e0\x00') mkdir(&(0x7f00000002c0)='./bus\x00', 0x101) syz_mount_image$udf(&(0x7f0000000c00), &(0x7f0000000c40)='./file0\x00', 0x0, &(0x7f0000007300)=ANY=[@ANYBLOB="0069d78db0773cd2d196c9ab9603a40145b3ff6f4a3ae5460c18c4775836f019c0460ed6504defd26ac31f470efa90ccbb3a5a9e26f855a969642751e6daaba6095402fb3542691ed4e5abdb8affa0d15b5c1c000000094a39a6e8b7311c151f4effdaf4664dc9a4bd1f977038a4d6da3200000000000000003010a17500"/139], 0x1, 0xbee, &(0x7f0000000cc0)="$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") openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r2, &(0x7f0000000200), 0x23000) 20:05:48 executing program 2: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$incfs(0xffffffffffffffff, &(0x7f0000000300)='.pending_reads\x00', 0x20000, 0x0) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, 0x0, 0x0, 0x10040, &(0x7f0000000780)={{0x3, @null, 0x2}, [@default, @null, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @default]}, 0x48) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='lowerdir=.:file0']) r0 = socket$netlink(0x10, 0x3, 0x0) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) lsetxattr$system_posix_acl(&(0x7f00000003c0)='./bus\x00', &(0x7f0000000540)='system.posix_acl_access\x00', &(0x7f00000008c0)={{}, {}, [{}], {}, [], {0x10, 0x4}}, 0x2c, 0x0) lchown(&(0x7f0000000340)='./bus\x00', r1, 0x0) creat(&(0x7f0000000180)='./bus/file0\x00', 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000280)='./bus/file0\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080), 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="75707065726469723d2e2f6275732c776f726b6469723d2e2f66696c65312c6c6f7765726469723d2e2f66696c65300018"]) chdir(&(0x7f00000001c0)='./bus\x00') sendmsg$netlink(0xffffffffffffffff, &(0x7f0000008d00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000008c00)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}, 0x0) rename(&(0x7f0000000100)='./bus/file0\x00', &(0x7f0000000440)='./file0\x00') mkdir(&(0x7f00000002c0)='./bus\x00', 0x101) syz_mount_image$udf(&(0x7f0000000c00), &(0x7f0000000c40)='./file0\x00', 0x0, &(0x7f0000007300)=ANY=[@ANYBLOB="0069d78db0773cd2d196c9ab9603a40145b3ff6f4a3ae5460c18c4775836f019c0460ed6504defd26ac31f470efa90ccbb3a5a9e26f855a969642751e6daaba6095402fb3542691ed4e5abdb8affa0d15b5c1c000000094a39a6e8b7311c151f4effdaf4664dc9a4bd1f977038a4d6da3200000000000000003010a17500"/139], 0x1, 0xbee, &(0x7f0000000cc0)="$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") openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r2, &(0x7f0000000200), 0x23000) [ 322.119457] overlayfs: fs on 'file0' does not support file handles, falling back to index=off. [ 322.152242] overlayfs: fs on 'file0' does not support file handles, falling back to index=off. 20:05:48 executing program 5: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$incfs(0xffffffffffffffff, &(0x7f0000000300)='.pending_reads\x00', 0x20000, 0x0) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, 0x0, 0x0, 0x10040, &(0x7f0000000780)={{0x3, @null, 0x2}, [@default, @null, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @default]}, 0x48) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='lowerdir=.:file0']) r0 = socket$netlink(0x10, 0x3, 0x0) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) lsetxattr$system_posix_acl(&(0x7f00000003c0)='./bus\x00', &(0x7f0000000540)='system.posix_acl_access\x00', &(0x7f00000008c0)={{}, {}, [{}], {}, [], {0x10, 0x4}}, 0x2c, 0x0) lchown(&(0x7f0000000340)='./bus\x00', r1, 0x0) creat(&(0x7f0000000180)='./bus/file0\x00', 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000280)='./bus/file0\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080), 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="75707065726469723d2e2f6275732c776f726b6469723d2e2f66696c65312c6c6f7765726469723d2e2f66696c65300018"]) chdir(&(0x7f00000001c0)='./bus\x00') sendmsg$netlink(0xffffffffffffffff, &(0x7f0000008d00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000008c00)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}, 0x0) rename(&(0x7f0000000100)='./bus/file0\x00', &(0x7f0000000440)='./file0\x00') mkdir(&(0x7f00000002c0)='./bus\x00', 0x101) syz_mount_image$udf(&(0x7f0000000c00), &(0x7f0000000c40)='./file0\x00', 0x0, &(0x7f0000007300)=ANY=[@ANYBLOB="0069d78db0773cd2d196c9ab9603a40145b3ff6f4a3ae5460c18c4775836f019c0460ed6504defd26ac31f470efa90ccbb3a5a9e26f855a969642751e6daaba6095402fb3542691ed4e5abdb8affa0d15b5c1c000000094a39a6e8b7311c151f4effdaf4664dc9a4bd1f977038a4d6da3200000000000000003010a17500"/139], 0x1, 0xbee, &(0x7f0000000cc0)="$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") openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r2, &(0x7f0000000200), 0x23000) [ 322.192548] overlayfs: fs on './file0' does not support file handles, falling back to index=off. [ 322.212861] overlayfs: fs on './file0' does not support file handles, falling back to index=off. [ 322.347410] overlayfs: fs on 'file0' does not support file handles, falling back to index=off. [ 322.435215] overlayfs: fs on './file0' does not support file handles, falling back to index=off. 20:05:49 executing program 2: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$incfs(0xffffffffffffffff, &(0x7f0000000300)='.pending_reads\x00', 0x20000, 0x0) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, 0x0, 0x0, 0x10040, &(0x7f0000000780)={{0x3, @null, 0x2}, [@default, @null, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @default]}, 0x48) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='lowerdir=.:file0']) r0 = socket$netlink(0x10, 0x3, 0x0) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) lsetxattr$system_posix_acl(&(0x7f00000003c0)='./bus\x00', &(0x7f0000000540)='system.posix_acl_access\x00', &(0x7f00000008c0)={{}, {}, [{}], {}, [], {0x10, 0x4}}, 0x2c, 0x0) lchown(&(0x7f0000000340)='./bus\x00', r1, 0x0) creat(&(0x7f0000000180)='./bus/file0\x00', 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000280)='./bus/file0\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080), 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="75707065726469723d2e2f6275732c776f726b6469723d2e2f66696c65312c6c6f7765726469723d2e2f66696c65300018"]) chdir(&(0x7f00000001c0)='./bus\x00') sendmsg$netlink(0xffffffffffffffff, &(0x7f0000008d00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000008c00)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}, 0x0) rename(&(0x7f0000000100)='./bus/file0\x00', &(0x7f0000000440)='./file0\x00') mkdir(&(0x7f00000002c0)='./bus\x00', 0x101) syz_mount_image$udf(&(0x7f0000000c00), &(0x7f0000000c40)='./file0\x00', 0x0, &(0x7f0000007300)=ANY=[@ANYBLOB="0069d78db0773cd2d196c9ab9603a40145b3ff6f4a3ae5460c18c4775836f019c0460ed6504defd26ac31f470efa90ccbb3a5a9e26f855a969642751e6daaba6095402fb3542691ed4e5abdb8affa0d15b5c1c000000094a39a6e8b7311c151f4effdaf4664dc9a4bd1f977038a4d6da3200000000000000003010a17500"/139], 0x1, 0xbee, &(0x7f0000000cc0)="$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") openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r2, &(0x7f0000000200), 0x23000) 20:05:49 executing program 0: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$incfs(0xffffffffffffffff, &(0x7f0000000300)='.pending_reads\x00', 0x20000, 0x0) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, 0x0, 0x0, 0x10040, &(0x7f0000000780)={{0x3, @null, 0x2}, [@default, @null, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @default]}, 0x48) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='lowerdir=.:file0']) r0 = socket$netlink(0x10, 0x3, 0x0) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) lsetxattr$system_posix_acl(&(0x7f00000003c0)='./bus\x00', &(0x7f0000000540)='system.posix_acl_access\x00', &(0x7f00000008c0)={{}, {}, [{}], {}, [], {0x10, 0x4}}, 0x2c, 0x0) lchown(&(0x7f0000000340)='./bus\x00', r1, 0x0) creat(&(0x7f0000000180)='./bus/file0\x00', 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000280)='./bus/file0\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080), 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="75707065726469723d2e2f6275732c776f726b6469723d2e2f66696c65312c6c6f7765726469723d2e2f66696c65300018"]) chdir(&(0x7f00000001c0)='./bus\x00') sendmsg$netlink(0xffffffffffffffff, &(0x7f0000008d00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000008c00)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}, 0x0) rename(&(0x7f0000000100)='./bus/file0\x00', &(0x7f0000000440)='./file0\x00') mkdir(&(0x7f00000002c0)='./bus\x00', 0x101) syz_mount_image$udf(&(0x7f0000000c00), &(0x7f0000000c40)='./file0\x00', 0x0, &(0x7f0000007300)=ANY=[@ANYBLOB="0069d78db0773cd2d196c9ab9603a40145b3ff6f4a3ae5460c18c4775836f019c0460ed6504defd26ac31f470efa90ccbb3a5a9e26f855a969642751e6daaba6095402fb3542691ed4e5abdb8affa0d15b5c1c000000094a39a6e8b7311c151f4effdaf4664dc9a4bd1f977038a4d6da3200000000000000003010a17500"/139], 0x1, 0xbee, &(0x7f0000000cc0)="$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") openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r2, &(0x7f0000000200), 0x23000) 20:05:49 executing program 5: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$incfs(0xffffffffffffffff, &(0x7f0000000300)='.pending_reads\x00', 0x20000, 0x0) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, 0x0, 0x0, 0x10040, &(0x7f0000000780)={{0x3, @null, 0x2}, [@default, @null, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @default]}, 0x48) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='lowerdir=.:file0']) r0 = socket$netlink(0x10, 0x3, 0x0) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) lsetxattr$system_posix_acl(&(0x7f00000003c0)='./bus\x00', &(0x7f0000000540)='system.posix_acl_access\x00', &(0x7f00000008c0)={{}, {}, [{}], {}, [], {0x10, 0x4}}, 0x2c, 0x0) lchown(&(0x7f0000000340)='./bus\x00', r1, 0x0) creat(&(0x7f0000000180)='./bus/file0\x00', 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000280)='./bus/file0\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080), 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="75707065726469723d2e2f6275732c776f726b6469723d2e2f66696c65312c6c6f7765726469723d2e2f66696c65300018"]) chdir(&(0x7f00000001c0)='./bus\x00') sendmsg$netlink(0xffffffffffffffff, &(0x7f0000008d00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000008c00)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}, 0x0) rename(&(0x7f0000000100)='./bus/file0\x00', &(0x7f0000000440)='./file0\x00') mkdir(&(0x7f00000002c0)='./bus\x00', 0x101) syz_mount_image$udf(&(0x7f0000000c00), &(0x7f0000000c40)='./file0\x00', 0x0, &(0x7f0000007300)=ANY=[@ANYBLOB="0069d78db0773cd2d196c9ab9603a40145b3ff6f4a3ae5460c18c4775836f019c0460ed6504defd26ac31f470efa90ccbb3a5a9e26f855a969642751e6daaba6095402fb3542691ed4e5abdb8affa0d15b5c1c000000094a39a6e8b7311c151f4effdaf4664dc9a4bd1f977038a4d6da3200000000000000003010a17500"/139], 0x1, 0xbee, &(0x7f0000000cc0)="$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") openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r2, &(0x7f0000000200), 0x23000) [ 322.627437] overlayfs: fs on 'file0' does not support file handles, falling back to index=off. [ 322.627442] overlayfs: fs on 'file0' does not support file handles, falling back to index=off. [ 322.672004] overlayfs: fs on './file0' does not support file handles, falling back to index=off. [ 322.683660] overlayfs: fs on './file0' does not support file handles, falling back to index=off. [ 322.845012] overlayfs: fs on 'file0' does not support file handles, falling back to index=off. [ 322.924139] overlayfs: fs on './file0' does not support file handles, falling back to index=off. 20:05:49 executing program 2: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$incfs(0xffffffffffffffff, &(0x7f0000000300)='.pending_reads\x00', 0x20000, 0x0) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, 0x0, 0x0, 0x10040, &(0x7f0000000780)={{0x3, @null, 0x2}, [@default, @null, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @default]}, 0x48) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='lowerdir=.:file0']) r0 = socket$netlink(0x10, 0x3, 0x0) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) lsetxattr$system_posix_acl(&(0x7f00000003c0)='./bus\x00', &(0x7f0000000540)='system.posix_acl_access\x00', &(0x7f00000008c0)={{}, {}, [{}], {}, [], {0x10, 0x4}}, 0x2c, 0x0) lchown(&(0x7f0000000340)='./bus\x00', r1, 0x0) creat(&(0x7f0000000180)='./bus/file0\x00', 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000280)='./bus/file0\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080), 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="75707065726469723d2e2f6275732c776f726b6469723d2e2f66696c65312c6c6f7765726469723d2e2f66696c65300018"]) chdir(&(0x7f00000001c0)='./bus\x00') sendmsg$netlink(0xffffffffffffffff, &(0x7f0000008d00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000008c00)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}, 0x0) rename(&(0x7f0000000100)='./bus/file0\x00', &(0x7f0000000440)='./file0\x00') mkdir(&(0x7f00000002c0)='./bus\x00', 0x101) syz_mount_image$udf(&(0x7f0000000c00), &(0x7f0000000c40)='./file0\x00', 0x0, &(0x7f0000007300)=ANY=[@ANYBLOB="0069d78db0773cd2d196c9ab9603a40145b3ff6f4a3ae5460c18c4775836f019c0460ed6504defd26ac31f470efa90ccbb3a5a9e26f855a969642751e6daaba6095402fb3542691ed4e5abdb8affa0d15b5c1c000000094a39a6e8b7311c151f4effdaf4664dc9a4bd1f977038a4d6da3200000000000000003010a17500"/139], 0x1, 0xbee, &(0x7f0000000cc0)="$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") openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r2, &(0x7f0000000200), 0x23000) 20:05:49 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000001c0)) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, 0x0) r1 = syz_open_dev$dri(&(0x7f0000000040), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_SETCRTC(0xffffffffffffffff, 0xc06864a2, 0x0) ioctl$DRM_IOCTL_MODE_OBJ_SETPROPERTY(r1, 0xc01864ba, 0x0) ftruncate(0xffffffffffffffff, 0x800) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000000)={'wlan0\x00', 0x0}) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_CONTROL_PORT_FRAME(r4, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000100)={0x4c, r5, 0x5, 0x0, 0x0, {{}, {@val={0x8, 0x3, r3}, @void}}, [@NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_FRAME={0x1c}, @NL80211_ATTR_CONTROL_PORT_ETHERTYPE={0x6, 0x66, 0x888e}]}, 0x4c}}, 0x0) 20:05:49 executing program 0: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$incfs(0xffffffffffffffff, &(0x7f0000000300)='.pending_reads\x00', 0x20000, 0x0) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, 0x0, 0x0, 0x10040, &(0x7f0000000780)={{0x3, @null, 0x2}, [@default, @null, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @default]}, 0x48) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='lowerdir=.:file0']) r0 = socket$netlink(0x10, 0x3, 0x0) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) lsetxattr$system_posix_acl(&(0x7f00000003c0)='./bus\x00', &(0x7f0000000540)='system.posix_acl_access\x00', &(0x7f00000008c0)={{}, {}, [{}], {}, [], {0x10, 0x4}}, 0x2c, 0x0) lchown(&(0x7f0000000340)='./bus\x00', r1, 0x0) creat(&(0x7f0000000180)='./bus/file0\x00', 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000280)='./bus/file0\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080), 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="75707065726469723d2e2f6275732c776f726b6469723d2e2f66696c65312c6c6f7765726469723d2e2f66696c65300018"]) chdir(&(0x7f00000001c0)='./bus\x00') sendmsg$netlink(0xffffffffffffffff, &(0x7f0000008d00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000008c00)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}, 0x0) rename(&(0x7f0000000100)='./bus/file0\x00', &(0x7f0000000440)='./file0\x00') mkdir(&(0x7f00000002c0)='./bus\x00', 0x101) syz_mount_image$udf(&(0x7f0000000c00), &(0x7f0000000c40)='./file0\x00', 0x0, &(0x7f0000007300)=ANY=[@ANYBLOB="0069d78db0773cd2d196c9ab9603a40145b3ff6f4a3ae5460c18c4775836f019c0460ed6504defd26ac31f470efa90ccbb3a5a9e26f855a969642751e6daaba6095402fb3542691ed4e5abdb8affa0d15b5c1c000000094a39a6e8b7311c151f4effdaf4664dc9a4bd1f977038a4d6da3200000000000000003010a17500"/139], 0x1, 0xbee, &(0x7f0000000cc0)="$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") openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r2, &(0x7f0000000200), 0x23000) 20:05:49 executing program 3: syz_mount_image$ext4(&(0x7f00000004c0)='ext4\x00', &(0x7f0000000500)='./file0\x00', 0x200810, &(0x7f0000000040)={[{@noquota}, {@barrier}, {@nouid32}, {@grpquota}]}, 0x1, 0x4a6, &(0x7f0000000580)="$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") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuset.effective_cpus\x00', 0x275a, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000080)) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuset.effective_cpus\x00', 0x275a, 0x0) pwritev2(r1, &(0x7f0000000500)=[{&(0x7f0000000000)='d', 0xd00600}, {0x0}, {&(0x7f0000000140)="d9", 0x1}], 0x2, 0x0, 0x0, 0x0) ioctl$EXT4_IOC_MIGRATE(r1, 0x6609) 20:05:49 executing program 5: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$incfs(0xffffffffffffffff, &(0x7f0000000300)='.pending_reads\x00', 0x20000, 0x0) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, 0x0, 0x0, 0x10040, &(0x7f0000000780)={{0x3, @null, 0x2}, [@default, @null, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @default]}, 0x48) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='lowerdir=.:file0']) r0 = socket$netlink(0x10, 0x3, 0x0) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) lsetxattr$system_posix_acl(&(0x7f00000003c0)='./bus\x00', &(0x7f0000000540)='system.posix_acl_access\x00', &(0x7f00000008c0)={{}, {}, [{}], {}, [], {0x10, 0x4}}, 0x2c, 0x0) lchown(&(0x7f0000000340)='./bus\x00', r1, 0x0) creat(&(0x7f0000000180)='./bus/file0\x00', 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000280)='./bus/file0\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080), 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="75707065726469723d2e2f6275732c776f726b6469723d2e2f66696c65312c6c6f7765726469723d2e2f66696c65300018"]) chdir(&(0x7f00000001c0)='./bus\x00') sendmsg$netlink(0xffffffffffffffff, &(0x7f0000008d00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000008c00)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}, 0x0) rename(&(0x7f0000000100)='./bus/file0\x00', &(0x7f0000000440)='./file0\x00') mkdir(&(0x7f00000002c0)='./bus\x00', 0x101) syz_mount_image$udf(&(0x7f0000000c00), &(0x7f0000000c40)='./file0\x00', 0x0, &(0x7f0000007300)=ANY=[@ANYBLOB="0069d78db0773cd2d196c9ab9603a40145b3ff6f4a3ae5460c18c4775836f019c0460ed6504defd26ac31f470efa90ccbb3a5a9e26f855a969642751e6daaba6095402fb3542691ed4e5abdb8affa0d15b5c1c000000094a39a6e8b7311c151f4effdaf4664dc9a4bd1f977038a4d6da3200000000000000003010a17500"/139], 0x1, 0xbee, &(0x7f0000000cc0)="$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") openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r2, &(0x7f0000000200), 0x23000) [ 323.107722] overlayfs: fs on 'file0' does not support file handles, falling back to index=off. [ 323.136657] overlayfs: fs on 'file0' does not support file handles, falling back to index=off. [ 323.165344] overlayfs: fs on './file0' does not support file handles, falling back to index=off. [ 323.201278] overlayfs: fs on './file0' does not support file handles, falling back to index=off. [ 323.288043] overlayfs: fs on 'file0' does not support file handles, falling back to index=off. [ 323.374698] overlayfs: fs on './file0' does not support file handles, falling back to index=off. 20:05:50 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000001c0)) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, 0x0) r1 = syz_open_dev$dri(&(0x7f0000000040), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_SETCRTC(0xffffffffffffffff, 0xc06864a2, 0x0) ioctl$DRM_IOCTL_MODE_OBJ_SETPROPERTY(r1, 0xc01864ba, 0x0) ftruncate(0xffffffffffffffff, 0x800) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000000)={'wlan0\x00', 0x0}) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_CONTROL_PORT_FRAME(r4, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000100)={0x4c, r5, 0x5, 0x0, 0x0, {{}, {@val={0x8, 0x3, r3}, @void}}, [@NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_FRAME={0x1c}, @NL80211_ATTR_CONTROL_PORT_ETHERTYPE={0x6, 0x66, 0x888e}]}, 0x4c}}, 0x0) 20:05:50 executing program 2: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$incfs(0xffffffffffffffff, &(0x7f0000000300)='.pending_reads\x00', 0x20000, 0x0) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, 0x0, 0x0, 0x10040, &(0x7f0000000780)={{0x3, @null, 0x2}, [@default, @null, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @default]}, 0x48) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='lowerdir=.:file0']) r0 = socket$netlink(0x10, 0x3, 0x0) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) lsetxattr$system_posix_acl(&(0x7f00000003c0)='./bus\x00', &(0x7f0000000540)='system.posix_acl_access\x00', &(0x7f00000008c0)={{}, {}, [{}], {}, [], {0x10, 0x4}}, 0x2c, 0x0) lchown(&(0x7f0000000340)='./bus\x00', r1, 0x0) creat(&(0x7f0000000180)='./bus/file0\x00', 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000280)='./bus/file0\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080), 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="75707065726469723d2e2f6275732c776f726b6469723d2e2f66696c65312c6c6f7765726469723d2e2f66696c65300018"]) chdir(&(0x7f00000001c0)='./bus\x00') sendmsg$netlink(0xffffffffffffffff, &(0x7f0000008d00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000008c00)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}, 0x0) rename(&(0x7f0000000100)='./bus/file0\x00', &(0x7f0000000440)='./file0\x00') mkdir(&(0x7f00000002c0)='./bus\x00', 0x101) syz_mount_image$udf(&(0x7f0000000c00), &(0x7f0000000c40)='./file0\x00', 0x0, &(0x7f0000007300)=ANY=[@ANYBLOB="0069d78db0773cd2d196c9ab9603a40145b3ff6f4a3ae5460c18c4775836f019c0460ed6504defd26ac31f470efa90ccbb3a5a9e26f855a969642751e6daaba6095402fb3542691ed4e5abdb8affa0d15b5c1c000000094a39a6e8b7311c151f4effdaf4664dc9a4bd1f977038a4d6da3200000000000000003010a17500"/139], 0x1, 0xbee, &(0x7f0000000cc0)="$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") openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r2, &(0x7f0000000200), 0x23000) 20:05:50 executing program 0: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/profiling', 0x2205, 0x0) write$char_usb(r0, 0x0, 0x0) 20:05:50 executing program 0: r0 = syz_genetlink_get_family_id$devlink(&(0x7f0000000200), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x54, r0, 0x1, 0x0, 0x0, {}, [{{@nsim={{0xe}, {0xfffffffffffffca8, 0x2, {'netdevsim', 0x0}}}, {0x8}}, {0x8}, {0x6}, {0x5}}]}, 0x54}}, 0x0) 20:05:50 executing program 5: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$incfs(0xffffffffffffffff, &(0x7f0000000300)='.pending_reads\x00', 0x20000, 0x0) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, 0x0, 0x0, 0x10040, &(0x7f0000000780)={{0x3, @null, 0x2}, [@default, @null, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @default]}, 0x48) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='lowerdir=.:file0']) r0 = socket$netlink(0x10, 0x3, 0x0) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) lsetxattr$system_posix_acl(&(0x7f00000003c0)='./bus\x00', &(0x7f0000000540)='system.posix_acl_access\x00', &(0x7f00000008c0)={{}, {}, [{}], {}, [], {0x10, 0x4}}, 0x2c, 0x0) lchown(&(0x7f0000000340)='./bus\x00', r1, 0x0) creat(&(0x7f0000000180)='./bus/file0\x00', 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000280)='./bus/file0\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080), 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="75707065726469723d2e2f6275732c776f726b6469723d2e2f66696c65312c6c6f7765726469723d2e2f66696c65300018"]) chdir(&(0x7f00000001c0)='./bus\x00') sendmsg$netlink(0xffffffffffffffff, &(0x7f0000008d00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000008c00)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}, 0x0) rename(&(0x7f0000000100)='./bus/file0\x00', &(0x7f0000000440)='./file0\x00') mkdir(&(0x7f00000002c0)='./bus\x00', 0x101) syz_mount_image$udf(&(0x7f0000000c00), &(0x7f0000000c40)='./file0\x00', 0x0, &(0x7f0000007300)=ANY=[@ANYBLOB="0069d78db0773cd2d196c9ab9603a40145b3ff6f4a3ae5460c18c4775836f019c0460ed6504defd26ac31f470efa90ccbb3a5a9e26f855a969642751e6daaba6095402fb3542691ed4e5abdb8affa0d15b5c1c000000094a39a6e8b7311c151f4effdaf4664dc9a4bd1f977038a4d6da3200000000000000003010a17500"/139], 0x1, 0xbee, &(0x7f0000000cc0)="$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") openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r2, &(0x7f0000000200), 0x23000) [ 323.656794] overlayfs: fs on 'file0' does not support file handles, falling back to index=off. [ 323.699779] overlayfs: fs on './file0' does not support file handles, falling back to index=off. [ 323.709446] netlink: 48 bytes leftover after parsing attributes in process `syz-executor.0'. 20:05:50 executing program 0: r0 = syz_genetlink_get_family_id$devlink(&(0x7f0000000200), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x54, r0, 0x1, 0x0, 0x0, {}, [{{@nsim={{0xe}, {0xfffffffffffffca8, 0x2, {'netdevsim', 0x0}}}, {0x8}}, {0x8}, {0x6}, {0x5}}]}, 0x54}}, 0x0) 20:05:50 executing program 0: r0 = syz_genetlink_get_family_id$devlink(&(0x7f0000000200), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x54, r0, 0x1, 0x0, 0x0, {}, [{{@nsim={{0xe}, {0xfffffffffffffca8, 0x2, {'netdevsim', 0x0}}}, {0x8}}, {0x8}, {0x6}, {0x5}}]}, 0x54}}, 0x0) [ 323.793765] netlink: 48 bytes leftover after parsing attributes in process `syz-executor.0'. [ 323.815790] overlayfs: fs on 'file0' does not support file handles, falling back to index=off. [ 323.869025] overlayfs: fs on './file0' does not support file handles, falling back to index=off. [ 323.923786] netlink: 48 bytes leftover after parsing attributes in process `syz-executor.0'. 