0x3200, 0x8, 0x8000, 0x7f, 0x0, 0x20, 0x4, 0x9, 0x38000000000000, 0x5, 0xffff, 0x6756, 0x47a7, 0xd167, 0x2, 0x3, 0x9, 0x1, 0x62e, 0xce22, 0x0, 0x100000000, 0x9, 0x870, 0x4, 0x0, 0x6, 0x101, 0x2, 0x4, 0x0, 0x100000000, 0x4, @perf_bp={0x0, 0x2}, 0x10059, 0x0, 0x3ff, 0x1, 0x76a7, 0x310d7fff80, 0x7f}, r4, 0xd, 0xffffffffffffffff, 0x2) ioctl$BLKBSZSET(r6, 0x40081271, &(0x7f00000008c0)=0x3) ioctl$EVIOCGABS20(r3, 0x80184560, &(0x7f00000005c0)=""/68) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000700), 0x111, 0xe}}, 0x20) r7 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000000380), 0x80800) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_settime(0x0, 0x1, &(0x7f0000000040)={{0x0, 0x989680}}, &(0x7f00000000c0)) ioctl$FS_IOC_SETVERSION(r7, 0x40087602, &(0x7f0000000080)=0x7) ioctl$UI_END_FF_UPLOAD(r7, 0x406855c9, &(0x7f00000007c0)={0x5, 0x6, {0x56, 0x10001, 0xfffffffffffffffd, {0x5}, {0x80000001, 0x5}, @const={0xffffffffffff66e5, {0x9, 0x7, 0x81, 0x80}}}, {0x54, 0x75, 0x10001, {0x5, 0x80000001}, {0x2, 0x5}, @ramp={0x6920000000000000, 0x0, {0x3, 0xffffffff, 0xfffffffffffffffe, 0xbf53}}}}) close(r3) arch_prctl$ARCH_GET_FS(0x1003, &(0x7f0000000840)) utimensat(0xffffffffffffffff, 0x0, &(0x7f00000016c0), 0x0) connect$l2tp(r2, &(0x7f00000000c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}, 0x4, 0x8}}, 0x2e) dup3(r1, r2, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000900)=ANY=[@ANYBLOB="67e9b8ad27439b16daf1782ae17d840289f4c4fd0a934c896dc7c0ab7ce112a1a1c7d1f8c6d7220c90f3b5c94e93bfdcfc1ceb1f681cec2378dd66fc5d0e5581b58dd0e6d618a5b80f7a555a765246d680aabf84e47742d97dfc8c4eb0cd5e82d0b316bfb939fbac404473de8cf80c05babba5126b43728e3f3b9137aa45042a0f60715c3224e4397339b2aec80fe665407848108d283d5214cc46ceab956ffbf85573", @ANYRESOCT]) r8 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x111800, 0x0) getdents64(r8, &(0x7f0000000200)=""/189, 0xbd) 10:17:56 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000080)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) r2 = socket$l2tp(0x18, 0x1, 0x1) io_pgetevents(0x0, 0x7fff, 0x0, &(0x7f0000000140), &(0x7f00000001c0)={0x77359400}, &(0x7f00000002c0)={&(0x7f0000000280), 0x8}) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x20601, 0x0) write$evdev(0xffffffffffffffff, &(0x7f0000000400), 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0xffffffffffffffff, r3, 0x0, 0x2, &(0x7f0000000240)='\\\x00'}, 0x30) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r0, 0xc1105511, &(0x7f00000003c0)={{0x8, 0x0, 0x400, 0x5, 'syz1\x00', 0x3}, 0x1, 0x20000000, 0x2, r4, 0x0, 0x2, 'syz0\x00', 0x0, 0x0, [], [0x40, 0x30, 0x8001, 0x2]}) ioctl$VIDIOC_G_INPUT(r5, 0x80045626, &(0x7f0000000640)) r6 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x10000000080, 0x0) perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0x4, 0x5, 0x8, 0x5, 0x0, 0x7, 0x3200, 0x8, 0x8000, 0x7f, 0x0, 0x20, 0x4, 0x9, 0x38000000000000, 0x5, 0xffff, 0x6756, 0x47a7, 0xd167, 0x2, 0x3, 0x9, 0x1, 0x62e, 0xce22, 0x0, 0x100000000, 0x9, 0x870, 0x4, 0x0, 0x6, 0x101, 0x2, 0x4, 0x0, 0x100000000, 0x4, @perf_bp={0x0, 0x2}, 0x10059, 0x0, 0x3ff, 0x1, 0x76a7, 0x310d7fff80, 0x7f}, r4, 0xd, 0xffffffffffffffff, 0x2) ioctl$BLKBSZSET(r6, 0x40081271, &(0x7f00000008c0)=0x3) ioctl$EVIOCGABS20(r3, 0x80184560, &(0x7f00000005c0)=""/68) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000700), 0x111, 0xe}}, 0x20) r7 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000000380), 0x80800) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_settime(0x0, 0x1, &(0x7f0000000040)={{0x0, 0x989680}}, &(0x7f00000000c0)) ioctl$FS_IOC_SETVERSION(r7, 0x40087602, &(0x7f0000000080)=0x7) ioctl$UI_END_FF_UPLOAD(r7, 0x406855c9, &(0x7f00000007c0)={0x5, 0x6, {0x56, 0x10001, 0xfffffffffffffffd, {0x5}, {0x80000001, 0x5}, @const={0xffffffffffff66e5, {0x9, 0x7, 0x81, 0x80}}}, {0x54, 0x75, 0x10001, {0x5, 0x80000001}, {0x2, 0x5}, @ramp={0x6920000000000000, 0x0, {0x3, 0xffffffff, 0xfffffffffffffffe, 0xbf53}}}}) close(r3) arch_prctl$ARCH_GET_FS(0x1003, &(0x7f0000000840)) utimensat(0xffffffffffffffff, 0x0, &(0x7f00000016c0), 0x0) connect$l2tp(r2, &(0x7f00000000c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}, 0x4, 0x8}}, 0x2e) dup3(r1, r2, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000900)=ANY=[@ANYBLOB="67e9b8ad27439b16daf1782ae17d840289f4c4fd0a934c896dc7c0ab7ce112a1a1c7d1f8c6d7220c90f3b5c94e93bfdcfc1ceb1f681cec2378dd66fc5d0e5581b58dd0e6d618a5b80f7a555a765246d680aabf84e47742d97dfc8c4eb0cd5e82d0b316bfb939fbac404473de8cf80c05babba5126b43728e3f3b9137aa45042a0f60715c3224e4397339b2aec80fe665407848108d283d5214cc46ceab956ffbf85573", @ANYRESOCT]) r8 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x111800, 0x0) getdents64(r8, &(0x7f0000000200)=""/189, 0xbd) [ 1599.693454] hfs: unable to parse mount options 10:17:56 executing program 2: openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x40000000000, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x40000000, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x4, 0x4, 0x400000000004, 0x9}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_LINKINFO={0x14, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0x4}}}]}, 0x3c}}, 0x0) add_key(&(0x7f0000000080)='dns_resolver\x00', &(0x7f00000000c0)={'\x02\x00'}, &(0x7f0000000100), 0xfffff, 0xfffffffffffffffb) 10:17:56 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000080)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) r2 = socket$l2tp(0x18, 0x1, 0x1) io_pgetevents(0x0, 0x7fff, 0x0, &(0x7f0000000140), &(0x7f00000001c0)={0x77359400}, &(0x7f00000002c0)={&(0x7f0000000280), 0x8}) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x20601, 0x0) write$evdev(0xffffffffffffffff, &(0x7f0000000400), 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0xffffffffffffffff, r3, 0x0, 0x2, &(0x7f0000000240)='\\\x00'}, 0x30) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r0, 0xc1105511, &(0x7f00000003c0)={{0x8, 0x0, 0x400, 0x5, 'syz1\x00', 0x3}, 0x1, 0x20000000, 0x2, r4, 0x0, 0x2, 'syz0\x00', 0x0, 0x0, [], [0x40, 0x30, 0x8001, 0x2]}) ioctl$VIDIOC_G_INPUT(r5, 0x80045626, &(0x7f0000000640)) r6 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x10000000080, 0x0) perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0x4, 0x5, 0x8, 0x5, 0x0, 0x7, 0x3200, 0x8, 0x8000, 0x7f, 0x0, 0x20, 0x4, 0x9, 0x38000000000000, 0x5, 0xffff, 0x6756, 0x47a7, 0xd167, 0x2, 0x3, 0x9, 0x1, 0x62e, 0xce22, 0x0, 0x100000000, 0x9, 0x870, 0x4, 0x0, 0x6, 0x101, 0x2, 0x4, 0x0, 0x100000000, 0x4, @perf_bp={0x0, 0x2}, 0x10059, 0x0, 0x3ff, 0x1, 0x76a7, 0x310d7fff80, 0x7f}, r4, 0xd, 0xffffffffffffffff, 0x2) ioctl$BLKBSZSET(r6, 0x40081271, &(0x7f00000008c0)=0x3) ioctl$EVIOCGABS20(r3, 0x80184560, &(0x7f00000005c0)=""/68) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000700), 0x111, 0xe}}, 0x20) r7 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000000380), 0x80800) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_settime(0x0, 0x1, &(0x7f0000000040)={{0x0, 0x989680}}, &(0x7f00000000c0)) ioctl$FS_IOC_SETVERSION(r7, 0x40087602, &(0x7f0000000080)=0x7) ioctl$UI_END_FF_UPLOAD(r7, 0x406855c9, &(0x7f00000007c0)={0x5, 0x6, {0x56, 0x10001, 0xfffffffffffffffd, {0x5}, {0x80000001, 0x5}, @const={0xffffffffffff66e5, {0x9, 0x7, 0x81, 0x80}}}, {0x54, 0x75, 0x10001, {0x5, 0x80000001}, {0x2, 0x5}, @ramp={0x6920000000000000, 0x0, {0x3, 0xffffffff, 0xfffffffffffffffe, 0xbf53}}}}) close(r3) arch_prctl$ARCH_GET_FS(0x1003, &(0x7f0000000840)) utimensat(0xffffffffffffffff, 0x0, &(0x7f00000016c0), 0x0) connect$l2tp(r2, &(0x7f00000000c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}, 0x4, 0x8}}, 0x2e) dup3(r1, r2, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000900)=ANY=[@ANYBLOB="67e9b8ad27439b16daf1782ae17d840289f4c4fd0a934c896dc7c0ab7ce112a1a1c7d1f8c6d7220c90f3b5c94e93bfdcfc1ceb1f681cec2378dd66fc5d0e5581b58dd0e6d618a5b80f7a555a765246d680aabf84e47742d97dfc8c4eb0cd5e82d0b316bfb939fbac404473de8cf80c05babba5126b43728e3f3b9137aa45042a0f60715c3224e4397339b2aec80fe665407848108d283d5214cc46ceab956ffbf85573", @ANYRESOCT]) r8 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x111800, 0x0) getdents64(r8, &(0x7f0000000200)=""/189, 0xbd) [ 1599.915141] hfs: unable to parse mount options 10:17:56 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000080)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) r2 = socket$l2tp(0x18, 0x1, 0x1) io_pgetevents(0x0, 0x7fff, 0x0, &(0x7f0000000140), &(0x7f00000001c0)={0x77359400}, &(0x7f00000002c0)={&(0x7f0000000280), 0x8}) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x20601, 0x0) write$evdev(0xffffffffffffffff, &(0x7f0000000400), 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0xffffffffffffffff, r3, 0x0, 0x2, &(0x7f0000000240)='\\\x00'}, 0x30) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r0, 0xc1105511, &(0x7f00000003c0)={{0x8, 0x0, 0x400, 0x5, 'syz1\x00', 0x3}, 0x1, 0x20000000, 0x2, r4, 0x0, 0x2, 'syz0\x00', 0x0, 0x0, [], [0x40, 0x30, 0x8001, 0x2]}) ioctl$VIDIOC_G_INPUT(r5, 0x80045626, &(0x7f0000000640)) r6 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x10000000080, 0x0) perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0x4, 0x5, 0x8, 0x5, 0x0, 0x7, 0x3200, 0x8, 0x8000, 0x7f, 0x0, 0x20, 0x4, 0x9, 0x38000000000000, 0x5, 0xffff, 0x6756, 0x47a7, 0xd167, 0x2, 0x3, 0x9, 0x1, 0x62e, 0xce22, 0x0, 0x100000000, 0x9, 0x870, 0x4, 0x0, 0x6, 0x101, 0x2, 0x4, 0x0, 0x100000000, 0x4, @perf_bp={0x0, 0x2}, 0x10059, 0x0, 0x3ff, 0x1, 0x76a7, 0x310d7fff80, 0x7f}, r4, 0xd, 0xffffffffffffffff, 0x2) ioctl$BLKBSZSET(r6, 0x40081271, &(0x7f00000008c0)=0x3) ioctl$EVIOCGABS20(r3, 0x80184560, &(0x7f00000005c0)=""/68) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000700), 0x111, 0xe}}, 0x20) r7 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000000380), 0x80800) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_settime(0x0, 0x1, &(0x7f0000000040)={{0x0, 0x989680}}, &(0x7f00000000c0)) ioctl$FS_IOC_SETVERSION(r7, 0x40087602, &(0x7f0000000080)=0x7) ioctl$UI_END_FF_UPLOAD(r7, 0x406855c9, &(0x7f00000007c0)={0x5, 0x6, {0x56, 0x10001, 0xfffffffffffffffd, {0x5}, {0x80000001, 0x5}, @const={0xffffffffffff66e5, {0x9, 0x7, 0x81, 0x80}}}, {0x54, 0x75, 0x10001, {0x5, 0x80000001}, {0x2, 0x5}, @ramp={0x6920000000000000, 0x0, {0x3, 0xffffffff, 0xfffffffffffffffe, 0xbf53}}}}) close(r3) arch_prctl$ARCH_GET_FS(0x1003, &(0x7f0000000840)) utimensat(0xffffffffffffffff, 0x0, &(0x7f00000016c0), 0x0) connect$l2tp(r2, &(0x7f00000000c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}, 0x4, 0x8}}, 0x2e) dup3(r1, r2, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000900)=ANY=[@ANYBLOB="67e9b8ad27439b16daf1782ae17d840289f4c4fd0a934c896dc7c0ab7ce112a1a1c7d1f8c6d7220c90f3b5c94e93bfdcfc1ceb1f681cec2378dd66fc5d0e5581b58dd0e6d618a5b80f7a555a765246d680aabf84e47742d97dfc8c4eb0cd5e82d0b316bfb939fbac404473de8cf80c05babba5126b43728e3f3b9137aa45042a0f60715c3224e4397339b2aec80fe665407848108d283d5214cc46ceab956ffbf85573", @ANYRESOCT]) r8 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x111800, 0x0) getdents64(r8, &(0x7f0000000200)=""/189, 0xbd) 10:17:56 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000080)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) r2 = socket$l2tp(0x18, 0x1, 0x1) io_pgetevents(0x0, 0x7fff, 0x0, &(0x7f0000000140), &(0x7f00000001c0)={0x77359400}, &(0x7f00000002c0)={&(0x7f0000000280), 0x8}) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x20601, 0x0) write$evdev(0xffffffffffffffff, &(0x7f0000000400), 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0xffffffffffffffff, r3, 0x0, 0x2, &(0x7f0000000240)='\\\x00'}, 0x30) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r0, 0xc1105511, &(0x7f00000003c0)={{0x8, 0x0, 0x400, 0x5, 'syz1\x00', 0x3}, 0x1, 0x20000000, 0x2, r4, 0x0, 0x2, 'syz0\x00', 0x0, 0x0, [], [0x40, 0x30, 0x8001, 0x2]}) ioctl$VIDIOC_G_INPUT(r5, 0x80045626, &(0x7f0000000640)) r6 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x10000000080, 0x0) perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0x4, 0x5, 0x8, 0x5, 0x0, 0x7, 0x3200, 0x8, 0x8000, 0x7f, 0x0, 0x20, 0x4, 0x9, 0x38000000000000, 0x5, 0xffff, 0x6756, 0x47a7, 0xd167, 0x2, 0x3, 0x9, 0x1, 0x62e, 0xce22, 0x0, 0x100000000, 0x9, 0x870, 0x4, 0x0, 0x6, 0x101, 0x2, 0x4, 0x0, 0x100000000, 0x4, @perf_bp={0x0, 0x2}, 0x10059, 0x0, 0x3ff, 0x1, 0x76a7, 0x310d7fff80, 0x7f}, r4, 0xd, 0xffffffffffffffff, 0x2) ioctl$BLKBSZSET(r6, 0x40081271, &(0x7f00000008c0)=0x3) ioctl$EVIOCGABS20(r3, 0x80184560, &(0x7f00000005c0)=""/68) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000700), 0x111, 0xe}}, 0x20) r7 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000000380), 0x80800) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_settime(0x0, 0x1, &(0x7f0000000040)={{0x0, 0x989680}}, &(0x7f00000000c0)) ioctl$FS_IOC_SETVERSION(r7, 0x40087602, &(0x7f0000000080)=0x7) ioctl$UI_END_FF_UPLOAD(r7, 0x406855c9, &(0x7f00000007c0)={0x5, 0x6, {0x56, 0x10001, 0xfffffffffffffffd, {0x5}, {0x80000001, 0x5}, @const={0xffffffffffff66e5, {0x9, 0x7, 0x81, 0x80}}}, {0x54, 0x75, 0x10001, {0x5, 0x80000001}, {0x2, 0x5}, @ramp={0x6920000000000000, 0x0, {0x3, 0xffffffff, 0xfffffffffffffffe, 0xbf53}}}}) close(r3) arch_prctl$ARCH_GET_FS(0x1003, &(0x7f0000000840)) utimensat(0xffffffffffffffff, 0x0, &(0x7f00000016c0), 0x0) connect$l2tp(r2, &(0x7f00000000c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}, 0x4, 0x8}}, 0x2e) dup3(r1, r2, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000900)=ANY=[@ANYBLOB="67e9b8ad27439b16daf1782ae17d840289f4c4fd0a934c896dc7c0ab7ce112a1a1c7d1f8c6d7220c90f3b5c94e93bfdcfc1ceb1f681cec2378dd66fc5d0e5581b58dd0e6d618a5b80f7a555a765246d680aabf84e47742d97dfc8c4eb0cd5e82d0b316bfb939fbac404473de8cf80c05babba5126b43728e3f3b9137aa45042a0f60715c3224e4397339b2aec80fe665407848108d283d5214cc46ceab956ffbf85573", @ANYRESOCT]) r8 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x111800, 0x0) getdents64(r8, &(0x7f0000000200)=""/189, 0xbd) 10:17:56 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000080)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) r2 = socket$l2tp(0x18, 0x1, 0x1) io_pgetevents(0x0, 0x7fff, 0x0, &(0x7f0000000140), &(0x7f00000001c0)={0x77359400}, &(0x7f00000002c0)={&(0x7f0000000280), 0x8}) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x20601, 0x0) write$evdev(0xffffffffffffffff, &(0x7f0000000400), 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0xffffffffffffffff, r3, 0x0, 0x2, &(0x7f0000000240)='\\\x00'}, 0x30) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r0, 0xc1105511, &(0x7f00000003c0)={{0x8, 0x0, 0x400, 0x5, 'syz1\x00', 0x3}, 0x1, 0x20000000, 0x2, r4, 0x0, 0x2, 'syz0\x00', 0x0, 0x0, [], [0x40, 0x30, 0x8001, 0x2]}) ioctl$VIDIOC_G_INPUT(r5, 0x80045626, &(0x7f0000000640)) r6 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x10000000080, 0x0) perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0x4, 0x5, 0x8, 0x5, 0x0, 0x7, 0x3200, 0x8, 0x8000, 0x7f, 0x0, 0x20, 0x4, 0x9, 0x38000000000000, 0x5, 0xffff, 0x6756, 0x47a7, 0xd167, 0x2, 0x3, 0x9, 0x1, 0x62e, 0xce22, 0x0, 0x100000000, 0x9, 0x870, 0x4, 0x0, 0x6, 0x101, 0x2, 0x4, 0x0, 0x100000000, 0x4, @perf_bp={0x0, 0x2}, 0x10059, 0x0, 0x3ff, 0x1, 0x76a7, 0x310d7fff80, 0x7f}, r4, 0xd, 0xffffffffffffffff, 0x2) ioctl$BLKBSZSET(r6, 0x40081271, &(0x7f00000008c0)=0x3) ioctl$EVIOCGABS20(r3, 0x80184560, &(0x7f00000005c0)=""/68) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000700), 0x111, 0xe}}, 0x20) r7 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000000380), 0x80800) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_settime(0x0, 0x1, &(0x7f0000000040)={{0x0, 0x989680}}, &(0x7f00000000c0)) ioctl$FS_IOC_SETVERSION(r7, 0x40087602, &(0x7f0000000080)=0x7) ioctl$UI_END_FF_UPLOAD(r7, 0x406855c9, &(0x7f00000007c0)={0x5, 0x6, {0x56, 0x10001, 0xfffffffffffffffd, {0x5}, {0x80000001, 0x5}, @const={0xffffffffffff66e5, {0x9, 0x7, 0x81, 0x80}}}, {0x54, 0x75, 0x10001, {0x5, 0x80000001}, {0x2, 0x5}, @ramp={0x6920000000000000, 0x0, {0x3, 0xffffffff, 0xfffffffffffffffe, 0xbf53}}}}) close(r3) arch_prctl$ARCH_GET_FS(0x1003, &(0x7f0000000840)) utimensat(0xffffffffffffffff, 0x0, &(0x7f00000016c0), 0x0) connect$l2tp(r2, &(0x7f00000000c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}, 0x4, 0x8}}, 0x2e) dup3(r1, r2, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000900)=ANY=[@ANYBLOB="67e9b8ad27439b16daf1782ae17d840289f4c4fd0a934c896dc7c0ab7ce112a1a1c7d1f8c6d7220c90f3b5c94e93bfdcfc1ceb1f681cec2378dd66fc5d0e5581b58dd0e6d618a5b80f7a555a765246d680aabf84e47742d97dfc8c4eb0cd5e82d0b316bfb939fbac404473de8cf80c05babba5126b43728e3f3b9137aa45042a0f60715c3224e4397339b2aec80fe665407848108d283d5214cc46ceab956ffbf85573", @ANYRESOCT]) r8 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x111800, 0x0) getdents64(r8, &(0x7f0000000200)=""/189, 0xbd) 10:17:57 executing program 4: openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x40000000000, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x40000000, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x4, 0x4, 0x400000000004, 0x9}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_LINKINFO={0x14, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0x4}}}]}, 0x3c}}, 0x0) add_key(&(0x7f0000000080)='dns_resolver\x00', &(0x7f00000000c0)={'\x02\x00'}, &(0x7f0000000100), 0xfffff, 0xfffffffffffffffb) 10:17:57 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000040), 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) close(r1) socket$alg(0x26, 0x5, 0x0) io_setup(0x7, &(0x7f0000000240)=0x0) io_submit(r2, 0x1e09328e, &(0x7f0000000040)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1000800000000001, 0x0, r1, 0x0, 0x12f}]) 10:17:57 executing program 2: openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x40000000000, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x40000000, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x4, 0x4, 0x400000000004, 0x9}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_LINKINFO={0x14, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0x4}}}]}, 0x3c}}, 0x0) add_key(&(0x7f0000000080)='dns_resolver\x00', &(0x7f00000000c0)={'\x02\x00'}, &(0x7f0000000100), 0xfffff, 0xfffffffffffffffb) [ 1600.521211] hfs: unable to parse mount options 10:17:57 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000080)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) r2 = socket$l2tp(0x18, 0x1, 0x1) io_pgetevents(0x0, 0x7fff, 0x0, &(0x7f0000000140), &(0x7f00000001c0)={0x77359400}, &(0x7f00000002c0)={&(0x7f0000000280), 0x8}) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x20601, 0x0) write$evdev(0xffffffffffffffff, &(0x7f0000000400), 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0xffffffffffffffff, r3, 0x0, 0x2, &(0x7f0000000240)='\\\x00'}, 0x30) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r0, 0xc1105511, &(0x7f00000003c0)={{0x8, 0x0, 0x400, 0x5, 'syz1\x00', 0x3}, 0x1, 0x20000000, 0x2, r4, 0x0, 0x2, 'syz0\x00', 0x0, 0x0, [], [0x40, 0x30, 0x8001, 0x2]}) ioctl$VIDIOC_G_INPUT(r5, 0x80045626, &(0x7f0000000640)) r6 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x10000000080, 0x0) perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0x4, 0x5, 0x8, 0x5, 0x0, 0x7, 0x3200, 0x8, 0x8000, 0x7f, 0x0, 0x20, 0x4, 0x9, 0x38000000000000, 0x5, 0xffff, 0x6756, 0x47a7, 0xd167, 0x2, 0x3, 0x9, 0x1, 0x62e, 0xce22, 0x0, 0x100000000, 0x9, 0x870, 0x4, 0x0, 0x6, 0x101, 0x2, 0x4, 0x0, 0x100000000, 0x4, @perf_bp={0x0, 0x2}, 0x10059, 0x0, 0x3ff, 0x1, 0x76a7, 0x310d7fff80, 0x7f}, r4, 0xd, 0xffffffffffffffff, 0x2) ioctl$BLKBSZSET(r6, 0x40081271, &(0x7f00000008c0)=0x3) ioctl$EVIOCGABS20(r3, 0x80184560, &(0x7f00000005c0)=""/68) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000700), 0x111, 0xe}}, 0x20) r7 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000000380), 0x80800) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_settime(0x0, 0x1, &(0x7f0000000040)={{0x0, 0x989680}}, &(0x7f00000000c0)) ioctl$FS_IOC_SETVERSION(r7, 0x40087602, &(0x7f0000000080)=0x7) ioctl$UI_END_FF_UPLOAD(r7, 0x406855c9, &(0x7f00000007c0)={0x5, 0x6, {0x56, 0x10001, 0xfffffffffffffffd, {0x5}, {0x80000001, 0x5}, @const={0xffffffffffff66e5, {0x9, 0x7, 0x81, 0x80}}}, {0x54, 0x75, 0x10001, {0x5, 0x80000001}, {0x2, 0x5}, @ramp={0x6920000000000000, 0x0, {0x3, 0xffffffff, 0xfffffffffffffffe, 0xbf53}}}}) close(r3) arch_prctl$ARCH_GET_FS(0x1003, &(0x7f0000000840)) utimensat(0xffffffffffffffff, 0x0, &(0x7f00000016c0), 0x0) connect$l2tp(r2, &(0x7f00000000c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}, 0x4, 0x8}}, 0x2e) dup3(r1, r2, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000900)=ANY=[@ANYBLOB="67e9b8ad27439b16daf1782ae17d840289f4c4fd0a934c896dc7c0ab7ce112a1a1c7d1f8c6d7220c90f3b5c94e93bfdcfc1ceb1f681cec2378dd66fc5d0e5581b58dd0e6d618a5b80f7a555a765246d680aabf84e47742d97dfc8c4eb0cd5e82d0b316bfb939fbac404473de8cf80c05babba5126b43728e3f3b9137aa45042a0f60715c3224e4397339b2aec80fe665407848108d283d5214cc46ceab956ffbf85573", @ANYRESOCT]) r8 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x111800, 0x0) getdents64(r8, &(0x7f0000000200)=""/189, 0xbd) 10:17:57 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000040), 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) close(r1) socket$alg(0x26, 0x5, 0x0) io_setup(0x7, &(0x7f0000000240)=0x0) io_submit(r2, 0x1e09328e, &(0x7f0000000040)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1000800000000001, 0x0, r1, 0x0, 0x12f}]) 10:17:57 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000080)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) r2 = socket$l2tp(0x18, 0x1, 0x1) io_pgetevents(0x0, 0x7fff, 0x0, &(0x7f0000000140), &(0x7f00000001c0)={0x77359400}, &(0x7f00000002c0)={&(0x7f0000000280), 0x8}) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x20601, 0x0) write$evdev(0xffffffffffffffff, &(0x7f0000000400), 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0xffffffffffffffff, r3, 0x0, 0x2, &(0x7f0000000240)='\\\x00'}, 0x30) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r0, 0xc1105511, &(0x7f00000003c0)={{0x8, 0x0, 0x400, 0x5, 'syz1\x00', 0x3}, 0x1, 0x20000000, 0x2, r4, 0x0, 0x2, 'syz0\x00', 0x0, 0x0, [], [0x40, 0x30, 0x8001, 0x2]}) ioctl$VIDIOC_G_INPUT(r5, 0x80045626, &(0x7f0000000640)) r6 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x10000000080, 0x0) perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0x4, 0x5, 0x8, 0x5, 0x0, 0x7, 0x3200, 0x8, 0x8000, 0x7f, 0x0, 0x20, 0x4, 0x9, 0x38000000000000, 0x5, 0xffff, 0x6756, 0x47a7, 0xd167, 0x2, 0x3, 0x9, 0x1, 0x62e, 0xce22, 0x0, 0x100000000, 0x9, 0x870, 0x4, 0x0, 0x6, 0x101, 0x2, 0x4, 0x0, 0x100000000, 0x4, @perf_bp={0x0, 0x2}, 0x10059, 0x0, 0x3ff, 0x1, 0x76a7, 0x310d7fff80, 0x7f}, r4, 0xd, 0xffffffffffffffff, 0x2) ioctl$BLKBSZSET(r6, 0x40081271, &(0x7f00000008c0)=0x3) ioctl$EVIOCGABS20(r3, 0x80184560, &(0x7f00000005c0)=""/68) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000700), 0x111, 0xe}}, 0x20) r7 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000000380), 0x80800) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_settime(0x0, 0x1, &(0x7f0000000040)={{0x0, 0x989680}}, &(0x7f00000000c0)) ioctl$FS_IOC_SETVERSION(r7, 0x40087602, &(0x7f0000000080)=0x7) ioctl$UI_END_FF_UPLOAD(r7, 0x406855c9, &(0x7f00000007c0)={0x5, 0x6, {0x56, 0x10001, 0xfffffffffffffffd, {0x5}, {0x80000001, 0x5}, @const={0xffffffffffff66e5, {0x9, 0x7, 0x81, 0x80}}}, {0x54, 0x75, 0x10001, {0x5, 0x80000001}, {0x2, 0x5}, @ramp={0x6920000000000000, 0x0, {0x3, 0xffffffff, 0xfffffffffffffffe, 0xbf53}}}}) close(r3) arch_prctl$ARCH_GET_FS(0x1003, &(0x7f0000000840)) utimensat(0xffffffffffffffff, 0x0, &(0x7f00000016c0), 0x0) connect$l2tp(r2, &(0x7f00000000c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}, 0x4, 0x8}}, 0x2e) dup3(r1, r2, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000900)=ANY=[@ANYBLOB="67e9b8ad27439b16daf1782ae17d840289f4c4fd0a934c896dc7c0ab7ce112a1a1c7d1f8c6d7220c90f3b5c94e93bfdcfc1ceb1f681cec2378dd66fc5d0e5581b58dd0e6d618a5b80f7a555a765246d680aabf84e47742d97dfc8c4eb0cd5e82d0b316bfb939fbac404473de8cf80c05babba5126b43728e3f3b9137aa45042a0f60715c3224e4397339b2aec80fe665407848108d283d5214cc46ceab956ffbf85573", @ANYRESOCT]) r8 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x111800, 0x0) getdents64(r8, &(0x7f0000000200)=""/189, 0xbd) [ 1600.795997] hfs: unable to parse mount options 10:17:57 executing program 4: openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x40000000000, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x40000000, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x4, 0x4, 0x400000000004, 0x9}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_LINKINFO={0x14, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0x4}}}]}, 0x3c}}, 0x0) add_key(&(0x7f0000000080)='dns_resolver\x00', &(0x7f00000000c0)={'\x02\x00'}, &(0x7f0000000100), 0xfffff, 0xfffffffffffffffb) 10:17:57 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000080)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) r2 = socket$l2tp(0x18, 0x1, 0x1) io_pgetevents(0x0, 0x7fff, 0x0, &(0x7f0000000140), &(0x7f00000001c0)={0x77359400}, &(0x7f00000002c0)={&(0x7f0000000280), 0x8}) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x20601, 0x0) write$evdev(0xffffffffffffffff, &(0x7f0000000400), 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0xffffffffffffffff, r3, 0x0, 0x2, &(0x7f0000000240)='\\\x00'}, 0x30) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r0, 0xc1105511, &(0x7f00000003c0)={{0x8, 0x0, 0x400, 0x5, 'syz1\x00', 0x3}, 0x1, 0x20000000, 0x2, r4, 0x0, 0x2, 'syz0\x00', 0x0, 0x0, [], [0x40, 0x30, 0x8001, 0x2]}) ioctl$VIDIOC_G_INPUT(r5, 0x80045626, &(0x7f0000000640)) r6 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x10000000080, 0x0) perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0x4, 0x5, 0x8, 0x5, 0x0, 0x7, 0x3200, 0x8, 0x8000, 0x7f, 0x0, 0x20, 0x4, 0x9, 0x38000000000000, 0x5, 0xffff, 0x6756, 0x47a7, 0xd167, 0x2, 0x3, 0x9, 0x1, 0x62e, 0xce22, 0x0, 0x100000000, 0x9, 0x870, 0x4, 0x0, 0x6, 0x101, 0x2, 0x4, 0x0, 0x100000000, 0x4, @perf_bp={0x0, 0x2}, 0x10059, 0x0, 0x3ff, 0x1, 0x76a7, 0x310d7fff80, 0x7f}, r4, 0xd, 0xffffffffffffffff, 0x2) ioctl$BLKBSZSET(r6, 0x40081271, &(0x7f00000008c0)=0x3) ioctl$EVIOCGABS20(r3, 0x80184560, &(0x7f00000005c0)=""/68) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000740)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000700), 0x111, 0xe}}, 0x20) r7 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000000380), 0x80800) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_settime(0x0, 0x1, &(0x7f0000000040)={{0x0, 0x989680}}, &(0x7f00000000c0)) ioctl$FS_IOC_SETVERSION(r7, 0x40087602, &(0x7f0000000080)=0x7) ioctl$UI_END_FF_UPLOAD(r7, 0x406855c9, &(0x7f00000007c0)={0x5, 0x6, {0x56, 0x10001, 0xfffffffffffffffd, {0x5}, {0x80000001, 0x5}, @const={0xffffffffffff66e5, {0x9, 0x7, 0x81, 0x80}}}, {0x54, 0x75, 0x10001, {0x5, 0x80000001}, {0x2, 0x5}, @ramp={0x6920000000000000, 0x0, {0x3, 0xffffffff, 0xfffffffffffffffe, 0xbf53}}}}) close(r3) arch_prctl$ARCH_GET_FS(0x1003, &(0x7f0000000840)) utimensat(0xffffffffffffffff, 0x0, &(0x7f00000016c0), 0x0) connect$l2tp(r2, &(0x7f00000000c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}, 0x4, 0x8}}, 0x2e) dup3(r1, r2, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000900)=ANY=[@ANYBLOB="67e9b8ad27439b16daf1782ae17d840289f4c4fd0a934c896dc7c0ab7ce112a1a1c7d1f8c6d7220c90f3b5c94e93bfdcfc1ceb1f681cec2378dd66fc5d0e5581b58dd0e6d618a5b80f7a555a765246d680aabf84e47742d97dfc8c4eb0cd5e82d0b316bfb939fbac404473de8cf80c05babba5126b43728e3f3b9137aa45042a0f60715c3224e4397339b2aec80fe665407848108d283d5214cc46ceab956ffbf85573", @ANYRESOCT]) r8 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x111800, 0x0) getdents64(r8, &(0x7f0000000200)=""/189, 0xbd) 10:17:57 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000040), 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) close(r1) socket$alg(0x26, 0x5, 0x0) io_setup(0x7, &(0x7f0000000240)=0x0) io_submit(r2, 0x1e09328e, &(0x7f0000000040)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1000800000000001, 0x0, r1, 0x0, 0x12f}]) 10:17:58 executing program 2: openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x40000000000, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x40000000, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x4, 0x4, 0x400000000004, 0x9}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_LINKINFO={0x14, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0x4}}}]}, 0x3c}}, 0x0) add_key(&(0x7f0000000080)='dns_resolver\x00', &(0x7f00000000c0)={'\x02\x00'}, &(0x7f0000000100), 0xfffff, 0xfffffffffffffffb) [ 1601.334130] hfs: unable to parse mount options 10:17:58 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000040), 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) close(r1) socket$alg(0x26, 0x5, 0x0) io_setup(0x7, &(0x7f0000000240)=0x0) io_submit(r2, 0x1e09328e, &(0x7f0000000040)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1000800000000001, 0x0, r1, 0x0, 0x12f}]) 10:17:58 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) r2 = syz_open_dev$dspn(0x0, 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz1\x00', 0x200002, 0x0) arch_prctl$ARCH_GET_CPUID(0x1011) ioctl$int_in(r0, 0x800000c0045005, 0x0) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) setsockopt$sock_timeval(r2, 0x1, 0x14, &(0x7f0000000140)={r3, r4/1000+10000}, 0x10) getpgrp(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'team0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r2, 0x8936, &(0x7f0000000200)={@mcast2, 0x62, r5}) setsockopt$RDS_CONG_MONITOR(0xffffffffffffffff, 0x114, 0x6, 0x0, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r2, 0xc0106403, &(0x7f0000000040)={0x8875, 0x0, 0x8000, 0x7}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) fcntl$dupfd(r1, 0x0, r0) getsockopt$packet_int(r2, 0x107, 0x1f, &(0x7f00000001c0), &(0x7f0000000280)=0x4) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\'', 0x1ff) write$binfmt_script(r0, 0x0, 0x0) unshare(0x40000000) [ 1601.541441] hfs: unable to parse mount options [ 1601.782981] IPVS: ftp: loaded support on port[0] = 21 10:17:58 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000040), 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) close(r1) socket$alg(0x26, 0x5, 0x0) io_setup(0x7, &(0x7f0000000240)=0x0) io_submit(r2, 0x1e09328e, &(0x7f0000000040)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1000800000000001, 0x0, r1, 0x0, 0x12f}]) 10:17:58 executing program 3: bpf$MAP_CREATE(0x2, &(0x7f0000000100)={0x3, 0x0, 0x77fffb, 0x0, 0x0, 0x0}, 0x2c) perf_event_open(&(0x7f00000017c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/policy\x00', 0x0, 0x0) 10:17:58 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000040), 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) close(r1) socket$alg(0x26, 0x5, 0x0) io_setup(0x7, &(0x7f0000000240)=0x0) io_submit(r2, 0x1e09328e, &(0x7f0000000040)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1000800000000001, 0x0, r1, 0x0, 0x12f}]) 10:17:58 executing program 4: openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x40000000000, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x40000000, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x4, 0x4, 0x400000000004, 0x9}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_LINKINFO={0x14, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0x4}}}]}, 0x3c}}, 0x0) add_key(&(0x7f0000000080)='dns_resolver\x00', &(0x7f00000000c0)={'\x02\x00'}, &(0x7f0000000100), 0xfffff, 0xfffffffffffffffb) [ 1602.574179] IPVS: ftp: loaded support on port[0] = 21 10:17:59 executing program 3: bpf$MAP_CREATE(0x2, &(0x7f0000000100)={0x3, 0x0, 0x77fffb, 0x0, 0x0, 0x0}, 0x2c) perf_event_open(&(0x7f00000017c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/policy\x00', 0x0, 0x0) 10:17:59 executing program 2: r0 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000440)='/proc/thread-self/attr/fscreate\x00', 0x2, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) write$P9_RREADDIR(r1, &(0x7f0000000140)={0xb}, 0xb) 10:17:59 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(adian%um(lrw-twofish-3way,aes-ce,cmac-aes-ce),ghash-g(n'}, 0x58) 10:17:59 executing program 3: bpf$MAP_CREATE(0x2, &(0x7f0000000100)={0x3, 0x0, 0x77fffb, 0x0, 0x0, 0x0}, 0x2c) perf_event_open(&(0x7f00000017c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/policy\x00', 0x0, 0x0) 10:17:59 executing program 1: r0 = socket$inet6(0xa, 0x5, 0x0) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r0, 0x103) recvmmsg(r0, &(0x7f0000005c00)=[{{&(0x7f0000000340)=@sco, 0x80, 0x0}}], 0x1, 0x0, 0x0) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000000)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) write(r1, &(0x7f0000000100), 0x34000) 10:18:00 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000001c0)={0x2, 0x3, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x9}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_sa={0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x68}}, 0x0) 10:18:00 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(adian%um(lrw-twofish-3way,aes-ce,cmac-aes-ce),ghash-g(n'}, 0x58) 10:18:02 executing program 3: bpf$MAP_CREATE(0x2, &(0x7f0000000100)={0x3, 0x0, 0x77fffb, 0x0, 0x0, 0x0}, 0x2c) perf_event_open(&(0x7f00000017c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/policy\x00', 0x0, 0x0) 10:18:02 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(adian%um(lrw-twofish-3way,aes-ce,cmac-aes-ce),ghash-g(n'}, 0x58) 10:18:02 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000001c0)={0x2, 0x3, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x9}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_sa={0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x68}}, 0x0) [ 1605.845780] IPVS: ftp: loaded support on port[0] = 21 [ 1605.975593] chnl_net:caif_netlink_parms(): no params data found [ 1606.030817] bridge0: port 1(bridge_slave_0) entered blocking state [ 1606.037440] bridge0: port 1(bridge_slave_0) entered disabled state [ 1606.046123] device bridge_slave_0 entered promiscuous mode [ 1606.055437] bridge0: port 2(bridge_slave_1) entered blocking state [ 1606.062241] bridge0: port 2(bridge_slave_1) entered disabled state [ 1606.070674] device bridge_slave_1 entered promiscuous mode [ 1606.120978] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1606.134587] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1606.156946] team0: Port device team_slave_0 added [ 1606.164446] team0: Port device team_slave_1 added [ 1606.250420] device hsr_slave_0 entered promiscuous mode [ 1606.298831] device hsr_slave_1 entered promiscuous mode [ 1606.401979] bridge0: port 2(bridge_slave_1) entered blocking state [ 1606.408542] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1606.415343] bridge0: port 1(bridge_slave_0) entered blocking state [ 1606.421922] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1606.488817] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1606.505912] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1606.514360] bridge0: port 1(bridge_slave_0) entered disabled state [ 1606.522715] bridge0: port 2(bridge_slave_1) entered disabled state [ 1606.532769] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1606.547437] 8021q: adding VLAN 0 to HW filter on device team0 [ 1606.560409] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1606.568291] bridge0: port 1(bridge_slave_0) entered blocking state [ 1606.574982] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1606.600817] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1606.611063] bridge0: port 2(bridge_slave_1) entered blocking state [ 1606.617539] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1606.625802] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1606.634436] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1606.649424] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1606.664190] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1606.679662] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1606.691616] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1606.719174] 8021q: adding VLAN 0 to HW filter on device batadv0 10:18:03 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000040), 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) close(r1) socket$alg(0x26, 0x5, 0x0) io_setup(0x7, &(0x7f0000000240)=0x0) io_submit(r2, 0x1e09328e, &(0x7f0000000040)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1000800000000001, 0x0, r1, 0x0, 0x12f}]) 10:18:03 executing program 1: r0 = socket$inet6(0xa, 0x5, 0x0) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r0, 0x103) recvmmsg(r0, &(0x7f0000005c00)=[{{&(0x7f0000000340)=@sco, 0x80, 0x0}}], 0x1, 0x0, 0x0) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000000)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) write(r1, &(0x7f0000000100), 0x34000) 10:18:03 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) r2 = syz_open_dev$dspn(0x0, 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz1\x00', 0x200002, 0x0) arch_prctl$ARCH_GET_CPUID(0x1011) ioctl$int_in(r0, 0x800000c0045005, 0x0) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) setsockopt$sock_timeval(r2, 0x1, 0x14, &(0x7f0000000140)={r3, r4/1000+10000}, 0x10) getpgrp(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'team0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r2, 0x8936, &(0x7f0000000200)={@mcast2, 0x62, r5}) setsockopt$RDS_CONG_MONITOR(0xffffffffffffffff, 0x114, 0x6, 0x0, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r2, 0xc0106403, &(0x7f0000000040)={0x8875, 0x0, 0x8000, 0x7}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) fcntl$dupfd(r1, 0x0, r0) getsockopt$packet_int(r2, 0x107, 0x1f, &(0x7f00000001c0), &(0x7f0000000280)=0x4) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\'', 0x1ff) write$binfmt_script(r0, 0x0, 0x0) unshare(0x40000000) 10:18:03 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(adian%um(lrw-twofish-3way,aes-ce,cmac-aes-ce),ghash-g(n'}, 0x58) 10:18:03 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000001c0)={0x2, 0x3, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x9}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_sa={0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x68}}, 0x0) 10:18:03 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000001c0)={0x2, 0x3, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x9}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_sa={0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x68}}, 0x0) [ 1607.072996] IPVS: ftp: loaded support on port[0] = 21 10:18:04 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) r2 = syz_open_dev$dspn(0x0, 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz1\x00', 0x200002, 0x0) arch_prctl$ARCH_GET_CPUID(0x1011) ioctl$int_in(r0, 0x800000c0045005, 0x0) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) setsockopt$sock_timeval(r2, 0x1, 0x14, &(0x7f0000000140)={r3, r4/1000+10000}, 0x10) getpgrp(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'team0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r2, 0x8936, &(0x7f0000000200)={@mcast2, 0x62, r5}) setsockopt$RDS_CONG_MONITOR(0xffffffffffffffff, 0x114, 0x6, 0x0, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r2, 0xc0106403, &(0x7f0000000040)={0x8875, 0x0, 0x8000, 0x7}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) fcntl$dupfd(r1, 0x0, r0) getsockopt$packet_int(r2, 0x107, 0x1f, &(0x7f00000001c0), &(0x7f0000000280)=0x4) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\'', 0x1ff) write$binfmt_script(r0, 0x0, 0x0) unshare(0x40000000) 10:18:04 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) r2 = syz_open_dev$dspn(0x0, 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz1\x00', 0x200002, 0x0) arch_prctl$ARCH_GET_CPUID(0x1011) ioctl$int_in(r0, 0x800000c0045005, 0x0) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) setsockopt$sock_timeval(r2, 0x1, 0x14, &(0x7f0000000140)={r3, r4/1000+10000}, 0x10) getpgrp(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'team0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r2, 0x8936, &(0x7f0000000200)={@mcast2, 0x62, r5}) setsockopt$RDS_CONG_MONITOR(0xffffffffffffffff, 0x114, 0x6, 0x0, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r2, 0xc0106403, &(0x7f0000000040)={0x8875, 0x0, 0x8000, 0x7}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) fcntl$dupfd(r1, 0x0, r0) getsockopt$packet_int(r2, 0x107, 0x1f, &(0x7f00000001c0), &(0x7f0000000280)=0x4) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\'', 0x1ff) write$binfmt_script(r0, 0x0, 0x0) unshare(0x40000000) 10:18:04 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) r2 = syz_open_dev$dspn(0x0, 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz1\x00', 0x200002, 0x0) arch_prctl$ARCH_GET_CPUID(0x1011) ioctl$int_in(r0, 0x800000c0045005, 0x0) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) setsockopt$sock_timeval(r2, 0x1, 0x14, &(0x7f0000000140)={r3, r4/1000+10000}, 0x10) getpgrp(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'team0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r2, 0x8936, &(0x7f0000000200)={@mcast2, 0x62, r5}) setsockopt$RDS_CONG_MONITOR(0xffffffffffffffff, 0x114, 0x6, 0x0, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r2, 0xc0106403, &(0x7f0000000040)={0x8875, 0x0, 0x8000, 0x7}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) fcntl$dupfd(r1, 0x0, r0) getsockopt$packet_int(r2, 0x107, 0x1f, &(0x7f00000001c0), &(0x7f0000000280)=0x4) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\'', 0x1ff) write$binfmt_script(r0, 0x0, 0x0) unshare(0x40000000) 10:18:04 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) r2 = syz_open_dev$dspn(0x0, 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz1\x00', 0x200002, 0x0) arch_prctl$ARCH_GET_CPUID(0x1011) ioctl$int_in(r0, 0x800000c0045005, 0x0) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) setsockopt$sock_timeval(r2, 0x1, 0x14, &(0x7f0000000140)={r3, r4/1000+10000}, 0x10) getpgrp(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'team0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r2, 0x8936, &(0x7f0000000200)={@mcast2, 0x62, r5}) setsockopt$RDS_CONG_MONITOR(0xffffffffffffffff, 0x114, 0x6, 0x0, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r2, 0xc0106403, &(0x7f0000000040)={0x8875, 0x0, 0x8000, 0x7}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) fcntl$dupfd(r1, 0x0, r0) getsockopt$packet_int(r2, 0x107, 0x1f, &(0x7f00000001c0), &(0x7f0000000280)=0x4) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\'', 0x1ff) write$binfmt_script(r0, 0x0, 0x0) unshare(0x40000000) [ 1607.923439] IPVS: ftp: loaded support on port[0] = 21 [ 1608.082778] IPVS: ftp: loaded support on port[0] = 21 10:18:06 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) r2 = syz_open_dev$dspn(0x0, 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz1\x00', 0x200002, 0x0) arch_prctl$ARCH_GET_CPUID(0x1011) ioctl$int_in(r0, 0x800000c0045005, 0x0) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) setsockopt$sock_timeval(r2, 0x1, 0x14, &(0x7f0000000140)={r3, r4/1000+10000}, 0x10) getpgrp(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'team0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r2, 0x8936, &(0x7f0000000200)={@mcast2, 0x62, r5}) setsockopt$RDS_CONG_MONITOR(0xffffffffffffffff, 0x114, 0x6, 0x0, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r2, 0xc0106403, &(0x7f0000000040)={0x8875, 0x0, 0x8000, 0x7}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) fcntl$dupfd(r1, 0x0, r0) getsockopt$packet_int(r2, 0x107, 0x1f, &(0x7f00000001c0), &(0x7f0000000280)=0x4) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\'', 0x1ff) write$binfmt_script(r0, 0x0, 0x0) unshare(0x40000000) 10:18:06 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) r2 = syz_open_dev$dspn(0x0, 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz1\x00', 0x200002, 0x0) arch_prctl$ARCH_GET_CPUID(0x1011) ioctl$int_in(r0, 0x800000c0045005, 0x0) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) setsockopt$sock_timeval(r2, 0x1, 0x14, &(0x7f0000000140)={r3, r4/1000+10000}, 0x10) getpgrp(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'team0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r2, 0x8936, &(0x7f0000000200)={@mcast2, 0x62, r5}) setsockopt$RDS_CONG_MONITOR(0xffffffffffffffff, 0x114, 0x6, 0x0, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r2, 0xc0106403, &(0x7f0000000040)={0x8875, 0x0, 0x8000, 0x7}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) fcntl$dupfd(r1, 0x0, r0) getsockopt$packet_int(r2, 0x107, 0x1f, &(0x7f00000001c0), &(0x7f0000000280)=0x4) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\'', 0x1ff) write$binfmt_script(r0, 0x0, 0x0) unshare(0x40000000) [ 1609.298832] IPVS: ftp: loaded support on port[0] = 21 10:18:06 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) r2 = syz_open_dev$dspn(0x0, 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz1\x00', 0x200002, 0x0) arch_prctl$ARCH_GET_CPUID(0x1011) ioctl$int_in(r0, 0x800000c0045005, 0x0) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) setsockopt$sock_timeval(r2, 0x1, 0x14, &(0x7f0000000140)={r3, r4/1000+10000}, 0x10) getpgrp(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'team0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r2, 0x8936, &(0x7f0000000200)={@mcast2, 0x62, r5}) setsockopt$RDS_CONG_MONITOR(0xffffffffffffffff, 0x114, 0x6, 0x0, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r2, 0xc0106403, &(0x7f0000000040)={0x8875, 0x0, 0x8000, 0x7}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) fcntl$dupfd(r1, 0x0, r0) getsockopt$packet_int(r2, 0x107, 0x1f, &(0x7f00000001c0), &(0x7f0000000280)=0x4) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\'', 0x1ff) write$binfmt_script(r0, 0x0, 0x0) unshare(0x40000000) 10:18:06 executing program 1: r0 = socket$inet6(0xa, 0x5, 0x0) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r0, 0x103) recvmmsg(r0, &(0x7f0000005c00)=[{{&(0x7f0000000340)=@sco, 0x80, 0x0}}], 0x1, 0x0, 0x0) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000000)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) write(r1, &(0x7f0000000100), 0x34000) [ 1609.567909] IPVS: ftp: loaded support on port[0] = 21 10:18:07 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) r2 = syz_open_dev$dspn(0x0, 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz1\x00', 0x200002, 0x0) arch_prctl$ARCH_GET_CPUID(0x1011) ioctl$int_in(r0, 0x800000c0045005, 0x0) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) setsockopt$sock_timeval(r2, 0x1, 0x14, &(0x7f0000000140)={r3, r4/1000+10000}, 0x10) getpgrp(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'team0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r2, 0x8936, &(0x7f0000000200)={@mcast2, 0x62, r5}) setsockopt$RDS_CONG_MONITOR(0xffffffffffffffff, 0x114, 0x6, 0x0, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r2, 0xc0106403, &(0x7f0000000040)={0x8875, 0x0, 0x8000, 0x7}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) fcntl$dupfd(r1, 0x0, r0) getsockopt$packet_int(r2, 0x107, 0x1f, &(0x7f00000001c0), &(0x7f0000000280)=0x4) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\'', 0x1ff) write$binfmt_script(r0, 0x0, 0x0) unshare(0x40000000) [ 1611.008773] IPVS: ftp: loaded support on port[0] = 21 10:18:08 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) r2 = syz_open_dev$dspn(0x0, 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz1\x00', 0x200002, 0x0) arch_prctl$ARCH_GET_CPUID(0x1011) ioctl$int_in(r0, 0x800000c0045005, 0x0) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) setsockopt$sock_timeval(r2, 0x1, 0x14, &(0x7f0000000140)={r3, r4/1000+10000}, 0x10) getpgrp(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'team0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r2, 0x8936, &(0x7f0000000200)={@mcast2, 0x62, r5}) setsockopt$RDS_CONG_MONITOR(0xffffffffffffffff, 0x114, 0x6, 0x0, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r2, 0xc0106403, &(0x7f0000000040)={0x8875, 0x0, 0x8000, 0x7}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) fcntl$dupfd(r1, 0x0, r0) getsockopt$packet_int(r2, 0x107, 0x1f, &(0x7f00000001c0), &(0x7f0000000280)=0x4) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\'', 0x1ff) write$binfmt_script(r0, 0x0, 0x0) unshare(0x40000000) [ 1611.428691] IPVS: ftp: loaded support on port[0] = 21 [ 1611.561991] IPVS: ftp: loaded support on port[0] = 21 [ 1612.437347] IPVS: ftp: loaded support on port[0] = 21 [ 1613.063342] IPVS: ftp: loaded support on port[0] = 21 10:18:10 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) r2 = syz_open_dev$dspn(0x0, 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz1\x00', 0x200002, 0x0) arch_prctl$ARCH_GET_CPUID(0x1011) ioctl$int_in(r0, 0x800000c0045005, 0x0) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) setsockopt$sock_timeval(r2, 0x1, 0x14, &(0x7f0000000140)={r3, r4/1000+10000}, 0x10) getpgrp(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'team0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r2, 0x8936, &(0x7f0000000200)={@mcast2, 0x62, r5}) setsockopt$RDS_CONG_MONITOR(0xffffffffffffffff, 0x114, 0x6, 0x0, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r2, 0xc0106403, &(0x7f0000000040)={0x8875, 0x0, 0x8000, 0x7}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) fcntl$dupfd(r1, 0x0, r0) getsockopt$packet_int(r2, 0x107, 0x1f, &(0x7f00000001c0), &(0x7f0000000280)=0x4) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\'', 0x1ff) write$binfmt_script(r0, 0x0, 0x0) unshare(0x40000000) 10:18:10 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) r2 = syz_open_dev$dspn(0x0, 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz1\x00', 0x200002, 0x0) arch_prctl$ARCH_GET_CPUID(0x1011) ioctl$int_in(r0, 0x800000c0045005, 0x0) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) setsockopt$sock_timeval(r2, 0x1, 0x14, &(0x7f0000000140)={r3, r4/1000+10000}, 0x10) getpgrp(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'team0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r2, 0x8936, &(0x7f0000000200)={@mcast2, 0x62, r5}) setsockopt$RDS_CONG_MONITOR(0xffffffffffffffff, 0x114, 0x6, 0x0, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r2, 0xc0106403, &(0x7f0000000040)={0x8875, 0x0, 0x8000, 0x7}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) fcntl$dupfd(r1, 0x0, r0) getsockopt$packet_int(r2, 0x107, 0x1f, &(0x7f00000001c0), &(0x7f0000000280)=0x4) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\'', 0x1ff) write$binfmt_script(r0, 0x0, 0x0) unshare(0x40000000) 10:18:10 executing program 1: r0 = socket$inet6(0xa, 0x5, 0x0) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r0, 0x103) recvmmsg(r0, &(0x7f0000005c00)=[{{&(0x7f0000000340)=@sco, 0x80, 0x0}}], 0x1, 0x0, 0x0) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000000)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) write(r1, &(0x7f0000000100), 0x34000) 10:18:10 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) r2 = syz_open_dev$dspn(0x0, 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz1\x00', 0x200002, 0x0) arch_prctl$ARCH_GET_CPUID(0x1011) ioctl$int_in(r0, 0x800000c0045005, 0x0) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) setsockopt$sock_timeval(r2, 0x1, 0x14, &(0x7f0000000140)={r3, r4/1000+10000}, 0x10) getpgrp(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'team0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r2, 0x8936, &(0x7f0000000200)={@mcast2, 0x62, r5}) setsockopt$RDS_CONG_MONITOR(0xffffffffffffffff, 0x114, 0x6, 0x0, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r2, 0xc0106403, &(0x7f0000000040)={0x8875, 0x0, 0x8000, 0x7}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) fcntl$dupfd(r1, 0x0, r0) getsockopt$packet_int(r2, 0x107, 0x1f, &(0x7f00000001c0), &(0x7f0000000280)=0x4) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\'', 0x1ff) write$binfmt_script(r0, 0x0, 0x0) unshare(0x40000000) [ 1613.609377] IPVS: ftp: loaded support on port[0] = 21 [ 1613.722551] IPVS: ftp: loaded support on port[0] = 21 [ 1614.899205] IPVS: ftp: loaded support on port[0] = 21 10:18:11 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) r2 = syz_open_dev$dspn(0x0, 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz1\x00', 0x200002, 0x0) arch_prctl$ARCH_GET_CPUID(0x1011) ioctl$int_in(r0, 0x800000c0045005, 0x0) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) setsockopt$sock_timeval(r2, 0x1, 0x14, &(0x7f0000000140)={r3, r4/1000+10000}, 0x10) getpgrp(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'team0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r2, 0x8936, &(0x7f0000000200)={@mcast2, 0x62, r5}) setsockopt$RDS_CONG_MONITOR(0xffffffffffffffff, 0x114, 0x6, 0x0, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r2, 0xc0106403, &(0x7f0000000040)={0x8875, 0x0, 0x8000, 0x7}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) fcntl$dupfd(r1, 0x0, r0) getsockopt$packet_int(r2, 0x107, 0x1f, &(0x7f00000001c0), &(0x7f0000000280)=0x4) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\'', 0x1ff) write$binfmt_script(r0, 0x0, 0x0) unshare(0x40000000) [ 1615.185347] IPVS: ftp: loaded support on port[0] = 21 10:18:12 executing program 1: r0 = socket$inet6(0xa, 0x5, 0x0) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r0, 0x103) recvmmsg(r0, &(0x7f0000005c00)=[{{&(0x7f0000000340)=@sco, 0x80, 0x0}}], 0x1, 0x0, 0x0) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000000)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) write(r1, &(0x7f0000000100), 0x34000) 10:18:12 executing program 3: r0 = socket$kcm(0x2, 0x2000000000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x84, 0x6e, 0x0, 0xad3639cc0044c9f0) 10:18:14 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) r2 = syz_open_dev$dspn(0x0, 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz1\x00', 0x200002, 0x0) arch_prctl$ARCH_GET_CPUID(0x1011) ioctl$int_in(r0, 0x800000c0045005, 0x0) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) setsockopt$sock_timeval(r2, 0x1, 0x14, &(0x7f0000000140)={r3, r4/1000+10000}, 0x10) getpgrp(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'team0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r2, 0x8936, &(0x7f0000000200)={@mcast2, 0x62, r5}) setsockopt$RDS_CONG_MONITOR(0xffffffffffffffff, 0x114, 0x6, 0x0, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r2, 0xc0106403, &(0x7f0000000040)={0x8875, 0x0, 0x8000, 0x7}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) fcntl$dupfd(r1, 0x0, r0) getsockopt$packet_int(r2, 0x107, 0x1f, &(0x7f00000001c0), &(0x7f0000000280)=0x4) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\'', 0x1ff) write$binfmt_script(r0, 0x0, 0x0) unshare(0x40000000) 10:18:14 executing program 3: r0 = socket$kcm(0x2, 0x2000000000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x84, 0x6e, 0x0, 0xad3639cc0044c9f0) 10:18:14 executing program 1: r0 = socket$inet6(0xa, 0x5, 0x0) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r0, 0x103) recvmmsg(r0, &(0x7f0000005c00)=[{{&(0x7f0000000340)=@sco, 0x80, 0x0}}], 0x1, 0x0, 0x0) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000000)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) write(r1, &(0x7f0000000100), 0x34000) [ 1617.601358] IPVS: ftp: loaded support on port[0] = 21 10:18:15 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) r2 = syz_open_dev$dspn(0x0, 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz1\x00', 0x200002, 0x0) arch_prctl$ARCH_GET_CPUID(0x1011) ioctl$int_in(r0, 0x800000c0045005, 0x0) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) setsockopt$sock_timeval(r2, 0x1, 0x14, &(0x7f0000000140)={r3, r4/1000+10000}, 0x10) getpgrp(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'team0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r2, 0x8936, &(0x7f0000000200)={@mcast2, 0x62, r5}) setsockopt$RDS_CONG_MONITOR(0xffffffffffffffff, 0x114, 0x6, 0x0, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r2, 0xc0106403, &(0x7f0000000040)={0x8875, 0x0, 0x8000, 0x7}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) fcntl$dupfd(r1, 0x0, r0) getsockopt$packet_int(r2, 0x107, 0x1f, &(0x7f00000001c0), &(0x7f0000000280)=0x4) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\'', 0x1ff) write$binfmt_script(r0, 0x0, 0x0) unshare(0x40000000) 10:18:15 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) r2 = syz_open_dev$dspn(0x0, 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz1\x00', 0x200002, 0x0) arch_prctl$ARCH_GET_CPUID(0x1011) ioctl$int_in(r0, 0x800000c0045005, 0x0) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) setsockopt$sock_timeval(r2, 0x1, 0x14, &(0x7f0000000140)={r3, r4/1000+10000}, 0x10) getpgrp(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'team0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r2, 0x8936, &(0x7f0000000200)={@mcast2, 0x62, r5}) setsockopt$RDS_CONG_MONITOR(0xffffffffffffffff, 0x114, 0x6, 0x0, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r2, 0xc0106403, &(0x7f0000000040)={0x8875, 0x0, 0x8000, 0x7}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) fcntl$dupfd(r1, 0x0, r0) getsockopt$packet_int(r2, 0x107, 0x1f, &(0x7f00000001c0), &(0x7f0000000280)=0x4) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\'', 0x1ff) write$binfmt_script(r0, 0x0, 0x0) unshare(0x40000000) 10:18:15 executing program 3: r0 = socket$kcm(0x2, 0x2000000000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x84, 0x6e, 0x0, 0xad3639cc0044c9f0) [ 1618.728561] IPVS: ftp: loaded support on port[0] = 21 [ 1618.947179] IPVS: ftp: loaded support on port[0] = 21 10:18:17 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) r2 = syz_open_dev$dspn(0x0, 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz1\x00', 0x200002, 0x0) arch_prctl$ARCH_GET_CPUID(0x1011) ioctl$int_in(r0, 0x800000c0045005, 0x0) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) setsockopt$sock_timeval(r2, 0x1, 0x14, &(0x7f0000000140)={r3, r4/1000+10000}, 0x10) getpgrp(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'team0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r2, 0x8936, &(0x7f0000000200)={@mcast2, 0x62, r5}) setsockopt$RDS_CONG_MONITOR(0xffffffffffffffff, 0x114, 0x6, 0x0, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r2, 0xc0106403, &(0x7f0000000040)={0x8875, 0x0, 0x8000, 0x7}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) fcntl$dupfd(r1, 0x0, r0) getsockopt$packet_int(r2, 0x107, 0x1f, &(0x7f00000001c0), &(0x7f0000000280)=0x4) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\'', 0x1ff) write$binfmt_script(r0, 0x0, 0x0) unshare(0x40000000) 10:18:17 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) r2 = syz_open_dev$dspn(0x0, 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz1\x00', 0x200002, 0x0) arch_prctl$ARCH_GET_CPUID(0x1011) ioctl$int_in(r0, 0x800000c0045005, 0x0) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) setsockopt$sock_timeval(r2, 0x1, 0x14, &(0x7f0000000140)={r3, r4/1000+10000}, 0x10) getpgrp(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'team0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r2, 0x8936, &(0x7f0000000200)={@mcast2, 0x62, r5}) setsockopt$RDS_CONG_MONITOR(0xffffffffffffffff, 0x114, 0x6, 0x0, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r2, 0xc0106403, &(0x7f0000000040)={0x8875, 0x0, 0x8000, 0x7}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) fcntl$dupfd(r1, 0x0, r0) getsockopt$packet_int(r2, 0x107, 0x1f, &(0x7f00000001c0), &(0x7f0000000280)=0x4) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\'', 0x1ff) write$binfmt_script(r0, 0x0, 0x0) unshare(0x40000000) 10:18:17 executing program 1: r0 = socket$inet6(0xa, 0x5, 0x0) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r0, 0x103) recvmmsg(r0, &(0x7f0000005c00)=[{{&(0x7f0000000340)=@sco, 0x80, 0x0}}], 0x1, 0x0, 0x0) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000000)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) write(r1, &(0x7f0000000100), 0x34000) 10:18:17 executing program 3: r0 = socket$kcm(0x2, 0x2000000000005, 0x0) setsockopt$sock_attach_bpf(r0, 0x84, 0x6e, 0x0, 0xad3639cc0044c9f0) 10:18:17 executing program 5: ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000900)=0x0) sched_setaffinity(r0, 0x8, &(0x7f00000000c0)=0x9) r1 = open(&(0x7f00000019c0)='./bus\x00', 0x0, 0x8) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setflags(r1, 0x2, 0x1) symlinkat(&(0x7f0000000140)='./bus\x00', 0xffffffffffffffff, 0x0) setrlimit(0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_setup(0x8, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) ioctl$SIOCX25GCAUSEDIAG(r1, 0x89e6, &(0x7f0000000180)={0x1, 0x5}) setxattr$trusted_overlay_origin(0x0, 0x0, 0x0, 0x0, 0x1) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000340)={{0x0, @rand_addr, 0x0, 0x3, 'wlc\x00'}, {@local, 0x4e20, 0x10002, 0x4, 0xa8e9}}, 0x44) lremovexattr(&(0x7f0000000780)='./file0/../file0\x00', &(0x7f00000007c0)=@known='trusted.overlay.opaque\x00') sendto$inet6(0xffffffffffffffff, &(0x7f00000004c0), 0x0, 0x1, 0x0, 0xfffffffffffffffd) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) remap_file_pages(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x1000007, 0x0, 0x102) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[], &(0x7f0000000200)='./file0/../file0\x00', &(0x7f0000000540)='sysfs\x00*\x86OK\xc0\v\xce\x1b\xdb cr\x13\xb1\xe8\x94\xd1 q_\x9d\xc1\x12[\x04,r&\xeb\x016\xd9bN\xa1\xd23t\xa6`\xfeZ\xc1sr/\xd3g\xad\"\xe8U0%\xa2\xe8\xbe\v\xc5QCy\xafr\x13\xd3+\x8d]\x06\xdc\x8f\xbf,\x84\x9e\xd9\xcd\xef\xc7K\x03\xdf\xa9\xcbZ\x90\xb2\x8bK$\xd7\x86,=f\xfc\xa51g\xd5BB5CZ=\xbbv\xbc}0x0, 0x0}) setsockopt$sock_timeval(r2, 0x1, 0x14, &(0x7f0000000140)={r3, r4/1000+10000}, 0x10) getpgrp(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'team0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r2, 0x8936, &(0x7f0000000200)={@mcast2, 0x62, r5}) setsockopt$RDS_CONG_MONITOR(0xffffffffffffffff, 0x114, 0x6, 0x0, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r2, 0xc0106403, &(0x7f0000000040)={0x8875, 0x0, 0x8000, 0x7}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) fcntl$dupfd(r1, 0x0, r0) getsockopt$packet_int(r2, 0x107, 0x1f, &(0x7f00000001c0), &(0x7f0000000280)=0x4) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\'', 0x1ff) write$binfmt_script(r0, 0x0, 0x0) unshare(0x40000000) [ 1620.609624] IPVS: ftp: loaded support on port[0] = 21 [ 1620.722613] IPVS: ftp: loaded support on port[0] = 21 10:18:18 executing program 3: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000002fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="5500000018007f1412fe01b2a4a280930a06000000a84306910000000b000f0035020000060000001900154004000001d40000dc1338d54400009b84136ef75afb83de44110016000d0004000000060cec4faba7d4", 0x55}], 0x1}, 0x0) [ 1621.685775] netlink: 'syz-executor.3': attribute type 15 has an invalid length. [ 1621.694168] netlink: 'syz-executor.3': attribute type 21 has an invalid length. 10:18:18 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) r2 = syz_open_dev$dspn(0x0, 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz1\x00', 0x200002, 0x0) arch_prctl$ARCH_GET_CPUID(0x1011) ioctl$int_in(r0, 0x800000c0045005, 0x0) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) setsockopt$sock_timeval(r2, 0x1, 0x14, &(0x7f0000000140)={r3, r4/1000+10000}, 0x10) getpgrp(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'team0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r2, 0x8936, &(0x7f0000000200)={@mcast2, 0x62, r5}) setsockopt$RDS_CONG_MONITOR(0xffffffffffffffff, 0x114, 0x6, 0x0, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r2, 0xc0106403, &(0x7f0000000040)={0x8875, 0x0, 0x8000, 0x7}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) fcntl$dupfd(r1, 0x0, r0) getsockopt$packet_int(r2, 0x107, 0x1f, &(0x7f00000001c0), &(0x7f0000000280)=0x4) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\'', 0x1ff) write$binfmt_script(r0, 0x0, 0x0) unshare(0x40000000) 10:18:18 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) close(r0) openat$cuse(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/cuse\x00', 0x121102, 0x0) io_setup(0x2005, &(0x7f0000000100)=0x0) io_submit(r1, 0x1, &(0x7f0000000600)=[&(0x7f0000000540)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r0, &(0x7f0000000000)="10000000040000000000000000000000", 0x10}]) [ 1621.757991] netlink: 'syz-executor.3': attribute type 4 has an invalid length. 