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", 0x1000}, 0x1006) ioctl(r1, 0x200001000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") setsockopt$inet6_mtu(r2, 0x29, 0x17, &(0x7f00000001c0)=0x4, 0x4) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) r4 = socket$kcm(0x11, 0x8000000002, 0x300) setsockopt$sock_attach_bpf(r4, 0x1, 0x32, &(0x7f0000001d80)=r3, 0x4) syz_genetlink_get_family_id$tipc2(&(0x7f0000000200)='TIPCv2\x00') openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000100)='/proc/capi/capi20ncci\x00', 0x4000, 0x0) 11:42:37 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x200001000008912, &(0x7f0000000000)="11dca5055e0b") bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) socket$nl_route(0x10, 0x3, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = gettid() tkill(r1, 0x3b) socket$inet_tcp(0x2, 0x1, 0x0) write$FUSE_OPEN(0xffffffffffffffff, &(0x7f00000001c0)={0x20, 0x0, 0x1, {0x0, 0x6}}, 0x20) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000400)) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000300)='cgroup.procs\x00', 0x2, 0x0) connect$inet(r2, &(0x7f0000000280)={0x2, 0x0, @local}, 0x10) 11:42:37 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x100, 0x0) getpeername$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @empty}, &(0x7f0000000180)=0x1c) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) statfs(&(0x7f0000000240)='./bus\x00', &(0x7f0000000900)=""/147) 11:42:37 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x200001000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) syz_init_net_socket$x25(0x9, 0x5, 0x0) r2 = socket$kcm(0x11, 0x8000000002, 0x300) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000001d80)=r1, 0x4) syz_genetlink_get_family_id$tipc2(&(0x7f0000000480)='TIPCv2\x00') r3 = syz_open_dev$usb(&(0x7f0000001ec0)='/dev/bus/usb/00#/00#\x00', 0x2, 0x0) getsockopt$X25_QBITINCL(r3, 0x106, 0x1, &(0x7f0000001f00), &(0x7f0000001f40)=0x4) fsetxattr$security_smack_entry(r1, &(0x7f0000000040)='security.SMACK64IPIN\x00', &(0x7f0000000080)='\x00', 0x1, 0x1) 11:42:37 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x200001000008912, &(0x7f0000000000)="11dca5055e0b") bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) socket$nl_route(0x10, 0x3, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = gettid() tkill(r1, 0x3b) socket$inet_tcp(0x2, 0x1, 0x0) write$FUSE_OPEN(0xffffffffffffffff, &(0x7f00000001c0)={0x20, 0x0, 0x1, {0x0, 0x6}}, 0x20) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000400)) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000300)='cgroup.procs\x00', 0x2, 0x0) connect$inet(r2, &(0x7f0000000280)={0x2, 0x0, @local}, 0x10) 11:42:37 executing program 1: perf_event_open(&(0x7f0000000440)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x220801, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r0, 0x800443d3, &(0x7f0000000580)={{0x3, 0x9, 0xffff, 0x7fffffff}, 0x100000000}) syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vcs\x00', 0x280200, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\xf6', 0x1ff) ioctl$RTC_EPOCH_READ(r1, 0x8008700d, &(0x7f0000000280)) getsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000300)=0xffff, &(0x7f0000000140)=0x4) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) bind$ax25(r0, &(0x7f0000000340)={{0x3, @null, 0x5}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x80000, 0x10064) r3 = openat$cgroup_procs(r2, &(0x7f0000000100)='cgroup.procs\x00', 0x2, 0x0) write$P9_RCLUNK(r1, &(0x7f00000001c0)={0x7, 0x79, 0x1}, 0x7) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.net/syz1\x00', 0x1ff) write$cgroup_pid(r3, &(0x7f0000000640), 0x12) 11:42:37 executing program 5: perf_event_open(&(0x7f0000000440)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x220801, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r0, 0x800443d3, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\xf6', 0x1ff) ioctl$RTC_EPOCH_READ(0xffffffffffffffff, 0x8008700d, &(0x7f0000000280)) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) r2 = openat$cgroup_procs(r1, 0x0, 0x2, 0x0) write$cgroup_pid(r2, &(0x7f0000000640), 0x12) 11:42:37 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x200001000008912, &(0x7f0000000000)="11dca5055e0b") bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) socket$nl_route(0x10, 0x3, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = gettid() tkill(r1, 0x3b) socket$inet_tcp(0x2, 0x1, 0x0) write$FUSE_OPEN(0xffffffffffffffff, &(0x7f00000001c0)={0x20, 0x0, 0x1, {0x0, 0x6}}, 0x20) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000400)) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000300)='cgroup.procs\x00', 0x2, 0x0) connect$inet(r2, &(0x7f0000000280)={0x2, 0x0, @local}, 0x10) 11:42:37 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x3) fchdir(r0) open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) statfs(&(0x7f0000000240)='./bus\x00', &(0x7f0000000900)=""/147) 11:42:37 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x200001000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0x23, &(0x7f00000002c0)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000000000002402000020feffff7a0af0fff8ffffff69a4f0ff00000000b70600000018d1fe2d6405000000000075040000000000000704000000000000b7040000100000206a070000ffffffffffff00002f000000b70000000a00000095000000000000006458c2c62fc286000389d909a63796c113a80c19aab9d646ae8f51b6cdf0d3253730e711f5969f62c28b22756bedf3cf393d14c46cc4f79fd2b316da4f0de8163f6242fa7323f1740637c48468766af540439fce41f144631ac2f9842e1b346362dcae08c3d1a1fbe96dd87235b44174f7c0343185089ab5119e31975e551558055dc2dce53b95c132e78454c4813681e0688d3a127f7418c6226f4133346c2e6794d9d2f2bb7938a2c53a0ce68e"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00=', 0x80000, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x1000000000004000}, 0x10}, 0x70) r2 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0xf7426d587f30bcfd) sendto$ax25(r2, &(0x7f0000000080)="e23bb8d8f6a46915fd15907612c5c6ab49b534730b183c6bf0eb9fca8a7374aa73f9ff4c5f5853eaec30ae83378c08b5001a90ca411b2ef4ced7bf42f9aed6177de24a5f0be2e82a5c6127b77479aa89148bc3cdd5ecef598da6df4ef20a5db8d35f43eb1a73875e81277416249a087faf428acefafdb2e010e82d43de7e5d0f", 0x80, 0x48000, 0x0, 0x0) r3 = socket$kcm(0x11, 0x8000000002, 0x300) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000001d80)=r1, 0x4) syz_genetlink_get_family_id$tipc2(&(0x7f0000000200)='TIPCv2\x00') 11:42:37 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x200001000008912, &(0x7f0000000000)="11dca5055e0bcfe47b") bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) socket$nl_route(0x10, 0x3, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = gettid() tkill(r1, 0x3b) socket$inet_tcp(0x2, 0x1, 0x0) write$FUSE_OPEN(0xffffffffffffffff, &(0x7f00000001c0)={0x20, 0x0, 0x1, {0x0, 0x6}}, 0x20) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000400)) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000300)='cgroup.procs\x00', 0x2, 0x0) connect$inet(r2, &(0x7f0000000280)={0x2, 0x0, @local}, 0x10) [ 340.310084] net_ratelimit: 20 callbacks suppressed [ 340.310089] protocol 88fb is buggy, dev hsr_slave_0 [ 340.320122] protocol 88fb is buggy, dev hsr_slave_1 [ 340.550120] protocol 88fb is buggy, dev hsr_slave_0 [ 340.555208] protocol 88fb is buggy, dev hsr_slave_1 [ 340.630120] protocol 88fb is buggy, dev hsr_slave_0 [ 340.635227] protocol 88fb is buggy, dev hsr_slave_1 [ 341.270128] protocol 88fb is buggy, dev hsr_slave_0 [ 341.275197] protocol 88fb is buggy, dev hsr_slave_1 [ 341.590123] protocol 88fb is buggy, dev hsr_slave_0 [ 341.595201] protocol 88fb is buggy, dev hsr_slave_1 11:42:40 executing program 1: perf_event_open(&(0x7f0000000440)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x220801, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r0, 0x800443d3, &(0x7f0000000580)={{0x3, 0x9, 0xffff, 0x7fffffff}, 0x100000000}) syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vcs\x00', 0x280200, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\xf6', 0x1ff) ioctl$RTC_EPOCH_READ(r1, 0x8008700d, &(0x7f0000000280)) getsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000300)=0xffff, &(0x7f0000000140)=0x4) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) bind$ax25(r0, &(0x7f0000000340)={{0x3, @null, 0x5}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x80000, 0x10064) r3 = openat$cgroup_procs(r2, &(0x7f0000000100)='cgroup.procs\x00', 0x2, 0x0) write$P9_RCLUNK(r1, &(0x7f00000001c0)={0x7, 0x79, 0x1}, 0x7) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.net/syz1\x00', 0x1ff) write$cgroup_pid(r3, &(0x7f0000000640), 0x12) 11:42:40 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000000)="5500000019007f5300fe01b2a4a280930a60ffff00a8430291000000390009", 0x1f}], 0x1}, 0x0) r0 = socket(0x1000000010, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f00000000c0), 0x492492492492191, 0x0) r1 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r1) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x38) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) 11:42:40 executing program 5: perf_event_open(&(0x7f0000000440)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x220801, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r0, 0x800443d3, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\xf6', 0x1ff) ioctl$RTC_EPOCH_READ(0xffffffffffffffff, 0x8008700d, &(0x7f0000000280)) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) r2 = openat$cgroup_procs(r1, 0x0, 0x2, 0x0) write$cgroup_pid(r2, &(0x7f0000000640), 0x12) 11:42:40 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x200001000008912, &(0x7f0000000000)="11dca5055e0bcfe47b") bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) socket$nl_route(0x10, 0x3, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = gettid() tkill(r1, 0x3b) socket$inet_tcp(0x2, 0x1, 0x0) write$FUSE_OPEN(0xffffffffffffffff, &(0x7f00000001c0)={0x20, 0x0, 0x1, {0x0, 0x6}}, 0x20) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000400)) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000300)='cgroup.procs\x00', 0x2, 0x0) connect$inet(r2, &(0x7f0000000280)={0x2, 0x0, @local}, 0x10) 11:42:40 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000000)={0x0, 0x1, 0x3f6f, 0x2, 0x0}, &(0x7f0000000040)=0x10) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000180)={r1, 0x4}, &(0x7f00000001c0)=0x8) open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) mmap$binder(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x1, 0x11, r0, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) statfs(&(0x7f0000000240)='./bus\x00', &(0x7f0000000900)=""/147) 11:42:40 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x200001000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f00000001c0)={'ip_vti0\x00', &(0x7f0000000040)=@ethtool_rxnfc={0x2e, 0x2, 0x7f, {0x4, @sctp_ip6_spec={@loopback, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4e20, 0x4e21, 0xffffffff}, {0x0, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}, 0x3, 0x1000, [0x9, 0x3]}, @hdata="5c1faece4f6d0e82aff832ce167cf36fa7ac10212b4d406bbe38c7649eceb2099022ab2c681666fe7bc5c8a9282e4a586e385021", {0x0, @broadcast, 0x8, 0x1, [0x2, 0x9]}, 0x209e, 0x8}, 0x9, [0x0, 0x7fffffff, 0x7, 0x8001, 0xffffffffffffff80, 0x8, 0x7ff, 0x4, 0xfff]}}) r2 = socket$kcm(0x11, 0x8000000002, 0x300) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000001d80)=r1, 0x4) syz_genetlink_get_family_id$tipc2(&(0x7f0000000200)='TIPCv2\x00') 11:42:40 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x200001000008912, &(0x7f0000000000)="11dca5055e0bcfe47b") bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000002c0)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000100000002402000020feffff7a0af0fff8ffffff69a4f0ff00000000b7060000000000000744000000000000b7040000100000206a0700fe00000000850000002f000000b70000000a00000095000000000000006458c2c62fc286000389d909a63796c113a80c19aab9d646ae8f51b6cdf0d3253730e711f5969f62c28b22756bedf3cf393d14c46cc4f79fd2b316da4f0de8163f6242fa7323f1740637c48468766af540439f0500f144631ac2f9842e1b346362dcae08c3d1a1fbe96dd87235b44174f7c0343185089ab5119e31975e551558055dc2dce53b95c132e78454c4813681e0688d3a127f7418c6226f4133346c2e6794d952f2bb7938a2c53a0ce68e"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) socket$nl_route(0x10, 0x3, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = gettid() tkill(r1, 0x3b) socket$inet_tcp(0x2, 0x1, 0x0) write$FUSE_OPEN(0xffffffffffffffff, &(0x7f00000001c0)={0x20, 0x0, 0x1, {0x0, 0x6}}, 0x20) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000400)) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000300)='cgroup.procs\x00', 0x2, 0x0) connect$inet(r2, &(0x7f0000000280)={0x2, 0x0, @local}, 0x10) 11:42:40 executing program 2: r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ubi_ctrl\x00', 0x20100, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r0, 0x770a, 0x0) syz_mount_image$vfat(&(0x7f00000001c0)='vfat\x00', &(0x7f0000000280)='./file0\x00', 0x40, 0x26c, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_ASSOCINFO(r2, 0x84, 0x1, &(0x7f0000000000)={0x0, 0x1, 0x1, 0x2, 0x8000, 0x4}, &(0x7f0000000040)=0x14) setsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000180)={r3, 0xfffffffffffffffd}, 0x8) ioctl$VIDIOC_G_MODULATOR(r2, 0xc0445636, &(0x7f00000002c0)={0x4, "d7f08a40e074f689f28fcae65f733df78dd7a1924de5ee46c307479b01da1b0f", 0x1, 0x2, 0x3}) statfs(&(0x7f0000000240)='./bus\x00', &(0x7f0000000900)=""/147) 11:42:40 executing program 1: perf_event_open(&(0x7f0000000440)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x220801, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r0, 0x800443d3, &(0x7f0000000580)={{0x3, 0x9, 0xffff, 0x7fffffff}, 0x100000000}) syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vcs\x00', 0x280200, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\xf6', 0x1ff) ioctl$RTC_EPOCH_READ(r1, 0x8008700d, &(0x7f0000000280)) getsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000300)=0xffff, &(0x7f0000000140)=0x4) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) bind$ax25(r0, &(0x7f0000000340)={{0x3, @null, 0x5}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x80000, 0x10064) r3 = openat$cgroup_procs(r2, &(0x7f0000000100)='cgroup.procs\x00', 0x2, 0x0) write$P9_RCLUNK(r1, &(0x7f00000001c0)={0x7, 0x79, 0x1}, 0x7) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.net/syz1\x00', 0x1ff) write$cgroup_pid(r3, &(0x7f0000000640), 0x12) [ 342.950067] audit: type=1400 audit(1566560560.216:76): avc: denied { map } for pid=12311 comm="syz-executor.2" path="/root/syzkaller-testdir294370960/syzkaller.621ihq/199/file0" dev="loop2" ino=1 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:dosfs_t:s0 tclass=dir permissive=1 11:42:40 executing program 5: perf_event_open(&(0x7f0000000440)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x220801, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r0, 0x800443d3, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\xf6', 0x1ff) ioctl$RTC_EPOCH_READ(0xffffffffffffffff, 0x8008700d, &(0x7f0000000280)) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) r2 = openat$cgroup_procs(r1, 0x0, 0x2, 0x0) write$cgroup_pid(r2, &(0x7f0000000640), 0x12) 11:42:40 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x20000110000890f, &(0x7f0000000080)="11dca84a6eb47484239c25df87f8f867d6055e0bcfe47bf070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0x23, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00=', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) geteuid() r2 = socket$kcm(0x11, 0x8000000002, 0x300) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000001d80)=r1, 0x4) syz_genetlink_get_family_id$tipc2(&(0x7f0000000200)='TIPCv2\x00') 11:42:40 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x200001000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf0") bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) socket$nl_route(0x10, 0x3, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = gettid() tkill(r1, 0x3b) socket$inet_tcp(0x2, 0x1, 0x0) write$FUSE_OPEN(0xffffffffffffffff, &(0x7f00000001c0)={0x20, 0x0, 0x1, {0x0, 0x6}}, 0x20) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000400)) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000300)='cgroup.procs\x00', 0x2, 0x0) connect$inet(r2, &(0x7f0000000280)={0x2, 0x0, @local}, 0x10) 11:42:40 executing program 1: perf_event_open(&(0x7f0000000440)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x220801, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r0, 0x800443d3, &(0x7f0000000580)={{0x3, 0x9, 0xffff, 0x7fffffff}, 0x100000000, 0x0, 0x9}) syz_genetlink_get_family_id$tipc(0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vcs\x00', 0x280200, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\xf6', 0x1ff) ioctl$RTC_EPOCH_READ(r1, 0x8008700d, &(0x7f0000000280)) getsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000300)=0xffff, &(0x7f0000000140)=0x4) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) bind$ax25(r0, &(0x7f0000000340)={{0x3, @null, 0x5}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x80000, 0x10064) r3 = openat$cgroup_procs(r2, &(0x7f0000000100)='cgroup.procs\x00', 0x2, 0x0) write$P9_RCLUNK(r1, &(0x7f00000001c0)={0x7, 0x79, 0x1}, 0x7) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.net/syz1\x00', 0x1ff) write$cgroup_pid(r3, &(0x7f0000000640), 0x12) [ 345.430136] net_ratelimit: 20 callbacks suppressed [ 345.430141] protocol 88fb is buggy, dev hsr_slave_0 [ 345.440226] protocol 88fb is buggy, dev hsr_slave_1 [ 345.750121] protocol 88fb is buggy, dev hsr_slave_0 [ 345.755202] protocol 88fb is buggy, dev hsr_slave_1 11:42:43 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000000)="5500000019007f5300fe01b2a4a280930a60ffff00a84302910000003900090008000c00060000f3180015e00500", 0x2e}], 0x1}, 0x0) r0 = socket(0x1000000010, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f00000000c0), 0x492492492492191, 0x0) r1 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r1) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x38) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) 11:42:43 executing program 5: perf_event_open(&(0x7f0000000440)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x220801, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r0, 0x800443d3, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\xf6', 0x1ff) ioctl$RTC_EPOCH_READ(0xffffffffffffffff, 0x8008700d, &(0x7f0000000280)) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r1, &(0x7f0000000100)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000640), 0x12) 11:42:43 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x200001000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf0") bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) socket$nl_route(0x10, 0x3, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = gettid() tkill(r1, 0x3b) socket$inet_tcp(0x2, 0x1, 0x0) write$FUSE_OPEN(0xffffffffffffffff, &(0x7f00000001c0)={0x20, 0x0, 0x1, {0x0, 0x6}}, 0x20) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000400)) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000300)='cgroup.procs\x00', 0x2, 0x0) connect$inet(r2, &(0x7f0000000280)={0x2, 0x0, @local}, 0x10) 11:42:43 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x200001000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x48c, &(0x7f00000001c0)={0x0, 'veth0_to_team\x00', 0x1}, 0x18) r2 = socket$kcm(0x11, 0x8000000002, 0x300) r3 = syz_open_dev$binder(&(0x7f0000000180)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r3, 0xc0306201, &(0x7f0000000200)={0x44, 0x0, &(0x7f00000000c0)=[@reply={0x40406301, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}], 0x0, 0x0, 0x0}) ioctl$sock_SIOCDELDLCI(r0, 0x8981, &(0x7f0000000040)={'vxcan1\x00', 0xffffffff7fffffff}) r4 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/enforce\x00', 0x0, 0x0) ioctl$KVM_ASSIGN_PCI_DEVICE(r4, 0x8040ae69, &(0x7f00000002c0)={0x0, 0x4, 0x7fff, 0x1, 0xfffffffffffffff9}) r5 = getpgrp(0x0) ioctl$TIOCGPGRP(r3, 0x540f, &(0x7f0000000080)=0x0) kcmp(r5, r6, 0x0, r3, r1) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000001d80)=r1, 0x4) syz_genetlink_get_family_id$tipc2(&(0x7f0000000200)='TIPCv2\x00') 11:42:43 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) r2 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) statfs(&(0x7f0000000240)='./bus\x00', &(0x7f0000000900)=""/147) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(r1, 0xc4c85513, &(0x7f00000009c0)={{0x6, 0x6, 0x7f, 0xf6, 'syz0\x00', 0x5}, 0x0, [0xffff, 0xfffffffffffff001, 0x9, 0x6a4, 0x9, 0x200, 0x1000, 0x0, 0x1, 0x8001, 0x3, 0x366, 0x2, 0x9, 0x2, 0x5, 0xe2, 0x2, 0x2, 0x9, 0x9, 0x5, 0x1000, 0xffffffffffffff56, 0x9349, 0x100000001, 0x6, 0xffffffff, 0x7fff, 0x954, 0x100000000, 0x0, 0xa7, 0x4, 0x1, 0x6, 0x7, 0x7, 0x73a, 0x6, 0x7, 0x831, 0x0, 0xbd52, 0x3f, 0x1, 0x8, 0xce, 0x1f, 0xefd, 0x100, 0x7, 0x8001, 0xc702, 0x3, 0x6, 0x7, 0xd538, 0x7, 0x1, 0x101, 0x80000000, 0xfffffffffffffffb, 0xbe6e, 0x7f, 0xb1f, 0x0, 0x81, 0x9, 0x8, 0x7fff, 0x4a, 0xe042, 0x0, 0x5, 0x3, 0x9, 0xfffffffffffffe00, 0x0, 0x100, 0x100000001, 0x2, 0x7, 0x6, 0x7, 0x4, 0x5, 0x80000001, 0x7fff, 0x1, 0x0, 0x10001, 0x31c825ca, 0xfffffffffffffe00, 0x9, 0x0, 0x7ff, 0x2, 0x1f, 0xff, 0x100000000, 0x6, 0x7, 0x5, 0x20, 0x1563, 0x6, 0x1, 0x10001, 0x3, 0x10001, 0x1ff, 0x88, 0x3, 0x4, 0x0, 0x0, 0x0, 0xfffffffffffff000, 0x6, 0x20, 0x8, 0x1, 0x0, 0x5, 0xfffffffffffffffb, 0x6, 0x8], {0x0, 0x1c9c380}}) fsetxattr$security_smack_entry(r2, &(0x7f0000000000)='security.SMACK64\x00', &(0x7f0000000040)='vfat\x00', 0x5, 0x0) 11:42:43 executing program 1: perf_event_open(&(0x7f0000000440)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x220801, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r0, 0x800443d3, &(0x7f0000000580)={{0x3, 0x9, 0xffff, 0x7fffffff}, 0x100000000, 0x0, 0x9}) syz_genetlink_get_family_id$tipc(0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vcs\x00', 0x280200, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\xf6', 0x1ff) ioctl$RTC_EPOCH_READ(r1, 0x8008700d, &(0x7f0000000280)) getsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000300)=0xffff, &(0x7f0000000140)=0x4) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) bind$ax25(r0, &(0x7f0000000340)={{0x3, @null, 0x5}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x80000, 0x10064) r3 = openat$cgroup_procs(r2, &(0x7f0000000100)='cgroup.procs\x00', 0x2, 0x0) write$P9_RCLUNK(r1, &(0x7f00000001c0)={0x7, 0x79, 0x1}, 0x7) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.net/syz1\x00', 0x1ff) write$cgroup_pid(r3, &(0x7f0000000640), 0x12) 11:42:43 executing program 5: perf_event_open(&(0x7f0000000440)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x220801, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r0, 0x800443d3, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\xf6', 0x1ff) ioctl$RTC_EPOCH_READ(0xffffffffffffffff, 0x8008700d, &(0x7f0000000280)) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r1, &(0x7f0000000100)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000640), 0x12) [ 345.991278] binder: 12372:12381 ioctl 540f 20000080 returned -22 11:42:43 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x200001000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf0") bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) socket$nl_route(0x10, 0x3, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = gettid() tkill(r1, 0x3b) socket$inet_tcp(0x2, 0x1, 0x0) write$FUSE_OPEN(0xffffffffffffffff, &(0x7f00000001c0)={0x20, 0x0, 0x1, {0x0, 0x6}}, 0x20) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000400)) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000300)='cgroup.procs\x00', 0x2, 0x0) connect$inet(r2, &(0x7f0000000280)={0x2, 0x0, @local}, 0x10) 11:42:43 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x200, 0x10192) fchdir(r0) open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) statfs(&(0x7f0000000240)='./bus\x00', &(0x7f0000000900)=""/147) 11:42:43 executing program 1: perf_event_open(&(0x7f0000000440)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x220801, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r0, 0x800443d3, &(0x7f0000000580)={{0x3, 0x9, 0xffff, 0x7fffffff}, 0x100000000, 0x0, 0x9}) syz_genetlink_get_family_id$tipc(0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vcs\x00', 0x280200, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\xf6', 0x1ff) ioctl$RTC_EPOCH_READ(r1, 0x8008700d, &(0x7f0000000280)) getsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000300)=0xffff, &(0x7f0000000140)=0x4) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) bind$ax25(r0, &(0x7f0000000340)={{0x3, @null, 0x5}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x80000, 0x10064) r3 = openat$cgroup_procs(r2, &(0x7f0000000100)='cgroup.procs\x00', 0x2, 0x0) write$P9_RCLUNK(r1, &(0x7f00000001c0)={0x7, 0x79, 0x1}, 0x7) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.net/syz1\x00', 0x1ff) write$cgroup_pid(r3, &(0x7f0000000640), 0x12) [ 346.069666] binder: 12372:12381 ioctl 540f 20000080 returned -22 11:42:43 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x200001000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) socket$nl_route(0x10, 0x3, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = gettid() tkill(r1, 0x3b) socket$inet_tcp(0x2, 0x1, 0x0) write$FUSE_OPEN(0xffffffffffffffff, &(0x7f00000001c0)={0x20, 0x0, 0x1, {0x0, 0x6}}, 0x20) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000400)) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000300)='cgroup.procs\x00', 0x2, 0x0) connect$inet(r2, &(0x7f0000000280)={0x2, 0x0, @local}, 0x10) 11:42:43 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x200001000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x8400, 0x0) recvfrom$packet(r1, &(0x7f0000000080)=""/36, 0x24, 0x10020, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) r3 = socket$kcm(0x11, 0x8000000002, 0x300) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000001d80)=r2, 0x4) syz_genetlink_get_family_id$tipc2(&(0x7f0000000200)='TIPCv2\x00') getpeername$netrom(r1, &(0x7f00000000c0)={{0x3, @netrom}, [@null, @rose, @bcast, @netrom, @null, @default, @bcast, @rose]}, &(0x7f00000001c0)=0x48) [ 346.150095] protocol 88fb is buggy, dev hsr_slave_0 [ 346.155268] protocol 88fb is buggy, dev hsr_slave_1 [ 346.550088] protocol 88fb is buggy, dev hsr_slave_0 [ 346.555271] protocol 88fb is buggy, dev hsr_slave_1 [ 346.790112] protocol 88fb is buggy, dev hsr_slave_0 [ 346.795230] protocol 88fb is buggy, dev hsr_slave_1 11:42:46 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000000)="5500000019007f5300fe01b2a4a280930a60ffff00a84302910000003900090008000c00060000f3180015e00500", 0x2e}], 0x1}, 0x0) r0 = socket(0x1000000010, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f00000000c0), 0x492492492492191, 0x0) r1 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r1) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x38) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) 11:42:46 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/protocols\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") sendfile(r0, r1, 0x0, 0x7ffff000) 11:42:46 executing program 5: perf_event_open(&(0x7f0000000440)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x220801, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r0, 0x800443d3, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\xf6', 0x1ff) ioctl$RTC_EPOCH_READ(0xffffffffffffffff, 0x8008700d, &(0x7f0000000280)) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r1, &(0x7f0000000100)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000640), 0x12) 11:42:46 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x200001000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) socket$nl_route(0x10, 0x3, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = gettid() tkill(r1, 0x3b) socket$inet_tcp(0x2, 0x1, 0x0) write$FUSE_OPEN(0xffffffffffffffff, &(0x7f00000001c0)={0x20, 0x0, 0x1, {0x0, 0x6}}, 0x20) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000400)) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000300)='cgroup.procs\x00', 0x2, 0x0) connect$inet(r2, &(0x7f0000000280)={0x2, 0x0, @local}, 0x10) 11:42:46 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x200001000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) eventfd(0xd67) r2 = socket$kcm(0x11, 0x8000000002, 0x300) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000001d80)=r1, 0x4) pwritev(r2, &(0x7f00000007c0)=[{&(0x7f0000000040)="0533a02bf120b35a0dc9a3d948455eddefbe7757dc1f28b524d1a230bd0cce3c2facb9484fe0c456b0709f0f2ebd51bb8e23ce9a0a7e6940b4da0251fd0f34612e5f93eed280f09e79bfa6c88242f1b08ef2c87e2c7c026d715613eca670d48a6a69f67e6e87b3354c7a8ce92fa4c655fcd1a4ad479ce3a8e9754e418e55ac67a30eb6dc3398dcf3baef05a3c8cf37d31c80d7bb28468454d66cbdb4ec3749a34ad306fe92975df6d7225eeec793a71375", 0xb1}, {&(0x7f0000000100)="c3cfd1514b297f16ad90706d0ecc785e8e2013cac4ebfd31488d18fb86253b8b2d1c7f29f5389231ab", 0x29}, {&(0x7f00000002c0)="0b81329f49e458094a74d3434e9a904f6d48a2049d7020338fd487d038c4645db6e514e031ca99b527ad9d779a5121a81c11410a6838ea895682e4f7fdfdd473cacdff85d2a3ef4ece2571f8817a57968feb21090deacabf8b154665db64e69f3a843d71223aee75b4522f01ac9068b2ec06f51b7bb5512bf6e45376a33c958a485fd6ef400b99e28f68d5b63cf1eeeedb16784f6e4847c8b81a86acb03912bd71683a59eb62a4740896b4643b51c5e8fb64808d068fcca2d128673787af884326b9e01e0ab59fda21820581f122a9422831", 0xd2}, {&(0x7f00000003c0)="78f9767d0a66052f943f8327103dcf97d648a9010a323ec061b7255e9695ec6f231b7ea9d26c96b54c26842b7810f67752a73b6c5a1db856c309a2c4bfac66fcf8b6be249854ea66ed5a6ce6fc46e27f458bd46759ed9e5a04ba77e5b3d76d5635fdf68a7d9da24491339d9479529b32eb98f1fff3397ec3476c9170882edb20e8cd", 0x82}, {&(0x7f00000006c0)="0d9ece75a3a57a850d9536c2c5201e2a8e6e20d4a0e7454ce2b719f1013890ee9ac8952f416ee58d31e73b2f105ff59abd9bbc021a8548bfb6b30f68c0beb4329893c20a2e1e9b945fc730329ff739582ab46a02f4a1e03f0345d755a3", 0x5d}, {&(0x7f00000001c0)="e8b1746fb3f3478f5352", 0xa}, {&(0x7f0000000240)="456277f1ea7a79601736ee370c9b0d231031346eacf2c6ac13ab1faf32f536ad46f00af495a9f6e93b55ccbd84", 0x2d}, {&(0x7f0000000740)="311e504bc1936cc95a331472c9854b16d56dae763565ed2042050333383dfca67ea72a0f09efa0665475cbbe3efe59ef8de082861c7e0d01d0441e2509b15097d7fde66f9a2eca71c8445d11658d6900c2e187afe52f5c8db9c2d0057fb8b1148d2a9124e5fae4197712a22778c078f1174337a05b385fc511ed1c8aaa06", 0x7e}], 0x8, 0x0) r3 = accept4(r0, &(0x7f0000000840)=@in6={0xa, 0x0, 0x0, @initdev}, &(0x7f0000000480)=0x80, 0x80000) r4 = syz_open_dev$vbi(&(0x7f0000000a00)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_SUBDEV_G_FRAME_INTERVAL(r4, 0xc0305615, &(0x7f0000000ac0)={0x0, {0x9}}) getsockopt$inet_sctp_SCTP_PR_STREAM_STATUS(r3, 0x84, 0x74, &(0x7f00000008c0)=""/225, &(0x7f00000009c0)=0xe1) syz_genetlink_get_family_id$tipc2(&(0x7f0000000200)='TIPCv2\x00') getsockopt$inet6_opts(r3, 0x29, 0x37, &(0x7f0000000a40)=""/39, &(0x7f0000000a80)=0x27) write$cgroup_subtree(r1, &(0x7f0000000bc0)={[{0x2d, 'memory'}, {0x2b, 'memory'}, {0x2d, 'cpu\xeb\xab\x9d\xe0\xb5\x88*$o\x1e{=\xfefaw\xb7\xa5\xcf\xbc\xb3Z\xa4\x8f%\xa8\xe7\x0f\xef\x87\xc8\xd3\xb4\x87\x12YT\xc5\xbe\xb3\xa2yXQ\xee\xe7\xfe\xd5\xe6\xfe\xe4\xee0F\xfc\xe5!>\xed\xdc\xd6\xc8\x00\xad\xac\x01+\x99\xe2\x8f\x8699@\xb7\xf7\xcfl\x98G\x87\xb6\xb0\xbe\x91(\xe0\x82\xed\x01\x00\x00\x00\x00\x00\x00\x000\xfb\xe5\xf0\xd0_\xdaJ\x80\x88\xa8\xe7\xa9\x94M\x1dd2V\xe1\xf92\xd2\xc7|\xd2\x18\xb8Z\x1bWT_\xec\x81\xe8GI{\xa9\x04\x86\xde7\xbf\t$pv6\x16\xaf\x98\"\x06I\x93\xcb\xab\r4\xff\t\xf0\x92,]\xad\xe2CU\xcb\xed\xfc\x17\n\xa4\xc6\x82I~\xa81\xa6\x82\xcf\xaa'}, {0x2d, 'io'}, {0x2b, 'pids'}, {0x2b, 'pids'}]}, 0xdd) 11:42:46 executing program 1: perf_event_open(&(0x7f0000000440)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x220801, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r0, 0x800443d3, &(0x7f0000000580)={{0x3, 0x9, 0xffff, 0x7fffffff}, 0x100000000, 0x0, 0x9}) syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') r1 = openat$vcs(0xffffffffffffff9c, 0x0, 0x280200, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\xf6', 0x1ff) ioctl$RTC_EPOCH_READ(r1, 0x8008700d, &(0x7f0000000280)) getsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000300)=0xffff, &(0x7f0000000140)=0x4) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) bind$ax25(r0, &(0x7f0000000340)={{0x3, @null, 0x5}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x80000, 0x10064) r3 = openat$cgroup_procs(r2, &(0x7f0000000100)='cgroup.procs\x00', 0x2, 0x0) write$P9_RCLUNK(r1, &(0x7f00000001c0)={0x7, 0x79, 0x1}, 0x7) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.net/syz1\x00', 0x1ff) write$cgroup_pid(r3, &(0x7f0000000640), 0x12) 11:42:46 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-camellia-aesni-avx2\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000300)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) 11:42:46 executing program 5: perf_event_open(&(0x7f0000000440)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x220801, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r0, 0x800443d3, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\xf6', 0x1ff) ioctl$RTC_EPOCH_READ(0xffffffffffffffff, 0x8008700d, &(0x7f0000000280)) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f0000000100)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r2, 0x0, 0x0) 11:42:46 executing program 1: perf_event_open(&(0x7f0000000440)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x220801, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r0, 0x800443d3, &(0x7f0000000580)={{0x3, 0x9, 0xffff, 0x7fffffff}, 0x100000000, 0x0, 0x9}) syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') r1 = openat$vcs(0xffffffffffffff9c, 0x0, 0x280200, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\xf6', 0x1ff) ioctl$RTC_EPOCH_READ(r1, 0x8008700d, &(0x7f0000000280)) getsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000300)=0xffff, &(0x7f0000000140)=0x4) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) bind$ax25(r0, &(0x7f0000000340)={{0x3, @null, 0x5}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x80000, 0x10064) r3 = openat$cgroup_procs(r2, &(0x7f0000000100)='cgroup.procs\x00', 0x2, 0x0) write$P9_RCLUNK(r1, &(0x7f00000001c0)={0x7, 0x79, 0x1}, 0x7) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.net/syz1\x00', 0x1ff) write$cgroup_pid(r3, &(0x7f0000000640), 0x12) 11:42:46 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='cmdline\x00') preadv(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)=""/172, 0xac}], 0x1, 0x0) 11:42:46 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x200001000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) socket$nl_route(0x10, 0x3, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = gettid() tkill(r1, 0x3b) socket$inet_tcp(0x2, 0x1, 0x0) write$FUSE_OPEN(0xffffffffffffffff, &(0x7f00000001c0)={0x20, 0x0, 0x1, {0x0, 0x6}}, 0x20) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000400)) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000300)='cgroup.procs\x00', 0x2, 0x0) connect$inet(r2, &(0x7f0000000280)={0x2, 0x0, @local}, 0x10) 11:42:46 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x80000, 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000240)=[@timestamp], 0x1) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) ioctl$VFIO_CHECK_EXTENSION(0xffffffffffffffff, 0x3b65, 0x7) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) ioctl$TCSETSF(r0, 0x5404, &(0x7f00000002c0)={0x6, 0x8001, 0x8, 0x2, 0x0, 0x10001, 0x3, 0x7, 0x8c1, 0x0, 0x7, 0x7}) fcntl$setstatus(r1, 0x4, 0x2000) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000000)=0x2, 0x4) syz_emit_ethernet(0x0, 0x0, 0x0) connect$inet(r1, &(0x7f00000001c0)={0x2, 0x4e23, @broadcast}, 0x10) sendmmsg(r1, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) setxattr$security_selinux(0x0, 0x0, &(0x7f0000000180)='system_u:object_r:memory_device_t:s0\x00', 0x25, 0x1) [ 350.710127] net_ratelimit: 20 callbacks suppressed [ 350.715193] protocol 88fb is buggy, dev hsr_slave_0 [ 350.720232] protocol 88fb is buggy, dev hsr_slave_1 [ 350.950103] protocol 88fb is buggy, dev hsr_slave_0 [ 350.955173] protocol 88fb is buggy, dev hsr_slave_1 [ 351.040128] protocol 88fb is buggy, dev hsr_slave_0 [ 351.045192] protocol 88fb is buggy, dev hsr_slave_1 [ 351.670155] protocol 88fb is buggy, dev hsr_slave_0 [ 351.675239] protocol 88fb is buggy, dev hsr_slave_1 11:42:49 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000000)="5500000019007f5300fe01b2a4a280930a60ffff00a84302910000003900090008000c00060000f3180015e00500", 0x2e}], 0x1}, 0x0) r0 = socket(0x1000000010, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f00000000c0), 0x492492492492191, 0x0) r1 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r1) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x38) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) 11:42:49 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xf7d, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6(0xa, 0x3, 0x1) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) 11:42:49 executing program 1: perf_event_open(&(0x7f0000000440)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x220801, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r0, 0x800443d3, &(0x7f0000000580)={{0x3, 0x9, 0xffff, 0x7fffffff}, 0x100000000, 0x0, 0x9}) syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') r1 = openat$vcs(0xffffffffffffff9c, 0x0, 0x280200, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\xf6', 0x1ff) ioctl$RTC_EPOCH_READ(r1, 0x8008700d, &(0x7f0000000280)) getsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000300)=0xffff, &(0x7f0000000140)=0x4) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) bind$ax25(r0, &(0x7f0000000340)={{0x3, @null, 0x5}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x80000, 0x10064) r3 = openat$cgroup_procs(r2, &(0x7f0000000100)='cgroup.procs\x00', 0x2, 0x0) write$P9_RCLUNK(r1, &(0x7f00000001c0)={0x7, 0x79, 0x1}, 0x7) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.net/syz1\x00', 0x1ff) write$cgroup_pid(r3, &(0x7f0000000640), 0x12) 11:42:49 executing program 5: perf_event_open(&(0x7f0000000440)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x220801, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r0, 0x800443d3, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\xf6', 0x1ff) ioctl$RTC_EPOCH_READ(0xffffffffffffffff, 0x8008700d, &(0x7f0000000280)) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f0000000100)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r2, 0x0, 0x0) 11:42:49 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x200001000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) socket$nl_route(0x10, 0x3, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = gettid() tkill(r1, 0x3b) socket$inet_tcp(0x2, 0x1, 0x0) write$FUSE_OPEN(0xffffffffffffffff, &(0x7f00000001c0)={0x20, 0x0, 0x1, {0x0, 0x6}}, 0x20) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000400)) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000300)='cgroup.procs\x00', 0x2, 0x0) connect$inet(r2, &(0x7f0000000280)={0x2, 0x0, @local}, 0x10) 11:42:49 executing program 2: r0 = gettid() recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x9}}, 0x0) listen(r1, 0xf8) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0xc9c) poll(0x0, 0x0, 0x0) tkill(r0, 0x1000100000016) [ 351.990120] protocol 88fb is buggy, dev hsr_slave_0 [ 351.995197] protocol 88fb is buggy, dev hsr_slave_1 11:42:49 executing program 5: perf_event_open(&(0x7f0000000440)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x220801, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r0, 0x800443d3, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\xf6', 0x1ff) ioctl$RTC_EPOCH_READ(0xffffffffffffffff, 0x8008700d, &(0x7f0000000280)) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f0000000100)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r2, 0x0, 0x0) 11:42:49 executing program 1: perf_event_open(&(0x7f0000000440)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x220801, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r0, 0x800443d3, &(0x7f0000000580)={{0x3, 0x9, 0xffff, 0x7fffffff}, 0x100000000, 0x0, 0x9}) syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vcs\x00', 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\xf6', 0x1ff) ioctl$RTC_EPOCH_READ(r1, 0x8008700d, &(0x7f0000000280)) getsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000300)=0xffff, &(0x7f0000000140)=0x4) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) bind$ax25(r0, &(0x7f0000000340)={{0x3, @null, 0x5}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x80000, 0x10064) r3 = openat$cgroup_procs(r2, &(0x7f0000000100)='cgroup.procs\x00', 0x2, 0x0) write$P9_RCLUNK(r1, &(0x7f00000001c0)={0x7, 0x79, 0x1}, 0x7) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.net/syz1\x00', 0x1ff) write$cgroup_pid(r3, &(0x7f0000000640), 0x12) 11:42:49 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) r2 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) statfs(&(0x7f0000000240)='./bus\x00', &(0x7f0000000900)=""/147) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(r1, 0xc4c85513, &(0x7f00000009c0)={{0x6, 0x6, 0x7f, 0xf6, 'syz0\x00', 0x5}, 0x0, [0xffff, 0xfffffffffffff001, 0x9, 0x6a4, 0x9, 0x200, 0x1000, 0x0, 0x1, 0x8001, 0x3, 0x366, 0x2, 0x9, 0x2, 0x5, 0xe2, 0x2, 0x2, 0x9, 0x9, 0x5, 0x1000, 0xffffffffffffff56, 0x9349, 0x100000001, 0x6, 0xffffffff, 0x7fff, 0x954, 0x100000000, 0x0, 0xa7, 0x4, 0x1, 0x6, 0x7, 0x7, 0x73a, 0x6, 0x7, 0x831, 0x0, 0xbd52, 0x3f, 0x1, 0x8, 0xce, 0x1f, 0xefd, 0x100, 0x7, 0x8001, 0xc702, 0x3, 0x6, 0x7, 0xd538, 0x7, 0x1, 0x101, 0x80000000, 0xfffffffffffffffb, 0xbe6e, 0x7f, 0xb1f, 0x0, 0x81, 0x9, 0x8, 0x7fff, 0x4a, 0xe042, 0x0, 0x5, 0x3, 0x9, 0xfffffffffffffe00, 0x0, 0x100, 0x100000001, 0x2, 0x7, 0x6, 0x7, 0x4, 0x5, 0x80000001, 0x7fff, 0x1, 0x0, 0x10001, 0x31c825ca, 0xfffffffffffffe00, 0x9, 0x0, 0x7ff, 0x2, 0x1f, 0xff, 0x100000000, 0x6, 0x7, 0x5, 0x20, 0x1563, 0x6, 0x1, 0x10001, 0x3, 0x10001, 0x1ff, 0x88, 0x3, 0x4, 0x0, 0x0, 0x0, 0xfffffffffffff000, 0x6, 0x20, 0x8, 0x1, 0x0, 0x5, 0xfffffffffffffffb, 0x6, 0x8], {0x0, 0x1c9c380}}) fsetxattr$security_smack_entry(r2, &(0x7f0000000000)='security.SMACK64\x00', &(0x7f0000000040)='vfat\x00', 0x5, 0x0) 11:42:49 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x200001000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) socket$nl_route(0x10, 0x3, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = gettid() tkill(r1, 0x3b) socket$inet_tcp(0x2, 0x1, 0x0) write$FUSE_OPEN(0xffffffffffffffff, &(0x7f00000001c0)={0x20, 0x0, 0x1, {0x0, 0x6}}, 0x20) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000400)) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000300)='cgroup.procs\x00', 0x2, 0x0) connect$inet(r2, &(0x7f0000000280)={0x2, 0x0, @local}, 0x10) 11:42:49 executing program 1: perf_event_open(&(0x7f0000000440)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x220801, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r0, 0x800443d3, &(0x7f0000000580)={{0x3, 0x9, 0xffff, 0x7fffffff}, 0x100000000, 0x0, 0x9}) syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vcs\x00', 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\xf6', 0x1ff) ioctl$RTC_EPOCH_READ(r1, 0x8008700d, &(0x7f0000000280)) getsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000300)=0xffff, &(0x7f0000000140)=0x4) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) bind$ax25(r0, &(0x7f0000000340)={{0x3, @null, 0x5}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x80000, 0x10064) r3 = openat$cgroup_procs(r2, &(0x7f0000000100)='cgroup.procs\x00', 0x2, 0x0) write$P9_RCLUNK(r1, &(0x7f00000001c0)={0x7, 0x79, 0x1}, 0x7) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.net/syz1\x00', 0x1ff) write$cgroup_pid(r3, &(0x7f0000000640), 0x12) 11:42:49 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x200001000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) socket$nl_route(0x10, 0x3, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = gettid() tkill(r1, 0x3b) socket$inet_tcp(0x2, 0x1, 0x0) write$FUSE_OPEN(0xffffffffffffffff, &(0x7f00000001c0)={0x20, 0x0, 0x1, {0x0, 0x6}}, 0x20) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000400)) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000300)='cgroup.procs\x00', 0x2, 0x0) connect$inet(r2, &(0x7f0000000280)={0x2, 0x0, @local}, 0x10) 11:42:52 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000000)="5500000019007f5300fe01b2a4a280930a60ffff00a84302910000003900090008000c00060000f3180015e005000600000000dc1320", 0x36}], 0x1}, 0x0) r0 = socket(0x1000000010, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f00000000c0), 0x492492492492191, 0x0) r1 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r1) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x38) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) 11:42:52 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) r2 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) statfs(&(0x7f0000000240)='./bus\x00', &(0x7f0000000900)=""/147) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(r1, 0xc4c85513, &(0x7f00000009c0)={{0x6, 0x6, 0x7f, 0xf6, 'syz0\x00', 0x5}, 0x0, [0xffff, 0xfffffffffffff001, 0x9, 0x6a4, 0x9, 0x200, 0x1000, 0x0, 0x1, 0x8001, 0x3, 0x366, 0x2, 0x9, 0x2, 0x5, 0xe2, 0x2, 0x2, 0x9, 0x9, 0x5, 0x1000, 0xffffffffffffff56, 0x9349, 0x100000001, 0x6, 0xffffffff, 0x7fff, 0x954, 0x100000000, 0x0, 0xa7, 0x4, 0x1, 0x6, 0x7, 0x7, 0x73a, 0x6, 0x7, 0x831, 0x0, 0xbd52, 0x3f, 0x1, 0x8, 0xce, 0x1f, 0xefd, 0x100, 0x7, 0x8001, 0xc702, 0x3, 0x6, 0x7, 0xd538, 0x7, 0x1, 0x101, 0x80000000, 0xfffffffffffffffb, 0xbe6e, 0x7f, 0xb1f, 0x0, 0x81, 0x9, 0x8, 0x7fff, 0x4a, 0xe042, 0x0, 0x5, 0x3, 0x9, 0xfffffffffffffe00, 0x0, 0x100, 0x100000001, 0x2, 0x7, 0x6, 0x7, 0x4, 0x5, 0x80000001, 0x7fff, 0x1, 0x0, 0x10001, 0x31c825ca, 0xfffffffffffffe00, 0x9, 0x0, 0x7ff, 0x2, 0x1f, 0xff, 0x100000000, 0x6, 0x7, 0x5, 0x20, 0x1563, 0x6, 0x1, 0x10001, 0x3, 0x10001, 0x1ff, 0x88, 0x3, 0x4, 0x0, 0x0, 0x0, 0xfffffffffffff000, 0x6, 0x20, 0x8, 0x1, 0x0, 0x5, 0xfffffffffffffffb, 0x6, 0x8], {0x0, 0x1c9c380}}) fsetxattr$security_smack_entry(r2, &(0x7f0000000000)='security.SMACK64\x00', &(0x7f0000000040)='vfat\x00', 0x5, 0x0) 11:42:52 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x200001000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf0") bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) socket$nl_route(0x10, 0x3, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = gettid() tkill(r1, 0x3b) socket$inet_tcp(0x2, 0x1, 0x0) write$FUSE_OPEN(0xffffffffffffffff, &(0x7f00000001c0)={0x20, 0x0, 0x1, {0x0, 0x6}}, 0x20) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000400)) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000300)='cgroup.procs\x00', 0x2, 0x0) connect$inet(r2, &(0x7f0000000280)={0x2, 0x0, @local}, 0x10) 11:42:52 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x200001000008912, &(0x7f0000000000)="11dca5055e0b") bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) socket$nl_route(0x10, 0x3, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = gettid() tkill(r1, 0x3b) socket$inet_tcp(0x2, 0x1, 0x0) write$FUSE_OPEN(0xffffffffffffffff, &(0x7f00000001c0)={0x20, 0x0, 0x1, {0x0, 0x6}}, 0x20) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000400)) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000300)='cgroup.procs\x00', 0x2, 0x0) connect$inet(r2, &(0x7f0000000280)={0x2, 0x0, @local}, 0x10) 11:42:52 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x200001000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) socket$nl_route(0x10, 0x3, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = gettid() tkill(r1, 0x3b) socket$inet_tcp(0x2, 0x1, 0x0) write$FUSE_OPEN(0xffffffffffffffff, &(0x7f00000001c0)={0x20, 0x0, 0x1, {0x0, 0x6}}, 0x20) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000400)) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000300)='cgroup.procs\x00', 0x2, 0x0) connect$inet(r2, &(0x7f0000000280)={0x2, 0x0, @local}, 0x10) 11:42:52 executing program 1: perf_event_open(&(0x7f0000000440)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x220801, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r0, 0x800443d3, &(0x7f0000000580)={{0x3, 0x9, 0xffff, 0x7fffffff}, 0x100000000, 0x0, 0x9}) syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vcs\x00', 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\xf6', 0x1ff) ioctl$RTC_EPOCH_READ(r1, 0x8008700d, &(0x7f0000000280)) getsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000300)=0xffff, &(0x7f0000000140)=0x4) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) bind$ax25(r0, &(0x7f0000000340)={{0x3, @null, 0x5}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x80000, 0x10064) r3 = openat$cgroup_procs(r2, &(0x7f0000000100)='cgroup.procs\x00', 0x2, 0x0) write$P9_RCLUNK(r1, &(0x7f00000001c0)={0x7, 0x79, 0x1}, 0x7) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.net/syz1\x00', 0x1ff) write$cgroup_pid(r3, &(0x7f0000000640), 0x12) 11:42:52 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x200001000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) socket$nl_route(0x10, 0x3, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = gettid() tkill(r1, 0x3b) socket$inet_tcp(0x2, 0x1, 0x0) write$FUSE_OPEN(0xffffffffffffffff, &(0x7f00000001c0)={0x20, 0x0, 0x1, {0x0, 0x6}}, 0x20) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000400)) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000300)='cgroup.procs\x00', 0x2, 0x0) connect$inet(r2, &(0x7f0000000280)={0x2, 0x0, @local}, 0x10) 11:42:52 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) r2 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) statfs(&(0x7f0000000240)='./bus\x00', &(0x7f0000000900)=""/147) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(r1, 0xc4c85513, &(0x7f00000009c0)={{0x6, 0x6, 0x7f, 0xf6, 'syz0\x00', 0x5}, 0x0, [0xffff, 0xfffffffffffff001, 0x9, 0x6a4, 0x9, 0x200, 0x1000, 0x0, 0x1, 0x8001, 0x3, 0x366, 0x2, 0x9, 0x2, 0x5, 0xe2, 0x2, 0x2, 0x9, 0x9, 0x5, 0x1000, 0xffffffffffffff56, 0x9349, 0x100000001, 0x6, 0xffffffff, 0x7fff, 0x954, 0x100000000, 0x0, 0xa7, 0x4, 0x1, 0x6, 0x7, 0x7, 0x73a, 0x6, 0x7, 0x831, 0x0, 0xbd52, 0x3f, 0x1, 0x8, 0xce, 0x1f, 0xefd, 0x100, 0x7, 0x8001, 0xc702, 0x3, 0x6, 0x7, 0xd538, 0x7, 0x1, 0x101, 0x80000000, 0xfffffffffffffffb, 0xbe6e, 0x7f, 0xb1f, 0x0, 0x81, 0x9, 0x8, 0x7fff, 0x4a, 0xe042, 0x0, 0x5, 0x3, 0x9, 0xfffffffffffffe00, 0x0, 0x100, 0x100000001, 0x2, 0x7, 0x6, 0x7, 0x4, 0x5, 0x80000001, 0x7fff, 0x1, 0x0, 0x10001, 0x31c825ca, 0xfffffffffffffe00, 0x9, 0x0, 0x7ff, 0x2, 0x1f, 0xff, 0x100000000, 0x6, 0x7, 0x5, 0x20, 0x1563, 0x6, 0x1, 0x10001, 0x3, 0x10001, 0x1ff, 0x88, 0x3, 0x4, 0x0, 0x0, 0x0, 0xfffffffffffff000, 0x6, 0x20, 0x8, 0x1, 0x0, 0x5, 0xfffffffffffffffb, 0x6, 0x8], {0x0, 0x1c9c380}}) fsetxattr$security_smack_entry(r2, &(0x7f0000000000)='security.SMACK64\x00', &(0x7f0000000040)='vfat\x00', 0x5, 0x0) 11:42:52 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x200001000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf0") bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) socket$nl_route(0x10, 0x3, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = gettid() tkill(r1, 0x3b) socket$inet_tcp(0x2, 0x1, 0x0) write$FUSE_OPEN(0xffffffffffffffff, &(0x7f00000001c0)={0x20, 0x0, 0x1, {0x0, 0x6}}, 0x20) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000400)) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000300)='cgroup.procs\x00', 0x2, 0x0) connect$inet(r2, &(0x7f0000000280)={0x2, 0x0, @local}, 0x10) 11:42:52 executing program 1: perf_event_open(&(0x7f0000000440)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x220801, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r0, 0x800443d3, &(0x7f0000000580)={{0x3, 0x9, 0xffff, 0x7fffffff}, 0x100000000, 0x0, 0x9}) syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vcs\x00', 0x280200, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) ioctl$RTC_EPOCH_READ(r1, 0x8008700d, &(0x7f0000000280)) getsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000300)=0xffff, &(0x7f0000000140)=0x4) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) bind$ax25(r0, &(0x7f0000000340)={{0x3, @null, 0x5}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x80000, 0x10064) r3 = openat$cgroup_procs(r2, &(0x7f0000000100)='cgroup.procs\x00', 0x2, 0x0) write$P9_RCLUNK(r1, &(0x7f00000001c0)={0x7, 0x79, 0x1}, 0x7) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.net/syz1\x00', 0x1ff) write$cgroup_pid(r3, &(0x7f0000000640), 0x12) 11:42:52 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x200001000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) socket$nl_route(0x10, 0x3, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = gettid() tkill(r1, 0x3b) socket$inet_tcp(0x2, 0x1, 0x0) write$FUSE_OPEN(0xffffffffffffffff, &(0x7f00000001c0)={0x20, 0x0, 0x1, {0x0, 0x6}}, 0x20) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000400)) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000300)='cgroup.procs\x00', 0x2, 0x0) connect$inet(r2, &(0x7f0000000280)={0x2, 0x0, @local}, 0x10) 11:42:52 executing program 4: sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000000)="5500000019007f5300fe01b2a4a280930a60ffff00a84302910000003900090008000c00060000f3180015e00500", 0x2e}], 0x1}, 0x0) r0 = socket(0x1000000010, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f00000000c0), 0x492492492492191, 0x0) r1 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r1) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x38) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) [ 355.830134] net_ratelimit: 20 callbacks suppressed [ 355.830140] protocol 88fb is buggy, dev hsr_slave_0 [ 355.840150] protocol 88fb is buggy, dev hsr_slave_1 [ 356.150101] protocol 88fb is buggy, dev hsr_slave_0 [ 356.155156] protocol 88fb is buggy, dev hsr_slave_1 [ 356.550087] protocol 88fb is buggy, dev hsr_slave_0 [ 356.555216] protocol 88fb is buggy, dev hsr_slave_1 [ 356.950114] protocol 88fb is buggy, dev hsr_slave_0 [ 356.955216] protocol 88fb is buggy, dev hsr_slave_1 [ 357.190155] protocol 88fb is buggy, dev hsr_slave_0 [ 357.195233] protocol 88fb is buggy, dev hsr_slave_1 11:42:55 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000000)="5500000019007f5300fe01b2a4a280930a60ffff00a84302910000003900090008000c00060000f3180015e005000600000000dc1320", 0x36}], 0x1}, 0x0) r0 = socket(0x1000000010, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f00000000c0), 0x492492492492191, 0x0) r1 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r1) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x38) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) 11:42:55 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x200001000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf0") bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) socket$nl_route(0x10, 0x3, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = gettid() tkill(r1, 0x3b) socket$inet_tcp(0x2, 0x1, 0x0) write$FUSE_OPEN(0xffffffffffffffff, &(0x7f00000001c0)={0x20, 0x0, 0x1, {0x0, 0x6}}, 0x20) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000400)) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000300)='cgroup.procs\x00', 0x2, 0x0) connect$inet(r2, &(0x7f0000000280)={0x2, 0x0, @local}, 0x10) 11:42:55 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) r2 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) statfs(&(0x7f0000000240)='./bus\x00', &(0x7f0000000900)=""/147) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(r1, 0xc4c85513, &(0x7f00000009c0)={{0x6, 0x6, 0x7f, 0xf6, 'syz0\x00', 0x5}, 0x0, [0xffff, 0xfffffffffffff001, 0x9, 0x6a4, 0x9, 0x200, 0x1000, 0x0, 0x1, 0x8001, 0x3, 0x366, 0x2, 0x9, 0x2, 0x5, 0xe2, 0x2, 0x2, 0x9, 0x9, 0x5, 0x1000, 0xffffffffffffff56, 0x9349, 0x100000001, 0x6, 0xffffffff, 0x7fff, 0x954, 0x100000000, 0x0, 0xa7, 0x4, 0x1, 0x6, 0x7, 0x7, 0x73a, 0x6, 0x7, 0x831, 0x0, 0xbd52, 0x3f, 0x1, 0x8, 0xce, 0x1f, 0xefd, 0x100, 0x7, 0x8001, 0xc702, 0x3, 0x6, 0x7, 0xd538, 0x7, 0x1, 0x101, 0x80000000, 0xfffffffffffffffb, 0xbe6e, 0x7f, 0xb1f, 0x0, 0x81, 0x9, 0x8, 0x7fff, 0x4a, 0xe042, 0x0, 0x5, 0x3, 0x9, 0xfffffffffffffe00, 0x0, 0x100, 0x100000001, 0x2, 0x7, 0x6, 0x7, 0x4, 0x5, 0x80000001, 0x7fff, 0x1, 0x0, 0x10001, 0x31c825ca, 0xfffffffffffffe00, 0x9, 0x0, 0x7ff, 0x2, 0x1f, 0xff, 0x100000000, 0x6, 0x7, 0x5, 0x20, 0x1563, 0x6, 0x1, 0x10001, 0x3, 0x10001, 0x1ff, 0x88, 0x3, 0x4, 0x0, 0x0, 0x0, 0xfffffffffffff000, 0x6, 0x20, 0x8, 0x1, 0x0, 0x5, 0xfffffffffffffffb, 0x6, 0x8], {0x0, 0x1c9c380}}) fsetxattr$security_smack_entry(r2, &(0x7f0000000000)='security.SMACK64\x00', &(0x7f0000000040)='vfat\x00', 0x5, 0x0) 11:42:55 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x200001000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) socket$nl_route(0x10, 0x3, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = gettid() tkill(r1, 0x3b) socket$inet_tcp(0x2, 0x1, 0x0) write$FUSE_OPEN(0xffffffffffffffff, &(0x7f00000001c0)={0x20, 0x0, 0x1, {0x0, 0x6}}, 0x20) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000400)) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000300)='cgroup.procs\x00', 0x2, 0x0) connect$inet(r2, &(0x7f0000000280)={0x2, 0x0, @local}, 0x10) 11:42:55 executing program 1: perf_event_open(&(0x7f0000000440)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x220801, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r0, 0x800443d3, &(0x7f0000000580)={{0x3, 0x9, 0xffff, 0x7fffffff}, 0x100000000, 0x0, 0x9}) syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vcs\x00', 0x280200, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) ioctl$RTC_EPOCH_READ(r1, 0x8008700d, &(0x7f0000000280)) getsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000300)=0xffff, &(0x7f0000000140)=0x4) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) bind$ax25(r0, &(0x7f0000000340)={{0x3, @null, 0x5}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x80000, 0x10064) r3 = openat$cgroup_procs(r2, &(0x7f0000000100)='cgroup.procs\x00', 0x2, 0x0) write$P9_RCLUNK(r1, &(0x7f00000001c0)={0x7, 0x79, 0x1}, 0x7) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.net/syz1\x00', 0x1ff) write$cgroup_pid(r3, &(0x7f0000000640), 0x12) 11:42:55 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x200001000008912, &(0x7f0000000000)="11dca5055e0b") bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000002c0)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000100000002402000020feffff7a0af0fff8ffffff69a4f0ff00000000b7060000000000000744000000000000b7040000100000206a0700fe00000000850000002f000000b70000000a00000095000000000000006458c2c62fc286000389d909a63796c113a80c19aab9d646ae8f51b6cdf0d3253730e711f5969f62c28b22756bedf3cf393d14c46cc4f79fd2b316da4f0de8163f6242fa7323f1740637c48468766af540439f0500f144631ac2f9842e1b346362dcae08c3d1a1fbe96dd87235b44174f7c0343185089ab5119e31975e551558055dc2dce53b95c132e78454c4813681e0688d3a127f7418c6226f4133346c2e6794d952f2bb7938a2c53a0ce68e"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) socket$nl_route(0x10, 0x3, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = gettid() tkill(r1, 0x3b) socket$inet_tcp(0x2, 0x1, 0x0) write$FUSE_OPEN(0xffffffffffffffff, &(0x7f00000001c0)={0x20, 0x0, 0x1, {0x0, 0x6}}, 0x20) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000400)) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000300)='cgroup.procs\x00', 0x2, 0x0) connect$inet(r2, &(0x7f0000000280)={0x2, 0x0, @local}, 0x10) 11:42:55 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x200001000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) socket$nl_route(0x10, 0x3, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = gettid() tkill(r1, 0x3b) socket$inet_tcp(0x2, 0x1, 0x0) write$FUSE_OPEN(0xffffffffffffffff, &(0x7f00000001c0)={0x20, 0x0, 0x1, {0x0, 0x6}}, 0x20) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000400)) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000300)='cgroup.procs\x00', 0x2, 0x0) connect$inet(r2, &(0x7f0000000280)={0x2, 0x0, @local}, 0x10) 11:42:55 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x200001000008912, &(0x7f0000000000)) bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) socket$nl_route(0x10, 0x3, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = gettid() tkill(r1, 0x3b) socket$inet_tcp(0x2, 0x1, 0x0) write$FUSE_OPEN(0xffffffffffffffff, &(0x7f00000001c0)={0x20, 0x0, 0x1, {0x0, 0x6}}, 0x20) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000400)) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000300)='cgroup.procs\x00', 0x2, 0x0) connect$inet(r2, &(0x7f0000000280)={0x2, 0x0, @local}, 0x10) 11:42:55 executing program 1: perf_event_open(&(0x7f0000000440)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x220801, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r0, 0x800443d3, &(0x7f0000000580)={{0x3, 0x9, 0xffff, 0x7fffffff}, 0x100000000, 0x0, 0x9}) syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vcs\x00', 0x280200, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) ioctl$RTC_EPOCH_READ(r1, 0x8008700d, &(0x7f0000000280)) getsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000300)=0xffff, &(0x7f0000000140)=0x4) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) bind$ax25(r0, &(0x7f0000000340)={{0x3, @null, 0x5}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x80000, 0x10064) r3 = openat$cgroup_procs(r2, &(0x7f0000000100)='cgroup.procs\x00', 0x2, 0x0) write$P9_RCLUNK(r1, &(0x7f00000001c0)={0x7, 0x79, 0x1}, 0x7) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.net/syz1\x00', 0x1ff) write$cgroup_pid(r3, &(0x7f0000000640), 0x12) 11:42:55 executing program 4: perf_event_open(&(0x7f0000000440)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x220801, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r0, 0x800443d3, &(0x7f0000000580)={{0x3, 0x9, 0xffff, 0x7fffffff}, 0x0, 0x0, 0x9}) syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vcs\x00', 0x280200, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\xf6', 0x1ff) ioctl$RTC_EPOCH_READ(r1, 0x8008700d, &(0x7f0000000280)) getsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000300)=0xffff, &(0x7f0000000140)=0x4) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) bind$ax25(r0, &(0x7f0000000340)={{0x3, @null, 0x5}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x80000, 0x10064) r3 = openat$cgroup_procs(r2, &(0x7f0000000100)='cgroup.procs\x00', 0x2, 0x0) write$P9_RCLUNK(r1, &(0x7f00000001c0)={0x7, 0x79, 0x1}, 0x7) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.net/syz1\x00', 0x1ff) write$cgroup_pid(r3, &(0x7f0000000640), 0x12) 11:42:55 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x200001000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) socket$nl_route(0x10, 0x3, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = gettid() tkill(r1, 0x3b) socket$inet_tcp(0x2, 0x1, 0x0) write$FUSE_OPEN(0xffffffffffffffff, &(0x7f00000001c0)={0x20, 0x0, 0x1, {0x0, 0x6}}, 0x20) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000400)) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000300)='cgroup.procs\x00', 0x2, 0x0) connect$inet(r2, &(0x7f0000000280)={0x2, 0x0, @local}, 0x10) 11:42:55 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000000)={0xa, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) statfs(&(0x7f0000000240)='./bus\x00', &(0x7f0000000300)=""/147) 11:42:58 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000000)="5500000019007f5300fe01b2a4a280930a60ffff00a84302910000003900090008000c00060000f3180015e005000600000000dc1320", 0x36}], 0x1}, 0x0) r0 = socket(0x1000000010, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f00000000c0), 0x492492492492191, 0x0) r1 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r1) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x38) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) 11:42:58 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x200001000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) socket$nl_route(0x10, 0x3, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = gettid() tkill(r1, 0x3b) socket$inet_tcp(0x2, 0x1, 0x0) write$FUSE_OPEN(0xffffffffffffffff, &(0x7f00000001c0)={0x20, 0x0, 0x1, {0x0, 0x6}}, 0x20) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000400)) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000300)='cgroup.procs\x00', 0x2, 0x0) connect$inet(r2, &(0x7f0000000280)={0x2, 0x0, @local}, 0x10) 11:42:58 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x200001000008912, &(0x7f0000000000)) bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) socket$nl_route(0x10, 0x3, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = gettid() tkill(r1, 0x3b) socket$inet_tcp(0x2, 0x1, 0x0) write$FUSE_OPEN(0xffffffffffffffff, &(0x7f00000001c0)={0x20, 0x0, 0x1, {0x0, 0x6}}, 0x20) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000400)) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000300)='cgroup.procs\x00', 0x2, 0x0) connect$inet(r2, &(0x7f0000000280)={0x2, 0x0, @local}, 0x10) 11:42:58 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x200001000008912, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000002c0)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000100000002402000020feffff7a0af0fff8ffffff69a4f0ff00000000b7060000000000000744000000000000b7040000100000206a0700fe00000000850000002f000000b70000000a00000095000000000000006458c2c62fc286000389d909a63796c113a80c19aab9d646ae8f51b6cdf0d3253730e711f5969f62c28b22756bedf3cf393d14c46cc4f79fd2b316da4f0de8163f6242fa7323f1740637c48468766af540439f0500f144631ac2f9842e1b346362dcae08c3d1a1fbe96dd87235b44174f7c0343185089ab5119e31975e551558055dc2dce53b95c132e78454c4813681e0688d3a127f7418c6226f4133346c2e6794d952f2bb7938a2c53a0ce68e"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) socket$nl_route(0x10, 0x3, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = gettid() tkill(r1, 0x3b) socket$inet_tcp(0x2, 0x1, 0x0) write$FUSE_OPEN(0xffffffffffffffff, &(0x7f00000001c0)={0x20, 0x0, 0x1, {0x0, 0x6}}, 0x20) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000400)) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000300)='cgroup.procs\x00', 0x2, 0x0) connect$inet(r2, &(0x7f0000000280)={0x2, 0x0, @local}, 0x10) 11:42:58 executing program 1: perf_event_open(&(0x7f0000000440)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x220801, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r0, 0x800443d3, &(0x7f0000000580)={{0x3, 0x9, 0xffff, 0x7fffffff}, 0x100000000, 0x0, 0x9}) syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vcs\x00', 0x280200, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\xf6', 0x1ff) ioctl$RTC_EPOCH_READ(0xffffffffffffffff, 0x8008700d, &(0x7f0000000280)) getsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000300)=0xffff, &(0x7f0000000140)=0x4) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) bind$ax25(r0, &(0x7f0000000340)={{0x3, @null, 0x5}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x80000, 0x10064) r3 = openat$cgroup_procs(r2, &(0x7f0000000100)='cgroup.procs\x00', 0x2, 0x0) write$P9_RCLUNK(r1, &(0x7f00000001c0)={0x7, 0x79, 0x1}, 0x7) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.net/syz1\x00', 0x1ff) write$cgroup_pid(r3, &(0x7f0000000640), 0x12) 11:42:58 executing program 4: perf_event_open(&(0x7f0000000440)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x220801, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r0, 0x800443d3, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\xf6', 0x1ff) ioctl$RTC_EPOCH_READ(0xffffffffffffffff, 0x8008700d, &(0x7f0000000280)) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f0000000100)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f0000000640), 0x12) [ 361.110130] net_ratelimit: 20 callbacks suppressed [ 361.115110] protocol 88fb is buggy, dev hsr_slave_0 [ 361.120164] protocol 88fb is buggy, dev hsr_slave_1 11:42:58 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x200001000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) socket$nl_route(0x10, 0x3, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = gettid() tkill(r1, 0x3b) socket$inet_tcp(0x2, 0x1, 0x0) write$FUSE_OPEN(0xffffffffffffffff, &(0x7f00000001c0)={0x20, 0x0, 0x1, {0x0, 0x6}}, 0x20) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000400)) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000300)='cgroup.procs\x00', 0x2, 0x0) connect$inet(r2, &(0x7f0000000280)={0x2, 0x0, @local}, 0x10) 11:42:58 executing program 1: perf_event_open(&(0x7f0000000440)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x220801, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r0, 0x800443d3, &(0x7f0000000580)={{0x3, 0x9, 0xffff, 0x7fffffff}, 0x100000000, 0x0, 0x9}) syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vcs\x00', 0x280200, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\xf6', 0x1ff) ioctl$RTC_EPOCH_READ(0xffffffffffffffff, 0x8008700d, &(0x7f0000000280)) getsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000300)=0xffff, &(0x7f0000000140)=0x4) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) bind$ax25(r0, &(0x7f0000000340)={{0x3, @null, 0x5}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x80000, 0x10064) r3 = openat$cgroup_procs(r2, &(0x7f0000000100)='cgroup.procs\x00', 0x2, 0x0) write$P9_RCLUNK(r1, &(0x7f00000001c0)={0x7, 0x79, 0x1}, 0x7) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.net/syz1\x00', 0x1ff) write$cgroup_pid(r3, &(0x7f0000000640), 0x12) 11:42:58 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x200001000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) socket$nl_route(0x10, 0x3, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = gettid() tkill(r1, 0x3b) socket$inet_tcp(0x2, 0x1, 0x0) write$FUSE_OPEN(0xffffffffffffffff, &(0x7f00000001c0)={0x20, 0x0, 0x1, {0x0, 0x6}}, 0x20) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000400)) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000300)='cgroup.procs\x00', 0x2, 0x0) connect$inet(r2, &(0x7f0000000280)={0x2, 0x0, @local}, 0x10) 11:42:58 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x200001000008912, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) socket$nl_route(0x10, 0x3, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = gettid() tkill(r1, 0x3b) socket$inet_tcp(0x2, 0x1, 0x0) write$FUSE_OPEN(0xffffffffffffffff, &(0x7f00000001c0)={0x20, 0x0, 0x1, {0x0, 0x6}}, 0x20) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000400)) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000300)='cgroup.procs\x00', 0x2, 0x0) connect$inet(r2, &(0x7f0000000280)={0x2, 0x0, @local}, 0x10) 11:42:58 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000000)="5500000019007f5300fe01b2a4a280930a60ffff00a84302910000003900090008000c00060000f3180015e005000600000000dc1320d5440700", 0x3a}], 0x1}, 0x0) r0 = socket(0x1000000010, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f00000000c0), 0x492492492492191, 0x0) r1 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r1) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x38) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) 11:42:58 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x200001000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) socket$nl_route(0x10, 0x3, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = gettid() tkill(r1, 0x3b) socket$inet_tcp(0x2, 0x1, 0x0) write$FUSE_OPEN(0xffffffffffffffff, &(0x7f00000001c0)={0x20, 0x0, 0x1, {0x0, 0x6}}, 0x20) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000400)) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000300)='cgroup.procs\x00', 0x2, 0x0) connect$inet(r2, &(0x7f0000000280)={0x2, 0x0, @local}, 0x10) [ 361.350122] protocol 88fb is buggy, dev hsr_slave_0 [ 361.355257] protocol 88fb is buggy, dev hsr_slave_1 11:42:58 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x200001000008912, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) socket$nl_route(0x10, 0x3, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = gettid() tkill(r1, 0x3b) socket$inet_tcp(0x2, 0x1, 0x0) write$FUSE_OPEN(0xffffffffffffffff, &(0x7f00000001c0)={0x20, 0x0, 0x1, {0x0, 0x6}}, 0x20) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000400)) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000300)='cgroup.procs\x00', 0x2, 0x0) connect$inet(r2, &(0x7f0000000280)={0x2, 0x0, @local}, 0x10) 11:42:58 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x200001000008912, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) socket$nl_route(0x10, 0x3, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = gettid() tkill(r1, 0x3b) socket$inet_tcp(0x2, 0x1, 0x0) write$FUSE_OPEN(0xffffffffffffffff, &(0x7f00000001c0)={0x20, 0x0, 0x1, {0x0, 0x6}}, 0x20) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000400)) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000300)='cgroup.procs\x00', 0x2, 0x0) connect$inet(r2, &(0x7f0000000280)={0x2, 0x0, @local}, 0x10) [ 361.430475] protocol 88fb is buggy, dev hsr_slave_0 [ 361.435586] protocol 88fb is buggy, dev hsr_slave_1 11:42:58 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x200001000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) socket$nl_route(0x10, 0x3, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = gettid() tkill(r1, 0x3b) socket$inet_tcp(0x2, 0x1, 0x0) write$FUSE_OPEN(0xffffffffffffffff, &(0x7f00000001c0)={0x20, 0x0, 0x1, {0x0, 0x6}}, 0x20) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000400)) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000300)='cgroup.procs\x00', 0x2, 0x0) connect$inet(r2, &(0x7f0000000280)={0x2, 0x0, @local}, 0x10) 11:42:58 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x200001000008912, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000002c0)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000100000002402000020feffff7a0af0fff8ffffff69a4f0ff00000000b7060000000000000744000000000000b7040000100000206a0700fe00000000850000002f000000b70000000a00000095000000000000006458c2c62fc286000389d909a63796c113a80c19aab9d646ae8f51b6cdf0d3253730e711f5969f62c28b22756bedf3cf393d14c46cc4f79fd2b316da4f0de8163f6242fa7323f1740637c48468766af540439f0500f144631ac2f9842e1b346362dcae08c3d1a1fbe96dd87235b44174f7c0343185089ab5119e31975e551558055dc2dce53b95c132e78454c4813681e0688d3a127f7418c6226f4133346c2e6794d952f2bb7938a2c53a0ce68e"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) socket$nl_route(0x10, 0x3, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = gettid() tkill(r1, 0x3b) socket$inet_tcp(0x2, 0x1, 0x0) write$FUSE_OPEN(0xffffffffffffffff, &(0x7f00000001c0)={0x20, 0x0, 0x1, {0x0, 0x6}}, 0x20) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000400)) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000300)='cgroup.procs\x00', 0x2, 0x0) connect$inet(r2, &(0x7f0000000280)={0x2, 0x0, @local}, 0x10) 11:42:58 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x200001000008912, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) socket$nl_route(0x10, 0x3, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = gettid() tkill(r1, 0x3b) socket$inet_tcp(0x2, 0x1, 0x0) write$FUSE_OPEN(0xffffffffffffffff, &(0x7f00000001c0)={0x20, 0x0, 0x1, {0x0, 0x6}}, 0x20) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000400)) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000300)='cgroup.procs\x00', 0x2, 0x0) connect$inet(r2, &(0x7f0000000280)={0x2, 0x0, @local}, 0x10) 11:42:58 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x200001000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) socket$nl_route(0x10, 0x3, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = gettid() tkill(r1, 0x3b) socket$inet_tcp(0x2, 0x1, 0x0) write$FUSE_OPEN(0xffffffffffffffff, &(0x7f00000001c0)={0x20, 0x0, 0x1, {0x0, 0x6}}, 0x20) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000400)) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000300)='cgroup.procs\x00', 0x2, 0x0) connect$inet(r2, &(0x7f0000000280)={0x2, 0x0, @local}, 0x10) 11:42:58 executing program 1: perf_event_open(&(0x7f0000000440)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x220801, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r0, 0x800443d3, &(0x7f0000000580)={{0x3, 0x9, 0xffff, 0x7fffffff}, 0x100000000, 0x0, 0x9}) syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vcs\x00', 0x280200, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\xf6', 0x1ff) ioctl$RTC_EPOCH_READ(0xffffffffffffffff, 0x8008700d, &(0x7f0000000280)) getsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000300)=0xffff, &(0x7f0000000140)=0x4) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) bind$ax25(r0, &(0x7f0000000340)={{0x3, @null, 0x5}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x80000, 0x10064) r3 = openat$cgroup_procs(r2, &(0x7f0000000100)='cgroup.procs\x00', 0x2, 0x0) write$P9_RCLUNK(r1, &(0x7f00000001c0)={0x7, 0x79, 0x1}, 0x7) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.net/syz1\x00', 0x1ff) write$cgroup_pid(r3, &(0x7f0000000640), 0x12) 11:42:59 executing program 4: perf_event_open(&(0x7f0000000440)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x220801, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r0, 0x800443d3, &(0x7f0000000580)={{0x3, 0x9, 0xffff, 0x7fffffff}, 0x100000000, 0x0, 0x9}) syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vcs\x00', 0x280200, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\xf6', 0x1ff) ioctl$RTC_EPOCH_READ(0xffffffffffffffff, 0x8008700d, &(0x7f0000000280)) getsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000300)=0xffff, &(0x7f0000000140)=0x4) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) bind$ax25(r0, &(0x7f0000000340)={{0x3, @null, 0x5}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x80000, 0x10064) r3 = openat$cgroup_procs(r2, &(0x7f0000000100)='cgroup.procs\x00', 0x2, 0x0) write$P9_RCLUNK(r1, &(0x7f00000001c0)={0x7, 0x79, 0x1}, 0x7) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.net/syz1\x00', 0x1ff) write$cgroup_pid(r3, &(0x7f0000000640), 0x12) 11:42:59 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x200001000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) socket$nl_route(0x10, 0x3, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = gettid() tkill(r1, 0x3b) socket$inet_tcp(0x2, 0x1, 0x0) write$FUSE_OPEN(0xffffffffffffffff, &(0x7f00000001c0)={0x20, 0x0, 0x1, {0x0, 0x6}}, 0x20) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000400)) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000300)='cgroup.procs\x00', 0x2, 0x0) connect$inet(r2, &(0x7f0000000280)={0x2, 0x0, @local}, 0x10) 11:42:59 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) socket$nl_route(0x10, 0x3, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = gettid() tkill(r1, 0x3b) socket$inet_tcp(0x2, 0x1, 0x0) write$FUSE_OPEN(0xffffffffffffffff, &(0x7f00000001c0)={0x20, 0x0, 0x1, {0x0, 0x6}}, 0x20) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000400)) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000300)='cgroup.procs\x00', 0x2, 0x0) connect$inet(r2, &(0x7f0000000280)={0x2, 0x0, @local}, 0x10) [ 362.079967] protocol 88fb is buggy, dev hsr_slave_0 [ 362.085060] protocol 88fb is buggy, dev hsr_slave_1 [ 362.390119] protocol 88fb is buggy, dev hsr_slave_0 [ 362.395195] protocol 88fb is buggy, dev hsr_slave_1 11:43:01 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000000)="5500000019007f5300fe01b2a4a280930a60ffff00a84302910000003900090008000c00060000f3180015e005000600000000dc1320d5440700", 0x3a}], 0x1}, 0x0) r0 = socket(0x1000000010, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f00000000c0), 0x492492492492191, 0x0) r1 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r1) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x38) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) 11:43:01 executing program 1: perf_event_open(&(0x7f0000000440)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x220801, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r0, 0x800443d3, &(0x7f0000000580)={{0x3, 0x9, 0xffff, 0x7fffffff}, 0x100000000, 0x0, 0x9}) syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vcs\x00', 0x280200, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\xf6', 0x1ff) ioctl$RTC_EPOCH_READ(r1, 0x8008700d, 0x0) getsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000300)=0xffff, &(0x7f0000000140)=0x4) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) bind$ax25(r0, &(0x7f0000000340)={{0x3, @null, 0x5}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x80000, 0x10064) r3 = openat$cgroup_procs(r2, &(0x7f0000000100)='cgroup.procs\x00', 0x2, 0x0) write$P9_RCLUNK(r1, &(0x7f00000001c0)={0x7, 0x79, 0x1}, 0x7) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.net/syz1\x00', 0x1ff) write$cgroup_pid(r3, &(0x7f0000000640), 0x12) 11:43:01 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x200001000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) socket$nl_route(0x10, 0x3, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = gettid() tkill(r1, 0x3b) socket$inet_tcp(0x2, 0x1, 0x0) write$FUSE_OPEN(0xffffffffffffffff, &(0x7f00000001c0)={0x20, 0x0, 0x1, {0x0, 0x6}}, 0x20) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000400)) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000300)='cgroup.procs\x00', 0x2, 0x0) connect$inet(r2, &(0x7f0000000280)={0x2, 0x0, @local}, 0x10) 11:43:01 executing program 4: perf_event_open(&(0x7f0000000440)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x220801, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r0, 0x800443d3, &(0x7f0000000580)={{0x3, 0x9, 0xffff, 0x7fffffff}, 0x100000000, 0x0, 0x9}) syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vcs\x00', 0x280200, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\xf6', 0x1ff) ioctl$RTC_EPOCH_READ(0xffffffffffffffff, 0x8008700d, &(0x7f0000000280)) getsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000300)=0xffff, &(0x7f0000000140)=0x4) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) bind$ax25(r0, &(0x7f0000000340)={{0x3, @null, 0x5}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x80000, 0x10064) r3 = openat$cgroup_procs(r2, &(0x7f0000000100)='cgroup.procs\x00', 0x2, 0x0) write$P9_RCLUNK(r1, &(0x7f00000001c0)={0x7, 0x79, 0x1}, 0x7) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.net/syz1\x00', 0x1ff) write$cgroup_pid(r3, &(0x7f0000000640), 0x12) 11:43:01 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x200001000008912, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) socket$nl_route(0x10, 0x3, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = gettid() tkill(r1, 0x3b) socket$inet_tcp(0x2, 0x1, 0x0) write$FUSE_OPEN(0xffffffffffffffff, &(0x7f00000001c0)={0x20, 0x0, 0x1, {0x0, 0x6}}, 0x20) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000400)) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000300)='cgroup.procs\x00', 0x2, 0x0) connect$inet(r2, &(0x7f0000000280)={0x2, 0x0, @local}, 0x10) 11:43:01 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) socket$nl_route(0x10, 0x3, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = gettid() tkill(r1, 0x3b) socket$inet_tcp(0x2, 0x1, 0x0) write$FUSE_OPEN(0xffffffffffffffff, &(0x7f00000001c0)={0x20, 0x0, 0x1, {0x0, 0x6}}, 0x20) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000400)) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000300)='cgroup.procs\x00', 0x2, 0x0) connect$inet(r2, &(0x7f0000000280)={0x2, 0x0, @local}, 0x10) 11:43:01 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x200001000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) socket$nl_route(0x10, 0x3, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = gettid() tkill(r1, 0x3b) socket$inet_tcp(0x2, 0x1, 0x0) write$FUSE_OPEN(0xffffffffffffffff, &(0x7f00000001c0)={0x20, 0x0, 0x1, {0x0, 0x6}}, 0x20) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000400)) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000300)='cgroup.procs\x00', 0x2, 0x0) connect$inet(r2, &(0x7f0000000280)={0x2, 0x0, @local}, 0x10) 11:43:01 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x200001000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) socket$nl_route(0x10, 0x3, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = gettid() tkill(r1, 0x3b) socket$inet_tcp(0x2, 0x1, 0x0) write$FUSE_OPEN(0xffffffffffffffff, &(0x7f00000001c0)={0x20, 0x0, 0x1, {0x0, 0x6}}, 0x20) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000400)) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000300)='cgroup.procs\x00', 0x2, 0x0) connect$inet(r2, &(0x7f0000000280)={0x2, 0x0, @local}, 0x10) 11:43:01 executing program 1: perf_event_open(&(0x7f0000000440)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x220801, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r0, 0x800443d3, &(0x7f0000000580)={{0x3, 0x9, 0xffff, 0x7fffffff}, 0x100000000, 0x0, 0x9}) syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vcs\x00', 0x280200, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\xf6', 0x1ff) ioctl$RTC_EPOCH_READ(r1, 0x8008700d, 0x0) getsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000300)=0xffff, &(0x7f0000000140)=0x4) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) bind$ax25(r0, &(0x7f0000000340)={{0x3, @null, 0x5}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x80000, 0x10064) r3 = openat$cgroup_procs(r2, &(0x7f0000000100)='cgroup.procs\x00', 0x2, 0x0) write$P9_RCLUNK(r1, &(0x7f00000001c0)={0x7, 0x79, 0x1}, 0x7) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.net/syz1\x00', 0x1ff) write$cgroup_pid(r3, &(0x7f0000000640), 0x12) 11:43:01 executing program 4: perf_event_open(&(0x7f0000000440)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x220801, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r0, 0x800443d3, &(0x7f0000000580)={{0x3, 0x9, 0xffff, 0x7fffffff}, 0x100000000, 0x0, 0x9}) syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vcs\x00', 0x280200, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\xf6', 0x1ff) ioctl$RTC_EPOCH_READ(0xffffffffffffffff, 0x8008700d, &(0x7f0000000280)) getsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000300)=0xffff, &(0x7f0000000140)=0x4) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) bind$ax25(r0, &(0x7f0000000340)={{0x3, @null, 0x5}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x80000, 0x10064) r3 = openat$cgroup_procs(r2, &(0x7f0000000100)='cgroup.procs\x00', 0x2, 0x0) write$P9_RCLUNK(r1, &(0x7f00000001c0)={0x7, 0x79, 0x1}, 0x7) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.net/syz1\x00', 0x1ff) write$cgroup_pid(r3, &(0x7f0000000640), 0x12) 11:43:01 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) socket$nl_route(0x10, 0x3, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = gettid() tkill(r1, 0x3b) socket$inet_tcp(0x2, 0x1, 0x0) write$FUSE_OPEN(0xffffffffffffffff, &(0x7f00000001c0)={0x20, 0x0, 0x1, {0x0, 0x6}}, 0x20) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000400)) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000300)='cgroup.procs\x00', 0x2, 0x0) connect$inet(r2, &(0x7f0000000280)={0x2, 0x0, @local}, 0x10) 11:43:01 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x200001000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) socket$nl_route(0x10, 0x3, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0x0, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r1 = gettid() tkill(r1, 0x3b) socket$inet_tcp(0x2, 0x1, 0x0) write$FUSE_OPEN(0xffffffffffffffff, &(0x7f00000001c0)={0x20, 0x0, 0x1, {0x0, 0x6}}, 0x20) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000400)) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000300)='cgroup.procs\x00', 0x2, 0x0) connect$inet(r2, &(0x7f0000000280)={0x2, 0x0, @local}, 0x10) [ 366.230142] net_ratelimit: 20 callbacks suppressed [ 366.230148] protocol 88fb is buggy, dev hsr_slave_0 [ 366.240251] protocol 88fb is buggy, dev hsr_slave_1 [ 366.550123] protocol 88fb is buggy, dev hsr_slave_0 [ 366.555297] protocol 88fb is buggy, dev hsr_slave_1 [ 366.950118] protocol 88fb is buggy, dev hsr_slave_0 [ 366.955247] protocol 88fb is buggy, dev hsr_slave_1 [ 367.350105] protocol 88fb is buggy, dev hsr_slave_0 [ 367.355187] protocol 88fb is buggy, dev hsr_slave_1 11:43:04 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000000)="5500000019007f5300fe01b2a4a280930a60ffff00a84302910000003900090008000c00060000f3180015e005000600000000dc1320d5440700", 0x3a}], 0x1}, 0x0) r0 = socket(0x1000000010, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f00000000c0), 0x492492492492191, 0x0) r1 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r1) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x38) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) 11:43:04 executing program 5: perf_event_open(&(0x7f0000000440)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x220801, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r0, 0x800443d3, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\xf6', 0x1ff) ioctl$RTC_EPOCH_READ(0xffffffffffffffff, 0x8008700d, &(0x7f0000000280)) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r1 = open(0x0, 0x80000, 0x10064) r2 = openat$cgroup_procs(r1, &(0x7f0000000100)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f0000000640), 0x12) 11:43:04 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x200001000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) socket$nl_route(0x10, 0x3, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0x0, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r1 = gettid() tkill(r1, 0x3b) socket$inet_tcp(0x2, 0x1, 0x0) write$FUSE_OPEN(0xffffffffffffffff, &(0x7f00000001c0)={0x20, 0x0, 0x1, {0x0, 0x6}}, 0x20) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000400)) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000300)='cgroup.procs\x00', 0x2, 0x0) connect$inet(r2, &(0x7f0000000280)={0x2, 0x0, @local}, 0x10) 11:43:04 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) socket$nl_route(0x10, 0x3, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = gettid() tkill(r1, 0x3b) socket$inet_tcp(0x2, 0x1, 0x0) write$FUSE_OPEN(0xffffffffffffffff, &(0x7f00000001c0)={0x20, 0x0, 0x1, {0x0, 0x6}}, 0x20) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000400)) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000300)='cgroup.procs\x00', 0x2, 0x0) connect$inet(r2, &(0x7f0000000280)={0x2, 0x0, @local}, 0x10) 11:43:04 executing program 1: perf_event_open(&(0x7f0000000440)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x220801, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r0, 0x800443d3, &(0x7f0000000580)={{0x3, 0x9, 0xffff, 0x7fffffff}, 0x100000000, 0x0, 0x9}) syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vcs\x00', 0x280200, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\xf6', 0x1ff) ioctl$RTC_EPOCH_READ(r1, 0x8008700d, 0x0) getsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000300)=0xffff, &(0x7f0000000140)=0x4) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) bind$ax25(r0, &(0x7f0000000340)={{0x3, @null, 0x5}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x80000, 0x10064) r3 = openat$cgroup_procs(r2, &(0x7f0000000100)='cgroup.procs\x00', 0x2, 0x0) write$P9_RCLUNK(r1, &(0x7f00000001c0)={0x7, 0x79, 0x1}, 0x7) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.net/syz1\x00', 0x1ff) write$cgroup_pid(r3, &(0x7f0000000640), 0x12) 11:43:04 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) socket$nl_route(0x10, 0x3, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = gettid() tkill(r1, 0x3b) socket$inet_tcp(0x2, 0x1, 0x0) write$FUSE_OPEN(0xffffffffffffffff, &(0x7f00000001c0)={0x20, 0x0, 0x1, {0x0, 0x6}}, 0x20) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000400)) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000300)='cgroup.procs\x00', 0x2, 0x0) connect$inet(r2, &(0x7f0000000280)={0x2, 0x0, @local}, 0x10) 11:43:04 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x200001000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) socket$nl_route(0x10, 0x3, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0x0, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r1 = gettid() tkill(r1, 0x3b) socket$inet_tcp(0x2, 0x1, 0x0) write$FUSE_OPEN(0xffffffffffffffff, &(0x7f00000001c0)={0x20, 0x0, 0x1, {0x0, 0x6}}, 0x20) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000400)) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000300)='cgroup.procs\x00', 0x2, 0x0) connect$inet(r2, &(0x7f0000000280)={0x2, 0x0, @local}, 0x10) [ 367.590097] protocol 88fb is buggy, dev hsr_slave_0 [ 367.595247] protocol 88fb is buggy, dev hsr_slave_1 11:43:04 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x200001000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) socket$nl_route(0x10, 0x3, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0x0, &(0x7f0000000380)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r1 = gettid() tkill(r1, 0x3b) socket$inet_tcp(0x2, 0x1, 0x0) write$FUSE_OPEN(0xffffffffffffffff, &(0x7f00000001c0)={0x20, 0x0, 0x1, {0x0, 0x6}}, 0x20) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000400)) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000300)='cgroup.procs\x00', 0x2, 0x0) connect$inet(r2, &(0x7f0000000280)={0x2, 0x0, @local}, 0x10) 11:43:05 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x200001000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000002c0)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000100000002402000020feffff7a0af0fff8ffffff69a4f0ff00000000b7060000000000000744000000000000b7040000100000206a0700fe00000000850000002f000000b70000000a00000095000000000000006458c2c62fc286000389d909a63796c113a80c19aab9d646ae8f51b6cdf0d3253730e711f5969f62c28b22756bedf3cf393d14c46cc4f79fd2b316da4f0de8163f6242fa7323f1740637c48468766af540439f0500f144631ac2f9842e1b346362dcae08c3d1a1fbe96dd87235b44174f7c0343185089ab5119e31975e551558055dc2dce53b95c132e78454c4813681e0688d3a127f7418c6226f4133346c2e6794d952f2bb7938a2c53a0ce68e"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) socket$nl_route(0x10, 0x3, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r0 = gettid() tkill(r0, 0x3b) socket$inet_tcp(0x2, 0x1, 0x0) write$FUSE_OPEN(0xffffffffffffffff, &(0x7f00000001c0)={0x20, 0x0, 0x1, {0x0, 0x6}}, 0x20) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000400)) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000300)='cgroup.procs\x00', 0x2, 0x0) connect$inet(r1, &(0x7f0000000280)={0x2, 0x0, @local}, 0x10) 11:43:05 executing program 1: perf_event_open(&(0x7f0000000440)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x220801, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r0, 0x800443d3, &(0x7f0000000580)={{0x3, 0x9, 0xffff, 0x7fffffff}, 0x100000000, 0x0, 0x9}) syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vcs\x00', 0x280200, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\xf6', 0x1ff) ioctl$RTC_EPOCH_READ(r1, 0x8008700d, &(0x7f0000000280)) getsockopt$netrom_NETROM_T4(0xffffffffffffffff, 0x103, 0x6, &(0x7f0000000300)=0xffff, &(0x7f0000000140)=0x4) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) bind$ax25(r0, &(0x7f0000000340)={{0x3, @null, 0x5}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x80000, 0x10064) r3 = openat$cgroup_procs(r2, &(0x7f0000000100)='cgroup.procs\x00', 0x2, 0x0) write$P9_RCLUNK(r1, &(0x7f00000001c0)={0x7, 0x79, 0x1}, 0x7) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.net/syz1\x00', 0x1ff) write$cgroup_pid(r3, &(0x7f0000000640), 0x12) 11:43:05 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) socket$nl_route(0x10, 0x3, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = gettid() tkill(r1, 0x3b) socket$inet_tcp(0x2, 0x1, 0x0) write$FUSE_OPEN(0xffffffffffffffff, &(0x7f00000001c0)={0x20, 0x0, 0x1, {0x0, 0x6}}, 0x20) socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000400)) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000300)='cgroup.procs\x00', 0x2, 0x0) 11:43:05 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x200001000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) socket$nl_route(0x10, 0x3, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r0 = gettid() tkill(r0, 0x3b) socket$inet_tcp(0x2, 0x1, 0x0) write$FUSE_OPEN(0xffffffffffffffff, &(0x7f00000001c0)={0x20, 0x0, 0x1, {0x0, 0x6}}, 0x20) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000400)) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000300)='cgroup.procs\x00', 0x2, 0x0) connect$inet(r1, &(0x7f0000000280)={0x2, 0x0, @local}, 0x10) 11:43:07 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000000)="5500000019007f5300fe01b2a4a280930a60ffff00a84302910000003900090008000c00060000f3180015e005000600000000dc1320d54407000000", 0x3c}], 0x1}, 0x0) r0 = socket(0x1000000010, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f00000000c0), 0x492492492492191, 0x0) r1 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r1) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x38) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) 11:43:07 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x200001000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) socket$nl_route(0x10, 0x3, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0x0, &(0x7f0000000380)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r1 = gettid() tkill(r1, 0x3b) socket$inet_tcp(0x2, 0x1, 0x0) write$FUSE_OPEN(0xffffffffffffffff, &(0x7f00000001c0)={0x20, 0x0, 0x1, {0x0, 0x6}}, 0x20) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000400)) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000300)='cgroup.procs\x00', 0x2, 0x0) connect$inet(r2, &(0x7f0000000280)={0x2, 0x0, @local}, 0x10) 11:43:07 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x200001000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) socket$nl_route(0x10, 0x3, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r0 = gettid() tkill(r0, 0x3b) socket$inet_tcp(0x2, 0x1, 0x0) write$FUSE_OPEN(0xffffffffffffffff, &(0x7f00000001c0)={0x20, 0x0, 0x1, {0x0, 0x6}}, 0x20) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000400)) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000300)='cgroup.procs\x00', 0x2, 0x0) connect$inet(r1, &(0x7f0000000280)={0x2, 0x0, @local}, 0x10) 11:43:07 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x200001000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) socket$nl_route(0x10, 0x3, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r0 = gettid() tkill(r0, 0x3b) socket$inet_tcp(0x2, 0x1, 0x0) write$FUSE_OPEN(0xffffffffffffffff, &(0x7f00000001c0)={0x20, 0x0, 0x1, {0x0, 0x6}}, 0x20) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000400)) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000300)='cgroup.procs\x00', 0x2, 0x0) connect$inet(r1, &(0x7f0000000280)={0x2, 0x0, @local}, 0x10) 11:43:07 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) socket$nl_route(0x10, 0x3, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = gettid() tkill(r1, 0x3b) socket$inet_tcp(0x2, 0x1, 0x0) write$FUSE_OPEN(0xffffffffffffffff, &(0x7f00000001c0)={0x20, 0x0, 0x1, {0x0, 0x6}}, 0x20) socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000400)) 11:43:07 executing program 1: perf_event_open(&(0x7f0000000440)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x220801, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r0, 0x800443d3, &(0x7f0000000580)={{0x3, 0x9, 0xffff, 0x7fffffff}, 0x100000000, 0x0, 0x9}) syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vcs\x00', 0x280200, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\xf6', 0x1ff) ioctl$RTC_EPOCH_READ(r1, 0x8008700d, &(0x7f0000000280)) getsockopt$netrom_NETROM_T4(0xffffffffffffffff, 0x103, 0x6, &(0x7f0000000300)=0xffff, &(0x7f0000000140)=0x4) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) bind$ax25(r0, &(0x7f0000000340)={{0x3, @null, 0x5}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x80000, 0x10064) r3 = openat$cgroup_procs(r2, &(0x7f0000000100)='cgroup.procs\x00', 0x2, 0x0) write$P9_RCLUNK(r1, &(0x7f00000001c0)={0x7, 0x79, 0x1}, 0x7) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.net/syz1\x00', 0x1ff) write$cgroup_pid(r3, &(0x7f0000000640), 0x12) 11:43:07 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x200001000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) socket$nl_route(0x10, 0x3, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0x0, &(0x7f0000000380)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r1 = gettid() tkill(r1, 0x3b) socket$inet_tcp(0x2, 0x1, 0x0) write$FUSE_OPEN(0xffffffffffffffff, &(0x7f00000001c0)={0x20, 0x0, 0x1, {0x0, 0x6}}, 0x20) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000400)) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000300)='cgroup.procs\x00', 0x2, 0x0) connect$inet(r2, &(0x7f0000000280)={0x2, 0x0, @local}, 0x10) 11:43:07 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x200001000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) socket$nl_route(0x10, 0x3, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r0 = gettid() tkill(r0, 0x3b) socket$inet_tcp(0x2, 0x1, 0x0) write$FUSE_OPEN(0xffffffffffffffff, &(0x7f00000001c0)={0x20, 0x0, 0x1, {0x0, 0x6}}, 0x20) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000400)) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000300)='cgroup.procs\x00', 0x2, 0x0) connect$inet(r1, &(0x7f0000000280)={0x2, 0x0, @local}, 0x10) 11:43:08 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) socket$nl_route(0x10, 0x3, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = gettid() tkill(r1, 0x3b) socket$inet_tcp(0x2, 0x1, 0x0) write$FUSE_OPEN(0xffffffffffffffff, &(0x7f00000001c0)={0x20, 0x0, 0x1, {0x0, 0x6}}, 0x20) socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000400)) 11:43:08 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x200001000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) socket$nl_route(0x10, 0x3, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r1 = gettid() tkill(r1, 0x3b) socket$inet_tcp(0x2, 0x1, 0x0) write$FUSE_OPEN(0xffffffffffffffff, &(0x7f00000001c0)={0x20, 0x0, 0x1, {0x0, 0x6}}, 0x20) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000400)) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000300)='cgroup.procs\x00', 0x2, 0x0) connect$inet(r2, &(0x7f0000000280)={0x2, 0x0, @local}, 0x10) 11:43:08 executing program 1: perf_event_open(&(0x7f0000000440)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x220801, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r0, 0x800443d3, &(0x7f0000000580)={{0x3, 0x9, 0xffff, 0x7fffffff}, 0x100000000, 0x0, 0x9}) syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vcs\x00', 0x280200, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\xf6', 0x1ff) ioctl$RTC_EPOCH_READ(r1, 0x8008700d, &(0x7f0000000280)) getsockopt$netrom_NETROM_T4(0xffffffffffffffff, 0x103, 0x6, &(0x7f0000000300)=0xffff, &(0x7f0000000140)=0x4) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) bind$ax25(r0, &(0x7f0000000340)={{0x3, @null, 0x5}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x80000, 0x10064) r3 = openat$cgroup_procs(r2, &(0x7f0000000100)='cgroup.procs\x00', 0x2, 0x0) write$P9_RCLUNK(r1, &(0x7f00000001c0)={0x7, 0x79, 0x1}, 0x7) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.net/syz1\x00', 0x1ff) write$cgroup_pid(r3, &(0x7f0000000640), 0x12) 11:43:08 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) socket$nl_route(0x10, 0x3, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = gettid() tkill(r1, 0x3b) socket$inet_tcp(0x2, 0x1, 0x0) write$FUSE_OPEN(0xffffffffffffffff, &(0x7f00000001c0)={0x20, 0x0, 0x1, {0x0, 0x6}}, 0x20) socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000400)) [ 371.510107] net_ratelimit: 20 callbacks suppressed [ 371.510112] protocol 88fb is buggy, dev hsr_slave_0 [ 371.520091] protocol 88fb is buggy, dev hsr_slave_1 [ 371.750078] protocol 88fb is buggy, dev hsr_slave_0 [ 371.755243] protocol 88fb is buggy, dev hsr_slave_1 [ 371.830119] protocol 88fb is buggy, dev hsr_slave_0 [ 371.835210] protocol 88fb is buggy, dev hsr_slave_1 [ 372.470127] protocol 88fb is buggy, dev hsr_slave_0 [ 372.475213] protocol 88fb is buggy, dev hsr_slave_1 [ 372.790104] protocol 88fb is buggy, dev hsr_slave_0 [ 372.795169] protocol 88fb is buggy, dev hsr_slave_1 11:43:10 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000000)="5500000019007f5300fe01b2a4a280930a60ffff00a84302910000003900090008000c00060000f3180015e005000600000000dc1320d54407000000", 0x3c}], 0x1}, 0x0) r0 = socket(0x1000000010, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f00000000c0), 0x492492492492191, 0x0) r1 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r1) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x38) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) 11:43:10 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x200001000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) socket$nl_route(0x10, 0x3, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r1 = gettid() tkill(r1, 0x3b) socket$inet_tcp(0x2, 0x1, 0x0) write$FUSE_OPEN(0xffffffffffffffff, &(0x7f00000001c0)={0x20, 0x0, 0x1, {0x0, 0x6}}, 0x20) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000400)) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000300)='cgroup.procs\x00', 0x2, 0x0) connect$inet(r2, &(0x7f0000000280)={0x2, 0x0, @local}, 0x10) 11:43:10 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000002c0)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000100000002402000020feffff7a0af0fff8ffffff69a4f0ff00000000b7060000000000000744000000000000b7040000100000206a0700fe00000000850000002f000000b70000000a00000095000000000000006458c2c62fc286000389d909a63796c113a80c19aab9d646ae8f51b6cdf0d3253730e711f5969f62c28b22756bedf3cf393d14c46cc4f79fd2b316da4f0de8163f6242fa7323f1740637c48468766af540439f0500f144631ac2f9842e1b346362dcae08c3d1a1fbe96dd87235b44174f7c0343185089ab5119e31975e551558055dc2dce53b95c132e78454c4813681e0688d3a127f7418c6226f4133346c2e6794d952f2bb7938a2c53a0ce68e"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) socket$nl_route(0x10, 0x3, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = gettid() tkill(r1, 0x3b) socket$inet_tcp(0x2, 0x1, 0x0) write$FUSE_OPEN(0xffffffffffffffff, &(0x7f00000001c0)={0x20, 0x0, 0x1, {0x0, 0x6}}, 0x20) socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000400)) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000300)='cgroup.procs\x00', 0x2, 0x0) 11:43:10 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) socket$nl_route(0x10, 0x3, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = gettid() tkill(r1, 0x3b) socket$inet_tcp(0x2, 0x1, 0x0) write$FUSE_OPEN(0xffffffffffffffff, &(0x7f00000001c0)={0x20, 0x0, 0x1, {0x0, 0x6}}, 0x20) socket$inet_udp(0x2, 0x2, 0x0) 11:43:10 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) socket$nl_route(0x10, 0x3, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = gettid() tkill(r1, 0x3b) socket$inet_tcp(0x2, 0x1, 0x0) write$FUSE_OPEN(0xffffffffffffffff, &(0x7f00000001c0)={0x20, 0x0, 0x1, {0x0, 0x6}}, 0x20) socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000400)) 11:43:10 executing program 1: perf_event_open(&(0x7f0000000440)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x220801, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r0, 0x800443d3, &(0x7f0000000580)={{0x3, 0x9, 0xffff, 0x7fffffff}, 0x100000000, 0x0, 0x9}) syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vcs\x00', 0x280200, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\xf6', 0x1ff) ioctl$RTC_EPOCH_READ(r1, 0x8008700d, &(0x7f0000000280)) getsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, 0x0, &(0x7f0000000140)) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) bind$ax25(r0, &(0x7f0000000340)={{0x3, @null, 0x5}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x80000, 0x10064) r3 = openat$cgroup_procs(r2, &(0x7f0000000100)='cgroup.procs\x00', 0x2, 0x0) write$P9_RCLUNK(r1, &(0x7f00000001c0)={0x7, 0x79, 0x1}, 0x7) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.net/syz1\x00', 0x1ff) write$cgroup_pid(r3, &(0x7f0000000640), 0x12) 11:43:10 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x200001000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) socket$nl_route(0x10, 0x3, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r1 = gettid() tkill(r1, 0x3b) socket$inet_tcp(0x2, 0x1, 0x0) write$FUSE_OPEN(0xffffffffffffffff, &(0x7f00000001c0)={0x20, 0x0, 0x1, {0x0, 0x6}}, 0x20) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000400)) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000300)='cgroup.procs\x00', 0x2, 0x0) connect$inet(r2, &(0x7f0000000280)={0x2, 0x0, @local}, 0x10) 11:43:11 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x200001000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) socket$nl_route(0x10, 0x3, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0x7, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d64050000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r1 = gettid() tkill(r1, 0x3b) socket$inet_tcp(0x2, 0x1, 0x0) write$FUSE_OPEN(0xffffffffffffffff, &(0x7f00000001c0)={0x20, 0x0, 0x1, {0x0, 0x6}}, 0x20) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000400)) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000300)='cgroup.procs\x00', 0x2, 0x0) connect$inet(r2, &(0x7f0000000280)={0x2, 0x0, @local}, 0x10) 11:43:11 executing program 1: perf_event_open(&(0x7f0000000440)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x220801, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r0, 0x800443d3, &(0x7f0000000580)={{0x3, 0x9, 0xffff, 0x7fffffff}, 0x100000000, 0x0, 0x9}) syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vcs\x00', 0x280200, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\xf6', 0x1ff) ioctl$RTC_EPOCH_READ(r1, 0x8008700d, &(0x7f0000000280)) getsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, 0x0, &(0x7f0000000140)) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) bind$ax25(r0, &(0x7f0000000340)={{0x3, @null, 0x5}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x80000, 0x10064) r3 = openat$cgroup_procs(r2, &(0x7f0000000100)='cgroup.procs\x00', 0x2, 0x0) write$P9_RCLUNK(r1, &(0x7f00000001c0)={0x7, 0x79, 0x1}, 0x7) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.net/syz1\x00', 0x1ff) write$cgroup_pid(r3, &(0x7f0000000640), 0x12) 11:43:11 executing program 5: perf_event_open(&(0x7f0000000440)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x220801, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r0, 0x800443d3, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\xf6', 0x1ff) ioctl$RTC_EPOCH_READ(0xffffffffffffffff, 0x8008700d, &(0x7f0000000280)) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x80000, 0x10064) r2 = openat$cgroup_procs(r1, &(0x7f0000000100)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f0000000640), 0x12) 11:43:11 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000002c0)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000100000002402000020feffff7a0af0fff8ffffff69a4f0ff00000000b7060000000000000744000000000000b7040000100000206a0700fe00000000850000002f000000b70000000a00000095000000000000006458c2c62fc286000389d909a63796c113a80c19aab9d646ae8f51b6cdf0d3253730e711f5969f62c28b22756bedf3cf393d14c46cc4f79fd2b316da4f0de8163f6242fa7323f1740637c48468766af540439f0500f144631ac2f9842e1b346362dcae08c3d1a1fbe96dd87235b44174f7c0343185089ab5119e31975e551558055dc2dce53b95c132e78454c4813681e0688d3a127f7418c6226f4133346c2e6794d952f2bb7938a2c53a0ce68e"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) socket$nl_route(0x10, 0x3, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = gettid() tkill(r1, 0x3b) socket$inet_tcp(0x2, 0x1, 0x0) write$FUSE_OPEN(0xffffffffffffffff, &(0x7f00000001c0)={0x20, 0x0, 0x1, {0x0, 0x6}}, 0x20) socket$inet_udp(0x2, 0x2, 0x0) 11:43:11 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) socket$nl_route(0x10, 0x3, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = gettid() tkill(r1, 0x3b) socket$inet_tcp(0x2, 0x1, 0x0) write$FUSE_OPEN(0xffffffffffffffff, &(0x7f00000001c0)={0x20, 0x0, 0x1, {0x0, 0x6}}, 0x20) socket$inet_udp(0x2, 0x2, 0x0) [ 376.630166] net_ratelimit: 20 callbacks suppressed [ 376.630171] protocol 88fb is buggy, dev hsr_slave_0 [ 376.640337] protocol 88fb is buggy, dev hsr_slave_1 11:43:13 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000000)="5500000019007f5300fe01b2a4a280930a60ffff00a84302910000003900090008000c00060000f3180015e005000600000000dc1320d54407000000", 0x3c}], 0x1}, 0x0) r0 = socket(0x1000000010, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f00000000c0), 0x492492492492191, 0x0) r1 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r1) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x38) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) 11:43:13 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x200001000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) socket$nl_route(0x10, 0x3, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0x7, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d64050000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r1 = gettid() tkill(r1, 0x3b) socket$inet_tcp(0x2, 0x1, 0x0) write$FUSE_OPEN(0xffffffffffffffff, &(0x7f00000001c0)={0x20, 0x0, 0x1, {0x0, 0x6}}, 0x20) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000400)) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000300)='cgroup.procs\x00', 0x2, 0x0) connect$inet(r2, &(0x7f0000000280)={0x2, 0x0, @local}, 0x10) 11:43:13 executing program 1: perf_event_open(&(0x7f0000000440)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x220801, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r0, 0x800443d3, &(0x7f0000000580)={{0x3, 0x9, 0xffff, 0x7fffffff}, 0x100000000, 0x0, 0x9}) syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vcs\x00', 0x280200, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\xf6', 0x1ff) ioctl$RTC_EPOCH_READ(r1, 0x8008700d, &(0x7f0000000280)) getsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, 0x0, &(0x7f0000000140)) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) bind$ax25(r0, &(0x7f0000000340)={{0x3, @null, 0x5}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x80000, 0x10064) r3 = openat$cgroup_procs(r2, &(0x7f0000000100)='cgroup.procs\x00', 0x2, 0x0) write$P9_RCLUNK(r1, &(0x7f00000001c0)={0x7, 0x79, 0x1}, 0x7) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.net/syz1\x00', 0x1ff) write$cgroup_pid(r3, &(0x7f0000000640), 0x12) 11:43:13 executing program 4: perf_event_open(&(0x7f0000000440)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x220801, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r0, 0x800443d3, &(0x7f0000000580)={{0x3, 0x9, 0xffff, 0x7fffffff}, 0x100000000, 0x0, 0x9}) syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vcs\x00', 0x280200, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\xf6', 0x1ff) ioctl$RTC_EPOCH_READ(r1, 0x8008700d, &(0x7f0000000280)) getsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, 0x0, &(0x7f0000000140)) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) bind$ax25(r0, &(0x7f0000000340)={{0x3, @null, 0x5}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x80000, 0x10064) r3 = openat$cgroup_procs(r2, &(0x7f0000000100)='cgroup.procs\x00', 0x2, 0x0) write$P9_RCLUNK(r1, &(0x7f00000001c0)={0x7, 0x79, 0x1}, 0x7) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.net/syz1\x00', 0x1ff) write$cgroup_pid(r3, &(0x7f0000000640), 0x12) 11:43:13 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) socket$nl_route(0x10, 0x3, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = gettid() tkill(r1, 0x3b) socket$inet_tcp(0x2, 0x1, 0x0) write$FUSE_OPEN(0xffffffffffffffff, &(0x7f00000001c0)={0x20, 0x0, 0x1, {0x0, 0x6}}, 0x20) socket$inet_udp(0x2, 0x2, 0x0) 11:43:13 executing program 5: ioctl(0xffffffffffffffff, 0x200001000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000002c0)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000100000002402000020feffff7a0af0fff8ffffff69a4f0ff00000000b7060000000000000744000000000000b7040000100000206a0700fe00000000850000002f000000b70000000a00000095000000000000006458c2c62fc286000389d909a63796c113a80c19aab9d646ae8f51b6cdf0d3253730e711f5969f62c28b22756bedf3cf393d14c46cc4f79fd2b316da4f0de8163f6242fa7323f1740637c48468766af540439f0500f144631ac2f9842e1b346362dcae08c3d1a1fbe96dd87235b44174f7c0343185089ab5119e31975e551558055dc2dce53b95c132e78454c4813681e0688d3a127f7418c6226f4133346c2e6794d952f2bb7938a2c53a0ce68e"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) socket$nl_route(0x10, 0x3, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r0 = gettid() tkill(r0, 0x3b) socket$inet_tcp(0x2, 0x1, 0x0) write$FUSE_OPEN(0xffffffffffffffff, &(0x7f00000001c0)={0x20, 0x0, 0x1, {0x0, 0x6}}, 0x20) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000400)) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000300)='cgroup.procs\x00', 0x2, 0x0) connect$inet(r1, &(0x7f0000000280)={0x2, 0x0, @local}, 0x10) 11:43:14 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x200001000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) socket$nl_route(0x10, 0x3, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0x7, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d64050000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r1 = gettid() tkill(r1, 0x3b) socket$inet_tcp(0x2, 0x1, 0x0) write$FUSE_OPEN(0xffffffffffffffff, &(0x7f00000001c0)={0x20, 0x0, 0x1, {0x0, 0x6}}, 0x20) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000400)) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000300)='cgroup.procs\x00', 0x2, 0x0) connect$inet(r2, &(0x7f0000000280)={0x2, 0x0, @local}, 0x10) 11:43:14 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) socket$nl_route(0x10, 0x3, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = gettid() tkill(r1, 0x3b) socket$inet_tcp(0x2, 0x1, 0x0) write$FUSE_OPEN(0xffffffffffffffff, &(0x7f00000001c0)={0x20, 0x0, 0x1, {0x0, 0x6}}, 0x20) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000400)) 11:43:14 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) socket$nl_route(0x10, 0x3, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = gettid() tkill(r1, 0x3b) socket$inet_tcp(0x2, 0x1, 0x0) write$FUSE_OPEN(0xffffffffffffffff, &(0x7f00000001c0)={0x20, 0x0, 0x1, {0x0, 0x6}}, 0x20) socket$inet_udp(0x2, 0x2, 0x0) 11:43:14 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x200001000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) socket$nl_route(0x10, 0x3, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xa, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r1 = gettid() tkill(r1, 0x3b) socket$inet_tcp(0x2, 0x1, 0x0) write$FUSE_OPEN(0xffffffffffffffff, &(0x7f00000001c0)={0x20, 0x0, 0x1, {0x0, 0x6}}, 0x20) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000400)) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000300)='cgroup.procs\x00', 0x2, 0x0) connect$inet(r2, &(0x7f0000000280)={0x2, 0x0, @local}, 0x10) 11:43:14 executing program 1: perf_event_open(&(0x7f0000000440)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x220801, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r0, 0x800443d3, &(0x7f0000000580)={{0x3, 0x9, 0xffff, 0x7fffffff}, 0x100000000, 0x0, 0x9}) syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vcs\x00', 0x280200, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\xf6', 0x1ff) ioctl$RTC_EPOCH_READ(r1, 0x8008700d, &(0x7f0000000280)) getsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000300), &(0x7f0000000140)=0x4) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) bind$ax25(r0, &(0x7f0000000340)={{0x3, @null, 0x5}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x80000, 0x10064) r3 = openat$cgroup_procs(r2, &(0x7f0000000100)='cgroup.procs\x00', 0x2, 0x0) write$P9_RCLUNK(r1, &(0x7f00000001c0)={0x7, 0x79, 0x1}, 0x7) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.net/syz1\x00', 0x1ff) write$cgroup_pid(r3, &(0x7f0000000640), 0x12) 11:43:14 executing program 4: perf_event_open(&(0x7f0000000440)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x220801, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r0, 0x800443d3, &(0x7f0000000580)={{0x3, 0x9, 0xffff, 0x7fffffff}, 0x100000000, 0x0, 0x9}) syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vcs\x00', 0x280200, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\xf6', 0x1ff) ioctl$RTC_EPOCH_READ(r1, 0x8008700d, &(0x7f0000000280)) getsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, 0x0, &(0x7f0000000140)) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) bind$ax25(r0, &(0x7f0000000340)={{0x3, @null, 0x5}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x80000, 0x10064) r3 = openat$cgroup_procs(r2, &(0x7f0000000100)='cgroup.procs\x00', 0x2, 0x0) write$P9_RCLUNK(r1, &(0x7f00000001c0)={0x7, 0x79, 0x1}, 0x7) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.net/syz1\x00', 0x1ff) write$cgroup_pid(r3, &(0x7f0000000640), 0x12) [ 376.960153] protocol 88fb is buggy, dev hsr_slave_0 [ 376.965337] protocol 88fb is buggy, dev hsr_slave_1 [ 377.350149] protocol 88fb is buggy, dev hsr_slave_0 [ 377.355490] protocol 88fb is buggy, dev hsr_slave_1 [ 377.750191] protocol 88fb is buggy, dev hsr_slave_0 [ 377.755344] protocol 88fb is buggy, dev hsr_slave_1 [ 377.990225] protocol 88fb is buggy, dev hsr_slave_0 [ 377.995424] protocol 88fb is buggy, dev hsr_slave_1 11:43:17 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000000)="5500000019007f5300fe01b2a4a280930a60ffff00a84302910000003900090008000c00060000f3180015e005000600000000dc1320d5440700000000", 0x3d}], 0x1}, 0x0) r0 = socket(0x0, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f00000000c0), 0x492492492492191, 0x0) r1 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r1) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x38) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) 11:43:17 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) socket$nl_route(0x10, 0x3, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = gettid() tkill(r1, 0x3b) socket$inet_tcp(0x2, 0x1, 0x0) write$FUSE_OPEN(0xffffffffffffffff, &(0x7f00000001c0)={0x20, 0x0, 0x1, {0x0, 0x6}}, 0x20) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000400)) 11:43:17 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) socket$nl_route(0x10, 0x3, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = gettid() tkill(r1, 0x3b) socket$inet_tcp(0x2, 0x1, 0x0) write$FUSE_OPEN(0xffffffffffffffff, &(0x7f00000001c0)={0x20, 0x0, 0x1, {0x0, 0x6}}, 0x20) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000400)) 11:43:17 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x200001000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) socket$nl_route(0x10, 0x3, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xa, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r1 = gettid() tkill(r1, 0x3b) socket$inet_tcp(0x2, 0x1, 0x0) write$FUSE_OPEN(0xffffffffffffffff, &(0x7f00000001c0)={0x20, 0x0, 0x1, {0x0, 0x6}}, 0x20) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000400)) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000300)='cgroup.procs\x00', 0x2, 0x0) connect$inet(r2, &(0x7f0000000280)={0x2, 0x0, @local}, 0x10) 11:43:17 executing program 1: perf_event_open(&(0x7f0000000440)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x220801, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r0, 0x800443d3, &(0x7f0000000580)={{0x3, 0x9, 0xffff, 0x7fffffff}, 0x100000000, 0x0, 0x9}) syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vcs\x00', 0x280200, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\xf6', 0x1ff) ioctl$RTC_EPOCH_READ(r1, 0x8008700d, &(0x7f0000000280)) getsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000300), &(0x7f0000000140)=0x4) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) bind$ax25(r0, &(0x7f0000000340)={{0x3, @null, 0x5}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x80000, 0x10064) r3 = openat$cgroup_procs(r2, &(0x7f0000000100)='cgroup.procs\x00', 0x2, 0x0) write$P9_RCLUNK(r1, &(0x7f00000001c0)={0x7, 0x79, 0x1}, 0x7) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.net/syz1\x00', 0x1ff) write$cgroup_pid(r3, &(0x7f0000000640), 0x12) 11:43:17 executing program 4: perf_event_open(&(0x7f0000000440)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x220801, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r0, 0x800443d3, &(0x7f0000000580)={{0x3, 0x9, 0xffff, 0x7fffffff}, 0x100000000, 0x0, 0x9}) syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vcs\x00', 0x280200, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\xf6', 0x1ff) ioctl$RTC_EPOCH_READ(r1, 0x8008700d, &(0x7f0000000280)) getsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, 0x0, &(0x7f0000000140)) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) bind$ax25(r0, &(0x7f0000000340)={{0x3, @null, 0x5}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x80000, 0x10064) r3 = openat$cgroup_procs(r2, &(0x7f0000000100)='cgroup.procs\x00', 0x2, 0x0) write$P9_RCLUNK(r1, &(0x7f00000001c0)={0x7, 0x79, 0x1}, 0x7) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.net/syz1\x00', 0x1ff) write$cgroup_pid(r3, &(0x7f0000000640), 0x12) 11:43:17 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x200001000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) socket$nl_route(0x10, 0x3, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xa, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r1 = gettid() tkill(r1, 0x3b) socket$inet_tcp(0x2, 0x1, 0x0) write$FUSE_OPEN(0xffffffffffffffff, &(0x7f00000001c0)={0x20, 0x0, 0x1, {0x0, 0x6}}, 0x20) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000400)) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000300)='cgroup.procs\x00', 0x2, 0x0) connect$inet(r2, &(0x7f0000000280)={0x2, 0x0, @local}, 0x10) 11:43:17 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) socket$nl_route(0x10, 0x3, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = gettid() tkill(r1, 0x3b) socket$inet_tcp(0x2, 0x1, 0x0) write$FUSE_OPEN(0xffffffffffffffff, &(0x7f00000001c0)={0x20, 0x0, 0x1, {0x0, 0x6}}, 0x20) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000400)) 11:43:17 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) socket$nl_route(0x10, 0x3, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = gettid() tkill(r1, 0x3b) socket$inet_tcp(0x2, 0x1, 0x0) write$FUSE_OPEN(0xffffffffffffffff, &(0x7f00000001c0)={0x20, 0x0, 0x1, {0x0, 0x6}}, 0x20) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000400)) 11:43:17 executing program 4: perf_event_open(&(0x7f0000000440)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x220801, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r0, 0x800443d3, &(0x7f0000000580)={{0x3, 0x9, 0xffff, 0x7fffffff}, 0x100000000, 0x0, 0x9}) syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vcs\x00', 0x280200, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\xf6', 0x1ff) ioctl$RTC_EPOCH_READ(r1, 0x8008700d, &(0x7f0000000280)) getsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, 0x0, &(0x7f0000000140)) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) bind$ax25(r0, &(0x7f0000000340)={{0x3, @null, 0x5}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x80000, 0x10064) r3 = openat$cgroup_procs(r2, &(0x7f0000000100)='cgroup.procs\x00', 0x2, 0x0) write$P9_RCLUNK(r1, &(0x7f00000001c0)={0x7, 0x79, 0x1}, 0x7) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.net/syz1\x00', 0x1ff) write$cgroup_pid(r3, &(0x7f0000000640), 0x12) 11:43:17 executing program 1: perf_event_open(&(0x7f0000000440)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x220801, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r0, 0x800443d3, &(0x7f0000000580)={{0x3, 0x9, 0xffff, 0x7fffffff}, 0x100000000, 0x0, 0x9}) syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vcs\x00', 0x280200, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\xf6', 0x1ff) ioctl$RTC_EPOCH_READ(r1, 0x8008700d, &(0x7f0000000280)) getsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000300), &(0x7f0000000140)=0x4) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) bind$ax25(r0, &(0x7f0000000340)={{0x3, @null, 0x5}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x80000, 0x10064) r3 = openat$cgroup_procs(r2, &(0x7f0000000100)='cgroup.procs\x00', 0x2, 0x0) write$P9_RCLUNK(r1, &(0x7f00000001c0)={0x7, 0x79, 0x1}, 0x7) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.net/syz1\x00', 0x1ff) write$cgroup_pid(r3, &(0x7f0000000640), 0x12) 11:43:17 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) socket$nl_route(0x10, 0x3, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = gettid() tkill(r1, 0x3b) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000400)) [ 381.910688] net_ratelimit: 20 callbacks suppressed [ 381.910693] protocol 88fb is buggy, dev hsr_slave_0 [ 381.920681] protocol 88fb is buggy, dev hsr_slave_1 [ 382.150094] protocol 88fb is buggy, dev hsr_slave_0 [ 382.155162] protocol 88fb is buggy, dev hsr_slave_1 [ 382.230132] protocol 88fb is buggy, dev hsr_slave_0 [ 382.235193] protocol 88fb is buggy, dev hsr_slave_1 11:43:20 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000000)="5500000019007f5300fe01b2a4a280930a60ffff00a84302910000003900090008000c00060000f3180015e005000600000000dc1320d5440700000000", 0x3d}], 0x1}, 0x0) r0 = socket(0x0, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f00000000c0), 0x492492492492191, 0x0) r1 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r1) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x38) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) 11:43:20 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x200001000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) socket$nl_route(0x10, 0x3, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xc, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b700"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r1 = gettid() tkill(r1, 0x3b) socket$inet_tcp(0x2, 0x1, 0x0) write$FUSE_OPEN(0xffffffffffffffff, &(0x7f00000001c0)={0x20, 0x0, 0x1, {0x0, 0x6}}, 0x20) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000400)) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000300)='cgroup.procs\x00', 0x2, 0x0) connect$inet(r2, &(0x7f0000000280)={0x2, 0x0, @local}, 0x10) 11:43:20 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000002c0)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000100000002402000020feffff7a0af0fff8ffffff69a4f0ff00000000b7060000000000000744000000000000b7040000100000206a0700fe00000000850000002f000000b70000000a00000095000000000000006458c2c62fc286000389d909a63796c113a80c19aab9d646ae8f51b6cdf0d3253730e711f5969f62c28b22756bedf3cf393d14c46cc4f79fd2b316da4f0de8163f6242fa7323f1740637c48468766af540439f0500f144631ac2f9842e1b346362dcae08c3d1a1fbe96dd87235b44174f7c0343185089ab5119e31975e551558055dc2dce53b95c132e78454c4813681e0688d3a127f7418c6226f4133346c2e6794d952f2bb7938a2c53a0ce68e"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) socket$nl_route(0x10, 0x3, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = gettid() tkill(r1, 0x3b) socket$inet_tcp(0x2, 0x1, 0x0) write$FUSE_OPEN(0xffffffffffffffff, &(0x7f00000001c0)={0x20, 0x0, 0x1, {0x0, 0x6}}, 0x20) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000400)) 11:43:20 executing program 1: perf_event_open(&(0x7f0000000440)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x220801, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r0, 0x800443d3, &(0x7f0000000580)={{0x3, 0x9, 0xffff, 0x7fffffff}, 0x100000000, 0x0, 0x9}) syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vcs\x00', 0x280200, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\xf6', 0x1ff) ioctl$RTC_EPOCH_READ(r1, 0x8008700d, &(0x7f0000000280)) getsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000300)=0xffff, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) bind$ax25(r0, &(0x7f0000000340)={{0x3, @null, 0x5}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x80000, 0x10064) r3 = openat$cgroup_procs(r2, &(0x7f0000000100)='cgroup.procs\x00', 0x2, 0x0) write$P9_RCLUNK(r1, &(0x7f00000001c0)={0x7, 0x79, 0x1}, 0x7) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.net/syz1\x00', 0x1ff) write$cgroup_pid(r3, &(0x7f0000000640), 0x12) 11:43:20 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) socket$nl_route(0x10, 0x3, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = gettid() tkill(r1, 0x3b) socket$inet_tcp(0x2, 0x1, 0x0) write$FUSE_OPEN(0xffffffffffffffff, &(0x7f00000001c0)={0x20, 0x0, 0x1, {0x0, 0x6}}, 0x20) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000400)) 11:43:20 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) socket$nl_route(0x10, 0x3, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = gettid() tkill(r1, 0x3b) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000400)) 11:43:20 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x200001000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) socket$nl_route(0x10, 0x3, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xc, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b700"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r1 = gettid() tkill(r1, 0x3b) socket$inet_tcp(0x2, 0x1, 0x0) write$FUSE_OPEN(0xffffffffffffffff, &(0x7f00000001c0)={0x20, 0x0, 0x1, {0x0, 0x6}}, 0x20) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000400)) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000300)='cgroup.procs\x00', 0x2, 0x0) connect$inet(r2, &(0x7f0000000280)={0x2, 0x0, @local}, 0x10) [ 382.870534] protocol 88fb is buggy, dev hsr_slave_0 [ 382.876125] protocol 88fb is buggy, dev hsr_slave_1 11:43:20 executing program 4: pipe(0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mprotect(&(0x7f0000ff0000/0xd000)=nil, 0xd000, 0x0) pivot_root(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x41007701, 0x0) getpeername$netrom(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) r0 = socket$inet(0x2b, 0x1, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) close(r0) 11:43:20 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) socket$nl_route(0x10, 0x3, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = gettid() tkill(r1, 0x3b) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000400)) 11:43:20 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='setgroups\x00') sendfile(r0, r0, 0x0, 0x9) write$P9_RRENAMEAT(r0, 0x0, 0x0) 11:43:20 executing program 1: perf_event_open(&(0x7f0000000440)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x220801, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r0, 0x800443d3, &(0x7f0000000580)={{0x3, 0x9, 0xffff, 0x7fffffff}, 0x100000000, 0x0, 0x9}) syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vcs\x00', 0x280200, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\xf6', 0x1ff) ioctl$RTC_EPOCH_READ(r1, 0x8008700d, &(0x7f0000000280)) getsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000300)=0xffff, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) bind$ax25(r0, &(0x7f0000000340)={{0x3, @null, 