20:05:50 executing program 2: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$incfs(0xffffffffffffffff, &(0x7f0000000300)='.pending_reads\x00', 0x20000, 0x0) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, 0x0, 0x0, 0x10040, &(0x7f0000000780)={{0x3, @null, 0x2}, [@default, @null, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @default]}, 0x48) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='lowerdir=.:file0']) r0 = socket$netlink(0x10, 0x3, 0x0) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) lsetxattr$system_posix_acl(&(0x7f00000003c0)='./bus\x00', &(0x7f0000000540)='system.posix_acl_access\x00', &(0x7f00000008c0)={{}, {}, [{}], {}, [], {0x10, 0x4}}, 0x2c, 0x0) lchown(&(0x7f0000000340)='./bus\x00', r1, 0x0) creat(&(0x7f0000000180)='./bus/file0\x00', 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000280)='./bus/file0\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080), 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="75707065726469723d2e2f6275732c776f726b6469723d2e2f66696c65312c6c6f7765726469723d2e2f66696c65300018"]) chdir(&(0x7f00000001c0)='./bus\x00') sendmsg$netlink(0xffffffffffffffff, &(0x7f0000008d00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000008c00)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}, 0x0) rename(&(0x7f0000000100)='./bus/file0\x00', &(0x7f0000000440)='./file0\x00') mkdir(&(0x7f00000002c0)='./bus\x00', 0x101) syz_mount_image$udf(&(0x7f0000000c00), &(0x7f0000000c40)='./file0\x00', 0x0, &(0x7f0000007300)=ANY=[@ANYBLOB="0069d78db0773cd2d196c9ab9603a40145b3ff6f4a3ae5460c18c4775836f019c0460ed6504defd26ac31f470efa90ccbb3a5a9e26f855a969642751e6daaba6095402fb3542691ed4e5abdb8affa0d15b5c1c000000094a39a6e8b7311c151f4effdaf4664dc9a4bd1f977038a4d6da3200000000000000003010a17500"/139], 0x1, 0xbee, &(0x7f0000000cc0)="$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") openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r2, &(0x7f0000000200), 0x23000) 20:05:50 executing program 5: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$incfs(0xffffffffffffffff, &(0x7f0000000300)='.pending_reads\x00', 0x20000, 0x0) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, 0x0, 0x0, 0x10040, &(0x7f0000000780)={{0x3, @null, 0x2}, [@default, @null, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @default]}, 0x48) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='lowerdir=.:file0']) r0 = socket$netlink(0x10, 0x3, 0x0) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) lsetxattr$system_posix_acl(&(0x7f00000003c0)='./bus\x00', &(0x7f0000000540)='system.posix_acl_access\x00', &(0x7f00000008c0)={{}, {}, [{}], {}, [], {0x10, 0x4}}, 0x2c, 0x0) lchown(&(0x7f0000000340)='./bus\x00', r1, 0x0) creat(&(0x7f0000000180)='./bus/file0\x00', 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000280)='./bus/file0\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080), 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="75707065726469723d2e2f6275732c776f726b6469723d2e2f66696c65312c6c6f7765726469723d2e2f66696c65300018"]) chdir(&(0x7f00000001c0)='./bus\x00') sendmsg$netlink(0xffffffffffffffff, &(0x7f0000008d00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000008c00)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}, 0x0) rename(&(0x7f0000000100)='./bus/file0\x00', &(0x7f0000000440)='./file0\x00') mkdir(&(0x7f00000002c0)='./bus\x00', 0x101) syz_mount_image$udf(&(0x7f0000000c00), &(0x7f0000000c40)='./file0\x00', 0x0, &(0x7f0000007300)=ANY=[@ANYBLOB="0069d78db0773cd2d196c9ab9603a40145b3ff6f4a3ae5460c18c4775836f019c0460ed6504defd26ac31f470efa90ccbb3a5a9e26f855a969642751e6daaba6095402fb3542691ed4e5abdb8affa0d15b5c1c000000094a39a6e8b7311c151f4effdaf4664dc9a4bd1f977038a4d6da3200000000000000003010a17500"/139], 0x1, 0xbee, &(0x7f0000000cc0)="$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") openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r2, &(0x7f0000000200), 0x23000) 20:05:50 executing program 0: r0 = syz_genetlink_get_family_id$devlink(&(0x7f0000000200), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x54, r0, 0x1, 0x0, 0x0, {}, [{{@nsim={{0xe}, {0xfffffffffffffca8, 0x2, {'netdevsim', 0x0}}}, {0x8}}, {0x8}, {0x6}, {0x5}}]}, 0x54}}, 0x0) 20:05:50 executing program 3: r0 = socket$inet6(0xa, 0x801, 0x8010000400000084) sendmmsg$inet6(r0, &(0x7f0000000300)=[{{&(0x7f0000000140)={0xa, 0x0, 0x0, @private2}, 0x1c, &(0x7f0000000180)=[{&(0x7f0000000240)="9a", 0x1}], 0x1}}], 0x1, 0x0) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000040)={0xffffffff}, 0x60) sendto$inet6(r0, &(0x7f0000000340)="11", 0x1, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @private2={0xfc, 0x2, '\x00', 0x1}}, 0x1c) close(r0) 20:05:50 executing program 4: r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) write$cgroup_int(r0, 0x0, 0x0) 20:05:50 executing program 1: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c47, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x5, 0x8000000}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001080), 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000780)='ext4\x00', &(0x7f0000000240)='./file0\x00', 0x2000480, &(0x7f0000000000)=ANY=[], 0x1, 0x76a, &(0x7f0000000fc0)="$eJzs3d9rW1UcAPDvTdt17aatIOh8KghaGEvtrJuCDxMfRHAw0Ge3kGZlNm1Gk461FNwQwRdBxQdBX/bsj/nmqz9e9b/wQTamdsOJD1K5adJla9KlW5MI+XzgNOfce9Nzvjn3nnuSe0kC6FsT6Z9MxKGI+CiJGKstTyJiqJobjDixud3t9bV8mpLY2Hjzj6S6za31tXw0PCd1oFZ4MiJ+fD/icGZ7veWV1flcsVhYqpWnKgvnp8orq0fOLeTmCnOFxWPTMzNHj79w/NjexfrXL6sHr3/82rPfnPjnvSeufvhTEifiYG1dYxx7ZSImaq/JUPoS3uXVva6sx5JeN4AHkh6aA5tHeRyKsRio5loY6WbLAIBOeTciNgCAPpM4/wNAn6l/DnBrfS1fT739RKK7brwSEfs3469f39xcM1i7Zre/eh109FZy15WRJCLG96D+iYj44ru3v0pTdOg6JEAzly5HxJnxie3jf7LtnoXdeq6NbSbuKRv/oHu+T+c/Lzab/2W25j/RZP4z3OTYfRD3P/4z1/agmpbS+d/LDfe23W6Iv2Z8oFZ6pDrnG0rOnisW0rHt0YiYjKHhtDy9Qx2TN/+92Wpd4/zvz0/e+TKtP328s0Xm2uDw3c+ZzVVyDxNzoxuXI54abBZ/stX/SYv576k263j9pQ8+b7UujT+Nt562x99ZG1cinmna/3fuaEt2vD9xqro7TNV3iia+/fWz0Vb1N/Z/mtL66+8FuiHt/9Gd4x9PGu/XLO++jp+vjP3Qat3942++/+9L3qrm99WWXcxVKkvTEfuSN7YvP3rnufVyffs0/smnmx//O+3/6XvCM23GP3j9968fPP7OSuOf3VX/7z5z9fb8QKv62+v/mWpusraknfGv3QY+zGsHAAAAAAAAAAAAAAAAAAAAAAAAAO3KRMTBSDLZrXwmk81u/ob34zGaKZbKlcNnS8uLs1H9rezxGMrUv+pyrOH7UKdr34dfLx+9p/x8RDwWEZ8Oj1TL2XypONvr4AEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACg5kCL3/9P/Tbc69YBAB2zv9cNAAC6zvkfAPrP7s7/Ix1rBwDQPd7/A0D/cf4HgP7j/A8AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAECHnTp5Mk0bf6+v5dPy7IWV5fnShSOzhfJ8dmE5n82Xls5n50qluWIhmy8ttPxHlzYfiqXS+ZlYXL44VSmUK1PlldXTC6Xlxcrpcwu5ucLpwlDXIgMAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACA9pVXVudzxWJhSUZGRmYr0zhKjPRugAIAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAD4n/svAAD//9EyKso=") open(&(0x7f0000000080)='./bus\x00', 0x6fe44da629969272, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000004400)='./bus\x00', 0x1c1002, 0x0) write$binfmt_misc(r2, &(0x7f0000000500)=ANY=[], 0x5) sendfile(r2, r1, 0x0, 0x1ffff) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x9, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuset.effective_mems\x00', 0x275a, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cgroup.controllers\x00', 0x275a, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r4, 0xc028660f, &(0x7f0000000200)={0x0, r3, 0x1000000000000}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000500)={0x84, 0x2a, 0x7e2881d4b0058261, 0x0, 0x0, {0x1}, [@generic="e4bbac412a17305504ad793ea00a6a8b6af59b93a71efc64f1ba9ffd3d7708256fad7c8c336cf7184b2651994299cad739b99f592c800cf74bc91b2a206bbcf6fb80877577dabf5cd4ec9c33bad91823389f23299d0eeed20059627675267baeec666bd7148a371ce03cab9d2bd75f4e"]}, 0x84}, 0x1, 0x0, 0x0, 0x8}, 0x0) syz_genetlink_get_family_id$devlink(0x0, 0xffffffffffffffff) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r5, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000700)=@newsa={0x138, 0x10, 0x0, 0x0, 0x0, {{@in6=@rand_addr=' \x01\x00', @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}, {@in6=@empty, 0x0, 0x32}, @in=@loopback, {0x0, 0x0, 0xe033, 0x6, 0x0, 0xfffffffffffffffd}}, [@algo_comp={0x48, 0x3, {{'lzs\x00'}}}]}, 0x138}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r4, 0xc018937c, &(0x7f0000000180)={{0x1, 0x1, 0x18, r0}, './bus\x00'}) getsockopt$bt_l2cap_L2CAP_OPTIONS(r6, 0x6, 0x1, &(0x7f0000000280), &(0x7f00000002c0)=0xc) sendmsg$DEVLINK_CMD_SB_POOL_SET(0xffffffffffffffff, 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) syz_open_procfs(0x0, &(0x7f00000001c0)='net/vlan/vlan0\x00') [ 324.101087] overlayfs: fs on 'file0' does not support file handles, falling back to index=off. 20:05:50 executing program 4: r0 = perf_event_open(0x0, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000018c00)={0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000400)=@bpf_ext={0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000380)={0x0, 0x0, 0x10000}, 0x10, 0x0, r1}, 0x80) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0xffffffffffffffff, 0x9, r0, 0x8) bpf$ENABLE_STATS(0x20, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40086602, &(0x7f0000000180)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) write$cgroup_type(r3, &(0x7f0000000080), 0x11ffffce1) perf_event_open(&(0x7f0000001940)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) perf_event_open(&(0x7f0000000400)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x32600) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x660c, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x48800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000080)}, 0x400, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000), 0x248800) [ 324.172509] overlayfs: fs on './file0' does not support file handles, falling back to index=off. [ 324.187821] netlink: 48 bytes leftover after parsing attributes in process `syz-executor.0'. 20:05:50 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffbffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x1, 0x8010000000000084) setsockopt$inet6_IPV6_RTHDR(r2, 0x29, 0x39, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x58) bind$inet6(r2, &(0x7f0000000140)={0xa, 0x4e23, 0x0, @empty}, 0x1c) listen(r2, 0x10001) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, 0x0, &(0x7f00000001c0)) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, &(0x7f0000000100)) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/bus/input/devices\x00', 0x0, 0x0) io_setup(0x5, 0x0) io_submit(0x0, 0x1, &(0x7f00000007c0)=[&(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, r3, 0x0, 0x0, 0x100, 0x0, 0x6}]) r4 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000800), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_GET(r5, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, r6, 0x86a762f4dfb5c7dd}, 0x14}}, 0x0) r7 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000180), 0x4000, 0x0) sendmsg$L2TP_CMD_SESSION_DELETE(r3, &(0x7f0000000340)={&(0x7f0000000040), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x3c, r6, 0x4, 0x70bd25, 0x25dfdbff, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x3}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x1}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp6=r7}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x2}]}, 0x3c}}, 0x4000) connect$inet6(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r4, 0x84, 0x64, &(0x7f0000000200)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) r8 = socket(0x18, 0x2, 0x0) r9 = socket(0x18, 0x2, 0x0) dup2(r9, r8) ioctl$FS_IOC_ENABLE_VERITY(r8, 0x40806685, &(0x7f0000000480)={0x1, 0x3, 0x1000, 0x62, &(0x7f0000000240)="bd0504ca8d136a22ab7413131d9354c565a277d9e4e3108e4d2962715ba8c98f97c80ab0e4d0198db660761a31cbf27c4bbcbedeca0e8d6a9004649274f5d74ae8382b7c1a2c4e7f4f40503699b10ef0ab8281fb70949fbeb95d0d24c46fe6d98fba", 0x5b, 0x0, &(0x7f0000000380)="2c155ea9f06c0166da3eb92d94b69fd8aacec5c7049f6ca2336e160aeb5bc6c57f793320e18afe78559a57f5b043f89f427a8ab5495e3e26b39df95b39725f7f99a2715f94f85ed62e8913799de129a457a50b28fc72578e544eb4"}) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r4, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0xec034000, @loopback}], 0x1c) mmap(&(0x7f00000e4000/0x1000)=nil, 0x1000, 0x0, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) [ 324.270578] overlayfs: fs on 'file0' does not support file handles, falling back to index=off. [ 324.354575] overlayfs: fs on './file0' does not support file handles, falling back to index=off. 20:05:51 executing program 3: r0 = socket$inet6(0xa, 0x801, 0x8010000400000084) sendmmsg$inet6(r0, &(0x7f0000000300)=[{{&(0x7f0000000140)={0xa, 0x0, 0x0, @private2}, 0x1c, &(0x7f0000000180)=[{&(0x7f0000000240)="9a", 0x1}], 0x1}}], 0x1, 0x0) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000040)={0xffffffff}, 0x60) sendto$inet6(r0, &(0x7f0000000340)="11", 0x1, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @private2={0xfc, 0x2, '\x00', 0x1}}, 0x1c) close(r0) 20:05:51 executing program 3: r0 = socket$inet6(0xa, 0x801, 0x8010000400000084) sendmmsg$inet6(r0, &(0x7f0000000300)=[{{&(0x7f0000000140)={0xa, 0x0, 0x0, @private2}, 0x1c, &(0x7f0000000180)=[{&(0x7f0000000240)="9a", 0x1}], 0x1}}], 0x1, 0x0) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000040)={0xffffffff}, 0x60) sendto$inet6(r0, &(0x7f0000000340)="11", 0x1, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @private2={0xfc, 0x2, '\x00', 0x1}}, 0x1c) close(r0) 20:05:51 executing program 2: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$incfs(0xffffffffffffffff, &(0x7f0000000300)='.pending_reads\x00', 0x20000, 0x0) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, 0x0, 0x0, 0x10040, &(0x7f0000000780)={{0x3, @null, 0x2}, [@default, @null, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @default]}, 0x48) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='lowerdir=.:file0']) r0 = socket$netlink(0x10, 0x3, 0x0) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) lsetxattr$system_posix_acl(&(0x7f00000003c0)='./bus\x00', &(0x7f0000000540)='system.posix_acl_access\x00', &(0x7f00000008c0)={{}, {}, [{}], {}, [], {0x10, 0x4}}, 0x2c, 0x0) lchown(&(0x7f0000000340)='./bus\x00', r1, 0x0) creat(&(0x7f0000000180)='./bus/file0\x00', 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000280)='./bus/file0\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080), 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="75707065726469723d2e2f6275732c776f726b6469723d2e2f66696c65312c6c6f7765726469723d2e2f66696c65300018"]) chdir(&(0x7f00000001c0)='./bus\x00') sendmsg$netlink(0xffffffffffffffff, &(0x7f0000008d00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000008c00)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}, 0x0) rename(&(0x7f0000000100)='./bus/file0\x00', &(0x7f0000000440)='./file0\x00') mkdir(&(0x7f00000002c0)='./bus\x00', 0x101) syz_mount_image$udf(&(0x7f0000000c00), &(0x7f0000000c40)='./file0\x00', 0x0, &(0x7f0000007300)=ANY=[@ANYBLOB="0069d78db0773cd2d196c9ab9603a40145b3ff6f4a3ae5460c18c4775836f019c0460ed6504defd26ac31f470efa90ccbb3a5a9e26f855a969642751e6daaba6095402fb3542691ed4e5abdb8affa0d15b5c1c000000094a39a6e8b7311c151f4effdaf4664dc9a4bd1f977038a4d6da3200000000000000003010a17500"/139], 0x1, 0xbee, &(0x7f0000000cc0)="$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") openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r2, &(0x7f0000000200), 0x23000) 20:05:51 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_mreqsrc(r0, 0x0, 0xa, 0x0, &(0x7f0000000280)) 20:05:51 executing program 3: r0 = socket$inet6(0xa, 0x801, 0x8010000400000084) sendmmsg$inet6(r0, &(0x7f0000000300)=[{{&(0x7f0000000140)={0xa, 0x0, 0x0, @private2}, 0x1c, &(0x7f0000000180)=[{&(0x7f0000000240)="9a", 0x1}], 0x1}}], 0x1, 0x0) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000040)={0xffffffff}, 0x60) sendto$inet6(r0, &(0x7f0000000340)="11", 0x1, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @private2={0xfc, 0x2, '\x00', 0x1}}, 0x1c) close(r0) 20:05:51 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_mreqsrc(r0, 0x0, 0xa, 0x0, &(0x7f0000000280)) [ 324.715749] overlayfs: fs on 'file0' does not support file handles, falling back to index=off. [ 324.725123] audit: type=1804 audit(1677355551.298:131): pid=15001 uid=0 auid=4294967295 ses=4294967295 op="invalid_pcr" cause="open_writers" comm="syz-executor.1" name="/root/syzkaller-testdir3295352786/syzkaller.7PI3PL/230/bus" dev="sda1" ino=13882 res=1 20:05:51 executing program 3: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) keyctl$get_persistent(0x16, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x42, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(0xffffffffffffffff, 0x0, 0x0) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(0xffffffffffffffff, 0x80089419, &(0x7f0000002200)) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000280), 0x8100, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), 0x0) mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0) syz_fuse_handle_req(r1, 0x0, 0x0, &(0x7f00000030c0)={0x0, &(0x7f0000000040)={0x18, 0x0, 0x0, {0x5}}, &(0x7f0000000300)={0x18, 0x0, 0x0, {0x4}}, &(0x7f0000000380)={0x18, 0x0, 0x0, {0x1}}, &(0x7f00000024c0)={0x18, 0x0, 0x1f}, &(0x7f0000002580)={0x28, 0x0, 0xff, {{0x4, 0x3, 0x2}}}, 0x0, &(0x7f0000002640)={0x18, 0x0, 0x4, {0x7ff}}, &(0x7f0000002680)=ANY=[@ANYBLOB="1d00000000000073636865645f737769746368000000"], &(0x7f00000026c0)={0x20, 0x0, 0x0, {0x0, 0x1}}, &(0x7f0000002700)={0x78, 0x0, 0x0, {0x800, 0x0, 0x0, {0x0, 0x0, 0xccd8, 0x23, 0x8434, 0xd2a, 0x0, 0x80005, 0x5, 0xc000, 0x6, 0x0, 0xee01, 0x0, 0x6}}}, &(0x7f0000002780)={0x90, 0x0, 0x2, {0x0, 0x3, 0x10001, 0x1f, 0xfffffffe, 0x0, {0x1, 0x3f, 0xffffffffffffff80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x45c1, 0x0, 0x3f, 0xee00, 0x0, 0x5, 0x9}}}, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], &(0x7f0000002bc0)=ANY=[@ANYBLOB="6001000000000000080000000000000000000000000000000100000000000000373900000000000031490000000000003f0000000200000001000000000000f0ffffffff000000000800000000000000080000000000000000000000000000000800000000000000070000000300000098bb000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="01000000ffffff7f00000000060000000000000005000000000000000d00000000004c1b73636865645f7377697463680000000004000000000000000300000000000000010000000000000004000000000000008f000000090000000300000000000000060000000000000000000000000000008100000000000000030000000000000001000000000000000000000009000000fd0000000060000000000000", @ANYRES32=0xee01, @ANYRES32], &(0x7f0000002fc0)={0xa0, 0xfffffffffffffff5, 0x0, {{0x1, 0x1, 0x2, 0x7, 0x6, 0x5, {0x6, 0x81, 0x80000000, 0x935d, 0x5, 0x10001, 0x1, 0x100, 0x2, 0x0, 0x0, 0xee01, 0x0, 0x1}}, {0x0, 0x1}}}, &(0x7f0000003080)={0x20, 0x0, 0x7e41, {0x3145ad07, 0x0, 0x0, 0x7}}}) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB="15000000feffff018000000800395032303030"], 0x15) r4 = syz_open_dev$vcsn(&(0x7f00000001c0), 0x2, 0x0) sendto$ax25(r4, &(0x7f0000000440)="67a9c6157eee7d0843c78bebd8be044f9dd7905e451be2e143888394952dbb86f3048fc552c8dfc3ee4db9f6fad3e48242c4fcbe06746ffc83cb438d1eb52158013306b5a3b692af4de104d10baece3422b2ea6c3dad3057db2288ed4d94182842281899384bb83dd684ae4bde0a98a32ffd6b4247032bbd86fc5a840e29686bc412fef520bfe4d728dc8094a788cc49359dc6409187696194", 0x99, 0x4000, &(0x7f0000000500)={{0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, 0x3}, [@default, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @bcast, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) r5 = dup(r3) write$FUSE_BMAP(r5, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_NOTIFY_RETRIEVE(r5, &(0x7f00000000c0)={0x14c}, 0x137) write$FUSE_INIT(r1, 0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000040), 0x0, &(0x7f0000000300)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r5}, 0x2c, {[{@access_uid}], [], 0x6b}}) mount$fuse(0x0, &(0x7f00000042c0)='./file0\x00', &(0x7f0000002000), 0x0, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x2000}}) add_key$keyring(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f00000020c0), &(0x7f0000002100)={'syz', 0x3}, &(0x7f00000021c0)=ANY=[], 0x48, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x6, 0xffffffffffffffff, 0x0) write$FUSE_BMAP(r4, 0x0, 0x0) keyctl$setperm(0x5, 0x0, 0x1c243911) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000700)=@can_delroute={0x70, 0x19, 0x4, 0x70bd2a, 0x25dfdbfc, {0x1d, 0x1, 0x1}, [@CGW_MOD_UID={0x8}, @CGW_CS_XOR={0x8, 0x5, {0xfffffffffffffffa, 0xfffffffffffffff8, 0x1, 0x40}}, @CGW_FILTER={0xc, 0xb, {{0x4, 0x1, 0x0, 0x1}, {0x4, 0x1, 0x0, 0x1}}}, @CGW_MOD_OR={0x15, 0x2, {{{0x2, 0x0, 0x1}, 0x3, 0x3, 0x0, 0x0, "0ae7836b9d5cd6e2"}, 0x4}}, @CGW_MOD_XOR={0x15, 0x3, {{{0x0, 0x0, 0x1}, 0x2, 0x1, 0x0, 0x0, "3e62eff2ef27f8cd"}, 0x5}}, @CGW_MOD_UID={0x8}, @CGW_DST_IF={0x8}]}, 0x70}, 0x1, 0x0, 0x0, 0x20000000}, 0x4008050) write$P9_RUNLINKAT(r3, &(0x7f0000002040)={0x7, 0x4d, 0x1}, 0x7) umount2(&(0x7f0000000080)='./file0\x00', 0x3) [ 324.805878] overlayfs: fs on './file0' does not support file handles, falling back to index=off. [ 324.815706] audit: type=1804 audit(1677355551.308:132): pid=15001 uid=0 auid=4294967295 ses=4294967295 op="invalid_pcr" cause="ToMToU" comm="syz-executor.1" name="/root/syzkaller-testdir3295352786/syzkaller.7PI3PL/230/bus" dev="sda1" ino=13882 res=1 20:05:51 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_mreqsrc(r0, 0x0, 0xa, 0x0, &(0x7f0000000280)) 20:05:51 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_mreqsrc(r0, 0x0, 0xa, 0x0, &(0x7f0000000280)) 20:05:51 executing program 3: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) keyctl$get_persistent(0x16, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x42, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(0xffffffffffffffff, 0x0, 0x0) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(0xffffffffffffffff, 0x80089419, &(0x7f0000002200)) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000280), 0x8100, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), 0x0) mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0) syz_fuse_handle_req(r1, 0x0, 0x0, &(0x7f00000030c0)={0x0, &(0x7f0000000040)={0x18, 0x0, 0x0, {0x5}}, &(0x7f0000000300)={0x18, 0x0, 0x0, {0x4}}, &(0x7f0000000380)={0x18, 0x0, 0x0, {0x1}}, &(0x7f00000024c0)={0x18, 0x0, 0x1f}, &(0x7f0000002580)={0x28, 0x0, 0xff, {{0x4, 0x3, 0x2}}}, 0x0, &(0x7f0000002640)={0x18, 0x0, 0x4, {0x7ff}}, &(0x7f0000002680)=ANY=[@ANYBLOB="1d00000000000073636865645f737769746368000000"], &(0x7f00000026c0)={0x20, 0x0, 0x0, {0x0, 0x1}}, &(0x7f0000002700)={0x78, 0x0, 0x0, {0x800, 0x0, 0x0, {0x0, 0x0, 0xccd8, 0x23, 0x8434, 0xd2a, 0x0, 0x80005, 0x5, 0xc000, 0x6, 0x0, 0xee01, 0x0, 0x6}}}, &(0x7f0000002780)={0x90, 0x0, 0x2, {0x0, 0x3, 0x10001, 0x1f, 0xfffffffe, 0x0, {0x1, 0x3f, 0xffffffffffffff80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x45c1, 0x0, 0x3f, 0xee00, 0x0, 0x5, 0x9}}}, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], &(0x7f0000002bc0)=ANY=[@ANYBLOB="6001000000000000080000000000000000000000000000000100000000000000373900000000000031490000000000003f0000000200000001000000000000f0ffffffff000000000800000000000000080000000000000000000000000000000800000000000000070000000300000098bb000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="01000000ffffff7f00000000060000000000000005000000000000000d00000000004c1b73636865645f7377697463680000000004000000000000000300000000000000010000000000000004000000000000008f000000090000000300000000000000060000000000000000000000000000008100000000000000030000000000000001000000000000000000000009000000fd0000000060000000000000", @ANYRES32=0xee01, @ANYRES32], &(0x7f0000002fc0)={0xa0, 0xfffffffffffffff5, 0x0, {{0x1, 0x1, 0x2, 0x7, 0x6, 0x5, {0x6, 0x81, 0x80000000, 0x935d, 0x5, 0x10001, 0x1, 0x100, 0x2, 0x0, 0x0, 0xee01, 0x0, 0x1}}, {0x0, 0x1}}}, &(0x7f0000003080)={0x20, 0x0, 0x7e41, {0x3145ad07, 0x0, 0x0, 0x7}}}) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB="15000000feffff018000000800395032303030"], 0x15) r4 = syz_open_dev$vcsn(&(0x7f00000001c0), 0x2, 0x0) sendto$ax25(r4, &(0x7f0000000440)="67a9c6157eee7d0843c78bebd8be044f9dd7905e451be2e143888394952dbb86f3048fc552c8dfc3ee4db9f6fad3e48242c4fcbe06746ffc83cb438d1eb52158013306b5a3b692af4de104d10baece3422b2ea6c3dad3057db2288ed4d94182842281899384bb83dd684ae4bde0a98a32ffd6b4247032bbd86fc5a840e29686bc412fef520bfe4d728dc8094a788cc49359dc6409187696194", 0x99, 0x4000, &(0x7f0000000500)={{0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, 0x3}, [@default, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @bcast, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) r5 = dup(r3) write$FUSE_BMAP(r5, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_NOTIFY_RETRIEVE(r5, &(0x7f00000000c0)={0x14c}, 0x137) write$FUSE_INIT(r1, 0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000040), 0x0, &(0x7f0000000300)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r5}, 0x2c, {[{@access_uid}], [], 0x6b}}) mount$fuse(0x0, &(0x7f00000042c0)='./file0\x00', &(0x7f0000002000), 0x0, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x2000}}) add_key$keyring(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f00000020c0), &(0x7f0000002100)={'syz', 0x3}, &(0x7f00000021c0)=ANY=[], 0x48, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x6, 0xffffffffffffffff, 0x0) write$FUSE_BMAP(r4, 0x0, 0x0) keyctl$setperm(0x5, 0x0, 0x1c243911) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000700)=@can_delroute={0x70, 0x19, 0x4, 0x70bd2a, 0x25dfdbfc, {0x1d, 0x1, 0x1}, [@CGW_MOD_UID={0x8}, @CGW_CS_XOR={0x8, 0x5, {0xfffffffffffffffa, 0xfffffffffffffff8, 0x1, 0x40}}, @CGW_FILTER={0xc, 0xb, {{0x4, 0x1, 0x0, 0x1}, {0x4, 0x1, 0x0, 0x1}}}, @CGW_MOD_OR={0x15, 0x2, {{{0x2, 0x0, 0x1}, 0x3, 0x3, 0x0, 0x0, "0ae7836b9d5cd6e2"}, 0x4}}, @CGW_MOD_XOR={0x15, 0x3, {{{0x0, 0x0, 0x1}, 0x2, 0x1, 0x0, 0x0, "3e62eff2ef27f8cd"}, 0x5}}, @CGW_MOD_UID={0x8}, @CGW_DST_IF={0x8}]}, 0x70}, 0x1, 0x0, 0x0, 0x20000000}, 0x4008050) write$P9_RUNLINKAT(r3, &(0x7f0000002040)={0x7, 0x4d, 0x1}, 0x7) umount2(&(0x7f0000000080)='./file0\x00', 0x3) 20:05:51 executing program 4: r0 = perf_event_open(0x0, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000018c00)={0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000400)=@bpf_ext={0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000380)={0x0, 0x0, 0x10000}, 0x10, 0x0, r1}, 0x80) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0xffffffffffffffff, 0x9, r0, 0x8) bpf$ENABLE_STATS(0x20, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40086602, &(0x7f0000000180)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) write$cgroup_type(r3, &(0x7f0000000080), 0x11ffffce1) perf_event_open(&(0x7f0000001940)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) perf_event_open(&(0x7f0000000400)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x32600) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x660c, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x48800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000080)}, 0x400, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000), 0x248800) 20:05:51 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffbffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x1, 0x8010000000000084) setsockopt$inet6_IPV6_RTHDR(r2, 0x29, 0x39, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x58) bind$inet6(r2, &(0x7f0000000140)={0xa, 0x4e23, 0x0, @empty}, 0x1c) listen(r2, 0x10001) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, 0x0, &(0x7f00000001c0)) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, &(0x7f0000000100)) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/bus/input/devices\x00', 0x0, 0x0) io_setup(0x5, 0x0) io_submit(0x0, 0x1, &(0x7f00000007c0)=[&(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, r3, 0x0, 0x0, 0x100, 0x0, 0x6}]) r4 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000800), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_GET(r5, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, r6, 0x86a762f4dfb5c7dd}, 0x14}}, 0x0) r7 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000180), 0x4000, 0x0) sendmsg$L2TP_CMD_SESSION_DELETE(r3, &(0x7f0000000340)={&(0x7f0000000040), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x3c, r6, 0x4, 0x70bd25, 0x25dfdbff, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x3}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x1}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp6=r7}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x2}]}, 0x3c}}, 0x4000) connect$inet6(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r4, 0x84, 0x64, &(0x7f0000000200)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) r8 = socket(0x18, 0x2, 0x0) r9 = socket(0x18, 0x2, 0x0) dup2(r9, r8) ioctl$FS_IOC_ENABLE_VERITY(r8, 0x40806685, &(0x7f0000000480)={0x1, 0x3, 0x1000, 0x62, &(0x7f0000000240)="bd0504ca8d136a22ab7413131d9354c565a277d9e4e3108e4d2962715ba8c98f97c80ab0e4d0198db660761a31cbf27c4bbcbedeca0e8d6a9004649274f5d74ae8382b7c1a2c4e7f4f40503699b10ef0ab8281fb70949fbeb95d0d24c46fe6d98fba", 0x5b, 0x0, &(0x7f0000000380)="2c155ea9f06c0166da3eb92d94b69fd8aacec5c7049f6ca2336e160aeb5bc6c57f793320e18afe78559a57f5b043f89f427a8ab5495e3e26b39df95b39725f7f99a2715f94f85ed62e8913799de129a457a50b28fc72578e544eb4"}) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r4, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0xec034000, @loopback}], 0x1c) mmap(&(0x7f00000e4000/0x1000)=nil, 0x1000, 0x0, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) 20:05:51 executing program 1: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c47, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x5, 0x8000000}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001080), 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000780)='ext4\x00', &(0x7f0000000240)='./file0\x00', 0x2000480, &(0x7f0000000000)=ANY=[], 0x1, 0x76a, &(0x7f0000000fc0)="$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") open(&(0x7f0000000080)='./bus\x00', 0x6fe44da629969272, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000004400)='./bus\x00', 0x1c1002, 0x0) write$binfmt_misc(r2, &(0x7f0000000500)=ANY=[], 0x5) sendfile(r2, r1, 0x0, 0x1ffff) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x9, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuset.effective_mems\x00', 0x275a, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cgroup.controllers\x00', 0x275a, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r4, 0xc028660f, &(0x7f0000000200)={0x0, r3, 0x1000000000000}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000500)={0x84, 0x2a, 0x7e2881d4b0058261, 0x0, 0x0, {0x1}, [@generic="e4bbac412a17305504ad793ea00a6a8b6af59b93a71efc64f1ba9ffd3d7708256fad7c8c336cf7184b2651994299cad739b99f592c800cf74bc91b2a206bbcf6fb80877577dabf5cd4ec9c33bad91823389f23299d0eeed20059627675267baeec666bd7148a371ce03cab9d2bd75f4e"]}, 0x84}, 0x1, 0x0, 0x0, 0x8}, 0x0) syz_genetlink_get_family_id$devlink(0x0, 0xffffffffffffffff) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r5, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000700)=@newsa={0x138, 0x10, 0x0, 0x0, 0x0, {{@in6=@rand_addr=' \x01\x00', @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}, {@in6=@empty, 0x0, 0x32}, @in=@loopback, {0x0, 0x0, 0xe033, 0x6, 0x0, 0xfffffffffffffffd}}, [@algo_comp={0x48, 0x3, {{'lzs\x00'}}}]}, 0x138}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r4, 0xc018937c, &(0x7f0000000180)={{0x1, 0x1, 0x18, r0}, './bus\x00'}) getsockopt$bt_l2cap_L2CAP_OPTIONS(r6, 0x6, 0x1, &(0x7f0000000280), &(0x7f00000002c0)=0xc) sendmsg$DEVLINK_CMD_SB_POOL_SET(0xffffffffffffffff, 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) syz_open_procfs(0x0, &(0x7f00000001c0)='net/vlan/vlan0\x00') 20:05:51 executing program 5: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c47, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x5, 0x8000000}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001080), 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000780)='ext4\x00', &(0x7f0000000240)='./file0\x00', 0x2000480, &(0x7f0000000000)=ANY=[], 0x1, 0x76a, &(0x7f0000000fc0)="$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") open(&(0x7f0000000080)='./bus\x00', 0x6fe44da629969272, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000004400)='./bus\x00', 0x1c1002, 0x0) write$binfmt_misc(r2, &(0x7f0000000500)=ANY=[], 0x5) sendfile(r2, r1, 0x0, 0x1ffff) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x9, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuset.effective_mems\x00', 0x275a, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cgroup.controllers\x00', 0x275a, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r4, 0xc028660f, &(0x7f0000000200)={0x0, r3, 0x1000000000000}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000500)={0x84, 0x2a, 0x7e2881d4b0058261, 0x0, 0x0, {0x1}, [@generic="e4bbac412a17305504ad793ea00a6a8b6af59b93a71efc64f1ba9ffd3d7708256fad7c8c336cf7184b2651994299cad739b99f592c800cf74bc91b2a206bbcf6fb80877577dabf5cd4ec9c33bad91823389f23299d0eeed20059627675267baeec666bd7148a371ce03cab9d2bd75f4e"]}, 0x84}, 0x1, 0x0, 0x0, 0x8}, 0x0) syz_genetlink_get_family_id$devlink(0x0, 0xffffffffffffffff) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r5, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000700)=@newsa={0x138, 0x10, 0x0, 0x0, 0x0, {{@in6=@rand_addr=' \x01\x00', @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}, {@in6=@empty, 0x0, 0x32}, @in=@loopback, {0x0, 