10:18:18 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000340)={0x2, 0x4000004e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x2ec, 0x200007fd, &(0x7f0000000100)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='veno\x00', 0x5) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='vxcan1\x00\x00\x00\xf8\xff\xff\xff\x00', 0x1ec) sendto(r0, &(0x7f0000000080)='\x00', 0x1, 0x0, 0x0, 0x0) [ 1621.817324] audit: type=1400 audit(1551953898.596:415): avc: denied { setattr } for pid=6348 comm="syz-executor.5" name="/" dev="sysfs" ino=1 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:scsi_generic_device_t:s0 tclass=dir permissive=1 [ 1621.903806] IPVS: ftp: loaded support on port[0] = 21 [ 1621.975412] IPVS: ftp: loaded support on port[0] = 21 10:18:18 executing program 5: ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000900)=0x0) sched_setaffinity(r0, 0x8, &(0x7f00000000c0)=0x9) r1 = open(&(0x7f00000019c0)='./bus\x00', 0x0, 0x8) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setflags(r1, 0x2, 0x1) symlinkat(&(0x7f0000000140)='./bus\x00', 0xffffffffffffffff, 0x0) setrlimit(0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_setup(0x8, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) ioctl$SIOCX25GCAUSEDIAG(r1, 0x89e6, &(0x7f0000000180)={0x1, 0x5}) setxattr$trusted_overlay_origin(0x0, 0x0, 0x0, 0x0, 0x1) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000340)={{0x0, @rand_addr, 0x0, 0x3, 'wlc\x00'}, {@local, 0x4e20, 0x10002, 0x4, 0xa8e9}}, 0x44) lremovexattr(&(0x7f0000000780)='./file0/../file0\x00', &(0x7f00000007c0)=@known='trusted.overlay.opaque\x00') sendto$inet6(0xffffffffffffffff, &(0x7f00000004c0), 0x0, 0x1, 0x0, 0xfffffffffffffffd) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) remap_file_pages(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x1000007, 0x0, 0x102) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[], &(0x7f0000000200)='./file0/../file0\x00', &(0x7f0000000540)='sysfs\x00*\x86OK\xc0\v\xce\x1b\xdb cr\x13\xb1\xe8\x94\xd1 q_\x9d\xc1\x12[\x04,r&\xeb\x016\xd9bN\xa1\xd23t\xa6`\xfeZ\xc1sr/\xd3g\xad\"\xe8U0%\xa2\xe8\xbe\v\xc5QCy\xafr\x13\xd3+\x8d]\x06\xdc\x8f\xbf,\x84\x9e\xd9\xcd\xef\xc7K\x03\xdf\xa9\xcbZ\x90\xb2\x8bK$\xd7\x86,=f\xfc\xa51g\xd5BB5CZ=\xbbv\xbc}0x0) sched_setaffinity(r0, 0x8, &(0x7f00000000c0)=0x9) r1 = open(&(0x7f00000019c0)='./bus\x00', 0x0, 0x8) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setflags(r1, 0x2, 0x1) symlinkat(&(0x7f0000000140)='./bus\x00', 0xffffffffffffffff, 0x0) setrlimit(0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_setup(0x8, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) ioctl$SIOCX25GCAUSEDIAG(r1, 0x89e6, &(0x7f0000000180)={0x1, 0x5}) setxattr$trusted_overlay_origin(0x0, 0x0, 0x0, 0x0, 0x1) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000340)={{0x0, @rand_addr, 0x0, 0x3, 'wlc\x00'}, {@local, 0x4e20, 0x10002, 0x4, 0xa8e9}}, 0x44) lremovexattr(&(0x7f0000000780)='./file0/../file0\x00', &(0x7f00000007c0)=@known='trusted.overlay.opaque\x00') sendto$inet6(0xffffffffffffffff, &(0x7f00000004c0), 0x0, 0x1, 0x0, 0xfffffffffffffffd) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) remap_file_pages(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x1000007, 0x0, 0x102) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[], &(0x7f0000000200)='./file0/../file0\x00', &(0x7f0000000540)='sysfs\x00*\x86OK\xc0\v\xce\x1b\xdb cr\x13\xb1\xe8\x94\xd1 q_\x9d\xc1\x12[\x04,r&\xeb\x016\xd9bN\xa1\xd23t\xa6`\xfeZ\xc1sr/\xd3g\xad\"\xe8U0%\xa2\xe8\xbe\v\xc5QCy\xafr\x13\xd3+\x8d]\x06\xdc\x8f\xbf,\x84\x9e\xd9\xcd\xef\xc7K\x03\xdf\xa9\xcbZ\x90\xb2\x8bK$\xd7\x86,=f\xfc\xa51g\xd5BB5CZ=\xbbv\xbc}0x0) sched_setaffinity(r0, 0x8, &(0x7f00000000c0)=0x9) r1 = open(&(0x7f00000019c0)='./bus\x00', 0x0, 0x8) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setflags(r1, 0x2, 0x1) symlinkat(&(0x7f0000000140)='./bus\x00', 0xffffffffffffffff, 0x0) setrlimit(0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_setup(0x8, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) ioctl$SIOCX25GCAUSEDIAG(r1, 0x89e6, &(0x7f0000000180)={0x1, 0x5}) setxattr$trusted_overlay_origin(0x0, 0x0, 0x0, 0x0, 0x1) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000340)={{0x0, @rand_addr, 0x0, 0x3, 'wlc\x00'}, {@local, 0x4e20, 0x10002, 0x4, 0xa8e9}}, 0x44) lremovexattr(&(0x7f0000000780)='./file0/../file0\x00', &(0x7f00000007c0)=@known='trusted.overlay.opaque\x00') sendto$inet6(0xffffffffffffffff, &(0x7f00000004c0), 0x0, 0x1, 0x0, 0xfffffffffffffffd) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) remap_file_pages(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x1000007, 0x0, 0x102) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[], &(0x7f0000000200)='./file0/../file0\x00', &(0x7f0000000540)='sysfs\x00*\x86OK\xc0\v\xce\x1b\xdb cr\x13\xb1\xe8\x94\xd1 q_\x9d\xc1\x12[\x04,r&\xeb\x016\xd9bN\xa1\xd23t\xa6`\xfeZ\xc1sr/\xd3g\xad\"\xe8U0%\xa2\xe8\xbe\v\xc5QCy\xafr\x13\xd3+\x8d]\x06\xdc\x8f\xbf,\x84\x9e\xd9\xcd\xef\xc7K\x03\xdf\xa9\xcbZ\x90\xb2\x8bK$\xd7\x86,=f\xfc\xa51g\xd5BB5CZ=\xbbv\xbc}0x0) sched_setaffinity(r0, 0x8, &(0x7f00000000c0)=0x9) r1 = open(&(0x7f00000019c0)='./bus\x00', 0x0, 0x8) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setflags(r1, 0x2, 0x1) symlinkat(&(0x7f0000000140)='./bus\x00', 0xffffffffffffffff, 0x0) setrlimit(0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_setup(0x8, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) ioctl$SIOCX25GCAUSEDIAG(r1, 0x89e6, &(0x7f0000000180)={0x1, 0x5}) setxattr$trusted_overlay_origin(0x0, 0x0, 0x0, 0x0, 0x1) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000340)={{0x0, @rand_addr, 0x0, 0x3, 'wlc\x00'}, {@local, 0x4e20, 0x10002, 0x4, 0xa8e9}}, 0x44) lremovexattr(&(0x7f0000000780)='./file0/../file0\x00', &(0x7f00000007c0)=@known='trusted.overlay.opaque\x00') sendto$inet6(0xffffffffffffffff, &(0x7f00000004c0), 0x0, 0x1, 0x0, 0xfffffffffffffffd) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) remap_file_pages(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x1000007, 0x0, 0x102) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[], &(0x7f0000000200)='./file0/../file0\x00', &(0x7f0000000540)='sysfs\x00*\x86OK\xc0\v\xce\x1b\xdb cr\x13\xb1\xe8\x94\xd1 q_\x9d\xc1\x12[\x04,r&\xeb\x016\xd9bN\xa1\xd23t\xa6`\xfeZ\xc1sr/\xd3g\xad\"\xe8U0%\xa2\xe8\xbe\v\xc5QCy\xafr\x13\xd3+\x8d]\x06\xdc\x8f\xbf,\x84\x9e\xd9\xcd\xef\xc7K\x03\xdf\xa9\xcbZ\x90\xb2\x8bK$\xd7\x86,=f\xfc\xa51g\xd5BB5CZ=\xbbv\xbc}0x0) sched_setaffinity(r0, 0x8, &(0x7f00000000c0)=0x9) r1 = open(&(0x7f00000019c0)='./bus\x00', 0x0, 0x8) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setflags(r1, 0x2, 0x1) symlinkat(&(0x7f0000000140)='./bus\x00', 0xffffffffffffffff, 0x0) setrlimit(0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_setup(0x8, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) ioctl$SIOCX25GCAUSEDIAG(r1, 0x89e6, &(0x7f0000000180)={0x1, 0x5}) setxattr$trusted_overlay_origin(0x0, 0x0, 0x0, 0x0, 0x1) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000340)={{0x0, @rand_addr, 0x0, 0x3, 'wlc\x00'}, {@local, 0x4e20, 0x10002, 0x4, 0xa8e9}}, 0x44) lremovexattr(&(0x7f0000000780)='./file0/../file0\x00', &(0x7f00000007c0)=@known='trusted.overlay.opaque\x00') sendto$inet6(0xffffffffffffffff, &(0x7f00000004c0), 0x0, 0x1, 0x0, 0xfffffffffffffffd) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) remap_file_pages(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x1000007, 0x0, 0x102) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[], &(0x7f0000000200)='./file0/../file0\x00', &(0x7f0000000540)='sysfs\x00*\x86OK\xc0\v\xce\x1b\xdb cr\x13\xb1\xe8\x94\xd1 q_\x9d\xc1\x12[\x04,r&\xeb\x016\xd9bN\xa1\xd23t\xa6`\xfeZ\xc1sr/\xd3g\xad\"\xe8U0%\xa2\xe8\xbe\v\xc5QCy\xafr\x13\xd3+\x8d]\x06\xdc\x8f\xbf,\x84\x9e\xd9\xcd\xef\xc7K\x03\xdf\xa9\xcbZ\x90\xb2\x8bK$\xd7\x86,=f\xfc\xa51g\xd5BB5CZ=\xbbv\xbc}0x0) sched_setaffinity(r0, 0x8, &(0x7f00000000c0)=0x9) r1 = open(&(0x7f00000019c0)='./bus\x00', 0x0, 0x8) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setflags(r1, 0x2, 0x1) symlinkat(&(0x7f0000000140)='./bus\x00', 0xffffffffffffffff, 0x0) setrlimit(0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_setup(0x8, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) ioctl$SIOCX25GCAUSEDIAG(r1, 0x89e6, &(0x7f0000000180)={0x1, 0x5}) setxattr$trusted_overlay_origin(0x0, 0x0, 0x0, 0x0, 0x1) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000340)={{0x0, @rand_addr, 0x0, 0x3, 'wlc\x00'}, {@local, 0x4e20, 0x10002, 0x4, 0xa8e9}}, 0x44) lremovexattr(&(0x7f0000000780)='./file0/../file0\x00', &(0x7f00000007c0)=@known='trusted.overlay.opaque\x00') sendto$inet6(0xffffffffffffffff, &(0x7f00000004c0), 0x0, 0x1, 0x0, 0xfffffffffffffffd) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) remap_file_pages(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x1000007, 0x0, 0x102) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[], &(0x7f0000000200)='./file0/../file0\x00', &(0x7f0000000540)='sysfs\x00*\x86OK\xc0\v\xce\x1b\xdb cr\x13\xb1\xe8\x94\xd1 q_\x9d\xc1\x12[\x04,r&\xeb\x016\xd9bN\xa1\xd23t\xa6`\xfeZ\xc1sr/\xd3g\xad\"\xe8U0%\xa2\xe8\xbe\v\xc5QCy\xafr\x13\xd3+\x8d]\x06\xdc\x8f\xbf,\x84\x9e\xd9\xcd\xef\xc7K\x03\xdf\xa9\xcbZ\x90\xb2\x8bK$\xd7\x86,=f\xfc\xa51g\xd5BB5CZ=\xbbv\xbc}0x0) sched_setaffinity(r0, 0x8, &(0x7f00000000c0)=0x9) r1 = open(&(0x7f00000019c0)='./bus\x00', 0x0, 0x8) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setflags(r1, 0x2, 0x1) symlinkat(&(0x7f0000000140)='./bus\x00', 0xffffffffffffffff, 0x0) setrlimit(0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_setup(0x8, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) ioctl$SIOCX25GCAUSEDIAG(r1, 0x89e6, &(0x7f0000000180)={0x1, 0x5}) setxattr$trusted_overlay_origin(0x0, 0x0, 0x0, 0x0, 0x1) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000340)={{0x0, @rand_addr, 0x0, 0x3, 'wlc\x00'}, {@local, 0x4e20, 0x10002, 0x4, 0xa8e9}}, 0x44) lremovexattr(&(0x7f0000000780)='./file0/../file0\x00', &(0x7f00000007c0)=@known='trusted.overlay.opaque\x00') sendto$inet6(0xffffffffffffffff, &(0x7f00000004c0), 0x0, 0x1, 0x0, 0xfffffffffffffffd) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) remap_file_pages(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x1000007, 0x0, 0x102) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[], &(0x7f0000000200)='./file0/../file0\x00', &(0x7f0000000540)='sysfs\x00*\x86OK\xc0\v\xce\x1b\xdb cr\x13\xb1\xe8\x94\xd1 q_\x9d\xc1\x12[\x04,r&\xeb\x016\xd9bN\xa1\xd23t\xa6`\xfeZ\xc1sr/\xd3g\xad\"\xe8U0%\xa2\xe8\xbe\v\xc5QCy\xafr\x13\xd3+\x8d]\x06\xdc\x8f\xbf,\x84\x9e\xd9\xcd\xef\xc7K\x03\xdf\xa9\xcbZ\x90\xb2\x8bK$\xd7\x86,=f\xfc\xa51g\xd5BB5CZ=\xbbv\xbc}0x0) sched_setaffinity(r0, 0x8, &(0x7f00000000c0)=0x9) r1 = open(&(0x7f00000019c0)='./bus\x00', 0x0, 0x8) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setflags(r1, 0x2, 0x1) symlinkat(&(0x7f0000000140)='./bus\x00', 0xffffffffffffffff, 0x0) setrlimit(0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_setup(0x8, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) ioctl$SIOCX25GCAUSEDIAG(r1, 0x89e6, &(0x7f0000000180)={0x1, 0x5}) setxattr$trusted_overlay_origin(0x0, 0x0, 0x0, 0x0, 0x1) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000340)={{0x0, @rand_addr, 0x0, 0x3, 'wlc\x00'}, {@local, 0x4e20, 0x10002, 0x4, 0xa8e9}}, 0x44) lremovexattr(&(0x7f0000000780)='./file0/../file0\x00', &(0x7f00000007c0)=@known='trusted.overlay.opaque\x00') sendto$inet6(0xffffffffffffffff, &(0x7f00000004c0), 0x0, 0x1, 0x0, 0xfffffffffffffffd) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) remap_file_pages(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x1000007, 0x0, 0x102) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[], &(0x7f0000000200)='./file0/../file0\x00', &(0x7f0000000540)='sysfs\x00*\x86OK\xc0\v\xce\x1b\xdb cr\x13\xb1\xe8\x94\xd1 q_\x9d\xc1\x12[\x04,r&\xeb\x016\xd9bN\xa1\xd23t\xa6`\xfeZ\xc1sr/\xd3g\xad\"\xe8U0%\xa2\xe8\xbe\v\xc5QCy\xafr\x13\xd3+\x8d]\x06\xdc\x8f\xbf,\x84\x9e\xd9\xcd\xef\xc7K\x03\xdf\xa9\xcbZ\x90\xb2\x8bK$\xd7\x86,=f\xfc\xa51g\xd5BB5CZ=\xbbv\xbc}0x0) sched_setaffinity(r0, 0x8, &(0x7f00000000c0)=0x9) r1 = open(&(0x7f00000019c0)='./bus\x00', 0x0, 0x8) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setflags(r1, 0x2, 0x1) symlinkat(&(0x7f0000000140)='./bus\x00', 0xffffffffffffffff, 0x0) setrlimit(0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_setup(0x8, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) ioctl$SIOCX25GCAUSEDIAG(r1, 0x89e6, &(0x7f0000000180)={0x1, 0x5}) setxattr$trusted_overlay_origin(0x0, 0x0, 0x0, 0x0, 0x1) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000340)={{0x0, @rand_addr, 0x0, 0x3, 'wlc\x00'}, {@local, 0x4e20, 0x10002, 0x4, 0xa8e9}}, 0x44) lremovexattr(&(0x7f0000000780)='./file0/../file0\x00', &(0x7f00000007c0)=@known='trusted.overlay.opaque\x00') sendto$inet6(0xffffffffffffffff, &(0x7f00000004c0), 0x0, 0x1, 0x0, 0xfffffffffffffffd) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) remap_file_pages(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x1000007, 0x0, 0x102) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[], &(0x7f0000000200)='./file0/../file0\x00', &(0x7f0000000540)='sysfs\x00*\x86OK\xc0\v\xce\x1b\xdb cr\x13\xb1\xe8\x94\xd1 q_\x9d\xc1\x12[\x04,r&\xeb\x016\xd9bN\xa1\xd23t\xa6`\xfeZ\xc1sr/\xd3g\xad\"\xe8U0%\xa2\xe8\xbe\v\xc5QCy\xafr\x13\xd3+\x8d]\x06\xdc\x8f\xbf,\x84\x9e\xd9\xcd\xef\xc7K\x03\xdf\xa9\xcbZ\x90\xb2\x8bK$\xd7\x86,=f\xfc\xa51g\xd5BB5CZ=\xbbv\xbc}0x0) sched_setaffinity(r0, 0x8, &(0x7f00000000c0)=0x9) r1 = open(&(0x7f00000019c0)='./bus\x00', 0x0, 0x8) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setflags(r1, 0x2, 0x1) symlinkat(&(0x7f0000000140)='./bus\x00', 0xffffffffffffffff, 0x0) setrlimit(0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_setup(0x8, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) ioctl$SIOCX25GCAUSEDIAG(r1, 0x89e6, &(0x7f0000000180)={0x1, 0x5}) setxattr$trusted_overlay_origin(0x0, 0x0, 0x0, 0x0, 0x1) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000340)={{0x0, @rand_addr, 0x0, 0x3, 'wlc\x00'}, {@local, 0x4e20, 0x10002, 0x4, 0xa8e9}}, 0x44) lremovexattr(&(0x7f0000000780)='./file0/../file0\x00', &(0x7f00000007c0)=@known='trusted.overlay.opaque\x00') sendto$inet6(0xffffffffffffffff, &(0x7f00000004c0), 0x0, 0x1, 0x0, 0xfffffffffffffffd) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) remap_file_pages(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x1000007, 0x0, 0x102) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[], &(0x7f0000000200)='./file0/../file0\x00', &(0x7f0000000540)='sysfs\x00*\x86OK\xc0\v\xce\x1b\xdb cr\x13\xb1\xe8\x94\xd1 q_\x9d\xc1\x12[\x04,r&\xeb\x016\xd9bN\xa1\xd23t\xa6`\xfeZ\xc1sr/\xd3g\xad\"\xe8U0%\xa2\xe8\xbe\v\xc5QCy\xafr\x13\xd3+\x8d]\x06\xdc\x8f\xbf,\x84\x9e\xd9\xcd\xef\xc7K\x03\xdf\xa9\xcbZ\x90\xb2\x8bK$\xd7\x86,=f\xfc\xa51g\xd5BB5CZ=\xbbv\xbc}0x0) sched_setaffinity(r0, 0x8, &(0x7f00000000c0)=0x9) r1 = open(&(0x7f00000019c0)='./bus\x00', 0x0, 0x8) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setflags(r1, 0x2, 0x1) symlinkat(&(0x7f0000000140)='./bus\x00', 0xffffffffffffffff, 0x0) setrlimit(0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_setup(0x8, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) ioctl$SIOCX25GCAUSEDIAG(r1, 0x89e6, &(0x7f0000000180)={0x1, 0x5}) setxattr$trusted_overlay_origin(0x0, 0x0, 0x0, 0x0, 0x1) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000340)={{0x0, @rand_addr, 0x0, 0x3, 'wlc\x00'}, {@local, 0x4e20, 0x10002, 0x4, 0xa8e9}}, 0x44) lremovexattr(&(0x7f0000000780)='./file0/../file0\x00', &(0x7f00000007c0)=@known='trusted.overlay.opaque\x00') sendto$inet6(0xffffffffffffffff, &(0x7f00000004c0), 0x0, 0x1, 0x0, 0xfffffffffffffffd) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) remap_file_pages(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x1000007, 0x0, 0x102) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[], &(0x7f0000000200)='./file0/../file0\x00', &(0x7f0000000540)='sysfs\x00*\x86OK\xc0\v\xce\x1b\xdb cr\x13\xb1\xe8\x94\xd1 q_\x9d\xc1\x12[\x04,r&\xeb\x016\xd9bN\xa1\xd23t\xa6`\xfeZ\xc1sr/\xd3g\xad\"\xe8U0%\xa2\xe8\xbe\v\xc5QCy\xafr\x13\xd3+\x8d]\x06\xdc\x8f\xbf,\x84\x9e\xd9\xcd\xef\xc7K\x03\xdf\xa9\xcbZ\x90\xb2\x8bK$\xd7\x86,=f\xfc\xa51g\xd5BB5CZ=\xbbv\xbc}0x0) sched_setaffinity(r0, 0x8, &(0x7f00000000c0)=0x9) r1 = open(&(0x7f00000019c0)='./bus\x00', 0x0, 0x8) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setflags(r1, 0x2, 0x1) symlinkat(&(0x7f0000000140)='./bus\x00', 0xffffffffffffffff, 0x0) setrlimit(0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_setup(0x8, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) ioctl$SIOCX25GCAUSEDIAG(r1, 0x89e6, &(0x7f0000000180)={0x1, 0x5}) setxattr$trusted_overlay_origin(0x0, 0x0, 0x0, 0x0, 0x1) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000340)={{0x0, @rand_addr, 0x0, 0x3, 'wlc\x00'}, {@local, 0x4e20, 0x10002, 0x4, 0xa8e9}}, 0x44) lremovexattr(&(0x7f0000000780)='./file0/../file0\x00', &(0x7f00000007c0)=@known='trusted.overlay.opaque\x00') sendto$inet6(0xffffffffffffffff, &(0x7f00000004c0), 0x0, 0x1, 0x0, 0xfffffffffffffffd) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) remap_file_pages(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x1000007, 0x0, 0x102) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[], &(0x7f0000000200)='./file0/../file0\x00', &(0x7f0000000540)='sysfs\x00*\x86OK\xc0\v\xce\x1b\xdb cr\x13\xb1\xe8\x94\xd1 q_\x9d\xc1\x12[\x04,r&\xeb\x016\xd9bN\xa1\xd23t\xa6`\xfeZ\xc1sr/\xd3g\xad\"\xe8U0%\xa2\xe8\xbe\v\xc5QCy\xafr\x13\xd3+\x8d]\x06\xdc\x8f\xbf,\x84\x9e\xd9\xcd\xef\xc7K\x03\xdf\xa9\xcbZ\x90\xb2\x8bK$\xd7\x86,=f\xfc\xa51g\xd5BB5CZ=\xbbv\xbc}0x0) sched_setaffinity(r0, 0x8, &(0x7f00000000c0)=0x9) r1 = open(&(0x7f00000019c0)='./bus\x00', 0x0, 0x8) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setflags(r1, 0x2, 0x1) symlinkat(&(0x7f0000000140)='./bus\x00', 0xffffffffffffffff, 0x0) setrlimit(0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_setup(0x8, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) ioctl$SIOCX25GCAUSEDIAG(r1, 0x89e6, &(0x7f0000000180)={0x1, 0x5}) setxattr$trusted_overlay_origin(0x0, 0x0, 0x0, 0x0, 0x1) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000340)={{0x0, @rand_addr, 0x0, 0x3, 'wlc\x00'}, {@local, 0x4e20, 0x10002, 0x4, 0xa8e9}}, 0x44) lremovexattr(&(0x7f0000000780)='./file0/../file0\x00', &(0x7f00000007c0)=@known='trusted.overlay.opaque\x00') sendto$inet6(0xffffffffffffffff, &(0x7f00000004c0), 0x0, 0x1, 0x0, 0xfffffffffffffffd) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) remap_file_pages(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x1000007, 0x0, 0x102) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[], &(0x7f0000000200)='./file0/../file0\x00', &(0x7f0000000540)='sysfs\x00*\x86OK\xc0\v\xce\x1b\xdb cr\x13\xb1\xe8\x94\xd1 q_\x9d\xc1\x12[\x04,r&\xeb\x016\xd9bN\xa1\xd23t\xa6`\xfeZ\xc1sr/\xd3g\xad\"\xe8U0%\xa2\xe8\xbe\v\xc5QCy\xafr\x13\xd3+\x8d]\x06\xdc\x8f\xbf,\x84\x9e\xd9\xcd\xef\xc7K\x03\xdf\xa9\xcbZ\x90\xb2\x8bK$\xd7\x86,=f\xfc\xa51g\xd5BB5CZ=\xbbv\xbc}0x0) sched_setaffinity(r0, 0x8, &(0x7f00000000c0)=0x9) r1 = open(&(0x7f00000019c0)='./bus\x00', 0x0, 0x8) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setflags(r1, 0x2, 0x1) symlinkat(&(0x7f0000000140)='./bus\x00', 0xffffffffffffffff, 0x0) setrlimit(0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_setup(0x8, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) ioctl$SIOCX25GCAUSEDIAG(r1, 0x89e6, &(0x7f0000000180)={0x1, 0x5}) setxattr$trusted_overlay_origin(0x0, 0x0, 0x0, 0x0, 0x1) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000340)={{0x0, @rand_addr, 0x0, 0x3, 'wlc\x00'}, {@local, 0x4e20, 0x10002, 0x4, 0xa8e9}}, 0x44) lremovexattr(&(0x7f0000000780)='./file0/../file0\x00', &(0x7f00000007c0)=@known='trusted.overlay.opaque\x00') sendto$inet6(0xffffffffffffffff, &(0x7f00000004c0), 0x0, 0x1, 0x0, 0xfffffffffffffffd) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) remap_file_pages(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x1000007, 0x0, 0x102) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[], &(0x7f0000000200)='./file0/../file0\x00', &(0x7f0000000540)='sysfs\x00*\x86OK\xc0\v\xce\x1b\xdb cr\x13\xb1\xe8\x94\xd1 q_\x9d\xc1\x12[\x04,r&\xeb\x016\xd9bN\xa1\xd23t\xa6`\xfeZ\xc1sr/\xd3g\xad\"\xe8U0%\xa2\xe8\xbe\v\xc5QCy\xafr\x13\xd3+\x8d]\x06\xdc\x8f\xbf,\x84\x9e\xd9\xcd\xef\xc7K\x03\xdf\xa9\xcbZ\x90\xb2\x8bK$\xd7\x86,=f\xfc\xa51g\xd5BB5CZ=\xbbv\xbc}0x0) sched_setaffinity(r0, 0x8, &(0x7f00000000c0)=0x9) r1 = open(&(0x7f00000019c0)='./bus\x00', 0x0, 0x8) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setflags(r1, 0x2, 0x1) symlinkat(&(0x7f0000000140)='./bus\x00', 0xffffffffffffffff, 0x0) setrlimit(0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_setup(0x8, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) ioctl$SIOCX25GCAUSEDIAG(r1, 0x89e6, &(0x7f0000000180)={0x1, 0x5}) setxattr$trusted_overlay_origin(0x0, 0x0, 0x0, 0x0, 0x1) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000340)={{0x0, @rand_addr, 0x0, 0x3, 'wlc\x00'}, {@local, 0x4e20, 0x10002, 0x4, 0xa8e9}}, 0x44) lremovexattr(&(0x7f0000000780)='./file0/../file0\x00', &(0x7f00000007c0)=@known='trusted.overlay.opaque\x00') sendto$inet6(0xffffffffffffffff, &(0x7f00000004c0), 0x0, 0x1, 0x0, 0xfffffffffffffffd) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) remap_file_pages(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x1000007, 0x0, 0x102) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[], &(0x7f0000000200)='./file0/../file0\x00', &(0x7f0000000540)='sysfs\x00*\x86OK\xc0\v\xce\x1b\xdb cr\x13\xb1\xe8\x94\xd1 q_\x9d\xc1\x12[\x04,r&\xeb\x016\xd9bN\xa1\xd23t\xa6`\xfeZ\xc1sr/\xd3g\xad\"\xe8U0%\xa2\xe8\xbe\v\xc5QCy\xafr\x13\xd3+\x8d]\x06\xdc\x8f\xbf,\x84\x9e\xd9\xcd\xef\xc7K\x03\xdf\xa9\xcbZ\x90\xb2\x8bK$\xd7\x86,=f\xfc\xa51g\xd5BB5CZ=\xbbv\xbc}0x0) sched_setaffinity(r0, 0x8, &(0x7f00000000c0)=0x9) r1 = open(&(0x7f00000019c0)='./bus\x00', 0x0, 0x8) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setflags(r1, 0x2, 0x1) symlinkat(&(0x7f0000000140)='./bus\x00', 0xffffffffffffffff, 0x0) setrlimit(0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_setup(0x8, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) ioctl$SIOCX25GCAUSEDIAG(r1, 0x89e6, &(0x7f0000000180)={0x1, 0x5}) setxattr$trusted_overlay_origin(0x0, 0x0, 0x0, 0x0, 0x1) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000340)={{0x0, @rand_addr, 0x0, 0x3, 'wlc\x00'}, {@local, 0x4e20, 0x10002, 0x4, 0xa8e9}}, 0x44) lremovexattr(&(0x7f0000000780)='./file0/../file0\x00', &(0x7f00000007c0)=@known='trusted.overlay.opaque\x00') sendto$inet6(0xffffffffffffffff, &(0x7f00000004c0), 0x0, 0x1, 0x0, 0xfffffffffffffffd) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) remap_file_pages(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x1000007, 0x0, 0x102) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[], &(0x7f0000000200)='./file0/../file0\x00', &(0x7f0000000540)='sysfs\x00*\x86OK\xc0\v\xce\x1b\xdb cr\x13\xb1\xe8\x94\xd1 q_\x9d\xc1\x12[\x04,r&\xeb\x016\xd9bN\xa1\xd23t\xa6`\xfeZ\xc1sr/\xd3g\xad\"\xe8U0%\xa2\xe8\xbe\v\xc5QCy\xafr\x13\xd3+\x8d]\x06\xdc\x8f\xbf,\x84\x9e\xd9\xcd\xef\xc7K\x03\xdf\xa9\xcbZ\x90\xb2\x8bK$\xd7\x86,=f\xfc\xa51g\xd5BB5CZ=\xbbv\xbc}0x0) sched_setaffinity(r0, 0x8, &(0x7f00000000c0)=0x9) r1 = open(&(0x7f00000019c0)='./bus\x00', 0x0, 0x8) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setflags(r1, 0x2, 0x1) symlinkat(&(0x7f0000000140)='./bus\x00', 0xffffffffffffffff, 0x0) setrlimit(0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_setup(0x8, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) ioctl$SIOCX25GCAUSEDIAG(r1, 0x89e6, &(0x7f0000000180)={0x1, 0x5}) setxattr$trusted_overlay_origin(0x0, 0x0, 0x0, 0x0, 0x1) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000340)={{0x0, @rand_addr, 0x0, 0x3, 'wlc\x00'}, {@local, 0x4e20, 0x10002, 0x4, 0xa8e9}}, 0x44) lremovexattr(&(0x7f0000000780)='./file0/../file0\x00', &(0x7f00000007c0)=@known='trusted.overlay.opaque\x00') sendto$inet6(0xffffffffffffffff, &(0x7f00000004c0), 0x0, 0x1, 0x0, 0xfffffffffffffffd) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) remap_file_pages(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x1000007, 0x0, 0x102) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[], &(0x7f0000000200)='./file0/../file0\x00', &(0x7f0000000540)='sysfs\x00*\x86OK\xc0\v\xce\x1b\xdb cr\x13\xb1\xe8\x94\xd1 q_\x9d\xc1\x12[\x04,r&\xeb\x016\xd9bN\xa1\xd23t\xa6`\xfeZ\xc1sr/\xd3g\xad\"\xe8U0%\xa2\xe8\xbe\v\xc5QCy\xafr\x13\xd3+\x8d]\x06\xdc\x8f\xbf,\x84\x9e\xd9\xcd\xef\xc7K\x03\xdf\xa9\xcbZ\x90\xb2\x8bK$\xd7\x86,=f\xfc\xa51g\xd5BB5CZ=\xbbv\xbc}0x0) sched_setaffinity(r0, 0x8, &(0x7f00000000c0)=0x9) r1 = open(&(0x7f00000019c0)='./bus\x00', 0x0, 0x8) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setflags(r1, 0x2, 0x1) symlinkat(&(0x7f0000000140)='./bus\x00', 0xffffffffffffffff, 0x0) setrlimit(0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_setup(0x8, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) ioctl$SIOCX25GCAUSEDIAG(r1, 0x89e6, &(0x7f0000000180)={0x1, 0x5}) setxattr$trusted_overlay_origin(0x0, 0x0, 0x0, 0x0, 0x1) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000340)={{0x0, @rand_addr, 0x0, 0x3, 'wlc\x00'}, {@local, 0x4e20, 0x10002, 0x4, 0xa8e9}}, 0x44) lremovexattr(&(0x7f0000000780)='./file0/../file0\x00', &(0x7f00000007c0)=@known='trusted.overlay.opaque\x00') sendto$inet6(0xffffffffffffffff, &(0x7f00000004c0), 0x0, 0x1, 0x0, 0xfffffffffffffffd) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) remap_file_pages(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x1000007, 0x0, 0x102) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[], &(0x7f0000000200)='./file0/../file0\x00', &(0x7f0000000540)='sysfs\x00*\x86OK\xc0\v\xce\x1b\xdb cr\x13\xb1\xe8\x94\xd1 q_\x9d\xc1\x12[\x04,r&\xeb\x016\xd9bN\xa1\xd23t\xa6`\xfeZ\xc1sr/\xd3g\xad\"\xe8U0%\xa2\xe8\xbe\v\xc5QCy\xafr\x13\xd3+\x8d]\x06\xdc\x8f\xbf,\x84\x9e\xd9\xcd\xef\xc7K\x03\xdf\xa9\xcbZ\x90\xb2\x8bK$\xd7\x86,=f\xfc\xa51g\xd5BB5CZ=\xbbv\xbc}0x0) sched_setaffinity(r0, 0x8, &(0x7f00000000c0)=0x9) r1 = open(&(0x7f00000019c0)='./bus\x00', 0x0, 0x8) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setflags(r1, 0x2, 0x1) symlinkat(&(0x7f0000000140)='./bus\x00', 0xffffffffffffffff, 0x0) setrlimit(0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_setup(0x8, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) ioctl$SIOCX25GCAUSEDIAG(r1, 0x89e6, &(0x7f0000000180)={0x1, 0x5}) setxattr$trusted_overlay_origin(0x0, 0x0, 0x0, 0x0, 0x1) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000340)={{0x0, @rand_addr, 0x0, 0x3, 'wlc\x00'}, {@local, 0x4e20, 0x10002, 0x4, 0xa8e9}}, 0x44) lremovexattr(&(0x7f0000000780)='./file0/../file0\x00', &(0x7f00000007c0)=@known='trusted.overlay.opaque\x00') sendto$inet6(0xffffffffffffffff, &(0x7f00000004c0), 0x0, 0x1, 0x0, 0xfffffffffffffffd) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) remap_file_pages(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x1000007, 0x0, 0x102) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[], &(0x7f0000000200)='./file0/../file0\x00', &(0x7f0000000540)='sysfs\x00*\x86OK\xc0\v\xce\x1b\xdb cr\x13\xb1\xe8\x94\xd1 q_\x9d\xc1\x12[\x04,r&\xeb\x016\xd9bN\xa1\xd23t\xa6`\xfeZ\xc1sr/\xd3g\xad\"\xe8U0%\xa2\xe8\xbe\v\xc5QCy\xafr\x13\xd3+\x8d]\x06\xdc\x8f\xbf,\x84\x9e\xd9\xcd\xef\xc7K\x03\xdf\xa9\xcbZ\x90\xb2\x8bK$\xd7\x86,=f\xfc\xa51g\xd5BB5CZ=\xbbv\xbc}0x0) sched_setaffinity(r0, 0x8, &(0x7f00000000c0)=0x9) r1 = open(&(0x7f00000019c0)='./bus\x00', 0x0, 0x8) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setflags(r1, 0x2, 0x1) symlinkat(&(0x7f0000000140)='./bus\x00', 0xffffffffffffffff, 0x0) setrlimit(0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_setup(0x8, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) ioctl$SIOCX25GCAUSEDIAG(r1, 0x89e6, &(0x7f0000000180)={0x1, 0x5}) setxattr$trusted_overlay_origin(0x0, 0x0, 0x0, 0x0, 0x1) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000340)={{0x0, @rand_addr, 0x0, 0x3, 'wlc\x00'}, {@local, 0x4e20, 0x10002, 0x4, 0xa8e9}}, 0x44) lremovexattr(&(0x7f0000000780)='./file0/../file0\x00', &(0x7f00000007c0)=@known='trusted.overlay.opaque\x00') sendto$inet6(0xffffffffffffffff, &(0x7f00000004c0), 0x0, 0x1, 0x0, 0xfffffffffffffffd) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) remap_file_pages(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x1000007, 0x0, 0x102) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[], &(0x7f0000000200)='./file0/../file0\x00', &(0x7f0000000540)='sysfs\x00*\x86OK\xc0\v\xce\x1b\xdb cr\x13\xb1\xe8\x94\xd1 q_\x9d\xc1\x12[\x04,r&\xeb\x016\xd9bN\xa1\xd23t\xa6`\xfeZ\xc1sr/\xd3g\xad\"\xe8U0%\xa2\xe8\xbe\v\xc5QCy\xafr\x13\xd3+\x8d]\x06\xdc\x8f\xbf,\x84\x9e\xd9\xcd\xef\xc7K\x03\xdf\xa9\xcbZ\x90\xb2\x8bK$\xd7\x86,=f\xfc\xa51g\xd5BB5CZ=\xbbv\xbc}0x0) sched_setaffinity(r0, 0x8, &(0x7f00000000c0)=0x9) r1 = open(&(0x7f00000019c0)='./bus\x00', 0x0, 0x8) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setflags(r1, 0x2, 0x1) symlinkat(&(0x7f0000000140)='./bus\x00', 0xffffffffffffffff, 0x0) setrlimit(0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_setup(0x8, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) ioctl$SIOCX25GCAUSEDIAG(r1, 0x89e6, &(0x7f0000000180)={0x1, 0x5}) setxattr$trusted_overlay_origin(0x0, 0x0, 0x0, 0x0, 0x1) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000340)={{0x0, @rand_addr, 0x0, 0x3, 'wlc\x00'}, {@local, 0x4e20, 0x10002, 0x4, 0xa8e9}}, 0x44) lremovexattr(&(0x7f0000000780)='./file0/../file0\x00', &(0x7f00000007c0)=@known='trusted.overlay.opaque\x00') sendto$inet6(0xffffffffffffffff, &(0x7f00000004c0), 0x0, 0x1, 0x0, 0xfffffffffffffffd) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) remap_file_pages(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x1000007, 0x0, 0x102) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[], &(0x7f0000000200)='./file0/../file0\x00', &(0x7f0000000540)='sysfs\x00*\x86OK\xc0\v\xce\x1b\xdb cr\x13\xb1\xe8\x94\xd1 q_\x9d\xc1\x12[\x04,r&\xeb\x016\xd9bN\xa1\xd23t\xa6`\xfeZ\xc1sr/\xd3g\xad\"\xe8U0%\xa2\xe8\xbe\v\xc5QCy\xafr\x13\xd3+\x8d]\x06\xdc\x8f\xbf,\x84\x9e\xd9\xcd\xef\xc7K\x03\xdf\xa9\xcbZ\x90\xb2\x8bK$\xd7\x86,=f\xfc\xa51g\xd5BB5CZ=\xbbv\xbc}0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f"], 0x1) ioctl$int_in(r0, 0x8000008004500b, 0x0) 10:18:23 executing program 4: r0 = socket$kcm(0x10, 0x800000000002, 0x0) perf_event_open$cgroup(&(0x7f0000000c80)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x774}, 0xffffffffffffff9c, 0x0, 0xffffffffffffff9c, 0x0) recvmsg$kcm(r0, &(0x7f00000005c0)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000002940)=""/227, 0xe3}, {&(0x7f0000002a40)=""/206, 0xce}, {&(0x7f0000001940)=""/4096, 0x1000}], 0x130}, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f00000000c0)="2e000000120081aee4050cecff0e00fa048b5bdb4cb904e473730e55cff26d1b0e001d80fffffff05e510befccd7", 0x2e}], 0x1}, 0x0) 10:18:23 executing program 2: write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[@ANYBLOB="b48485e05683ce0b3e"], 0x9) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$TUNSETVNETBE(r0, 0x400454de, &(0x7f0000000000)=0x1) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd'}]}, 0xfdef) 10:18:23 executing program 1: r0 = socket$kcm(0x10, 0x800000000002, 0x0) perf_event_open$cgroup(&(0x7f0000000c80)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x774}, 0xffffffffffffff9c, 0x0, 0xffffffffffffff9c, 0x0) recvmsg$kcm(r0, &(0x7f00000005c0)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000002940)=""/227, 0xe3}, {&(0x7f0000002a40)=""/206, 0xce}, {&(0x7f0000001940)=""/4096, 0x1000}], 0x130}, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f00000000c0)="2e000000120081aee4050cecff0e00fa048b5bdb4cb904e473730e55cff26d1b0e001d80fffffff05e510befccd7", 0x2e}], 0x1}, 0x0) 10:18:23 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x220, 0x0, 0x0, 0x10000007a) ioctl$KVM_ENABLE_CAP_CPU(r2, 0xc008ae88, &(0x7f0000000340)={0x7b, 0x0, [0x20000048c]}) [ 1626.530483] device nr0 entered promiscuous mode 10:18:23 executing program 2: write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[@ANYBLOB="b48485e05683ce0b3e"], 0x9) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$TUNSETVNETBE(r0, 0x400454de, &(0x7f0000000000)=0x1) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd'}]}, 0xfdef) 10:18:23 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) r2 = socket(0xa, 0x1, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r2, 0x0, 0x2a, &(0x7f0000000040)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) setsockopt$sock_int(r1, 0x1, 0x2d, &(0x7f0000000180)=0x4, 0x4) 10:18:23 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x220, 0x0, 0x0, 0x10000007a) ioctl$KVM_ENABLE_CAP_CPU(r2, 0xc008ae88, &(0x7f0000000340)={0x7b, 0x0, [0x20000048c]}) 10:18:23 executing program 1: r0 = socket$kcm(0x10, 0x800000000002, 0x0) perf_event_open$cgroup(&(0x7f0000000c80)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x774}, 0xffffffffffffff9c, 0x0, 0xffffffffffffff9c, 0x0) recvmsg$kcm(r0, &(0x7f00000005c0)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000002940)=""/227, 0xe3}, {&(0x7f0000002a40)=""/206, 0xce}, {&(0x7f0000001940)=""/4096, 0x1000}], 0x130}, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f00000000c0)="2e000000120081aee4050cecff0e00fa048b5bdb4cb904e473730e55cff26d1b0e001d80fffffff05e510befccd7", 0x2e}], 0x1}, 0x0) [ 1626.740301] validate_nla: 20 callbacks suppressed [ 1626.740310] netlink: 'syz-executor.1': attribute type 29 has an invalid length. 10:18:23 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x220, 0x0, 0x0, 0x10000007a) ioctl$KVM_ENABLE_CAP_CPU(r2, 0xc008ae88, &(0x7f0000000340)={0x7b, 0x0, [0x20000048c]}) 10:18:23 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x400000}, 0x207) r0 = socket$kcm(0xa, 0x3, 0x87) sendmsg$kcm(r0, &(0x7f0000002780)={&(0x7f0000000000)=@un=@abs, 0x80, &(0x7f0000001380), 0x2ed, &(0x7f0000000100)}, 0x0) [ 1626.975842] netlink: 'syz-executor.1': attribute type 29 has an invalid length. [ 1627.014772] netlink: 'syz-executor.1': attribute type 29 has an invalid length. 10:18:23 executing program 0: write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[@ANYBLOB="b48485e05683ce0b3e"], 0x9) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$TUNSETVNETBE(r0, 0x400454de, &(0x7f0000000000)=0x1) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd'}]}, 0xfdef) [ 1627.106124] device nr0 entered promiscuous mode 10:18:24 executing program 5: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x1, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f"], 0x1) ioctl$int_in(r0, 0x8000008004500b, 0x0) 10:18:24 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="24000000280007081dfffd940101830020200a000900000006007400600003000d00ff7e280000001100ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47a6268e3406cf055d90f15a3", 0x4c}], 0x1}, 0x0) 10:18:24 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) r2 = socket(0xa, 0x1, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r2, 0x0, 0x2a, &(0x7f0000000040)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) setsockopt$sock_int(r1, 0x1, 0x2d, &(0x7f0000000180)=0x4, 0x4) 10:18:24 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x400000}, 0x207) r0 = socket$kcm(0xa, 0x3, 0x87) sendmsg$kcm(r0, &(0x7f0000002780)={&(0x7f0000000000)=@un=@abs, 0x80, &(0x7f0000001380), 0x2ed, &(0x7f0000000100)}, 0x0) 10:18:24 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) r2 = socket(0xa, 0x1, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r2, 0x0, 0x2a, &(0x7f0000000040)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) setsockopt$sock_int(r1, 0x1, 0x2d, &(0x7f0000000180)=0x4, 0x4) 10:18:24 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f00000000c0)='cpuset.sched_load_balance\x00', 0x2, 0x0) r2 = syz_open_dev$vbi(&(0x7f0000000180)='/dev/vbi#\x00', 0x2, 0x2) ioctl$PIO_UNIMAPCLR(r2, 0x4b68, &(0x7f00000001c0)={0x4, 0x100000000, 0x93}) write$cgroup_int(r1, &(0x7f0000000100), 0x12) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast2}}}, 0x88) socket$inet_udplite(0x2, 0x2, 0x88) [ 1627.579108] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. 10:18:24 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f00000000c0)='cpuset.sched_load_balance\x00', 0x2, 0x0) r2 = syz_open_dev$vbi(&(0x7f0000000180)='/dev/vbi#\x00', 0x2, 0x2) ioctl$PIO_UNIMAPCLR(r2, 0x4b68, &(0x7f00000001c0)={0x4, 0x100000000, 0x93}) write$cgroup_int(r1, &(0x7f0000000100), 0x12) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast2}}}, 0x88) socket$inet_udplite(0x2, 0x2, 0x88) 10:18:24 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) r2 = socket(0xa, 0x1, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r2, 0x0, 0x2a, &(0x7f0000000040)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) setsockopt$sock_int(r1, 0x1, 0x2d, &(0x7f0000000180)=0x4, 0x4) 10:18:24 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) r2 = socket(0xa, 0x1, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r2, 0x0, 0x2a, &(0x7f0000000040)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) setsockopt$sock_int(r1, 0x1, 0x2d, &(0x7f0000000180)=0x4, 0x4) 10:18:24 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x400000}, 0x207) r0 = socket$kcm(0xa, 0x3, 0x87) sendmsg$kcm(r0, &(0x7f0000002780)={&(0x7f0000000000)=@un=@abs, 0x80, &(0x7f0000001380), 0x2ed, &(0x7f0000000100)}, 0x0) 10:18:24 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="24000000280007081dfffd940101830020200a000900000006007400600003000d00ff7e280000001100ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47a6268e3406cf055d90f15a3", 0x4c}], 0x1}, 0x0) 10:18:24 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f00000000c0)='cpuset.sched_load_balance\x00', 0x2, 0x0) r2 = syz_open_dev$vbi(&(0x7f0000000180)='/dev/vbi#\x00', 0x2, 0x2) ioctl$PIO_UNIMAPCLR(r2, 0x4b68, &(0x7f00000001c0)={0x4, 0x100000000, 0x93}) write$cgroup_int(r1, &(0x7f0000000100), 0x12) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast2}}}, 0x88) socket$inet_udplite(0x2, 0x2, 0x88) [ 1627.797705] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. 10:18:25 executing program 5: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x1, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f"], 0x1) ioctl$int_in(r0, 0x8000008004500b, 0x0) 10:18:25 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) r2 = socket(0xa, 0x1, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r2, 0x0, 0x2a, &(0x7f0000000040)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) setsockopt$sock_int(r1, 0x1, 0x2d, &(0x7f0000000180)=0x4, 0x4) 10:18:25 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) r2 = socket(0xa, 0x1, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r2, 0x0, 0x2a, &(0x7f0000000040)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) setsockopt$sock_int(r1, 0x1, 0x2d, &(0x7f0000000180)=0x4, 0x4) 10:18:25 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x400000}, 0x207) r0 = socket$kcm(0xa, 0x3, 0x87) sendmsg$kcm(r0, &(0x7f0000002780)={&(0x7f0000000000)=@un=@abs, 0x80, &(0x7f0000001380), 0x2ed, &(0x7f0000000100)}, 0x0) 10:18:25 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f00000000c0)='cpuset.sched_load_balance\x00', 0x2, 0x0) r2 = syz_open_dev$vbi(&(0x7f0000000180)='/dev/vbi#\x00', 0x2, 0x2) ioctl$PIO_UNIMAPCLR(r2, 0x4b68, &(0x7f00000001c0)={0x4, 0x100000000, 0x93}) write$cgroup_int(r1, &(0x7f0000000100), 0x12) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast2}}}, 0x88) socket$inet_udplite(0x2, 0x2, 0x88) 10:18:25 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="24000000280007081dfffd940101830020200a000900000006007400600003000d00ff7e280000001100ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47a6268e3406cf055d90f15a3", 0x4c}], 0x1}, 0x0) 10:18:25 executing program 0: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x1, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f"], 0x1) ioctl$int_in(r0, 0x8000008004500b, 0x0) [ 1628.279734] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. 10:18:25 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="24000000280007081dfffd940101830020200a000900000006007400600003000d00ff7e280000001100ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47a6268e3406cf055d90f15a3", 0x4c}], 0x1}, 0x0) 10:18:25 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x3b1, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r2, 0x4010ae67, &(0x7f0000000140)={0x0, 0x8000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000000000/0x18000)=nil, 0x0, 0x30, 0x0, 0x0, 0xfffffffffffffee3) syz_emit_ethernet(0x1, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaa0000aaaa00000900000b00f65b34fb43f4000000000000007b3de1e8bfe3af2ec8d86c4df4711cd0b6a8a0"], 0x0) ioctl$KVM_NMI(r3, 0xae9a) ioctl$KVM_RUN(r3, 0xae80, 0x0) 10:18:25 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000100)={0x2, 0xf, 0x0, 0x0, 0x15, 0x2000000, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0xa8}}, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) 10:18:25 executing program 3: socketpair$unix(0x1, 0x4000000000002, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ubi_ctrl\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x4000, 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r4, 0x5423, &(0x7f0000000100)=0x14) epoll_create1(0x80000) getsockopt$inet_sctp_SCTP_PR_STREAM_STATUS(r3, 0x84, 0x74, 0x0, &(0x7f00000001c0)) r5 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/avc/hash_stats\x00', 0x0, 0x0) r6 = openat$cgroup_ro(r5, 0x0, 0x0, 0x0) close(r4) perf_event_open(&(0x7f0000000300)={0x0, 0x70, 0x0, 0x0, 0x100, 0x0, 0x0, 0x3, 0x40, 0x2, 0x0, 0x0, 0x2, 0x662, 0x0, 0x0, 0x783, 0x3, 0x0, 0x0, 0x401, 0x0, 0x0, 0x20, 0x9, 0x4, 0xf802, 0x37b800, 0x0, 0x0, 0x7, 0x0, 0x0, 0x6, 0x100000000, 0x0, 0x5, 0xfffffffffffffffa, 0x0, 0x6, 0x4, @perf_config_ext, 0x1000, 0x0, 0x0, 0x0, 0x401, 0x23837179, 0x4a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$can_raw(0x1d, 0x3, 0x1) getsockopt$inet_IP_IPSEC_POLICY(r6, 0x0, 0x10, &(0x7f0000000540)={{{@in=@initdev, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@broadcast}}, &(0x7f0000000640)=0xe8) connect$unix(r0, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, &(0x7f00000000c0)={0x1}) socket$isdn_base(0x22, 0x3, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNLIST(0xffffffffffffffff, 0x800443d2, &(0x7f00000002c0)={0x3, &(0x7f0000000280)=[{}, {}, {}]}) r8 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r8, 0x28, 0x6, &(0x7f0000000040), 0x5bd706a31ce31a6e) clock_gettime(0x0, &(0x7f0000000080)) getresuid(&(0x7f0000000180), &(0x7f00000001c0)=0x0, &(0x7f0000000200)=0x0) mount$overlay(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='overlay\x00', 0x80443, &(0x7f0000000380)=ANY=[@ANYRESDEC=r9, @ANYRESDEC=r10, @ANYRES64=r7]) [ 1628.415924] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. 10:18:25 executing program 2: r0 = socket(0x400020000000010, 0x2, 0x0) write(r0, &(0x7f0000000080)="1f00000011000d0000000000fc07ff1b070404000d00000007000100010039", 0x1f) 10:18:25 executing program 5: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x1, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f"], 0x1) ioctl$int_in(r0, 0x8000008004500b, 0x0) 10:18:25 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) msgctl$IPC_RMID(0x0, 0x300) 10:18:25 executing program 2: r0 = socket(0x400020000000010, 0x2, 0x0) write(r0, &(0x7f0000000080)="1f00000011000d0000000000fc07ff1b070404000d00000007000100010039", 0x1f) 10:18:25 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000100)={0x2, 0xf, 0x0, 0x0, 0x15, 0x2000000, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0xa8}}, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) 10:18:25 executing program 2: r0 = socket(0x400020000000010, 0x2, 0x0) write(r0, &(0x7f0000000080)="1f00000011000d0000000000fc07ff1b070404000d00000007000100010039", 0x1f) 10:18:25 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) msgctl$IPC_RMID(0x0, 0x300) 10:18:25 executing program 0: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x1, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f"], 0x1) ioctl$int_in(r0, 0x8000008004500b, 0x0) 10:18:25 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000100)={0x2, 0xf, 0x0, 0x0, 0x15, 0x2000000, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0xa8}}, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) 10:18:25 executing program 2: r0 = socket(0x400020000000010, 0x2, 0x0) write(r0, &(0x7f0000000080)="1f00000011000d0000000000fc07ff1b070404000d00000007000100010039", 0x1f) 10:18:25 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) msgctl$IPC_RMID(0x0, 0x300) 10:18:26 executing program 3: socketpair$unix(0x1, 0x4000000000002, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ubi_ctrl\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x4000, 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r4, 0x5423, &(0x7f0000000100)=0x14) epoll_create1(0x80000) getsockopt$inet_sctp_SCTP_PR_STREAM_STATUS(r3, 0x84, 0x74, 0x0, &(0x7f00000001c0)) r5 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/avc/hash_stats\x00', 0x0, 0x0) r6 = openat$cgroup_ro(r5, 0x0, 0x0, 0x0) close(r4) perf_event_open(&(0x7f0000000300)={0x0, 0x70, 0x0, 0x0, 0x100, 0x0, 0x0, 0x3, 0x40, 0x2, 0x0, 0x0, 0x2, 0x662, 0x0, 0x0, 0x783, 0x3, 0x0, 0x0, 0x401, 0x0, 0x0, 0x20, 0x9, 0x4, 0xf802, 0x37b800, 0x0, 0x0, 0x7, 0x0, 0x0, 0x6, 0x100000000, 0x0, 0x5, 0xfffffffffffffffa, 0x0, 0x6, 0x4, @perf_config_ext, 0x1000, 0x0, 0x0, 0x0, 0x401, 0x23837179, 0x4a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$can_raw(0x1d, 0x3, 0x1) getsockopt$inet_IP_IPSEC_POLICY(r6, 0x0, 0x10, &(0x7f0000000540)={{{@in=@initdev, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@broadcast}}, &(0x7f0000000640)=0xe8) connect$unix(r0, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, &(0x7f00000000c0)={0x1}) socket$isdn_base(0x22, 0x3, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNLIST(0xffffffffffffffff, 0x800443d2, &(0x7f00000002c0)={0x3, &(0x7f0000000280)=[{}, {}, {}]}) r8 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r8, 0x28, 0x6, &(0x7f0000000040), 0x5bd706a31ce31a6e) clock_gettime(0x0, &(0x7f0000000080)) getresuid(&(0x7f0000000180), &(0x7f00000001c0)=0x0, &(0x7f0000000200)=0x0) mount$overlay(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='overlay\x00', 0x80443, &(0x7f0000000380)=ANY=[@ANYRESDEC=r9, @ANYRESDEC=r10, @ANYRES64=r7]) 10:18:26 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000100)={0x2, 0xf, 0x0, 0x0, 0x15, 0x2000000, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0xa8}}, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) 10:18:26 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000100)={0x2, 0xf, 0x0, 0x0, 0x15, 0x2000000, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0xa8}}, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) 10:18:26 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) msgctl$IPC_RMID(0x0, 0x300) 10:18:26 executing program 5: socketpair$unix(0x1, 0x4000000000002, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ubi_ctrl\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x4000, 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r4, 0x5423, &(0x7f0000000100)=0x14) epoll_create1(0x80000) getsockopt$inet_sctp_SCTP_PR_STREAM_STATUS(r3, 0x84, 0x74, 0x0, &(0x7f00000001c0)) r5 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/avc/hash_stats\x00', 0x0, 0x0) r6 = openat$cgroup_ro(r5, 0x0, 0x0, 0x0) close(r4) perf_event_open(&(0x7f0000000300)={0x0, 0x70, 0x0, 0x0, 0x100, 0x0, 0x0, 0x3, 0x40, 0x2, 0x0, 0x0, 0x2, 0x662, 0x0, 0x0, 0x783, 0x3, 0x0, 0x0, 0x401, 0x0, 0x0, 0x20, 0x9, 0x4, 0xf802, 0x37b800, 0x0, 0x0, 0x7, 0x0, 0x0, 0x6, 0x100000000, 0x0, 0x5, 0xfffffffffffffffa, 0x0, 0x6, 0x4, @perf_config_ext, 0x1000, 0x0, 0x0, 0x0, 0x401, 0x23837179, 0x4a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$can_raw(0x1d, 0x3, 0x1) getsockopt$inet_IP_IPSEC_POLICY(r6, 0x0, 0x10, &(0x7f0000000540)={{{@in=@initdev, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@broadcast}}, &(0x7f0000000640)=0xe8) connect$unix(r0, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, &(0x7f00000000c0)={0x1}) socket$isdn_base(0x22, 0x3, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNLIST(0xffffffffffffffff, 0x800443d2, &(0x7f00000002c0)={0x3, &(0x7f0000000280)=[{}, {}, {}]}) r8 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r8, 0x28, 0x6, &(0x7f0000000040), 0x5bd706a31ce31a6e) clock_gettime(0x0, &(0x7f0000000080)) getresuid(&(0x7f0000000180), &(0x7f00000001c0)=0x0, &(0x7f0000000200)=0x0) mount$overlay(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='overlay\x00', 0x80443, &(0x7f0000000380)=ANY=[@ANYRESDEC=r9, @ANYRESDEC=r10, @ANYRES64=r7]) 10:18:26 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000100)={0x2, 0xf, 0x0, 0x0, 0x15, 0x2000000, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0xa8}}, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) 10:18:26 executing program 1: socketpair$unix(0x1, 0x4000000000002, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ubi_ctrl\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x4000, 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r4, 0x5423, &(0x7f0000000100)=0x14) epoll_create1(0x80000) getsockopt$inet_sctp_SCTP_PR_STREAM_STATUS(r3, 0x84, 0x74, 0x0, &(0x7f00000001c0)) r5 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/avc/hash_stats\x00', 0x0, 0x0) r6 = openat$cgroup_ro(r5, 0x0, 0x0, 0x0) close(r4) perf_event_open(&(0x7f0000000300)={0x0, 0x70, 0x0, 0x0, 0x100, 0x0, 0x0, 0x3, 0x40, 0x2, 0x0, 0x0, 0x2, 0x662, 0x0, 0x0, 0x783, 0x3, 0x0, 0x0, 0x401, 0x0, 0x0, 0x20, 0x9, 0x4, 0xf802, 0x37b800, 0x0, 0x0, 0x7, 0x0, 0x0, 0x6, 0x100000000, 0x0, 0x5, 0xfffffffffffffffa, 0x0, 0x6, 0x4, @perf_config_ext, 0x1000, 0x0, 0x0, 0x0, 0x401, 0x23837179, 0x4a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$can_raw(0x1d, 0x3, 0x1) getsockopt$inet_IP_IPSEC_POLICY(r6, 0x0, 0x10, &(0x7f0000000540)={{{@in=@initdev, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@broadcast}}, &(0x7f0000000640)=0xe8) connect$unix(r0, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, &(0x7f00000000c0)={0x1}) socket$isdn_base(0x22, 0x3, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNLIST(0xffffffffffffffff, 0x800443d2, &(0x7f00000002c0)={0x3, &(0x7f0000000280)=[{}, {}, {}]}) r8 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r8, 0x28, 0x6, &(0x7f0000000040), 0x5bd706a31ce31a6e) clock_gettime(0x0, &(0x7f0000000080)) getresuid(&(0x7f0000000180), &(0x7f00000001c0)=0x0, &(0x7f0000000200)=0x0) mount$overlay(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='overlay\x00', 0x80443, &(0x7f0000000380)=ANY=[@ANYRESDEC=r9, @ANYRESDEC=r10, @ANYRES64=r7]) 10:18:26 executing program 0: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x1, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f"], 0x1) ioctl$int_in(r0, 0x8000008004500b, 0x0) 10:18:26 executing program 4: socketpair$unix(0x1, 0x4000000000002, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ubi_ctrl\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x4000, 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r4, 0x5423, &(0x7f0000000100)=0x14) epoll_create1(0x80000) getsockopt$inet_sctp_SCTP_PR_STREAM_STATUS(r3, 0x84, 0x74, 0x0, &(0x7f00000001c0)) r5 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/avc/hash_stats\x00', 0x0, 0x0) r6 = openat$cgroup_ro(r5, 0x0, 0x0, 0x0) close(r4) perf_event_open(&(0x7f0000000300)={0x0, 0x70, 0x0, 0x0, 0x100, 0x0, 0x0, 0x3, 0x40, 0x2, 0x0, 0x0, 0x2, 0x662, 0x0, 0x0, 0x783, 0x3, 0x0, 0x0, 0x401, 0x0, 0x0, 0x20, 0x9, 0x4, 0xf802, 0x37b800, 0x0, 0x0, 0x7, 0x0, 0x0, 0x6, 0x100000000, 0x0, 0x5, 0xfffffffffffffffa, 0x0, 0x6, 0x4, @perf_config_ext, 0x1000, 0x0, 0x0, 0x0, 0x401, 0x23837179, 0x4a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$can_raw(0x1d, 0x3, 0x1) getsockopt$inet_IP_IPSEC_POLICY(r6, 0x0, 0x10, &(0x7f0000000540)={{{@in=@initdev, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@broadcast}}, &(0x7f0000000640)=0xe8) connect$unix(r0, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, &(0x7f00000000c0)={0x1}) socket$isdn_base(0x22, 0x3, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNLIST(0xffffffffffffffff, 0x800443d2, &(0x7f00000002c0)={0x3, &(0x7f0000000280)=[{}, {}, {}]}) r8 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r8, 0x28, 0x6, &(0x7f0000000040), 0x5bd706a31ce31a6e) clock_gettime(0x0, &(0x7f0000000080)) getresuid(&(0x7f0000000180), &(0x7f00000001c0)=0x0, &(0x7f0000000200)=0x0) mount$overlay(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='overlay\x00', 0x80443, &(0x7f0000000380)=ANY=[@ANYRESDEC=r9, @ANYRESDEC=r10, @ANYRES64=r7]) 10:18:26 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000100)={0x2, 0xf, 0x0, 0x0, 0x15, 0x2000000, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0xa8}}, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) 10:18:26 executing program 2: socketpair$unix(0x1, 0x4000000000002, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ubi_ctrl\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x4000, 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r4, 0x5423, &(0x7f0000000100)=0x14) epoll_create1(0x80000) getsockopt$inet_sctp_SCTP_PR_STREAM_STATUS(r3, 0x84, 0x74, 0x0, &(0x7f00000001c0)) r5 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/avc/hash_stats\x00', 0x0, 0x0) r6 = openat$cgroup_ro(r5, 0x0, 0x0, 0x0) close(r4) perf_event_open(&(0x7f0000000300)={0x0, 0x70, 0x0, 0x0, 0x100, 0x0, 0x0, 0x3, 0x40, 0x2, 0x0, 0x0, 0x2, 0x662, 0x0, 0x0, 0x783, 0x3, 0x0, 0x0, 0x401, 0x0, 0x0, 0x20, 0x9, 0x4, 0xf802, 0x37b800, 0x0, 0x0, 0x7, 0x0, 0x0, 0x6, 0x100000000, 0x0, 0x5, 0xfffffffffffffffa, 0x0, 0x6, 0x4, @perf_config_ext, 0x1000, 0x0, 0x0, 0x0, 0x401, 0x23837179, 0x4a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$can_raw(0x1d, 0x3, 0x1) getsockopt$inet_IP_IPSEC_POLICY(r6, 0x0, 0x10, &(0x7f0000000540)={{{@in=@initdev, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@broadcast}}, &(0x7f0000000640)=0xe8) connect$unix(r0, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, &(0x7f00000000c0)={0x1}) socket$isdn_base(0x22, 0x3, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNLIST(0xffffffffffffffff, 0x800443d2, &(0x7f00000002c0)={0x3, &(0x7f0000000280)=[{}, {}, {}]}) r8 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r8, 0x28, 0x6, &(0x7f0000000040), 0x5bd706a31ce31a6e) clock_gettime(0x0, &(0x7f0000000080)) getresuid(&(0x7f0000000180), &(0x7f00000001c0)=0x0, &(0x7f0000000200)=0x0) mount$overlay(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='overlay\x00', 0x80443, &(0x7f0000000380)=ANY=[@ANYRESDEC=r9, @ANYRESDEC=r10, @ANYRES64=r7]) 10:18:27 executing program 0: socketpair$unix(0x1, 0x4000000000002, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ubi_ctrl\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x4000, 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r4, 0x5423, &(0x7f0000000100)=0x14) epoll_create1(0x80000) getsockopt$inet_sctp_SCTP_PR_STREAM_STATUS(r3, 0x84, 0x74, 0x0, &(0x7f00000001c0)) r5 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/avc/hash_stats\x00', 0x0, 0x0) r6 = openat$cgroup_ro(r5, 0x0, 0x0, 0x0) close(r4) perf_event_open(&(0x7f0000000300)={0x0, 0x70, 0x0, 0x0, 0x100, 0x0, 0x0, 0x3, 0x40, 0x2, 0x0, 0x0, 0x2, 0x662, 0x0, 0x0, 0x783, 0x3, 0x0, 0x0, 0x401, 0x0, 0x0, 0x20, 0x9, 0x4, 0xf802, 0x37b800, 0x0, 0x0, 0x7, 0x0, 0x0, 0x6, 0x100000000, 0x0, 0x5, 0xfffffffffffffffa, 0x0, 0x6, 0x4, @perf_config_ext, 0x1000, 0x0, 0x0, 0x0, 0x401, 0x23837179, 0x4a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$can_raw(0x1d, 0x3, 0x1) getsockopt$inet_IP_IPSEC_POLICY(r6, 0x0, 0x10, &(0x7f0000000540)={{{@in=@initdev, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@broadcast}}, &(0x7f0000000640)=0xe8) connect$unix(r0, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, &(0x7f00000000c0)={0x1}) socket$isdn_base(0x22, 0x3, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNLIST(0xffffffffffffffff, 0x800443d2, &(0x7f00000002c0)={0x3, &(0x7f0000000280)=[{}, {}, {}]}) r8 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r8, 0x28, 0x6, &(0x7f0000000040), 0x5bd706a31ce31a6e) clock_gettime(0x0, &(0x7f0000000080)) getresuid(&(0x7f0000000180), &(0x7f00000001c0)=0x0, &(0x7f0000000200)=0x0) mount$overlay(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='overlay\x00', 0x80443, &(0x7f0000000380)=ANY=[@ANYRESDEC=r9, @ANYRESDEC=r10, @ANYRES64=r7]) 10:18:28 executing program 3: socketpair$unix(0x1, 0x4000000000002, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ubi_ctrl\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x4000, 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r4, 0x5423, &(0x7f0000000100)=0x14) epoll_create1(0x80000) getsockopt$inet_sctp_SCTP_PR_STREAM_STATUS(r3, 0x84, 0x74, 0x0, &(0x7f00000001c0)) r5 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/avc/hash_stats\x00', 0x0, 0x0) r6 = openat$cgroup_ro(r5, 0x0, 0x0, 0x0) close(r4) perf_event_open(&(0x7f0000000300)={0x0, 0x70, 0x0, 0x0, 0x100, 0x0, 0x0, 0x3, 0x40, 0x2, 0x0, 0x0, 0x2, 0x662, 0x0, 0x0, 0x783, 0x3, 0x0, 0x0, 0x401, 0x0, 0x0, 0x20, 0x9, 0x4, 0xf802, 0x37b800, 0x0, 0x0, 0x7, 0x0, 0x0, 0x6, 0x100000000, 0x0, 0x5, 0xfffffffffffffffa, 0x0, 0x6, 0x4, @perf_config_ext, 0x1000, 0x0, 0x0, 0x0, 0x401, 0x23837179, 0x4a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$can_raw(0x1d, 0x3, 0x1) getsockopt$inet_IP_IPSEC_POLICY(r6, 0x0, 0x10, &(0x7f0000000540)={{{@in=@initdev, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@broadcast}}, &(0x7f0000000640)=0xe8) connect$unix(r0, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, &(0x7f00000000c0)={0x1}) socket$isdn_base(0x22, 0x3, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNLIST(0xffffffffffffffff, 0x800443d2, &(0x7f00000002c0)={0x3, &(0x7f0000000280)=[{}, {}, {}]}) r8 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r8, 0x28, 0x6, &(0x7f0000000040), 0x5bd706a31ce31a6e) clock_gettime(0x0, &(0x7f0000000080)) getresuid(&(0x7f0000000180), &(0x7f00000001c0)=0x0, &(0x7f0000000200)=0x0) mount$overlay(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='overlay\x00', 0x80443, &(0x7f0000000380)=ANY=[@ANYRESDEC=r9, @ANYRESDEC=r10, @ANYRES64=r7]) 10:18:28 executing program 1: socketpair$unix(0x1, 0x4000000000002, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ubi_ctrl\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x4000, 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r4, 0x5423, &(0x7f0000000100)=0x14) epoll_create1(0x80000) getsockopt$inet_sctp_SCTP_PR_STREAM_STATUS(r3, 0x84, 0x74, 0x0, &(0x7f00000001c0)) r5 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/avc/hash_stats\x00', 0x0, 0x0) r6 = openat$cgroup_ro(r5, 0x0, 0x0, 0x0) close(r4) perf_event_open(&(0x7f0000000300)={0x0, 0x70, 0x0, 0x0, 0x100, 0x0, 0x0, 0x3, 0x40, 0x2, 0x0, 0x0, 0x2, 0x662, 0x0, 0x0, 0x783, 0x3, 0x0, 0x0, 0x401, 0x0, 0x0, 0x20, 0x9, 0x4, 0xf802, 0x37b800, 0x0, 0x0, 0x7, 0x0, 0x0, 0x6, 0x100000000, 0x0, 0x5, 0xfffffffffffffffa, 0x0, 0x6, 0x4, @perf_config_ext, 0x1000, 0x0, 0x0, 0x0, 0x401, 0x23837179, 0x4a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$can_raw(0x1d, 0x3, 0x1) getsockopt$inet_IP_IPSEC_POLICY(r6, 0x0, 0x10, &(0x7f0000000540)={{{@in=@initdev, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@broadcast}}, &(0x7f0000000640)=0xe8) connect$unix(r0, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, &(0x7f00000000c0)={0x1}) socket$isdn_base(0x22, 0x3, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNLIST(0xffffffffffffffff, 0x800443d2, &(0x7f00000002c0)={0x3, &(0x7f0000000280)=[{}, {}, {}]}) r8 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r8, 0x28, 0x6, &(0x7f0000000040), 0x5bd706a31ce31a6e) clock_gettime(0x0, &(0x7f0000000080)) getresuid(&(0x7f0000000180), &(0x7f00000001c0)=0x0, &(0x7f0000000200)=0x0) mount$overlay(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='overlay\x00', 0x80443, &(0x7f0000000380)=ANY=[@ANYRESDEC=r9, @ANYRESDEC=r10, @ANYRES64=r7]) 10:18:28 executing program 2: socketpair$unix(0x1, 0x4000000000002, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ubi_ctrl\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x4000, 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r4, 0x5423, &(0x7f0000000100)=0x14) epoll_create1(0x80000) getsockopt$inet_sctp_SCTP_PR_STREAM_STATUS(r3, 0x84, 0x74, 0x0, &(0x7f00000001c0)) r5 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/avc/hash_stats\x00', 0x0, 0x0) r6 = openat$cgroup_ro(r5, 0x0, 0x0, 0x0) close(r4) perf_event_open(&(0x7f0000000300)={0x0, 0x70, 0x0, 0x0, 0x100, 0x0, 0x0, 0x3, 0x40, 0x2, 0x0, 0x0, 0x2, 0x662, 0x0, 0x0, 0x783, 0x3, 0x0, 0x0, 0x401, 0x0, 0x0, 0x20, 0x9, 0x4, 0xf802, 0x37b800, 0x0, 0x0, 0x7, 0x0, 0x0, 0x6, 0x100000000, 0x0, 0x5, 0xfffffffffffffffa, 0x0, 0x6, 0x4, @perf_config_ext, 0x1000, 0x0, 0x0, 0x0, 0x401, 0x23837179, 0x4a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$can_raw(0x1d, 0x3, 0x1) getsockopt$inet_IP_IPSEC_POLICY(r6, 0x0, 0x10, &(0x7f0000000540)={{{@in=@initdev, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@broadcast}}, &(0x7f0000000640)=0xe8) connect$unix(r0, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, &(0x7f00000000c0)={0x1}) socket$isdn_base(0x22, 0x3, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNLIST(0xffffffffffffffff, 0x800443d2, &(0x7f00000002c0)={0x3, &(0x7f0000000280)=[{}, {}, {}]}) r8 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r8, 0x28, 0x6, &(0x7f0000000040), 0x5bd706a31ce31a6e) clock_gettime(0x0, &(0x7f0000000080)) getresuid(&(0x7f0000000180), &(0x7f00000001c0)=0x0, &(0x7f0000000200)=0x0) mount$overlay(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='overlay\x00', 0x80443, &(0x7f0000000380)=ANY=[@ANYRESDEC=r9, @ANYRESDEC=r10, @ANYRES64=r7]) 10:18:28 executing program 0: socketpair$unix(0x1, 0x4000000000002, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ubi_ctrl\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x4000, 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r4, 0x5423, &(0x7f0000000100)=0x14) epoll_create1(0x80000) getsockopt$inet_sctp_SCTP_PR_STREAM_STATUS(r3, 0x84, 0x74, 0x0, &(0x7f00000001c0)) r5 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/avc/hash_stats\x00', 0x0, 0x0) r6 = openat$cgroup_ro(r5, 0x0, 0x0, 0x0) close(r4) perf_event_open(&(0x7f0000000300)={0x0, 0x70, 0x0, 0x0, 0x100, 0x0, 0x0, 0x3, 0x40, 0x2, 0x0, 0x0, 0x2, 0x662, 0x0, 0x0, 0x783, 0x3, 0x0, 0x0, 0x401, 0x0, 0x0, 0x20, 0x9, 0x4, 0xf802, 0x37b800, 0x0, 0x0, 0x7, 0x0, 0x0, 0x6, 0x100000000, 0x0, 0x5, 0xfffffffffffffffa, 0x0, 0x6, 0x4, @perf_config_ext, 0x1000, 0x0, 0x0, 0x0, 0x401, 0x23837179, 0x4a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$can_raw(0x1d, 0x3, 0x1) getsockopt$inet_IP_IPSEC_POLICY(r6, 0x0, 0x10, &(0x7f0000000540)={{{@in=@initdev, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@broadcast}}, &(0x7f0000000640)=0xe8) connect$unix(r0, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, &(0x7f00000000c0)={0x1}) socket$isdn_base(0x22, 0x3, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNLIST(0xffffffffffffffff, 0x800443d2, &(0x7f00000002c0)={0x3, &(0x7f0000000280)=[{}, {}, {}]}) r8 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r8, 0x28, 0x6, &(0x7f0000000040), 0x5bd706a31ce31a6e) clock_gettime(0x0, &(0x7f0000000080)) getresuid(&(0x7f0000000180), &(0x7f00000001c0)=0x0, &(0x7f0000000200)=0x0) mount$overlay(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='overlay\x00', 0x80443, &(0x7f0000000380)=ANY=[@ANYRESDEC=r9, @ANYRESDEC=r10, @ANYRES64=r7]) 10:18:28 executing program 5: socketpair$unix(0x1, 0x4000000000002, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ubi_ctrl\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x4000, 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r4, 0x5423, &(0x7f0000000100)=0x14) epoll_create1(0x80000) getsockopt$inet_sctp_SCTP_PR_STREAM_STATUS(r3, 0x84, 0x74, 0x0, &(0x7f00000001c0)) r5 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/avc/hash_stats\x00', 0x0, 0x0) r6 = openat$cgroup_ro(r5, 0x0, 0x0, 0x0) close(r4) perf_event_open(&(0x7f0000000300)={0x0, 0x70, 0x0, 0x0, 0x100, 0x0, 0x0, 0x3, 0x40, 0x2, 0x0, 0x0, 0x2, 0x662, 0x0, 0x0, 0x783, 