0x5}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x80000, 0x10064) r3 = openat$cgroup_procs(r2, &(0x7f0000000100)='cgroup.procs\x00', 0x2, 0x0) write$P9_RCLUNK(r1, &(0x7f00000001c0)={0x7, 0x79, 0x1}, 0x7) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.net/syz1\x00', 0x1ff) write$cgroup_pid(r3, &(0x7f0000000640), 0x12) 11:43:20 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000000)="5500000019007f5300fe01b2a4a280930a60ffff00a84302910000003900090008000c00060000f3180015e005000600000000dc1320d5440700000000", 0x3d}], 0x1}, 0x0) r0 = socket(0x0, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f00000000c0), 0x492492492492191, 0x0) r1 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r1) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x38) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) 11:43:20 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x200001000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) socket$nl_route(0x10, 0x3, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xc, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b700"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r1 = gettid() tkill(r1, 0x3b) socket$inet_tcp(0x2, 0x1, 0x0) write$FUSE_OPEN(0xffffffffffffffff, &(0x7f00000001c0)={0x20, 0x0, 0x1, {0x0, 0x6}}, 0x20) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000400)) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000300)='cgroup.procs\x00', 0x2, 0x0) connect$inet(r2, &(0x7f0000000280)={0x2, 0x0, @local}, 0x10) 11:43:20 executing program 5: setresuid(0xffffffffffffffff, 0xfffe, 0xffffffffffffffff) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, 0x0) 11:43:20 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) socket$nl_route(0x10, 0x3, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = gettid() tkill(r1, 0x3b) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000400)) 11:43:20 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x200001000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) socket$nl_route(0x10, 0x3, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xd, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b70000000000000095"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r1 = gettid() tkill(r1, 0x3b) socket$inet_tcp(0x2, 0x1, 0x0) write$FUSE_OPEN(0xffffffffffffffff, &(0x7f00000001c0)={0x20, 0x0, 0x1, {0x0, 0x6}}, 0x20) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000400)) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000300)='cgroup.procs\x00', 0x2, 0x0) connect$inet(r2, &(0x7f0000000280)={0x2, 0x0, @local}, 0x10) 11:43:20 executing program 4: pipe(0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mprotect(&(0x7f0000ff0000/0xd000)=nil, 0xd000, 0x0) pivot_root(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x41007701, 0x0) getpeername$netrom(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) r0 = socket$inet(0x2b, 0x1, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) close(r0) [ 383.190117] protocol 88fb is buggy, dev hsr_slave_0 [ 383.195204] protocol 88fb is buggy, dev hsr_slave_1 11:43:20 executing program 1: perf_event_open(&(0x7f0000000440)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x220801, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r0, 0x800443d3, &(0x7f0000000580)={{0x3, 0x9, 0xffff, 0x7fffffff}, 0x100000000, 0x0, 0x9}) syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vcs\x00', 0x280200, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\xf6', 0x1ff) ioctl$RTC_EPOCH_READ(r1, 0x8008700d, &(0x7f0000000280)) getsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000300)=0xffff, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) bind$ax25(r0, &(0x7f0000000340)={{0x3, @null, 0x5}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x80000, 0x10064) r3 = openat$cgroup_procs(r2, &(0x7f0000000100)='cgroup.procs\x00', 0x2, 0x0) write$P9_RCLUNK(r1, &(0x7f00000001c0)={0x7, 0x79, 0x1}, 0x7) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.net/syz1\x00', 0x1ff) write$cgroup_pid(r3, &(0x7f0000000640), 0x12) 11:43:20 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x200001000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) socket$nl_route(0x10, 0x3, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xd, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b70000000000000095"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r1 = gettid() tkill(r1, 0x3b) socket$inet_tcp(0x2, 0x1, 0x0) write$FUSE_OPEN(0xffffffffffffffff, &(0x7f00000001c0)={0x20, 0x0, 0x1, {0x0, 0x6}}, 0x20) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000400)) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000300)='cgroup.procs\x00', 0x2, 0x0) connect$inet(r2, &(0x7f0000000280)={0x2, 0x0, @local}, 0x10) 11:43:20 executing program 5: setresuid(0xffffffffffffffff, 0xfffe, 0xffffffffffffffff) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, 0x0) 11:43:20 executing program 4: syz_emit_ethernet(0x3005aa, &(0x7f0000000180)=ANY=[@ANYBLOB="aaaaaaaaaaaa00000000000008060001080006040001aaaaaaaaaaaaac1492aaaaaaaaaaaa00ac1414aa9117906ad01f19d3e1f6945759ff39267da6adabd8ba8b7dee4df326d72a3cf794ece804b2ff95b645a5aee1c8c70ff21f2f06ddff3aa0fc4db55b494a6a25382224a4c5a5d7d31287f7b59a383dcae6401db2459f65c1925b902d3592a3c7b3d7ecb354ac2d4402e6756bb6087bc763365f87cfc15cc332b0f2c861dbd7d8dea60e529426ff4bdcd3c10622ea16a1bcbbe32a60c274e85b2ea5b3915c9162ea7a228a9c2f9a89d2de7e7f7568f0f36e792a"], 0x0) 11:43:20 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x200001000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) socket$nl_route(0x10, 0x3, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xd, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b70000000000000095"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r1 = gettid() tkill(r1, 0x3b) socket$inet_tcp(0x2, 0x1, 0x0) write$FUSE_OPEN(0xffffffffffffffff, &(0x7f00000001c0)={0x20, 0x0, 0x1, {0x0, 0x6}}, 0x20) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000400)) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000300)='cgroup.procs\x00', 0x2, 0x0) connect$inet(r2, &(0x7f0000000280)={0x2, 0x0, @local}, 0x10) 11:43:20 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000002c0)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000100000002402000020feffff7a0af0fff8ffffff69a4f0ff00000000b7060000000000000744000000000000b7040000100000206a0700fe00000000850000002f000000b70000000a00000095000000000000006458c2c62fc286000389d909a63796c113a80c19aab9d646ae8f51b6cdf0d3253730e711f5969f62c28b22756bedf3cf393d14c46cc4f79fd2b316da4f0de8163f6242fa7323f1740637c48468766af540439f0500f144631ac2f9842e1b346362dcae08c3d1a1fbe96dd87235b44174f7c0343185089ab5119e31975e551558055dc2dce53b95c132e78454c4813681e0688d3a127f7418c6226f4133346c2e6794d952f2bb7938a2c53a0ce68e"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) socket$nl_route(0x10, 0x3, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) tkill(0x0, 0x3b) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000400)) 11:43:23 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000000)="5500000019007f5300fe01b2a4a280930a60ffff00a84302910000003900090008000c00060000f3180015e005000600000000dc1320d5440700000000", 0x3d}], 0x1}, 0x0) r0 = socket(0x1000000010, 0x0, 0x0) sendmmsg$alg(r0, &(0x7f00000000c0), 0x492492492492191, 0x0) r1 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r1) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x38) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) 11:43:23 executing program 5: setresuid(0xffffffffffffffff, 0xfffe, 0xffffffffffffffff) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, 0x0) 11:43:23 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x200001000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) socket$nl_route(0x10, 0x3, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xd, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r1 = gettid() tkill(r1, 0x3b) socket$inet_tcp(0x2, 0x1, 0x0) write$FUSE_OPEN(0xffffffffffffffff, &(0x7f00000001c0)={0x20, 0x0, 0x1, {0x0, 0x6}}, 0x20) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000400)) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000300)='cgroup.procs\x00', 0x2, 0x0) connect$inet(r2, &(0x7f0000000280)={0x2, 0x0, @local}, 0x10) 11:43:23 executing program 4: syz_emit_ethernet(0x3005aa, &(0x7f0000000180)=ANY=[@ANYBLOB="aaaaaaaaaaaa00000000000008060001080006040001aaaaaaaaaaaaac1492aaaaaaaaaaaa00ac1414aa9117906ad01f19d3e1f6945759ff39267da6adabd8ba8b7dee4df326d72a3cf794ece804b2ff95b645a5aee1c8c70ff21f2f06ddff3aa0fc4db55b494a6a25382224a4c5a5d7d31287f7b59a383dcae6401db2459f65c1925b902d3592a3c7b3d7ecb354ac2d4402e6756bb6087bc763365f87cfc15cc332b0f2c861dbd7d8dea60e529426ff4bdcd3c10622ea16a1bcbbe32a60c274e85b2ea5b3915c9162ea7a228a9c2f9a89d2de7e7f7568f0f36e792a"], 0x0) 11:43:23 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) socket$nl_route(0x10, 0x3, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) tkill(0x0, 0x3b) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000400)) 11:43:23 executing program 1: perf_event_open(&(0x7f0000000440)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x220801, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r0, 0x800443d3, &(0x7f0000000580)={{0x3, 0x9, 0xffff, 0x7fffffff}, 0x100000000, 0x0, 0x9}) syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vcs\x00', 0x280200, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\xf6', 0x1ff) ioctl$RTC_EPOCH_READ(r1, 0x8008700d, &(0x7f0000000280)) getsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000300)=0xffff, &(0x7f0000000140)=0x4) mkdirat(0xffffffffffffff9c, 0x0, 0x0) bind$ax25(r0, &(0x7f0000000340)={{0x3, @null, 0x5}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x80000, 0x10064) r3 = openat$cgroup_procs(r2, &(0x7f0000000100)='cgroup.procs\x00', 0x2, 0x0) write$P9_RCLUNK(r1, &(0x7f00000001c0)={0x7, 0x79, 0x1}, 0x7) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.net/syz1\x00', 0x1ff) write$cgroup_pid(r3, &(0x7f0000000640), 0x12) 11:43:23 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x200001000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) socket$nl_route(0x10, 0x3, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xd, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r1 = gettid() tkill(r1, 0x3b) socket$inet_tcp(0x2, 0x1, 0x0) write$FUSE_OPEN(0xffffffffffffffff, &(0x7f00000001c0)={0x20, 0x0, 0x1, {0x0, 0x6}}, 0x20) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000400)) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000300)='cgroup.procs\x00', 0x2, 0x0) connect$inet(r2, &(0x7f0000000280)={0x2, 0x0, @local}, 0x10) 11:43:23 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000002c0)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000100000002402000020feffff7a0af0fff8ffffff69a4f0ff00000000b7060000000000000744000000000000b7040000100000206a0700fe00000000850000002f000000b70000000a00000095000000000000006458c2c62fc286000389d909a63796c113a80c19aab9d646ae8f51b6cdf0d3253730e711f5969f62c28b22756bedf3cf393d14c46cc4f79fd2b316da4f0de8163f6242fa7323f1740637c48468766af540439f0500f144631ac2f9842e1b346362dcae08c3d1a1fbe96dd87235b44174f7c0343185089ab5119e31975e551558055dc2dce53b95c132e78454c4813681e0688d3a127f7418c6226f4133346c2e6794d952f2bb7938a2c53a0ce68e"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) socket$nl_route(0x10, 0x3, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) tkill(0x0, 0x3b) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000400)) 11:43:23 executing program 5: setresuid(0xffffffffffffffff, 0xfffe, 0xffffffffffffffff) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, 0x0) 11:43:23 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="20321798c481a14337b6d46eb9892153dc9449d00000000700000000000040942fcb2b080000000000994e3690c5615a9d6800aaa4b5a478c9"], 0x1}}, 0x0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3b) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 11:43:23 executing program 1: perf_event_open(&(0x7f0000000440)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x220801, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r0, 0x800443d3, &(0x7f0000000580)={{0x3, 0x9, 0xffff, 0x7fffffff}, 0x100000000, 0x0, 0x9}) syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vcs\x00', 0x280200, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\xf6', 0x1ff) ioctl$RTC_EPOCH_READ(r1, 0x8008700d, &(0x7f0000000280)) getsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000300)=0xffff, &(0x7f0000000140)=0x4) mkdirat(0xffffffffffffff9c, 0x0, 0x0) bind$ax25(r0, &(0x7f0000000340)={{0x3, @null, 0x5}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x80000, 0x10064) r3 = openat$cgroup_procs(r2, &(0x7f0000000100)='cgroup.procs\x00', 0x2, 0x0) write$P9_RCLUNK(r1, &(0x7f00000001c0)={0x7, 0x79, 0x1}, 0x7) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.net/syz1\x00', 0x1ff) write$cgroup_pid(r3, &(0x7f0000000640), 0x12) 11:43:23 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x200001000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) socket$nl_route(0x10, 0x3, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xd, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r1 = gettid() tkill(r1, 0x3b) socket$inet_tcp(0x2, 0x1, 0x0) write$FUSE_OPEN(0xffffffffffffffff, &(0x7f00000001c0)={0x20, 0x0, 0x1, {0x0, 0x6}}, 0x20) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000400)) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000300)='cgroup.procs\x00', 0x2, 0x0) connect$inet(r2, &(0x7f0000000280)={0x2, 0x0, @local}, 0x10) [ 386.349813] ptrace attach of "/root/syz-executor.4"[13130] was attempted by "/root/syz-executor.4"[13133] [ 387.031022] net_ratelimit: 20 callbacks suppressed [ 387.031026] protocol 88fb is buggy, dev hsr_slave_0 [ 387.041032] protocol 88fb is buggy, dev hsr_slave_1 [ 387.360097] protocol 88fb is buggy, dev hsr_slave_0 [ 387.365171] protocol 88fb is buggy, dev hsr_slave_1 [ 387.760100] protocol 88fb is buggy, dev hsr_slave_0 [ 387.765247] protocol 88fb is buggy, dev hsr_slave_1 [ 388.150099] protocol 88fb is buggy, dev hsr_slave_0 [ 388.155171] protocol 88fb is buggy, dev hsr_slave_1 [ 388.390088] protocol 88fb is buggy, dev hsr_slave_0 [ 388.395145] protocol 88fb is buggy, dev hsr_slave_1 11:43:26 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000000)="5500000019007f5300fe01b2a4a280930a60ffff00a84302910000003900090008000c00060000f3180015e005000600000000dc1320d5440700000000", 0x3d}], 0x1}, 0x0) r0 = socket(0x1000000010, 0x0, 0x0) sendmmsg$alg(r0, &(0x7f00000000c0), 0x492492492492191, 0x0) r1 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r1) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x38) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) 11:43:26 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) socket$nl_route(0x10, 0x3, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = gettid() tkill(r1, 0x3b) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000400)) 11:43:26 executing program 5: setresuid(0xffffffffffffffff, 0xfffe, 0xffffffffffffffff) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) ioctl$TCSETSF(0xffffffffffffffff, 0x5412, 0x0) 11:43:26 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x200001000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) socket$nl_route(0x10, 0x3, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xd, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b70000000000000095000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r1 = gettid() tkill(r1, 0x3b) socket$inet_tcp(0x2, 0x1, 0x0) write$FUSE_OPEN(0xffffffffffffffff, &(0x7f00000001c0)={0x20, 0x0, 0x1, {0x0, 0x6}}, 0x20) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000400)) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000300)='cgroup.procs\x00', 0x2, 0x0) connect$inet(r2, &(0x7f0000000280)={0x2, 0x0, @local}, 0x10) 11:43:26 executing program 4: openat$zero(0xffffffffffffff9c, 0x0, 0x180, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r1 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_MP_STATE(r1, 0x4004ae99, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, &(0x7f0000000580), 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$TCSETSF(r2, 0x5404, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r2, 0x0, 0x43, &(0x7f0000000100)={'HL\x00'}, &(0x7f00000004c0)=0x1e) fchdir(r2) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r3, &(0x7f0000000380)=ANY=[@ANYBLOB="56ef637615b704c4aa77cebc58325dc65adaff3124533c31f005ea2dd751c6974f6d04c137449dc225295e08b2a2bb855e95df18737a4a28ac926d3f155723b6e6d3e996e89d734371623b50f046dd4d973a05ef09fbdd43cd7909a255a1ca452e7f826ac3695a3ac9d2e16a9af02cf565f5868fe8eeb1dc66bc66e961e6bee8af2b248ccc5c0c80d2778aacbdc1d098e47b26bfb5"], 0x95) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r3, r3, &(0x7f00000001c0), 0x8080fffffffe) creat(&(0x7f0000000280)='./file0\x00', 0x1c1) prctl$PR_SET_MM_AUXV(0x23, 0xc, &(0x7f0000000080)="32789fe680566ce619e87d8389f2393a5750f2a00209794ed1ca77cb476a032c34594149f0976fd8f2b6f520e4d6b5dfb6443c0d27434362573b0985a3d5cc764efa2397becf461d4a363c04dd50396b12b3f85da2fea5a058f546b868edb42b857869f684ae6a9c", 0x68) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x89a1, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) accept4$tipc(0xffffffffffffffff, &(0x7f0000000300)=@id, &(0x7f0000000340)=0x10, 0x80800) openat$rtc(0xffffffffffffff9c, 0x0, 0x24002, 0x0) 11:43:26 executing program 1: perf_event_open(&(0x7f0000000440)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x220801, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r0, 0x800443d3, &(0x7f0000000580)={{0x3, 0x9, 0xffff, 0x7fffffff}, 0x100000000, 0x0, 0x9}) syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vcs\x00', 0x280200, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\xf6', 0x1ff) ioctl$RTC_EPOCH_READ(r1, 0x8008700d, &(0x7f0000000280)) getsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000300)=0xffff, &(0x7f0000000140)=0x4) mkdirat(0xffffffffffffff9c, 0x0, 0x0) bind$ax25(r0, &(0x7f0000000340)={{0x3, @null, 0x5}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x80000, 0x10064) r3 = openat$cgroup_procs(r2, &(0x7f0000000100)='cgroup.procs\x00', 0x2, 0x0) write$P9_RCLUNK(r1, &(0x7f00000001c0)={0x7, 0x79, 0x1}, 0x7) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.net/syz1\x00', 0x1ff) write$cgroup_pid(r3, &(0x7f0000000640), 0x12) 11:43:26 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) socket$nl_route(0x10, 0x3, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = gettid() tkill(r1, 0x3b) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000400)) 11:43:26 executing program 5: setresuid(0xffffffffffffffff, 0xfffe, 0xffffffffffffffff) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) ioctl$TCSETSF(0xffffffffffffffff, 0x5412, 0x0) 11:43:26 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x200001000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) socket$nl_route(0x10, 0x3, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xd, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b70000000000000095000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r1 = gettid() tkill(r1, 0x3b) socket$inet_tcp(0x2, 0x1, 0x0) write$FUSE_OPEN(0xffffffffffffffff, &(0x7f00000001c0)={0x20, 0x0, 0x1, {0x0, 0x6}}, 0x20) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000400)) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000300)='cgroup.procs\x00', 0x2, 0x0) connect$inet(r2, &(0x7f0000000280)={0x2, 0x0, @local}, 0x10) 11:43:26 executing program 1: perf_event_open(&(0x7f0000000440)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x220801, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r0, 0x800443d3, &(0x7f0000000580)={{0x3, 0x9, 0xffff, 0x7fffffff}, 0x100000000, 0x0, 0x9}) syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vcs\x00', 0x280200, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\xf6', 0x1ff) ioctl$RTC_EPOCH_READ(r1, 0x8008700d, &(0x7f0000000280)) getsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000300)=0xffff, &(0x7f0000000140)=0x4) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) bind$ax25(0xffffffffffffffff, &(0x7f0000000340)={{0x3, @null, 0x5}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x80000, 0x10064) r3 = openat$cgroup_procs(r2, &(0x7f0000000100)='cgroup.procs\x00', 0x2, 0x0) write$P9_RCLUNK(r1, &(0x7f00000001c0)={0x7, 0x79, 0x1}, 0x7) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.net/syz1\x00', 0x1ff) write$cgroup_pid(r3, &(0x7f0000000640), 0x12) 11:43:26 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x200001000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) socket$nl_route(0x10, 0x3, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xd, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b70000000000000095000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r1 = gettid() tkill(r1, 0x3b) socket$inet_tcp(0x2, 0x1, 0x0) write$FUSE_OPEN(0xffffffffffffffff, &(0x7f00000001c0)={0x20, 0x0, 0x1, {0x0, 0x6}}, 0x20) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000400)) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000300)='cgroup.procs\x00', 0x2, 0x0) connect$inet(r2, &(0x7f0000000280)={0x2, 0x0, @local}, 0x10) 11:43:26 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) socket$nl_route(0x10, 0x3, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = gettid() tkill(r1, 0x3b) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000400)) [ 390.037238] audit: type=1804 audit(1566560607.306:77): pid=13161 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.4" name="/root/syzkaller-testdir618752181/syzkaller.5L6KZq/267/file0/file0" dev="loop4" ino=257 res=1 11:43:29 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000000)="5500000019007f5300fe01b2a4a280930a60ffff00a84302910000003900090008000c00060000f3180015e005000600000000dc1320d5440700000000", 0x3d}], 0x1}, 0x0) r0 = socket(0x1000000010, 0x0, 0x0) sendmmsg$alg(r0, &(0x7f00000000c0), 0x492492492492191, 0x0) r1 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r1) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x38) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) 11:43:29 executing program 5: setresuid(0xffffffffffffffff, 0xfffe, 0xffffffffffffffff) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) ioctl$TCSETSF(0xffffffffffffffff, 0x5412, 0x0) 11:43:29 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000002c0)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000100000002402000020feffff7a0af0fff8ffffff69a4f0ff00000000b7060000000000000744000000000000b7040000100000206a0700fe00000000850000002f000000b70000000a00000095000000000000006458c2c62fc286000389d909a63796c113a80c19aab9d646ae8f51b6cdf0d3253730e711f5969f62c28b22756bedf3cf393d14c46cc4f79fd2b316da4f0de8163f6242fa7323f1740637c48468766af540439f0500f144631ac2f9842e1b346362dcae08c3d1a1fbe96dd87235b44174f7c0343185089ab5119e31975e551558055dc2dce53b95c132e78454c4813681e0688d3a127f7418c6226f4133346c2e6794d952f2bb7938a2c53a0ce68e"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) socket$nl_route(0x10, 0x3, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = gettid() tkill(r1, 0x3b) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000400)) 11:43:29 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x200001000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) socket$nl_route(0x10, 0x3, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r1 = gettid() tkill(r1, 0x3b) socket$inet_tcp(0x2, 0x1, 0x0) write$FUSE_OPEN(0xffffffffffffffff, &(0x7f00000001c0)={0x20, 0x0, 0x1, {0x0, 0x6}}, 0x20) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000400)) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000300)='cgroup.procs\x00', 0x2, 0x0) connect$inet(r2, &(0x7f0000000280)={0x2, 0x0, @local}, 0x10) 11:43:29 executing program 1: perf_event_open(&(0x7f0000000440)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x220801, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r0, 0x800443d3, &(0x7f0000000580)={{0x3, 0x9, 0xffff, 0x7fffffff}, 0x100000000, 0x0, 0x9}) syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vcs\x00', 0x280200, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\xf6', 0x1ff) ioctl$RTC_EPOCH_READ(r1, 0x8008700d, &(0x7f0000000280)) getsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000300)=0xffff, &(0x7f0000000140)=0x4) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) bind$ax25(0xffffffffffffffff, &(0x7f0000000340)={{0x3, @null, 0x5}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x80000, 0x10064) r3 = openat$cgroup_procs(r2, &(0x7f0000000100)='cgroup.procs\x00', 0x2, 0x0) write$P9_RCLUNK(r1, &(0x7f00000001c0)={0x7, 0x79, 0x1}, 0x7) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.net/syz1\x00', 0x1ff) write$cgroup_pid(r3, &(0x7f0000000640), 0x12) 11:43:29 executing program 4: openat$zero(0xffffffffffffff9c, 0x0, 0x180, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r1 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_MP_STATE(r1, 0x4004ae99, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, &(0x7f0000000580), 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$TCSETSF(r2, 0x5404, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r2, 0x0, 0x43, &(0x7f0000000100)={'HL\x00'}, &(0x7f00000004c0)=0x1e) fchdir(r2) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r3, &(0x7f0000000380)=ANY=[@ANYBLOB="56ef637615b704c4aa77cebc58325dc65adaff3124533c31f005ea2dd751c6974f6d04c137449dc225295e08b2a2bb855e95df18737a4a28ac926d3f155723b6e6d3e996e89d734371623b50f046dd4d973a05ef09fbdd43cd7909a255a1ca452e7f826ac3695a3ac9d2e16a9af02cf565f5868fe8eeb1dc66bc66e961e6bee8af2b248ccc5c0c80d2778aacbdc1d098e47b26bfb5"], 0x95) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r3, r3, &(0x7f00000001c0), 0x8080fffffffe) creat(&(0x7f0000000280)='./file0\x00', 0x1c1) prctl$PR_SET_MM_AUXV(0x23, 0xc, &(0x7f0000000080)="32789fe680566ce619e87d8389f2393a5750f2a00209794ed1ca77cb476a032c34594149f0976fd8f2b6f520e4d6b5dfb6443c0d27434362573b0985a3d5cc764efa2397becf461d4a363c04dd50396b12b3f85da2fea5a058f546b868edb42b857869f684ae6a9c", 0x68) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x89a1, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) accept4$tipc(0xffffffffffffffff, &(0x7f0000000300)=@id, &(0x7f0000000340)=0x10, 0x80800) openat$rtc(0xffffffffffffff9c, 0x0, 0x24002, 0x0) 11:43:29 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x200001000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) socket$nl_route(0x10, 0x3, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r1 = gettid() tkill(r1, 0x3b) socket$inet_tcp(0x2, 0x1, 0x0) write$FUSE_OPEN(0xffffffffffffffff, &(0x7f00000001c0)={0x20, 0x0, 0x1, {0x0, 0x6}}, 0x20) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000400)) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000300)='cgroup.procs\x00', 0x2, 0x0) connect$inet(r2, &(0x7f0000000280)={0x2, 0x0, @local}, 0x10) 11:43:29 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000002c0)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000100000002402000020feffff7a0af0fff8ffffff69a4f0ff00000000b7060000000000000744000000000000b7040000100000206a0700fe00000000850000002f000000b70000000a00000095000000000000006458c2c62fc286000389d909a63796c113a80c19aab9d646ae8f51b6cdf0d3253730e711f5969f62c28b22756bedf3cf393d14c46cc4f79fd2b316da4f0de8163f6242fa7323f1740637c48468766af540439f0500f144631ac2f9842e1b346362dcae08c3d1a1fbe96dd87235b44174f7c0343185089ab5119e31975e551558055dc2dce53b95c132e78454c4813681e0688d3a127f7418c6226f4133346c2e6794d952f2bb7938a2c53a0ce68e"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) socket$nl_route(0x10, 0x3, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = gettid() tkill(r1, 0x3b) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000400)) 11:43:29 executing program 5: setresuid(0xffffffffffffffff, 0xfffe, 0xffffffffffffffff) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, 0x0) [ 392.310608] net_ratelimit: 20 callbacks suppressed [ 392.310643] protocol 88fb is buggy, dev hsr_slave_0 [ 392.321364] protocol 88fb is buggy, dev hsr_slave_1 11:43:29 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x200001000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) socket$nl_route(0x10, 0x3, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r1 = gettid() tkill(r1, 0x3b) socket$inet_tcp(0x2, 0x1, 0x0) write$FUSE_OPEN(0xffffffffffffffff, &(0x7f00000001c0)={0x20, 0x0, 0x1, {0x0, 0x6}}, 0x20) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000400)) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000300)='cgroup.procs\x00', 0x2, 0x0) connect$inet(r2, &(0x7f0000000280)={0x2, 0x0, @local}, 0x10) 11:43:29 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000002c0)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000100000002402000020feffff7a0af0fff8ffffff69a4f0ff00000000b7060000000000000744000000000000b7040000100000206a0700fe00000000850000002f000000b70000000a00000095000000000000006458c2c62fc286000389d909a63796c113a80c19aab9d646ae8f51b6cdf0d3253730e711f5969f62c28b22756bedf3cf393d14c46cc4f79fd2b316da4f0de8163f6242fa7323f1740637c48468766af540439f0500f144631ac2f9842e1b346362dcae08c3d1a1fbe96dd87235b44174f7c0343185089ab5119e31975e551558055dc2dce53b95c132e78454c4813681e0688d3a127f7418c6226f4133346c2e6794d952f2bb7938a2c53a0ce68e"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) socket$nl_route(0x10, 0x3, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = gettid() tkill(r1, 0x3b) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000400)) 11:43:29 executing program 5: setresuid(0xffffffffffffffff, 0xfffe, 0xffffffffffffffff) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, 0x0) [ 392.550134] protocol 88fb is buggy, dev hsr_slave_0 [ 392.555285] protocol 88fb is buggy, dev hsr_slave_1 [ 392.630818] protocol 88fb is buggy, dev hsr_slave_0 [ 392.636457] protocol 88fb is buggy, dev hsr_slave_1 [ 393.270137] protocol 88fb is buggy, dev hsr_slave_0 [ 393.275203] protocol 88fb is buggy, dev hsr_slave_1 [ 393.590119] protocol 88fb is buggy, dev hsr_slave_0 [ 393.595174] protocol 88fb is buggy, dev hsr_slave_1 11:43:32 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000000)="5500000019007f5300fe01b2a4a280930a60ffff00a84302910000003900090008000c00060000f3180015e005000600000000dc1320d5440700000000", 0x3d}], 0x1}, 0x0) socket(0x1000000010, 0x80002, 0x0) sendmmsg$alg(0xffffffffffffffff, &(0x7f00000000c0), 0x492492492492191, 0x0) r0 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x38) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 11:43:32 executing program 1: perf_event_open(&(0x7f0000000440)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x220801, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r0, 0x800443d3, &(0x7f0000000580)={{0x3, 0x9, 0xffff, 0x7fffffff}, 0x100000000, 0x0, 0x9}) syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vcs\x00', 0x280200, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\xf6', 0x1ff) ioctl$RTC_EPOCH_READ(r1, 0x8008700d, &(0x7f0000000280)) getsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000300)=0xffff, &(0x7f0000000140)=0x4) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) bind$ax25(0xffffffffffffffff, &(0x7f0000000340)={{0x3, @null, 0x5}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x80000, 0x10064) r3 = openat$cgroup_procs(r2, &(0x7f0000000100)='cgroup.procs\x00', 0x2, 0x0) write$P9_RCLUNK(r1, &(0x7f00000001c0)={0x7, 0x79, 0x1}, 0x7) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.net/syz1\x00', 0x1ff) write$cgroup_pid(r3, &(0x7f0000000640), 0x12) 11:43:32 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x200001000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) socket$nl_route(0x10, 0x3, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) r1 = gettid() tkill(r1, 0x3b) socket$inet_tcp(0x2, 0x1, 0x0) write$FUSE_OPEN(0xffffffffffffffff, &(0x7f00000001c0)={0x20, 0x0, 0x1, {0x0, 0x6}}, 0x20) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000400)) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000300)='cgroup.procs\x00', 0x2, 0x0) connect$inet(r2, &(0x7f0000000280)={0x2, 0x0, @local}, 0x10) 11:43:32 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = gettid() tkill(r1, 0x3b) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000400)) 11:43:32 executing program 5: setresuid(0xffffffffffffffff, 0xfffe, 0xffffffffffffffff) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, 0x0) 11:43:32 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(camellia-generic)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000640)="d3abc79909535c9e00"/24, 0x18) r1 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet(r1, &(0x7f0000000040), 0x3a3728, 0x0, 0x0, 0xffffffffffffffbf) 11:43:32 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x200001000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) socket$nl_route(0x10, 0x3, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) r1 = gettid() tkill(r1, 0x3b) socket$inet_tcp(0x2, 0x1, 0x0) write$FUSE_OPEN(0xffffffffffffffff, &(0x7f00000001c0)={0x20, 0x0, 0x1, {0x0, 0x6}}, 0x20) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000400)) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000300)='cgroup.procs\x00', 0x2, 0x0) connect$inet(r2, &(0x7f0000000280)={0x2, 0x0, @local}, 0x10) 11:43:32 executing program 5: setresuid(0xffffffffffffffff, 0xfffe, 0xffffffffffffffff) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000600)) r0 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TCSETSF(r0, 0x5412, 0x0) 11:43:32 executing program 4: creat(&(0x7f0000000480)='./bus\x00', 0x0) msgget(0x1, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) setsockopt$inet6_MRT6_ADD_MIF(0xffffffffffffffff, 0x29, 0xca, &(0x7f00000001c0)={0x0, 0x1, 0x40, 0x4, 0x1}, 0xc) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffff9c, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000005c0)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[.\xf6\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+\x8d\xed\xa6\\\x1c\xc3\x97\x94\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4\xc4\x88C\xa2B\x8b\x81\v\xea\t\xf0\x8fw\a\f\x15\xe2\xd0q\xbb\r\x17`s\xec\x85>\xcf\xab9(\xf6.\x15\xcd2-\xf2\xc4\xd8\x00a\xd5\xd9\xb5Z\xd7\xb4\xac\x1d_+k\xd6\x8ag\xdceHE\xd5\x1c\x8a\xbd#\xcc\x82\xca\xc2(\xb6\xe1\x99p\x9b\xa3D\xd2\x91\x96\xef\x05\fv\x16\x14\xcc\xea\x9d\x11w\x1e\xb5VG\x9ad\x9a`=^h\x8c8\xc9\"\x1eO\xb5vk\xc9\xcfi\x90\xd7\xd3H\xa1\xb4\xda\v\x17\x95\xf7\x19\x99\x99\x92\xc3\xc0\x8a\x18\xc7\"g\xd7B\x8f\x85\x18\xf3\x02\xa7\xb6\x83\x92\xefY\xef\x85\x92\x10E\x18\xbc\xacy\xd6\xa7Wh\xcd\xd0\xfa\xcc\xde\xeb\xdf\xad\xfd\xb0\xee\xfb\xc2(\x8cj\xd0uj{4\xb2\xe1p\x88u6\x9a;\xaa\x9f+J\x9e\xe3\xcc\xc7O\xad\x84\x8c;\x92~,\x15\xb2\x97\f~\xa0W\x16\x8b\a\x88\xaa\xe4C\xaf\x90\xdf\x7f\xe51\x00/n\xb5f\x1a\x8c+\xea<\xe3N@\x9e\xec\xbe{\x90x\xc6\x95!\xea\x11\xda\xe1I\x1d\xcbY\xe1\x01\xd2d\xae\xd1(>\xa3\xa9\x93\x16\xc6G\x94|', 0x2761, 0x0) write$cgroup_pid(r0, &(0x7f0000000080), 0xfffffe38) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f0000000300)={{0xa, 0x4e24, 0x0, @remote, 0x4}, {0xa, 0x4e21, 0x0, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x6}, 0xff, [0x8e3, 0x0, 0x0, 0x9389, 0x1, 0x5, 0x40, 0x2]}, 0x5c) write$P9_RSYMLINK(r0, 0x0, 0x0) r1 = perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x660c, 0x0) r2 = open(&(0x7f0000000280)='./bus\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r2, 0x10e, 0x4, 0x0, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0xc, 0x4002091, r2, 0x0) r3 = memfd_create(&(0x7f00000003c0)='+\x8b\x8a\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x3) write$binfmt_misc(r3, &(0x7f00000000c0)=ANY=[@ANYRESDEC], 0x14) sendfile(r3, r1, &(0x7f0000000000)=0xfffffffffffffff8, 0xffff) ioctl$DRM_IOCTL_GET_STATS(r0, 0x80f86406, &(0x7f0000000540)=""/108) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(r4, 0x5420, &(0x7f0000000040)=0xae71) ioctl$TCSETS(r4, 0x40045431, &(0x7f0000000600)) syz_open_pts(r4, 0x0) 11:43:32 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x200001000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) socket$nl_route(0x10, 0x3, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) r1 = gettid() tkill(r1, 0x3b) socket$inet_tcp(0x2, 0x1, 0x0) write$FUSE_OPEN(0xffffffffffffffff, &(0x7f00000001c0)={0x20, 0x0, 0x1, {0x0, 0x6}}, 0x20) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000400)) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000300)='cgroup.procs\x00', 0x2, 0x0) connect$inet(r2, &(0x7f0000000280)={0x2, 0x0, @local}, 0x10) 11:43:32 executing program 1: perf_event_open(&(0x7f0000000440)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x220801, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r0, 0x800443d3, &(0x7f0000000580)={{0x3, 0x9, 0xffff, 0x7fffffff}, 0x100000000, 0x0, 0x9}) syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vcs\x00', 0x280200, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\xf6', 0x1ff) ioctl$RTC_EPOCH_READ(r1, 0x8008700d, &(0x7f0000000280)) getsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000300)=0xffff, &(0x7f0000000140)=0x4) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) bind$ax25(r0, 0x0, 0x0) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x80000, 0x10064) r3 = openat$cgroup_procs(r2, &(0x7f0000000100)='cgroup.procs\x00', 0x2, 0x0) write$P9_RCLUNK(r1, &(0x7f00000001c0)={0x7, 0x79, 0x1}, 0x7) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.net/syz1\x00', 0x1ff) write$cgroup_pid(r3, &(0x7f0000000640), 0x12) 11:43:32 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = gettid() tkill(r1, 0x3b) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000400)) [ 395.800577] audit: type=1804 audit(1566560613.076:78): pid=13283 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.4" name="/root/syzkaller-testdir618752181/syzkaller.5L6KZq/270/bus" dev="sda1" ino=17881 res=1 [ 395.869408] audit: type=1804 audit(1566560613.106:79): pid=13283 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.4" name="/root/syzkaller-testdir618752181/syzkaller.5L6KZq/270/bus" dev="sda1" ino=17881 res=1 [ 397.430140] net_ratelimit: 20 callbacks suppressed [ 397.430145] protocol 88fb is buggy, dev hsr_slave_0 [ 397.440167] protocol 88fb is buggy, dev hsr_slave_1 [ 397.750099] protocol 88fb is buggy, dev hsr_slave_0 [ 397.755168] protocol 88fb is buggy, dev hsr_slave_1 [ 398.150109] protocol 88fb is buggy, dev hsr_slave_0 [ 398.155221] protocol 88fb is buggy, dev hsr_slave_1 11:43:35 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000000)="5500000019007f5300fe01b2a4a280930a60ffff00a84302910000003900090008000c00060000f3180015e005000600000000dc1320d5440700000000", 0x3d}], 0x1}, 0x0) socket(0x1000000010, 0x80002, 0x0) sendmmsg$alg(0xffffffffffffffff, &(0x7f00000000c0), 0x492492492492191, 0x0) r0 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x38) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 11:43:35 executing program 5: setresuid(0xffffffffffffffff, 0xfffe, 0xffffffffffffffff) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000600)) r0 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TCSETSF(r0, 0x5412, 0x0) 11:43:35 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x200001000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) socket$nl_route(0x10, 0x3, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x70) r1 = gettid() tkill(r1, 0x3b) socket$inet_tcp(0x2, 0x1, 0x0) write$FUSE_OPEN(0xffffffffffffffff, &(0x7f00000001c0)={0x20, 0x0, 0x1, {0x0, 0x6}}, 0x20) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000400)) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000300)='cgroup.procs\x00', 0x2, 0x0) connect$inet(r2, &(0x7f0000000280)={0x2, 0x0, @local}, 0x10) 11:43:35 executing program 1: perf_event_open(&(0x7f0000000440)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x220801, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r0, 0x800443d3, &(0x7f0000000580)={{0x3, 0x9, 0xffff, 0x7fffffff}, 0x100000000, 0x0, 0x9}) syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vcs\x00', 0x280200, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\xf6', 0x1ff) ioctl$RTC_EPOCH_READ(r1, 0x8008700d, &(0x7f0000000280)) getsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000300)=0xffff, &(0x7f0000000140)=0x4) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) bind$ax25(r0, 0x0, 0x0) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x80000, 0x10064) r3 = openat$cgroup_procs(r2, &(0x7f0000000100)='cgroup.procs\x00', 0x2, 0x0) write$P9_RCLUNK(r1, &(0x7f00000001c0)={0x7, 0x79, 0x1}, 0x7) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.net/syz1\x00', 0x1ff) write$cgroup_pid(r3, &(0x7f0000000640), 0x12) 11:43:35 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = gettid() tkill(r1, 0x3b) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000400)) 11:43:35 executing program 4: setresuid(0xffffffffffffffff, 0xfffe, 0xffffffffffffffff) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSLCKTRMIOS(r1, 0x5457, 0x0) 11:43:35 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x200001000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) socket$nl_route(0x10, 0x3, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x70) r1 = gettid() tkill(r1, 0x3b) socket$inet_tcp(0x2, 0x1, 0x0) write$FUSE_OPEN(0xffffffffffffffff, &(0x7f00000001c0)={0x20, 0x0, 0x1, {0x0, 0x6}}, 0x20) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000400)) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000300)='cgroup.procs\x00', 0x2, 0x0) connect$inet(r2, &(0x7f0000000280)={0x2, 0x0, @local}, 0x10) 11:43:35 executing program 4: r0 = syz_open_dev$sndseq(&(0x7f0000000140)='/dev/snd/seq\x00', 0x0, 0x0) timer_create(0x0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(r0, 0x40505331, &(0x7f0000000340)) timer_settime(0x0, 0x0, 0x0, 0x0) tkill(0x0, 0x0) 11:43:35 executing program 5: setresuid(0xffffffffffffffff, 0xfffe, 0xffffffffffffffff) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000600)) r0 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TCSETSF(r0, 0x5412, 0x0) 11:43:35 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x200001000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) socket$nl_route(0x10, 0x3, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x70) r1 = gettid() tkill(r1, 0x3b) socket$inet_tcp(0x2, 0x1, 0x0) write$FUSE_OPEN(0xffffffffffffffff, &(0x7f00000001c0)={0x20, 0x0, 0x1, {0x0, 0x6}}, 0x20) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000400)) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000300)='cgroup.procs\x00', 0x2, 0x0) connect$inet(r2, &(0x7f0000000280)={0x2, 0x0, @local}, 0x10) 11:43:35 executing program 1: perf_event_open(&(0x7f0000000440)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x220801, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r0, 0x800443d3, &(0x7f0000000580)={{0x3, 0x9, 0xffff, 0x7fffffff}, 0x100000000, 0x0, 0x9}) syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vcs\x00', 0x280200, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\xf6', 0x1ff) ioctl$RTC_EPOCH_READ(r1, 0x8008700d, &(0x7f0000000280)) getsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000300)=0xffff, &(0x7f0000000140)=0x4) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) bind$ax25(r0, 0x0, 0x0) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x80000, 0x10064) r3 = openat$cgroup_procs(r2, &(0x7f0000000100)='cgroup.procs\x00', 0x2, 0x0) write$P9_RCLUNK(r1, &(0x7f00000001c0)={0x7, 0x79, 0x1}, 0x7) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.net/syz1\x00', 0x1ff) write$cgroup_pid(r3, &(0x7f0000000640), 0x12) 11:43:35 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x200001000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) socket$nl_route(0x10, 0x3, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) gettid() tkill(0x0, 0x3b) socket$inet_tcp(0x2, 0x1, 0x0) write$FUSE_OPEN(0xffffffffffffffff, &(0x7f00000001c0)={0x20, 0x0, 0x1, {0x0, 0x6}}, 0x20) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000400)) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000300)='cgroup.procs\x00', 0x2, 0x0) connect$inet(r1, &(0x7f0000000280)={0x2, 0x0, @local}, 0x10) [ 398.550667] protocol 88fb is buggy, dev hsr_slave_0 [ 398.555777] protocol 88fb is buggy, dev hsr_slave_1 [ 398.790113] protocol 88fb is buggy, dev hsr_slave_0 [ 398.795181] protocol 88fb is buggy, dev hsr_slave_1 11:43:38 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000000)="5500000019007f5300fe01b2a4a280930a60ffff00a84302910000003900090008000c00060000f3180015e005000600000000dc1320d5440700000000", 0x3d}], 0x1}, 0x0) socket(0x1000000010, 0x80002, 0x0) sendmmsg$alg(0xffffffffffffffff, &(0x7f00000000c0), 0x492492492492191, 0x0) r0 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x38) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 11:43:38 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, 0x0) 11:43:38 executing program 4: munmap(&(0x7f0000ab4000/0x2000)=nil, 0x2000) mmap(&(0x7f000071c000/0x400000)=nil, 0x400000, 0x3, 0x5012, 0xffffffffffffffff, 0x0) 11:43:38 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = gettid() tkill(r1, 0x3b) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000400)) 11:43:38 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x200001000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) socket$nl_route(0x10, 0x3, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) gettid() tkill(0x0, 0x3b) socket$inet_tcp(0x2, 0x1, 0x0) write$FUSE_OPEN(0xffffffffffffffff, &(0x7f00000001c0)={0x20, 0x0, 0x1, {0x0, 0x6}}, 0x20) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000400)) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000300)='cgroup.procs\x00', 0x2, 0x0) connect$inet(r1, &(0x7f0000000280)={0x2, 0x0, @local}, 0x10) 11:43:38 executing program 1: perf_event_open(&(0x7f0000000440)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x220801, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r0, 0x800443d3, &(0x7f0000000580)={{0x3, 0x9, 0xffff, 0x7fffffff}, 0x100000000, 0x0, 0x9}) syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vcs\x00', 0x280200, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\xf6', 0x1ff) ioctl$RTC_EPOCH_READ(r1, 0x8008700d, &(0x7f0000000280)) getsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000300)=0xffff, &(0x7f0000000140)=0x4) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) bind$ax25(r0, &(0x7f0000000340)={{0x3, @null}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x80000, 0x10064) r3 = openat$cgroup_procs(r2, &(0x7f0000000100)='cgroup.procs\x00', 0x2, 0x0) write$P9_RCLUNK(r1, &(0x7f00000001c0)={0x7, 0x79, 0x1}, 0x7) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.net/syz1\x00', 0x1ff) write$cgroup_pid(r3, &(0x7f0000000640), 0x12) 11:43:38 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, 0x0) 11:43:38 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x2c}}, 0x0) 11:43:38 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x200001000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) socket$nl_route(0x10, 0x3, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) gettid() tkill(0x0, 0x3b) socket$inet_tcp(0x2, 0x1, 0x0) write$FUSE_OPEN(0xffffffffffffffff, &(0x7f00000001c0)={0x20, 0x0, 0x1, {0x0, 0x6}}, 0x20) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000400)) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000300)='cgroup.procs\x00', 0x2, 0x0) connect$inet(r1, &(0x7f0000000280)={0x2, 0x0, @local}, 0x10) 11:43:38 executing program 1: perf_event_open(&(0x7f0000000440)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x220801, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r0, 0x800443d3, &(0x7f0000000580)={{0x3, 0x9, 0xffff, 0x7fffffff}, 0x100000000, 0x0, 0x9}) syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vcs\x00', 0x280200, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\xf6', 0x1ff) ioctl$RTC_EPOCH_READ(r1, 0x8008700d, &(0x7f0000000280)) getsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000300)=0xffff, &(0x7f0000000140)=0x4) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) bind$ax25(r0, &(0x7f0000000340)={{0x3, @null}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x80000, 0x10064) r3 = openat$cgroup_procs(r2, &(0x7f0000000100)='cgroup.procs\x00', 0x2, 0x0) write$P9_RCLUNK(r1, &(0x7f00000001c0)={0x7, 0x79, 0x1}, 0x7) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.net/syz1\x00', 0x1ff) write$cgroup_pid(r3, &(0x7f0000000640), 0x12) 11:43:38 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = gettid() tkill(r1, 0x3b) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000400)) 11:43:38 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x100000001e) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000100)={r2}) [ 402.710117] net_ratelimit: 20 callbacks suppressed [ 402.710121] protocol 88fb is buggy, dev hsr_slave_0 [ 402.720148] protocol 88fb is buggy, dev hsr_slave_1 [ 402.950117] protocol 88fb is buggy, dev hsr_slave_0 [ 402.955203] protocol 88fb is buggy, dev hsr_slave_1 [ 403.030163] protocol 88fb is buggy, dev hsr_slave_0 [ 403.035272] protocol 88fb is buggy, dev hsr_slave_1 [ 403.670138] protocol 88fb is buggy, dev hsr_slave_0 [ 403.675225] protocol 88fb is buggy, dev hsr_slave_1 [ 403.990102] protocol 88fb is buggy, dev hsr_slave_0 [ 403.995268] protocol 88fb is buggy, dev hsr_slave_1 11:43:41 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000000)="5500000019007f5300fe01b2a4a280930a60ffff00a84302910000003900090008000c00060000f3180015e005000600000000dc1320d5440700000000", 0x3d}], 0x1}, 0x0) r0 = socket(0x1000000010, 0x80002, 0x0) sendmmsg$alg(r0, 0x0, 0x0, 0x0) r1 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r1) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x38) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) 11:43:41 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x200001000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) socket$nl_route(0x10, 0x3, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = gettid() tkill(r1, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) write$FUSE_OPEN(0xffffffffffffffff, &(0x7f00000001c0)={0x20, 0x0, 0x1, {0x0, 0x6}}, 0x20) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000400)) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000300)='cgroup.procs\x00', 0x2, 0x0) connect$inet(r2, &(0x7f0000000280)={0x2, 0x0, @local}, 0x10) 11:43:41 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, 0x0) 11:43:41 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = gettid() tkill(r1, 0x3b) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000400)) 11:43:41 executing program 4: 11:43:41 executing program 1: perf_event_open(&(0x7f0000000440)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x220801, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r0, 0x800443d3, &(0x7f0000000580)={{0x3, 0x9, 0xffff, 0x7fffffff}, 0x100000000, 0x0, 0x9}) syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vcs\x00', 0x280200, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\xf6', 0x1ff) ioctl$RTC_EPOCH_READ(r1, 0x8008700d, &(0x7f0000000280)) getsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000300)=0xffff, &(0x7f0000000140)=0x4) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) bind$ax25(r0, &(0x7f0000000340)={{0x3, @null}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x80000, 0x10064) r3 = openat$cgroup_procs(r2, &(0x7f0000000100)='cgroup.procs\x00', 0x2, 0x0) write$P9_RCLUNK(r1, &(0x7f00000001c0)={0x7, 0x79, 0x1}, 0x7) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.net/syz1\x00', 0x1ff) write$cgroup_pid(r3, &(0x7f0000000640), 0x12) 11:43:41 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x200001000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) socket$nl_route(0x10, 0x3, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = gettid() tkill(r1, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) write$FUSE_OPEN(0xffffffffffffffff, &(0x7f00000001c0)={0x20, 0x0, 0x1, {0x0, 0x6}}, 0x20) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000400)) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000300)='cgroup.procs\x00', 0x2, 0x0) connect$inet(r2, &(0x7f0000000280)={0x2, 0x0, @local}, 0x10) 11:43:41 executing program 4: 11:43:41 executing program 5: setresuid(0xffffffffffffffff, 0xfffe, 0xffffffffffffffff) r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, 0x0) 11:43:41 executing program 4: 11:43:41 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) socket$nl_route(0x10, 0x3, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = gettid() tkill(r1, 0x3b) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000400)) 11:43:41 executing program 1: perf_event_open(&(0x7f0000000440)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x220801, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r0, 0x800443d3, &(0x7f0000000580)={{0x3, 0x9, 0xffff, 0x7fffffff}, 0x100000000, 0x0, 0x9}) syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vcs\x00', 0x280200, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\xf6', 0x1ff) ioctl$RTC_EPOCH_READ(r1, 0x8008700d, &(0x7f0000000280)) getsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000300)=0xffff, &(0x7f0000000140)=0x4) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) bind$ax25(r0, &(0x7f0000000340)={{0x3, @null, 0x5}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) mount$fuse(0x20000000, 0x0, 0x0, 0x7a00, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x80000, 0x10064) r3 = openat$cgroup_procs(r2, &(0x7f0000000100)='cgroup.procs\x00', 0x2, 0x0) write$P9_RCLUNK(r1, &(0x7f00000001c0)={0x7, 0x79, 0x1}, 0x7) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.net/syz1\x00', 0x1ff) write$cgroup_pid(r3, &(0x7f0000000640), 0x12) 11:43:44 executing program 5: setresuid(0xffffffffffffffff, 0xfffe, 0xffffffffffffffff) r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, 0x0) 11:43:44 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000000)="5500000019007f5300fe01b2a4a280930a60ffff00a84302910000003900090008000c00060000f3180015e005000600000000dc1320d5440700000000", 0x3d}], 0x1}, 0x0) r0 = socket(0x1000000010, 0x80002, 0x0) sendmmsg$alg(r0, 0x0, 0x0, 0x0) r1 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r1) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x38) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) 11:43:44 executing program 4: 11:43:44 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x200001000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) socket$nl_route(0x10, 0x3, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = gettid() tkill(r1, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) write$FUSE_OPEN(0xffffffffffffffff, &(0x7f00000001c0)={0x20, 0x0, 0x1, {0x0, 0x6}}, 0x20) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000400)) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000300)='cgroup.procs\x00', 0x2, 0x0) connect$inet(r2, &(0x7f0000000280)={0x2, 0x0, @local}, 0x10) 11:43:44 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000002c0)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000100000002402000020feffff7a0af0fff8ffffff69a4f0ff00000000b7060000000000000744000000000000b7040000100000206a0700fe00000000850000002f000000b70000000a00000095000000000000006458c2c62fc286000389d909a63796c113a80c19aab9d646ae8f51b6cdf0d3253730e711f5969f62c28b22756bedf3cf393d14c46cc4f79fd2b316da4f0de8163f6242fa7323f1740637c48468766af540439f0500f144631ac2f9842e1b346362dcae08c3d1a1fbe96dd87235b44174f7c0343185089ab5119e31975e551558055dc2dce53b95c132e78454c4813681e0688d3a127f7418c6226f4133346c2e6794d952f2bb7938a2c53a0ce68e"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) socket$nl_route(0x10, 0x3, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = gettid() tkill(r1, 0x3b) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000400)) 11:43:44 executing program 1: perf_event_open(&(0x7f0000000440)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x220801, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r0, 0x800443d3, &(0x7f0000000580)={{0x3, 0x9, 0xffff, 0x7fffffff}, 0x100000000, 0x0, 0x9}) syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vcs\x00', 0x280200, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\xf6', 0x1ff) ioctl$RTC_EPOCH_READ(r1, 0x8008700d, &(0x7f0000000280)) getsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000300)=0xffff, &(0x7f0000000140)=0x4) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) bind$ax25(r0, &(0x7f0000000340)={{0x3, @null, 0x5}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) mount$fuse(0x20000000, 0x0, 0x0, 0x7a00, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x80000, 0x10064) r3 = openat$cgroup_procs(r2, &(0x7f0000000100)='cgroup.procs\x00', 0x2, 0x0) write$P9_RCLUNK(r1, &(0x7f00000001c0)={0x7, 0x79, 0x1}, 0x7) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.net/syz1\x00', 0x1ff) write$cgroup_pid(r3, &(0x7f0000000640), 0x12) 11:43:44 executing program 4: 11:43:44 executing program 5: setresuid(0xffffffffffffffff, 0xfffe, 0xffffffffffffffff) r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, 0x0) 11:43:44 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x200001000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) socket$nl_route(0x10, 0x3, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = gettid() tkill(r1, 0x3b) socket$inet_tcp(0x2, 0x1, 0x0) write$FUSE_OPEN(0xffffffffffffffff, 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000400)) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000300)='cgroup.procs\x00', 0x2, 0x0) connect$inet(r2, &(0x7f0000000280)={0x2, 0x0, @local}, 0x10) 11:43:44 executing program 1: perf_event_open(&(0x7f0000000440)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x220801, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r0, 0x800443d3, &(0x7f0000000580)={{0x3, 0x9, 0xffff, 0x7fffffff}, 0x100000000, 0x0, 0x9}) syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vcs\x00', 0x280200, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\xf6', 0x1ff) ioctl$RTC_EPOCH_READ(r1, 0x8008700d, &(0x7f0000000280)) getsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000300)=0xffff, &(0x7f0000000140)=0x4) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) bind$ax25(r0, &(0x7f0000000340)={{0x3, @null, 0x5}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) mount$fuse(0x20000000, 0x0, 0x0, 0x7a00, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x80000, 0x10064) r3 = openat$cgroup_procs(r2, &(0x7f0000000100)='cgroup.procs\x00', 0x2, 0x0) write$P9_RCLUNK(r1, &(0x7f00000001c0)={0x7, 0x79, 0x1}, 0x7) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.net/syz1\x00', 0x1ff) write$cgroup_pid(r3, &(0x7f0000000640), 0x12) 11:43:44 executing program 4: 11:43:44 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000000)="11dca5055e0bcfe47bf070") socket$nl_route(0x10, 0x3, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = gettid() tkill(r1, 0x3b) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000400)) 11:43:45 executing program 5: setresuid(0xffffffffffffffff, 0xfffe, 0xffffffffffffffff) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000600)) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, 0x0) [ 407.830114] net_ratelimit: 20 callbacks suppressed [ 407.830118] protocol 88fb is buggy, dev hsr_slave_0 [ 407.840466] protocol 88fb is buggy, dev hsr_slave_1 [ 408.160141] protocol 88fb is buggy, dev hsr_slave_0 [ 408.165667] protocol 88fb is buggy, dev hsr_slave_1 [ 408.550134] protocol 88fb is buggy, dev hsr_slave_0 [ 408.555691] protocol 88fb is buggy, dev hsr_slave_1 [ 408.950207] protocol 88fb is buggy, dev hsr_slave_0 [ 408.955466] protocol 88fb is buggy, dev hsr_slave_1 [ 409.200130] protocol 88fb is buggy, dev hsr_slave_0 [ 409.205867] protocol 88fb is buggy, dev hsr_slave_1 11:43:47 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000000)="5500000019007f5300fe01b2a4a280930a60ffff00a84302910000003900090008000c00060000f3180015e005000600000000dc1320d5440700000000", 0x3d}], 0x1}, 0x0) r0 = socket(0x1000000010, 0x80002, 0x0) sendmmsg$alg(r0, 0x0, 0x0, 0x0) r1 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r1) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x38) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) 11:43:47 executing program 4: 11:43:47 executing program 1: perf_event_open(&(0x7f0000000440)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x220801, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r0, 0x800443d3, &(0x7f0000000580)={{0x3, 0x9, 0xffff, 0x7fffffff}, 0x100000000, 0x0, 0x9}) syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vcs\x00', 0x280200, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\xf6', 0x1ff) ioctl$RTC_EPOCH_READ(r1, 0x8008700d, &(0x7f0000000280)) getsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000300)=0xffff, &(0x7f0000000140)=0x4) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) bind$ax25(r0, &(0x7f0000000340)={{0x3, @null, 0x5}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x80000, 0x10064) r3 = openat$cgroup_procs(r2, &(0x7f0000000100)='cgroup.procs\x00', 0x2, 0x0) write$P9_RCLUNK(r1, &(0x7f00000001c0)={0x7, 0x79, 0x1}, 0x7) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.net/syz1\x00', 0x1ff) write$cgroup_pid(r3, &(0x7f0000000640), 0x12) 11:43:47 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x200001000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) socket$nl_route(0x10, 0x3, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = gettid() tkill(r1, 0x3b) socket$inet_tcp(0x2, 0x1, 0x0) write$FUSE_OPEN(0xffffffffffffffff, 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000400)) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000300)='cgroup.procs\x00', 0x2, 0x0) connect$inet(r2, &(0x7f0000000280)={0x2, 0x0, @local}, 0x10) 11:43:47 executing program 5: setresuid(0xffffffffffffffff, 0xfffe, 0xffffffffffffffff) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000600)) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, 0x0) 11:43:47 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000000)="11dca5055e0bcfe47bf070") socket$nl_route(0x10, 0x3, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = gettid() tkill(r1, 0x3b) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000400)) 11:43:47 executing program 4: 11:43:47 executing program 5: setresuid(0xffffffffffffffff, 0xfffe, 0xffffffffffffffff) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000600)) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, 0x0) 11:43:47 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000000)="11dca5055e0bcfe47bf070") socket$nl_route(0x10, 0x3, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = gettid() tkill(r1, 0x3b) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000400)) 11:43:48 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x200001000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) socket$nl_route(0x10, 0x3, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = gettid() tkill(r1, 0x3b) socket$inet_tcp(0x2, 0x1, 0x0) write$FUSE_OPEN(0xffffffffffffffff, 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000400)) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000300)='cgroup.procs\x00', 0x2, 0x0) connect$inet(r2, &(0x7f0000000280)={0x2, 0x0, @local}, 0x10) 11:43:48 executing program 4: 11:43:48 executing program 1: perf_event_open(&(0x7f0000000440)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x220801, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r0, 0x800443d3, &(0x7f0000000580)={{0x3, 0x9, 0xffff, 0x7fffffff}, 0x100000000, 0x0, 0x9}) syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vcs\x00', 0x280200, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\xf6', 0x1ff) ioctl$RTC_EPOCH_READ(r1, 0x8008700d, &(0x7f0000000280)) getsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000300)=0xffff, &(0x7f0000000140)=0x4) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) bind$ax25(r0, &(0x7f0000000340)={{0x3, @null, 0x5}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x80000, 0x10064) r3 = openat$cgroup_procs(r2, &(0x7f0000000100)='cgroup.procs\x00', 0x2, 0x0) write$P9_RCLUNK(r1, &(0x7f00000001c0)={0x7, 0x79, 0x1}, 0x7) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.net/syz1\x00', 0x1ff) write$cgroup_pid(r3, &(0x7f0000000640), 0x12) [ 413.110178] net_ratelimit: 20 callbacks suppressed [ 413.110182] protocol 88fb is buggy, dev hsr_slave_0 [ 413.120580] protocol 88fb is buggy, dev hsr_slave_1 [ 413.360131] protocol 88fb is buggy, dev hsr_slave_0 [ 413.365671] protocol 88fb is buggy, dev hsr_slave_1 [ 413.440145] protocol 88fb is buggy, dev hsr_slave_0 [ 413.445683] protocol 88fb is buggy, dev hsr_slave_1 11:43:50 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000000)="5500000019007f5300fe01b2a4a280930a60ffff00a84302910000003900090008000c00060000f3180015e005000600000000dc1320d5440700000000", 0x3d}], 0x1}, 0x0) r0 = socket(0x1000000010, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f00000000c0), 0x492492492492191, 0x0) getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, 0x0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x38) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 11:43:50 executing program 5: setresuid(0xffffffffffffffff, 0xfffe, 0xffffffffffffffff) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, 0x0) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, 0x0) 11:43:50 executing program 4: 11:43:50 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x200001000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) socket$nl_route(0x10, 0x3, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = gettid() tkill(r1, 0x3b) socket$inet_tcp(0x2, 0x1, 0x0) write$FUSE_OPEN(0xffffffffffffffff, 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000300)='cgroup.procs\x00', 0x2, 0x0) connect$inet(r2, &(0x7f0000000280)={0x2, 0x0, @local}, 0x10) 11:43:50 executing program 1: perf_event_open(&(0x7f0000000440)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x220801, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r0, 0x800443d3, &(0x7f0000000580)={{0x3, 0x9, 0xffff, 0x7fffffff}, 0x100000000, 0x0, 0x9}) syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vcs\x00', 0x280200, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\xf6', 0x1ff) ioctl$RTC_EPOCH_READ(r1, 0x8008700d, &(0x7f0000000280)) getsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000300)=0xffff, &(0x7f0000000140)=0x4) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) bind$ax25(r0, &(0x7f0000000340)={{0x3, @null, 0x5}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x80000, 0x10064) r3 = openat$cgroup_procs(r2, &(0x7f0000000100)='cgroup.procs\x00', 0x2, 0x0) write$P9_RCLUNK(r1, &(0x7f00000001c0)={0x7, 0x79, 0x1}, 0x7) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.net/syz1\x00', 0x1ff) write$cgroup_pid(r3, &(0x7f0000000640), 0x12) 11:43:50 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) socket$nl_route(0x10, 0x3, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r0 = gettid() tkill(r0, 0x3b) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000400)) 11:43:50 executing program 4: 11:43:51 executing program 5: setresuid(0xffffffffffffffff, 0xfffe, 0xffffffffffffffff) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, 