0x0, 0xe033, 0x6, 0x0, 0xfffffffffffffffd}}, [@algo_comp={0x48, 0x3, {{'lzs\x00'}}}]}, 0x138}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r4, 0xc018937c, &(0x7f0000000180)={{0x1, 0x1, 0x18, r0}, './bus\x00'}) getsockopt$bt_l2cap_L2CAP_OPTIONS(r6, 0x6, 0x1, &(0x7f0000000280), &(0x7f00000002c0)=0xc) sendmsg$DEVLINK_CMD_SB_POOL_SET(0xffffffffffffffff, 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) syz_open_procfs(0x0, &(0x7f00000001c0)='net/vlan/vlan0\x00') 20:05:51 executing program 3: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) keyctl$get_persistent(0x16, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x42, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(0xffffffffffffffff, 0x0, 0x0) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(0xffffffffffffffff, 0x80089419, &(0x7f0000002200)) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000280), 0x8100, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), 0x0) mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0) syz_fuse_handle_req(r1, 0x0, 0x0, &(0x7f00000030c0)={0x0, &(0x7f0000000040)={0x18, 0x0, 0x0, {0x5}}, &(0x7f0000000300)={0x18, 0x0, 0x0, {0x4}}, &(0x7f0000000380)={0x18, 0x0, 0x0, {0x1}}, &(0x7f00000024c0)={0x18, 0x0, 0x1f}, &(0x7f0000002580)={0x28, 0x0, 0xff, {{0x4, 0x3, 0x2}}}, 0x0, &(0x7f0000002640)={0x18, 0x0, 0x4, {0x7ff}}, &(0x7f0000002680)=ANY=[@ANYBLOB="1d00000000000073636865645f737769746368000000"], &(0x7f00000026c0)={0x20, 0x0, 0x0, {0x0, 0x1}}, &(0x7f0000002700)={0x78, 0x0, 0x0, {0x800, 0x0, 0x0, {0x0, 0x0, 0xccd8, 0x23, 0x8434, 0xd2a, 0x0, 0x80005, 0x5, 0xc000, 0x6, 0x0, 0xee01, 0x0, 0x6}}}, &(0x7f0000002780)={0x90, 0x0, 0x2, {0x0, 0x3, 0x10001, 0x1f, 0xfffffffe, 0x0, {0x1, 0x3f, 0xffffffffffffff80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x45c1, 0x0, 0x3f, 0xee00, 0x0, 0x5, 0x9}}}, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], &(0x7f0000002bc0)=ANY=[@ANYBLOB="6001000000000000080000000000000000000000000000000100000000000000373900000000000031490000000000003f0000000200000001000000000000f0ffffffff000000000800000000000000080000000000000000000000000000000800000000000000070000000300000098bb000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="01000000ffffff7f00000000060000000000000005000000000000000d00000000004c1b73636865645f7377697463680000000004000000000000000300000000000000010000000000000004000000000000008f000000090000000300000000000000060000000000000000000000000000008100000000000000030000000000000001000000000000000000000009000000fd0000000060000000000000", @ANYRES32=0xee01, @ANYRES32], &(0x7f0000002fc0)={0xa0, 0xfffffffffffffff5, 0x0, {{0x1, 0x1, 0x2, 0x7, 0x6, 0x5, {0x6, 0x81, 0x80000000, 0x935d, 0x5, 0x10001, 0x1, 0x100, 0x2, 0x0, 0x0, 0xee01, 0x0, 0x1}}, {0x0, 0x1}}}, &(0x7f0000003080)={0x20, 0x0, 0x7e41, {0x3145ad07, 0x0, 0x0, 0x7}}}) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB="15000000feffff018000000800395032303030"], 0x15) r4 = syz_open_dev$vcsn(&(0x7f00000001c0), 0x2, 0x0) sendto$ax25(r4, &(0x7f0000000440)="67a9c6157eee7d0843c78bebd8be044f9dd7905e451be2e143888394952dbb86f3048fc552c8dfc3ee4db9f6fad3e48242c4fcbe06746ffc83cb438d1eb52158013306b5a3b692af4de104d10baece3422b2ea6c3dad3057db2288ed4d94182842281899384bb83dd684ae4bde0a98a32ffd6b4247032bbd86fc5a840e29686bc412fef520bfe4d728dc8094a788cc49359dc6409187696194", 0x99, 0x4000, &(0x7f0000000500)={{0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, 0x3}, [@default, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @bcast, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) r5 = dup(r3) write$FUSE_BMAP(r5, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_NOTIFY_RETRIEVE(r5, &(0x7f00000000c0)={0x14c}, 0x137) write$FUSE_INIT(r1, 0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000040), 0x0, &(0x7f0000000300)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r5}, 0x2c, {[{@access_uid}], [], 0x6b}}) mount$fuse(0x0, &(0x7f00000042c0)='./file0\x00', &(0x7f0000002000), 0x0, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x2000}}) add_key$keyring(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f00000020c0), &(0x7f0000002100)={'syz', 0x3}, &(0x7f00000021c0)=ANY=[], 0x48, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x6, 0xffffffffffffffff, 0x0) write$FUSE_BMAP(r4, 0x0, 0x0) keyctl$setperm(0x5, 0x0, 0x1c243911) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000700)=@can_delroute={0x70, 0x19, 0x4, 0x70bd2a, 0x25dfdbfc, {0x1d, 0x1, 0x1}, [@CGW_MOD_UID={0x8}, @CGW_CS_XOR={0x8, 0x5, {0xfffffffffffffffa, 0xfffffffffffffff8, 0x1, 0x40}}, @CGW_FILTER={0xc, 0xb, {{0x4, 0x1, 0x0, 0x1}, {0x4, 0x1, 0x0, 0x1}}}, @CGW_MOD_OR={0x15, 0x2, {{{0x2, 0x0, 0x1}, 0x3, 0x3, 0x0, 0x0, "0ae7836b9d5cd6e2"}, 0x4}}, @CGW_MOD_XOR={0x15, 0x3, {{{0x0, 0x0, 0x1}, 0x2, 0x1, 0x0, 0x0, "3e62eff2ef27f8cd"}, 0x5}}, @CGW_MOD_UID={0x8}, @CGW_DST_IF={0x8}]}, 0x70}, 0x1, 0x0, 0x0, 0x20000000}, 0x4008050) write$P9_RUNLINKAT(r3, &(0x7f0000002040)={0x7, 0x4d, 0x1}, 0x7) umount2(&(0x7f0000000080)='./file0\x00', 0x3) 20:05:51 executing program 2: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffbffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x1, 0x8010000000000084) setsockopt$inet6_IPV6_RTHDR(r2, 0x29, 0x39, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x58) bind$inet6(r2, &(0x7f0000000140)={0xa, 0x4e23, 0x0, @empty}, 0x1c) listen(r2, 0x10001) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, 0x0, &(0x7f00000001c0)) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, &(0x7f0000000100)) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/bus/input/devices\x00', 0x0, 0x0) io_setup(0x5, 0x0) io_submit(0x0, 0x1, &(0x7f00000007c0)=[&(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, r3, 0x0, 0x0, 0x100, 0x0, 0x6}]) r4 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000800), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_GET(r5, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, r6, 0x86a762f4dfb5c7dd}, 0x14}}, 0x0) r7 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000180), 0x4000, 0x0) sendmsg$L2TP_CMD_SESSION_DELETE(r3, &(0x7f0000000340)={&(0x7f0000000040), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x3c, r6, 0x4, 0x70bd25, 0x25dfdbff, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x3}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x1}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp6=r7}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x2}]}, 0x3c}}, 0x4000) connect$inet6(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r4, 0x84, 0x64, &(0x7f0000000200)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) r8 = socket(0x18, 0x2, 0x0) r9 = socket(0x18, 0x2, 0x0) dup2(r9, r8) ioctl$FS_IOC_ENABLE_VERITY(r8, 0x40806685, &(0x7f0000000480)={0x1, 0x3, 0x1000, 0x62, &(0x7f0000000240)="bd0504ca8d136a22ab7413131d9354c565a277d9e4e3108e4d2962715ba8c98f97c80ab0e4d0198db660761a31cbf27c4bbcbedeca0e8d6a9004649274f5d74ae8382b7c1a2c4e7f4f40503699b10ef0ab8281fb70949fbeb95d0d24c46fe6d98fba", 0x5b, 0x0, &(0x7f0000000380)="2c155ea9f06c0166da3eb92d94b69fd8aacec5c7049f6ca2336e160aeb5bc6c57f793320e18afe78559a57f5b043f89f427a8ab5495e3e26b39df95b39725f7f99a2715f94f85ed62e8913799de129a457a50b28fc72578e544eb4"}) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r4, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0xec034000, @loopback}], 0x1c) mmap(&(0x7f00000e4000/0x1000)=nil, 0x1000, 0x0, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) 20:05:52 executing program 3: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) keyctl$get_persistent(0x16, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x42, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(0xffffffffffffffff, 0x0, 0x0) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(0xffffffffffffffff, 0x80089419, &(0x7f0000002200)) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000280), 0x8100, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), 0x0) mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0) syz_fuse_handle_req(r1, 0x0, 0x0, &(0x7f00000030c0)={0x0, &(0x7f0000000040)={0x18, 0x0, 0x0, {0x5}}, &(0x7f0000000300)={0x18, 0x0, 0x0, {0x4}}, &(0x7f0000000380)={0x18, 0x0, 0x0, {0x1}}, &(0x7f00000024c0)={0x18, 0x0, 0x1f}, &(0x7f0000002580)={0x28, 0x0, 0xff, {{0x4, 0x3, 0x2}}}, 0x0, &(0x7f0000002640)={0x18, 0x0, 0x4, {0x7ff}}, &(0x7f0000002680)=ANY=[@ANYBLOB="1d00000000000073636865645f737769746368000000"], &(0x7f00000026c0)={0x20, 0x0, 0x0, {0x0, 0x1}}, &(0x7f0000002700)={0x78, 0x0, 0x0, {0x800, 0x0, 0x0, {0x0, 0x0, 0xccd8, 0x23, 0x8434, 0xd2a, 0x0, 0x80005, 0x5, 0xc000, 0x6, 0x0, 0xee01, 0x0, 0x6}}}, &(0x7f0000002780)={0x90, 0x0, 0x2, {0x0, 0x3, 0x10001, 0x1f, 0xfffffffe, 0x0, {0x1, 0x3f, 0xffffffffffffff80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x45c1, 0x0, 0x3f, 0xee00, 0x0, 0x5, 0x9}}}, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], &(0x7f0000002bc0)=ANY=[@ANYBLOB="6001000000000000080000000000000000000000000000000100000000000000373900000000000031490000000000003f0000000200000001000000000000f0ffffffff000000000800000000000000080000000000000000000000000000000800000000000000070000000300000098bb000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="01000000ffffff7f00000000060000000000000005000000000000000d00000000004c1b73636865645f7377697463680000000004000000000000000300000000000000010000000000000004000000000000008f000000090000000300000000000000060000000000000000000000000000008100000000000000030000000000000001000000000000000000000009000000fd0000000060000000000000", @ANYRES32=0xee01, @ANYRES32], &(0x7f0000002fc0)={0xa0, 0xfffffffffffffff5, 0x0, {{0x1, 0x1, 0x2, 0x7, 0x6, 0x5, {0x6, 0x81, 0x80000000, 0x935d, 0x5, 0x10001, 0x1, 0x100, 0x2, 0x0, 0x0, 0xee01, 0x0, 0x1}}, {0x0, 0x1}}}, &(0x7f0000003080)={0x20, 0x0, 0x7e41, {0x3145ad07, 0x0, 0x0, 0x7}}}) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB="15000000feffff018000000800395032303030"], 0x15) r4 = syz_open_dev$vcsn(&(0x7f00000001c0), 0x2, 0x0) sendto$ax25(r4, &(0x7f0000000440)="67a9c6157eee7d0843c78bebd8be044f9dd7905e451be2e143888394952dbb86f3048fc552c8dfc3ee4db9f6fad3e48242c4fcbe06746ffc83cb438d1eb52158013306b5a3b692af4de104d10baece3422b2ea6c3dad3057db2288ed4d94182842281899384bb83dd684ae4bde0a98a32ffd6b4247032bbd86fc5a840e29686bc412fef520bfe4d728dc8094a788cc49359dc6409187696194", 0x99, 0x4000, &(0x7f0000000500)={{0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, 0x3}, [@default, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @bcast, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) r5 = dup(r3) write$FUSE_BMAP(r5, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_NOTIFY_RETRIEVE(r5, &(0x7f00000000c0)={0x14c}, 0x137) write$FUSE_INIT(r1, 0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000040), 0x0, &(0x7f0000000300)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r5}, 0x2c, {[{@access_uid}], [], 0x6b}}) mount$fuse(0x0, &(0x7f00000042c0)='./file0\x00', &(0x7f0000002000), 0x0, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x2000}}) add_key$keyring(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f00000020c0), &(0x7f0000002100)={'syz', 0x3}, &(0x7f00000021c0)=ANY=[], 0x48, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x6, 0xffffffffffffffff, 0x0) write$FUSE_BMAP(r4, 0x0, 0x0) keyctl$setperm(0x5, 0x0, 0x1c243911) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000700)=@can_delroute={0x70, 0x19, 0x4, 0x70bd2a, 0x25dfdbfc, {0x1d, 0x1, 0x1}, [@CGW_MOD_UID={0x8}, @CGW_CS_XOR={0x8, 0x5, {0xfffffffffffffffa, 0xfffffffffffffff8, 0x1, 0x40}}, @CGW_FILTER={0xc, 0xb, {{0x4, 0x1, 0x0, 0x1}, {0x4, 0x1, 0x0, 0x1}}}, @CGW_MOD_OR={0x15, 0x2, {{{0x2, 0x0, 0x1}, 0x3, 0x3, 0x0, 0x0, "0ae7836b9d5cd6e2"}, 0x4}}, @CGW_MOD_XOR={0x15, 0x3, {{{0x0, 0x0, 0x1}, 0x2, 0x1, 0x0, 0x0, "3e62eff2ef27f8cd"}, 0x5}}, @CGW_MOD_UID={0x8}, @CGW_DST_IF={0x8}]}, 0x70}, 0x1, 0x0, 0x0, 0x20000000}, 0x4008050) write$P9_RUNLINKAT(r3, &(0x7f0000002040)={0x7, 0x4d, 0x1}, 0x7) umount2(&(0x7f0000000080)='./file0\x00', 0x3) 20:05:52 executing program 2: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffbffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x1, 0x8010000000000084) setsockopt$inet6_IPV6_RTHDR(r2, 0x29, 0x39, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x58) bind$inet6(r2, &(0x7f0000000140)={0xa, 0x4e23, 0x0, @empty}, 0x1c) listen(r2, 0x10001) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, 0x0, &(0x7f00000001c0)) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, &(0x7f0000000100)) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/bus/input/devices\x00', 0x0, 0x0) io_setup(0x5, 0x0) io_submit(0x0, 0x1, &(0x7f00000007c0)=[&(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, r3, 0x0, 0x0, 0x100, 0x0, 0x6}]) r4 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000800), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_GET(r5, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, r6, 0x86a762f4dfb5c7dd}, 0x14}}, 0x0) r7 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000180), 0x4000, 0x0) sendmsg$L2TP_CMD_SESSION_DELETE(r3, &(0x7f0000000340)={&(0x7f0000000040), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x3c, r6, 0x4, 0x70bd25, 0x25dfdbff, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x3}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x1}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp6=r7}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x2}]}, 0x3c}}, 0x4000) connect$inet6(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r4, 0x84, 0x64, &(0x7f0000000200)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) r8 = socket(0x18, 0x2, 0x0) r9 = socket(0x18, 0x2, 0x0) dup2(r9, r8) ioctl$FS_IOC_ENABLE_VERITY(r8, 0x40806685, &(0x7f0000000480)={0x1, 0x3, 0x1000, 0x62, &(0x7f0000000240)="bd0504ca8d136a22ab7413131d9354c565a277d9e4e3108e4d2962715ba8c98f97c80ab0e4d0198db660761a31cbf27c4bbcbedeca0e8d6a9004649274f5d74ae8382b7c1a2c4e7f4f40503699b10ef0ab8281fb70949fbeb95d0d24c46fe6d98fba", 0x5b, 0x0, &(0x7f0000000380)="2c155ea9f06c0166da3eb92d94b69fd8aacec5c7049f6ca2336e160aeb5bc6c57f793320e18afe78559a57f5b043f89f427a8ab5495e3e26b39df95b39725f7f99a2715f94f85ed62e8913799de129a457a50b28fc72578e544eb4"}) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r4, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0xec034000, @loopback}], 0x1c) mmap(&(0x7f00000e4000/0x1000)=nil, 0x1000, 0x0, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) 20:05:52 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffbffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x1, 0x8010000000000084) setsockopt$inet6_IPV6_RTHDR(r2, 0x29, 0x39, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x58) bind$inet6(r2, &(0x7f0000000140)={0xa, 0x4e23, 0x0, @empty}, 0x1c) listen(r2, 0x10001) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, 0x0, &(0x7f00000001c0)) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, &(0x7f0000000100)) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/bus/input/devices\x00', 0x0, 0x0) io_setup(0x5, 0x0) io_submit(0x0, 0x1, &(0x7f00000007c0)=[&(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, r3, 0x0, 0x0, 0x100, 0x0, 0x6}]) r4 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000800), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_GET(r5, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, r6, 0x86a762f4dfb5c7dd}, 0x14}}, 0x0) r7 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000180), 0x4000, 0x0) sendmsg$L2TP_CMD_SESSION_DELETE(r3, &(0x7f0000000340)={&(0x7f0000000040), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x3c, r6, 0x4, 0x70bd25, 0x25dfdbff, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x3}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x1}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp6=r7}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x2}]}, 0x3c}}, 0x4000) connect$inet6(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r4, 0x84, 0x64, &(0x7f0000000200)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) r8 = socket(0x18, 0x2, 0x0) r9 = socket(0x18, 0x2, 0x0) dup2(r9, r8) ioctl$FS_IOC_ENABLE_VERITY(r8, 0x40806685, &(0x7f0000000480)={0x1, 0x3, 0x1000, 0x62, &(0x7f0000000240)="bd0504ca8d136a22ab7413131d9354c565a277d9e4e3108e4d2962715ba8c98f97c80ab0e4d0198db660761a31cbf27c4bbcbedeca0e8d6a9004649274f5d74ae8382b7c1a2c4e7f4f40503699b10ef0ab8281fb70949fbeb95d0d24c46fe6d98fba", 0x5b, 0x0, &(0x7f0000000380)="2c155ea9f06c0166da3eb92d94b69fd8aacec5c7049f6ca2336e160aeb5bc6c57f793320e18afe78559a57f5b043f89f427a8ab5495e3e26b39df95b39725f7f99a2715f94f85ed62e8913799de129a457a50b28fc72578e544eb4"}) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r4, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0xec034000, @loopback}], 0x1c) mmap(&(0x7f00000e4000/0x1000)=nil, 0x1000, 0x0, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) [ 325.760142] audit: type=1804 audit(1677355552.338:133): pid=15041 uid=0 auid=4294967295 ses=4294967295 op="invalid_pcr" cause="open_writers" comm="syz-executor.1" name="/root/syzkaller-testdir3295352786/syzkaller.7PI3PL/231/bus" dev="sda1" ino=13894 res=1 [ 325.988023] audit: type=1804 audit(1677355552.378:134): pid=15041 uid=0 auid=4294967295 ses=4294967295 op="invalid_pcr" cause="ToMToU" comm="syz-executor.1" name="/root/syzkaller-testdir3295352786/syzkaller.7PI3PL/231/bus" dev="sda1" ino=13894 res=1 20:05:52 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffbffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x1, 0x8010000000000084) setsockopt$inet6_IPV6_RTHDR(r2, 0x29, 0x39, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x58) bind$inet6(r2, &(0x7f0000000140)={0xa, 0x4e23, 0x0, @empty}, 0x1c) listen(r2, 0x10001) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, 0x0, &(0x7f00000001c0)) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, &(0x7f0000000100)) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/bus/input/devices\x00', 0x0, 0x0) io_setup(0x5, 0x0) io_submit(0x0, 0x1, &(0x7f00000007c0)=[&(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, r3, 0x0, 0x0, 0x100, 0x0, 0x6}]) r4 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000800), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_GET(r5, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, r6, 0x86a762f4dfb5c7dd}, 0x14}}, 0x0) r7 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000180), 0x4000, 0x0) sendmsg$L2TP_CMD_SESSION_DELETE(r3, &(0x7f0000000340)={&(0x7f0000000040), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x3c, r6, 0x4, 0x70bd25, 0x25dfdbff, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x3}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x1}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp6=r7}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x2}]}, 0x3c}}, 0x4000) connect$inet6(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r4, 0x84, 0x64, &(0x7f0000000200)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) r8 = socket(0x18, 0x2, 0x0) r9 = socket(0x18, 0x2, 0x0) dup2(r9, r8) ioctl$FS_IOC_ENABLE_VERITY(r8, 0x40806685, &(0x7f0000000480)={0x1, 0x3, 0x1000, 0x62, &(0x7f0000000240)="bd0504ca8d136a22ab7413131d9354c565a277d9e4e3108e4d2962715ba8c98f97c80ab0e4d0198db660761a31cbf27c4bbcbedeca0e8d6a9004649274f5d74ae8382b7c1a2c4e7f4f40503699b10ef0ab8281fb70949fbeb95d0d24c46fe6d98fba", 0x5b, 0x0, &(0x7f0000000380)="2c155ea9f06c0166da3eb92d94b69fd8aacec5c7049f6ca2336e160aeb5bc6c57f793320e18afe78559a57f5b043f89f427a8ab5495e3e26b39df95b39725f7f99a2715f94f85ed62e8913799de129a457a50b28fc72578e544eb4"}) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r4, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0xec034000, @loopback}], 0x1c) mmap(&(0x7f00000e4000/0x1000)=nil, 0x1000, 0x0, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) [ 326.016488] audit: type=1804 audit(1677355552.378:135): pid=15040 uid=0 auid=4294967295 ses=4294967295 op="invalid_pcr" cause="open_writers" comm="syz-executor.5" name="/root/syzkaller-testdir2782243939/syzkaller.gZJ0jW/249/bus" dev="sda1" ino=13888 res=1 [ 326.076970] audit: type=1804 audit(1677355552.408:136): pid=15040 uid=0 auid=4294967295 ses=4294967295 op="invalid_pcr" cause="ToMToU" comm="syz-executor.5" name="/root/syzkaller-testdir2782243939/syzkaller.gZJ0jW/249/bus" dev="sda1" ino=13888 res=1 20:05:52 executing program 5: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c47, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x5, 0x8000000}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001080), 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000780)='ext4\x00', &(0x7f0000000240)='./file0\x00', 0x2000480, &(0x7f0000000000)=ANY=[], 0x1, 0x76a, &(0x7f0000000fc0)="$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") open(&(0x7f0000000080)='./bus\x00', 0x6fe44da629969272, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000004400)='./bus\x00', 0x1c1002, 0x0) write$binfmt_misc(r2, &(0x7f0000000500)=ANY=[], 0x5) sendfile(r2, r1, 0x0, 0x1ffff) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x9, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuset.effective_mems\x00', 0x275a, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cgroup.controllers\x00', 0x275a, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r4, 0xc028660f, &(0x7f0000000200)={0x0, r3, 0x1000000000000}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000500)={0x84, 0x2a, 0x7e2881d4b0058261, 0x0, 0x0, {0x1}, [@generic="e4bbac412a17305504ad793ea00a6a8b6af59b93a71efc64f1ba9ffd3d7708256fad7c8c336cf7184b2651994299cad739b99f592c800cf74bc91b2a206bbcf6fb80877577dabf5cd4ec9c33bad91823389f23299d0eeed20059627675267baeec666bd7148a371ce03cab9d2bd75f4e"]}, 0x84}, 0x1, 0x0, 0x0, 0x8}, 0x0) syz_genetlink_get_family_id$devlink(0x0, 0xffffffffffffffff) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r5, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000700)=@newsa={0x138, 0x10, 0x0, 0x0, 0x0, {{@in6=@rand_addr=' \x01\x00', @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}, {@in6=@empty, 0x0, 0x32}, @in=@loopback, {0x0, 0x0, 0xe033, 0x6, 0x0, 0xfffffffffffffffd}}, [@algo_comp={0x48, 0x3, {{'lzs\x00'}}}]}, 0x138}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r4, 0xc018937c, &(0x7f0000000180)={{0x1, 0x1, 0x18, r0}, './bus\x00'}) getsockopt$bt_l2cap_L2CAP_OPTIONS(r6, 0x6, 0x1, &(0x7f0000000280), &(0x7f00000002c0)=0xc) sendmsg$DEVLINK_CMD_SB_POOL_SET(0xffffffffffffffff, 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) syz_open_procfs(0x0, &(0x7f00000001c0)='net/vlan/vlan0\x00') 20:05:52 executing program 1: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c47, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x5, 0x8000000}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001080), 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000780)='ext4\x00', &(0x7f0000000240)='./file0\x00', 0x2000480, &(0x7f0000000000)=ANY=[], 0x1, 0x76a, &(0x7f0000000fc0)="$eJzs3d9rW1UcAPDvTdt17aatIOh8KghaGEvtrJuCDxMfRHAw0Ge3kGZlNm1Gk461FNwQwRdBxQdBX/bsj/nmqz9e9b/wQTamdsOJD1K5adJla9KlW5MI+XzgNOfce9Nzvjn3nnuSe0kC6FsT6Z9MxKGI+CiJGKstTyJiqJobjDixud3t9bV8mpLY2Hjzj6S6za31tXw0PCd1oFZ4MiJ+fD/icGZ7veWV1flcsVhYqpWnKgvnp8orq0fOLeTmCnOFxWPTMzNHj79w/NjexfrXL6sHr3/82rPfnPjnvSeufvhTEifiYG1dYxx7ZSImaq/JUPoS3uXVva6sx5JeN4AHkh6aA5tHeRyKsRio5loY6WbLAIBOeTciNgCAPpM4/wNAn6l/DnBrfS1fT739RKK7brwSEfs3469f39xcM1i7Zre/eh109FZy15WRJCLG96D+iYj44ru3v0pTdOg6JEAzly5HxJnxie3jf7LtnoXdeq6NbSbuKRv/oHu+T+c/Lzab/2W25j/RZP4z3OTYfRD3P/4z1/agmpbS+d/LDfe23W6Iv2Z8oFZ6pDrnG0rOnisW0rHt0YiYjKHhtDy9Qx2TN/+92Wpd4/zvz0/e+TKtP328s0Xm2uDw3c+ZzVVyDxNzoxuXI54abBZ/stX/SYv576k263j9pQ8+b7UujT+Nt562x99ZG1cinmna/3fuaEt2vD9xqro7TNV3iia+/fWz0Vb1N/Z/mtL66+8FuiHt/9Gd4x9PGu/XLO++jp+vjP3Qat3942++/+9L3qrm99WWXcxVKkvTEfuSN7YvP3rnufVyffs0/smnmx//O+3/6XvCM23GP3j9968fPP7OSuOf3VX/7z5z9fb8QKv62+v/mWpusraknfGv3QY+zGsHAAAAAAAAAAAAAAAAAAAAAAAAAO3KRMTBSDLZrXwmk81u/ob34zGaKZbKlcNnS8uLs1H9rezxGMrUv+pyrOH7UKdr34dfLx+9p/x8RDwWEZ8Oj1TL2XypONvr4AEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACg5kCL3/9P/Tbc69YBAB2zv9cNAAC6zvkfAPrP7s7/Ix1rBwDQPd7/A0D/cf4HgP7j/A8AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAECHnTp5Mk0bf6+v5dPy7IWV5fnShSOzhfJ8dmE5n82Xls5n50qluWIhmy8ttPxHlzYfiqXS+ZlYXL44VSmUK1PlldXTC6Xlxcrpcwu5ucLpwlDXIgMAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACA9pVXVudzxWJhSUZGRmYr0zhKjPRugAIAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAD4n/svAAD//9EyKso=") open(&(0x7f0000000080)='./bus\x00', 0x6fe44da629969272, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000004400)='./bus\x00', 0x1c1002, 0x0) write$binfmt_misc(r2, &(0x7f0000000500)=ANY=[], 0x5) sendfile(r2, r1, 0x0, 0x1ffff) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x9, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuset.effective_mems\x00', 0x275a, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cgroup.controllers\x00', 0x275a, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r4, 0xc028660f, &(0x7f0000000200)={0x0, r3, 0x1000000000000}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000500)={0x84, 0x2a, 0x7e2881d4b0058261, 0x0, 0x0, {0x1}, [@generic="e4bbac412a17305504ad793ea00a6a8b6af59b93a71efc64f1ba9ffd3d7708256fad7c8c336cf7184b2651994299cad739b99f592c800cf74bc91b2a206bbcf6fb80877577dabf5cd4ec9c33bad91823389f23299d0eeed20059627675267baeec666bd7148a371ce03cab9d2bd75f4e"]}, 0x84}, 0x1, 0x0, 0x0, 0x8}, 0x0) syz_genetlink_get_family_id$devlink(0x0, 0xffffffffffffffff) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r5, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000700)=@newsa={0x138, 0x10, 0x0, 0x0, 0x0, {{@in6=@rand_addr=' \x01\x00', @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}, {@in6=@empty, 0x0, 0x32}, @in=@loopback, {0x0, 0x0, 0xe033, 0x6, 0x0, 0xfffffffffffffffd}}, [@algo_comp={0x48, 0x3, {{'lzs\x00'}}}]}, 0x138}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r4, 0xc018937c, &(0x7f0000000180)={{0x1, 0x1, 0x18, r0}, './bus\x00'}) getsockopt$bt_l2cap_L2CAP_OPTIONS(r6, 0x6, 0x1, &(0x7f0000000280), &(0x7f00000002c0)=0xc) sendmsg$DEVLINK_CMD_SB_POOL_SET(0xffffffffffffffff, 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) syz_open_procfs(0x0, &(0x7f00000001c0)='net/vlan/vlan0\x00') 20:05:52 executing program 4: r0 = perf_event_open(0x0, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000018c00)={0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000400)=@bpf_ext={0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000380)={0x0, 0x0, 0x10000}, 0x10, 0x0, r1}, 0x80) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0xffffffffffffffff, 0x9, r0, 0x8) bpf$ENABLE_STATS(0x20, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40086602, &(0x7f0000000180)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) write$cgroup_type(r3, &(0x7f0000000080), 0x11ffffce1) perf_event_open(&(0x7f0000001940)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) perf_event_open(&(0x7f0000000400)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x32600) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x660c, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x48800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000080)}, 0x400, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000), 0x248800) 20:05:52 executing program 2: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffbffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x1, 0x8010000000000084) setsockopt$inet6_IPV6_RTHDR(r2, 0x29, 0x39, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x58) bind$inet6(r2, &(0x7f0000000140)={0xa, 0x4e23, 0x0, @empty}, 0x1c) listen(r2, 0x10001) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, 0x0, &(0x7f00000001c0)) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, &(0x7f0000000100)) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/bus/input/devices\x00', 0x0, 0x0) io_setup(0x5, 0x0) io_submit(0x0, 0x1, &(0x7f00000007c0)=[&(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, r3, 0x0, 0x0, 0x100, 0x0, 0x6}]) r4 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000800), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_GET(r5, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, r6, 0x86a762f4dfb5c7dd}, 0x14}}, 0x0) r7 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000180), 0x4000, 0x0) sendmsg$L2TP_CMD_SESSION_DELETE(r3, &(0x7f0000000340)={&(0x7f0000000040), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x3c, r6, 0x4, 0x70bd25, 0x25dfdbff, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x3}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x1}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp6=r7}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x2}]}, 0x3c}}, 0x4000) connect$inet6(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r4, 0x84, 0x64, &(0x7f0000000200)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) r8 = socket(0x18, 0x2, 0x0) r9 = socket(0x18, 0x2, 0x0) dup2(r9, r8) ioctl$FS_IOC_ENABLE_VERITY(r8, 0x40806685, &(0x7f0000000480)={0x1, 0x3, 0x1000, 0x62, &(0x7f0000000240)="bd0504ca8d136a22ab7413131d9354c565a277d9e4e3108e4d2962715ba8c98f97c80ab0e4d0198db660761a31cbf27c4bbcbedeca0e8d6a9004649274f5d74ae8382b7c1a2c4e7f4f40503699b10ef0ab8281fb70949fbeb95d0d24c46fe6d98fba", 0x5b, 0x0, &(0x7f0000000380)="2c155ea9f06c0166da3eb92d94b69fd8aacec5c7049f6ca2336e160aeb5bc6c57f793320e18afe78559a57f5b043f89f427a8ab5495e3e26b39df95b39725f7f99a2715f94f85ed62e8913799de129a457a50b28fc72578e544eb4"}) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r4, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0xec034000, @loopback}], 0x1c) mmap(&(0x7f00000e4000/0x1000)=nil, 0x1000, 0x0, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) 20:05:53 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffbffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x1, 