0x3, 0x0, 0x0, 0x401, 0x0, 0x0, 0x20, 0x9, 0x4, 0xf802, 0x37b800, 0x0, 0x0, 0x7, 0x0, 0x0, 0x6, 0x100000000, 0x0, 0x5, 0xfffffffffffffffa, 0x0, 0x6, 0x4, @perf_config_ext, 0x1000, 0x0, 0x0, 0x0, 0x401, 0x23837179, 0x4a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$can_raw(0x1d, 0x3, 0x1) getsockopt$inet_IP_IPSEC_POLICY(r6, 0x0, 0x10, &(0x7f0000000540)={{{@in=@initdev, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@broadcast}}, &(0x7f0000000640)=0xe8) connect$unix(r0, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, &(0x7f00000000c0)={0x1}) socket$isdn_base(0x22, 0x3, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNLIST(0xffffffffffffffff, 0x800443d2, &(0x7f00000002c0)={0x3, &(0x7f0000000280)=[{}, {}, {}]}) r8 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r8, 0x28, 0x6, &(0x7f0000000040), 0x5bd706a31ce31a6e) clock_gettime(0x0, &(0x7f0000000080)) getresuid(&(0x7f0000000180), &(0x7f00000001c0)=0x0, &(0x7f0000000200)=0x0) mount$overlay(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='overlay\x00', 0x80443, &(0x7f0000000380)=ANY=[@ANYRESDEC=r9, @ANYRESDEC=r10, @ANYRES64=r7]) 10:18:28 executing program 4: socketpair$unix(0x1, 0x4000000000002, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ubi_ctrl\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x4000, 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r4, 0x5423, &(0x7f0000000100)=0x14) epoll_create1(0x80000) getsockopt$inet_sctp_SCTP_PR_STREAM_STATUS(r3, 0x84, 0x74, 0x0, &(0x7f00000001c0)) r5 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/avc/hash_stats\x00', 0x0, 0x0) r6 = openat$cgroup_ro(r5, 0x0, 0x0, 0x0) close(r4) perf_event_open(&(0x7f0000000300)={0x0, 0x70, 0x0, 0x0, 0x100, 0x0, 0x0, 0x3, 0x40, 0x2, 0x0, 0x0, 0x2, 0x662, 0x0, 0x0, 0x783, 0x3, 0x0, 0x0, 0x401, 0x0, 0x0, 0x20, 0x9, 0x4, 0xf802, 0x37b800, 0x0, 0x0, 0x7, 0x0, 0x0, 0x6, 0x100000000, 0x0, 0x5, 0xfffffffffffffffa, 0x0, 0x6, 0x4, @perf_config_ext, 0x1000, 0x0, 0x0, 0x0, 0x401, 0x23837179, 0x4a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$can_raw(0x1d, 0x3, 0x1) getsockopt$inet_IP_IPSEC_POLICY(r6, 0x0, 0x10, &(0x7f0000000540)={{{@in=@initdev, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@broadcast}}, &(0x7f0000000640)=0xe8) connect$unix(r0, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, &(0x7f00000000c0)={0x1}) socket$isdn_base(0x22, 0x3, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNLIST(0xffffffffffffffff, 0x800443d2, &(0x7f00000002c0)={0x3, &(0x7f0000000280)=[{}, {}, {}]}) r8 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r8, 0x28, 0x6, &(0x7f0000000040), 0x5bd706a31ce31a6e) clock_gettime(0x0, &(0x7f0000000080)) getresuid(&(0x7f0000000180), &(0x7f00000001c0)=0x0, &(0x7f0000000200)=0x0) mount$overlay(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='overlay\x00', 0x80443, &(0x7f0000000380)=ANY=[@ANYRESDEC=r9, @ANYRESDEC=r10, @ANYRES64=r7]) 10:18:28 executing program 1: socketpair$unix(0x1, 0x4000000000002, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ubi_ctrl\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x4000, 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r4, 0x5423, &(0x7f0000000100)=0x14) epoll_create1(0x80000) getsockopt$inet_sctp_SCTP_PR_STREAM_STATUS(r3, 0x84, 0x74, 0x0, &(0x7f00000001c0)) r5 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/avc/hash_stats\x00', 0x0, 0x0) r6 = openat$cgroup_ro(r5, 0x0, 0x0, 0x0) close(r4) perf_event_open(&(0x7f0000000300)={0x0, 0x70, 0x0, 0x0, 0x100, 0x0, 0x0, 0x3, 0x40, 0x2, 0x0, 0x0, 0x2, 0x662, 0x0, 0x0, 0x783, 0x3, 0x0, 0x0, 0x401, 0x0, 0x0, 0x20, 0x9, 0x4, 0xf802, 0x37b800, 0x0, 0x0, 0x7, 0x0, 0x0, 0x6, 0x100000000, 0x0, 0x5, 0xfffffffffffffffa, 0x0, 0x6, 0x4, @perf_config_ext, 0x1000, 0x0, 0x0, 0x0, 0x401, 0x23837179, 0x4a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$can_raw(0x1d, 0x3, 0x1) getsockopt$inet_IP_IPSEC_POLICY(r6, 0x0, 0x10, &(0x7f0000000540)={{{@in=@initdev, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@broadcast}}, &(0x7f0000000640)=0xe8) connect$unix(r0, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, &(0x7f00000000c0)={0x1}) socket$isdn_base(0x22, 0x3, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNLIST(0xffffffffffffffff, 0x800443d2, &(0x7f00000002c0)={0x3, &(0x7f0000000280)=[{}, {}, {}]}) r8 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r8, 0x28, 0x6, &(0x7f0000000040), 0x5bd706a31ce31a6e) clock_gettime(0x0, &(0x7f0000000080)) getresuid(&(0x7f0000000180), &(0x7f00000001c0)=0x0, &(0x7f0000000200)=0x0) mount$overlay(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='overlay\x00', 0x80443, &(0x7f0000000380)=ANY=[@ANYRESDEC=r9, @ANYRESDEC=r10, @ANYRES64=r7]) 10:18:28 executing program 2: socketpair$unix(0x1, 0x4000000000002, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ubi_ctrl\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x4000, 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r4, 0x5423, &(0x7f0000000100)=0x14) epoll_create1(0x80000) getsockopt$inet_sctp_SCTP_PR_STREAM_STATUS(r3, 0x84, 0x74, 0x0, &(0x7f00000001c0)) r5 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/avc/hash_stats\x00', 0x0, 0x0) r6 = openat$cgroup_ro(r5, 0x0, 0x0, 0x0) close(r4) perf_event_open(&(0x7f0000000300)={0x0, 0x70, 0x0, 0x0, 0x100, 0x0, 0x0, 0x3, 0x40, 0x2, 0x0, 0x0, 0x2, 0x662, 0x0, 0x0, 0x783, 0x3, 0x0, 0x0, 0x401, 0x0, 0x0, 0x20, 0x9, 0x4, 0xf802, 0x37b800, 0x0, 0x0, 0x7, 0x0, 0x0, 0x6, 0x100000000, 0x0, 0x5, 0xfffffffffffffffa, 0x0, 0x6, 0x4, @perf_config_ext, 0x1000, 0x0, 0x0, 0x0, 0x401, 0x23837179, 0x4a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$can_raw(0x1d, 0x3, 0x1) getsockopt$inet_IP_IPSEC_POLICY(r6, 0x0, 0x10, &(0x7f0000000540)={{{@in=@initdev, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@broadcast}}, &(0x7f0000000640)=0xe8) connect$unix(r0, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, &(0x7f00000000c0)={0x1}) socket$isdn_base(0x22, 0x3, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNLIST(0xffffffffffffffff, 0x800443d2, &(0x7f00000002c0)={0x3, &(0x7f0000000280)=[{}, {}, {}]}) r8 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r8, 0x28, 0x6, &(0x7f0000000040), 0x5bd706a31ce31a6e) clock_gettime(0x0, &(0x7f0000000080)) getresuid(&(0x7f0000000180), &(0x7f00000001c0)=0x0, &(0x7f0000000200)=0x0) mount$overlay(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='overlay\x00', 0x80443, &(0x7f0000000380)=ANY=[@ANYRESDEC=r9, @ANYRESDEC=r10, @ANYRES64=r7]) 10:18:28 executing program 4: socketpair$unix(0x1, 0x4000000000002, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ubi_ctrl\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x4000, 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r4, 0x5423, &(0x7f0000000100)=0x14) epoll_create1(0x80000) getsockopt$inet_sctp_SCTP_PR_STREAM_STATUS(r3, 0x84, 0x74, 0x0, &(0x7f00000001c0)) r5 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/avc/hash_stats\x00', 0x0, 0x0) r6 = openat$cgroup_ro(r5, 0x0, 0x0, 0x0) close(r4) perf_event_open(&(0x7f0000000300)={0x0, 0x70, 0x0, 0x0, 0x100, 0x0, 0x0, 0x3, 0x40, 0x2, 0x0, 0x0, 0x2, 0x662, 0x0, 0x0, 0x783, 0x3, 0x0, 0x0, 0x401, 0x0, 0x0, 0x20, 0x9, 0x4, 0xf802, 0x37b800, 0x0, 0x0, 0x7, 0x0, 0x0, 0x6, 0x100000000, 0x0, 0x5, 0xfffffffffffffffa, 0x0, 0x6, 0x4, @perf_config_ext, 0x1000, 0x0, 0x0, 0x0, 0x401, 0x23837179, 0x4a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$can_raw(0x1d, 0x3, 0x1) getsockopt$inet_IP_IPSEC_POLICY(r6, 0x0, 0x10, &(0x7f0000000540)={{{@in=@initdev, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@broadcast}}, &(0x7f0000000640)=0xe8) connect$unix(r0, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, &(0x7f00000000c0)={0x1}) socket$isdn_base(0x22, 0x3, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNLIST(0xffffffffffffffff, 0x800443d2, &(0x7f00000002c0)={0x3, &(0x7f0000000280)=[{}, {}, {}]}) r8 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r8, 0x28, 0x6, &(0x7f0000000040), 0x5bd706a31ce31a6e) clock_gettime(0x0, &(0x7f0000000080)) getresuid(&(0x7f0000000180), &(0x7f00000001c0)=0x0, &(0x7f0000000200)=0x0) mount$overlay(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='overlay\x00', 0x80443, &(0x7f0000000380)=ANY=[@ANYRESDEC=r9, @ANYRESDEC=r10, @ANYRES64=r7]) 10:18:28 executing program 1: socketpair$unix(0x1, 0x4000000000002, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ubi_ctrl\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x4000, 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r4, 0x5423, &(0x7f0000000100)=0x14) epoll_create1(0x80000) getsockopt$inet_sctp_SCTP_PR_STREAM_STATUS(r3, 0x84, 0x74, 0x0, &(0x7f00000001c0)) r5 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/avc/hash_stats\x00', 0x0, 0x0) r6 = openat$cgroup_ro(r5, 0x0, 0x0, 0x0) close(r4) perf_event_open(&(0x7f0000000300)={0x0, 0x70, 0x0, 0x0, 0x100, 0x0, 0x0, 0x3, 0x40, 0x2, 0x0, 0x0, 0x2, 0x662, 0x0, 0x0, 0x783, 0x3, 0x0, 0x0, 0x401, 0x0, 0x0, 0x20, 0x9, 0x4, 0xf802, 0x37b800, 0x0, 0x0, 0x7, 0x0, 0x0, 0x6, 0x100000000, 0x0, 0x5, 0xfffffffffffffffa, 0x0, 0x6, 0x4, @perf_config_ext, 0x1000, 0x0, 0x0, 0x0, 0x401, 0x23837179, 0x4a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$can_raw(0x1d, 0x3, 0x1) getsockopt$inet_IP_IPSEC_POLICY(r6, 0x0, 0x10, &(0x7f0000000540)={{{@in=@initdev, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@broadcast}}, &(0x7f0000000640)=0xe8) connect$unix(r0, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, &(0x7f00000000c0)={0x1}) socket$isdn_base(0x22, 0x3, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNLIST(0xffffffffffffffff, 0x800443d2, &(0x7f00000002c0)={0x3, &(0x7f0000000280)=[{}, {}, {}]}) r8 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r8, 0x28, 0x6, &(0x7f0000000040), 0x5bd706a31ce31a6e) clock_gettime(0x0, &(0x7f0000000080)) getresuid(&(0x7f0000000180), &(0x7f00000001c0)=0x0, &(0x7f0000000200)=0x0) mount$overlay(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='overlay\x00', 0x80443, &(0x7f0000000380)=ANY=[@ANYRESDEC=r9, @ANYRESDEC=r10, @ANYRES64=r7]) 10:18:28 executing program 5: socketpair$unix(0x1, 0x4000000000002, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ubi_ctrl\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x4000, 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r4, 0x5423, &(0x7f0000000100)=0x14) epoll_create1(0x80000) getsockopt$inet_sctp_SCTP_PR_STREAM_STATUS(r3, 0x84, 0x74, 0x0, &(0x7f00000001c0)) r5 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/avc/hash_stats\x00', 0x0, 0x0) r6 = openat$cgroup_ro(r5, 0x0, 0x0, 0x0) close(r4) perf_event_open(&(0x7f0000000300)={0x0, 0x70, 0x0, 0x0, 0x100, 0x0, 0x0, 0x3, 0x40, 0x2, 0x0, 0x0, 0x2, 0x662, 0x0, 0x0, 0x783, 0x3, 0x0, 0x0, 0x401, 0x0, 0x0, 0x20, 0x9, 0x4, 0xf802, 0x37b800, 0x0, 0x0, 0x7, 0x0, 0x0, 0x6, 0x100000000, 0x0, 0x5, 0xfffffffffffffffa, 0x0, 0x6, 0x4, @perf_config_ext, 0x1000, 0x0, 0x0, 0x0, 0x401, 0x23837179, 0x4a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$can_raw(0x1d, 0x3, 0x1) getsockopt$inet_IP_IPSEC_POLICY(r6, 0x0, 0x10, &(0x7f0000000540)={{{@in=@initdev, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@broadcast}}, &(0x7f0000000640)=0xe8) connect$unix(r0, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, &(0x7f00000000c0)={0x1}) socket$isdn_base(0x22, 0x3, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNLIST(0xffffffffffffffff, 0x800443d2, &(0x7f00000002c0)={0x3, &(0x7f0000000280)=[{}, {}, {}]}) r8 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r8, 0x28, 0x6, &(0x7f0000000040), 0x5bd706a31ce31a6e) clock_gettime(0x0, &(0x7f0000000080)) getresuid(&(0x7f0000000180), &(0x7f00000001c0)=0x0, &(0x7f0000000200)=0x0) mount$overlay(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='overlay\x00', 0x80443, &(0x7f0000000380)=ANY=[@ANYRESDEC=r9, @ANYRESDEC=r10, @ANYRES64=r7]) 10:18:28 executing program 3: socketpair$unix(0x1, 0x4000000000002, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ubi_ctrl\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x4000, 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r4, 0x5423, &(0x7f0000000100)=0x14) epoll_create1(0x80000) getsockopt$inet_sctp_SCTP_PR_STREAM_STATUS(r3, 0x84, 0x74, 0x0, &(0x7f00000001c0)) r5 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/avc/hash_stats\x00', 0x0, 0x0) r6 = openat$cgroup_ro(r5, 0x0, 0x0, 0x0) close(r4) perf_event_open(&(0x7f0000000300)={0x0, 0x70, 0x0, 0x0, 0x100, 0x0, 0x0, 0x3, 0x40, 0x2, 0x0, 0x0, 0x2, 0x662, 0x0, 0x0, 0x783, 0x3, 0x0, 0x0, 0x401, 0x0, 0x0, 0x20, 0x9, 0x4, 0xf802, 0x37b800, 0x0, 0x0, 0x7, 0x0, 0x0, 0x6, 0x100000000, 0x0, 0x5, 0xfffffffffffffffa, 0x0, 0x6, 0x4, @perf_config_ext, 0x1000, 0x0, 0x0, 0x0, 0x401, 0x23837179, 0x4a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$can_raw(0x1d, 0x3, 0x1) getsockopt$inet_IP_IPSEC_POLICY(r6, 0x0, 0x10, &(0x7f0000000540)={{{@in=@initdev, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@broadcast}}, &(0x7f0000000640)=0xe8) connect$unix(r0, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, &(0x7f00000000c0)={0x1}) socket$isdn_base(0x22, 0x3, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNLIST(0xffffffffffffffff, 0x800443d2, &(0x7f00000002c0)={0x3, &(0x7f0000000280)=[{}, {}, {}]}) r8 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r8, 0x28, 0x6, &(0x7f0000000040), 0x5bd706a31ce31a6e) clock_gettime(0x0, &(0x7f0000000080)) getresuid(&(0x7f0000000180), &(0x7f00000001c0)=0x0, &(0x7f0000000200)=0x0) mount$overlay(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='overlay\x00', 0x80443, &(0x7f0000000380)=ANY=[@ANYRESDEC=r9, @ANYRESDEC=r10, @ANYRES64=r7]) 10:18:28 executing program 0: socketpair$unix(0x1, 0x4000000000002, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ubi_ctrl\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x4000, 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r4, 0x5423, &(0x7f0000000100)=0x14) epoll_create1(0x80000) getsockopt$inet_sctp_SCTP_PR_STREAM_STATUS(r3, 0x84, 0x74, 0x0, &(0x7f00000001c0)) r5 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/avc/hash_stats\x00', 0x0, 0x0) r6 = openat$cgroup_ro(r5, 0x0, 0x0, 0x0) close(r4) perf_event_open(&(0x7f0000000300)={0x0, 0x70, 0x0, 0x0, 0x100, 0x0, 0x0, 0x3, 0x40, 0x2, 0x0, 0x0, 0x2, 0x662, 0x0, 0x0, 0x783, 0x3, 0x0, 0x0, 0x401, 0x0, 0x0, 0x20, 0x9, 0x4, 0xf802, 0x37b800, 0x0, 0x0, 0x7, 0x0, 0x0, 0x6, 0x100000000, 0x0, 0x5, 0xfffffffffffffffa, 0x0, 0x6, 0x4, @perf_config_ext, 0x1000, 0x0, 0x0, 0x0, 0x401, 0x23837179, 0x4a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$can_raw(0x1d, 0x3, 0x1) getsockopt$inet_IP_IPSEC_POLICY(r6, 0x0, 0x10, &(0x7f0000000540)={{{@in=@initdev, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@broadcast}}, &(0x7f0000000640)=0xe8) connect$unix(r0, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, &(0x7f00000000c0)={0x1}) socket$isdn_base(0x22, 0x3, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNLIST(0xffffffffffffffff, 0x800443d2, &(0x7f00000002c0)={0x3, &(0x7f0000000280)=[{}, {}, {}]}) r8 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r8, 0x28, 0x6, &(0x7f0000000040), 0x5bd706a31ce31a6e) clock_gettime(0x0, &(0x7f0000000080)) getresuid(&(0x7f0000000180), &(0x7f00000001c0)=0x0, &(0x7f0000000200)=0x0) mount$overlay(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='overlay\x00', 0x80443, &(0x7f0000000380)=ANY=[@ANYRESDEC=r9, @ANYRESDEC=r10, @ANYRES64=r7]) 10:18:28 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f00000000c0)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a00)={[{@discard='discard'}]}) 10:18:28 executing program 4: r0 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r0, 0x40a85321, &(0x7f0000000180)={0x40000000080, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbf00]}) 10:18:29 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SMI(0xffffffffffffffff, 0xaeb7) ioctl$KVM_RUN(r2, 0x4004ae8b, 0x0) 10:18:29 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000340)={0x0, 0x1, 0x1000, 0x2000, &(0x7f0000007000/0x2000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000000e000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000040)="6bae12ae00b880008ec8f30f2353660f6fea670f0fcfb6ba4200ec64f40f06ba420066b8df1301dc66efbad10466b8ca00000066ef", 0x35}], 0x1, 0x0, &(0x7f0000000000), 0x0) r3 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x9, 0x10180) sched_setscheduler(0x0, 0x2, &(0x7f00000001c0)=0x5) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) r4 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(r4, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) r5 = gettid() ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(0xffffffffffffffff, 0xc1105517, &(0x7f0000000680)={{0x0, 0x5, 0x0, 0x0, 'syz0\x00', 0x9a69}, 0x0, 0x0, 0x0, r5, 0x4, 0x0, 'syz1\x00', &(0x7f0000000280)=['/dev/dmmidi#\x00', '=%):%%mime_type^\x00', 'keyringselinuxsecuritymd5sumppp1\x00', '}},\x00'], 0x43, [], [0x0, 0x0, 0x3]}) syz_emit_ethernet(0x46, &(0x7f0000000600)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "645cde", 0x10, 0x11, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000, 0x0, 0x0, 0x0, 0x0, 0x8848]}, @ipv4, {[], @dccp={{0x0, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "ffcba1", 0x0, "713af2"}}}}}}}, &(0x7f0000000040)={0x0, 0x3, [0x0, 0xfffffffffffffffd]}) mknod(&(0x7f0000000440)='./file0/file1\x00', 0x0, 0x0) sched_rr_get_interval(r5, &(0x7f0000000400)) setsockopt$RDS_CONG_MONITOR(r3, 0x114, 0x6, &(0x7f0000000080), 0x4) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) write$P9_RUNLINKAT(r3, &(0x7f00000000c0)={0x7, 0x4d, 0x1}, 0x7) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000005000/0x18000)=nil, &(0x7f0000000240)=[@text32={0x20, &(0x7f00000000c0)="f20f5824900f4b360f31660f01dec4c2d5400e8fe950903558000000b9cd0800000f32b9800000c00f3235000100000f30c4e195ed2367660f38827b36", 0x3d}], 0x1, 0x8, &(0x7f00000001c0), 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 10:18:29 executing program 1: socketpair$unix(0x1, 0x4000000000002, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ubi_ctrl\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x4000, 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r4, 0x5423, &(0x7f0000000100)=0x14) epoll_create1(0x80000) getsockopt$inet_sctp_SCTP_PR_STREAM_STATUS(r3, 0x84, 0x74, 0x0, &(0x7f00000001c0)) r5 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/avc/hash_stats\x00', 0x0, 0x0) r6 = openat$cgroup_ro(r5, 0x0, 0x0, 0x0) close(r4) perf_event_open(&(0x7f0000000300)={0x0, 0x70, 0x0, 0x0, 0x100, 0x0, 0x0, 0x3, 0x40, 0x2, 0x0, 0x0, 0x2, 0x662, 0x0, 0x0, 0x783, 0x3, 0x0, 0x0, 0x401, 0x0, 0x0, 0x20, 0x9, 0x4, 0xf802, 0x37b800, 0x0, 0x0, 0x7, 0x0, 0x0, 0x6, 0x100000000, 0x0, 0x5, 0xfffffffffffffffa, 0x0, 0x6, 0x4, @perf_config_ext, 0x1000, 0x0, 0x0, 0x0, 0x401, 0x23837179, 0x4a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$can_raw(0x1d, 0x3, 0x1) getsockopt$inet_IP_IPSEC_POLICY(r6, 0x0, 0x10, &(0x7f0000000540)={{{@in=@initdev, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@broadcast}}, &(0x7f0000000640)=0xe8) connect$unix(r0, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, &(0x7f00000000c0)={0x1}) socket$isdn_base(0x22, 0x3, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNLIST(0xffffffffffffffff, 0x800443d2, &(0x7f00000002c0)={0x3, &(0x7f0000000280)=[{}, {}, {}]}) r8 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r8, 0x28, 0x6, &(0x7f0000000040), 0x5bd706a31ce31a6e) clock_gettime(0x0, &(0x7f0000000080)) getresuid(&(0x7f0000000180), &(0x7f00000001c0)=0x0, &(0x7f0000000200)=0x0) mount$overlay(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='overlay\x00', 0x80443, &(0x7f0000000380)=ANY=[@ANYRESDEC=r9, @ANYRESDEC=r10, @ANYRES64=r7]) 10:18:29 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000340)={0x0, 0x1, 0x1000, 0x2000, &(0x7f0000007000/0x2000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000000e000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000040)="6bae12ae00b880008ec8f30f2353660f6fea670f0fcfb6ba4200ec64f40f06ba420066b8df1301dc66efbad10466b8ca00000066ef", 0x35}], 0x1, 0x0, &(0x7f0000000000), 0x0) r3 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x9, 0x10180) sched_setscheduler(0x0, 0x2, &(0x7f00000001c0)=0x5) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) r4 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(r4, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) r5 = gettid() ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(0xffffffffffffffff, 0xc1105517, &(0x7f0000000680)={{0x0, 0x5, 0x0, 0x0, 'syz0\x00', 0x9a69}, 0x0, 0x0, 0x0, r5, 0x4, 0x0, 'syz1\x00', &(0x7f0000000280)=['/dev/dmmidi#\x00', '=%):%%mime_type^\x00', 'keyringselinuxsecuritymd5sumppp1\x00', '}},\x00'], 0x43, [], [0x0, 0x0, 0x3]}) syz_emit_ethernet(0x46, &(0x7f0000000600)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "645cde", 0x10, 0x11, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000, 0x0, 0x0, 0x0, 0x0, 0x8848]}, @ipv4, {[], @dccp={{0x0, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "ffcba1", 0x0, "713af2"}}}}}}}, &(0x7f0000000040)={0x0, 0x3, [0x0, 0xfffffffffffffffd]}) mknod(&(0x7f0000000440)='./file0/file1\x00', 0x0, 0x0) sched_rr_get_interval(r5, &(0x7f0000000400)) setsockopt$RDS_CONG_MONITOR(r3, 0x114, 0x6, &(0x7f0000000080), 0x4) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) write$P9_RUNLINKAT(r3, &(0x7f00000000c0)={0x7, 0x4d, 0x1}, 0x7) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000005000/0x18000)=nil, &(0x7f0000000240)=[@text32={0x20, &(0x7f00000000c0)="f20f5824900f4b360f31660f01dec4c2d5400e8fe950903558000000b9cd0800000f32b9800000c00f3235000100000f30c4e195ed2367660f38827b36", 0x3d}], 0x1, 0x8, &(0x7f00000001c0), 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 10:18:29 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002840)={[{@max_inline={'max_inline'}}]}) 10:18:29 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000180)="2e0000002e008183ad5de0713c444d000600000010000340c00000000000000037113e370000000000000000d1bd", 0x2e}], 0x1}, 0x0) 10:18:29 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$inet6(0xa, 0x1, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000000c0)={'bridge0\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0xf000}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)=@bridge_delneigh={0x28, 0x1c, 0xf07, 0x0, 0x0, {0x7, 0x0, 0x0, r3, 0x3e0, 0xf}, [@NDA_LLADDR={0xa, 0x2, @local}]}, 0x28}}, 0x0) 10:18:29 executing program 1: socketpair$unix(0x1, 0x4000000000002, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ubi_ctrl\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x4000, 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r4, 0x5423, &(0x7f0000000100)=0x14) epoll_create1(0x80000) getsockopt$inet_sctp_SCTP_PR_STREAM_STATUS(r3, 0x84, 0x74, 0x0, &(0x7f00000001c0)) r5 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/avc/hash_stats\x00', 0x0, 0x0) r6 = openat$cgroup_ro(r5, 0x0, 0x0, 0x0) close(r4) perf_event_open(&(0x7f0000000300)={0x0, 0x70, 0x0, 0x0, 0x100, 0x0, 0x0, 0x3, 0x40, 0x2, 0x0, 0x0, 0x2, 0x662, 0x0, 0x0, 0x783, 0x3, 0x0, 0x0, 0x401, 0x0, 0x0, 0x20, 0x9, 0x4, 0xf802, 0x37b800, 0x0, 0x0, 0x7, 0x0, 0x0, 0x6, 0x100000000, 0x0, 0x5, 0xfffffffffffffffa, 0x0, 0x6, 0x4, @perf_config_ext, 0x1000, 0x0, 0x0, 0x0, 0x401, 0x23837179, 0x4a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$can_raw(0x1d, 0x3, 0x1) getsockopt$inet_IP_IPSEC_POLICY(r6, 0x0, 0x10, &(0x7f0000000540)={{{@in=@initdev, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@broadcast}}, &(0x7f0000000640)=0xe8) connect$unix(r0, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, &(0x7f00000000c0)={0x1}) socket$isdn_base(0x22, 0x3, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNLIST(0xffffffffffffffff, 0x800443d2, &(0x7f00000002c0)={0x3, &(0x7f0000000280)=[{}, {}, {}]}) r8 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r8, 0x28, 0x6, &(0x7f0000000040), 0x5bd706a31ce31a6e) clock_gettime(0x0, &(0x7f0000000080)) getresuid(&(0x7f0000000180), &(0x7f00000001c0)=0x0, &(0x7f0000000200)=0x0) mount$overlay(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='overlay\x00', 0x80443, &(0x7f0000000380)=ANY=[@ANYRESDEC=r9, @ANYRESDEC=r10, @ANYRES64=r7]) 10:18:29 executing program 4: timer_settime(0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000001300)={0xffffffffffffffff, 0xffffffffffffffff}) flock(0xffffffffffffffff, 0x4004000000001) flock(r0, 0x2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) flock(r1, 0x7fffffffffeffffd) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f00000000c0)) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000100)=0x0) kcmp(0x0, r2, 0x0, r0, 0xffffffffffffffff) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000000)=""/148, 0x94}], 0x5e, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000300)='net/arp\x00') preadv(r3, &(0x7f0000000700), 0x31f, 0x10400003) 10:18:29 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) capset(&(0x7f00001e8ff8)={0x19980330}, &(0x7f0000032fe8)) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000080)={@loopback, 0x0, 0x2}, 0x20) 10:18:29 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000340)={0x0, 0x1, 0x1000, 0x2000, &(0x7f0000007000/0x2000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000000e000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000040)="6bae12ae00b880008ec8f30f2353660f6fea670f0fcfb6ba4200ec64f40f06ba420066b8df1301dc66efbad10466b8ca00000066ef", 0x35}], 0x1, 0x0, &(0x7f0000000000), 0x0) r3 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x9, 0x10180) sched_setscheduler(0x0, 0x2, &(0x7f00000001c0)=0x5) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) r4 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(r4, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) r5 = gettid() ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(0xffffffffffffffff, 0xc1105517, &(0x7f0000000680)={{0x0, 0x5, 0x0, 0x0, 'syz0\x00', 0x9a69}, 0x0, 0x0, 0x0, r5, 0x4, 0x0, 'syz1\x00', &(0x7f0000000280)=['/dev/dmmidi#\x00', '=%):%%mime_type^\x00', 'keyringselinuxsecuritymd5sumppp1\x00', '}},\x00'], 0x43, [], [0x0, 0x0, 0x3]}) syz_emit_ethernet(0x46, &(0x7f0000000600)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "645cde", 0x10, 0x11, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000, 0x0, 0x0, 0x0, 0x0, 0x8848]}, @ipv4, {[], @dccp={{0x0, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "ffcba1", 0x0, "713af2"}}}}}}}, &(0x7f0000000040)={0x0, 0x3, [0x0, 0xfffffffffffffffd]}) mknod(&(0x7f0000000440)='./file0/file1\x00', 0x0, 0x0) sched_rr_get_interval(r5, &(0x7f0000000400)) setsockopt$RDS_CONG_MONITOR(r3, 0x114, 0x6, &(0x7f0000000080), 0x4) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) write$P9_RUNLINKAT(r3, &(0x7f00000000c0)={0x7, 0x4d, 0x1}, 0x7) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000005000/0x18000)=nil, &(0x7f0000000240)=[@text32={0x20, &(0x7f00000000c0)="f20f5824900f4b360f31660f01dec4c2d5400e8fe950903558000000b9cd0800000f32b9800000c00f3235000100000f30c4e195ed2367660f38827b36", 0x3d}], 0x1, 0x8, &(0x7f00000001c0), 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 10:18:29 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) capset(&(0x7f00001e8ff8)={0x19980330}, &(0x7f0000032fe8)) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000080)={@loopback, 0x0, 0x2}, 0x20) [ 1632.818024] bridge: RTM_NEWNEIGH bridge0 with NTF_USE is not supported 10:18:29 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000180)="2e0000002e008183ad5de0713c444d000600000010000340c00000000000000037113e370000000000000000d1bd", 0x2e}], 0x1}, 0x0) 10:18:29 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$inet6(0xa, 0x1, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000000c0)={'bridge0\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0xf000}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)=@bridge_delneigh={0x28, 0x1c, 0xf07, 0x0, 0x0, {0x7, 0x0, 0x0, r3, 0x3e0, 0xf}, [@NDA_LLADDR={0xa, 0x2, @local}]}, 0x28}}, 0x0) 10:18:29 executing program 4: timer_settime(0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000001300)={0xffffffffffffffff, 0xffffffffffffffff}) flock(0xffffffffffffffff, 0x4004000000001) flock(r0, 0x2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) flock(r1, 0x7fffffffffeffffd) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f00000000c0)) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000100)=0x0) kcmp(0x0, r2, 0x0, r0, 0xffffffffffffffff) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000000)=""/148, 0x94}], 0x5e, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000300)='net/arp\x00') preadv(r3, &(0x7f0000000700), 0x31f, 0x10400003) 10:18:29 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000340)={0x0, 0x1, 0x1000, 0x2000, &(0x7f0000007000/0x2000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000000e000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000040)="6bae12ae00b880008ec8f30f2353660f6fea670f0fcfb6ba4200ec64f40f06ba420066b8df1301dc66efbad10466b8ca00000066ef", 0x35}], 0x1, 0x0, &(0x7f0000000000), 0x0) r3 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x9, 0x10180) sched_setscheduler(0x0, 0x2, &(0x7f00000001c0)=0x5) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) r4 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(r4, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) r5 = gettid() ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(0xffffffffffffffff, 0xc1105517, &(0x7f0000000680)={{0x0, 0x5, 0x0, 0x0, 'syz0\x00', 0x9a69}, 0x0, 0x0, 0x0, r5, 0x4, 0x0, 'syz1\x00', &(0x7f0000000280)=['/dev/dmmidi#\x00', '=%):%%mime_type^\x00', 'keyringselinuxsecuritymd5sumppp1\x00', '}},\x00'], 0x43, [], [0x0, 0x0, 0x3]}) syz_emit_ethernet(0x46, &(0x7f0000000600)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "645cde", 0x10, 0x11, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000, 0x0, 0x0, 0x0, 0x0, 0x8848]}, @ipv4, {[], @dccp={{0x0, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "ffcba1", 0x0, "713af2"}}}}}}}, &(0x7f0000000040)={0x0, 0x3, [0x0, 0xfffffffffffffffd]}) mknod(&(0x7f0000000440)='./file0/file1\x00', 0x0, 0x0) sched_rr_get_interval(r5, &(0x7f0000000400)) setsockopt$RDS_CONG_MONITOR(r3, 0x114, 0x6, &(0x7f0000000080), 0x4) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) write$P9_RUNLINKAT(r3, &(0x7f00000000c0)={0x7, 0x4d, 0x1}, 0x7) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000005000/0x18000)=nil, &(0x7f0000000240)=[@text32={0x20, &(0x7f00000000c0)="f20f5824900f4b360f31660f01dec4c2d5400e8fe950903558000000b9cd0800000f32b9800000c00f3235000100000f30c4e195ed2367660f38827b36", 0x3d}], 0x1, 0x8, &(0x7f00000001c0), 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 10:18:29 executing program 1: timer_settime(0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000001300)={0xffffffffffffffff, 0xffffffffffffffff}) flock(0xffffffffffffffff, 0x4004000000001) flock(r0, 0x2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) flock(r1, 0x7fffffffffeffffd) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f00000000c0)) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000100)=0x0) kcmp(0x0, r2, 0x0, r0, 0xffffffffffffffff) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000000)=""/148, 0x94}], 0x5e, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000300)='net/arp\x00') preadv(r3, &(0x7f0000000700), 0x31f, 0x10400003) 10:18:29 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) capset(&(0x7f00001e8ff8)={0x19980330}, &(0x7f0000032fe8)) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000080)={@loopback, 0x0, 0x2}, 0x20) 10:18:29 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000180)="2e0000002e008183ad5de0713c444d000600000010000340c00000000000000037113e370000000000000000d1bd", 0x2e}], 0x1}, 0x0) [ 1633.077235] bridge: RTM_NEWNEIGH bridge0 with NTF_USE is not supported 10:18:29 executing program 1: timer_settime(0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000001300)={0xffffffffffffffff, 0xffffffffffffffff}) flock(0xffffffffffffffff, 0x4004000000001) flock(r0, 0x2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) flock(r1, 0x7fffffffffeffffd) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f00000000c0)) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000100)=0x0) kcmp(0x0, r2, 0x0, r0, 0xffffffffffffffff) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000000)=""/148, 0x94}], 0x5e, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000300)='net/arp\x00') preadv(r3, &(0x7f0000000700), 0x31f, 0x10400003) 10:18:30 executing program 4: timer_settime(0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000001300)={0xffffffffffffffff, 0xffffffffffffffff}) flock(0xffffffffffffffff, 0x4004000000001) flock(r0, 0x2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) flock(r1, 0x7fffffffffeffffd) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f00000000c0)) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000100)=0x0) kcmp(0x0, r2, 0x0, r0, 0xffffffffffffffff) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000000)=""/148, 0x94}], 0x5e, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000300)='net/arp\x00') preadv(r3, &(0x7f0000000700), 0x31f, 0x10400003) 10:18:30 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$inet6(0xa, 0x1, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000000c0)={'bridge0\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0xf000}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)=@bridge_delneigh={0x28, 0x1c, 0xf07, 0x0, 0x0, {0x7, 0x0, 0x0, r3, 0x3e0, 0xf}, [@NDA_LLADDR={0xa, 0x2, @local}]}, 0x28}}, 0x0) 10:18:30 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) capset(&(0x7f00001e8ff8)={0x19980330}, &(0x7f0000032fe8)) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000080)={@loopback, 0x0, 0x2}, 0x20) 10:18:30 executing program 2: timer_settime(0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000001300)={0xffffffffffffffff, 0xffffffffffffffff}) flock(0xffffffffffffffff, 0x4004000000001) flock(r0, 0x2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) flock(r1, 0x7fffffffffeffffd) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f00000000c0)) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000100)=0x0) kcmp(0x0, r2, 0x0, r0, 0xffffffffffffffff) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000000)=""/148, 0x94}], 0x5e, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000300)='net/arp\x00') preadv(r3, &(0x7f0000000700), 0x31f, 0x10400003) 10:18:30 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000180)="2e0000002e008183ad5de0713c444d000600000010000340c00000000000000037113e370000000000000000d1bd", 0x2e}], 0x1}, 0x0) 10:18:30 executing program 4: timer_settime(0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000001300)={0xffffffffffffffff, 0xffffffffffffffff}) flock(0xffffffffffffffff, 0x4004000000001) flock(r0, 0x2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) flock(r1, 0x7fffffffffeffffd) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f00000000c0)) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000100)=0x0) kcmp(0x0, r2, 0x0, r0, 0xffffffffffffffff) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000000)=""/148, 0x94}], 0x5e, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000300)='net/arp\x00') preadv(r3, &(0x7f0000000700), 0x31f, 0x10400003) [ 1633.318233] bridge: RTM_NEWNEIGH bridge0 with NTF_USE is not supported 10:18:30 executing program 1: timer_settime(0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000001300)={0xffffffffffffffff, 0xffffffffffffffff}) flock(0xffffffffffffffff, 0x4004000000001) flock(r0, 0x2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) flock(r1, 0x7fffffffffeffffd) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f00000000c0)) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000100)=0x0) kcmp(0x0, r2, 0x0, r0, 0xffffffffffffffff) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000000)=""/148, 0x94}], 0x5e, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000300)='net/arp\x00') preadv(r3, &(0x7f0000000700), 0x31f, 0x10400003) 10:18:30 executing program 0: socket$kcm(0x10, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x802, 0x0) ioctl$BLKZEROOUT(r1, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) fchdir(r0) r2 = open(&(0x7f0000000100)='.\x00', 0x0, 0x0) ioctl$KVM_GET_XCRS(r2, 0x8188aea6, &(0x7f0000000200)=ANY=[@ANYBLOB]) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSARP(r3, 0x8955, &(0x7f0000000180)={{}, {0x20000000304, @random="2d3b18abbbff"}, 0x0, {0x2, 0x0, @local}, '\x00\x00\x00\xfd\xfd\xff\xff\x00'}) symlinkat(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r2, &(0x7f0000000300)='./file2\x00') ioctl$DRM_IOCTL_AUTH_MAGIC(r2, 0x40046411, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r2, 0x7706, &(0x7f00000000c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$RXRPC_MIN_SECURITY_LEVEL(r2, 0x110, 0x4, &(0x7f0000000240)=0x2, 0x4) 10:18:30 executing program 2: timer_settime(0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000001300)={0xffffffffffffffff, 0xffffffffffffffff}) flock(0xffffffffffffffff, 0x4004000000001) flock(r0, 0x2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) flock(r1, 0x7fffffffffeffffd) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f00000000c0)) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000100)=0x0) kcmp(0x0, r2, 0x0, r0, 0xffffffffffffffff) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000000)=""/148, 0x94}], 0x5e, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000300)='net/arp\x00') preadv(r3, &(0x7f0000000700), 0x31f, 0x10400003) 10:18:30 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$inet6(0xa, 0x1, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000000c0)={'bridge0\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0xf000}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)=@bridge_delneigh={0x28, 0x1c, 0xf07, 0x0, 0x0, {0x7, 0x0, 0x0, r3, 0x3e0, 0xf}, [@NDA_LLADDR={0xa, 0x2, @local}]}, 0x28}}, 0x0) 10:18:30 executing program 3: r0 = socket$inet_sctp(0x2, 0x800000000001, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000094000)=[@in={0x2, 0x0, @loopback}], 0x10) connect$inet(r0, &(0x7f0000f6fff0)={0x2, 0x4e23, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) listen(r0, 0x11000000000b) accept(r0, &(0x7f00000011c0)=ANY=[], &(0x7f0000123000)) listen(r0, 0x0) sendto$inet(r0, &(0x7f00000000c0)="cf", 0x1, 0x0, &(0x7f0000a04000)={0x2, 0x4e23, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x4) writev(r1, &(0x7f000051c000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d8c560284470080ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) 10:18:30 executing program 4: r0 = socket$unix(0x1, 0x800000001, 0x0) socketpair$unix(0x1, 0x80000000003, 0x0, &(0x7f0000000000)={0x0, 0x0}) bind$unix(r0, &(0x7f0000003100)=@file={0x1, './file0\x00'}, 0x6e) sendmmsg(r1, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 10:18:30 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000880)={'syz0\x00'}, 0x45c) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) readv(r0, &(0x7f0000000000)=[{&(0x7f00000001c0)=""/166, 0xa6}], 0x1) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00000002c0)) dup2(r2, r1) r3 = gettid() timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) dup2(r1, r0) tkill(r3, 0x15) 10:18:30 executing program 2: timer_settime(0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000001300)={0xffffffffffffffff, 0xffffffffffffffff}) flock(0xffffffffffffffff, 0x4004000000001) flock(r0, 0x2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) flock(r1, 0x7fffffffffeffffd) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f00000000c0)) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000100)=0x0) kcmp(0x0, r2, 0x0, r0, 0xffffffffffffffff) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000000)=""/148, 0x94}], 0x5e, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000300)='net/arp\x00') preadv(r3, &(0x7f0000000700), 0x31f, 0x10400003) 10:18:30 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000100)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, 0x0) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) add_key(0x0, &(0x7f0000001a40)={'syz', 0x1}, &(0x7f0000001a80)="b7feb58638d4bf8dfafcdf7772f14b127341adba280fd79cc810085b0ac4a6bfbb03a22eb9a4958ee8a0a188e794bbb9b639d06a55c12aa11948cb5383795501baf9981e1311d8dc95625005158c4b946a262a479d121a16b13e6c163a73", 0x5e, 0xfffffffffffffff8) getegid() ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000200)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) prctl$PR_CAPBSET_READ(0x17, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000740)={0x0, 0x16f, "d4b720fb1cc6b2f4830cf3531b0dad38b0c678e3f5c9d10c5584d2f39b8239bdc8e6cac98073c748fcabc0b5b88acbbb39c31e0ab02ad731fc71c6c19fce17cce1313a001ab7dd5d8c1602e1607dbc9fc640a357510a3f12e679903ba059e77c0e5200350d8384c9c94ef45b62b3548b903624a5915904615a26963b8964a49865661c8b9a717030452161ab4c0a171c98f8f9b1e19bcfd585125450fbab409976eb17a5e28de9a0e337a0b1edbad2c23e486e0db2af6c621d7ed5a56e5c59c81221a6f8d8d583e75717282fb55cc6d2c57c64cad41752c70e59e9ae873312fe9cc4b31dd4ed691d1da0d7133acba9865bef12e60f21e36845c9802f4e961a27bf465c878b6995347b5135e159563800d695a70a428f4129600f7e6ee2f7c7392f5c852bb1600a11ccf7f1705071a59aa08cb9b029834d48bfc73ecd741e654a8d2f169a0b599e94d7cc740f6407eb7dc6434a0c832be4c39e18fdb9e927c2817d1b044f42d0896cf952f794a7e8ad"}, 0x0) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000340)=@assoc_value={r2}, 0x8) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') keyctl$unlink(0x9, r1, 0xfffffffffffffffd) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) getegid() syz_genetlink_get_family_id$nbd(&(0x7f0000000140)='nbd\x00') sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0x4) fcntl$dupfd(r0, 0x0, r0) [ 1633.663239] bridge: RTM_NEWNEIGH bridge0 with NTF_USE is not supported 10:18:30 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_int(r1, 0x29, 0x10, &(0x7f0000b67000), &(0x7f00007d0000)=0x2fd71482) 10:18:30 executing program 4: r0 = socket$unix(0x1, 0x800000001, 0x0) socketpair$unix(0x1, 0x80000000003, 0x0, &(0x7f0000000000)={0x0, 0x0}) bind$unix(r0, &(0x7f0000003100)=@file={0x1, './file0\x00'}, 0x6e) sendmmsg(r1, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 10:18:30 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_int(r1, 0x29, 0x10, &(0x7f0000b67000), &(0x7f00007d0000)=0x2fd71482) 10:18:30 executing program 2: r0 = epoll_create1(0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = eventfd(0x0) ioctl$KVM_IRQFD(r2, 0x4020ae76, &(0x7f0000000080)={r3}) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r3, &(0x7f0000000040)={0x10000000}) write$eventfd(r3, &(0x7f0000000100), 0x8) 10:18:30 executing program 0: socket$kcm(0x10, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x802, 0x0) ioctl$BLKZEROOUT(r1, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) fchdir(r0) r2 = open(&(0x7f0000000100)='.\x00', 0x0, 0x0) ioctl$KVM_GET_XCRS(r2, 0x8188aea6, &(0x7f0000000200)=ANY=[@ANYBLOB]) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSARP(r3, 0x8955, &(0x7f0000000180)={{}, {0x20000000304, @random="2d3b18abbbff"}, 0x0, {0x2, 0x0, @local}, '\x00\x00\x00\xfd\xfd\xff\xff\x00'}) symlinkat(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r2, &(0x7f0000000300)='./file2\x00') ioctl$DRM_IOCTL_AUTH_MAGIC(r2, 0x40046411, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r2, 0x7706, &(0x7f00000000c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$RXRPC_MIN_SECURITY_LEVEL(r2, 0x110, 0x4, &(0x7f0000000240)=0x2, 0x4) 10:18:30 executing program 4: r0 = socket$unix(0x1, 0x800000001, 0x0) socketpair$unix(0x1, 0x80000000003, 0x0, &(0x7f0000000000)={0x0, 0x0}) bind$unix(r0, &(0x7f0000003100)=@file={0x1, './file0\x00'}, 0x6e) sendmmsg(r1, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 10:18:30 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_int(r1, 0x29, 0x10, &(0x7f0000b67000), &(0x7f00007d0000)=0x2fd71482) 10:18:31 executing program 2: r0 = epoll_create1(0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = eventfd(0x0) ioctl$KVM_IRQFD(r2, 0x4020ae76, &(0x7f0000000080)={r3}) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r3, &(0x7f0000000040)={0x10000000}) write$eventfd(r3, &(0x7f0000000100), 0x8) 10:18:31 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000100)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, 0x0) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) add_key(0x0, &(0x7f0000001a40)={'syz', 0x1}, &(0x7f0000001a80)="b7feb58638d4bf8dfafcdf7772f14b127341adba280fd79cc810085b0ac4a6bfbb03a22eb9a4958ee8a0a188e794bbb9b639d06a55c12aa11948cb5383795501baf9981e1311d8dc95625005158c4b946a262a479d121a16b13e6c163a73", 0x5e, 0xfffffffffffffff8) getegid() ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000200)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) prctl$PR_CAPBSET_READ(0x17, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000740)={0x0, 0x16f, "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"}, 0x0) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000340)=@assoc_value={r2}, 0x8) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') keyctl$unlink(0x9, r1, 0xfffffffffffffffd) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) getegid() syz_genetlink_get_family_id$nbd(&(0x7f0000000140)='nbd\x00') sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0x4) fcntl$dupfd(r0, 0x0, r0) 10:18:31 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_int(r1, 0x29, 0x10, &(0x7f0000b67000), &(0x7f00007d0000)=0x2fd71482) 10:18:31 executing program 4: r0 = socket$unix(0x1, 0x800000001, 0x0) socketpair$unix(0x1, 0x80000000003, 0x0, &(0x7f0000000000)={0x0, 0x0}) bind$unix(r0, &(0x7f0000003100)=@file={0x1, './file0\x00'}, 0x6e) sendmmsg(r1, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 10:18:31 executing program 0: socket$kcm(0x10, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x802, 0x0) ioctl$BLKZEROOUT(r1, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) fchdir(r0) r2 = open(&(0x7f0000000100)='.\x00', 0x0, 0x0) ioctl$KVM_GET_XCRS(r2, 0x8188aea6, &(0x7f0000000200)=ANY=[@ANYBLOB]) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSARP(r3, 0x8955, &(0x7f0000000180)={{}, {0x20000000304, @random="2d3b18abbbff"}, 0x0, {0x2, 0x0, @local}, '\x00\x00\x00\xfd\xfd\xff\xff\x00'}) symlinkat(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r2, &(0x7f0000000300)='./file2\x00') ioctl$DRM_IOCTL_AUTH_MAGIC(r2, 0x40046411, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r2, 0x7706, &(0x7f00000000c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$RXRPC_MIN_SECURITY_LEVEL(r2, 0x110, 0x4, &(0x7f0000000240)=0x2, 0x4) 10:18:31 executing program 3: r0 = socket$inet_sctp(0x2, 0x800000000001, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000094000)=[@in={0x2, 0x0, @loopback}], 0x10) connect$inet(r0, &(0x7f0000f6fff0)={0x2, 0x4e23, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) listen(r0, 0x11000000000b) accept(r0, &(0x7f00000011c0)=ANY=[], &(0x7f0000123000)) listen(r0, 0x0) sendto$inet(r0, &(0x7f00000000c0)="cf", 0x1, 0x0, &(0x7f0000a04000)={0x2, 0x4e23, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x4) writev(r1, &(0x7f000051c000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d8c560284470080ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) 10:18:31 executing program 2: r0 = epoll_create1(0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = eventfd(0x0) ioctl$KVM_IRQFD(r2, 0x4020ae76, &(0x7f0000000080)={r3}) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r3, &(0x7f0000000040)={0x10000000}) write$eventfd(r3, &(0x7f0000000100), 0x8) 10:18:31 executing program 4: r0 = socket$inet_sctp(0x2, 0x800000000001, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000094000)=[@in={0x2, 0x0, @loopback}], 0x10) connect$inet(r0, &(0x7f0000f6fff0)={0x2, 0x4e23, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) listen(r0, 0x11000000000b) accept(r0, &(0x7f00000011c0)=ANY=[], &(0x7f0000123000)) listen(r0, 0x0) sendto$inet(r0, &(0x7f00000000c0)="cf", 0x1, 0x0, &(0x7f0000a04000)={0x2, 0x4e23, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x4) writev(r1, &(0x7f000051c000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d8c560284470080ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) 10:18:31 executing program 5: r0 = socket$inet_sctp(0x2, 0x800000000001, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000094000)=[@in={0x2, 0x0, @loopback}], 0x10) connect$inet(r0, &(0x7f0000f6fff0)={0x2, 0x4e23, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) listen(r0, 0x11000000000b) accept(r0, &(0x7f00000011c0)=ANY=[], &(0x7f0000123000)) listen(r0, 0x0) sendto$inet(r0, &(0x7f00000000c0)="cf", 0x1, 0x0, &(0x7f0000a04000)={0x2, 0x4e23, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x4) writev(r1, &(0x7f000051c000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d8c560284470080ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) 10:18:31 executing program 2: r0 = epoll_create1(0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = eventfd(0x0) ioctl$KVM_IRQFD(r2, 0x4020ae76, &(0x7f0000000080)={r3}) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r3, &(0x7f0000000040)={0x10000000}) write$eventfd(r3, &(0x7f0000000100), 0x8) 10:18:31 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000100)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, 0x0) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) add_key(0x0, &(0x7f0000001a40)={'syz', 0x1}, &(0x7f0000001a80)="b7feb58638d4bf8dfafcdf7772f14b127341adba280fd79cc810085b0ac4a6bfbb03a22eb9a4958ee8a0a188e794bbb9b639d06a55c12aa11948cb5383795501baf9981e1311d8dc95625005158c4b946a262a479d121a16b13e6c163a73", 0x5e, 0xfffffffffffffff8) getegid() ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000200)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) prctl$PR_CAPBSET_READ(0x17, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000740)={0x0, 0x16f, "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"}, 0x0) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000340)=@assoc_value={r2}, 0x8) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') keyctl$unlink(0x9, r1, 0xfffffffffffffffd) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) getegid() syz_genetlink_get_family_id$nbd(&(0x7f0000000140)='nbd\x00') sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0x4) fcntl$dupfd(r0, 0x0, r0) 10:18:31 executing program 2: r0 = socket$inet_sctp(0x2, 0x800000000001, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000094000)=[@in={0x2, 0x0, @loopback}], 0x10) connect$inet(r0, &(0x7f0000f6fff0)={0x2, 0x4e23, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) listen(r0, 0x11000000000b) accept(r0, &(0x7f00000011c0)=ANY=[], &(0x7f0000123000)) listen(r0, 0x0) sendto$inet(r0, &(0x7f00000000c0)="cf", 0x1, 0x0, &(0x7f0000a04000)={0x2, 0x4e23, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x4) writev(r1, &(0x7f000051c000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d8c560284470080ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) 10:18:31 executing program 0: socket$kcm(0x10, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x802, 0x0) ioctl$BLKZEROOUT(r1, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) fchdir(r0) r2 = open(&(0x7f0000000100)='.\x00', 0x0, 0x0) ioctl$KVM_GET_XCRS(r2, 0x8188aea6, &(0x7f0000000200)=ANY=[@ANYBLOB]) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSARP(r3, 0x8955, &(0x7f0000000180)={{}, {0x20000000304, @random="2d3b18abbbff"}, 0x0, {0x2, 0x0, @local}, '\x00\x00\x00\xfd\xfd\xff\xff\x00'}) symlinkat(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r2, &(0x7f0000000300)='./file2\x00') ioctl$DRM_IOCTL_AUTH_MAGIC(r2, 0x40046411, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r2, 0x7706, &(0x7f00000000c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$RXRPC_MIN_SECURITY_LEVEL(r2, 0x110, 0x4, &(0x7f0000000240)=0x2, 0x4) 10:18:31 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000100)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, 0x0) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) add_key(0x0, &(0x7f0000001a40)={'syz', 0x1}, &(0x7f0000001a80)="b7feb58638d4bf8dfafcdf7772f14b127341adba280fd79cc810085b0ac4a6bfbb03a22eb9a4958ee8a0a188e794bbb9b639d06a55c12aa11948cb5383795501baf9981e1311d8dc95625005158c4b946a262a479d121a16b13e6c163a73", 0x5e, 0xfffffffffffffff8) getegid() ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000200)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) prctl$PR_CAPBSET_READ(0x17, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000740)={0x0, 0x16f, "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"}, 0x0) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000340)=@assoc_value={r2}, 0x8) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') keyctl$unlink(0x9, r1, 0xfffffffffffffffd) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) getegid() syz_genetlink_get_family_id$nbd(&(0x7f0000000140)='nbd\x00') sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0x4) fcntl$dupfd(r0, 0x0, r0) 10:18:32 executing program 1: r0 = socket$inet_sctp(0x2, 0x800000000001, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000094000)=[@in={0x2, 0x0, @loopback}], 0x10) connect$inet(r0, &(0x7f0000f6fff0)={0x2, 0x4e23, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) listen(r0, 0x11000000000b) accept(r0, &(0x7f00000011c0)=ANY=[], &(0x7f0000123000)) listen(r0, 0x0) sendto$inet(r0, &(0x7f00000000c0)="cf", 0x1, 0x0, &(0x7f0000a04000)={0x2, 0x4e23, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x4) writev(r1, &(0x7f000051c000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d8c560284470080ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) 10:18:32 executing program 3: r0 = socket$inet_sctp(0x2, 0x800000000001, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000094000)=[@in={0x2, 0x0, @loopback}], 0x10) connect$inet(r0, &(0x7f0000f6fff0)={0x2, 0x4e23, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) listen(r0, 0x11000000000b) accept(r0, &(0x7f00000011c0)=ANY=[], &(0x7f0000123000)) listen(r0, 0x0) sendto$inet(r0, &(0x7f00000000c0)="cf", 0x1, 0x0, &(0x7f0000a04000)={0x2, 0x4e23, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x4) writev(r1, &(0x7f000051c000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d8c560284470080ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) 10:18:32 executing program 4: r0 = socket$inet_sctp(0x2, 0x800000000001, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000094000)=[@in={0x2, 0x0, @loopback}], 0x10) connect$inet(r0, &(0x7f0000f6fff0)={0x2, 0x4e23, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) listen(r0, 0x11000000000b) accept(r0, &(0x7f00000011c0)=ANY=[], &(0x7f0000123000)) listen(r0, 0x0) sendto$inet(r0, &(0x7f00000000c0)="cf", 0x1, 0x0, &(0x7f0000a04000)={0x2, 0x4e23, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x4) writev(r1, &(0x7f000051c000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d8c560284470080ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) 10:18:32 executing program 5: r0 = socket$inet_sctp(0x2, 0x800000000001, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000094000)=[@in={0x2, 0x0, @loopback}], 0x10) connect$inet(r0, &(0x7f0000f6fff0)={0x2, 0x4e23, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) listen(r0, 0x11000000000b) accept(r0, &(0x7f00000011c0)=ANY=[], &(0x7f0000123000)) listen(r0, 0x0) sendto$inet(r0, &(0x7f00000000c0)="cf", 0x1, 0x0, &(0x7f0000a04000)={0x2, 0x4e23, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x4) writev(r1, &(0x7f000051c000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d8c560284470080ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) 10:18:32 executing program 0: socket$kcm(0x10, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x802, 0x0) ioctl$BLKZEROOUT(r1, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) fchdir(r0) r2 = open(&(0x7f0000000100)='.\x00', 0x0, 0x0) ioctl$KVM_GET_XCRS(r2, 0x8188aea6, &(0x7f0000000200)=ANY=[@ANYBLOB]) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSARP(r3, 0x8955, &(0x7f0000000180)={{}, {0x20000000304, @random="2d3b18abbbff"}, 0x0, {0x2, 0x0, @local}, '\x00\x00\x00\xfd\xfd\xff\xff\x00'}) symlinkat(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r2, &(0x7f0000000300)='./file2\x00') ioctl$DRM_IOCTL_AUTH_MAGIC(r2, 0x40046411, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r2, 0x7706, &(0x7f00000000c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$RXRPC_MIN_SECURITY_LEVEL(r2, 0x110, 0x4, &(0x7f0000000240)=0x2, 0x4) 10:18:32 executing program 2: r0 = socket$inet_sctp(0x2, 0x800000000001, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000094000)=[@in={0x2, 0x0, @loopback}], 0x10) connect$inet(r0, &(0x7f0000f6fff0)={0x2, 0x4e23, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) listen(r0, 0x11000000000b) accept(r0, &(0x7f00000011c0)=ANY=[], &(0x7f0000123000)) listen(r0, 0x0) sendto$inet(r0, &(0x7f00000000c0)="cf", 0x1, 0x0, &(0x7f0000a04000)={0x2, 0x4e23, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x4) writev(r1, &(0x7f000051c000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d8c560284470080ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) 10:18:32 executing program 0: socket$kcm(0x10, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x802, 0x0) ioctl$BLKZEROOUT(r1, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) fchdir(r0) r2 = open(&(0x7f0000000100)='.\x00', 0x0, 0x0) ioctl$KVM_GET_XCRS(r2, 0x8188aea6, &(0x7f0000000200)=ANY=[@ANYBLOB]) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSARP(r3, 0x8955, &(0x7f0000000180)={{}, {0x20000000304, @random="2d3b18abbbff"}, 0x0, {0x2, 0x0, @local}, '\x00\x00\x00\xfd\xfd\xff\xff\x00'}) symlinkat(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r2, &(0x7f0000000300)='./file2\x00') ioctl$DRM_IOCTL_AUTH_MAGIC(r2, 0x40046411, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r2, 0x7706, &(0x7f00000000c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$RXRPC_MIN_SECURITY_LEVEL(r2, 0x110, 0x4, &(0x7f0000000240)=0x2, 0x4) 10:18:33 executing program 1: r0 = socket$inet_sctp(0x2, 0x800000000001, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000094000)=[@in={0x2, 0x0, @loopback}], 0x10) connect$inet(r0, &(0x7f0000f6fff0)={0x2, 0x4e23, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) listen(r0, 0x11000000000b) accept(r0, &(0x7f00000011c0)=ANY=[], &(0x7f0000123000)) listen(r0, 0x0) sendto$inet(r0, &(0x7f00000000c0)="cf", 0x1, 0x0, &(0x7f0000a04000)={0x2, 0x4e23, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x4) writev(r1, &(0x7f000051c000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d8c560284470080ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) 10:18:33 executing program 0: socket$kcm(0x10, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x802, 0x0) ioctl$BLKZEROOUT(r1, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) fchdir(r0) r2 = open(&(0x7f0000000100)='.