0x0) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, 0x0) 11:43:51 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) socket$nl_route(0x10, 0x3, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r0 = gettid() tkill(r0, 0x3b) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000400)) 11:43:51 executing program 4: 11:43:51 executing program 1: perf_event_open(&(0x7f0000000440)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x220801, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r0, 0x800443d3, &(0x7f0000000580)={{0x3, 0x9, 0xffff, 0x7fffffff}, 0x100000000, 0x0, 0x9}) syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vcs\x00', 0x280200, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\xf6', 0x1ff) ioctl$RTC_EPOCH_READ(r1, 0x8008700d, &(0x7f0000000280)) getsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000300)=0xffff, &(0x7f0000000140)=0x4) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) bind$ax25(r0, &(0x7f0000000340)={{0x3, @null, 0x5}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r2 = open(0x0, 0x80000, 0x10064) r3 = openat$cgroup_procs(r2, &(0x7f0000000100)='cgroup.procs\x00', 0x2, 0x0) write$P9_RCLUNK(r1, &(0x7f00000001c0)={0x7, 0x79, 0x1}, 0x7) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.net/syz1\x00', 0x1ff) write$cgroup_pid(r3, &(0x7f0000000640), 0x12) 11:43:51 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x200001000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) socket$nl_route(0x10, 0x3, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = gettid() tkill(r1, 0x3b) socket$inet_tcp(0x2, 0x1, 0x0) write$FUSE_OPEN(0xffffffffffffffff, 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000300)='cgroup.procs\x00', 0x2, 0x0) connect$inet(r2, &(0x7f0000000280)={0x2, 0x0, @local}, 0x10) 11:43:51 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000000)="5500000019007f5300fe01b2a4a280930a60ffff00a84302910000003900090008000c00060000f3180015e005000600000000dc1320d5440700000000", 0x3d}], 0x1}, 0x0) r0 = socket(0x1000000010, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f00000000c0), 0x492492492492191, 0x0) getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, 0x0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x38) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) [ 413.813035] ptrace attach of "/root/syz-executor.3"[13517] was attempted by "/root/syz-executor.3"[13520] 11:43:51 executing program 5: setresuid(0xffffffffffffffff, 0xfffe, 0xffffffffffffffff) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, 0x0) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, 0x0) 11:43:51 executing program 4: 11:43:51 executing program 1: perf_event_open(&(0x7f0000000440)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x220801, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r0, 0x800443d3, &(0x7f0000000580)={{0x3, 0x9, 0xffff, 0x7fffffff}, 0x100000000, 0x0, 0x9}) syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vcs\x00', 0x280200, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\xf6', 0x1ff) ioctl$RTC_EPOCH_READ(r1, 0x8008700d, &(0x7f0000000280)) getsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000300)=0xffff, &(0x7f0000000140)=0x4) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) bind$ax25(r0, &(0x7f0000000340)={{0x3, @null, 0x5}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r2 = open(0x0, 0x80000, 0x10064) r3 = openat$cgroup_procs(r2, &(0x7f0000000100)='cgroup.procs\x00', 0x2, 0x0) write$P9_RCLUNK(r1, &(0x7f00000001c0)={0x7, 0x79, 0x1}, 0x7) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.net/syz1\x00', 0x1ff) write$cgroup_pid(r3, &(0x7f0000000640), 0x12) 11:43:51 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) socket$nl_route(0x10, 0x3, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r0 = gettid() tkill(r0, 0x3b) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000400)) 11:43:51 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000000)="5500000019007f5300fe01b2a4a280930a60ffff00a84302910000003900090008000c00060000f3180015e005000600000000dc1320d5440700000000", 0x3d}], 0x1}, 0x0) r0 = socket(0x1000000010, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f00000000c0), 0x492492492492191, 0x0) getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, 0x0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x38) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 11:43:51 executing program 4: [ 414.057616] ptrace attach of "/root/syz-executor.3"[13544] was attempted by "/root/syz-executor.3"[13547] [ 414.070121] protocol 88fb is buggy, dev hsr_slave_0 [ 414.075441] protocol 88fb is buggy, dev hsr_slave_1 11:43:51 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x200001000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) socket$nl_route(0x10, 0x3, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = gettid() tkill(r1, 0x3b) socket$inet_tcp(0x2, 0x1, 0x0) write$FUSE_OPEN(0xffffffffffffffff, 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) connect$inet(r2, &(0x7f0000000280)={0x2, 0x0, @local}, 0x10) 11:43:51 executing program 5: setresuid(0xffffffffffffffff, 0xfffe, 0xffffffffffffffff) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r1 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TCSETSF(r1, 0x5412, 0x0) 11:43:51 executing program 4: [ 414.257298] ptrace attach of "/root/syz-executor.3"[13565] was attempted by "/root/syz-executor.3"[13566] 11:43:51 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000000)="5500000019007f5300fe01b2a4a280930a60ffff00a84302910000003900090008000c00060000f3180015e005000600000000dc1320d5440700000000", 0x3d}], 0x1}, 0x0) r0 = socket(0x1000000010, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f00000000c0), 0x492492492492191, 0x0) r1 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r1) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x38) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) 11:43:51 executing program 4: 11:43:51 executing program 5: setresuid(0xffffffffffffffff, 0xfffe, 0xffffffffffffffff) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r1 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TCSETSF(r1, 0x5412, 0x0) 11:43:51 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) socket$nl_route(0x10, 0x3, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r0 = gettid() tkill(r0, 0x3b) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000400)) 11:43:51 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x200001000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) socket$nl_route(0x10, 0x3, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = gettid() tkill(r1, 0x3b) socket$inet_tcp(0x2, 0x1, 0x0) write$FUSE_OPEN(0xffffffffffffffff, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000280)={0x2, 0x0, @local}, 0x10) [ 414.390150] protocol 88fb is buggy, dev hsr_slave_0 [ 414.395487] protocol 88fb is buggy, dev hsr_slave_1 11:43:51 executing program 1: perf_event_open(&(0x7f0000000440)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x220801, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r0, 0x800443d3, &(0x7f0000000580)={{0x3, 0x9, 0xffff, 0x7fffffff}, 0x100000000, 0x0, 0x9}) syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vcs\x00', 0x280200, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\xf6', 0x1ff) ioctl$RTC_EPOCH_READ(r1, 0x8008700d, &(0x7f0000000280)) getsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000300)=0xffff, &(0x7f0000000140)=0x4) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) bind$ax25(r0, &(0x7f0000000340)={{0x3, @null, 0x5}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r2 = open(0x0, 0x80000, 0x10064) r3 = openat$cgroup_procs(r2, &(0x7f0000000100)='cgroup.procs\x00', 0x2, 0x0) write$P9_RCLUNK(r1, &(0x7f00000001c0)={0x7, 0x79, 0x1}, 0x7) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.net/syz1\x00', 0x1ff) write$cgroup_pid(r3, &(0x7f0000000640), 0x12) 11:43:51 executing program 4: 11:43:51 executing program 5: setresuid(0xffffffffffffffff, 0xfffe, 0xffffffffffffffff) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r1 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TCSETSF(r1, 0x5412, 0x0) 11:43:51 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) socket$nl_route(0x10, 0x3, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r0 = gettid() tkill(r0, 0x3b) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000400)) 11:43:51 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000000)="5500000019007f5300fe01b2a4a280930a60ffff00a84302910000003900090008000c00060000f3180015e005000600000000dc1320d5440700000000", 0x3d}], 0x1}, 0x0) r0 = socket(0x1000000010, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f00000000c0), 0x492492492492191, 0x0) r1 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r1) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x38) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) 11:43:51 executing program 4: 11:43:51 executing program 1: perf_event_open(&(0x7f0000000440)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x220801, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r0, 0x800443d3, &(0x7f0000000580)={{0x3, 0x9, 0xffff, 0x7fffffff}, 0x100000000, 0x0, 0x9}) syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vcs\x00', 0x280200, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\xf6', 0x1ff) ioctl$RTC_EPOCH_READ(r1, 0x8008700d, &(0x7f0000000280)) getsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000300)=0xffff, &(0x7f0000000140)=0x4) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) bind$ax25(r0, &(0x7f0000000340)={{0x3, @null, 0x5}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x10064) r3 = openat$cgroup_procs(r2, &(0x7f0000000100)='cgroup.procs\x00', 0x2, 0x0) write$P9_RCLUNK(r1, &(0x7f00000001c0)={0x7, 0x79, 0x1}, 0x7) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.net/syz1\x00', 0x1ff) write$cgroup_pid(r3, &(0x7f0000000640), 0x12) 11:43:51 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x200001000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) socket$nl_route(0x10, 0x3, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = gettid() tkill(r1, 0x3b) socket$inet_tcp(0x2, 0x1, 0x0) write$FUSE_OPEN(0xffffffffffffffff, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) 11:43:51 executing program 4: 11:43:52 executing program 5: setresuid(0xffffffffffffffff, 0xfffe, 0xffffffffffffffff) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) syz_open_pts(r0, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5412, 0x0) 11:43:52 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000000)="5500000019007f5300fe01b2a4a280930a60ffff00a84302910000003900090008000c00060000f3180015e005000600000000dc1320d5440700000000", 0x3d}], 0x1}, 0x0) r0 = socket(0x1000000010, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f00000000c0), 0x492492492492191, 0x0) r1 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r1) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x38) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) 11:43:52 executing program 4: 11:43:52 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) socket$nl_route(0x10, 0x3, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r0 = gettid() tkill(r0, 0x3b) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000400)) 11:43:52 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x200001000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) socket$nl_route(0x10, 0x3, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = gettid() tkill(r1, 0x3b) socket$inet_tcp(0x2, 0x1, 0x0) write$FUSE_OPEN(0xffffffffffffffff, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) 11:43:52 executing program 4: 11:43:52 executing program 5: setresuid(0xffffffffffffffff, 0xfffe, 0xffffffffffffffff) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) syz_open_pts(r0, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5412, 0x0) 11:43:52 executing program 1: perf_event_open(&(0x7f0000000440)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x220801, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r0, 0x800443d3, &(0x7f0000000580)={{0x3, 0x9, 0xffff, 0x7fffffff}, 0x100000000, 0x0, 0x9}) syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vcs\x00', 0x280200, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\xf6', 0x1ff) ioctl$RTC_EPOCH_READ(r1, 0x8008700d, &(0x7f0000000280)) getsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000300)=0xffff, &(0x7f0000000140)=0x4) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) bind$ax25(r0, &(0x7f0000000340)={{0x3, @null, 0x5}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x10064) r3 = openat$cgroup_procs(r2, &(0x7f0000000100)='cgroup.procs\x00', 0x2, 0x0) write$P9_RCLUNK(r1, &(0x7f00000001c0)={0x7, 0x79, 0x1}, 0x7) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.net/syz1\x00', 0x1ff) write$cgroup_pid(r3, &(0x7f0000000640), 0x12) 11:43:52 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000000)="5500000019007f5300fe01b2a4a280930a60ffff00a84302910000003900090008000c00060000f3180015e005000600000000dc1320d5440700000000", 0x3d}], 0x1}, 0x0) r0 = socket(0x1000000010, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f00000000c0), 0x492492492492191, 0x0) r1 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r1) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x38) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) 11:43:52 executing program 4: 11:43:52 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) bpf$PROG_LOAD(0x5, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r0 = gettid() tkill(r0, 0x3b) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000400)) 11:43:52 executing program 5: setresuid(0xffffffffffffffff, 0xfffe, 0xffffffffffffffff) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) syz_open_pts(r0, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5412, 0x0) 11:43:52 executing program 4: 11:43:52 executing program 0: 11:43:52 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000000)="5500000019007f5300fe01b2a4a280930a60ffff00a84302910000003900090008000c00060000f3180015e005000600000000dc1320d5440700000000", 0x3d}], 0x1}, 0x0) r0 = socket(0x1000000010, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f00000000c0), 0x492492492492191, 0x0) r1 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r1) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x38) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) 11:43:52 executing program 4: 11:43:52 executing program 0: 11:43:52 executing program 5: 11:43:52 executing program 1: perf_event_open(&(0x7f0000000440)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x220801, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r0, 0x800443d3, &(0x7f0000000580)={{0x3, 0x9, 0xffff, 0x7fffffff}, 0x100000000, 0x0, 0x9}) syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vcs\x00', 0x280200, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\xf6', 0x1ff) ioctl$RTC_EPOCH_READ(r1, 0x8008700d, &(0x7f0000000280)) getsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000300)=0xffff, &(0x7f0000000140)=0x4) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) bind$ax25(r0, &(0x7f0000000340)={{0x3, @null, 0x5}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x10064) r3 = openat$cgroup_procs(r2, &(0x7f0000000100)='cgroup.procs\x00', 0x2, 0x0) write$P9_RCLUNK(r1, &(0x7f00000001c0)={0x7, 0x79, 0x1}, 0x7) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.net/syz1\x00', 0x1ff) write$cgroup_pid(r3, &(0x7f0000000640), 0x12) 11:43:52 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000000)="5500000019007f5300fe01b2a4a280930a60ffff00a84302910000003900090008000c00060000f3180015e005000600000000dc1320d5440700000000", 0x3d}], 0x1}, 0x0) r0 = socket(0x1000000010, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f00000000c0), 0x492492492492191, 0x0) r1 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r1) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x38) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) 11:43:52 executing program 4: 11:43:52 executing program 0: 11:43:52 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) bpf$PROG_LOAD(0x5, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r0 = gettid() tkill(r0, 0x3b) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000400)) 11:43:52 executing program 5: 11:43:52 executing program 0: 11:43:52 executing program 4: 11:43:52 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000000)="5500000019007f5300fe01b2a4a280930a60ffff00a84302910000003900090008000c00060000f3180015e005000600000000dc1320d5440700000000", 0x3d}], 0x1}, 0x0) r0 = socket(0x1000000010, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f00000000c0), 0x492492492492191, 0x0) r1 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r1) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0xffffffffffffffff, r2, 0x0, 0x0) tkill(r2, 0x38) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) 11:43:52 executing program 5: 11:43:52 executing program 0: 11:43:52 executing program 1: perf_event_open(&(0x7f0000000440)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x220801, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r0, 0x800443d3, &(0x7f0000000580)={{0x3, 0x9, 0xffff, 0x7fffffff}, 0x100000000, 0x0, 0x9}) syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vcs\x00', 0x280200, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\xf6', 0x1ff) ioctl$RTC_EPOCH_READ(r1, 0x8008700d, &(0x7f0000000280)) getsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000300)=0xffff, &(0x7f0000000140)=0x4) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) bind$ax25(r0, &(0x7f0000000340)={{0x3, @null, 0x5}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x80000, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000000100)='cgroup.procs\x00', 0x2, 0x0) write$P9_RCLUNK(r1, &(0x7f00000001c0)={0x7, 0x79, 0x1}, 0x7) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.net/syz1\x00', 0x1ff) write$cgroup_pid(r3, &(0x7f0000000640), 0x12) 11:43:52 executing program 4: 11:43:52 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000000)="5500000019007f5300fe01b2a4a280930a60ffff00a84302910000003900090008000c00060000f3180015e005000600000000dc1320d5440700000000", 0x3d}], 0x1}, 0x0) r0 = socket(0x1000000010, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f00000000c0), 0x492492492492191, 0x0) r1 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r1) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0xffffffffffffffff, r2, 0x0, 0x0) tkill(r2, 0x38) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) 11:43:52 executing program 0: 11:43:52 executing program 5: 11:43:53 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000000)="5500000019007f5300fe01b2a4a280930a60ffff00a84302910000003900090008000c00060000f3180015e005000600000000dc1320d5440700000000", 0x3d}], 0x1}, 0x0) r0 = socket(0x1000000010, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f00000000c0), 0x492492492492191, 0x0) r1 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r1) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0xffffffffffffffff, r2, 0x0, 0x0) tkill(r2, 0x38) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) 11:43:53 executing program 4: 11:43:53 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) bpf$PROG_LOAD(0x5, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r0 = gettid() tkill(r0, 0x3b) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000400)) 11:43:53 executing program 5: 11:43:53 executing program 0: 11:43:53 executing program 1: perf_event_open(&(0x7f0000000440)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x220801, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r0, 0x800443d3, &(0x7f0000000580)={{0x3, 0x9, 0xffff, 0x7fffffff}, 0x100000000, 0x0, 0x9}) syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vcs\x00', 0x280200, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\xf6', 0x1ff) ioctl$RTC_EPOCH_READ(r1, 0x8008700d, &(0x7f0000000280)) getsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000300)=0xffff, &(0x7f0000000140)=0x4) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) bind$ax25(r0, &(0x7f0000000340)={{0x3, @null, 0x5}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x80000, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000000100)='cgroup.procs\x00', 0x2, 0x0) write$P9_RCLUNK(r1, &(0x7f00000001c0)={0x7, 0x79, 0x1}, 0x7) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.net/syz1\x00', 0x1ff) write$cgroup_pid(r3, &(0x7f0000000640), 0x12) 11:43:53 executing program 0: 11:43:53 executing program 5: 11:43:53 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000000)="5500000019007f5300fe01b2a4a280930a60ffff00a84302910000003900090008000c00060000f3180015e005000600000000dc1320d5440700000000", 0x3d}], 0x1}, 0x0) r0 = socket(0x1000000010, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f00000000c0), 0x492492492492191, 0x0) r1 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r1) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(r2, 0x38) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) 11:43:53 executing program 4: 11:43:53 executing program 5: 11:43:53 executing program 4: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x0, 0x0) creat(&(0x7f00000001c0)='./file0/bus\x00', 0x0) stat(&(0x7f0000002680)='./file0/bus\x00', &(0x7f00000026c0)) 11:43:53 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000000)="5500000019007f5300fe01b2a4a280930a60ffff00a84302910000003900090008000c00060000f3180015e005000600000000dc1320d5440700000000", 0x3d}], 0x1}, 0x0) r0 = socket(0x1000000010, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f00000000c0), 0x492492492492191, 0x0) r1 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r1) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(r2, 0x38) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) 11:43:53 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) bpf$PROG_LOAD(0x5, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r0 = gettid() tkill(r0, 0x3b) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000400)) 11:43:53 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x1) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000300)={@remote, 0x800, 0x0, 0xff, 0x1}, 0x20) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f00000005c0)=0x6, 0x4) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x380000, @loopback}, 0x1c) sendmmsg$alg(r0, &(0x7f0000002500)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[@assoc={0x18}], 0x18}], 0x49249e4, 0x0) 11:43:53 executing program 1: perf_event_open(&(0x7f0000000440)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x220801, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r0, 0x800443d3, &(0x7f0000000580)={{0x3, 0x9, 0xffff, 0x7fffffff}, 0x100000000, 0x0, 0x9}) syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vcs\x00', 0x280200, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\xf6', 0x1ff) ioctl$RTC_EPOCH_READ(r1, 0x8008700d, &(0x7f0000000280)) getsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000300)=0xffff, &(0x7f0000000140)=0x4) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) bind$ax25(r0, &(0x7f0000000340)={{0x3, @null, 0x5}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x80000, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000000100)='cgroup.procs\x00', 0x2, 0x0) write$P9_RCLUNK(r1, &(0x7f00000001c0)={0x7, 0x79, 0x1}, 0x7) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.net/syz1\x00', 0x1ff) write$cgroup_pid(r3, &(0x7f0000000640), 0x12) 11:43:53 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000000)="5500000019007f5300fe01b2a4a280930a60ffff00a84302910000003900090008000c00060000f3180015e005000600000000dc1320d5440700000000", 0x3d}], 0x1}, 0x0) r0 = socket(0x1000000010, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f00000000c0), 0x492492492492191, 0x0) r1 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r1) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(r2, 0x38) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) 11:43:53 executing program 5: r0 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000240)={0x0, 0x9, 0x1, {0xb, @sdr={0x0, 0x1}}}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000440)={0x0, 0x1ff, 0x1, {0xb, @raw_data="b57ec6e2ccfebc2f19650bb2b17372c05fea81c70a61a58b97c5bffa8f3ff22ef5e44f8d5bcd9a7e6ad039656c778e3defde487514c27a53e5ab19e7d988086662bc7d2936c0ce17f57929fe03c491a499d671387a8c4a9d52f2fa0f12b0c8a6fbac0bf52fe8075949b6f554aad4d9906746094746213d701bdbfdddfab15780f0ff892ac680cdf8d58b6eec86af9447e96b23570e54caa7549caa341c121bd9f0d43abff4054dc2ade5aa89ec0521282cbd701f60913b7986f0199bcfb06c4d3b1bf98e836e40ac"}}) 11:43:53 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_emit_ethernet(0x46, &(0x7f00000000c0)=ANY=[@ANYBLOB="aaaaaaaaaaaaa085c20e2afb2f2adc866d466ec7317fa13dc727a508004a0000480000000000009078ac1414bbac1e00004410000000000000e000000100000000890300"/86], 0x0) 11:43:53 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000000)="5500000019007f5300fe01b2a4a280930a60ffff00a84302910000003900090008000c00060000f3180015e005000600000000dc1320d5440700000000", 0x3d}], 0x1}, 0x0) r0 = socket(0x1000000010, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f00000000c0), 0x492492492492191, 0x0) r1 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r1) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(0x0, 0x38) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) 11:43:53 executing program 1: perf_event_open(&(0x7f0000000440)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x220801, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r0, 0x800443d3, &(0x7f0000000580)={{0x3, 0x9, 0xffff, 0x7fffffff}, 0x100000000, 0x0, 0x9}) syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vcs\x00', 0x280200, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\xf6', 0x1ff) ioctl$RTC_EPOCH_READ(r1, 0x8008700d, &(0x7f0000000280)) getsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000300)=0xffff, &(0x7f0000000140)=0x4) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) bind$ax25(r0, &(0x7f0000000340)={{0x3, @null, 0x5}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) open(&(0x7f0000000200)='./file0\x00', 0x80000, 0x10064) r2 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000100)='cgroup.procs\x00', 0x2, 0x0) write$P9_RCLUNK(r1, &(0x7f00000001c0)={0x7, 0x79, 0x1}, 0x7) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.net/syz1\x00', 0x1ff) write$cgroup_pid(r2, &(0x7f0000000640), 0x12) 11:43:53 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_SREGS(r2, 0x4138ae84, &(0x7f0000000300)={{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, 0xfffffffffffffffa, 0x0, 0x0, 0x100a0, 0x0, 0x2d01}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_GET_TSC_KHZ(r2, 0xaea3) 11:43:53 executing program 5: r0 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000240)={0x0, 0x9, 0x1, {0xb, @sdr={0x0, 0x1}}}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000440)={0x0, 0x1ff, 0x1, {0xb, @raw_data="b57ec6e2ccfebc2f19650bb2b17372c05fea81c70a61a58b97c5bffa8f3ff22ef5e44f8d5bcd9a7e6ad039656c778e3defde487514c27a53e5ab19e7d988086662bc7d2936c0ce17f57929fe03c491a499d671387a8c4a9d52f2fa0f12b0c8a6fbac0bf52fe8075949b6f554aad4d9906746094746213d701bdbfdddfab15780f0ff892ac680cdf8d58b6eec86af9447e96b23570e54caa7549caa341c121bd9f0d43abff4054dc2ade5aa89ec0521282cbd701f60913b7986f0199bcfb06c4d3b1bf98e836e40ac"}}) 11:43:53 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) bpf$PROG_LOAD(0x5, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r0 = gettid() tkill(r0, 0x3b) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000400)) 11:43:53 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000000)="5500000019007f5300fe01b2a4a280930a60ffff00a84302910000003900090008000c00060000f3180015e005000600000000dc1320d5440700000000", 0x3d}], 0x1}, 0x0) r0 = socket(0x1000000010, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f00000000c0), 0x492492492492191, 0x0) r1 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r1) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(0x0, 0x38) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) 11:43:53 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) bpf$PROG_LOAD(0x5, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r0 = gettid() tkill(r0, 0x3b) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000400)) [ 416.590515] *** Guest State *** [ 416.607823] CR0: actual=0xffffffff9ffffffa, shadow=0xfffffffffffffffa, gh_mask=fffffffffffffff7 [ 416.669464] CR4: actual=0x00000000000120e0, shadow=0x00000000000100a0, gh_mask=ffffffffffffe871 [ 416.688747] CR3 = 0x0000000000000000 [ 416.692926] RSP = 0x0000000000000000 RIP = 0x000000000000fff0 [ 416.708425] RFLAGS=0x00000002 DR7 = 0x0000000000000400 [ 416.725220] Sysenter RSP=0000000000000000 CS:RIP=0000:0000000000000000 [ 416.738938] CS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 416.753794] DS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 416.764276] SS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 11:43:54 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) bpf$PROG_LOAD(0x5, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r0 = gettid() tkill(r0, 0x3b) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000400)) 11:43:54 executing program 1: perf_event_open(&(0x7f0000000440)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x220801, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r0, 0x800443d3, &(0x7f0000000580)={{0x3, 0x9, 0xffff, 0x7fffffff}, 0x100000000, 0x0, 0x9}) syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vcs\x00', 0x280200, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\xf6', 0x1ff) ioctl$RTC_EPOCH_READ(r1, 0x8008700d, &(0x7f0000000280)) getsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000300)=0xffff, &(0x7f0000000140)=0x4) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) bind$ax25(r0, &(0x7f0000000340)={{0x3, @null, 0x5}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) open(&(0x7f0000000200)='./file0\x00', 0x80000, 0x10064) r2 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000100)='cgroup.procs\x00', 0x2, 0x0) write$P9_RCLUNK(r1, &(0x7f00000001c0)={0x7, 0x79, 0x1}, 0x7) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.net/syz1\x00', 0x1ff) write$cgroup_pid(r2, &(0x7f0000000640), 0x12) 11:43:54 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) bpf$PROG_LOAD(0x5, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r0 = gettid() tkill(r0, 0x3b) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000400)) 11:43:54 executing program 5: r0 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000240)={0x0, 0x9, 0x1, {0xb, @sdr={0x0, 0x1}}}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000440)={0x0, 0x1ff, 0x1, {0xb, @raw_data="b57ec6e2ccfebc2f19650bb2b17372c05fea81c70a61a58b97c5bffa8f3ff22ef5e44f8d5bcd9a7e6ad039656c778e3defde487514c27a53e5ab19e7d988086662bc7d2936c0ce17f57929fe03c491a499d671387a8c4a9d52f2fa0f12b0c8a6fbac0bf52fe8075949b6f554aad4d9906746094746213d701bdbfdddfab15780f0ff892ac680cdf8d58b6eec86af9447e96b23570e54caa7549caa341c121bd9f0d43abff4054dc2ade5aa89ec0521282cbd701f60913b7986f0199bcfb06c4d3b1bf98e836e40ac"}}) 11:43:54 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) bpf$PROG_LOAD(0x5, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r0 = gettid() tkill(r0, 0x3b) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000400)) [ 416.774768] ES: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 416.785450] FS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 416.795667] GS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 11:43:54 executing program 5: r0 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000240)={0x0, 0x9, 0x1, {0xb, @sdr={0x0, 0x1}}}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000440)={0x0, 0x1ff, 0x1, {0xb, @raw_data="b57ec6e2ccfebc2f19650bb2b17372c05fea81c70a61a58b97c5bffa8f3ff22ef5e44f8d5bcd9a7e6ad039656c778e3defde487514c27a53e5ab19e7d988086662bc7d2936c0ce17f57929fe03c491a499d671387a8c4a9d52f2fa0f12b0c8a6fbac0bf52fe8075949b6f554aad4d9906746094746213d701bdbfdddfab15780f0ff892ac680cdf8d58b6eec86af9447e96b23570e54caa7549caa341c121bd9f0d43abff4054dc2ade5aa89ec0521282cbd701f60913b7986f0199bcfb06c4d3b1bf98e836e40ac"}}) [ 416.844530] GDTR: limit=0x00000000, base=0x0000000000000000 [ 416.858868] LDTR: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 416.882927] IDTR: limit=0x00000000, base=0x0000000000000000 [ 416.905282] TR: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 416.923990] EFER = 0x0000000000002d01 PAT = 0x0007040600070406 [ 416.935700] DebugCtl = 0x0000000000000000 DebugExceptions = 0x0000000000000000 [ 416.946699] Interruptibility = 00000000 ActivityState = 00000000 11:43:54 executing program 1: perf_event_open(&(0x7f0000000440)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x220801, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r0, 0x800443d3, &(0x7f0000000580)={{0x3, 0x9, 0xffff, 0x7fffffff}, 0x100000000, 0x0, 0x9}) syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vcs\x00', 0x280200, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\xf6', 0x1ff) ioctl$RTC_EPOCH_READ(r1, 0x8008700d, &(0x7f0000000280)) getsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000300)=0xffff, &(0x7f0000000140)=0x4) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) bind$ax25(r0, &(0x7f0000000340)={{0x3, @null, 0x5}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) open(&(0x7f0000000200)='./file0\x00', 0x80000, 0x10064) r2 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000100)='cgroup.procs\x00', 0x2, 0x0) write$P9_RCLUNK(r1, &(0x7f00000001c0)={0x7, 0x79, 0x1}, 0x7) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.net/syz1\x00', 0x1ff) write$cgroup_pid(r2, &(0x7f0000000640), 0x12) [ 416.958588] *** Host State *** [ 416.966459] RIP = 0xffffffff81174900 RSP = 0xffff888054a47998 [ 416.996101] CS=0010 SS=0018 DS=0000 ES=0000 FS=0000 GS=0000 TR=0040 [ 417.025860] FSBase=00007f60ea58e700 GSBase=ffff8880aee00000 TRBase=fffffe0000034000 [ 417.039538] GDTBase=fffffe0000032000 IDTBase=fffffe0000000000 [ 417.088330] CR0=0000000080050033 CR3=00000000a0116000 CR4=00000000001426f0 [ 417.102866] Sysenter RSP=fffffe0000033200 CS:RIP=0010:ffffffff862018e0 [ 417.121721] EFER = 0x0000000000000d01 PAT = 0x0407050600070106 [ 417.132357] *** Control State *** [ 417.135921] PinBased=0000003f CPUBased=b6986dfa SecondaryExec=000000e2 [ 417.145241] EntryControls=0000d3ff ExitControls=002fefff [ 417.152951] ExceptionBitmap=00060042 PFECmask=00000000 PFECmatch=00000000 [ 417.159992] VMEntry: intr_info=00000000 errcode=00000000 ilen=00000000 [ 417.168907] VMExit: intr_info=00000000 errcode=00000000 ilen=00000000 11:43:54 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) bpf$PROG_LOAD(0x5, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r0 = gettid() tkill(r0, 0x3b) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000400)) 11:43:54 executing program 5: r0 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000240)={0x0, 0x9, 0x1, {0xb, @sdr={0x0, 0x1}}}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000440)={0x0, 0x1ff, 0x1, {0xb, @raw_data="b57ec6e2ccfebc2f19650bb2b17372c05fea81c70a61a58b97c5bffa8f3ff22ef5e44f8d5bcd9a7e6ad039656c778e3defde487514c27a53e5ab19e7d988086662bc7d2936c0ce17f57929fe03c491a499d671387a8c4a9d52f2fa0f12b0c8a6fbac0bf52fe8075949b6f554aad4d9906746094746213d701bdbfdddfab15780f0ff892ac680cdf8d58b6eec86af9447e96b23570e54caa7549caa341c121bd9f0d43abff4054dc2ade5aa89ec0521282cbd701f60913b7986f0199bcfb06c4d3b1bf98e836e40ac"}}) 11:43:54 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) bpf$PROG_LOAD(0x5, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r0 = gettid() tkill(r0, 0x3b) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000400)) [ 417.183576] reason=80000021 qualification=0000000000000000 [ 417.190083] IDTVectoring: info=00000000 errcode=00000000 [ 417.195638] TSC Offset = 0xffffff1e74d87fb8 [ 417.200078] EPT pointer = 0x00000000889f501e [ 417.204517] Virtual processor ID = 0x0001 [ 418.230134] net_ratelimit: 20 callbacks suppressed [ 418.230139] protocol 88fb is buggy, dev hsr_slave_0 [ 418.240170] protocol 88fb is buggy, dev hsr_slave_1 [ 418.550119] protocol 88fb is buggy, dev hsr_slave_0 [ 418.555191] protocol 88fb is buggy, dev hsr_slave_1 [ 418.950102] protocol 88fb is buggy, dev hsr_slave_0 [ 418.955186] protocol 88fb is buggy, dev hsr_slave_1 [ 419.350114] protocol 88fb is buggy, dev hsr_slave_0 [ 419.355187] protocol 88fb is buggy, dev hsr_slave_1 11:43:56 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000000)="5500000019007f5300fe01b2a4a280930a60ffff00a84302910000003900090008000c00060000f3180015e005000600000000dc1320d5440700000000", 0x3d}], 0x1}, 0x0) r0 = socket(0x1000000010, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f00000000c0), 0x492492492492191, 0x0) r1 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r1) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(0x0, 0x38) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) 11:43:56 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) bpf$PROG_LOAD(0x5, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r0 = gettid() tkill(r0, 0x3b) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000400)) 11:43:56 executing program 1: perf_event_open(&(0x7f0000000440)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x220801, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r0, 0x800443d3, &(0x7f0000000580)={{0x3, 0x9, 0xffff, 0x7fffffff}, 0x100000000, 0x0, 0x9}) syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vcs\x00', 0x280200, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\xf6', 0x1ff) ioctl$RTC_EPOCH_READ(r1, 0x8008700d, &(0x7f0000000280)) getsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000300)=0xffff, &(0x7f0000000140)=0x4) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) bind$ax25(r0, &(0x7f0000000340)={{0x3, @null, 0x5}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x80000, 0x10064) r3 = openat$cgroup_procs(r2, 0x0, 0x2, 0x0) write$P9_RCLUNK(r1, &(0x7f00000001c0)={0x7, 0x79, 0x1}, 0x7) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.net/syz1\x00', 0x1ff) write$cgroup_pid(r3, &(0x7f0000000640), 0x12) 11:43:56 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) bpf$PROG_LOAD(0x5, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r0 = gettid() tkill(r0, 0x3b) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000400)) 11:43:56 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) bpf$PROG_LOAD(0x5, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r0 = gettid() tkill(r0, 0x3b) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000400)) 11:43:56 executing program 5: r0 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000240)={0x0, 0x9, 0x1, {0xb, @sdr={0x0, 0x1}}}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000440)={0x0, 0x1ff, 0x1, {0xb, @raw_data="b57ec6e2ccfebc2f19650bb2b17372c05fea81c70a61a58b97c5bffa8f3ff22ef5e44f8d5bcd9a7e6ad039656c778e3defde487514c27a53e5ab19e7d988086662bc7d2936c0ce17f57929fe03c491a499d671387a8c4a9d52f2fa0f12b0c8a6fbac0bf52fe8075949b6f554aad4d9906746094746213d701bdbfdddfab15780f0ff892ac680cdf8d58b6eec86af9447e96b23570e54caa7549caa341c121bd9f0d43abff4054dc2ade5aa89ec0521282cbd701f60913b7986f0199bcfb06c4d3b1bf98e836e40ac"}}) 11:43:56 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) bpf$PROG_LOAD(0x5, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r0 = gettid() tkill(r0, 0x3b) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000400)) 11:43:56 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) bpf$PROG_LOAD(0x5, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r0 = gettid() tkill(r0, 0x3b) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000400)) [ 419.590694] protocol 88fb is buggy, dev hsr_slave_0 [ 419.596419] protocol 88fb is buggy, dev hsr_slave_1 11:43:56 executing program 1: perf_event_open(&(0x7f0000000440)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x220801, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r0, 0x800443d3, &(0x7f0000000580)={{0x3, 0x9, 0xffff, 0x7fffffff}, 0x100000000, 0x0, 0x9}) syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vcs\x00', 0x280200, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\xf6', 0x1ff) ioctl$RTC_EPOCH_READ(r1, 0x8008700d, &(0x7f0000000280)) getsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000300)=0xffff, &(0x7f0000000140)=0x4) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) bind$ax25(r0, &(0x7f0000000340)={{0x3, @null, 0x5}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x80000, 0x10064) r3 = openat$cgroup_procs(r2, 0x0, 0x2, 0x0) write$P9_RCLUNK(r1, &(0x7f00000001c0)={0x7, 0x79, 0x1}, 0x7) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.net/syz1\x00', 0x1ff) write$cgroup_pid(r3, &(0x7f0000000640), 0x12) 11:43:56 executing program 0: r0 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000240)={0x0, 0x9, 0x1, {0xb, @sdr={0x0, 0x1}}}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000440)={0x0, 0x1ff, 0x1, {0xb, @raw_data="b57ec6e2ccfebc2f19650bb2b17372c05fea81c70a61a58b97c5bffa8f3ff22ef5e44f8d5bcd9a7e6ad039656c778e3defde487514c27a53e5ab19e7d988086662bc7d2936c0ce17f57929fe03c491a499d671387a8c4a9d52f2fa0f12b0c8a6fbac0bf52fe8075949b6f554aad4d9906746094746213d701bdbfdddfab15780f0ff892ac680cdf8d58b6eec86af9447e96b23570e54caa7549caa341c121bd9f0d43abff4054dc2ade5aa89ec0521282cbd701f60913b7986f0199bcfb06c4d3b1bf98e836e40ac"}}) 11:43:56 executing program 5: r0 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000240)={0x0, 0x9, 0x1, {0xb, @sdr={0x0, 0x1}}}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000440)={0x0, 0x1ff, 0x1, {0xb, @raw_data="b57ec6e2ccfebc2f19650bb2b17372c05fea81c70a61a58b97c5bffa8f3ff22ef5e44f8d5bcd9a7e6ad039656c778e3defde487514c27a53e5ab19e7d988086662bc7d2936c0ce17f57929fe03c491a499d671387a8c4a9d52f2fa0f12b0c8a6fbac0bf52fe8075949b6f554aad4d9906746094746213d701bdbfdddfab15780f0ff892ac680cdf8d58b6eec86af9447e96b23570e54caa7549caa341c121bd9f0d43abff4054dc2ade5aa89ec0521282cbd701f60913b7986f0199bcfb06c4d3b1bf98e836e40ac"}}) 11:43:56 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) bpf$PROG_LOAD(0x5, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r0 = gettid() tkill(r0, 0x3b) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000400)) 11:43:59 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000000)="5500000019007f5300fe01b2a4a280930a60ffff00a84302910000003900090008000c00060000f3180015e005000600000000dc1320d5440700000000", 0x3d}], 0x1}, 0x0) r0 = socket(0x1000000010, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f00000000c0), 0x492492492492191, 0x0) r1 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r1) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x0) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) 11:43:59 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) bpf$PROG_LOAD(0x5, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r0 = gettid() tkill(r0, 0x3b) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000400)) 11:43:59 executing program 0: r0 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000240)={0x0, 0x9, 0x1, {0xb, @sdr={0x0, 0x1}}}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000440)={0x0, 0x1ff, 0x1, {0xb, @raw_data="b57ec6e2ccfebc2f19650bb2b17372c05fea81c70a61a58b97c5bffa8f3ff22ef5e44f8d5bcd9a7e6ad039656c778e3defde487514c27a53e5ab19e7d988086662bc7d2936c0ce17f57929fe03c491a499d671387a8c4a9d52f2fa0f12b0c8a6fbac0bf52fe8075949b6f554aad4d9906746094746213d701bdbfdddfab15780f0ff892ac680cdf8d58b6eec86af9447e96b23570e54caa7549caa341c121bd9f0d43abff4054dc2ade5aa89ec0521282cbd701f60913b7986f0199bcfb06c4d3b1bf98e836e40ac"}}) 11:43:59 executing program 5: r0 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000240)={0x0, 0x9, 0x1, {0xb, @sdr={0x0, 0x1}}}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000440)={0x0, 0x1ff, 0x1, {0xb, @raw_data="b57ec6e2ccfebc2f19650bb2b17372c05fea81c70a61a58b97c5bffa8f3ff22ef5e44f8d5bcd9a7e6ad039656c778e3defde487514c27a53e5ab19e7d988086662bc7d2936c0ce17f57929fe03c491a499d671387a8c4a9d52f2fa0f12b0c8a6fbac0bf52fe8075949b6f554aad4d9906746094746213d701bdbfdddfab15780f0ff892ac680cdf8d58b6eec86af9447e96b23570e54caa7549caa341c121bd9f0d43abff4054dc2ade5aa89ec0521282cbd701f60913b7986f0199bcfb06c4d3b1bf98e836e40ac"}}) 11:43:59 executing program 1: perf_event_open(&(0x7f0000000440)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x220801, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r0, 0x800443d3, &(0x7f0000000580)={{0x3, 0x9, 0xffff, 0x7fffffff}, 0x100000000, 0x0, 0x9}) syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vcs\x00', 0x280200, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\xf6', 0x1ff) ioctl$RTC_EPOCH_READ(r1, 0x8008700d, &(0x7f0000000280)) getsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000300)=0xffff, &(0x7f0000000140)=0x4) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) bind$ax25(r0, &(0x7f0000000340)={{0x3, @null, 0x5}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x80000, 0x10064) r3 = openat$cgroup_procs(r2, 0x0, 0x2, 0x0) write$P9_RCLUNK(r1, &(0x7f00000001c0)={0x7, 0x79, 0x1}, 0x7) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.net/syz1\x00', 0x1ff) write$cgroup_pid(r3, &(0x7f0000000640), 0x12) 11:43:59 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000002c0)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000100000002402000020feffff7a0af0fff8ffffff69a4f0ff00000000b7060000000000000744000000000000b7040000100000206a0700fe00000000850000002f000000b70000000a00000095000000000000006458c2c62fc286000389d909a63796c113a80c19aab9d646ae8f51b6cdf0d3253730e711f5969f62c28b22756bedf3cf393d14c46cc4f79fd2b316da4f0de8163f6242fa7323f1740637c48468766af540439f0500f144631ac2f9842e1b346362dcae08c3d1a1fbe96dd87235b44174f7c0343185089ab5119e31975e551558055dc2dce53b95c132e78454c4813681e0688d3a127f7418c6226f4133346c2e6794d952f2bb7938a2c53a0ce68e"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) socket$nl_route(0x10, 0x3, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r0 = gettid() tkill(r0, 0x3b) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000400)) 11:43:59 executing program 0: r0 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000240)={0x0, 0x9, 0x1, {0xb, @sdr={0x0, 0x1}}}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000440)={0x0, 0x1ff, 0x1, {0xb, @raw_data="b57ec6e2ccfebc2f19650bb2b17372c05fea81c70a61a58b97c5bffa8f3ff22ef5e44f8d5bcd9a7e6ad039656c778e3defde487514c27a53e5ab19e7d988086662bc7d2936c0ce17f57929fe03c491a499d671387a8c4a9d52f2fa0f12b0c8a6fbac0bf52fe8075949b6f554aad4d9906746094746213d701bdbfdddfab15780f0ff892ac680cdf8d58b6eec86af9447e96b23570e54caa7549caa341c121bd9f0d43abff4054dc2ade5aa89ec0521282cbd701f60913b7986f0199bcfb06c4d3b1bf98e836e40ac"}}) 11:43:59 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) bpf$PROG_LOAD(0x5, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r0 = gettid() tkill(r0, 0x3b) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000400)) 11:43:59 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000002c0)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000100000002402000020feffff7a0af0fff8ffffff69a4f0ff00000000b7060000000000000744000000000000b7040000100000206a0700fe00000000850000002f000000b70000000a00000095000000000000006458c2c62fc286000389d909a63796c113a80c19aab9d646ae8f51b6cdf0d3253730e711f5969f62c28b22756bedf3cf393d14c46cc4f79fd2b316da4f0de8163f6242fa7323f1740637c48468766af540439f0500f144631ac2f9842e1b346362dcae08c3d1a1fbe96dd87235b44174f7c0343185089ab5119e31975e551558055dc2dce53b95c132e78454c4813681e0688d3a127f7418c6226f4133346c2e6794d952f2bb7938a2c53a0ce68e"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) socket$nl_route(0x10, 0x3, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r0 = gettid() tkill(r0, 0x3b) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000400)) 11:43:59 executing program 5: r0 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000240)={0x0, 0x9, 0x1, {0xb, @sdr={0x0, 0x1}}}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000440)={0x0, 0x1ff, 0x1, {0xb, @raw_data="b57ec6e2ccfebc2f19650bb2b17372c05fea81c70a61a58b97c5bffa8f3ff22ef5e44f8d5bcd9a7e6ad039656c778e3defde487514c27a53e5ab19e7d988086662bc7d2936c0ce17f57929fe03c491a499d671387a8c4a9d52f2fa0f12b0c8a6fbac0bf52fe8075949b6f554aad4d9906746094746213d701bdbfdddfab15780f0ff892ac680cdf8d58b6eec86af9447e96b23570e54caa7549caa341c121bd9f0d43abff4054dc2ade5aa89ec0521282cbd701f60913b7986f0199bcfb06c4d3b1bf98e836e40ac"}}) 11:44:00 executing program 1: perf_event_open(&(0x7f0000000440)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x220801, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r0, 0x800443d3, &(0x7f0000000580)={{0x3, 0x9, 0xffff, 0x7fffffff}, 0x100000000, 0x0, 0x9}) syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vcs\x00', 0x280200, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\xf6', 0x1ff) ioctl$RTC_EPOCH_READ(r1, 0x8008700d, &(0x7f0000000280)) getsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000300)=0xffff, &(0x7f0000000140)=0x4) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) bind$ax25(r0, &(0x7f0000000340)={{0x3, @null, 0x5}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x80000, 0x10064) r3 = openat$cgroup_procs(r2, &(0x7f0000000100)='cgroup.procs\x00', 0x2, 0x0) write$P9_RCLUNK(0xffffffffffffffff, &(0x7f00000001c0)={0x7, 0x79, 0x1}, 0x7) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.net/syz1\x00', 0x1ff) write$cgroup_pid(r3, &(0x7f0000000640), 0x12) 11:44:00 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) bpf$PROG_LOAD(0x5, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r0 = gettid() tkill(r0, 0x3b) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000400)) [ 423.511628] net_ratelimit: 20 callbacks suppressed [ 423.511633] protocol 88fb is buggy, dev hsr_slave_0 [ 423.521623] protocol 88fb is buggy, dev hsr_slave_1 [ 423.750129] protocol 88fb is buggy, dev hsr_slave_0 [ 423.755321] protocol 88fb is buggy, dev hsr_slave_1 [ 423.830133] protocol 88fb is buggy, dev hsr_slave_0 [ 423.835230] protocol 88fb is buggy, dev hsr_slave_1 [ 424.470160] protocol 88fb is buggy, dev hsr_slave_0 [ 424.475337] protocol 88fb is buggy, dev hsr_slave_1 [ 424.790260] protocol 88fb is buggy, dev hsr_slave_0 [ 424.795359] protocol 88fb is buggy, dev hsr_slave_1 11:44:02 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000000)="5500000019007f5300fe01b2a4a280930a60ffff00a84302910000003900090008000c00060000f3180015e005000600000000dc1320d5440700000000", 0x3d}], 0x1}, 0x0) r0 = socket(0x1000000010, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f00000000c0), 0x492492492492191, 0x0) r1 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r1) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x0) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) 11:44:02 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) socket$nl_route(0x10, 0x3, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r0 = gettid() tkill(r0, 0x3b) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000400)) 11:44:02 executing program 5: r0 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000240)={0x0, 0x9, 0x1, {0xb, @sdr={0x0, 0x1}}}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000440)={0x0, 0x1ff, 0x1, {0xb, @raw_data="b57ec6e2ccfebc2f19650bb2b17372c05fea81c70a61a58b97c5bffa8f3ff22ef5e44f8d5bcd9a7e6ad039656c778e3defde487514c27a53e5ab19e7d988086662bc7d2936c0ce17f57929fe03c491a499d671387a8c4a9d52f2fa0f12b0c8a6fbac0bf52fe8075949b6f554aad4d9906746094746213d701bdbfdddfab15780f0ff892ac680cdf8d58b6eec86af9447e96b23570e54caa7549caa341c121bd9f0d43abff4054dc2ade5aa89ec0521282cbd701f60913b7986f0199bcfb06c4d3b1bf98e836e40ac"}}) 11:44:02 executing program 0: r0 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000240)={0x0, 0x9, 0x1, {0xb, @sdr={0x0, 0x1}}}) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000440)={0x0, 0x1ff, 0x1, {0xb, @raw_data="b57ec6e2ccfebc2f19650bb2b17372c05fea81c70a61a58b97c5bffa8f3ff22ef5e44f8d5bcd9a7e6ad039656c778e3defde487514c27a53e5ab19e7d988086662bc7d2936c0ce17f57929fe03c491a499d671387a8c4a9d52f2fa0f12b0c8a6fbac0bf52fe8075949b6f554aad4d9906746094746213d701bdbfdddfab15780f0ff892ac680cdf8d58b6eec86af9447e96b23570e54caa7549caa341c121bd9f0d43abff4054dc2ade5aa89ec0521282cbd701f60913b7986f0199bcfb06c4d3b1bf98e836e40ac"}}) 11:44:02 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) bpf$PROG_LOAD(0x5, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r0 = gettid() tkill(r0, 0x3b) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000400)) 11:44:02 executing program 1: perf_event_open(&(0x7f0000000440)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x220801, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r0, 0x800443d3, &(0x7f0000000580)={{0x3, 0x9, 0xffff, 0x7fffffff}, 0x100000000, 0x0, 0x9}) syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vcs\x00', 0x280200, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\xf6', 0x1ff) ioctl$RTC_EPOCH_READ(r1, 0x8008700d, &(0x7f0000000280)) getsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000300)=0xffff, &(0x7f0000000140)=0x4) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) bind$ax25(r0, &(0x7f0000000340)={{0x3, @null, 0x5}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x80000, 0x10064) r3 = openat$cgroup_procs(r2, &(0x7f0000000100)='cgroup.procs\x00', 0x2, 0x0) write$P9_RCLUNK(0xffffffffffffffff, &(0x7f00000001c0)={0x7, 0x79, 0x1}, 0x7) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.net/syz1\x00', 0x1ff) write$cgroup_pid(r3, &(0x7f0000000640), 0x12) 11:44:02 executing program 0: r0 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000240)={0x0, 0x9, 0x1, {0xb, @sdr={0x0, 0x1}}}) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000440)={0x0, 0x1ff, 0x1, {0xb, @raw_data="b57ec6e2ccfebc2f19650bb2b17372c05fea81c70a61a58b97c5bffa8f3ff22ef5e44f8d5bcd9a7e6ad039656c778e3defde487514c27a53e5ab19e7d988086662bc7d2936c0ce17f57929fe03c491a499d671387a8c4a9d52f2fa0f12b0c8a6fbac0bf52fe8075949b6f554aad4d9906746094746213d701bdbfdddfab15780f0ff892ac680cdf8d58b6eec86af9447e96b23570e54caa7549caa341c121bd9f0d43abff4054dc2ade5aa89ec0521282cbd701f60913b7986f0199bcfb06c4d3b1bf98e836e40ac"}}) 11:44:02 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) bpf$PROG_LOAD(0x5, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r0 = gettid() tkill(r0, 0x3b) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000400)) 11:44:03 executing program 5: r0 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000440)={0x0, 0x1ff, 0x1, {0xb, @raw_data="b57ec6e2ccfebc2f19650bb2b17372c05fea81c70a61a58b97c5bffa8f3ff22ef5e44f8d5bcd9a7e6ad039656c778e3defde487514c27a53e5ab19e7d988086662bc7d2936c0ce17f57929fe03c491a499d671387a8c4a9d52f2fa0f12b0c8a6fbac0bf52fe8075949b6f554aad4d9906746094746213d701bdbfdddfab15780f0ff892ac680cdf8d58b6eec86af9447e96b23570e54caa7549caa341c121bd9f0d43abff4054dc2ade5aa89ec0521282cbd701f60913b7986f0199bcfb06c4d3b1bf98e836e40ac"}}) 11:44:03 executing program 1: perf_event_open(&(0x7f0000000440)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x220801, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r0, 0x800443d3, &(0x7f0000000580)={{0x3, 0x9, 0xffff, 0x7fffffff}, 0x100000000, 0x0, 0x9}) syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vcs\x00', 0x280200, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\xf6', 0x1ff) ioctl$RTC_EPOCH_READ(r1, 0x8008700d, &(0x7f0000000280)) getsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000300)=0xffff, &(0x7f0000000140)=0x4) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) bind$ax25(r0, &(0x7f0000000340)={{0x3, @null, 0x5}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x80000, 0x10064) r3 = openat$cgroup_procs(r2, &(0x7f0000000100)='cgroup.procs\x00', 0x2, 0x0) write$P9_RCLUNK(0xffffffffffffffff, &(0x7f00000001c0)={0x7, 0x79, 0x1}, 0x7) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.net/syz1\x00', 0x1ff) write$cgroup_pid(r3, &(0x7f0000000640), 0x12) 11:44:03 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) socket$nl_route(0x10, 0x3, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r0 = gettid() tkill(r0, 0x3b) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000400)) 11:44:03 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) bpf$PROG_LOAD(0x5, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = gettid() tkill(r0, 0x3b) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000400)) 11:44:05 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000000)="5500000019007f5300fe01b2a4a280930a60ffff00a84302910000003900090008000c00060000f3180015e005000600000000dc1320d5440700000000", 0x3d}], 0x1}, 0x0) r0 = socket(0x1000000010, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f00000000c0), 0x492492492492191, 0x0) r1 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r1) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x0) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) 11:44:05 executing program 0: r0 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000440)={0x0, 0x1ff, 0x1, {0xb, @raw_data="b57ec6e2ccfebc2f19650bb2b17372c05fea81c70a61a58b97c5bffa8f3ff22ef5e44f8d5bcd9a7e6ad039656c778e3defde487514c27a53e5ab19e7d988086662bc7d2936c0ce17f57929fe03c491a499d671387a8c4a9d52f2fa0f12b0c8a6fbac0bf52fe8075949b6f554aad4d9906746094746213d701bdbfdddfab15780f0ff892ac680cdf8d58b6eec86af9447e96b23570e54caa7549caa341c121bd9f0d43abff4054dc2ade5aa89ec0521282cbd701f60913b7986f0199bcfb06c4d3b1bf98e836e40ac"}}) 11:44:05 executing program 5: r0 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000440)={0x0, 0x1ff, 0x1, {0xb, @raw_data="b57ec6e2ccfebc2f19650bb2b17372c05fea81c70a61a58b97c5bffa8f3ff22ef5e44f8d5bcd9a7e6ad039656c778e3defde487514c27a53e5ab19e7d988086662bc7d2936c0ce17f57929fe03c491a499d671387a8c4a9d52f2fa0f12b0c8a6fbac0bf52fe8075949b6f554aad4d9906746094746213d701bdbfdddfab15780f0ff892ac680cdf8d58b6eec86af9447e96b23570e54caa7549caa341c121bd9f0d43abff4054dc2ade5aa89ec0521282cbd701f60913b7986f0199bcfb06c4d3b1bf98e836e40ac"}}) 11:44:05 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) bpf$PROG_LOAD(0x5, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = gettid() tkill(r0, 0x3b) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000400)) 11:44:05 executing program 1: perf_event_open(&(0x7f0000000440)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x220801, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r0, 0x800443d3, &(0x7f0000000580)={{0x3, 0x9, 0xffff, 0x7fffffff}, 0x100000000, 0x0, 0x9}) syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vcs\x00', 0x280200, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\xf6', 0x1ff) ioctl$RTC_EPOCH_READ(r1, 0x8008700d, &(0x7f0000000280)) getsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000300)=0xffff, &(0x7f0000000140)=0x4) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) bind$ax25(r0, &(0x7f0000000340)={{0x3, @null, 0x5}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x80000, 0x10064) r3 = openat$cgroup_procs(r2, &(0x7f0000000100)='cgroup.procs\x00', 0x2, 0x0) write$P9_RCLUNK(r1, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.net/syz1\x00', 0x1ff) write$cgroup_pid(r3, &(0x7f0000000640), 0x12) 11:44:05 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) bpf$PROG_LOAD(0x5, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r0 = gettid() tkill(r0, 0x3b) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000400)) 11:44:05 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) bpf$PROG_LOAD(0x5, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = gettid() tkill(r0, 0x3b) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000400)) 11:44:05 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) bpf$PROG_LOAD(0x5, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r0 = gettid() tkill(r0, 0x3b) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000400)) 11:44:06 executing program 1: perf_event_open(&(0x7f0000000440)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x220801, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r0, 0x800443d3, &(0x7f0000000580)={{0x3, 0x9, 0xffff, 0x7fffffff}, 0x100000000, 0x0, 0x9}) syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vcs\x00', 0x280200, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\xf6', 0x1ff) ioctl$RTC_EPOCH_READ(r1, 0x8008700d, &(0x7f0000000280)) getsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000300)=0xffff, &(0x7f0000000140)=0x4) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) bind$ax25(r0, &(0x7f0000000340)={{0x3, @null, 0x5}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x80000, 0x10064) r3 = openat$cgroup_procs(r2, &(0x7f0000000100)='cgroup.procs\x00', 0x2, 0x0) write$P9_RCLUNK(r1, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.net/syz1\x00', 0x1ff) write$cgroup_pid(r3, &(0x7f0000000640), 0x12) 11:44:06 executing program 0: r0 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000440)={0x0, 0x1ff, 0x1, {0xb, @raw_data="b57ec6e2ccfebc2f19650bb2b17372c05fea81c70a61a58b97c5bffa8f3ff22ef5e44f8d5bcd9a7e6ad039656c778e3defde487514c27a53e5ab19e7d988086662bc7d2936c0ce17f57929fe03c491a499d671387a8c4a9d52f2fa0f12b0c8a6fbac0bf52fe8075949b6f554aad4d9906746094746213d701bdbfdddfab15780f0ff892ac680cdf8d58b6eec86af9447e96b23570e54caa7549caa341c121bd9f0d43abff4054dc2ade5aa89ec0521282cbd701f60913b7986f0199bcfb06c4d3b1bf98e836e40ac"}}) 11:44:06 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) bpf$PROG_LOAD(0x5, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r0 = gettid() tkill(r0, 0x3b) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000400)) 11:44:06 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) bpf$PROG_LOAD(0x5, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r0 = gettid() tkill(r0, 0x3b) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000400)) [ 428.630161] net_ratelimit: 20 callbacks suppressed [ 428.630167] protocol 88fb is buggy, dev hsr_slave_0 [ 428.640238] protocol 88fb is buggy, dev hsr_slave_1 11:44:06 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000000)="5500000019007f5300fe01b2a4a280930a60ffff00a84302910000003900090008000c00060000f3180015e005000600000000dc1320d5440700000000", 0x3d}], 0x1}, 0x0) r0 = socket(0x1000000010, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f00000000c0), 0x492492492492191, 0x0) r1 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r1) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x38) ptrace$cont(0xffffffffffffffff, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) 11:44:06 executing program 5: r0 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000440)={0x0, 0x1ff, 0x1, {0xb, @raw_data="b57ec6e2ccfebc2f19650bb2b17372c05fea81c70a61a58b97c5bffa8f3ff22ef5e44f8d5bcd9a7e6ad039656c778e3defde487514c27a53e5ab19e7d988086662bc7d2936c0ce17f57929fe03c491a499d671387a8c4a9d52f2fa0f12b0c8a6fbac0bf52fe8075949b6f554aad4d9906746094746213d701bdbfdddfab15780f0ff892ac680cdf8d58b6eec86af9447e96b23570e54caa7549caa341c121bd9f0d43abff4054dc2ade5aa89ec0521282cbd701f60913b7986f0199bcfb06c4d3b1bf98e836e40ac"}}) 11:44:06 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) bpf$PROG_LOAD(0x5, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r0 = gettid() tkill(r0, 0x3b) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000400)) 11:44:06 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) bpf$PROG_LOAD(0x5, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r0 = gettid() tkill(r0, 0x3b) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000400)) [ 428.950133] protocol 88fb is buggy, dev hsr_slave_0 [ 428.955291] protocol 88fb is buggy, dev hsr_slave_1 11:44:06 executing program 4: r0 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000240)={0x0, 0x9, 0x1, {0xb, @sdr={0x0, 0x1}}}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000440)={0x0, 0x1ff, 0x1, {0xb, @raw_data="b57ec6e2ccfebc2f19650bb2b17372c05fea81c70a61a58b97c5bffa8f3ff22ef5e44f8d5bcd9a7e6ad039656c778e3defde487514c27a53e5ab19e7d988086662bc7d2936c0ce17f57929fe03c491a499d671387a8c4a9d52f2fa0f12b0c8a6fbac0bf52fe8075949b6f554aad4d9906746094746213d701bdbfdddfab15780f0ff892ac680cdf8d58b6eec86af9447e96b23570e54caa7549caa341c121bd9f0d43abff4054dc2ade5aa89ec0521282cbd701f60913b7986f0199bcfb06c4d3b1bf98e836e40ac"}}) 11:44:06 executing program 0: r0 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000440)={0x0, 0x1ff, 0x1, {0xb, @raw_data="b57ec6e2ccfebc2f19650bb2b17372c05fea81c70a61a58b97c5bffa8f3ff22ef5e44f8d5bcd9a7e6ad039656c778e3defde487514c27a53e5ab19e7d988086662bc7d2936c0ce17f57929fe03c491a499d671387a8c4a9d52f2fa0f12b0c8a6fbac0bf52fe8075949b6f554aad4d9906746094746213d701bdbfdddfab15780f0ff892ac680cdf8d58b6eec86af9447e96b23570e54caa7549caa341c121bd9f0d43abff4054dc2ade5aa89ec0521282cbd701f60913b7986f0199bcfb06c4d3b1bf98e836e40ac"}}) 11:44:06 executing program 1: perf_event_open(&(0x7f0000000440)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x220801, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r0, 0x800443d3, &(0x7f0000000580)={{0x3, 0x9, 0xffff, 0x7fffffff}, 0x100000000, 0x0, 0x9}) syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vcs\x00', 0x280200, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\xf6', 0x1ff) ioctl$RTC_EPOCH_READ(r1, 0x8008700d, &(0x7f0000000280)) getsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000300)=0xffff, &(0x7f0000000140)=0x4) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) bind$ax25(r0, &(0x7f0000000340)={{0x3, @null, 0x5}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x80000, 0x10064) r3 = openat$cgroup_procs(r2, &(0x7f0000000100)='cgroup.procs\x00', 0x2, 0x0) write$P9_RCLUNK(r1, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.net/syz1\x00', 0x1ff) write$cgroup_pid(r3, &(0x7f0000000640), 0x12) 11:44:06 executing program 5: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000240)={0x0, 0x9, 0x1, {0xb, @sdr={0x0, 0x1}}}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000440)={0x0, 0x1ff, 0x1, {0xb, @raw_data="b57ec6e2ccfebc2f19650bb2b17372c05fea81c70a61a58b97c5bffa8f3ff22ef5e44f8d5bcd9a7e6ad039656c778e3defde487514c27a53e5ab19e7d988086662bc7d2936c0ce17f57929fe03c491a499d671387a8c4a9d52f2fa0f12b0c8a6fbac0bf52fe8075949b6f554aad4d9906746094746213d701bdbfdddfab15780f0ff892ac680cdf8d58b6eec86af9447e96b23570e54caa7549caa341c121bd9f0d43abff4054dc2ade5aa89ec0521282cbd701f60913b7986f0199bcfb06c4d3b1bf98e836e40ac"}}) 11:44:06 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) bpf$PROG_LOAD(0x5, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r0 = gettid() tkill(r0, 0x3b) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000400)) 11:44:06 executing program 0: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000240)={0x0, 0x9, 0x1, {0xb, @sdr={0x0, 0x1}}}) ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000440)={0x0, 0x1ff, 0x1, {0xb, @raw_data="b57ec6e2ccfebc2f19650bb2b17372c05fea81c70a61a58b97c5bffa8f3ff22ef5e44f8d5bcd9a7e6ad039656c778e3defde487514c27a53e5ab19e7d988086662bc7d2936c0ce17f57929fe03c491a499d671387a8c4a9d52f2fa0f12b0c8a6fbac0bf52fe8075949b6f554aad4d9906746094746213d701bdbfdddfab15780f0ff892ac680cdf8d58b6eec86af9447e96b23570e54caa7549caa341c121bd9f0d43abff4054dc2ade5aa89ec0521282cbd701f60913b7986f0199bcfb06c4d3b1bf98e836e40ac"}}) 11:44:06 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) bpf$PROG_LOAD(0x5, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0x0, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r0 = gettid() tkill(r0, 0x3b) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000400)) 11:44:06 executing program 5: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000240)={0x0, 0x9, 0x1, {0xb, @sdr={0x0, 0x1}}}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000440)={0x0, 0x1ff, 0x1, {0xb, @raw_data="b57ec6e2ccfebc2f19650bb2b17372c05fea81c70a61a58b97c5bffa8f3ff22ef5e44f8d5bcd9a7e6ad039656c778e3defde487514c27a53e5ab19e7d988086662bc7d2936c0ce17f57929fe03c491a499d671387a8c4a9d52f2fa0f12b0c8a6fbac0bf52fe8075949b6f554aad4d9906746094746213d701bdbfdddfab15780f0ff892ac680cdf8d58b6eec86af9447e96b23570e54caa7549caa341c121bd9f0d43abff4054dc2ade5aa89ec0521282cbd701f60913b7986f0199bcfb06c4d3b1bf98e836e40ac"}}) [ 429.360129] protocol 88fb is buggy, dev hsr_slave_0 [ 429.365315] protocol 88fb is buggy, dev hsr_slave_1 [ 429.750144] protocol 88fb is buggy, dev hsr_slave_0 [ 429.755401] protocol 88fb is buggy, dev hsr_slave_1 [ 429.990151] protocol 88fb is buggy, dev hsr_slave_0 [ 429.995264] protocol 88fb is buggy, dev hsr_slave_1 11:44:09 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000000)="5500000019007f5300fe01b2a4a280930a60ffff00a84302910000003900090008000c00060000f3180015e005000600000000dc1320d5440700000000", 0x3d}], 0x1}, 0x0) r0 = socket(0x1000000010, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f00000000c0), 0x492492492492191, 0x0) r1 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r1) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x38) ptrace$cont(0xffffffffffffffff, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) 11:44:09 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) socket$nl_route(0x10, 0x3, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r0 = gettid() tkill(r0, 0x3b) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000400)) 11:44:09 executing program 0: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000240)={0x0, 0x9, 0x1, {0xb, @sdr={0x0, 0x1}}}) ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000440)={0x0, 0x1ff, 0x1, {0xb, @raw_data="b57ec6e2ccfebc2f19650bb2b17372c05fea81c70a61a58b97c5bffa8f3ff22ef5e44f8d5bcd9a7e6ad039656c778e3defde487514c27a53e5ab19e7d988086662bc7d2936c0ce17f57929fe03c491a499d671387a8c4a9d52f2fa0f12b0c8a6fbac0bf52fe8075949b6f554aad4d9906746094746213d701bdbfdddfab15780f0ff892ac680cdf8d58b6eec86af9447e96b23570e54caa7549caa341c121bd9f0d43abff4054dc2ade5aa89ec0521282cbd701f60913b7986f0199bcfb06c4d3b1bf98e836e40ac"}}) 11:44:09 executing program 1: perf_event_open(&(0x7f0000000440)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x220801, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r0, 0x800443d3, &(0x7f0000000580)={{0x3, 0x9, 0xffff, 0x7fffffff}, 0x100000000, 0x0, 0x9}) syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vcs\x00', 0x280200, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\xf6', 0x1ff) ioctl$RTC_EPOCH_READ(r1, 0x8008700d, &(0x7f0000000280)) getsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000300)=0xffff, &(0x7f0000000140)=0x4) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) bind$ax25(r0, &(0x7f0000000340)={{0x3, @null, 0x5}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x80000, 0x10064) r3 = openat$cgroup_procs(r2, &(0x7f0000000100)='cgroup.procs\x00', 0x2, 0x0) write$P9_RCLUNK(r1, &(0x7f00000001c0)={0x7}, 0x7) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.net/syz1\x00', 0x1ff) write$cgroup_pid(r3, &(0x7f0000000640), 0x12) 11:44:09 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) bpf$PROG_LOAD(0x5, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0x0, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r0 = gettid() tkill(r0, 0x3b) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000400)) 11:44:09 executing program 5: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000240)={0x0, 0x9, 0x1, {0xb, @sdr={0x0, 0x1}}}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000440)={0x0, 0x1ff, 0x1, {0xb, @raw_data="b57ec6e2ccfebc2f19650bb2b17372c05fea81c70a61a58b97c5bffa8f3ff22ef5e44f8d5bcd9a7e6ad039656c778e3defde487514c27a53e5ab19e7d988086662bc7d2936c0ce17f57929fe03c491a499d671387a8c4a9d52f2fa0f12b0c8a6fbac0bf52fe8075949b6f554aad4d9906746094746213d701bdbfdddfab15780f0ff892ac680cdf8d58b6eec86af9447e96b23570e54caa7549caa341c121bd9f0d43abff4054dc2ade5aa89ec0521282cbd701f60913b7986f0199bcfb06c4d3b1bf98e836e40ac"}}) 11:44:09 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) bpf$PROG_LOAD(0x5, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0x0, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r0 = gettid() tkill(r0, 0x3b) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000400)) 11:44:09 executing program 5: r0 = syz_open_dev$swradio(0x0, 0x1, 0x2) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000240)={0x0, 0x9, 0x1, {0xb, @sdr={0x0, 0x1}}}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000440)={0x0, 0x1ff, 0x1, {0xb, @raw_data="b57ec6e2ccfebc2f19650bb2b17372c05fea81c70a61a58b97c5bffa8f3ff22ef5e44f8d5bcd9a7e6ad039656c778e3defde487514c27a53e5ab19e7d988086662bc7d2936c0ce17f57929fe03c491a499d671387a8c4a9d52f2fa0f12b0c8a6fbac0bf52fe8075949b6f554aad4d9906746094746213d701bdbfdddfab15780f0ff892ac680cdf8d58b6eec86af9447e96b23570e54caa7549caa341c121bd9f0d43abff4054dc2ade5aa89ec0521282cbd701f60913b7986f0199bcfb06c4d3b1bf98e836e40ac"}}) 11:44:09 executing program 0: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000240)={0x0, 0x9, 0x1, {0xb, @sdr={0x0, 0x1}}}) ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000440)={0x0, 0x1ff, 0x1, {0xb, @raw_data="b57ec6e2ccfebc2f19650bb2b17372c05fea81c70a61a58b97c5bffa8f3ff22ef5e44f8d5bcd9a7e6ad039656c778e3defde487514c27a53e5ab19e7d988086662bc7d2936c0ce17f57929fe03c491a499d671387a8c4a9d52f2fa0f12b0c8a6fbac0bf52fe8075949b6f554aad4d9906746094746213d701bdbfdddfab15780f0ff892ac680cdf8d58b6eec86af9447e96b23570e54caa7549caa341c121bd9f0d43abff4054dc2ade5aa89ec0521282cbd701f60913b7986f0199bcfb06c4d3b1bf98e836e40ac"}}) 11:44:09 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) bpf$PROG_LOAD(0x5, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0x0, &(0x7f0000000380)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r0 = gettid() tkill(r0, 0x3b) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000400)) 11:44:09 executing program 1: perf_event_open(&(0x7f0000000440)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x220801, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r0, 0x800443d3, &(0x7f0000000580)={{0x3, 0x9, 0xffff, 0x7fffffff}, 0x100000000, 0x0, 0x9}) syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vcs\x00', 0x280200, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\xf6', 0x1ff) ioctl$RTC_EPOCH_READ(r1, 0x8008700d, &(0x7f0000000280)) getsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000300)=0xffff, &(0x7f0000000140)=0x4) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) bind$ax25(r0, &(0x7f0000000340)={{0x3, @null, 0x5}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x80000, 0x10064) r3 = openat$cgroup_procs(r2, &(0x7f0000000100)='cgroup.procs\x00', 0x2, 0x0) write$P9_RCLUNK(r1, &(0x7f00000001c0)={0x7}, 0x7) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.net/syz1\x00', 0x1ff) write$cgroup_pid(r3, &(0x7f0000000640), 0x12) 11:44:09 executing program 0: r0 = syz_open_dev$swradio(0x0, 0x1, 0x2) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000240)={0x0, 0x9, 0x1, {0xb, @sdr={0x0, 0x1}}}) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000440)={0x0, 0x1ff, 0x1, {0xb, @raw_data="b57ec6e2ccfebc2f19650bb2b17372c05fea81c70a61a58b97c5bffa8f3ff22ef5e44f8d5bcd9a7e6ad039656c778e3defde487514c27a53e5ab19e7d988086662bc7d2936c0ce17f57929fe03c491a499d671387a8c4a9d52f2fa0f12b0c8a6fbac0bf52fe8075949b6f554aad4d9906746094746213d701bdbfdddfab15780f0ff892ac680cdf8d58b6eec86af9447e96b23570e54caa7549caa341c121bd9f0d43abff4054dc2ade5aa89ec0521282cbd701f60913b7986f0199bcfb06c4d3b1bf98e836e40ac"}}) [ 433.910100] net_ratelimit: 20 callbacks suppressed [ 433.910106] protocol 88fb is buggy, dev hsr_slave_0 [ 433.920107] protocol 88fb is buggy, dev hsr_slave_1 [ 434.150097] protocol 88fb is buggy, dev hsr_slave_0 [ 434.155194] protocol 88fb is buggy, dev hsr_slave_1 [ 434.230128] protocol 88fb is buggy, dev hsr_slave_0 [ 434.235234] protocol 88fb is buggy, dev hsr_slave_1 [ 434.870135] protocol 88fb is buggy, dev hsr_slave_0 [ 434.875211] protocol 88fb is buggy, dev hsr_slave_1 11:44:12 executing program 5: r0 = syz_open_dev$swradio(0x0, 0x1, 0x2) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000240)={0x0, 0x9, 0x1, {0xb, @sdr={0x0, 0x1}}}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000440)={0x0, 0x1ff, 0x1, {0xb, @raw_data="b57ec6e2ccfebc2f19650bb2b17372c05fea81c70a61a58b97c5bffa8f3ff22ef5e44f8d5bcd9a7e6ad039656c778e3defde487514c27a53e5ab19e7d988086662bc7d2936c0ce17f57929fe03c491a499d671387a8c4a9d52f2fa0f12b0c8a6fbac0bf52fe8075949b6f554aad4d9906746094746213d701bdbfdddfab15780f0ff892ac680cdf8d58b6eec86af9447e96b23570e54caa7549caa341c121bd9f0d43abff4054dc2ade5aa89ec0521282cbd701f60913b7986f0199bcfb06c4d3b1bf98e836e40ac"}}) 11:44:12 executing program 1: perf_event_open(&(0x7f0000000440)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x220801, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r0, 0x800443d3, &(0x7f0000000580)={{0x3, 0x9, 0xffff, 0x7fffffff}, 0x100000000, 0x0, 0x9}) syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vcs\x00', 0x280200, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\xf6', 0x1ff) ioctl$RTC_EPOCH_READ(r1, 0x8008700d, &(0x7f0000000280)) getsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000300)=0xffff, &(0x7f0000000140)=0x4) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) bind$ax25(r0, &(0x7f0000000340)={{0x3, @null, 0x5}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x80000, 0x10064) r3 = openat$cgroup_procs(r2, &(0x7f0000000100)='cgroup.procs\x00', 0x2, 0x0) write$P9_RCLUNK(r1, &(0x7f00000001c0)={0x7}, 0x7) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.net/syz1\x00', 0x1ff) write$cgroup_pid(r3, &(0x7f0000000640), 0x12) 11:44:12 executing program 4: perf_event_open(&(0x7f0000000440)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x220801, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r0, 0x800443d3, &(0x7f0000000580)={{0x3, 0x9, 0xffff, 0x7fffffff}, 0x100000000, 0x0, 0x9}) syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vcs\x00', 0x280200, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\xf6', 0x1ff) ioctl$RTC_EPOCH_READ(r1, 0x8008700d, &(0x7f0000000280)) getsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000300)=0xffff, &(0x7f0000000140)=0x4) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) bind$ax25(r0, &(0x7f0000000340)={{0x3, @null, 0x5}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x80000, 0x10064) r3 = openat$cgroup_procs(r2, &(0x7f0000000100)='cgroup.procs\x00', 0x2, 0x0) write$P9_RCLUNK(r1, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.net/syz1\x00', 0x1ff) write$cgroup_pid(r3, &(0x7f0000000640), 0x12) 11:44:12 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) bpf$PROG_LOAD(0x5, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0x0, &(0x7f0000000380)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r0 = gettid() tkill(r0, 0x3b) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000400)) 11:44:12 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000000)="5500000019007f5300fe01b2a4a280930a60ffff00a84302910000003900090008000c00060000f3180015e005000600000000dc1320d5440700000000", 0x3d}], 0x1}, 0x0) r0 = socket(0x1000000010, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f00000000c0), 0x492492492492191, 0x0) r1 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r1) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x38) ptrace$cont(0xffffffffffffffff, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) 11:44:12 executing program 0: r0 = syz_open_dev$swradio(0x0, 0x1, 0x2) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000240)={0x0, 0x9, 0x1, {0xb, @sdr={0x0, 0x1}}}) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000440)={0x0, 0x1ff, 0x1, {0xb, @raw_data="b57ec6e2ccfebc2f19650bb2b17372c05fea81c70a61a58b97c5bffa8f3ff22ef5e44f8d5bcd9a7e6ad039656c778e3defde487514c27a53e5ab19e7d988086662bc7d2936c0ce17f57929fe03c491a499d671387a8c4a9d52f2fa0f12b0c8a6fbac0bf52fe8075949b6f554aad4d9906746094746213d701bdbfdddfab15780f0ff892ac680cdf8d58b6eec86af9447e96b23570e54caa7549caa341c121bd9f0d43abff4054dc2ade5aa89ec0521282cbd701f60913b7986f0199bcfb06c4d3b1bf98e836e40ac"}}) 11:44:12 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) bpf$PROG_LOAD(0x5, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0x0, &(0x7f0000000380)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r0 = gettid() tkill(r0, 0x3b) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000400)) 11:44:12 executing program 0: r0 = syz_open_dev$swradio(0x0, 0x1, 0x2) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000240)={0x0, 0x9, 0x1, {0xb, @sdr={0x0, 0x1}}}) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000440)={0x0, 0x1ff, 0x1, {0xb, @raw_data="b57ec6e2ccfebc2f19650bb2b17372c05fea81c70a61a58b97c5bffa8f3ff22ef5e44f8d5bcd9a7e6ad039656c778e3defde487514c27a53e5ab19e7d988086662bc7d2936c0ce17f57929fe03c491a499d671387a8c4a9d52f2fa0f12b0c8a6fbac0bf52fe8075949b6f554aad4d9906746094746213d701bdbfdddfab15780f0ff892ac680cdf8d58b6eec86af9447e96b23570e54caa7549caa341c121bd9f0d43abff4054dc2ade5aa89ec0521282cbd701f60913b7986f0199bcfb06c4d3b1bf98e836e40ac"}}) 11:44:12 executing program 5: r0 = syz_open_dev$swradio(0x0, 0x1, 0x2) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000240)={0x0, 0x9, 0x1, {0xb, @sdr={0x0, 0x1}}}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000440)={0x0, 0x1ff, 0x1, {0xb, @raw_data="b57ec6e2ccfebc2f19650bb2b17372c05fea81c70a61a58b97c5bffa8f3ff22ef5e44f8d5bcd9a7e6ad039656c778e3defde487514c27a53e5ab19e7d988086662bc7d2936c0ce17f57929fe03c491a499d671387a8c4a9d52f2fa0f12b0c8a6fbac0bf52fe8075949b6f554aad4d9906746094746213d701bdbfdddfab15780f0ff892ac680cdf8d58b6eec86af9447e96b23570e54caa7549caa341c121bd9f0d43abff4054dc2ade5aa89ec0521282cbd701f60913b7986f0199bcfb06c4d3b1bf98e836e40ac"}}) 11:44:12 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) bpf$PROG_LOAD(0x5, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r0 = gettid() tkill(r0, 0x3b) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000400)) 11:44:12 executing program 1: perf_event_open(&(0x7f0000000440)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x220801, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r0, 0x800443d3, &(0x7f0000000580)={{0x3, 0x9, 0xffff, 0x7fffffff}, 0x100000000, 0x0, 0x9}) syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vcs\x00', 0x280200, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\xf6', 0x1ff) ioctl$RTC_EPOCH_READ(r1, 0x8008700d, &(0x7f0000000280)) getsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000300)=0xffff, &(0x7f0000000140)=0x4) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) bind$ax25(r0, &(0x7f0000000340)={{0x3, @null, 0x5}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x80000, 0x10064) r3 = openat$cgroup_procs(r2, &(0x7f0000000100)='cgroup.procs\x00', 0x2, 0x0) write$P9_RCLUNK(r1, &(0x7f00000001c0)={0x7, 0x79, 0x1}, 0x7) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) write$cgroup_pid(r3, &(0x7f0000000640), 0x12) 11:44:12 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000000)="11dca5055e0bcfe47bf070") socket$nl_route(0x10, 0x3, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = gettid() tkill(r1, 0x3b) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000400)) 11:44:12 executing program 0: r0 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000240)={0x0, 0x9, 0x1, {0xb, @sdr={0x0, 0x1}}}) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000440)={0x0, 0x1ff, 0x1, {0xb, @raw_data="b57ec6e2ccfebc2f19650bb2b17372c05fea81c70a61a58b97c5bffa8f3ff22ef5e44f8d5bcd9a7e6ad039656c778e3defde487514c27a53e5ab19e7d988086662bc7d2936c0ce17f57929fe03c491a499d671387a8c4a9d52f2fa0f12b0c8a6fbac0bf52fe8075949b6f554aad4d9906746094746213d701bdbfdddfab15780f0ff892ac680cdf8d58b6eec86af9447e96b23570e54caa7549caa341c121bd9f0d43abff4054dc2ade5aa89ec0521282cbd701f60913b7986f0199bcfb06c4d3b1bf98e836e40ac"}}) [ 435.190113] protocol 88fb is buggy, dev hsr_slave_0 [ 435.195227] protocol 88fb is buggy, dev hsr_slave_1 11:44:15 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000000)="5500000019007f5300fe01b2a4a280930a60ffff00a84302910000003900090008000c00060000f3180015e005000600000000dc1320d5440700000000", 0x3d}], 0x1}, 0x0) r0 = socket(0x1000000010, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f00000000c0), 0x492492492492191, 0x0) r1 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r1) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x38) ptrace$cont(0x18, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) 11:44:15 executing program 5: r0 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000240)={0x0, 0x9, 0x1, {0xb, @sdr={0x0, 0x1}}}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000440)={0x0, 0x1ff, 0x1, {0xb, @raw_data="b57ec6e2ccfebc2f19650bb2b17372c05fea81c70a61a58b97c5bffa8f3ff22ef5e44f8d5bcd9a7e6ad039656c778e3defde487514c27a53e5ab19e7d988086662bc7d2936c0ce17f57929fe03c491a499d671387a8c4a9d52f2fa0f12b0c8a6fbac0bf52fe8075949b6f554aad4d9906746094746213d701bdbfdddfab15780f0ff892ac680cdf8d58b6eec86af9447e96b23570e54caa7549caa341c121bd9f0d43abff4054dc2ade5aa89ec0521282cbd701f60913b7986f0199bcfb06c4d3b1bf98e836e40ac"}}) 11:44:15 executing program 4: sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000000)="5500000019007f5300fe01b2a4a280930a60ffff00a84302910000003900090008000c00060000f3180015e005000600000000dc1320d5440700000000", 0x3d}], 0x1}, 0x0) r0 = socket(0x1000000010, 0x80002, 0x0) sendmmsg$alg(r0, 0x0, 0x0, 0x0) r1 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r1) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x38) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) 11:44:15 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) bpf$PROG_LOAD(0x5, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r0 = gettid() tkill(r0, 0x3b) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000400)) 11:44:15 executing program 1: perf_event_open(&(0x7f0000000440)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x220801, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r0, 0x800443d3, &(0x7f0000000580)={{0x3, 0x9, 0xffff, 0x7fffffff}, 0x100000000, 0x0, 0x9}) syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vcs\x00', 0x280200, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\xf6', 0x1ff) ioctl$RTC_EPOCH_READ(r1, 0x8008700d, &(0x7f0000000280)) getsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000300)=0xffff, &(0x7f0000000140)=0x4) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) bind$ax25(r0, &(0x7f0000000340)={{0x3, @null, 0x5}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x80000, 0x10064) r3 = openat$cgroup_procs(r2, &(0x7f0000000100)='cgroup.procs\x00', 0x2, 0x0) write$P9_RCLUNK(r1, &(0x7f00000001c0)={0x7, 0x79, 0x1}, 0x7) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) write$cgroup_pid(r3, &(0x7f0000000640), 0x12) 11:44:15 executing program 0: r0 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000240)={0x0, 0x9, 0x1, {0xb, @sdr={0x0, 0x1}}}) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000440)={0x0, 0x1ff, 0x1, {0xb, @raw_data="b57ec6e2ccfebc2f19650bb2b17372c05fea81c70a61a58b97c5bffa8f3ff22ef5e44f8d5bcd9a7e6ad039656c778e3defde487514c27a53e5ab19e7d988086662bc7d2936c0ce17f57929fe03c491a499d671387a8c4a9d52f2fa0f12b0c8a6fbac0bf52fe8075949b6f554aad4d9906746094746213d701bdbfdddfab15780f0ff892ac680cdf8d58b6eec86af9447e96b23570e54caa7549caa341c121bd9f0d43abff4054dc2ade5aa89ec0521282cbd701f60913b7986f0199bcfb06c4d3b1bf98e836e40ac"}}) 11:44:15 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) bpf$PROG_LOAD(0x5, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r0 = gettid() tkill(r0, 0x3b) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000400)) 11:44:15 executing program 0: r0 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000240)={0x0, 0x9, 0x1, {0xb, @sdr={0x0, 0x1}}}) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000440)={0x0, 0x1ff, 0x1, {0xb, @raw_data="b57ec6e2ccfebc2f19650bb2b17372c05fea81c70a61a58b97c5bffa8f3ff22ef5e44f8d5bcd9a7e6ad039656c778e3defde487514c27a53e5ab19e7d988086662bc7d2936c0ce17f57929fe03c491a499d671387a8c4a9d52f2fa0f12b0c8a6fbac0bf52fe8075949b6f554aad4d9906746094746213d701bdbfdddfab15780f0ff892ac680cdf8d58b6eec86af9447e96b23570e54caa7549caa341c121bd9f0d43abff4054dc2ade5aa89ec0521282cbd701f60913b7986f0199bcfb06c4d3b1bf98e836e40ac"}}) 11:44:15 executing program 5: r0 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000240)={0x0, 0x9, 0x1, {0xb, @sdr={0x0, 0x1}}}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000440)={0x0, 0x1ff, 0x1, {0xb, @raw_data="b57ec6e2ccfebc2f19650bb2b17372c05fea81c70a61a58b97c5bffa8f3ff22ef5e44f8d5bcd9a7e6ad039656c778e3defde487514c27a53e5ab19e7d988086662bc7d2936c0ce17f57929fe03c491a499d671387a8c4a9d52f2fa0f12b0c8a6fbac0bf52fe8075949b6f554aad4d9906746094746213d701bdbfdddfab15780f0ff892ac680cdf8d58b6eec86af9447e96b23570e54caa7549caa341c121bd9f0d43abff4054dc2ade5aa89ec0521282cbd701f60913b7986f0199bcfb06c4d3b1bf98e836e40ac"}}) 11:44:15 executing program 1: perf_event_open(&(0x7f0000000440)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x220801, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r0, 0x800443d3, &(0x7f0000000580)={{0x3, 0x9, 0xffff, 0x7fffffff}, 0x100000000, 0x0, 0x9}) syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vcs\x00', 0x280200, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\xf6', 0x1ff) ioctl$RTC_EPOCH_READ(r1, 0x8008700d, &(0x7f0000000280)) getsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000300)=0xffff, &(0x7f0000000140)=0x4) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) bind$ax25(r0, &(0x7f0000000340)={{0x3, @null, 0x5}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x80000, 0x10064) r3 = openat$cgroup_procs(r2, &(0x7f0000000100)='cgroup.procs\x00', 0x2, 0x0) write$P9_RCLUNK(r1, &(0x7f00000001c0)={0x7, 0x79, 0x1}, 0x7) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) write$cgroup_pid(r3, &(0x7f0000000640), 0x12) 11:44:15 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) bpf$PROG_LOAD(0x5, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0x7, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d64050000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r0 = gettid() tkill(r0, 0x3b) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000400)) 11:44:15 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) bpf$PROG_LOAD(0x5, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0x7, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d64050000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r0 = gettid() tkill(r0, 0x3b) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000400)) 11:44:15 executing program 5: r0 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000240)={0x0, 0x9, 0x1, {0xb, @sdr={0x0, 0x1}}}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000440)={0x0, 0x1ff, 0x1, {0xb, @raw_data="b57ec6e2ccfebc2f19650bb2b17372c05fea81c70a61a58b97c5bffa8f3ff22ef5e44f8d5bcd9a7e6ad039656c778e3defde487514c27a53e5ab19e7d988086662bc7d2936c0ce17f57929fe03c491a499d671387a8c4a9d52f2fa0f12b0c8a6fbac0bf52fe8075949b6f554aad4d9906746094746213d701bdbfdddfab15780f0ff892ac680cdf8d58b6eec86af9447e96b23570e54caa7549caa341c121bd9f0d43abff4054dc2ade5aa89ec0521282cbd701f60913b7986f0199bcfb06c4d3b1bf98e836e40ac"}}) [ 439.030151] net_ratelimit: 20 callbacks suppressed [ 439.030156] protocol 88fb is buggy, dev hsr_slave_0 [ 439.040189] protocol 88fb is buggy, dev hsr_slave_1 [ 439.350107] protocol 88fb is buggy, dev hsr_slave_0 [ 439.355177] protocol 88fb is buggy, dev hsr_slave_1 [ 439.750105] protocol 88fb is buggy, dev hsr_slave_0 [ 439.755181] protocol 88fb is buggy, dev hsr_slave_1 [ 440.150120] protocol 88fb is buggy, dev hsr_slave_0 [ 440.155234] protocol 88fb is buggy, dev hsr_slave_1 [ 440.390089] protocol 88fb is buggy, dev hsr_slave_0 [ 440.395182] protocol 88fb is buggy, dev hsr_slave_1 11:44:18 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000000)="5500000019007f5300fe01b2a4a280930a60ffff00a84302910000003900090008000c00060000f3180015e005000600000000dc1320d5440700000000", 0x3d}], 0x1}, 0x0) r0 = socket(0x1000000010, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f00000000c0), 0x492492492492191, 0x0) r1 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r1) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x38) ptrace$cont(0x18, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) 11:44:18 executing program 0: r0 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, 0x0) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000440)={0x0, 0x1ff, 0x1, {0xb, @raw_data="b57ec6e2ccfebc2f19650bb2b17372c05fea81c70a61a58b97c5bffa8f3ff22ef5e44f8d5bcd9a7e6ad039656c778e3defde487514c27a53e5ab19e7d988086662bc7d2936c0ce17f57929fe03c491a499d671387a8c4a9d52f2fa0f12b0c8a6fbac0bf52fe8075949b6f554aad4d9906746094746213d701bdbfdddfab15780f0ff892ac680cdf8d58b6eec86af9447e96b23570e54caa7549caa341c121bd9f0d43abff4054dc2ade5aa89ec0521282cbd701f60913b7986f0199bcfb06c4d3b1bf98e836e40ac"}}) 11:44:18 executing program 1: perf_event_open(&(0x7f0000000440)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x220801, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r0, 0x800443d3, &(0x7f0000000580)={{0x3, 0x9, 0xffff, 0x7fffffff}, 0x100000000, 0x0, 0x9}) syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vcs\x00', 0x280200, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\xf6', 0x1ff) ioctl$RTC_EPOCH_READ(r1, 0x8008700d, &(0x7f0000000280)) getsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000300)=0xffff, &(0x7f0000000140)=0x4) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) bind$ax25(r0, &(0x7f0000000340)={{0x3, @null, 0x5}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x80000, 0x10064) openat$cgroup_procs(r2, &(0x7f0000000100)='cgroup.procs\x00', 0x2, 0x0) write$P9_RCLUNK(r1, &(0x7f00000001c0)={0x7, 0x79, 0x1}, 0x7) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.net/syz1\x00', 0x1ff) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000640), 0x12) 11:44:18 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) bpf$PROG_LOAD(0x5, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0x7, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d64050000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r0 = gettid() tkill(r0, 0x3b) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000400)) 11:44:18 executing program 5: r0 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000440)={0x0, 0x1ff, 0x1, {0xb, @raw_data="b57ec6e2ccfebc2f19650bb2b17372c05fea81c70a61a58b97c5bffa8f3ff22ef5e44f8d5bcd9a7e6ad039656c778e3defde487514c27a53e5ab19e7d988086662bc7d2936c0ce17f57929fe03c491a499d671387a8c4a9d52f2fa0f12b0c8a6fbac0bf52fe8075949b6f554aad4d9906746094746213d701bdbfdddfab15780f0ff892ac680cdf8d58b6eec86af9447e96b23570e54caa7549caa341c121bd9f0d43abff4054dc2ade5aa89ec0521282cbd701f60913b7986f0199bcfb06c4d3b1bf98e836e40ac"}}) 11:44:18 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000000)="11dca5055e0bcfe47bf070") socket$nl_route(0x10, 0x3, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = gettid() tkill(r1, 0x3b) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000400)) 11:44:18 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) bpf$PROG_LOAD(0x5, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xa, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r0 = gettid() tkill(r0, 0x3b) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000400)) 11:44:18 executing program 0: r0 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, 0x0) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000440)={0x0, 0x1ff, 0x1, {0xb, @raw_data="b57ec6e2ccfebc2f19650bb2b17372c05fea81c70a61a58b97c5bffa8f3ff22ef5e44f8d5bcd9a7e6ad039656c778e3defde487514c27a53e5ab19e7d988086662bc7d2936c0ce17f57929fe03c491a499d671387a8c4a9d52f2fa0f12b0c8a6fbac0bf52fe8075949b6f554aad4d9906746094746213d701bdbfdddfab15780f0ff892ac680cdf8d58b6eec86af9447e96b23570e54caa7549caa341c121bd9f0d43abff4054dc2ade5aa89ec0521282cbd701f60913b7986f0199bcfb06c4d3b1bf98e836e40ac"}}) 11:44:18 executing program 5: r0 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000440)={0x0, 0x1ff, 0x1, {0xb, @raw_data="b57ec6e2ccfebc2f19650bb2b17372c05fea81c70a61a58b97c5bffa8f3ff22ef5e44f8d5bcd9a7e6ad039656c778e3defde487514c27a53e5ab19e7d988086662bc7d2936c0ce17f57929fe03c491a499d671387a8c4a9d52f2fa0f12b0c8a6fbac0bf52fe8075949b6f554aad4d9906746094746213d701bdbfdddfab15780f0ff892ac680cdf8d58b6eec86af9447e96b23570e54caa7549caa341c121bd9f0d43abff4054dc2ade5aa89ec0521282cbd701f60913b7986f0199bcfb06c4d3b1bf98e836e40ac"}}) 11:44:18 executing program 1: perf_event_open(&(0x7f0000000440)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x220801, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r0, 0x800443d3, &(0x7f0000000580)={{0x3, 0x9, 0xffff, 0x7fffffff}, 0x100000000, 0x0, 0x9}) syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vcs\x00', 0x280200, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\xf6', 0x1ff) ioctl$RTC_EPOCH_READ(r1, 0x8008700d, &(0x7f0000000280)) getsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000300)=0xffff, &(0x7f0000000140)=0x4) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) bind$ax25(r0, &(0x7f0000000340)={{0x3, @null, 0x5}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x80000, 0x10064) openat$cgroup_procs(r2, &(0x7f0000000100)='cgroup.procs\x00', 0x2, 0x0) write$P9_RCLUNK(r1, &(0x7f00000001c0)={0x7, 0x79, 0x1}, 0x7) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.net/syz1\x00', 0x1ff) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000640), 0x12) 11:44:18 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) bpf$PROG_LOAD(0x5, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xa, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r0 = gettid() tkill(r0, 0x3b) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000400)) 11:44:18 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) socket$nl_route(0x10, 0x3, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = gettid() tkill(r1, 0x3b) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000400)) 11:44:21 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000000)="5500000019007f5300fe01b2a4a280930a60ffff00a84302910000003900090008000c00060000f3180015e005000600000000dc1320d5440700000000", 0x3d}], 0x1}, 0x0) r0 = socket(0x1000000010, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f00000000c0), 0x492492492492191, 0x0) r1 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r1) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x38) ptrace$cont(0x18, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) 11:44:21 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) bpf$PROG_LOAD(0x5, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xa, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r0 = gettid() tkill(r0, 0x3b) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000400)) 11:44:21 executing program 5: r0 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000440)={0x0, 0x1ff, 0x1, {0xb, @raw_data="b57ec6e2ccfebc2f19650bb2b17372c05fea81c70a61a58b97c5bffa8f3ff22ef5e44f8d5bcd9a7e6ad039656c778e3defde487514c27a53e5ab19e7d988086662bc7d2936c0ce17f57929fe03c491a499d671387a8c4a9d52f2fa0f12b0c8a6fbac0bf52fe8075949b6f554aad4d9906746094746213d701bdbfdddfab15780f0ff892ac680cdf8d58b6eec86af9447e96b23570e54caa7549caa341c121bd9f0d43abff4054dc2ade5aa89ec0521282cbd701f60913b7986f0199bcfb06c4d3b1bf98e836e40ac"}}) 11:44:21 executing program 0: r0 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, 0x0) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000440)={0x0, 0x1ff, 0x1, {0xb, @raw_data="b57ec6e2ccfebc2f19650bb2b17372c05fea81c70a61a58b97c5bffa8f3ff22ef5e44f8d5bcd9a7e6ad039656c778e3defde487514c27a53e5ab19e7d988086662bc7d2936c0ce17f57929fe03c491a499d671387a8c4a9d52f2fa0f12b0c8a6fbac0bf52fe8075949b6f554aad4d9906746094746213d701bdbfdddfab15780f0ff892ac680cdf8d58b6eec86af9447e96b23570e54caa7549caa341c121bd9f0d43abff4054dc2ade5aa89ec0521282cbd701f60913b7986f0199bcfb06c4d3b1bf98e836e40ac"}}) 11:44:21 executing program 1: perf_event_open(&(0x7f0000000440)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x220801, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r0, 0x800443d3, &(0x7f0000000580)={{0x3, 0x9, 0xffff, 0x7fffffff}, 0x100000000, 0x0, 0x9}) syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vcs\x00', 0x280200, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\xf6', 0x1ff) ioctl$RTC_EPOCH_READ(r1, 0x8008700d, &(0x7f0000000280)) getsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000300)=0xffff, &(0x7f0000000140)=0x4) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) bind$ax25(r0, &(0x7f0000000340)={{0x3, @null, 0x5}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x80000, 0x10064) openat$cgroup_procs(r2, &(0x7f0000000100)='cgroup.procs\x00', 0x2, 0x0) write$P9_RCLUNK(r1, &(0x7f00000001c0)={0x7, 0x79, 0x1}, 0x7) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.net/syz1\x00', 0x1ff) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000640), 0x12) 11:44:21 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) socket$nl_route(0x10, 0x3, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = gettid() tkill(r1, 0x3b) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000400)) 11:44:21 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) bpf$PROG_LOAD(0x5, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xc, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b700"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r0 = gettid() tkill(r0, 0x3b) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000400)) 11:44:21 executing program 5: r0 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000240)={0x0, 0x0, 0x1, {0xb, @sdr={0x0, 0x1}}}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000440)={0x0, 0x1ff, 0x1, {0xb, @raw_data="b57ec6e2ccfebc2f19650bb2b17372c05fea81c70a61a58b97c5bffa8f3ff22ef5e44f8d5bcd9a7e6ad039656c778e3defde487514c27a53e5ab19e7d988086662bc7d2936c0ce17f57929fe03c491a499d671387a8c4a9d52f2fa0f12b0c8a6fbac0bf52fe8075949b6f554aad4d9906746094746213d701bdbfdddfab15780f0ff892ac680cdf8d58b6eec86af9447e96b23570e54caa7549caa341c121bd9f0d43abff4054dc2ade5aa89ec0521282cbd701f60913b7986f0199bcfb06c4d3b1bf98e836e40ac"}}) 11:44:21 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) bpf$PROG_LOAD(0x5, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xc, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b700"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r0 = gettid() tkill(r0, 0x3b) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000400)) 11:44:21 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000002c0)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000100000002402000020feffff7a0af0fff8ffffff69a4f0ff00000000b7060000000000000744000000000000b7040000100000206a0700fe00000000850000002f000000b70000000a00000095000000000000006458c2c62fc286000389d909a63796c113a80c19aab9d646ae8f51b6cdf0d3253730e711f5969f62c28b22756bedf3cf393d14c46cc4f79fd2b316da4f0de8163f6242fa7323f1740637c48468766af540439f0500f144631ac2f9842e1b346362dcae08c3d1a1fbe96dd87235b44174f7c0343185089ab5119e31975e551558055dc2dce53b95c132e78454c4813681e0688d3a127f7418c6226f4133346c2e6794d952f2bb7938a2c53a0ce68e"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) socket$nl_route(0x10, 0x3, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = gettid() tkill(r1, 0x3b) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000400)) 11:44:21 executing program 0: r0 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000240)={0x0, 0x0, 0x1, {0xb, @sdr={0x0, 0x1}}}) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000440)={0x0, 0x1ff, 0x1, {0xb, @raw_data="b57ec6e2ccfebc2f19650bb2b17372c05fea81c70a61a58b97c5bffa8f3ff22ef5e44f8d5bcd9a7e6ad039656c778e3defde487514c27a53e5ab19e7d988086662bc7d2936c0ce17f57929fe03c491a499d671387a8c4a9d52f2fa0f12b0c8a6fbac0bf52fe8075949b6f554aad4d9906746094746213d701bdbfdddfab15780f0ff892ac680cdf8d58b6eec86af9447e96b23570e54caa7549caa341c121bd9f0d43abff4054dc2ade5aa89ec0521282cbd701f60913b7986f0199bcfb06c4d3b1bf98e836e40ac"}}) 11:44:21 executing program 1: perf_event_open(&(0x7f0000000440)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x220801, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r0, 0x800443d3, &(0x7f0000000580)={{0x3, 0x9, 0xffff, 0x7fffffff}, 0x100000000, 0x0, 0x9}) syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vcs\x00', 0x280200, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\xf6', 0x1ff) ioctl$RTC_EPOCH_READ(r1, 0x8008700d, &(0x7f0000000280)) getsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000300)=0xffff, &(0x7f0000000140)=0x4) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) bind$ax25(r0, &(0x7f0000000340)={{0x3, @null, 0x5}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x80000, 0x10064) r3 = openat$cgroup_procs(r2, &(0x7f0000000100)='cgroup.procs\x00', 0x2, 0x0) write$P9_RCLUNK(r1, &(0x7f00000001c0)={0x7, 0x79, 0x1}, 0x7) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.net/syz1\x00', 0x1ff) write$cgroup_pid(r3, 0x0, 0x0) [ 444.310081] net_ratelimit: 20 callbacks suppressed [ 444.310085] protocol 88fb is buggy, dev hsr_slave_0 [ 444.320120] protocol 88fb is buggy, dev hsr_slave_1 [ 444.560117] protocol 88fb is buggy, dev hsr_slave_0 [ 444.565379] protocol 88fb is buggy, dev hsr_slave_1 [ 444.640168] protocol 88fb is buggy, dev hsr_slave_0 [ 444.645405] protocol 88fb is buggy, dev hsr_slave_1 [ 445.270141] protocol 88fb is buggy, dev hsr_slave_0 [ 445.275235] protocol 88fb is buggy, dev hsr_slave_1 [ 445.590124] protocol 88fb is buggy, dev hsr_slave_0 [ 445.595369] protocol 88fb is buggy, dev hsr_slave_1 11:44:24 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000000)="5500000019007f5300fe01b2a4a280930a60ffff00a84302910000003900090008000c00060000f3180015e005000600000000dc1320d5440700000000", 0x3d}], 0x1}, 0x0) r0 = socket(0x1000000010, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f00000000c0), 0x492492492492191, 0x0) r1 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r1) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x38) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xffffffffffffffff, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) 11:44:24 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) bpf$PROG_LOAD(0x5, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xc, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b700"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r0 = gettid() tkill(r0, 0x3b) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000400)) 11:44:24 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = gettid() tkill(r1, 0x3b) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000400)) 11:44:24 executing program 5: r0 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000240)={0x0, 0x0, 0x1, {0xb, @sdr={0x0, 0x1}}}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000440)={0x0, 0x1ff, 0x1, {0xb, @raw_data="b57ec6e2ccfebc2f19650bb2b17372c05fea81c70a61a58b97c5bffa8f3ff22ef5e44f8d5bcd9a7e6ad039656c778e3defde487514c27a53e5ab19e7d988086662bc7d2936c0ce17f57929fe03c491a499d671387a8c4a9d52f2fa0f12b0c8a6fbac0bf52fe8075949b6f554aad4d9906746094746213d701bdbfdddfab15780f0ff892ac680cdf8d58b6eec86af9447e96b23570e54caa7549caa341c121bd9f0d43abff4054dc2ade5aa89ec0521282cbd701f60913b7986f0199bcfb06c4d3b1bf98e836e40ac"}}) 11:44:24 executing program 0: r0 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000240)={0x0, 0x0, 0x1, {0xb, @sdr={0x0, 0x1}}}) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000440)={0x0, 0x1ff, 0x1, {0xb, @raw_data="b57ec6e2ccfebc2f19650bb2b17372c05fea81c70a61a58b97c5bffa8f3ff22ef5e44f8d5bcd9a7e6ad039656c778e3defde487514c27a53e5ab19e7d988086662bc7d2936c0ce17f57929fe03c491a499d671387a8c4a9d52f2fa0f12b0c8a6fbac0bf52fe8075949b6f554aad4d9906746094746213d701bdbfdddfab15780f0ff892ac680cdf8d58b6eec86af9447e96b23570e54caa7549caa341c121bd9f0d43abff4054dc2ade5aa89ec0521282cbd701f60913b7986f0199bcfb06c4d3b1bf98e836e40ac"}}) 11:44:24 executing program 1: perf_event_open(&(0x7f0000000440)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x220801, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r0, 0x800443d3, &(0x7f0000000580)={{0x3, 0x9, 0xffff, 0x7fffffff}, 0x100000000, 0x0, 0x9}) syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vcs\x00', 0x280200, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\xf6', 0x1ff) ioctl$RTC_EPOCH_READ(r1, 0x8008700d, &(0x7f0000000280)) getsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000300)=0xffff, &(0x7f0000000140)=0x4) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) bind$ax25(r0, &(0x7f0000000340)={{0x3, @null, 0x5}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x80000, 0x10064) r3 = openat$cgroup_procs(r2, &(0x7f0000000100)='cgroup.procs\x00', 0x2, 0x0) write$P9_RCLUNK(r1, &(0x7f00000001c0)={0x7, 0x79, 0x1}, 0x7) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.net/syz1\x00', 0x1ff) write$cgroup_pid(r3, 0x0, 0x0) 11:44:24 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) bpf$PROG_LOAD(0x5, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xd, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b70000000000000095"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r0 = gettid() tkill(r0, 0x3b) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000400)) 11:44:24 executing program 1: perf_event_open(&(0x7f0000000440)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x220801, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r0, 0x800443d3, &(0x7f0000000580)={{0x3, 0x9, 0xffff, 0x7fffffff}, 0x100000000, 0x0, 0x9}) syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vcs\x00', 0x280200, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\xf6', 0x1ff) ioctl$RTC_EPOCH_READ(r1, 0x8008700d, &(0x7f0000000280)) getsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000300)=0xffff, &(0x7f0000000140)=0x4) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) bind$ax25(r0, &(0x7f0000000340)={{0x3, @null, 0x5}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x80000, 0x10064) r3 = openat$cgroup_procs(r2, &(0x7f0000000100)='cgroup.procs\x00', 0x2, 0x0) write$P9_RCLUNK(r1, &(0x7f00000001c0)={0x7, 0x79, 0x1}, 0x7) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.net/syz1\x00', 0x1ff) write$cgroup_pid(r3, 0x0, 0x0) 11:44:24 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) bpf$PROG_LOAD(0x5, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xd, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b70000000000000095"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r0 = gettid() tkill(r0, 0x3b) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000400)) 11:44:24 executing program 5: r0 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000240)={0x0, 0x0, 0x1, {0xb, @sdr={0x0, 0x1}}}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000440)={0x0, 0x1ff, 0x1, {0xb, @raw_data="b57ec6e2ccfebc2f19650bb2b17372c05fea81c70a61a58b97c5bffa8f3ff22ef5e44f8d5bcd9a7e6ad039656c778e3defde487514c27a53e5ab19e7d988086662bc7d2936c0ce17f57929fe03c491a499d671387a8c4a9d52f2fa0f12b0c8a6fbac0bf52fe8075949b6f554aad4d9906746094746213d701bdbfdddfab15780f0ff892ac680cdf8d58b6eec86af9447e96b23570e54caa7549caa341c121bd9f0d43abff4054dc2ade5aa89ec0521282cbd701f60913b7986f0199bcfb06c4d3b1bf98e836e40ac"}}) 11:44:24 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) bpf$PROG_LOAD(0x5, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xd, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b70000000000000095"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r0 = gettid() tkill(r0, 0x3b) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000400)) 11:44:24 executing program 0: r0 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000240)={0x0, 0x0, 0x1, {0xb, @sdr={0x0, 0x1}}}) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000440)={0x0, 0x1ff, 0x1, {0xb, @raw_data="b57ec6e2ccfebc2f19650bb2b17372c05fea81c70a61a58b97c5bffa8f3ff22ef5e44f8d5bcd9a7e6ad039656c778e3defde487514c27a53e5ab19e7d988086662bc7d2936c0ce17f57929fe03c491a499d671387a8c4a9d52f2fa0f12b0c8a6fbac0bf52fe8075949b6f554aad4d9906746094746213d701bdbfdddfab15780f0ff892ac680cdf8d58b6eec86af9447e96b23570e54caa7549caa341c121bd9f0d43abff4054dc2ade5aa89ec0521282cbd701f60913b7986f0199bcfb06c4d3b1bf98e836e40ac"}}) [ 449.430138] net_ratelimit: 20 callbacks suppressed [ 449.430142] protocol 88fb is buggy, dev hsr_slave_0 [ 449.440294] protocol 88fb is buggy, dev hsr_slave_1 [ 449.750141] protocol 88fb is buggy, dev hsr_slave_0 [ 449.755414] protocol 88fb is buggy, dev hsr_slave_1 [ 450.150151] protocol 88fb is buggy, dev hsr_slave_0 [ 450.155323] protocol 88fb is buggy, dev hsr_slave_1 11:44:27 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000000)="5500000019007f5300fe01b2a4a280930a60ffff00a84302910000003900090008000c00060000f3180015e005000600000000dc1320d5440700000000", 0x3d}], 0x1}, 0x0) r0 = socket(0x1000000010, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f00000000c0), 0x492492492492191, 0x0) r1 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r1) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x38) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xffffffffffffffff, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) 11:44:27 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = gettid() tkill(r1, 0x3b) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000400)) 11:44:27 executing program 5: r0 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000240)={0x0, 0x9, 0x0, {0xb, @sdr={0x0, 0x1}}}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000440)={0x0, 0x1ff, 0x1, {0xb, @raw_data="b57ec6e2ccfebc2f19650bb2b17372c05fea81c70a61a58b97c5bffa8f3ff22ef5e44f8d5bcd9a7e6ad039656c778e3defde487514c27a53e5ab19e7d988086662bc7d2936c0ce17f57929fe03c491a499d671387a8c4a9d52f2fa0f12b0c8a6fbac0bf52fe8075949b6f554aad4d9906746094746213d701bdbfdddfab15780f0ff892ac680cdf8d58b6eec86af9447e96b23570e54caa7549caa341c121bd9f0d43abff4054dc2ade5aa89ec0521282cbd701f60913b7986f0199bcfb06c4d3b1bf98e836e40ac"}}) 11:44:27 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) bpf$PROG_LOAD(0x5, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xd, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r0 = gettid() tkill(r0, 0x3b) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000400)) 11:44:27 executing program 0: r0 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000240)={0x0, 0x9, 0x0, {0xb, @sdr={0x0, 0x1}}}) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000440)={0x0, 0x1ff, 0x1, {0xb, @raw_data="b57ec6e2ccfebc2f19650bb2b17372c05fea81c70a61a58b97c5bffa8f3ff22ef5e44f8d5bcd9a7e6ad039656c778e3defde487514c27a53e5ab19e7d988086662bc7d2936c0ce17f57929fe03c491a499d671387a8c4a9d52f2fa0f12b0c8a6fbac0bf52fe8075949b6f554aad4d9906746094746213d701bdbfdddfab15780f0ff892ac680cdf8d58b6eec86af9447e96b23570e54caa7549caa341c121bd9f0d43abff4054dc2ade5aa89ec0521282cbd701f60913b7986f0199bcfb06c4d3b1bf98e836e40ac"}}) 11:44:27 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = gettid() tkill(r1, 0x3b) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000400)) 11:44:27 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) bpf$PROG_LOAD(0x5, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xd, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r0 = gettid() tkill(r0, 0x3b) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000400)) 11:44:27 executing program 0: r0 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000240)={0x0, 0x9, 0x0, {0xb, @sdr={0x0, 0x1}}}) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000440)={0x0, 0x1ff, 0x1, {0xb, @raw_data="b57ec6e2ccfebc2f19650bb2b17372c05fea81c70a61a58b97c5bffa8f3ff22ef5e44f8d5bcd9a7e6ad039656c778e3defde487514c27a53e5ab19e7d988086662bc7d2936c0ce17f57929fe03c491a499d671387a8c4a9d52f2fa0f12b0c8a6fbac0bf52fe8075949b6f554aad4d9906746094746213d701bdbfdddfab15780f0ff892ac680cdf8d58b6eec86af9447e96b23570e54caa7549caa341c121bd9f0d43abff4054dc2ade5aa89ec0521282cbd701f60913b7986f0199bcfb06c4d3b1bf98e836e40ac"}}) 11:44:27 executing program 5: r0 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000240)={0x0, 0x9, 0x0, {0xb, @sdr={0x0, 0x1}}}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000440)={0x0, 0x1ff, 0x1, {0xb, @raw_data="b57ec6e2ccfebc2f19650bb2b17372c05fea81c70a61a58b97c5bffa8f3ff22ef5e44f8d5bcd9a7e6ad039656c778e3defde487514c27a53e5ab19e7d988086662bc7d2936c0ce17f57929fe03c491a499d671387a8c4a9d52f2fa0f12b0c8a6fbac0bf52fe8075949b6f554aad4d9906746094746213d701bdbfdddfab15780f0ff892ac680cdf8d58b6eec86af9447e96b23570e54caa7549caa341c121bd9f0d43abff4054dc2ade5aa89ec0521282cbd701f60913b7986f0199bcfb06c4d3b1bf98e836e40ac"}}) 11:44:27 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) bpf$PROG_LOAD(0x5, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xd, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r0 = gettid() tkill(r0, 0x3b) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000400)) 11:44:27 executing program 4: r0 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) ioctl$VIDIOC_STREAMOFF(r0, 0xc0205647, &(0x7f0000000180)) 11:44:27 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r0, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000000)=""/13, 0xd}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x7}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0xfe79, 0x0, 0x0, 0x800e00516) shutdown(r0, 0x0) r2 = dup(r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = dup2(r2, r3) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x50, 0x0, 0x0) recvfrom$inet(r4, 0x0, 0x4a8, 0x0, 0x0, 0x800e0051d) shutdown(r3, 0x0) [ 450.560111] protocol 88fb is buggy, dev hsr_slave_0 [ 450.565281] protocol 88fb is buggy, dev hsr_slave_1 [ 450.790136] protocol 88fb is buggy, dev hsr_slave_0 [ 450.795281] protocol 88fb is buggy, dev hsr_slave_1 11:44:30 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000000)="5500000019007f5300fe01b2a4a280930a60ffff00a84302910000003900090008000c00060000f3180015e005000600000000dc1320d5440700000000", 0x3d}], 0x1}, 0x0) r0 = socket(0x1000000010, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f00000000c0), 0x492492492492191, 0x0) r1 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r1) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x38) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xffffffffffffffff, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) 11:44:30 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) bpf$PROG_LOAD(0x5, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xd, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b70000000000000095000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r0 = gettid() tkill(r0, 0x3b) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000400)) 11:44:30 executing program 0: r0 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000240)={0x0, 0x9, 0x0, {0xb, @sdr={0x0, 0x1}}}) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000440)={0x0, 0x1ff, 0x1, {0xb, @raw_data="b57ec6e2ccfebc2f19650bb2b17372c05fea81c70a61a58b97c5bffa8f3ff22ef5e44f8d5bcd9a7e6ad039656c778e3defde487514c27a53e5ab19e7d988086662bc7d2936c0ce17f57929fe03c491a499d671387a8c4a9d52f2fa0f12b0c8a6fbac0bf52fe8075949b6f554aad4d9906746094746213d701bdbfdddfab15780f0ff892ac680cdf8d58b6eec86af9447e96b23570e54caa7549caa341c121bd9f0d43abff4054dc2ade5aa89ec0521282cbd701f60913b7986f0199bcfb06c4d3b1bf98e836e40ac"}}) 11:44:30 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r0, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000000)=""/13, 0xd}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x8}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0xfe79, 0x0, 0x0, 0x800e00516) shutdown(r0, 0x0) r2 = dup(r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = dup2(r2, r3) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x50, &(0x7f0000000100)={0x0, {{0xffffffffffffff3a, 0x2}}}, 0x31b) recvfrom$inet(r4, 0x0, 0x4a8, 0x0, 0x0, 0x800e0051d) shutdown(r3, 0x0) 11:44:30 executing program 5: r0 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000240)={0x0, 0x9, 0x0, {0xb, @sdr={0x0, 0x1}}}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000440)={0x0, 0x1ff, 0x1, {0xb, @raw_data="b57ec6e2ccfebc2f19650bb2b17372c05fea81c70a61a58b97c5bffa8f3ff22ef5e44f8d5bcd9a7e6ad039656c778e3defde487514c27a53e5ab19e7d988086662bc7d2936c0ce17f57929fe03c491a499d671387a8c4a9d52f2fa0f12b0c8a6fbac0bf52fe8075949b6f554aad4d9906746094746213d701bdbfdddfab15780f0ff892ac680cdf8d58b6eec86af9447e96b23570e54caa7549caa341c121bd9f0d43abff4054dc2ade5aa89ec0521282cbd701f60913b7986f0199bcfb06c4d3b1bf98e836e40ac"}}) 11:44:30 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r0, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000000)=""/13, 0xd}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x8}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0xfe79, 0x0, 0x0, 0x800e00516) shutdown(r0, 0x0) r2 = dup(r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) dup2(r2, r3) recvmsg(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000240)=""/113, 0x71}, {0x0}], 0x2}, 0x0) shutdown(r3, 0x0) 11:44:30 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) bpf$PROG_LOAD(0x5, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xd, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b70000000000000095000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r0 = gettid() tkill(r0, 0x3b) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000400)) 11:44:30 executing program 5: r0 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000240)={0x0, 0x9, 0x1, {0x0, @sdr={0x0, 0x1}}}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000440)={0x0, 0x1ff, 0x1, {0xb, @raw_data="b57ec6e2ccfebc2f19650bb2b17372c05fea81c70a61a58b97c5bffa8f3ff22ef5e44f8d5bcd9a7e6ad039656c778e3defde487514c27a53e5ab19e7d988086662bc7d2936c0ce17f57929fe03c491a499d671387a8c4a9d52f2fa0f12b0c8a6fbac0bf52fe8075949b6f554aad4d9906746094746213d701bdbfdddfab15780f0ff892ac680cdf8d58b6eec86af9447e96b23570e54caa7549caa341c121bd9f0d43abff4054dc2ade5aa89ec0521282cbd701f60913b7986f0199bcfb06c4d3b1bf98e836e40ac"}}) 11:44:30 executing program 0: r0 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000240)={0x0, 0x9, 0x1, {0x0, @sdr={0x0, 0x1}}}) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000440)={0x0, 0x1ff, 0x1, {0xb, @raw_data="b57ec6e2ccfebc2f19650bb2b17372c05fea81c70a61a58b97c5bffa8f3ff22ef5e44f8d5bcd9a7e6ad039656c778e3defde487514c27a53e5ab19e7d988086662bc7d2936c0ce17f57929fe03c491a499d671387a8c4a9d52f2fa0f12b0c8a6fbac0bf52fe8075949b6f554aad4d9906746094746213d701bdbfdddfab15780f0ff892ac680cdf8d58b6eec86af9447e96b23570e54caa7549caa341c121bd9f0d43abff4054dc2ade5aa89ec0521282cbd701f60913b7986f0199bcfb06c4d3b1bf98e836e40ac"}}) 11:44:30 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) bpf$PROG_LOAD(0x5, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xd, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b70000000000000095000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r0 = gettid() tkill(r0, 0x3b) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000400)) 11:44:30 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) bpf$PROG_LOAD(0x5, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r0 = gettid() tkill(r0, 0x3b) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000400)) 11:44:30 executing program 5: r0 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000240)={0x0, 0x9, 0x1, {0x0, @sdr={0x0, 0x1}}}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000440)={0x0, 0x1ff, 0x1, {0xb, @raw_data="b57ec6e2ccfebc2f19650bb2b17372c05fea81c70a61a58b97c5bffa8f3ff22ef5e44f8d5bcd9a7e6ad039656c778e3defde487514c27a53e5ab19e7d988086662bc7d2936c0ce17f57929fe03c491a499d671387a8c4a9d52f2fa0f12b0c8a6fbac0bf52fe8075949b6f554aad4d9906746094746213d701bdbfdddfab15780f0ff892ac680cdf8d58b6eec86af9447e96b23570e54caa7549caa341c121bd9f0d43abff4054dc2ade5aa89ec0521282cbd701f60913b7986f0199bcfb06c4d3b1bf98e836e40ac"}}) [ 454.710215] net_ratelimit: 20 callbacks suppressed [ 454.710220] protocol 88fb is buggy, dev hsr_slave_0 [ 454.720337] protocol 88fb is buggy, dev hsr_slave_1 [ 454.950140] protocol 88fb is buggy, dev hsr_slave_0 [ 454.955358] protocol 88fb is buggy, dev hsr_slave_1 [ 455.040151] protocol 88fb is buggy, dev hsr_slave_0 [ 455.045326] protocol 88fb is buggy, dev hsr_slave_1 [ 455.670241] protocol 88fb is buggy, dev hsr_slave_0 [ 455.675335] protocol 88fb is buggy, dev hsr_slave_1 [ 455.990157] protocol 88fb is buggy, dev hsr_slave_0 [ 455.995264] protocol 88fb is buggy, dev hsr_slave_1 11:44:33 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000000)="5500000019007f5300fe01b2a4a280930a60ffff00a84302910000003900090008000c00060000f3180015e005000600000000dc1320d5440700000000", 0x3d}], 0x1}, 0x0) r0 = socket(0x1000000010, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f00000000c0), 0x492492492492191, 0x0) r1 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r1) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x38) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) 11:44:33 executing program 0: r0 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000240)={0x0, 0x9, 0x1, {0x0, @sdr={0x0, 0x1}}}) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000440)={0x0, 0x1ff, 0x1, {0xb, @raw_data="b57ec6e2ccfebc2f19650bb2b17372c05fea81c70a61a58b97c5bffa8f3ff22ef5e44f8d5bcd9a7e6ad039656c778e3defde487514c27a53e5ab19e7d988086662bc7d2936c0ce17f57929fe03c491a499d671387a8c4a9d52f2fa0f12b0c8a6fbac0bf52fe8075949b6f554aad4d9906746094746213d701bdbfdddfab15780f0ff892ac680cdf8d58b6eec86af9447e96b23570e54caa7549caa341c121bd9f0d43abff4054dc2ade5aa89ec0521282cbd701f60913b7986f0199bcfb06c4d3b1bf98e836e40ac"}}) 11:44:33 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) bpf$PROG_LOAD(0x5, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r0 = gettid() tkill(r0, 0x3b) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000400)) 11:44:33 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r0, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000000)=""/13, 0xd}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x8}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0xfe79, 0x0, 0x0, 0x800e00516) shutdown(r0, 0x0) r2 = dup(r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = dup2(r2, r3) getrusage(0xffffffffffffffff, &(0x7f0000000840)) recvfrom$inet(r4, 0x0, 0x4a8, 0x0, 0x0, 0x800e0051d) shutdown(r3, 0x0) 11:44:33 executing program 5: r0 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000240)={0x0, 0x9, 0x1, {0x0, @sdr={0x0, 0x1}}}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000440)={0x0, 0x1ff, 0x1, {0xb, @raw_data="b57ec6e2ccfebc2f19650bb2b17372c05fea81c70a61a58b97c5bffa8f3ff22ef5e44f8d5bcd9a7e6ad039656c778e3defde487514c27a53e5ab19e7d988086662bc7d2936c0ce17f57929fe03c491a499d671387a8c4a9d52f2fa0f12b0c8a6fbac0bf52fe8075949b6f554aad4d9906746094746213d701bdbfdddfab15780f0ff892ac680cdf8d58b6eec86af9447e96b23570e54caa7549caa341c121bd9f0d43abff4054dc2ade5aa89ec0521282cbd701f60913b7986f0199bcfb06c4d3b1bf98e836e40ac"}}) 11:44:33 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) shutdown(0xffffffffffffffff, 0x0) lseek(r0, 0x0, 0x0) recvfrom$inet(r0, 0x0, 0x10000002c, 0x2, 0x0, 0x800e0054e) shutdown(r0, 0x0) 11:44:33 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) bpf$PROG_LOAD(0x5, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r0 = gettid() tkill(r0, 0x3b) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000400)) 11:44:33 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) bpf$PROG_LOAD(0x5, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) r0 = gettid() tkill(r0, 0x3b) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000400)) 11:44:33 executing program 5: r0 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000240)={0x0, 0x9, 0x1, {0xb, @sdr}}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000440)={0x0, 0x1ff, 0x1, {0xb, @raw_data="b57ec6e2ccfebc2f19650bb2b17372c05fea81c70a61a58b97c5bffa8f3ff22ef5e44f8d5bcd9a7e6ad039656c778e3defde487514c27a53e5ab19e7d988086662bc7d2936c0ce17f57929fe03c491a499d671387a8c4a9d52f2fa0f12b0c8a6fbac0bf52fe8075949b6f554aad4d9906746094746213d701bdbfdddfab15780f0ff892ac680cdf8d58b6eec86af9447e96b23570e54caa7549caa341c121bd9f0d43abff4054dc2ade5aa89ec0521282cbd701f60913b7986f0199bcfb06c4d3b1bf98e836e40ac"}}) 11:44:33 executing program 0: r0 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000240)={0x0, 0x9, 0x1, {0x0, @sdr={0x0, 0x1}}}) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000440)={0x0, 0x1ff, 0x1, {0xb, @raw_data="b57ec6e2ccfebc2f19650bb2b17372c05fea81c70a61a58b97c5bffa8f3ff22ef5e44f8d5bcd9a7e6ad039656c778e3defde487514c27a53e5ab19e7d988086662bc7d2936c0ce17f57929fe03c491a499d671387a8c4a9d52f2fa0f12b0c8a6fbac0bf52fe8075949b6f554aad4d9906746094746213d701bdbfdddfab15780f0ff892ac680cdf8d58b6eec86af9447e96b23570e54caa7549caa341c121bd9f0d43abff4054dc2ade5aa89ec0521282cbd701f60913b7986f0199bcfb06c4d3b1bf98e836e40ac"}}) 11:44:33 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000300)="3fad", 0x2) 11:44:33 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) bpf$PROG_LOAD(0x5, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) r0 = gettid() tkill(r0, 0x3b) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000400)) 11:44:36 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000000)="5500000019007f5300fe01b2a4a280930a60ffff00a84302910000003900090008000c00060000f3180015e005000600000000dc1320d5440700000000", 0x3d}], 0x1}, 0x0) r0 = socket(0x1000000010, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f00000000c0), 0x492492492492191, 0x0) r1 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r1) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x38) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) 11:44:36 executing program 5: r0 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000240)={0x0, 0x9, 0x1, {0xb, @sdr}}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000440)={0x0, 0x1ff, 0x1, {0xb, @raw_data="b57ec6e2ccfebc2f19650bb2b17372c05fea81c70a61a58b97c5bffa8f3ff22ef5e44f8d5bcd9a7e6ad039656c778e3defde487514c27a53e5ab19e7d988086662bc7d2936c0ce17f57929fe03c491a499d671387a8c4a9d52f2fa0f12b0c8a6fbac0bf52fe8075949b6f554aad4d9906746094746213d701bdbfdddfab15780f0ff892ac680cdf8d58b6eec86af9447e96b23570e54caa7549caa341c121bd9f0d43abff4054dc2ade5aa89ec0521282cbd701f60913b7986f0199bcfb06c4d3b1bf98e836e40ac"}}) 11:44:36 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) bpf$PROG_LOAD(0x5, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) r0 = gettid() tkill(r0, 0x3b) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000400)) 11:44:36 executing program 0: r0 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000240)={0x0, 0x9, 0x1, {0xb, @sdr}}) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000440)={0x0, 0x1ff, 0x1, {0xb, @raw_data="b57ec6e2ccfebc2f19650bb2b17372c05fea81c70a61a58b97c5bffa8f3ff22ef5e44f8d5bcd9a7e6ad039656c778e3defde487514c27a53e5ab19e7d988086662bc7d2936c0ce17f57929fe03c491a499d671387a8c4a9d52f2fa0f12b0c8a6fbac0bf52fe8075949b6f554aad4d9906746094746213d701bdbfdddfab15780f0ff892ac680cdf8d58b6eec86af9447e96b23570e54caa7549caa341c121bd9f0d43abff4054dc2ade5aa89ec0521282cbd701f60913b7986f0199bcfb06c4d3b1bf98e836e40ac"}}) 11:44:36 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f00000000c0)={0x0, 0x5, 0x5}) 11:44:36 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000300)="3fad", 0x2) 11:44:36 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) bpf$PROG_LOAD(0x5, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x70) r0 = gettid() tkill(r0, 0x3b) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000400)) 11:44:36 executing program 1: r0 = memfd_create(&(0x7f0000000000)='/dev/loop#\x00', 0x1) fsetxattr$trusted_overlay_opaque(r0, &(0x7f0000000040)='trusted.overlay.opaque\x00', &(0x7f0000000080)='y\x00', 0x2, 0x1) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) fdatasync(r1) 11:44:36 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net/udp\x00') sendfile(r0, r0, &(0x7f00000000c0)=0x202, 0xdd) 11:44:36 executing program 0: r0 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000240)={0x0, 0x9, 0x1, {0xb, @sdr}}) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000440)={0x0, 0x1ff, 0x1, {0xb, @raw_data="b57ec6e2ccfebc2f19650bb2b17372c05fea81c70a61a58b97c5bffa8f3ff22ef5e44f8d5bcd9a7e6ad039656c778e3defde487514c27a53e5ab19e7d988086662bc7d2936c0ce17f57929fe03c491a499d671387a8c4a9d52f2fa0f12b0c8a6fbac0bf52fe8075949b6f554aad4d9906746094746213d701bdbfdddfab15780f0ff892ac680cdf8d58b6eec86af9447e96b23570e54caa7549caa341c121bd9f0d43abff4054dc2ade5aa89ec0521282cbd701f60913b7986f0199bcfb06c4d3b1bf98e836e40ac"}}) 11:44:36 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) bpf$PROG_LOAD(0x5, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x70) r0 = gettid() tkill(r0, 0x3b) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000400)) 11:44:36 executing program 5: r0 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000240)={0x0, 0x9, 0x1, {0xb, @sdr}}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000440)={0x0, 0x1ff, 0x1, {0xb, @raw_data="b57ec6e2ccfebc2f19650bb2b17372c05fea81c70a61a58b97c5bffa8f3ff22ef5e44f8d5bcd9a7e6ad039656c778e3defde487514c27a53e5ab19e7d988086662bc7d2936c0ce17f57929fe03c491a499d671387a8c4a9d52f2fa0f12b0c8a6fbac0bf52fe8075949b6f554aad4d9906746094746213d701bdbfdddfab15780f0ff892ac680cdf8d58b6eec86af9447e96b23570e54caa7549caa341c121bd9f0d43abff4054dc2ade5aa89ec0521282cbd701f60913b7986f0199bcfb06c4d3b1bf98e836e40ac"}}) [ 459.452282] print_req_error: I/O error, dev loop0, sector 0 [ 459.472221] print_req_error: I/O error, dev loop0, sector 0 [ 459.840115] net_ratelimit: 20 callbacks suppressed [ 459.840119] protocol 88fb is buggy, dev hsr_slave_0 [ 459.850226] protocol 88fb is buggy, dev hsr_slave_1 [ 460.150130] protocol 88fb is buggy, dev hsr_slave_0 [ 460.155473] protocol 88fb is buggy, dev hsr_slave_1 [ 460.560168] protocol 88fb is buggy, dev hsr_slave_0 [ 460.565307] protocol 88fb is buggy, dev hsr_slave_1 [ 460.950101] protocol 88fb is buggy, dev hsr_slave_0 [ 460.955207] protocol 88fb is buggy, dev hsr_slave_1 [ 461.190191] protocol 88fb is buggy, dev hsr_slave_0 [ 461.195477] protocol 88fb is buggy, dev hsr_slave_1 11:44:39 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000000)="5500000019007f5300fe01b2a4a280930a60ffff00a84302910000003900090008000c00060000f3180015e005000600000000dc1320d5440700000000", 0x3d}], 0x1}, 0x0) r0 = socket(0x1000000010, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f00000000c0), 0x492492492492191, 0x0) r1 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r1) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x38) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) 11:44:39 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) bpf$PROG_LOAD(0x5, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x70) r0 = gettid() tkill(r0, 0x3b) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000400)) 11:44:39 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) fcntl$setstatus(r0, 0x4, 