0x8010000000000084) setsockopt$inet6_IPV6_RTHDR(r2, 0x29, 0x39, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x58) bind$inet6(r2, &(0x7f0000000140)={0xa, 0x4e23, 0x0, @empty}, 0x1c) listen(r2, 0x10001) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, 0x0, &(0x7f00000001c0)) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, &(0x7f0000000100)) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/bus/input/devices\x00', 0x0, 0x0) io_setup(0x5, 0x0) io_submit(0x0, 0x1, &(0x7f00000007c0)=[&(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, r3, 0x0, 0x0, 0x100, 0x0, 0x6}]) r4 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000800), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_GET(r5, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, r6, 0x86a762f4dfb5c7dd}, 0x14}}, 0x0) r7 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000180), 0x4000, 0x0) sendmsg$L2TP_CMD_SESSION_DELETE(r3, &(0x7f0000000340)={&(0x7f0000000040), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x3c, r6, 0x4, 0x70bd25, 0x25dfdbff, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x3}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x1}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp6=r7}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x2}]}, 0x3c}}, 0x4000) connect$inet6(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r4, 0x84, 0x64, &(0x7f0000000200)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) r8 = socket(0x18, 0x2, 0x0) r9 = socket(0x18, 0x2, 0x0) dup2(r9, r8) ioctl$FS_IOC_ENABLE_VERITY(r8, 0x40806685, &(0x7f0000000480)={0x1, 0x3, 0x1000, 0x62, &(0x7f0000000240)="bd0504ca8d136a22ab7413131d9354c565a277d9e4e3108e4d2962715ba8c98f97c80ab0e4d0198db660761a31cbf27c4bbcbedeca0e8d6a9004649274f5d74ae8382b7c1a2c4e7f4f40503699b10ef0ab8281fb70949fbeb95d0d24c46fe6d98fba", 0x5b, 0x0, &(0x7f0000000380)="2c155ea9f06c0166da3eb92d94b69fd8aacec5c7049f6ca2336e160aeb5bc6c57f793320e18afe78559a57f5b043f89f427a8ab5495e3e26b39df95b39725f7f99a2715f94f85ed62e8913799de129a457a50b28fc72578e544eb4"}) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r4, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0xec034000, @loopback}], 0x1c) mmap(&(0x7f00000e4000/0x1000)=nil, 0x1000, 0x0, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) 20:05:53 executing program 2: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffbffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x1, 0x8010000000000084) setsockopt$inet6_IPV6_RTHDR(r2, 0x29, 0x39, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x58) bind$inet6(r2, &(0x7f0000000140)={0xa, 0x4e23, 0x0, @empty}, 0x1c) listen(r2, 0x10001) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, 0x0, &(0x7f00000001c0)) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, &(0x7f0000000100)) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/bus/input/devices\x00', 0x0, 0x0) io_setup(0x5, 0x0) io_submit(0x0, 0x1, &(0x7f00000007c0)=[&(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, r3, 0x0, 0x0, 0x100, 0x0, 0x6}]) r4 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000800), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_GET(r5, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, r6, 0x86a762f4dfb5c7dd}, 0x14}}, 0x0) r7 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000180), 0x4000, 0x0) sendmsg$L2TP_CMD_SESSION_DELETE(r3, &(0x7f0000000340)={&(0x7f0000000040), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x3c, r6, 0x4, 0x70bd25, 0x25dfdbff, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x3}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x1}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp6=r7}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x2}]}, 0x3c}}, 0x4000) connect$inet6(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r4, 0x84, 0x64, &(0x7f0000000200)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) r8 = socket(0x18, 0x2, 0x0) r9 = socket(0x18, 0x2, 0x0) dup2(r9, r8) ioctl$FS_IOC_ENABLE_VERITY(r8, 0x40806685, &(0x7f0000000480)={0x1, 0x3, 0x1000, 0x62, &(0x7f0000000240)="bd0504ca8d136a22ab7413131d9354c565a277d9e4e3108e4d2962715ba8c98f97c80ab0e4d0198db660761a31cbf27c4bbcbedeca0e8d6a9004649274f5d74ae8382b7c1a2c4e7f4f40503699b10ef0ab8281fb70949fbeb95d0d24c46fe6d98fba", 0x5b, 0x0, &(0x7f0000000380)="2c155ea9f06c0166da3eb92d94b69fd8aacec5c7049f6ca2336e160aeb5bc6c57f793320e18afe78559a57f5b043f89f427a8ab5495e3e26b39df95b39725f7f99a2715f94f85ed62e8913799de129a457a50b28fc72578e544eb4"}) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r4, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0xec034000, @loopback}], 0x1c) mmap(&(0x7f00000e4000/0x1000)=nil, 0x1000, 0x0, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) [ 326.826876] audit: type=1804 audit(1677355553.408:137): pid=15069 uid=0 auid=4294967295 ses=4294967295 op="invalid_pcr" cause="open_writers" comm="syz-executor.5" name="/root/syzkaller-testdir2782243939/syzkaller.gZJ0jW/250/bus" dev="sda1" ino=14083 res=1 20:05:53 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffbffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x1, 0x8010000000000084) setsockopt$inet6_IPV6_RTHDR(r2, 0x29, 0x39, &(0x7f0000000500)=ANY=[@ANYBLOB="1d0a02090000000020010000001000000000000000000001fe80000000000000000000000000009f1d8448e19d5b9e000000000000000001fc020000000000000000000000000001200100140000000000000000000000003f412f79a9ac9072b2fdfd52ffff8c2a62be0afa575562498b17300e85c25140bd9ddc7ff7e79c5b733c24f16b62ec0e22a39e17ed999f86323a17c66a775988fdb03b0210fa883c96612f08415db79d931e6224b8f0a4843fbc7065f98f2cdaa7a5047e62275d3df04c6810b05a19f83f127a4120f524f34d4bae85d576c1fef5010b0000457ffd7fdf0a36e9a966a91fff53c636151fc70e77feb2fe72d7fd2188296c6dfe72e79cb7e59f030000006cb2d6142a7b8726692ddf7189a79e81d8409069d726c761bf017c1f8840fb747ea63cea7f46271514a03447d9ef"], 0x58) bind$inet6(r2, &(0x7f0000000140)={0xa, 0x4e23, 0x0, @empty}, 0x1c) listen(r2, 0x10001) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, 0x0, &(0x7f00000001c0)) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, &(0x7f0000000100)) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/bus/input/devices\x00', 0x0, 0x0) io_setup(0x5, 0x0) io_submit(0x0, 0x1, &(0x7f00000007c0)=[&(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, r3, 0x0, 0x0, 0x100, 0x0, 0x6}]) r4 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000800), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_GET(r5, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, r6, 0x86a762f4dfb5c7dd}, 0x14}}, 0x0) r7 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000180), 0x4000, 0x0) sendmsg$L2TP_CMD_SESSION_DELETE(r3, &(0x7f0000000340)={&(0x7f0000000040), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x3c, r6, 0x4, 0x70bd25, 0x25dfdbff, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x3}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x1}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp6=r7}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x2}]}, 0x3c}}, 0x4000) connect$inet6(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r4, 0x84, 0x64, &(0x7f0000000200)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) r8 = socket(0x18, 0x2, 0x0) r9 = socket(0x18, 0x2, 0x0) dup2(r9, r8) ioctl$FS_IOC_ENABLE_VERITY(r8, 0x40806685, &(0x7f0000000480)={0x1, 0x3, 0x1000, 0x62, &(0x7f0000000240)="bd0504ca8d136a22ab7413131d9354c565a277d9e4e3108e4d2962715ba8c98f97c80ab0e4d0198db660761a31cbf27c4bbcbedeca0e8d6a9004649274f5d74ae8382b7c1a2c4e7f4f40503699b10ef0ab8281fb70949fbeb95d0d24c46fe6d98fba", 0x5b, 0x0, &(0x7f0000000380)="2c155ea9f06c0166da3eb92d94b69fd8aacec5c7049f6ca2336e160aeb5bc6c57f793320e18afe78559a57f5b043f89f427a8ab5495e3e26b39df95b39725f7f99a2715f94f85ed62e8913799de129a457a50b28fc72578e544eb4"}) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r4, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0xec034000, @loopback}], 0x1c) mmap(&(0x7f00000e4000/0x1000)=nil, 0x1000, 0x0, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) [ 327.009134] audit: type=1804 audit(1677355553.438:138): pid=15069 uid=0 auid=4294967295 ses=4294967295 op="invalid_pcr" cause="ToMToU" comm="syz-executor.5" name="/root/syzkaller-testdir2782243939/syzkaller.gZJ0jW/250/bus" dev="sda1" ino=14083 res=1 20:05:53 executing program 1: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c47, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x5, 0x8000000}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001080), 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000780)='ext4\x00', &(0x7f0000000240)='./file0\x00', 0x2000480, &(0x7f0000000000)=ANY=[], 0x1, 0x76a, &(0x7f0000000fc0)="$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") open(&(0x7f0000000080)='./bus\x00', 0x6fe44da629969272, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000004400)='./bus\x00', 0x1c1002, 0x0) write$binfmt_misc(r2, &(0x7f0000000500)=ANY=[], 0x5) sendfile(r2, r1, 0x0, 0x1ffff) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x9, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuset.effective_mems\x00', 0x275a, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cgroup.controllers\x00', 0x275a, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r4, 0xc028660f, &(0x7f0000000200)={0x0, r3, 0x1000000000000}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000500)={0x84, 0x2a, 0x7e2881d4b0058261, 0x0, 0x0, {0x1}, [@generic="e4bbac412a17305504ad793ea00a6a8b6af59b93a71efc64f1ba9ffd3d7708256fad7c8c336cf7184b2651994299cad739b99f592c800cf74bc91b2a206bbcf6fb80877577dabf5cd4ec9c33bad91823389f23299d0eeed20059627675267baeec666bd7148a371ce03cab9d2bd75f4e"]}, 0x84}, 0x1, 0x0, 0x0, 0x8}, 0x0) syz_genetlink_get_family_id$devlink(0x0, 0xffffffffffffffff) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r5, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000700)=@newsa={0x138, 0x10, 0x0, 0x0, 0x0, {{@in6=@rand_addr=' \x01\x00', @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}, {@in6=@empty, 0x0, 0x32}, @in=@loopback, {0x0, 0x0, 0xe033, 0x6, 0x0, 0xfffffffffffffffd}}, [@algo_comp={0x48, 0x3, {{'lzs\x00'}}}]}, 0x138}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r4, 0xc018937c, &(0x7f0000000180)={{0x1, 0x1, 0x18, r0}, './bus\x00'}) getsockopt$bt_l2cap_L2CAP_OPTIONS(r6, 0x6, 0x1, &(0x7f0000000280), &(0x7f00000002c0)=0xc) sendmsg$DEVLINK_CMD_SB_POOL_SET(0xffffffffffffffff, 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) syz_open_procfs(0x0, &(0x7f00000001c0)='net/vlan/vlan0\x00') [ 327.259808] audit: type=1804 audit(1677355553.458:139): pid=15070 uid=0 auid=4294967295 ses=4294967295 op="invalid_pcr" cause="open_writers" comm="syz-executor.1" name="/root/syzkaller-testdir3295352786/syzkaller.7PI3PL/232/bus" dev="sda1" ino=14099 res=1 20:05:53 executing program 2: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffbffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x1, 0x8010000000000084) setsockopt$inet6_IPV6_RTHDR(r2, 0x29, 0x39, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x58) bind$inet6(r2, &(0x7f0000000140)={0xa, 0x4e23, 0x0, @empty}, 0x1c) listen(r2, 0x10001) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, 0x0, &(0x7f00000001c0)) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, &(0x7f0000000100)) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/bus/input/devices\x00', 0x0, 0x0) io_setup(0x5, 0x0) io_submit(0x0, 0x1, &(0x7f00000007c0)=[&(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, r3, 0x0, 0x0, 0x100, 0x0, 0x6}]) r4 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000800), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_GET(r5, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, r6, 0x86a762f4dfb5c7dd}, 0x14}}, 0x0) r7 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000180), 0x4000, 0x0) sendmsg$L2TP_CMD_SESSION_DELETE(r3, &(0x7f0000000340)={&(0x7f0000000040), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x3c, r6, 0x4, 0x70bd25, 0x25dfdbff, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x3}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x1}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp6=r7}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x2}]}, 0x3c}}, 0x4000) connect$inet6(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r4, 0x84, 0x64, &(0x7f0000000200)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) r8 = socket(0x18, 0x2, 0x0) r9 = socket(0x18, 0x2, 0x0) dup2(r9, r8) ioctl$FS_IOC_ENABLE_VERITY(r8, 0x40806685, &(0x7f0000000480)={0x1, 0x3, 0x1000, 0x62, &(0x7f0000000240)="bd0504ca8d136a22ab7413131d9354c565a277d9e4e3108e4d2962715ba8c98f97c80ab0e4d0198db660761a31cbf27c4bbcbedeca0e8d6a9004649274f5d74ae8382b7c1a2c4e7f4f40503699b10ef0ab8281fb70949fbeb95d0d24c46fe6d98fba", 0x5b, 0x0, &(0x7f0000000380)="2c155ea9f06c0166da3eb92d94b69fd8aacec5c7049f6ca2336e160aeb5bc6c57f793320e18afe78559a57f5b043f89f427a8ab5495e3e26b39df95b39725f7f99a2715f94f85ed62e8913799de129a457a50b28fc72578e544eb4"}) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r4, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0xec034000, @loopback}], 0x1c) mmap(&(0x7f00000e4000/0x1000)=nil, 0x1000, 0x0, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) 20:05:53 executing program 5: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c47, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x5, 0x8000000}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001080), 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000780)='ext4\x00', &(0x7f0000000240)='./file0\x00', 0x2000480, &(0x7f0000000000)=ANY=[], 0x1, 0x76a, &(0x7f0000000fc0)="$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") open(&(0x7f0000000080)='./bus\x00', 0x6fe44da629969272, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000004400)='./bus\x00', 0x1c1002, 0x0) write$binfmt_misc(r2, &(0x7f0000000500)=ANY=[], 0x5) sendfile(r2, r1, 0x0, 0x1ffff) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x9, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuset.effective_mems\x00', 0x275a, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cgroup.controllers\x00', 0x275a, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r4, 0xc028660f, &(0x7f0000000200)={0x0, r3, 0x1000000000000}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000500)={0x84, 0x2a, 0x7e2881d4b0058261, 0x0, 0x0, {0x1}, [@generic="e4bbac412a17305504ad793ea00a6a8b6af59b93a71efc64f1ba9ffd3d7708256fad7c8c336cf7184b2651994299cad739b99f592c800cf74bc91b2a206bbcf6fb80877577dabf5cd4ec9c33bad91823389f23299d0eeed20059627675267baeec666bd7148a371ce03cab9d2bd75f4e"]}, 0x84}, 0x1, 0x0, 0x0, 0x8}, 0x0) syz_genetlink_get_family_id$devlink(0x0, 0xffffffffffffffff) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r5, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000700)=@newsa={0x138, 0x10, 0x0, 0x0, 0x0, {{@in6=@rand_addr=' \x01\x00', @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}, {@in6=@empty, 0x0, 0x32}, @in=@loopback, {0x0, 0x0, 0xe033, 0x6, 0x0, 0xfffffffffffffffd}}, [@algo_comp={0x48, 0x3, {{'lzs\x00'}}}]}, 0x138}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r4, 0xc018937c, &(0x7f0000000180)={{0x1, 0x1, 0x18, r0}, './bus\x00'}) getsockopt$bt_l2cap_L2CAP_OPTIONS(r6, 0x6, 0x1, &(0x7f0000000280), &(0x7f00000002c0)=0xc) sendmsg$DEVLINK_CMD_SB_POOL_SET(0xffffffffffffffff, 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) syz_open_procfs(0x0, &(0x7f00000001c0)='net/vlan/vlan0\x00') [ 327.336678] audit: type=1804 audit(1677355553.468:140): pid=15070 uid=0 auid=4294967295 ses=4294967295 op="invalid_pcr" cause="ToMToU" comm="syz-executor.1" name="/root/syzkaller-testdir3295352786/syzkaller.7PI3PL/232/bus" dev="sda1" ino=14099 res=1 20:05:54 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffbffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x1, 0x8010000000000084) setsockopt$inet6_IPV6_RTHDR(r2, 0x29, 0x39, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x58) bind$inet6(r2, &(0x7f0000000140)={0xa, 0x4e23, 0x0, @empty}, 0x1c) listen(r2, 0x10001) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, 0x0, &(0x7f00000001c0)) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, &(0x7f0000000100)) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/bus/input/devices\x00', 0x0, 0x0) io_setup(0x5, 0x0) io_submit(0x0, 0x1, &(0x7f00000007c0)=[&(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, r3, 0x0, 0x0, 0x100, 0x0, 0x6}]) r4 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000800), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_GET(r5, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, r6, 0x86a762f4dfb5c7dd}, 0x14}}, 0x0) r7 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000180), 0x4000, 0x0) sendmsg$L2TP_CMD_SESSION_DELETE(r3, &(0x7f0000000340)={&(0x7f0000000040), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x3c, r6, 0x4, 0x70bd25, 0x25dfdbff, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x3}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x1}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp6=r7}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x2}]}, 0x3c}}, 0x4000) connect$inet6(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r4, 0x84, 0x64, &(0x7f0000000200)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) r8 = socket(0x18, 0x2, 0x0) r9 = socket(0x18, 0x2, 0x0) dup2(r9, r8) ioctl$FS_IOC_ENABLE_VERITY(r8, 0x40806685, &(0x7f0000000480)={0x1, 0x3, 0x1000, 0x62, &(0x7f0000000240)="bd0504ca8d136a22ab7413131d9354c565a277d9e4e3108e4d2962715ba8c98f97c80ab0e4d0198db660761a31cbf27c4bbcbedeca0e8d6a9004649274f5d74ae8382b7c1a2c4e7f4f40503699b10ef0ab8281fb70949fbeb95d0d24c46fe6d98fba", 0x5b, 0x0, &(0x7f0000000380)="2c155ea9f06c0166da3eb92d94b69fd8aacec5c7049f6ca2336e160aeb5bc6c57f793320e18afe78559a57f5b043f89f427a8ab5495e3e26b39df95b39725f7f99a2715f94f85ed62e8913799de129a457a50b28fc72578e544eb4"}) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r4, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0xec034000, @loopback}], 0x1c) mmap(&(0x7f00000e4000/0x1000)=nil, 0x1000, 0x0, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) 20:05:54 executing program 4: r0 = perf_event_open(0x0, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000018c00)={0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000400)=@bpf_ext={0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000380)={0x0, 0x0, 0x10000}, 0x10, 0x0, r1}, 0x80) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0xffffffffffffffff, 0x9, r0, 0x8) bpf$ENABLE_STATS(0x20, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40086602, &(0x7f0000000180)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) write$cgroup_type(r3, &(0x7f0000000080), 0x11ffffce1) perf_event_open(&(0x7f0000001940)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) perf_event_open(&(0x7f0000000400)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x32600) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x660c, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x48800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000080)}, 0x400, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000), 0x248800) 20:05:54 executing program 2: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffbffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x1, 0x8010000000000084) setsockopt$inet6_IPV6_RTHDR(r2, 0x29, 0x39, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x58) bind$inet6(r2, &(0x7f0000000140)={0xa, 0x4e23, 0x0, @empty}, 0x1c) listen(r2, 0x10001) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, 0x0, &(0x7f00000001c0)) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, &(0x7f0000000100)) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/bus/input/devices\x00', 0x0, 0x0) io_setup(0x5, 0x0) io_submit(0x0, 0x1, &(0x7f00000007c0)=[&(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, r3, 0x0, 0x0, 0x100, 0x0, 0x6}]) r4 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000800), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_GET(r5, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, r6, 0x86a762f4dfb5c7dd}, 0x14}}, 0x0) r7 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000180), 0x4000, 0x0) sendmsg$L2TP_CMD_SESSION_DELETE(r3, &(0x7f0000000340)={&(0x7f0000000040), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x3c, r6, 0x4, 0x70bd25, 0x25dfdbff, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x3}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x1}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp6=r7}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x2}]}, 0x3c}}, 0x4000) connect$inet6(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r4, 0x84, 0x64, &(0x7f0000000200)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) r8 = socket(0x18, 0x2, 0x0) r9 = socket(0x18, 0x2, 0x0) dup2(r9, r8) ioctl$FS_IOC_ENABLE_VERITY(r8, 0x40806685, &(0x7f0000000480)={0x1, 0x3, 0x1000, 0x62, &(0x7f0000000240)="bd0504ca8d136a22ab7413131d9354c565a277d9e4e3108e4d2962715ba8c98f97c80ab0e4d0198db660761a31cbf27c4bbcbedeca0e8d6a9004649274f5d74ae8382b7c1a2c4e7f4f40503699b10ef0ab8281fb70949fbeb95d0d24c46fe6d98fba", 0x5b, 0x0, &(0x7f0000000380)="2c155ea9f06c0166da3eb92d94b69fd8aacec5c7049f6ca2336e160aeb5bc6c57f793320e18afe78559a57f5b043f89f427a8ab5495e3e26b39df95b39725f7f99a2715f94f85ed62e8913799de129a457a50b28fc72578e544eb4"}) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r4, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0xec034000, @loopback}], 0x1c) mmap(&(0x7f00000e4000/0x1000)=nil, 0x1000, 0x0, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) 20:05:54 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffbffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x1, 0x8010000000000084) setsockopt$inet6_IPV6_RTHDR(r2, 0x29, 0x39, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x58) bind$inet6(r2, &(0x7f0000000140)={0xa, 0x4e23, 0x0, @empty}, 0x1c) listen(r2, 0x10001) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, 0x0, &(0x7f00000001c0)) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, &(0x7f0000000100)) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/bus/input/devices\x00', 0x0, 0x0) io_setup(0x5, 0x0) io_submit(0x0, 0x1, &(0x7f00000007c0)=[&(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, r3, 0x0, 0x0, 0x100, 0x0, 0x6}]) r4 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000800), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_GET(r5, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, r6, 0x86a762f4dfb5c7dd}, 0x14}}, 0x0) r7 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000180), 0x4000, 0x0) sendmsg$L2TP_CMD_SESSION_DELETE(r3, &(0x7f0000000340)={&(0x7f0000000040), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x3c, r6, 0x4, 0x70bd25, 0x25dfdbff, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x3}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x1}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp6=r7}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x2}]}, 0x3c}}, 0x4000) connect$inet6(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r4, 0x84, 0x64, &(0x7f0000000200)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) r8 = socket(0x18, 0x2, 0x0) r9 = socket(0x18, 0x2, 0x0) dup2(r9, r8) ioctl$FS_IOC_ENABLE_VERITY(r8, 0x40806685, &(0x7f0000000480)={0x1, 0x3, 0x1000, 0x62, &(0x7f0000000240)="bd0504ca8d136a22ab7413131d9354c565a277d9e4e3108e4d2962715ba8c98f97c80ab0e4d0198db660761a31cbf27c4bbcbedeca0e8d6a9004649274f5d74ae8382b7c1a2c4e7f4f40503699b10ef0ab8281fb70949fbeb95d0d24c46fe6d98fba", 0x5b, 0x0, &(0x7f0000000380)="2c155ea9f06c0166da3eb92d94b69fd8aacec5c7049f6ca2336e160aeb5bc6c57f793320e18afe78559a57f5b043f89f427a8ab5495e3e26b39df95b39725f7f99a2715f94f85ed62e8913799de129a457a50b28fc72578e544eb4"}) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r4, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0xec034000, @loopback}], 0x1c) mmap(&(0x7f00000e4000/0x1000)=nil, 0x1000, 0x0, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) 20:05:54 executing program 2: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffbffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x1, 0x8010000000000084) setsockopt$inet6_IPV6_RTHDR(r2, 0x29, 0x39, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x58) bind$inet6(r2, &(0x7f0000000140)={0xa, 0x4e23, 0x0, @empty}, 0x1c) listen(r2, 0x10001) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, 0x0, &(0x7f00000001c0)) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, &(0x7f0000000100)) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/bus/input/devices\x00', 0x0, 0x0) io_setup(0x5, 0x0) io_submit(0x0, 0x1, &(0x7f00000007c0)=[&(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, r3, 0x0, 0x0, 0x100, 0x0, 0x6}]) r4 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000800), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_GET(r5, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, r6, 0x86a762f4dfb5c7dd}, 0x14}}, 0x0) r7 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000180), 0x4000, 0x0) sendmsg$L2TP_CMD_SESSION_DELETE(r3, &(0x7f0000000340)={&(0x7f0000000040), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x3c, r6, 0x4, 0x70bd25, 0x25dfdbff, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x3}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x1}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp6=r7}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x2}]}, 0x3c}}, 0x4000) connect$inet6(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r4, 0x84, 0x64, &(0x7f0000000200)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) r8 = socket(0x18, 0x2, 0x0) r9 = socket(0x18, 0x2, 0x0) dup2(r9, r8) ioctl$FS_IOC_ENABLE_VERITY(r8, 0x40806685, &(0x7f0000000480)={0x1, 0x3, 0x1000, 0x62, &(0x7f0000000240)="bd0504ca8d136a22ab7413131d9354c565a277d9e4e3108e4d2962715ba8c98f97c80ab0e4d0198db660761a31cbf27c4bbcbedeca0e8d6a9004649274f5d74ae8382b7c1a2c4e7f4f40503699b10ef0ab8281fb70949fbeb95d0d24c46fe6d98fba", 0x5b, 0x0, &(0x7f0000000380)="2c155ea9f06c0166da3eb92d94b69fd8aacec5c7049f6ca2336e160aeb5bc6c57f793320e18afe78559a57f5b043f89f427a8ab5495e3e26b39df95b39725f7f99a2715f94f85ed62e8913799de129a457a50b28fc72578e544eb4"}) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r4, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0xec034000, @loopback}], 0x1c) mmap(&(0x7f00000e4000/0x1000)=nil, 0x1000, 0x0, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) 20:05:54 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffbffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x1, 0x8010000000000084) setsockopt$inet6_IPV6_RTHDR(r2, 0x29, 0x39, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x58) bind$inet6(r2, &(0x7f0000000140)={0xa, 0x4e23, 0x0, @empty}, 0x1c) listen(r2, 0x10001) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, 0x0, &(0x7f00000001c0)) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, &(0x7f0000000100)) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/bus/input/devices\x00', 0x0, 0x0) io_setup(0x5, 0x0) io_submit(0x0, 0x1, &(0x7f00000007c0)=[&(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, r3, 0x0, 0x0, 0x100, 0x0, 0x6}]) r4 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000800), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_GET(r5, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, r6, 0x86a762f4dfb5c7dd}, 0x14}}, 0x0) r7 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000180), 0x4000, 0x0) sendmsg$L2TP_CMD_SESSION_DELETE(r3, &(0x7f0000000340)={&(0x7f0000000040), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x3c, r6, 0x4, 0x70bd25, 0x25dfdbff, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x3}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x1}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp6=r7}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x2}]}, 0x3c}}, 0x4000) connect$inet6(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r4, 0x84, 0x64, &(0x7f0000000200)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) r8 = socket(0x18, 0x2, 0x0) r9 = socket(0x18, 0x2, 0x0) dup2(r9, r8) ioctl$FS_IOC_ENABLE_VERITY(r8, 0x40806685, &(0x7f0000000480)={0x1, 0x3, 0x1000, 0x62, &(0x7f0000000240)="bd0504ca8d136a22ab7413131d9354c565a277d9e4e3108e4d2962715ba8c98f97c80ab0e4d0198db660761a31cbf27c4bbcbedeca0e8d6a9004649274f5d74ae8382b7c1a2c4e7f4f40503699b10ef0ab8281fb70949fbeb95d0d24c46fe6d98fba", 0x5b, 0x0, &(0x7f0000000380)="2c155ea9f06c0166da3eb92d94b69fd8aacec5c7049f6ca2336e160aeb5bc6c57f793320e18afe78559a57f5b043f89f427a8ab5495e3e26b39df95b39725f7f99a2715f94f85ed62e8913799de129a457a50b28fc72578e544eb4"}) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r4, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0xec034000, @loopback}], 0x1c) mmap(&(0x7f00000e4000/0x1000)=nil, 0x1000, 0x0, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) 20:05:55 executing program 1: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c47, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x5, 0x8000000}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001080), 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000780)='ext4\x00', &(0x7f0000000240)='./file0\x00', 0x2000480, &(0x7f0000000000)=ANY=[], 0x1, 0x76a, &(0x7f0000000fc0)="$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") open(&(0x7f0000000080)='./bus\x00', 0x6fe44da629969272, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000004400)='./bus\x00', 0x1c1002, 0x0) write$binfmt_misc(r2, &(0x7f0000000500)=ANY=[], 0x5) sendfile(r2, r1, 0x0, 0x1ffff) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x9, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuset.effective_mems\x00', 