\x00', 0x0, 0x0) ioctl$KVM_GET_XCRS(r2, 0x8188aea6, &(0x7f0000000200)=ANY=[@ANYBLOB]) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSARP(r3, 0x8955, &(0x7f0000000180)={{}, {0x20000000304, @random="2d3b18abbbff"}, 0x0, {0x2, 0x0, @local}, '\x00\x00\x00\xfd\xfd\xff\xff\x00'}) symlinkat(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r2, &(0x7f0000000300)='./file2\x00') ioctl$DRM_IOCTL_AUTH_MAGIC(r2, 0x40046411, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r2, 0x7706, &(0x7f00000000c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$RXRPC_MIN_SECURITY_LEVEL(r2, 0x110, 0x4, &(0x7f0000000240)=0x2, 0x4) 10:18:33 executing program 3: r0 = socket$inet_sctp(0x2, 0x800000000001, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000094000)=[@in={0x2, 0x0, @loopback}], 0x10) connect$inet(r0, &(0x7f0000f6fff0)={0x2, 0x4e23, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) listen(r0, 0x11000000000b) accept(r0, &(0x7f00000011c0)=ANY=[], &(0x7f0000123000)) listen(r0, 0x0) sendto$inet(r0, &(0x7f00000000c0)="cf", 0x1, 0x0, &(0x7f0000a04000)={0x2, 0x4e23, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x4) writev(r1, &(0x7f000051c000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d8c560284470080ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) 10:18:33 executing program 4: r0 = socket$inet_sctp(0x2, 0x800000000001, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000094000)=[@in={0x2, 0x0, @loopback}], 0x10) connect$inet(r0, &(0x7f0000f6fff0)={0x2, 0x4e23, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) listen(r0, 0x11000000000b) accept(r0, &(0x7f00000011c0)=ANY=[], &(0x7f0000123000)) listen(r0, 0x0) sendto$inet(r0, &(0x7f00000000c0)="cf", 0x1, 0x0, &(0x7f0000a04000)={0x2, 0x4e23, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x4) writev(r1, &(0x7f000051c000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d8c560284470080ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) 10:18:33 executing program 5: r0 = socket$inet_sctp(0x2, 0x800000000001, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000094000)=[@in={0x2, 0x0, @loopback}], 0x10) connect$inet(r0, &(0x7f0000f6fff0)={0x2, 0x4e23, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) listen(r0, 0x11000000000b) accept(r0, &(0x7f00000011c0)=ANY=[], &(0x7f0000123000)) listen(r0, 0x0) sendto$inet(r0, &(0x7f00000000c0)="cf", 0x1, 0x0, &(0x7f0000a04000)={0x2, 0x4e23, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x4) writev(r1, &(0x7f000051c000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d8c560284470080ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) 10:18:33 executing program 0: r0 = epoll_create1(0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = eventfd(0x0) ioctl$KVM_IRQFD(r2, 0x4020ae76, &(0x7f0000000080)={r3}) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r3, &(0x7f0000000040)={0x10000000}) write$eventfd(r3, &(0x7f0000000100), 0x8) 10:18:33 executing program 2: r0 = socket$inet_sctp(0x2, 0x800000000001, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000094000)=[@in={0x2, 0x0, @loopback}], 0x10) connect$inet(r0, &(0x7f0000f6fff0)={0x2, 0x4e23, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) listen(r0, 0x11000000000b) accept(r0, &(0x7f00000011c0)=ANY=[], &(0x7f0000123000)) listen(r0, 0x0) sendto$inet(r0, &(0x7f00000000c0)="cf", 0x1, 0x0, &(0x7f0000a04000)={0x2, 0x4e23, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x4) writev(r1, &(0x7f000051c000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d8c560284470080ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) 10:18:33 executing program 0: r0 = epoll_create1(0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = eventfd(0x0) ioctl$KVM_IRQFD(r2, 0x4020ae76, &(0x7f0000000080)={r3}) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r3, &(0x7f0000000040)={0x10000000}) write$eventfd(r3, &(0x7f0000000100), 0x8) 10:18:33 executing program 0: r0 = epoll_create1(0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = eventfd(0x0) ioctl$KVM_IRQFD(r2, 0x4020ae76, &(0x7f0000000080)={r3}) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r3, &(0x7f0000000040)={0x10000000}) write$eventfd(r3, &(0x7f0000000100), 0x8) 10:18:33 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000100)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, 0x0) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) add_key(0x0, &(0x7f0000001a40)={'syz', 0x1}, &(0x7f0000001a80)="b7feb58638d4bf8dfafcdf7772f14b127341adba280fd79cc810085b0ac4a6bfbb03a22eb9a4958ee8a0a188e794bbb9b639d06a55c12aa11948cb5383795501baf9981e1311d8dc95625005158c4b946a262a479d121a16b13e6c163a73", 0x5e, 0xfffffffffffffff8) getegid() ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000200)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) prctl$PR_CAPBSET_READ(0x17, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000740)={0x0, 0x16f, "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"}, 0x0) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000340)=@assoc_value={r2}, 0x8) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') keyctl$unlink(0x9, r1, 0xfffffffffffffffd) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) getegid() syz_genetlink_get_family_id$nbd(&(0x7f0000000140)='nbd\x00') sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0x4) fcntl$dupfd(r0, 0x0, r0) 10:18:33 executing program 1: r0 = socket$inet_sctp(0x2, 0x800000000001, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000094000)=[@in={0x2, 0x0, @loopback}], 0x10) connect$inet(r0, &(0x7f0000f6fff0)={0x2, 0x4e23, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) listen(r0, 0x11000000000b) accept(r0, &(0x7f00000011c0)=ANY=[], &(0x7f0000123000)) listen(r0, 0x0) sendto$inet(r0, &(0x7f00000000c0)="cf", 0x1, 0x0, &(0x7f0000a04000)={0x2, 0x4e23, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x4) writev(r1, &(0x7f000051c000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d8c560284470080ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) 10:18:34 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000100)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, 0x0) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) add_key(0x0, &(0x7f0000001a40)={'syz', 0x1}, &(0x7f0000001a80)="b7feb58638d4bf8dfafcdf7772f14b127341adba280fd79cc810085b0ac4a6bfbb03a22eb9a4958ee8a0a188e794bbb9b639d06a55c12aa11948cb5383795501baf9981e1311d8dc95625005158c4b946a262a479d121a16b13e6c163a73", 0x5e, 0xfffffffffffffff8) getegid() ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000200)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) prctl$PR_CAPBSET_READ(0x17, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000740)={0x0, 0x16f, "d4b720fb1cc6b2f4830cf3531b0dad38b0c678e3f5c9d10c5584d2f39b8239bdc8e6cac98073c748fcabc0b5b88acbbb39c31e0ab02ad731fc71c6c19fce17cce1313a001ab7dd5d8c1602e1607dbc9fc640a357510a3f12e679903ba059e77c0e5200350d8384c9c94ef45b62b3548b903624a5915904615a26963b8964a49865661c8b9a717030452161ab4c0a171c98f8f9b1e19bcfd585125450fbab409976eb17a5e28de9a0e337a0b1edbad2c23e486e0db2af6c621d7ed5a56e5c59c81221a6f8d8d583e75717282fb55cc6d2c57c64cad41752c70e59e9ae873312fe9cc4b31dd4ed691d1da0d7133acba9865bef12e60f21e36845c9802f4e961a27bf465c878b6995347b5135e159563800d695a70a428f4129600f7e6ee2f7c7392f5c852bb1600a11ccf7f1705071a59aa08cb9b029834d48bfc73ecd741e654a8d2f169a0b599e94d7cc740f6407eb7dc6434a0c832be4c39e18fdb9e927c2817d1b044f42d0896cf952f794a7e8ad"}, 0x0) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000340)=@assoc_value={r2}, 0x8) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') keyctl$unlink(0x9, r1, 0xfffffffffffffffd) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) getegid() syz_genetlink_get_family_id$nbd(&(0x7f0000000140)='nbd\x00') sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0x4) fcntl$dupfd(r0, 0x0, r0) 10:18:34 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000100)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, 0x0) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) add_key(0x0, &(0x7f0000001a40)={'syz', 0x1}, &(0x7f0000001a80)="b7feb58638d4bf8dfafcdf7772f14b127341adba280fd79cc810085b0ac4a6bfbb03a22eb9a4958ee8a0a188e794bbb9b639d06a55c12aa11948cb5383795501baf9981e1311d8dc95625005158c4b946a262a479d121a16b13e6c163a73", 0x5e, 0xfffffffffffffff8) getegid() ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000200)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) prctl$PR_CAPBSET_READ(0x17, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000740)={0x0, 0x16f, "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"}, 0x0) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000340)=@assoc_value={r2}, 0x8) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') keyctl$unlink(0x9, r1, 0xfffffffffffffffd) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) getegid() syz_genetlink_get_family_id$nbd(&(0x7f0000000140)='nbd\x00') sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0x4) fcntl$dupfd(r0, 0x0, r0) 10:18:34 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000100)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, 0x0) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) add_key(0x0, &(0x7f0000001a40)={'syz', 0x1}, &(0x7f0000001a80)="b7feb58638d4bf8dfafcdf7772f14b127341adba280fd79cc810085b0ac4a6bfbb03a22eb9a4958ee8a0a188e794bbb9b639d06a55c12aa11948cb5383795501baf9981e1311d8dc95625005158c4b946a262a479d121a16b13e6c163a73", 0x5e, 0xfffffffffffffff8) getegid() ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000200)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) prctl$PR_CAPBSET_READ(0x17, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000740)={0x0, 0x16f, "d4b720fb1cc6b2f4830cf3531b0dad38b0c678e3f5c9d10c5584d2f39b8239bdc8e6cac98073c748fcabc0b5b88acbbb39c31e0ab02ad731fc71c6c19fce17cce1313a001ab7dd5d8c1602e1607dbc9fc640a357510a3f12e679903ba059e77c0e5200350d8384c9c94ef45b62b3548b903624a5915904615a26963b8964a49865661c8b9a717030452161ab4c0a171c98f8f9b1e19bcfd585125450fbab409976eb17a5e28de9a0e337a0b1edbad2c23e486e0db2af6c621d7ed5a56e5c59c81221a6f8d8d583e75717282fb55cc6d2c57c64cad41752c70e59e9ae873312fe9cc4b31dd4ed691d1da0d7133acba9865bef12e60f21e36845c9802f4e961a27bf465c878b6995347b5135e159563800d695a70a428f4129600f7e6ee2f7c7392f5c852bb1600a11ccf7f1705071a59aa08cb9b029834d48bfc73ecd741e654a8d2f169a0b599e94d7cc740f6407eb7dc6434a0c832be4c39e18fdb9e927c2817d1b044f42d0896cf952f794a7e8ad"}, 0x0) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000340)=@assoc_value={r2}, 0x8) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') keyctl$unlink(0x9, r1, 0xfffffffffffffffd) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) getegid() syz_genetlink_get_family_id$nbd(&(0x7f0000000140)='nbd\x00') sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0x4) fcntl$dupfd(r0, 0x0, r0) 10:18:34 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000100)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, 0x0) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) add_key(0x0, &(0x7f0000001a40)={'syz', 0x1}, &(0x7f0000001a80)="b7feb58638d4bf8dfafcdf7772f14b127341adba280fd79cc810085b0ac4a6bfbb03a22eb9a4958ee8a0a188e794bbb9b639d06a55c12aa11948cb5383795501baf9981e1311d8dc95625005158c4b946a262a479d121a16b13e6c163a73", 0x5e, 0xfffffffffffffff8) getegid() ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000200)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) prctl$PR_CAPBSET_READ(0x17, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000740)={0x0, 0x16f, "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"}, 0x0) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000340)=@assoc_value={r2}, 0x8) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') keyctl$unlink(0x9, r1, 0xfffffffffffffffd) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) getegid() syz_genetlink_get_family_id$nbd(&(0x7f0000000140)='nbd\x00') sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0x4) fcntl$dupfd(r0, 0x0, r0) 10:18:34 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000100)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, 0x0) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) add_key(0x0, &(0x7f0000001a40)={'syz', 0x1}, &(0x7f0000001a80)="b7feb58638d4bf8dfafcdf7772f14b127341adba280fd79cc810085b0ac4a6bfbb03a22eb9a4958ee8a0a188e794bbb9b639d06a55c12aa11948cb5383795501baf9981e1311d8dc95625005158c4b946a262a479d121a16b13e6c163a73", 0x5e, 0xfffffffffffffff8) getegid() ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000200)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) prctl$PR_CAPBSET_READ(0x17, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000740)={0x0, 0x16f, "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"}, 0x0) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000340)=@assoc_value={r2}, 0x8) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') keyctl$unlink(0x9, r1, 0xfffffffffffffffd) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) getegid() syz_genetlink_get_family_id$nbd(&(0x7f0000000140)='nbd\x00') sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0x4) fcntl$dupfd(r0, 0x0, r0) 10:18:34 executing program 2: mprotect(&(0x7f0000032000/0x1000)=nil, 0x1000, 0x0) prctl$PR_SET_MM(0x23, 0x40000000000f, &(0x7f0000ffd000/0x3000)=nil) 10:18:34 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000100)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, 0x0) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) add_key(0x0, &(0x7f0000001a40)={'syz', 0x1}, &(0x7f0000001a80)="b7feb58638d4bf8dfafcdf7772f14b127341adba280fd79cc810085b0ac4a6bfbb03a22eb9a4958ee8a0a188e794bbb9b639d06a55c12aa11948cb5383795501baf9981e1311d8dc95625005158c4b946a262a479d121a16b13e6c163a73", 0x5e, 0xfffffffffffffff8) getegid() ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000200)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) prctl$PR_CAPBSET_READ(0x17, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000740)={0x0, 0x16f, "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"}, 0x0) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000340)=@assoc_value={r2}, 0x8) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') keyctl$unlink(0x9, r1, 0xfffffffffffffffd) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) getegid() syz_genetlink_get_family_id$nbd(&(0x7f0000000140)='nbd\x00') sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0x4) fcntl$dupfd(r0, 0x0, r0) 10:18:34 executing program 2: mprotect(&(0x7f0000032000/0x1000)=nil, 0x1000, 0x0) prctl$PR_SET_MM(0x23, 0x40000000000f, &(0x7f0000ffd000/0x3000)=nil) 10:18:34 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000100)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, 0x0) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) add_key(0x0, &(0x7f0000001a40)={'syz', 0x1}, &(0x7f0000001a80)="b7feb58638d4bf8dfafcdf7772f14b127341adba280fd79cc810085b0ac4a6bfbb03a22eb9a4958ee8a0a188e794bbb9b639d06a55c12aa11948cb5383795501baf9981e1311d8dc95625005158c4b946a262a479d121a16b13e6c163a73", 0x5e, 0xfffffffffffffff8) getegid() ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000200)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) prctl$PR_CAPBSET_READ(0x17, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000740)={0x0, 0x16f, "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"}, 0x0) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000340)=@assoc_value={r2}, 0x8) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') keyctl$unlink(0x9, r1, 0xfffffffffffffffd) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) getegid() syz_genetlink_get_family_id$nbd(&(0x7f0000000140)='nbd\x00') sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0x4) fcntl$dupfd(r0, 0x0, r0) 10:18:34 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000100)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, 0x0) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) add_key(0x0, &(0x7f0000001a40)={'syz', 0x1}, &(0x7f0000001a80)="b7feb58638d4bf8dfafcdf7772f14b127341adba280fd79cc810085b0ac4a6bfbb03a22eb9a4958ee8a0a188e794bbb9b639d06a55c12aa11948cb5383795501baf9981e1311d8dc95625005158c4b946a262a479d121a16b13e6c163a73", 0x5e, 0xfffffffffffffff8) getegid() ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000200)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) prctl$PR_CAPBSET_READ(0x17, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000740)={0x0, 0x16f, "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"}, 0x0) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000340)=@assoc_value={r2}, 0x8) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') keyctl$unlink(0x9, r1, 0xfffffffffffffffd) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) getegid() syz_genetlink_get_family_id$nbd(&(0x7f0000000140)='nbd\x00') sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0x4) fcntl$dupfd(r0, 0x0, r0) 10:18:34 executing program 1: syz_emit_ethernet(0xe, &(0x7f00000001c0)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x9}}}}}, &(0x7f0000000040)={0x0, 0x2, [0x0, 0xfffffd]}) 10:18:34 executing program 2: mprotect(&(0x7f0000032000/0x1000)=nil, 0x1000, 0x0) prctl$PR_SET_MM(0x23, 0x40000000000f, &(0x7f0000ffd000/0x3000)=nil) 10:18:34 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000100)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, 0x0) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) add_key(0x0, &(0x7f0000001a40)={'syz', 0x1}, &(0x7f0000001a80)="b7feb58638d4bf8dfafcdf7772f14b127341adba280fd79cc810085b0ac4a6bfbb03a22eb9a4958ee8a0a188e794bbb9b639d06a55c12aa11948cb5383795501baf9981e1311d8dc95625005158c4b946a262a479d121a16b13e6c163a73", 0x5e, 0xfffffffffffffff8) getegid() ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000200)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) prctl$PR_CAPBSET_READ(0x17, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000740)={0x0, 0x16f, "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"}, 0x0) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000340)=@assoc_value={r2}, 0x8) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') keyctl$unlink(0x9, r1, 0xfffffffffffffffd) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) getegid() syz_genetlink_get_family_id$nbd(&(0x7f0000000140)='nbd\x00') sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0x4) fcntl$dupfd(r0, 0x0, r0) 10:18:34 executing program 1: syz_emit_ethernet(0xe, &(0x7f00000001c0)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x9}}}}}, &(0x7f0000000040)={0x0, 0x2, [0x0, 0xfffffd]}) 10:18:34 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000100)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, 0x0) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) add_key(0x0, &(0x7f0000001a40)={'syz', 0x1}, &(0x7f0000001a80)="b7feb58638d4bf8dfafcdf7772f14b127341adba280fd79cc810085b0ac4a6bfbb03a22eb9a4958ee8a0a188e794bbb9b639d06a55c12aa11948cb5383795501baf9981e1311d8dc95625005158c4b946a262a479d121a16b13e6c163a73", 0x5e, 0xfffffffffffffff8) getegid() ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000200)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) prctl$PR_CAPBSET_READ(0x17, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000740)={0x0, 0x16f, "d4b720fb1cc6b2f4830cf3531b0dad38b0c678e3f5c9d10c5584d2f39b8239bdc8e6cac98073c748fcabc0b5b88acbbb39c31e0ab02ad731fc71c6c19fce17cce1313a001ab7dd5d8c1602e1607dbc9fc640a357510a3f12e679903ba059e77c0e5200350d8384c9c94ef45b62b3548b903624a5915904615a26963b8964a49865661c8b9a717030452161ab4c0a171c98f8f9b1e19bcfd585125450fbab409976eb17a5e28de9a0e337a0b1edbad2c23e486e0db2af6c621d7ed5a56e5c59c81221a6f8d8d583e75717282fb55cc6d2c57c64cad41752c70e59e9ae873312fe9cc4b31dd4ed691d1da0d7133acba9865bef12e60f21e36845c9802f4e961a27bf465c878b6995347b5135e159563800d695a70a428f4129600f7e6ee2f7c7392f5c852bb1600a11ccf7f1705071a59aa08cb9b029834d48bfc73ecd741e654a8d2f169a0b599e94d7cc740f6407eb7dc6434a0c832be4c39e18fdb9e927c2817d1b044f42d0896cf952f794a7e8ad"}, 0x0) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000340)=@assoc_value={r2}, 0x8) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') keyctl$unlink(0x9, r1, 0xfffffffffffffffd) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) getegid() syz_genetlink_get_family_id$nbd(&(0x7f0000000140)='nbd\x00') sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0x4) fcntl$dupfd(r0, 0x0, r0) 10:18:34 executing program 2: mprotect(&(0x7f0000032000/0x1000)=nil, 0x1000, 0x0) prctl$PR_SET_MM(0x23, 0x40000000000f, &(0x7f0000ffd000/0x3000)=nil) 10:18:35 executing program 1: syz_emit_ethernet(0xe, &(0x7f00000001c0)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x9}}}}}, &(0x7f0000000040)={0x0, 0x2, [0x0, 0xfffffd]}) 10:18:35 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={&(0x7f0000000000), 0xc, &(0x7f00000001c0)={&(0x7f0000000340)={0x20, 0x0, 0x1, 0x1, 0x0, 0x0, {}, [@nested={0xc, 0x12, [@typed={0x8, 0x0, @pid}]}]}, 0x20}}, 0x0) 10:18:35 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x1000000000001, 0x0) ioctl$sock_SIOCETHTOOL(r1, 0x89f0, &(0x7f00000000c0)={'bridge0\x00\x0f\x00', &(0x7f0000000000)=@ethtool_ringparam={0xe, 0x0, 0x2}}) 10:18:35 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000008c0)={&(0x7f0000000180), 0xc, &(0x7f0000000880)={&(0x7f0000000800)=@ipv6_getroute={0x24, 0x1a, 0x21, 0x0, 0x0, {}, [@RTA_IIF={0x8}]}, 0x24}}, 0x0) 10:18:35 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000100)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, 0x0) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) add_key(0x0, &(0x7f0000001a40)={'syz', 0x1}, &(0x7f0000001a80)="b7feb58638d4bf8dfafcdf7772f14b127341adba280fd79cc810085b0ac4a6bfbb03a22eb9a4958ee8a0a188e794bbb9b639d06a55c12aa11948cb5383795501baf9981e1311d8dc95625005158c4b946a262a479d121a16b13e6c163a73", 0x5e, 0xfffffffffffffff8) getegid() ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000200)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) prctl$PR_CAPBSET_READ(0x17, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000740)={0x0, 0x16f, "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"}, 0x0) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000340)=@assoc_value={r2}, 0x8) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') keyctl$unlink(0x9, r1, 0xfffffffffffffffd) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) getegid() syz_genetlink_get_family_id$nbd(&(0x7f0000000140)='nbd\x00') sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0x4) fcntl$dupfd(r0, 0x0, r0) 10:18:35 executing program 1: syz_emit_ethernet(0xe, &(0x7f00000001c0)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x9}}}}}, &(0x7f0000000040)={0x0, 0x2, [0x0, 0xfffffd]}) [ 1638.404607] netlink: 'syz-executor.2': attribute type 18 has an invalid length. 10:18:35 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000008c0)={&(0x7f0000000180), 0xc, &(0x7f0000000880)={&(0x7f0000000800)=@ipv6_getroute={0x24, 0x1a, 0x21, 0x0, 0x0, {}, [@RTA_IIF={0x8}]}, 0x24}}, 0x0) 10:18:35 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={&(0x7f0000000000), 0xc, &(0x7f00000001c0)={&(0x7f0000000340)={0x20, 0x0, 0x1, 0x1, 0x0, 0x0, {}, [@nested={0xc, 0x12, [@typed={0x8, 0x0, @pid}]}]}, 0x20}}, 0x0) 10:18:35 executing program 1: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = creat(&(0x7f0000001140)='./file0\x00', 0x3) write$vnet(r0, &(0x7f0000000100)={0x1, {0x0, 0x0, 0x0}}, 0x68) close(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$CAPI_GET_ERRCODE(r0, 0x80024321, 0x0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) 10:18:35 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x1000000000001, 0x0) ioctl$sock_SIOCETHTOOL(r1, 0x89f0, &(0x7f00000000c0)={'bridge0\x00\x0f\x00', &(0x7f0000000000)=@ethtool_ringparam={0xe, 0x0, 0x2}}) [ 1638.620473] netlink: 'syz-executor.2': attribute type 18 has an invalid length. 10:18:35 executing program 1: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = creat(&(0x7f0000001140)='./file0\x00', 0x3) write$vnet(r0, &(0x7f0000000100)={0x1, {0x0, 0x0, 0x0}}, 0x68) close(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$CAPI_GET_ERRCODE(r0, 0x80024321, 0x0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) 10:18:35 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000008c0)={&(0x7f0000000180), 0xc, &(0x7f0000000880)={&(0x7f0000000800)=@ipv6_getroute={0x24, 0x1a, 0x21, 0x0, 0x0, {}, [@RTA_IIF={0x8}]}, 0x24}}, 0x0) 10:18:35 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x1000000000001, 0x0) ioctl$sock_SIOCETHTOOL(r1, 0x89f0, &(0x7f00000000c0)={'bridge0\x00\x0f\x00', &(0x7f0000000000)=@ethtool_ringparam={0xe, 0x0, 0x2}}) 10:18:35 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={&(0x7f0000000000), 0xc, &(0x7f00000001c0)={&(0x7f0000000340)={0x20, 0x0, 0x1, 0x1, 0x0, 0x0, {}, [@nested={0xc, 0x12, [@typed={0x8, 0x0, @pid}]}]}, 0x20}}, 0x0) 10:18:35 executing program 3: r0 = open$dir(0x0, 0x0, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000009340)=[{{0xffffffffffffffff, 0x0, &(0x7f0000003280)=[{&(0x7f0000002180)=""/113, 0x71}, {&(0x7f0000002200)=""/66, 0x42}, {&(0x7f0000002280)=""/4096, 0x1000}, {&(0x7f0000001e40)=""/64, 0x40}], 0x4, &(0x7f00000032c0)=""/224, 0xe0, 0x9}, 0xfffffffffffffffe}, {{0x0, 0x0, &(0x7f0000003480)=[{&(0x7f00000033c0)=""/137, 0x89}], 0x1, 0x0, 0x0, 0x2}, 0xca}, {{&(0x7f0000003800)=@hci, 0x80, &(0x7f0000003940)}}, {{0x0, 0x0, &(0x7f0000005bc0)=[{&(0x7f0000003a00)=""/181, 0xb5}], 0x1, &(0x7f0000005c40)=""/4096, 0x1000, 0xb5d}}, {{0x0, 0x0, &(0x7f0000006ec0)=[{&(0x7f0000006cc0)=""/230, 0xe6}, {&(0x7f0000006dc0)=""/66, 0x42}], 0x2, 0x0, 0x0, 0x1000}, 0x5}], 0x5, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_sha512\x00'}, 0x58) dup(r0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, 0x0, 0x0) r2 = syz_open_dev$media(0x0, 0x0, 0x101000) ioctl$KVM_S390_UCAS_UNMAP(r2, 0x4018ae51, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000240)="3b02", 0x2) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000100), &(0x7f0000000180)=0x1) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000200), &(0x7f0000000380)=0xc) setsockopt$sock_cred(r2, 0x1, 0x11, 0x0, 0x0) open$dir(&(0x7f0000000400)='./file0\x00', 0x80, 0x0) r3 = accept$alg(r1, 0x0, 0x0) recvmmsg(r3, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x34e, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d, 0xbb000000}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) 10:18:35 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000008c0)={&(0x7f0000000180), 0xc, &(0x7f0000000880)={&(0x7f0000000800)=@ipv6_getroute={0x24, 0x1a, 0x21, 0x0, 0x0, {}, [@RTA_IIF={0x8}]}, 0x24}}, 0x0) [ 1638.819815] netlink: 'syz-executor.2': attribute type 18 has an invalid length. 10:18:35 executing program 1: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = creat(&(0x7f0000001140)='./file0\x00', 0x3) write$vnet(r0, &(0x7f0000000100)={0x1, {0x0, 0x0, 0x0}}, 0x68) close(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$CAPI_GET_ERRCODE(r0, 0x80024321, 0x0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) 10:18:35 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x1000000000001, 0x0) ioctl$sock_SIOCETHTOOL(r1, 0x89f0, &(0x7f00000000c0)={'bridge0\x00\x0f\x00', &(0x7f0000000000)=@ethtool_ringparam={0xe, 0x0, 0x2}}) 10:18:35 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={&(0x7f0000000000), 0xc, &(0x7f00000001c0)={&(0x7f0000000340)={0x20, 0x0, 0x1, 0x1, 0x0, 0x0, {}, [@nested={0xc, 0x12, [@typed={0x8, 0x0, @pid}]}]}, 0x20}}, 0x0) 10:18:35 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r1 = syz_open_pts(r0, 0x0) write$binfmt_aout(r0, &(0x7f0000001b80)=ANY=[@ANYBLOB="16"], 0x1) ioctl$TCSETS(r0, 0x5402, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x6}) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)) 10:18:35 executing program 0: r0 = socket$inet(0x2b, 0x1, 0x0) bind$inet(r0, &(0x7f0000000600)={0x2, 0x4e23, @multicast2}, 0x10) connect$inet(r0, &(0x7f00000001c0)={0x2, 0x4e23}, 0x10) sendto$inet(r0, &(0x7f0000000300)='\a', 0x1, 0x8055, 0x0, 0x0) [ 1639.020799] netlink: 'syz-executor.2': attribute type 18 has an invalid length. 10:18:35 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r1, &(0x7f0000000080), 0x1c) r2 = dup2(r1, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() setsockopt$inet6_opts(r1, 0x29, 0x39, &(0x7f0000000000)=@fragment={0x0, 0x0, 0x4}, 0x250) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x1d) fcntl$setstatus(r2, 0x4, 0x42803) 10:18:35 executing program 1: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = creat(&(0x7f0000001140)='./file0\x00', 0x3) write$vnet(r0, &(0x7f0000000100)={0x1, {0x0, 0x0, 0x0}}, 0x68) close(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$CAPI_GET_ERRCODE(r0, 0x80024321, 0x0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) 10:18:35 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r1 = syz_open_pts(r0, 0x0) write$binfmt_aout(r0, &(0x7f0000001b80)=ANY=[@ANYBLOB="16"], 0x1) ioctl$TCSETS(r0, 0x5402, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x6}) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)) 10:18:35 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x40000000001, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x20000000000000}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x9}]}, &(0x7f0000f6bffb)='GPL\x1d', 0x80, 0x4e1, &(0x7f00001a7f05)=""/251}, 0x48) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) 10:18:36 executing program 0: r0 = socket$inet(0x2b, 0x1, 0x0) bind$inet(r0, &(0x7f0000000600)={0x2, 0x4e23, @multicast2}, 0x10) connect$inet(r0, &(0x7f00000001c0)={0x2, 0x4e23}, 0x10) sendto$inet(r0, &(0x7f0000000300)='\a', 0x1, 0x8055, 0x0, 0x0) 10:18:36 executing program 3: r0 = open$dir(0x0, 0x0, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000009340)=[{{0xffffffffffffffff, 0x0, &(0x7f0000003280)=[{&(0x7f0000002180)=""/113, 0x71}, {&(0x7f0000002200)=""/66, 0x42}, {&(0x7f0000002280)=""/4096, 0x1000}, {&(0x7f0000001e40)=""/64, 0x40}], 0x4, &(0x7f00000032c0)=""/224, 0xe0, 0x9}, 0xfffffffffffffffe}, {{0x0, 0x0, &(0x7f0000003480)=[{&(0x7f00000033c0)=""/137, 0x89}], 0x1, 0x0, 0x0, 0x2}, 0xca}, {{&(0x7f0000003800)=@hci, 0x80, &(0x7f0000003940)}}, {{0x0, 0x0, &(0x7f0000005bc0)=[{&(0x7f0000003a00)=""/181, 0xb5}], 0x1, &(0x7f0000005c40)=""/4096, 0x1000, 0xb5d}}, {{0x0, 0x0, &(0x7f0000006ec0)=[{&(0x7f0000006cc0)=""/230, 0xe6}, {&(0x7f0000006dc0)=""/66, 0x42}], 0x2, 0x0, 0x0, 0x1000}, 0x5}], 0x5, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_sha512\x00'}, 0x58) dup(r0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, 0x0, 0x0) r2 = syz_open_dev$media(0x0, 0x0, 0x101000) ioctl$KVM_S390_UCAS_UNMAP(r2, 0x4018ae51, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000240)="3b02", 0x2) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000100), &(0x7f0000000180)=0x1) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000200), &(0x7f0000000380)=0xc) setsockopt$sock_cred(r2, 0x1, 0x11, 0x0, 0x0) open$dir(&(0x7f0000000400)='./file0\x00', 0x80, 0x0) r3 = accept$alg(r1, 0x0, 0x0) recvmmsg(r3, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x34e, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d, 0xbb000000}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) 10:18:36 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r1 = syz_open_pts(r0, 0x0) write$binfmt_aout(r0, &(0x7f0000001b80)=ANY=[@ANYBLOB="16"], 0x1) ioctl$TCSETS(r0, 0x5402, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x6}) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)) 10:18:36 executing program 0: r0 = socket$inet(0x2b, 0x1, 0x0) bind$inet(r0, &(0x7f0000000600)={0x2, 0x4e23, @multicast2}, 0x10) connect$inet(r0, &(0x7f00000001c0)={0x2, 0x4e23}, 0x10) sendto$inet(r0, &(0x7f0000000300)='\a', 0x1, 0x8055, 0x0, 0x0) 10:18:36 executing program 1: r0 = open$dir(0x0, 0x0, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000009340)=[{{0xffffffffffffffff, 0x0, &(0x7f0000003280)=[{&(0x7f0000002180)=""/113, 0x71}, {&(0x7f0000002200)=""/66, 0x42}, {&(0x7f0000002280)=""/4096, 0x1000}, {&(0x7f0000001e40)=""/64, 0x40}], 0x4, &(0x7f00000032c0)=""/224, 0xe0, 0x9}, 0xfffffffffffffffe}, {{0x0, 0x0, &(0x7f0000003480)=[{&(0x7f00000033c0)=""/137, 0x89}], 0x1, 0x0, 0x0, 0x2}, 0xca}, {{&(0x7f0000003800)=@hci, 0x80, &(0x7f0000003940)}}, {{0x0, 0x0, &(0x7f0000005bc0)=[{&(0x7f0000003a00)=""/181, 0xb5}], 0x1, &(0x7f0000005c40)=""/4096, 0x1000, 0xb5d}}, {{0x0, 0x0, &(0x7f0000006ec0)=[{&(0x7f0000006cc0)=""/230, 0xe6}, {&(0x7f0000006dc0)=""/66, 0x42}], 0x2, 0x0, 0x0, 0x1000}, 0x5}], 0x5, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_sha512\x00'}, 0x58) dup(r0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, 0x0, 0x0) r2 = syz_open_dev$media(0x0, 0x0, 0x101000) ioctl$KVM_S390_UCAS_UNMAP(r2, 0x4018ae51, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000240)="3b02", 0x2) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000100), &(0x7f0000000180)=0x1) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000200), &(0x7f0000000380)=0xc) setsockopt$sock_cred(r2, 0x1, 0x11, 0x0, 0x0) open$dir(&(0x7f0000000400)='./file0\x00', 0x80, 0x0) r3 = accept$alg(r1, 0x0, 0x0) recvmmsg(r3, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x34e, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d, 0xbb000000}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) 10:18:36 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x40000000001, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x20000000000000}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x9}]}, &(0x7f0000f6bffb)='GPL\x1d', 0x80, 0x4e1, &(0x7f00001a7f05)=""/251}, 0x48) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) 10:18:36 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r1 = syz_open_pts(r0, 0x0) write$binfmt_aout(r0, &(0x7f0000001b80)=ANY=[@ANYBLOB="16"], 0x1) ioctl$TCSETS(r0, 0x5402, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x6}) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)) 10:18:36 executing program 0: r0 = socket$inet(0x2b, 0x1, 0x0) bind$inet(r0, &(0x7f0000000600)={0x2, 0x4e23, @multicast2}, 0x10) connect$inet(r0, &(0x7f00000001c0)={0x2, 0x4e23}, 0x10) sendto$inet(r0, &(0x7f0000000300)='\a', 0x1, 0x8055, 0x0, 0x0) 10:18:36 executing program 4: r0 = open$dir(0x0, 0x0, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000009340)=[{{0xffffffffffffffff, 0x0, &(0x7f0000003280)=[{&(0x7f0000002180)=""/113, 0x71}, {&(0x7f0000002200)=""/66, 0x42}, {&(0x7f0000002280)=""/4096, 0x1000}, {&(0x7f0000001e40)=""/64, 0x40}], 0x4, &(0x7f00000032c0)=""/224, 0xe0, 0x9}, 0xfffffffffffffffe}, {{0x0, 0x0, &(0x7f0000003480)=[{&(0x7f00000033c0)=""/137, 0x89}], 0x1, 0x0, 0x0, 0x2}, 0xca}, {{&(0x7f0000003800)=@hci, 0x80, &(0x7f0000003940)}}, {{0x0, 0x0, &(0x7f0000005bc0)=[{&(0x7f0000003a00)=""/181, 0xb5}], 0x1, &(0x7f0000005c40)=""/4096, 0x1000, 0xb5d}}, {{0x0, 0x0, &(0x7f0000006ec0)=[{&(0x7f0000006cc0)=""/230, 0xe6}, {&(0x7f0000006dc0)=""/66, 0x42}], 0x2, 0x0, 0x0, 0x1000}, 0x5}], 0x5, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_sha512\x00'}, 0x58) dup(r0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, 0x0, 0x0) r2 = syz_open_dev$media(0x0, 0x0, 0x101000) ioctl$KVM_S390_UCAS_UNMAP(r2, 0x4018ae51, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000240)="3b02", 0x2) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000100), &(0x7f0000000180)=0x1) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000200), &(0x7f0000000380)=0xc) setsockopt$sock_cred(r2, 0x1, 0x11, 0x0, 0x0) open$dir(&(0x7f0000000400)='./file0\x00', 0x80, 0x0) r3 = accept$alg(r1, 0x0, 0x0) recvmmsg(r3, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x34e, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d, 0xbb000000}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) 10:18:36 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x40000000001, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x20000000000000}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x9}]}, &(0x7f0000f6bffb)='GPL\x1d', 0x80, 0x4e1, &(0x7f00001a7f05)=""/251}, 0x48) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) 10:18:36 executing program 5: r0 = open$dir(0x0, 0x0, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000009340)=[{{0xffffffffffffffff, 0x0, &(0x7f0000003280)=[{&(0x7f0000002180)=""/113, 0x71}, {&(0x7f0000002200)=""/66, 0x42}, {&(0x7f0000002280)=""/4096, 0x1000}, {&(0x7f0000001e40)=""/64, 0x40}], 0x4, &(0x7f00000032c0)=""/224, 0xe0, 0x9}, 0xfffffffffffffffe}, {{0x0, 0x0, &(0x7f0000003480)=[{&(0x7f00000033c0)=""/137, 0x89}], 0x1, 0x0, 0x0, 0x2}, 0xca}, {{&(0x7f0000003800)=@hci, 0x80, &(0x7f0000003940)}}, {{0x0, 0x0, &(0x7f0000005bc0)=[{&(0x7f0000003a00)=""/181, 0xb5}], 0x1, &(0x7f0000005c40)=""/4096, 0x1000, 0xb5d}}, {{0x0, 0x0, &(0x7f0000006ec0)=[{&(0x7f0000006cc0)=""/230, 0xe6}, {&(0x7f0000006dc0)=""/66, 0x42}], 0x2, 0x0, 0x0, 0x1000}, 0x5}], 0x5, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_sha512\x00'}, 0x58) dup(r0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, 0x0, 0x0) r2 = syz_open_dev$media(0x0, 0x0, 0x101000) ioctl$KVM_S390_UCAS_UNMAP(r2, 0x4018ae51, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000240)="3b02", 0x2) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000100), &(0x7f0000000180)=0x1) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000200), &(0x7f0000000380)=0xc) setsockopt$sock_cred(r2, 0x1, 0x11, 0x0, 0x0) open$dir(&(0x7f0000000400)='./file0\x00', 0x80, 0x0) r3 = accept$alg(r1, 0x0, 0x0) recvmmsg(r3, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x34e, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d, 0xbb000000}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) 10:18:36 executing program 0: r0 = open$dir(0x0, 0x0, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000009340)=[{{0xffffffffffffffff, 0x0, &(0x7f0000003280)=[{&(0x7f0000002180)=""/113, 0x71}, {&(0x7f0000002200)=""/66, 0x42}, {&(0x7f0000002280)=""/4096, 0x1000}, {&(0x7f0000001e40)=""/64, 0x40}], 0x4, &(0x7f00000032c0)=""/224, 0xe0, 0x9}, 0xfffffffffffffffe}, {{0x0, 0x0, &(0x7f0000003480)=[{&(0x7f00000033c0)=""/137, 0x89}], 0x1, 0x0, 0x0, 0x2}, 0xca}, {{&(0x7f0000003800)=@hci, 0x80, &(0x7f0000003940)}}, {{0x0, 0x0, &(0x7f0000005bc0)=[{&(0x7f0000003a00)=""/181, 0xb5}], 0x1, &(0x7f0000005c40)=""/4096, 0x1000, 0xb5d}}, {{0x0, 0x0, &(0x7f0000006ec0)=[{&(0x7f0000006cc0)=""/230, 0xe6}, {&(0x7f0000006dc0)=""/66, 0x42}], 0x2, 0x0, 0x0, 0x1000}, 0x5}], 0x5, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_sha512\x00'}, 0x58) dup(r0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, 0x0, 0x0) r2 = syz_open_dev$media(0x0, 0x0, 0x101000) ioctl$KVM_S390_UCAS_UNMAP(r2, 0x4018ae51, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000240)="3b02", 0x2) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000100), &(0x7f0000000180)=0x1) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000200), &(0x7f0000000380)=0xc) setsockopt$sock_cred(r2, 0x1, 0x11, 0x0, 0x0) open$dir(&(0x7f0000000400)='./file0\x00', 0x80, 0x0) r3 = accept$alg(r1, 0x0, 0x0) recvmmsg(r3, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x34e, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d, 0xbb000000}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) 10:18:36 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x40000000001, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x20000000000000}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x9}]}, &(0x7f0000f6bffb)='GPL\x1d', 0x80, 0x4e1, &(0x7f00001a7f05)=""/251}, 0x48) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) 10:18:37 executing program 3: r0 = open$dir(0x0, 0x0, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000009340)=[{{0xffffffffffffffff, 0x0, &(0x7f0000003280)=[{&(0x7f0000002180)=""/113, 0x71}, {&(0x7f0000002200)=""/66, 0x42}, {&(0x7f0000002280)=""/4096, 0x1000}, {&(0x7f0000001e40)=""/64, 0x40}], 0x4, &(0x7f00000032c0)=""/224, 0xe0, 0x9}, 0xfffffffffffffffe}, {{0x0, 0x0, &(0x7f0000003480)=[{&(0x7f00000033c0)=""/137, 0x89}], 0x1, 0x0, 0x0, 0x2}, 0xca}, {{&(0x7f0000003800)=@hci, 0x80, &(0x7f0000003940)}}, {{0x0, 0x0, &(0x7f0000005bc0)=[{&(0x7f0000003a00)=""/181, 0xb5}], 0x1, &(0x7f0000005c40)=""/4096, 0x1000, 0xb5d}}, {{0x0, 0x0, &(0x7f0000006ec0)=[{&(0x7f0000006cc0)=""/230, 0xe6}, {&(0x7f0000006dc0)=""/66, 0x42}], 0x2, 0x0, 0x0, 0x1000}, 0x5}], 0x5, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_sha512\x00'}, 0x58) dup(r0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, 0x0, 0x0) r2 = syz_open_dev$media(0x0, 0x0, 0x101000) ioctl$KVM_S390_UCAS_UNMAP(r2, 0x4018ae51, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000240)="3b02", 0x2) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000100), &(0x7f0000000180)=0x1) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000200), &(0x7f0000000380)=0xc) setsockopt$sock_cred(r2, 0x1, 0x11, 0x0, 0x0) open$dir(&(0x7f0000000400)='./file0\x00', 0x80, 0x0) r3 = accept$alg(r1, 0x0, 0x0) recvmmsg(r3, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x34e, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d, 0xbb000000}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) 10:18:37 executing program 2: r0 = open$dir(0x0, 0x0, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000009340)=[{{0xffffffffffffffff, 0x0, &(0x7f0000003280)=[{&(0x7f0000002180)=""/113, 0x71}, {&(0x7f0000002200)=""/66, 0x42}, {&(0x7f0000002280)=""/4096, 0x1000}, {&(0x7f0000001e40)=""/64, 0x40}], 0x4, &(0x7f00000032c0)=""/224, 0xe0, 0x9}, 0xfffffffffffffffe}, {{0x0, 0x0, &(0x7f0000003480)=[{&(0x7f00000033c0)=""/137, 0x89}], 0x1, 0x0, 0x0, 0x2}, 0xca}, {{&(0x7f0000003800)=@hci, 0x80, &(0x7f0000003940)}}, {{0x0, 0x0, &(0x7f0000005bc0)=[{&(0x7f0000003a00)=""/181, 0xb5}], 0x1, &(0x7f0000005c40)=""/4096, 0x1000, 0xb5d}}, {{0x0, 0x0, &(0x7f0000006ec0)=[{&(0x7f0000006cc0)=""/230, 0xe6}, {&(0x7f0000006dc0)=""/66, 0x42}], 0x2, 0x0, 0x0, 0x1000}, 0x5}], 0x5, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_sha512\x00'}, 0x58) dup(r0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, 0x0, 0x0) r2 = syz_open_dev$media(0x0, 0x0, 0x101000) ioctl$KVM_S390_UCAS_UNMAP(r2, 0x4018ae51, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000240)="3b02", 0x2) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000100), &(0x7f0000000180)=0x1) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000200), &(0x7f0000000380)=0xc) setsockopt$sock_cred(r2, 0x1, 0x11, 0x0, 0x0) open$dir(&(0x7f0000000400)='./file0\x00', 0x80, 0x0) r3 = accept$alg(r1, 0x0, 0x0) recvmmsg(r3, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x34e, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d, 0xbb000000}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) 10:18:37 executing program 1: r0 = open$dir(0x0, 0x0, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000009340)=[{{0xffffffffffffffff, 0x0, &(0x7f0000003280)=[{&(0x7f0000002180)=""/113, 0x71}, {&(0x7f0000002200)=""/66, 0x42}, {&(0x7f0000002280)=""/4096, 0x1000}, {&(0x7f0000001e40)=""/64, 0x40}], 0x4, &(0x7f00000032c0)=""/224, 0xe0, 0x9}, 0xfffffffffffffffe}, {{0x0, 0x0, &(0x7f0000003480)=[{&(0x7f00000033c0)=""/137, 0x89}], 0x1, 0x0, 0x0, 0x2}, 0xca}, {{&(0x7f0000003800)=@hci, 0x80, &(0x7f0000003940)}}, {{0x0, 0x0, &(0x7f0000005bc0)=[{&(0x7f0000003a00)=""/181, 0xb5}], 0x1, &(0x7f0000005c40)=""/4096, 0x1000, 0xb5d}}, {{0x0, 0x0, &(0x7f0000006ec0)=[{&(0x7f0000006cc0)=""/230, 0xe6}, {&(0x7f0000006dc0)=""/66, 0x42}], 0x2, 0x0, 0x0, 0x1000}, 0x5}], 0x5, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_sha512\x00'}, 0x58) dup(r0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, 0x0, 0x0) r2 = syz_open_dev$media(0x0, 0x0, 0x101000) ioctl$KVM_S390_UCAS_UNMAP(r2, 0x4018ae51, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000240)="3b02", 0x2) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000100), &(0x7f0000000180)=0x1) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000200), &(0x7f0000000380)=0xc) setsockopt$sock_cred(r2, 0x1, 0x11, 0x0, 0x0) open$dir(&(0x7f0000000400)='./file0\x00', 0x80, 0x0) r3 = accept$alg(r1, 0x0, 0x0) recvmmsg(r3, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x34e, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d, 0xbb000000}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) 10:18:37 executing program 4: r0 = open$dir(0x0, 0x0, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000009340)=[{{0xffffffffffffffff, 0x0, &(0x7f0000003280)=[{&(0x7f0000002180)=""/113, 0x71}, {&(0x7f0000002200)=""/66, 0x42}, {&(0x7f0000002280)=""/4096, 0x1000}, {&(0x7f0000001e40)=""/64, 0x40}], 0x4, &(0x7f00000032c0)=""/224, 0xe0, 0x9}, 0xfffffffffffffffe}, {{0x0, 0x0, &(0x7f0000003480)=[{&(0x7f00000033c0)=""/137, 0x89}], 0x1, 0x0, 0x0, 0x2}, 0xca}, {{&(0x7f0000003800)=@hci, 0x80, &(0x7f0000003940)}}, {{0x0, 0x0, &(0x7f0000005bc0)=[{&(0x7f0000003a00)=""/181, 0xb5}], 0x1, &(0x7f0000005c40)=""/4096, 0x1000, 0xb5d}}, {{0x0, 0x0, &(0x7f0000006ec0)=[{&(0x7f0000006cc0)=""/230, 0xe6}, {&(0x7f0000006dc0)=""/66, 0x42}], 0x2, 0x0, 0x0, 0x1000}, 0x5}], 0x5, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_sha512\x00'}, 0x58) dup(r0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, 0x0, 0x0) r2 = syz_open_dev$media(0x0, 0x0, 0x101000) ioctl$KVM_S390_UCAS_UNMAP(r2, 0x4018ae51, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000240)="3b02", 0x2) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000100), &(0x7f0000000180)=0x1) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000200), &(0x7f0000000380)=0xc) setsockopt$sock_cred(r2, 0x1, 0x11, 0x0, 0x0) open$dir(&(0x7f0000000400)='./file0\x00', 0x80, 0x0) r3 = accept$alg(r1, 0x0, 0x0) recvmmsg(r3, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x34e, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d, 0xbb000000}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) 10:18:37 executing program 5: r0 = open$dir(0x0, 0x0, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000009340)=[{{0xffffffffffffffff, 0x0, &(0x7f0000003280)=[{&(0x7f0000002180)=""/113, 0x71}, {&(0x7f0000002200)=""/66, 0x42}, {&(0x7f0000002280)=""/4096, 0x1000}, {&(0x7f0000001e40)=""/64, 0x40}], 0x4, &(0x7f00000032c0)=""/224, 0xe0, 0x9}, 0xfffffffffffffffe}, {{0x0, 0x0, &(0x7f0000003480)=[{&(0x7f00000033c0)=""/137, 0x89}], 0x1, 0x0, 0x0, 0x2}, 0xca}, {{&(0x7f0000003800)=@hci, 0x80, &(0x7f0000003940)}}, {{0x0, 0x0, &(0x7f0000005bc0)=[{&(0x7f0000003a00)=""/181, 0xb5}], 0x1, &(0x7f0000005c40)=""/4096, 0x1000, 0xb5d}}, {{0x0, 0x0, &(0x7f0000006ec0)=[{&(0x7f0000006cc0)=""/230, 0xe6}, {&(0x7f0000006dc0)=""/66, 0x42}], 0x2, 0x0, 0x0, 0x1000}, 0x5}], 0x5, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_sha512\x00'}, 0x58) dup(r0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, 0x0, 0x0) r2 = syz_open_dev$media(0x0, 0x0, 0x101000) ioctl$KVM_S390_UCAS_UNMAP(r2, 0x4018ae51, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000240)="3b02", 0x2) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000100), &(0x7f0000000180)=0x1) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000200), &(0x7f0000000380)=0xc) setsockopt$sock_cred(r2, 0x1, 0x11, 0x0, 0x0) open$dir(&(0x7f0000000400)='./file0\x00', 0x80, 0x0) r3 = accept$alg(r1, 0x0, 0x0) recvmmsg(r3, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x34e, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d, 0xbb000000}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) 10:18:37 executing program 0: r0 = open$dir(0x0, 0x0, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000009340)=[{{0xffffffffffffffff, 0x0, &(0x7f0000003280)=[{&(0x7f0000002180)=""/113, 0x71}, {&(0x7f0000002200)=""/66, 0x42}, {&(0x7f0000002280)=""/4096, 0x1000}, {&(0x7f0000001e40)=""/64, 0x40}], 0x4, &(0x7f00000032c0)=""/224, 0xe0, 0x9}, 0xfffffffffffffffe}, {{0x0, 0x0, &(0x7f0000003480)=[{&(0x7f00000033c0)=""/137, 0x89}], 0x1, 0x0, 0x0, 0x2}, 0xca}, {{&(0x7f0000003800)=@hci, 0x80, &(0x7f0000003940)}}, {{0x0, 0x0, &(0x7f0000005bc0)=[{&(0x7f0000003a00)=""/181, 0xb5}], 0x1, &(0x7f0000005c40)=""/4096, 0x1000, 0xb5d}}, {{0x0, 0x0, &(0x7f0000006ec0)=[{&(0x7f0000006cc0)=""/230, 0xe6}, {&(0x7f0000006dc0)=""/66, 0x42}], 0x2, 0x0, 0x0, 0x1000}, 0x5}], 0x5, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_sha512\x00'}, 0x58) dup(r0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, 0x0, 0x0) r2 = syz_open_dev$media(0x0, 0x0, 0x101000) ioctl$KVM_S390_UCAS_UNMAP(r2, 0x4018ae51, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000240)="3b02", 0x2) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000100), &(0x7f0000000180)=0x1) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000200), &(0x7f0000000380)=0xc) setsockopt$sock_cred(r2, 0x1, 0x11, 0x0, 0x0) open$dir(&(0x7f0000000400)='./file0\x00', 0x80, 0x0) r3 = accept$alg(r1, 0x0, 0x0) recvmmsg(r3, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x34e, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d, 0xbb000000}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) 10:18:38 executing program 1: r0 = open$dir(0x0, 0x0, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000009340)=[{{0xffffffffffffffff, 0x0, &(0x7f0000003280)=[{&(0x7f0000002180)=""/113, 0x71}, {&(0x7f0000002200)=""/66, 0x42}, {&(0x7f0000002280)=""/4096, 0x1000}, {&(0x7f0000001e40)=""/64, 0x40}], 0x4, &(0x7f00000032c0)=""/224, 0xe0, 0x9}, 0xfffffffffffffffe}, {{0x0, 0x0, &(0x7f0000003480)=[{&(0x7f00000033c0)=""/137, 0x89}], 0x1, 0x0, 0x0, 0x2}, 0xca}, {{&(0x7f0000003800)=@hci, 0x80, &(0x7f0000003940)}}, {{0x0, 0x0, &(0x7f0000005bc0)=[{&(0x7f0000003a00)=""/181, 0xb5}], 0x1, &(0x7f0000005c40)=""/4096, 0x1000, 0xb5d}}, {{0x0, 0x0, &(0x7f0000006ec0)=[{&(0x7f0000006cc0)=""/230, 0xe6}, {&(0x7f0000006dc0)=""/66, 0x42}], 0x2, 0x0, 0x0, 0x1000}, 0x5}], 0x5, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_sha512\x00'}, 0x58) dup(r0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, 0x0, 0x0) r2 = syz_open_dev$media(0x0, 0x0, 0x101000) ioctl$KVM_S390_UCAS_UNMAP(r2, 0x4018ae51, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000240)="3b02", 0x2) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000100), &(0x7f0000000180)=0x1) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000200), &(0x7f0000000380)=0xc) setsockopt$sock_cred(r2, 0x1, 0x11, 0x0, 0x0) open$dir(&(0x7f0000000400)='./file0\x00', 0x80, 0x0) r3 = accept$alg(r1, 0x0, 0x0) recvmmsg(r3, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x34e, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d, 0xbb000000}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) 10:18:38 executing program 3: r0 = open$dir(0x0, 0x0, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000009340)=[{{0xffffffffffffffff, 0x0, &(0x7f0000003280)=[{&(0x7f0000002180)=""/113, 0x71}, {&(0x7f0000002200)=""/66, 0x42}, {&(0x7f0000002280)=""/4096, 0x1000}, {&(0x7f0000001e40)=""/64, 0x40}], 0x4, &(0x7f00000032c0)=""/224, 0xe0, 0x9}, 0xfffffffffffffffe}, {{0x0, 0x0, &(0x7f0000003480)=[{&(0x7f00000033c0)=""/137, 0x89}], 0x1, 0x0, 0x0, 0x2}, 0xca}, {{&(0x7f0000003800)=@hci, 0x80, &(0x7f0000003940)}}, {{0x0, 0x0, &(0x7f0000005bc0)=[{&(0x7f0000003a00)=""/181, 0xb5}], 0x1, &(0x7f0000005c40)=""/4096, 0x1000, 0xb5d}}, {{0x0, 0x0, &(0x7f0000006ec0)=[{&(0x7f0000006cc0)=""/230, 0xe6}, {&(0x7f0000006dc0)=""/66, 0x42}], 0x2, 0x0, 0x0, 0x1000}, 0x5}], 0x5, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_sha512\x00'}, 0x58) dup(r0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, 0x0, 0x0) r2 = syz_open_dev$media(0x0, 0x0, 0x101000) ioctl$KVM_S390_UCAS_UNMAP(r2, 0x4018ae51, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000240)="3b02", 0x2) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000100), &(0x7f0000000180)=0x1) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000200), &(0x7f0000000380)=0xc) setsockopt$sock_cred(r2, 0x1, 0x11, 0x0, 0x0) open$dir(&(0x7f0000000400)='./file0\x00', 0x80, 0x0) r3 = accept$alg(r1, 0x0, 0x0) recvmmsg(r3, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x34e, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d, 0xbb000000}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) 10:18:38 executing program 2: r0 = open$dir(0x0, 0x0, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000009340)=[{{0xffffffffffffffff, 0x0, &(0x7f0000003280)=[{&(0x7f0000002180)=""/113, 0x71}, {&(0x7f0000002200)=""/66, 0x42}, {&(0x7f0000002280)=""/4096, 0x1000}, {&(0x7f0000001e40)=""/64, 0x40}], 0x4, &(0x7f00000032c0)=""/224, 0xe0, 0x9}, 0xfffffffffffffffe}, {{0x0, 0x0, &(0x7f0000003480)=[{&(0x7f00000033c0)=""/137, 0x89}], 0x1, 0x0, 0x0, 0x2}, 0xca}, {{&(0x7f0000003800)=@hci, 0x80, &(0x7f0000003940)}}, {{0x0, 0x0, &(0x7f0000005bc0)=[{&(0x7f0000003a00)=""/181, 0xb5}], 0x1, &(0x7f0000005c40)=""/4096, 0x1000, 0xb5d}}, {{0x0, 0x0, &(0x7f0000006ec0)=[{&(0x7f0000006cc0)=""/230, 0xe6}, {&(0x7f0000006dc0)=""/66, 0x42}], 0x2, 0x0, 0x0, 0x1000}, 0x5}], 0x5, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_sha512\x00'}, 0x58) dup(r0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, 0x0, 0x0) r2 = syz_open_dev$media(0x0, 0x0, 0x101000) ioctl$KVM_S390_UCAS_UNMAP(r2, 0x4018ae51, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000240)="3b02", 0x2) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000100), &(0x7f0000000180)=0x1) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000200), &(0x7f0000000380)=0xc) setsockopt$sock_cred(r2, 0x1, 0x11, 0x0, 0x0) open$dir(&(0x7f0000000400)='./file0\x00', 0x80, 0x0) r3 = accept$alg(r1, 0x0, 0x0) recvmmsg(r3, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x34e, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d, 0xbb000000}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) 10:18:38 executing program 4: r0 = open$dir(0x0, 0x0, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000009340)=[{{0xffffffffffffffff, 0x0, &(0x7f0000003280)=[{&(0x7f0000002180)=""/113, 0x71}, {&(0x7f0000002200)=""/66, 0x42}, {&(0x7f0000002280)=""/4096, 0x1000}, {&(0x7f0000001e40)=""/64, 0x40}], 0x4, &(0x7f00000032c0)=""/224, 0xe0, 0x9}, 0xfffffffffffffffe}, {{0x0, 0x0, &(0x7f0000003480)=[{&(0x7f00000033c0)=""/137, 0x89}], 0x1, 0x0, 0x0, 0x2}, 0xca}, {{&(0x7f0000003800)=@hci, 0x80, &(0x7f0000003940)}}, {{0x0, 0x0, &(0x7f0000005bc0)=[{&(0x7f0000003a00)=""/181, 0xb5}], 0x1, &(0x7f0000005c40)=""/4096, 0x1000, 0xb5d}}, {{0x0, 0x0, &(0x7f0000006ec0)=[{&(0x7f0000006cc0)=""/230, 0xe6}, {&(0x7f0000006dc0)=""/66, 0x42}], 0x2, 0x0, 0x0, 0x1000}, 0x5}], 0x5, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_sha512\x00'}, 0x58) dup(r0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, 0x0, 0x0) r2 = syz_open_dev$media(0x0, 0x0, 0x101000) ioctl$KVM_S390_UCAS_UNMAP(r2, 0x4018ae51, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000240)="3b02", 0x2) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000100), &(0x7f0000000180)=0x1) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000200), &(0x7f0000000380)=0xc) setsockopt$sock_cred(r2, 0x1, 0x11, 0x0, 0x0) open$dir(&(0x7f0000000400)='./file0\x00', 0x80, 0x0) r3 = accept$alg(r1, 0x0, 0x0) recvmmsg(r3, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x34e, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d, 0xbb000000}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) 10:18:38 executing program 5: r0 = open$dir(0x0, 0x0, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000009340)=[{{0xffffffffffffffff, 0x0, &(0x7f0000003280)=[{&(0x7f0000002180)=""/113, 0x71}, {&(0x7f0000002200)=""/66, 0x42}, {&(0x7f0000002280)=""/4096, 0x1000}, {&(0x7f0000001e40)=""/64, 0x40}], 0x4, &(0x7f00000032c0)=""/224, 0xe0, 0x9}, 0xfffffffffffffffe}, {{0x0, 0x0, &(0x7f0000003480)=[{&(0x7f00000033c0)=""/137, 0x89}], 0x1, 0x0, 0x0, 0x2}, 0xca}, {{&(0x7f0000003800)=@hci, 0x80, &(0x7f0000003940)}}, {{0x0, 0x0, &(0x7f0000005bc0)=[{&(0x7f0000003a00)=""/181, 0xb5}], 0x1, &(0x7f0000005c40)=""/4096, 0x1000, 0xb5d}}, {{0x0, 0x0, &(0x7f0000006ec0)=[{&(0x7f0000006cc0)=""/230, 0xe6}, {&(0x7f0000006dc0)=""/66, 0x42}], 0x2, 0x0, 0x0, 0x1000}, 0x5}], 0x5, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_sha512\x00'}, 0x58) dup(r0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, 0x0, 0x0) r2 = syz_open_dev$media(0x0, 0x0, 0x101000) ioctl$KVM_S390_UCAS_UNMAP(r2, 0x4018ae51, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000240)="3b02", 0x2) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000100), &(0x7f0000000180)=0x1) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000200), &(0x7f0000000380)=0xc) setsockopt$sock_cred(r2, 0x1, 0x11, 0x0, 0x0) open$dir(&(0x7f0000000400)='./file0\x00', 0x80, 0x0) r3 = accept$alg(r1, 0x0, 0x0) recvmmsg(r3, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x34e, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d, 0xbb000000}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) 10:18:38 executing program 0: r0 = open$dir(0x0, 0x0, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000009340)=[{{0xffffffffffffffff, 0x0, &(0x7f0000003280)=[{&(0x7f0000002180)=""/113, 0x71}, {&(0x7f0000002200)=""/66, 0x42}, {&(0x7f0000002280)=""/4096, 0x1000}, {&(0x7f0000001e40)=""/64, 0x40}], 0x4, &(0x7f00000032c0)=""/224, 0xe0, 0x9}, 0xfffffffffffffffe}, {{0x0, 0x0, &(0x7f0000003480)=[{&(0x7f00000033c0)=""/137, 0x89}], 0x1, 0x0, 0x0, 0x2}, 0xca}, {{&(0x7f0000003800)=@hci, 0x80, &(0x7f0000003940)}}, {{0x0, 0x0, &(0x7f0000005bc0)=[{&(0x7f0000003a00)=""/181, 0xb5}], 0x1, &(0x7f0000005c40)=""/4096, 0x1000, 0xb5d}}, {{0x0, 0x0, &(0x7f0000006ec0)=[{&(0x7f0000006cc0)=""/230, 0xe6}, {&(0x7f0000006dc0)=""/66, 0x42}], 0x2, 0x0, 0x0, 0x1000}, 0x5}], 0x5, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_sha512\x00'}, 0x58) dup(r0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, 0x0, 0x0) r2 = syz_open_dev$media(0x0, 0x0, 0x101000) ioctl$KVM_S390_UCAS_UNMAP(r2, 0x4018ae51, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000240)="3b02", 0x2) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000100), &(0x7f0000000180)=0x1) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000200), &(0x7f0000000380)=0xc) setsockopt$sock_cred(r2, 0x1, 0x11, 0x0, 0x0) open$dir(&(0x7f0000000400)='./file0\x00', 0x80, 0x0) r3 = accept$alg(r1, 0x0, 0x0) recvmmsg(r3, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x34e, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d, 0xbb000000}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) 10:18:39 executing program 1: r0 = open$dir(0x0, 0x0, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000009340)=[{{0xffffffffffffffff, 0x0, &(0x7f0000003280)=[{&(0x7f0000002180)=""/113, 0x71}, {&(0x7f0000002200)=""/66, 0x42}, {&(0x7f0000002280)=""/4096, 0x1000}, {&(0x7f0000001e40)=""/64, 0x40}], 0x4, &(0x7f00000032c0)=""/224, 0xe0, 0x9}, 0xfffffffffffffffe}, {{0x0, 0x0, &(0x7f0000003480)=[{&(0x7f00000033c0)=""/137, 0x89}], 0x1, 0x0, 0x0, 0x2}, 0xca}, {{&(0x7f0000003800)=@hci, 0x80, &(0x7f0000003940)}}, {{0x0, 0x0, &(0x7f0000005bc0)=[{&(0x7f0000003a00)=""/181, 0xb5}], 0x1, &(0x7f0000005c40)=""/4096, 0x1000, 0xb5d}}, {{0x0, 0x0, &(0x7f0000006ec0)=[{&(0x7f0000006cc0)=""/230, 0xe6}, {&(0x7f0000006dc0)=""/66, 0x42}], 0x2, 0x0, 0x0, 0x1000}, 0x5}], 0x5, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_sha512\x00'}, 0x58) dup(r0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, 0x0, 0x0) r2 = syz_open_dev$media(0x0, 0x0, 0x101000) ioctl$KVM_S390_UCAS_UNMAP(r2, 0x4018ae51, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000240)="3b02", 0x2) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000100), &(0x7f0000000180)=0x1) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000200), &(0x7f0000000380)=0xc) setsockopt$sock_cred(r2, 0x1, 0x11, 0x0, 0x0) open$dir(&(0x7f0000000400)='./file0\x00', 0x80, 0x0) r3 = accept$alg(r1, 0x0, 0x0) recvmmsg(r3, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x34e, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d, 0xbb000000}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) 10:18:39 executing program 2: r0 = open$dir(0x0, 0x0, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000009340)=[{{0xffffffffffffffff, 0x0, &(0x7f0000003280)=[{&(0x7f0000002180)=""/113, 0x71}, {&(0x7f0000002200)=""/66, 0x42}, {&(0x7f0000002280)=""/4096, 0x1000}, {&(0x7f0000001e40)=""/64, 0x40}], 0x4, &(0x7f00000032c0)=""/224, 0xe0, 0x9}, 0xfffffffffffffffe}, {{0x0, 0x0, &(0x7f0000003480)=[{&(0x7f00000033c0)=""/137, 0x89}], 0x1, 0x0, 0x0, 0x2}, 0xca}, {{&(0x7f0000003800)=@hci, 0x80, &(0x7f0000003940)}}, {{0x0, 0x0, &(0x7f0000005bc0)=[{&(0x7f0000003a00)=""/181, 0xb5}], 0x1, &(0x7f0000005c40)=""/4096, 0x1000, 0xb5d}}, {{0x0, 0x0, &(0x7f0000006ec0)=[{&(0x7f0000006cc0)=""/230, 0xe6}, {&(0x7f0000006dc0)=""/66, 0x42}], 0x2, 0x0, 0x0, 0x1000}, 0x5}], 0x5, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_sha512\x00'}, 0x58) dup(r0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, 0x0, 0x0) r2 = syz_open_dev$media(0x0, 0x0, 0x101000) ioctl$KVM_S390_UCAS_UNMAP(r2, 0x4018ae51, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000240)="3b02", 0x2) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000100), &(0x7f0000000180)=0x1) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000200), &(0x7f0000000380)=0xc) setsockopt$sock_cred(r2, 0x1, 0x11, 0x0, 0x0) open$dir(&(0x7f0000000400)='./file0\x00', 0x80, 0x0) r3 = accept$alg(r1, 0x0, 0x0) recvmmsg(r3, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x34e, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d, 0xbb000000}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) 10:18:39 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) bind$inet(r0, &(0x7f0000000600)={0x2, 0x4e23, @multicast2}, 0x10) connect$inet(r0, &(0x7f00000001c0)={0x2, 0x4e23}, 0x10) sendto$inet(r0, &(0x7f0000000300)='\a', 0x1, 0x8055, 0x0, 0x0) 10:18:39 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) bind$inet(r0, &(0x7f0000000600)={0x2, 0x4e23, @multicast2}, 0x10) connect$inet(r0, &(0x7f00000001c0)={0x2, 0x4e23}, 0x10) sendto$inet(r0, &(0x7f0000000300)='\a', 0x1, 0x8055, 0x0, 0x0) 10:18:39 executing program 4: socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000580)=""/4096, 0x1000}], 0x1}, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) 10:18:39 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) bind$inet(r0, &(0x7f0000000600)={0x2, 0x4e23, @multicast2}, 0x10) connect$inet(r0, &(0x7f00000001c0)={0x2, 0x4e23}, 0x10) sendto$inet(r0, &(0x7f0000000300)='\a', 0x1, 0x8055, 0x0, 0x0) 10:18:39 executing program 3: msgrcv(0x0, 0x0, 0x189, 0x0, 0x3c18608a0b7cd813) 10:18:39 executing program 5: capset(&(0x7f00000003c0)={0x19980330}, &(0x7f0000000400)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000480)='highspeed\x00', 0xe) 10:18:39 executing program 0: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000007000/0x4000)=nil, 0x4000, 0x0, 0x2812, r0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1081}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$tun(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="cc"], 0x1) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) 10:18:40 executing program 3: msgrcv(0x0, 0x0, 0x189, 0x0, 0x3c18608a0b7cd813) 10:18:40 executing program 5: capset(&(0x7f00000003c0)={0x19980330}, &(0x7f0000000400)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000480)='highspeed\x00', 0xe) 10:18:40 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000040)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f000086c000)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) read(r0, &(0x7f0000465f8e)=""/114, 0x37) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UFFDIO_UNREGISTER(r1, 0x8010aa02, &(0x7f0000000240)={&(0x7f000001d000/0xc00000)=nil, 0xc00000}) 10:18:40 executing program 1: r0 = open$dir(0x0, 0x0, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000009340)=[{{0xffffffffffffffff, 0x0, &(0x7f0000003280)=[{&(0x7f0000002180)=""/113, 0x71}, {&(0x7f0000002200)=""/66, 0x42}, {&(0x7f0000002280)=""/4096, 0x1000}, {&(0x7f0000001e40)=""/64, 0x40}], 0x4, &(0x7f00000032c0)=""/224, 0xe0, 0x9}, 0xfffffffffffffffe}, {{0x0, 0x0, &(0x7f0000003480)=[{&(0x7f00000033c0)=""/137, 0x89}], 0x1, 0x0, 0x0, 0x2}, 0xca}, {{&(0x7f0000003800)=@hci, 0x80, &(0x7f0000003940)}}, {{0x0, 0x0, &(0x7f0000005bc0)=[{&(0x7f0000003a00)=""/181, 0xb5}], 0x1, &(0x7f0000005c40)=""/4096, 0x1000, 0xb5d}}, {{0x0, 0x0, &(0x7f0000006ec0)=[{&(0x7f0000006cc0)=""/230, 0xe6}, {&(0x7f0000006dc0)=""/66, 0x42}], 0x2, 0x0, 0x0, 0x1000}, 0x5}], 0x5, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_sha512\x00'}, 0x58) dup(r0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, 0x0, 0x0) r2 = syz_open_dev$media(0x0, 0x0, 0x101000) ioctl$KVM_S390_UCAS_UNMAP(r2, 0x4018ae51, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000240)="3b02", 0x2) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000100), &(0x7f0000000180)=0x1) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000200), &(0x7f0000000380)=0xc) setsockopt$sock_cred(r2, 0x1, 0x11, 0x0, 0x0) open$dir(&(0x7f0000000400)='./file0\x00', 0x80, 0x0) r3 = accept$alg(r1, 0x0, 0x0) recvmmsg(r3, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x34e, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d, 0xbb000000}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) 10:18:40 executing program 3: msgrcv(0x0, 0x0, 0x189, 0x0, 0x3c18608a0b7cd813) 10:18:40 executing program 0: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000007000/0x4000)=nil, 0x4000, 0x0, 0x2812, r0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1081}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$tun(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="cc"], 0x1) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) 10:18:40 executing program 5: capset(&(0x7f00000003c0)={0x19980330}, &(0x7f0000000400)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000480)='highspeed\x00', 0xe) [ 1643.476820] FAULT_FLAG_ALLOW_RETRY missing 31 [ 1643.518135] CPU: 1 PID: 7261 Comm: syz-executor.2 Not tainted 5.0.0+ #10 [ 1643.524981] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1643.534329] Call Trace: [ 1643.536936] dump_stack+0x172/0x1f0 [ 1643.540647] handle_userfault.cold+0x41/0x5d [ 1643.545071] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 1643.550198] ? debug_check_no_obj_freed+0x200/0x464 [ 1643.555225] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 1643.560352] ? userfaultfd_ioctl+0x3aa0/0x3aa0 [ 1643.564980] ? trace_hardirqs_on+0x67/0x230 [ 1643.569321] ? kasan_check_read+0x11/0x20 [ 1643.569350] ? mark_held_locks+0xa4/0xf0 [ 1643.569365] ? free_unref_page+0x476/0x600 [ 1643.569375] ? __free_pages+0x72/0xb0 [ 1643.569386] ? free_unref_page+0x476/0x600 [ 1643.569399] ? lockdep_hardirqs_on+0x418/0x5d0 [ 1643.569416] ? trace_hardirqs_on+0x67/0x230 [ 1643.598755] do_huge_pmd_anonymous_page+0x98a/0x1710 [ 1643.603858] ? is_dynamic_key+0x1c0/0x1c0 [ 1643.608027] ? __thp_get_unmapped_area+0x190/0x190 [ 1643.612997] ? __lock_acquire+0x548/0x3fb0 10:18:40 executing program 4: socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000580)=""/4096, 0x1000}], 0x1}, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) 10:18:40 executing program 3: msgrcv(0x0, 0x0, 0x189, 0x0, 0x3c18608a0b7cd813) [ 1643.617264] __handle_mm_fault+0x2d50/0x3eb0 [ 1643.621671] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 1643.626511] ? find_held_lock+0x35/0x130 [ 1643.630594] ? handle_mm_fault+0x322/0xb30 [ 1643.634851] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1643.640393] ? kasan_check_read+0x11/0x20 [ 1643.644552] handle_mm_fault+0x43f/0xb30 [ 1643.648691] __do_page_fault+0x5da/0xd60 [ 1643.652760] do_page_fault+0x71/0x581 [ 1643.656571] page_fault+0x1e/0x30 [ 1643.660025] RIP: 0010:copy_user_generic_unrolled+0x89/0xc0 [ 1643.665648] Code: 38 4c 89 47 20 4c 89 4f 28 4c 89 57 30 4c 89 5f 38 48 8d 76 40 48 8d 7f 40 ff c9 75 b6 89 d1 83 e2 07 c1 e9 03 74 12 4c 8b 06 <4c> 89 07 48 8d 76 08 48 8d 7f 08 ff c9 75 ee 21 d2 74 10 89 d1 8a [ 1643.684570] RSP: 0018:ffff8880643e7b28 EFLAGS: 00010202 [ 1643.689947] RAX: ffffed100c87cf81 RBX: 0000000000000008 RCX: 0000000000000001 [ 1643.697211] RDX: 0000000000000000 RSI: ffff8880643e7c00 RDI: 0000000020465f8e [ 1643.704478] RBP: ffff8880643e7b60 R08: 0000000000000000 R09: ffffed100c87cf81 [ 1643.711740] R10: ffffed100c87cf80 R11: ffff8880643e7c07 R12: 0000000020465f8e [ 1643.719006] R13: ffff8880643e7c00 R14: 0000000020465f96 R15: 00007ffffffff000 [ 1643.726323] ? _copy_to_user+0xf7/0x120 [ 1643.730323] perf_read+0x638/0x900 [ 1643.733868] ? perf_event_read_value+0x60/0x60 [ 1643.738445] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1643.743979] ? selinux_is_enabled+0x43/0x60 [ 1643.748298] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1643.753836] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1643.759376] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1643.764941] ? fsnotify+0x3ac/0xbf0 [ 1643.768599] __vfs_read+0x116/0x8c0 [ 1643.772233] ? perf_event_read_value+0x60/0x60 [ 1643.776824] ? vfs_copy_file_range+0xbb0/0xbb0 [ 1643.781419] ? selinux_file_permission+0x92/0x550 [ 1643.786314] ? security_file_permission+0x94/0x320 [ 1643.791265] ? rw_verify_area+0x118/0x360 [ 1643.795424] vfs_read+0x194/0x3e0 [ 1643.798903] ksys_read+0xea/0x1f0 [ 1643.802367] ? kernel_write+0x120/0x120 [ 1643.806349] ? do_syscall_64+0x26/0x610 [ 1643.810319] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1643.815684] ? do_syscall_64+0x26/0x610 [ 1643.819665] __x64_sys_read+0x73/0xb0 [ 1643.823468] do_syscall_64+0x103/0x610 [ 1643.827357] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1643.832581] RIP: 0033:0x457f29 [ 1643.835780] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1643.854692] RSP: 002b:00007f59d938ec78 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1643.862411] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457f29 10:18:40 executing program 5: capset(&(0x7f00000003c0)={0x19980330}, &(0x7f0000000400)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000480)='highspeed\x00', 0xe) [ 