0x2000) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000000)=0x2, 0x4) openat$full(0xffffffffffffff9c, 0x0, 0x800, 0x0) connect$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) 11:44:39 executing program 0: r0 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000240)={0x0, 0x9, 0x1, {0xb, @sdr}}) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000440)={0x0, 0x1ff, 0x1, {0xb, @raw_data="b57ec6e2ccfebc2f19650bb2b17372c05fea81c70a61a58b97c5bffa8f3ff22ef5e44f8d5bcd9a7e6ad039656c778e3defde487514c27a53e5ab19e7d988086662bc7d2936c0ce17f57929fe03c491a499d671387a8c4a9d52f2fa0f12b0c8a6fbac0bf52fe8075949b6f554aad4d9906746094746213d701bdbfdddfab15780f0ff892ac680cdf8d58b6eec86af9447e96b23570e54caa7549caa341c121bd9f0d43abff4054dc2ade5aa89ec0521282cbd701f60913b7986f0199bcfb06c4d3b1bf98e836e40ac"}}) 11:44:39 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) fcntl$setstatus(r0, 0x4, 0x2000) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000000)=0x2, 0x4) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) connect$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) 11:44:39 executing program 5: r0 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000240)={0x0, 0x9, 0x1, {0xb, @sdr={0x0, 0x1}}}) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000440)={0x0, 0x1ff, 0x1, {0xb, @raw_data="b57ec6e2ccfebc2f19650bb2b17372c05fea81c70a61a58b97c5bffa8f3ff22ef5e44f8d5bcd9a7e6ad039656c778e3defde487514c27a53e5ab19e7d988086662bc7d2936c0ce17f57929fe03c491a499d671387a8c4a9d52f2fa0f12b0c8a6fbac0bf52fe8075949b6f554aad4d9906746094746213d701bdbfdddfab15780f0ff892ac680cdf8d58b6eec86af9447e96b23570e54caa7549caa341c121bd9f0d43abff4054dc2ade5aa89ec0521282cbd701f60913b7986f0199bcfb06c4d3b1bf98e836e40ac"}}) 11:44:39 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) bpf$PROG_LOAD(0x5, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) gettid() tkill(0x0, 0x3b) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000400)) 11:44:39 executing program 5: r0 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000240)={0x0, 0x9, 0x1, {0xb, @sdr={0x0, 0x1}}}) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000440)={0x0, 0x1ff, 0x1, {0xb, @raw_data="b57ec6e2ccfebc2f19650bb2b17372c05fea81c70a61a58b97c5bffa8f3ff22ef5e44f8d5bcd9a7e6ad039656c778e3defde487514c27a53e5ab19e7d988086662bc7d2936c0ce17f57929fe03c491a499d671387a8c4a9d52f2fa0f12b0c8a6fbac0bf52fe8075949b6f554aad4d9906746094746213d701bdbfdddfab15780f0ff892ac680cdf8d58b6eec86af9447e96b23570e54caa7549caa341c121bd9f0d43abff4054dc2ade5aa89ec0521282cbd701f60913b7986f0199bcfb06c4d3b1bf98e836e40ac"}}) 11:44:39 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) bpf$PROG_LOAD(0x5, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) gettid() tkill(0x0, 0x3b) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000400)) 11:44:39 executing program 0: r0 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000240)={0x0, 0x9, 0x1, {0xb, @sdr={0x0, 0x1}}}) ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000440)={0x0, 0x1ff, 0x1, {0xb, @raw_data="b57ec6e2ccfebc2f19650bb2b17372c05fea81c70a61a58b97c5bffa8f3ff22ef5e44f8d5bcd9a7e6ad039656c778e3defde487514c27a53e5ab19e7d988086662bc7d2936c0ce17f57929fe03c491a499d671387a8c4a9d52f2fa0f12b0c8a6fbac0bf52fe8075949b6f554aad4d9906746094746213d701bdbfdddfab15780f0ff892ac680cdf8d58b6eec86af9447e96b23570e54caa7549caa341c121bd9f0d43abff4054dc2ade5aa89ec0521282cbd701f60913b7986f0199bcfb06c4d3b1bf98e836e40ac"}}) 11:44:39 executing program 5: r0 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000240)={0x0, 0x9, 0x1, {0xb, @sdr={0x0, 0x1}}}) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000440)={0x0, 0x1ff, 0x1, {0xb, @raw_data="b57ec6e2ccfebc2f19650bb2b17372c05fea81c70a61a58b97c5bffa8f3ff22ef5e44f8d5bcd9a7e6ad039656c778e3defde487514c27a53e5ab19e7d988086662bc7d2936c0ce17f57929fe03c491a499d671387a8c4a9d52f2fa0f12b0c8a6fbac0bf52fe8075949b6f554aad4d9906746094746213d701bdbfdddfab15780f0ff892ac680cdf8d58b6eec86af9447e96b23570e54caa7549caa341c121bd9f0d43abff4054dc2ade5aa89ec0521282cbd701f60913b7986f0199bcfb06c4d3b1bf98e836e40ac"}}) 11:44:39 executing program 0: r0 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000240)={0x0, 0x9, 0x1, {0xb, @sdr={0x0, 0x1}}}) ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000440)={0x0, 0x1ff, 0x1, {0xb, @raw_data="b57ec6e2ccfebc2f19650bb2b17372c05fea81c70a61a58b97c5bffa8f3ff22ef5e44f8d5bcd9a7e6ad039656c778e3defde487514c27a53e5ab19e7d988086662bc7d2936c0ce17f57929fe03c491a499d671387a8c4a9d52f2fa0f12b0c8a6fbac0bf52fe8075949b6f554aad4d9906746094746213d701bdbfdddfab15780f0ff892ac680cdf8d58b6eec86af9447e96b23570e54caa7549caa341c121bd9f0d43abff4054dc2ade5aa89ec0521282cbd701f60913b7986f0199bcfb06c4d3b1bf98e836e40ac"}}) [ 465.110145] net_ratelimit: 20 callbacks suppressed [ 465.110150] protocol 88fb is buggy, dev hsr_slave_0 [ 465.120212] protocol 88fb is buggy, dev hsr_slave_1 [ 465.350136] protocol 88fb is buggy, dev hsr_slave_0 [ 465.355248] protocol 88fb is buggy, dev hsr_slave_1 11:44:42 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000000)="5500000019007f5300fe01b2a4a280930a60ffff00a84302910000003900090008000c00060000f3180015e005000600000000dc1320d5440700000000", 0x3d}], 0x1}, 0x0) r0 = socket(0x1000000010, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f00000000c0), 0x492492492492191, 0x0) r1 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r1) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x38) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, 0x0) ptrace$cont(0x9, r2, 0x0, 0x0) 11:44:42 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) bpf$PROG_LOAD(0x5, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) gettid() tkill(0x0, 0x3b) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000400)) 11:44:42 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) r2 = dup2(0xffffffffffffffff, r0) ioctl$VFIO_CHECK_EXTENSION(r2, 0x3b65, 0x7) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) fcntl$setstatus(r1, 0x4, 0x2000) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000000)=0x2, 0x4) syz_emit_ethernet(0x0, 0x0, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x800, 0x0) connect$inet(r1, &(0x7f00000001c0)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r1, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 11:44:42 executing program 0: r0 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000240)={0x0, 0x9, 0x1, {0xb, @sdr={0x0, 0x1}}}) ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000440)={0x0, 0x1ff, 0x1, {0xb, @raw_data="b57ec6e2ccfebc2f19650bb2b17372c05fea81c70a61a58b97c5bffa8f3ff22ef5e44f8d5bcd9a7e6ad039656c778e3defde487514c27a53e5ab19e7d988086662bc7d2936c0ce17f57929fe03c491a499d671387a8c4a9d52f2fa0f12b0c8a6fbac0bf52fe8075949b6f554aad4d9906746094746213d701bdbfdddfab15780f0ff892ac680cdf8d58b6eec86af9447e96b23570e54caa7549caa341c121bd9f0d43abff4054dc2ade5aa89ec0521282cbd701f60913b7986f0199bcfb06c4d3b1bf98e836e40ac"}}) 11:44:42 executing program 5: r0 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000240)={0x0, 0x9, 0x1, {0xb, @sdr={0x0, 0x1}}}) socketpair$unix(0x1, 0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000440)={0x0, 0x1ff, 0x1, {0xb, @raw_data="b57ec6e2ccfebc2f19650bb2b17372c05fea81c70a61a58b97c5bffa8f3ff22ef5e44f8d5bcd9a7e6ad039656c778e3defde487514c27a53e5ab19e7d988086662bc7d2936c0ce17f57929fe03c491a499d671387a8c4a9d52f2fa0f12b0c8a6fbac0bf52fe8075949b6f554aad4d9906746094746213d701bdbfdddfab15780f0ff892ac680cdf8d58b6eec86af9447e96b23570e54caa7549caa341c121bd9f0d43abff4054dc2ade5aa89ec0521282cbd701f60913b7986f0199bcfb06c4d3b1bf98e836e40ac"}}) 11:44:42 executing program 1: mount(0x0, 0x0, 0x0, 0x0, 0x0) capset(&(0x7f0000a31000)={0x19980330}, &(0x7f00009b3000)) open(0x0, 0x0, 0x0) fchdir(0xffffffffffffffff) mknod$loop(&(0x7f00000004c0)='./file0\x00', 0x2002, 0x0) 11:44:42 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) bpf$PROG_LOAD(0x5, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r0 = gettid() tkill(r0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000400)) [ 465.430155] protocol 88fb is buggy, dev hsr_slave_0 [ 465.435375] protocol 88fb is buggy, dev hsr_slave_1 11:44:42 executing program 0: r0 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000240)={0x0, 0x9, 0x1, {0xb, @sdr={0x0, 0x1}}}) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, 0x0) 11:44:42 executing program 5: r0 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000240)={0x0, 0x9, 0x1, {0xb, @sdr={0x0, 0x1}}}) socketpair$unix(0x1, 0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000440)={0x0, 0x1ff, 0x1, {0xb, @raw_data="b57ec6e2ccfebc2f19650bb2b17372c05fea81c70a61a58b97c5bffa8f3ff22ef5e44f8d5bcd9a7e6ad039656c778e3defde487514c27a53e5ab19e7d988086662bc7d2936c0ce17f57929fe03c491a499d671387a8c4a9d52f2fa0f12b0c8a6fbac0bf52fe8075949b6f554aad4d9906746094746213d701bdbfdddfab15780f0ff892ac680cdf8d58b6eec86af9447e96b23570e54caa7549caa341c121bd9f0d43abff4054dc2ade5aa89ec0521282cbd701f60913b7986f0199bcfb06c4d3b1bf98e836e40ac"}}) 11:44:42 executing program 1: mount(0x0, 0x0, 0x0, 0x0, 0x0) capset(&(0x7f0000a31000)={0x19980330}, &(0x7f00009b3000)) open(0x0, 0x0, 0x0) fchdir(0xffffffffffffffff) mknod$loop(&(0x7f00000004c0)='./file0\x00', 0x2002, 0x0) 11:44:42 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) bpf$PROG_LOAD(0x5, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r0 = gettid() tkill(r0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000400)) 11:44:42 executing program 0: r0 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000240)={0x0, 0x9, 0x1, {0xb, @sdr={0x0, 0x1}}}) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, 0x0) [ 466.070115] protocol 88fb is buggy, dev hsr_slave_0 [ 466.075509] protocol 88fb is buggy, dev hsr_slave_1 [ 466.400125] protocol 88fb is buggy, dev hsr_slave_0 [ 466.405351] protocol 88fb is buggy, dev hsr_slave_1 11:44:45 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000000)="5500000019007f5300fe01b2a4a280930a60ffff00a84302910000003900090008000c00060000f3180015e005000600000000dc1320d5440700000000", 0x3d}], 0x1}, 0x0) r0 = socket(0x1000000010, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f00000000c0), 0x492492492492191, 0x0) r1 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r1) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x38) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, 0x0) ptrace$cont(0x9, r2, 0x0, 0x0) 11:44:45 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) bpf$PROG_LOAD(0x5, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r0 = gettid() tkill(r0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000400)) 11:44:45 executing program 1: mount(0x0, 0x0, 0x0, 0x0, 0x0) capset(&(0x7f0000a31000)={0x19980330}, &(0x7f00009b3000)) open(0x0, 0x0, 0x0) fchdir(0xffffffffffffffff) mknod$loop(&(0x7f00000004c0)='./file0\x00', 0x2002, 0x0) 11:44:45 executing program 5: r0 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000240)={0x0, 0x9, 0x1, {0xb, @sdr={0x0, 0x1}}}) socketpair$unix(0x1, 0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000440)={0x0, 0x1ff, 0x1, {0xb, @raw_data="b57ec6e2ccfebc2f19650bb2b17372c05fea81c70a61a58b97c5bffa8f3ff22ef5e44f8d5bcd9a7e6ad039656c778e3defde487514c27a53e5ab19e7d988086662bc7d2936c0ce17f57929fe03c491a499d671387a8c4a9d52f2fa0f12b0c8a6fbac0bf52fe8075949b6f554aad4d9906746094746213d701bdbfdddfab15780f0ff892ac680cdf8d58b6eec86af9447e96b23570e54caa7549caa341c121bd9f0d43abff4054dc2ade5aa89ec0521282cbd701f60913b7986f0199bcfb06c4d3b1bf98e836e40ac"}}) 11:44:45 executing program 0: r0 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000240)={0x0, 0x9, 0x1, {0xb, @sdr={0x0, 0x1}}}) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, 0x0) 11:44:45 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000000)='\\nodevvmnet0$@\x00', 0x0) finit_module(r0, 0x0, 0x0) 11:44:45 executing program 0: r0 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000240)={0x0, 0x9, 0x1, {0xb, @sdr={0x0, 0x1}}}) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000440)={0x0, 0x0, 0x1, {0xb, @raw_data="b57ec6e2ccfebc2f19650bb2b17372c05fea81c70a61a58b97c5bffa8f3ff22ef5e44f8d5bcd9a7e6ad039656c778e3defde487514c27a53e5ab19e7d988086662bc7d2936c0ce17f57929fe03c491a499d671387a8c4a9d52f2fa0f12b0c8a6fbac0bf52fe8075949b6f554aad4d9906746094746213d701bdbfdddfab15780f0ff892ac680cdf8d58b6eec86af9447e96b23570e54caa7549caa341c121bd9f0d43abff4054dc2ade5aa89ec0521282cbd701f60913b7986f0199bcfb06c4d3b1bf98e836e40ac"}}) 11:44:45 executing program 1: mount(0x0, 0x0, 0x0, 0x0, 0x0) capset(&(0x7f0000a31000)={0x19980330}, &(0x7f00009b3000)) open(0x0, 0x0, 0x0) fchdir(0xffffffffffffffff) mknod$loop(&(0x7f00000004c0)='./file0\x00', 0x2002, 0x0) 11:44:45 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) bpf$PROG_LOAD(0x5, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r0 = gettid() tkill(r0, 0x3b) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) 11:44:45 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065cb0400010000000404000001747d60b7030000010000006a0a00fe00000000850000000d000000b700000000000000950000000000000075cdc4b57a0000002f628cee6c478ac7c7f033142f08639100"/146], &(0x7f0000000340)='syzkaller\x00'}, 0x48) 11:44:45 executing program 5: r0 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000240)={0x0, 0x9, 0x1, {0xb, @sdr={0x0, 0x1}}}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000440)={0x0, 0x1ff, 0x1, {0xb, @raw_data="b57ec6e2ccfebc2f19650bb2b17372c05fea81c70a61a58b97c5bffa8f3ff22ef5e44f8d5bcd9a7e6ad039656c778e3defde487514c27a53e5ab19e7d988086662bc7d2936c0ce17f57929fe03c491a499d671387a8c4a9d52f2fa0f12b0c8a6fbac0bf52fe8075949b6f554aad4d9906746094746213d701bdbfdddfab15780f0ff892ac680cdf8d58b6eec86af9447e96b23570e54caa7549caa341c121bd9f0d43abff4054dc2ade5aa89ec0521282cbd701f60913b7986f0199bcfb06c4d3b1bf98e836e40ac"}}) 11:44:45 executing program 1: mount(0x0, 0x0, 0x0, 0x0, 0x0) capset(&(0x7f0000a31000)={0x19980330}, &(0x7f00009b3000)) open(0x0, 0x0, 0x0) mknod$loop(&(0x7f00000004c0)='./file0\x00', 0x2002, 0x0) [ 470.230188] net_ratelimit: 20 callbacks suppressed [ 470.230192] protocol 88fb is buggy, dev hsr_slave_0 [ 470.240232] protocol 88fb is buggy, dev hsr_slave_1 [ 470.550113] protocol 88fb is buggy, dev hsr_slave_0 [ 470.555471] protocol 88fb is buggy, dev hsr_slave_1 [ 470.960111] protocol 88fb is buggy, dev hsr_slave_0 [ 470.965387] protocol 88fb is buggy, dev hsr_slave_1 [ 471.350142] protocol 88fb is buggy, dev hsr_slave_0 [ 471.355418] protocol 88fb is buggy, dev hsr_slave_1 11:44:48 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000000)="5500000019007f5300fe01b2a4a280930a60ffff00a84302910000003900090008000c00060000f3180015e005000600000000dc1320d5440700000000", 0x3d}], 0x1}, 0x0) r0 = socket(0x1000000010, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f00000000c0), 0x492492492492191, 0x0) r1 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r1) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x38) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, 0x0) ptrace$cont(0x9, r2, 0x0, 0x0) 11:44:48 executing program 0: r0 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000240)={0x0, 0x9, 0x1, {0xb, @sdr={0x0, 0x1}}}) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000440)={0x0, 0x0, 0x1, {0xb, @raw_data="b57ec6e2ccfebc2f19650bb2b17372c05fea81c70a61a58b97c5bffa8f3ff22ef5e44f8d5bcd9a7e6ad039656c778e3defde487514c27a53e5ab19e7d988086662bc7d2936c0ce17f57929fe03c491a499d671387a8c4a9d52f2fa0f12b0c8a6fbac0bf52fe8075949b6f554aad4d9906746094746213d701bdbfdddfab15780f0ff892ac680cdf8d58b6eec86af9447e96b23570e54caa7549caa341c121bd9f0d43abff4054dc2ade5aa89ec0521282cbd701f60913b7986f0199bcfb06c4d3b1bf98e836e40ac"}}) 11:44:48 executing program 4: r0 = getpid() r1 = syz_open_dev$sndseq(&(0x7f0000000140)='/dev/snd/seq\x00', 0x0, 0x0) read(r1, &(0x7f0000000200)=""/28, 0x1cc) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000080)={0x1, @time}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r1, 0xc02c5341, &(0x7f0000000340)) timer_create(0x0, &(0x7f0000000100)={0x0, 0x12}, &(0x7f00000001c0)) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r1, 0xc0305302, &(0x7f00000003c0)) timer_settime(0x0, 0x0, &(0x7f0000000240)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) tkill(r0, 0x1000000000013) 11:44:48 executing program 1: mount(0x0, 0x0, 0x0, 0x0, 0x0) capset(&(0x7f0000a31000)={0x19980330}, &(0x7f00009b3000)) mknod$loop(&(0x7f00000004c0)='./file0\x00', 0x2002, 0x0) 11:44:48 executing program 2: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(0x0, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) getuid() fsetxattr$security_ima(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$TUNSETOWNER(0xffffffffffffffff, 0x400454cc, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) r2 = dup(r1) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x0) setsockopt$sock_int(r1, 0x1, 0x21, &(0x7f0000000240), 0x4) syz_emit_ethernet(0x0, 0x0, 0x0) bind$inet6(r1, &(0x7f0000000180)={0xa, 0x4e20}, 0x1c) sendto$inet6(r2, 0x0, 0x0, 0x2000000a, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = open(0x0, 0x20141042, 0x0) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r0, 0x10e, 0x2, &(0x7f0000000140)=0x18, 0x4) ftruncate(r3, 0x80080) sendfile(r2, r3, 0x0, 0x2008000fffffffe) 11:44:48 executing program 5: r0 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000240)={0x0, 0x9, 0x1, {0xb, @sdr={0x0, 0x1}}}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000440)={0x0, 0x1ff, 0x1, {0xb, @raw_data="b57ec6e2ccfebc2f19650bb2b17372c05fea81c70a61a58b97c5bffa8f3ff22ef5e44f8d5bcd9a7e6ad039656c778e3defde487514c27a53e5ab19e7d988086662bc7d2936c0ce17f57929fe03c491a499d671387a8c4a9d52f2fa0f12b0c8a6fbac0bf52fe8075949b6f554aad4d9906746094746213d701bdbfdddfab15780f0ff892ac680cdf8d58b6eec86af9447e96b23570e54caa7549caa341c121bd9f0d43abff4054dc2ade5aa89ec0521282cbd701f60913b7986f0199bcfb06c4d3b1bf98e836e40ac"}}) 11:44:48 executing program 0: r0 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000240)={0x0, 0x9, 0x1, {0xb, @sdr={0x0, 0x1}}}) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000440)={0x0, 0x0, 0x1, {0xb, @raw_data="b57ec6e2ccfebc2f19650bb2b17372c05fea81c70a61a58b97c5bffa8f3ff22ef5e44f8d5bcd9a7e6ad039656c778e3defde487514c27a53e5ab19e7d988086662bc7d2936c0ce17f57929fe03c491a499d671387a8c4a9d52f2fa0f12b0c8a6fbac0bf52fe8075949b6f554aad4d9906746094746213d701bdbfdddfab15780f0ff892ac680cdf8d58b6eec86af9447e96b23570e54caa7549caa341c121bd9f0d43abff4054dc2ade5aa89ec0521282cbd701f60913b7986f0199bcfb06c4d3b1bf98e836e40ac"}}) 11:44:48 executing program 5: r0 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000240)={0x0, 0x9, 0x1, {0xb, @sdr={0x0, 0x1}}}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000440)={0x0, 0x1ff, 0x1, {0xb, @raw_data="b57ec6e2ccfebc2f19650bb2b17372c05fea81c70a61a58b97c5bffa8f3ff22ef5e44f8d5bcd9a7e6ad039656c778e3defde487514c27a53e5ab19e7d988086662bc7d2936c0ce17f57929fe03c491a499d671387a8c4a9d52f2fa0f12b0c8a6fbac0bf52fe8075949b6f554aad4d9906746094746213d701bdbfdddfab15780f0ff892ac680cdf8d58b6eec86af9447e96b23570e54caa7549caa341c121bd9f0d43abff4054dc2ade5aa89ec0521282cbd701f60913b7986f0199bcfb06c4d3b1bf98e836e40ac"}}) 11:44:48 executing program 1: mount(0x0, 0x0, 0x0, 0x0, 0x0) mknod$loop(&(0x7f00000004c0)='./file0\x00', 0x2002, 0x0) 11:44:48 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x3}, 0x1c) sendmmsg$inet(r0, &(0x7f0000001b80)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000440), 0x1, 0x0, 0x0, &(0x7f0000001a40)=[@ip_retopts={{0x20, 0x0, 0x7, {[@timestamp={0x44, 0xc, 0x0, 0x0, 0x0, [{}, {}]}, @timestamp={0x44, 0x4}]}}}], 0x20}}], 0x2, 0x0) 11:44:48 executing program 1: mount(0x0, 0x0, 0x0, 0x0, 0x0) mknod$loop(&(0x7f00000004c0)='./file0\x00', 0x2002, 0x0) 11:44:48 executing program 0: r0 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000240)={0x0, 0x9, 0x1, {0xb, @sdr={0x0, 0x1}}}) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000440)={0x0, 0x1ff, 0x0, {0xb, @raw_data="b57ec6e2ccfebc2f19650bb2b17372c05fea81c70a61a58b97c5bffa8f3ff22ef5e44f8d5bcd9a7e6ad039656c778e3defde487514c27a53e5ab19e7d988086662bc7d2936c0ce17f57929fe03c491a499d671387a8c4a9d52f2fa0f12b0c8a6fbac0bf52fe8075949b6f554aad4d9906746094746213d701bdbfdddfab15780f0ff892ac680cdf8d58b6eec86af9447e96b23570e54caa7549caa341c121bd9f0d43abff4054dc2ade5aa89ec0521282cbd701f60913b7986f0199bcfb06c4d3b1bf98e836e40ac"}}) [ 471.590093] protocol 88fb is buggy, dev hsr_slave_0 [ 471.595285] protocol 88fb is buggy, dev hsr_slave_1 11:44:51 executing program 5: r0 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000240)={0x0, 0x9, 0x1, {0xb, @sdr={0x0, 0x1}}}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000440)={0x0, 0x1ff, 0x1, {0xb, @raw_data="b57ec6e2ccfebc2f19650bb2b17372c05fea81c70a61a58b97c5bffa8f3ff22ef5e44f8d5bcd9a7e6ad039656c778e3defde487514c27a53e5ab19e7d988086662bc7d2936c0ce17f57929fe03c491a499d671387a8c4a9d52f2fa0f12b0c8a6fbac0bf52fe8075949b6f554aad4d9906746094746213d701bdbfdddfab15780f0ff892ac680cdf8d58b6eec86af9447e96b23570e54caa7549caa341c121bd9f0d43abff4054dc2ade5aa89ec0521282cbd701f60913b7986f0199bcfb06c4d3b1bf98e836e40ac"}}) 11:44:51 executing program 2: r0 = socket(0x40000000015, 0x5, 0x0) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x2, 0x0, @multicast1}, 0x10) 11:44:51 executing program 1: mount(0x0, 0x0, 0x0, 0x0, 0x0) mknod$loop(&(0x7f00000004c0)='./file0\x00', 0x2002, 0x0) 11:44:51 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000000)="5500000019007f5300fe01b2a4a280930a60ffff00a84302910000003900090008000c00060000f3180015e005000600000000dc1320d5440700000000", 0x3d}], 0x1}, 0x0) r0 = socket(0x1000000010, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f00000000c0), 0x492492492492191, 0x0) r1 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r1) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x38) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0xffffffffffffffff, r2, 0x0, 0x0) 11:44:51 executing program 4: r0 = getpid() r1 = syz_open_dev$sndseq(&(0x7f0000000140)='/dev/snd/seq\x00', 0x0, 0x0) read(r1, &(0x7f0000000200)=""/28, 0x1cc) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000080)={0x1, @time}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r1, 0xc02c5341, &(0x7f0000000340)) timer_create(0x0, &(0x7f0000000100)={0x0, 0x12}, &(0x7f00000001c0)) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r1, 0xc0305302, &(0x7f00000003c0)) timer_settime(0x0, 0x0, &(0x7f0000000240)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) tkill(r0, 0x1000000000013) 11:44:51 executing program 0: r0 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000240)={0x0, 0x9, 0x1, {0xb, @sdr={0x0, 0x1}}}) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000440)={0x0, 0x1ff, 0x0, {0xb, @raw_data="b57ec6e2ccfebc2f19650bb2b17372c05fea81c70a61a58b97c5bffa8f3ff22ef5e44f8d5bcd9a7e6ad039656c778e3defde487514c27a53e5ab19e7d988086662bc7d2936c0ce17f57929fe03c491a499d671387a8c4a9d52f2fa0f12b0c8a6fbac0bf52fe8075949b6f554aad4d9906746094746213d701bdbfdddfab15780f0ff892ac680cdf8d58b6eec86af9447e96b23570e54caa7549caa341c121bd9f0d43abff4054dc2ade5aa89ec0521282cbd701f60913b7986f0199bcfb06c4d3b1bf98e836e40ac"}}) 11:44:51 executing program 2: r0 = socket(0x40000000015, 0x5, 0x0) recvfrom$netrom(r0, 0x0, 0x0, 0x3, 0x0, 0x0) 11:44:51 executing program 1: capset(&(0x7f0000a31000)={0x19980330}, &(0x7f00009b3000)) mknod$loop(&(0x7f00000004c0)='./file0\x00', 0x2002, 0x0) 11:44:51 executing program 0: r0 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000240)={0x0, 0x9, 0x1, {0xb, @sdr={0x0, 0x1}}}) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000440)={0x0, 0x1ff, 0x0, {0xb, @raw_data="b57ec6e2ccfebc2f19650bb2b17372c05fea81c70a61a58b97c5bffa8f3ff22ef5e44f8d5bcd9a7e6ad039656c778e3defde487514c27a53e5ab19e7d988086662bc7d2936c0ce17f57929fe03c491a499d671387a8c4a9d52f2fa0f12b0c8a6fbac0bf52fe8075949b6f554aad4d9906746094746213d701bdbfdddfab15780f0ff892ac680cdf8d58b6eec86af9447e96b23570e54caa7549caa341c121bd9f0d43abff4054dc2ade5aa89ec0521282cbd701f60913b7986f0199bcfb06c4d3b1bf98e836e40ac"}}) 11:44:51 executing program 5: r0 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000240)={0x0, 0x9, 0x1, {0xb, @sdr={0x0, 0x1}}}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000440)={0x0, 0x1ff, 0x1, {0xb, @raw_data="b57ec6e2ccfebc2f19650bb2b17372c05fea81c70a61a58b97c5bffa8f3ff22ef5e44f8d5bcd9a7e6ad039656c778e3defde487514c27a53e5ab19e7d988086662bc7d2936c0ce17f57929fe03c491a499d671387a8c4a9d52f2fa0f12b0c8a6fbac0bf52fe8075949b6f554aad4d9906746094746213d701bdbfdddfab15780f0ff892ac680cdf8d58b6eec86af9447e96b23570e54caa7549caa341c121bd9f0d43abff4054dc2ade5aa89ec0521282cbd701f60913b7986f0199bcfb06c4d3b1bf98e836e40ac"}}) 11:44:51 executing program 0: r0 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000240)={0x0, 0x9, 0x1, {0xb, @sdr={0x0, 0x1}}}) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000440)={0x0, 0x1ff, 0x1, {0x0, @raw_data="b57ec6e2ccfebc2f19650bb2b17372c05fea81c70a61a58b97c5bffa8f3ff22ef5e44f8d5bcd9a7e6ad039656c778e3defde487514c27a53e5ab19e7d988086662bc7d2936c0ce17f57929fe03c491a499d671387a8c4a9d52f2fa0f12b0c8a6fbac0bf52fe8075949b6f554aad4d9906746094746213d701bdbfdddfab15780f0ff892ac680cdf8d58b6eec86af9447e96b23570e54caa7549caa341c121bd9f0d43abff4054dc2ade5aa89ec0521282cbd701f60913b7986f0199bcfb06c4d3b1bf98e836e40ac"}}) 11:44:51 executing program 2: openat$tun(0xffffffffffffff9c, 0x0, 0x100, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(0x0, 0x0) r1 = socket(0x40000000015, 0x5, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') bind$inet(r1, &(0x7f0000000840)={0x2, 0x4e20, @loopback}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x0, &(0x7f000069affb)={0x2, 0x0, @loopback}, 0x10) syz_open_dev$cec(0x0, 0x1, 0x2) sendto$inet(r1, 0x0, 0x0, 0x0, &(0x7f00002b4000)={0x2, 0x0, @loopback}, 0x10) readv(r1, &(0x7f0000000240)=[{&(0x7f00000001c0)=""/96, 0x60}], 0x1) pwrite64(r0, 0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_NUMBER(0xffffffffffffffff, 0x84, 0x1c, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) eventfd2(0x0, 0x0) 11:44:51 executing program 1: capset(0x0, &(0x7f00009b3000)) mknod$loop(&(0x7f00000004c0)='./file0\x00', 0x2002, 0x0) 11:44:51 executing program 5: r0 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000240)={0x0, 0x9, 0x1, {0xb, @sdr={0x0, 0x1}}}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000440)={0x0, 0x1ff, 0x1, {0xb, @raw_data="b57ec6e2ccfebc2f19650bb2b17372c05fea81c70a61a58b97c5bffa8f3ff22ef5e44f8d5bcd9a7e6ad039656c778e3defde487514c27a53e5ab19e7d988086662bc7d2936c0ce17f57929fe03c491a499d671387a8c4a9d52f2fa0f12b0c8a6fbac0bf52fe8075949b6f554aad4d9906746094746213d701bdbfdddfab15780f0ff892ac680cdf8d58b6eec86af9447e96b23570e54caa7549caa341c121bd9f0d43abff4054dc2ade5aa89ec0521282cbd701f60913b7986f0199bcfb06c4d3b1bf98e836e40ac"}}) 11:44:52 executing program 0: r0 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000240)={0x0, 0x9, 0x1, {0xb, @sdr={0x0, 0x1}}}) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000440)={0x0, 0x1ff, 0x1, {0x0, @raw_data="b57ec6e2ccfebc2f19650bb2b17372c05fea81c70a61a58b97c5bffa8f3ff22ef5e44f8d5bcd9a7e6ad039656c778e3defde487514c27a53e5ab19e7d988086662bc7d2936c0ce17f57929fe03c491a499d671387a8c4a9d52f2fa0f12b0c8a6fbac0bf52fe8075949b6f554aad4d9906746094746213d701bdbfdddfab15780f0ff892ac680cdf8d58b6eec86af9447e96b23570e54caa7549caa341c121bd9f0d43abff4054dc2ade5aa89ec0521282cbd701f60913b7986f0199bcfb06c4d3b1bf98e836e40ac"}}) [ 475.510123] net_ratelimit: 20 callbacks suppressed [ 475.510128] protocol 88fb is buggy, dev hsr_slave_0 [ 475.520414] protocol 88fb is buggy, dev hsr_slave_1 [ 475.750138] protocol 88fb is buggy, dev hsr_slave_0 [ 475.755250] protocol 88fb is buggy, dev hsr_slave_1 [ 475.830126] protocol 88fb is buggy, dev hsr_slave_0 [ 475.835449] protocol 88fb is buggy, dev hsr_slave_1 [ 476.470168] protocol 88fb is buggy, dev hsr_slave_0 [ 476.475255] protocol 88fb is buggy, dev hsr_slave_1 [ 476.790129] protocol 88fb is buggy, dev hsr_slave_0 [ 476.795389] protocol 88fb is buggy, dev hsr_slave_1 11:44:54 executing program 2: openat$tun(0xffffffffffffff9c, 0x0, 0x100, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(0x0, 0x0) r1 = socket(0x40000000015, 0x5, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') bind$inet(r1, &(0x7f0000000840)={0x2, 0x4e20, @loopback}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x0, &(0x7f000069affb)={0x2, 0x0, @loopback}, 0x10) syz_open_dev$cec(0x0, 0x1, 0x2) sendto$inet(r1, 0x0, 0x0, 0x0, &(0x7f00002b4000)={0x2, 0x0, @loopback}, 0x10) readv(r1, &(0x7f0000000240)=[{&(0x7f00000001c0)=""/96, 0x60}], 0x1) pwrite64(r0, 0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_NUMBER(0xffffffffffffffff, 0x84, 0x1c, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) eventfd2(0x0, 0x0) 11:44:54 executing program 4: r0 = getpid() r1 = syz_open_dev$sndseq(&(0x7f0000000140)='/dev/snd/seq\x00', 0x0, 0x0) read(r1, &(0x7f0000000200)=""/28, 0x1cc) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000080)={0x1, @time}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r1, 0xc02c5341, &(0x7f0000000340)) timer_create(0x0, &(0x7f0000000100)={0x0, 0x12}, &(0x7f00000001c0)) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r1, 0xc0305302, &(0x7f00000003c0)) timer_settime(0x0, 0x0, &(0x7f0000000240)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) tkill(r0, 0x1000000000013) 11:44:54 executing program 1: capset(0x0, &(0x7f00009b3000)) mknod$loop(&(0x7f00000004c0)='./file0\x00', 0x2002, 0x0) 11:44:54 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000000)="5500000019007f5300fe01b2a4a280930a60ffff00a84302910000003900090008000c00060000f3180015e005000600000000dc1320d5440700000000", 0x3d}], 0x1}, 0x0) r0 = socket(0x1000000010, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f00000000c0), 0x492492492492191, 0x0) r1 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r1) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x38) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0xffffffffffffffff, r2, 0x0, 0x0) 11:44:54 executing program 0: r0 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000240)={0x0, 0x9, 0x1, {0xb, @sdr={0x0, 0x1}}}) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000440)={0x0, 0x1ff, 0x1, {0x0, @raw_data="b57ec6e2ccfebc2f19650bb2b17372c05fea81c70a61a58b97c5bffa8f3ff22ef5e44f8d5bcd9a7e6ad039656c778e3defde487514c27a53e5ab19e7d988086662bc7d2936c0ce17f57929fe03c491a499d671387a8c4a9d52f2fa0f12b0c8a6fbac0bf52fe8075949b6f554aad4d9906746094746213d701bdbfdddfab15780f0ff892ac680cdf8d58b6eec86af9447e96b23570e54caa7549caa341c121bd9f0d43abff4054dc2ade5aa89ec0521282cbd701f60913b7986f0199bcfb06c4d3b1bf98e836e40ac"}}) 11:44:54 executing program 5: r0 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000240)={0x0, 0x9, 0x1, {0xb, @sdr={0x0, 0x1}}}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000440)={0x0, 0x1ff, 0x1, {0xb, @raw_data="b57ec6e2ccfebc2f19650bb2b17372c05fea81c70a61a58b97c5bffa8f3ff22ef5e44f8d5bcd9a7e6ad039656c778e3defde487514c27a53e5ab19e7d988086662bc7d2936c0ce17f57929fe03c491a499d671387a8c4a9d52f2fa0f12b0c8a6fbac0bf52fe8075949b6f554aad4d9906746094746213d701bdbfdddfab15780f0ff892ac680cdf8d58b6eec86af9447e96b23570e54caa7549caa341c121bd9f0d43abff4054dc2ade5aa89ec0521282cbd701f60913b7986f0199bcfb06c4d3b1bf98e836e40ac"}}) 11:44:54 executing program 1: capset(0x0, &(0x7f00009b3000)) mknod$loop(&(0x7f00000004c0)='./file0\x00', 0x2002, 0x0) 11:44:54 executing program 5: r0 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000240)={0x0, 0x9, 0x1, {0xb, @sdr={0x0, 0x1}}}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000440)={0x0, 0x1ff, 0x1, {0xb, @raw_data="b57ec6e2ccfebc2f19650bb2b17372c05fea81c70a61a58b97c5bffa8f3ff22ef5e44f8d5bcd9a7e6ad039656c778e3defde487514c27a53e5ab19e7d988086662bc7d2936c0ce17f57929fe03c491a499d671387a8c4a9d52f2fa0f12b0c8a6fbac0bf52fe8075949b6f554aad4d9906746094746213d701bdbfdddfab15780f0ff892ac680cdf8d58b6eec86af9447e96b23570e54caa7549caa341c121bd9f0d43abff4054dc2ade5aa89ec0521282cbd701f60913b7986f0199bcfb06c4d3b1bf98e836e40ac"}}) 11:44:54 executing program 0: openat$tun(0xffffffffffffff9c, 0x0, 0x100, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(0x0, 0x0) r1 = socket(0x40000000015, 0x5, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') bind$inet(r1, &(0x7f0000000840)={0x2, 0x4e20, @loopback}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x0, &(0x7f000069affb)={0x2, 0x0, @loopback}, 0x10) syz_open_dev$cec(0x0, 0x1, 0x2) sendto$inet(r1, 0x0, 0x0, 0x0, &(0x7f00002b4000)={0x2, 0x0, @loopback}, 0x10) readv(r1, &(0x7f0000000240)=[{&(0x7f00000001c0)=""/96, 0x60}], 0x1) pwrite64(r0, 0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_NUMBER(0xffffffffffffffff, 0x84, 0x1c, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) eventfd2(0x0, 0x0) 11:44:54 executing program 2: openat$tun(0xffffffffffffff9c, 0x0, 0x100, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(0x0, 0x0) r1 = socket(0x40000000015, 0x5, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') bind$inet(r1, &(0x7f0000000840)={0x2, 0x4e20, @loopback}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x0, &(0x7f000069affb)={0x2, 0x0, @loopback}, 0x10) syz_open_dev$cec(0x0, 0x1, 0x2) sendto$inet(r1, 0x0, 0x0, 0x0, &(0x7f00002b4000)={0x2, 0x0, @loopback}, 0x10) readv(r1, &(0x7f0000000240)=[{&(0x7f00000001c0)=""/96, 0x60}], 0x1) pwrite64(r0, 0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_NUMBER(0xffffffffffffffff, 0x84, 0x1c, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) eventfd2(0x0, 0x0) 11:44:54 executing program 1: capset(&(0x7f0000a31000), &(0x7f00009b3000)) mknod$loop(&(0x7f00000004c0)='./file0\x00', 0x2002, 0x0) 11:44:55 executing program 5: r0 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000240)={0x0, 0x9, 0x1, {0xb, @sdr={0x0, 0x1}}}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000440)={0x0, 0x1ff, 0x1, {0xb, @raw_data="b57ec6e2ccfebc2f19650bb2b17372c05fea81c70a61a58b97c5bffa8f3ff22ef5e44f8d5bcd9a7e6ad039656c778e3defde487514c27a53e5ab19e7d988086662bc7d2936c0ce17f57929fe03c491a499d671387a8c4a9d52f2fa0f12b0c8a6fbac0bf52fe8075949b6f554aad4d9906746094746213d701bdbfdddfab15780f0ff892ac680cdf8d58b6eec86af9447e96b23570e54caa7549caa341c121bd9f0d43abff4054dc2ade5aa89ec0521282cbd701f60913b7986f0199bcfb06c4d3b1bf98e836e40ac"}}) 11:44:55 executing program 0: mmap(&(0x7f0000011000/0x2000)=nil, 0x2000, 0x0, 0x31, 0xffffffffffffffff, 0x0) mincore(&(0x7f0000011000/0x6000)=nil, 0x6000, &(0x7f0000000100)=""/238) 11:44:57 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000000)="5500000019007f5300fe01b2a4a280930a60ffff00a84302910000003900090008000c00060000f3180015e005000600000000dc1320d5440700000000", 0x3d}], 0x1}, 0x0) r0 = socket(0x1000000010, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f00000000c0), 0x492492492492191, 0x0) r1 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r1) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x38) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0xffffffffffffffff, r2, 0x0, 0x0) 11:44:57 executing program 1: capset(&(0x7f0000a31000), &(0x7f00009b3000)) mknod$loop(&(0x7f00000004c0)='./file0\x00', 0x2002, 0x0) 11:44:57 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'sha256-avx\x00'}, 0x58) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r2 = accept$alg(r0, 0x0, 0x0) recvmmsg(r2, &(0x7f0000009780)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 11:44:57 executing program 5: r0 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000240)={0x0, 0x9, 0x1, {0xb, @sdr={0x0, 0x1}}}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, 0x0) 11:44:57 executing program 0: mmap(&(0x7f000000c000/0x3000)=nil, 0x3000, 0x3, 0x31, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x1, 0xb, 0x1, 0x0, &(0x7f0000048000), 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) clock_gettime(0x0, &(0x7f00000001c0)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, r1+10000000}}, 0x0) tkill(r0, 0x16) 11:44:57 executing program 4: r0 = getpid() r1 = syz_open_dev$sndseq(&(0x7f0000000140)='/dev/snd/seq\x00', 0x0, 0x0) read(r1, &(0x7f0000000200)=""/28, 0x1cc) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000080)={0x1, @time}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r1, 0xc02c5341, &(0x7f0000000340)) timer_create(0x0, &(0x7f0000000100)={0x0, 0x12}, &(0x7f00000001c0)) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r1, 0xc0305302, &(0x7f00000003c0)) timer_settime(0x0, 0x0, &(0x7f0000000240)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) tkill(r0, 0x1000000000013) 11:44:57 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$netlink(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000001340)={0xd80, 0x0, 0x0, 0x0, 0x0, "", [@nested={0x148, 0x0, [@typed={0xc, 0x0, @u64}, @typed={0xc, 0x0, @u64}, @typed={0x8, 0x0, @u32}, @generic="47f27b7db3d903ff5466256550560a46548cbe9a00a5c9301a2f9eb4c4ead8b17751f2724f96b0908f1dc540540dbffe52789ac511ed3b5d53249b5b1415a862c12c1b49fd052b2a9999b441052c3b1fa45626fbbc37bed3c43d24079a9dc8417065b46063186ec25a6bbb13038dc2e4482ac71b44a36e88b8432c803873164f4ff72e05d645d3d4c599742be7d6ca3e9d954df5a37d755b5d7dd5eb3bd84b80adecd8cd710316f8bc0e95c18e26dccb28ec66a87980436a3f8f7c6bbce8f2c89e101401", @generic="7a8af9b7015cd34fc42ba72fa71aed17341e89577607d0a832b2014db8427bf0341e56e899e0395c832783184fc8527d328a66a4f0cdcb533ebfaf09d9016bc861c45a39e2ffeb80fb4f4efdca39332530", @typed={0x4}, @typed={0x8, 0x0, @ipv4}]}, @generic="f74ec4ee14552739298a0e", @generic="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"]}, 0xd80}], 0x1}, 0x0) recvmmsg(r1, &(0x7f0000009780)=[{{0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000340)=""/4096, 0x1000}], 0x1}}], 0x400000000000118, 0x0, 0x0) 11:44:57 executing program 5: r0 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000240)={0x0, 0x9, 0x1, {0xb, @sdr={0x0, 0x1}}}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, 0x0) 11:44:57 executing program 1: capset(&(0x7f0000a31000), &(0x7f00009b3000)) mknod$loop(&(0x7f00000004c0)='./file0\x00', 0x2002, 0x0) [ 480.630122] net_ratelimit: 20 callbacks suppressed [ 480.630125] protocol 88fb is buggy, dev hsr_slave_0 [ 480.640222] protocol 88fb is buggy, dev hsr_slave_1 11:44:58 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$KDSETMODE(0xffffffffffffffff, 0x4b3a, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="b9ff0300000d698cb89e40f088a8", 0x0, 0x100}, 0x28) 11:44:58 executing program 1: capset(&(0x7f0000a31000)={0x19980330}, 0x0) mknod$loop(&(0x7f00000004c0)='./file0\x00', 0x2002, 0x0) 11:44:58 executing program 5: r0 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000240)={0x0, 0x9, 0x1, {0xb, @sdr={0x0, 0x1}}}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, 0x0) [ 480.950163] protocol 88fb is buggy, dev hsr_slave_0 [ 480.955286] protocol 88fb is buggy, dev hsr_slave_1 [ 481.350131] protocol 88fb is buggy, dev hsr_slave_0 [ 481.355337] protocol 88fb is buggy, dev hsr_slave_1 [ 481.750111] protocol 88fb is buggy, dev hsr_slave_0 [ 481.755395] protocol 88fb is buggy, dev hsr_slave_1 [ 481.990146] protocol 88fb is buggy, dev hsr_slave_0 [ 481.995261] protocol 88fb is buggy, dev hsr_slave_1 11:45:00 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000000)="5500000019007f5300fe01b2a4a280930a60ffff00a84302910000003900090008000c00060000f3180015e005000600000000dc1320d5440700000000", 0x3d}], 0x1}, 0x0) r0 = socket(0x1000000010, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f00000000c0), 0x492492492492191, 0x0) r1 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r1) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x38) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, 0x0, 0x0, 0x0) 11:45:00 executing program 1: capset(&(0x7f0000a31000)={0x19980330}, 0x0) mknod$loop(&(0x7f00000004c0)='./file0\x00', 0x2002, 0x0) 11:45:00 executing program 5: r0 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000240)={0x0, 0x9, 0x1, {0xb, @sdr={0x0, 0x1}}}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000440)={0x0, 0x0, 0x1, {0xb, @raw_data="b57ec6e2ccfebc2f19650bb2b17372c05fea81c70a61a58b97c5bffa8f3ff22ef5e44f8d5bcd9a7e6ad039656c778e3defde487514c27a53e5ab19e7d988086662bc7d2936c0ce17f57929fe03c491a499d671387a8c4a9d52f2fa0f12b0c8a6fbac0bf52fe8075949b6f554aad4d9906746094746213d701bdbfdddfab15780f0ff892ac680cdf8d58b6eec86af9447e96b23570e54caa7549caa341c121bd9f0d43abff4054dc2ade5aa89ec0521282cbd701f60913b7986f0199bcfb06c4d3b1bf98e836e40ac"}}) 11:45:00 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(0xffffffffffffffff, 0xc1105518, &(0x7f0000000840)={{}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 'syz1\x00', &(0x7f0000000280)=['status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce', 'status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce'], 0x21e}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setgroups(0x54b, &(0x7f0000000180)) pread64(r0, 0x0, 0x0, 0x0) 11:45:00 executing program 4: getpid() r0 = syz_open_dev$sndseq(&(0x7f0000000140)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000200)=""/28, 0x1cc) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000080)={0x1, @time}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r0, 0xc02c5341, &(0x7f0000000340)) timer_create(0x0, &(0x7f0000000100)={0x0, 0x12}, &(0x7f00000001c0)) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r0, 0xc0305302, &(0x7f00000003c0)) timer_settime(0x0, 0x0, &(0x7f0000000240)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) 11:45:00 executing program 0: r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)=""/247, 0xffffff50}], 0x1000000000000005, &(0x7f0000000180)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x0) fgetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0) 11:45:01 executing program 1: capset(&(0x7f0000a31000)={0x19980330}, 0x0) mknod$loop(&(0x7f00000004c0)='./file0\x00', 0x2002, 0x0) 11:45:01 executing program 5: r0 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000240)={0x0, 0x9, 0x1, {0xb, @sdr={0x0, 0x1}}}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000440)={0x0, 0x0, 0x1, {0xb, @raw_data="b57ec6e2ccfebc2f19650bb2b17372c05fea81c70a61a58b97c5bffa8f3ff22ef5e44f8d5bcd9a7e6ad039656c778e3defde487514c27a53e5ab19e7d988086662bc7d2936c0ce17f57929fe03c491a499d671387a8c4a9d52f2fa0f12b0c8a6fbac0bf52fe8075949b6f554aad4d9906746094746213d701bdbfdddfab15780f0ff892ac680cdf8d58b6eec86af9447e96b23570e54caa7549caa341c121bd9f0d43abff4054dc2ade5aa89ec0521282cbd701f60913b7986f0199bcfb06c4d3b1bf98e836e40ac"}}) 11:45:01 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) sendmsg$netlink(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000001340)={0xd80, 0x0, 0x0, 0x0, 0x0, "", [@nested={0x148, 0x0, [@typed={0xc, 0x0, @u64}, @typed={0xc, 0x0, @u64}, @typed={0x8, 0x0, @u32}, @generic="47f27b7db3d903ff5466256550560a46548cbe9a00a5c9301a2f9eb4c4ead8b17751f2724f96b0908f1dc540540dbffe52789ac511ed3b5d53249b5b1415a862c12c1b49fd052b2a9999b441052c3b1fa45626fbbc37bed3c43d24079a9dc8417065b46063186ec25a6bbb13038dc2e4482ac71b44a36e88b8432c803873164f4ff72e05d645d3d4c599742be7d6ca3e9d954df5a37d755b5d7dd5eb3bd84b80adecd8cd710316f8bc0e95c18e26dccb28ec66a87980436a3f8f7c6bbce8f2c89e101401", @generic="7a8af9b7015cd34fc42ba72fa71aed17341e89577607d0a832b2014db8427bf0341e56e899e0395c832783184fc8527d328a66a4f0cdcb533ebfaf09d9016bc861c45a39e2ffeb80fb4f4efdca39332530", @typed={0x4}, @typed={0x8, 0x0, @ipv4}]}, @generic="f74ec4ee14552739298a0e", @generic="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"]}, 0xd80}], 0x1}, 0x0) recvmmsg(r1, &(0x7f0000009780)=[{{0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000340)=""/4096, 0x1000}], 0x1}}], 0x400000000000118, 0x0, 0x0) 11:45:01 executing program 1: capset(&(0x7f0000a31000)={0x19980330}, &(0x7f00009b3000)) mknod$loop(0x0, 0x2002, 0x0) 11:45:01 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) flock(r1, 0x1) flock(0xffffffffffffffff, 0x2) flock(r2, 0x1) flock(r1, 0x2) 11:45:01 executing program 5: r0 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000240)={0x0, 0x9, 0x1, {0xb, @sdr={0x0, 0x1}}}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000440)={0x0, 0x0, 0x1, {0xb, @raw_data="b57ec6e2ccfebc2f19650bb2b17372c05fea81c70a61a58b97c5bffa8f3ff22ef5e44f8d5bcd9a7e6ad039656c778e3defde487514c27a53e5ab19e7d988086662bc7d2936c0ce17f57929fe03c491a499d671387a8c4a9d52f2fa0f12b0c8a6fbac0bf52fe8075949b6f554aad4d9906746094746213d701bdbfdddfab15780f0ff892ac680cdf8d58b6eec86af9447e96b23570e54caa7549caa341c121bd9f0d43abff4054dc2ade5aa89ec0521282cbd701f60913b7986f0199bcfb06c4d3b1bf98e836e40ac"}}) [ 485.920135] net_ratelimit: 20 callbacks suppressed [ 485.920140] protocol 88fb is buggy, dev hsr_slave_0 [ 485.930139] protocol 88fb is buggy, dev hsr_slave_1 [ 486.150153] protocol 88fb is buggy, dev hsr_slave_0 [ 486.155399] protocol 88fb is buggy, dev hsr_slave_1 [ 486.230138] protocol 88fb is buggy, dev hsr_slave_0 [ 486.235367] protocol 88fb is buggy, dev hsr_slave_1 11:45:03 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000000)="5500000019007f5300fe01b2a4a280930a60ffff00a84302910000003900090008000c00060000f3180015e005000600000000dc1320d5440700000000", 0x3d}], 0x1}, 0x0) r0 = socket(0x1000000010, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f00000000c0), 0x492492492492191, 0x0) r1 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r1) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x38) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, 0x0, 0x0, 0x0) 11:45:03 executing program 1: capset(&(0x7f0000a31000)={0x19980330}, &(0x7f00009b3000)) mknod$loop(0x0, 0x2002, 0x0) 11:45:03 executing program 2: 11:45:03 executing program 5: r0 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000240)={0x0, 0x9, 0x1, {0xb, @sdr={0x0, 0x1}}}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000440)={0x0, 0x1ff, 0x0, {0xb, @raw_data="b57ec6e2ccfebc2f19650bb2b17372c05fea81c70a61a58b97c5bffa8f3ff22ef5e44f8d5bcd9a7e6ad039656c778e3defde487514c27a53e5ab19e7d988086662bc7d2936c0ce17f57929fe03c491a499d671387a8c4a9d52f2fa0f12b0c8a6fbac0bf52fe8075949b6f554aad4d9906746094746213d701bdbfdddfab15780f0ff892ac680cdf8d58b6eec86af9447e96b23570e54caa7549caa341c121bd9f0d43abff4054dc2ade5aa89ec0521282cbd701f60913b7986f0199bcfb06c4d3b1bf98e836e40ac"}}) 11:45:03 executing program 4: getpid() r0 = syz_open_dev$sndseq(&(0x7f0000000140)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000200)=""/28, 0x1cc) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000080)={0x1, @time}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r0, 0xc02c5341, &(0x7f0000000340)) timer_create(0x0, &(0x7f0000000100)={0x0, 0x12}, &(0x7f00000001c0)) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r0, 0xc0305302, &(0x7f00000003c0)) timer_settime(0x0, 0x0, &(0x7f0000000240)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) 11:45:03 executing program 0: 11:45:04 executing program 2: 11:45:04 executing program 0: 11:45:04 executing program 1: capset(&(0x7f0000a31000)={0x19980330}, &(0x7f00009b3000)) mknod$loop(0x0, 0x2002, 0x0) 11:45:04 executing program 2: 11:45:04 executing program 5: r0 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000240)={0x0, 0x9, 0x1, {0xb, @sdr={0x0, 0x1}}}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000440)={0x0, 0x1ff, 0x0, {0xb, @raw_data="b57ec6e2ccfebc2f19650bb2b17372c05fea81c70a61a58b97c5bffa8f3ff22ef5e44f8d5bcd9a7e6ad039656c778e3defde487514c27a53e5ab19e7d988086662bc7d2936c0ce17f57929fe03c491a499d671387a8c4a9d52f2fa0f12b0c8a6fbac0bf52fe8075949b6f554aad4d9906746094746213d701bdbfdddfab15780f0ff892ac680cdf8d58b6eec86af9447e96b23570e54caa7549caa341c121bd9f0d43abff4054dc2ade5aa89ec0521282cbd701f60913b7986f0199bcfb06c4d3b1bf98e836e40ac"}}) 11:45:04 executing program 0: [ 486.873311] protocol 88fb is buggy, dev hsr_slave_0 [ 486.878364] protocol 88fb is buggy, dev hsr_slave_1 [ 487.190118] protocol 88fb is buggy, dev hsr_slave_0 [ 487.195372] protocol 88fb is buggy, dev hsr_slave_1 11:45:07 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000000)="5500000019007f5300fe01b2a4a280930a60ffff00a84302910000003900090008000c00060000f3180015e005000600000000dc1320d5440700000000", 0x3d}], 0x1}, 0x0) r0 = socket(0x1000000010, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f00000000c0), 0x492492492492191, 0x0) r1 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r1) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x38) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, 0x0, 0x0, 0x0) 11:45:07 executing program 2: 11:45:07 executing program 0: 11:45:07 executing program 5: r0 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000240)={0x0, 0x9, 0x1, {0xb, @sdr={0x0, 0x1}}}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000440)={0x0, 0x1ff, 0x0, {0xb, @raw_data="b57ec6e2ccfebc2f19650bb2b17372c05fea81c70a61a58b97c5bffa8f3ff22ef5e44f8d5bcd9a7e6ad039656c778e3defde487514c27a53e5ab19e7d988086662bc7d2936c0ce17f57929fe03c491a499d671387a8c4a9d52f2fa0f12b0c8a6fbac0bf52fe8075949b6f554aad4d9906746094746213d701bdbfdddfab15780f0ff892ac680cdf8d58b6eec86af9447e96b23570e54caa7549caa341c121bd9f0d43abff4054dc2ade5aa89ec0521282cbd701f60913b7986f0199bcfb06c4d3b1bf98e836e40ac"}}) 11:45:07 executing program 1: capset(&(0x7f0000a31000)={0x19980330}, &(0x7f00009b3000)) mknod$loop(&(0x7f00000004c0)='./file0\x00', 0x0, 0x0) 11:45:07 executing program 4: getpid() r0 = syz_open_dev$sndseq(&(0x7f0000000140)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000200)=""/28, 0x1cc) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000080)={0x1, @time}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r0, 0xc02c5341, &(0x7f0000000340)) timer_create(0x0, &(0x7f0000000100)={0x0, 0x12}, &(0x7f00000001c0)) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r0, 0xc0305302, &(0x7f00000003c0)) timer_settime(0x0, 0x0, &(0x7f0000000240)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) 11:45:07 executing program 0: 11:45:07 executing program 2: 11:45:07 executing program 1: capset(&(0x7f0000a31000)={0x19980330}, &(0x7f00009b3000)) mknod$loop(&(0x7f00000004c0)='./file0\x00', 0x0, 0x0) 11:45:07 executing program 0: 11:45:07 executing program 2: 11:45:07 executing program 5: r0 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000240)={0x0, 0x9, 0x1, {0xb, @sdr={0x0, 0x1}}}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000440)={0x0, 0x1ff, 0x1, {0x0, @raw_data="b57ec6e2ccfebc2f19650bb2b17372c05fea81c70a61a58b97c5bffa8f3ff22ef5e44f8d5bcd9a7e6ad039656c778e3defde487514c27a53e5ab19e7d988086662bc7d2936c0ce17f57929fe03c491a499d671387a8c4a9d52f2fa0f12b0c8a6fbac0bf52fe8075949b6f554aad4d9906746094746213d701bdbfdddfab15780f0ff892ac680cdf8d58b6eec86af9447e96b23570e54caa7549caa341c121bd9f0d43abff4054dc2ade5aa89ec0521282cbd701f60913b7986f0199bcfb06c4d3b1bf98e836e40ac"}}) [ 491.030228] net_ratelimit: 20 callbacks suppressed [ 491.030233] protocol 88fb is buggy, dev hsr_slave_0 [ 491.040355] protocol 88fb is buggy, dev hsr_slave_1 [ 491.350128] protocol 88fb is buggy, dev hsr_slave_0 [ 491.355254] protocol 88fb is buggy, dev hsr_slave_1 [ 491.760117] protocol 88fb is buggy, dev hsr_slave_0 [ 491.765333] protocol 88fb is buggy, dev hsr_slave_1 [ 492.150243] protocol 88fb is buggy, dev hsr_slave_0 [ 492.155330] protocol 88fb is buggy, dev hsr_slave_1 [ 492.390123] protocol 88fb is buggy, dev hsr_slave_0 [ 492.395251] protocol 88fb is buggy, dev hsr_slave_1 11:45:10 executing program 4: r0 = getpid() r1 = syz_open_dev$sndseq(&(0x7f0000000140)='/dev/snd/seq\x00', 0x0, 0x0) read(r1, &(0x7f0000000200)=""/28, 0x1cc) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000080)={0x1, @time}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r1, 0xc02c5341, &(0x7f0000000340)) timer_create(0x0, &(0x7f0000000100)={0x0, 0x12}, &(0x7f00000001c0)) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r1, 0xc0305302, &(0x7f00000003c0)) tkill(r0, 0x1000000000013) 11:45:10 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$netlink(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000001340)={0x7d4, 0x0, 0x0, 0x0, 0x0, "", [@generic="f74ec4", @generic="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"]}, 0x7d4}], 0x1}, 0x0) recvmmsg(r1, &(0x7f0000009780)=[{{0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000340)=""/4096, 0x1000}], 0x1}}], 0x400000000000118, 0x0, 0x0) 11:45:10 executing program 1: capset(&(0x7f0000a31000)={0x19980330}, &(0x7f00009b3000)) mknod$loop(&(0x7f00000004c0)='./file0\x00', 0x0, 0x0) 11:45:10 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKREPORTZONE(r0, 0xc0101282, &(0x7f0000001200)) 11:45:10 executing program 5: r0 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000240)={0x0, 0x9, 0x1, {0xb, @sdr={0x0, 0x1}}}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000440)={0x0, 0x1ff, 0x1, {0x0, @raw_data="b57ec6e2ccfebc2f19650bb2b17372c05fea81c70a61a58b97c5bffa8f3ff22ef5e44f8d5bcd9a7e6ad039656c778e3defde487514c27a53e5ab19e7d988086662bc7d2936c0ce17f57929fe03c491a499d671387a8c4a9d52f2fa0f12b0c8a6fbac0bf52fe8075949b6f554aad4d9906746094746213d701bdbfdddfab15780f0ff892ac680cdf8d58b6eec86af9447e96b23570e54caa7549caa341c121bd9f0d43abff4054dc2ade5aa89ec0521282cbd701f60913b7986f0199bcfb06c4d3b1bf98e836e40ac"}}) 11:45:10 executing program 3: r0 = syz_open_dev$video(&(0x7f0000000100)='/dev/video#\x00', 0x0, 0x0) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000140)={0x0, 0x0, 0x0, {0xa}}) 11:45:10 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000300)='?', 0x5000) 11:45:10 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000100)='/dev/video#\x00', 0x0, 0x0) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc058560f, &(0x7f0000000140)) 11:45:10 executing program 1: r0 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000240)={0x0, 0x9, 0x1, {0xb, @sdr={0x0, 0x1}}}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000440)={0x0, 0x0, 0x1, {0xb, @raw_data="b57ec6e2ccfebc2f19650bb2b17372c05fea81c70a61a58b97c5bffa8f3ff22ef5e44f8d5bcd9a7e6ad039656c778e3defde487514c27a53e5ab19e7d988086662bc7d2936c0ce17f57929fe03c491a499d671387a8c4a9d52f2fa0f12b0c8a6fbac0bf52fe8075949b6f554aad4d9906746094746213d701bdbfdddfab15780f0ff892ac680cdf8d58b6eec86af9447e96b23570e54caa7549caa341c121bd9f0d43abff4054dc2ade5aa89ec0521282cbd701f60913b7986f0199bcfb06c4d3b1bf98e836e40ac"}}) 11:45:10 executing program 5: r0 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000240)={0x0, 0x9, 0x1, {0xb, @sdr={0x0, 0x1}}}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000440)={0x0, 0x1ff, 0x1, {0x0, @raw_data="b57ec6e2ccfebc2f19650bb2b17372c05fea81c70a61a58b97c5bffa8f3ff22ef5e44f8d5bcd9a7e6ad039656c778e3defde487514c27a53e5ab19e7d988086662bc7d2936c0ce17f57929fe03c491a499d671387a8c4a9d52f2fa0f12b0c8a6fbac0bf52fe8075949b6f554aad4d9906746094746213d701bdbfdddfab15780f0ff892ac680cdf8d58b6eec86af9447e96b23570e54caa7549caa341c121bd9f0d43abff4054dc2ade5aa89ec0521282cbd701f60913b7986f0199bcfb06c4d3b1bf98e836e40ac"}}) 11:45:10 executing program 3: r0 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000240)={0x0, 0x9, 0x1, {0xb, @sdr={0x0, 0x1}}}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000440)={0x0, 0x1ff, 0x1, {0xb, @raw_data="b57ec6e2ccfebc2f19650bb2b17372c05fea81c70a61a58b97c5bffa8f3ff22ef5e44f8d5bcd9a7e6ad039656c778e3defde487514c27a53e5ab19e7d988086662bc7d2936c0ce17f57929fe03c491a499d671387a8c4a9d52f2fa0f12b0c8a6fbac0bf52fe8075949b6f554aad4d9906746094746213d701bdbfdddfab15780f0ff892ac680cdf8d58b6eec86af9447e96b23570e54caa7549caa341c121bd9f0d43abff4054dc2ade5aa89ec0521282cbd701f60913b7986f0199bcfb06c4d3b1bf98e836e40ac"}}) 11:45:10 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) bpf$PROG_LOAD(0x5, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r0 = gettid() tkill(r0, 0x3b) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) 11:45:13 executing program 4: r0 = getpid() r1 = syz_open_dev$sndseq(&(0x7f0000000140)='/dev/snd/seq\x00', 0x0, 0x0) read(r1, &(0x7f0000000200)=""/28, 0x1cc) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000080)={0x1, @time}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r1, 0xc02c5341, &(0x7f0000000340)) timer_create(0x0, &(0x7f0000000100)={0x0, 0x12}, &(0x7f00000001c0)) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r1, 0xc0305302, &(0x7f00000003c0)) tkill(r0, 0x1000000000013) 11:45:13 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) socket$nl_route(0x10, 0x3, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = gettid() tkill(r1, 0x3b) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000400)) 11:45:13 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) socket$nl_route(0x10, 0x3, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = gettid() tkill(r1, 0x3b) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000400)) 11:45:13 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) socket$nl_route(0x10, 0x3, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = gettid() tkill(r1, 0x3b) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000400)) 11:45:13 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) socket$nl_route(0x10, 0x3, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = gettid() tkill(r1, 0x3b) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000400)) 11:45:13 executing program 2: perf_event_open(&(0x7f0000000440)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x220801, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r0, 0x800443d3, &(0x7f0000000580)={{0x3, 0x9, 0xffff, 0x7fffffff}, 0x100000000, 0x0, 0x9}) syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vcs\x00', 0x280200, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\xf6', 0x1ff) ioctl$RTC_EPOCH_READ(r1, 0x8008700d, &(0x7f0000000280)) getsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000300), &(0x7f0000000140)=0x4) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) bind$ax25(r0, &(0x7f0000000340)={{0x3, @null, 0x5}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x80000, 0x10064) r3 = openat$cgroup_procs(r2, &(0x7f0000000100)='cgroup.procs\x00', 0x2, 0x0) write$P9_RCLUNK(r1, &(0x7f00000001c0)={0x7, 0x79, 0x1}, 0x7) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.net/syz1\x00', 0x1ff) write$cgroup_pid(r3, &(0x7f0000000640), 0x12) 11:45:13 executing program 2: perf_event_open(&(0x7f0000000440)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x220801, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r0, 0x800443d3, &(0x7f0000000580)={{0x3, 0x9, 0xffff, 0x7fffffff}, 0x100000000, 0x0, 0x9}) syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vcs\x00', 0x280200, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\xf6', 0x1ff) ioctl$RTC_EPOCH_READ(r1, 0x8008700d, &(0x7f0000000280)) getsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000300), &(0x7f0000000140)=0x4) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) bind$ax25(r0, &(0x7f0000000340)={{0x3, @null, 0x5}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x80000, 0x10064) r3 = openat$cgroup_procs(r2, &(0x7f0000000100)='cgroup.procs\x00', 0x2, 0x0) write$P9_RCLUNK(r1, &(0x7f00000001c0)={0x7, 0x79, 0x1}, 0x7) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.net/syz1\x00', 0x1ff) write$cgroup_pid(r3, &(0x7f0000000640), 0x12) 11:45:13 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) socket$nl_route(0x10, 0x3, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = gettid() tkill(r1, 0x3b) socket$inet_tcp(0x2, 0x1, 0x0) write$FUSE_OPEN(0xffffffffffffffff, &(0x7f00000001c0)={0x20, 0x0, 0x1, {0x0, 0x6}}, 0x20) socket$inet_udp(0x2, 0x2, 0x0) 11:45:13 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) socket$nl_route(0x10, 0x3, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = gettid() tkill(r1, 0x3b) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000400)) 11:45:13 executing program 1: ioctl(0xffffffffffffffff, 0x200001000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) socket$nl_route(0x10, 0x3, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r0 = gettid() tkill(r0, 0x3b) socket$inet_tcp(0x2, 0x1, 0x0) write$FUSE_OPEN(0xffffffffffffffff, &(0x7f00000001c0)={0x20, 0x0, 0x1, {0x0, 0x6}}, 0x20) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000400)) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000300)='cgroup.procs\x00', 0x2, 0x0) connect$inet(r1, &(0x7f0000000280)={0x2, 0x0, @local}, 0x10) 11:45:13 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000002c0)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000100000002402000020feffff7a0af0fff8ffffff69a4f0ff00000000b7060000000000000744000000000000b7040000100000206a0700fe00000000850000002f000000b70000000a00000095000000000000006458c2c62fc286000389d909a63796c113a80c19aab9d646ae8f51b6cdf0d3253730e711f5969f62c28b22756bedf3cf393d14c46cc4f79fd2b316da4f0de8163f6242fa7323f1740637c48468766af540439f0500f144631ac2f9842e1b346362dcae08c3d1a1fbe96dd87235b44174f7c0343185089ab5119e31975e551558055dc2dce53b95c132e78454c4813681e0688d3a127f7418c6226f4133346c2e6794d952f2bb7938a2c53a0ce68e"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) socket$nl_route(0x10, 0x3, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = gettid() tkill(r1, 0x3b) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000400)) 11:45:13 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) socket$nl_route(0x10, 0x3, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r0 = gettid() tkill(r0, 0x3b) socket$inet_tcp(0x2, 0x1, 0x0) write$FUSE_OPEN(0xffffffffffffffff, &(0x7f00000001c0)={0x20, 0x0, 0x1, {0x0, 0x6}}, 0x20) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000400)) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000300)='cgroup.procs\x00', 0x2, 0x0) connect$inet(r1, &(0x7f0000000280)={0x2, 0x0, @local}, 0x10) [ 496.310105] net_ratelimit: 20 callbacks suppressed [ 496.310109] protocol 88fb is buggy, dev hsr_slave_0 [ 496.320152] protocol 88fb is buggy, dev hsr_slave_1 [ 496.550151] protocol 88fb is buggy, dev hsr_slave_0 [ 496.555494] protocol 88fb is buggy, dev hsr_slave_1 [ 496.640128] protocol 88fb is buggy, dev hsr_slave_0 [ 496.645539] protocol 88fb is buggy, dev hsr_slave_1 [ 497.270146] protocol 88fb is buggy, dev hsr_slave_0 [ 497.275233] protocol 88fb is buggy, dev hsr_slave_1 [ 497.590157] protocol 88fb is buggy, dev hsr_slave_0 [ 497.595494] protocol 88fb is buggy, dev hsr_slave_1 11:45:16 executing program 4: r0 = getpid() r1 = syz_open_dev$sndseq(&(0x7f0000000140)='/dev/snd/seq\x00', 0x0, 0x0) read(r1, &(0x7f0000000200)=""/28, 0x1cc) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000080)={0x1, @time}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r1, 0xc02c5341, &(0x7f0000000340)) timer_create(0x0, &(0x7f0000000100)={0x0, 0x12}, &(0x7f00000001c0)) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r1, 0xc0305302, &(0x7f00000003c0)) tkill(r0, 0x1000000000013) 11:45:16 executing program 0: perf_event_open(&(0x7f0000000440)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x220801, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r0, 0x800443d3, &(0x7f0000000580)={{0x0, 0x9, 0xffff, 0x7fffffff}, 0x100000000, 0x0, 0x9}) syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vcs\x00', 0x280200, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\xf6', 0x1ff) ioctl$RTC_EPOCH_READ(r1, 0x8008700d, &(0x7f0000000280)) getsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000300)=0xffff, &(0x7f0000000140)=0x4) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) bind$ax25(r0, &(0x7f0000000340)={{0x3, @null, 0x5}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x80000, 0x10064) r3 = openat$cgroup_procs(r2, &(0x7f0000000100)='cgroup.procs\x00', 0x2, 0x0) write$P9_RCLUNK(r1, &(0x7f00000001c0)={0x7, 0x79, 0x1}, 0x7) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.net/syz1\x00', 0x1ff) write$cgroup_pid(r3, &(0x7f0000000640), 0x12) 11:45:16 executing program 2: perf_event_open(&(0x7f0000000440)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x220801, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r0, 0x800443d3, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vcs\x00', 0x280200, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\xf6', 0x1ff) ioctl$RTC_EPOCH_READ(r1, 0x8008700d, &(0x7f0000000280)) getsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000300)=0xffff, &(0x7f0000000140)=0x4) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) bind$ax25(r0, &(0x7f0000000340)={{0x3, @null, 0x5}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x80000, 0x10064) r3 = openat$cgroup_procs(r2, &(0x7f0000000100)='cgroup.procs\x00', 0x2, 0x0) write$P9_RCLUNK(r1, &(0x7f00000001c0)={0x7, 0x79, 0x1}, 0x7) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.net/syz1\x00', 0x1ff) write$cgroup_pid(r3, &(0x7f0000000640), 0x12) 11:45:16 executing program 1: ioctl(0xffffffffffffffff, 0x200001000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000002c0)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000100000002402000020feffff7a0af0fff8ffffff69a4f0ff00000000b7060000000000000744000000000000b7040000100000206a0700fe00000000850000002f000000b70000000a00000095000000000000006458c2c62fc286000389d909a63796c113a80c19aab9d646ae8f51b6cdf0d3253730e711f5969f62c28b22756bedf3cf393d14c46cc4f79fd2b316da4f0de8163f6242fa7323f1740637c48468766af540439f0500f144631ac2f9842e1b346362dcae08c3d1a1fbe96dd87235b44174f7c0343185089ab5119e31975e551558055dc2dce53b95c132e78454c4813681e0688d3a127f7418c6226f4133346c2e6794d952f2bb7938a2c53a0ce68e"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) socket$nl_route(0x10, 0x3, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r0 = gettid() tkill(r0, 0x3b) socket$inet_tcp(0x2, 0x1, 0x0) write$FUSE_OPEN(0xffffffffffffffff, &(0x7f00000001c0)={0x20, 0x0, 0x1, {0x0, 0x6}}, 0x20) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000400)) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000300)='cgroup.procs\x00', 0x2, 0x0) connect$inet(r1, &(0x7f0000000280)={0x2, 0x0, @local}, 0x10) 11:45:16 executing program 3: perf_event_open(&(0x7f0000000440)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x220801, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r0, 0x800443d3, 0x0) syz_genetlink_get_family_id$tipc(0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\xf6', 0x1ff) ioctl$RTC_EPOCH_READ(0xffffffffffffffff, 0x8008700d, &(0x7f0000000280)) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x80000, 0x10064) r2 = openat$cgroup_procs(r1, &(0x7f0000000100)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f0000000640), 0x12) 11:45:16 executing program 5: perf_event_open(&(0x7f0000000440)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r0, 0x800443d3, &(0x7f0000000580)={{0x3, 0x9, 0xffff, 0x7fffffff}, 0x100000000, 0x0, 0x9}) syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vcs\x00', 0x280200, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\xf6', 0x1ff) ioctl$RTC_EPOCH_READ(r1, 0x8008700d, &(0x7f0000000280)) getsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000300)=0xffff, &(0x7f0000000140)=0x4) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) bind$ax25(r0, &(0x7f0000000340)={{0x3, @null, 0x5}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x80000, 0x10064) r3 = openat$cgroup_procs(r2, &(0x7f0000000100)='cgroup.procs\x00', 0x2, 0x0) write$P9_RCLUNK(r1, &(0x7f00000001c0)={0x7, 0x79, 0x1}, 0x7) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.net/syz1\x00', 0x1ff) write$cgroup_pid(r3, &(0x7f0000000640), 0x12) 11:45:16 executing program 2: perf_event_open(&(0x7f0000000440)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x220801, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r0, 0x800443d3, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\xf6', 0x1ff) ioctl$RTC_EPOCH_READ(0xffffffffffffffff, 0x8008700d, &(0x7f0000000280)) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x80000, 0x10064) r2 = openat$cgroup_procs(r1, &(0x7f0000000100)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f0000000640), 0x12) 11:45:16 executing program 5: perf_event_open(&(0x7f0000000440)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r0, 0x800443d3, &(0x7f0000000580)={{0x3, 0x9, 0xffff, 0x7fffffff}, 0x100000000, 0x0, 0x9}) syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vcs\x00', 0x280200, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\xf6', 0x1ff) ioctl$RTC_EPOCH_READ(r1, 0x8008700d, &(0x7f0000000280)) getsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000300)=0xffff, &(0x7f0000000140)=0x4) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) bind$ax25(r0, &(0x7f0000000340)={{0x3, @null, 0x5}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x80000, 0x10064) r3 = openat$cgroup_procs(r2, &(0x7f0000000100)='cgroup.procs\x00', 0x2, 0x0) write$P9_RCLUNK(r1, &(0x7f00000001c0)={0x7, 0x79, 0x1}, 0x7) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.net/syz1\x00', 0x1ff) write$cgroup_pid(r3, &(0x7f0000000640), 0x12) 11:45:16 executing program 3: perf_event_open(&(0x7f0000000440)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x220801, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r0, 0x800443d3, &(0x7f0000000580)={{0x3, 0x9, 0xffff, 0x7fffffff}, 0x100000000, 0x0, 0x9}) syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vcs\x00', 0x280200, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\xf6', 0x1ff) ioctl$RTC_EPOCH_READ(r1, 0x8008700d, &(0x7f0000000280)) getsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000300)=0xffff, &(0x7f0000000140)=0x4) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) bind$ax25(r0, &(0x7f0000000340)={{0x3, @null, 0x5}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x80000, 0x10064) r3 = openat$cgroup_procs(r2, &(0x7f0000000100)='cgroup.procs\x00', 0x2, 0x0) write$P9_RCLUNK(r1, &(0x7f00000001c0)={0x7, 0x79, 0x1}, 0x7) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.net/syz1\x00', 0x1ff) write$cgroup_pid(r3, &(0x7f0000000640), 0x12) 11:45:16 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0xfffffffffffff192, 0x0) faccessat(r0, &(0x7f0000000180)='./bus\x00', 0x2, 0x100) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) statfs(&(0x7f0000000240)='./bus\x00', &(0x7f0000000900)=""/147) 11:45:16 executing program 0: perf_event_open(&(0x7f0000000440)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x220801, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r0, 0x800443d3, &(0x7f0000000580)={{0x3, 0x9, 0xffff, 0x7fffffff}, 0x100000000, 0x0, 0x9}) syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vcs\x00', 0x280200, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\xf6', 0x1ff) ioctl$RTC_EPOCH_READ(r1, 0x8008700d, &(0x7f0000000280)) getsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000300)=0xffff, &(0x7f0000000140)=0x4) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) bind$ax25(r0, &(0x7f0000000340)={{0x3, @null, 0x5}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x80000, 0x10064) r3 = openat$cgroup_procs(r2, &(0x7f0000000100)='cgroup.procs\x00', 0x2, 0x0) write$P9_RCLUNK(r1, &(0x7f00000001c0)={0x7, 0x79, 0x1}, 0x7) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.net/syz1\x00', 0x1ff) write$cgroup_pid(r3, &(0x7f0000000640), 0x12) 11:45:16 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = geteuid() getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000040)=0xc) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000280)={r0, &(0x7f0000000180)="d49c11729ef14fcab0eb30a49c65b7e803695db500c5b082210cba18901f5dea07aa2fa15967b22d5244ba5b8e236614326978467b00354da9e1a5586c5d032c828294235c006b6e2041f780", &(0x7f00000009c0)="bddac7d25939ee2a3e93201200d1463af6192823613fa8f33b1a87ed3f0292b431b2599c15df797b465c6041f9aec92f64aa389e5638d778ba00c004d322b3f8d156976e25ae02b87686c22fa1b87bfb01bf889edc39e98680b837d5b843a848eb98239cd1d3e53155fd0deeb6a11959664bc520edb0b75e32f75e998a2fa9467094805b236f60001dd0abc11fad3d038c5a232fe60684f8734e402f64f3f7b7fc7cfc8f58925d60da77f033f9bd749cb5eb2908bfd0e73d9e18ac2fdd3585fc9d19afd930811dda162baa486dd11527b76f6fadb359c5b7e1d46dd3693793dffd03af2af18bd8919c026a7ce7cbf8c625a75dc9b92d15ec934315127fde14801fc2e895d1f020c47ff2be026db13d6619cd2f5055e630b0ccee638b8ac1a2186572190782d3380c7d432f1a57ea2b0122bff4a5ad0cbb8ab4e9cc74422a6bb959b8925565fec281a35de718f456137e69be0617878a86f25f4127a25d106bb7166d5ad2867df0d77741e008a53740fae25ed09273d0153ef4f119945b5f9f38845ea4125a089ce6eba678dd2bc67aca5cc20825483eb534c5b8652540cb5120efa5490ef45db802e526f258683f236bf67c07974b531a89f7f4cde6821f345740da8a956c9050519f74be5ad268d731890a1d1e71c82b14080d30b8ecf8499f62162fe43f93f13efa168a5545ee8c2e8fc2724a0b3fc32a3b8846880387103edf5b1386ab7d87420ce6225aa7a1e06054bbd35a34c340eb746b22629ed368256a822ae5511b96b3d2d9a97b1ba91e8c200fa2ba61ea86665ec1fd8ba97b5140348b373b21ae420934968e24e19f2e983bdc4db5b1656a30a2e455689a2cd4d15830915f5076b5c48580542773a34b62d13e90bc112f702bf2fe2e1f0a38eb71ac3bfae671ec4b5c9b55321343248e04e2bcfcfa4b328057e7acab4bffdebf4b20f3312ed34af72cbb87e806debcc652df77442548dde439ba1dfcaa9c10870f041a19d86a30856f8605e283879b799aa205fb774623ef8348fe0e48897cae47c50965418dd1c948e4b3cf4f652afcd5f9854516eac48b658c3b46ef483ca589aa8c51cadd69a09ea12cbc40457823c6290963d35792ba265bb91500902c9d7e7a049404dc529d56171eb39033b3fa2095d930dd3e16d378873fac13b2af891c8fcf3a9345397b2369c93ee457a24177e89155f168369bd54c49a90e03f5204d5a24721ea5d129e92360e6c219d793ed9e8881e745802682b3e90cdee815bbb0d5ea461390493bee6e2219860a353a0d30a0e1a8f32d76004567ca743dafdee8bc741162f90db423b5cec4a0a1135c280a270ab8b8593c576de32945174a74ddbf3a49cba338b55c7a9b25a2e1dc0a6a6dd5ac8ca8806f79609f9a3ee227d4fdf847185580e20ada2ac0db3a0f04460a0acd2fad7f43058e0149d9101bb64aeb7b43943a73a3c6708c7f93ae2e6ca89c06b1239c1df7f298926e133e5f7ad064a1b49ecf63a8e4599b1913e768675d2788982206cd0766a66447d7a0897d525d36c4bd70703054cd8f1295f2013fdd19de011a46d30963b7acb051426c68e021d2fc18006ef078a7bb6fa350afe35675092d7fa6e2e6bc9d5446c3859582fcfd70c96dd302dc34f85b5c64278707a2dbc077a4a7fd17af9ab06caec3015b766e9868dc02563537ab96d48cab146c471ac40929c3c7633e56080a375fcc76e4b5599b865b2e6e1ec2d7c10a9de962ad451b50f65afa1463a85ba9ba30dbcd4db6a568bb1e79f4dc0bcf92b3de63712cb7baf54163880039f186d60cdb18ce4f66fe3bfc02f77770c115ea50b8cce1092a62c068dc1858dc818e882a2fbeb67badb61f8a8ecda266799d75f19bdad91573699c2ce5f3522c2d57a9629d6416ae2231eed9b0d796504b5934973cca85534ce27cdaa834fb95e108d501dd2fa6c988a52fccf7b073a704e368f097ba902e0a2a36cf70932816d360d06f347c4d62d0799e325bf87f3cd4bc08d7f63890a291d7a0a7ace9d554bb38086f17d7102332abfb0beae1783a1863ee51056642d35e00ed594539f10b83f440e28fa034b9a13e3628cf94f14d61b7efcc51365f63833eda82ccdc55f0d1abe39ff3b2a512822f626387a43502d2ca742fc56615da7e578711af4bf0f422729907f18d4159e92bcc573a703c24eec04b76aeef75f75a8d08f3b55c34cedea43f2f670240bec865ac8b0c15cdb4571cb42b0b0cc820e98263ac330e3c1cc71937b3d3c3aed60dba82f1acc7fd2d56ed33e472a1aa21b8f0609b59f4dd2451953344b2f31570ce8f77b64e4bfb6c21609c833049d842cf3ac9cbe9efa30b3a73f6a650128bf4cfbfc90633187781b1ed74b8d89bda74ea689ba4ff625f25a11b94a860748bedd956951017dc3ea3e4cecdfb7056b4290234c642def3442fe6c8b531bd6e4764a55a19eec735b299c6f398909273f6a9c2cfbddd0ab5518fa2a77a7462d3335dd44cabad85a8104e4b2d0f0b27fa5481d3fad30a619e53cfb23e78383121dc8472e6338a68e5829b8af6fe441b5dd55b1ef3558f1f9eaf932cf8f7aa4224d32b50f5146422237af6a69fafdc19c9af85da195c06852079760f00d7e406d9597ec6523e812527eb47ec5acc151644ef659003fce579ac01eeb42cfa0ffc40f1111ff4ec6293d0649e3a3be5eb1194fd40d38ff854cea6277cfbaa8acc42e6c585f9efc457988c561ca9af6492812927fe5e6becaef98544a4d95b50111def4afda6d9414b7b95b3aa7fd5b3d172e5c7d7d055313d4513721fabb9d0ab2a17203ccf3100bef2529b49134eb94dec4d9c528edb2a8982ef4c85f99763cc0de0d5c723610119d68af2254caa7e71adf376c53574f357975afdcc86549d26e2381e862cce05bdebdad96c33a1907e9e74f43b84603f79c35af0068fcad98ee55017779a551b252411eb104a1bc548e1a28857692b78e04077134ba28a3fa38fbedc32b53d7ce3aabb234b4084309c4a1cb3d7d64d63edcc151b0eba8561bda3589ed8915c5a3656b6d1f0ae00a2a8fe72374b9f28e7a2bec89e42437a6b4cee5252c6a5801a04699c5b7e99afd696d80a07af075c9bf866d5a91d35e162385530ff35b9e05d9876f6b39b920d3fc2b3c71003ed06749a4058ba0540b21a66c588569566470c7f8841809480483d00f5035aef7798fdeaad965ed5bc0af5095f77426c1157e15da1f971fd736e503b68e755c02fbe05007c35b09441e052dfe538e1501bca850b34d6fee19a54500e7d976120bbf310e4b13009bf35e8d24eece5d899969e4f06ae75f3b6f9275b6c01dbf9da46573226da75a08db8c48f281c14ff5ca314d9fd8951c55f79b295679ee43faf2c8847de82fe8bd58ab8bd61bd26a026bd09d7ccd24fb0a605b9ca7c1a79b3bccbe7ec7ad50549fde9a6aae5ccd19d8841b38c0ac539be44e2f35785169ed82ddf0186a025e2126b7f7093dd6f3189cd0145ddc020521d957701f7797d44959038b5c5d74577e567c78c1c3c02a5d82ff8da69086ba4f7f440259e2bfac2c82a255e9bda26b0be7c3e0a147fe7ba8853df3cef967703b20784219c76328676a0d8fd05dbe3e69e4a59c37f6d2bb2e4fb99710a80952fe02f69f5b1c5c4ac10b1a54c08cb1fa6f6a99b6aff7a259dd43152bbb103364c791d0eef35be9c89376675c027d1f6fafbed4e5cf3694dd7a21d3b477108b0cd9bed3836353d1b93d935d1966c7058871e4bb316d9789fbc6b6c7d314633b85b6bbe771a375bd5b1622587fd829b26c2554071df48afcc31f04d12e70c108bc0169318aeef8c87542806b3b994cd81d88461ce2196e643f2d08d6a5ce5315b482e53efaf0dddf922095f1b6533a9d63c60d81bd8be9ad11c1c27ec93ec1c8d166894676a341aaf3af07857df7c28d109e73a6fac728c7d4d886daa3f630577822f572b15a0ec89ee6a90af7a34566c2021e7e8e75af1a632bb2f8036967cd196813157998533353cb6d2010e0c4ad9503420e2845b774d1b4277f8b1cc910c9f3a76f1d86bf47e7f8d4bc94fa55e999521362704f89436def549be571dc9cb67f86e5b9f985b51a297d2db4048ed3e6061ddcd8b151a76fde3f5ff56a2a1475668b9a00324561001dd265f8e16f763c21ba1a74a692341ae4bf8c3d60431101a794f67cd4c498bc60c36a5440de6862b4ece58a8d70ca087b1cc1b8cb71e1f4637fe13648934ca83a2fc16b13a6730e61eb80bac10ca049948c769f33105f887e36692e555d91385d9e80ed90dc122d714513a124f01eb4cc3322ce4ea4161904ec92dc632882a567a676f31df88e789edaec8bef2101e13bc6bd68d3b55a889b698e9df61d8363cc2f3e4460ddbf4b6fe49bd74d588d80d6baead6a1777efd045754680af5639164567d6948cf341ca1b7981065752af06d36c87b9e51c624b9ca657c47b2b1bac7fce47c43200af69b25232db0cc40e369d3144e6c1de1c1e90cad27f50dac786ae89420822c1473d0003239f7e49f4e4322fe111914d43dcdf2990dc0805ac7915c1b9eba8fa2c0c08c7ac5b3699212ee3477e164dbeb4211986058de6f39f7abc826388fd10a53d92eb14ecdc28f135f01f2e5ce5f2c29ba496d34208e67c66bfd0c4eb8f58c84ec75445da95210b04d2ebcf1ae99882386a2d002a9fd756145376ecc1b16b1ae6f11cebc4ac757bfbe3e5c454623ad115dcdc5ed59ceb332772d8d1093711910962d171a87a32f45364af87d0639bf25c4a66b3f28e84c3c986c38e2a92e881d60bb421b80d2da4c283f0a6399903757022478f22f2e141199783e7bc0f513d8433858db2b6225ed6dbff04dd400397319a0aebb80e4100c5089f3f50309a2e503f734f2ef79ef609fea73b0f992e6182b4f2dc8f94fcc9822ffb7f876f2be26512072e88713ee3a2c3d318d6b47361247a636744b7873bb900bf87c6038b1f15ffe7111aa85cf08370bcd8052944670ef632ef3843ed29cf5c50ae445448b4dd3c4be03c664a94c85f82a6c81d9f73419d2f22912420e8173b7830dd016fc4d106c3d6d7363f5f07e06e02a3dfd0b252e4048174f977f91df8f997febb9221f0cee8896fa0a1857beedccc020e2f98746ff4b6c6818eb7cd3b72889492857206ad857903f37ad186fbb2a8786bf478cfa0397a534137841e29f22186c2818d621fea06813210f4fd856d102211b8dbf31c1d65ef8aec5f21cabf4612b934ba957a587ec041e74f6c74b60a56c81f6a73c585f3fe8430b43c70d43bc802daf97dfb35f833e144039defb7b565a4d2767f0b6acba9b48ceb63710a974ad764dd1377ad3f7309c6bdd9ea45a549a51faaafe0d16662f56fe39e0db2c5fac7708267121ad26e8237d15bfe3d61409198249407cc28e94213c3a989186e4ec249ab7b09498a582b454ecc5eb98f7d9bb591dd580c50bccbd6ba1c8944f700b4840e443ef8f05e9deaadea3d26567cf17e2ec687a22b92551c08444cb2c85b5bd77e5fc9b5ce4ce88d928ab80b8d722d15bedd33aeaf18da4a8e24fde77359e486da69ec8bfd27c9bc336704ed4784c094976a3f7ec0a26d653867d657764733a2c13ec58ec5e0217e40c3d15190aaadab9005fc2d4b0c4505b0d62f03e09d3e49f67528e73d012c28f2382c170dd5cb774b1bc48a58eb14225e9b20d673c4b7e156aa04991c82cb1263c66375e7d84e6f95781d62664db5098bc6792995d5e3d370e9222f005d01eb79e14649c15e2928f2375aeea9676b4cba01577ec5d16b74fd379c35559a2826b6877da1ef", 0x2}, 0x20) fchown(r1, r2, r3) statfs(&(0x7f0000000240)='./bus\x00', &(0x7f0000000900)=""/147) [ 501.430125] net_ratelimit: 20 callbacks suppressed [ 501.430130] protocol 88fb is buggy, dev hsr_slave_0 [ 501.440253] protocol 88fb is buggy, dev hsr_slave_1 [ 501.750089] protocol 88fb is buggy, dev hsr_slave_0 [ 501.755161] protocol 88fb is buggy, dev hsr_slave_1 11:45:19 executing program 4: r0 = getpid() r1 = syz_open_dev$sndseq(&(0x7f0000000140)='/dev/snd/seq\x00', 0x0, 0x0) read(r1, &(0x7f0000000200)=""/28, 0x1cc) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000080)={0x1, @time}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r1, 0xc02c5341, &(0x7f0000000340)) timer_create(0x0, &(0x7f0000000100)={0x0, 0x12}, &(0x7f00000001c0)) timer_settime(0x0, 0x0, &(0x7f0000000240)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) tkill(r0, 0x1000000000013) 11:45:19 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x200001000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) socket$kcm(0x11, 0x8000000002, 0x300) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) socket$nl_route(0x10, 0x3, 0x0) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/commit_pending_bools\x00', 0x1, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_open_dev$vcsn(0x0, 0x0, 0x1) fstat(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$overlay(0x0, 0x0, 0x0, 0x200000, &(0x7f00000005c0)={[], [{@subj_type={'subj_type', 0x3d, '/dev/vcs#\x00'}}, {@defcontext={'defcontext', 0x3d, 'user_u'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@euid_gt={'euid>', r2}}]}) r3 = openat(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0x1, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r4 = gettid() getsockopt$IP_VS_SO_GET_INFO(r3, 0x0, 0x481, &(0x7f0000000040), &(0x7f0000000080)=0xc) tkill(r4, 0x3b) socket$inet_tcp(0x2, 0x1, 0x0) write$FUSE_OPEN(r1, &(0x7f00000001c0)={0x20, 0x0, 0x1, {0x0, 0x6}}, 0x20) r5 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000400)) openat$cgroup_procs(r1, &(0x7f0000000300)='cgroup.procs\x00', 0x2, 0x0) connect$inet(r5, &(0x7f0000000280)={0x2, 0x0, @local}, 0x10) 11:45:19 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000340)={0x0, 0x0}) write$sndseq(r0, &(0x7f0000000380)=[{0x1, 0x7, 0x0, 0x1000, @time={r1, r2+30000000}, {0x5ef1, 0x400}, {0x0, 0x63ab}, @raw32={[0xfffffffffffffffe, 0x4, 0x80]}}, {0x6, 0x8e, 0x7e28, 0x80000001, @tick=0x40, {0xda, 0x6}, {0x2, 0x8}, @queue={0x5, {0x2, 0x80000001}}}], 0x60) fchdir(r0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_SET(r0, &(0x7f0000000300)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000580)=ANY=[@ANYBLOB="b1da005ba4d6de1803004805220ea0297d7a296fea03a7686557e36bfd1e83d389d79d4fc54926d5b9fb07000000000000000091e6a14346329ee33debdc492bf12f61e0b95f3822d2a7ab04a33883eafc3db7f8ad385ae28de6196b6ebd9e6b755b549594a3ed5d0e20ab9d0bcd50c73784314da9b4677afdfcb2ceda0ba6eee19a627440cb0ebfad62b468cbe0f2ed87ad7830b00670d7f4a9", @ANYRES16=r3, @ANYBLOB="2786259356b0f0dbdf2505000000"], 0x14}, 0x1, 0x0, 0x0, 0x8000}, 0x800) r4 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) r5 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000001c0)={'vcan0\x00', 0x20}) ioctl$FS_IOC_RESVSP(r5, 0x40305828, &(0x7f0000000000)={0x0, 0x4, 0x401, 0x3}) statfs(&(0x7f0000000240)='./bus\x00', &(0x7f0000000480)=""/147) 11:45:19 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) statfs(&(0x7f0000000240)='./bus\x00', &(0x7f0000000900)=""/147) r1 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/status\x00', 0x0, 0x0) mmap$binder(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x1, 0x11, r1, 0x0) unshare(0x40000000) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ptrace$setsig(0x4203, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xe, 0x8031, r2, 0x0) setsockopt$inet_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000240)=@gcm_128={{}, "64b80a048fe965f7", "b1e2348cd151dfa1273b409f60cf16bc", "4fd05d25", "93ad1cbe28a42746"}, 0x28) ioctl$TIOCSSOFTCAR(0xffffffffffffffff, 0x541a, &(0x7f0000000000)=0xffffffff) utimensat(r0, &(0x7f0000000180)='./file1\x00', &(0x7f00000001c0), 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x3e, &(0x7f00000000c0)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaaaa080045000030000000d66607d96fdd550000009078ac2314bbac1414000304907800000000450000000000000000000000ac"], 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8923, &(0x7f0000000200)={'ip_vti0\x00', 0x3001}) readv(0xffffffffffffffff, &(0x7f0000001640)=[{&(0x7f00000000c0)=""/11, 0xb}, {&(0x7f0000000340)=""/91, 0x5b}, {&(0x7f0000000540)=""/4096, 0x1000}, {&(0x7f00000003c0)=""/175, 0xaf}, {&(0x7f00000015c0)=""/107, 0x6b}], 0x5) ioctl$EVIOCGID(r0, 0x80084502, &(0x7f0000000300)=""/32) write$P9_RSETATTR(r0, &(0x7f0000000000)={0x7, 0x1b, 0x2}, 0x7) 11:45:19 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = getuid() getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0, 0x0}, &(0x7f0000000280)=0xc) stat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000003c0)={{{@in, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@dev}}, &(0x7f00000004c0)=0xe8) mount$fuseblk(&(0x7f0000000000)='/dev/loop0\x00', &(0x7f0000000040)='./bus\x00', &(0x7f0000000180)='fuseblk\x00', 0x20, &(0x7f0000000580)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, r2}, 0x2c, {'group_id', 0x3d, r3}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x7ff}}, {@blksize={'blksize', 0x3d, 0x1000}}, {@blksize={'blksize', 0x3d, 0x1000}}], [{@fowner_gt={'fowner>', r4}}, {@subj_type={'subj_type', 0x3d, 'vfat\x00'}}, {@pcr={'pcr', 0x3d, 0x29}}, {@subj_user={'subj_user', 0x3d, 'vfat\x00'}}, {@subj_role={'subj_role', 0x3d, '}%ppp1$selftrusted\\\\nodev!'}}, {@audit='audit'}, {@obj_user={'obj_user', 0x3d, 'vfat\x00'}}, {@euid_lt={'euid<', r5}}]}}) statfs(&(0x7f0000000240)='./bus\x00', &(0x7f0000000900)=""/147) 11:45:19 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = geteuid() getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000040)=0xc) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000280)={r0, &(0x7f0000000180)="d49c11729ef14fcab0eb30a49c65b7e803695db500c5b082210cba18901f5dea07aa2fa15967b22d5244ba5b8e236614326978467b00354da9e1a5586c5d032c828294235c006b6e2041f780", &(0x7f00000009c0)="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", 0x2}, 0x20) fchown(r1, r2, r3) statfs(&(0x7f0000000240)='./bus\x00', &(0x7f0000000900)=""/147) 11:45:19 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x200001000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) socket$kcm(0x11, 0x8000000002, 0x300) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) socket$nl_route(0x10, 0x3, 0x0) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/commit_pending_bools\x00', 0x1, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_open_dev$vcsn(0x0, 0x0, 0x1) fstat(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$overlay(0x0, 0x0, 0x0, 0x200000, &(0x7f00000005c0)={[], [{@subj_type={'subj_type', 0x3d, '/dev/vcs#\x00'}}, {@defcontext={'defcontext', 0x3d, 'user_u'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@euid_gt={'euid>', r2}}]}) r3 = openat(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0x1, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r4 = gettid() getsockopt$IP_VS_SO_GET_INFO(r3, 0x0, 0x481, &(0x7f0000000040), &(0x7f0000000080)=0xc) tkill(r4, 0x3b) ioctl$BLKGETSIZE(r1, 0x1260, &(0x7f0000000140)) socket$inet_tcp(0x2, 0x1, 0x0) r5 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000400)) openat$cgroup_procs(r1, &(0x7f0000000300)='cgroup.procs\x00', 0x2, 0x0) connect$inet(r5, &(0x7f0000000280)={0x2, 0x0, @local}, 0x10) 11:45:19 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x220801, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r0, 0x800443d3, &(0x7f0000000580)={{0x3, 0x9, 0xffff, 0x7fffffff}, 0x100000000, 0x0, 0x9}) syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vcs\x00', 0x280200, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\xf6', 0x1ff) ioctl$RTC_EPOCH_READ(r1, 0x8008700d, &(0x7f0000000280)) getsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000300)=0xffff, &(0x7f0000000140)=0x4) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) bind$ax25(r0, &(0x7f0000000340)={{0x3, @null, 0x5}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x80000, 0x10064) r3 = openat$cgroup_procs(r2, &(0x7f0000000100)='cgroup.procs\x00', 0x2, 0x0) write$P9_RCLUNK(r1, &(0x7f00000001c0)={0x7, 0x79, 0x1}, 0x7) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.net/syz1\x00', 0x1ff) write$cgroup_pid(r3, &(0x7f0000000640), 0x12) 11:45:19 executing program 0: perf_event_open(&(0x7f0000000440)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x220801, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\xf6', 0x1ff) ioctl$RTC_EPOCH_READ(0xffffffffffffffff, 0x8008700d, &(0x7f0000000280)) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x80000, 0x10064) r1 = openat$cgroup_procs(r0, &(0x7f0000000100)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000640), 0x12) 11:45:19 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(r0, 0x111, 0x1, 0xa1, 0x4) open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) statfs(&(0x7f0000000240)='./bus\x00', &(0x7f0000000900)=""/147) [ 502.150093] protocol 88fb is buggy, dev hsr_slave_0 [ 502.155351] protocol 88fb is buggy, dev hsr_slave_1 11:45:19 executing program 5: perf_event_open(&(0x7f0000000440)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(0xffffffffffffffff, 0x800443d3, &(0x7f0000000580)={{0x3, 0x9, 0xffff, 0x7fffffff}, 0x100000000, 0x0, 0x9}) syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vcs\x00', 0x280200, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\xf6', 0x1ff) ioctl$RTC_EPOCH_READ(r0, 0x8008700d, &(0x7f0000000280)) getsockopt$netrom_NETROM_T4(0xffffffffffffffff, 0x103, 0x6, &(0x7f0000000300)=0xffff, &(0x7f0000000140)=0x4) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) bind$ax25(0xffffffffffffffff, &(0x7f0000000340)={{0x3, @null, 0x5}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x80000, 0x10064) r2 = openat$cgroup_procs(r1, &(0x7f0000000100)='cgroup.procs\x00', 0x2, 0x0) write$P9_RCLUNK(r0, &(0x7f00000001c0)={0x7, 0x79, 0x1}, 0x7) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.net/syz1\x00', 0x1ff) write$cgroup_pid(r2, &(0x7f0000000640), 0x12) [ 502.302925] IPVS: ftp: loaded support on port[0] = 21 11:45:19 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(r0, 0x111, 0x1, 0xa1, 0x4) open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) statfs(&(0x7f0000000240)='./bus\x00', &(0x7f0000000900)=""/147) [ 502.550148] protocol 88fb is buggy, dev hsr_slave_0 [ 502.555267] protocol 88fb is buggy, dev hsr_slave_1 [ 502.800675] protocol 88fb is buggy, dev hsr_slave_0 [ 502.806141] protocol 88fb is buggy, dev hsr_slave_1 11:45:20 executing program 4: r0 = getpid() r1 = syz_open_dev$sndseq(&(0x7f0000000140)='/dev/snd/seq\x00', 0x0, 0x0) read(r1, &(0x7f0000000200)=""/28, 0x1cc) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000080)={0x1, @time}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r1, 0xc02c5341, &(0x7f0000000340)) timer_create(0x0, &(0x7f0000000100)={0x0, 0x12}, &(0x7f00000001c0)) timer_settime(0x0, 0x0, &(0x7f0000000240)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) tkill(r0, 0x1000000000013) 11:45:20 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x200001000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000002c0)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000100000002402000020feffff7a0af0fff8ffffff69a4f0ff00000000b7060000000000000744000000000000b7040000100000206a0700fe00000000850000002f000000b70000000a00000095000000000000006458c2c62fc286000389d909a63796c113a80c19aab9d646ae8f51b6cdf0d3253730e711f5969f62c28b22756bedf3cf393d14c46cc4f79fd2b316da4f0de8163f6242fa7323f1740637c48468766af540439f0500f144631ac2f9842e1b346362dcae08c3d1a1fbe96dd87235b44174f7c0343185089ab5119e31975e551558055dc2dce53b95c132e78454c4813681e0688d3a127f7418c6226f4133346c2e6794d952f2bb7938a2c53a0ce68e"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) socket$kcm(0x11, 0x8000000002, 0x300) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) socket$nl_route(0x10, 0x3, 0x0) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/commit_pending_bools\x00', 0x1, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_open_dev$vcsn(0x0, 0x0, 0x1) fstat(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$overlay(0x0, 0x0, 0x0, 0x200000, &(0x7f00000005c0)={[], [{@subj_type={'subj_type', 0x3d, '/dev/vcs#\x00'}}, {@defcontext={'defcontext', 0x3d, 'user_u'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@euid_gt={'euid>', r2}}]}) r3 = openat(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0x1, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r4 = gettid() getsockopt$IP_VS_SO_GET_INFO(r3, 0x0, 0x481, &(0x7f0000000040), &(0x7f0000000080)=0xc) tkill(r4, 0x3b) ioctl$BLKGETSIZE(r1, 0x1260, &(0x7f0000000140)) socket$inet_tcp(0x2, 0x1, 0x0) write$FUSE_OPEN(r1, &(0x7f00000001c0)={0x20, 0x0, 0x1, {0x0, 0x6}}, 0x20) r5 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000400)) openat$cgroup_procs(r1, &(0x7f0000000300)='cgroup.procs\x00', 0x2, 0x0) connect$inet(r5, &(0x7f0000000280)={0x2, 0x0, @local}, 0x10) 11:45:20 executing program 0: perf_event_open(&(0x7f0000000440)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x220801, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r0, 0x800443d3, &(0x7f0000000580)={{0x3, 0x9, 0xffff, 0x7fffffff}, 0x100000000, 0x0, 0x9}) syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') openat$vcs(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vcs\x00', 0x280200, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\xf6', 0x1ff) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x80000, 0x10064) r2 = openat$cgroup_procs(r1, &(0x7f0000000100)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f0000000640), 0x12) 11:45:20 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) signalfd(r1, &(0x7f0000000000)={0x2}, 0x8) statfs(&(0x7f0000000240)='./bus\x00', &(0x7f0000000900)=""/147) 11:45:20 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(r0, 0x111, 0x1, 0xa1, 0x4) open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) statfs(&(0x7f0000000240)='./bus\x00', &(0x7f0000000900)=""/147) 11:45:20 executing program 5: perf_event_open(&(0x7f0000000440)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x220801, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r0, 0x800443d3, &(0x7f0000000580)={{0x3, 0x9, 0xffff, 0x7fffffff}, 0x100000000, 0x0, 0x9}) syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vcs\x00', 0x280200, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\xf6', 0x1ff) ioctl$RTC_EPOCH_READ(r1, 0x8008700d, &(0x7f0000000280)) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x80000, 0x10064) r3 = openat$cgroup_procs(r2, &(0x7f0000000100)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f0000000640), 0x12) 11:45:20 executing program 0: perf_event_open(&(0x7f0000000440)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x220801, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r0, 0x800443d3, &(0x7f0000000580)={{0x3, 0x9, 0xffff, 0x7fffffff}, 0x100000000, 0x0, 0x9}) syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vcs\x00', 0x280200, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\xf6', 0x1ff) ioctl$RTC_EPOCH_READ(r1, 0x8008700d, &(0x7f0000000280)) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x80000, 0x10064) r3 = openat$cgroup_procs(r2, &(0x7f0000000100)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f0000000640), 0x12) 11:45:20 executing program 2: perf_event_open(&(0x7f0000000440)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x220801, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r0, 0x800443d3, &(0x7f0000000580)={{0x3, 0x9, 0xffff, 0x7fffffff}, 0x100000000, 0x0, 0x9}) syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vcs\x00', 0x280200, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\xf6', 0x1ff) ioctl$RTC_EPOCH_READ(r1, 0x8008700d, &(0x7f0000000280)) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) bind$ax25(r0, &(0x7f0000000340)={{0x3, @null, 0x5}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x80000, 0x10064) r3 = openat$cgroup_procs(r2, &(0x7f0000000100)='cgroup.procs\x00', 0x2, 0x0) write$P9_RCLUNK(r1, &(0x7f00000001c0)={0x7, 0x79, 0x1}, 0x7) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.net/syz1\x00', 0x1ff) write$cgroup_pid(r3, &(0x7f0000000640), 0x12) 11:45:20 executing program 1: perf_event_open(&(0x7f0000000440)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x220801, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r0, 0x800443d3, &(0x7f0000000580)={{0x3, 0x9, 0xffff, 0x7fffffff}, 0x100000000, 0x0, 0x9}) syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vcs\x00', 0x280200, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\xf6', 0x1ff) ioctl$RTC_EPOCH_READ(r1, 0x8008700d, &(0x7f0000000280)) getsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000300)=0xffff, &(0x7f0000000140)=0x4) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x80000, 0x10064) r3 = openat$cgroup_procs(r2, &(0x7f0000000100)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f0000000640), 0x12) 11:45:20 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x200001000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) socket$kcm(0x11, 0x8000000002, 0x300) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) socket$nl_route(0x10, 0x3, 0x0) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/commit_pending_bools\x00', 0x1, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_open_dev$vcsn(0x0, 0x0, 0x1) fstat(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$overlay(0x0, 0x0, 0x0, 0x200000, &(0x7f00000005c0)={[], [{@subj_type={'subj_type', 0x3d, '/dev/vcs#\x00'}}, {@defcontext={'defcontext', 0x3d, 'user_u'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@euid_gt={'euid>', r2}}]}) r3 = openat(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0x1, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r4 = gettid() getsockopt$IP_VS_SO_GET_INFO(r3, 0x0, 0x481, &(0x7f0000000040), &(0x7f0000000080)=0xc) tkill(r4, 0x3b) ioctl$BLKGETSIZE(r1, 0x1260, &(0x7f0000000140)) r5 = socket$inet_tcp(0x2, 0x1, 0x0) write$FUSE_OPEN(r1, &(0x7f00000001c0)={0x20, 0x0, 0x1, {0x0, 0x6}}, 0x20) r6 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r5, &(0x7f00000004c0)={0x2, 0x4e24, @rand_addr=0x8}, 0x10) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000400)) openat$cgroup_procs(r1, &(0x7f0000000300)='cgroup.procs\x00', 0x2, 0x0) connect$inet(r6, &(0x7f0000000280)={0x2, 0x0, @local}, 0x10) getsockopt$inet_mreqsrc(r6, 0x0, 0x26, &(0x7f0000000240)={@remote, @loopback, @loopback}, &(0x7f00000002c0)=0xc) ioctl$sock_inet_SIOCADDRT(r6, 0x890b, &(0x7f0000000080)={0x750, {0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x17}}, {0x2, 0x4e22, @remote}, {0x2, 0x4e20, @broadcast}, 0x0, 0x0, 0x2, 0x46a, 0x0, 0x0, 0x1000, 0x800000000, 0xffffffffffffffff}) accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000000440)=0xfffffffffffffd51) 11:45:20 executing program 5: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/pmtu_disc\x00', 0x2, 0x0) fcntl$setlease(r0, 0x400, 0x3) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000280)=0xc) getresgid(&(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000500)=0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000580)={{{@in=@multicast1, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in6=@ipv4={[], [], @loopback}}}, &(0x7f00000004c0)=0x1bb) mount$fuse(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000180)='fuse\x00', 0x40000, &(0x7f0000000680)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB="2c726f6f746d6f64653d303030303030303030f210f143574730303030303030303031303030302c7573", @ANYRESDEC=r3, @ANYBLOB=',group_id=', @ANYRESDEC=r4, @ANYBLOB=',allow_other,max_read=0x0000000000000006,blksize=0x0000000000000800,blksize=0x0000000000001400,fowner>', @ANYRESDEC=r5, @ANYBLOB=',\x00']) statfs(&(0x7f0000000240)='./bus\x00', &(0x7f0000000900)=""/147) 11:45:20 executing program 0 (fault-call:4 fault-nth:0): r0 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000240)={0x0, 0x9, 0x1, {0xb, @sdr={0x0, 0x1}}}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000440)={0x0, 0x1ff, 0x1, {0xb, @raw_data="b57ec6e2ccfebc2f19650bb2b17372c05fea81c70a61a58b97c5bffa8f3ff22ef5e44f8d5bcd9a7e6ad039656c778e3defde487514c27a53e5ab19e7d988086662bc7d2936c0ce17f57929fe03c491a499d671387a8c4a9d52f2fa0f12b0c8a6fbac0bf52fe8075949b6f554aad4d9906746094746213d701bdbfdddfab15780f0ff892ac680cdf8d58b6eec86af9447e96b23570e54caa7549caa341c121bd9f0d43abff4054dc2ade5aa89ec0521282cbd701f60913b7986f0199bcfb06c4d3b1bf98e836e40ac"}}) [ 503.505016] FAULT_INJECTION: forcing a failure. [ 503.505016] name failslab, interval 1, probability 0, space 0, times 0 [ 503.540828] CPU: 0 PID: 15181 Comm: syz-executor.0 Not tainted 4.14.139 #35 [ 503.548074] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 503.557421] Call Trace: [ 503.560008] dump_stack+0x138/0x19c [ 503.563634] should_fail.cold+0x10f/0x159 [ 503.567768] should_failslab+0xdb/0x130 [ 503.571729] kmem_cache_alloc_node_trace+0x280/0x770 [ 503.576817] __kmalloc_node+0x3d/0x80 [ 503.580601] kvmalloc_node+0x4e/0xe0 [ 503.584429] video_usercopy+0x365/0xf20 [ 503.588398] ? lock_downgrade+0x6e0/0x6e0 [ 503.592521] ? video_ioctl2+0x40/0x40 [ 503.596298] ? v4l_g_priority+0xa0/0xa0 [ 503.600247] ? mutex_trylock+0x1c0/0x1c0 [ 503.604291] video_ioctl2+0x2d/0x40 [ 503.607899] v4l2_ioctl+0x1c0/0x300 [ 503.611526] ? v4l2_open+0x300/0x300 [ 503.615329] do_vfs_ioctl+0x7ae/0x1060 [ 503.619208] ? selinux_file_mprotect+0x5d0/0x5d0 [ 503.623947] ? lock_downgrade+0x6e0/0x6e0 [ 503.628084] ? ioctl_preallocate+0x1c0/0x1c0 [ 503.632468] ? __fget+0x237/0x370 [ 503.635902] ? security_file_ioctl+0x89/0xb0 [ 503.640285] SyS_ioctl+0x8f/0xc0 [ 503.643650] ? do_vfs_ioctl+0x1060/0x1060 [ 503.647780] do_syscall_64+0x1e8/0x640 [ 503.651640] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 503.656460] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 503.661756] RIP: 0033:0x459829 [ 503.664928] RSP: 002b:00007f8a8b85ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 503.672611] RAX: ffffffffffffffda RBX: 00007f8a8b85ac90 RCX: 0000000000459829 [ 503.679856] RDX: 0000000020000440 RSI: 00000000c100565c RDI: 0000000000000003 [ 503.688929] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 503.696208] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f8a8b85b6d4 11:45:21 executing program 4: r0 = getpid() r1 = syz_open_dev$sndseq(&(0x7f0000000140)='/dev/snd/seq\x00', 0x0, 0x0) read(r1, &(0x7f0000000200)=""/28, 0x1cc) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000080)={0x1, @time}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r1, 0xc02c5341, &(0x7f0000000340)) timer_create(0x0, &(0x7f0000000100)={0x0, 0x12}, &(0x7f00000001c0)) timer_settime(0x0, 0x0, &(0x7f0000000240)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) tkill(r0, 0x1000000000013) 11:45:21 executing program 1 (fault-call:1 fault-nth:0): capset(&(0x7f0000a31000)={0x19980330}, &(0x7f00009b3000)) mknod$loop(&(0x7f00000004c0)='./file0\x00', 0x2002, 0x0) 11:45:21 executing program 5 (fault-call:12 fault-nth:0): sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000000)="5500000019007f5300fe01b2a4a280930a60ffff00a84302910000003900090008000c00060000f3180015e005000600000000dc1320d5440700000000", 0x3d}], 0x1}, 0x0) r0 = socket(0x1000000010, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f00000000c0), 0x492492492492191, 0x0) r1 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r1) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x38) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) 11:45:21 executing program 3 (fault-call:2 fault-nth:0): r0 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000240)={0x0, 0x9, 0x1, {0xb, @sdr={0x0, 0x1}}}) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000440)={0x0, 0x1ff, 0x1, {0xb, @raw_data="b57ec6e2ccfebc2f19650bb2b17372c05fea81c70a61a58b97c5bffa8f3ff22ef5e44f8d5bcd9a7e6ad039656c778e3defde487514c27a53e5ab19e7d988086662bc7d2936c0ce17f57929fe03c491a499d671387a8c4a9d52f2fa0f12b0c8a6fbac0bf52fe8075949b6f554aad4d9906746094746213d701bdbfdddfab15780f0ff892ac680cdf8d58b6eec86af9447e96b23570e54caa7549caa341c121bd9f0d43abff4054dc2ade5aa89ec0521282cbd701f60913b7986f0199bcfb06c4d3b1bf98e836e40ac"}}) 11:45:21 executing program 0 (fault-call:4 fault-nth:1): r0 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000240)={0x0, 0x9, 0x1, {0xb, @sdr={0x0, 0x1}}}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000440)={0x0, 0x1ff, 0x1, {0xb, @raw_data="b57ec6e2ccfebc2f19650bb2b17372c05fea81c70a61a58b97c5bffa8f3ff22ef5e44f8d5bcd9a7e6ad039656c778e3defde487514c27a53e5ab19e7d988086662bc7d2936c0ce17f57929fe03c491a499d671387a8c4a9d52f2fa0f12b0c8a6fbac0bf52fe8075949b6f554aad4d9906746094746213d701bdbfdddfab15780f0ff892ac680cdf8d58b6eec86af9447e96b23570e54caa7549caa341c121bd9f0d43abff4054dc2ade5aa89ec0521282cbd701f60913b7986f0199bcfb06c4d3b1bf98e836e40ac"}}) [ 503.703453] R13: 00000000004c495f R14: 00000000004d8c88 R15: 0000000000000006 11:45:21 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x200001000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) socket$kcm(0x11, 0x8000000002, 0x300) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) socket$nl_route(0x10, 0x3, 0x0) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/commit_pending_bools\x00', 0x1, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_open_dev$vcsn(0x0, 0x0, 0x1) fstat(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$overlay(0x0, 0x0, 0x0, 0x200000, &(0x7f00000005c0)={[], [{@subj_type={'subj_type', 0x3d, '/dev/vcs#\x00'}}, {@defcontext={'defcontext', 0x3d, 'user_u'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@euid_gt={'euid>', r2}}]}) r3 = openat(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0x1, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r4 = gettid() getsockopt$IP_VS_SO_GET_INFO(r3, 0x0, 0x481, &(0x7f0000000040), &(0x7f0000000080)=0xc) tkill(r4, 0x3b) ioctl$BLKGETSIZE(r1, 0x1260, &(0x7f0000000140)) r5 = socket$inet_tcp(0x2, 0x1, 0x0) write$FUSE_OPEN(r1, &(0x7f00000001c0)={0x20, 0x0, 0x1, {0x0, 0x6}}, 0x20) r6 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r5, &(0x7f00000004c0)={0x2, 0x4e24, @rand_addr=0x8}, 0x10) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000400)) openat$cgroup_procs(r1, &(0x7f0000000300)='cgroup.procs\x00', 0x2, 0x0) connect$inet(r6, &(0x7f0000000280)={0x2, 0x0, @local}, 0x10) getsockopt$inet_mreqsrc(r6, 0x0, 0x26, &(0x7f0000000240)={@remote, @loopback, @loopback}, &(0x7f00000002c0)=0xc) ioctl$sock_inet_SIOCADDRT(r6, 0x890b, &(0x7f0000000080)={0x750, {0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x17}}, {0x2, 0x4e22, @remote}, {0x2, 0x4e20, @broadcast}, 0x0, 0x0, 0x2, 0x46a, 0x0, 0x0, 0x1000, 0x800000000, 0xffffffffffffffff}) accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000000440)=0xfffffffffffffd51) [ 503.777389] FAULT_INJECTION: forcing a failure. [ 503.777389] name failslab, interval 1, probability 0, space 0, times 0 [ 503.784461] FAULT_INJECTION: forcing a failure. [ 503.784461] name failslab, interval 1, probability 0, space 0, times 0 [ 503.819749] CPU: 0 PID: 15194 Comm: syz-executor.0 Not tainted 4.14.139 #35 [ 503.826870] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 503.836213] Call Trace: [ 503.836232] dump_stack+0x138/0x19c [ 503.836251] should_fail.cold+0x10f/0x159 [ 503.836268] should_failslab+0xdb/0x130 [ 503.836280] __kmalloc+0x2f0/0x7a0 [ 503.854109] ? __vb2_queue_alloc+0x101/0xdb0 [ 503.858527] __vb2_queue_alloc+0x101/0xdb0 [ 503.862781] ? unwind_get_return_address+0x61/0xa0 [ 503.867704] vb2_core_create_bufs+0x2c3/0x640 [ 503.872189] ? vivid_rds_gen_fill+0x440/0x440 [ 503.876673] ? __vb2_queue_alloc+0xdb0/0xdb0 [ 503.881068] ? save_trace+0x290/0x290 [ 503.884860] ? __lock_acquire+0x5f7/0x4620 [ 503.889081] ? __kmalloc_node+0x51/0x80 [ 503.893042] ? kvmalloc_node+0x4e/0xe0 [ 503.896919] ? video_usercopy+0x365/0xf20 [ 503.901057] vb2_create_bufs+0x33d/0x640 [ 503.905492] ? save_trace+0x290/0x290 [ 503.909284] ? vb2_thread_start.cold+0x27/0x27 [ 503.913853] ? save_trace+0x290/0x290 [ 503.917647] vb2_ioctl_create_bufs+0x232/0x3a0 [ 503.922219] v4l_create_bufs+0x11e/0x1f0 [ 503.926269] ? __might_fault+0x110/0x1d0 [ 503.930317] __video_do_ioctl+0x6eb/0x740 [ 503.934461] ? video_ioctl2+0x40/0x40 [ 503.938251] ? kasan_check_write+0x14/0x20 [ 503.942481] ? _copy_from_user+0x99/0x110 [ 503.946621] video_usercopy+0x3d3/0xf20 [ 503.950583] ? lock_downgrade+0x5f0/0x6e0 [ 503.954715] ? video_ioctl2+0x40/0x40 [ 503.958505] ? v4l_g_priority+0xa0/0xa0 [ 503.962466] ? mutex_trylock+0x1c0/0x1c0 [ 503.966529] video_ioctl2+0x2d/0x40 [ 503.970170] v4l2_ioctl+0x1c0/0x300 [ 503.973792] ? v4l2_open+0x300/0x300 [ 503.977491] do_vfs_ioctl+0x7ae/0x1060 [ 503.981373] ? selinux_file_mprotect+0x5d0/0x5d0 [ 503.986118] ? lock_downgrade+0x6e0/0x6e0 [ 503.990258] ? ioctl_preallocate+0x1c0/0x1c0 [ 503.994655] ? __fget+0x237/0x370 [ 503.998105] ? security_file_ioctl+0x89/0xb0 [ 504.002501] SyS_ioctl+0x8f/0xc0 [ 504.005856] ? do_vfs_ioctl+0x1060/0x1060 [ 504.009998] do_syscall_64+0x1e8/0x640 [ 504.013875] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 504.018711] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 504.023887] RIP: 0033:0x459829 [ 504.027058] RSP: 002b:00007f8a8b85ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 504.034753] RAX: ffffffffffffffda RBX: 00007f8a8b85ac90 RCX: 0000000000459829 [ 504.042009] RDX: 0000000020000440 RSI: 00000000c100565c RDI: 0000000000000003 [ 504.049272] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 504.056529] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f8a8b85b6d4 [ 504.063785] R13: 00000000004c495f R14: 00000000004d8c88 R15: 0000000000000006 [ 504.071068] CPU: 1 PID: 15192 Comm: syz-executor.1 Not tainted 4.14.139 #35 [ 504.078175] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 504.087529] Call Trace: [ 504.090117] dump_stack+0x138/0x19c [ 504.093752] should_fail.cold+0x10f/0x159 [ 504.097907] should_failslab+0xdb/0x130 [ 504.101886] kmem_cache_alloc+0x2d7/0x780 [ 504.106043] ? __mutex_unlock_slowpath+0x71/0x800 [ 504.110896] ? check_preemption_disabled+0x3c/0x250 [ 504.115915] getname_flags+0xcb/0x580 [ 504.119734] SyS_mknod+0x131/0x3b0 [ 504.123273] ? SyS_mknodat+0x3d0/0x3d0 [ 504.127156] ? do_syscall_64+0x53/0x640 [ 504.131130] ? SyS_mknodat+0x3d0/0x3d0 [ 504.135014] do_syscall_64+0x1e8/0x640 [ 504.138904] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 504.143745] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 504.148920] RIP: 0033:0x459829 [ 504.152098] RSP: 002b:00007f3f51f75c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000085 [ 504.159796] RAX: ffffffffffffffda RBX: 00007f3f51f75c90 RCX: 0000000000459829 11:45:21 executing program 0 (fault-call:4 fault-nth:2): r0 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000240)={0x0, 0x9, 0x1, {0xb, @sdr={0x0, 0x1}}}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000440)={0x0, 0x1ff, 0x1, {0xb, @raw_data="b57ec6e2ccfebc2f19650bb2b17372c05fea81c70a61a58b97c5bffa8f3ff22ef5e44f8d5bcd9a7e6ad039656c778e3defde487514c27a53e5ab19e7d988086662bc7d2936c0ce17f57929fe03c491a499d671387a8c4a9d52f2fa0f12b0c8a6fbac0bf52fe8075949b6f554aad4d9906746094746213d701bdbfdddfab15780f0ff892ac680cdf8d58b6eec86af9447e96b23570e54caa7549caa341c121bd9f0d43abff4054dc2ade5aa89ec0521282cbd701f60913b7986f0199bcfb06c4d3b1bf98e836e40ac"}}) [ 504.167068] RDX: 0000000000000702 RSI: 0000000000002002 RDI: 00000000200004c0 [ 504.174327] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 504.181584] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3f51f766d4 [ 504.188929] R13: 00000000004c5cf2 R14: 00000000004da6f8 R15: 0000000000000003 [ 504.259635] FAULT_INJECTION: forcing a failure. [ 504.259635] name failslab, interval 1, probability 0, space 0, times 0 [ 504.273271] CPU: 0 PID: 15210 Comm: syz-executor.0 Not tainted 4.14.139 #35 [ 504.280404] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 504.289751] Call Trace: [ 504.292337] dump_stack+0x138/0x19c [ 504.295963] should_fail.cold+0x10f/0x159 [ 504.300106] should_failslab+0xdb/0x130 [ 504.304071] kmem_cache_alloc_trace+0x2e9/0x790 [ 504.308734] ? rcu_read_lock_sched_held+0x110/0x130 [ 504.313743] ? __kmalloc+0x376/0x7a0 [ 504.317452] ? vb2_vmalloc_attach_dmabuf+0x150/0x150 [ 504.322553] vb2_vmalloc_alloc+0x64/0x270 [ 504.326692] __vb2_queue_alloc+0x48d/0xdb0 [ 504.330931] vb2_core_create_bufs+0x2c3/0x640 [ 504.335418] ? vivid_rds_gen_fill+0x440/0x440 [ 504.339933] ? __vb2_queue_alloc+0xdb0/0xdb0 [ 504.344327] ? save_trace+0x290/0x290 [ 504.348110] ? __lock_acquire+0x5f7/0x4620 [ 504.352336] ? __kmalloc_node+0x51/0x80 [ 504.356317] ? kvmalloc_node+0x4e/0xe0 [ 504.360193] ? video_usercopy+0x365/0xf20 [ 504.364328] vb2_create_bufs+0x33d/0x640 [ 504.368372] ? save_trace+0x290/0x290 [ 504.372162] ? vb2_thread_start.cold+0x27/0x27 [ 504.376729] ? save_trace+0x290/0x290 [ 504.380550] vb2_ioctl_create_bufs+0x232/0x3a0 [ 504.385137] v4l_create_bufs+0x11e/0x1f0 [ 504.389186] ? __might_fault+0x110/0x1d0 [ 504.393234] __video_do_ioctl+0x6eb/0x740 [ 504.397379] ? video_ioctl2+0x40/0x40 [ 504.401167] ? kasan_check_write+0x14/0x20 [ 504.405385] ? _copy_from_user+0x99/0x110 [ 504.409518] video_usercopy+0x3d3/0xf20 [ 504.413483] ? lock_downgrade+0x5f0/0x6e0 [ 504.417618] ? video_ioctl2+0x40/0x40 [ 504.421411] ? v4l_g_priority+0xa0/0xa0 [ 504.425374] ? mutex_trylock+0x1c0/0x1c0 [ 504.429440] video_ioctl2+0x2d/0x40 [ 504.433063] v4l2_ioctl+0x1c0/0x300 [ 504.436674] ? v4l2_open+0x300/0x300 [ 504.440377] do_vfs_ioctl+0x7ae/0x1060 [ 504.444257] ? selinux_file_mprotect+0x5d0/0x5d0 [ 504.449014] ? lock_downgrade+0x6e0/0x6e0 [ 504.453151] ? ioctl_preallocate+0x1c0/0x1c0 [ 504.457551] ? __fget+0x237/0x370 [ 504.460998] ? security_file_ioctl+0x89/0xb0 [ 504.465399] SyS_ioctl+0x8f/0xc0 [ 504.468751] ? do_vfs_ioctl+0x1060/0x1060 [ 504.472891] do_syscall_64+0x1e8/0x640 [ 504.476766] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 504.481607] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 504.486781] RIP: 0033:0x459829 [ 504.489958] RSP: 002b:00007f8a8b85ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 504.497655] RAX: ffffffffffffffda RBX: 00007f8a8b85ac90 RCX: 0000000000459829 11:45:21 executing program 1 (fault-call:1 fault-nth:1): capset(&(0x7f0000a31000)={0x19980330}, &(0x7f00009b3000)) mknod$loop(&(0x7f00000004c0)='./file0\x00', 0x2002, 0x0) [ 504.504913] RDX: 0000000020000440 RSI: 00000000c100565c RDI: 0000000000000003 [ 504.512167] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 504.519424] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f8a8b85b6d4 [ 504.526682] R13: 00000000004c495f R14: 00000000004d8c88 R15: 0000000000000006 [ 504.545378] FAULT_INJECTION: forcing a failure. [ 504.545378] name failslab, interval 1, probability 0, space 0, times 0 11:45:21 executing program 0 (fault-call:4 fault-nth:3): r0 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000240)={0x0, 0x9, 0x1, {0xb, @sdr={0x0, 0x1}}}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000440)={0x0, 0x1ff, 0x1, {0xb, @raw_data="b57ec6e2ccfebc2f19650bb2b17372c05fea81c70a61a58b97c5bffa8f3ff22ef5e44f8d5bcd9a7e6ad039656c778e3defde487514c27a53e5ab19e7d988086662bc7d2936c0ce17f57929fe03c491a499d671387a8c4a9d52f2fa0f12b0c8a6fbac0bf52fe8075949b6f554aad4d9906746094746213d701bdbfdddfab15780f0ff892ac680cdf8d58b6eec86af9447e96b23570e54caa7549caa341c121bd9f0d43abff4054dc2ade5aa89ec0521282cbd701f60913b7986f0199bcfb06c4d3b1bf98e836e40ac"}}) [ 504.566763] CPU: 0 PID: 15211 Comm: syz-executor.3 Not tainted 4.14.139 #35 [ 504.573875] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 504.573879] Call Trace: [ 504.573897] dump_stack+0x138/0x19c [ 504.573917] should_fail.cold+0x10f/0x159 [ 504.573933] should_failslab+0xdb/0x130 [ 504.573946] kmem_cache_alloc_node_trace+0x280/0x770 [ 504.573965] __kmalloc_node+0x3d/0x80 [ 504.593782] kvmalloc_node+0x4e/0xe0 [ 504.593795] video_usercopy+0x365/0xf20 [ 504.593805] ? lock_downgrade+0x6e0/0x6e0 [ 504.593814] ? video_ioctl2+0x40/0x40 [ 504.593828] ? v4l_g_priority+0xa0/0xa0 [ 504.593839] ? mutex_trylock+0x1c0/0x1c0 [ 504.593862] video_ioctl2+0x2d/0x40 [ 504.593878] v4l2_ioctl+0x1c0/0x300 [ 504.602934] ? v4l2_open+0x300/0x300 [ 504.602947] do_vfs_ioctl+0x7ae/0x1060 [ 504.602960] ? selinux_file_mprotect+0x5d0/0x5d0 [ 504.602970] ? lock_downgrade+0x6e0/0x6e0 [ 504.602981] ? ioctl_preallocate+0x1c0/0x1c0 [ 504.602992] ? __fget+0x237/0x370 [ 504.661813] ? security_file_ioctl+0x89/0xb0 [ 504.666199] SyS_ioctl+0x8f/0xc0 [ 504.669539] ? do_vfs_ioctl+0x1060/0x1060 [ 504.673672] do_syscall_64+0x1e8/0x640 [ 504.677557] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 504.682378] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 504.687539] RIP: 0033:0x459829 [ 504.690702] RSP: 002b:00007fced42a5c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 504.698387] RAX: ffffffffffffffda RBX: 00007fced42a5c90 RCX: 0000000000459829 [ 504.705631] RDX: 0000000020000440 RSI: 00000000c100565c RDI: 0000000000000003 11:45:22 executing program 3 (fault-call:2 fault-nth:1): r0 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000240)={0x0, 0x9, 0x1, {0xb, @sdr={0x0, 0x1}}}) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000440)={0x0, 0x1ff, 0x1, {0xb, @raw_data="b57ec6e2ccfebc2f19650bb2b17372c05fea81c70a61a58b97c5bffa8f3ff22ef5e44f8d5bcd9a7e6ad039656c778e3defde487514c27a53e5ab19e7d988086662bc7d2936c0ce17f57929fe03c491a499d671387a8c4a9d52f2fa0f12b0c8a6fbac0bf52fe8075949b6f554aad4d9906746094746213d701bdbfdddfab15780f0ff892ac680cdf8d58b6eec86af9447e96b23570e54caa7549caa341c121bd9f0d43abff4054dc2ade5aa89ec0521282cbd701f60913b7986f0199bcfb06c4d3b1bf98e836e40ac"}}) [ 504.712877] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 504.720121] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fced42a66d4 [ 504.727389] R13: 00000000004c495f R14: 00000000004d8c88 R15: 0000000000000004 11:45:22 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x200001000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) socket$kcm(0x11, 0x8000000002, 0x300) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) socket$nl_route(0x10, 0x3, 0x0) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/commit_pending_bools\x00', 0x1, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_open_dev$vcsn(0x0, 0x0, 0x1) fstat(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$overlay(0x0, 0x0, 0x0, 0x200000, &(0x7f00000005c0)={[], [{@subj_type={'subj_type', 0x3d, '/dev/vcs#\x00'}}, {@defcontext={'defcontext', 0x3d, 'user_u'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@euid_gt={'euid>', r2}}]}) r3 = openat(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0x1, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r4 = gettid() getsockopt$IP_VS_SO_GET_INFO(r3, 0x0, 0x481, &(0x7f0000000040), &(0x7f0000000080)=0xc) tkill(r4, 0x3b) ioctl$BLKGETSIZE(r1, 0x1260, &(0x7f0000000140)) r5 = socket$inet_tcp(0x2, 0x1, 0x0) write$FUSE_OPEN(r1, &(0x7f00000001c0)={0x20, 0x0, 0x1, {0x0, 0x6}}, 0x20) r6 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r5, &(0x7f00000004c0)={0x2, 0x4e24, @rand_addr=0x8}, 0x10) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000400)) openat$cgroup_procs(r1, &(0x7f0000000300)='cgroup.procs\x00', 0x2, 0x0) connect$inet(r6, &(0x7f0000000280)={0x2, 0x0, @local}, 0x10) getsockopt$inet_mreqsrc(r6, 0x0, 0x26, &(0x7f0000000240)={@remote, @loopback, @loopback}, &(0x7f00000002c0)=0xc) ioctl$sock_inet_SIOCADDRT(r6, 0x890b, &(0x7f0000000080)={0x750, {0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x17}}, {0x2, 0x4e22, @remote}, {0x2, 0x4e20, @broadcast}, 0x0, 0x0, 0x2, 0x46a, 0x0, 0x0, 0x1000, 0x800000000, 0xffffffffffffffff}) accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000000440)=0xfffffffffffffd51) 11:45:22 executing program 4: r0 = getpid() r1 = syz_open_dev$sndseq(&(0x7f0000000140)='/dev/snd/seq\x00', 0x0, 0x0) read(r1, &(0x7f0000000200)=""/28, 0x1cc) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000080)={0x1, @time}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r1, 0xc02c5341, &(0x7f0000000340)) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r1, 0xc0305302, &(0x7f00000003c0)) timer_settime(0x0, 0x0, &(0x7f0000000240)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) tkill(r0, 0x1000000000013) [ 504.849397] FAULT_INJECTION: forcing a failure. [ 504.849397] name failslab, interval 1, probability 0, space 0, times 0 [ 504.864691] FAULT_INJECTION: forcing a failure. [ 504.864691] name failslab, interval 1, probability 0, space 0, times 0 [ 504.868760] CPU: 1 PID: 15220 Comm: syz-executor.0 Not tainted 4.14.139 #35 [ 504.883387] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 504.892738] Call Trace: [ 504.895319] dump_stack+0x138/0x19c [ 504.898941] should_fail.cold+0x10f/0x159 [ 504.903079] should_failslab+0xdb/0x130 [ 504.907045] kmem_cache_alloc_node_trace+0x280/0x770 [ 504.912141] ? save_trace+0x290/0x290 [ 504.915937] __get_vm_area_node+0xf0/0x340 [ 504.920154] ? __lock_is_held+0xb6/0x140 [ 504.924205] __vmalloc_node_range+0x9f/0x6a0 [ 504.928603] ? vb2_vmalloc_alloc+0xce/0x270 [ 504.932932] ? vb2_vmalloc_alloc+0x64/0x270 [ 504.937262] ? kmem_cache_alloc_trace+0x623/0x790 [ 504.942103] ? vb2_vmalloc_attach_dmabuf+0x150/0x150 [ 504.947314] vmalloc_user+0x47/0x110 [ 504.951032] ? vb2_vmalloc_alloc+0xce/0x270 [ 504.955361] vb2_vmalloc_alloc+0xce/0x270 [ 504.959500] __vb2_queue_alloc+0x48d/0xdb0 [ 504.963736] vb2_core_create_bufs+0x2c3/0x640 [ 504.968221] ? vivid_rds_gen_fill+0x440/0x440 [ 504.972705] ? __vb2_queue_alloc+0xdb0/0xdb0 [ 504.977106] ? save_trace+0x290/0x290 [ 504.980904] ? __lock_acquire+0x5f7/0x4620 [ 504.985133] ? __kmalloc_node+0x51/0x80 [ 504.989093] ? kvmalloc_node+0x4e/0xe0 [ 504.992967] ? video_usercopy+0x365/0xf20 [ 504.997116] vb2_create_bufs+0x33d/0x640 [ 505.001170] ? save_trace+0x290/0x290 [ 505.004967] ? vb2_thread_start.cold+0x27/0x27 [ 505.009544] ? save_trace+0x290/0x290 [ 505.013343] vb2_ioctl_create_bufs+0x232/0x3a0 [ 505.017920] v4l_create_bufs+0x11e/0x1f0 [ 505.021979] ? __might_fault+0x110/0x1d0 [ 505.026050] __video_do_ioctl+0x6eb/0x740 [ 505.030198] ? video_ioctl2+0x40/0x40 [ 505.030212] ? kasan_check_write+0x14/0x20 [ 505.030222] ? _copy_from_user+0x99/0x110 [ 505.030234] video_usercopy+0x3d3/0xf20 [ 505.030243] ? lock_downgrade+0x5f0/0x6e0 [ 505.030251] ? video_ioctl2+0x40/0x40 [ 505.038257] ? v4l_g_priority+0xa0/0xa0 [ 505.038268] ? mutex_trylock+0x1c0/0x1c0 [ 505.062292] video_ioctl2+0x2d/0x40 [ 505.065922] v4l2_ioctl+0x1c0/0x300 [ 505.069547] ? v4l2_open+0x300/0x300 [ 505.073256] do_vfs_ioctl+0x7ae/0x1060 [ 505.077144] ? selinux_file_mprotect+0x5d0/0x5d0 [ 505.081894] ? lock_downgrade+0x6e0/0x6e0 [ 505.086040] ? ioctl_preallocate+0x1c0/0x1c0 [ 505.090490] ? __fget+0x237/0x370 [ 505.093943] ? security_file_ioctl+0x89/0xb0 [ 505.098341] SyS_ioctl+0x8f/0xc0 [ 505.101693] ? do_vfs_ioctl+0x1060/0x1060 [ 505.105843] do_syscall_64+0x1e8/0x640 [ 505.109712] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 505.114552] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 505.119727] RIP: 0033:0x459829 [ 505.122900] RSP: 002b:00007f8a8b85ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 505.130595] RAX: ffffffffffffffda RBX: 00007f8a8b85ac90 RCX: 0000000000459829 [ 505.137853] RDX: 0000000020000440 RSI: 00000000c100565c RDI: 0000000000000003 11:45:22 executing program 3: r0 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x1, 0x2) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000240)={0x0, 0x9, 0x1, {0xb, @sdr={0x0, 0x1}}}) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000440)={0x0, 0x1ff, 0x1, {0xb, @raw_data="b57ec6e2ccfebc2f19650bb2b17372c05fea81c70a61a58b97c5bffa8f3ff22ef5e44f8d5bcd9a7e6ad039656c778e3defde487514c27a53e5ab19e7d988086662bc7d2936c0ce17f57929fe03c491a499d671387a8c4a9d52f2fa0f12b0c8a6fbac0bf52fe8075949b6f554aad4d9906746094746213d701bdbfdddfab15780f0ff892ac680cdf8d58b6eec86af9447e96b23570e54caa7549caa341c121bd9f0d43abff4054dc2ade5aa89ec0521282cbd701f60913b7986f0199bcfb06c4d3b1bf98e836e40ac"}}) ioctl$SNDRV_TIMER_IOCTL_PVERSION(r0, 0x80045400, &(0x7f0000000680)) lstat(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x40, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="00034a5d97cba3af42eda3c2c475cf496f4b53c26fc97d2e7d32cf1f75beb347da18f93050e99f78f3a22b7e7517ef5b79098b64989bd510e1a103baefae0e6987279254027bc5024f1fe92cedecc94fc393295b", 0x54, 0xfffffffffffffffc}], 0x1000004, &(0x7f0000000580)={[{@data_err_abort='data_err=abort'}, {@dioread_lock='dioread_lock'}, {@oldalloc='oldalloc'}, {@delalloc='delalloc'}, {@grpjquota='grpjquota='}, {@nojournal_checksum='nojournal_checksum'}], [{@uid_lt={'uid<', r1}}, {@smackfsdef={'smackfsdef', 0x3d, '/dev/swradio#\x00'}}, {@appraise_type='appraise_type=imasig'}, {@fowner_eq={'fowner'}}, {@smackfstransmute={'smackfstransmute', 0x3d, 'vmnet1'}}]}) ioctl$BLKTRACESTOP(r0, 0x1275, 0x0) [ 505.145111] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 505.152367] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f8a8b85b6d4 [ 505.159622] R13: 00000000004c495f R14: 00000000004d8c88 R15: 0000000000000006 [ 505.166906] CPU: 0 PID: 15223 Comm: syz-executor.1 Not tainted 4.14.139 #35 [ 505.174005] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 505.177712] syz-executor.0: [ 505.183360] Call Trace: [ 505.183420] dump_stack+0x138/0x19c [ 505.183436] should_fail.cold+0x10f/0x159 [ 505.183450] should_failslab+0xdb/0x130 11:45:22 executing program 1 (fault-call:1 fault-nth:2): capset(&(0x7f0000a31000)={0x19980330}, &(0x7f00009b3000)) mknod$loop(&(0x7f00000004c0)='./file0\x00', 0x2002, 0x0) [ 505.186623] vmalloc: allocation failure: 32768 bytes [ 505.189029] kmem_cache_alloc+0x2d7/0x780 [ 505.189040] ? __d_lookup+0x3a2/0x670 [ 505.189052] ? mark_held_locks+0xb1/0x100 [ 505.189063] ? d_lookup+0xe5/0x240 [ 505.189075] __d_alloc+0x2d/0x9f0 [ 505.192791] , mode:0x14080c0(GFP_KERNEL|__GFP_ZERO), nodemask= [ 505.196809] d_alloc+0x4d/0x270 [ 505.196825] __lookup_hash+0x58/0x180 [ 505.196837] filename_create+0x16c/0x430 [ 505.196851] ? kern_path_mountpoint+0x40/0x40 [ 505.200909] (null) [ 505.205888] SyS_mknod+0x144/0x3b0 [ 505.205901] ? SyS_mknodat+0x3d0/0x3d0 [ 505.205910] ? do_syscall_64+0x53/0x640 [ 505.205919] ? SyS_mknodat+0x3d0/0x3d0 [ 505.205930] do_syscall_64+0x1e8/0x640 [ 505.210210] syz-executor.0 cpuset= [ 505.213824] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 505.213843] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 505.213851] RIP: 0033:0x459829 [ 505.213856] RSP: 002b:00007f3f51f75c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000085 [ 505.213866] RAX: ffffffffffffffda RBX: 00007f3f51f75c90 RCX: 0000000000459829 [ 505.213871] RDX: 0000000000000702 RSI: 0000000000002002 RDI: 00000000200004c0 [ 505.213875] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 505.213880] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3f51f766d4 [ 505.213885] R13: 00000000004c5cf2 R14: 00000000004da6f8 R15: 0000000000000003 [ 505.345134] syz0 mems_allowed=0-1 [ 505.349787] CPU: 1 PID: 15220 Comm: syz-executor.0 Not tainted 4.14.139 #35 [ 505.356909] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 505.356914] Call Trace: [ 505.356930] dump_stack+0x138/0x19c [ 505.356944] warn_alloc.cold+0x96/0x1af [ 505.356956] ? zone_watermark_ok_safe+0x2b0/0x2b0 [ 505.381301] ? __get_vm_area_node+0x27f/0x340 [ 505.385790] ? __lock_is_held+0xb6/0x140 [ 505.385809] __vmalloc_node_range+0x3c3/0x6a0 [ 505.385824] ? vb2_vmalloc_alloc+0x64/0x270 [ 505.394346] ? kmem_cache_alloc_trace+0x623/0x790 [ 505.394359] ? vb2_vmalloc_attach_dmabuf+0x150/0x150 [ 505.394366] vmalloc_user+0x47/0x110 [ 505.394381] ? vb2_vmalloc_alloc+0xce/0x270 [ 505.394391] vb2_vmalloc_alloc+0xce/0x270 [ 505.394403] __vb2_queue_alloc+0x48d/0xdb0 [ 505.394425] vb2_core_create_bufs+0x2c3/0x640 [ 505.394436] ? vivid_rds_gen_fill+0x440/0x440 [ 505.394445] ? __vb2_queue_alloc+0xdb0/0xdb0 [ 505.394456] ? save_trace+0x290/0x290 [ 505.394465] ? __lock_acquire+0x5f7/0x4620 [ 505.394472] ? __kmalloc_node+0x51/0x80 [ 505.394480] ? kvmalloc_node+0x4e/0xe0 [ 505.394487] ? video_usercopy+0x365/0xf20 [ 505.394499] vb2_create_bufs+0x33d/0x640 [ 505.409165] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 505.412408] ? save_trace+0x290/0x290 [ 505.412426] ? vb2_thread_start.cold+0x27/0x27 [ 505.412435] ? save_trace+0x290/0x290 [ 505.412451] vb2_ioctl_create_bufs+0x232/0x3a0 [ 505.412464] v4l_create_bufs+0x11e/0x1f0 [ 505.412476] ? __might_fault+0x110/0x1d0 [ 505.412488] __video_do_ioctl+0x6eb/0x740 [ 505.412504] ? video_ioctl2+0x40/0x40 [ 505.412515] ? kasan_check_write+0x14/0x20 [ 505.412524] ? _copy_from_user+0x99/0x110 [ 505.412534] video_usercopy+0x3d3/0xf20 [ 505.412547] ? lock_downgrade+0x5f0/0x6e0 [ 505.440743] FAULT_INJECTION: forcing a failure. [ 505.440743] name failslab, interval 1, probability 0, space 0, times 0 [ 505.442481] ? video_ioctl2+0x40/0x40 [ 505.442496] ? v4l_g_priority+0xa0/0xa0 [ 505.442507] ? mutex_trylock+0x1c0/0x1c0 [ 505.442530] video_ioctl2+0x2d/0x40 [ 505.544075] v4l2_ioctl+0x1c0/0x300 [ 505.547692] ? v4l2_open+0x300/0x300 [ 505.551393] do_vfs_ioctl+0x7ae/0x1060 [ 505.555272] ? selinux_file_mprotect+0x5d0/0x5d0 [ 505.560019] ? lock_downgrade+0x6e0/0x6e0 [ 505.564156] ? ioctl_preallocate+0x1c0/0x1c0 [ 505.568554] ? __fget+0x237/0x370 [ 505.572004] ? security_file_ioctl+0x89/0xb0 [ 505.576406] SyS_ioctl+0x8f/0xc0 [ 505.579761] ? do_vfs_ioctl+0x1060/0x1060 [ 505.583903] do_syscall_64+0x1e8/0x640 [ 505.587773] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 505.592613] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 505.597787] RIP: 0033:0x459829 [ 505.600986] RSP: 002b:00007f8a8b85ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 505.608689] RAX: ffffffffffffffda RBX: 00007f8a8b85ac90 RCX: 0000000000459829 [ 505.615947] RDX: 0000000020000440 RSI: 00000000c100565c RDI: 0000000000000003 [ 505.623204] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 505.630462] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f8a8b85b6d4 [ 505.637737] R13: 00000000004c495f R14: 00000000004d8c88 R15: 0000000000000006 [ 505.645016] CPU: 0 PID: 15242 Comm: syz-executor.1 Not tainted 4.14.139 #35 [ 505.652106] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 505.652110] Call Trace: [ 505.652125] dump_stack+0x138/0x19c [ 505.652141] should_fail.cold+0x10f/0x159 [ 505.670502] Mem-Info: [ 505.671833] should_failslab+0xdb/0x130 [ 505.671845] kmem_cache_alloc+0x2d7/0x780 [ 505.671856] ? __d_lookup+0x3a2/0x670 [ 505.674326] active_anon:230848 inactive_anon:9279 isolated_anon:0 [ 505.674326] active_file:17647 inactive_file:15754 isolated_file:0 [ 505.674326] unevictable:1536 dirty:204 writeback:0 unstable:0 [ 505.674326] slab_reclaimable:12768 slab_unreclaimable:109059 [ 505.674326] mapped:59132 shmem:691 pagetables:6739 bounce:0 [ 505.674326] free:1127066 free_pcp:164 free_cma:0 [ 505.678196] ? mark_held_locks+0xb1/0x100 [ 505.678208] ? d_lookup+0xe5/0x240 [ 505.678220] __d_alloc+0x2d/0x9f0 [ 505.678233] d_alloc+0x4d/0x270 [ 505.686127] __lookup_hash+0x58/0x180 [ 505.686139] filename_create+0x16c/0x430 [ 505.686151] ? kern_path_mountpoint+0x40/0x40 [ 505.686170] SyS_mknod+0x144/0x3b0 [ 505.720606] Node 0 active_anon:923392kB inactive_anon:37116kB active_file:70456kB inactive_file:63016kB unevictable:6144kB isolated(anon):0kB isolated(file):0kB mapped:236528kB dirty:816kB writeback:0kB shmem:2764kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 524288kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 505.724638] ? SyS_mknodat+0x3d0/0x3d0 [ 505.724648] ? do_syscall_64+0x53/0x640 [ 505.724657] ? SyS_mknodat+0x3d0/0x3d0 [ 505.724668] do_syscall_64+0x1e8/0x640 [ 505.728274] Node 1 active_anon:0kB inactive_anon:0kB active_file:132kB inactive_file:0kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:0kB dirty:0kB writeback:0kB shmem:0kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 505.731628] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 505.731645] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 505.731652] RIP: 0033:0x459829 [ 505.731658] RSP: 002b:00007f3f51f75c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000085 [ 505.731668] RAX: ffffffffffffffda RBX: 00007f3f51f75c90 RCX: 0000000000459829 [ 505.734977] Node 0 [ 505.738688] RDX: 0000000000000702 RSI: 0000000000002002 RDI: 00000000200004c0 [ 505.738693] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 505.738698] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3f51f766d4 [ 505.738703] R13: 00000000004c5cf2 R14: 00000000004da6f8 R15: 0000000000000003 [ 505.799058] DMA free:15908kB min:216kB low:268kB high:320kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 505.918064] lowmem_reserve[]: 0 2580 2580 2580 [ 505.925299] Node 0 DMA32 free:712892kB min:36468kB low:45584kB high:54700kB active_anon:917176kB inactive_anon:37116kB active_file:70456kB inactive_file:63016kB unevictable:6144kB writepending:816kB present:3129332kB managed:2644892kB mlocked:6144kB kernel_stack:14400kB pagetables:26956kB bounce:0kB free_pcp:1108kB local_pcp:572kB free_cma:0kB [ 505.959807] lowmem_reserve[]: 0 0 0 0 [ 505.964361] Node 0 Normal free:0kB min:0kB low:0kB high:0kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:786432kB managed:0kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 505.989854] lowmem_reserve[]: 0 0 0 0 [ 505.997851] Node 1 Normal free:3785532kB min:53420kB low:66772kB high:80124kB active_anon:0kB inactive_anon:0kB active_file:132kB inactive_file:0kB unevictable:0kB writepending:0kB present:3932160kB managed:3870208kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:120kB local_pcp:120kB free_cma:0kB [ 506.027378] lowmem_reserve[]: 0 0 0 0 [ 506.040050] Node 0 DMA: 1*4kB (U) 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15908kB [ 506.054362] Node 0 DMA32: 205*4kB (UME) 187*8kB (UME) 52*16kB (UME) 352*32kB (UME) 262*64kB (UME) 60*128kB (UME) 20*256kB (UME) 11*512kB (ME) 6*1024kB (ME) 2*2048kB (M) 160*4096kB (UM) = 715212kB [ 506.072115] Node 0 Normal: 0*4kB 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 0kB [ 506.082887] Node 1 Normal: 51*4kB (UE) 347*8kB (UE) 275*16kB (U) 53*32kB (UE) 13*64kB (U) 10*128kB (UM) 10*256kB (UME) 1*512kB (E) 3*1024kB (UME) 4*2048kB (ME) 918*4096kB (M) = 3785652kB [ 506.099861] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 506.108750] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 506.117349] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 506.126237] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 506.134833] 34095 total pagecache pages [ 506.138800] 0 pages in swap cache [ 506.142270] Swap cache stats: add 0, delete 0, find 0/0 [ 506.147626] Free swap = 0kB [ 506.150685] Total swap = 0kB [ 506.153696] 1965979 pages RAM [ 506.156787] 0 pages HighMem/MovableOnly [ 506.160787] 333227 pages reserved [ 506.164243] 0 pages cma reserved 11:45:24 executing program 5: sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000000)="5500000019007f5300fe01b2a4a280930a60ffff00a84302910000003900090008000c00060000f3180015e005000600000000dc1320d5440700000000", 0x3d}], 0x1}, 0x0) r0 = socket(0x1000000010, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x23, 0x40) r1 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r1) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) r3 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm-control\x00', 0x20000, 0x0) write$FUSE_INIT(r3, &(0x7f00000001c0)={0x50, 0x0, 0x4, {0x7, 0x1f, 0xaa, 0x10, 0x0, 0x101, 0x1d, 0x8}}, 0x50) r4 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x400, 0x0) ioctl$VIDIOC_S_EDID(r4, 0xc0285629, &(0x7f0000000140)={0x0, 0x0, 0x200, [], &(0x7f0000000100)=0x2}) ptrace$setopts(0x4206, r2, 0x0, 0x4) tkill(r2, 0x38) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) rt_sigsuspend(&(0x7f0000000040), 0x8) ptrace$cont(0x9, r2, 0x0, 0x0) 11:45:24 executing program 2 (fault-call:7 fault-nth:0): socket$inet_udplite(0x2, 0x2, 0x88) bpf$PROG_LOAD(0x5, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r0 = gettid() tkill(r0, 0x3b) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) 11:45:24 executing program 3: r0 = syz_open_dev$swradio(&(0x7f0000000080)='/dev/swradio#\x00', 0x0, 0x2) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000240)={0x0, 0x9, 0x1, {0xb, @sdr={0x0, 0x1}}}) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000340)={0xfffffffffffffffe, 0x3, 0x3, {0x1, @raw_data="ee34becf4b90812fec061fae2f3739e7645bda550fe4876334f8907e54ec556667534970b8e87fa784b1d0554ce43eb32049cb2eeb171d6207911f20e1a97dd8578760bc19764c1d3aaa8f73493fbb9281ffac0ade767e30e722de2d8d47cf4d45829a92cd8c042ba419d96d6db2fd303e92cc87fb185b5ff71da35ab6d12bf0cc713cdf3c8575a306556b7beafb0f5e1b1f4024d024612a9e6c3b609d8b457914f8a979279ed23a07080033a604bf8783654a482ec24753bb3576f6c631c5bcfffec4d1dc9803c3"}}) 11:45:24 executing program 1 (fault-call:1 fault-nth:3): capset(&(0x7f0000a31000)={0x19980330}, &(0x7f00009b3000)) mknod$loop(&(0x7f00000004c0)='./file0\x00', 0x2002, 0x0) 11:45:24 executing program 0: r0 = eventfd2(0x7f, 0x80000) ioctl$int_in(r0, 0x5473, &(0x7f0000007f40)=0x80000001) r1 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) splice(r0, &(0x7f0000000140), r0, &(0x7f0000000180), 0x3, 0x2) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x64, "9d1825a51c335648c75a869b50e3254b802cb0c91ad5d0342e844bc55a7d60d46a3befa8bec92f13f867fe402ecaa718673c3c5a7adde515df7b3ab491fa4e2d371c10649b78ea58ee2345d4958bef813e899656f00130897bcf509153b00dfffffe9dd1"}, &(0x7f0000000080)=0x6c) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f00000000c0)=ANY=[@ANYRES32=r2, @ANYBLOB="48e600007100"], 0xa) ioctl$VIDIOC_CREATE_BUFS(r1, 0xc100565c, &(0x7f0000000240)={0x0, 0x9, 0x1, {0xb, @sdr={0x0, 0x1}}}) set_robust_list(&(0x7f0000000540)={&(0x7f0000000380)={&(0x7f0000000340)}, 0x101, &(0x7f0000000400)={&(0x7f00000003c0)}}, 0x18) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$VIDIOC_S_AUDOUT(r1, 0x40345632, &(0x7f00000001c0)={0x9, "6397b473a206b3b690e4291a0d5533d5ad6d9c9147bdf961d05284c208004c34", 0x2, 0x1}) ioctl$VIDIOC_CREATE_BUFS(r1, 0xc100565c, &(0x7f0000000440)={0x0, 0x1ff, 0x1, {0xb, @raw_data="b57ec6e2ccfebc2f19650bb2b17372c05fea81c70a61a58b97c5bffa8f3ff22ef5e44f8d5bcd9a7e6ad039656c778e3defde487514c27a53e5ab19e7d988086662bc7d2936c0ce17f57929fe03c491a499d671387a8c4a9d52f2fa0f12b0c8a6fbac0bf52fe8075949b6f554aad4d9906746094746213d701bdbfdddfab15780f0ff892ac680cdf8d58b6eec86af9447e96b23570e54caa7549caa341c121bd9f0d43abff4054dc2ade5aa89ec0521282cbd701f60913b7986f0199bcfb06c4d3b1bf98e836e40ac"}}) ioctl$VT_RESIZE(r1, 0x5609, &(0x7f0000000100)={0xe5d, 0x401, 0x2}) 11:45:24 executing program 1: recvmsg(0xffffffffffffffff, &(0x7f0000001580)={&(0x7f0000000340)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000001540)=[{&(0x7f0000000500)=""/4096, 0x1000}, {&(0x7f00000003c0)=""/208, 0xd0}, {&(0x7f0000001500)=""/36, 0x24}], 0x3}, 0x22) r1 = getpid() ioctl$sock_FIOSETOWN(r0, 0x8901, &(0x7f00000015c0)=r1) r2 = openat(0xffffffffffffffff, &(0x7f00000016c0)='./file0\x00', 0x400000, 0x38) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000001700)={0x0, r2, 0x5, 0x2}, 0x14) capset(&(0x7f0000a31000)={0x19980330}, &(0x7f00009b3000)) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000001600)='/dev/qat_adf_ctl\x00', 0x402200, 0x0) ioctl$KVM_GET_DEVICE_ATTR(r3, 0x4018aee2, &(0x7f0000001680)={0x0, 0x80000001, 0xddd4, &(0x7f0000001640)=0x2}) mknod$loop(&(0x7f00000004c0)='./file0\x00', 0x2002, 0x1) r4 = add_key$user(&(0x7f0000001740)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="90e44cccab9b8c42a89ac3c74522f0043dfa64b202b4a0568ce5c57c63", 0x1d, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f00000000c0)={r4, 0xec, 0x95}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'cbcmac-aes-neon\x00'}}, &(0x7f0000000180)="64147b4896a87da21d4bc6215b717a55379a54e5f52b9a3552b1447ae358613914bbe088285e7b81406351209a6779c737fc120d1c6f4d68c45072e0ebfbc54e55916ac6af58248fd0af95cca65d191c2f83226856e392d5096791718a8cfd5513caf1d7635e62bf8100331c72fad6829f79c613e2586e4f4ce0912a278b4d13616e9b1a4fdb701092399c4b911bfbd4ff0adc1050f9846717e3b82e2befd52871e6eda0aece0770b3f1fd245a3dd0e286a1f23e352c3991bf2bc4aa047c8401bc1e762500fbdb0892653755af166afb3e33dab4ade0b0d23178c174b6268b23fd103fb3f768f3f4a908b783", &(0x7f0000000280)=""/149) [ 506.790146] net_ratelimit: 20 callbacks suppressed [ 506.790151] protocol 88fb is buggy, dev hsr_slave_0 [ 506.800245] protocol 88fb is buggy, dev hsr_slave_1 11:45:24 executing program 0: r0 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000240)={0x0, 0x9, 0x1, {0xb, @sdr={0x0, 0x1}}}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000440)={0x0, 0x1ff, 0x1, {0xb, @raw_data="b57ec6e2ccfebc2f19650bb2b17372c05fea81c70a61a58b97c5bffa8f3ff22ef5e44f8d5bcd9a7e6ad039656c778e3defde487514c27a53e5ab19e7d988086662bc7d2936c0ce17f57929fe03c491a499d671387a8c4a9d52f2fa0f12b0c8a6fbac0bf52fe8075949b6f554aad4d9906746094746213d701bdbfdddfab15780f0ff892ac680cdf8d58b6eec86af9447e96b23570e54caa7549caa341c121bd9f0d43abff4054dc2ade5aa89ec0521282cbd701f60913b7986f0199bcfb06c4d3b1bf98e836e40ac"}}) [ 506.841104] FAULT_INJECTION: forcing a failure. [ 506.841104] name failslab, interval 1, probability 0, space 0, times 0 [ 506.852633] CPU: 0 PID: 15261 Comm: syz-executor.2 Not tainted 4.14.139 #35 [ 506.859718] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 506.869055] Call Trace: [ 506.871641] dump_stack+0x138/0x19c [ 506.875260] should_fail.cold+0x10f/0x159 [ 506.879399] should_failslab+0xdb/0x130 [ 506.883363] kmem_cache_alloc+0x47/0x780 [ 506.887432] ? lock_downgrade+0x6e0/0x6e0 [ 506.891569] __sigqueue_alloc+0x1da/0x400 [ 506.895702] __send_signal+0x24a/0x1280 [ 506.899667] send_signal+0x49/0xc0 [ 506.903192] do_send_sig_info+0x85/0x100 [ 506.907236] ? __lock_task_sighand+0x660/0x660 [ 506.911801] ? check_kill_permission+0x49/0x4b0 [ 506.916554] do_send_specific+0x134/0x1c0 [ 506.920687] do_tkill+0x1a9/0x250 [ 506.924124] ? do_send_specific+0x1c0/0x1c0 [ 506.928440] ? __sb_end_write+0xc1/0x100 [ 506.932500] ? do_syscall_64+0x53/0x640 [ 506.936466] SyS_tkill+0x27/0x40 [ 506.939814] ? SyS_tgkill+0x60/0x60 [ 506.943438] do_syscall_64+0x1e8/0x640 [ 506.947318] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 506.952152] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 506.957341] RIP: 0033:0x459829 [ 506.960517] RSP: 002b:00007fa8fe57ec78 EFLAGS: 00000246 ORIG_RAX: 00000000000000c8 [ 506.968212] RAX: ffffffffffffffda RBX: 00007fa8fe57ec90 RCX: 0000000000459829 [ 506.975468] RDX: 0000000000000000 RSI: 000000000000003b RDI: 0000000000000449 [ 506.982720] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 11:45:24 executing program 3: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) r1 = getuid() r2 = syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0x5, 0x40000) ioctl$SIOCAX25ADDUID(r0, 0x89e1, &(0x7f0000000000)={0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, r1}) r3 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000200)={'lo\x00@\x00', 0x1801}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x20000000000, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) r5 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/qat_adf_ctl\x00', 0x400201, 0x0) ioctl$SNDRV_TIMER_IOCTL_PARAMS(0xffffffffffffffff, 0x40505412, &(0x7f0000000240)={0x0, 0x3c995f2c, 0x4, 0x0, 0xe}) sendto$inet6(r4, 0x0, 0x0, 0x20000001, 0x0, 0x0) setsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f00000000c0), 0x4) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000440)='./file1\x00', 0x0) symlink(&(0x7f0000000040)='./file1\x00', &(0x7f0000000000)='.