0x275a, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cgroup.controllers\x00', 0x275a, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r4, 0xc028660f, &(0x7f0000000200)={0x0, r3, 0x1000000000000}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000500)={0x84, 0x2a, 0x7e2881d4b0058261, 0x0, 0x0, {0x1}, [@generic="e4bbac412a17305504ad793ea00a6a8b6af59b93a71efc64f1ba9ffd3d7708256fad7c8c336cf7184b2651994299cad739b99f592c800cf74bc91b2a206bbcf6fb80877577dabf5cd4ec9c33bad91823389f23299d0eeed20059627675267baeec666bd7148a371ce03cab9d2bd75f4e"]}, 0x84}, 0x1, 0x0, 0x0, 0x8}, 0x0) syz_genetlink_get_family_id$devlink(0x0, 0xffffffffffffffff) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r5, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000700)=@newsa={0x138, 0x10, 0x0, 0x0, 0x0, {{@in6=@rand_addr=' \x01\x00', @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}, {@in6=@empty, 0x0, 0x32}, @in=@loopback, {0x0, 0x0, 0xe033, 0x6, 0x0, 0xfffffffffffffffd}}, [@algo_comp={0x48, 0x3, {{'lzs\x00'}}}]}, 0x138}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r4, 0xc018937c, &(0x7f0000000180)={{0x1, 0x1, 0x18, r0}, './bus\x00'}) getsockopt$bt_l2cap_L2CAP_OPTIONS(r6, 0x6, 0x1, &(0x7f0000000280), &(0x7f00000002c0)=0xc) sendmsg$DEVLINK_CMD_SB_POOL_SET(0xffffffffffffffff, 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) syz_open_procfs(0x0, &(0x7f00000001c0)='net/vlan/vlan0\x00') 20:05:55 executing program 5: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c47, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x5, 0x8000000}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001080), 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000780)='ext4\x00', &(0x7f0000000240)='./file0\x00', 0x2000480, &(0x7f0000000000)=ANY=[], 0x1, 0x76a, &(0x7f0000000fc0)="$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") open(&(0x7f0000000080)='./bus\x00', 0x6fe44da629969272, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000004400)='./bus\x00', 0x1c1002, 0x0) write$binfmt_misc(r2, &(0x7f0000000500)=ANY=[], 0x5) sendfile(r2, r1, 0x0, 0x1ffff) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x9, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuset.effective_mems\x00', 0x275a, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cgroup.controllers\x00', 0x275a, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r4, 0xc028660f, &(0x7f0000000200)={0x0, r3, 0x1000000000000}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000500)={0x84, 0x2a, 0x7e2881d4b0058261, 0x0, 0x0, {0x1}, [@generic="e4bbac412a17305504ad793ea00a6a8b6af59b93a71efc64f1ba9ffd3d7708256fad7c8c336cf7184b2651994299cad739b99f592c800cf74bc91b2a206bbcf6fb80877577dabf5cd4ec9c33bad91823389f23299d0eeed20059627675267baeec666bd7148a371ce03cab9d2bd75f4e"]}, 0x84}, 0x1, 0x0, 0x0, 0x8}, 0x0) syz_genetlink_get_family_id$devlink(0x0, 0xffffffffffffffff) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r5, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000700)=@newsa={0x138, 0x10, 0x0, 0x0, 0x0, {{@in6=@rand_addr=' \x01\x00', @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}, {@in6=@empty, 0x0, 0x32}, @in=@loopback, {0x0, 0x0, 0xe033, 0x6, 0x0, 0xfffffffffffffffd}}, [@algo_comp={0x48, 0x3, {{'lzs\x00'}}}]}, 0x138}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r4, 0xc018937c, &(0x7f0000000180)={{0x1, 0x1, 0x18, r0}, './bus\x00'}) getsockopt$bt_l2cap_L2CAP_OPTIONS(r6, 0x6, 0x1, &(0x7f0000000280), &(0x7f00000002c0)=0xc) sendmsg$DEVLINK_CMD_SB_POOL_SET(0xffffffffffffffff, 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) syz_open_procfs(0x0, &(0x7f00000001c0)='net/vlan/vlan0\x00') 20:05:55 executing program 2: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffbffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x1, 0x8010000000000084) setsockopt$inet6_IPV6_RTHDR(r2, 0x29, 0x39, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x58) bind$inet6(r2, &(0x7f0000000140)={0xa, 0x4e23, 0x0, @empty}, 0x1c) listen(r2, 0x10001) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, 0x0, &(0x7f00000001c0)) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, &(0x7f0000000100)) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/bus/input/devices\x00', 0x0, 0x0) io_setup(0x5, 0x0) io_submit(0x0, 0x1, &(0x7f00000007c0)=[&(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, r3, 0x0, 0x0, 0x100, 0x0, 0x6}]) r4 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000800), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_GET(r5, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, r6, 0x86a762f4dfb5c7dd}, 0x14}}, 0x0) r7 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000180), 0x4000, 0x0) sendmsg$L2TP_CMD_SESSION_DELETE(r3, &(0x7f0000000340)={&(0x7f0000000040), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x3c, r6, 0x4, 0x70bd25, 0x25dfdbff, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x3}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x1}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp6=r7}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x2}]}, 0x3c}}, 0x4000) connect$inet6(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r4, 0x84, 0x64, &(0x7f0000000200)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) r8 = socket(0x18, 0x2, 0x0) r9 = socket(0x18, 0x2, 0x0) dup2(r9, r8) ioctl$FS_IOC_ENABLE_VERITY(r8, 0x40806685, &(0x7f0000000480)={0x1, 0x3, 0x1000, 0x62, &(0x7f0000000240)="bd0504ca8d136a22ab7413131d9354c565a277d9e4e3108e4d2962715ba8c98f97c80ab0e4d0198db660761a31cbf27c4bbcbedeca0e8d6a9004649274f5d74ae8382b7c1a2c4e7f4f40503699b10ef0ab8281fb70949fbeb95d0d24c46fe6d98fba", 0x5b, 0x0, &(0x7f0000000380)="2c155ea9f06c0166da3eb92d94b69fd8aacec5c7049f6ca2336e160aeb5bc6c57f793320e18afe78559a57f5b043f89f427a8ab5495e3e26b39df95b39725f7f99a2715f94f85ed62e8913799de129a457a50b28fc72578e544eb4"}) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r4, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0xec034000, @loopback}], 0x1c) mmap(&(0x7f00000e4000/0x1000)=nil, 0x1000, 0x0, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) 20:05:55 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffbffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x1, 0x8010000000000084) setsockopt$inet6_IPV6_RTHDR(r2, 0x29, 0x39, &(0x7f0000000500)=ANY=[@ANYBLOB="1d0a02090000000020010000001000000000000000000001fe80000000000000000000000000009f1d8448e19d5b9e000000000000000001fc020000000000000000000000000001200100140000000000000000000000003f412f79a9ac9072b2fdfd52ffff8c2a62be0afa575562498b17300e85c25140bd9ddc7ff7e79c5b733c24f16b62ec0e22a39e17ed999f86323a17c66a775988fdb03b0210fa883c96612f08415db79d931e6224b8f0a4843fbc7065f98f2cdaa7a5047e62275d3df04c6810b05a19f83f127a4120f524f34d4bae85d576c1fef5010b0000457ffd7fdf0a36e9a966a91fff53c636151fc70e77feb2fe72d7fd2188296c6dfe72e79cb7e59f030000006cb2d6142a7b8726692ddf7189a79e81d8409069d726c761bf017c1f8840fb747ea63cea7f46271514a03447d9ef"], 0x58) bind$inet6(r2, &(0x7f0000000140)={0xa, 0x4e23, 0x0, @empty}, 0x1c) listen(r2, 0x10001) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, 0x0, &(0x7f00000001c0)) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, &(0x7f0000000100)) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/bus/input/devices\x00', 0x0, 0x0) io_setup(0x5, 0x0) io_submit(0x0, 0x1, &(0x7f00000007c0)=[&(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, r3, 0x0, 0x0, 0x100, 0x0, 0x6}]) r4 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000800), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_GET(r5, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, r6, 0x86a762f4dfb5c7dd}, 0x14}}, 0x0) r7 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000180), 0x4000, 0x0) sendmsg$L2TP_CMD_SESSION_DELETE(r3, &(0x7f0000000340)={&(0x7f0000000040), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x3c, r6, 0x4, 0x70bd25, 0x25dfdbff, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x3}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x1}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp6=r7}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x2}]}, 0x3c}}, 0x4000) connect$inet6(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r4, 0x84, 0x64, &(0x7f0000000200)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) r8 = socket(0x18, 0x2, 0x0) r9 = socket(0x18, 0x2, 0x0) dup2(r9, r8) ioctl$FS_IOC_ENABLE_VERITY(r8, 0x40806685, &(0x7f0000000480)={0x1, 0x3, 0x1000, 0x62, &(0x7f0000000240)="bd0504ca8d136a22ab7413131d9354c565a277d9e4e3108e4d2962715ba8c98f97c80ab0e4d0198db660761a31cbf27c4bbcbedeca0e8d6a9004649274f5d74ae8382b7c1a2c4e7f4f40503699b10ef0ab8281fb70949fbeb95d0d24c46fe6d98fba", 0x5b, 0x0, &(0x7f0000000380)="2c155ea9f06c0166da3eb92d94b69fd8aacec5c7049f6ca2336e160aeb5bc6c57f793320e18afe78559a57f5b043f89f427a8ab5495e3e26b39df95b39725f7f99a2715f94f85ed62e8913799de129a457a50b28fc72578e544eb4"}) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r4, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0xec034000, @loopback}], 0x1c) mmap(&(0x7f00000e4000/0x1000)=nil, 0x1000, 0x0, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) 20:05:55 executing program 2: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffbffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x1, 0x8010000000000084) setsockopt$inet6_IPV6_RTHDR(r2, 0x29, 0x39, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x58) bind$inet6(r2, &(0x7f0000000140)={0xa, 0x4e23, 0x0, @empty}, 0x1c) listen(r2, 0x10001) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, 0x0, &(0x7f00000001c0)) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, &(0x7f0000000100)) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/bus/input/devices\x00', 0x0, 0x0) io_setup(0x5, 0x0) io_submit(0x0, 0x1, &(0x7f00000007c0)=[&(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, r3, 0x0, 0x0, 0x100, 0x0, 0x6}]) r4 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000800), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_GET(r5, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, r6, 0x86a762f4dfb5c7dd}, 0x14}}, 0x0) r7 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000180), 0x4000, 0x0) sendmsg$L2TP_CMD_SESSION_DELETE(r3, &(0x7f0000000340)={&(0x7f0000000040), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x3c, r6, 0x4, 0x70bd25, 0x25dfdbff, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x3}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x1}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp6=r7}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x2}]}, 0x3c}}, 0x4000) connect$inet6(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r4, 0x84, 0x64, &(0x7f0000000200)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) r8 = socket(0x18, 0x2, 0x0) r9 = socket(0x18, 0x2, 0x0) dup2(r9, r8) ioctl$FS_IOC_ENABLE_VERITY(r8, 0x40806685, &(0x7f0000000480)={0x1, 0x3, 0x1000, 0x62, &(0x7f0000000240)="bd0504ca8d136a22ab7413131d9354c565a277d9e4e3108e4d2962715ba8c98f97c80ab0e4d0198db660761a31cbf27c4bbcbedeca0e8d6a9004649274f5d74ae8382b7c1a2c4e7f4f40503699b10ef0ab8281fb70949fbeb95d0d24c46fe6d98fba", 0x5b, 0x0, &(0x7f0000000380)="2c155ea9f06c0166da3eb92d94b69fd8aacec5c7049f6ca2336e160aeb5bc6c57f793320e18afe78559a57f5b043f89f427a8ab5495e3e26b39df95b39725f7f99a2715f94f85ed62e8913799de129a457a50b28fc72578e544eb4"}) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r4, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0xec034000, @loopback}], 0x1c) mmap(&(0x7f00000e4000/0x1000)=nil, 0x1000, 0x0, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) 20:05:55 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffbffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x1, 0x8010000000000084) setsockopt$inet6_IPV6_RTHDR(r2, 0x29, 0x39, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x58) bind$inet6(r2, &(0x7f0000000140)={0xa, 0x4e23, 0x0, @empty}, 0x1c) listen(r2, 0x10001) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, 0x0, &(0x7f00000001c0)) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, &(0x7f0000000100)) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/bus/input/devices\x00', 0x0, 0x0) io_setup(0x5, 0x0) io_submit(0x0, 0x1, &(0x7f00000007c0)=[&(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, r3, 0x0, 0x0, 0x100, 0x0, 0x6}]) r4 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000800), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_GET(r5, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, r6, 0x86a762f4dfb5c7dd}, 0x14}}, 0x0) r7 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000180), 0x4000, 0x0) sendmsg$L2TP_CMD_SESSION_DELETE(r3, &(0x7f0000000340)={&(0x7f0000000040), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x3c, r6, 0x4, 0x70bd25, 0x25dfdbff, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x3}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x1}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp6=r7}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x2}]}, 0x3c}}, 0x4000) connect$inet6(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r4, 0x84, 0x64, &(0x7f0000000200)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) r8 = socket(0x18, 0x2, 0x0) r9 = socket(0x18, 0x2, 0x0) dup2(r9, r8) ioctl$FS_IOC_ENABLE_VERITY(r8, 0x40806685, &(0x7f0000000480)={0x1, 0x3, 0x1000, 0x62, &(0x7f0000000240)="bd0504ca8d136a22ab7413131d9354c565a277d9e4e3108e4d2962715ba8c98f97c80ab0e4d0198db660761a31cbf27c4bbcbedeca0e8d6a9004649274f5d74ae8382b7c1a2c4e7f4f40503699b10ef0ab8281fb70949fbeb95d0d24c46fe6d98fba", 0x5b, 0x0, &(0x7f0000000380)="2c155ea9f06c0166da3eb92d94b69fd8aacec5c7049f6ca2336e160aeb5bc6c57f793320e18afe78559a57f5b043f89f427a8ab5495e3e26b39df95b39725f7f99a2715f94f85ed62e8913799de129a457a50b28fc72578e544eb4"}) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r4, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0xec034000, @loopback}], 0x1c) mmap(&(0x7f00000e4000/0x1000)=nil, 0x1000, 0x0, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) 20:05:56 executing program 2: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c47, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x5, 0x8000000}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001080), 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000780)='ext4\x00', &(0x7f0000000240)='./file0\x00', 0x2000480, &(0x7f0000000000)=ANY=[], 0x1, 0x76a, &(0x7f0000000fc0)="$eJzs3d9rW1UcAPDvTdt17aatIOh8KghaGEvtrJuCDxMfRHAw0Ge3kGZlNm1Gk461FNwQwRdBxQdBX/bsj/nmqz9e9b/wQTamdsOJD1K5adJla9KlW5MI+XzgNOfce9Nzvjn3nnuSe0kC6FsT6Z9MxKGI+CiJGKstTyJiqJobjDixud3t9bV8mpLY2Hjzj6S6za31tXw0PCd1oFZ4MiJ+fD/icGZ7veWV1flcsVhYqpWnKgvnp8orq0fOLeTmCnOFxWPTMzNHj79w/NjexfrXL6sHr3/82rPfnPjnvSeufvhTEifiYG1dYxx7ZSImaq/JUPoS3uXVva6sx5JeN4AHkh6aA5tHeRyKsRio5loY6WbLAIBOeTciNgCAPpM4/wNAn6l/DnBrfS1fT739RKK7brwSEfs3469f39xcM1i7Zre/eh109FZy15WRJCLG96D+iYj44ru3v0pTdOg6JEAzly5HxJnxie3jf7LtnoXdeq6NbSbuKRv/oHu+T+c/Lzab/2W25j/RZP4z3OTYfRD3P/4z1/agmpbS+d/LDfe23W6Iv2Z8oFZ6pDrnG0rOnisW0rHt0YiYjKHhtDy9Qx2TN/+92Wpd4/zvz0/e+TKtP328s0Xm2uDw3c+ZzVVyDxNzoxuXI54abBZ/stX/SYv576k263j9pQ8+b7UujT+Nt562x99ZG1cinmna/3fuaEt2vD9xqro7TNV3iia+/fWz0Vb1N/Z/mtL66+8FuiHt/9Gd4x9PGu/XLO++jp+vjP3Qat3942++/+9L3qrm99WWXcxVKkvTEfuSN7YvP3rnufVyffs0/smnmx//O+3/6XvCM23GP3j9968fPP7OSuOf3VX/7z5z9fb8QKv62+v/mWpusraknfGv3QY+zGsHAAAAAAAAAAAAAAAAAAAAAAAAAO3KRMTBSDLZrXwmk81u/ob34zGaKZbKlcNnS8uLs1H9rezxGMrUv+pyrOH7UKdr34dfLx+9p/x8RDwWEZ8Oj1TL2XypONvr4AEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACg5kCL3/9P/Tbc69YBAB2zv9cNAAC6zvkfAPrP7s7/Ix1rBwDQPd7/A0D/cf4HgP7j/A8AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAECHnTp5Mk0bf6+v5dPy7IWV5fnShSOzhfJ8dmE5n82Xls5n50qluWIhmy8ttPxHlzYfiqXS+ZlYXL44VSmUK1PlldXTC6Xlxcrpcwu5ucLpwlDXIgMAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACA9pVXVudzxWJhSUZGRmYr0zhKjPRugAIAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAD4n/svAAD//9EyKso=") open(&(0x7f0000000080)='./bus\x00', 0x6fe44da629969272, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000004400)='./bus\x00', 0x1c1002, 0x0) write$binfmt_misc(r2, &(0x7f0000000500)=ANY=[], 0x5) sendfile(r2, r1, 0x0, 0x1ffff) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x9, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuset.effective_mems\x00', 0x275a, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cgroup.controllers\x00', 0x275a, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r4, 0xc028660f, &(0x7f0000000200)={0x0, r3, 0x1000000000000}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000500)={0x84, 0x2a, 0x7e2881d4b0058261, 0x0, 0x0, {0x1}, [@generic="e4bbac412a17305504ad793ea00a6a8b6af59b93a71efc64f1ba9ffd3d7708256fad7c8c336cf7184b2651994299cad739b99f592c800cf74bc91b2a206bbcf6fb80877577dabf5cd4ec9c33bad91823389f23299d0eeed20059627675267baeec666bd7148a371ce03cab9d2bd75f4e"]}, 0x84}, 0x1, 0x0, 0x0, 0x8}, 0x0) syz_genetlink_get_family_id$devlink(0x0, 0xffffffffffffffff) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r5, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000700)=@newsa={0x138, 0x10, 0x0, 0x0, 0x0, {{@in6=@rand_addr=' \x01\x00', @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}, {@in6=@empty, 0x0, 0x32}, @in=@loopback, {0x0, 0x0, 0xe033, 0x6, 0x0, 0xfffffffffffffffd}}, [@algo_comp={0x48, 0x3, {{'lzs\x00'}}}]}, 0x138}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r4, 0xc018937c, &(0x7f0000000180)={{0x1, 0x1, 0x18, r0}, './bus\x00'}) getsockopt$bt_l2cap_L2CAP_OPTIONS(r6, 0x6, 0x1, &(0x7f0000000280), &(0x7f00000002c0)=0xc) sendmsg$DEVLINK_CMD_SB_POOL_SET(0xffffffffffffffff, 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) syz_open_procfs(0x0, &(0x7f00000001c0)='net/vlan/vlan0\x00') 20:05:56 executing program 4: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c47, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x5, 0x8000000}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001080), 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000780)='ext4\x00', &(0x7f0000000240)='./file0\x00', 0x2000480, &(0x7f0000000000)=ANY=[], 0x1, 0x76a, &(0x7f0000000fc0)="$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") open(&(0x7f0000000080)='./bus\x00', 0x6fe44da629969272, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000004400)='./bus\x00', 0x1c1002, 0x0) write$binfmt_misc(r2, &(0x7f0000000500)=ANY=[], 0x5) sendfile(r2, r1, 0x0, 0x1ffff) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x9, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuset.effective_mems\x00', 0x275a, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cgroup.controllers\x00', 0x275a, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r4, 0xc028660f, &(0x7f0000000200)={0x0, r3, 0x1000000000000}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000500)={0x84, 0x2a, 0x7e2881d4b0058261, 0x0, 0x0, {0x1}, [@generic="e4bbac412a17305504ad793ea00a6a8b6af59b93a71efc64f1ba9ffd3d7708256fad7c8c336cf7184b2651994299cad739b99f592c800cf74bc91b2a206bbcf6fb80877577dabf5cd4ec9c33bad91823389f23299d0eeed20059627675267baeec666bd7148a371ce03cab9d2bd75f4e"]}, 0x84}, 0x1, 0x0, 0x0, 0x8}, 0x0) syz_genetlink_get_family_id$devlink(0x0, 0xffffffffffffffff) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r5, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000700)=@newsa={0x138, 0x10, 0x0, 0x0, 0x0, {{@in6=@rand_addr=' \x01\x00', @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}, {@in6=@empty, 0x0, 0x32}, @in=@loopback, {0x0, 0x0, 0xe033, 0x6, 0x0, 0xfffffffffffffffd}}, [@algo_comp={0x48, 0x3, {{'lzs\x00'}}}]}, 0x138}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r4, 0xc018937c, &(0x7f0000000180)={{0x1, 0x1, 0x18, r0}, './bus\x00'}) getsockopt$bt_l2cap_L2CAP_OPTIONS(r6, 0x6, 0x1, &(0x7f0000000280), &(0x7f00000002c0)=0xc) sendmsg$DEVLINK_CMD_SB_POOL_SET(0xffffffffffffffff, 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) syz_open_procfs(0x0, &(0x7f00000001c0)='net/vlan/vlan0\x00') 20:05:56 executing program 1: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c47, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x5, 0x8000000}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001080), 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000780)='ext4\x00', &(0x7f0000000240)='./file0\x00', 0x2000480, &(0x7f0000000000)=ANY=[], 0x1, 0x76a, &(0x7f0000000fc0)="$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") open(&(0x7f0000000080)='./bus\x00', 0x6fe44da629969272, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000004400)='./bus\x00', 0x1c1002, 0x0) write$binfmt_misc(r2, &(0x7f0000000500)=ANY=[], 0x5) sendfile(r2, r1, 0x0, 0x1ffff) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x9, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuset.effective_mems\x00', 0x275a, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cgroup.controllers\x00', 0x275a, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r4, 0xc028660f, &(0x7f0000000200)={0x0, r3, 0x1000000000000}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000500)={0x84, 0x2a, 0x7e2881d4b0058261, 0x0, 0x0, {0x1}, [@generic="e4bbac412a17305504ad793ea00a6a8b6af59b93a71efc64f1ba9ffd3d7708256fad7c8c336cf7184b2651994299cad739b99f592c800cf74bc91b2a206bbcf6fb80877577dabf5cd4ec9c33bad91823389f23299d0eeed20059627675267baeec666bd7148a371ce03cab9d2bd75f4e"]}, 0x84}, 0x1, 0x0, 0x0, 0x8}, 0x0) syz_genetlink_get_family_id$devlink(0x0, 0xffffffffffffffff) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r5, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000700)=@newsa={0x138, 0x10, 0x0, 0x0, 0x0, {{@in6=@rand_addr=' \x01\x00', @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}, {@in6=@empty, 0x0, 0x32}, @in=@loopback, {0x0, 0x0, 0xe033, 0x6, 0x0, 0xfffffffffffffffd}}, [@algo_comp={0x48, 0x3, {{'lzs\x00'}}}]}, 0x138}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r4, 0xc018937c, &(0x7f0000000180)={{0x1, 0x1, 0x18, r0}, './bus\x00'}) getsockopt$bt_l2cap_L2CAP_OPTIONS(r6, 0x6, 0x1, &(0x7f0000000280), &(0x7f00000002c0)=0xc) sendmsg$DEVLINK_CMD_SB_POOL_SET(0xffffffffffffffff, 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) syz_open_procfs(0x0, &(0x7f00000001c0)='net/vlan/vlan0\x00') 20:05:56 executing program 5: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c47, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x5, 0x8000000}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001080), 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000780)='ext4\x00', &(0x7f0000000240)='./file0\x00', 0x2000480, &(0x7f0000000000)=ANY=[], 0x1, 0x76a, &(0x7f0000000fc0)="$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") open(&(0x7f0000000080)='./bus\x00', 0x6fe44da629969272, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000004400)='./bus\x00', 0x1c1002, 0x0) write$binfmt_misc(r2, &(0x7f0000000500)=ANY=[], 0x5) sendfile(r2, r1, 0x0, 0x1ffff) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x9, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuset.effective_mems\x00', 0x275a, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cgroup.controllers\x00', 0x275a, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r4, 0xc028660f, &(0x7f0000000200)={0x0, r3, 0x1000000000000}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000500)={0x84, 0x2a, 0x7e2881d4b0058261, 0x0, 0x0, {0x1}, [@generic="e4bbac412a17305504ad793ea00a6a8b6af59b93a71efc64f1ba9ffd3d7708256fad7c8c336cf7184b2651994299cad739b99f592c800cf74bc91b2a206bbcf6fb80877577dabf5cd4ec9c33bad91823389f23299d0eeed20059627675267baeec666bd7148a371ce03cab9d2bd75f4e"]}, 0x84}, 0x1, 0x0, 0x0, 0x8}, 0x0) syz_genetlink_get_family_id$devlink(0x0, 0xffffffffffffffff) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r5, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000700)=@newsa={0x138, 0x10, 0x0, 0x0, 0x0, {{@in6=@rand_addr=' \x01\x00', @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}, {@in6=@empty, 0x0, 0x32}, @in=@loopback, {0x0, 0x0, 0xe033, 0x6, 0x0, 0xfffffffffffffffd}}, [@algo_comp={0x48, 0x3, {{'lzs\x00'}}}]}, 0x138}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r4, 0xc018937c, &(0x7f0000000180)={{0x1, 0x1, 0x18, r0}, './bus\x00'}) getsockopt$bt_l2cap_L2CAP_OPTIONS(r6, 0x6, 0x1, &(0x7f0000000280), &(0x7f00000002c0)=0xc) sendmsg$DEVLINK_CMD_SB_POOL_SET(0xffffffffffffffff, 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) syz_open_procfs(0x0, &(0x7f00000001c0)='net/vlan/vlan0\x00') 20:05:56 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffbffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x1, 0x8010000000000084) setsockopt$inet6_IPV6_RTHDR(r2, 0x29, 0x39, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x58) bind$inet6(r2, &(0x7f0000000140)={0xa, 0x4e23, 0x0, @empty}, 0x1c) listen(r2, 0x10001) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, 0x0, &(0x7f00000001c0)) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, &(0x7f0000000100)) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/bus/input/devices\x00', 0x0, 0x0) io_setup(0x5, 0x0) io_submit(0x0, 0x1, &(0x7f00000007c0)=[&(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, r3, 0x0, 0x0, 0x100, 0x0, 0x6}]) r4 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000800), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_GET(r5, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, r6, 0x86a762f4dfb5c7dd}, 0x14}}, 0x0) r7 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000180), 0x4000, 0x0) sendmsg$L2TP_CMD_SESSION_DELETE(r3, &(0x7f0000000340)={&(0x7f0000000040), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x3c, r6, 0x4, 0x70bd25, 0x25dfdbff, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x3}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x1}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp6=r7}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x2}]}, 0x3c}}, 0x4000) connect$inet6(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r4, 0x84, 0x64, &(0x7f0000000200)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) r8 = socket(0x18, 0x2, 0x0) r9 = socket(0x18, 0x2, 0x0) dup2(r9, r8) ioctl$FS_IOC_ENABLE_VERITY(r8, 0x40806685, &(0x7f0000000480)={0x1, 0x3, 0x1000, 0x62, &(0x7f0000000240)="bd0504ca8d136a22ab7413131d9354c565a277d9e4e3108e4d2962715ba8c98f97c80ab0e4d0198db660761a31cbf27c4bbcbedeca0e8d6a9004649274f5d74ae8382b7c1a2c4e7f4f40503699b10ef0ab8281fb70949fbeb95d0d24c46fe6d98fba", 0x5b, 0x0, &(0x7f0000000380)="2c155ea9f06c0166da3eb92d94b69fd8aacec5c7049f6ca2336e160aeb5bc6c57f793320e18afe78559a57f5b043f89f427a8ab5495e3e26b39df95b39725f7f99a2715f94f85ed62e8913799de129a457a50b28fc72578e544eb4"}) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r4, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0xec034000, @loopback}], 0x1c) mmap(&(0x7f00000e4000/0x1000)=nil, 0x1000, 0x0, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) 20:05:56 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffbffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x1, 0x8010000000000084) setsockopt$inet6_IPV6_RTHDR(r2, 0x29, 0x39, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x58) bind$inet6(r2, &(0x7f0000000140)={0xa, 0x4e23, 0x0, @empty}, 0x1c) listen(r2, 0x10001) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, 0x0, &(0x7f00000001c0)) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, &(0x7f0000000100)) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/bus/input/devices\x00', 0x0, 0x0) io_setup(0x5, 0x0) io_submit(0x0, 0x1, &(0x7f00000007c0)=[&(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, r3, 0x0, 0x0, 0x100, 0x0, 0x6}]) r4 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000800), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_GET(r5, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, r6, 0x86a762f4dfb5c7dd}, 0x14}}, 0x0) r7 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000180), 0x4000, 0x0) sendmsg$L2TP_CMD_SESSION_DELETE(r3, &(0x7f0000000340)={&(0x7f0000000040), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x3c, r6, 0x4, 0x70bd25, 0x25dfdbff, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x3}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x1}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp6=r7}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x2}]}, 0x3c}}, 0x4000) connect$inet6(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r4, 0x84, 0x64, &(0x7f0000000200)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) r8 = socket(0x18, 0x2, 0x0) r9 = socket(0x18, 0x2, 0x0) dup2(r9, r8) ioctl$FS_IOC_ENABLE_VERITY(r8, 0x40806685, &(0x7f0000000480)={0x1, 0x3, 0x1000, 0x62, &(0x7f0000000240)="bd0504ca8d136a22ab7413131d9354c565a277d9e4e3108e4d2962715ba8c98f97c80ab0e4d0198db660761a31cbf27c4bbcbedeca0e8d6a9004649274f5d74ae8382b7c1a2c4e7f4f40503699b10ef0ab8281fb70949fbeb95d0d24c46fe6d98fba", 0x5b, 0x0, &(0x7f0000000380)="2c155ea9f06c0166da3eb92d94b69fd8aacec5c7049f6ca2336e160aeb5bc6c57f793320e18afe78559a57f5b043f89f427a8ab5495e3e26b39df95b39725f7f99a2715f94f85ed62e8913799de129a457a50b28fc72578e544eb4"}) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r4, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0xec034000, @loopback}], 0x1c) mmap(&(0x7f00000e4000/0x1000)=nil, 0x1000, 0x0, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) [ 330.337045] kauditd_printk_skb: 8 callbacks suppressed [ 330.337059] audit: type=1804 audit(1677355556.918:149): pid=15139 uid=0 auid=4294967295 ses=4294967295 op="invalid_pcr" cause="open_writers" comm="syz-executor.4" name="/root/syzkaller-testdir3167728923/syzkaller.RAOH85/260/bus" dev="sda1" ino=14005 res=1 [ 330.594608] audit: type=1804 audit(1677355556.928:150): pid=15139 uid=0 auid=4294967295 ses=4294967295 op="invalid_pcr" cause="ToMToU" comm="syz-executor.4" name="/root/syzkaller-testdir3167728923/syzkaller.RAOH85/260/bus" dev="sda1" ino=14005 