1643.869669] RDX: 0000000000000037 RSI: 0000000020465f8e RDI: 0000000000000003 [ 1643.876932] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1643.884207] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f59d938f6d4 [ 1643.891470] R13: 00000000004c3a63 R14: 00000000004d8550 R15: 00000000ffffffff 10:18:40 executing program 3: socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000580)=""/4096, 0x1000}], 0x1}, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) 10:18:40 executing program 0: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000007000/0x4000)=nil, 0x4000, 0x0, 0x2812, r0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1081}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$tun(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="cc"], 0x1) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) 10:18:40 executing program 5: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000007000/0x4000)=nil, 0x4000, 0x0, 0x2812, r0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1081}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$tun(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="cc"], 0x1) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) 10:18:40 executing program 1: r0 = open$dir(0x0, 0x0, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000009340)=[{{0xffffffffffffffff, 0x0, &(0x7f0000003280)=[{&(0x7f0000002180)=""/113, 0x71}, {&(0x7f0000002200)=""/66, 0x42}, {&(0x7f0000002280)=""/4096, 0x1000}, {&(0x7f0000001e40)=""/64, 0x40}], 0x4, &(0x7f00000032c0)=""/224, 0xe0, 0x9}, 0xfffffffffffffffe}, {{0x0, 0x0, &(0x7f0000003480)=[{&(0x7f00000033c0)=""/137, 0x89}], 0x1, 0x0, 0x0, 0x2}, 0xca}, {{&(0x7f0000003800)=@hci, 0x80, &(0x7f0000003940)}}, {{0x0, 0x0, &(0x7f0000005bc0)=[{&(0x7f0000003a00)=""/181, 0xb5}], 0x1, &(0x7f0000005c40)=""/4096, 0x1000, 0xb5d}}, {{0x0, 0x0, &(0x7f0000006ec0)=[{&(0x7f0000006cc0)=""/230, 0xe6}, {&(0x7f0000006dc0)=""/66, 0x42}], 0x2, 0x0, 0x0, 0x1000}, 0x5}], 0x5, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_sha512\x00'}, 0x58) dup(r0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, 0x0, 0x0) r2 = syz_open_dev$media(0x0, 0x0, 0x101000) ioctl$KVM_S390_UCAS_UNMAP(r2, 0x4018ae51, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000240)="3b02", 0x2) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000100), &(0x7f0000000180)=0x1) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000200), &(0x7f0000000380)=0xc) setsockopt$sock_cred(r2, 0x1, 0x11, 0x0, 0x0) open$dir(&(0x7f0000000400)='./file0\x00', 0x80, 0x0) r3 = accept$alg(r1, 0x0, 0x0) recvmmsg(r3, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x34e, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d, 0xbb000000}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) 10:18:41 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000040)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f000086c000)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) read(r0, &(0x7f0000465f8e)=""/114, 0x37) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UFFDIO_UNREGISTER(r1, 0x8010aa02, &(0x7f0000000240)={&(0x7f000001d000/0xc00000)=nil, 0xc00000}) 10:18:41 executing program 4: socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000580)=""/4096, 0x1000}], 0x1}, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) 10:18:41 executing program 5: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000007000/0x4000)=nil, 0x4000, 0x0, 0x2812, r0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1081}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$tun(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="cc"], 0x1) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) 10:18:41 executing program 0: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000007000/0x4000)=nil, 0x4000, 0x0, 0x2812, r0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1081}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$tun(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="cc"], 0x1) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) 10:18:41 executing program 3: socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000580)=""/4096, 0x1000}], 0x1}, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) 10:18:41 executing program 1: openat$vfio(0xffffffffffffff9c, 0x0, 0x214400, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x0, 0xfffffffffffff000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/net/tun\xff', 0x241, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) mq_unlink(0x0) syz_mount_image$btrfs(&(0x7f00000002c0)='btrfs\x00', 0x0, 0x0, 0x0, 0x0, 0x2, 0x0) 10:18:41 executing program 1: openat$vfio(0xffffffffffffff9c, 0x0, 0x214400, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x0, 0xfffffffffffff000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/net/tun\xff', 0x241, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) mq_unlink(0x0) syz_mount_image$btrfs(&(0x7f00000002c0)='btrfs\x00', 0x0, 0x0, 0x0, 0x0, 0x2, 0x0) [ 1644.682620] FAULT_FLAG_ALLOW_RETRY missing 31 [ 1644.710465] CPU: 0 PID: 7318 Comm: syz-executor.2 Not tainted 5.0.0+ #10 [ 1644.717317] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1644.726662] Call Trace: [ 1644.729258] dump_stack+0x172/0x1f0 [ 1644.732900] handle_userfault.cold+0x41/0x5d [ 1644.737329] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 1644.742521] ? debug_check_no_obj_freed+0x200/0x464 [ 1644.747585] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 1644.752704] ? userfaultfd_ioctl+0x3aa0/0x3aa0 [ 1644.757289] ? trace_hardirqs_on+0x67/0x230 [ 1644.761631] ? kasan_check_read+0x11/0x20 [ 1644.765788] ? mark_held_locks+0xa4/0xf0 [ 1644.769884] ? free_unref_page+0x476/0x600 [ 1644.774132] ? __free_pages+0x72/0xb0 [ 1644.777948] ? free_unref_page+0x476/0x600 [ 1644.782183] ? lockdep_hardirqs_on+0x418/0x5d0 [ 1644.786784] ? trace_hardirqs_on+0x67/0x230 [ 1644.791127] do_huge_pmd_anonymous_page+0x98a/0x1710 [ 1644.796230] ? is_dynamic_key+0x1c0/0x1c0 [ 1644.800387] ? __thp_get_unmapped_area+0x190/0x190 [ 1644.805317] ? __lock_acquire+0x548/0x3fb0 [ 1644.809594] __handle_mm_fault+0x2d50/0x3eb0 [ 1644.814051] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 1644.818895] ? find_held_lock+0x35/0x130 [ 1644.822954] ? handle_mm_fault+0x322/0xb30 [ 1644.827204] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1644.832747] ? kasan_check_read+0x11/0x20 [ 1644.836900] handle_mm_fault+0x43f/0xb30 [ 1644.840969] __do_page_fault+0x5da/0xd60 [ 1644.845041] do_page_fault+0x71/0x581 [ 1644.848846] page_fault+0x1e/0x30 [ 1644.852321] RIP: 0010:copy_user_generic_unrolled+0x89/0xc0 [ 1644.857943] Code: 38 4c 89 47 20 4c 89 4f 28 4c 89 57 30 4c 89 5f 38 48 8d 76 40 48 8d 7f 40 ff c9 75 b6 89 d1 83 e2 07 c1 e9 03 74 12 4c 8b 06 <4c> 89 07 48 8d 76 08 48 8d 7f 08 ff c9 75 ee 21 d2 74 10 89 d1 8a [ 1644.876843] RSP: 0018:ffff88807468fb28 EFLAGS: 00010202 [ 1644.882239] RAX: ffffed100e8d1f81 RBX: 0000000000000008 RCX: 0000000000000001 [ 1644.889504] RDX: 0000000000000000 RSI: ffff88807468fc00 RDI: 0000000020465f8e [ 1644.896792] RBP: ffff88807468fb60 R08: 0000000000000000 R09: ffffed100e8d1f81 [ 1644.904061] R10: ffffed100e8d1f80 R11: ffff88807468fc07 R12: 0000000020465f8e 10:18:41 executing program 4: socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000580)=""/4096, 0x1000}], 0x1}, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) 10:18:41 executing program 1: openat$vfio(0xffffffffffffff9c, 0x0, 0x214400, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x0, 0xfffffffffffff000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/net/tun\xff', 0x241, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) mq_unlink(0x0) syz_mount_image$btrfs(&(0x7f00000002c0)='btrfs\x00', 0x0, 0x0, 0x0, 0x0, 0x2, 0x0) [ 1644.911330] R13: ffff88807468fc00 R14: 0000000020465f96 R15: 00007ffffffff000 [ 1644.918617] ? _copy_to_user+0xf7/0x120 [ 1644.922591] perf_read+0x638/0x900 [ 1644.926132] ? perf_event_read_value+0x60/0x60 [ 1644.930714] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1644.936255] ? selinux_is_enabled+0x43/0x60 [ 1644.940601] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1644.946170] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1644.951735] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1644.957279] ? fsnotify+0x3ac/0xbf0 10:18:41 executing program 1: openat$vfio(0xffffffffffffff9c, 0x0, 0x214400, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x0, 0xfffffffffffff000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/net/tun\xff', 0x241, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) mq_unlink(0x0) syz_mount_image$btrfs(&(0x7f00000002c0)='btrfs\x00', 0x0, 0x0, 0x0, 0x0, 0x2, 0x0) [ 1644.960911] __vfs_read+0x116/0x8c0 [ 1644.964559] ? perf_event_read_value+0x60/0x60 [ 1644.969164] ? vfs_copy_file_range+0xbb0/0xbb0 [ 1644.973752] ? selinux_file_permission+0x92/0x550 [ 1644.979049] ? security_file_permission+0x94/0x320 [ 1644.983987] ? rw_verify_area+0x118/0x360 [ 1644.988143] vfs_read+0x194/0x3e0 [ 1644.991614] ksys_read+0xea/0x1f0 [ 1644.995090] ? kernel_write+0x120/0x120 [ 1644.999071] ? do_syscall_64+0x26/0x610 [ 1645.003049] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe 10:18:41 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000040)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f000086c000)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) read(r0, &(0x7f0000465f8e)=""/114, 0x37) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UFFDIO_UNREGISTER(r1, 0x8010aa02, &(0x7f0000000240)={&(0x7f000001d000/0xc00000)=nil, 0xc00000}) [ 1645.008411] ? do_syscall_64+0x26/0x610 [ 1645.012402] __x64_sys_read+0x73/0xb0 [ 1645.016204] do_syscall_64+0x103/0x610 [ 1645.020106] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1645.025290] RIP: 0033:0x457f29 [ 1645.028475] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1645.047386] RSP: 002b:00007f59d938ec78 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 10:18:41 executing program 3: socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000580)=""/4096, 0x1000}], 0x1}, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) [ 1645.055087] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457f29 [ 1645.062340] RDX: 0000000000000037 RSI: 0000000020465f8e RDI: 0000000000000003 [ 1645.069609] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1645.076869] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f59d938f6d4 [ 1645.084114] R13: 00000000004c3a63 R14: 00000000004d8550 R15: 00000000ffffffff 10:18:42 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000040)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f000086c000)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) read(r0, &(0x7f0000465f8e)=""/114, 0x37) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UFFDIO_UNREGISTER(r1, 0x8010aa02, &(0x7f0000000240)={&(0x7f000001d000/0xc00000)=nil, 0xc00000}) 10:18:42 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") socket$inet(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x2b, 0x801, 0x0) bind$inet(r1, &(0x7f0000000000)={0x2, 0x4e23, @empty}, 0x10) connect$inet(r1, &(0x7f00000001c0)={0x2, 0x4e23}, 0x10) recvmmsg(r1, &(0x7f000000a500), 0x400000000000259, 0x0, &(0x7f000000a780)={0x77359400}) 10:18:42 executing program 5: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000007000/0x4000)=nil, 0x4000, 0x0, 0x2812, r0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1081}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$tun(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="cc"], 0x1) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) 10:18:42 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000040)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f000086c000)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) read(r0, &(0x7f0000465f8e)=""/114, 0x37) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UFFDIO_UNREGISTER(r1, 0x8010aa02, &(0x7f0000000240)={&(0x7f000001d000/0xc00000)=nil, 0xc00000}) 10:18:42 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000500)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x11) ioctl$TIOCGLCKTRMIOS(r0, 0x405c5503, &(0x7f0000000000)={0x0, 0x0, 0x2}) ioctl$UI_SET_LEDBIT(r0, 0x40045569, 0x0) ioctl$UI_SET_LEDBIT(r0, 0x40045569, 0x9) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) 10:18:42 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, &(0x7f0000000400)='./file0\x00') mkdir(&(0x7f0000000080)='./file0\x00', 0x0) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(0xffffffffffffffff, 0xc0505405, &(0x7f0000000000)={{0x3, 0x3, 0x0, 0x3, 0x7}, 0x4, 0x5, 0x100000000}) accept$unix(0xffffffffffffffff, 0x0, 0x0) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f0000000480)={0xffffffff, 0x0, 0x5, 0x9, 0xffffffffffffc1b6}) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x0, 0x0) 10:18:42 executing program 4: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = fcntl$dupfd(r0, 0x0, r0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bind$bt_rfcomm(r1, &(0x7f0000000040)={0x1f, {0xffffffffffffffff, 0x1ff, 0x2}}, 0xa) [ 1645.564590] FAULT_FLAG_ALLOW_RETRY missing 31 [ 1645.603629] CPU: 1 PID: 7350 Comm: syz-executor.1 Not tainted 5.0.0+ #10 [ 1645.610486] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1645.613027] FAULT_FLAG_ALLOW_RETRY missing 31 [ 1645.619836] Call Trace: [ 1645.619884] dump_stack+0x172/0x1f0 [ 1645.619919] handle_userfault.cold+0x41/0x5d [ 1645.619947] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 1645.619965] ? debug_check_no_obj_freed+0x200/0x464 [ 1645.619979] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 1645.619995] ? userfaultfd_ioctl+0x3aa0/0x3aa0 [ 1645.620010] ? trace_hardirqs_on+0x67/0x230 [ 1645.620028] ? kasan_check_read+0x11/0x20 [ 1645.620057] ? mark_held_locks+0xa4/0xf0 [ 1645.667384] ? free_unref_page+0x476/0x600 [ 1645.671633] ? __free_pages+0x72/0xb0 [ 1645.675429] ? free_unref_page+0x476/0x600 [ 1645.679665] ? lockdep_hardirqs_on+0x418/0x5d0 [ 1645.684251] ? trace_hardirqs_on+0x67/0x230 [ 1645.688614] do_huge_pmd_anonymous_page+0x98a/0x1710 [ 1645.693729] ? is_dynamic_key+0x1c0/0x1c0 [ 1645.697895] ? __thp_get_unmapped_area+0x190/0x190 [ 1645.702831] ? __lock_acquire+0x548/0x3fb0 [ 1645.707089] __handle_mm_fault+0x2d50/0x3eb0 [ 1645.711501] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 1645.716364] ? find_held_lock+0x35/0x130 [ 1645.720444] ? handle_mm_fault+0x322/0xb30 [ 1645.724683] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1645.730225] ? kasan_check_read+0x11/0x20 [ 1645.734376] handle_mm_fault+0x43f/0xb30 [ 1645.738461] __do_page_fault+0x5da/0xd60 [ 1645.742559] do_page_fault+0x71/0x581 [ 1645.746378] page_fault+0x1e/0x30 [ 1645.749845] RIP: 0010:copy_user_generic_unrolled+0x89/0xc0 [ 1645.755475] Code: 38 4c 89 47 20 4c 89 4f 28 4c 89 57 30 4c 89 5f 38 48 8d 76 40 48 8d 7f 40 ff c9 75 b6 89 d1 83 e2 07 c1 e9 03 74 12 4c 8b 06 <4c> 89 07 48 8d 76 08 48 8d 7f 08 ff c9 75 ee 21 d2 74 10 89 d1 8a [ 1645.774372] RSP: 0018:ffff888037a2fb28 EFLAGS: 00010202 [ 1645.779729] RAX: ffffed1006f45f81 RBX: 0000000000000008 RCX: 0000000000000001 [ 1645.787002] RDX: 0000000000000000 RSI: ffff888037a2fc00 RDI: 0000000020465f8e [ 1645.794303] RBP: ffff888037a2fb60 R08: 0000000000000000 R09: ffffed1006f45f81 10:18:42 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") socket$inet(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x2b, 0x801, 0x0) bind$inet(r1, &(0x7f0000000000)={0x2, 0x4e23, @empty}, 0x10) connect$inet(r1, &(0x7f00000001c0)={0x2, 0x4e23}, 0x10) recvmmsg(r1, &(0x7f000000a500), 0x400000000000259, 0x0, &(0x7f000000a780)={0x77359400}) 10:18:42 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, &(0x7f0000000400)='./file0\x00') mkdir(&(0x7f0000000080)='./file0\x00', 0x0) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(0xffffffffffffffff, 0xc0505405, &(0x7f0000000000)={{0x3, 0x3, 0x0, 0x3, 0x7}, 0x4, 0x5, 0x100000000}) accept$unix(0xffffffffffffffff, 0x0, 0x0) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f0000000480)={0xffffffff, 0x0, 0x5, 0x9, 0xffffffffffffc1b6}) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x0, 0x0) [ 1645.801568] R10: ffffed1006f45f80 R11: ffff888037a2fc07 R12: 0000000020465f8e [ 1645.801579] R13: ffff888037a2fc00 R14: 0000000020465f96 R15: 00007ffffffff000 [ 1645.816151] ? _copy_to_user+0xf7/0x120 [ 1645.820134] perf_read+0x638/0x900 [ 1645.823675] ? perf_event_read_value+0x60/0x60 [ 1645.828266] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1645.833806] ? selinux_is_enabled+0x43/0x60 [ 1645.838124] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1645.843664] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1645.849208] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1645.854745] ? fsnotify+0x3ac/0xbf0 [ 1645.858371] __vfs_read+0x116/0x8c0 [ 1645.862001] ? perf_event_read_value+0x60/0x60 [ 1645.866646] ? vfs_copy_file_range+0xbb0/0xbb0 [ 1645.871239] ? selinux_file_permission+0x92/0x550 [ 1645.876097] ? security_file_permission+0x94/0x320 [ 1645.881053] ? rw_verify_area+0x118/0x360 [ 1645.885219] vfs_read+0x194/0x3e0 [ 1645.888703] ksys_read+0xea/0x1f0 [ 1645.892169] ? kernel_write+0x120/0x120 [ 1645.896157] ? do_syscall_64+0x26/0x610 10:18:42 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, &(0x7f0000000400)='./file0\x00') mkdir(&(0x7f0000000080)='./file0\x00', 0x0) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(0xffffffffffffffff, 0xc0505405, &(0x7f0000000000)={{0x3, 0x3, 0x0, 0x3, 0x7}, 0x4, 0x5, 0x100000000}) accept$unix(0xffffffffffffffff, 0x0, 0x0) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f0000000480)={0xffffffff, 0x0, 0x5, 0x9, 0xffffffffffffc1b6}) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x0, 0x0) [ 1645.900145] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1645.905514] ? do_syscall_64+0x26/0x610 [ 1645.909515] __x64_sys_read+0x73/0xb0 [ 1645.913341] do_syscall_64+0x103/0x610 [ 1645.917241] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1645.922431] RIP: 0033:0x457f29 [ 1645.925656] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1645.944565] RSP: 002b:00007fe46159dc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1645.952305] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457f29 [ 1645.959588] RDX: 0000000000000037 RSI: 0000000020465f8e RDI: 0000000000000003 [ 1645.966878] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1645.974146] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe46159e6d4 [ 1645.981411] R13: 00000000004c3a63 R14: 00000000004d8550 R15: 00000000ffffffff [ 1645.989888] CPU: 0 PID: 7356 Comm: syz-executor.2 Not tainted 5.0.0+ #10 [ 1645.996729] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1646.006086] Call Trace: [ 1646.008668] dump_stack+0x172/0x1f0 [ 1646.012332] handle_userfault.cold+0x41/0x5d [ 1646.016746] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 1646.021845] ? debug_check_no_obj_freed+0x200/0x464 [ 1646.026859] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 1646.031978] ? userfaultfd_ioctl+0x3aa0/0x3aa0 [ 1646.036566] ? trace_hardirqs_on+0x67/0x230 [ 1646.040878] ? kasan_check_read+0x11/0x20 [ 1646.045019] ? mark_held_locks+0xa4/0xf0 [ 1646.049070] ? free_unref_page+0x476/0x600 [ 1646.053961] ? __free_pages+0x72/0xb0 [ 1646.057763] ? free_unref_page+0x476/0x600 [ 1646.061987] ? lockdep_hardirqs_on+0x418/0x5d0 [ 1646.066607] ? trace_hardirqs_on+0x67/0x230 [ 1646.070946] do_huge_pmd_anonymous_page+0x98a/0x1710 [ 1646.076062] ? is_dynamic_key+0x1c0/0x1c0 [ 1646.080214] ? __thp_get_unmapped_area+0x190/0x190 [ 1646.085132] ? __lock_acquire+0x548/0x3fb0 [ 1646.089511] __handle_mm_fault+0x2d50/0x3eb0 [ 1646.093939] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 1646.098798] ? find_held_lock+0x35/0x130 [ 1646.102852] ? handle_mm_fault+0x322/0xb30 [ 1646.107094] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1646.112641] ? kasan_check_read+0x11/0x20 [ 1646.116838] handle_mm_fault+0x43f/0xb30 [ 1646.120908] __do_page_fault+0x5da/0xd60 [ 1646.124978] do_page_fault+0x71/0x581 [ 1646.128789] page_fault+0x1e/0x30 [ 1646.132245] RIP: 0010:copy_user_generic_unrolled+0x89/0xc0 [ 1646.137864] Code: 38 4c 89 47 20 4c 89 4f 28 4c 89 57 30 4c 89 5f 38 48 8d 76 40 48 8d 7f 40 ff c9 75 b6 89 d1 83 e2 07 c1 e9 03 74 12 4c 8b 06 <4c> 89 07 48 8d 76 08 48 8d 7f 08 ff c9 75 ee 21 d2 74 10 89 d1 8a [ 1646.156749] RSP: 0018:ffff88805054fb28 EFLAGS: 00010202 [ 1646.162444] RAX: ffffed100a0a9f81 RBX: 0000000000000008 RCX: 0000000000000001 [ 1646.169699] RDX: 0000000000000000 RSI: ffff88805054fc00 RDI: 0000000020465f8e [ 1646.176956] RBP: ffff88805054fb60 R08: 0000000000000000 R09: ffffed100a0a9f81 [ 1646.184234] R10: ffffed100a0a9f80 R11: ffff88805054fc07 R12: 0000000020465f8e [ 1646.191499] R13: ffff88805054fc00 R14: 0000000020465f96 R15: 00007ffffffff000 [ 1646.198782] ? _copy_to_user+0xf7/0x120 [ 1646.202751] perf_read+0x638/0x900 [ 1646.206296] ? perf_event_read_value+0x60/0x60 [ 1646.210868] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1646.216423] ? selinux_is_enabled+0x43/0x60 [ 1646.220736] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1646.226289] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1646.231820] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1646.237359] ? fsnotify+0x3ac/0xbf0 [ 1646.240993] __vfs_read+0x116/0x8c0 [ 1646.244611] ? perf_event_read_value+0x60/0x60 [ 1646.249214] ? vfs_copy_file_range+0xbb0/0xbb0 [ 1646.253796] ? selinux_file_permission+0x92/0x550 [ 1646.258649] ? security_file_permission+0x94/0x320 [ 1646.263589] ? rw_verify_area+0x118/0x360 [ 1646.267741] vfs_read+0x194/0x3e0 [ 1646.271193] ksys_read+0xea/0x1f0 [ 1646.274647] ? kernel_write+0x120/0x120 [ 1646.278634] ? do_syscall_64+0x26/0x610 [ 1646.282612] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1646.287965] ? do_syscall_64+0x26/0x610 [ 1646.291936] __x64_sys_read+0x73/0xb0 [ 1646.295728] do_syscall_64+0x103/0x610 [ 1646.299611] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1646.304785] RIP: 0033:0x457f29 [ 1646.307976] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1646.326876] RSP: 002b:00007f59d938ec78 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1646.334570] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457f29 [ 1646.341826] RDX: 0000000000000037 RSI: 0000000020465f8e RDI: 0000000000000003 [ 1646.349094] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 10:18:43 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, &(0x7f0000000400)='./file0\x00') mkdir(&(0x7f0000000080)='./file0\x00', 0x0) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(0xffffffffffffffff, 0xc0505405, &(0x7f0000000000)={{0x3, 0x3, 0x0, 0x3, 0x7}, 0x4, 0x5, 0x100000000}) accept$unix(0xffffffffffffffff, 0x0, 0x0) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f0000000480)={0xffffffff, 0x0, 0x5, 0x9, 0xffffffffffffc1b6}) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x0, 0x0) 10:18:43 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") socket$inet(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x2b, 0x801, 0x0) bind$inet(r1, &(0x7f0000000000)={0x2, 0x4e23, @empty}, 0x10) connect$inet(r1, &(0x7f00000001c0)={0x2, 0x4e23}, 0x10) recvmmsg(r1, &(0x7f000000a500), 0x400000000000259, 0x0, &(0x7f000000a780)={0x77359400}) [ 1646.356348] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f59d938f6d4 [ 1646.363615] R13: 00000000004c3a63 R14: 00000000004d8550 R15: 00000000ffffffff 10:18:43 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000040)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f000086c000)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) read(r0, &(0x7f0000465f8e)=""/114, 0x37) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UFFDIO_UNREGISTER(r1, 0x8010aa02, &(0x7f0000000240)={&(0x7f000001d000/0xc00000)=nil, 0xc00000}) 10:18:43 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") socket$inet(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x2b, 0x801, 0x0) bind$inet(r1, &(0x7f0000000000)={0x2, 0x4e23, @empty}, 0x10) connect$inet(r1, &(0x7f00000001c0)={0x2, 0x4e23}, 0x10) recvmmsg(r1, &(0x7f000000a500), 0x400000000000259, 0x0, &(0x7f000000a780)={0x77359400}) 10:18:43 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, &(0x7f0000000400)='./file0\x00') mkdir(&(0x7f0000000080)='./file0\x00', 0x0) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(0xffffffffffffffff, 0xc0505405, &(0x7f0000000000)={{0x3, 0x3, 0x0, 0x3, 0x7}, 0x4, 0x5, 0x100000000}) accept$unix(0xffffffffffffffff, 0x0, 0x0) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f0000000480)={0xffffffff, 0x0, 0x5, 0x9, 0xffffffffffffc1b6}) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x0, 0x0) 10:18:43 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000040)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f000086c000)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) read(r0, &(0x7f0000465f8e)=""/114, 0x37) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UFFDIO_UNREGISTER(r1, 0x8010aa02, &(0x7f0000000240)={&(0x7f000001d000/0xc00000)=nil, 0xc00000}) 10:18:43 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, &(0x7f0000000400)='./file0\x00') mkdir(&(0x7f0000000080)='./file0\x00', 0x0) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(0xffffffffffffffff, 0xc0505405, &(0x7f0000000000)={{0x3, 0x3, 0x0, 0x3, 0x7}, 0x4, 0x5, 0x100000000}) accept$unix(0xffffffffffffffff, 0x0, 0x0) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f0000000480)={0xffffffff, 0x0, 0x5, 0x9, 0xffffffffffffc1b6}) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x0, 0x0) 10:18:43 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") socket$inet(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x2b, 0x801, 0x0) bind$inet(r1, &(0x7f0000000000)={0x2, 0x4e23, @empty}, 0x10) connect$inet(r1, &(0x7f00000001c0)={0x2, 0x4e23}, 0x10) recvmmsg(r1, &(0x7f000000a500), 0x400000000000259, 0x0, &(0x7f000000a780)={0x77359400}) [ 1646.740073] FAULT_FLAG_ALLOW_RETRY missing 31 [ 1646.753068] CPU: 1 PID: 7388 Comm: syz-executor.1 Not tainted 5.0.0+ #10 [ 1646.759915] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1646.769258] Call Trace: [ 1646.771850] dump_stack+0x172/0x1f0 [ 1646.775495] handle_userfault.cold+0x41/0x5d [ 1646.779946] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 1646.785075] ? debug_check_no_obj_freed+0x200/0x464 [ 1646.790079] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 1646.795184] ? userfaultfd_ioctl+0x3aa0/0x3aa0 [ 1646.799771] ? trace_hardirqs_on+0x67/0x230 [ 1646.804091] ? kasan_check_read+0x11/0x20 [ 1646.808241] ? mark_held_locks+0xa4/0xf0 [ 1646.812316] ? free_unref_page+0x476/0x600 [ 1646.816546] ? __free_pages+0x72/0xb0 [ 1646.820344] ? free_unref_page+0x476/0x600 [ 1646.824576] ? lockdep_hardirqs_on+0x418/0x5d0 [ 1646.829168] ? trace_hardirqs_on+0x67/0x230 [ 1646.833499] do_huge_pmd_anonymous_page+0x98a/0x1710 [ 1646.838620] ? is_dynamic_key+0x1c0/0x1c0 [ 1646.843072] ? __thp_get_unmapped_area+0x190/0x190 [ 1646.848023] ? __lock_acquire+0x548/0x3fb0 [ 1646.852276] __handle_mm_fault+0x2d50/0x3eb0 [ 1646.856693] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 1646.861549] ? find_held_lock+0x35/0x130 [ 1646.865622] ? handle_mm_fault+0x322/0xb30 [ 1646.869866] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1646.875415] ? kasan_check_read+0x11/0x20 [ 1646.879589] handle_mm_fault+0x43f/0xb30 [ 1646.883655] __do_page_fault+0x5da/0xd60 [ 1646.887744] do_page_fault+0x71/0x581 [ 1646.891570] page_fault+0x1e/0x30 [ 1646.895020] RIP: 0010:copy_user_generic_unrolled+0x89/0xc0 [ 1646.900645] Code: 38 4c 89 47 20 4c 89 4f 28 4c 89 57 30 4c 89 5f 38 48 8d 76 40 48 8d 7f 40 ff c9 75 b6 89 d1 83 e2 07 c1 e9 03 74 12 4c 8b 06 <4c> 89 07 48 8d 76 08 48 8d 7f 08 ff c9 75 ee 21 d2 74 10 89 d1 8a [ 1646.919545] RSP: 0018:ffff88807717fb28 EFLAGS: 00010202 [ 1646.924929] RAX: ffffed100ee2ff81 RBX: 0000000000000008 RCX: 0000000000000001 [ 1646.932189] RDX: 0000000000000000 RSI: ffff88807717fc00 RDI: 0000000020465f8e [ 1646.939455] RBP: ffff88807717fb60 R08: 0000000000000000 R09: ffffed100ee2ff81 [ 1646.946719] R10: ffffed100ee2ff80 R11: ffff88807717fc07 R12: 0000000020465f8e [ 1646.953996] R13: ffff88807717fc00 R14: 0000000020465f96 R15: 00007ffffffff000 [ 1646.961332] ? _copy_to_user+0xf7/0x120 [ 1646.965313] perf_read+0x638/0x900 [ 1646.968874] ? perf_event_read_value+0x60/0x60 [ 1646.973451] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1646.979262] ? selinux_is_enabled+0x43/0x60 [ 1646.983589] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1646.989123] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1646.994747] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1647.000280] ? fsnotify+0x3ac/0xbf0 [ 1647.003904] __vfs_read+0x116/0x8c0 [ 1647.007538] ? perf_event_read_value+0x60/0x60 [ 1647.012133] ? vfs_copy_file_range+0xbb0/0xbb0 [ 1647.016722] ? selinux_file_permission+0x92/0x550 [ 1647.021579] ? security_file_permission+0x94/0x320 [ 1647.026505] ? rw_verify_area+0x118/0x360 [ 1647.030665] vfs_read+0x194/0x3e0 [ 1647.034134] ksys_read+0xea/0x1f0 [ 1647.037587] ? kernel_write+0x120/0x120 [ 1647.041562] ? do_syscall_64+0x26/0x610 [ 1647.045540] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1647.050912] ? do_syscall_64+0x26/0x610 [ 1647.054892] __x64_sys_read+0x73/0xb0 [ 1647.058693] do_syscall_64+0x103/0x610 [ 1647.062577] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1647.067766] RIP: 0033:0x457f29 [ 1647.070974] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 10:18:43 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, &(0x7f0000000400)='./file0\x00') mkdir(&(0x7f0000000080)='./file0\x00', 0x0) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(0xffffffffffffffff, 0xc0505405, &(0x7f0000000000)={{0x3, 0x3, 0x0, 0x3, 0x7}, 0x4, 0x5, 0x100000000}) accept$unix(0xffffffffffffffff, 0x0, 0x0) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f0000000480)={0xffffffff, 0x0, 0x5, 0x9, 0xffffffffffffc1b6}) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x0, 0x0) 10:18:43 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") socket$inet(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x2b, 0x801, 0x0) bind$inet(r1, &(0x7f0000000000)={0x2, 0x4e23, @empty}, 0x10) connect$inet(r1, &(0x7f00000001c0)={0x2, 0x4e23}, 0x10) recvmmsg(r1, &(0x7f000000a500), 0x400000000000259, 0x0, &(0x7f000000a780)={0x77359400}) 10:18:43 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") socket$inet(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x2b, 0x801, 0x0) bind$inet(r1, &(0x7f0000000000)={0x2, 0x4e23, @empty}, 0x10) connect$inet(r1, &(0x7f00000001c0)={0x2, 0x4e23}, 0x10) recvmmsg(r1, &(0x7f000000a500), 0x400000000000259, 0x0, &(0x7f000000a780)={0x77359400}) 10:18:43 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") socket$inet(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x2b, 0x801, 0x0) bind$inet(r1, &(0x7f0000000000)={0x2, 0x4e23, @empty}, 0x10) connect$inet(r1, &(0x7f00000001c0)={0x2, 0x4e23}, 0x10) recvmmsg(r1, &(0x7f000000a500), 0x400000000000259, 0x0, &(0x7f000000a780)={0x77359400}) [ 1647.089869] RSP: 002b:00007fe46159dc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1647.089882] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457f29 [ 1647.089889] RDX: 0000000000000037 RSI: 0000000020465f8e RDI: 0000000000000003 [ 1647.089896] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1647.089903] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe46159e6d4 [ 1647.089910] R13: 00000000004c3a63 R14: 00000000004d8550 R15: 00000000ffffffff [ 1647.111020] FAULT_FLAG_ALLOW_RETRY missing 31 [ 1647.182626] CPU: 1 PID: 7391 Comm: syz-executor.2 Not tainted 5.0.0+ #10 [ 1647.189499] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1647.198877] Call Trace: [ 1647.201468] dump_stack+0x172/0x1f0 [ 1647.205096] handle_userfault.cold+0x41/0x5d [ 1647.209511] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 1647.214642] ? debug_check_no_obj_freed+0x200/0x464 [ 1647.219656] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 1647.224754] ? userfaultfd_ioctl+0x3aa0/0x3aa0 [ 1647.229368] ? trace_hardirqs_on+0x67/0x230 [ 1647.233710] ? kasan_check_read+0x11/0x20 [ 1647.233740] ? mark_held_locks+0xa4/0xf0 [ 1647.233766] ? free_unref_page+0x476/0x600 [ 1647.233778] ? __free_pages+0x72/0xb0 [ 1647.233793] ? free_unref_page+0x476/0x600 [ 1647.254218] ? lockdep_hardirqs_on+0x418/0x5d0 [ 1647.258817] ? trace_hardirqs_on+0x67/0x230 [ 1647.263167] do_huge_pmd_anonymous_page+0x98a/0x1710 [ 1647.268267] ? is_dynamic_key+0x1c0/0x1c0 [ 1647.268286] ? __thp_get_unmapped_area+0x190/0x190 [ 1647.268300] ? __lock_acquire+0x548/0x3fb0 [ 1647.268332] __handle_mm_fault+0x2d50/0x3eb0 [ 1647.268351] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 1647.268364] ? find_held_lock+0x35/0x130 [ 1647.268378] ? handle_mm_fault+0x322/0xb30 [ 1647.268409] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1647.286071] ? kasan_check_read+0x11/0x20 [ 1647.286087] handle_mm_fault+0x43f/0xb30 [ 1647.286106] __do_page_fault+0x5da/0xd60 [ 1647.316927] do_page_fault+0x71/0x581 [ 1647.316944] page_fault+0x1e/0x30 [ 1647.316958] RIP: 0010:copy_user_generic_unrolled+0x89/0xc0 [ 1647.316970] Code: 38 4c 89 47 20 4c 89 4f 28 4c 89 57 30 4c 89 5f 38 48 8d 76 40 48 8d 7f 40 ff c9 75 b6 89 d1 83 e2 07 c1 e9 03 74 12 4c 8b 06 <4c> 89 07 48 8d 76 08 48 8d 7f 08 ff c9 75 ee 21 d2 74 10 89 d1 8a [ 1647.316979] RSP: 0018:ffff88808782fb28 EFLAGS: 00010202 [ 1647.348699] RAX: ffffed1010f05f81 RBX: 0000000000000008 RCX: 0000000000000001 [ 1647.348706] RDX: 0000000000000000 RSI: ffff88808782fc00 RDI: 0000000020465f8e [ 1647.348713] RBP: ffff88808782fb60 R08: 0000000000000000 R09: ffffed1010f05f81 [ 1647.348721] R10: ffffed1010f05f80 R11: ffff88808782fc07 R12: 0000000020465f8e [ 1647.348728] R13: ffff88808782fc00 R14: 0000000020465f96 R15: 00007ffffffff000 [ 1647.348766] ? _copy_to_user+0xf7/0x120 [ 1647.348781] perf_read+0x638/0x900 [ 1647.348796] ? perf_event_read_value+0x60/0x60 [ 1647.348808] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1647.348821] ? selinux_is_enabled+0x43/0x60 [ 1647.348846] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1647.417980] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1647.423532] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1647.429092] ? fsnotify+0x3ac/0xbf0 [ 1647.432737] __vfs_read+0x116/0x8c0 [ 1647.436371] ? perf_event_read_value+0x60/0x60 [ 1647.440948] ? vfs_copy_file_range+0xbb0/0xbb0 [ 1647.445537] ? selinux_file_permission+0x92/0x550 [ 1647.450396] ? security_file_permission+0x94/0x320 [ 1647.455327] ? rw_verify_area+0x118/0x360 [ 1647.459477] vfs_read+0x194/0x3e0 [ 1647.462946] ksys_read+0xea/0x1f0 [ 1647.466410] ? kernel_write+0x120/0x120 [ 1647.470389] ? do_syscall_64+0x26/0x610 [ 1647.474357] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1647.479717] ? do_syscall_64+0x26/0x610 10:18:44 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") socket$inet(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x2b, 0x801, 0x0) bind$inet(r1, &(0x7f0000000000)={0x2, 0x4e23, @empty}, 0x10) connect$inet(r1, &(0x7f00000001c0)={0x2, 0x4e23}, 0x10) recvmmsg(r1, &(0x7f000000a500), 0x400000000000259, 0x0, &(0x7f000000a780)={0x77359400}) [ 1647.483690] __x64_sys_read+0x73/0xb0 [ 1647.487486] do_syscall_64+0x103/0x610 [ 1647.491375] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1647.496580] RIP: 0033:0x457f29 [ 1647.499769] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1647.518680] RSP: 002b:00007f59d938ec78 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1647.526381] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457f29 10:18:44 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") socket$inet(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x2b, 0x801, 0x0) bind$inet(r1, &(0x7f0000000000)={0x2, 0x4e23, @empty}, 0x10) connect$inet(r1, &(0x7f00000001c0)={0x2, 0x4e23}, 0x10) recvmmsg(r1, &(0x7f000000a500), 0x400000000000259, 0x0, &(0x7f000000a780)={0x77359400}) [ 1647.533644] RDX: 0000000000000037 RSI: 0000000020465f8e RDI: 0000000000000003 [ 1647.540907] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1647.548182] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f59d938f6d4 [ 1647.555453] R13: 00000000004c3a63 R14: 00000000004d8550 R15: 00000000ffffffff 10:18:44 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") socket$inet(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x2b, 0x801, 0x0) bind$inet(r1, &(0x7f0000000000)={0x2, 0x4e23, @empty}, 0x10) connect$inet(r1, &(0x7f00000001c0)={0x2, 0x4e23}, 0x10) recvmmsg(r1, &(0x7f000000a500), 0x400000000000259, 0x0, &(0x7f000000a780)={0x77359400}) 10:18:44 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) r1 = syz_open_dev$media(0x0, 0x0, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'crc32\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) setsockopt$inet_sctp_SCTP_RECVNXTINFO(r1, 0x84, 0x21, &(0x7f00000002c0)=0xe9, 0x4) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f0000000340)={'trans=fd,', {'rfdno', 0x3d, r4}, 0x2c, {'wfdno', 0x3d, r5}, 0x2c, {[{@mmap='mmap'}, {@cache_none='cache=none'}, {@version_L='version=9p2000.L'}]}}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg(r3, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x200056d0, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) r6 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r7 = ioctl$KVM_CREATE_VM(r6, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r7, 0xae41, 0x0) clock_gettime(0x7, &(0x7f00000000c0)) openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x16001, 0x0) ioctl$UDMABUF_CREATE_LIST(0xffffffffffffffff, 0x40087543, 0x0) listen(r0, 0x0) r8 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r8, 0x6, 0xd, &(0x7f0000000000)='dctcp\x00', 0x6) syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x1, 0x0) 10:18:44 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x2, 0x7, 0x0, 0x0, 0x2}, 0x10}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="020100090e000000030000000000000005000600000000000a0000000000000400000000000000000000002100000000000100000000000002000100012200000000000200fd000005000500000000000a004872bbb6896209000000000000009aec3f3f7710aa000000ff1700400000"], 0x70}}, 0x0) sendmmsg(r0, &(0x7f0000000180), 0x22e, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 10:18:44 executing program 2: r0 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x182) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, 0x0, 0x2000005) 10:18:44 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") socket$inet(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x2b, 0x801, 0x0) bind$inet(r1, &(0x7f0000000000)={0x2, 0x4e23, @empty}, 0x10) connect$inet(r1, &(0x7f00000001c0)={0x2, 0x4e23}, 0x10) recvmmsg(r1, &(0x7f000000a500), 0x400000000000259, 0x0, &(0x7f000000a780)={0x77359400}) 10:18:44 executing program 2: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mknod$loop(&(0x7f0000000300)='./file1/file0\x00', 0x0, 0xffffffffffffffff) rename(&(0x7f0000000040)='./file1/file0\x00', &(0x7f00000000c0)='./file1\x00') 10:18:44 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") socket$inet(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x2b, 0x801, 0x0) bind$inet(r1, &(0x7f0000000000)={0x2, 0x4e23, @empty}, 0x10) connect$inet(r1, &(0x7f00000001c0)={0x2, 0x4e23}, 0x10) recvmmsg(r1, &(0x7f000000a500), 0x400000000000259, 0x0, &(0x7f000000a780)={0x77359400}) 10:18:44 executing program 2: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mknod$loop(&(0x7f0000000300)='./file1/file0\x00', 0x0, 0xffffffffffffffff) rename(&(0x7f0000000040)='./file1/file0\x00', &(0x7f00000000c0)='./file1\x00') 10:18:44 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x1, 0x0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f00000003c0)=""/246) r2 = memfd_create(&(0x7f00000006c0)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x06\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86\xbbV,v8y\x9b\x93\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd5\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00]p\x9cFf\xadv\xf8\x8a\xb4jT)\xc8\xb7\xa73?\x1c\x93w\xc67j=\xb1\xc0\xe8\x19\xcc\x84\x87\xf3\xb4\x14\x96\xec!\x17h\n\xf9\xb2\x12T+\xdc\xa6\xe9\"v*\x9e\xb8\x8c\x90}\x9c\xc9\xda\xe5\x18W5\r\xc2\xdb5P1\xc7\x1e|\xc1\xbb\xf4\x1a\xbe1\xca!+1`|h\xa8\xd8\'\xc6\xac\x16\xc4\xc6JuM\x98T\x8d+;\x16\xc5\xe9v\xae\'\x92\xbf\x1f\x17\xb8\x9ax\x8b\xbb\xf1\xc8)\xc5$\xf1M\x98\xb0\x1aP\x043\xc3\xe6\x9e\x87\x89\xebp,\x1di\x12\xf2\fj\xaf\xa6g\x00\xcfY\xf6S\xa3\xf8\x9b\x1d\xba\x1au\xa6\x1c\xae\r\xa9\xe1i)\xd2\xb0\x8f\x1b?wCX\x0f\x99S\xfaA\x13\xbd\xcb\xed\"\xba\xda\xa2\xd1\xefc#\xfd5\xfc\xf3k\xaa\x83+\x83\xc5\x1b\xa7\x82\xe3\xdb\xf2\xfb4B\x19\xf2', 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f0000000040)='\x00', 0x1}], 0x1, 0x81806) sendfile(r1, r2, 0x0, 0x20000102000007) 10:18:45 executing program 2: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mknod$loop(&(0x7f0000000300)='./file1/file0\x00', 0x0, 0xffffffffffffffff) rename(&(0x7f0000000040)='./file1/file0\x00', &(0x7f00000000c0)='./file1\x00') 10:18:45 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) r1 = syz_open_dev$media(0x0, 0x0, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'crc32\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) setsockopt$inet_sctp_SCTP_RECVNXTINFO(r1, 0x84, 0x21, &(0x7f00000002c0)=0xe9, 0x4) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f0000000340)={'trans=fd,', {'rfdno', 0x3d, r4}, 0x2c, {'wfdno', 0x3d, r5}, 0x2c, {[{@mmap='mmap'}, {@cache_none='cache=none'}, {@version_L='version=9p2000.L'}]}}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg(r3, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x200056d0, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) r6 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r7 = ioctl$KVM_CREATE_VM(r6, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r7, 0xae41, 0x0) clock_gettime(0x7, &(0x7f00000000c0)) openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x16001, 0x0) ioctl$UDMABUF_CREATE_LIST(0xffffffffffffffff, 0x40087543, 0x0) listen(r0, 0x0) r8 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r8, 0x6, 0xd, &(0x7f0000000000)='dctcp\x00', 0x6) syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x1, 0x0) 10:18:45 executing program 2: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mknod$loop(&(0x7f0000000300)='./file1/file0\x00', 0x0, 0xffffffffffffffff) rename(&(0x7f0000000040)='./file1/file0\x00', &(0x7f00000000c0)='./file1\x00') 10:18:45 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) r1 = syz_open_dev$media(0x0, 0x0, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'crc32\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) setsockopt$inet_sctp_SCTP_RECVNXTINFO(r1, 0x84, 0x21, &(0x7f00000002c0)=0xe9, 0x4) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f0000000340)={'trans=fd,', {'rfdno', 0x3d, r4}, 0x2c, {'wfdno', 0x3d, r5}, 0x2c, {[{@mmap='mmap'}, {@cache_none='cache=none'}, {@version_L='version=9p2000.L'}]}}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg(r3, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x200056d0, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) r6 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r7 = ioctl$KVM_CREATE_VM(r6, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r7, 0xae41, 0x0) clock_gettime(0x7, &(0x7f00000000c0)) openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x16001, 0x0) ioctl$UDMABUF_CREATE_LIST(0xffffffffffffffff, 0x40087543, 0x0) listen(r0, 0x0) r8 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r8, 0x6, 0xd, &(0x7f0000000000)='dctcp\x00', 0x6) syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x1, 0x0) 10:18:45 executing program 4: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000580), 0x10, 0x0, 0x0, &(0x7f0000000440)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x4}}], 0x20}, 0x0) sendmmsg$inet_sctp(r0, &(0x7f0000000080)=[{&(0x7f0000000180)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000562000), 0x0, &(0x7f00000c3000)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x241}}], 0x20}], 0x4924924924924d0, 0x0) [ 1648.555139] FS-Cache: Duplicate cookie detected [ 1648.560010] FS-Cache: O-cookie c=00000000df523393 [p=000000005647dc77 fl=222 nc=0 na=1] [ 1648.560020] FS-Cache: O-cookie d=00000000c2a81a56 n=00000000d03497fe [ 1648.560046] FS-Cache: O-key=[10] '34323935313032303133' [ 1648.560088] FS-Cache: N-cookie c=00000000b4c30bce [p=000000005647dc77 fl=2 nc=0 na=1] [ 1648.560099] FS-Cache: N-cookie d=00000000c2a81a56 n=00000000a8f08c1a [ 1648.560105] FS-Cache: N-key=[10] '34323935313032303133' 10:18:45 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x2, 0x7, 0x0, 0x0, 0x2}, 0x10}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="020100090e000000030000000000000005000600000000000a0000000000000400000000000000000000002100000000000100000000000002000100012200000000000200fd000005000500000000000a004872bbb6896209000000000000009aec3f3f7710aa000000ff1700400000"], 0x70}}, 0x0) sendmmsg(r0, &(0x7f0000000180), 0x22e, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 10:18:45 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x1, 0x0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f00000003c0)=""/246) r2 = memfd_create(&(0x7f00000006c0)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x06\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86\xbbV,v8y\x9b\x93\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd5\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00]p\x9cFf\xadv\xf8\x8a\xb4jT)\xc8\xb7\xa73?\x1c\x93w\xc67j=\xb1\xc0\xe8\x19\xcc\x84\x87\xf3\xb4\x14\x96\xec!\x17h\n\xf9\xb2\x12T+\xdc\xa6\xe9\"v*\x9e\xb8\x8c\x90}\x9c\xc9\xda\xe5\x18W5\r\xc2\xdb5P1\xc7\x1e|\xc1\xbb\xf4\x1a\xbe1\xca!+1`|h\xa8\xd8\'\xc6\xac\x16\xc4\xc6JuM\x98T\x8d+;\x16\xc5\xe9v\xae\'\x92\xbf\x1f\x17\xb8\x9ax\x8b\xbb\xf1\xc8)\xc5$\xf1M\x98\xb0\x1aP\x043\xc3\xe6\x9e\x87\x89\xebp,\x1di\x12\xf2\fj\xaf\xa6g\x00\xcfY\xf6S\xa3\xf8\x9b\x1d\xba\x1au\xa6\x1c\xae\r\xa9\xe1i)\xd2\xb0\x8f\x1b?wCX\x0f\x99S\xfaA\x13\xbd\xcb\xed\"\xba\xda\xa2\xd1\xefc#\xfd5\xfc\xf3k\xaa\x83+\x83\xc5\x1b\xa7\x82\xe3\xdb\xf2\xfb4B\x19\xf2', 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f0000000040)='\x00', 0x1}], 0x1, 0x81806) sendfile(r1, r2, 0x0, 0x20000102000007) 10:18:45 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x1, 0x0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f00000003c0)=""/246) r2 = memfd_create(&(0x7f00000006c0)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x06\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86\xbbV,v8y\x9b\x93\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd5\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00]p\x9cFf\xadv\xf8\x8a\xb4jT)\xc8\xb7\xa73?\x1c\x93w\xc67j=\xb1\xc0\xe8\x19\xcc\x84\x87\xf3\xb4\x14\x96\xec!\x17h\n\xf9\xb2\x12T+\xdc\xa6\xe9\"v*\x9e\xb8\x8c\x90}\x9c\xc9\xda\xe5\x18W5\r\xc2\xdb5P1\xc7\x1e|\xc1\xbb\xf4\x1a\xbe1\xca!+1`|h\xa8\xd8\'\xc6\xac\x16\xc4\xc6JuM\x98T\x8d+;\x16\xc5\xe9v\xae\'\x92\xbf\x1f\x17\xb8\x9ax\x8b\xbb\xf1\xc8)\xc5$\xf1M\x98\xb0\x1aP\x043\xc3\xe6\x9e\x87\x89\xebp,\x1di\x12\xf2\fj\xaf\xa6g\x00\xcfY\xf6S\xa3\xf8\x9b\x1d\xba\x1au\xa6\x1c\xae\r\xa9\xe1i)\xd2\xb0\x8f\x1b?wCX\x0f\x99S\xfaA\x13\xbd\xcb\xed\"\xba\xda\xa2\xd1\xefc#\xfd5\xfc\xf3k\xaa\x83+\x83\xc5\x1b\xa7\x82\xe3\xdb\xf2\xfb4B\x19\xf2', 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f0000000040)='\x00', 0x1}], 0x1, 0x81806) sendfile(r1, r2, 0x0, 0x20000102000007) 10:18:45 executing program 4: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000580), 0x10, 0x0, 0x0, &(0x7f0000000440)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x4}}], 0x20}, 0x0) sendmmsg$inet_sctp(r0, &(0x7f0000000080)=[{&(0x7f0000000180)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000562000), 0x0, &(0x7f00000c3000)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x241}}], 0x20}], 0x4924924924924d0, 0x0) 10:18:45 executing program 4: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000580), 0x10, 0x0, 0x0, &(0x7f0000000440)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x4}}], 0x20}, 0x0) sendmmsg$inet_sctp(r0, &(0x7f0000000080)=[{&(0x7f0000000180)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000562000), 0x0, &(0x7f00000c3000)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x241}}], 0x20}], 0x4924924924924d0, 0x0) 10:18:45 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x1, 0x0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f00000003c0)=""/246) r2 = memfd_create(&(0x7f00000006c0)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x06\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86\xbbV,v8y\x9b\x93\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd5\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00]p\x9cFf\xadv\xf8\x8a\xb4jT)\xc8\xb7\xa73?\x1c\x93w\xc67j=\xb1\xc0\xe8\x19\xcc\x84\x87\xf3\xb4\x14\x96\xec!\x17h\n\xf9\xb2\x12T+\xdc\xa6\xe9\"v*\x9e\xb8\x8c\x90}\x9c\xc9\xda\xe5\x18W5\r\xc2\xdb5P1\xc7\x1e|\xc1\xbb\xf4\x1a\xbe1\xca!+1`|h\xa8\xd8\'\xc6\xac\x16\xc4\xc6JuM\x98T\x8d+;\x16\xc5\xe9v\xae\'\x92\xbf\x1f\x17\xb8\x9ax\x8b\xbb\xf1\xc8)\xc5$\xf1M\x98\xb0\x1aP\x043\xc3\xe6\x9e\x87\x89\xebp,\x1di\x12\xf2\fj\xaf\xa6g\x00\xcfY\xf6S\xa3\xf8\x9b\x1d\xba\x1au\xa6\x1c\xae\r\xa9\xe1i)\xd2\xb0\x8f\x1b?wCX\x0f\x99S\xfaA\x13\xbd\xcb\xed\"\xba\xda\xa2\xd1\xefc#\xfd5\xfc\xf3k\xaa\x83+\x83\xc5\x1b\xa7\x82\xe3\xdb\xf2\xfb4B\x19\xf2', 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f0000000040)='\x00', 0x1}], 0x1, 0x81806) sendfile(r1, r2, 0x0, 0x20000102000007) 10:18:45 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) r1 = syz_open_dev$media(0x0, 0x0, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'crc32\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) setsockopt$inet_sctp_SCTP_RECVNXTINFO(r1, 0x84, 0x21, &(0x7f00000002c0)=0xe9, 0x4) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f0000000340)={'trans=fd,', {'rfdno', 0x3d, r4}, 0x2c, {'wfdno', 0x3d, r5}, 0x2c, {[{@mmap='mmap'}, {@cache_none='cache=none'}, {@version_L='version=9p2000.L'}]}}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg(r3, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x200056d0, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) r6 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r7 = ioctl$KVM_CREATE_VM(r6, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r7, 0xae41, 0x0) clock_gettime(0x7, &(0x7f00000000c0)) openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x16001, 0x0) ioctl$UDMABUF_CREATE_LIST(0xffffffffffffffff, 0x40087543, 0x0) listen(r0, 0x0) r8 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r8, 0x6, 0xd, &(0x7f0000000000)='dctcp\x00', 0x6) syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x1, 0x0) 10:18:45 executing program 4: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000580), 0x10, 0x0, 0x0, &(0x7f0000000440)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x4}}], 0x20}, 0x0) sendmmsg$inet_sctp(r0, &(0x7f0000000080)=[{&(0x7f0000000180)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000562000), 0x0, &(0x7f00000c3000)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x241}}], 0x20}], 0x4924924924924d0, 0x0) 10:18:45 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x1, 0x0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f00000003c0)=""/246) r2 = memfd_create(&(0x7f00000006c0)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x06\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86\xbbV,v8y\x9b\x93\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd5\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00]p\x9cFf\xadv\xf8\x8a\xb4jT)\xc8\xb7\xa73?\x1c\x93w\xc67j=\xb1\xc0\xe8\x19\xcc\x84\x87\xf3\xb4\x14\x96\xec!\x17h\n\xf9\xb2\x12T+\xdc\xa6\xe9\"v*\x9e\xb8\x8c\x90}\x9c\xc9\xda\xe5\x18W5\r\xc2\xdb5P1\xc7\x1e|\xc1\xbb\xf4\x1a\xbe1\xca!+1`|h\xa8\xd8\'\xc6\xac\x16\xc4\xc6JuM\x98T\x8d+;\x16\xc5\xe9v\xae\'\x92\xbf\x1f\x17\xb8\x9ax\x8b\xbb\xf1\xc8)\xc5$\xf1M\x98\xb0\x1aP\x043\xc3\xe6\x9e\x87\x89\xebp,\x1di\x12\xf2\fj\xaf\xa6g\x00\xcfY\xf6S\xa3\xf8\x9b\x1d\xba\x1au\xa6\x1c\xae\r\xa9\xe1i)\xd2\xb0\x8f\x1b?wCX\x0f\x99S\xfaA\x13\xbd\xcb\xed\"\xba\xda\xa2\xd1\xefc#\xfd5\xfc\xf3k\xaa\x83+\x83\xc5\x1b\xa7\x82\xe3\xdb\xf2\xfb4B\x19\xf2', 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f0000000040)='\x00', 0x1}], 0x1, 0x81806) sendfile(r1, r2, 0x0, 0x20000102000007) 10:18:45 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x1, 0x0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f00000003c0)=""/246) r2 = memfd_create(&(0x7f00000006c0)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x06\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86\xbbV,v8y\x9b\x93\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd5\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00]p\x9cFf\xadv\xf8\x8a\xb4jT)\xc8\xb7\xa73?\x1c\x93w\xc67j=\xb1\xc0\xe8\x19\xcc\x84\x87\xf3\xb4\x14\x96\xec!\x17h\n\xf9\xb2\x12T+\xdc\xa6\xe9\"v*\x9e\xb8\x8c\x90}\x9c\xc9\xda\xe5\x18W5\r\xc2\xdb5P1\xc7\x1e|\xc1\xbb\xf4\x1a\xbe1\xca!+1`|h\xa8\xd8\'\xc6\xac\x16\xc4\xc6JuM\x98T\x8d+;\x16\xc5\xe9v\xae\'\x92\xbf\x1f\x17\xb8\x9ax\x8b\xbb\xf1\xc8)\xc5$\xf1M\x98\xb0\x1aP\x043\xc3\xe6\x9e\x87\x89\xebp,\x1di\x12\xf2\fj\xaf\xa6g\x00\xcfY\xf6S\xa3\xf8\x9b\x1d\xba\x1au\xa6\x1c\xae\r\xa9\xe1i)\xd2\xb0\x8f\x1b?wCX\x0f\x99S\xfaA\x13\xbd\xcb\xed\"\xba\xda\xa2\xd1\xefc#\xfd5\xfc\xf3k\xaa\x83+\x83\xc5\x1b\xa7\x82\xe3\xdb\xf2\xfb4B\x19\xf2', 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f0000000040)='\x00', 0x1}], 0x1, 0x81806) sendfile(r1, r2, 0x0, 0x20000102000007) 10:18:45 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) r1 = syz_open_dev$media(0x0, 0x0, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'crc32\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) setsockopt$inet_sctp_SCTP_RECVNXTINFO(r1, 0x84, 0x21, &(0x7f00000002c0)=0xe9, 0x4) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f0000000340)={'trans=fd,', {'rfdno', 0x3d, r4}, 0x2c, {'wfdno', 0x3d, r5}, 0x2c, {[{@mmap='mmap'}, {@cache_none='cache=none'}, {@version_L='version=9p2000.L'}]}}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg(r3, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x200056d0, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) r6 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r7 = ioctl$KVM_CREATE_VM(r6, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r7, 0xae41, 0x0) clock_gettime(0x7, &(0x7f00000000c0)) openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x16001, 0x0) ioctl$UDMABUF_CREATE_LIST(0xffffffffffffffff, 0x40087543, 0x0) listen(r0, 0x0) r8 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r8, 0x6, 0xd, &(0x7f0000000000)='dctcp\x00', 0x6) syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x1, 0x0) 10:18:45 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x0, 0x0) poll(&(0x7f0000000080)=[{r1}], 0x1, 0x6b) 10:18:46 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x2, 0x7, 0x0, 0x0, 0x2}, 0x10}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="020100090e000000030000000000000005000600000000000a0000000000000400000000000000000000002100000000000100000000000002000100012200000000000200fd000005000500000000000a004872bbb6896209000000000000009aec3f3f7710aa000000ff1700400000"], 0x70}}, 0x0) sendmmsg(r0, &(0x7f0000000180), 0x22e, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 10:18:46 executing program 2: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dsp\x00', 0x2, 0x0) ioctl$int_in(r0, 0x800000c004500a, &(0x7f0000000180)) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f0000000300)={0x4, 0x8}, 0xfffffe74) ioctl$int_in(r0, 0x800000c0045002, &(0x7f00000000c0)) 10:18:46 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) r1 = syz_open_dev$media(0x0, 0x0, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'crc32\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) setsockopt$inet_sctp_SCTP_RECVNXTINFO(r1, 0x84, 0x21, &(0x7f00000002c0)=0xe9, 0x4) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f0000000340)={'trans=fd,', {'rfdno', 0x3d, r4}, 0x2c, {'wfdno', 0x3d, r5}, 0x2c, {[{@mmap='mmap'}, {@cache_none='cache=none'}, {@version_L='version=9p2000.L'}]}}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg(r3, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x200056d0, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) r6 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r7 = ioctl$KVM_CREATE_VM(r6, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r7, 0xae41, 0x0) clock_gettime(0x7, &(0x7f00000000c0)) openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x16001, 0x0) ioctl$UDMABUF_CREATE_LIST(0xffffffffffffffff, 0x40087543, 0x0) listen(r0, 0x0) r8 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r8, 0x6, 0xd, &(0x7f0000000000)='dctcp\x00', 0x6) syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x1, 0x0) 10:18:46 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x1, 0x0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f00000003c0)=""/246) r2 = memfd_create(&(0x7f00000006c0)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x06\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86\xbbV,v8y\x9b\x93\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd5\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00]p\x9cFf\xadv\xf8\x8a\xb4jT)\xc8\xb7\xa73?\x1c\x93w\xc67j=\xb1\xc0\xe8\x19\xcc\x84\x87\xf3\xb4\x14\x96\xec!\x17h\n\xf9\xb2\x12T+\xdc\xa6\xe9\"v*\x9e\xb8\x8c\x90}\x9c\xc9\xda\xe5\x18W5\r\xc2\xdb5P1\xc7\x1e|\xc1\xbb\xf4\x1a\xbe1\xca!+1`|h\xa8\xd8\'\xc6\xac\x16\xc4\xc6JuM\x98T\x8d+;\x16\xc5\xe9v\xae\'\x92\xbf\x1f\x17\xb8\x9ax\x8b\xbb\xf1\xc8)\xc5$\xf1M\x98\xb0\x1aP\x043\xc3\xe6\x9e\x87\x89\xebp,\x1di\x12\xf2\fj\xaf\xa6g\x00\xcfY\xf6S\xa3\xf8\x9b\x1d\xba\x1au\xa6\x1c\xae\r\xa9\xe1i)\xd2\xb0\x8f\x1b?wCX\x0f\x99S\xfaA\x13\xbd\xcb\xed\"\xba\xda\xa2\xd1\xefc#\xfd5\xfc\xf3k\xaa\x83+\x83\xc5\x1b\xa7\x82\xe3\xdb\xf2\xfb4B\x19\xf2', 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f0000000040)='\x00', 0x1}], 0x1, 0x81806) sendfile(r1, r2, 0x0, 0x20000102000007) 10:18:46 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x0, 0x0) poll(&(0x7f0000000080)=[{r1}], 0x1, 0x6b) 10:18:46 executing program 2: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="24000000010607031dfffd946fa2830020200a0009000100061d85680c1baba20400ff7e", 0x24}], 0x1}, 0x0) [ 1649.463982] netlink: 'syz-executor.2': attribute type 1 has an invalid length. 10:18:46 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x0, 0x0) poll(&(0x7f0000000080)=[{r1}], 0x1, 0x6b) 10:18:46 executing program 2: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="24000000010607031dfffd946fa2830020200a0009000100061d85680c1baba20400ff7e", 0x24}], 0x1}, 0x0) 10:18:46 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x2, 0x7, 0x0, 0x0, 0x2}, 0x10}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="020100090e000000030000000000000005000600000000000a0000000000000400000000000000000000002100000000000100000000000002000100012200000000000200fd000005000500000000000a004872bbb6896209000000000000009aec3f3f7710aa000000ff1700400000"], 0x70}}, 0x0) sendmmsg(r0, &(0x7f0000000180), 0x22e, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 10:18:46 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}}, &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000240)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, 0x0) write$binfmt_aout(r0, &(0x7f0000000040)=ANY=[@ANYRESOCT], 0x337) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000100)={r0, r1}) recvmmsg(r2, &(0x7f0000002300)=[{{0x0, 0xfffffe19, 0x0, 0x0, 0x0, 0x7e}}], 0x2fd, 0x400002fd, 0x0) [ 1649.718417] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 1649.825364] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 10:18:46 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) r1 = syz_open_dev$media(0x0, 0x0, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'crc32\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) setsockopt$inet_sctp_SCTP_RECVNXTINFO(r1, 0x84, 0x21, &(0x7f00000002c0)=0xe9, 0x4) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f0000000340)={'trans=fd,', {'rfdno', 0x3d, r4}, 0x2c, {'wfdno', 0x3d, r5}, 0x2c, {[{@mmap='mmap'}, {@cache_none='cache=none'}, {@version_L='version=9p2000.L'}]}}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg(r3, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x200056d0, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) r6 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r7 = ioctl$KVM_CREATE_VM(r6, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r7, 0xae41, 0x0) clock_gettime(0x7, &(0x7f00000000c0)) openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x16001, 0x0) ioctl$UDMABUF_CREATE_LIST(0xffffffffffffffff, 0x40087543, 0x0) listen(r0, 0x0) r8 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r8, 0x6, 0xd, &(0x7f0000000000)='dctcp\x00', 0x6) syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x1, 0x0) 10:18:46 executing program 2: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="24000000010607031dfffd946fa2830020200a0009000100061d85680c1baba20400ff7e", 0x24}], 0x1}, 0x0) 10:18:46 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x0, 0x0) poll(&(0x7f0000000080)=[{r1}], 0x1, 0x6b) [ 1649.978910] netlink: 'syz-executor.2': attribute type 1 has an invalid length. 10:18:46 executing program 2: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="24000000010607031dfffd946fa2830020200a0009000100061d85680c1baba20400ff7e", 0x24}], 0x1}, 0x0) 10:18:46 executing program 1: syz_emit_ethernet(0x32, &(0x7f0000000000)={@local, @empty=[0x7, 0x0, 0x200000000000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0xffffff89, 0x0, @remote, @local}, @dccp={{0x0, 0x0, 0x4, 0x60, 0x0, 0x0, 0x3, 0x0, 0x0, "e57044", 0x0, "cd98e8"}}}}}}, 0x0) 10:18:46 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}}, &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000240)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, 0x0) write$binfmt_aout(r0, &(0x7f0000000040)=ANY=[@ANYRESOCT], 0x337) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000100)={r0, r1}) recvmmsg(r2, &(0x7f0000002300)=[{{0x0, 0xfffffe19, 0x0, 0x0, 0x0, 0x7e}}], 0x2fd, 0x400002fd, 0x0) 10:18:46 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}}, &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000240)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, 0x0) write$binfmt_aout(r0, &(0x7f0000000040)=ANY=[@ANYRESOCT], 0x337) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000100)={r0, r1}) recvmmsg(r2, &(0x7f0000002300)=[{{0x0, 0xfffffe19, 0x0, 0x0, 0x0, 0x7e}}], 0x2fd, 0x400002fd, 0x0) 10:18:47 executing program 1: syz_emit_ethernet(0x32, &(0x7f0000000000)={@local, @empty=[0x7, 0x0, 0x200000000000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0xffffff89, 0x0, @remote, @local}, @dccp={{0x0, 0x0, 0x4, 0x60, 0x0, 0x0, 0x3, 0x0, 0x0, "e57044", 0x0, "cd98e8"}}}}}}, 0x0) 10:18:47 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}}, &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000240)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, 0x0) write$binfmt_aout(r0, &(0x7f0000000040)=ANY=[@ANYRESOCT], 0x337) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000100)={r0, r1}) recvmmsg(r2, &(0x7f0000002300)=[{{0x0, 0xfffffe19, 0x0, 0x0, 0x0, 0x7e}}], 0x2fd, 0x400002fd, 0x0) [ 1650.203061] netlink: 'syz-executor.2': attribute type 1 has an invalid length. 