//ile0\x00') mkdir(&(0x7f0000000340)='./file0\x00', 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r5, 0xc05c5340, &(0x7f0000000380)={0x80, 0x6, 0xe53, {}, 0x6, 0x8}) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) r6 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000600)={{{@in6=@dev, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in=@multicast2}}, &(0x7f0000000400)=0xe8) bind$bt_hci(r2, &(0x7f0000001400)={0x1f, r7}, 0x785811c43aa66644) symlinkat(&(0x7f00000000c0)='./file0\x00', r6, &(0x7f0000000140)='./file0/f.le.\x00') renameat(r6, &(0x7f0000000180)='.//ile0\x00', r6, &(0x7f00000007c0)='./file0/f.le.\x00') ioctl$VIDIOC_CREATE_BUFS(r3, 0xc100565c, &(0x7f0000000240)={0x0, 0x9, 0x1, {0xb, @sdr={0x0, 0x1}}}) ioctl$VIDIOC_CREATE_BUFS(r3, 0xc100565c, &(0x7f0000000440)={0x0, 0x1ff, 0x1, {0xb, @raw_data="b57ec6e2ccfebc2f19650bb2b17372c05fea81c70a61a58b97c5bffa8f3ff22ef5e44f8d5bcd9a7e6ad039656c778e3defde487514c27a53e5ab19e7d988086662bc7d2936c0ce17f57929fe03c491a499d671387a8c4a9d52f2fa0f12b0c8a6fbac0bf52fe8075949b6f554aad4d9906746094746213d701bdbfdddfab15780f0ff892ac680cdf8d58b6eec86af9447e96b23570e54caa7549caa341c121bd9f0d43abff4054dc2ade5aa89ec0521282cbd701f60913b7986f0199bcfb06c4d3b1bf98e836e40ac"}}) [ 506.989972] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fa8fe57f6d4 [ 506.997228] R13: 00000000004c8fc4 R14: 00000000004e00e0 R15: 0000000000000006 11:45:24 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) bpf$PROG_LOAD(0x5, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r0 = gettid() pipe2(&(0x7f0000000040)={0xffffffffffffffff}, 0x80800) write$FUSE_DIRENT(r1, &(0x7f0000000080)={0xd0, 0x0, 0x4, [{0x1, 0x8, 0xa, 0x79, 'syzkaller\x00'}, {0x4, 0x3, 0xd, 0x9, 'keyringcpuset'}, {0x4, 0x7, 0xa, 0x7, 'syzkaller\x00'}, {0x4, 0x9, 0x8, 0x20, '@cpuset#'}, {0x2, 0xfffffffffffffffe, 0xa, 0x247, 'syzkaller\x00'}]}, 0xd0) tkill(r0, 0x3b) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) [ 507.200692] protocol 88fb is buggy, dev hsr_slave_0 [ 507.206373] protocol 88fb is buggy, dev hsr_slave_1 [ 507.212524] protocol 88fb is buggy, dev hsr_slave_0 [ 507.218184] protocol 88fb is buggy, dev hsr_slave_1 [ 507.319750] overlayfs: filesystem on './file0' not supported as upperdir [ 507.670114] protocol 88fb is buggy, dev hsr_slave_0 [ 507.675221] protocol 88fb is buggy, dev hsr_slave_1 11:45:25 executing program 4: r0 = getpid() r1 = syz_open_dev$sndseq(&(0x7f0000000140)='/dev/snd/seq\x00', 0x0, 0x0) read(r1, &(0x7f0000000200)=""/28, 0x1cc) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000080)={0x1, @time}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r1, 0xc02c5341, &(0x7f0000000340)) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r1, 0xc0305302, &(0x7f00000003c0)) timer_settime(0x0, 0x0, &(0x7f0000000240)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) tkill(r0, 0x1000000000013) 11:45:25 executing program 1: capset(&(0x7f0000a31000)={0x19980330}, &(0x7f00009b3000)) r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ubi_ctrl\x00', 0x2000, 0x0) ioctl$VIDIOC_G_FREQUENCY(r0, 0xc02c5638, &(0x7f0000000080)={0xf4, 0x3, 0x1}) sendto$llc(r0, &(0x7f00000000c0)="735ccd05adfdd65761ae2953907dce7ee34660a047f0fc0a99b8b0ade86012da3a2d1105260d4df572259880893c5c689506427fd1adff509b54e65d213a548d7c446c321a33ce031a954dce46a81ee22c3a759c", 0x54, 0x4000000, &(0x7f0000000140)={0x1a, 0x317, 0x0, 0x81, 0x10001, 0x8, @broadcast}, 0x10) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x2002, 0x0) 11:45:25 executing program 0: r0 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000140)={0xfffffffffffffffe, 0x7, 0x1, {0x1, @pix_mp={0x0, 0x401, 0x50313134, 0xd, 0x0, [{0x2}, {0x2, 0x3}, {0x2, 0x5a10ba54}, {0x9c, 0x3}, {0x8, 0xef8}, {0xefe2, 0x1}, {0x100000001, 0x3}, {0x7fff, 0x2}], 0x4, 0x80000000, 0x7, 0x2, 0x2}}}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000000)=ANY=[@ANYBLOB="01800000000000000a004e2100000009ff020000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000a004e200000ffffff010000000000000000000000000001ff0f000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f50000000000000000000000000000000000000000000000000000002000"], 0x110) accept$alg(r0, 0x0, 0x0) restart_syscall() ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000440)={0x0, 0x1ff, 0x1, {0xb, @raw_data="b57ec6e2ccfebc2f19650bb2b17372c05fea81c70a61a58b97c5bffa8f3ff22ef5e44f8d5bcd9a7e6ad039656c778e3defde487514c27a53e5ab19e7d988086662bc7d2936c0ce17f57929fe03c491a499d671387a8c4a9d52f2fa0f12b0c8a6fbac0bf52fe8075949b6f554aad4d9906746094746213d701bdbfdddfab15780f0ff892ac680cdf8d58b6eec86af9447e96b23570e54caa7549caa341c121bd9f0d43abff4054dc2ade5aa89ec0521282cbd701f60913b7986f0199bcfb06c4d3b1bf98e836e40ac"}}) [ 508.310085] protocol 88fb is buggy, dev hsr_slave_0 [ 508.315155] protocol 88fb is buggy, dev hsr_slave_1 11:45:27 executing program 5: sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000000)="5500000019007f5300fe01b2a4a280930a60ffff00a84302910000003900090008000c00060000f3180015e005000600000000dc1320d5440700000000", 0x3d}], 0x1}, 0x0) r0 = socket(0x1000000010, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f00000000c0), 0x492492492492191, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000040)=0x0) ptrace$cont(0x18, r1, 0x7fffffff, 0x1) r2 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x38) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r3, 0x0, 0x0) sendmsg(r0, &(0x7f0000001300)={&(0x7f0000000100)=@pppol2tpin6={0x18, 0x1, {0x0, r0, 0x2, 0x1, 0x0, 0x2, {0xa, 0x4e21, 0x6, @local, 0x400}}}, 0x80, &(0x7f00000012c0)=[{&(0x7f0000000180)="fc74334e60f3fac19d00d7ed96a85a5ffe3579f30924191aff6a1f08cca59a1407a91cd44154cd67fb8dab6a79e8fcf03158db7799b1a9437c07117d33b9bbd16c6d8200e874115f66bd726d28759c74cac6", 0x52}, {&(0x7f0000000200)="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", 0x1000}, {&(0x7f0000000080)="70b07731e1b5c9f3844fd23b051a26a01fce149a8ed2f53b6c62fed2dbc472ec621c5becafc9e014ba1690d9191ad0cdb042fa", 0x33}, {&(0x7f0000001200)="ed88179071af1bbd7968650c4a8f2cb1df61504a19d71d2b6f845d4e8b699f6d181b1b3508cf12308622e36f5e6128c3e38a09a62a92325c1ac43d73dc48f674be2aae7a420f7891aeca5b4d7cfdc93bc4df1a4e397f90844d4ee852277dd9c6dfb6cef369a418dbf3ccf92f603abf7a6ee11926f3cd7f46d6355c8796f929d88eca870ce7e438dd33a92cfdaf482907", 0x90}], 0x4}, 0x20000805) 11:45:27 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) bpf$PROG_LOAD(0x5, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r0 = gettid() tkill(r0, 0x3e) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) 11:45:27 executing program 3: r0 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000240)={0x0, 0x9, 0x1, {0xb, @sdr={0x0, 0x1}}}) socket$pppoe(0x18, 0x1, 0x0) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000440)={0x0, 0x1ff, 0x1, {0xb, @raw_data="b57ec6e2ccfebc2f19650bb2b17372c05fea81c70a61a58b97c5bffa8f3ff22ef5e44f8d5bcd9a7e6ad039656c778e3defde487514c27a53e5ab19e7d988086662bc7d2936c0ce17f57929fe03c491a499d671387a8c4a9d52f2fa0f12b0c8a6fbac0bf52fe8075949b6f554aad4d9906746094746213d701bdbfdddfab15780f0ff892ac680cdf8d58b6eec86af9447e96b23570e54caa7549caa341c121bd9f0d43abff4054dc2ade5aa89ec0521282cbd701f60913b7986f0199bcfb06c4d3b1bf98e836e40ac"}}) ioctl$VHOST_GET_VRING_ENDIAN(r0, 0x4008af14, &(0x7f0000000000)={0x3, 0x1ff}) 11:45:27 executing program 1: capset(&(0x7f0000a31000)={0x19980330}, &(0x7f00009b3000)) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x141000, 0x0) ioctl$TUNGETSNDBUF(r0, 0x800454d3, &(0x7f0000000100)) mknod$loop(&(0x7f00000004c0)='./file0\x00', 0x2002, 0x0) r1 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) getsockopt$inet_udp_int(r1, 0x11, 0x6f, &(0x7f0000000040), &(0x7f0000000080)=0x4) 11:45:27 executing program 0: r0 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dlm_plock\x00', 0x0, 0x0) ioctl$VIDIOC_SUBDEV_S_CROP(r1, 0xc038563c, &(0x7f0000000140)={0x1, 0x0, {0x6, 0xfffffffffffffffe, 0x0, 0x8}}) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000240)={0x0, 0x9, 0x1, {0xb, @sdr={0x0, 0x1}}}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f0000000000)=0x1, 0x4) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_SET_REGS(r0, 0x4090ae82, &(0x7f0000000040)={[0x1, 0x1, 0xb0c7, 0x2, 0x7fff, 0xffffffffffff3769, 0x81, 0x0, 0x7fff, 0x80000001, 0x9, 0x0, 0x9, 0x5, 0x8001, 0x401], 0xf000}) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000440)={0x0, 0x1ff, 0x1, {0xb, @raw_data="b57ec6e2ccfebc2f19650bb2b17372c05fea81c70a61a58b97c5bffa8f3ff22ef5e44f8d5bcd9a7e6ad039656c778e3defde487514c27a53e5ab19e7d988086662bc7d2936c0ce17f57929fe03c491a499d671387a8c4a9d52f2fa0f12b0c8a6fbac0bf52fe8075949b6f554aad4d9906746094746213d701bdbfdddfab15780f0ff892ac680cdf8d58b6eec86af9447e96b23570e54caa7549caa341c121bd9f0d43abff4054dc2ade5aa89ec0521282cbd701f60913b7986f0199bcfb06c4d3b1bf98e836e40ac"}}) ioctl$MON_IOCX_GET(r1, 0x40189206, &(0x7f00000001c0)={&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @iso}, &(0x7f0000000340)=""/228, 0xe4}) 11:45:27 executing program 1: capset(&(0x7f0000a31000)={0x19980330}, &(0x7f00009b3000)) r0 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0xcde0, 0x41a002) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f0000000040)={0x25, 0x3, 0x0, {0x1, 0x4, 0x0, 'proc'}}, 0x25) mknod$loop(&(0x7f00000004c0)='./file0\x00', 0x2002, 0x0) 11:45:27 executing program 1: capset(&(0x7f0000a31000)={0x19980330}, &(0x7f00009b3000)={0xfffffffffffffffd, 0x0, 0x1, 0x0, 0x50000000000000}) mknod$loop(&(0x7f00000004c0)='./file0\x00', 0x2002, 0x0) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x100, 0x0) write$capi20_data(r0, &(0x7f0000000040)={{0x10, 0x6, 0x1, 0x82, 0x10000, 0x2}, 0x79, "5d134f340587f591fa1138c6fdc8792f008e60b87f92f2bc43c5fb1476c800a76dc82abdf35c3cf5fb35bfdc60c5464f90ad1059922a9dbca28f86f28e931b895acc14b940ef71af9f358a2190bb4ec921b0b047649025b2ecfef2c30fd248b5e3b08a8d4f410da2357d0062864cd185ce18dd1ba1d8631694"}, 0x8b) 11:45:27 executing program 3: r0 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) read(r0, &(0x7f0000000600)=""/4096, 0x1000) 11:45:27 executing program 0: r0 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000000)={0x0, 0x80000000c, 0x2, {0x4, @pix_mp={0x40, 0x0, 0x49323159, 0x1, 0x0, [{0x100000000}, {0x9}, {0x100000000, 0x9}, {0xfffffffffffff801, 0x4}, {0x8001, 0x9}, {0x6, 0x4b}, {0xb14, 0x9}, {0x3, 0x6}], 0x0, 0x7, 0x7, 0x0, 0x4}}}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x8) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000440)={0x0, 0x201, 0x1, {0xb, @raw_data="b57ec6e2ccfebc2f19650bb2b17372c05fea81c70a61a58b97c5bffa8f3ff22ef5e44f8d5bcd9a7e6ad039656c778e3defde487514c27a53e5ab19e7d988086662bc7d2936c0ce17f57929fe03c491a499d671387a8c4a9d52f2fa0f12b0c8a6fbac0bf52fe8075949b6f554aad4d9906746094746213d701bdbfdddfab15780f0ff892ac680cdf8d58b6eec86af9447e96b23570e54caa7549caa341c121bd9f0d43abff4054dc2ade5aa89ec0521282cbd701f60913b7986f0199bcfb06c4d3b1bf98e836e40ac"}}) 11:45:28 executing program 4: r0 = getpid() r1 = syz_open_dev$sndseq(&(0x7f0000000140)='/dev/snd/seq\x00', 0x0, 0x0) read(r1, &(0x7f0000000200)=""/28, 0x1cc) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000080)={0x1, @time}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r1, 0xc02c5341, &(0x7f0000000340)) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r1, 0xc0305302, &(0x7f00000003c0)) timer_settime(0x0, 0x0, &(0x7f0000000240)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) tkill(r0, 0x1000000000013) 11:45:28 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) bpf$PROG_LOAD(0x5, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff6405000000000065040400010000000404000001007d60b7d3a700000000006a0a00fe000000008500000026000000b700000000000000950000000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r0 = gettid() tkill(r0, 0x3b) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) 11:45:28 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000000040)=0x1, 0x4) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000013000)=[@in={0x2, 0x0, @broadcast}], 0x10) sendto$inet(r0, &(0x7f0000000200)="2043086c5820e78eda43433107c84cb1e201bfb0b50ca9a94df7db1e04a1ce5081e1c1d19467bee5a8f7241c8c82ae3498bf77cfde75fdc95af6e2060e1d231d2e09370afddf66185d414abe21e2745ac6ffe7a6d03c18d29cb7782cb3b1af82de", 0x61, 0x20000000, &(0x7f0000000280)={0x2, 0x4e20, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000000140)='^', 0x1, 0x5dc, &(0x7f0000004ff0)={0x2, 0x0, @rand_addr=0xfffffffffffffffe}, 0x10) getsockopt$IP_VS_SO_GET_TIMEOUT(r0, 0x0, 0x486, &(0x7f0000000000), &(0x7f0000000080)=0xc) io_setup(0x2, &(0x7f0000000380)=0x0) r2 = syz_open_dev$swradio(&(0x7f0000000500)='/dev/swradio#\x00', 0x0, 0x2) io_submit(r1, 0x1, &(0x7f0000000580)=[&(0x7f0000000540)={0x0, 0x0, 0x0, 0x1, 0x2, r0, &(0x7f00000003c0)="60cdbb8c50475a60164afd7b4cfe757b48109305be8b2198a769878fb06345aa05601d0324fca1eb62ffd28ee72c55976935fd19577a19f60d1cd0e5eca92ae73f3c4653ae1c09decfed9544fa1a49b94c105df3e381848c031cbd12e11749da1ac0f25538429c89cd38a07da3dcd0eb73595c8eef0da634cd7c0eaaaeca0d7402b9867309aab2e092a7eeb9c4471f9da529d9d81bdf600369897cb405327569dd418b64d2d3a063395a4be75306313dd3ac9297501d50c88ef45228e0f1dde345f87cd89780bdbe9301c4134c5af85813899bc11bdaaa0c0d7374632872f37bde13db4b6350af0750ea405666bbf290410efb", 0xf3, 0x5, 0x0, 0x3, r2}]) getsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000600)=@assoc_value={0x0}, &(0x7f0000000640)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f00000005c0)={r3, 0x4}, &(0x7f0000000100)=0xff57) getsockopt$inet_sctp_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000180)={r4, 0x200}, &(0x7f00000001c0)=0x8) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r0, 0xc08c5336, &(0x7f00000002c0)={0x1000, 0x9, 0xc6, 'queue0\x00', 0x40008000000000}) capset(&(0x7f0000a31000)={0x19980330}, &(0x7f00009b3000)) mknod$loop(&(0x7f00000004c0)='./file0\x00', 0x2002, 0x0) [ 511.830166] net_ratelimit: 20 callbacks suppressed [ 511.830170] protocol 88fb is buggy, dev hsr_slave_0 [ 511.840199] protocol 88fb is buggy, dev hsr_slave_1 [ 512.470123] protocol 88fb is buggy, dev hsr_slave_0 [ 512.475190] protocol 88fb is buggy, dev hsr_slave_1 [ 512.550119] protocol 88fb is buggy, dev hsr_slave_0 [ 512.555246] protocol 88fb is buggy, dev hsr_slave_1 11:45:30 executing program 5: sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000000)="5500000019007f5300fe01b2a4a280930a60ffff00a84302910000003900090008000c00060000f3180015e005000600000000dc1320d5440700000000", 0x3d}], 0x1}, 0x0) r0 = socket(0x1000000010, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f00000000c0), 0x492492492492191, 0x0) r1 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r1) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') personality(0x100000) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x1000000000025) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x3000000000000, &(0x7f00000001c0)="e86ca0557d5516a7190499740a399cb5994a407e604422edec7a3d3a17803822a085477ed3ddac0c9ef55a2dcbc1794ed9dd3a933f90706b9d64b2dd289ec204c1729b8d291e48fb218e451a47a6e798f895ddb308ddcde6e988404960189ab3d9c677ef3cef915bee3604a083c78ae449bb141063c5f7097dfa1d4053255cbcc8064fda89788a35bdacaa0a27031996d7ae32d46143f626c067d1e0f6719c9c7db27d9fa8abb52d2959ced6") tkill(r2, 0x1d) ptrace$cont(0x9, r2, 0x0, 0x0) 11:45:30 executing program 0: r0 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) write$FUSE_LSEEK(r0, &(0x7f0000000000)={0x18, 0x0, 0x5, {0x3}}, 0x18) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000240)={0x0, 0x9, 0x1, {0xb, @sdr={0x0, 0x1}}}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = add_key(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100)={'syz', 0x1}, &(0x7f0000000140)="df9659753dad1304ba4f2d967284afb82363e90e52", 0x15, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz', 0x1}, 0x0, 0x0, r2) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000440)={0x0, 0x1ff, 0x1, {0xb, @raw_data="b57ec6e2ccfebc2f19650bb2b17372c05fea81c70a61a58b97c5bffa8f3ff22ef5e44f8d5bcd9a7e6ad039656c778e3defde487514c27a53e5ab19e7d988086662bc7d2936c0ce17f57929fe03c491a499d671387a8c4a9d52f2fa0f12b0c8a6fbac0bf52fe8075949b6f554aad4d9906746094746213d701bdbfdddfab15780f0ff892ac680cdf8d58b6eec86af9447e96b23570e54caa7549caa341c121bd9f0d43abff4054dc2ade5aa89ec0521282cbd701f60913b7986f0199bcfb06c4d3b1bf98e836e40ac"}}) 11:45:30 executing program 3: r0 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000240)={0x0, 0x9, 0x1, {0xb, @sdr={0x0, 0x1}}}) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000440)={0x0, 0x1ff, 0x1, {0xb, @raw_data="b57ec6e2ccfebc2f19650bb2b17372c05fea81c70a61a58b97c5bffa8f3ff22ef5e44f8d5bcd9a7e6ad039656c778e3defde487514c27a53e5ab19e7d988086662bc7d2936c0ce17f57929fe03c491a499d671387a8c4a9d52f2fa0f12b0c8a6fbac0bf52fe8075949b6f554aad4d9906746094746213d701bdbfdddfab15780f0ff892ac680cdf8d58b6eec86af9447e96b23570e54caa7549caa341c121bd9f0d43abff4054dc2ade5aa89ec0521282cbd701f60913b7986f0199bcfb06c4d3b1bf98e836e40ac"}}) epoll_create(0x5) 11:45:30 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) bpf$PROG_LOAD(0x5, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = gettid() socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) perf_event_open(&(0x7f0000000040)={0x5, 0x70, 0x100, 0x8001, 0x6874, 0x2ff8, 0x0, 0x8, 0x8, 0x9, 0x1, 0xdb13, 0xfffffffffffffffe, 0x7, 0x9, 0x5, 0xfffffffffffffe00, 0x52b, 0x5, 0x6, 0x6e, 0x45, 0x6, 0xbfb, 0x8, 0x8001, 0xaf5, 0x9, 0x3, 0xffffffff, 0x3, 0x8000, 0x9, 0x401, 0x1f, 0x3f, 0x8001, 0x4, 0x0, 0x2, 0x1, @perf_config_ext={0x4, 0xb94e}, 0x2, 0x7fffffff, 0x40, 0x1, 0x8, 0x5, 0x4}, r1, 0x7, r0, 0x1) 11:45:30 executing program 1: capset(&(0x7f0000a31000)={0x19980330}, &(0x7f00009b3000)) mknod$loop(&(0x7f00000004c0)='./file0\x00', 0x2, 0x0) r0 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x0, 0x103080) lsetxattr$trusted_overlay_redirect(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='trusted.overlay.redirect\x00', &(0x7f00000001c0)='./file0/file0\x00', 0xe, 0x7c4d3278b2f53a07) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)={&(0x7f0000000000)='./file0\x00', r0}, 0x10) 11:45:30 executing program 1: capset(&(0x7f0000a31000)={0x19980330}, &(0x7f00009b3000)) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x2002, 0x1) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x0, 0x0) ioctl$KVM_ASSIGN_SET_MSIX_NR(r0, 0x4008ae73, &(0x7f0000000080)) sendmsg$kcm(r0, &(0x7f00000004c0)={&(0x7f00000000c0)=@isdn={0x22, 0x3, 0x1000, 0xfff, 0x5}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000140)="b7fde0b82a3191a36d607cf05a452c388cad0fd1eac54506564d62c2cd59e19895c5cc50892c5e2f4d4fffb5c746cbdf943d621b360c42555d6a5619175cc8081c71e5e4922ca43d7b1be840a120f13926662cb17e25c949ee947724bf6d89d4497d663826f9caaadf10e966e7239b2fe0a96b5c411e19989450a62f4fc1d6da20793b2b030492a8381b61df1464ad3472e5cc377c7d485a4f8b4bce164e22def4194c795065532e9c3d001e38d2b4bcd86852977cc8255ec1f182e5557c45d04a29dea5d0d25fedf91efcae580f4565a2f0c97d4e35a0ccb541e8ba8d7c1909a8439fd2e1cc03af0bb8fe2a41a50c46ed356108d1", 0xf5}, {&(0x7f0000000240)="9e1717c62bd177e6cf829c2ff22efcf9a5f361ce00a6e96ed518014942a7e597d5e2ca5932e6a9fe0b2d10492b36ac980c878b366f5ff132b5e68d5b45dc553e212a3344ae431e636052fcf61dfb208eaf56c26aa2b21de4e2c67ef3580690cdaf6f97c7547c6c5489d66d7c9cbf7c2f05e024b833bb4cd674e655e31377ba6a6a2351e9955832e2fbc3949353cbe4e45bb6bffe1f422f50295998ab1397b8f1a5c01e2c69339be870fe69eb2bb78aa52390ec97add981ba56e40a10ff0713dc58c325c413d05a9391f86f760803ec4f119074882ee05564ab5fe2e4bc2c0c05d48f22cd56cef608993203c035f722e66d7df7", 0xf3}, {&(0x7f0000000340)="74926abf943397283cea17c0bbd3c4a6045ba2789559484390cf8e44304cb74dff97e6a564da4ae50ed03d073a132083c755ac4e4979d72d44dea475b0541e024c511410d63ccf", 0x47}], 0x3, &(0x7f0000000400)=[{0x70, 0x115, 0x6, "f03bf7b88ab05ee0e59c7e488b68ee1ffd9c3c395259f352d82e907bf6a8d5e2c37fa824eaa9fd2d2c5ff20c80b5f80299a85841e2c6d27d68a3f1111453e19c4136df1071a607b969d9192f6138c6205ddfcb9f9520414eb2cfd65be84a"}, {0x48, 0x115, 0x6, "0d8d01bf4d5a6cc24e9cb0e810f500793a9bb5ac0536adca37bd1c300ac9b2f2ed422a0de8af003a3cfc55b195219c80a0b8bfc4"}], 0xb8}, 0x800) 11:45:30 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x3, 0x200000) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r0, 0x40106614, &(0x7f00000000c0)) ioctl$SG_GET_KEEP_ORPHAN(r1, 0x2288, &(0x7f0000000080)) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000100)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a91f59774040382e4087700fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r2 = gettid() tkill(r2, 0x3b) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r2) 11:45:30 executing program 0: r0 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000240)={0x0, 0x9, 0x1, {0xb, @sdr={0x0, 0x1}}}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x2) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000440)={0x0, 0x1ff, 0x1, {0xb, @raw_data="b57ec6e2ccfebc2f19650bb2b17372c05fea81c70a61a58b97c5bffa8f3ff22ef5e44f8d5bcd9a7e6ad039656c778e3defde487514c27a53e5ab19e7d988086662bc7d2936c0ce17f57929fe03c491a499d671387a8c4a9d52f2fa0f12b0c8a6fbac0bf52fe8075949b6f554aad4d9906746094746213d701bdbfdddfab15780f0ff892ac680cdf8d58b6eec86af9447e96b23570e54caa7549caa341c121bd9f0d43abff4054dc2ade5aa89ec0521282cbd701f60913b7986f0199bcfb06c4d3b1bf98e836e40ac"}}) 11:45:30 executing program 1: capset(&(0x7f0000a31000)={0x19980330}, &(0x7f00009b3000)) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x2206, 0x0) [ 513.030118] protocol 88fb is buggy, dev hsr_slave_0 [ 513.035286] protocol 88fb is buggy, dev hsr_slave_1 [ 513.430120] protocol 88fb is buggy, dev hsr_slave_0 [ 513.435195] protocol 88fb is buggy, dev hsr_slave_1 11:45:31 executing program 4: r0 = getpid() r1 = syz_open_dev$sndseq(&(0x7f0000000140)='/dev/snd/seq\x00', 0x0, 0x0) read(r1, &(0x7f0000000200)=""/28, 0x1cc) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r1, 0xc02c5341, &(0x7f0000000340)) timer_create(0x0, &(0x7f0000000100)={0x0, 0x12}, &(0x7f00000001c0)) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r1, 0xc0305302, &(0x7f00000003c0)) timer_settime(0x0, 0x0, &(0x7f0000000240)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) tkill(r0, 0x1000000000013) 11:45:31 executing program 3: r0 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000000)=0x6) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000240)={0x0, 0x9, 0x1, {0xb, @sdr={0x0, 0x1}}}) ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, &(0x7f00000000c0)={0x0}) ioctl$DRM_IOCTL_SET_SAREA_CTX(r0, 0x4010641c, &(0x7f0000000180)={r1, &(0x7f00000001c0)=""/118}) ioctl$VIDIOC_QUERYCAP(r0, 0x80685600, &(0x7f0000000040)) 11:45:31 executing program 0: r0 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000240)={0x0, 0x9, 0x1, {0xb, @sdr={0x0, 0x1}}}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0xff) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000440)={0x0, 0x1ff, 0x1, {0xb, @raw_data="b57ec6e2ccfebc2f19650bb2b17372c05fea81c70a61a58b97c5bffa8f3ff22ef5e44f8d5bcd9a7e6ad039656c778e3defde487514c27a53e5ab19e7d988086662bc7d2936c0ce17f57929fe03c491a499d671387a8c4a9d52f2fa0f12b0c8a6fbac0bf52fe8075949b6f554aad4d9906746094746213d701bdbfdddfab15780f0ff892ac680cdf8d58b6eec86af9447e96b23570e54caa7549caa341c121bd9f0d43abff4054dc2ade5aa89ec0521282cbd701f60913b7986f0199bcfb06c4d3b1bf98e836e40ac"}}) bind$nfc_llcp(r0, &(0x7f0000000000)={0x27, 0x1, 0x2, 0x7, 0x7fff, 0x2, "eaf0d821c37ef7ce0bff98315d11efcdca27262e3722e6fb47234674233c44a7fddbb312a4371fa4f9517b3bd3a4ab708832bda46fbe159a869e74bdde96ae", 0x8}, 0x60) 11:45:33 executing program 5: sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000000)="5500000019007f5300fe01b2a4a280930a60ffff00a84302910000003900090008000c00060000f3180015e005000600000000dc1320d5440700000000", 0x3d}], 0x1}, 0x0) r0 = socket(0x1000000010, 0x0, 0x0) sendmmsg$alg(r0, &(0x7f0000004c00)=[{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000100)="cb9fae358139907d68988d4f167e070000000eb7ce251b98292b0421b64dea7797e6ba975dfcb575fe0cb69a81ebb0c40ade96ed930d8c30c2489ed9748c507118183ceec2167ad985c661bffa062c85aa6e2cf6c98b60173dc44de95ad76ebadb043ba85dcdb867ef9a7a27f46742c75609b4cb2f3c0de1442bd0ff0c19e05a01000042dac976f5287496da2aff6f3bd5cc65b7f04718d99722311e97f4f6c586e8c64b008cc3ed7cbd79e2ff0f000013b6455d03372221d7579d5ca6c13c7f7f74166f7b", 0xc5}, {&(0x7f0000000200)="32c918bf549d91022263253f2ca61e87d2d1a5cfd851ff026d60a2a2e78f7665d92df7739f3f363dbc1d05f779dc585c86935a0942ab8a37fe6631f320e60d33cfd00a75a7a9f4777b65e9eeb4e17d3103b0176127c28a8a8d8379da794874f47664bf44b227b988db49b63135560076e89ac0bf774ed19a4d4a28f6062dc066f63937dac806e73ea81cb8c0b54cfac49499d7c585f110aa7fc7af7f1c2648291d8c9ed662e40c2b6786b36d7dbe11ae8db0024b08eac1de64d3bb316ad7e8c50e6d849ed615cced76ab4a4fdd51fdf33d105170982b4c8fdc63f683ffec68a71fb16ad8052fed", 0xe7}, {&(0x7f0000000300)="1cd120dd72b73d117e8409425c72a396ef0dacbbcdd3afc8ea258f60b3a3ecc485a42290f2e6448d6292e242890c405c7aa6784f704e4e4c50bed2d1dfb7687ea2b4f8f3f20debeeecf47836f664ec20f7648ad02ca212ff013e1218fe029d25b70ff49b3c9b5bf11fd0d77146ba24a8834fe0b95a2eafe28d8868860022f881384be7e68c9cdb175a40ba618caef7683b9465e809ea23d7d67c7ecd454f5f9f1590aedf55786cd26cd795a4ccb3dd565139f946ca635c22e8ed43718939f78e7f7ea538bf715522ae55244c5b", 0xcd}, {&(0x7f0000000040)="1d116932340fbb444b8337b8afcbbdfac04e3ff707ab0eac47f92a2687e405b3990d65582a82ba9fd04c77c5b0f7fe095ac00f6003a56b6c9bc5af73eac990de76799ed8446252b83972eb4c09b27b58621e4ab99c11ff7fc8f63e70e4ff58d706606e98861b5adb688c92517d5fd8a6", 0x70}, {&(0x7f0000000400)="91290771806ae7b3c99665a02fcaa340bbe16eca64d02b385502091b317dfb9bacf204faaf5ca7004f977e77b49532f3b5826e6473b1746e6974681d49e8b0f6fe402cff55b266d967886e839b241fdb5e4b65cad38af980f09e49cbfc5fb471bd458f7e7ee01828090544b691933577bb122549774813818a1b4718c744051b7777cd14748410afcdfc17bd7069f8c7192d35d61466607cded437edbca153686aa91ca97b03c2d10852fc16e5f1c77c005dfde445870f0012652f00bd744e59601cbf1c9164563d876f30bfae8877e6588a20320943fda9bb9f524f444cf438af87d2125404415dad2a6e8637", 0xed}, {&(0x7f0000000500)="337fab7f841d9f0c0b5d5aaba226e4b26b8bc32cac4c00b8dfe15ac2cf291357563848b9db587017a0553933bc00ea80b2731e8049e9da6d94c7a6a00a3f29b76980a1cce4d4eb07b3f28442fd58b7c3e69cc7fcc70693b6f775b4c598ef6000664d8f7950148537b81ff1ec254f1c13cd6c3653b6c8033076548b69c360e9859d60578f7fbdf330260ba3696ea088d0b3576e1769471f84c7443ff09b1725bf76a527b0a1fcec96b0f0f599f5bc51de53b6094c305520c1098ccc9f2950063b7155cdf37ff881901758b29c2b76a0a6d178cad0511d1db4ccc5438652f76d9423c379e2057ea7c7c7c167bf3e2d2eafa5cadf43e05f", 0xf6}], 0x6, &(0x7f0000000680)=[@assoc={0x18, 0x117, 0x4, 0x6}, @assoc={0x18, 0x117, 0x4, 0x4}, @op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x8}, @op={0x18}, @assoc={0x18, 0x117, 0x4, 0x3}, @op={0x18, 0x117, 0x3, 0x1}], 0xa8, 0x4008800}, {0x0, 0x0, &(0x7f0000000a40)=[{&(0x7f0000000740)="18aa369fc3c515c6d7b9bcd526774742fe02298ae3547b7f2095db135becb34a5b495dc64f4902f6a2655499e534564e5bd904ddf1296ebe10e437c74ece1ebf20b7c98fd8f43c379b24e2005832806fbce7bffc9677a15a07eb27bd42c8a48257fea1933e5321bce1c8ddb688f8306289d94c0e2400a3a57c6307d6531e1e7390bd1598b02ab980dcd72ad510605258c8fedec1c48101d34bd498208b965b0f433060ed5cb8f7c24118649ea7cf14dd0bcb5713e50cf1d8ee66152d74c4df7ed82937f447dddaa0f4a941dc461f3c4c6063c1bd20d08969be1a20a9444c0990cd5a0e02c9", 0xe5}, {&(0x7f0000000840)="d3dfd67d5a2bc4f020829309ec5a9d0bd6c653364b3599968fec937691fd7b2eadf8534ac38354b92a649e6e4e4a98271bdbfb1a8251e5ce7988d01fbd62fffa033e34e81fb8475eed812e1032db0d2fa3ef660c78c78e191d84ec5b332a72279968544f67a307527c21a249424b13bd8184fe4f9520d8207afc10766517186e3fdcd62e71344ce77fafb6647ada1a1e83e85b94adfdadf5fb79394d75718f1cf590e83f8e730f0b99dfd929661c600d37a5db5a4c65ebbc1c29e8635f24d8905208c7", 0xc3}, {&(0x7f0000000940)="39c47de3b931a1b3260e2b8938e965eb0f057923f016898a33a179ea52abdd64b97874947a1648fee627d04aca03e5d3ecdc75b16afd2f769d7de8b69cb1c09dfea5bb44fbb4d442edcb14f0fc8a4a1f6f4a4318f0282db0d37f10556d1bfe0c9c59d5bc1a431c5bddbe0f0c619e50222716277f1ac5db0e8daf85f317f527fc394e15ff52951c9bef57c18186fa7c0f1b55a39d0c6b", 0x96}, {&(0x7f0000000a00)="702c9bb22c7550a7f236adbd60b62fcd277c3a703851d08920fcb2c0650f5712ea", 0x21}], 0x4, 0x0, 0x0, 0x20004095}, {0x0, 0x0, &(0x7f0000004d80)=[{&(0x7f0000000a80)="dd7605ae7cd1bd84d88140c8044b09ceff572b76e32fa0012d57370dad3230c2626eb11da254fc3119a5348cccd5a8a3db", 0x31}, {&(0x7f0000000ac0)="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", 0x1000}, {&(0x7f0000001ac0)="993a905c4814399fd68dade27f1eef83ea24b157124c4c20eec21e72c62c8b7a3dccc332a1c9f9f3771246d6f5b8b062fdc400d1508cc4db11681ac36115680174dabcda0fc8260c466bd949e88eb6ad4831b629bd9ad475a63124ebb8aec38b65132a32db39bd658c567c804c1cc0f8de1a4c849f50993077", 0x79}, {&(0x7f0000001b40)="7060a7e91f2748128c8b7f5d4902535aee6c31599fd4ba90ff3f4fa815cdaee6503323db6a81c7f7f95f587380b6dfbfe3fa4128d4fa7e64c50463f7e40febfae0b157c781645b53f9a4605a577107f84559d737779f9623f7a1b982bdf8a530013de975fd3569aed9832b52ea52cc4634e04a80298a326309f02632938556cbf5da5c9ced40a7ab2cb8c383b84895b1bf3d0f63ef5e14d6e51d5cb29cb21a4f7b2b9a0dd9c5dd5453cde57a18971e9989bfc02e68daddb90dafd74d4b34871d9788d613a7bb121f1d0ef7328ab351a6b85b7d", 0xd3}, {&(0x7f0000001c40)="fb1f7793d85fb1060f7f79d6bcc2594b35ded9b4657af3d72026291e6eca81e8e3578c0f7494761cfb8ae28a978e8fb0972c323d1b54ec1711a36b6da122787750051f356f3a4c9f386551164d89af48731b2d23bab2810dcb1f10b53eaf9c633bd93190158f8d8010d390294c891777a56515b0c0a3533bb82060d4b428fe48dcd99d8a2adcfc3b29b72d5cf6a8b5a15da87da34d464c9e73c9113cc44c99dcb3d934de71d8658b80f625a857eb159235408b06bad902ff3f3b", 0xba}, {&(0x7f0000001d00)="1197c616eb4a0d6af84c69aac211bb660090936e4ba26d7cbcd12396b9122fa00237d13145bfbd40a9aae98e0b74f8e8ed0da27bebe080cd418e94ce1b4bfba192184b4176d0b42aad3666163c72c6d5162934174333b133aeed5ee88e9d6959a6e60ba2482a25d4533d114ae653b598ab96451a85208603eba6bcf3f04393ec95539082e7b8f6192dbd06db73b8d36e16fd35515fce4541b5a626e820f408c396ba667131b5029861e3a5f983cdd340a4c2c7951712ee", 0xb7}, {&(0x7f0000001dc0)="0a005df051222aa463fc44b6aee13816260e288007bdd34f465b69651ce874de4f9518245eb5967d70325ce8cd4b6313fa85c3fc34182fce61d3ad398d51f18f444a64f066d02be694f6fa44eefe9ee8edfa20ed7a253875f21a1090ab68c1695462ef1be8f3dea026b765ed5cef3ab4775397f7fba49e37a0800ac8ea0f2afc7730c3ebbf791277400585db07b261c7e560c4f5a7988fd2c0f66d2e9338e2f6cb17d5798129c4743d0afc609063cf6108ae64b93876336cc45ff5160fa0edea5babd3a614e4018574ff2834f7d44f202ed98b7819a6935065b09ff6b029a3e00eac94cf35", 0xe5}, {&(0x7f0000001ec0)}, {&(0x7f0000001f00)="f3a6a5f2bcb5a562f6b0cb1de1f0454be51b7c8c3804cc22a13b9dc28ca51e222786836bbfe094e3e787e0b2db3c8f2e82d203cd5027c97a95222a364a9f4c7a9ed457341316b4e72e71e865def18b5f80a37fcd71df1a95783be3b4920a3a053d4f1cdf72a018db8e3cefe8a28bfa0cab059152d9a10d5af5a2a3248152ccb79abb8764fc920c8f4c1291a97ffdcf35093ba23cd9284165d4bb473e7aeb7ab5e83ac375b67c6d556c42aa8ea4ac80908c95e0b46107218322adb92f55e9ac417b998b854ca08e2991", 0xc9}], 0x9, &(0x7f0000002100)=[@assoc={0x18, 0x117, 0x4, 0x1}, @assoc={0x18, 0x117, 0x4, 0x10001}, @op={0x18, 0x117, 0x3, 0x1}, @iv={0x1018, 0x117, 0x2, 0x1000, "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"}, @iv={0xe8, 0x117, 0x2, 0xd3, "6ee2634eba0ec5fea680c13a32f6b0bca46368357b3f42caa30fa827c1774325ca2bdc44ba35177882bac76ed9dbbb18fa8eddef6c42afc97f09e35fdea9d5277d9c947f0a26f0ee129a38343bbe702ec0a06ed26bd23a1476f79341d8ef2e10c09a59158d9c20fac693b0042630288d706ff69b10a091b6efa502dc7de801441d2495f2a0ba1a94a27c51d193c2163f4c6922b936dd26517ccb95ef673ca9419b1d6c0c73aae3f4e72731e23e814b17d08edaebd3fb188bfe93e515b5a529e5ebab7ed5b1f0a8b6d83d065ab68ffa3176fe58"}], 0x1148}, {0x0, 0x0, &(0x7f00000046c0)=[{&(0x7f0000003280)="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", 0x1000}, {&(0x7f0000004280)="e31b8ba234132dbcd97b9e3f6e6b7099572e86949112944ee6f9249ea580cd54304936accd4f7852a5a36506373e4eb96d375519bc9aadbd40e32cc1", 0x3c}, {&(0x7f00000042c0)="dca8eda5477fe8060170f72928543f5a143b40dd07fd8e257e263e7192c26c5f33a45fa70a42e214f181dc2194cd0f2f2d51c76319187962acfa1cbdab2cbb40bd7ced3f671a19782d96258ddc88563b8ef586e048a48d9251c14946db9e0bc5551802a180f33b66d5d7aec097ac9765884ca512ad4a82f13bde9fefcc62c88a3fd9d135f5e1662ff701997b3f09366a2ffdffe51cb13bd2b7cee8e9f5747981ba3e9a51d04a4594178dd05af6c0accc4ebd054171e5041d4887e47aeba6551a0dc96836f4c0ef11c82e633313824d99699e33022aeff9df977740603749364621346238a045", 0xe6}, {&(0x7f00000043c0)="46853dadde8bf83cd7bcfb2034909f613e8442a691d176ae6671954f2fceebea0e229557f1801a394d6cffe85a20e28593f91c06a1e02909f126122695323186ab2cbae3d3dd0faac4b5d6d3dd661b45c67a7e", 0x53}, {&(0x7f0000004440)="f720887de61269f9cd286712e06c47ba0b8cb821f95390d4af5c3ef7297fe617d3d7871a539c1f055dc4b06addfe324cf91fdd8dac30ccb1ddf53b6c0eaa71ebe9d76cff358fd9b775b6762e31dc9e39974414a69a7bcf662d8c874733dc2acb2c7d8641fc0fbcc6b45146e84049ab4eccc821d54fb09627ffa56d20783a0b866b8fbb22", 0x84}, {&(0x7f0000004500)="9096c5ab6b03dc5dcffec7b63212fb1c813981749595fb03faa6b7a8ce265e6127f9da40700db49a5553f076f998b1bd60d483440046fe808e7caf7d9aa1dbb879189c48cedf5e5b5a60a63b10288e3efb128ec059dec05fd1bdfe54d80f34fc87dcbb0132388a721179803777bba4392a81177fd0cb5f64a1323ff3fa61a32256b9c1e92c80b5d0933d6457dd97a3ad17b60e0b94d3d7892d96b37a5d69783c97d51f54681f7ebf402b0e176421502b458383", 0xb3}, {&(0x7f00000045c0)="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", 0xfd}], 0x7, &(0x7f0000004740)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x80000000}, @op={0x18, 0x117, 0x3, 0x1}, @op={0x18, 0x117, 0x3, 0x1}, @op={0x18}, @op={0x18}], 0x90, 0x80}, {0x0, 0x0, &(0x7f00000048c0)=[{&(0x7f0000004800)="b885e38247d664ca83b2a02118a36baf352ba79e8944a4d3bbdb9309d3053de03c5603aaa6fa14c8e0788cf52c4e90817277f422f3c8f3384261d9280fba487cb66a5da8f43d5c41a39677d59f3c2d227e3367f65b8fd7ff824eccff6a5eeab0e5b39ea79e4f8525b0037310cffae33167da78610af5f7e581cbd9018d16dc985da804c017769b6d0b849f1756b23d1f5b216d216bb7d038d687ef6f5bb4afe32a58", 0xa2}], 0x1, 0x0, 0x0, 0x840}, {0x0, 0x0, &(0x7f0000004a40)=[{&(0x7f0000004900)="14a9a9a87a21d5603e6bc2c8e3bbfd38670c5ba49dc9d3104c5f00c6258a2e6de7ec7db4ff7b6cc28327c21e0e614a9614a2bbbc2fae414c76da1e9b51fbe1d2d8688093f0cfc5e104744cff7b1d6a72afb92f40b6f97bcc0ef00f955b06bed99d16198050289099fde4705f5689294faf56e50c9fa4e3365e63f83bda5a534afe1355455ea72eef2a7e17eade18f787aded10060b6607039528c595443d94c929f5e74dcfb866e557ad2e757df40eb496505f768ce9fc3eef538914a50afe65c480ee1770553bf6b6c520b374e3c88273deaff5bd1c", 0xd6}, {&(0x7f0000004a00)="cc4a1438efaa72", 0x7}], 0x2, &(0x7f0000004a80)=[@op={0x18, 0x117, 0x3, 0x1}, @iv={0x100, 0x117, 0x2, 0xea, "44ff6489d60b8316cf6de4f2eb29ac2621dd865766721430509704ef788a2a8b431fe6a63571735d1728d8a0be61bfe9664a15a2c11ab023a9a9d2ece0c380ac3ea4d511fbefb9e8f9bb86c419b68b6f6f43d170d312be2ddc1d6ccad68005d2bc9a04874bf0abf039ad5fcc11097c2408c650b9b51d5b4c2d3d8506353b696d8d051c41ec06ad169a299bc315124b1be1cdb592765f51633d0254c77c68aa9bb93b931b4880d1152a8bbb592ed5efaf9571c3f241655e81bc362afe0316848a9d468bccae6d3051003d4a2230e1169f0cb11f45868b1e2b7240e2c20e65a8afde03a3a4bd441a1afc36"}, @assoc={0x18, 0x117, 0x4, 0x6}, @op={0x18}], 0x148, 0x70a18ce9791a1b19}], 0x6, 0x0) r1 = getpgrp(0xffffffffffffffff) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000002040)='/dev/zero\x00', 0x10001, 0x0) ioctl$TIOCSSOFTCAR(r2, 0x541a, &(0x7f0000002080)=0x1) prctl$PR_SET_PTRACER(0x59616d61, r1) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ioctl$sock_SIOCSPGRP(r0, 0x8902, &(0x7f0000001ec0)=r3) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x38) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r3, 0x0, 0x0) 11:45:33 executing program 1: capset(&(0x7f0000a31000)={0x19980330}, &(0x7f00009b3000)={0x0, 0x0, 0x0, 0x10000000}) mknod$loop(&(0x7f00000004c0)='./file0\x00', 0x2002, 0x0) 11:45:33 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) prctl$PR_SET_ENDIAN(0x14, 0x2) r3 = gettid() bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000400)={r0, 0xc0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=0x80000000, 0x0, 0x0, 0x0, &(0x7f0000000080)={0x8, 0x4}, 0x0, 0x0, &(0x7f00000000c0)={0x2, 0x1, 0xfffffffffffffff8, 0x1000}, &(0x7f0000000100)=0x1, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=0x81}}, 0x10) tkill(r3, 0x3b) ioctl$sock_SIOCGSKNS(r1, 0x894c, &(0x7f0000000440)=0x8) fcntl$notify(r2, 0x402, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) 11:45:33 executing program 3: r0 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000000)={0x10001, 0x2101, 0x5, {0xb, @pix_mp={0x1, 0x0, 0x32314742, 0x4, 0x9, [{0x3, 0xfffffffffffffffa}, {0x8001}, {0x15d5, 0x8}, {0x5e2, 0x40}, {0x1000, 0xff}, {0x0, 0x9}, {0x100000001, 0x8000}, {0x7f, 0x8}], 0x80000000, 0x9, 0x2, 0x0, 0x3}}}) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000440)={0x0, 0x1ff, 0x1, {0xb, @raw_data="b57ec6e2ccfebc2f19650bb2b17372c05fea81c70a61a58b97c5bffa8f3ff22ef5e44f8d5bcd9a7e6ad039656c778e3defde487514c27a53e5ab19e7d988086662bc7d2936c0ce17f57929fe03c491a499d671387a8c4a9d52f2fa0f12b0c8a6fbac0bf52fe8075949b6f554aad4d9906746094746213d701bdbfdddfab15780f0ff892ac680cdf8d58b6eec86af9447e96b23570e54caa7549caa341c121bd9f0d43abff4054dc2ade5aa89ec0521282cbd701f60913b7986f0199bcfb06c4d3b1bf98e836e40ac"}}) 11:45:33 executing program 0: r0 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000240)={0x0, 0x9, 0x1, {0xb, @sdr={0x0, 0x1}}}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000440)={0x0, 0x1ff, 0x1, {0xb, @raw_data="b57ec6e2ccfebc2f19650bb2b17372c05fea81c70a61a58b97c5bffa8f3ff22ef5e44f8d5bcd9a7e6ad039656c778e3defde487514c27a53e5ab19e7d988086662bc7d2936c0ce17f57929fe03c491a499d671387a8c4a9d52f2fa0f12b0c8a6fbac0bf52fe8075949b6f554aad4d9906746094746213d701bdbfdddfab15780f0ff892ac680cdf8d58b6eec86af9447e96b23570e54caa7549caa341c121bd9f0d43abff4054dc2ade5aa89ec0521282cbd701f60913b7986f0199bcfb06c4d3b1bf98e836e40ac"}}) 11:45:33 executing program 4: r0 = getpid() r1 = syz_open_dev$sndseq(&(0x7f0000000140)='/dev/snd/seq\x00', 0x0, 0x0) read(r1, &(0x7f0000000200)=""/28, 0x1cc) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r1, 0xc02c5341, &(0x7f0000000340)) timer_create(0x0, &(0x7f0000000100)={0x0, 0x12}, &(0x7f00000001c0)) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r1, 0xc0305302, &(0x7f00000003c0)) timer_settime(0x0, 0x0, &(0x7f0000000240)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) tkill(r0, 0x1000000000013) 11:45:33 executing program 1: r0 = fcntl$getown(0xffffffffffffffff, 0x9) capset(&(0x7f0000a31000)={0x20071026, r0}, &(0x7f0000000000)={0x0, 0x10000, 0x400000000000000, 0xfffffffffffffffa, 0xa97a, 0x7ffffffb}) mknod$loop(&(0x7f00000004c0)='./file0\x00', 0x2002, 0x0) 11:45:33 executing program 0: r0 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000240)={0x0, 0x9, 0x1, {0xb, @sdr={0x0, 0x1}}}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_x25_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={@null=' \x00', 0x9, 'ipddp0\x00'}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000440)={0x0, 0x1ff, 0x1, {0xb, @raw_data="b57ec6e2ccfebc2f19650bb2b17372c05fea81c70a61a58b97c5bffa8f3ff22ef5e44f8d5bcd9a7e6ad039656c778e3defde487514c27a53e5ab19e7d988086662bc7d2936c0ce17f57929fe03c491a499d671387a8c4a9d52f2fa0f12b0c8a6fbac0bf52fe8075949b6f554aad4d9906746094746213d701bdbfdddfab15780f0ff892ac680cdf8d58b6eec86af9447e96b23570e54caa7549caa341c121bd9f0d43abff4054dc2ade5aa89ec0521282cbd701f60913b7986f0199bcfb06c4d3b1bf98e836e40ac"}}) write$UHID_DESTROY(r0, &(0x7f0000000000), 0x4) 11:45:33 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x1, 0x8000) accept4$packet(r0, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000000c0)=0x14, 0x80800) socket$nl_route(0x10, 0x3, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = gettid() tkill(r1, 0x800003b) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) 11:45:33 executing program 3: r0 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000240)={0x0, 0x9, 0x1, {0xf, @pix={0x0, 0x2, 0xd8d825cdb710780a, 0x0, 0x8, 0x100000001, 0xb, 0xdf, 0x1, 0x1, 0x1}}}) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000440)={0x0, 0x1ff, 0x1, {0xb, @raw_data="b57ec6e2ccfebc2f19650bb2b17372c05fea81c70a61a58b97c5bffa8f3ff22ef5e44f8d5bcd9a7e6ad039656c778e3defde487514c27a53e5ab19e7d988086662bc7d2936c0ce17f57929fe03c491a499d671387a8c4a9d52f2fa0f12b0c8a6fbac0bf52fe8075949b6f554aad4d9906746094746213d701bdbfdddfab15780f0ff892ac680cdf8d58b6eec86af9447e96b23570e54caa7549caa341c121bd9f0d43abff4054dc2ade5aa89ec0521282cbd701f60913b7986f0199bcfb06c4d3b1bf98e836e40ac"}}) [ 516.045076] capability: warning: `syz-executor.1' uses deprecated v2 capabilities in a way that may be insecure 11:45:33 executing program 1: socket$key(0xf, 0x3, 0x2) capset(&(0x7f0000a31000)={0x19980330}, &(0x7f00009b3000)) mknod$loop(&(0x7f00000004c0)='./file0\x00', 0x2002, 0x0) 11:45:33 executing program 0: r0 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000240)={0x0, 0x9, 0x1, {0xb, @sdr={0x0, 0x1}}}) pread64(r0, &(0x7f0000000000)=""/254, 0xfe, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VIDIOC_DQEVENT(r0, 0x80885659, &(0x7f0000000140)={0x0, @frame_sync}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/relabel\x00', 0x2, 0x0) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000440)={0x0, 0x1ff, 0x1, {0xb, @raw_data="b57ec6e2ccfebc2f19650bb2b17372c05fea81c70a61a58b97c5bffa8f3ff22ef5e44f8d5bcd9a7e6ad039656c778e3defde487514c27a53e5ab19e7d988086662bc7d2936c0ce17f57929fe03c491a499d671387a8c4a9d52f2fa0f12b0c8a6fbac0bf52fe8075949b6f554aad4d9906746094746213d701bdbfdddfab15780f0ff892ac680cdf8d58b6eec86af9447e96b23570e54caa7549caa341c121bd9f0d43abff4054dc2ade5aa89ec0521282cbd701f60913b7986f0199bcfb06c4d3b1bf98e836e40ac"}}) getsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000340)=@assoc_id=0x0, &(0x7f0000000380)=0x4) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000400)={r3, 0x10, &(0x7f00000003c0)=[@in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x1a}}]}, &(0x7f0000000540)=0x10) [ 517.190169] net_ratelimit: 20 callbacks suppressed [ 517.190175] protocol 88fb is buggy, dev hsr_slave_0 [ 517.200212] protocol 88fb is buggy, dev hsr_slave_1 [ 517.590109] protocol 88fb is buggy, dev hsr_slave_0 [ 517.595213] protocol 88fb is buggy, dev hsr_slave_1 [ 517.600283] protocol 88fb is buggy, dev hsr_slave_0 [ 517.605293] protocol 88fb is buggy, dev hsr_slave_1 [ 518.070151] protocol 88fb is buggy, dev hsr_slave_0 [ 518.075298] protocol 88fb is buggy, dev hsr_slave_1 [ 518.710091] protocol 88fb is buggy, dev hsr_slave_0 [ 518.715337] protocol 88fb is buggy, dev hsr_slave_1 11:45:36 executing program 1: capset(&(0x7f0000a31000)={0x19980330}, &(0x7f00009b3000)) r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x40000, 0x0) ioctl$KVM_ARM_SET_DEVICE_ADDR(r0, 0x4010aeab, &(0x7f0000000040)={0x2, 0x4}) 11:45:36 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) openat$vimc1(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/video1\x00', 0x2, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x5, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0adcfff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b700ed081e69790000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r0 = gettid() tkill(r0, 0x3b) r1 = syz_open_dev$usbmon(&(0x7f0000000280)='/dev/usbmon#\x00', 0x100000001, 0x1) setsockopt$packet_tx_ring(r1, 0x107, 0xd, &(0x7f00000002c0)=@req={0x1, 0x5, 0x5, 0x1}, 0x10) r2 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x4, 0x1) mkdirat$cgroup(r2, &(0x7f0000000140)='syz1\x00', 0x1ff) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) 11:45:36 executing program 3: r0 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x1, 0x2) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000240)={0x0, 0x9, 0x1, {0xb, @sdr={0x0, 0x1}}}) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000440)={0x0, 0x1ff, 0x1, {0xb, @raw_data="b57ec6e2ccfebc2f19650bb2b17372c05fea81c70a61a58b97c5bffa8f3ff22ef5e44f8d5bcd9a7e6ad039656c778e3defde487514c27a53e5ab19e7d988086662bc7d2936c0ce17f57929fe03c491a499d671387a8c4a9d52f2fa0f12b0c8a6fbac0bf52fe8075949b6f554aad4d9906746094746213d701bdbfdddfab15780f0ff892ac680cdf8d58b6eec86af9447e96b23570e54caa7549caa341c121bd9f0d43abff4054dc2ade5aa89ec0521282cbd701f60913b7986f0199bcfb06c4d3b1bf98e836e40ac"}}) 11:45:36 executing program 4: r0 = getpid() r1 = syz_open_dev$sndseq(&(0x7f0000000140)='/dev/snd/seq\x00', 0x0, 0x0) read(r1, &(0x7f0000000200)=""/28, 0x1cc) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r1, 0xc02c5341, &(0x7f0000000340)) timer_create(0x0, &(0x7f0000000100)={0x0, 0x12}, &(0x7f00000001c0)) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r1, 0xc0305302, &(0x7f00000003c0)) timer_settime(0x0, 0x0, &(0x7f0000000240)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) tkill(r0, 0x1000000000013) 11:45:36 executing program 5: sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000000)="5500000019007f5300fe01b2a4a280930a60ffff00a84302910000003900090008000c00060000f3180015e005000600000000dc1320d5440700000000", 0x3d}], 0x1}, 0x0) r0 = socket(0x1000000010, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f00000000c0), 0x492492492492191, 0x0) r1 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r1) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() rt_sigqueueinfo(r2, 0x1d, &(0x7f0000000040)={0x33, 0xcc, 0x5}) wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) pwrite64(r0, &(0x7f00000001c0)="c47a5d70d3ab5e53e72f5c799d85cd5bc597db75f299f6eb821ad91e515ee1237396b2f670714fa60e93b0b3dc7363cd648b6d92a414ae394f96f72fff0758a9f35a22452bf232f75fda4ecb273a945e1c43643b5ca44cfe96c1ebfd22bb82876b40eebc08055226300161d1a4dafee9bffbf9dc17f8ea1bec480a26b4226983b037f2bd0422fa5c8df1e3a55418d552e9822b295aa36753342bba32b6f09a0c8a8ecd21d28cfe94f36eb860b2cef81a44f4115501b64ead6f4cb284643ddd145fc5bdce1cb20dca2c4c326fd96ad25a79e534154a37142c50ebd61e0a45493b4fa797677ab700f1332c4838a378e847c8c7d751", 0xf4, 0x0) r3 = semget$private(0x0, 0x3, 0x10) semctl$IPC_INFO(r3, 0x2, 0x3, &(0x7f0000000100)=""/149) tkill(r2, 0x38) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) 11:45:36 executing program 0: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000240)={0x0, 0x9, 0x1, {0xb, @sdr={0x0, 0x1}}}) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x200, 0x0) ioctl$sock_bt_hidp_HIDPGETCONNINFO(r0, 0x800448d3, &(0x7f0000000040)={{0x7, 0xfff, 0x80, 0xffffffffffff0000, 0x4e, 0x4}, 0x9, 0x8, 0x7, 0x2896, 0x6, "d5ffc08f46bae99e0f8634341c9af0ae8526271ed53fae9495fbe21d1be8ac6a7dfcbe310c2ab3cd1b11e88fec2985c256b61fa3835a0eb108a19aff445c9263237f270e43f3dfc51667a702a093e79bb7310152d9cd905a313396efb072f469760a4fcc4bdef1f342f8e73da6f07ccb35e3be532ce53c18bd08f363a9a5253a"}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000440)={0x0, 0x1ff, 0x1, {0xb, @raw_data="b57ec6e2ccfebc2f19650bb2b17372c05fea81c70a61a58b97c5bffa8f3ff22ef5e44f8d5bcd9a7e6ad039656c778e3defde487514c27a53e5ab19e7d988086662bc7d2936c0ce17f57929fe03c491a499d671387a8c4a9d52f2fa0f12b0c8a6fbac0bf52fe8075949b6f554aad4d9906746094746213d701bdbfdddfab15780f0ff892ac680cdf8d58b6eec86af9447e96b23570e54caa7549caa341c121bd9f0d43abff4054dc2ade5aa89ec0521282cbd701f60913b7986f0199bcfb06c4d3b1bf98e836e40ac"}}) 11:45:36 executing program 2: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8, &(0x7f00000000c0)='vmnet1@\x00', 0xffffffffffffffff}, 0x30) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/sys/net/ipv4/vs/sync_threshold\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0xb9898738a87e0b0, 0x70, 0x3, 0x87d0ee3, 0x0, 0x100000001, 0x0, 0x92, 0x800, 0x4, 0xe14, 0x1, 0x5, 0x6, 0x1, 0x0, 0x3, 0x4, 0x3, 0x6, 0x1, 0xfffffffffffffffe, 0x7ff, 0x7, 0x870b, 0xf54, 0x1848, 0x800, 0xfffffffffffffffc, 0x1, 0x1, 0x7ff, 0xebc5, 0x51, 0xf6f9, 0xad70, 0x7, 0x0, 0x0, 0x9, 0x5, @perf_config_ext={0x3, 0x7f}, 0x20000, 0x6, 0x4, 0x9, 0xf8d, 0x1ff}, r0, 0x2, r2, 0x8) socket$inet_udplite(0x2, 0x2, 0x88) bpf$PROG_LOAD(0x5, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000002c0)=r1, 0x4) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r3 = gettid() tkill(r3, 0x3b) ptrace$poke(0x5, r0, &(0x7f0000000280), 0x3f) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) ioctl$EVIOCGABS2F(r2, 0x8018456f, &(0x7f0000000380)=""/254) 11:45:36 executing program 0: r0 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000240)={0x0, 0x9, 0x1, {0xb, @sdr={0x0, 0x1}}}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$EVIOCGABS2F(r0, 0x8018456f, &(0x7f0000000000)=""/251) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000440)={0x0, 0x1ff, 0x1, {0xb, @raw_data="b57ec6e2ccfebc2f19650bb2b17372c05fea81c70a61a58b97c5bffa8f3ff22ef5e44f8d5bcd9a7e6ad039656c778e3defde487514c27a53e5ab19e7d988086662bc7d2936c0ce17f57929fe03c491a499d671387a8c4a9d52f2fa0f12b0c8a6fbac0bf52fe8075949b6f554aad4d9906746094746213d701bdbfdddfab15780f0ff892ac680cdf8d58b6eec86af9447e96b23570e54caa7549caa341c121bd9f0d43abff4054dc2ade5aa89ec0521282cbd701f60913b7986f0199bcfb06c4d3b1bf98e836e40ac"}}) 11:45:36 executing program 1: capset(&(0x7f0000a31000)={0x19980330}, &(0x7f00009b3000)) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x101000, 0x0) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f0000000080)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, 0xfffffffffffffffe, 0x1, 0x0, 0x0, 0x5}, 0x0) mknod$loop(&(0x7f00000004c0)='./file0\x00', 0x2002, 0x0) 11:45:36 executing program 5: sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000000)="5500000019007f5300fe01b2a4a280930a60ffff00a84302910000003900090008000c00060000f3180015e005000600000000dc1320d5440700000000", 0x3d}], 0x1}, 0x0) r0 = socket(0x1000000010, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f00000000c0), 0x492492492492191, 0x0) r1 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r1) ioctl$SIOCX25SCALLUSERDATA(r0, 0x89e5, &(0x7f0000001540)={0x39, "8cd0f77f4350444ca88c6f060599aa0a0b28c2f618fc91b593be0f7c2c5092d2f2350adaf0a6216c004f8f28edafbe0fe5be5f0a9934f5a6ab3033b626c8b51670f9570d915de14cc0765c0dc98ce5868980444603b2772efa227f214b9340bf7b5a3867e21456b6a615d81f223c6930a62c33975b83877679b0f2189cf81597"}) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001600)='/proc/sys/net/ipv4/vs/expire_nodest_conn\x00', 0x2, 0x0) r4 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4) wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x38) stat(&(0x7f00000013c0)='./file0\x00', &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x3, 0x7, &(0x7f0000001300)=[{&(0x7f0000000100)="d3eab11c7eb3f368a02026721a", 0xd, 0x7}, {&(0x7f0000000140)="fc1111d4cefb2072fee1108e448c17d3d15d75fdccaa48807c49abfa1531eb87c037cdcda34d0ea44f7f65a48a6e04b6992143a88579368df76078bc3117d3c580e2f8593346a9b5af468859de49280da3572e5add86c8", 0x57, 0x7}, {&(0x7f00000001c0)="690455e7d2b1ab9740ed6659181cbf66af9b23c134a0ca22f7b4fabefb68c76c82bd030ad61d7e6edcd0c36dd9f6aa3c7885afe8", 0x34, 0x8001}, {&(0x7f0000000200)="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", 0x1000, 0x1ff}, {&(0x7f0000002040)="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", 0x1000, 0x2}, {&(0x7f0000001200)="f8c9c7bbc5949695", 0x8, 0x5}, {&(0x7f0000001240)="f3376a25e77f02adf8d46b91599637ef6c132b16f42c6608efb6495231341d12c9a95795a52e21b201a25f6c749132e3a1b5619f80bb9b5c999a86f314090a6ef98a47c5bb3feabcb8dd1c424160d682644e76f1f13d78e540e2725a5860d5ccde460e45af8060ca199974f69bbe1f1308df272435fee8dfb868cbbe47b7a1a3cb94d49613e8bb7c927877e6aa19dabf8388766230420de3d318ee178324ef05e17f3fbae99af797cb3bba24e6480a91afba3d4d4079eddf150ab883", 0xbc, 0x3}], 0x9400, &(0x7f0000001480)={[{@usrjquota='usrjquota'}, {@balloc_test4='block-allocator=test4'}], [{@dont_appraise='dont_appraise'}, {@smackfsfloor={'smackfsfloor'}}, {@euid_gt={'euid>', r5}}, {@smackfsroot={'smackfsroot', 0x3d, 'securitywlan1em1em1@eth1ppp1vmnet0'}}, {@smackfshat={'smackfshat', 0x3d, '$ppp1'}}]}) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) 11:45:36 executing program 3: r0 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) accept$ax25(r0, &(0x7f0000000040)={{}, [@netrom, @default, @null, @null, @netrom, @bcast, @rose, @null]}, &(0x7f00000000c0)=0x48) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000100)={0x0, 0x9, 0x4, {0xb, @sdr={0x0, 0x1}}}) ioctl$VT_OPENQRY(r0, 0x5600, &(0x7f0000000000)) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000440)={0x0, 0x1ff, 0x1, {0xb, @raw_data="b57ec6e2ccfebc2f19650bb2b17372c05fea81c70a61a58b97c5bffa8f3ff22ef5e44f8d5bcd9a7e6ad039656c778e3defde487514c27a53e5ab19e7d988086662bc7d2936c0ce17f57929fe03c491a499d671387a8c4a9d52f2fa0f12b0c8a6fbac0bf52fe8075949b6f554aad4d9906746094746213d701bdbfdddfab15780f0ff892ac680cdf8d58b6eec86af9447e96b23570e54caa7549caa341c121bd9f0d43abff4054dc2ade5aa89ec0521282cbd701f60913b7986f0199bcfb06c4d3b1bf98e836e40ac"}}) ioctl$VIDIOC_S_CTRL(r0, 0xc008561c, &(0x7f0000000200)={0x1580, 0x1}) ioctl$TIOCSSERIAL(r0, 0x541f, &(0x7f00000002c0)={0xa8f, 0x5, 0x9, 0xfffffffffffff4d8, 0x7, 0x0, 0x4, 0x9, 0x3f, 0x5, 0x6, 0x80000001, 0xe83, 0x2, &(0x7f0000000240)=""/118, 0x8, 0x7a, 0x5}) 11:45:36 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) bpf$PROG_LOAD(0x5, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ff06ff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r0 = gettid() tkill(r0, 0x3b) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) 11:45:36 executing program 5: sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000000)="5500000019007f5300fe01b2a4a280930a60ffff00a84302910000003900090008000c00060000f3180015e005000600000000dc1320d5440700000000", 0x3d}], 0x1}, 0x0) r0 = socket(0x1000000010, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f00000000c0), 0x492492492492191, 0x0) r1 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r1) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4200, r2, 0x10, 0x4c) tkill(r2, 0x38) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) 11:45:36 executing program 1: capset(&(0x7f0000a31000)={0x19980330}, &(0x7f00009b3000)) mknod$loop(&(0x7f00000004c0)='./file0\x00', 0x2002, 0x0) removexattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@random={'user.', 'systemselfproc\x00'}) r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r1 = getpid() write$FUSE_LK(r0, &(0x7f00000000c0)={0x28, 0x0, 0x2, {{0x1, 0x3ff, 0x1, r1}}}, 0x28) 11:45:36 executing program 0: r0 = syz_open_dev$swradio(&(0x7f0000000040)='/dev/swradio#\x00', 0x0, 0x2) getsockopt$inet_udp_int(r0, 0x11, 0x1, &(0x7f0000000200), &(0x7f0000000240)=0x4) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000340)={0x6891ab86, 0x19, 0x3, {0xb, @win={{0x9cc, 0x4, 0x8, 0x8}, 0x6, 0x858, &(0x7f0000000100)={{0xffffffff, 0x401, 0x3, 0x9}, &(0x7f00000000c0)={{0x5, 0x0, 0x7fff}, &(0x7f0000000080)={{0x2, 0x6, 0x3, 0xc000000000000}}}}, 0x1, &(0x7f0000000140)="184139a460024959e3770d2a793e1233c9cffc00cab472871fcac6cba4e31d292e700ac2427d905b7e1e8028e43b820faaeacd867d1ae73e0db1badb96f9bb1f05d46160639af065b3d8f099d89739b758f1323cd90732b1ef31354a0012b22c549cc0b55e3528fae644feba0aa3aa5e9eaff6c59d504e5b8ce117ba58af3f38bc8eb5c1dfdc06a20ff998eb462d7669cd1123a298f920440e66e05b1b21c87f4247574affafecb6b3ae24032c7ed1b3e7a6d48c0920eadc2a483277347f"}}}) syz_open_dev$usbmon(&(0x7f0000000280)='/dev/usbmon#\x00', 0xffffffff, 0x20000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) prctl$PR_TASK_PERF_EVENTS_DISABLE(0x1f) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000440)={0x0, 0x1fc, 0x1, {0xb, @raw_data="b57ec6e2ccfebc2f19650bb2b17372c05fea81c70a61a58b97c5bffa8f3ff22ef5e44f8d5bcd9a7e6ad039656c778e3defde487514c27a53e5ab19e7d988086662bc7d2936c0ce17f57929fe03c491a499d671387a8c4a9d52f2fa0f12b0c8a6fbac0bf52fe8075949b6f554aad4d9906746094746213d701bdbfdddfab15780f0ff892ac680cdf8d58b6eec86af9447e96b23570e54caa7549caa341c121bd9f0d43abff4054dc2ade5aa89ec0521282cbd701f60913b7986f0199bcfb06c4d3b1bf98e836e40ac"}}) [ 519.290706] ------------[ cut here ]------------ [ 519.295788] WARNING: CPU: 1 PID: 15514 at drivers/dma-buf/dma-buf.c:1039 dma_buf_vunmap+0x18d/0x200 [ 519.304980] Kernel panic - not syncing: panic_on_warn set ... [ 519.304980] [ 519.312338] CPU: 1 PID: 15514 Comm: syz-executor.3 Not tainted 4.14.139 #35 [ 519.319426] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 519.328773] Call Trace: [ 519.331372] dump_stack+0x138/0x19c [ 519.335001] panic+0x1f2/0x426 [ 519.338192] ? add_taint.cold+0x16/0x16 [ 519.339277] kobject: 'loop0' (ffff8880a4992de0): kobject_uevent_env [ 519.342162] ? dma_buf_vunmap+0x18d/0x200 [ 519.342180] ? dma_buf_vunmap+0x18d/0x200 [ 519.342188] __warn.cold+0x2f/0x36 [ 519.342198] ? ist_end_non_atomic+0x10/0x10 [ 519.342205] ? dma_buf_vunmap+0x18d/0x200 [ 519.342213] report_bug+0x216/0x254 [ 519.342223] do_error_trap+0x1bb/0x310 [ 519.342231] ? math_error+0x360/0x360 [ 519.342242] ? __lock_is_held+0xb6/0x140 [ 519.342255] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 519.348768] kobject: 'loop0' (ffff8880a4992de0): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 519.352777] do_invalid_op+0x1b/0x20 [ 519.352786] invalid_op+0x1b/0x40 [ 519.352794] RIP: 0010:dma_buf_vunmap+0x18d/0x200 [ 519.352799] RSP: 0018:ffff88805d7afbb8 EFLAGS: 00010297 [ 519.352807] RAX: ffff888088b6c640 RBX: 0000000000000000 RCX: 1ffff11013b1ed2a [ 519.352812] RDX: 0000000000000000 RSI: ffffc90013016000 RDI: 0000000000000000 [ 519.352817] RBP: ffff88805d7afbe0 R08: dffffc0000000000 R09: ffffffff88ca3928 [ 519.352821] R10: ffff88805d7afcd0 R11: ffff888088b6c640 R12: ffffc90013016000 [ 519.352825] R13: ffffc90013016000 R14: ffff8880a0ef9ae8 R15: ffff88808ae25d00 [ 519.352848] ? dma_buf_vunmap+0x18d/0x200 [ 519.352860] vb2_vmalloc_detach_dmabuf+0x5e/0x90 [ 519.460757] ? vb2_vmalloc_map_dmabuf+0x90/0x90 [ 519.465443] __vb2_plane_dmabuf_put.isra.0+0x10d/0x2f0 [ 519.470699] __vb2_queue_free+0x60a/0x7d0 [ 519.474845] vb2_core_queue_release+0x64/0x80 [ 519.479321] _vb2_fop_release+0x1cf/0x2a0 [ 519.483461] vb2_fop_release+0x75/0xc0 [ 519.487325] vivid_fop_release+0x180/0x3f0 [ 519.491538] ? vivid_remove+0x3d0/0x3d0 [ 519.495487] ? dev_debug_store+0xe0/0xe0 [ 519.499532] v4l2_release+0xf9/0x190 [ 519.503232] __fput+0x275/0x7a0 [ 519.506491] ____fput+0x16/0x20 [ 519.509746] task_work_run+0x114/0x190 [ 519.513616] exit_to_usermode_loop+0x1da/0x220 [ 519.518175] do_syscall_64+0x4bc/0x640 [ 519.522036] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 519.526858] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 519.532027] RIP: 0033:0x413511 [ 519.535192] RSP: 002b:00007ffedff0ebf0 EFLAGS: 00000293 ORIG_RAX: 0000000000000003 [ 519.542873] RAX: 0000000000000000 RBX: 0000000000000004 RCX: 0000000000413511 [ 519.550119] RDX: 0000001b2ce20000 RSI: 0000000000000000 RDI: 0000000000000003 [ 519.557369] RBP: 0000000000000001 R08: 0000000010745ce5 R09: 0000000010745ce9 [ 519.564615] R10: 00007ffedff0ecd0 R11: 0000000000000293 R12: 000000000075bf20 [ 519.571865] R13: 000000000007ec75 R14: 0000000000760f68 R15: ffffffffffffffff [ 519.580301] Kernel Offset: disabled [ 519.584017] Rebooting in 86400 seconds..