res=1 20:05:57 executing program 2: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c47, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x5, 0x8000000}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001080), 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000780)='ext4\x00', &(0x7f0000000240)='./file0\x00', 0x2000480, &(0x7f0000000000)=ANY=[], 0x1, 0x76a, &(0x7f0000000fc0)="$eJzs3d9rW1UcAPDvTdt17aatIOh8KghaGEvtrJuCDxMfRHAw0Ge3kGZlNm1Gk461FNwQwRdBxQdBX/bsj/nmqz9e9b/wQTamdsOJD1K5adJla9KlW5MI+XzgNOfce9Nzvjn3nnuSe0kC6FsT6Z9MxKGI+CiJGKstTyJiqJobjDixud3t9bV8mpLY2Hjzj6S6za31tXw0PCd1oFZ4MiJ+fD/icGZ7veWV1flcsVhYqpWnKgvnp8orq0fOLeTmCnOFxWPTMzNHj79w/NjexfrXL6sHr3/82rPfnPjnvSeufvhTEifiYG1dYxx7ZSImaq/JUPoS3uXVva6sx5JeN4AHkh6aA5tHeRyKsRio5loY6WbLAIBOeTciNgCAPpM4/wNAn6l/DnBrfS1fT739RKK7brwSEfs3469f39xcM1i7Zre/eh109FZy15WRJCLG96D+iYj44ru3v0pTdOg6JEAzly5HxJnxie3jf7LtnoXdeq6NbSbuKRv/oHu+T+c/Lzab/2W25j/RZP4z3OTYfRD3P/4z1/agmpbS+d/LDfe23W6Iv2Z8oFZ6pDrnG0rOnisW0rHt0YiYjKHhtDy9Qx2TN/+92Wpd4/zvz0/e+TKtP328s0Xm2uDw3c+ZzVVyDxNzoxuXI54abBZ/stX/SYv576k263j9pQ8+b7UujT+Nt562x99ZG1cinmna/3fuaEt2vD9xqro7TNV3iia+/fWz0Vb1N/Z/mtL66+8FuiHt/9Gd4x9PGu/XLO++jp+vjP3Qat3942++/+9L3qrm99WWXcxVKkvTEfuSN7YvP3rnufVyffs0/smnmx//O+3/6XvCM23GP3j9968fPP7OSuOf3VX/7z5z9fb8QKv62+v/mWpusraknfGv3QY+zGsHAAAAAAAAAAAAAAAAAAAAAAAAAO3KRMTBSDLZrXwmk81u/ob34zGaKZbKlcNnS8uLs1H9rezxGMrUv+pyrOH7UKdr34dfLx+9p/x8RDwWEZ8Oj1TL2XypONvr4AEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACg5kCL3/9P/Tbc69YBAB2zv9cNAAC6zvkfAPrP7s7/Ix1rBwDQPd7/A0D/cf4HgP7j/A8AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAECHnTp5Mk0bf6+v5dPy7IWV5fnShSOzhfJ8dmE5n82Xls5n50qluWIhmy8ttPxHlzYfiqXS+ZlYXL44VSmUK1PlldXTC6Xlxcrpcwu5ucLpwlDXIgMAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACA9pVXVudzxWJhSUZGRmYr0zhKjPRugAIAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAD4n/svAAD//9EyKso=") open(&(0x7f0000000080)='./bus\x00', 0x6fe44da629969272, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000004400)='./bus\x00', 0x1c1002, 0x0) write$binfmt_misc(r2, &(0x7f0000000500)=ANY=[], 0x5) sendfile(r2, r1, 0x0, 0x1ffff) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x9, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuset.effective_mems\x00', 0x275a, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cgroup.controllers\x00', 0x275a, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r4, 0xc028660f, &(0x7f0000000200)={0x0, r3, 0x1000000000000}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000500)={0x84, 0x2a, 0x7e2881d4b0058261, 0x0, 0x0, {0x1}, [@generic="e4bbac412a17305504ad793ea00a6a8b6af59b93a71efc64f1ba9ffd3d7708256fad7c8c336cf7184b2651994299cad739b99f592c800cf74bc91b2a206bbcf6fb80877577dabf5cd4ec9c33bad91823389f23299d0eeed20059627675267baeec666bd7148a371ce03cab9d2bd75f4e"]}, 0x84}, 0x1, 0x0, 0x0, 0x8}, 0x0) syz_genetlink_get_family_id$devlink(0x0, 0xffffffffffffffff) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r5, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000700)=@newsa={0x138, 0x10, 0x0, 0x0, 0x0, {{@in6=@rand_addr=' \x01\x00', @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}, {@in6=@empty, 0x0, 0x32}, @in=@loopback, {0x0, 0x0, 0xe033, 0x6, 0x0, 0xfffffffffffffffd}}, [@algo_comp={0x48, 0x3, {{'lzs\x00'}}}]}, 0x138}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r4, 0xc018937c, &(0x7f0000000180)={{0x1, 0x1, 0x18, r0}, './bus\x00'}) getsockopt$bt_l2cap_L2CAP_OPTIONS(r6, 0x6, 0x1, &(0x7f0000000280), &(0x7f00000002c0)=0xc) sendmsg$DEVLINK_CMD_SB_POOL_SET(0xffffffffffffffff, 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) syz_open_procfs(0x0, &(0x7f00000001c0)='net/vlan/vlan0\x00') 20:05:57 executing program 0: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c47, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x5, 0x8000000}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001080), 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000780)='ext4\x00', &(0x7f0000000240)='./file0\x00', 0x2000480, &(0x7f0000000000)=ANY=[], 0x1, 0x76a, &(0x7f0000000fc0)="$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") open(&(0x7f0000000080)='./bus\x00', 0x6fe44da629969272, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000004400)='./bus\x00', 0x1c1002, 0x0) write$binfmt_misc(r2, &(0x7f0000000500)=ANY=[], 0x5) sendfile(r2, r1, 0x0, 0x1ffff) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x9, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuset.effective_mems\x00', 0x275a, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cgroup.controllers\x00', 0x275a, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r4, 0xc028660f, &(0x7f0000000200)={0x0, r3, 0x1000000000000}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000500)={0x84, 0x2a, 0x7e2881d4b0058261, 0x0, 0x0, {0x1}, [@generic="e4bbac412a17305504ad793ea00a6a8b6af59b93a71efc64f1ba9ffd3d7708256fad7c8c336cf7184b2651994299cad739b99f592c800cf74bc91b2a206bbcf6fb80877577dabf5cd4ec9c33bad91823389f23299d0eeed20059627675267baeec666bd7148a371ce03cab9d2bd75f4e"]}, 0x84}, 0x1, 0x0, 0x0, 0x8}, 0x0) syz_genetlink_get_family_id$devlink(0x0, 0xffffffffffffffff) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r5, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000700)=@newsa={0x138, 0x10, 0x0, 0x0, 0x0, {{@in6=@rand_addr=' \x01\x00', @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}, {@in6=@empty, 0x0, 0x32}, @in=@loopback, {0x0, 0x0, 0xe033, 0x6, 0x0, 0xfffffffffffffffd}}, [@algo_comp={0x48, 0x3, {{'lzs\x00'}}}]}, 0x138}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r4, 0xc018937c, &(0x7f0000000180)={{0x1, 0x1, 0x18, r0}, './bus\x00'}) getsockopt$bt_l2cap_L2CAP_OPTIONS(r6, 0x6, 0x1, &(0x7f0000000280), &(0x7f00000002c0)=0xc) sendmsg$DEVLINK_CMD_SB_POOL_SET(0xffffffffffffffff, 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) syz_open_procfs(0x0, &(0x7f00000001c0)='net/vlan/vlan0\x00') [ 330.762999] audit: type=1804 audit(1677355557.339:151): pid=15143 uid=0 auid=4294967295 ses=4294967295 op="invalid_pcr" cause="open_writers" comm="syz-executor.1" name="/root/syzkaller-testdir3295352786/syzkaller.7PI3PL/235/bus" dev="sda1" ino=14371 res=1 20:05:57 executing program 4: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c47, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x5, 0x8000000}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001080), 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000780)='ext4\x00', &(0x7f0000000240)='./file0\x00', 0x2000480, &(0x7f0000000000)=ANY=[], 0x1, 0x76a, &(0x7f0000000fc0)="$eJzs3d9rW1UcAPDvTdt17aatIOh8KghaGEvtrJuCDxMfRHAw0Ge3kGZlNm1Gk461FNwQwRdBxQdBX/bsj/nmqz9e9b/wQTamdsOJD1K5adJla9KlW5MI+XzgNOfce9Nzvjn3nnuSe0kC6FsT6Z9MxKGI+CiJGKstTyJiqJobjDixud3t9bV8mpLY2Hjzj6S6za31tXw0PCd1oFZ4MiJ+fD/icGZ7veWV1flcsVhYqpWnKgvnp8orq0fOLeTmCnOFxWPTMzNHj79w/NjexfrXL6sHr3/82rPfnPjnvSeufvhTEifiYG1dYxx7ZSImaq/JUPoS3uXVva6sx5JeN4AHkh6aA5tHeRyKsRio5loY6WbLAIBOeTciNgCAPpM4/wNAn6l/DnBrfS1fT739RKK7brwSEfs3469f39xcM1i7Zre/eh109FZy15WRJCLG96D+iYj44ru3v0pTdOg6JEAzly5HxJnxie3jf7LtnoXdeq6NbSbuKRv/oHu+T+c/Lzab/2W25j/RZP4z3OTYfRD3P/4z1/agmpbS+d/LDfe23W6Iv2Z8oFZ6pDrnG0rOnisW0rHt0YiYjKHhtDy9Qx2TN/+92Wpd4/zvz0/e+TKtP328s0Xm2uDw3c+ZzVVyDxNzoxuXI54abBZ/stX/SYv576k263j9pQ8+b7UujT+Nt562x99ZG1cinmna/3fuaEt2vD9xqro7TNV3iia+/fWz0Vb1N/Z/mtL66+8FuiHt/9Gd4x9PGu/XLO++jp+vjP3Qat3942++/+9L3qrm99WWXcxVKkvTEfuSN7YvP3rnufVyffs0/smnmx//O+3/6XvCM23GP3j9968fPP7OSuOf3VX/7z5z9fb8QKv62+v/mWpusraknfGv3QY+zGsHAAAAAAAAAAAAAAAAAAAAAAAAAO3KRMTBSDLZrXwmk81u/ob34zGaKZbKlcNnS8uLs1H9rezxGMrUv+pyrOH7UKdr34dfLx+9p/x8RDwWEZ8Oj1TL2XypONvr4AEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACg5kCL3/9P/Tbc69YBAB2zv9cNAAC6zvkfAPrP7s7/Ix1rBwDQPd7/A0D/cf4HgP7j/A8AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAECHnTp5Mk0bf6+v5dPy7IWV5fnShSOzhfJ8dmE5n82Xls5n50qluWIhmy8ttPxHlzYfiqXS+ZlYXL44VSmUK1PlldXTC6Xlxcrpcwu5ucLpwlDXIgMAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACA9pVXVudzxWJhSUZGRmYr0zhKjPRugAIAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAD4n/svAAD//9EyKso=") open(&(0x7f0000000080)='./bus\x00', 0x6fe44da629969272, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000004400)='./bus\x00', 0x1c1002, 0x0) write$binfmt_misc(r2, &(0x7f0000000500)=ANY=[], 0x5) sendfile(r2, r1, 0x0, 0x1ffff) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x9, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuset.effective_mems\x00', 0x275a, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cgroup.controllers\x00', 0x275a, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r4, 0xc028660f, &(0x7f0000000200)={0x0, r3, 0x1000000000000}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000500)={0x84, 0x2a, 0x7e2881d4b0058261, 0x0, 0x0, {0x1}, [@generic="e4bbac412a17305504ad793ea00a6a8b6af59b93a71efc64f1ba9ffd3d7708256fad7c8c336cf7184b2651994299cad739b99f592c800cf74bc91b2a206bbcf6fb80877577dabf5cd4ec9c33bad91823389f23299d0eeed20059627675267baeec666bd7148a371ce03cab9d2bd75f4e"]}, 0x84}, 0x1, 0x0, 0x0, 0x8}, 0x0) syz_genetlink_get_family_id$devlink(0x0, 0xffffffffffffffff) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r5, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000700)=@newsa={0x138, 0x10, 0x0, 0x0, 0x0, {{@in6=@rand_addr=' \x01\x00', @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}, {@in6=@empty, 0x0, 0x32}, @in=@loopback, {0x0, 0x0, 0xe033, 0x6, 0x0, 0xfffffffffffffffd}}, [@algo_comp={0x48, 0x3, {{'lzs\x00'}}}]}, 0x138}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r4, 0xc018937c, &(0x7f0000000180)={{0x1, 0x1, 0x18, r0}, './bus\x00'}) getsockopt$bt_l2cap_L2CAP_OPTIONS(r6, 0x6, 0x1, &(0x7f0000000280), &(0x7f00000002c0)=0xc) sendmsg$DEVLINK_CMD_SB_POOL_SET(0xffffffffffffffff, 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) syz_open_procfs(0x0, &(0x7f00000001c0)='net/vlan/vlan0\x00') 20:05:57 executing program 5: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c47, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x5, 0x8000000}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001080), 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000780)='ext4\x00', &(0x7f0000000240)='./file0\x00', 0x2000480, &(0x7f0000000000)=ANY=[], 0x1, 0x76a, &(0x7f0000000fc0)="$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") open(&(0x7f0000000080)='./bus\x00', 0x6fe44da629969272, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000004400)='./bus\x00', 0x1c1002, 0x0) write$binfmt_misc(r2, &(0x7f0000000500)=ANY=[], 0x5) sendfile(r2, r1, 0x0, 0x1ffff) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x9, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuset.effective_mems\x00', 0x275a, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cgroup.controllers\x00', 0x275a, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r4, 0xc028660f, &(0x7f0000000200)={0x0, r3, 0x1000000000000}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000500)={0x84, 0x2a, 0x7e2881d4b0058261, 0x0, 0x0, {0x1}, [@generic="e4bbac412a17305504ad793ea00a6a8b6af59b93a71efc64f1ba9ffd3d7708256fad7c8c336cf7184b2651994299cad739b99f592c800cf74bc91b2a206bbcf6fb80877577dabf5cd4ec9c33bad91823389f23299d0eeed20059627675267baeec666bd7148a371ce03cab9d2bd75f4e"]}, 0x84}, 0x1, 0x0, 0x0, 0x8}, 0x0) syz_genetlink_get_family_id$devlink(0x0, 0xffffffffffffffff) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r5, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000700)=@newsa={0x138, 0x10, 0x0, 0x0, 0x0, {{@in6=@rand_addr=' \x01\x00', @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}, {@in6=@empty, 0x0, 0x32}, @in=@loopback, {0x0, 0x0, 0xe033, 0x6, 0x0, 0xfffffffffffffffd}}, [@algo_comp={0x48, 0x3, {{'lzs\x00'}}}]}, 0x138}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r4, 0xc018937c, &(0x7f0000000180)={{0x1, 0x1, 0x18, r0}, './bus\x00'}) getsockopt$bt_l2cap_L2CAP_OPTIONS(r6, 0x6, 0x1, &(0x7f0000000280), &(0x7f00000002c0)=0xc) sendmsg$DEVLINK_CMD_SB_POOL_SET(0xffffffffffffffff, 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) syz_open_procfs(0x0, &(0x7f00000001c0)='net/vlan/vlan0\x00') 20:05:57 executing program 3: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c47, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x5, 0x8000000}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001080), 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000780)='ext4\x00', &(0x7f0000000240)='./file0\x00', 0x2000480, &(0x7f0000000000)=ANY=[], 0x1, 0x76a, &(0x7f0000000fc0)="$eJzs3d9rW1UcAPDvTdt17aatIOh8KghaGEvtrJuCDxMfRHAw0Ge3kGZlNm1Gk461FNwQwRdBxQdBX/bsj/nmqz9e9b/wQTamdsOJD1K5adJla9KlW5MI+XzgNOfce9Nzvjn3nnuSe0kC6FsT6Z9MxKGI+CiJGKstTyJiqJobjDixud3t9bV8mpLY2Hjzj6S6za31tXw0PCd1oFZ4MiJ+fD/icGZ7veWV1flcsVhYqpWnKgvnp8orq0fOLeTmCnOFxWPTMzNHj79w/NjexfrXL6sHr3/82rPfnPjnvSeufvhTEifiYG1dYxx7ZSImaq/JUPoS3uXVva6sx5JeN4AHkh6aA5tHeRyKsRio5loY6WbLAIBOeTciNgCAPpM4/wNAn6l/DnBrfS1fT739RKK7brwSEfs3469f39xcM1i7Zre/eh109FZy15WRJCLG96D+iYj44ru3v0pTdOg6JEAzly5HxJnxie3jf7LtnoXdeq6NbSbuKRv/oHu+T+c/Lzab/2W25j/RZP4z3OTYfRD3P/4z1/agmpbS+d/LDfe23W6Iv2Z8oFZ6pDrnG0rOnisW0rHt0YiYjKHhtDy9Qx2TN/+92Wpd4/zvz0/e+TKtP328s0Xm2uDw3c+ZzVVyDxNzoxuXI54abBZ/stX/SYv576k263j9pQ8+b7UujT+Nt562x99ZG1cinmna/3fuaEt2vD9xqro7TNV3iia+/fWz0Vb1N/Z/mtL66+8FuiHt/9Gd4x9PGu/XLO++jp+vjP3Qat3942++/+9L3qrm99WWXcxVKkvTEfuSN7YvP3rnufVyffs0/smnmx//O+3/6XvCM23GP3j9968fPP7OSuOf3VX/7z5z9fb8QKv62+v/mWpusraknfGv3QY+zGsHAAAAAAAAAAAAAAAAAAAAAAAAAO3KRMTBSDLZrXwmk81u/ob34zGaKZbKlcNnS8uLs1H9rezxGMrUv+pyrOH7UKdr34dfLx+9p/x8RDwWEZ8Oj1TL2XypONvr4AEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACg5kCL3/9P/Tbc69YBAB2zv9cNAAC6zvkfAPrP7s7/Ix1rBwDQPd7/A0D/cf4HgP7j/A8AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAECHnTp5Mk0bf6+v5dPy7IWV5fnShSOzhfJ8dmE5n82Xls5n50qluWIhmy8ttPxHlzYfiqXS+ZlYXL44VSmUK1PlldXTC6Xlxcrpcwu5ucLpwlDXIgMAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACA9pVXVudzxWJhSUZGRmYr0zhKjPRugAIAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAD4n/svAAD//9EyKso=") open(&(0x7f0000000080)='./bus\x00', 0x6fe44da629969272, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000004400)='./bus\x00', 0x1c1002, 0x0) write$binfmt_misc(r2, &(0x7f0000000500)=ANY=[], 0x5) sendfile(r2, r1, 0x0, 0x1ffff) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x9, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuset.effective_mems\x00', 0x275a, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cgroup.controllers\x00', 0x275a, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r4, 0xc028660f, &(0x7f0000000200)={0x0, r3, 0x1000000000000}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000500)={0x84, 0x2a, 0x7e2881d4b0058261, 0x0, 0x0, {0x1}, [@generic="e4bbac412a17305504ad793ea00a6a8b6af59b93a71efc64f1ba9ffd3d7708256fad7c8c336cf7184b2651994299cad739b99f592c800cf74bc91b2a206bbcf6fb80877577dabf5cd4ec9c33bad91823389f23299d0eeed20059627675267baeec666bd7148a371ce03cab9d2bd75f4e"]}, 0x84}, 0x1, 0x0, 0x0, 0x8}, 0x0) syz_genetlink_get_family_id$devlink(0x0, 0xffffffffffffffff) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r5, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000700)=@newsa={0x138, 0x10, 0x0, 0x0, 0x0, {{@in6=@rand_addr=' \x01\x00', @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}, {@in6=@empty, 0x0, 0x32}, @in=@loopback, {0x0, 0x0, 0xe033, 0x6, 0x0, 0xfffffffffffffffd}}, [@algo_comp={0x48, 0x3, {{'lzs\x00'}}}]}, 0x138}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r4, 0xc018937c, &(0x7f0000000180)={{0x1, 0x1, 0x18, r0}, './bus\x00'}) getsockopt$bt_l2cap_L2CAP_OPTIONS(r6, 0x6, 0x1, &(0x7f0000000280), &(0x7f00000002c0)=0xc) sendmsg$DEVLINK_CMD_SB_POOL_SET(0xffffffffffffffff, 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) syz_open_procfs(0x0, &(0x7f00000001c0)='net/vlan/vlan0\x00') [ 331.063452] audit: type=1804 audit(1677355557.389:152): pid=15143 uid=0 auid=4294967295 ses=4294967295 op="invalid_pcr" cause="ToMToU" comm="syz-executor.1" name="/root/syzkaller-testdir3295352786/syzkaller.7PI3PL/235/bus" dev="sda1" ino=14371 res=1 20:05:58 executing program 1: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c47, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x5, 0x8000000}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001080), 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000780)='ext4\x00', &(0x7f0000000240)='./file0\x00', 0x2000480, &(0x7f0000000000)=ANY=[], 0x1, 0x76a, &(0x7f0000000fc0)="$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") open(&(0x7f0000000080)='./bus\x00', 0x6fe44da629969272, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000004400)='./bus\x00', 0x1c1002, 0x0) write$binfmt_misc(r2, &(0x7f0000000500)=ANY=[], 0x5) sendfile(r2, r1, 0x0, 0x1ffff) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x9, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuset.effective_mems\x00', 0x275a, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cgroup.controllers\x00', 0x275a, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r4, 0xc028660f, &(0x7f0000000200)={0x0, r3, 0x1000000000000}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000500)={0x84, 0x2a, 0x7e2881d4b0058261, 0x0, 0x0, {0x1}, [@generic="e4bbac412a17305504ad793ea00a6a8b6af59b93a71efc64f1ba9ffd3d7708256fad7c8c336cf7184b2651994299cad739b99f592c800cf74bc91b2a206bbcf6fb80877577dabf5cd4ec9c33bad91823389f23299d0eeed20059627675267baeec666bd7148a371ce03cab9d2bd75f4e"]}, 0x84}, 0x1, 0x0, 0x0, 0x8}, 0x0) syz_genetlink_get_family_id$devlink(0x0, 0xffffffffffffffff) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r5, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000700)=@newsa={0x138, 0x10, 0x0, 0x0, 0x0, {{@in6=@rand_addr=' \x01\x00', @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}, {@in6=@empty, 0x0, 0x32}, @in=@loopback, {0x0, 0x0, 0xe033, 0x6, 0x0, 0xfffffffffffffffd}}, [@algo_comp={0x48, 0x3, {{'lzs\x00'}}}]}, 0x138}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r4, 0xc018937c, &(0x7f0000000180)={{0x1, 0x1, 0x18, r0}, './bus\x00'}) getsockopt$bt_l2cap_L2CAP_OPTIONS(r6, 0x6, 0x1, &(0x7f0000000280), &(0x7f00000002c0)=0xc) sendmsg$DEVLINK_CMD_SB_POOL_SET(0xffffffffffffffff, 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) syz_open_procfs(0x0, &(0x7f00000001c0)='net/vlan/vlan0\x00') [ 331.601904] audit: type=1804 audit(1677355558.179:153): pid=15156 uid=0 auid=4294967295 ses=4294967295 op="invalid_pcr" cause="open_writers" comm="syz-executor.2" name="/root/syzkaller-testdir3960867949/syzkaller.8rCAeT/233/bus" dev="sda1" ino=13935 res=1 [ 331.809206] audit: type=1804 audit(1677355558.179:154): pid=15156 uid=0 auid=4294967295 ses=4294967295 op="invalid_pcr" cause="ToMToU" comm="syz-executor.2" name="/root/syzkaller-testdir3960867949/syzkaller.8rCAeT/233/bus" dev="sda1" ino=13935 res=1 20:05:58 executing program 2: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c47, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x5, 0x8000000}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001080), 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000780)='ext4\x00', &(0x7f0000000240)='./file0\x00', 0x2000480, &(0x7f0000000000)=ANY=[], 0x1, 0x76a, &(0x7f0000000fc0)="$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") open(&(0x7f0000000080)='./bus\x00', 0x6fe44da629969272, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000004400)='./bus\x00', 0x1c1002, 0x0) write$binfmt_misc(r2, &(0x7f0000000500)=ANY=[], 0x5) sendfile(r2, r1, 0x0, 0x1ffff) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x9, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuset.effective_mems\x00', 0x275a, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cgroup.controllers\x00', 0x275a, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r4, 0xc028660f, &(0x7f0000000200)={0x0, r3, 0x1000000000000}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000500)={0x84, 0x2a, 0x7e2881d4b0058261, 0x0, 0x0, {0x1}, [@generic="e4bbac412a17305504ad793ea00a6a8b6af59b93a71efc64f1ba9ffd3d7708256fad7c8c336cf7184b2651994299cad739b99f592c800cf74bc91b2a206bbcf6fb80877577dabf5cd4ec9c33bad91823389f23299d0eeed20059627675267baeec666bd7148a371ce03cab9d2bd75f4e"]}, 0x84}, 0x1, 0x0, 0x0, 0x8}, 0x0) syz_genetlink_get_family_id$devlink(0x0, 0xffffffffffffffff) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r5, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000700)=@newsa={0x138, 0x10, 0x0, 0x0, 0x0, {{@in6=@rand_addr=' \x01\x00', @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}, {@in6=@empty, 0x0, 0x32}, @in=@loopback, {0x0, 0x0, 0xe033, 0x6, 0x0, 0xfffffffffffffffd}}, [@algo_comp={0x48, 0x3, {{'lzs\x00'}}}]}, 0x138}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r4, 0xc018937c, &(0x7f0000000180)={{0x1, 0x1, 0x18, r0}, './bus\x00'}) getsockopt$bt_l2cap_L2CAP_OPTIONS(r6, 0x6, 0x1, &(0x7f0000000280), &(0x7f00000002c0)=0xc) sendmsg$DEVLINK_CMD_SB_POOL_SET(0xffffffffffffffff, 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) syz_open_procfs(0x0, &(0x7f00000001c0)='net/vlan/vlan0\x00') [ 332.068099] audit: type=1804 audit(1677355558.299:155): pid=15158 uid=0 auid=4294967295 ses=4294967295 op="invalid_pcr" cause="open_writers" comm="syz-executor.0" name="/root/syzkaller-testdir3392027881/syzkaller.HZ3dQw/247/bus" dev="sda1" ino=13936 res=1 20:05:58 executing program 5: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c47, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x5, 0x8000000}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001080), 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000780)='ext4\x00', &(0x7f0000000240)='./file0\x00', 0x2000480, &(0x7f0000000000)=ANY=[], 0x1, 0x76a, &(0x7f0000000fc0)="$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") open(&(0x7f0000000080)='./bus\x00', 0x6fe44da629969272, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000004400)='./bus\x00', 0x1c1002, 0x0) write$binfmt_misc(r2, &(0x7f0000000500)=ANY=[], 0x5) sendfile(r2, r1, 0x0, 0x1ffff) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x9, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuset.effective_mems\x00', 0x275a, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cgroup.controllers\x00', 0x275a, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r4, 0xc028660f, &(0x7f0000000200)={0x0, r3, 0x1000000000000}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000500)={0x84, 0x2a, 0x7e2881d4b0058261, 0x0, 0x0, {0x1}, [@generic="e4bbac412a17305504ad793ea00a6a8b6af59b93a71efc64f1ba9ffd3d7708256fad7c8c336cf7184b2651994299cad739b99f592c800cf74bc91b2a206bbcf6fb80877577dabf5cd4ec9c33bad91823389f23299d0eeed20059627675267baeec666bd7148a371ce03cab9d2bd75f4e"]}, 0x84}, 0x1, 0x0, 0x0, 0x8}, 0x0) syz_genetlink_get_family_id$devlink(0x0, 0xffffffffffffffff) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r5, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000700)=@newsa={0x138, 0x10, 0x0, 0x0, 0x0, {{@in6=@rand_addr=' \x01\x00', @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}, {@in6=@empty, 0x0, 0x32}, @in=@loopback, {0x0, 0x0, 0xe033, 0x6, 0x0, 0xfffffffffffffffd}}, [@algo_comp={0x48, 0x3, {{'lzs\x00'}}}]}, 0x138}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r4, 0xc018937c, &(0x7f0000000180)={{0x1, 0x1, 0x18, r0}, './bus\x00'}) getsockopt$bt_l2cap_L2CAP_OPTIONS(r6, 0x6, 0x1, &(0x7f0000000280), &(0x7f00000002c0)=0xc) sendmsg$DEVLINK_CMD_SB_POOL_SET(0xffffffffffffffff, 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) syz_open_procfs(0x0, &(0x7f00000001c0)='net/vlan/vlan0\x00') 20:05:58 executing program 4: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c47, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x5, 0x8000000}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001080), 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000780)='ext4\x00', &(0x7f0000000240)='./file0\x00', 0x2000480, &(0x7f0000000000)=ANY=[], 0x1, 0x76a, &(0x7f0000000fc0)="$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") open(&(0x7f0000000080)='./bus\x00', 0x6fe44da629969272, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000004400)='./bus\x00', 0x1c1002, 0x0) write$binfmt_misc(r2, &(0x7f0000000500)=ANY=[], 0x5) sendfile(r2, r1, 0x0, 0x1ffff) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x9, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuset.effective_mems\x00', 0x275a, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cgroup.controllers\x00', 0x275a, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r4, 0xc028660f, &(0x7f0000000200)={0x0, r3, 0x1000000000000}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000500)={0x84, 0x2a, 0x7e2881d4b0058261, 0x0, 0x0, {0x1}, [@generic="e4bbac412a17305504ad793ea00a6a8b6af59b93a71efc64f1ba9ffd3d7708256fad7c8c336cf7184b2651994299cad739b99f592c800cf74bc91b2a206bbcf6fb80877577dabf5cd4ec9c33bad91823389f23299d0eeed20059627675267baeec666bd7148a371ce03cab9d2bd75f4e"]}, 0x84}, 0x1, 0x0, 0x0, 0x8}, 0x0) syz_genetlink_get_family_id$devlink(0x0, 0xffffffffffffffff) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r5, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000700)=@newsa={0x138, 0x10, 0x0, 0x0, 0x0, {{@in6=@rand_addr=' \x01\x00', @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}, {@in6=@empty, 0x0, 0x32}, @in=@loopback, {0x0, 0x0, 0xe033, 0x6, 0x0, 0xfffffffffffffffd}}, [@algo_comp={0x48, 0x3, {{'lzs\x00'}}}]}, 0x138}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r4, 0xc018937c, &(0x7f0000000180)={{0x1, 0x1, 0x18, r0}, './bus\x00'}) getsockopt$bt_l2cap_L2CAP_OPTIONS(r6, 0x6, 0x1, &(0x7f0000000280), &(0x7f00000002c0)=0xc) sendmsg$DEVLINK_CMD_SB_POOL_SET(0xffffffffffffffff, 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) syz_open_procfs(0x0, &(0x7f00000001c0)='net/vlan/vlan0\x00') [ 332.185275] audit: type=1804 audit(1677355558.319:156): pid=15158 uid=0 auid=4294967295 ses=4294967295 op="invalid_pcr" cause="ToMToU" comm="syz-executor.0" name="/root/syzkaller-testdir3392027881/syzkaller.HZ3dQw/247/bus" dev="sda1" ino=13936 res=1 [ 332.323833] audit: type=1804 audit(1677355558.379:157): pid=15168 uid=0 auid=4294967295 ses=4294967295 op="invalid_pcr" cause="open_writers" comm="syz-executor.4" name="/root/syzkaller-testdir3167728923/syzkaller.RAOH85/261/bus" dev="sda1" ino=14210 res=1 20:05:59 executing program 0: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c47, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x5, 0x8000000}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001080), 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000780)='ext4\x00', &(0x7f0000000240)='./file0\x00', 0x2000480, &(0x7f0000000000)=ANY=[], 0x1, 0x76a, &(0x7f0000000fc0)="$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") open(&(0x7f0000000080)='./bus\x00', 0x6fe44da629969272, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000004400)='./bus\x00', 0x1c1002, 0x0) write$binfmt_misc(r2, &(0x7f0000000500)=ANY=[], 0x5) sendfile(r2, r1, 0x0, 0x1ffff) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x9, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuset.effective_mems\x00', 0x275a, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cgroup.controllers\x00', 0x275a, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r4, 0xc028660f, &(0x7f0000000200)={0x0, r3, 0x1000000000000}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000500)={0x84, 0x2a, 0x7e2881d4b0058261, 0x0, 0x0, {0x1}, [@generic="e4bbac412a17305504ad793ea00a6a8b6af59b93a71efc64f1ba9ffd3d7708256fad7c8c336cf7184b2651994299cad739b99f592c800cf74bc91b2a206bbcf6fb80877577dabf5cd4ec9c33bad91823389f23299d0eeed20059627675267baeec666bd7148a371ce03cab9d2bd75f4e"]}, 0x84}, 0x1, 0x0, 0x0, 0x8}, 0x0) syz_genetlink_get_family_id$devlink(0x0, 0xffffffffffffffff) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r5, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000700)=@newsa={0x138, 0x10, 0x0, 0x0, 0x0, {{@in6=@rand_addr=' \x01\x00', @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}, {@in6=@empty, 0x0, 0x32}, @in=@loopback, {0x0, 0x0, 0xe033, 0x6, 0x0, 0xfffffffffffffffd}}, [@algo_comp={0x48, 0x3, {{'lzs\x00'}}}]}, 0x138}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r4, 0xc018937c, &(0x7f0000000180)={{0x1, 0x1, 0x18, r0}, './bus\x00'}) getsockopt$bt_l2cap_L2CAP_OPTIONS(r6, 0x6, 0x1, &(0x7f0000000280), &(0x7f00000002c0)=0xc) sendmsg$DEVLINK_CMD_SB_POOL_SET(0xffffffffffffffff, 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) syz_open_procfs(0x0, &(0x7f00000001c0)='net/vlan/vlan0\x00') [ 332.560563] audit: type=1804 audit(1677355558.379:158): pid=15168 uid=0 auid=4294967295 ses=4294967295 op="invalid_pcr" cause="ToMToU" comm="syz-executor.4" name="/root/syzkaller-testdir3167728923/syzkaller.RAOH85/261/bus" dev="sda1" ino=14210 res=1 20:05:59 executing program 3: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c47, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x5, 0x8000000}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001080), 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000780)='ext4\x00', &(0x7f0000000240)='./file0\x00', 0x2000480, &(0x7f0000000000)=ANY=[], 0x1, 