10:18:47 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}}, &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000240)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, 0x0) write$binfmt_aout(r0, &(0x7f0000000040)=ANY=[@ANYRESOCT], 0x337) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000100)={r0, r1}) recvmmsg(r2, &(0x7f0000002300)=[{{0x0, 0xfffffe19, 0x0, 0x0, 0x0, 0x7e}}], 0x2fd, 0x400002fd, 0x0) 10:18:47 executing program 1: syz_emit_ethernet(0x32, &(0x7f0000000000)={@local, @empty=[0x7, 0x0, 0x200000000000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0xffffff89, 0x0, @remote, @local}, @dccp={{0x0, 0x0, 0x4, 0x60, 0x0, 0x0, 0x3, 0x0, 0x0, "e57044", 0x0, "cd98e8"}}}}}}, 0x0) [ 1650.402314] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 10:18:47 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}}, &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000240)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, 0x0) write$binfmt_aout(r0, &(0x7f0000000040)=ANY=[@ANYRESOCT], 0x337) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000100)={r0, r1}) recvmmsg(r2, &(0x7f0000002300)=[{{0x0, 0xfffffe19, 0x0, 0x0, 0x0, 0x7e}}], 0x2fd, 0x400002fd, 0x0) 10:18:47 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}}, &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000240)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, 0x0) write$binfmt_aout(r0, &(0x7f0000000040)=ANY=[@ANYRESOCT], 0x337) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000100)={r0, r1}) recvmmsg(r2, &(0x7f0000002300)=[{{0x0, 0xfffffe19, 0x0, 0x0, 0x0, 0x7e}}], 0x2fd, 0x400002fd, 0x0) 10:18:47 executing program 1: syz_emit_ethernet(0x32, &(0x7f0000000000)={@local, @empty=[0x7, 0x0, 0x200000000000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0xffffff89, 0x0, @remote, @local}, @dccp={{0x0, 0x0, 0x4, 0x60, 0x0, 0x0, 0x3, 0x0, 0x0, "e57044", 0x0, "cd98e8"}}}}}}, 0x0) 10:18:47 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}}, &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000240)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, 0x0) write$binfmt_aout(r0, &(0x7f0000000040)=ANY=[@ANYRESOCT], 0x337) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000100)={r0, r1}) recvmmsg(r2, &(0x7f0000002300)=[{{0x0, 0xfffffe19, 0x0, 0x0, 0x0, 0x7e}}], 0x2fd, 0x400002fd, 0x0) 10:18:47 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}}, &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000240)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, 0x0) write$binfmt_aout(r0, &(0x7f0000000040)=ANY=[@ANYRESOCT], 0x337) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000100)={r0, r1}) recvmmsg(r2, &(0x7f0000002300)=[{{0x0, 0xfffffe19, 0x0, 0x0, 0x0, 0x7e}}], 0x2fd, 0x400002fd, 0x0) 10:18:47 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}}, &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000240)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, 0x0) write$binfmt_aout(r0, &(0x7f0000000040)=ANY=[@ANYRESOCT], 0x337) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000100)={r0, r1}) recvmmsg(r2, &(0x7f0000002300)=[{{0x0, 0xfffffe19, 0x0, 0x0, 0x0, 0x7e}}], 0x2fd, 0x400002fd, 0x0) 10:18:47 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}}, &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000240)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, 0x0) write$binfmt_aout(r0, &(0x7f0000000040)=ANY=[@ANYRESOCT], 0x337) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000100)={r0, r1}) recvmmsg(r2, &(0x7f0000002300)=[{{0x0, 0xfffffe19, 0x0, 0x0, 0x0, 0x7e}}], 0x2fd, 0x400002fd, 0x0) 10:18:47 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}}, &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000240)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, 0x0) write$binfmt_aout(r0, &(0x7f0000000040)=ANY=[@ANYRESOCT], 0x337) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000100)={r0, r1}) recvmmsg(r2, &(0x7f0000002300)=[{{0x0, 0xfffffe19, 0x0, 0x0, 0x0, 0x7e}}], 0x2fd, 0x400002fd, 0x0) 10:18:47 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}}, &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000240)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, 0x0) write$binfmt_aout(r0, &(0x7f0000000040)=ANY=[@ANYRESOCT], 0x337) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000100)={r0, r1}) recvmmsg(r2, &(0x7f0000002300)=[{{0x0, 0xfffffe19, 0x0, 0x0, 0x0, 0x7e}}], 0x2fd, 0x400002fd, 0x0) 10:18:47 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}}, &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000240)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, 0x0) write$binfmt_aout(r0, &(0x7f0000000040)=ANY=[@ANYRESOCT], 0x337) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000100)={r0, r1}) recvmmsg(r2, &(0x7f0000002300)=[{{0x0, 0xfffffe19, 0x0, 0x0, 0x0, 0x7e}}], 0x2fd, 0x400002fd, 0x0) 10:18:47 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}}, &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000240)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, 0x0) write$binfmt_aout(r0, &(0x7f0000000040)=ANY=[@ANYRESOCT], 0x337) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000100)={r0, r1}) recvmmsg(r2, &(0x7f0000002300)=[{{0x0, 0xfffffe19, 0x0, 0x0, 0x0, 0x7e}}], 0x2fd, 0x400002fd, 0x0) 10:18:47 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}}, &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000240)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, 0x0) write$binfmt_aout(r0, &(0x7f0000000040)=ANY=[@ANYRESOCT], 0x337) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000100)={r0, r1}) recvmmsg(r2, &(0x7f0000002300)=[{{0x0, 0xfffffe19, 0x0, 0x0, 0x0, 0x7e}}], 0x2fd, 0x400002fd, 0x0) 10:18:47 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}}, &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000240)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, 0x0) write$binfmt_aout(r0, &(0x7f0000000040)=ANY=[@ANYRESOCT], 0x337) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000100)={r0, r1}) recvmmsg(r2, &(0x7f0000002300)=[{{0x0, 0xfffffe19, 0x0, 0x0, 0x0, 0x7e}}], 0x2fd, 0x400002fd, 0x0) 10:18:47 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}}, &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000240)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, 0x0) write$binfmt_aout(r0, &(0x7f0000000040)=ANY=[@ANYRESOCT], 0x337) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000100)={r0, r1}) recvmmsg(r2, &(0x7f0000002300)=[{{0x0, 0xfffffe19, 0x0, 0x0, 0x0, 0x7e}}], 0x2fd, 0x400002fd, 0x0) 10:18:48 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0xffffffffffffffff, 0x2) getsockopt$MISDN_TIME_STAMP(r1, 0x0, 0x1, &(0x7f0000000000), &(0x7f0000000040)=0x4) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9a9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) r3 = syz_open_dev$sndmidi(&(0x7f0000000040)='/dev/snd/midiC#D#\x00', 0x200, 0x0) open(&(0x7f0000000080)='./file0\x00', 0x80081, 0x0) r4 = memfd_create(&(0x7f0000000480)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\x10\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f\xf3\xc8\xdd~w\xa7\xbdZ\xe5\xa7\xda\xeb\x03\x98\xfe\xd9,\xa6\'\xb6q\x19K\xdc\"b\xf5\x8aY\\P\xf2\xdb\xdc~\xf1}K\x9d%\x1e\xe7\xe1\x12\xc3x\xa2\x19\xf3}\xfe\x8fW\xf9\x13\x1f$\xea\f3b\x1c\xcf\xcf\xb9\x9a\x8d\xa0CS\n\xfc\t\x8b\xe3EP\xc8\xa9o\xde\xf7\x17\xa95\xb125\xdb\x16\xf953\xd6\x8f\xc2\x03a\x01\xfd\x8b\xad\xea\xb2+\xb3Z\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f\xf3\xc8\xdd~w\xa7\xbdZ\xe5\xa7\xda\xeb\x03\x98\xfe\xd9,\xa6\'\xb6q\x19K\xdc\"b\xf5\x8aY\\P\xf2\xdb\xdc~\xf1}K\x9d%\x1e\xe7\xe1\x12\xc3x\xa2\x19\xf3}\xfe\x8fW\xf9\x13\x1f$\xea\f3b\x1c\xcf\xcf\xb9\x9a\x8d\xa0CS\n\xfc\t\x8b\xe3EP\xc8\xa9o\xde\xf7\x17\xa95\xb125\xdb\x16\xf953\xd6\x8f\xc2\x03a\x01\xfd\x8b\xad\xea\xb2+\xb3Z\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f\xf3\xc8\xdd~w\xa7\xbdZ\xe5\xa7\xda\xeb\x03\x98\xfe\xd9,\xa6\'\xb6q\x19K\xdc\"b\xf5\x8aY\\P\xf2\xdb\xdc~\xf1}K\x9d%\x1e\xe7\xe1\x12\xc3x\xa2\x19\xf3}\xfe\x8fW\xf9\x13\x1f$\xea\f3b\x1c\xcf\xcf\xb9\x9a\x8d\xa0CS\n\xfc\t\x8b\xe3EP\xc8\xa9o\xde\xf7\x17\xa95\xb125\xdb\x16\xf953\xd6\x8f\xc2\x03a\x01\xfd\x8b\xad\xea\xb2+\xb3Z\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f\xf3\xc8\xdd~w\xa7\xbdZ\xe5\xa7\xda\xeb\x03\x98\xfe\xd9,\xa6\'\xb6q\x19K\xdc\"b\xf5\x8aY\\P\xf2\xdb\xdc~\xf1}K\x9d%\x1e\xe7\xe1\x12\xc3x\xa2\x19\xf3}\xfe\x8fW\xf9\x13\x1f$\xea\f3b\x1c\xcf\xcf\xb9\x9a\x8d\xa0CS\n\xfc\t\x8b\xe3EP\xc8\xa9o\xde\xf7\x17\xa95\xb125\xdb\x16\xf953\xd6\x8f\xc2\x03a\x01\xfd\x8b\xad\xea\xb2+\xb3Z\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f\xf3\xc8\xdd~w\xa7\xbdZ\xe5\xa7\xda\xeb\x03\x98\xfe\xd9,\xa6\'\xb6q\x19K\xdc\"b\xf5\x8aY\\P\xf2\xdb\xdc~\xf1}K\x9d%\x1e\xe7\xe1\x12\xc3x\xa2\x19\xf3}\xfe\x8fW\xf9\x13\x1f$\xea\f3b\x1c\xcf\xcf\xb9\x9a\x8d\xa0CS\n\xfc\t\x8b\xe3EP\xc8\xa9o\xde\xf7\x17\xa95\xb125\xdb\x16\xf953\xd6\x8f\xc2\x03a\x01\xfd\x8b\xad\xea\xb2+\xb3Z\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f\xf3\xc8\xdd~w\xa7\xbdZ\xe5\xa7\xda\xeb\x03\x98\xfe\xd9,\xa6\'\xb6q\x19K\xdc\"b\xf5\x8aY\\P\xf2\xdb\xdc~\xf1}K\x9d%\x1e\xe7\xe1\x12\xc3x\xa2\x19\xf3}\xfe\x8fW\xf9\x13\x1f$\xea\f3b\x1c\xcf\xcf\xb9\x9a\x8d\xa0CS\n\xfc\t\x8b\xe3EP\xc8\xa9o\xde\xf7\x17\xa95\xb125\xdb\x16\xf953\xd6\x8f\xc2\x03a\x01\xfd\x8b\xad\xea\xb2+\xb3Z\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f\xf3\xc8\xdd~w\xa7\xbdZ\xe5\xa7\xda\xeb\x03\x98\xfe\xd9,\xa6\'\xb6q\x19K\xdc\"b\xf5\x8aY\\P\xf2\xdb\xdc~\xf1}K\x9d%\x1e\xe7\xe1\x12\xc3x\xa2\x19\xf3}\xfe\x8fW\xf9\x13\x1f$\xea\f3b\x1c\xcf\xcf\xb9\x9a\x8d\xa0CS\n\xfc\t\x8b\xe3EP\xc8\xa9o\xde\xf7\x17\xa95\xb125\xdb\x16\xf953\xd6\x8f\xc2\x03a\x01\xfd\x8b\xad\xea\xb2+\xb3Z0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x40000000015, 0x5, 0x0) setsockopt$RDS_CONG_MONITOR(r1, 0x114, 0x6, &(0x7f0000000600)=0x1, 0x4) poll(&(0x7f0000000580)=[{r1}], 0x1, 0x1) 10:18:55 executing program 5: r0 = socket$rds(0x15, 0x5, 0x0) r1 = epoll_create(0x100000001) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00005befdc)) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffff9c, 0xc0086426, &(0x7f00000002c0)={0x1, &(0x7f0000000280)=[{}]}) close(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, 0x0) r3 = syz_open_dev$media(&(0x7f0000000080)='/dev/media#\x00', 0x3, 0x2) clone(0x2102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, @perf_config_ext, 0x4000200000000, 0x2, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x28) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, 0x0, &(0x7f0000000500)) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x04', 0x0, &(0x7f0000000000)) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$CAPI_NCCI_OPENCOUNT(r3, 0x80044326, &(0x7f00000001c0)=0x6) setsockopt$bt_BT_RCVMTU(r3, 0x112, 0xd, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, 0x0, &(0x7f0000000480)) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000080)) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000180)='tls\x00', 0x4) 10:18:55 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000180)={0x0, @in6, 0x0, 0x0, 0x0, 0x1800}, 0x98) 10:18:55 executing program 2: r0 = socket$rds(0x15, 0x5, 0x0) r1 = epoll_create(0x100000001) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00005befdc)) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffff9c, 0xc0086426, &(0x7f00000002c0)={0x1, &(0x7f0000000280)=[{}]}) close(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, 0x0) r3 = syz_open_dev$media(&(0x7f0000000080)='/dev/media#\x00', 0x3, 0x2) clone(0x2102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, @perf_config_ext, 0x4000200000000, 0x2, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x28) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, 0x0, &(0x7f0000000500)) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x04', 0x0, &(0x7f0000000000)) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$CAPI_NCCI_OPENCOUNT(r3, 0x80044326, &(0x7f00000001c0)=0x6) setsockopt$bt_BT_RCVMTU(r3, 0x112, 0xd, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, 0x0, &(0x7f0000000480)) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000080)) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000180)='tls\x00', 0x4) 10:18:55 executing program 5: r0 = socket$rds(0x15, 0x5, 0x0) r1 = epoll_create(0x100000001) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00005befdc)) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffff9c, 0xc0086426, &(0x7f00000002c0)={0x1, &(0x7f0000000280)=[{}]}) close(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, 0x0) r3 = syz_open_dev$media(&(0x7f0000000080)='/dev/media#\x00', 0x3, 0x2) clone(0x2102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, @perf_config_ext, 0x4000200000000, 0x2, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x28) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, 0x0, &(0x7f0000000500)) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x04', 0x0, &(0x7f0000000000)) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$CAPI_NCCI_OPENCOUNT(r3, 0x80044326, &(0x7f00000001c0)=0x6) setsockopt$bt_BT_RCVMTU(r3, 0x112, 0xd, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, 0x0, &(0x7f0000000480)) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000080)) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000180)='tls\x00', 0x4) 10:18:55 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000100)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000180)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) r2 = gettid() process_vm_writev(r2, &(0x7f0000000000)=[{&(0x7f000034afa4)=""/1, 0x1}], 0x1, &(0x7f0000c22fa0)=[{&(0x7f0000000080)=""/1, 0x1}], 0x1, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) close(r1) 10:18:55 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x40000000015, 0x5, 0x0) setsockopt$RDS_CONG_MONITOR(r1, 0x114, 0x6, &(0x7f0000000600)=0x1, 0x4) poll(&(0x7f0000000580)=[{r1}], 0x1, 0x1) 10:18:55 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000180)={0x0, @in6, 0x0, 0x0, 0x0, 0x1800}, 0x98) 10:18:55 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x40000000015, 0x5, 0x0) setsockopt$RDS_CONG_MONITOR(r1, 0x114, 0x6, &(0x7f0000000600)=0x1, 0x4) poll(&(0x7f0000000580)=[{r1}], 0x1, 0x1) 10:18:55 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000180)={0x0, @in6, 0x0, 0x0, 0x0, 0x1800}, 0x98) 10:18:58 executing program 1: connect$vsock_dgram(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() dup3(r0, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_buf(r0, 0x6, 0xd, &(0x7f0000000080)="11", 0x1) ptrace$setopts(0x4206, r1, 0x0, 0x0) r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r2, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r2, 0x0) accept(r2, 0x0, 0x0) tkill(r1, 0x8) 10:18:58 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000100)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000180)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) r2 = gettid() process_vm_writev(r2, &(0x7f0000000000)=[{&(0x7f000034afa4)=""/1, 0x1}], 0x1, &(0x7f0000c22fa0)=[{&(0x7f0000000080)=""/1, 0x1}], 0x1, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) close(r1) 10:18:58 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x40000000015, 0x5, 0x0) setsockopt$RDS_CONG_MONITOR(r1, 0x114, 0x6, &(0x7f0000000600)=0x1, 0x4) poll(&(0x7f0000000580)=[{r1}], 0x1, 0x1) 10:18:58 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x40000000015, 0x5, 0x0) setsockopt$RDS_CONG_MONITOR(r1, 0x114, 0x6, &(0x7f0000000600)=0x1, 0x4) poll(&(0x7f0000000580)=[{r1}], 0x1, 0x1) 10:18:58 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000180)={0x0, @in6, 0x0, 0x0, 0x0, 0x1800}, 0x98) 10:18:58 executing program 4: r0 = gettid() seccomp(0x1, 0x8, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x10200000006, 0x0, 0x0, 0x7fc00000}]}) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f00000001c0)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) tkill(r0, 0x1000000000016) 10:18:58 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x2, 0x400000000003, 0x2) sendmsg$kcm(r1, &(0x7f00000004c0)={&(0x7f00000001c0)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000e40)=ANY=[@ANYBLOB="1400000000000000010000002500000002010000"], 0x14}, 0x0) close(r1) 10:18:58 executing program 3: syz_emit_ethernet(0xab, &(0x7f0000000040)={@local, @dev, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0xffffff89, 0x0, @empty}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) 10:18:58 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x40000000015, 0x5, 0x0) setsockopt$RDS_CONG_MONITOR(r1, 0x114, 0x6, &(0x7f0000000600)=0x1, 0x4) poll(&(0x7f0000000580)=[{r1}], 0x1, 0x1) 10:18:58 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000100)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000180)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) r2 = gettid() process_vm_writev(r2, &(0x7f0000000000)=[{&(0x7f000034afa4)=""/1, 0x1}], 0x1, &(0x7f0000c22fa0)=[{&(0x7f0000000080)=""/1, 0x1}], 0x1, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) close(r1) 10:18:58 executing program 1: r0 = syz_open_dev$video(&(0x7f0000000080)='/dev/video#\x00', 0x7, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(r0, 0xc0205648, &(0x7f0000000100)={0x0, 0x4, 0x0, [], &(0x7f00000000c0)={0xf0f043, 0x0, [], @p_u8=0x0}}) [ 1661.636147] raw_sendmsg: syz-executor.0 forgot to set AF_INET. Fix it! 10:18:58 executing program 3: syz_emit_ethernet(0xab, &(0x7f0000000040)={@local, @dev, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0xffffff89, 0x0, @empty}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) 10:18:58 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x2, 0x400000000003, 0x2) sendmsg$kcm(r1, &(0x7f00000004c0)={&(0x7f00000001c0)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000e40)=ANY=[@ANYBLOB="1400000000000000010000002500000002010000"], 0x14}, 0x0) close(r1) 10:18:58 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0x1000000005) ioctl$TCFLSH(r0, 0x8926, 0x73fffa) 10:18:58 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x40000000015, 0x5, 0x0) setsockopt$RDS_CONG_MONITOR(r1, 0x114, 0x6, &(0x7f0000000600)=0x1, 0x4) poll(&(0x7f0000000580)=[{r1}], 0x1, 0x1) 10:18:58 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000100)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000180)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) r2 = gettid() process_vm_writev(r2, &(0x7f0000000000)=[{&(0x7f000034afa4)=""/1, 0x1}], 0x1, &(0x7f0000c22fa0)=[{&(0x7f0000000080)=""/1, 0x1}], 0x1, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) close(r1) 10:18:58 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='cpu.stat\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x28) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'\x00\x00\x00\x00\x00\x00\x00\x00\x00\xe9\xdc\x00', 0x200085}) socketpair(0x1, 0x1, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f3, &(0x7f0000000080)='ip6tnl0\x00') 10:18:59 executing program 4: r0 = gettid() seccomp(0x1, 0x8, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x10200000006, 0x0, 0x0, 0x7fc00000}]}) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f00000001c0)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) tkill(r0, 0x1000000000016) 10:18:59 executing program 1: r0 = socket(0xa, 0x5, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000001700)={'vcan0\x00', 0x0}) setsockopt$inet6_mreq(r0, 0x29, 0x14, &(0x7f0000000080)={@mcast1, r1}, 0x14) 10:18:59 executing program 3: syz_emit_ethernet(0xab, &(0x7f0000000040)={@local, @dev, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0xffffff89, 0x0, @empty}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) 10:18:59 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x2, 0x400000000003, 0x2) sendmsg$kcm(r1, &(0x7f00000004c0)={&(0x7f00000001c0)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000e40)=ANY=[@ANYBLOB="1400000000000000010000002500000002010000"], 0x14}, 0x0) close(r1) 10:18:59 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0/file0\x00', 0x0) mkdir(&(0x7f00000001c0)='./file0/file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0/file1/file0\x00', 0x0) rename(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000140)='./file0/file1\x00') 10:18:59 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='cpu.stat\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x28) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'\x00\x00\x00\x00\x00\x00\x00\x00\x00\xe9\xdc\x00', 0x200085}) socketpair(0x1, 0x1, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f3, &(0x7f0000000080)='ip6tnl0\x00') 10:18:59 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='cpu.stat\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x28) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'\x00\x00\x00\x00\x00\x00\x00\x00\x00\xe9\xdc\x00', 0x200085}) socketpair(0x1, 0x1, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f3, &(0x7f0000000080)='ip6tnl0\x00') 10:18:59 executing program 1: r0 = socket(0xa, 0x5, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000001700)={'vcan0\x00', 0x0}) setsockopt$inet6_mreq(r0, 0x29, 0x14, &(0x7f0000000080)={@mcast1, r1}, 0x14) 10:18:59 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x2, 0x400000000003, 0x2) sendmsg$kcm(r1, &(0x7f00000004c0)={&(0x7f00000001c0)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000e40)=ANY=[@ANYBLOB="1400000000000000010000002500000002010000"], 0x14}, 0x0) close(r1) 10:18:59 executing program 3: syz_emit_ethernet(0xab, &(0x7f0000000040)={@local, @dev, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0xffffff89, 0x0, @empty}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) 10:18:59 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0/file0\x00', 0x0) mkdir(&(0x7f00000001c0)='./file0/file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0/file1/file0\x00', 0x0) rename(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000140)='./file0/file1\x00') 10:18:59 executing program 1: r0 = socket(0xa, 0x5, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000001700)={'vcan0\x00', 0x0}) setsockopt$inet6_mreq(r0, 0x29, 0x14, &(0x7f0000000080)={@mcast1, r1}, 0x14) 10:18:59 executing program 4: r0 = gettid() seccomp(0x1, 0x8, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x10200000006, 0x0, 0x0, 0x7fc00000}]}) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f00000001c0)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) tkill(r0, 0x1000000000016) 10:18:59 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='cpu.stat\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x28) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'\x00\x00\x00\x00\x00\x00\x00\x00\x00\xe9\xdc\x00', 0x200085}) socketpair(0x1, 0x1, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f3, &(0x7f0000000080)='ip6tnl0\x00') 10:18:59 executing program 3: r0 = syz_open_dev$video(&(0x7f0000000280)='/dev/video#\x00', 0x9, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_S_INPUT(r0, 0xc0285629, &(0x7f0000000040)=0x3) 10:18:59 executing program 0: get_mempolicy(0x0, 0x0, 0x0, &(0x7f00007e2000/0x7000)=nil, 0x3) mbind(&(0x7f0000289000/0x400000)=nil, 0x400000, 0x0, 0x0, 0x0, 0x2) 10:18:59 executing program 1: r0 = socket(0xa, 0x5, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000001700)={'vcan0\x00', 0x0}) setsockopt$inet6_mreq(r0, 0x29, 0x14, &(0x7f0000000080)={@mcast1, r1}, 0x14) 10:18:59 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0/file0\x00', 0x0) mkdir(&(0x7f00000001c0)='./file0/file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0/file1/file0\x00', 0x0) rename(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000140)='./file0/file1\x00') 10:19:00 executing program 0: get_mempolicy(0x0, 0x0, 0x0, &(0x7f00007e2000/0x7000)=nil, 0x3) mbind(&(0x7f0000289000/0x400000)=nil, 0x400000, 0x0, 0x0, 0x0, 0x2) 10:19:00 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0/file0\x00', 0x0) mkdir(&(0x7f00000001c0)='./file0/file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0/file1/file0\x00', 0x0) rename(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000140)='./file0/file1\x00') 10:19:00 executing program 1: get_mempolicy(0x0, 0x0, 0x0, &(0x7f00007e2000/0x7000)=nil, 0x3) mbind(&(0x7f0000289000/0x400000)=nil, 0x400000, 0x0, 0x0, 0x0, 0x2) 10:19:00 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) getsockopt$bt_BT_CHANNEL_POLICY(r0, 0x112, 0xa, &(0x7f0000000040), &(0x7f0000000080)=0x4) 10:19:00 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) getsockopt$bt_BT_CHANNEL_POLICY(r0, 0x112, 0xa, &(0x7f0000000040), &(0x7f0000000080)=0x4) 10:19:00 executing program 1: get_mempolicy(0x0, 0x0, 0x0, &(0x7f00007e2000/0x7000)=nil, 0x3) mbind(&(0x7f0000289000/0x400000)=nil, 0x400000, 0x0, 0x0, 0x0, 0x2) 10:19:00 executing program 0: get_mempolicy(0x0, 0x0, 0x0, &(0x7f00007e2000/0x7000)=nil, 0x3) mbind(&(0x7f0000289000/0x400000)=nil, 0x400000, 0x0, 0x0, 0x0, 0x2) 10:19:00 executing program 3: r0 = syz_open_dev$video(&(0x7f0000000280)='/dev/video#\x00', 0x9, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_S_INPUT(r0, 0xc0285629, &(0x7f0000000040)=0x3) 10:19:00 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000002c0)={0xa, 0xc, 0x100000000000914, 0x1}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0}, 0x18) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) close(r0) perf_event_open(0x0, 0x0, 0x6, 0xffffffffffffffff, 0x0) 10:19:00 executing program 1: get_mempolicy(0x0, 0x0, 0x0, &(0x7f00007e2000/0x7000)=nil, 0x3) mbind(&(0x7f0000289000/0x400000)=nil, 0x400000, 0x0, 0x0, 0x0, 0x2) 10:19:00 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) getsockopt$bt_BT_CHANNEL_POLICY(r0, 0x112, 0xa, &(0x7f0000000040), &(0x7f0000000080)=0x4) 10:19:00 executing program 4: r0 = perf_event_open(&(0x7f0000000300)={0x400000001, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) mmap(&(0x7f000094f000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f00000001c0), 0x100000073) read(r1, &(0x7f0000000200)=""/250, 0x50c7e3e3) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) 10:19:00 executing program 3: r0 = syz_open_dev$video(&(0x7f0000000280)='/dev/video#\x00', 0x9, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_S_INPUT(r0, 0xc0285629, &(0x7f0000000040)=0x3) 10:19:00 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x8}, 0x1c) connect$inet(r0, &(0x7f0000000140)={0x2, 0x0, @broadcast}, 0x10) 10:19:01 executing program 0: get_mempolicy(0x0, 0x0, 0x0, &(0x7f00007e2000/0x7000)=nil, 0x3) mbind(&(0x7f0000289000/0x400000)=nil, 0x400000, 0x0, 0x0, 0x0, 0x2) 10:19:01 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) getsockopt$bt_BT_CHANNEL_POLICY(r0, 0x112, 0xa, &(0x7f0000000040), &(0x7f0000000080)=0x4) 10:19:01 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x8}, 0x1c) connect$inet(r0, &(0x7f0000000140)={0x2, 0x0, @broadcast}, 0x10) 10:19:01 executing program 3: r0 = syz_open_dev$video(&(0x7f0000000280)='/dev/video#\x00', 0x9, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_S_INPUT(r0, 0xc0285629, &(0x7f0000000040)=0x3) 10:19:01 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128l-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18}], 0x30}, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f00000012c0)=""/167, 0xa7}, {&(0x7f0000003580)=""/4096, 0x1000}], 0x2}}], 0x1, 0x0, 0x0) 10:19:01 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000014f000)={0x0, 0x0, &(0x7f0000bd7000)={&(0x7f0000c07e98)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in, @in6=@ipv4={[], [], @local={0xac, 0x14, 0xffffffffffffffff}}}, {@in6, 0x0, 0x2b}, @in=@broadcast, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth={0x48, 0x1, {{'md5\x00'}}}]}, 0x138}}, 0x0) 10:19:01 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000002c0)={0xa, 0xc, 0x100000000000914, 0x1}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0}, 0x18) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) close(r0) perf_event_open(0x0, 0x0, 0x6, 0xffffffffffffffff, 0x0) 10:19:01 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x8}, 0x1c) connect$inet(r0, &(0x7f0000000140)={0x2, 0x0, @broadcast}, 0x10) 10:19:01 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000002c0)={0xa, 0xc, 0x100000000000914, 0x1}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0}, 0x18) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) close(r0) perf_event_open(0x0, 0x0, 0x6, 0xffffffffffffffff, 0x0) 10:19:01 executing program 4: r0 = perf_event_open(&(0x7f0000000300)={0x400000001, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) mmap(&(0x7f000094f000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f00000001c0), 0x100000073) read(r1, &(0x7f0000000200)=""/250, 0x50c7e3e3) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) 10:19:01 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000014f000)={0x0, 0x0, &(0x7f0000bd7000)={&(0x7f0000c07e98)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in, @in6=@ipv4={[], [], @local={0xac, 0x14, 0xffffffffffffffff}}}, {@in6, 0x0, 0x2b}, @in=@broadcast, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth={0x48, 0x1, {{'md5\x00'}}}]}, 0x138}}, 0x0) 10:19:01 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128l-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18}], 0x30}, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f00000012c0)=""/167, 0xa7}, {&(0x7f0000003580)=""/4096, 0x1000}], 0x2}}], 0x1, 0x0, 0x0) 10:19:01 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000002c0)={0xa, 0xc, 0x100000000000914, 0x1}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0}, 0x18) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) close(r0) perf_event_open(0x0, 0x0, 0x6, 0xffffffffffffffff, 0x0) 10:19:01 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000002c0)={0xa, 0xc, 0x100000000000914, 0x1}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0}, 0x18) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) close(r0) perf_event_open(0x0, 0x0, 0x6, 0xffffffffffffffff, 0x0) 10:19:01 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x8}, 0x1c) connect$inet(r0, &(0x7f0000000140)={0x2, 0x0, @broadcast}, 0x10) 10:19:01 executing program 1: r0 = perf_event_open(&(0x7f0000000300)={0x400000001, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) mmap(&(0x7f000094f000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f00000001c0), 0x100000073) read(r1, &(0x7f0000000200)=""/250, 0x50c7e3e3) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) 10:19:01 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128l-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18}], 0x30}, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f00000012c0)=""/167, 0xa7}, {&(0x7f0000003580)=""/4096, 0x1000}], 0x2}}], 0x1, 0x0, 0x0) 10:19:01 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000014f000)={0x0, 0x0, &(0x7f0000bd7000)={&(0x7f0000c07e98)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in, @in6=@ipv4={[], [], @local={0xac, 0x14, 0xffffffffffffffff}}}, {@in6, 0x0, 0x2b}, @in=@broadcast, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth={0x48, 0x1, {{'md5\x00'}}}]}, 0x138}}, 0x0) 10:19:02 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000002c0)={0xa, 0xc, 0x100000000000914, 0x1}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0}, 0x18) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) close(r0) perf_event_open(0x0, 0x0, 0x6, 0xffffffffffffffff, 0x0) 10:19:02 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128l-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18}], 0x30}, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f00000012c0)=""/167, 0xa7}, {&(0x7f0000003580)=""/4096, 0x1000}], 0x2}}], 0x1, 0x0, 0x0) 10:19:02 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000014f000)={0x0, 0x0, &(0x7f0000bd7000)={&(0x7f0000c07e98)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in, @in6=@ipv4={[], [], @local={0xac, 0x14, 0xffffffffffffffff}}}, {@in6, 0x0, 0x2b}, @in=@broadcast, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth={0x48, 0x1, {{'md5\x00'}}}]}, 0x138}}, 0x0) 10:19:02 executing program 4: r0 = perf_event_open(&(0x7f0000000300)={0x400000001, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) mmap(&(0x7f000094f000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f00000001c0), 0x100000073) read(r1, &(0x7f0000000200)=""/250, 0x50c7e3e3) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) 10:19:02 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000002c0)={0xa, 0xc, 0x100000000000914, 0x1}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0}, 0x18) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) close(r0) perf_event_open(0x0, 0x0, 0x6, 0xffffffffffffffff, 0x0) 10:19:02 executing program 0: r0 = perf_event_open(&(0x7f0000000300)={0x400000001, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) mmap(&(0x7f000094f000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f00000001c0), 0x100000073) read(r1, &(0x7f0000000200)=""/250, 0x50c7e3e3) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) 10:19:02 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000002c0)={0xa, 0xc, 0x100000000000914, 0x1}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0}, 0x18) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) close(r0) perf_event_open(0x0, 0x0, 0x6, 0xffffffffffffffff, 0x0) 10:19:02 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000002c0)={0xa, 0xc, 0x100000000000914, 0x1}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0}, 0x18) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) close(r0) perf_event_open(0x0, 0x0, 0x6, 0xffffffffffffffff, 0x0) 10:19:02 executing program 1: r0 = perf_event_open(&(0x7f0000000300)={0x400000001, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) mmap(&(0x7f000094f000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f00000001c0), 0x100000073) read(r1, &(0x7f0000000200)=""/250, 0x50c7e3e3) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) 10:19:03 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000002c0)={0xa, 0xc, 0x100000000000914, 0x1}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0}, 0x18) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) close(r0) perf_event_open(0x0, 0x0, 0x6, 0xffffffffffffffff, 0x0) 10:19:03 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000002c0)={0xa, 0xc, 0x100000000000914, 0x1}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0}, 0x18) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) close(r0) perf_event_open(0x0, 0x0, 0x6, 0xffffffffffffffff, 0x0) 10:19:03 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000002c0)={0xa, 0xc, 0x100000000000914, 0x1}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0}, 0x18) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) close(r0) perf_event_open(0x0, 0x0, 0x6, 0xffffffffffffffff, 0x0) 10:19:03 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000002c0)={0xa, 0xc, 0x100000000000914, 0x1}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0}, 0x18) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) close(r0) perf_event_open(0x0, 0x0, 0x6, 0xffffffffffffffff, 0x0) 10:19:03 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000002c0)={0xa, 0xc, 0x100000000000914, 0x1}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0}, 0x18) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) close(r0) perf_event_open(0x0, 0x0, 0x6, 0xffffffffffffffff, 0x0) 10:19:04 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000002c0)={0xa, 0xc, 0x100000000000914, 0x1}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0}, 0x18) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) close(r0) perf_event_open(0x0, 0x0, 0x6, 0xffffffffffffffff, 0x0) 10:19:04 executing program 0: r0 = perf_event_open(&(0x7f0000000300)={0x400000001, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) mmap(&(0x7f000094f000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f00000001c0), 0x100000073) read(r1, &(0x7f0000000200)=""/250, 0x50c7e3e3) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) 10:19:04 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000002c0)={0xa, 0xc, 0x100000000000914, 0x1}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0}, 0x18) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) close(r0) perf_event_open(0x0, 0x0, 0x6, 0xffffffffffffffff, 0x0) 10:19:04 executing program 4: r0 = perf_event_open(&(0x7f0000000300)={0x400000001, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) mmap(&(0x7f000094f000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f00000001c0), 0x100000073) read(r1, &(0x7f0000000200)=""/250, 0x50c7e3e3) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) 10:19:04 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000002c0)={0xa, 0xc, 0x100000000000914, 0x1}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0}, 0x18) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) close(r0) perf_event_open(0x0, 0x0, 0x6, 0xffffffffffffffff, 0x0) 10:19:04 executing program 1: r0 = perf_event_open(&(0x7f0000000300)={0x400000001, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) mmap(&(0x7f000094f000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f00000001c0), 0x100000073) read(r1, &(0x7f0000000200)=""/250, 0x50c7e3e3) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) 10:19:04 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000002c0)={0xa, 0xc, 0x100000000000914, 0x1}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0}, 0x18) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) close(r0) perf_event_open(0x0, 0x0, 0x6, 0xffffffffffffffff, 0x0) 10:19:04 executing program 2: ioctl(0xffffffffffffffff, 0x0, 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000006c0)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) sendmsg$unix(r2, &(0x7f0000000940)={&(0x7f0000000700)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000780)=[{&(0x7f0000000b40)="92ccb06191e89d33a423cc73f347260cf8581fd569fedcfc94327909a99b496b43c6a87730902a47e48763d6815fb23f113475b1793560c58ac8bdc2c67267e6a276a80e47aac4eef6ed5ab12126ae7b33fe1d65f9bd3c912c45cf780e078642e7d26042c4d05d2813f209cf76cc", 0x6e}], 0x1, 0x0, 0x0, 0x4000}, 0x40) sched_setscheduler(r1, 0x5, &(0x7f0000000040)) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="55c4d2ffd38b0d51b15a9c3c16700893c1e31d2906b6a6f79778e1cebdf9068b02a9df9f9b2228c1a4cd4c9f52218a8777961267d5f157eb31cd8e6a4a828448b466cd963a7447655ec40fa2d4687785c21ba0c49a66b2b0465e0b9d353029086dcf88c6973e9e938692a5cbde2ddc12562a39c768a035efe8a25e05d5d56157370789c9564733570370da137cb76c7cb649e8"]) syz_mount_image$ntfs(0x0, &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r3 = shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_LOCK(r3, 0xb) r4 = syz_open_dev$vcsn(&(0x7f00000007c0)='/dev/vcs#\x00', 0x0, 0x400) ioctl$sock_inet_tcp_SIOCOUTQNSD(r4, 0x894b, 0x0) syz_read_part_table(0x7fffffff, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000580)={0x0, @in={{0x2, 0x0, @loopback}}, [0x97, 0x48a7, 0x0, 0x5, 0x0, 0x0, 0x0, 0xff, 0x0, 0x8340, 0x36, 0x0, 0x93d, 0x0, 0x1ff]}, 0x0) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f0000000680)={0x8000000000000000, 0x1}) creat(&(0x7f0000000100)='./file0\x00', 0x0) socket$key(0xf, 0x3, 0x2) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=""/198, 0xc6}, 0x0) 10:19:04 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r0, 0xfffbfffffffffffc) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f0000000280)={0x0, @in6={{0xa, 0x0, 0x0, @empty}}, 0xf401, 0x0, 0x0, 0x0, 0x51}, 0x98) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffff9c, 0x0) 10:19:04 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000002c0)={0xa, 0xc, 0x100000000000914, 0x1}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0}, 0x18) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) close(r0) perf_event_open(0x0, 0x0, 0x6, 0xffffffffffffffff, 0x0) 10:19:04 executing program 2: ioctl(0xffffffffffffffff, 0x0, 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000006c0)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) sendmsg$unix(r2, &(0x7f0000000940)={&(0x7f0000000700)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000780)=[{&(0x7f0000000b40)="92ccb06191e89d33a423cc73f347260cf8581fd569fedcfc94327909a99b496b43c6a87730902a47e48763d6815fb23f113475b1793560c58ac8bdc2c67267e6a276a80e47aac4eef6ed5ab12126ae7b33fe1d65f9bd3c912c45cf780e078642e7d26042c4d05d2813f209cf76cc", 0x6e}], 0x1, 0x0, 0x0, 0x4000}, 0x40) sched_setscheduler(r1, 0x5, &(0x7f0000000040)) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="55c4d2ffd38b0d51b15a9c3c16700893c1e31d2906b6a6f79778e1cebdf9068b02a9df9f9b2228c1a4cd4c9f52218a8777961267d5f157eb31cd8e6a4a828448b466cd963a7447655ec40fa2d4687785c21ba0c49a66b2b0465e0b9d353029086dcf88c6973e9e938692a5cbde2ddc12562a39c768a035efe8a25e05d5d56157370789c9564733570370da137cb76c7cb649e8"]) syz_mount_image$ntfs(0x0, &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r3 = shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_LOCK(r3, 0xb) r4 = syz_open_dev$vcsn(&(0x7f00000007c0)='/dev/vcs#\x00', 0x0, 0x400) ioctl$sock_inet_tcp_SIOCOUTQNSD(r4, 0x894b, 0x0) syz_read_part_table(0x7fffffff, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000580)={0x0, @in={{0x2, 0x0, @loopback}}, [0x97, 0x48a7, 0x0, 0x5, 0x0, 0x0, 0x0, 0xff, 0x0, 0x8340, 0x36, 0x0, 0x93d, 0x0, 0x1ff]}, 0x0) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f0000000680)={0x8000000000000000, 0x1}) creat(&(0x7f0000000100)='./file0\x00', 0x0) socket$key(0xf, 0x3, 0x2) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=""/198, 0xc6}, 0x0) 10:19:05 executing program 3: ioctl(0xffffffffffffffff, 0x0, 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000006c0)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) sendmsg$unix(r2, &(0x7f0000000940)={&(0x7f0000000700)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000780)=[{&(0x7f0000000b40)="92ccb06191e89d33a423cc73f347260cf8581fd569fedcfc94327909a99b496b43c6a87730902a47e48763d6815fb23f113475b1793560c58ac8bdc2c67267e6a276a80e47aac4eef6ed5ab12126ae7b33fe1d65f9bd3c912c45cf780e078642e7d26042c4d05d2813f209cf76cc", 0x6e}], 0x1, 0x0, 0x0, 0x4000}, 0x40) sched_setscheduler(r1, 0x5, &(0x7f0000000040)) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="55c4d2ffd38b0d51b15a9c3c16700893c1e31d2906b6a6f79778e1cebdf9068b02a9df9f9b2228c1a4cd4c9f52218a8777961267d5f157eb31cd8e6a4a828448b466cd963a7447655ec40fa2d4687785c21ba0c49a66b2b0465e0b9d353029086dcf88c6973e9e938692a5cbde2ddc12562a39c768a035efe8a25e05d5d56157370789c9564733570370da137cb76c7cb649e8"]) syz_mount_image$ntfs(0x0, &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r3 = shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_LOCK(r3, 0xb) r4 = syz_open_dev$vcsn(&(0x7f00000007c0)='/dev/vcs#\x00', 0x0, 0x400) ioctl$sock_inet_tcp_SIOCOUTQNSD(r4, 0x894b, 0x0) syz_read_part_table(0x7fffffff, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000580)={0x0, @in={{0x2, 0x0, @loopback}}, [0x97, 0x48a7, 0x0, 0x5, 0x0, 0x0, 0x0, 0xff, 0x0, 0x8340, 0x36, 0x0, 0x93d, 0x0, 0x1ff]}, 0x0) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f0000000680)={0x8000000000000000, 0x1}) creat(&(0x7f0000000100)='./file0\x00', 0x0) socket$key(0xf, 0x3, 0x2) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=""/198, 0xc6}, 0x0) 10:19:05 executing program 5: ioctl(0xffffffffffffffff, 0x0, 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000006c0)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) sendmsg$unix(r2, &(0x7f0000000940)={&(0x7f0000000700)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000780)=[{&(0x7f0000000b40)="92ccb06191e89d33a423cc73f347260cf8581fd569fedcfc94327909a99b496b43c6a87730902a47e48763d6815fb23f113475b1793560c58ac8bdc2c67267e6a276a80e47aac4eef6ed5ab12126ae7b33fe1d65f9bd3c912c45cf780e078642e7d26042c4d05d2813f209cf76cc", 0x6e}], 0x1, 0x0, 0x0, 0x4000}, 0x40) sched_setscheduler(r1, 0x5, &(0x7f0000000040)) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="55c4d2ffd38b0d51b15a9c3c16700893c1e31d2906b6a6f79778e1cebdf9068b02a9df9f9b2228c1a4cd4c9f52218a8777961267d5f157eb31cd8e6a4a828448b466cd963a7447655ec40fa2d4687785c21ba0c49a66b2b0465e0b9d353029086dcf88c6973e9e938692a5cbde2ddc12562a39c768a035efe8a25e05d5d56157370789c9564733570370da137cb76c7cb649e8"]) syz_mount_image$ntfs(0x0, &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r3 = shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_LOCK(r3, 0xb) r4 = syz_open_dev$vcsn(&(0x7f00000007c0)='/dev/vcs#\x00', 0x0, 0x400) ioctl$sock_inet_tcp_SIOCOUTQNSD(r4, 0x894b, 0x0) syz_read_part_table(0x7fffffff, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000580)={0x0, @in={{0x2, 0x0, @loopback}}, [0x97, 0x48a7, 0x0, 0x5, 0x0, 0x0, 0x0, 0xff, 0x0, 0x8340, 0x36, 0x0, 0x93d, 0x0, 0x1ff]}, 0x0) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f0000000680)={0x8000000000000000, 0x1}) creat(&(0x7f0000000100)='./file0\x00', 0x0) socket$key(0xf, 0x3, 0x2) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=""/198, 0xc6}, 0x0) 10:19:05 executing program 0: r0 = perf_event_open(&(0x7f0000000300)={0x400000001, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) mmap(&(0x7f000094f000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f00000001c0), 0x100000073) read(r1, &(0x7f0000000200)=""/250, 0x50c7e3e3) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) 10:19:05 executing program 2: ioctl(0xffffffffffffffff, 0x0, 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000006c0)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) sendmsg$unix(r2, &(0x7f0000000940)={&(0x7f0000000700)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000780)=[{&(0x7f0000000b40)="92ccb06191e89d33a423cc73f347260cf8581fd569fedcfc94327909a99b496b43c6a87730902a47e48763d6815fb23f113475b1793560c58ac8bdc2c67267e6a276a80e47aac4eef6ed5ab12126ae7b33fe1d65f9bd3c912c45cf780e078642e7d26042c4d05d2813f209cf76cc", 0x6e}], 0x1, 0x0, 0x0, 0x4000}, 0x40) sched_setscheduler(r1, 0x5, &(0x7f0000000040)) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="55c4d2ffd38b0d51b15a9c3c16700893c1e31d2906b6a6f79778e1cebdf9068b02a9df9f9b2228c1a4cd4c9f52218a8777961267d5f157eb31cd8e6a4a828448b466cd963a7447655ec40fa2d4687785c21ba0c49a66b2b0465e0b9d353029086dcf88c6973e9e938692a5cbde2ddc12562a39c768a035efe8a25e05d5d56157370789c9564733570370da137cb76c7cb649e8"]) syz_mount_image$ntfs(0x0, &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r3 = shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_LOCK(r3, 0xb) r4 = syz_open_dev$vcsn(&(0x7f00000007c0)='/dev/vcs#\x00', 0x0, 0x400) ioctl$sock_inet_tcp_SIOCOUTQNSD(r4, 0x894b, 0x0) syz_read_part_table(0x7fffffff, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000580)={0x0, @in={{0x2, 0x0, @loopback}}, [0x97, 0x48a7, 0x0, 0x5, 0x0, 0x0, 0x0, 0xff, 0x0, 0x8340, 0x36, 0x0, 0x93d, 0x0, 0x1ff]}, 0x0) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f0000000680)={0x8000000000000000, 0x1}) creat(&(0x7f0000000100)='./file0\x00', 0x0) socket$key(0xf, 0x3, 0x2) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=""/198, 0xc6}, 0x0) 10:19:05 executing program 1: ioctl(0xffffffffffffffff, 0x0, 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000006c0)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) sendmsg$unix(r2, &(0x7f0000000940)={&(0x7f0000000700)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000780)=[{&(0x7f0000000b40)="92ccb06191e89d33a423cc73f347260cf8581fd569fedcfc94327909a99b496b43c6a87730902a47e48763d6815fb23f113475b1793560c58ac8bdc2c67267e6a276a80e47aac4eef6ed5ab12126ae7b33fe1d65f9bd3c912c45cf780e078642e7d26042c4d05d2813f209cf76cc", 0x6e}], 0x1, 0x0, 0x0, 0x4000}, 0x40) sched_setscheduler(r1, 0x5, &(0x7f0000000040)) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="55c4d2ffd38b0d51b15a9c3c16700893c1e31d2906b6a6f79778e1cebdf9068b02a9df9f9b2228c1a4cd4c9f52218a8777961267d5f157eb31cd8e6a4a828448b466cd963a7447655ec40fa2d4687785c21ba0c49a66b2b0465e0b9d353029086dcf88c6973e9e938692a5cbde2ddc12562a39c768a035efe8a25e05d5d56157370789c9564733570370da137cb76c7cb649e8"]) syz_mount_image$ntfs(0x0, &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r3 = shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_LOCK(r3, 0xb) r4 = syz_open_dev$vcsn(&(0x7f00000007c0)='/dev/vcs#\x00', 0x0, 0x400) ioctl$sock_inet_tcp_SIOCOUTQNSD(r4, 0x894b, 0x0) syz_read_part_table(0x7fffffff, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000580)={0x0, @in={{0x2, 0x0, @loopback}}, [0x97, 0x48a7, 0x0, 0x5, 0x0, 0x0, 0x0, 0xff, 0x0, 0x8340, 0x36, 0x0, 0x93d, 0x0, 0x1ff]}, 0x0) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f0000000680)={0x8000000000000000, 0x1}) creat(&(0x7f0000000100)='./file0\x00', 0x0) socket$key(0xf, 0x3, 0x2) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=""/198, 0xc6}, 0x0) 10:19:05 executing program 4: ioctl(0xffffffffffffffff, 0x0, 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000006c0)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) sendmsg$unix(r2, &(0x7f0000000940)={&(0x7f0000000700)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000780)=[{&(0x7f0000000b40)="92ccb06191e89d33a423cc73f347260cf8581fd569fedcfc94327909a99b496b43c6a87730902a47e48763d6815fb23f113475b1793560c58ac8bdc2c67267e6a276a80e47aac4eef6ed5ab12126ae7b33fe1d65f9bd3c912c45cf780e078642e7d26042c4d05d2813f209cf76cc", 0x6e}], 0x1, 0x0, 0x0, 0x4000}, 0x40) sched_setscheduler(r1, 0x5, &(0x7f0000000040)) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="55c4d2ffd38b0d51b15a9c3c16700893c1e31d2906b6a6f79778e1cebdf9068b02a9df9f9b2228c1a4cd4c9f52218a8777961267d5f157eb31cd8e6a4a828448b466cd963a7447655ec40fa2d4687785c21ba0c49a66b2b0465e0b9d353029086dcf88c6973e9e938692a5cbde2ddc12562a39c768a035efe8a25e05d5d56157370789c9564733570370da137cb76c7cb649e8"]) syz_mount_image$ntfs(0x0, &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r3 = shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_LOCK(r3, 0xb) r4 = syz_open_dev$vcsn(&(0x7f00000007c0)='/dev/vcs#\x00', 0x0, 0x400) ioctl$sock_inet_tcp_SIOCOUTQNSD(r4, 0x894b, 0x0) syz_read_part_table(0x7fffffff, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000580)={0x0, @in={{0x2, 0x0, @loopback}}, [0x97, 0x48a7, 0x0, 0x5, 0x0, 0x0, 0x0, 0xff, 0x0, 0x8340, 0x36, 0x0, 0x93d, 0x0, 0x1ff]}, 0x0) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f0000000680)={0x8000000000000000, 0x1}) creat(&(0x7f0000000100)='./file0\x00', 0x0) socket$key(0xf, 0x3, 0x2) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=""/198, 0xc6}, 0x0) [ 1668.752643] BFS-fs: bfs_fill_super(): loop3 is unclean, continuing 10:19:05 executing program 2: ioctl(0xffffffffffffffff, 0x0, 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000006c0)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) sendmsg$unix(r2, &(0x7f0000000940)={&(0x7f0000000700)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000780)=[{&(0x7f0000000b40)="92ccb06191e89d33a423cc73f347260cf8581fd569fedcfc94327909a99b496b43c6a87730902a47e48763d6815fb23f113475b1793560c58ac8bdc2c67267e6a276a80e47aac4eef6ed5ab12126ae7b33fe1d65f9bd3c912c45cf780e078642e7d26042c4d05d2813f209cf76cc", 0x6e}], 0x1, 0x0, 0x0, 0x4000}, 0x40) sched_setscheduler(r1, 0x5, &(0x7f0000000040)) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="55c4d2ffd38b0d51b15a9c3c16700893c1e31d2906b6a6f79778e1cebdf9068b02a9df9f9b2228c1a4cd4c9f52218a8777961267d5f157eb31cd8e6a4a828448b466cd963a7447655ec40fa2d4687785c21ba0c49a66b2b0465e0b9d353029086dcf88c6973e9e938692a5cbde2ddc12562a39c768a035efe8a25e05d5d56157370789c9564733570370da137cb76c7cb649e8"]) syz_mount_image$ntfs(0x0, &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r3 = shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_LOCK(r3, 0xb) r4 = syz_open_dev$vcsn(&(0x7f00000007c0)='/dev/vcs#\x00', 0x0, 0x400) ioctl$sock_inet_tcp_SIOCOUTQNSD(r4, 0x894b, 0x0) syz_read_part_table(0x7fffffff, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000580)={0x0, @in={{0x2, 0x0, @loopback}}, [0x97, 0x48a7, 0x0, 0x5, 0x0, 0x0, 0x0, 0xff, 0x0, 0x8340, 0x36, 0x0, 0x93d, 0x0, 0x1ff]}, 0x0) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f0000000680)={0x8000000000000000, 0x1}) creat(&(0x7f0000000100)='./file0\x00', 0x0) socket$key(0xf, 0x3, 0x2) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=""/198, 0xc6}, 0x0) 10:19:05 executing program 4: ioctl(0xffffffffffffffff, 0x0, 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000006c0)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) sendmsg$unix(r2, &(0x7f0000000940)={&(0x7f0000000700)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000780)=[{&(0x7f0000000b40)="92ccb06191e89d33a423cc73f347260cf8581fd569fedcfc94327909a99b496b43c6a87730902a47e48763d6815fb23f113475b1793560c58ac8bdc2c67267e6a276a80e47aac4eef6ed5ab12126ae7b33fe1d65f9bd3c912c45cf780e078642e7d26042c4d05d2813f209cf76cc", 0x6e}], 0x1, 0x0, 0x0, 0x4000}, 0x40) sched_setscheduler(r1, 0x5, &(0x7f0000000040)) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="55c4d2ffd38b0d51b15a9c3c16700893c1e31d2906b6a6f79778e1cebdf9068b02a9df9f9b2228c1a4cd4c9f52218a8777961267d5f157eb31cd8e6a4a828448b466cd963a7447655ec40fa2d4687785c21ba0c49a66b2b0465e0b9d353029086dcf88c6973e9e938692a5cbde2ddc12562a39c768a035efe8a25e05d5d56157370789c9564733570370da137cb76c7cb649e8"]) syz_mount_image$ntfs(0x0, &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r3 = shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_LOCK(r3, 0xb) r4 = syz_open_dev$vcsn(&(0x7f00000007c0)='/dev/vcs#\x00', 0x0, 0x400) ioctl$sock_inet_tcp_SIOCOUTQNSD(r4, 0x894b, 0x0) syz_read_part_table(0x7fffffff, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000580)={0x0, @in={{0x2, 0x0, @loopback}}, [0x97, 0x48a7, 0x0, 0x5, 0x0, 0x0, 0x0, 0xff, 0x0, 0x8340, 0x36, 0x0, 0x93d, 0x0, 0x1ff]}, 0x0) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f0000000680)={0x8000000000000000, 0x1}) creat(&(0x7f0000000100)='./file0\x00', 0x0) socket$key(0xf, 0x3, 0x2) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=""/198, 0xc6}, 0x0) 10:19:05 executing program 1: ioctl(0xffffffffffffffff, 0x0, 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000006c0)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) sendmsg$unix(r2, &(0x7f0000000940)={&(0x7f0000000700)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000780)=[{&(0x7f0000000b40)="92ccb06191e89d33a423cc73f347260cf8581fd569fedcfc94327909a99b496b43c6a87730902a47e48763d6815fb23f113475b1793560c58ac8bdc2c67267e6a276a80e47aac4eef6ed5ab12126ae7b33fe1d65f9bd3c912c45cf780e078642e7d26042c4d05d2813f209cf76cc", 0x6e}], 0x1, 0x0, 0x0, 0x4000}, 0x40) sched_setscheduler(r1, 0x5, &(0x7f0000000040)) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="55c4d2ffd38b0d51b15a9c3c16700893c1e31d2906b6a6f79778e1cebdf9068b02a9df9f9b2228c1a4cd4c9f52218a8777961267d5f157eb31cd8e6a4a828448b466cd963a7447655ec40fa2d4687785c21ba0c49a66b2b0465e0b9d353029086dcf88c6973e9e938692a5cbde2ddc12562a39c768a035efe8a25e05d5d56157370789c9564733570370da137cb76c7cb649e8"]) syz_mount_image$ntfs(0x0, &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r3 = shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_LOCK(r3, 0xb) r4 = syz_open_dev$vcsn(&(0x7f00000007c0)='/dev/vcs#\x00', 0x0, 0x400) ioctl$sock_inet_tcp_SIOCOUTQNSD(r4, 0x894b, 0x0) syz_read_part_table(0x7fffffff, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000580)={0x0, @in={{0x2, 0x0, @loopback}}, [0x97, 0x48a7, 0x0, 0x5, 0x0, 0x0, 0x0, 0xff, 0x0, 0x8340, 0x36, 0x0, 0x93d, 0x0, 0x1ff]}, 0x0) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f0000000680)={0x8000000000000000, 0x1}) creat(&(0x7f0000000100)='./file0\x00', 0x0) socket$key(0xf, 0x3, 0x2) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=""/198, 0xc6}, 0x0) 10:19:05 executing program 3: ioctl(0xffffffffffffffff, 0x0, 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000006c0)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) sendmsg$unix(r2, &(0x7f0000000940)={&(0x7f0000000700)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000780)=[{&(0x7f0000000b40)="92ccb06191e89d33a423cc73f347260cf8581fd569fedcfc94327909a99b496b43c6a87730902a47e48763d6815fb23f113475b1793560c58ac8bdc2c67267e6a276a80e47aac4eef6ed5ab12126ae7b33fe1d65f9bd3c912c45cf780e078642e7d26042c4d05d2813f209cf76cc", 0x6e}], 0x1, 0x0, 0x0, 0x4000}, 0x40) sched_setscheduler(r1, 0x5, &(0x7f0000000040)) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="55c4d2ffd38b0d51b15a9c3c16700893c1e31d2906b6a6f79778e1cebdf9068b02a9df9f9b2228c1a4cd4c9f52218a8777961267d5f157eb31cd8e6a4a828448b466cd963a7447655ec40fa2d4687785c21ba0c49a66b2b0465e0b9d353029086dcf88c6973e9e938692a5cbde2ddc12562a39c768a035efe8a25e05d5d56157370789c9564733570370da137cb76c7cb649e8"]) syz_mount_image$ntfs(0x0, &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r3 = shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_LOCK(r3, 0xb) r4 = syz_open_dev$vcsn(&(0x7f00000007c0)='/dev/vcs#\x00', 0x0, 0x400) ioctl$sock_inet_tcp_SIOCOUTQNSD(r4, 0x894b, 0x0) syz_read_part_table(0x7fffffff, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000580)={0x0, @in={{0x2, 0x0, @loopback}}, [0x97, 0x48a7, 0x0, 0x5, 0x0, 0x0, 0x0, 0xff, 0x0, 0x8340, 0x36, 0x0, 0x93d, 0x0, 0x1ff]}, 0x0) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f0000000680)={0x8000000000000000, 0x1}) creat(&(0x7f0000000100)='./file0\x00', 0x0) socket$key(0xf, 0x3, 0x2) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=""/198, 0xc6}, 0x0) [ 1669.038789] __loop_clr_fd: partition scan of loop5 failed (rc=-22) 10:19:05 executing program 5: ioctl(0xffffffffffffffff, 0x0, 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000006c0)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) sendmsg$unix(r2, &(0x7f0000000940)={&(0x7f0000000700)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000780)=[{&(0x7f0000000b40)="92ccb06191e89d33a423cc73f347260cf8581fd569fedcfc94327909a99b496b43c6a87730902a47e48763d6815fb23f113475b1793560c58ac8bdc2c67267e6a276a80e47aac4eef6ed5ab12126ae7b33fe1d65f9bd3c912c45cf780e078642e7d26042c4d05d2813f209cf76cc", 0x6e}], 0x1, 0x0, 0x0, 0x4000}, 0x40) sched_setscheduler(r1, 0x5, &(0x7f0000000040)) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="55c4d2ffd38b0d51b15a9c3c16700893c1e31d2906b6a6f79778e1cebdf9068b02a9df9f9b2228c1a4cd4c9f52218a8777961267d5f157eb31cd8e6a4a828448b466cd963a7447655ec40fa2d4687785c21ba0c49a66b2b0465e0b9d353029086dcf88c6973e9e938692a5cbde2ddc12562a39c768a035efe8a25e05d5d56157370789c9564733570370da137cb76c7cb649e8"]) syz_mount_image$ntfs(0x0, &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r3 = shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_LOCK(r3, 0xb) r4 = syz_open_dev$vcsn(&(0x7f00000007c0)='/dev/vcs#\x00', 0x0, 0x400) ioctl$sock_inet_tcp_SIOCOUTQNSD(r4, 0x894b, 0x0) syz_read_part_table(0x7fffffff, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000580)={0x0, @in={{0x2, 0x0, @loopback}}, [0x97, 0x48a7, 0x0, 0x5, 0x0, 0x0, 0x0, 0xff, 0x0, 0x8340, 0x36, 0x0, 0x93d, 0x0, 0x1ff]}, 0x0) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f0000000680)={0x8000000000000000, 0x1}) creat(&(0x7f0000000100)='./file0\x00', 0x0) socket$key(0xf, 0x3, 0x2) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=""/198, 0xc6}, 0x0) 10:19:06 executing program 1: ioctl(0xffffffffffffffff, 0x0, 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000006c0)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) sendmsg$unix(r2, &(0x7f0000000940)={&(0x7f0000000700)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000780)=[{&(0x7f0000000b40)="92ccb06191e89d33a423cc73f347260cf8581fd569fedcfc94327909a99b496b43c6a87730902a47e48763d6815fb23f113475b1793560c58ac8bdc2c67267e6a276a80e47aac4eef6ed5ab12126ae7b33fe1d65f9bd3c912c45cf780e078642e7d26042c4d05d2813f209cf76cc", 0x6e}], 0x1, 0x0, 0x0, 0x4000}, 0x40) sched_setscheduler(r1, 0x5, &(0x7f0000000040)) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="55c4d2ffd38b0d51b15a9c3c16700893c1e31d2906b6a6f79778e1cebdf9068b02a9df9f9b2228c1a4cd4c9f52218a8777961267d5f157eb31cd8e6a4a828448b466cd963a7447655ec40fa2d4687785c21ba0c49a66b2b0465e0b9d353029086dcf88c6973e9e938692a5cbde2ddc12562a39c768a035efe8a25e05d5d56157370789c9564733570370da137cb76c7cb649e8"]) syz_mount_image$ntfs(0x0, &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r3 = shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_LOCK(r3, 0xb) r4 = syz_open_dev$vcsn(&(0x7f00000007c0)='/dev/vcs#\x00', 0x0, 0x400) ioctl$sock_inet_tcp_SIOCOUTQNSD(r4, 0x894b, 0x0) syz_read_part_table(0x7fffffff, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000580)={0x0, @in={{0x2, 0x0, @loopback}}, [0x97, 0x48a7, 0x0, 0x5, 0x0, 0x0, 0x0, 0xff, 0x0, 0x8340, 0x36, 0x0, 0x93d, 0x0, 0x1ff]}, 0x0) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f0000000680)={0x8000000000000000, 0x1}) creat(&(0x7f0000000100)='./file0\x00', 0x0) socket$key(0xf, 0x3, 0x2) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=""/198, 0xc6}, 0x0) 10:19:06 executing program 2: ioctl(0xffffffffffffffff, 0x0, 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000006c0)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) sendmsg$unix(r2, &(0x7f0000000940)={&(0x7f0000000700)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000780)=[{&(0x7f0000000b40)="92ccb06191e89d33a423cc73f347260cf8581fd569fedcfc94327909a99b496b43c6a87730902a47e48763d6815fb23f113475b1793560c58ac8bdc2c67267e6a276a80e47aac4eef6ed5ab12126ae7b33fe1d65f9bd3c912c45cf780e078642e7d26042c4d05d2813f209cf76cc", 0x6e}], 0x1, 0x0, 0x0, 0x4000}, 0x40) sched_setscheduler(r1, 0x5, &(0x7f0000000040)) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="55c4d2ffd38b0d51b15a9c3c16700893c1e31d2906b6a6f79778e1cebdf9068b02a9df9f9b2228c1a4cd4c9f52218a8777961267d5f157eb31cd8e6a4a828448b466cd963a7447655ec40fa2d4687785c21ba0c49a66b2b0465e0b9d353029086dcf88c6973e9e938692a5cbde2ddc12562a39c768a035efe8a25e05d5d56157370789c9564733570370da137cb76c7cb649e8"]) syz_mount_image$ntfs(0x0, &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r3 = shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_LOCK(r3, 0xb) r4 = syz_open_dev$vcsn(&(0x7f00000007c0)='/dev/vcs#\x00', 0x0, 0x400) ioctl$sock_inet_tcp_SIOCOUTQNSD(r4, 0x894b, 0x0) syz_read_part_table(0x7fffffff, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000580)={0x0, @in={{0x2, 0x0, @loopback}}, [0x97, 0x48a7, 0x0, 0x5, 0x0, 0x0, 0x0, 0xff, 0x0, 0x8340, 0x36, 0x0, 0x93d, 0x0, 0x1ff]}, 0x0) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f0000000680)={0x8000000000000000, 0x1}) creat(&(0x7f0000000100)='./file0\x00', 0x0) socket$key(0xf, 0x3, 0x2) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=""/198, 0xc6}, 0x0) [ 1669.642298] BFS-fs: bfs_fill_super(): loop3 is unclean, continuing [ 1669.658238] BFS-fs: bfs_fill_super(): loop5 is unclean, continuing 10:19:06 executing program 4: ioctl(0xffffffffffffffff, 0x0, 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000006c0)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) sendmsg$unix(r2, &(0x7f0000000940)={&(0x7f0000000700)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000780)=[{&(0x7f0000000b40)="92ccb06191e89d33a423cc73f347260cf8581fd569fedcfc94327909a99b496b43c6a87730902a47e48763d6815fb23f113475b1793560c58ac8bdc2c67267e6a276a80e47aac4eef6ed5ab12126ae7b33fe1d65f9bd3c912c45cf780e078642e7d26042c4d05d2813f209cf76cc", 0x6e}], 0x1, 0x0, 0x0, 0x4000}, 0x40) sched_setscheduler(r1, 0x5, &(0x7f0000000040)) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="55c4d2ffd38b0d51b15a9c3c16700893c1e31d2906b6a6f79778e1cebdf9068b02a9df9f9b2228c1a4cd4c9f52218a8777961267d5f157eb31cd8e6a4a828448b466cd963a7447655ec40fa2d4687785c21ba0c49a66b2b0465e0b9d353029086dcf88c6973e9e938692a5cbde2ddc12562a39c768a035efe8a25e05d5d56157370789c9564733570370da137cb76c7cb649e8"]) syz_mount_image$ntfs(0x0, &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r3 = shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_LOCK(r3, 0xb) r4 = syz_open_dev$vcsn(&(0x7f00000007c0)='/dev/vcs#\x00', 0x0, 0x400) ioctl$sock_inet_tcp_SIOCOUTQNSD(r4, 0x894b, 0x0) syz_read_part_table(0x7fffffff, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000580)={0x0, @in={{0x2, 0x0, @loopback}}, [0x97, 0x48a7, 0x0, 0x5, 0x0, 0x0, 0x0, 0xff, 0x0, 0x8340, 0x36, 0x0, 0x93d, 0x0, 0x1ff]}, 0x0) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f0000000680)={0x8000000000000000, 0x1}) creat(&(0x7f0000000100)='./file0\x00', 0x0) socket$key(0xf, 0x3, 0x2) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=""/198, 0xc6}, 0x0) 10:19:06 executing program 1: ioctl(0xffffffffffffffff, 0x0, 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000006c0)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) sendmsg$unix(r2, &(0x7f0000000940)={&(0x7f0000000700)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000780)=[{&(0x7f0000000b40)="92ccb06191e89d33a423cc73f347260cf8581fd569fedcfc94327909a99b496b43c6a87730902a47e48763d6815fb23f113475b1793560c58ac8bdc2c67267e6a276a80e47aac4eef6ed5ab12126ae7b33fe1d65f9bd3c912c45cf780e078642e7d26042c4d05d2813f209cf76cc", 0x6e}], 0x1, 0x0, 0x0, 0x4000}, 0x40) sched_setscheduler(r1, 0x5, &(0x7f0000000040)) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="55c4d2ffd38b0d51b15a9c3c16700893c1e31d2906b6a6f79778e1cebdf9068b02a9df9f9b2228c1a4cd4c9f52218a8777961267d5f157eb31cd8e6a4a828448b466cd963a7447655ec40fa2d4687785c21ba0c49a66b2b0465e0b9d353029086dcf88c6973e9e938692a5cbde2ddc12562a39c768a035efe8a25e05d5d56157370789c9564733570370da137cb76c7cb649e8"]) syz_mount_image$ntfs(0x0, &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r3 = shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_LOCK(r3, 0xb) r4 = syz_open_dev$vcsn(&(0x7f00000007c0)='/dev/vcs#\x00', 0x0, 0x400) ioctl$sock_inet_tcp_SIOCOUTQNSD(r4, 0x894b, 0x0) syz_read_part_table(0x7fffffff, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000580)={0x0, @in={{0x2, 0x0, @loopback}}, [0x97, 0x48a7, 0x0, 0x5, 0x0, 0x0, 0x0, 0xff, 0x0, 0x8340, 0x36, 0x0, 0x93d, 0x0, 0x1ff]}, 0x0) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f0000000680)={0x8000000000000000, 0x1}) creat(&(0x7f0000000100)='./file0\x00', 0x0) socket$key(0xf, 0x3, 0x2) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=""/198, 0xc6}, 0x0) 10:19:06 executing program 2: ioctl(0xffffffffffffffff, 0x0, 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000006c0)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) sendmsg$unix(r2, &(0x7f0000000940)={&(0x7f0000000700)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000780)=[{&(0x7f0000000b40)="92ccb06191e89d33a423cc73f347260cf8581fd569fedcfc94327909a99b496b43c6a87730902a47e48763d6815fb23f113475b1793560c58ac8bdc2c67267e6a276a80e47aac4eef6ed5ab12126ae7b33fe1d65f9bd3c912c45cf780e078642e7d26042c4d05d2813f209cf76cc", 0x6e}], 0x1, 0x0, 0x0, 0x4000}, 0x40) sched_setscheduler(r1, 0x5, &(0x7f0000000040)) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="55c4d2ffd38b0d51b15a9c3c16700893c1e31d2906b6a6f79778e1cebdf9068b02a9df9f9b2228c1a4cd4c9f52218a8777961267d5f157eb31cd8e6a4a828448b466cd963a7447655ec40fa2d4687785c21ba0c49a66b2b0465e0b9d353029086dcf88c6973e9e938692a5cbde2ddc12562a39c768a035efe8a25e05d5d56157370789c9564733570370da137cb76c7cb649e8"]) syz_mount_image$ntfs(0x0, &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r3 = shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_LOCK(r3, 0xb) r4 = syz_open_dev$vcsn(&(0x7f00000007c0)='/dev/vcs#\x00', 0x0, 0x400) ioctl$sock_inet_tcp_SIOCOUTQNSD(r4, 0x894b, 0x0) syz_read_part_table(0x7fffffff, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000580)={0x0, @in={{0x2, 0x0, @loopback}}, [0x97, 0x48a7, 0x0, 0x5, 0x0, 0x0, 0x0, 0xff, 0x0, 0x8340, 0x36, 0x0, 0x93d, 0x0, 0x1ff]}, 0x0) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f0000000680)={0x8000000000000000, 0x1}) creat(&(0x7f0000000100)='./file0\x00', 0x0) socket$key(0xf, 0x3, 0x2) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=""/198, 0xc6}, 0x0) 10:19:06 executing program 0: ioctl(0xffffffffffffffff, 0x0, 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000006c0)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) sendmsg$unix(r2, &(0x7f0000000940)={&(0x7f0000000700)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000780)=[{&(0x7f0000000b40)="92ccb06191e89d33a423cc73f347260cf8581fd569fedcfc94327909a99b496b43c6a87730902a47e48763d6815fb23f113475b1793560c58ac8bdc2c67267e6a276a80e47aac4eef6ed5ab12126ae7b33fe1d65f9bd3c912c45cf780e078642e7d26042c4d05d2813f209cf76cc", 0x6e}], 0x1, 0x0, 0x0, 0x4000}, 0x40) sched_setscheduler(r1, 0x5, &(0x7f0000000040)) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="55c4d2ffd38b0d51b15a9c3c16700893c1e31d2906b6a6f79778e1cebdf9068b02a9df9f9b2228c1a4cd4c9f52218a8777961267d5f157eb31cd8e6a4a828448b466cd963a7447655ec40fa2d4687785c21ba0c49a66b2b0465e0b9d353029086dcf88c6973e9e938692a5cbde2ddc12562a39c768a035efe8a25e05d5d56157370789c9564733570370da137cb76c7cb649e8"]) syz_mount_image$ntfs(0x0, &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r3 = shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_LOCK(r3, 0xb) r4 = syz_open_dev$vcsn(&(0x7f00000007c0)='/dev/vcs#\x00', 0x0, 0x400) ioctl$sock_inet_tcp_SIOCOUTQNSD(r4, 0x894b, 0x0) syz_read_part_table(0x7fffffff, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000580)={0x0, @in={{0x2, 0x0, @loopback}}, [0x97, 0x48a7, 0x0, 0x5, 0x0, 0x0, 0x0, 0xff, 0x0, 0x8340, 0x36, 0x0, 0x93d, 0x0, 0x1ff]}, 0x0) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f0000000680)={0x8000000000000000, 0x1}) creat(&(0x7f0000000100)='./file0\x00', 0x0) socket$key(0xf, 0x3, 0x2) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=""/198, 0xc6}, 0x0) 10:19:07 executing program 3: ioctl(0xffffffffffffffff, 0x0, 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000006c0)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) sendmsg$unix(r2, &(0x7f0000000940)={&(0x7f0000000700)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000780)=[{&(0x7f0000000b40)="92ccb06191e89d33a423cc73f347260cf8581fd569fedcfc94327909a99b496b43c6a87730902a47e48763d6815fb23f113475b1793560c58ac8bdc2c67267e6a276a80e47aac4eef6ed5ab12126ae7b33fe1d65f9bd3c912c45cf780e078642e7d26042c4d05d2813f209cf76cc", 0x6e}], 0x1, 0x0, 0x0, 0x4000}, 0x40) sched_setscheduler(r1, 0x5, &(0x7f0000000040)) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="55c4d2ffd38b0d51b15a9c3c16700893c1e31d2906b6a6f79778e1cebdf9068b02a9df9f9b2228c1a4cd4c9f52218a8777961267d5f157eb31cd8e6a4a828448b466cd963a7447655ec40fa2d4687785c21ba0c49a66b2b0465e0b9d353029086dcf88c6973e9e938692a5cbde2ddc12562a39c768a035efe8a25e05d5d56157370789c9564733570370da137cb76c7cb649e8"]) syz_mount_image$ntfs(0x0, &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r3 = shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_LOCK(r3, 0xb) r4 = syz_open_dev$vcsn(&(0x7f00000007c0)='/dev/vcs#\x00', 0x0, 0x400) ioctl$sock_inet_tcp_SIOCOUTQNSD(r4, 0x894b, 0x0) syz_read_part_table(0x7fffffff, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000580)={0x0, @in={{0x2, 0x0, @loopback}}, [0x97, 0x48a7, 0x0, 0x5, 0x0, 0x0, 0x0, 0xff, 0x0, 0x8340, 0x36, 0x0, 0x93d, 0x0, 0x1ff]}, 0x0) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f0000000680)={0x8000000000000000, 0x1}) creat(&(0x7f0000000100)='./file0\x00', 0x0) socket$key(0xf, 0x3, 0x2) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=""/198, 0xc6}, 0x0) 10:19:07 executing program 2: ioctl(0xffffffffffffffff, 0x0, 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000006c0)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) sendmsg$unix(r2, &(0x7f0000000940)={&(0x7f0000000700)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000780)=[{&(0x7f0000000b40)="92ccb06191e89d33a423cc73f347260cf8581fd569fedcfc94327909a99b496b43c6a87730902a47e48763d6815fb23f113475b1793560c58ac8bdc2c67267e6a276a80e47aac4eef6ed5ab12126ae7b33fe1d65f9bd3c912c45cf780e078642e7d26042c4d05d2813f209cf76cc", 0x6e}], 0x1, 0x0, 0x0, 0x4000}, 0x40) sched_setscheduler(r1, 0x5, &(0x7f0000000040)) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="55c4d2ffd38b0d51b15a9c3c16700893c1e31d2906b6a6f79778e1cebdf9068b02a9df9f9b2228c1a4cd4c9f52218a8777961267d5f157eb31cd8e6a4a828448b466cd963a7447655ec40fa2d4687785c21ba0c49a66b2b0465e0b9d353029086dcf88c6973e9e938692a5cbde2ddc12562a39c768a035efe8a25e05d5d56157370789c9564733570370da137cb76c7cb649e8"]) syz_mount_image$ntfs(0x0, &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r3 = shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_LOCK(r3, 0xb) r4 = syz_open_dev$vcsn(&(0x7f00000007c0)='/dev/vcs#\x00', 0x0, 0x400) ioctl$sock_inet_tcp_SIOCOUTQNSD(r4, 0x894b, 0x0) syz_read_part_table(0x7fffffff, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000580)={0x0, @in={{0x2, 0x0, @loopback}}, [0x97, 0x48a7, 0x0, 0x5, 0x0, 0x0, 0x0, 0xff, 0x0, 0x8340, 0x36, 0x0, 0x93d, 0x0, 0x1ff]}, 0x0) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f0000000680)={0x8000000000000000, 0x1}) creat(&(0x7f0000000100)='./file0\x00', 0x0) socket$key(0xf, 0x3, 0x2) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=""/198, 0xc6}, 0x0) 10:19:07 executing program 1: ioctl(0xffffffffffffffff, 0x0, 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000006c0)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) sendmsg$unix(r2, &(0x7f0000000940)={&(0x7f0000000700)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000780)=[{&(0x7f0000000b40)="92ccb06191e89d33a423cc73f347260cf8581fd569fedcfc94327909a99b496b43c6a87730902a47e48763d6815fb23f113475b1793560c58ac8bdc2c67267e6a276a80e47aac4eef6ed5ab12126ae7b33fe1d65f9bd3c912c45cf780e078642e7d26042c4d05d2813f209cf76cc", 0x6e}], 0x1, 0x0, 0x0, 0x4000}, 0x40) sched_setscheduler(r1, 0x5, &(0x7f0000000040)) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="55c4d2ffd38b0d51b15a9c3c16700893c1e31d2906b6a6f79778e1cebdf9068b02a9df9f9b2228c1a4cd4c9f52218a8777961267d5f157eb31cd8e6a4a828448b466cd963a7447655ec40fa2d4687785c21ba0c49a66b2b0465e0b9d353029086dcf88c6973e9e938692a5cbde2ddc12562a39c768a035efe8a25e05d5d56157370789c9564733570370da137cb76c7cb649e8"]) syz_mount_image$ntfs(0x0, &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r3 = shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_LOCK(r3, 0xb) r4 = syz_open_dev$vcsn(&(0x7f00000007c0)='/dev/vcs#\x00', 0x0, 0x400) ioctl$sock_inet_tcp_SIOCOUTQNSD(r4, 0x894b, 0x0) syz_read_part_table(0x7fffffff, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000580)={0x0, @in={{0x2, 0x0, @loopback}}, [0x97, 0x48a7, 0x0, 0x5, 0x0, 0x0, 0x0, 0xff, 0x0, 0x8340, 0x36, 0x0, 0x93d, 0x0, 0x1ff]}, 0x0) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f0000000680)={0x8000000000000000, 0x1}) creat(&(0x7f0000000100)='./file0\x00', 0x0) socket$key(0xf, 0x3, 0x2) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=""/198, 0xc6}, 0x0) 10:19:07 executing program 5: ioctl(0xffffffffffffffff, 0x0, 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000006c0)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) sendmsg$unix(r2, &(0x7f0000000940)={&(0x7f0000000700)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000780)=[{&(0x7f0000000b40)="92ccb06191e89d33a423cc73f347260cf8581fd569fedcfc94327909a99b496b43c6a87730902a47e48763d6815fb23f113475b1793560c58ac8bdc2c67267e6a276a80e47aac4eef6ed5ab12126ae7b33fe1d65f9bd3c912c45cf780e078642e7d26042c4d05d2813f209cf76cc", 0x6e}], 0x1, 0x0, 0x0, 0x4000}, 0x40) sched_setscheduler(r1, 0x5, &(0x7f0000000040)) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="55c4d2ffd38b0d51b15a9c3c16700893c1e31d2906b6a6f79778e1cebdf9068b02a9df9f9b2228c1a4cd4c9f52218a8777961267d5f157eb31cd8e6a4a828448b466cd963a7447655ec40fa2d4687785c21ba0c49a66b2b0465e0b9d353029086dcf88c6973e9e938692a5cbde2ddc12562a39c768a035efe8a25e05d5d56157370789c9564733570370da137cb76c7cb649e8"]) syz_mount_image$ntfs(0x0, &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r3 = shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_LOCK(r3, 0xb) r4 = syz_open_dev$vcsn(&(0x7f00000007c0)='/dev/vcs#\x00', 0x0, 0x400) ioctl$sock_inet_tcp_SIOCOUTQNSD(r4, 0x894b, 0x0) syz_read_part_table(0x7fffffff, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000580)={0x0, @in={{0x2, 0x0, @loopback}}, [0x97, 0x48a7, 0x0, 0x5, 0x0, 0x0, 0x0, 0xff, 0x0, 0x8340, 0x36, 0x0, 0x93d, 0x0, 0x1ff]}, 0x0) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f0000000680)={0x8000000000000000, 0x1}) creat(&(0x7f0000000100)='./file0\x00', 0x0) socket$key(0xf, 0x3, 0x2) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=""/198, 0xc6}, 0x0) 10:19:07 executing program 4: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000001240)="24000000000707031dfffd946fa2830020200a0009000100001d85680c1baba20400ff7e", 0x24}], 0x1}, 0x0) 10:19:07 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x7fffffdd, 0x0) ioctl$VIDIOC_S_TUNER(r0, 0x4054561e, &(0x7f0000000080)={0x0, "406ad0ded68b2958ce0a46e7aa375e5cbd17751453d80076a50fe475b2524fd9"}) 10:19:07 executing program 4: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000001240)="24000000000707031dfffd946fa2830020200a0009000100001d85680c1baba20400ff7e", 0x24}], 0x1}, 0x0) 10:19:07 executing program 1: ioctl(0xffffffffffffffff, 0x0, 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000006c0)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) sendmsg$unix(r2, &(0x7f0000000940)={&(0x7f0000000700)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000780)=[{&(0x7f0000000b40)="92ccb06191e89d33a423cc73f347260cf8581fd569fedcfc94327909a99b496b43c6a87730902a47e48763d6815fb23f113475b1793560c58ac8bdc2c67267e6a276a80e47aac4eef6ed5ab12126ae7b33fe1d65f9bd3c912c45cf780e078642e7d26042c4d05d2813f209cf76cc", 0x6e}], 0x1, 0x0, 0x0, 0x4000}, 0x40) sched_setscheduler(r1, 0x5, &(0x7f0000000040)) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="55c4d2ffd38b0d51b15a9c3c16700893c1e31d2906b6a6f79778e1cebdf9068b02a9df9f9b2228c1a4cd4c9f52218a8777961267d5f157eb31cd8e6a4a828448b466cd963a7447655ec40fa2d4687785c21ba0c49a66b2b0465e0b9d353029086dcf88c6973e9e938692a5cbde2ddc12562a39c768a035efe8a25e05d5d56157370789c9564733570370da137cb76c7cb649e8"]) syz_mount_image$ntfs(0x0, &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r3 = shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_LOCK(r3, 0xb) r4 = syz_open_dev$vcsn(&(0x7f00000007c0)='/dev/vcs#\x00', 0x0, 0x400) ioctl$sock_inet_tcp_SIOCOUTQNSD(r4, 0x894b, 0x0) syz_read_part_table(0x7fffffff, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000580)={0x0, @in={{0x2, 0x0, @loopback}}, [0x97, 0x48a7, 0x0, 0x5, 0x0, 0x0, 0x0, 0xff, 0x0, 0x8340, 0x36, 0x0, 0x93d, 0x0, 0x1ff]}, 0x0) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f0000000680)={0x8000000000000000, 0x1}) creat(&(0x7f0000000100)='./file0\x00', 0x0) socket$key(0xf, 0x3, 0x2) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=""/198, 0xc6}, 0x0) 10:19:07 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x104a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(des3_ede)\x00'}, 0x58) r1 = accept4(r0, 0x0, &(0x7f00000005c0)=0x1000000d6, 0x10000080800) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c90c200", 0x18) sendto$unix(r1, &(0x7f0000000140), 0x14ded905162a6a4b, 0x0, 0x0, 0x429) recvmmsg(r1, &(0x7f0000000040)=[{{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000003c0)=""/255, 0xff}], 0x1}}], 0x1, 0x0, 0x0) recvfrom(r1, &(0x7f0000001240)=""/4096, 0xffffff7e, 0x0, 0x0, 0x0) [ 1670.655476] BFS-fs: bfs_fill_super(): loop3 is unclean, continuing [ 1670.780137] __loop_clr_fd: partition scan of loop0 failed (rc=-22) 10:19:07 executing program 4: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000001240)="24000000000707031dfffd946fa2830020200a0009000100001d85680c1baba20400ff7e", 0x24}], 0x1}, 0x0) [ 1670.864704] BFS-fs: bfs_fill_super(): loop5 is unclean, continuing 10:19:07 executing program 0: ioctl(0xffffffffffffffff, 0x0, 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000006c0)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) sendmsg$unix(r2, &(0x7f0000000940)={&(0x7f0000000700)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000780)=[{&(0x7f0000000b40)="92ccb06191e89d33a423cc73f347260cf8581fd569fedcfc94327909a99b496b43c6a87730902a47e48763d6815fb23f113475b1793560c58ac8bdc2c67267e6a276a80e47aac4eef6ed5ab12126ae7b33fe1d65f9bd3c912c45cf780e078642e7d26042c4d05d2813f209cf76cc", 0x6e}], 0x1, 0x0, 0x0, 0x4000}, 0x40) sched_setscheduler(r1, 0x5, &(0x7f0000000040)) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="55c4d2ffd38b0d51b15a9c3c16700893c1e31d2906b6a6f79778e1cebdf9068b02a9df9f9b2228c1a4cd4c9f52218a8777961267d5f157eb31cd8e6a4a828448b466cd963a7447655ec40fa2d4687785c21ba0c49a66b2b0465e0b9d353029086dcf88c6973e9e938692a5cbde2ddc12562a39c768a035efe8a25e05d5d56157370789c9564733570370da137cb76c7cb649e8"]) syz_mount_image$ntfs(0x0, &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r3 = shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_LOCK(r3, 0xb) r4 = syz_open_dev$vcsn(&(0x7f00000007c0)='/dev/vcs#\x00', 0x0, 0x400) ioctl$sock_inet_tcp_SIOCOUTQNSD(r4, 0x894b, 0x0) syz_read_part_table(0x7fffffff, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000580)={0x0, @in={{0x2, 0x0, @loopback}}, [0x97, 0x48a7, 0x0, 0x5, 0x0, 0x0, 0x0, 0xff, 0x0, 0x8340, 0x36, 0x0, 0x93d, 0x0, 0x1ff]}, 0x0) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f0000000680)={0x8000000000000000, 0x1}) creat(&(0x7f0000000100)='./file0\x00', 0x0) socket$key(0xf, 0x3, 0x2) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=""/198, 0xc6}, 0x0) 10:19:07 executing program 3: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) symlink(&(0x7f0000000500)='./file0/f.le.\x00', &(0x7f0000000140)='.//ile0\x00') mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000280)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) execveat(r0, &(0x7f0000000180)='.//ile0/file0\x00', 0x0, 0x0, 0x0) 10:19:07 executing program 4: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000001240)="24000000000707031dfffd946fa2830020200a0009000100001d85680c1baba20400ff7e", 0x24}], 0x1}, 0x0) 10:19:08 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x800000000, 0xffffffffffffffff) fcntl$notify(r1, 0x402, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup(0xffffffffffffffff) sysinfo(&(0x7f0000000500)=""/94) fsetxattr$trusted_overlay_opaque(r1, &(0x7f0000000340)='trusted.overlay.opaque\x00', &(0x7f0000000180)='y\x00', 0xffffffffffffff32, 0x3) ioctl$sock_FIOGETOWN(r2, 0x8903, &(0x7f0000000780)) rt_sigprocmask(0x1, &(0x7f0000000700)={0x9}, &(0x7f0000000740), 0x8) syz_read_part_table(0xfffffffffffffffe, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="000000000000000000000000000000000000000000000000e0e51532000000000200880126000100000064000000000127008e030c00650000006400000000030d00f0043100c900000064000000000432000520", 0x54, 0x1a0}]) [ 1671.262277] [ 1671.263935] ====================================================== [ 1671.270251] WARNING: possible circular locking dependency detected [ 1671.276571] 5.0.0+ #10 Not tainted [ 1671.280098] ------------------------------------------------------ [ 1671.286406] syz-executor.3/8587 is trying to acquire lock: [ 1671.292018] 00000000c1439488 (&ovl_i_mutex_dir_key[depth]){++++}, at: lookup_slow+0x4a/0x80 [ 1671.300550] [ 1671.300550] but task is already holding lock: [ 1671.306520] 00000000ff70cf23 (&sig->cred_guard_mutex){+.+.}, at: __do_execve_file.isra.0+0x376/0x23f0 [ 1671.315891] [ 1671.315891] which lock already depends on the new lock. [ 1671.315891] [ 1671.324297] [ 1671.324297] the existing dependency chain (in reverse order) is: [ 1671.331903] [ 1671.331903] -> #3 (&sig->cred_guard_mutex){+.+.}: [ 1671.338220] lock_acquire+0x16f/0x3f0 [ 1671.342520] __mutex_lock+0xf7/0x1310 [ 1671.346833] mutex_lock_killable_nested+0x16/0x20 [ 1671.352221] lock_trace+0x4a/0xe0 [ 1671.356175] proc_pid_stack+0x13e/0x2c0 [ 1671.360657] proc_single_show+0xf6/0x170 [ 1671.365218] seq_read+0x4db/0x1130 [ 1671.369263] do_iter_read+0x4a9/0x660 [ 1671.373577] vfs_readv+0xf0/0x160 [ 1671.377581] do_preadv+0x1c4/0x280 [ 1671.381620] __x64_sys_preadv+0x9a/0xf0 [ 1671.386095] do_syscall_64+0x103/0x610 [ 1671.390480] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1671.396162] [ 1671.396162] -> #2 (&p->lock){+.+.}: [ 1671.401268] lock_acquire+0x16f/0x3f0 [ 1671.405741] __mutex_lock+0xf7/0x1310 [ 1671.410052] mutex_lock_nested+0x16/0x20 [ 1671.414621] seq_read+0x71/0x1130 [ 1671.418584] do_iter_read+0x4a9/0x660 [ 1671.422881] vfs_readv+0xf0/0x160 [ 1671.426882] default_file_splice_read+0x475/0x890 [ 1671.432246] do_splice_to+0x12a/0x190 [ 1671.436552] splice_direct_to_actor+0x2d2/0x970 [ 1671.441734] do_splice_direct+0x1da/0x2a0 [ 1671.446393] do_sendfile+0x597/0xd00 [ 1671.450613] __x64_sys_sendfile64+0x1dd/0x220 [ 1671.455609] do_syscall_64+0x103/0x610 [ 1671.460006] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1671.465686] [ 1671.465686] -> #1 (sb_writers#4){.+.+}: [ 1671.471126] lock_acquire+0x16f/0x3f0 [ 1671.475439] __sb_start_write+0x20b/0x360 [ 1671.480091] mnt_want_write+0x3f/0xc0 [ 1671.484439] ovl_want_write+0x76/0xa0 [ 1671.488745] ovl_do_remove+0xe9/0xd70 [ 1671.493049] ovl_rmdir+0x1b/0x20 [ 1671.496943] vfs_rmdir+0x19c/0x470 [ 1671.501002] do_rmdir+0x39e/0x420 [ 1671.504977] __x64_sys_rmdir+0x36/0x40 [ 1671.509370] do_syscall_64+0x103/0x610 [ 1671.513754] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1671.519433] [ 1671.519433] -> #0 (&ovl_i_mutex_dir_key[depth]){++++}: [ 1671.526169] __lock_acquire+0x239c/0x3fb0 [ 1671.530826] lock_acquire+0x16f/0x3f0 [ 1671.535135] down_read+0x3b/0x90 [ 1671.539005] lookup_slow+0x4a/0x80 [ 1671.543063] walk_component+0x74b/0x2000 [ 1671.547629] link_path_walk.part.0+0x980/0x1340 [ 1671.552821] path_openat+0x202/0x46e0 [ 1671.557136] do_filp_open+0x1a1/0x280 [ 1671.561474] do_open_execat+0x137/0x690 [ 1671.565957] __do_execve_file.isra.0+0x178d/0x23f0 [ 1671.571393] __x64_sys_execveat+0xed/0x130 [ 1671.576135] do_syscall_64+0x103/0x610 [ 1671.580543] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1671.586242] [ 1671.586242] other info that might help us debug this: [ 1671.586242] [ 1671.594375] Chain exists of: [ 1671.594375] &ovl_i_mutex_dir_key[depth] --> &p->lock --> &sig->cred_guard_mutex [ 1671.594375] [ 1671.606339] Possible unsafe locking scenario: [ 1671.606339] [ 1671.612383] CPU0 CPU1 [ 1671.617027] ---- ---- [ 1671.621687] lock(&sig->cred_guard_mutex); [ 1671.625988] lock(&p->lock); [ 1671.631601] lock(&sig->cred_guard_mutex); [ 1671.638436] lock(&ovl_i_mutex_dir_key[depth]); [ 1671.643189] [ 1671.643189] *** DEADLOCK *** [ 1671.643189] [ 1671.649223] 1 lock held by syz-executor.3/8587: [ 1671.653860] #0: 00000000ff70cf23 (&sig->cred_guard_mutex){+.+.}, at: __do_execve_file.isra.0+0x376/0x23f0 [ 1671.663664] [ 1671.663664] stack backtrace: [ 1671.668171] CPU: 1 PID: 8587 Comm: syz-executor.3 Not tainted 5.0.0+ #10 [ 1671.675015] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1671.684356] Call Trace: [ 1671.686926] dump_stack+0x172/0x1f0 [ 1671.690579] print_circular_bug.isra.0.cold+0x1cc/0x28f [ 1671.695947] check_prev_add.constprop.0+0xf11/0x23c0 [ 1671.701058] ? check_usage+0x570/0x570 [ 1671.704929] ? lock_downgrade+0x880/0x880 [ 1671.709059] ? is_dynamic_key+0x1c0/0x1c0 [ 1671.713195] ? __lockdep_reset_lock+0x450/0x450 [ 1671.717880] ? lockref_get_not_dead+0x70/0x90 [ 1671.722358] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1671.727890] ? find_first_zero_bit+0x9a/0xc0 [ 1671.732278] __lock_acquire+0x239c/0x3fb0 [ 1671.736424] ? unlazy_walk+0x1b6/0x560 [ 1671.740314] ? mark_held_locks+0xf0/0xf0 [ 1671.745051] ? kasan_check_read+0x11/0x20 [ 1671.749179] lock_acquire+0x16f/0x3f0 [ 1671.752992] ? lookup_slow+0x4a/0x80 [ 1671.756699] down_read+0x3b/0x90 [ 1671.760047] ? lookup_slow+0x4a/0x80 [ 1671.763743] lookup_slow+0x4a/0x80 [ 1671.767268] walk_component+0x74b/0x2000 [ 1671.771320] ? selinux_capable+0x40/0x40 [ 1671.775362] ? path_init+0x18f0/0x18f0 [ 1671.779245] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1671.784764] ? security_inode_permission+0xd5/0x110 [ 1671.789762] ? inode_permission+0xb4/0x570 [ 1671.793995] link_path_walk.part.0+0x980/0x1340 [ 1671.798654] ? walk_component+0x2000/0x2000 [ 1671.802956] path_openat+0x202/0x46e0 [ 1671.806739] ? save_stack+0x45/0xd0 [ 1671.810388] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1671.815501] ? kasan_kmalloc+0x9/0x10 [ 1671.819277] ? __kmalloc_track_caller+0x158/0x740 [ 1671.824145] ? kmemdup+0x27/0x60 [ 1671.827494] ? security_prepare_creds+0x7d/0xc0 [ 1671.832194] ? prepare_creds+0x2f5/0x3c0 [ 1671.836236] ? prepare_exec_creds+0x12/0xf0 [ 1671.840560] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 1671.845223] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1671.850565] ? __lock_acquire+0x548/0x3fb0 [ 1671.854775] ? save_stack+0xa9/0xd0 [ 1671.858376] ? save_stack+0x45/0xd0 [ 1671.861980] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1671.867073] ? kasan_slab_alloc+0xf/0x20 [ 1671.871144] ? kmem_cache_alloc+0x11a/0x6f0 [ 1671.875452] ? prepare_creds+0x3e/0x3c0 [ 1671.879418] do_filp_open+0x1a1/0x280 [ 1671.883206] ? may_open_dev+0x100/0x100 [ 1671.887171] ? __lock_acquire+0x548/0x3fb0 [ 1671.891383] do_open_execat+0x137/0x690 [ 1671.895350] ? unregister_binfmt+0x170/0x170 [ 1671.899756] ? lock_downgrade+0x880/0x880 [ 1671.903880] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1671.909391] ? kasan_check_read+0x11/0x20 [ 1671.913521] ? do_raw_spin_unlock+0x57/0x270 [ 1671.917926] __do_execve_file.isra.0+0x178d/0x23f0 [ 1671.922842] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1671.928357] ? copy_strings_kernel+0x110/0x110 [ 1671.933003] ? strncpy_from_user+0x2a8/0x380 [ 1671.937669] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1671.943198] __x64_sys_execveat+0xed/0x130 [ 1671.947419] do_syscall_64+0x103/0x610 [ 1671.951289] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1671.956491] RIP: 0033:0x457f29 [ 1671.959665] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1671.978544] RSP: 002b:00007f151ffa9c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1671.986228] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 0000000000457f29 [ 1671.993474] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000003 [ 1672.000734] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1672.007983] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f151ffaa6d4 10:19:08 executing program 4: r0 = syz_open_dev$dri(&(0x7f0000000200)='/dev/dri/card#\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(r0, 0x4020565b, 0x0) 10:19:08 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x104a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(des3_ede)\x00'}, 0x58) r1 = accept4(r0, 0x0, &(0x7f00000005c0)=0x1000000d6, 0x10000080800) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c90c200", 0x18) sendto$unix(r1, &(0x7f0000000140), 0x14ded905162a6a4b, 0x0, 0x0, 0x429) recvmmsg(r1, &(0x7f0000000040)=[{{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000003c0)=""/255, 0xff}], 0x1}}], 0x1, 0x0, 0x0) recvfrom(r1, &(0x7f0000001240)=""/4096, 0xffffff7e, 0x0, 0x0, 0x0) 10:19:08 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x104a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(des3_ede)\x00'}, 0x58) r1 = accept4(r0, 0x0, &(0x7f00000005c0)=0x1000000d6, 0x10000080800) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c90c200", 0x18) sendto$unix(r1, &(0x7f0000000140), 0x14ded905162a6a4b, 0x0, 0x0, 0x429) recvmmsg(r1, &(0x7f0000000040)=[{{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000003c0)=""/255, 0xff}], 0x1}}], 0x1, 0x0, 0x0) recvfrom(r1, &(0x7f0000001240)=""/4096, 0xffffff7e, 0x0, 0x0, 0x0) [ 1672.015228] R13: 00000000004be51a R14: 00000000004cee18 R15: 00000000ffffffff [ 1672.027337] kobject: 'loop5' (000000001419f111): kobject_uevent_env [ 1672.033958] kobject: 'loop5' (000000001419f111): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 1672.038899] kobject: 'rx-0' (000000007aa8d1c4): kobject_cleanup, parent 00000000924ea8bc [ 1672.073644] kobject: 'rx-0' (000000007aa8d1c4): auto cleanup 'remove' event [ 1672.077980] kobject: 'loop0' (00000000f9279d8b): kobject_uevent_env [ 1672.082953] kobject: 'rx-0' (000000007aa8d1c4): kobject_uevent_env [ 1672.098384] overlayfs: filesystem on './file0' not supported as upperdir 10:19:08 executing program 3: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) symlink(&(0x7f0000000500)='./file0/f.le.\x00', &(0x7f0000000140)='.//ile0\x00') mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000280)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) execveat(r0, &(0x7f0000000180)='.//ile0/file0\x00', 0x0, 0x0, 0x0) 10:19:08 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x104a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(des3_ede)\x00'}, 0x58) r1 = accept4(r0, 0x0, &(0x7f00000005c0)=0x1000000d6, 0x10000080800) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c90c200", 0x18) sendto$unix(r1, &(0x7f0000000140), 0x14ded905162a6a4b, 0x0, 0x0, 0x429) recvmmsg(r1, &(0x7f0000000040)=[{{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000003c0)=""/255, 0xff}], 0x1}}], 0x1, 0x0, 0x0) recvfrom(r1, &(0x7f0000001240)=""/4096, 0xffffff7e, 0x0, 0x0, 0x0) [ 1672.114635] kobject: 'rx-0' (000000007aa8d1c4): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1672.131918] kobject: 'loop0' (00000000f9279d8b): fill_kobj_path: path = '/devices/virtual/block/loop0' 10:19:08 executing program 4: r0 = syz_open_dev$dri(&(0x7f0000000200)='/dev/dri/card#\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(r0, 0x4020565b, 0x0) 10:19:08 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x104a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(des3_ede)\x00'}, 0x58) r1 = accept4(r0, 0x0, &(0x7f00000005c0)=0x1000000d6, 0x10000080800) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c90c200", 0x18) sendto$unix(r1, &(0x7f0000000140), 0x14ded905162a6a4b, 0x0, 0x0, 0x429) recvmmsg(r1, &(0x7f0000000040)=[{{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000003c0)=""/255, 0xff}], 0x1}}], 0x1, 0x0, 0x0) recvfrom(r1, &(0x7f0000001240)=""/4096, 0xffffff7e, 0x0, 0x0, 0x0) [ 1672.175502] kobject: 'rx-0' (000000007aa8d1c4): auto cleanup kobject_del [ 1672.211922] kobject: 'rx-0' (000000007aa8d1c4): calling ktype release 10:19:09 executing program 0: ioctl(0xffffffffffffffff, 0x0, 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000006c0)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) sendmsg$unix(r2, &(0x7f0000000940)={&(0x7f0000000700)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000780)=[{&(0x7f0000000b40)="92ccb06191e89d33a423cc73f347260cf8581fd569fedcfc94327909a99b496b43c6a87730902a47e48763d6815fb23f113475b1793560c58ac8bdc2c67267e6a276a80e47aac4eef6ed5ab12126ae7b33fe1d65f9bd3c912c45cf780e078642e7d26042c4d05d2813f209cf76cc", 0x6e}], 0x1, 0x0, 0x0, 0x4000}, 0x40) sched_setscheduler(r1, 0x5, &(0x7f0000000040)) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="55c4d2ffd38b0d51b15a9c3c16700893c1e31d2906b6a6f79778e1cebdf9068b02a9df9f9b2228c1a4cd4c9f52218a8777961267d5f157eb31cd8e6a4a828448b466cd963a7447655ec40fa2d4687785c21ba0c49a66b2b0465e0b9d353029086dcf88c6973e9e938692a5cbde2ddc12562a39c768a035efe8a25e05d5d56157370789c9564733570370da137cb76c7cb649e8"]) syz_mount_image$ntfs(0x0, &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r3 = shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_LOCK(r3, 0xb) r4 = syz_open_dev$vcsn(&(0x7f00000007c0)='/dev/vcs#\x00', 0x0, 0x400) ioctl$sock_inet_tcp_SIOCOUTQNSD(r4, 0x894b, 0x0) syz_read_part_table(0x7fffffff, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000580)={0x0, @in={{0x2, 0x0, @loopback}}, [0x97, 0x48a7, 0x0, 0x5, 0x0, 0x0, 0x0, 0xff, 0x0, 0x8340, 0x36, 0x0, 0x93d, 0x0, 0x1ff]}, 0x0) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f0000000680)={0x8000000000000000, 0x1}) creat(&(0x7f0000000100)='./file0\x00', 0x0) socket$key(0xf, 0x3, 0x2) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=""/198, 0xc6}, 0x0) [ 1672.230506] kobject: 'loop3' (0000000018c9208e): kobject_uevent_env [ 1672.236963] kobject: 'loop3' (0000000018c9208e): fill_kobj_path: path = '/devices/virtual/block/loop3' 10:19:09 executing program 4: r0 = syz_open_dev$dri(&(0x7f0000000200)='/dev/dri/card#\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(r0, 0x4020565b, 0x0) [ 1672.271817] kobject: 'rx-0': free name [ 1672.274943] kobject: 'loop5' (000000001419f111): kobject_uevent_env [ 1672.292108] kobject: 'tx-0' (000000007697dd57): kobject_cleanup, parent 00000000924ea8bc [ 1672.295821] kobject: 'loop5' (000000001419f111): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 1672.300676] kobject: 'tx-0' (000000007697dd57): auto cleanup 'remove' event [ 1672.317190] kobject: 'tx-0' (000000007697dd57): kobject_uevent_env [ 1672.323844] kobject: 'tx-0' (000000007697dd57): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1672.334211] kobject: 'tx-0' (000000007697dd57): auto cleanup kobject_del [ 1672.363144] kobject: 'tx-0' (000000007697dd57): calling ktype release [ 1672.380301] kobject: 'tx-0': free name [ 1672.385218] kobject: 'queues' (00000000924ea8bc): kobject_cleanup, parent (null) [ 1672.393952] kobject: 'queues' (00000000924ea8bc): calling ktype release 10:19:09 executing program 4: r0 = syz_open_dev$dri(&(0x7f0000000200)='/dev/dri/card#\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(r0, 0x4020565b, 0x0) [ 1672.429024] kobject: 'queues' (00000000924ea8bc): kset_release [ 1672.447008] kobject: 'queues': free name [ 1672.451973] kobject: 'sit0' (00000000ae03b097): kobject_uevent_env [ 1672.458779] kobject: 'sit0' (00000000ae03b097): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1672.470734] kobject: 'rx-0' (000000008a9d69b9): kobject_cleanup, parent 00000000a33491fd 10:19:09 executing program 3: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) symlink(&(0x7f0000000500)='./file0/f.le.\x00', &(0x7f0000000140)='.//ile0\x00') mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000280)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) execveat(r0, &(0x7f0000000180)='.//ile0/file0\x00', 0x0, 0x0, 0x0) [ 1672.480703] kobject: 'loop5' (000000001419f111): kobject_uevent_env [ 1672.491913] kobject: 'rx-0' (000000008a9d69b9): auto cleanup 'remove' event [ 1672.504266] kobject: 'rx-0' (000000008a9d69b9): kobject_uevent_env [ 1672.512575] kobject: 'loop5' (000000001419f111): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 1672.526885] kobject: 'rx-0' (000000008a9d69b9): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1672.554624] kobject: 'rx-0' (000000008a9d69b9): auto cleanup kobject_del [ 1672.571265] __loop_clr_fd: partition scan of loop5 failed (rc=-22) [ 1672.578454] kobject: 'rx-0' (000000008a9d69b9): calling ktype release [ 1672.599087] kobject: 'loop0' (00000000f9279d8b): kobject_uevent_env [ 1672.605646] kobject: 'rx-0': free name [ 1672.609910] kobject: 'tx-0' (000000005517391d): kobject_cleanup, parent 00000000a33491fd [ 1672.618927] kobject: 'loop0' (00000000f9279d8b): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 1672.628799] kobject: 'tx-0' (000000005517391d): auto cleanup 'remove' event [ 1672.652242] kobject: 'loop3' (0000000018c9208e): kobject_uevent_env [ 1672.662765] kobject: 'loop3' (0000000018c9208e): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 1672.669391] kobject: 'loop5' (000000001419f111): kobject_uevent_env [ 1672.683208] kobject: 'tx-0' (000000005517391d): kobject_uevent_env [ 1672.688959] kobject: 'loop5' (000000001419f111): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 1672.695229] kobject: 'tx-0' (000000005517391d): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1672.733678] kobject: 'tx-0' (000000005517391d): auto cleanup kobject_del [ 1672.750403] kobject: 'tx-0' (000000005517391d): calling ktype release [ 1672.757266] kobject: 'tx-0': free name [ 1672.762909] kobject: 'queues' (00000000a33491fd): kobject_cleanup, parent (null) [ 1672.775720] kobject: 'queues' (00000000a33491fd): calling ktype release [ 1672.782826] kobject: 'queues' (00000000a33491fd): kset_release [ 1672.789099] kobject: 'loop0' (00000000f9279d8b): kobject_uevent_env 10:19:09 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x104a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(des3_ede)\x00'}, 0x58) r1 = accept4(r0, 0x0, &(0x7f00000005c0)=0x1000000d6, 0x10000080800) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c90c200", 0x18) sendto$unix(r1, &(0x7f0000000140), 0x14ded905162a6a4b, 0x0, 0x0, 0x429) recvmmsg(r1, &(0x7f0000000040)=[{{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000003c0)=""/255, 0xff}], 0x1}}], 0x1, 0x0, 0x0) recvfrom(r1, &(0x7f0000001240)=""/4096, 0xffffff7e, 0x0, 0x0, 0x0) 10:19:09 executing program 4: r0 = syz_open_dev$dri(&(0x7f0000000200)='/dev/dri/card#\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(r0, 0x4020565b, 0x0) 10:19:09 executing program 1: r0 = syz_open_dev$dri(&(0x7f0000000200)='/dev/dri/card#\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(r0, 0x4020565b, 0x0) 10:19:09 executing program 3: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) symlink(&(0x7f0000000500)='./file0/f.le.\x00', &(0x7f0000000140)='.//ile0\x00') mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000280)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) execveat(r0, &(0x7f0000000180)='.//ile0/file0\x00', 0x0, 0x0, 0x0) 10:19:09 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x800000000, 0xffffffffffffffff) fcntl$notify(r1, 0x402, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup(0xffffffffffffffff) sysinfo(&(0x7f0000000500)=""/94) fsetxattr$trusted_overlay_opaque(r1, &(0x7f0000000340)='trusted.overlay.opaque\x00', &(0x7f0000000180)='y\x00', 0xffffffffffffff32, 0x3) ioctl$sock_FIOGETOWN(r2, 0x8903, &(0x7f0000000780)) rt_sigprocmask(0x1, &(0x7f0000000700)={0x9}, &(0x7f0000000740), 0x8) syz_read_part_table(0xfffffffffffffffe, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="000000000000000000000000000000000000000000000000e0e51532000000000200880126000100000064000000000127008e030c00650000006400000000030d00f0043100c900000064000000000432000520", 0x54, 0x1a0}]) [ 1672.801053] kobject: 'queues': free name [ 1672.806645] kobject: 'sit0' (00000000a2b1c850): kobject_uevent_env [ 1672.814072] kobject: 'loop0' (00000000f9279d8b): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 1672.820060] kobject: 'sit0' (00000000a2b1c850): kobject_uevent_env: uevent_suppress caused the event to drop! 10:19:09 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x104a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(des3_ede)\x00'}, 0x58) r1 = accept4(r0, 0x0, &(0x7f00000005c0)=0x1000000d6, 0x10000080800) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c90c200", 0x18) sendto$unix(r1, &(0x7f0000000140), 0x14ded905162a6a4b, 0x0, 0x0, 0x429) recvmmsg(r1, &(0x7f0000000040)=[{{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000003c0)=""/255, 0xff}], 0x1}}], 0x1, 0x0, 0x0) recvfrom(r1, &(0x7f0000001240)=""/4096, 0xffffff7e, 0x0, 0x0, 0x0) [ 1672.851757] kobject: 'rx-0' (00000000f20311ee): kobject_cleanup, parent 00000000698bd606 [ 1672.873932] kobject: 'rx-0' (00000000f20311ee): auto cleanup 'remove' event [ 1672.889460] kobject: 'rx-0' (00000000f20311ee): kobject_uevent_env 10:19:09 executing program 4: r0 = syz_open_dev$dri(&(0x7f0000000200)='/dev/dri/card#\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(r0, 0x4020565b, 0x0) [ 1672.896607] kobject: 'rx-0' (00000000f20311ee): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1672.908542] kobject: 'loop5' (000000001419f111): kobject_uevent_env [ 1672.915082] kobject: 'rx-0' (00000000f20311ee): auto cleanup kobject_del [ 1672.922032] kobject: 'loop5' (000000001419f111): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 1672.931605] kobject: 'rx-0' (00000000f20311ee): calling ktype release [ 1672.946831] kobject: 'rx-0': free name 10:19:09 executing program 1: r0 = syz_open_dev$dri(&(0x7f0000000200)='/dev/dri/card#\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(r0, 0x4020565b, 0x0) 10:19:09 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x800000000, 0xffffffffffffffff) fcntl$notify(r1, 0x402, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup(0xffffffffffffffff) sysinfo(&(0x7f0000000500)=""/94) fsetxattr$trusted_overlay_opaque(r1, &(0x7f0000000340)='trusted.overlay.opaque\x00', &(0x7f0000000180)='y\x00', 0xffffffffffffff32, 0x3) ioctl$sock_FIOGETOWN(r2, 0x8903, &(0x7f0000000780)) rt_sigprocmask(0x1, &(0x7f0000000700)={0x9}, &(0x7f0000000740), 0x8) syz_read_part_table(0xfffffffffffffffe, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="000000000000000000000000000000000000000000000000e0e51532000000000200880126000100000064000000000127008e030c00650000006400000000030d00f0043100c900000064000000000432000520", 0x54, 0x1a0}]) [ 1672.962396] kobject: 'loop3' (0000000018c9208e): kobject_uevent_env [ 1672.982187] kobject: 'loop3' (0000000018c9208e): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 1672.993703] kobject: 'tx-0' (0000000033476632): kobject_cleanup, parent 00000000698bd606 [ 1673.028068] kobject: 'loop5' (000000001419f111): kobject_uevent_env [ 1673.028719] kobject: 'tx-0' (0000000033476632): auto cleanup 'remove' event [ 1673.035684] kobject: 'loop5' (000000001419f111): fill_kobj_path: path = '/devices/virtual/block/loop5' 10:19:09 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x800000000, 0xffffffffffffffff) fcntl$notify(r1, 0x402, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup(0xffffffffffffffff) sysinfo(&(0x7f0000000500)=""/94) fsetxattr$trusted_overlay_opaque(r1, &(0x7f0000000340)='trusted.overlay.opaque\x00', &(0x7f0000000180)='y\x00', 0xffffffffffffff32, 0x3) ioctl$sock_FIOGETOWN(r2, 0x8903, &(0x7f0000000780)) rt_sigprocmask(0x1, &(0x7f0000000700)={0x9}, &(0x7f0000000740), 0x8) syz_read_part_table(0xfffffffffffffffe, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="000000000000000000000000000000000000000000000000e0e51532000000000200880126000100000064000000000127008e030c00650000006400000000030d00f0043100c900000064000000000432000520", 0x54, 0x1a0}]) [ 1673.088288] kobject: 'loop0' (00000000f9279d8b): kobject_uevent_env [ 1673.092762] kobject: 'tx-0' (0000000033476632): kobject_uevent_env [ 1673.114195] kobject: 'tx-0' (0000000033476632): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1673.117133] kobject: 'loop0' (00000000f9279d8b): fill_kobj_path: path = '/devices/virtual/block/loop0' 10:19:09 executing program 4: r0 = syz_open_dev$dri(&(0x7f0000000200)='/dev/dri/card#\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(r0, 0x4020565b, 0x0) [ 1673.137507] kobject: 'tx-0' (0000000033476632): auto cleanup kobject_del [ 1673.147225] kobject: 'tx-0' (0000000033476632): calling ktype release [ 1673.155001] kobject: 'tx-0': free name 10:19:10 executing program 1: r0 = syz_open_dev$dri(&(0x7f0000000200)='/dev/dri/card#\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(r0, 0x4020565b, 0x0) [ 1673.222207] kobject: 'queues' (00000000698bd606): kobject_cleanup, parent (null) [ 1673.229057] kobject: 'loop0' (00000000f9279d8b): kobject_uevent_env [ 1673.237700] kobject: 'loop0' (00000000f9279d8b): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 1673.262181] kobject: 'queues' (00000000698bd606): calling ktype release 10:19:10 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x800000000, 0xffffffffffffffff) fcntl$notify(r1, 0x402, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup(0xffffffffffffffff) sysinfo(&(0x7f0000000500)=""/94) fsetxattr$trusted_overlay_opaque(r1, &(0x7f0000000340)='trusted.overlay.opaque\x00', &(0x7f0000000180)='y\x00', 0xffffffffffffff32, 0x3) ioctl$sock_FIOGETOWN(r2, 0x8903, &(0x7f0000000780)) rt_sigprocmask(0x1, &(0x7f0000000700)={0x9}, &(0x7f0000000740), 0x8) syz_read_part_table(0xfffffffffffffffe, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="000000000000000000000000000000000000000000000000e0e51532000000000200880126000100000064000000000127008e030c00650000006400000000030d00f0043100c900000064000000000432000520", 0x54, 0x1a0}]) [ 1673.287516] kobject: 'queues' (00000000698bd606): kset_release [ 1673.304372] kobject: 'queues': free name [ 1673.312701] kobject: 'sit0' (0000000077b68eb9): kobject_uevent_env [ 1673.323091] kobject: 'loop5' (000000001419f111): kobject_uevent_env [ 1673.327041] kobject: 'sit0' (0000000077b68eb9): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1673.333443] kobject: 'loop5' (000000001419f111): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 1673.349466] kobject: 'rx-0' (00000000f7849271): kobject_cleanup, parent 0000000084e8350a [ 1673.349473] kobject: 'rx-0' (00000000f7849271): auto cleanup 'remove' event [ 1673.349480] kobject: 'rx-0' (00000000f7849271): kobject_uevent_env [ 1673.349486] kobject: 'rx-0' (00000000f7849271): kobject_uevent_env: uevent_suppress caused the event to drop! 10:19:10 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x800000000, 0xffffffffffffffff) fcntl$notify(r1, 0x402, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup(0xffffffffffffffff) sysinfo(&(0x7f0000000500)=""/94) fsetxattr$trusted_overlay_opaque(r1, &(0x7f0000000340)='trusted.overlay.opaque\x00', &(0x7f0000000180)='y\x00', 0xffffffffffffff32, 0x3) ioctl$sock_FIOGETOWN(r2, 0x8903, &(0x7f0000000780)) rt_sigprocmask(0x1, &(0x7f0000000700)={0x9}, &(0x7f0000000740), 0x8) syz_read_part_table(0xfffffffffffffffe, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="000000000000000000000000000000000000000000000000e0e51532000000000200880126000100000064000000000127008e030c00650000006400000000030d00f0043100c900000064000000000432000520", 0x54, 0x1a0}]) 10:19:10 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x800000000, 0xffffffffffffffff) fcntl$notify(r1, 0x402, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup(0xffffffffffffffff) sysinfo(&(0x7f0000000500)=""/94) fsetxattr$trusted_overlay_opaque(r1, &(0x7f0000000340)='trusted.overlay.opaque\x00', &(0x7f0000000180)='y\x00', 0xffffffffffffff32, 0x3) ioctl$sock_FIOGETOWN(r2, 0x8903, &(0x7f0000000780)) rt_sigprocmask(0x1, &(0x7f0000000700)={0x9}, &(0x7f0000000740), 0x8) syz_read_part_table(0xfffffffffffffffe, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="000000000000000000000000000000000000000000000000e0e51532000000000200880126000100000064000000000127008e030c00650000006400000000030d00f0043100c900000064000000000432000520", 0x54, 0x1a0}]) [ 1673.349492] kobject: 'rx-0' (00000000f7849271): auto cleanup kobject_del [ 1673.349554] kobject: 'rx-0' (00000000f7849271): calling ktype release [ 1673.349559] kobject: 'rx-0': free name [ 1673.349644] kobject: 'tx-0' (00000000a8a4dfe9): kobject_cleanup, parent 0000000084e8350a [ 1673.349656] kobject: 'tx-0' (00000000a8a4dfe9): auto cleanup 'remove' event [ 1673.376932] __loop_clr_fd: partition scan of loop5 failed (rc=-22) [ 1673.416391] kobject: 'tx-0' (00000000a8a4dfe9): kobject_uevent_env [ 1673.451954] kobject: 'tx-0' (00000000a8a4dfe9): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1673.476461] kobject: 'loop3' (0000000018c9208e): kobject_uevent_env [ 1673.487814] kobject: 'loop3' (0000000018c9208e): fill_kobj_path: path = '/devices/virtual/block/loop3' 10:19:10 executing program 1: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) symlink(&(0x7f0000000500)='./file0/f.le.\x00', &(0x7f0000000140)='.//ile0\x00') mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000280)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) execveat(r0, &(0x7f0000000180)='.//ile0/file0\x00', 0x0, 0x0, 0x0) [ 1673.515396] kobject: 'loop3' (0000000018c9208e): kobject_uevent_env [ 1673.522461] kobject: 'tx-0' (00000000a8a4dfe9): auto cleanup kobject_del [ 1673.546335] kobject: 'tx-0' (00000000a8a4dfe9): calling ktype release [ 1673.553703] kobject: 'loop3' (0000000018c9208e): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 1673.563892] kobject: 'tx-0': free name [ 1673.568390] kobject: 'queues' (0000000084e8350a): kobject_cleanup, parent (null) [ 1673.576805] kobject: 'queues' (0000000084e8350a): calling ktype release [ 1673.594390] kobject: 'queues' (0000000084e8350a): kset_release [ 1673.594741] kobject: 'loop5' (000000001419f111): kobject_uevent_env [ 1673.601578] kobject: 'queues': free name [ 1673.607933] kobject: 'loop5' (000000001419f111): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 1673.616981] kobject: 'sit0' (0000000008887717): kobject_uevent_env [ 1673.628148] kobject: 'sit0' (0000000008887717): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1673.651394] kobject: 'rx-0' (000000008046c7fc): kobject_cleanup, parent 00000000d247fdca [ 1673.674637] kobject: 'rx-0' (000000008046c7fc): auto cleanup 'remove' event [ 1673.693499] kobject: 'rx-0' (000000008046c7fc): kobject_uevent_env [ 1673.707864] kobject: 'rx-0' (000000008046c7fc): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1673.725572] kobject: 'rx-0' (000000008046c7fc): auto cleanup kobject_del [ 1673.733455] kobject: 'rx-0' (000000008046c7fc): calling ktype release [ 1673.746158] kobject: 'rx-0': free name [ 1673.750181] kobject: 'tx-0' (00000000da9f04ab): kobject_cleanup, parent 00000000d247fdca [ 1673.761755] kobject: 'tx-0' (00000000da9f04ab): auto cleanup 'remove' event [ 1673.768908] kobject: 'tx-0' (00000000da9f04ab): kobject_uevent_env [ 1673.775221] kobject: 'tx-0' (00000000da9f04ab): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1673.782087] kobject: 'loop0' (00000000f9279d8b): kobject_uevent_env [ 1673.800228] kobject: 'tx-0' (00000000da9f04ab): auto cleanup kobject_del [ 1673.807110] kobject: 'tx-0' (00000000da9f04ab): calling ktype release [ 1673.808153] kobject: 'loop0' (00000000f9279d8b): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 1673.816633] kobject: 'tx-0': free name [ 1673.827108] kobject: 'queues' (00000000d247fdca): kobject_cleanup, parent (null) [ 1673.837089] __loop_clr_fd: partition scan of loop0 failed (rc=-22) [ 1673.838587] kobject: 'queues' (00000000d247fdca): calling ktype release [ 1673.850202] kobject: 'queues' (00000000d247fdca): kset_release [ 1673.856167] kobject: 'queues': free name [ 1673.860704] kobject: 'sit0' (0000000020dfe0a1): kobject_uevent_env [ 1673.867044] kobject: 'sit0' (0000000020dfe0a1): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1673.894933] kobject: 'rx-0' (000000003f8bf493): kobject_cleanup, parent 00000000be9fe76a [ 1673.904065] kobject: 'rx-0' (000000003f8bf493): auto cleanup 'remove' event [ 1673.906422] kobject: 'loop5' (000000001419f111): kobject_uevent_env [ 1673.911223] kobject: 'rx-0' (000000003f8bf493): kobject_uevent_env 10:19:10 executing program 1: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) symlink(&(0x7f0000000500)='./file0/f.le.\x00', &(0x7f0000000140)='.//ile0\x00') mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000280)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) execveat(r0, &(0x7f0000000180)='.//ile0/file0\x00', 0x0, 0x0, 0x0) 10:19:10 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x800000000, 0xffffffffffffffff) fcntl$notify(r1, 0x402, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup(0xffffffffffffffff) sysinfo(&(0x7f0000000500)=""/94) fsetxattr$trusted_overlay_opaque(r1, &(0x7f0000000340)='trusted.overlay.opaque\x00', &(0x7f0000000180)='y\x00', 0xffffffffffffff32, 0x3) ioctl$sock_FIOGETOWN(r2, 0x8903, &(0x7f0000000780)) rt_sigprocmask(0x1, &(0x7f0000000700)={0x9}, &(0x7f0000000740), 0x8) syz_read_part_table(0xfffffffffffffffe, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="000000000000000000000000000000000000000000000000e0e51532000000000200880126000100000064000000000127008e030c00650000006400000000030d00f0043100c900000064000000000432000520", 0x54, 0x1a0}]) 10:19:10 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x800000000, 0xffffffffffffffff) fcntl$notify(r1, 0x402, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup(0xffffffffffffffff) sysinfo(&(0x7f0000000500)=""/94) fsetxattr$trusted_overlay_opaque(r1, &(0x7f0000000340)='trusted.overlay.opaque\x00', &(0x7f0000000180)='y\x00', 0xffffffffffffff32, 0x3) ioctl$sock_FIOGETOWN(r2, 0x8903, &(0x7f0000000780)) rt_sigprocmask(0x1, &(0x7f0000000700)={0x9}, &(0x7f0000000740), 0x8) syz_read_part_table(0xfffffffffffffffe, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="000000000000000000000000000000000000000000000000e0e51532000000000200880126000100000064000000000127008e030c00650000006400000000030d00f0043100c900000064000000000432000520", 0x54, 0x1a0}]) [ 1673.911231] kobject: 'rx-0' (000000003f8bf493): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1673.911237] kobject: 'rx-0' (000000003f8bf493): auto cleanup kobject_del [ 1673.911263] kobject: 'rx-0' (000000003f8bf493): calling ktype release [ 1673.911267] kobject: 'rx-0': free name [ 1673.911304] kobject: 'tx-0' (00000000da1d66e1): kobject_cleanup, parent 00000000be9fe76a [ 1673.911324] kobject: 'tx-0' (00000000da1d66e1): auto cleanup 'remove' event [ 1673.934350] kobject: 'loop5' (000000001419f111): fill_kobj_path: path = '/devices/virtual/block/loop5' 10:19:10 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x800000000, 0xffffffffffffffff) fcntl$notify(r1, 0x402, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup(0xffffffffffffffff) sysinfo(&(0x7f0000000500)=""/94) fsetxattr$trusted_overlay_opaque(r1, &(0x7f0000000340)='trusted.overlay.opaque\x00', &(0x7f0000000180)='y\x00', 0xffffffffffffff32, 0x3) ioctl$sock_FIOGETOWN(r2, 0x8903, &(0x7f0000000780)) rt_sigprocmask(0x1, &(0x7f0000000700)={0x9}, &(0x7f0000000740), 0x8) syz_read_part_table(0xfffffffffffffffe, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="000000000000000000000000000000000000000000000000e0e51532000000000200880126000100000064000000000127008e030c00650000006400000000030d00f0043100c900000064000000000432000520", 0x54, 0x1a0}]) 10:19:10 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x800000000, 0xffffffffffffffff) fcntl$notify(r1, 0x402, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup(0xffffffffffffffff) sysinfo(&(0x7f0000000500)=""/94) fsetxattr$trusted_overlay_opaque(r1, &(0x7f0000000340)='trusted.overlay.opaque\x00', &(0x7f0000000180)='y\x00', 0xffffffffffffff32, 0x3) ioctl$sock_FIOGETOWN(r2, 0x8903, &(0x7f0000000780)) rt_sigprocmask(0x1, &(0x7f0000000700)={0x9}, &(0x7f0000000740), 0x8) syz_read_part_table(0xfffffffffffffffe, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="000000000000000000000000000000000000000000000000e0e51532000000000200880126000100000064000000000127008e030c00650000006400000000030d00f0043100c900000064000000000432000520", 0x54, 0x1a0}]) [ 1673.940993] kobject: 'tx-0' (00000000da1d66e1): kobject_uevent_env [ 1673.941001] kobject: 'tx-0' (00000000da1d66e1): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1673.941006] kobject: 'tx-0' (00000000da1d66e1): auto cleanup kobject_del [ 1673.941045] kobject: 'tx-0' (00000000da1d66e1): calling ktype release [ 1673.941052] kobject: 'tx-0': free name [ 1674.054355] kobject: 'loop0' (00000000f9279d8b): kobject_uevent_env [ 1674.077062] kobject: 'loop0' (00000000f9279d8b): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 1674.081016] kobject: 'loop3' (0000000018c9208e): kobject_uevent_env [ 1674.088277] kobject: 'queues' (00000000be9fe76a): kobject_cleanup, parent (null) [ 1674.103215] kobject: 'queues' (00000000be9fe76a): calling ktype release [ 1674.110744] kobject: 'queues' (00000000be9fe76a): kset_release [ 1674.115704] kobject: 'loop3' (0000000018c9208e): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 1674.117058] kobject: 'queues': free name [ 1674.137821] kobject: 'sit0' (00000000aa0b578a): kobject_uevent_env [ 1674.143961] kobject: 'loop5' (000000001419f111): kobject_uevent_env [ 1674.152227] kobject: 'loop5' (000000001419f111): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 1674.157842] kobject: 'sit0' (00000000aa0b578a): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1674.173684] __loop_clr_fd: partition scan of loop3 failed (rc=-22) [ 1674.208453] kobject: 'loop3' (0000000018c9208e): kobject_uevent_env [ 1674.214923] kobject: 'loop3' (0000000018c9208e): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 1674.251695] kobject: 'loop0' (00000000f9279d8b): kobject_uevent_env [ 1674.261789] kobject: 'loop0' (00000000f9279d8b): fill_kobj_path: path = '/devices/virtual/block/loop0' 10:19:11 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x800000000, 0xffffffffffffffff) fcntl$notify(r1, 0x402, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup(0xffffffffffffffff) sysinfo(&(0x7f0000000500)=""/94) fsetxattr$trusted_overlay_opaque(r1, &(0x7f0000000340)='trusted.overlay.opaque\x00', &(0x7f0000000180)='y\x00', 0xffffffffffffff32, 0x3) ioctl$sock_FIOGETOWN(r2, 0x8903, &(0x7f0000000780)) rt_sigprocmask(0x1, &(0x7f0000000700)={0x9}, &(0x7f0000000740), 0x8) syz_read_part_table(0xfffffffffffffffe, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="000000000000000000000000000000000000000000000000e0e51532000000000200880126000100000064000000000127008e030c00650000006400000000030d00f0043100c900000064000000000432000520", 0x54, 0x1a0}]) 10:19:11 executing program 1: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) symlink(&(0x7f0000000500)='./file0/f.le.\x00', &(0x7f0000000140)='.//ile0\x00') mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000280)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) execveat(r0, &(0x7f0000000180)='.