0x76a, &(0x7f0000000fc0)="$eJzs3d9rW1UcAPDvTdt17aatIOh8KghaGEvtrJuCDxMfRHAw0Ge3kGZlNm1Gk461FNwQwRdBxQdBX/bsj/nmqz9e9b/wQTamdsOJD1K5adJla9KlW5MI+XzgNOfce9Nzvjn3nnuSe0kC6FsT6Z9MxKGI+CiJGKstTyJiqJobjDixud3t9bV8mpLY2Hjzj6S6za31tXw0PCd1oFZ4MiJ+fD/icGZ7veWV1flcsVhYqpWnKgvnp8orq0fOLeTmCnOFxWPTMzNHj79w/NjexfrXL6sHr3/82rPfnPjnvSeufvhTEifiYG1dYxx7ZSImaq/JUPoS3uXVva6sx5JeN4AHkh6aA5tHeRyKsRio5loY6WbLAIBOeTciNgCAPpM4/wNAn6l/DnBrfS1fT739RKK7brwSEfs3469f39xcM1i7Zre/eh109FZy15WRJCLG96D+iYj44ru3v0pTdOg6JEAzly5HxJnxie3jf7LtnoXdeq6NbSbuKRv/oHu+T+c/Lzab/2W25j/RZP4z3OTYfRD3P/4z1/agmpbS+d/LDfe23W6Iv2Z8oFZ6pDrnG0rOnisW0rHt0YiYjKHhtDy9Qx2TN/+92Wpd4/zvz0/e+TKtP328s0Xm2uDw3c+ZzVVyDxNzoxuXI54abBZ/stX/SYv576k263j9pQ8+b7UujT+Nt562x99ZG1cinmna/3fuaEt2vD9xqro7TNV3iia+/fWz0Vb1N/Z/mtL66+8FuiHt/9Gd4x9PGu/XLO++jp+vjP3Qat3942++/+9L3qrm99WWXcxVKkvTEfuSN7YvP3rnufVyffs0/smnmx//O+3/6XvCM23GP3j9968fPP7OSuOf3VX/7z5z9fb8QKv62+v/mWpusraknfGv3QY+zGsHAAAAAAAAAAAAAAAAAAAAAAAAAO3KRMTBSDLZrXwmk81u/ob34zGaKZbKlcNnS8uLs1H9rezxGMrUv+pyrOH7UKdr34dfLx+9p/x8RDwWEZ8Oj1TL2XypONvr4AEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACg5kCL3/9P/Tbc69YBAB2zv9cNAAC6zvkfAPrP7s7/Ix1rBwDQPd7/A0D/cf4HgP7j/A8AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAECHnTp5Mk0bf6+v5dPy7IWV5fnShSOzhfJ8dmE5n82Xls5n50qluWIhmy8ttPxHlzYfiqXS+ZlYXL44VSmUK1PlldXTC6Xlxcrpcwu5ucLpwlDXIgMAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACA9pVXVudzxWJhSUZGRmYr0zhKjPRugAIAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAD4n/svAAD//9EyKso=") open(&(0x7f0000000080)='./bus\x00', 0x6fe44da629969272, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000004400)='./bus\x00', 0x1c1002, 0x0) write$binfmt_misc(r2, &(0x7f0000000500)=ANY=[], 0x5) sendfile(r2, r1, 0x0, 0x1ffff) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x9, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuset.effective_mems\x00', 0x275a, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cgroup.controllers\x00', 0x275a, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r4, 0xc028660f, &(0x7f0000000200)={0x0, r3, 0x1000000000000}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000500)={0x84, 0x2a, 0x7e2881d4b0058261, 0x0, 0x0, {0x1}, [@generic="e4bbac412a17305504ad793ea00a6a8b6af59b93a71efc64f1ba9ffd3d7708256fad7c8c336cf7184b2651994299cad739b99f592c800cf74bc91b2a206bbcf6fb80877577dabf5cd4ec9c33bad91823389f23299d0eeed20059627675267baeec666bd7148a371ce03cab9d2bd75f4e"]}, 0x84}, 0x1, 0x0, 0x0, 0x8}, 0x0) syz_genetlink_get_family_id$devlink(0x0, 0xffffffffffffffff) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r5, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000700)=@newsa={0x138, 0x10, 0x0, 0x0, 0x0, {{@in6=@rand_addr=' \x01\x00', @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}, {@in6=@empty, 0x0, 0x32}, @in=@loopback, {0x0, 0x0, 0xe033, 0x6, 0x0, 0xfffffffffffffffd}}, [@algo_comp={0x48, 0x3, {{'lzs\x00'}}}]}, 0x138}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r4, 0xc018937c, &(0x7f0000000180)={{0x1, 0x1, 0x18, r0}, './bus\x00'}) getsockopt$bt_l2cap_L2CAP_OPTIONS(r6, 0x6, 0x1, &(0x7f0000000280), &(0x7f00000002c0)=0xc) sendmsg$DEVLINK_CMD_SB_POOL_SET(0xffffffffffffffff, 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) syz_open_procfs(0x0, &(0x7f00000001c0)='net/vlan/vlan0\x00') 20:05:59 executing program 1: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c47, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x5, 0x8000000}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001080), 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000780)='ext4\x00', &(0x7f0000000240)='./file0\x00', 0x2000480, &(0x7f0000000000)=ANY=[], 0x1, 0x76a, &(0x7f0000000fc0)="$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") open(&(0x7f0000000080)='./bus\x00', 0x6fe44da629969272, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000004400)='./bus\x00', 0x1c1002, 0x0) write$binfmt_misc(r2, &(0x7f0000000500)=ANY=[], 0x5) sendfile(r2, r1, 0x0, 0x1ffff) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x9, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuset.effective_mems\x00', 0x275a, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cgroup.controllers\x00', 0x275a, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r4, 0xc028660f, &(0x7f0000000200)={0x0, r3, 0x1000000000000}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000500)={0x84, 0x2a, 0x7e2881d4b0058261, 0x0, 0x0, {0x1}, [@generic="e4bbac412a17305504ad793ea00a6a8b6af59b93a71efc64f1ba9ffd3d7708256fad7c8c336cf7184b2651994299cad739b99f592c800cf74bc91b2a206bbcf6fb80877577dabf5cd4ec9c33bad91823389f23299d0eeed20059627675267baeec666bd7148a371ce03cab9d2bd75f4e"]}, 0x84}, 0x1, 0x0, 0x0, 0x8}, 0x0) syz_genetlink_get_family_id$devlink(0x0, 0xffffffffffffffff) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r5, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000700)=@newsa={0x138, 0x10, 0x0, 0x0, 0x0, {{@in6=@rand_addr=' \x01\x00', @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}, {@in6=@empty, 0x0, 0x32}, @in=@loopback, {0x0, 0x0, 0xe033, 0x6, 0x0, 0xfffffffffffffffd}}, [@algo_comp={0x48, 0x3, {{'lzs\x00'}}}]}, 0x138}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r4, 0xc018937c, &(0x7f0000000180)={{0x1, 0x1, 0x18, r0}, './bus\x00'}) getsockopt$bt_l2cap_L2CAP_OPTIONS(r6, 0x6, 0x1, &(0x7f0000000280), &(0x7f00000002c0)=0xc) sendmsg$DEVLINK_CMD_SB_POOL_SET(0xffffffffffffffff, 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) syz_open_procfs(0x0, &(0x7f00000001c0)='net/vlan/vlan0\x00') 20:06:00 executing program 2: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) keyctl$get_persistent(0x16, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x42, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(0xffffffffffffffff, 0x0, 0x0) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(0xffffffffffffffff, 0x80089419, &(0x7f0000002200)) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000280), 0x8100, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), 0x0) mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0) syz_fuse_handle_req(r1, 0x0, 0x0, &(0x7f00000030c0)={0x0, &(0x7f0000000040)={0x18, 0x0, 0x0, {0x5}}, &(0x7f0000000300)={0x18, 0x0, 0x0, {0x4}}, &(0x7f0000000380)={0x18, 0x0, 0x0, {0x1}}, &(0x7f00000024c0)={0x18, 0x0, 0x1f}, &(0x7f0000002580)={0x28, 0x0, 0xff, {{0x4, 0x3, 0x2}}}, 0x0, &(0x7f0000002640)={0x18, 0x0, 0x4, {0x7ff}}, &(0x7f0000002680)=ANY=[@ANYBLOB="1d00000000000073636865645f737769746368000000"], &(0x7f00000026c0)={0x20, 0x0, 0x0, {0x0, 0x1}}, &(0x7f0000002700)={0x78, 0x0, 0x0, {0x800, 0x0, 0x0, {0x0, 0x0, 0xccd8, 0x23, 0x8434, 0xd2a, 0x0, 0x80005, 0x5, 0xc000, 0x6, 0x0, 0xee01, 0x0, 0x6}}}, &(0x7f0000002780)={0x90, 0x0, 0x2, {0x0, 0x3, 0x10001, 0x1f, 0xfffffffe, 0x0, {0x1, 0x3f, 0xffffffffffffff80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x45c1, 0x0, 0x3f, 0xee00, 0x0, 0x5, 0x9}}}, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], &(0x7f0000002bc0)=ANY=[@ANYBLOB="6001000000000000080000000000000000000000000000000100000000000000373900000000000031490000000000003f0000000200000001000000000000f0ffffffff000000000800000000000000080000000000000000000000000000000800000000000000070000000300000098bb000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="01000000ffffff7f00000000060000000000000005000000000000000d00000000004c1b73636865645f7377697463680000000004000000000000000300000000000000010000000000000004000000000000008f000000090000000300000000000000060000000000000000000000000000008100000000000000030000000000000001000000000000000000000009000000fd0000000060000000000000", @ANYRES32=0xee01, @ANYRES32], &(0x7f0000002fc0)={0xa0, 0xfffffffffffffff5, 0x0, {{0x1, 0x1, 0x2, 0x7, 0x6, 0x5, {0x6, 0x81, 0x80000000, 0x935d, 0x5, 0x10001, 0x1, 0x100, 0x2, 0x0, 0x0, 0xee01, 0x0, 0x1}}, {0x0, 0x1}}}, &(0x7f0000003080)={0x20, 0x0, 0x7e41, {0x3145ad07, 0x0, 0x0, 0x7}}}) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB="15000000feffff018000000800395032303030"], 0x15) r4 = syz_open_dev$vcsn(&(0x7f00000001c0), 0x2, 0x0) sendto$ax25(r4, &(0x7f0000000440)="67a9c6157eee7d0843c78bebd8be044f9dd7905e451be2e143888394952dbb86f3048fc552c8dfc3ee4db9f6fad3e48242c4fcbe06746ffc83cb438d1eb52158013306b5a3b692af4de104d10baece3422b2ea6c3dad3057db2288ed4d94182842281899384bb83dd684ae4bde0a98a32ffd6b4247032bbd86fc5a840e29686bc412fef520bfe4d728dc8094a788cc49359dc6409187696194", 0x99, 0x4000, &(0x7f0000000500)={{0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, 0x3}, [@default, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @bcast, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) r5 = dup(r3) write$FUSE_BMAP(r5, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_NOTIFY_RETRIEVE(r5, &(0x7f00000000c0)={0x14c}, 0x137) write$FUSE_INIT(r1, 0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000040), 0x0, &(0x7f0000000300)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r5}, 0x2c, {[{@access_uid}], [], 0x6b}}) mount$fuse(0x0, &(0x7f00000042c0)='./file0\x00', &(0x7f0000002000), 0x0, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x2000}}) add_key$keyring(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f00000020c0), &(0x7f0000002100)={'syz', 0x3}, &(0x7f00000021c0)=ANY=[], 0x48, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x6, 0xffffffffffffffff, 0x0) write$FUSE_BMAP(r4, 0x0, 0x0) keyctl$setperm(0x5, 0x0, 0x1c243911) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000700)=@can_delroute={0x70, 0x19, 0x4, 0x70bd2a, 0x25dfdbfc, {0x1d, 0x1, 0x1}, [@CGW_MOD_UID={0x8}, @CGW_CS_XOR={0x8, 0x5, {0xfffffffffffffffa, 0xfffffffffffffff8, 0x1, 0x40}}, @CGW_FILTER={0xc, 0xb, {{0x4, 0x1, 0x0, 0x1}, {0x4, 0x1, 0x0, 0x1}}}, @CGW_MOD_OR={0x15, 0x2, {{{0x2, 0x0, 0x1}, 0x3, 0x3, 0x0, 0x0, "0ae7836b9d5cd6e2"}, 0x4}}, @CGW_MOD_XOR={0x15, 0x3, {{{0x0, 0x0, 0x1}, 0x2, 0x1, 0x0, 0x0, "3e62eff2ef27f8cd"}, 0x5}}, @CGW_MOD_UID={0x8}, @CGW_DST_IF={0x8}]}, 0x70}, 0x1, 0x0, 0x0, 0x20000000}, 0x4008050) write$P9_RUNLINKAT(r3, &(0x7f0000002040)={0x7, 0x4d, 0x1}, 0x7) umount2(&(0x7f0000000080)='./file0\x00', 0x3) 20:06:00 executing program 5: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c47, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x5, 0x8000000}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001080), 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000780)='ext4\x00', &(0x7f0000000240)='./file0\x00', 0x2000480, &(0x7f0000000000)=ANY=[], 0x1, 0x76a, &(0x7f0000000fc0)="$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") open(&(0x7f0000000080)='./bus\x00', 0x6fe44da629969272, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000004400)='./bus\x00', 0x1c1002, 0x0) write$binfmt_misc(r2, &(0x7f0000000500)=ANY=[], 0x5) sendfile(r2, r1, 0x0, 0x1ffff) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x9, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuset.effective_mems\x00', 0x275a, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cgroup.controllers\x00', 0x275a, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r4, 0xc028660f, &(0x7f0000000200)={0x0, r3, 0x1000000000000}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000500)={0x84, 0x2a, 0x7e2881d4b0058261, 0x0, 0x0, {0x1}, [@generic="e4bbac412a17305504ad793ea00a6a8b6af59b93a71efc64f1ba9ffd3d7708256fad7c8c336cf7184b2651994299cad739b99f592c800cf74bc91b2a206bbcf6fb80877577dabf5cd4ec9c33bad91823389f23299d0eeed20059627675267baeec666bd7148a371ce03cab9d2bd75f4e"]}, 0x84}, 0x1, 0x0, 0x0, 0x8}, 0x0) syz_genetlink_get_family_id$devlink(0x0, 0xffffffffffffffff) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r5, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000700)=@newsa={0x138, 0x10, 0x0, 0x0, 0x0, {{@in6=@rand_addr=' \x01\x00', @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}, {@in6=@empty, 0x0, 0x32}, @in=@loopback, {0x0, 0x0, 0xe033, 0x6, 0x0, 0xfffffffffffffffd}}, [@algo_comp={0x48, 0x3, {{'lzs\x00'}}}]}, 0x138}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r4, 0xc018937c, &(0x7f0000000180)={{0x1, 0x1, 0x18, r0}, './bus\x00'}) getsockopt$bt_l2cap_L2CAP_OPTIONS(r6, 0x6, 0x1, &(0x7f0000000280), &(0x7f00000002c0)=0xc) sendmsg$DEVLINK_CMD_SB_POOL_SET(0xffffffffffffffff, 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) syz_open_procfs(0x0, &(0x7f00000001c0)='net/vlan/vlan0\x00') 20:06:00 executing program 2: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) keyctl$get_persistent(0x16, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x42, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(0xffffffffffffffff, 0x0, 0x0) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(0xffffffffffffffff, 0x80089419, &(0x7f0000002200)) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000280), 0x8100, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), 0x0) mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0) syz_fuse_handle_req(r1, 0x0, 0x0, &(0x7f00000030c0)={0x0, &(0x7f0000000040)={0x18, 0x0, 0x0, {0x5}}, &(0x7f0000000300)={0x18, 0x0, 0x0, {0x4}}, &(0x7f0000000380)={0x18, 0x0, 0x0, {0x1}}, &(0x7f00000024c0)={0x18, 0x0, 0x1f}, &(0x7f0000002580)={0x28, 0x0, 0xff, {{0x4, 0x3, 0x2}}}, 0x0, &(0x7f0000002640)={0x18, 0x0, 0x4, {0x7ff}}, &(0x7f0000002680)=ANY=[@ANYBLOB="1d00000000000073636865645f737769746368000000"], &(0x7f00000026c0)={0x20, 0x0, 0x0, {0x0, 0x1}}, &(0x7f0000002700)={0x78, 0x0, 0x0, {0x800, 0x0, 0x0, {0x0, 0x0, 0xccd8, 0x23, 0x8434, 0xd2a, 0x0, 0x80005, 0x5, 0xc000, 0x6, 0x0, 0xee01, 0x0, 0x6}}}, &(0x7f0000002780)={0x90, 0x0, 0x2, {0x0, 0x3, 0x10001, 0x1f, 0xfffffffe, 0x0, {0x1, 0x3f, 0xffffffffffffff80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x45c1, 0x0, 0x3f, 0xee00, 0x0, 0x5, 0x9}}}, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], &(0x7f0000002bc0)=ANY=[@ANYBLOB="6001000000000000080000000000000000000000000000000100000000000000373900000000000031490000000000003f0000000200000001000000000000f0ffffffff000000000800000000000000080000000000000000000000000000000800000000000000070000000300000098bb000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="01000000ffffff7f00000000060000000000000005000000000000000d00000000004c1b73636865645f7377697463680000000004000000000000000300000000000000010000000000000004000000000000008f000000090000000300000000000000060000000000000000000000000000008100000000000000030000000000000001000000000000000000000009000000fd0000000060000000000000", @ANYRES32=0xee01, @ANYRES32], &(0x7f0000002fc0)={0xa0, 0xfffffffffffffff5, 0x0, {{0x1, 0x1, 0x2, 0x7, 0x6, 0x5, {0x6, 0x81, 0x80000000, 0x935d, 0x5, 0x10001, 0x1, 0x100, 0x2, 0x0, 0x0, 0xee01, 0x0, 0x1}}, {0x0, 0x1}}}, &(0x7f0000003080)={0x20, 0x0, 0x7e41, {0x3145ad07, 0x0, 0x0, 0x7}}}) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB="15000000feffff018000000800395032303030"], 0x15) r4 = syz_open_dev$vcsn(&(0x7f00000001c0), 0x2, 0x0) sendto$ax25(r4, &(0x7f0000000440)="67a9c6157eee7d0843c78bebd8be044f9dd7905e451be2e143888394952dbb86f3048fc552c8dfc3ee4db9f6fad3e48242c4fcbe06746ffc83cb438d1eb52158013306b5a3b692af4de104d10baece3422b2ea6c3dad3057db2288ed4d94182842281899384bb83dd684ae4bde0a98a32ffd6b4247032bbd86fc5a840e29686bc412fef520bfe4d728dc8094a788cc49359dc6409187696194", 0x99, 0x4000, &(0x7f0000000500)={{0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, 0x3}, [@default, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @bcast, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) r5 = dup(r3) write$FUSE_BMAP(r5, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_NOTIFY_RETRIEVE(r5, &(0x7f00000000c0)={0x14c}, 0x137) write$FUSE_INIT(r1, 0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000040), 0x0, &(0x7f0000000300)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r5}, 0x2c, {[{@access_uid}], [], 0x6b}}) mount$fuse(0x0, &(0x7f00000042c0)='./file0\x00', &(0x7f0000002000), 0x0, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x2000}}) add_key$keyring(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f00000020c0), &(0x7f0000002100)={'syz', 0x3}, &(0x7f00000021c0)=ANY=[], 0x48, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x6, 0xffffffffffffffff, 0x0) write$FUSE_BMAP(r4, 0x0, 0x0) keyctl$setperm(0x5, 0x0, 0x1c243911) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000700)=@can_delroute={0x70, 0x19, 0x4, 0x70bd2a, 0x25dfdbfc, {0x1d, 0x1, 0x1}, [@CGW_MOD_UID={0x8}, @CGW_CS_XOR={0x8, 0x5, {0xfffffffffffffffa, 0xfffffffffffffff8, 0x1, 0x40}}, @CGW_FILTER={0xc, 0xb, {{0x4, 0x1, 0x0, 0x1}, {0x4, 0x1, 0x0, 0x1}}}, @CGW_MOD_OR={0x15, 0x2, {{{0x2, 0x0, 0x1}, 0x3, 0x3, 0x0, 0x0, "0ae7836b9d5cd6e2"}, 0x4}}, @CGW_MOD_XOR={0x15, 0x3, {{{0x0, 0x0, 0x1}, 0x2, 0x1, 0x0, 0x0, "3e62eff2ef27f8cd"}, 0x5}}, @CGW_MOD_UID={0x8}, @CGW_DST_IF={0x8}]}, 0x70}, 0x1, 0x0, 0x0, 0x20000000}, 0x4008050) write$P9_RUNLINKAT(r3, &(0x7f0000002040)={0x7, 0x4d, 0x1}, 0x7) umount2(&(0x7f0000000080)='./file0\x00', 0x3) 20:06:00 executing program 1: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c47, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x5, 0x8000000}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001080), 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000780)='ext4\x00', &(0x7f0000000240)='./file0\x00', 0x2000480, &(0x7f0000000000)=ANY=[], 0x1, 0x76a, &(0x7f0000000fc0)="$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") open(&(0x7f0000000080)='./bus\x00', 0x6fe44da629969272, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000004400)='./bus\x00', 0x1c1002, 0x0) write$binfmt_misc(r2, &(0x7f0000000500)=ANY=[], 0x5) sendfile(r2, r1, 0x0, 0x1ffff) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x9, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuset.effective_mems\x00', 0x275a, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cgroup.controllers\x00', 0x275a, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r4, 0xc028660f, &(0x7f0000000200)={0x0, r3, 0x1000000000000}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000500)={0x84, 0x2a, 0x7e2881d4b0058261, 0x0, 0x0, {0x1}, [@generic="e4bbac412a17305504ad793ea00a6a8b6af59b93a71efc64f1ba9ffd3d7708256fad7c8c336cf7184b2651994299cad739b99f592c800cf74bc91b2a206bbcf6fb80877577dabf5cd4ec9c33bad91823389f23299d0eeed20059627675267baeec666bd7148a371ce03cab9d2bd75f4e"]}, 0x84}, 0x1, 0x0, 0x0, 0x8}, 0x0) syz_genetlink_get_family_id$devlink(0x0, 0xffffffffffffffff) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r5, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000700)=@newsa={0x138, 0x10, 0x0, 0x0, 0x0, {{@in6=@rand_addr=' \x01\x00', @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}, {@in6=@empty, 0x0, 0x32}, @in=@loopback, {0x0, 0x0, 0xe033, 0x6, 0x0, 0xfffffffffffffffd}}, [@algo_comp={0x48, 0x3, {{'lzs\x00'}}}]}, 0x138}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r4, 0xc018937c, &(0x7f0000000180)={{0x1, 0x1, 0x18, r0}, './bus\x00'}) getsockopt$bt_l2cap_L2CAP_OPTIONS(r6, 0x6, 0x1, &(0x7f0000000280), &(0x7f00000002c0)=0xc) sendmsg$DEVLINK_CMD_SB_POOL_SET(0xffffffffffffffff, 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) syz_open_procfs(0x0, &(0x7f00000001c0)='net/vlan/vlan0\x00') 20:06:00 executing program 2: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) keyctl$get_persistent(0x16, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x42, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(0xffffffffffffffff, 0x0, 0x0) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(0xffffffffffffffff, 0x80089419, &(0x7f0000002200)) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000280), 0x8100, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), 0x0) mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0) syz_fuse_handle_req(r1, 0x0, 0x0, &(0x7f00000030c0)={0x0, &(0x7f0000000040)={0x18, 0x0, 0x0, {0x5}}, &(0x7f0000000300)={0x18, 0x0, 0x0, {0x4}}, &(0x7f0000000380)={0x18, 0x0, 0x0, {0x1}}, &(0x7f00000024c0)={0x18, 0x0, 0x1f}, &(0x7f0000002580)={0x28, 0x0, 0xff, {{0x4, 0x3, 0x2}}}, 0x0, &(0x7f0000002640)={0x18, 0x0, 0x4, {0x7ff}}, &(0x7f0000002680)=ANY=[@ANYBLOB="1d00000000000073636865645f737769746368000000"], &(0x7f00000026c0)={0x20, 0x0, 0x0, {0x0, 0x1}}, &(0x7f0000002700)={0x78, 0x0, 0x0, {0x800, 0x0, 0x0, {0x0, 0x0, 0xccd8, 0x23, 0x8434, 0xd2a, 0x0, 0x80005, 0x5, 0xc000, 0x6, 0x0, 0xee01, 0x0, 0x6}}}, &(0x7f0000002780)={0x90, 0x0, 0x2, {0x0, 0x3, 0x10001, 0x1f, 0xfffffffe, 0x0, {0x1, 0x3f, 0xffffffffffffff80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x45c1, 0x0, 0x3f, 0xee00, 0x0, 0x5, 0x9}}}, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], &(0x7f0000002bc0)=ANY=[@ANYBLOB="6001000000000000080000000000000000000000000000000100000000000000373900000000000031490000000000003f0000000200000001000000000000f0ffffffff000000000800000000000000080000000000000000000000000000000800000000000000070000000300000098bb000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="01000000ffffff7f00000000060000000000000005000000000000000d00000000004c1b73636865645f7377697463680000000004000000000000000300000000000000010000000000000004000000000000008f000000090000000300000000000000060000000000000000000000000000008100000000000000030000000000000001000000000000000000000009000000fd0000000060000000000000", @ANYRES32=0xee01, @ANYRES32], &(0x7f0000002fc0)={0xa0, 0xfffffffffffffff5, 0x0, {{0x1, 0x1, 0x2, 0x7, 0x6, 0x5, {0x6, 0x81, 0x80000000, 0x935d, 0x5, 0x10001, 0x1, 0x100, 0x2, 0x0, 0x0, 0xee01, 0x0, 0x1}}, {0x0, 0x1}}}, &(0x7f0000003080)={0x20, 0x0, 0x7e41, {0x3145ad07, 0x0, 0x0, 0x7}}}) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB="15000000feffff018000000800395032303030"], 0x15) r4 = syz_open_dev$vcsn(&(0x7f00000001c0), 0x2, 0x0) sendto$ax25(r4, &(0x7f0000000440)="67a9c6157eee7d0843c78bebd8be044f9dd7905e451be2e143888394952dbb86f3048fc552c8dfc3ee4db9f6fad3e48242c4fcbe06746ffc83cb438d1eb52158013306b5a3b692af4de104d10baece3422b2ea6c3dad3057db2288ed4d94182842281899384bb83dd684ae4bde0a98a32ffd6b4247032bbd86fc5a840e29686bc412fef520bfe4d728dc8094a788cc49359dc6409187696194", 0x99, 0x4000, &(0x7f0000000500)={{0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, 0x3}, [@default, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @bcast, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) r5 = dup(r3) write$FUSE_BMAP(r5, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_NOTIFY_RETRIEVE(r5, &(0x7f00000000c0)={0x14c}, 0x137) write$FUSE_INIT(r1, 0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000040), 0x0, &(0x7f0000000300)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r5}, 0x2c, {[{@access_uid}], [], 0x6b}}) mount$fuse(0x0, &(0x7f00000042c0)='./file0\x00', &(0x7f0000002000), 0x0, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x2000}}) add_key$keyring(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f00000020c0), &(0x7f0000002100)={'syz', 0x3}, &(0x7f00000021c0)=ANY=[], 0x48, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x6, 0xffffffffffffffff, 0x0) write$FUSE_BMAP(r4, 0x0, 0x0) keyctl$setperm(0x5, 0x0, 0x1c243911) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000700)=@can_delroute={0x70, 0x19, 0x4, 0x70bd2a, 0x25dfdbfc, {0x1d, 0x1, 0x1}, [@CGW_MOD_UID={0x8}, @CGW_CS_XOR={0x8, 0x5, {0xfffffffffffffffa, 0xfffffffffffffff8, 0x1, 0x40}}, @CGW_FILTER={0xc, 0xb, {{0x4, 0x1, 0x0, 0x1}, {0x4, 0x1, 0x0, 0x1}}}, @CGW_MOD_OR={0x15, 0x2, {{{0x2, 0x0, 0x1}, 0x3, 0x3, 0x0, 0x0, "0ae7836b9d5cd6e2"}, 0x4}}, @CGW_MOD_XOR={0x15, 0x3, {{{0x0, 0x0, 0x1}, 0x2, 0x1, 0x0, 0x0, "3e62eff2ef27f8cd"}, 0x5}}, @CGW_MOD_UID={0x8}, @CGW_DST_IF={0x8}]}, 0x70}, 0x1, 0x0, 0x0, 0x20000000}, 0x4008050) write$P9_RUNLINKAT(r3, &(0x7f0000002040)={0x7, 0x4d, 0x1}, 0x7) umount2(&(0x7f0000000080)='./file0\x00', 0x3) 20:06:00 executing program 4: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) keyctl$get_persistent(0x16, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x42, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(0xffffffffffffffff, 0x0, 0x0) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(0xffffffffffffffff, 0x80089419, &(0x7f0000002200)) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000280), 0x8100, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), 0x0) mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0) syz_fuse_handle_req(r1, 0x0, 0x0, &(0x7f00000030c0)={0x0, &(0x7f0000000040)={0x18, 0x0, 0x0, {0x5}}, &(0x7f0000000300)={0x18, 0x0, 0x0, {0x4}}, &(0x7f0000000380)={0x18, 0x0, 0x0, {0x1}}, &(0x7f00000024c0)={0x18, 0x0, 0x1f}, &(0x7f0000002580)={0x28, 0x0, 0xff, {{0x4, 0x3, 0x2}}}, 0x0, &(0x7f0000002640)={0x18, 0x0, 0x4, {0x7ff}}, &(0x7f0000002680)=ANY=[@ANYBLOB="1d00000000000073636865645f737769746368000000"], &(0x7f00000026c0)={0x20, 0x0, 0x0, {0x0, 0x1}}, &(0x7f0000002700)={0x78, 0x0, 0x0, {0x800, 0x0, 0x0, {0x0, 0x0, 0xccd8, 0x23, 0x8434, 0xd2a, 0x0, 0x80005, 0x5, 0xc000, 0x6, 0x0, 0xee01, 0x0, 0x6}}}, &(0x7f0000002780)={0x90, 0x0, 0x2, {0x0, 0x3, 0x10001, 0x1f, 0xfffffffe, 0x0, {0x1, 0x3f, 0xffffffffffffff80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x45c1, 0x0, 0x3f, 0xee00, 0x0, 0x5, 0x9}}}, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], &(0x7f0000002bc0)=ANY=[@ANYBLOB="6001000000000000080000000000000000000000000000000100000000000000373900000000000031490000000000003f0000000200000001000000000000f0ffffffff000000000800000000000000080000000000000000000000000000000800000000000000070000000300000098bb000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="01000000ffffff7f00000000060000000000000005000000000000000d00000000004c1b73636865645f7377697463680000000004000000000000000300000000000000010000000000000004000000000000008f000000090000000300000000000000060000000000000000000000000000008100000000000000030000000000000001000000000000000000000009000000fd0000000060000000000000", @ANYRES32=0xee01, @ANYRES32], &(0x7f0000002fc0)={0xa0, 0xfffffffffffffff5, 0x0, {{0x1, 0x1, 0x2, 0x7, 0x6, 0x5, {0x6, 0x81, 0x80000000, 0x935d, 0x5, 0x10001, 0x1, 0x100, 0x2, 0x0, 0x0, 0xee01, 0x0, 0x1}}, {0x0, 0x1}}}, &(0x7f0000003080)={0x20, 0x0, 0x7e41, {0x3145ad07, 0x0, 0x0, 0x7}}}) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB="15000000feffff018000000800395032303030"], 0x15) r4 = syz_open_dev$vcsn(&(0x7f00000001c0), 0x2, 0x0) sendto$ax25(r4, &(0x7f0000000440)="67a9c6157eee7d0843c78bebd8be044f9dd7905e451be2e143888394952dbb86f3048fc552c8dfc3ee4db9f6fad3e48242c4fcbe06746ffc83cb438d1eb52158013306b5a3b692af4de104d10baece3422b2ea6c3dad3057db2288ed4d94182842281899384bb83dd684ae4bde0a98a32ffd6b4247032bbd86fc5a840e29686bc412fef520bfe4d728dc8094a788cc49359dc6409187696194", 0x99, 0x4000, &(0x7f0000000500)={{0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, 0x3}, [@default, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @bcast, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) r5 = dup(r3) write$FUSE_BMAP(r5, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_NOTIFY_RETRIEVE(r5, &(0x7f00000000c0)={0x14c}, 0x137) write$FUSE_INIT(r1, 0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000040), 0x0, &(0x7f0000000300)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r5}, 0x2c, {[{@access_uid}], [], 0x6b}}) mount$fuse(0x0, &(0x7f00000042c0)='./file0\x00', &(0x7f0000002000), 0x0, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x2000}}) add_key$keyring(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f00000020c0), &(0x7f0000002100)={'syz', 0x3}, &(0x7f00000021c0)=ANY=[], 0x48, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x6, 0xffffffffffffffff, 0x0) write$FUSE_BMAP(r4, 0x0, 0x0) keyctl$setperm(0x5, 0x0, 0x1c243911) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000700)=@can_delroute={0x70, 0x19, 0x4, 0x70bd2a, 0x25dfdbfc, {0x1d, 0x1, 0x1}, [@CGW_MOD_UID={0x8}, @CGW_CS_XOR={0x8, 0x5, {0xfffffffffffffffa, 0xfffffffffffffff8, 0x1, 0x40}}, @CGW_FILTER={0xc, 0xb, {{0x4, 0x1, 0x0, 0x1}, {0x4, 0x1, 0x0, 0x1}}}, @CGW_MOD_OR={0x15, 0x2, {{{0x2, 0x0, 0x1}, 0x3, 0x3, 0x0, 0x0, "0ae7836b9d5cd6e2"}, 0x4}}, @CGW_MOD_XOR={0x15, 0x3, {{{0x0, 0x0, 0x1}, 0x2, 0x1, 0x0, 0x0, "3e62eff2ef27f8cd"}, 0x5}}, @CGW_MOD_UID={0x8}, @CGW_DST_IF={0x8}]}, 0x70}, 0x1, 0x0, 0x0, 0x20000000}, 0x4008050) write$P9_RUNLINKAT(r3, &(0x7f0000002040)={0x7, 0x4d, 0x1}, 0x7) umount2(&(0x7f0000000080)='./file0\x00', 0x3) 20:06:00 executing program 2: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) keyctl$get_persistent(0x16, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x42, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(0xffffffffffffffff, 0x0, 0x0) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(0xffffffffffffffff, 0x80089419, &(0x7f0000002200)) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000280), 0x8100, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), 0x0) mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0) syz_fuse_handle_req(r1, 0x0, 0x0, &(0x7f00000030c0)={0x0, &(0x7f0000000040)={0x18, 0x0, 0x0, {0x5}}, &(0x7f0000000300)={0x18, 0x0, 0x0, {0x4}}, &(0x7f0000000380)={0x18, 0x0, 0x0, {0x1}}, &(0x7f00000024c0)={0x18, 0x0, 0x1f}, &(0x7f0000002580)={0x28, 0x0, 0xff, {{0x4, 0x3, 0x2}}}, 0x0, &(0x7f0000002640)={0x18, 0x0, 0x4, {0x7ff}}, &(0x7f0000002680)=ANY=[@ANYBLOB="1d00000000000073636865645f737769746368000000"], &(0x7f00000026c0)={0x20, 0x0, 0x0, {0x0, 0x1}}, &(0x7f0000002700)={0x78, 0x0, 0x0, {0x800, 0x0, 0x0, {0x0, 0x0, 0xccd8, 0x23, 0x8434, 0xd2a, 0x0, 0x80005, 0x5, 0xc000, 0x6, 0x0, 0xee01, 0x0, 0x6}}}, &(0x7f0000002780)={0x90, 0x0, 0x2, {0x0, 0x3, 0x10001, 0x1f, 0xfffffffe, 0x0, {0x1, 0x3f, 0xffffffffffffff80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x45c1, 0x0, 0x3f, 0xee00, 0x0, 0x5, 0x9}}}, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], &(0x7f0000002bc0)=ANY=[@ANYBLOB="6001000000000000080000000000000000000000000000000100000000000000373900000000000031490000000000003f0000000200000001000000000000f0ffffffff000000000800000000000000080000000000000000000000000000000800000000000000070000000300000098bb000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="01000000ffffff7f00000000060000000000000005000000000000000d00000000004c1b73636865645f7377697463680000000004000000000000000300000000000000010000000000000004000000000000008f000000090000000300000000000000060000000000000000000000000000008100000000000000030000000000000001000000000000000000000009000000fd0000000060000000000000", @ANYRES32=0xee01, @ANYRES32], &(0x7f0000002fc0)={0xa0, 0xfffffffffffffff5, 0x0, {{0x1, 0x1, 0x2, 0x7, 0x6, 0x5, {0x6, 0x81, 0x80000000, 0x935d, 0x5, 0x10001, 0x1, 0x100, 0x2, 0x0, 0x0, 0xee01, 0x0, 0x1}}, {0x0, 0x1}}}, &(0x7f0000003080)={0x20, 0x0, 