//ile0/file0\x00', 0x0, 0x0, 0x0) 10:19:11 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x104a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(des3_ede)\x00'}, 0x58) r1 = accept4(r0, 0x0, &(0x7f00000005c0)=0x1000000d6, 0x10000080800) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c90c200", 0x18) sendto$unix(r1, &(0x7f0000000140), 0x14ded905162a6a4b, 0x0, 0x0, 0x429) recvmmsg(r1, &(0x7f0000000040)=[{{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000003c0)=""/255, 0xff}], 0x1}}], 0x1, 0x0, 0x0) recvfrom(r1, &(0x7f0000001240)=""/4096, 0xffffff7e, 0x0, 0x0, 0x0) 10:19:11 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x104a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(des3_ede)\x00'}, 0x58) r1 = accept4(r0, 0x0, &(0x7f00000005c0)=0x1000000d6, 0x10000080800) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c90c200", 0x18) sendto$unix(r1, &(0x7f0000000140), 0x14ded905162a6a4b, 0x0, 0x0, 0x429) recvmmsg(r1, &(0x7f0000000040)=[{{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000003c0)=""/255, 0xff}], 0x1}}], 0x1, 0x0, 0x0) recvfrom(r1, &(0x7f0000001240)=""/4096, 0xffffff7e, 0x0, 0x0, 0x0) 10:19:11 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x104a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(des3_ede)\x00'}, 0x58) r1 = accept4(r0, 0x0, &(0x7f00000005c0)=0x1000000d6, 0x10000080800) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c90c200", 0x18) sendto$unix(r1, &(0x7f0000000140), 0x14ded905162a6a4b, 0x0, 0x0, 0x429) recvmmsg(r1, &(0x7f0000000040)=[{{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000003c0)=""/255, 0xff}], 0x1}}], 0x1, 0x0, 0x0) recvfrom(r1, &(0x7f0000001240)=""/4096, 0xffffff7e, 0x0, 0x0, 0x0) [ 1674.425573] kobject: 'batman_adv' (00000000f36b138a): kobject_uevent_env [ 1674.433682] kobject: 'loop5' (000000001419f111): kobject_uevent_env [ 1674.440716] kobject: 'batman_adv' (00000000f36b138a): kobject_uevent_env: filter function caused the event to drop! [ 1674.452141] kobject: 'loop5' (000000001419f111): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 1674.463977] kobject: 'batman_adv' (00000000f36b138a): kobject_cleanup, parent (null) [ 1674.473662] kobject: 'batman_adv' (00000000f36b138a): calling ktype release [ 1674.485206] kobject: (00000000f36b138a): dynamic_kobj_release [ 1674.503578] kobject: 'batman_adv': free name [ 1674.509006] kobject: 'rx-0' (00000000736d7f50): kobject_cleanup, parent 000000006ed1a826 [ 1674.517369] kobject: 'rx-0' (00000000736d7f50): auto cleanup 'remove' event [ 1674.532626] __loop_clr_fd: partition scan of loop5 failed (rc=-22) [ 1674.535549] kobject: 'loop3' (0000000018c9208e): kobject_uevent_env [ 1674.565402] kobject: 'rx-0' (00000000736d7f50): kobject_uevent_env [ 1674.574764] kobject: 'rx-0' (00000000736d7f50): fill_kobj_path: path = '/devices/virtual/net/syz_tun/queues/rx-0' [ 1674.589614] kobject: 'loop3' (0000000018c9208e): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 1674.603060] kobject: 'loop3' (0000000018c9208e): kobject_uevent_env [ 1674.609773] kobject: 'rx-0' (00000000736d7f50): auto cleanup kobject_del [ 1674.616641] kobject: 'rx-0' (00000000736d7f50): calling ktype release [ 1674.624161] kobject: 'loop3' (0000000018c9208e): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 1674.636291] kobject: 'rx-0': free name [ 1674.648205] kobject: 'tx-0' (00000000cdb1d7c3): kobject_cleanup, parent 000000006ed1a826 [ 1674.656681] kobject: 'tx-0' (00000000cdb1d7c3): auto cleanup 'remove' event [ 1674.664179] kobject: 'tx-0' (00000000cdb1d7c3): kobject_uevent_env [ 1674.670672] kobject: 'tx-0' (00000000cdb1d7c3): fill_kobj_path: path = '/devices/virtual/net/syz_tun/queues/tx-0' [ 1674.681272] kobject: 'loop0' (00000000f9279d8b): kobject_uevent_env [ 1674.682000] kobject: 'tx-0' (00000000cdb1d7c3): auto cleanup kobject_del [ 1674.688275] kobject: 'loop0' (00000000f9279d8b): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 1674.694764] kobject: 'tx-0' (00000000cdb1d7c3): calling ktype release [ 1674.709478] __loop_clr_fd: partition scan of loop0 failed (rc=-22) [ 1674.714944] kobject: 'tx-0': free name [ 1674.721208] kobject: 'queues' (000000006ed1a826): kobject_cleanup, parent (null) [ 1674.729679] kobject: 'queues' (000000006ed1a826): calling ktype release [ 1674.736470] kobject: 'queues' (000000006ed1a826): kset_release [ 1674.742693] kobject: 'queues': free name [ 1674.746955] kobject: 'syz_tun' (00000000671833c1): kobject_uevent_env [ 1674.753723] kobject: 'syz_tun' (00000000671833c1): fill_kobj_path: path = '/devices/virtual/net/syz_tun' [ 1674.765147] kobject: 'sit0' (00000000ae03b097): kobject_cleanup, parent (null) [ 1674.778454] kobject: 'sit0' (00000000ae03b097): auto cleanup 'remove' event [ 1674.785587] kobject: 'sit0' (00000000ae03b097): kobject_uevent_env [ 1674.795702] kobject: 'sit0' (00000000ae03b097): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1674.805943] kobject: 'syz_tun' (00000000671833c1): kobject_cleanup, parent (null) [ 1674.806658] kobject: 'sit0' (00000000ae03b097): calling ktype release [ 1674.822599] kobject: 'syz_tun' (00000000671833c1): calling ktype release [ 1674.828855] kobject: 'sit0': free name [ 1674.832786] kobject: 'syz_tun': free name [ 1674.833359] kobject: 'sit0' (00000000a2b1c850): kobject_cleanup, parent (null) [ 1674.849996] kobject: 'sit0' (00000000a2b1c850): auto cleanup 'remove' event [ 1674.857097] kobject: 'sit0' (00000000a2b1c850): kobject_uevent_env [ 1674.857926] kobject: 'loop3' (0000000018c9208e): kobject_uevent_env [ 1674.865100] kobject: 'sit0' (00000000a2b1c850): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1674.877814] kobject: 'loop3' (0000000018c9208e): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 1674.884103] kobject: 'sit0' (00000000a2b1c850): calling ktype release [ 1674.895992] kobject: 'sit0': free name [ 1674.903428] __loop_clr_fd: partition scan of loop3 failed (rc=-22) [ 1674.903952] kobject: 'sit0' (0000000077b68eb9): kobject_cleanup, parent (null) [ 1674.922322] kobject: 'sit0' (0000000077b68eb9): auto cleanup 'remove' event [ 1674.929458] kobject: 'sit0' (0000000077b68eb9): kobject_uevent_env [ 1674.935774] kobject: 'sit0' (0000000077b68eb9): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1674.954849] kobject: 'sit0' (0000000077b68eb9): calling ktype release [ 1674.963404] kobject: 'sit0': free name [ 1674.967351] kobject: 'sit0' (0000000008887717): kobject_cleanup, parent (null) [ 1674.980107] kobject: 'sit0' (0000000008887717): auto cleanup 'remove' event [ 1674.987230] kobject: 'sit0' (0000000008887717): kobject_uevent_env [ 1674.995644] kobject: 'sit0' (0000000008887717): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1675.010501] kobject: 'sit0' (0000000008887717): calling ktype release [ 1675.017126] kobject: 'sit0': free name [ 1675.022520] kobject: 'sit0' (0000000020dfe0a1): kobject_cleanup, parent (null) [ 1675.033810] kobject: 'sit0' (0000000020dfe0a1): auto cleanup 'remove' event [ 1675.042435] kobject: 'sit0' (0000000020dfe0a1): kobject_uevent_env [ 1675.051551] kobject: 'sit0' (0000000020dfe0a1): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1675.063078] kobject: 'sit0' (0000000020dfe0a1): calling ktype release [ 1675.072551] kobject: 'sit0': free name [ 1675.076488] kobject: 'sit0' (00000000aa0b578a): kobject_cleanup, parent (null) [ 1675.086149] kobject: 'sit0' (00000000aa0b578a): auto cleanup 'remove' event [ 1675.093356] kobject: 'sit0' (00000000aa0b578a): kobject_uevent_env [ 1675.099722] kobject: 'sit0' (00000000aa0b578a): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1675.109795] kobject: 'sit0' (00000000aa0b578a): calling ktype release [ 1675.116408] kobject: 'sit0': free name [ 1675.145309] kobject: 'rx-0' (000000007c9961d0): kobject_cleanup, parent 000000009babebbf [ 1675.153603] kobject: 'rx-0' (000000007c9961d0): auto cleanup 'remove' event [ 1675.161550] kobject: 'rx-0' (000000007c9961d0): kobject_uevent_env [ 1675.168186] kobject: 'rx-0' (000000007c9961d0): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1675.178465] kobject: 'rx-0' (000000007c9961d0): auto cleanup kobject_del [ 1675.185310] kobject: 'rx-0' (000000007c9961d0): calling ktype release [ 1675.191939] kobject: 'rx-0': free name [ 1675.195863] kobject: 'tx-0' (0000000024e235f9): kobject_cleanup, parent 000000009babebbf [ 1675.204126] kobject: 'tx-0' (0000000024e235f9): auto cleanup 'remove' event [ 1675.211248] kobject: 'tx-0' (0000000024e235f9): kobject_uevent_env [ 1675.217555] kobject: 'tx-0' (0000000024e235f9): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1675.227645] kobject: 'tx-0' (0000000024e235f9): auto cleanup kobject_del [ 1675.234512] kobject: 'tx-0' (0000000024e235f9): calling ktype release [ 1675.241119] kobject: 'tx-0': free name [ 1675.245022] kobject: 'queues' (000000009babebbf): kobject_cleanup, parent (null) [ 1675.253462] kobject: 'queues' (000000009babebbf): calling ktype release [ 1675.260221] kobject: 'queues' (000000009babebbf): kset_release [ 1675.266168] kobject: 'queues': free name [ 1675.270583] kobject: 'ip6_vti0' (000000003335fb96): kobject_uevent_env [ 1675.277240] kobject: 'ip6_vti0' (000000003335fb96): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1675.289117] kobject: 'rx-0' (00000000cee7d100): kobject_cleanup, parent 0000000098648357 [ 1675.297338] kobject: 'rx-0' (00000000cee7d100): auto cleanup 'remove' event [ 1675.304521] kobject: 'rx-0' (00000000cee7d100): kobject_uevent_env [ 1675.310929] kobject: 'rx-0' (00000000cee7d100): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1675.321002] kobject: 'rx-0' (00000000cee7d100): auto cleanup kobject_del [ 1675.327880] kobject: 'rx-0' (00000000cee7d100): calling ktype release [ 1675.334431] kobject: 'rx-0': free name [ 1675.338386] kobject: 'tx-0' (00000000fd986ca9): kobject_cleanup, parent 0000000098648357 [ 1675.346630] kobject: 'tx-0' (00000000fd986ca9): auto cleanup 'remove' event [ 1675.353750] kobject: 'tx-0' (00000000fd986ca9): kobject_uevent_env [ 1675.360117] kobject: 'tx-0' (00000000fd986ca9): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1675.370204] kobject: 'tx-0' (00000000fd986ca9): auto cleanup kobject_del [ 1675.377052] kobject: 'tx-0' (00000000fd986ca9): calling ktype release [ 1675.383643] kobject: 'tx-0': free name [ 1675.387554] kobject: 'queues' (0000000098648357): kobject_cleanup, parent (null) [ 1675.395992] kobject: 'queues' (0000000098648357): calling ktype release [ 1675.402776] kobject: 'queues' (0000000098648357): kset_release [ 1675.408771] kobject: 'queues': free name [ 1675.413053] kobject: 'ip6_vti0' (00000000b78d05eb): kobject_uevent_env [ 1675.419736] kobject: 'ip6_vti0' (00000000b78d05eb): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1675.431262] kobject: 'rx-0' (00000000e11a6688): kobject_cleanup, parent 00000000e3b5bed9 [ 1675.439629] kobject: 'rx-0' (00000000e11a6688): auto cleanup 'remove' event [ 1675.446731] kobject: 'rx-0' (00000000e11a6688): kobject_uevent_env [ 1675.453060] kobject: 'rx-0' (00000000e11a6688): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1675.463193] kobject: 'rx-0' (00000000e11a6688): auto cleanup kobject_del [ 1675.470084] kobject: 'rx-0' (00000000e11a6688): calling ktype release [ 1675.476652] kobject: 'rx-0': free name [ 1675.480790] kobject: 'tx-0' (0000000068f1d040): kobject_cleanup, parent 00000000e3b5bed9 [ 1675.489052] kobject: 'tx-0' (0000000068f1d040): auto cleanup 'remove' event [ 1675.496163] kobject: 'tx-0' (0000000068f1d040): kobject_uevent_env [ 1675.502503] kobject: 'tx-0' (0000000068f1d040): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1675.512611] kobject: 'tx-0' (0000000068f1d040): auto cleanup kobject_del [ 1675.519510] kobject: 'tx-0' (0000000068f1d040): calling ktype release [ 1675.526092] kobject: 'tx-0': free name [ 1675.530010] kobject: 'queues' (00000000e3b5bed9): kobject_cleanup, parent (null) [ 1675.538558] kobject: 'queues' (00000000e3b5bed9): calling ktype release [ 1675.545320] kobject: 'queues' (00000000e3b5bed9): kset_release [ 1675.551303] kobject: 'queues': free name [ 1675.555582] kobject: 'ip6_vti0' (00000000fe1d567d): kobject_uevent_env [ 1675.562283] kobject: 'ip6_vti0' (00000000fe1d567d): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1675.573649] kobject: 'rx-0' (0000000093588286): kobject_cleanup, parent 000000000f787ea1 [ 1675.581922] kobject: 'rx-0' (0000000093588286): auto cleanup 'remove' event [ 1675.589056] kobject: 'rx-0' (0000000093588286): kobject_uevent_env [ 1675.595375] kobject: 'rx-0' (0000000093588286): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1675.605441] kobject: 'rx-0' (0000000093588286): auto cleanup kobject_del [ 1675.612341] kobject: 'rx-0' (0000000093588286): calling ktype release [ 1675.619126] kobject: 'rx-0': free name [ 1675.623065] kobject: 'tx-0' (0000000057235f8e): kobject_cleanup, parent 000000000f787ea1 [ 1675.631383] kobject: 'tx-0' (0000000057235f8e): auto cleanup 'remove' event [ 1675.638534] kobject: 'tx-0' (0000000057235f8e): kobject_uevent_env [ 1675.644844] kobject: 'tx-0' (0000000057235f8e): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1675.654975] kobject: 'tx-0' (0000000057235f8e): auto cleanup kobject_del [ 1675.661880] kobject: 'tx-0' (0000000057235f8e): calling ktype release [ 1675.668497] kobject: 'tx-0': free name [ 1675.672410] kobject: 'queues' (000000000f787ea1): kobject_cleanup, parent (null) [ 1675.680849] kobject: 'queues' (000000000f787ea1): calling ktype release [ 1675.687603] kobject: 'queues' (000000000f787ea1): kset_release [ 1675.693618] kobject: 'queues': free name [ 1675.698185] kobject: 'ip6_vti0' (000000006472567c): kobject_uevent_env [ 1675.704864] kobject: 'ip6_vti0' (000000006472567c): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1675.716716] kobject: 'rx-0' (00000000a261f51e): kobject_cleanup, parent 0000000030e54045 [ 1675.725044] kobject: 'rx-0' (00000000a261f51e): auto cleanup 'remove' event [ 1675.732181] kobject: 'rx-0' (00000000a261f51e): kobject_uevent_env [ 1675.738548] kobject: 'rx-0' (00000000a261f51e): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1675.748675] kobject: 'rx-0' (00000000a261f51e): auto cleanup kobject_del [ 1675.755564] kobject: 'rx-0' (00000000a261f51e): calling ktype release [ 1675.762193] kobject: 'rx-0': free name [ 1675.766109] kobject: 'tx-0' (000000000f23779e): kobject_cleanup, parent 0000000030e54045 [ 1675.774377] kobject: 'tx-0' (000000000f23779e): auto cleanup 'remove' event [ 1675.781535] kobject: 'tx-0' (000000000f23779e): kobject_uevent_env [ 1675.787922] kobject: 'tx-0' (000000000f23779e): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1675.798090] kobject: 'tx-0' (000000000f23779e): auto cleanup kobject_del [ 1675.804974] kobject: 'tx-0' (000000000f23779e): calling ktype release [ 1675.811626] kobject: 'tx-0': free name [ 1675.815576] kobject: 'queues' (0000000030e54045): kobject_cleanup, parent (null) [ 1675.824064] kobject: 'queues' (0000000030e54045): calling ktype release [ 1675.830891] kobject: 'queues' (0000000030e54045): kset_release [ 1675.836891] kobject: 'queues': free name [ 1675.841358] kobject: 'ip6_vti0' (00000000da7ed492): kobject_uevent_env [ 1675.848100] kobject: 'ip6_vti0' (00000000da7ed492): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1675.859936] kobject: 'rx-0' (00000000b31b1ee6): kobject_cleanup, parent 00000000d8c8afc1 [ 1675.868217] kobject: 'rx-0' (00000000b31b1ee6): auto cleanup 'remove' event [ 1675.875315] kobject: 'rx-0' (00000000b31b1ee6): kobject_uevent_env [ 1675.881693] kobject: 'rx-0' (00000000b31b1ee6): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1675.891821] kobject: 'rx-0' (00000000b31b1ee6): auto cleanup kobject_del [ 1675.898737] kobject: 'rx-0' (00000000b31b1ee6): calling ktype release [ 1675.905311] kobject: 'rx-0': free name [ 1675.909246] kobject: 'tx-0' (000000007e175f16): kobject_cleanup, parent 00000000d8c8afc1 [ 1675.917515] kobject: 'tx-0' (000000007e175f16): auto cleanup 'remove' event [ 1675.924652] kobject: 'tx-0' (000000007e175f16): kobject_uevent_env [ 1675.931055] kobject: 'tx-0' (000000007e175f16): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1675.941247] kobject: 'tx-0' (000000007e175f16): auto cleanup kobject_del [ 1675.948143] kobject: 'tx-0' (000000007e175f16): calling ktype release [ 1675.954743] kobject: 'tx-0': free name [ 1675.958680] kobject: 'queues' (00000000d8c8afc1): kobject_cleanup, parent (null) [ 1675.967080] kobject: 'queues' (00000000d8c8afc1): calling ktype release [ 1675.973851] kobject: 'queues' (00000000d8c8afc1): kset_release [ 1675.979868] kobject: 'queues': free name [ 1675.984154] kobject: 'ip6_vti0' (0000000001a399e7): kobject_uevent_env [ 1675.990858] kobject: 'ip6_vti0' (0000000001a399e7): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1676.018044] kobject: 'ip6_vti0' (000000003335fb96): kobject_cleanup, parent (null) [ 1676.026621] kobject: 'ip6_vti0' (000000003335fb96): auto cleanup 'remove' event [ 1676.034133] kobject: 'ip6_vti0' (000000003335fb96): kobject_uevent_env [ 1676.040818] kobject: 'ip6_vti0' (000000003335fb96): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1676.051270] kobject: 'ip6_vti0' (000000003335fb96): calling ktype release [ 1676.058273] kobject: 'ip6_vti0': free name [ 1676.062518] kobject: 'ip6_vti0' (00000000b78d05eb): kobject_cleanup, parent (null) [ 1676.071139] kobject: 'ip6_vti0' (00000000b78d05eb): auto cleanup 'remove' event [ 1676.078611] kobject: 'ip6_vti0' (00000000b78d05eb): kobject_uevent_env [ 1676.085277] kobject: 'ip6_vti0' (00000000b78d05eb): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1676.095721] kobject: 'ip6_vti0' (00000000b78d05eb): calling ktype release [ 1676.102992] kobject: 'ip6_vti0': free name [ 1676.107264] kobject: 'ip6_vti0' (00000000fe1d567d): kobject_cleanup, parent (null) [ 1676.120562] kobject: 'ip6_vti0' (00000000fe1d567d): auto cleanup 'remove' event [ 1676.129814] kobject: 'ip6_vti0' (00000000fe1d567d): kobject_uevent_env [ 1676.136495] kobject: 'ip6_vti0' (00000000fe1d567d): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1676.151556] kobject: 'ip6_vti0' (00000000fe1d567d): calling ktype release [ 1676.157887] IPVS: ftp: loaded support on port[0] = 21 [ 1676.159332] kobject: 'ip6_vti0': free name [ 1676.168593] kobject: 'lo' (00000000eb9e0dd1): kobject_add_internal: parent: 'net', set: 'devices' [ 1676.178948] kobject: 'lo' (00000000eb9e0dd1): kobject_uevent_env [ 1676.185115] kobject: 'lo' (00000000eb9e0dd1): fill_kobj_path: path = '/devices/virtual/net/lo' [ 1676.194181] kobject: 'queues' (00000000c7365350): kobject_add_internal: parent: 'lo', set: '' [ 1676.203434] kobject: 'queues' (00000000c7365350): kobject_uevent_env [ 1676.209971] kobject: 'queues' (00000000c7365350): kobject_uevent_env: filter function caused the event to drop! [ 1676.220303] kobject: 'rx-0' (000000004307c4e5): kobject_add_internal: parent: 'queues', set: 'queues' [ 1676.229765] kobject: 'rx-0' (000000004307c4e5): kobject_uevent_env [ 1676.236132] kobject: 'rx-0' (000000004307c4e5): fill_kobj_path: path = '/devices/virtual/net/lo/queues/rx-0' [ 1676.246220] kobject: 'tx-0' (000000009793de74): kobject_add_internal: parent: 'queues', set: 'queues' [ 1676.255684] kobject: 'tx-0' (000000009793de74): kobject_uevent_env [ 1676.262155] kobject: 'tx-0' (000000009793de74): fill_kobj_path: path = '/devices/virtual/net/lo/queues/tx-0' [ 1676.272982] kobject: 'ip6_vti0' (000000006472567c): kobject_cleanup, parent (null) [ 1676.273196] kobject: 'tunl0' (000000004f197150): kobject_add_internal: parent: 'net', set: 'devices' [ 1676.285916] kobject: 'ip6_vti0' (000000006472567c): auto cleanup 'remove' event [ 1676.291424] kobject: 'tunl0' (000000004f197150): kobject_uevent_env [ 1676.302987] kobject: 'ip6_vti0' (000000006472567c): kobject_uevent_env [ 1676.304860] kobject: 'tunl0' (000000004f197150): fill_kobj_path: path = '/devices/virtual/net/tunl0' [ 1676.311755] kobject: 'ip6_vti0' (000000006472567c): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1676.320923] kobject: 'queues' (00000000fea7e208): kobject_add_internal: parent: 'tunl0', set: '' [ 1676.335769] kobject: 'ip6_vti0' (000000006472567c): calling ktype release [ 1676.341825] kobject: 'queues' (00000000fea7e208): kobject_uevent_env [ 1676.348092] kobject: 'ip6_vti0': free name [ 1676.357801] kobject: 'queues' (00000000fea7e208): kobject_uevent_env: filter function caused the event to drop! [ 1676.368874] kobject: 'rx-0' (000000004a15a090): kobject_add_internal: parent: 'queues', set: 'queues' [ 1676.378332] kobject: 'rx-0' (000000004a15a090): kobject_uevent_env [ 1676.384669] kobject: 'rx-0' (000000004a15a090): fill_kobj_path: path = '/devices/virtual/net/tunl0/queues/rx-0' [ 1676.395023] kobject: 'tx-0' (000000000e2165f3): kobject_add_internal: parent: 'queues', set: 'queues' [ 1676.404483] kobject: 'tx-0' (000000000e2165f3): kobject_uevent_env [ 1676.410873] kobject: 'tx-0' (000000000e2165f3): fill_kobj_path: path = '/devices/virtual/net/tunl0/queues/tx-0' [ 1676.422813] kobject: 'gre0' (00000000df18f8f0): kobject_add_internal: parent: 'net', set: 'devices' [ 1676.432499] kobject: 'gre0' (00000000df18f8f0): kobject_uevent_env [ 1676.438907] kobject: 'gre0' (00000000df18f8f0): fill_kobj_path: path = '/devices/virtual/net/gre0' [ 1676.448129] kobject: 'queues' (000000000df2b211): kobject_add_internal: parent: 'gre0', set: '' [ 1676.457506] kobject: 'queues' (000000000df2b211): kobject_uevent_env [ 1676.464100] kobject: 'queues' (000000000df2b211): kobject_uevent_env: filter function caused the event to drop! [ 1676.474382] kobject: 'rx-0' (0000000061a15c73): kobject_add_internal: parent: 'queues', set: 'queues' [ 1676.483833] kobject: 'rx-0' (0000000061a15c73): kobject_uevent_env [ 1676.490218] kobject: 'rx-0' (0000000061a15c73): fill_kobj_path: path = '/devices/virtual/net/gre0/queues/rx-0' [ 1676.500462] kobject: 'tx-0' (00000000f745ef4e): kobject_add_internal: parent: 'queues', set: 'queues' [ 1676.509976] kobject: 'tx-0' (00000000f745ef4e): kobject_uevent_env [ 1676.516322] kobject: 'tx-0' (00000000f745ef4e): fill_kobj_path: path = '/devices/virtual/net/gre0/queues/tx-0' [ 1676.527076] kobject: 'ip6_vti0' (00000000da7ed492): kobject_cleanup, parent (null) [ 1676.527256] kobject: 'gretap0' (000000002183ddd3): kobject_add_internal: parent: 'net', set: 'devices' [ 1676.539583] kobject: 'ip6_vti0' (00000000da7ed492): auto cleanup 'remove' event [ 1676.545692] kobject: 'gretap0' (000000002183ddd3): kobject_uevent_env [ 1676.556873] kobject: 'ip6_vti0' (00000000da7ed492): kobject_uevent_env [ 1676.559213] kobject: 'gretap0' (000000002183ddd3): fill_kobj_path: path = '/devices/virtual/net/gretap0' [ 1676.565907] kobject: 'ip6_vti0' (00000000da7ed492): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1676.575569] kobject: 'queues' (000000007208d0fc): kobject_add_internal: parent: 'gretap0', set: '' [ 1676.592373] kobject: 'ip6_vti0' (00000000da7ed492): calling ktype release [ 1676.595679] kobject: 'queues' (000000007208d0fc): kobject_uevent_env [ 1676.606502] kobject: 'ip6_vti0': free name [ 1676.609087] kobject: 'queues' (000000007208d0fc): kobject_uevent_env: filter function caused the event to drop! [ 1676.609112] kobject: 'rx-0' (0000000081424cea): kobject_add_internal: parent: 'queues', set: 'queues' [ 1676.609163] kobject: 'rx-0' (0000000081424cea): kobject_uevent_env [ 1676.609195] kobject: 'rx-0' (0000000081424cea): fill_kobj_path: path = '/devices/virtual/net/gretap0/queues/rx-0' [ 1676.650470] kobject: 'tx-0' (00000000645a7e49): kobject_add_internal: parent: 'queues', set: 'queues' [ 1676.659994] kobject: 'tx-0' (00000000645a7e49): kobject_uevent_env [ 1676.666362] kobject: 'tx-0' (00000000645a7e49): fill_kobj_path: path = '/devices/virtual/net/gretap0/queues/tx-0' [ 1676.677376] kobject: 'batman_adv' (00000000e3da5e08): kobject_add_internal: parent: 'gretap0', set: '' [ 1676.687828] kobject: 'erspan0' (00000000d7881d8a): kobject_add_internal: parent: 'net', set: 'devices' [ 1676.697858] kobject: 'erspan0' (00000000d7881d8a): kobject_uevent_env [ 1676.704458] kobject: 'erspan0' (00000000d7881d8a): fill_kobj_path: path = '/devices/virtual/net/erspan0' [ 1676.714182] kobject: 'queues' (00000000ad51e67d): kobject_add_internal: parent: 'erspan0', set: '' [ 1676.723871] kobject: 'queues' (00000000ad51e67d): kobject_uevent_env [ 1676.730396] kobject: 'queues' (00000000ad51e67d): kobject_uevent_env: filter function caused the event to drop! [ 1676.740667] kobject: 'rx-0' (00000000c7f249d3): kobject_add_internal: parent: 'queues', set: 'queues' [ 1676.750091] kobject: 'rx-0' (00000000c7f249d3): kobject_uevent_env [ 1676.756436] kobject: 'rx-0' (00000000c7f249d3): fill_kobj_path: path = '/devices/virtual/net/erspan0/queues/rx-0' [ 1676.766968] kobject: 'tx-0' (000000002fc9682c): kobject_add_internal: parent: 'queues', set: 'queues' [ 1676.776483] kobject: 'tx-0' (000000002fc9682c): kobject_uevent_env [ 1676.782868] kobject: 'tx-0' (000000002fc9682c): fill_kobj_path: path = '/devices/virtual/net/erspan0/queues/tx-0' [ 1676.794200] kobject: 'batman_adv' (0000000048d0f8dd): kobject_add_internal: parent: 'erspan0', set: '' [ 1676.804516] kobject: 'ip6_vti0' (0000000001a399e7): kobject_cleanup, parent (null) [ 1676.804712] kobject: 'ip_vti0' (000000005163af19): kobject_add_internal: parent: 'net', set: 'devices' [ 1676.817416] kobject: 'ip6_vti0' (0000000001a399e7): auto cleanup 'remove' event [ 1676.823124] kobject: 'ip_vti0' (000000005163af19): kobject_uevent_env [ 1676.834652] kobject: 'ip6_vti0' (0000000001a399e7): kobject_uevent_env [ 1676.836688] kobject: 'ip_vti0' (000000005163af19): fill_kobj_path: path = '/devices/virtual/net/ip_vti0' [ 1676.843684] kobject: 'ip6_vti0' (0000000001a399e7): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1676.853183] kobject: 'queues' (00000000b80a9788): kobject_add_internal: parent: 'ip_vti0', set: '' [ 1676.868120] kobject: 'ip6_vti0' (0000000001a399e7): calling ktype release [ 1676.873225] kobject: 'queues' (00000000b80a9788): kobject_uevent_env [ 1676.884315] kobject: 'ip6_vti0': free name [ 1676.886600] kobject: 'queues' (00000000b80a9788): kobject_uevent_env: filter function caused the event to drop! [ 1676.901096] kobject: 'rx-0' (00000000c7cca240): kobject_add_internal: parent: 'queues', set: 'queues' [ 1676.910540] kobject: 'rx-0' (00000000c7cca240): kobject_uevent_env [ 1676.916907] kobject: 'rx-0' (00000000c7cca240): fill_kobj_path: path = '/devices/virtual/net/ip_vti0/queues/rx-0' [ 1676.927419] kobject: 'tx-0' (00000000629f7975): kobject_add_internal: parent: 'queues', set: 'queues' [ 1676.936856] kobject: 'tx-0' (00000000629f7975): kobject_uevent_env [ 1676.943261] kobject: 'tx-0' (00000000629f7975): fill_kobj_path: path = '/devices/virtual/net/ip_vti0/queues/tx-0' [ 1676.986606] kobject: 'rx-0' (00000000d8358686): kobject_cleanup, parent 000000008d639abc [ 1676.995164] kobject: 'rx-0' (00000000d8358686): auto cleanup 'remove' event [ 1677.002308] kobject: 'rx-0' (00000000d8358686): kobject_uevent_env [ 1677.008658] kobject: 'rx-0' (00000000d8358686): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1677.018749] kobject: 'rx-0' (00000000d8358686): auto cleanup kobject_del [ 1677.025604] kobject: 'rx-0' (00000000d8358686): calling ktype release [ 1677.032201] kobject: 'rx-0': free name [ 1677.036105] kobject: 'tx-0' (00000000d9c640e2): kobject_cleanup, parent 000000008d639abc [ 1677.044361] kobject: 'tx-0' (00000000d9c640e2): auto cleanup 'remove' event [ 1677.051467] kobject: 'tx-0' (00000000d9c640e2): kobject_uevent_env [ 1677.057814] kobject: 'tx-0' (00000000d9c640e2): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1677.067885] kobject: 'tx-0' (00000000d9c640e2): auto cleanup kobject_del [ 1677.074718] kobject: 'tx-0' (00000000d9c640e2): calling ktype release [ 1677.081336] kobject: 'tx-0': free name [ 1677.085233] kobject: 'queues' (000000008d639abc): kobject_cleanup, parent (null) [ 1677.093653] kobject: 'queues' (000000008d639abc): calling ktype release [ 1677.100452] kobject: 'queues' (000000008d639abc): kset_release [ 1677.106415] kobject: 'queues': free name [ 1677.110811] kobject: 'ip_vti0' (0000000077b98c40): kobject_uevent_env [ 1677.117386] kobject: 'ip_vti0' (0000000077b98c40): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1677.129119] kobject: 'rx-0' (0000000065bcc2fc): kobject_cleanup, parent 00000000461cacaf [ 1677.137350] kobject: 'rx-0' (0000000065bcc2fc): auto cleanup 'remove' event [ 1677.144895] kobject: 'rx-0' (0000000065bcc2fc): kobject_uevent_env [ 1677.151294] kobject: 'rx-0' (0000000065bcc2fc): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1677.161676] kobject: 'rx-0' (0000000065bcc2fc): auto cleanup kobject_del [ 1677.168569] kobject: 'rx-0' (0000000065bcc2fc): calling ktype release [ 1677.175152] kobject: 'rx-0': free name [ 1677.179126] kobject: 'tx-0' (0000000080133407): kobject_cleanup, parent 00000000461cacaf [ 1677.187345] kobject: 'tx-0' (0000000080133407): auto cleanup 'remove' event [ 1677.194452] kobject: 'tx-0' (0000000080133407): kobject_uevent_env [ 1677.200817] kobject: 'tx-0' (0000000080133407): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1677.210907] kobject: 'tx-0' (0000000080133407): auto cleanup kobject_del [ 1677.217900] kobject: 'tx-0' (0000000080133407): calling ktype release [ 1677.224481] kobject: 'tx-0': free name [ 1677.228397] kobject: 'queues' (00000000461cacaf): kobject_cleanup, parent (null) [ 1677.236803] kobject: 'queues' (00000000461cacaf): calling ktype release [ 1677.243792] kobject: 'queues' (00000000461cacaf): kset_release [ 1677.249815] kobject: 'queues': free name [ 1677.254064] kobject: 'ip_vti0' (00000000e308694f): kobject_uevent_env [ 1677.260671] kobject: 'ip_vti0' (00000000e308694f): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1677.272115] kobject: 'rx-0' (000000005a63804d): kobject_cleanup, parent 00000000793c29e2 [ 1677.280377] kobject: 'rx-0' (000000005a63804d): auto cleanup 'remove' event [ 1677.287476] kobject: 'rx-0' (000000005a63804d): kobject_uevent_env [ 1677.293827] kobject: 'rx-0' (000000005a63804d): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1677.303917] kobject: 'rx-0' (000000005a63804d): auto cleanup kobject_del [ 1677.310821] kobject: 'rx-0' (000000005a63804d): calling ktype release [ 1677.317386] kobject: 'rx-0': free name [ 1677.321317] kobject: 'tx-0' (0000000021375301): kobject_cleanup, parent 00000000793c29e2 [ 1677.329572] kobject: 'tx-0' (0000000021375301): auto cleanup 'remove' event [ 1677.336657] kobject: 'tx-0' (0000000021375301): kobject_uevent_env [ 1677.342989] kobject: 'tx-0' (0000000021375301): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1677.353075] kobject: 'tx-0' (0000000021375301): auto cleanup kobject_del [ 1677.359994] kobject: 'tx-0' (0000000021375301): calling ktype release [ 1677.366582] kobject: 'tx-0': free name [ 1677.370519] kobject: 'queues' (00000000793c29e2): kobject_cleanup, parent (null) [ 1677.379069] kobject: 'queues' (00000000793c29e2): calling ktype release [ 1677.385815] kobject: 'queues' (00000000793c29e2): kset_release [ 1677.391823] kobject: 'queues': free name [ 1677.396090] kobject: 'ip_vti0' (00000000c06f6afe): kobject_uevent_env [ 1677.402864] kobject: 'ip_vti0' (00000000c06f6afe): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1677.414290] kobject: 'rx-0' (0000000099c5a567): kobject_cleanup, parent 00000000bb3ddabc [ 1677.422585] kobject: 'rx-0' (0000000099c5a567): auto cleanup 'remove' event [ 1677.429708] kobject: 'rx-0' (0000000099c5a567): kobject_uevent_env [ 1677.436046] kobject: 'rx-0' (0000000099c5a567): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1677.446119] kobject: 'rx-0' (0000000099c5a567): auto cleanup kobject_del [ 1677.452980] kobject: 'rx-0' (0000000099c5a567): calling ktype release [ 1677.459695] kobject: 'rx-0': free name [ 1677.463628] kobject: 'tx-0' (00000000479bb783): kobject_cleanup, parent 00000000bb3ddabc [ 1677.471899] kobject: 'tx-0' (00000000479bb783): auto cleanup 'remove' event [ 1677.479030] kobject: 'tx-0' (00000000479bb783): kobject_uevent_env [ 1677.485349] kobject: 'tx-0' (00000000479bb783): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1677.495414] kobject: 'tx-0' (00000000479bb783): auto cleanup kobject_del [ 1677.502283] kobject: 'tx-0' (00000000479bb783): calling ktype release [ 1677.508880] kobject: 'tx-0': free name [ 1677.512787] kobject: 'queues' (00000000bb3ddabc): kobject_cleanup, parent (null) [ 1677.521209] kobject: 'queues' (00000000bb3ddabc): calling ktype release [ 1677.528001] kobject: 'queues' (00000000bb3ddabc): kset_release [ 1677.533957] kobject: 'queues': free name [ 1677.538352] kobject: 'ip_vti0' (000000003fecfb28): kobject_uevent_env [ 1677.544934] kobject: 'ip_vti0' (000000003fecfb28): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1677.556354] kobject: 'rx-0' (00000000c31864eb): kobject_cleanup, parent 000000004c9470c8 [ 1677.564605] kobject: 'rx-0' (00000000c31864eb): auto cleanup 'remove' event [ 1677.571730] kobject: 'rx-0' (00000000c31864eb): kobject_uevent_env [ 1677.578091] kobject: 'rx-0' (00000000c31864eb): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1677.588170] kobject: 'rx-0' (00000000c31864eb): auto cleanup kobject_del [ 1677.595012] kobject: 'rx-0' (00000000c31864eb): calling ktype release [ 1677.601693] kobject: 'rx-0': free name [ 1677.605613] kobject: 'tx-0' (00000000f186f09b): kobject_cleanup, parent 000000004c9470c8 [ 1677.613878] kobject: 'tx-0' (00000000f186f09b): auto cleanup 'remove' event [ 1677.621159] kobject: 'tx-0' (00000000f186f09b): kobject_uevent_env [ 1677.627458] kobject: 'tx-0' (00000000f186f09b): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1677.637544] kobject: 'tx-0' (00000000f186f09b): auto cleanup kobject_del [ 1677.644445] kobject: 'tx-0' (00000000f186f09b): calling ktype release [ 1677.651059] kobject: 'tx-0': free name [ 1677.654961] kobject: 'queues' (000000004c9470c8): kobject_cleanup, parent (null) [ 1677.663388] kobject: 'queues' (000000004c9470c8): calling ktype release [ 1677.670190] kobject: 'queues' (000000004c9470c8): kset_release [ 1677.676141] kobject: 'queues': free name [ 1677.680534] kobject: 'ip_vti0' (00000000ffc71d2c): kobject_uevent_env [ 1677.687107] kobject: 'ip_vti0' (00000000ffc71d2c): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1677.698821] kobject: 'rx-0' (000000000d3b09a0): kobject_cleanup, parent 000000007d5a801b [ 1677.707047] kobject: 'rx-0' (000000000d3b09a0): auto cleanup 'remove' event [ 1677.714191] kobject: 'rx-0' (000000000d3b09a0): kobject_uevent_env [ 1677.720655] kobject: 'rx-0' (000000000d3b09a0): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1677.730746] kobject: 'rx-0' (000000000d3b09a0): auto cleanup kobject_del [ 1677.737601] kobject: 'rx-0' (000000000d3b09a0): calling ktype release [ 1677.744227] kobject: 'rx-0': free name [ 1677.748176] kobject: 'tx-0' (0000000060700df1): kobject_cleanup, parent 000000007d5a801b [ 1677.756403] kobject: 'tx-0' (0000000060700df1): auto cleanup 'remove' event [ 1677.763630] kobject: 'tx-0' (0000000060700df1): kobject_uevent_env [ 1677.770006] kobject: 'tx-0' (0000000060700df1): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1677.780305] kobject: 'tx-0' (0000000060700df1): auto cleanup kobject_del [ 1677.787157] kobject: 'tx-0' (0000000060700df1): calling ktype release [ 1677.793745] kobject: 'tx-0': free name [ 1677.797637] kobject: 'queues' (000000007d5a801b): kobject_cleanup, parent (null) [ 1677.806082] kobject: 'queues' (000000007d5a801b): calling ktype release [ 1677.812881] kobject: 'queues' (000000007d5a801b): kset_release [ 1677.818878] kobject: 'queues': free name [ 1677.823174] kobject: 'ip_vti0' (0000000043d95be0): kobject_uevent_env [ 1677.829780] kobject: 'ip_vti0' (0000000043d95be0): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1677.840413] kobject: 'ip6_vti0' (00000000f759bc8c): kobject_add_internal: parent: 'net', set: 'devices' [ 1677.850609] kobject: 'ip6_vti0' (00000000f759bc8c): kobject_uevent_env [ 1677.857284] kobject: 'ip6_vti0' (00000000f759bc8c): fill_kobj_path: path = '/devices/virtual/net/ip6_vti0' [ 1677.867172] kobject: 'queues' (0000000089045912): kobject_add_internal: parent: 'ip6_vti0', set: '' [ 1677.876915] kobject: 'queues' (0000000089045912): kobject_uevent_env [ 1677.883438] kobject: 'queues' (0000000089045912): kobject_uevent_env: filter function caused the event to drop! [ 1677.893704] kobject: 'rx-0' (00000000155fc434): kobject_add_internal: parent: 'queues', set: 'queues' [ 1677.903160] kobject: 'rx-0' (00000000155fc434): kobject_uevent_env [ 1677.909503] kobject: 'rx-0' (00000000155fc434): fill_kobj_path: path = '/devices/virtual/net/ip6_vti0/queues/rx-0' [ 1677.920085] kobject: 'tx-0' (00000000cbd885ec): kobject_add_internal: parent: 'queues', set: 'queues' [ 1677.929510] kobject: 'tx-0' (00000000cbd885ec): kobject_uevent_env [ 1677.936284] kobject: 'tx-0' (00000000cbd885ec): fill_kobj_path: path = '/devices/virtual/net/ip6_vti0/queues/tx-0' [ 1677.947902] kobject: 'ip_vti0' (0000000077b98c40): kobject_cleanup, parent (null) [ 1677.948038] kobject: 'sit0' (000000009cad87d1): kobject_add_internal: parent: 'net', set: 'devices' [ 1677.956398] kobject: 'ip_vti0' (0000000077b98c40): auto cleanup 'remove' event [ 1677.966118] kobject: 'sit0' (000000009cad87d1): kobject_uevent_env [ 1677.977249] kobject: 'ip_vti0' (0000000077b98c40): kobject_uevent_env [ 1677.979355] kobject: 'sit0' (000000009cad87d1): fill_kobj_path: path = '/devices/virtual/net/sit0' [ 1677.985988] kobject: 'ip_vti0' (0000000077b98c40): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1677.995101] kobject: 'queues' (000000006a6296bc): kobject_add_internal: parent: 'sit0', set: '' [ 1678.016992] kobject: 'ip_vti0' (0000000077b98c40): calling ktype release [ 1678.020841] kobject: 'queues' (000000006a6296bc): kobject_uevent_env [ 1678.026997] kobject: 'ip_vti0': free name [ 1678.032676] kobject: 'queues' (000000006a6296bc): kobject_uevent_env: filter function caused the event to drop! [ 1678.044806] kobject: 'rx-0' (00000000d3b59593): kobject_add_internal: parent: 'queues', set: 'queues' [ 1678.054331] kobject: 'rx-0' (00000000d3b59593): kobject_uevent_env [ 1678.060735] kobject: 'rx-0' (00000000d3b59593): fill_kobj_path: path = '/devices/virtual/net/sit0/queues/rx-0' [ 1678.071061] kobject: 'tx-0' (00000000ebf26b9f): kobject_add_internal: parent: 'queues', set: 'queues' [ 1678.080617] kobject: 'tx-0' (00000000ebf26b9f): kobject_uevent_env [ 1678.087111] kobject: 'tx-0' (00000000ebf26b9f): fill_kobj_path: path = '/devices/virtual/net/sit0/queues/tx-0' [ 1678.098048] kobject: 'ip_vti0' (00000000e308694f): kobject_cleanup, parent (null) [ 1678.098197] kobject: 'ip6tnl0' (000000002d2cff83): kobject_add_internal: parent: 'net', set: 'devices' [ 1678.106538] kobject: 'ip_vti0' (00000000e308694f): auto cleanup 'remove' event [ 1678.116442] kobject: 'ip6tnl0' (000000002d2cff83): kobject_uevent_env [ 1678.127402] kobject: 'ip_vti0' (00000000e308694f): kobject_uevent_env [ 1678.130015] kobject: 'ip6tnl0' (000000002d2cff83): fill_kobj_path: path = '/devices/virtual/net/ip6tnl0' [ 1678.136635] kobject: 'ip_vti0' (00000000e308694f): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1678.146262] kobject: 'queues' (00000000f822ec67): kobject_add_internal: parent: 'ip6tnl0', set: '' [ 1678.161440] kobject: 'ip_vti0' (00000000e308694f): calling ktype release [ 1678.166286] kobject: 'queues' (00000000f822ec67): kobject_uevent_env [ 1678.174436] kobject: 'ip_vti0': free name [ 1678.179599] kobject: 'queues' (00000000f822ec67): kobject_uevent_env: filter function caused the event to drop! [ 1678.179633] kobject: 'rx-0' (00000000031d627c): kobject_add_internal: parent: 'queues', set: 'queues' [ 1678.179715] kobject: 'rx-0' (00000000031d627c): kobject_uevent_env [ 1678.209924] kobject: 'rx-0' (00000000031d627c): fill_kobj_path: path = '/devices/virtual/net/ip6tnl0/queues/rx-0' [ 1678.220428] kobject: 'tx-0' (0000000086a717b2): kobject_add_internal: parent: 'queues', set: 'queues' [ 1678.229885] kobject: 'tx-0' (0000000086a717b2): kobject_uevent_env [ 1678.236200] kobject: 'tx-0' (0000000086a717b2): fill_kobj_path: path = '/devices/virtual/net/ip6tnl0/queues/tx-0' [ 1678.247447] kobject: 'ip_vti0' (00000000c06f6afe): kobject_cleanup, parent (null) [ 1678.247661] kobject: 'ip6gre0' (000000000053d88d): kobject_add_internal: parent: 'net', set: 'devices' [ 1678.256986] kobject: 'ip_vti0' (00000000c06f6afe): auto cleanup 'remove' event [ 1678.266376] kobject: 'ip6gre0' (000000000053d88d): kobject_uevent_env [ 1678.277683] kobject: 'ip_vti0' (00000000c06f6afe): kobject_uevent_env [ 1678.279594] kobject: 'ip6gre0' (000000000053d88d): fill_kobj_path: path = '/devices/virtual/net/ip6gre0' [ 1678.286230] kobject: 'ip_vti0' (00000000c06f6afe): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1678.295853] kobject: 'queues' (000000000b273c02): kobject_add_internal: parent: 'ip6gre0', set: '' [ 1678.310978] kobject: 'ip_vti0' (00000000c06f6afe): calling ktype release [ 1678.315877] kobject: 'queues' (000000000b273c02): kobject_uevent_env [ 1678.324249] kobject: 'ip_vti0': free name [ 1678.329198] kobject: 'queues' (000000000b273c02): kobject_uevent_env: filter function caused the event to drop! [ 1678.329221] kobject: 'rx-0' (000000001d98d8d3): kobject_add_internal: parent: 'queues', set: 'queues' [ 1678.329261] kobject: 'rx-0' (000000001d98d8d3): kobject_uevent_env [ 1678.359768] kobject: 'rx-0' (000000001d98d8d3): fill_kobj_path: path = '/devices/virtual/net/ip6gre0/queues/rx-0' [ 1678.370318] kobject: 'tx-0' (00000000a9a6322b): kobject_add_internal: parent: 'queues', set: 'queues' [ 1678.379767] kobject: 'tx-0' (00000000a9a6322b): kobject_uevent_env [ 1678.386092] kobject: 'tx-0' (00000000a9a6322b): fill_kobj_path: path = '/devices/virtual/net/ip6gre0/queues/tx-0' [ 1678.397200] kobject: 'ip_vti0' (000000003fecfb28): kobject_cleanup, parent (null) [ 1678.398091] kobject: 'syz_tun' (00000000d30d29c9): kobject_add_internal: parent: 'net', set: 'devices' [ 1678.407232] kobject: 'ip_vti0' (000000003fecfb28): auto cleanup 'remove' event [ 1678.415677] kobject: 'syz_tun' (00000000d30d29c9): kobject_uevent_env [ 1678.429236] kobject: 'syz_tun' (00000000d30d29c9): fill_kobj_path: path = '/devices/virtual/net/syz_tun' [ 1678.429337] kobject: 'ip_vti0' (000000003fecfb28): kobject_uevent_env [ 1678.438962] kobject: 'queues' (000000005f3e0c77): kobject_add_internal: parent: 'syz_tun', set: '' [ 1678.449702] kobject: 'ip_vti0' (000000003fecfb28): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1678.455175] kobject: 'queues' (000000005f3e0c77): kobject_uevent_env [ 1678.470396] kobject: 'ip_vti0' (000000003fecfb28): calling ktype release [ 1678.471975] kobject: 'queues' (000000005f3e0c77): kobject_uevent_env: filter function caused the event to drop! [ 1678.481118] kobject: 'ip_vti0': free name [ 1678.491393] kobject: 'rx-0' (00000000bfc2573c): kobject_add_internal: parent: 'queues', set: 'queues' [ 1678.503623] kobject: 'rx-0' (00000000bfc2573c): kobject_uevent_env [ 1678.510134] kobject: 'rx-0' (00000000bfc2573c): fill_kobj_path: path = '/devices/virtual/net/syz_tun/queues/rx-0' [ 1678.520649] kobject: 'tx-0' (00000000f2761b17): kobject_add_internal: parent: 'queues', set: 'queues' [ 1678.530169] kobject: 'tx-0' (00000000f2761b17): kobject_uevent_env [ 1678.536508] kobject: 'tx-0' (00000000f2761b17): fill_kobj_path: path = '/devices/virtual/net/syz_tun/queues/tx-0' [ 1678.547569] kobject: 'batman_adv' (0000000022d6c74d): kobject_add_internal: parent: 'syz_tun', set: '' [ 1678.558005] kobject: 'ip_vti0' (00000000ffc71d2c): kobject_cleanup, parent (null) [ 1678.562792] kobject: 'ip6gretap0' (00000000b56b315e): kobject_add_internal: parent: 'net', set: 'devices' [ 1678.566507] kobject: 'ip_vti0' (00000000ffc71d2c): auto cleanup 'remove' event [ 1678.576986] kobject: 'ip6gretap0' (00000000b56b315e): kobject_uevent_env [ 1678.590070] kobject: 'ip_vti0' (00000000ffc71d2c): kobject_uevent_env [ 1678.590787] kobject: 'ip6gretap0' (00000000b56b315e): fill_kobj_path: path = '/devices/virtual/net/ip6gretap0' [ 1678.597165] kobject: 'ip_vti0' (00000000ffc71d2c): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1678.607394] kobject: 'queues' (000000000b84994f): kobject_add_internal: parent: 'ip6gretap0', set: '' [ 1678.622154] kobject: 'ip_vti0' (00000000ffc71d2c): calling ktype release [ 1678.627939] kobject: 'queues' (000000000b84994f): kobject_uevent_env [ 1678.634663] kobject: 'ip_vti0': free name [ 1678.640919] kobject: 'queues' (000000000b84994f): kobject_uevent_env: filter function caused the event to drop! [ 1678.640943] kobject: 'rx-0' (0000000044701986): kobject_add_internal: parent: 'queues', set: 'queues' [ 1678.640983] kobject: 'rx-0' (0000000044701986): kobject_uevent_env [ 1678.671170] kobject: 'rx-0' (0000000044701986): fill_kobj_path: path = '/devices/virtual/net/ip6gretap0/queues/rx-0' [ 1678.681911] kobject: 'tx-0' (000000007e7e0b55): kobject_add_internal: parent: 'queues', set: 'queues' [ 1678.691355] kobject: 'tx-0' (000000007e7e0b55): kobject_uevent_env [ 1678.697683] kobject: 'tx-0' (000000007e7e0b55): fill_kobj_path: path = '/devices/virtual/net/ip6gretap0/queues/tx-0' [ 1678.709114] kobject: 'batman_adv' (0000000086e0cc8b): kobject_add_internal: parent: 'ip6gretap0', set: '' [ 1678.719697] kobject: 'ip_vti0' (0000000043d95be0): kobject_cleanup, parent (null) [ 1678.720167] kobject: 'bridge0' (00000000b7993330): kobject_add_internal: parent: 'net', set: 'devices' [ 1678.730461] kobject: 'ip_vti0' (0000000043d95be0): auto cleanup 'remove' event [ 1678.738181] kobject: 'bridge0' (00000000b7993330): kobject_uevent_env [ 1678.752211] kobject: 'bridge0' (00000000b7993330): fill_kobj_path: path = '/devices/virtual/net/bridge0' [ 1678.753754] kobject: 'ip_vti0' (0000000043d95be0): kobject_uevent_env [ 1678.763008] kobject: 'queues' (0000000069ccfaa1): kobject_add_internal: parent: 'bridge0', set: '' [ 1678.772758] kobject: 'ip_vti0' (0000000043d95be0): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1678.778219] kobject: 'queues' (0000000069ccfaa1): kobject_uevent_env [ 1678.793078] kobject: 'ip_vti0' (0000000043d95be0): calling ktype release [ 1678.795094] kobject: 'queues' (0000000069ccfaa1): kobject_uevent_env: filter function caused the event to drop! [ 1678.802215] kobject: 'ip_vti0': free name [ 1678.812211] kobject: 'rx-0' (000000007e6664ab): kobject_add_internal: parent: 'queues', set: 'queues' [ 1678.812257] kobject: 'rx-0' (000000007e6664ab): kobject_uevent_env [ 1678.832076] kobject: 'rx-0' (000000007e6664ab): fill_kobj_path: path = '/devices/virtual/net/bridge0/queues/rx-0' [ 1678.842593] kobject: 'tx-0' (00000000b9603b5e): kobject_add_internal: parent: 'queues', set: 'queues' [ 1678.852055] kobject: 'tx-0' (00000000b9603b5e): kobject_uevent_env [ 1678.858406] kobject: 'tx-0' (00000000b9603b5e): fill_kobj_path: path = '/devices/virtual/net/bridge0/queues/tx-0' [ 1678.869611] kobject: 'brif' (00000000078d6ac1): kobject_add_internal: parent: 'bridge0', set: '' [ 1678.879601] kobject: 'batman_adv' (00000000e16326e3): kobject_add_internal: parent: 'bridge0', set: '' [ 1678.915545] kobject: 'batman_adv' (0000000024ff95ec): kobject_uevent_env [ 1678.922432] kobject: 'batman_adv' (0000000024ff95ec): kobject_uevent_env: filter function caused the event to drop! [ 1678.933077] kobject: 'batman_adv' (0000000024ff95ec): kobject_cleanup, parent (null) [ 1678.941947] kobject: 'batman_adv' (0000000024ff95ec): calling ktype release [ 1678.949105] kobject: (0000000024ff95ec): dynamic_kobj_release [ 1678.954991] kobject: 'batman_adv': free name [ 1678.959602] kobject: 'rx-0' (00000000b6475089): kobject_cleanup, parent 000000005b00ce95 [ 1678.967887] kobject: 'rx-0' (00000000b6475089): auto cleanup 'remove' event [ 1678.974984] kobject: 'rx-0' (00000000b6475089): kobject_uevent_env [ 1678.981332] kobject: 'rx-0' (00000000b6475089): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1678.991411] kobject: 'rx-0' (00000000b6475089): auto cleanup kobject_del [ 1678.998288] kobject: 'rx-0' (00000000b6475089): calling ktype release [ 1679.004857] kobject: 'rx-0': free name [ 1679.009124] kobject: 'tx-0' (0000000016836ef7): kobject_cleanup, parent 000000005b00ce95 [ 1679.017339] kobject: 'tx-0' (0000000016836ef7): auto cleanup 'remove' event [ 1679.024458] kobject: 'tx-0' (0000000016836ef7): kobject_uevent_env [ 1679.031710] kobject: 'tx-0' (0000000016836ef7): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1679.041879] kobject: 'tx-0' (0000000016836ef7): auto cleanup kobject_del [ 1679.048875] kobject: 'tx-0' (0000000016836ef7): calling ktype release [ 1679.055464] kobject: 'tx-0': free name [ 1679.059381] kobject: 'queues' (000000005b00ce95): kobject_cleanup, parent (null) [ 1679.067828] kobject: 'queues' (000000005b00ce95): calling ktype release [ 1679.074578] kobject: 'queues' (000000005b00ce95): kset_release [ 1679.080600] kobject: 'queues': free name [ 1679.084845] kobject: 'erspan0' (00000000875ab24b): kobject_uevent_env [ 1679.091442] kobject: 'erspan0' (00000000875ab24b): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1679.102668] kobject: 'batman_adv' (0000000069831e57): kobject_uevent_env [ 1679.109533] kobject: 'batman_adv' (0000000069831e57): kobject_uevent_env: filter function caused the event to drop! [ 1679.120146] kobject: 'batman_adv' (0000000069831e57): kobject_cleanup, parent (null) [ 1679.128922] kobject: 'batman_adv' (0000000069831e57): calling ktype release [ 1679.136069] kobject: (0000000069831e57): dynamic_kobj_release [ 1679.142171] kobject: 'batman_adv': free name [ 1679.146686] kobject: 'rx-0' (00000000b7caa1ce): kobject_cleanup, parent 00000000753107a9 [ 1679.154935] kobject: 'rx-0' (00000000b7caa1ce): auto cleanup 'remove' event [ 1679.162046] kobject: 'rx-0' (00000000b7caa1ce): kobject_uevent_env [ 1679.168384] kobject: 'rx-0' (00000000b7caa1ce): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1679.178452] kobject: 'rx-0' (00000000b7caa1ce): auto cleanup kobject_del [ 1679.185318] kobject: 'rx-0' (00000000b7caa1ce): calling ktype release [ 1679.191904] kobject: 'rx-0': free name [ 1679.195809] kobject: 'tx-0' (00000000f0955126): kobject_cleanup, parent 00000000753107a9 [ 1679.204066] kobject: 'tx-0' (00000000f0955126): auto cleanup 'remove' event [ 1679.211202] kobject: 'tx-0' (00000000f0955126): kobject_uevent_env [ 1679.217501] kobject: 'tx-0' (00000000f0955126): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1679.227573] kobject: 'tx-0' (00000000f0955126): auto cleanup kobject_del [ 1679.234456] kobject: 'tx-0' (00000000f0955126): calling ktype release [ 1679.241036] kobject: 'tx-0': free name [ 1679.244931] kobject: 'queues' (00000000753107a9): kobject_cleanup, parent (null) [ 1679.253344] kobject: 'queues' (00000000753107a9): calling ktype release [ 1679.260120] kobject: 'queues' (00000000753107a9): kset_release [ 1679.266086] kobject: 'queues': free name [ 1679.270520] kobject: 'erspan0' (000000003a956149): kobject_uevent_env [ 1679.277093] kobject: 'erspan0' (000000003a956149): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1679.288519] kobject: 'batman_adv' (00000000b0c50191): kobject_uevent_env [ 1679.295367] kobject: 'batman_adv' (00000000b0c50191): kobject_uevent_env: filter function caused the event to drop! [ 1679.306269] kobject: 'batman_adv' (00000000b0c50191): kobject_cleanup, parent (null) [ 1679.315037] kobject: 'batman_adv' (00000000b0c50191): calling ktype release [ 1679.322155] kobject: (00000000b0c50191): dynamic_kobj_release [ 1679.328046] kobject: 'batman_adv': free name [ 1679.332559] kobject: 'rx-0' (00000000f6c404b1): kobject_cleanup, parent 000000008117dfeb [ 1679.340815] kobject: 'rx-0' (00000000f6c404b1): auto cleanup 'remove' event [ 1679.347947] kobject: 'rx-0' (00000000f6c404b1): kobject_uevent_env [ 1679.354258] kobject: 'rx-0' (00000000f6c404b1): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1679.364319] kobject: 'rx-0' (00000000f6c404b1): auto cleanup kobject_del [ 1679.371187] kobject: 'rx-0' (00000000f6c404b1): calling ktype release [ 1679.377787] kobject: 'rx-0': free name [ 1679.381699] kobject: 'tx-0' (0000000037e3b1fe): kobject_cleanup, parent 000000008117dfeb [ 1679.389949] kobject: 'tx-0' (0000000037e3b1fe): auto cleanup 'remove' event [ 1679.397043] kobject: 'tx-0' (0000000037e3b1fe): kobject_uevent_env [ 1679.403640] kobject: 'tx-0' (0000000037e3b1fe): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1679.413735] kobject: 'tx-0' (0000000037e3b1fe): auto cleanup kobject_del [ 1679.420685] kobject: 'tx-0' (0000000037e3b1fe): calling ktype release [ 1679.427238] kobject: 'tx-0': free name [ 1679.431140] kobject: 'queues' (000000008117dfeb): kobject_cleanup, parent (null) [ 1679.439582] kobject: 'queues' (000000008117dfeb): calling ktype release [ 1679.446317] kobject: 'queues' (000000008117dfeb): kset_release [ 1679.452301] kobject: 'queues': free name [ 1679.456527] kobject: 'erspan0' (00000000b1cf0c57): kobject_uevent_env [ 1679.463214] kobject: 'erspan0' (00000000b1cf0c57): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1679.474254] kobject: 'batman_adv' (00000000eeef44b8): kobject_uevent_env [ 1679.481114] kobject: 'batman_adv' (00000000eeef44b8): kobject_uevent_env: filter function caused the event to drop! [ 1679.491720] kobject: 'batman_adv' (00000000eeef44b8): kobject_cleanup, parent (null) [ 1679.500480] kobject: 'batman_adv' (00000000eeef44b8): calling ktype release [ 1679.507565] kobject: (00000000eeef44b8): dynamic_kobj_release [ 1679.513462] kobject: 'batman_adv': free name [ 1679.518010] kobject: 'rx-0' (0000000034ed3aeb): kobject_cleanup, parent 0000000063efc46d [ 1679.526236] kobject: 'rx-0' (0000000034ed3aeb): auto cleanup 'remove' event [ 1679.533640] kobject: 'rx-0' (0000000034ed3aeb): kobject_uevent_env [ 1679.539997] kobject: 'rx-0' (0000000034ed3aeb): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1679.550092] kobject: 'rx-0' (0000000034ed3aeb): auto cleanup kobject_del [ 1679.556919] kobject: 'rx-0' (0000000034ed3aeb): calling ktype release [ 1679.563530] kobject: 'rx-0': free name [ 1679.567432] kobject: 'tx-0' (00000000db1d535f): kobject_cleanup, parent 0000000063efc46d [ 1679.575682] kobject: 'tx-0' (00000000db1d535f): auto cleanup 'remove' event [ 1679.582799] kobject: 'tx-0' (00000000db1d535f): kobject_uevent_env [ 1679.589148] kobject: 'tx-0' (00000000db1d535f): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1679.599239] kobject: 'tx-0' (00000000db1d535f): auto cleanup kobject_del [ 1679.606076] kobject: 'tx-0' (00000000db1d535f): calling ktype release [ 1679.612656] kobject: 'tx-0': free name [ 1679.616572] kobject: 'queues' (0000000063efc46d): kobject_cleanup, parent (null) [ 1679.625146] kobject: 'queues' (0000000063efc46d): calling ktype release [ 1679.631965] kobject: 'queues' (0000000063efc46d): kset_release [ 1679.638127] kobject: 'queues': free name [ 1679.642336] kobject: 'erspan0' (00000000ea9d6e2e): kobject_uevent_env [ 1679.648930] kobject: 'erspan0' (00000000ea9d6e2e): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1679.660588] kobject: 'batman_adv' (00000000a8ac7ea5): kobject_uevent_env [ 1679.667425] kobject: 'batman_adv' (00000000a8ac7ea5): kobject_uevent_env: filter function caused the event to drop! [ 1679.678051] kobject: 'batman_adv' (00000000a8ac7ea5): kobject_cleanup, parent (null) [ 1679.686800] kobject: 'batman_adv' (00000000a8ac7ea5): calling ktype release [ 1679.693922] kobject: (00000000a8ac7ea5): dynamic_kobj_release [ 1679.699855] kobject: 'batman_adv': free name [ 1679.704347] kobject: 'rx-0' (00000000bff3cc44): kobject_cleanup, parent 00000000fc29b867 [ 1679.712610] kobject: 'rx-0' (00000000bff3cc44): auto cleanup 'remove' event [ 1679.719726] kobject: 'rx-0' (00000000bff3cc44): kobject_uevent_env [ 1679.726042] kobject: 'rx-0' (00000000bff3cc44): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1679.736113] kobject: 'rx-0' (00000000bff3cc44): auto cleanup kobject_del [ 1679.742985] kobject: 'rx-0' (00000000bff3cc44): calling ktype release [ 1679.749571] kobject: 'rx-0': free name [ 1679.753488] kobject: 'tx-0' (000000006d13290c): kobject_cleanup, parent 00000000fc29b867 [ 1679.761724] kobject: 'tx-0' (000000006d13290c): auto cleanup 'remove' event [ 1679.768868] kobject: 'tx-0' (000000006d13290c): kobject_uevent_env [ 1679.775188] kobject: 'tx-0' (000000006d13290c): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1679.785249] kobject: 'tx-0' (000000006d13290c): auto cleanup kobject_del [ 1679.792285] kobject: 'tx-0' (000000006d13290c): calling ktype release [ 1679.798891] kobject: 'tx-0': free name [ 1679.802788] kobject: 'queues' (00000000fc29b867): kobject_cleanup, parent (null) [ 1679.811342] kobject: 'queues' (00000000fc29b867): calling ktype release [ 1679.818149] kobject: 'queues' (00000000fc29b867): kset_release [ 1679.824119] kobject: 'queues': free name [ 1679.828551] kobject: 'erspan0' (0000000089eddba8): kobject_uevent_env [ 1679.835137] kobject: 'erspan0' (0000000089eddba8): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1679.846248] kobject: 'batman_adv' (000000009c721754): kobject_uevent_env [ 1679.853131] kobject: 'batman_adv' (000000009c721754): kobject_uevent_env: filter function caused the event to drop! [ 1679.863761] kobject: 'batman_adv' (000000009c721754): kobject_cleanup, parent (null) [ 1679.872530] kobject: 'batman_adv' (000000009c721754): calling ktype release [ 1679.879672] kobject: (000000009c721754): dynamic_kobj_release [ 1679.885557] kobject: 'batman_adv': free name [ 1679.890110] kobject: 'rx-0' (00000000b0f55ba9): kobject_cleanup, parent 00000000199f89ff [ 1679.898369] kobject: 'rx-0' (00000000b0f55ba9): auto cleanup 'remove' event [ 1679.905454] kobject: 'rx-0' (00000000b0f55ba9): kobject_uevent_env [ 1679.911778] kobject: 'rx-0' (00000000b0f55ba9): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1679.922136] kobject: 'rx-0' (00000000b0f55ba9): auto cleanup kobject_del [ 1679.929021] kobject: 'rx-0' (00000000b0f55ba9): calling ktype release [ 1679.935612] kobject: 'rx-0': free name [ 1679.939612] kobject: 'tx-0' (00000000a66485ea): kobject_cleanup, parent 00000000199f89ff [ 1679.947858] kobject: 'tx-0' (00000000a66485ea): auto cleanup 'remove' event [ 1679.954938] kobject: 'tx-0' (00000000a66485ea): kobject_uevent_env [ 1679.961258] kobject: 'tx-0' (00000000a66485ea): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1679.971314] kobject: 'tx-0' (00000000a66485ea): auto cleanup kobject_del [ 1679.978205] kobject: 'tx-0' (00000000a66485ea): calling ktype release [ 1679.986210] kobject: 'tx-0': free name [ 1679.990778] kobject: 'queues' (00000000199f89ff): kobject_cleanup, parent (null) [ 1680.000732] kobject: 'queues' (00000000199f89ff): calling ktype release [ 1680.007515] kobject: 'queues' (00000000199f89ff): kset_release [ 1680.014172] kobject: 'queues': free name [ 1680.019990] kobject: 'erspan0' (00000000c294b527): kobject_uevent_env [ 1680.026584] kobject: 'erspan0' (00000000c294b527): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1680.037910] kobject: 'vcan0' (00000000fa25c103): kobject_add_internal: parent: 'net', set: 'devices' [ 1680.047415] kobject: 'vcan0' (00000000fa25c103): kobject_uevent_env [ 1680.054068] kobject: 'vcan0' (00000000fa25c103): fill_kobj_path: path = '/devices/virtual/net/vcan0' [ 1680.063475] kobject: 'queues' (00000000b0d78b0d): kobject_add_internal: parent: 'vcan0', set: '' [ 1680.072984] kobject: 'queues' (00000000b0d78b0d): kobject_uevent_env [ 1680.079511] kobject: 'queues' (00000000b0d78b0d): kobject_uevent_env: filter function caused the event to drop! [ 1680.089972] kobject: 'rx-0' (0000000027276471): kobject_add_internal: parent: 'queues', set: 'queues' [ 1680.099386] kobject: 'rx-0' (0000000027276471): kobject_uevent_env [ 1680.105713] kobject: 'rx-0' (0000000027276471): fill_kobj_path: path = '/devices/virtual/net/vcan0/queues/rx-0' [ 1680.116032] kobject: 'tx-0' (00000000c3fba04b): kobject_add_internal: parent: 'queues', set: 'queues' [ 1680.125502] kobject: 'tx-0' (00000000c3fba04b): kobject_uevent_env [ 1680.131868] kobject: 'tx-0' (00000000c3fba04b): fill_kobj_path: path = '/devices/virtual/net/vcan0/queues/tx-0' [ 1680.142404] kobject: 'erspan0' (00000000875ab24b): kobject_cleanup, parent (null) [ 1680.150954] kobject: 'erspan0' (00000000875ab24b): auto cleanup 'remove' event [ 1680.158079] kobject: 'bond0' (000000008ff58879): kobject_add_internal: parent: 'net', set: 'devices' [ 1680.162431] kobject: 'erspan0' (00000000875ab24b): kobject_uevent_env [ 1680.168396] kobject: 'bond0' (000000008ff58879): kobject_uevent_env [ 1680.174207] kobject: 'erspan0' (00000000875ab24b): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1680.181545] kobject: 'bond0' (000000008ff58879): fill_kobj_path: path = '/devices/virtual/net/bond0' [ 1680.194815] kobject: 'erspan0' (00000000875ab24b): calling ktype release [ 1680.200583] kobject: 'queues' (00000000eb180022): kobject_add_internal: parent: 'bond0', set: '' [ 1680.207098] kobject: 'erspan0': free name [ 1680.216815] kobject: 'queues' (00000000eb180022): kobject_uevent_env [ 1680.227297] kobject: 'queues' (00000000eb180022): kobject_uevent_env: filter function caused the event to drop! [ 1680.237619] kobject: 'rx-0' (0000000080924389): kobject_add_internal: parent: 'queues', set: 'queues' [ 1680.247859] kobject: 'rx-0' (0000000080924389): kobject_uevent_env [ 1680.254189] kobject: 'rx-0' (0000000080924389): fill_kobj_path: path = '/devices/virtual/net/bond0/queues/rx-0' [ 1680.264506] kobject: 'rx-1' (000000002b9f843b): kobject_add_internal: parent: 'queues', set: 'queues' [ 1680.273942] kobject: 'rx-1' (000000002b9f843b): kobject_uevent_env [ 1680.280317] kobject: 'rx-1' (000000002b9f843b): fill_kobj_path: path = '/devices/virtual/net/bond0/queues/rx-1' [ 1680.290668] kobject: 'rx-2' (00000000dbc7a7e8): kobject_add_internal: parent: 'queues', set: 'queues' [ 1680.300102] kobject: 'rx-2' (00000000dbc7a7e8): kobject_uevent_env [ 1680.306425] kobject: 'rx-2' (00000000dbc7a7e8): fill_kobj_path: path = '/devices/virtual/net/bond0/queues/rx-2' [ 1680.316938] kobject: 'rx-3' (000000006d68fd9c): kobject_add_internal: parent: 'queues', set: 'queues' [ 1680.326360] kobject: 'rx-3' (000000006d68fd9c): kobject_uevent_env [ 1680.332706] kobject: 'rx-3' (000000006d68fd9c): fill_kobj_path: path = '/devices/virtual/net/bond0/queues/rx-3' [ 1680.343308] kobject: 'rx-4' (00000000ed26275d): kobject_add_internal: parent: 'queues', set: 'queues' [ 1680.352752] kobject: 'rx-4' (00000000ed26275d): kobject_uevent_env [ 1680.359120] kobject: 'rx-4' (00000000ed26275d): fill_kobj_path: path = '/devices/virtual/net/bond0/queues/rx-4' [ 1680.369444] kobject: 'rx-5' (0000000045039349): kobject_add_internal: parent: 'queues', set: 'queues' [ 1680.378868] kobject: 'rx-5' (0000000045039349): kobject_uevent_env [ 1680.385189] kobject: 'rx-5' (0000000045039349): fill_kobj_path: path = '/devices/virtual/net/bond0/queues/rx-5' [ 1680.396582] kobject: 'rx-6' (000000007e079fb8): kobject_add_internal: parent: 'queues', set: 'queues' [ 1680.405973] kobject: 'rx-6' (000000007e079fb8): kobject_uevent_env [ 1680.412335] kobject: 'rx-6' (000000007e079fb8): fill_kobj_path: path = '/devices/virtual/net/bond0/queues/rx-6' [ 1680.422776] kobject: 'rx-7' (00000000afd6851a): kobject_add_internal: parent: 'queues', set: 'queues' [ 1680.432194] kobject: 'rx-7' (00000000afd6851a): kobject_uevent_env [ 1680.438911] kobject: 'rx-7' (00000000afd6851a): fill_kobj_path: path = '/devices/virtual/net/bond0/queues/rx-7' [ 1680.449224] kobject: 'rx-8' (0000000021638a78): kobject_add_internal: parent: 'queues', set: 'queues' [ 1680.458637] kobject: 'rx-8' (0000000021638a78): kobject_uevent_env [ 1680.464955] kobject: 'rx-8' (0000000021638a78): fill_kobj_path: path = '/devices/virtual/net/bond0/queues/rx-8' [ 1680.475253] kobject: 'rx-9' (000000004833cf93): kobject_add_internal: parent: 'queues', set: 'queues' [ 1680.484661] kobject: 'rx-9' (000000004833cf93): kobject_uevent_env [ 1680.491028] kobject: 'rx-9' (000000004833cf93): fill_kobj_path: path = '/devices/virtual/net/bond0/queues/rx-9' [ 1680.502206] kobject: 'rx-10' (00000000ec48050b): kobject_add_internal: parent: 'queues', set: 'queues' [ 1680.511745] kobject: 'rx-10' (00000000ec48050b): kobject_uevent_env [ 1680.518196] kobject: 'rx-10' (00000000ec48050b): fill_kobj_path: path = '/devices/virtual/net/bond0/queues/rx-10' [ 1680.528677] kobject: 'rx-11' (000000007b838a7d): kobject_add_internal: parent: 'queues', set: 'queues' [ 1680.538179] kobject: 'rx-11' (000000007b838a7d): kobject_uevent_env [ 1680.544599] kobject: 'rx-11' (000000007b838a7d): fill_kobj_path: path = '/devices/virtual/net/bond0/queues/rx-11' [ 1680.555060] kobject: 'rx-12' (00000000762b021c): kobject_add_internal: parent: 'queues', set: 'queues' [ 1680.564543] kobject: 'rx-12' (00000000762b021c): kobject_uevent_env [ 1680.571205] kobject: 'rx-12' (00000000762b021c): fill_kobj_path: path = '/devices/virtual/net/bond0/queues/rx-12' [ 1680.581710] kobject: 'rx-13' (000000005bcd9acb): kobject_add_internal: parent: 'queues', set: 'queues' [ 1680.591230] kobject: 'rx-13' (000000005bcd9acb): kobject_uevent_env [ 1680.597666] kobject: 'rx-13' (000000005bcd9acb): fill_kobj_path: path = '/devices/virtual/net/bond0/queues/rx-13' [ 1680.608150] kobject: 'rx-14' (0000000033061c9d): kobject_add_internal: parent: 'queues', set: 'queues' [ 1680.617642] kobject: 'rx-14' (0000000033061c9d): kobject_uevent_env [ 1680.624091] kobject: 'rx-14' (0000000033061c9d): fill_kobj_path: path = '/devices/virtual/net/bond0/queues/rx-14' [ 1680.634560] kobject: 'rx-15' (00000000e2078423): kobject_add_internal: parent: 'queues', set: 'queues' [ 1680.644057] kobject: 'rx-15' (00000000e2078423): kobject_uevent_env [ 1680.650546] kobject: 'rx-15' (00000000e2078423): fill_kobj_path: path = '/devices/virtual/net/bond0/queues/rx-15' [ 1680.661044] kobject: 'tx-0' (000000004cebb27d): kobject_add_internal: parent: 'queues', set: 'queues' [ 1680.670550] kobject: 'tx-0' (000000004cebb27d): kobject_uevent_env [ 1680.676893] kobject: 'tx-0' (000000004cebb27d): fill_kobj_path: path = '/devices/virtual/net/bond0/queues/tx-0' [ 1680.687189] kobject: 'tx-1' (00000000363c6fdc): kobject_add_internal: parent: 'queues', set: 'queues' [ 1680.696639] kobject: 'tx-1' (00000000363c6fdc): kobject_uevent_env [ 1680.703238] kobject: 'tx-1' (00000000363c6fdc): fill_kobj_path: path = '/devices/virtual/net/bond0/queues/tx-1' [ 1680.713576] kobject: 'tx-2' (0000000082260a23): kobject_add_internal: parent: 'queues', set: 'queues' [ 1680.723009] kobject: 'tx-2' (0000000082260a23): kobject_uevent_env [ 1680.729400] kobject: 'tx-2' (0000000082260a23): fill_kobj_path: path = '/devices/virtual/net/bond0/queues/tx-2' [ 1680.739707] kobject: 'tx-3' (00000000394d3c38): kobject_add_internal: parent: 'queues', set: 'queues' [ 1680.749190] kobject: 'tx-3' (00000000394d3c38): kobject_uevent_env [ 1680.755531] kobject: 'tx-3' (00000000394d3c38): fill_kobj_path: path = '/devices/virtual/net/bond0/queues/tx-3' [ 1680.765867] kobject: 'tx-4' (000000004dc57d26): kobject_add_internal: parent: 'queues', set: 'queues' [ 1680.775293] kobject: 'tx-4' (000000004dc57d26): kobject_uevent_env [ 1680.781652] kobject: 'tx-4' (000000004dc57d26): fill_kobj_path: path = '/devices/virtual/net/bond0/queues/tx-4' [ 1680.791936] kobject: 'tx-5' (0000000052676e4d): kobject_add_internal: parent: 'queues', set: 'queues' [ 1680.801422] kobject: 'tx-5' (0000000052676e4d): kobject_uevent_env [ 1680.807817] kobject: 'tx-5' (0000000052676e4d): fill_kobj_path: path = '/devices/virtual/net/bond0/queues/tx-5' [ 1680.818165] kobject: 'tx-6' (000000000a7d943d): kobject_add_internal: parent: 'queues', set: 'queues' [ 1680.827644] kobject: 'tx-6' (000000000a7d943d): kobject_uevent_env [ 1680.834266] kobject: 'tx-6' (000000000a7d943d): fill_kobj_path: path = '/devices/virtual/net/bond0/queues/tx-6' [ 1680.844615] kobject: 'tx-7' (00000000825b83a7): kobject_add_internal: parent: 'queues', set: 'queues' [ 1680.854065] kobject: 'tx-7' (00000000825b83a7): kobject_uevent_env [ 1680.860435] kobject: 'tx-7' (00000000825b83a7): fill_kobj_path: path = '/devices/virtual/net/bond0/queues/tx-7' [ 1680.870783] kobject: 'tx-8' (000000001b769db7): kobject_add_internal: parent: 'queues', set: 'queues' [ 1680.880260] kobject: 'tx-8' (000000001b769db7): kobject_uevent_env [ 1680.886589] kobject: 'tx-8' (000000001b769db7): fill_kobj_path: path = '/devices/virtual/net/bond0/queues/tx-8' [ 1680.896909] kobject: 'tx-9' (00000000246973bd): kobject_add_internal: parent: 'queues', set: 'queues' [ 1680.906336] kobject: 'tx-9' (00000000246973bd): kobject_uevent_env [ 1680.912706] kobject: 'tx-9' (00000000246973bd): fill_kobj_path: path = '/devices/virtual/net/bond0/queues/tx-9' [ 1680.922981] kobject: 'tx-10' (000000001f7f1ba7): kobject_add_internal: parent: 'queues', set: 'queues' [ 1680.932565] kobject: 'tx-10' (000000001f7f1ba7): kobject_uevent_env [ 1680.939010] kobject: 'tx-10' (000000001f7f1ba7): fill_kobj_path: path = '/devices/virtual/net/bond0/queues/tx-10' [ 1680.949520] kobject: 'tx-11' (00000000e94caeba): kobject_add_internal: parent: 'queues', set: 'queues' [ 1680.959257] kobject: 'tx-11' (00000000e94caeba): kobject_uevent_env [ 1680.965677] kobject: 'tx-11' (00000000e94caeba): fill_kobj_path: path = '/devices/virtual/net/bond0/queues/tx-11' [ 1680.976151] kobject: 'tx-12' (000000004a1499b6): kobject_add_internal: parent: 'queues', set: 'queues' [ 1680.985661] kobject: 'tx-12' (000000004a1499b6): kobject_uevent_env [ 1680.992135] kobject: 'tx-12' (000000004a1499b6): fill_kobj_path: path = '/devices/virtual/net/bond0/queues/tx-12' [ 1681.002606] kobject: 'tx-13' (00000000230b266f): kobject_add_internal: parent: 'queues', set: 'queues' [ 1681.012154] kobject: 'tx-13' (00000000230b266f): kobject_uevent_env [ 1681.018605] kobject: 'tx-13' (00000000230b266f): fill_kobj_path: path = '/devices/virtual/net/bond0/queues/tx-13' [ 1681.029242] kobject: 'tx-14' (00000000ffda5cd8): kobject_add_internal: parent: 'queues', set: 'queues' [ 1681.038837] kobject: 'tx-14' (00000000ffda5cd8): kobject_uevent_env [ 1681.045254] kobject: 'tx-14' (00000000ffda5cd8): fill_kobj_path: path = '/devices/virtual/net/bond0/queues/tx-14' [ 1681.055761] kobject: 'tx-15' (0000000093bada2d): kobject_add_internal: parent: 'queues', set: 'queues' [ 1681.065274] kobject: 'tx-15' (0000000093bada2d): kobject_uevent_env [ 1681.071756] kobject: 'tx-15' (0000000093bada2d): fill_kobj_path: path = '/devices/virtual/net/bond0/queues/tx-15' [ 1681.082688] kobject: 'batman_adv' (000000005275856b): kobject_add_internal: parent: 'bond0', set: '' [ 1681.093026] kobject: 'erspan0' (000000003a956149): kobject_cleanup, parent (null) [ 1681.093490] kobject: 'team0' (0000000007e38599): kobject_add_internal: parent: 'net', set: 'devices' [ 1681.102841] kobject: 'erspan0' (000000003a956149): auto cleanup 'remove' event [ 1681.111300] kobject: 'team0' (0000000007e38599): kobject_uevent_env [ 1681.122520] kobject: 'erspan0' (000000003a956149): kobject_uevent_env [ 1681.124720] kobject: 'team0' (0000000007e38599): fill_kobj_path: path = '/devices/virtual/net/team0' [ 1681.131449] kobject: 'erspan0' (000000003a956149): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1681.140683] kobject: 'queues' (00000000f0f0e8b2): kobject_add_internal: parent: 'team0', set: '' [ 1681.155188] kobject: 'erspan0' (000000003a956149): calling ktype release [ 1681.160466] kobject: 'queues' (00000000f0f0e8b2): kobject_uevent_env [ 1681.160476] kobject: 'queues' (00000000f0f0e8b2): kobject_uevent_env: filter function caused the event to drop! [ 1681.167385] kobject: 'erspan0': free name [ 1681.173818] kobject: 'rx-0' (000000007b8d9fe7): kobject_add_internal: parent: 'queues', set: 'queues' [ 1681.173856] kobject: 'rx-0' (000000007b8d9fe7): kobject_uevent_env [ 1681.203898] kobject: 'rx-0' (000000007b8d9fe7): fill_kobj_path: path = '/devices/virtual/net/team0/queues/rx-0' [ 1681.214185] kobject: 'rx-1' (0000000003eabfa5): kobject_add_internal: parent: 'queues', set: 'queues' [ 1681.223794] kobject: 'rx-1' (0000000003eabfa5): kobject_uevent_env [ 1681.230164] kobject: 'rx-1' (0000000003eabfa5): fill_kobj_path: path = '/devices/virtual/net/team0/queues/rx-1' [ 1681.240471] kobject: 'rx-2' (0000000097935d66): kobject_add_internal: parent: 'queues', set: 'queues' [ 1681.249876] kobject: 'rx-2' (0000000097935d66): kobject_uevent_env [ 1681.256228] kobject: 'rx-2' (0000000097935d66): fill_kobj_path: path = '/devices/virtual/net/team0/queues/rx-2' [ 1681.266509] kobject: 'rx-3' (00000000573b164c): kobject_add_internal: parent: 'queues', set: 'queues'