0x7e41, {0x3145ad07, 0x0, 0x0, 0x7}}}) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB="15000000feffff018000000800395032303030"], 0x15) r4 = syz_open_dev$vcsn(&(0x7f00000001c0), 0x2, 0x0) sendto$ax25(r4, &(0x7f0000000440)="67a9c6157eee7d0843c78bebd8be044f9dd7905e451be2e143888394952dbb86f3048fc552c8dfc3ee4db9f6fad3e48242c4fcbe06746ffc83cb438d1eb52158013306b5a3b692af4de104d10baece3422b2ea6c3dad3057db2288ed4d94182842281899384bb83dd684ae4bde0a98a32ffd6b4247032bbd86fc5a840e29686bc412fef520bfe4d728dc8094a788cc49359dc6409187696194", 0x99, 0x4000, &(0x7f0000000500)={{0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, 0x3}, [@default, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @bcast, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) r5 = dup(r3) write$FUSE_BMAP(r5, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_NOTIFY_RETRIEVE(r5, &(0x7f00000000c0)={0x14c}, 0x137) write$FUSE_INIT(r1, 0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000040), 0x0, &(0x7f0000000300)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r5}, 0x2c, {[{@access_uid}], [], 0x6b}}) mount$fuse(0x0, &(0x7f00000042c0)='./file0\x00', &(0x7f0000002000), 0x0, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x2000}}) add_key$keyring(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f00000020c0), &(0x7f0000002100)={'syz', 0x3}, &(0x7f00000021c0)=ANY=[], 0x48, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x6, 0xffffffffffffffff, 0x0) write$FUSE_BMAP(r4, 0x0, 0x0) keyctl$setperm(0x5, 0x0, 0x1c243911) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000700)=@can_delroute={0x70, 0x19, 0x4, 0x70bd2a, 0x25dfdbfc, {0x1d, 0x1, 0x1}, [@CGW_MOD_UID={0x8}, @CGW_CS_XOR={0x8, 0x5, {0xfffffffffffffffa, 0xfffffffffffffff8, 0x1, 0x40}}, @CGW_FILTER={0xc, 0xb, {{0x4, 0x1, 0x0, 0x1}, {0x4, 0x1, 0x0, 0x1}}}, @CGW_MOD_OR={0x15, 0x2, {{{0x2, 0x0, 0x1}, 0x3, 0x3, 0x0, 0x0, "0ae7836b9d5cd6e2"}, 0x4}}, @CGW_MOD_XOR={0x15, 0x3, {{{0x0, 0x0, 0x1}, 0x2, 0x1, 0x0, 0x0, "3e62eff2ef27f8cd"}, 0x5}}, @CGW_MOD_UID={0x8}, @CGW_DST_IF={0x8}]}, 0x70}, 0x1, 0x0, 0x0, 0x20000000}, 0x4008050) write$P9_RUNLINKAT(r3, &(0x7f0000002040)={0x7, 0x4d, 0x1}, 0x7) umount2(&(0x7f0000000080)='./file0\x00', 0x3) 20:06:00 executing program 0: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c47, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x5, 0x8000000}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001080), 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000780)='ext4\x00', &(0x7f0000000240)='./file0\x00', 0x2000480, &(0x7f0000000000)=ANY=[], 0x1, 0x76a, &(0x7f0000000fc0)="$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") open(&(0x7f0000000080)='./bus\x00', 0x6fe44da629969272, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000004400)='./bus\x00', 0x1c1002, 0x0) write$binfmt_misc(r2, &(0x7f0000000500)=ANY=[], 0x5) sendfile(r2, r1, 0x0, 0x1ffff) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x9, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuset.effective_mems\x00', 0x275a, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cgroup.controllers\x00', 0x275a, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r4, 0xc028660f, &(0x7f0000000200)={0x0, r3, 0x1000000000000}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000500)={0x84, 0x2a, 0x7e2881d4b0058261, 0x0, 0x0, {0x1}, [@generic="e4bbac412a17305504ad793ea00a6a8b6af59b93a71efc64f1ba9ffd3d7708256fad7c8c336cf7184b2651994299cad739b99f592c800cf74bc91b2a206bbcf6fb80877577dabf5cd4ec9c33bad91823389f23299d0eeed20059627675267baeec666bd7148a371ce03cab9d2bd75f4e"]}, 0x84}, 0x1, 0x0, 0x0, 0x8}, 0x0) syz_genetlink_get_family_id$devlink(0x0, 0xffffffffffffffff) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r5, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000700)=@newsa={0x138, 0x10, 0x0, 0x0, 0x0, {{@in6=@rand_addr=' \x01\x00', @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}, {@in6=@empty, 0x0, 0x32}, @in=@loopback, {0x0, 0x0, 0xe033, 0x6, 0x0, 0xfffffffffffffffd}}, [@algo_comp={0x48, 0x3, {{'lzs\x00'}}}]}, 0x138}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r4, 0xc018937c, &(0x7f0000000180)={{0x1, 0x1, 0x18, r0}, './bus\x00'}) getsockopt$bt_l2cap_L2CAP_OPTIONS(r6, 0x6, 0x1, &(0x7f0000000280), &(0x7f00000002c0)=0xc) sendmsg$DEVLINK_CMD_SB_POOL_SET(0xffffffffffffffff, 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) syz_open_procfs(0x0, &(0x7f00000001c0)='net/vlan/vlan0\x00') 20:06:01 executing program 3: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c47, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x5, 0x8000000}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001080), 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000780)='ext4\x00', &(0x7f0000000240)='./file0\x00', 0x2000480, &(0x7f0000000000)=ANY=[], 0x1, 0x76a, &(0x7f0000000fc0)="$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") open(&(0x7f0000000080)='./bus\x00', 0x6fe44da629969272, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000004400)='./bus\x00', 0x1c1002, 0x0) write$binfmt_misc(r2, &(0x7f0000000500)=ANY=[], 0x5) sendfile(r2, r1, 0x0, 0x1ffff) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x9, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuset.effective_mems\x00', 0x275a, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cgroup.controllers\x00', 0x275a, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r4, 0xc028660f, &(0x7f0000000200)={0x0, r3, 0x1000000000000}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000500)={0x84, 0x2a, 0x7e2881d4b0058261, 0x0, 0x0, {0x1}, [@generic="e4bbac412a17305504ad793ea00a6a8b6af59b93a71efc64f1ba9ffd3d7708256fad7c8c336cf7184b2651994299cad739b99f592c800cf74bc91b2a206bbcf6fb80877577dabf5cd4ec9c33bad91823389f23299d0eeed20059627675267baeec666bd7148a371ce03cab9d2bd75f4e"]}, 0x84}, 0x1, 0x0, 0x0, 0x8}, 0x0) syz_genetlink_get_family_id$devlink(0x0, 0xffffffffffffffff) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r5, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000700)=@newsa={0x138, 0x10, 0x0, 0x0, 0x0, {{@in6=@rand_addr=' \x01\x00', @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}, {@in6=@empty, 0x0, 0x32}, @in=@loopback, {0x0, 0x0, 0xe033, 0x6, 0x0, 0xfffffffffffffffd}}, [@algo_comp={0x48, 0x3, {{'lzs\x00'}}}]}, 0x138}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r4, 0xc018937c, &(0x7f0000000180)={{0x1, 0x1, 0x18, r0}, './bus\x00'}) getsockopt$bt_l2cap_L2CAP_OPTIONS(r6, 0x6, 0x1, &(0x7f0000000280), &(0x7f00000002c0)=0xc) sendmsg$DEVLINK_CMD_SB_POOL_SET(0xffffffffffffffff, 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) syz_open_procfs(0x0, &(0x7f00000001c0)='net/vlan/vlan0\x00') 20:06:01 executing program 4: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) keyctl$get_persistent(0x16, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x42, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(0xffffffffffffffff, 0x0, 0x0) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(0xffffffffffffffff, 0x80089419, &(0x7f0000002200)) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000280), 0x8100, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), 0x0) mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0) syz_fuse_handle_req(r1, 0x0, 0x0, &(0x7f00000030c0)={0x0, &(0x7f0000000040)={0x18, 0x0, 0x0, {0x5}}, &(0x7f0000000300)={0x18, 0x0, 0x0, {0x4}}, &(0x7f0000000380)={0x18, 0x0, 0x0, {0x1}}, &(0x7f00000024c0)={0x18, 0x0, 0x1f}, &(0x7f0000002580)={0x28, 0x0, 0xff, {{0x4, 0x3, 0x2}}}, 0x0, &(0x7f0000002640)={0x18, 0x0, 0x4, {0x7ff}}, &(0x7f0000002680)=ANY=[@ANYBLOB="1d00000000000073636865645f737769746368000000"], &(0x7f00000026c0)={0x20, 0x0, 0x0, {0x0, 0x1}}, &(0x7f0000002700)={0x78, 0x0, 0x0, {0x800, 0x0, 0x0, {0x0, 0x0, 0xccd8, 0x23, 0x8434, 0xd2a, 0x0, 0x80005, 0x5, 0xc000, 0x6, 0x0, 0xee01, 0x0, 0x6}}}, &(0x7f0000002780)={0x90, 0x0, 0x2, {0x0, 0x3, 0x10001, 0x1f, 0xfffffffe, 0x0, {0x1, 0x3f, 0xffffffffffffff80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x45c1, 0x0, 0x3f, 0xee00, 0x0, 0x5, 0x9}}}, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], &(0x7f0000002bc0)=ANY=[@ANYBLOB="6001000000000000080000000000000000000000000000000100000000000000373900000000000031490000000000003f0000000200000001000000000000f0ffffffff000000000800000000000000080000000000000000000000000000000800000000000000070000000300000098bb000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="01000000ffffff7f00000000060000000000000005000000000000000d00000000004c1b73636865645f7377697463680000000004000000000000000300000000000000010000000000000004000000000000008f000000090000000300000000000000060000000000000000000000000000008100000000000000030000000000000001000000000000000000000009000000fd0000000060000000000000", @ANYRES32=0xee01, @ANYRES32], &(0x7f0000002fc0)={0xa0, 0xfffffffffffffff5, 0x0, {{0x1, 0x1, 0x2, 0x7, 0x6, 0x5, {0x6, 0x81, 0x80000000, 0x935d, 0x5, 0x10001, 0x1, 0x100, 0x2, 0x0, 0x0, 0xee01, 0x0, 0x1}}, {0x0, 0x1}}}, &(0x7f0000003080)={0x20, 0x0, 0x7e41, {0x3145ad07, 0x0, 0x0, 0x7}}}) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB="15000000feffff018000000800395032303030"], 0x15) r4 = syz_open_dev$vcsn(&(0x7f00000001c0), 0x2, 0x0) sendto$ax25(r4, &(0x7f0000000440)="67a9c6157eee7d0843c78bebd8be044f9dd7905e451be2e143888394952dbb86f3048fc552c8dfc3ee4db9f6fad3e48242c4fcbe06746ffc83cb438d1eb52158013306b5a3b692af4de104d10baece3422b2ea6c3dad3057db2288ed4d94182842281899384bb83dd684ae4bde0a98a32ffd6b4247032bbd86fc5a840e29686bc412fef520bfe4d728dc8094a788cc49359dc6409187696194", 0x99, 0x4000, &(0x7f0000000500)={{0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, 0x3}, [@default, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @bcast, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) r5 = dup(r3) write$FUSE_BMAP(r5, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_NOTIFY_RETRIEVE(r5, &(0x7f00000000c0)={0x14c}, 0x137) write$FUSE_INIT(r1, 0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000040), 0x0, &(0x7f0000000300)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r5}, 0x2c, {[{@access_uid}], [], 0x6b}}) mount$fuse(0x0, &(0x7f00000042c0)='./file0\x00', &(0x7f0000002000), 0x0, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x2000}}) add_key$keyring(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f00000020c0), &(0x7f0000002100)={'syz', 0x3}, &(0x7f00000021c0)=ANY=[], 0x48, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x6, 0xffffffffffffffff, 0x0) write$FUSE_BMAP(r4, 0x0, 0x0) keyctl$setperm(0x5, 0x0, 0x1c243911) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000700)=@can_delroute={0x70, 0x19, 0x4, 0x70bd2a, 0x25dfdbfc, {0x1d, 0x1, 0x1}, [@CGW_MOD_UID={0x8}, @CGW_CS_XOR={0x8, 0x5, {0xfffffffffffffffa, 0xfffffffffffffff8, 0x1, 0x40}}, @CGW_FILTER={0xc, 0xb, {{0x4, 0x1, 0x0, 0x1}, {0x4, 0x1, 0x0, 0x1}}}, @CGW_MOD_OR={0x15, 0x2, {{{0x2, 0x0, 0x1}, 0x3, 0x3, 0x0, 0x0, "0ae7836b9d5cd6e2"}, 0x4}}, @CGW_MOD_XOR={0x15, 0x3, {{{0x0, 0x0, 0x1}, 0x2, 0x1, 0x0, 0x0, "3e62eff2ef27f8cd"}, 0x5}}, @CGW_MOD_UID={0x8}, @CGW_DST_IF={0x8}]}, 0x70}, 0x1, 0x0, 0x0, 0x20000000}, 0x4008050) write$P9_RUNLINKAT(r3, &(0x7f0000002040)={0x7, 0x4d, 0x1}, 0x7) umount2(&(0x7f0000000080)='./file0\x00', 0x3) 20:06:01 executing program 2: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) keyctl$get_persistent(0x16, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x42, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(0xffffffffffffffff, 0x0, 0x0) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(0xffffffffffffffff, 0x80089419, &(0x7f0000002200)) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000280), 0x8100, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), 0x0) mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0) syz_fuse_handle_req(r1, 0x0, 0x0, &(0x7f00000030c0)={0x0, &(0x7f0000000040)={0x18, 0x0, 0x0, {0x5}}, &(0x7f0000000300)={0x18, 0x0, 0x0, {0x4}}, &(0x7f0000000380)={0x18, 0x0, 0x0, {0x1}}, &(0x7f00000024c0)={0x18, 0x0, 0x1f}, &(0x7f0000002580)={0x28, 0x0, 0xff, {{0x4, 0x3, 0x2}}}, 0x0, &(0x7f0000002640)={0x18, 0x0, 0x4, {0x7ff}}, &(0x7f0000002680)=ANY=[@ANYBLOB="1d00000000000073636865645f737769746368000000"], &(0x7f00000026c0)={0x20, 0x0, 0x0, {0x0, 0x1}}, &(0x7f0000002700)={0x78, 0x0, 0x0, {0x800, 0x0, 0x0, {0x0, 0x0, 0xccd8, 0x23, 0x8434, 0xd2a, 0x0, 0x80005, 0x5, 0xc000, 0x6, 0x0, 0xee01, 0x0, 0x6}}}, &(0x7f0000002780)={0x90, 0x0, 0x2, {0x0, 0x3, 0x10001, 0x1f, 0xfffffffe, 0x0, {0x1, 0x3f, 0xffffffffffffff80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x45c1, 0x0, 0x3f, 0xee00, 0x0, 0x5, 0x9}}}, &(0x7f0000000580)=ANY=[@ANYBLOB="40010000000000003d0f0000000000000500040000000000050000000000000004000000010000002828292900000000060000000000000000000000000000000300000000000000292427000000000003000000000000000200000000000000040000000010000047504c000900000000000000000000000008000000000000040000008000000047504c00000000050000000000000000000000000000060100000007000000000000000000000003000000000000000104000000000000050000001f0000003a3a2c257e000000000000000000000000000000000000000a000000050000002f6465762f7a65726f000000000000000000000000000000000100000005000000000000000000000001000000000000000300000000000000000000000000002473636865645f7377697663680062a557bbd7cbaf0049"], &(0x7f0000002bc0)=ANY=[@ANYBLOB="6001000000000000080000000000000000000000000000000100000000000000373900000000000031490000000000003f0000000200000001000000000000f0ffffffff000000000800000000000000080000000000000000000000000000000800000000000000070000000300000098bb000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="01000000ffffff7f00000000060000000000000005000000000000000d00000000004c1b73636865645f7377697463680000000004000000000000000300000000000000010000000000000004000000000000008f000000090000000300000000000000060000000000000000000000000000008100000000000000030000000000000001000000000000000000000009000000fd0000000060000000000000", @ANYRES32=0xee01, @ANYRES32], &(0x7f0000002fc0)={0xa0, 0xfffffffffffffff5, 0x0, {{0x1, 0x1, 0x2, 0x7, 0x6, 0x5, {0x6, 0x81, 0x80000000, 0x935d, 0x5, 0x10001, 0x1, 0x100, 0x2, 0x0, 0x0, 0xee01, 0x0, 0x1}}, {0x0, 0x1}}}, &(0x7f0000003080)={0x20, 0x0, 0x7e41, {0x3145ad07, 0x0, 0x0, 0x7}}}) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB="15000000feffff018000000800395032303030"], 0x15) r4 = syz_open_dev$vcsn(&(0x7f00000001c0), 0x2, 0x0) sendto$ax25(r4, &(0x7f0000000440)="67a9c6157eee7d0843c78bebd8be044f9dd7905e451be2e143888394952dbb86f3048fc552c8dfc3ee4db9f6fad3e48242c4fcbe06746ffc83cb438d1eb52158013306b5a3b692af4de104d10baece3422b2ea6c3dad3057db2288ed4d94182842281899384bb83dd684ae4bde0a98a32ffd6b4247032bbd86fc5a840e29686bc412fef520bfe4d728dc8094a788cc49359dc6409187696194", 0x99, 0x4000, &(0x7f0000000500)={{0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, 0x3}, [@default, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @bcast, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) r5 = dup(r3) write$FUSE_BMAP(r5, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_NOTIFY_RETRIEVE(r5, &(0x7f00000000c0)={0x14c}, 0x137) write$FUSE_INIT(r1, 0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000040), 0x0, &(0x7f0000000300)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r5}, 0x2c, {[{@access_uid}], [], 0x6b}}) mount$fuse(0x0, &(0x7f00000042c0)='./file0\x00', &(0x7f0000002000), 0x0, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x2000}}) add_key$keyring(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f00000020c0), &(0x7f0000002100)={'syz', 0x3}, &(0x7f00000021c0)=ANY=[], 0x48, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x6, 0xffffffffffffffff, 0x0) write$FUSE_BMAP(r4, 0x0, 0x0) keyctl$setperm(0x5, 0x0, 0x1c243911) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000700)=@can_delroute={0x70, 0x19, 0x4, 0x70bd2a, 0x25dfdbfc, {0x1d, 0x1, 0x1}, [@CGW_MOD_UID={0x8}, @CGW_CS_XOR={0x8, 0x5, {0xfffffffffffffffa, 0xfffffffffffffff8, 0x1, 0x40}}, @CGW_FILTER={0xc, 0xb, {{0x4, 0x1, 0x0, 0x1}, {0x4, 0x1, 0x0, 0x1}}}, @CGW_MOD_OR={0x15, 0x2, {{{0x2, 0x0, 0x1}, 0x3, 0x3, 0x0, 0x0, "0ae7836b9d5cd6e2"}, 0x4}}, @CGW_MOD_XOR={0x15, 0x3, {{{0x0, 0x0, 0x1}, 0x2, 0x1, 0x0, 0x0, "3e62eff2ef27f8cd"}, 0x5}}, @CGW_MOD_UID={0x8}, @CGW_DST_IF={0x8}]}, 0x70}, 0x1, 0x0, 0x0, 0x20000000}, 0x4008050) write$P9_RUNLINKAT(r3, &(0x7f0000002040)={0x7, 0x4d, 0x1}, 0x7) umount2(&(0x7f0000000080)='./file0\x00', 0x3) 20:06:01 executing program 4: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) keyctl$get_persistent(0x16, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x42, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(0xffffffffffffffff, 0x0, 0x0) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(0xffffffffffffffff, 0x80089419, &(0x7f0000002200)) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000280), 0x8100, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), 0x0) mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0) syz_fuse_handle_req(r1, 0x0, 0x0, &(0x7f00000030c0)={0x0, &(0x7f0000000040)={0x18, 0x0, 0x0, {0x5}}, &(0x7f0000000300)={0x18, 0x0, 0x0, {0x4}}, &(0x7f0000000380)={0x18, 0x0, 0x0, {0x1}}, &(0x7f00000024c0)={0x18, 0x0, 0x1f}, &(0x7f0000002580)={0x28, 0x0, 0xff, {{0x4, 0x3, 0x2}}}, 0x0, &(0x7f0000002640)={0x18, 0x0, 0x4, {0x7ff}}, &(0x7f0000002680)=ANY=[@ANYBLOB="1d00000000000073636865645f737769746368000000"], &(0x7f00000026c0)={0x20, 0x0, 0x0, {0x0, 0x1}}, &(0x7f0000002700)={0x78, 0x0, 0x0, {0x800, 0x0, 0x0, {0x0, 0x0, 0xccd8, 0x23, 0x8434, 0xd2a, 0x0, 0x80005, 0x5, 0xc000, 0x6, 0x0, 0xee01, 0x0, 0x6}}}, &(0x7f0000002780)={0x90, 0x0, 0x2, {0x0, 0x3, 0x10001, 0x1f, 0xfffffffe, 0x0, {0x1, 0x3f, 0xffffffffffffff80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x45c1, 0x0, 0x3f, 0xee00, 0x0, 0x5, 0x9}}}, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], &(0x7f0000002bc0)=ANY=[@ANYBLOB="6001000000000000080000000000000000000000000000000100000000000000373900000000000031490000000000003f0000000200000001000000000000f0ffffffff000000000800000000000000080000000000000000000000000000000800000000000000070000000300000098bb000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="01000000ffffff7f00000000060000000000000005000000000000000d00000000004c1b73636865645f7377697463680000000004000000000000000300000000000000010000000000000004000000000000008f000000090000000300000000000000060000000000000000000000000000008100000000000000030000000000000001000000000000000000000009000000fd0000000060000000000000", @ANYRES32=0xee01, @ANYRES32], &(0x7f0000002fc0)={0xa0, 0xfffffffffffffff5, 0x0, {{0x1, 0x1, 0x2, 0x7, 0x6, 0x5, {0x6, 0x81, 0x80000000, 0x935d, 0x5, 0x10001, 0x1, 0x100, 0x2, 0x0, 0x0, 0xee01, 0x0, 0x1}}, {0x0, 0x1}}}, &(0x7f0000003080)={0x20, 0x0, 0x7e41, {0x3145ad07, 0x0, 0x0, 0x7}}}) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB="15000000feffff018000000800395032303030"], 0x15) r4 = syz_open_dev$vcsn(&(0x7f00000001c0), 0x2, 0x0) sendto$ax25(r4, &(0x7f0000000440)="67a9c6157eee7d0843c78bebd8be044f9dd7905e451be2e143888394952dbb86f3048fc552c8dfc3ee4db9f6fad3e48242c4fcbe06746ffc83cb438d1eb52158013306b5a3b692af4de104d10baece3422b2ea6c3dad3057db2288ed4d94182842281899384bb83dd684ae4bde0a98a32ffd6b4247032bbd86fc5a840e29686bc412fef520bfe4d728dc8094a788cc49359dc6409187696194", 0x99, 0x4000, &(0x7f0000000500)={{0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, 0x3}, [@default, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @bcast, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) r5 = dup(r3) write$FUSE_BMAP(r5, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_NOTIFY_RETRIEVE(r5, &(0x7f00000000c0)={0x14c}, 0x137) write$FUSE_INIT(r1, 0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000040), 0x0, &(0x7f0000000300)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r5}, 0x2c, {[{@access_uid}], [], 0x6b}}) mount$fuse(0x0, &(0x7f00000042c0)='./file0\x00', &(0x7f0000002000), 0x0, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x2000}}) add_key$keyring(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f00000020c0), &(0x7f0000002100)={'syz', 0x3}, &(0x7f00000021c0)=ANY=[], 0x48, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x6, 0xffffffffffffffff, 0x0) write$FUSE_BMAP(r4, 0x0, 0x0) keyctl$setperm(0x5, 0x0, 0x1c243911) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000700)=@can_delroute={0x70, 0x19, 0x4, 0x70bd2a, 0x25dfdbfc, {0x1d, 0x1, 0x1}, [@CGW_MOD_UID={0x8}, @CGW_CS_XOR={0x8, 0x5, {0xfffffffffffffffa, 0xfffffffffffffff8, 0x1, 0x40}}, @CGW_FILTER={0xc, 0xb, {{0x4, 0x1, 0x0, 0x1}, {0x4, 0x1, 0x0, 0x1}}}, @CGW_MOD_OR={0x15, 0x2, {{{0x2, 0x0, 0x1}, 0x3, 0x3, 0x0, 0x0, "0ae7836b9d5cd6e2"}, 0x4}}, @CGW_MOD_XOR={0x15, 0x3, {{{0x0, 0x0, 0x1}, 0x2, 0x1, 0x0, 0x0, "3e62eff2ef27f8cd"}, 0x5}}, @CGW_MOD_UID={0x8}, @CGW_DST_IF={0x8}]}, 0x70}, 0x1, 0x0, 0x0, 0x20000000}, 0x4008050) write$P9_RUNLINKAT(r3, &(0x7f0000002040)={0x7, 0x4d, 0x1}, 0x7) umount2(&(0x7f0000000080)='./file0\x00', 0x3) 20:06:01 executing program 2: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) keyctl$get_persistent(0x16, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x42, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(0xffffffffffffffff, 0x0, 0x0) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(0xffffffffffffffff, 0x80089419, &(0x7f0000002200)) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000280), 0x8100, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), 0x0) mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0) syz_fuse_handle_req(r1, 0x0, 0x0, &(0x7f00000030c0)={0x0, &(0x7f0000000040)={0x18, 0x0, 0x0, {0x5}}, &(0x7f0000000300)={0x18, 0x0, 0x0, {0x4}}, &(0x7f0000000380)={0x18, 0x0, 0x0, {0x1}}, &(0x7f00000024c0)={0x18, 0x0, 0x1f}, &(0x7f0000002580)={0x28, 0x0, 0xff, {{0x4, 0x3, 0x2}}}, 0x0, &(0x7f0000002640)={0x18, 0x0, 0x4, {0x7ff}}, &(0x7f0000002680)=ANY=[@ANYBLOB="1d00000000000073636865645f737769746368000000"], &(0x7f00000026c0)={0x20, 0x0, 0x0, {0x0, 0x1}}, &(0x7f0000002700)={0x78, 0x0, 0x0, {0x800, 0x0, 0x0, {0x0, 0x0, 0xccd8, 0x23, 0x8434, 0xd2a, 0x0, 0x80005, 0x5, 0xc000, 0x6, 0x0, 0xee01, 0x0, 0x6}}}, &(0x7f0000002780)={0x90, 0x0, 0x2, {0x0, 0x3, 0x10001, 0x1f, 0xfffffffe, 0x0, {0x1, 0x3f, 0xffffffffffffff80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x45c1, 0x0, 0x3f, 0xee00, 0x0, 0x5, 0x9}}}, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], &(0x7f0000002bc0)=ANY=[@ANYBLOB="6001000000000000080000000000000000000000000000000100000000000000373900000000000031490000000000003f0000000200000001000000000000f0ffffffff000000000800000000000000080000000000000000000000000000000800000000000000070000000300000098bb000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="01000000ffffff7f00000000060000000000000005000000000000000d00000000004c1b73636865645f7377697463680000000004000000000000000300000000000000010000000000000004000000000000008f000000090000000300000000000000060000000000000000000000000000008100000000000000030000000000000001000000000000000000000009000000fd0000000060000000000000", @ANYRES32=0xee01, @ANYRES32], &(0x7f0000002fc0)={0xa0, 0xfffffffffffffff5, 0x0, {{0x1, 0x1, 0x2, 0x7, 0x6, 0x5, {0x6, 0x81, 0x80000000, 0x935d, 0x5, 0x10001, 0x1, 0x100, 0x2, 0x0, 0x0, 0xee01, 0x0, 0x1}}, {0x0, 0x1}}}, &(0x7f0000003080)={0x20, 0x0, 0x7e41, {0x3145ad07, 0x0, 0x0, 0x7}}}) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB="15000000feffff018000000800395032303030"], 0x15) r4 = syz_open_dev$vcsn(&(0x7f00000001c0), 0x2, 0x0) sendto$ax25(r4, &(0x7f0000000440)="67a9c6157eee7d0843c78bebd8be044f9dd7905e451be2e143888394952dbb86f3048fc552c8dfc3ee4db9f6fad3e48242c4fcbe06746ffc83cb438d1eb52158013306b5a3b692af4de104d10baece3422b2ea6c3dad3057db2288ed4d94182842281899384bb83dd684ae4bde0a98a32ffd6b4247032bbd86fc5a840e29686bc412fef520bfe4d728dc8094a788cc49359dc6409187696194", 0x99, 0x4000, &(0x7f0000000500)={{0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, 0x3}, [@default, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @bcast, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) r5 = dup(r3) write$FUSE_BMAP(r5, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_NOTIFY_RETRIEVE(r5, &(0x7f00000000c0)={0x14c}, 0x137) write$FUSE_INIT(r1, 0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000040), 0x0, &(0x7f0000000300)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r5}, 0x2c, {[{@access_uid}], [], 0x6b}}) mount$fuse(0x0, &(0x7f00000042c0)='./file0\x00', &(0x7f0000002000), 0x0, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x2000}}) add_key$keyring(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f00000020c0), &(0x7f0000002100)={'syz', 0x3}, &(0x7f00000021c0)=ANY=[], 0x48, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x6, 0xffffffffffffffff, 0x0) write$FUSE_BMAP(r4, 0x0, 0x0) keyctl$setperm(0x5, 0x0, 0x1c243911) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000700)=@can_delroute={0x70, 0x19, 0x4, 0x70bd2a, 0x25dfdbfc, {0x1d, 0x1, 0x1}, [@CGW_MOD_UID={0x8}, @CGW_CS_XOR={0x8, 0x5, {0xfffffffffffffffa, 0xfffffffffffffff8, 0x1, 0x40}}, @CGW_FILTER={0xc, 0xb, {{0x4, 0x1, 0x0, 0x1}, {0x4, 0x1, 0x0, 0x1}}}, @CGW_MOD_OR={0x15, 0x2, {{{0x2, 0x0, 0x1}, 0x3, 0x3, 0x0, 0x0, "0ae7836b9d5cd6e2"}, 0x4}}, @CGW_MOD_XOR={0x15, 0x3, {{{0x0, 0x0, 0x1}, 0x2, 0x1, 0x0, 0x0, "3e62eff2ef27f8cd"}, 0x5}}, @CGW_MOD_UID={0x8}, @CGW_DST_IF={0x8}]}, 0x70}, 0x1, 0x0, 0x0, 0x20000000}, 0x4008050) write$P9_RUNLINKAT(r3, &(0x7f0000002040)={0x7, 0x4d, 0x1}, 0x7) umount2(&(0x7f0000000080)='./file0\x00', 0x3) 20:06:01 executing program 5: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c47, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x5, 0x8000000}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001080), 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000780)='ext4\x00', &(0x7f0000000240)='./file0\x00', 0x2000480, &(0x7f0000000000)=ANY=[], 0x1, 0x76a, &(0x7f0000000fc0)="$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") open(&(0x7f0000000080)='./bus\x00', 0x6fe44da629969272, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000004400)='./bus\x00', 0x1c1002, 0x0) write$binfmt_misc(r2, &(0x7f0000000500)=ANY=[], 0x5) sendfile(r2, r1, 0x0, 0x1ffff) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x9, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuset.effective_mems\x00', 0x275a, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cgroup.controllers\x00', 0x275a, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r4, 0xc028660f, &(0x7f0000000200)={0x0, r3, 0x1000000000000}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000500)={0x84, 0x2a, 0x7e2881d4b0058261, 0x0, 0x0, {0x1}, [@generic="e4bbac412a17305504ad793ea00a6a8b6af59b93a71efc64f1ba9ffd3d7708256fad7c8c336cf7184b2651994299cad739b99f592c800cf74bc91b2a206bbcf6fb80877577dabf5cd4ec9c33bad91823389f23299d0eeed20059627675267baeec666bd7148a371ce03cab9d2bd75f4e"]}, 0x84}, 0x1, 0x0, 0x0, 0x8}, 0x0) syz_genetlink_get_family_id$devlink(0x0, 0xffffffffffffffff) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r5, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000700)=@newsa={0x138, 0x10, 0x0, 0x0, 0x0, {{@in6=@rand_addr=' \x01\x00', @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}, {@in6=@empty, 0x0, 0x32}, @in=@loopback, {0x0, 0x0, 0xe033, 0x6, 0x0, 0xfffffffffffffffd}}, [@algo_comp={0x48, 0x3, {{'lzs\x00'}}}]}, 0x138}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r4, 0xc018937c, &(0x7f0000000180)={{0x1, 0x1, 0x18, r0}, './bus\x00'}) getsockopt$bt_l2cap_L2CAP_OPTIONS(r6, 0x6, 0x1, &(0x7f0000000280), &(0x7f00000002c0)=0xc) sendmsg$DEVLINK_CMD_SB_POOL_SET(0xffffffffffffffff, 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) syz_open_procfs(0x0, &(0x7f00000001c0)='net/vlan/vlan0\x00') 20:06:01 executing program 4: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) keyctl$get_persistent(0x16, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x42, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(0xffffffffffffffff, 0x0, 0x0) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(0xffffffffffffffff, 0x80089419, &(0x7f0000002200)) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000280), 0x8100, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), 0x0) mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0) syz_fuse_handle_req(r1, 0x0, 0x0, &(0x7f00000030c0)={0x0, &(0x7f0000000040)={0x18, 0x0, 0x0, {0x5}}, &(0x7f0000000300)={0x18, 0x0, 0x0, {0x4}}, &(0x7f0000000380)={0x18, 0x0, 0x0, {0x1}}, &(0x7f00000024c0)={0x18, 0x0, 0x1f}, &(0x7f0000002580)={0x28, 0x0, 0xff, {{0x4, 0x3, 0x2}}}, 0x0, &(0x7f0000002640)={0x18, 0x0, 0x4, {0x7ff}}, &(0x7f0000002680)=ANY=[@ANYBLOB="1d00000000000073636865645f737769746368000000"], &(0x7f00000026c0)={0x20, 0x0, 0x0, {0x0, 0x1}}, &(0x7f0000002700)={0x78, 0x0, 0x0, {0x800, 0x0, 0x0, {0x0, 0x0, 0xccd8, 0x23, 0x8434, 0xd2a, 0x0, 0x80005, 0x5, 0xc000, 0x6, 0x0, 0xee01, 0x0, 0x6}}}, &(0x7f0000002780)={0x90, 0x0, 0x2, {0x0, 0x3, 0x10001, 0x1f, 0xfffffffe, 0x0, {0x1, 0x3f, 0xffffffffffffff80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x45c1, 0x0, 0x3f, 0xee00, 0x0, 0x5, 0x9}}}, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], &(0x7f0000002bc0)=ANY=[@ANYBLOB="6001000000000000080000000000000000000000000000000100000000000000373900000000000031490000000000003f0000000200000001000000000000f0ffffffff000000000800000000000000080000000000000000000000000000000800000000000000070000000300000098bb000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="01000000ffffff7f00000000060000000000000005000000000000000d00000000004c1b73636865645f7377697463680000000004000000000000000300000000000000010000000000000004000000000000008f000000090000000300000000000000060000000000000000000000000000008100000000000000030000000000000001000000000000000000000009000000fd0000000060000000000000", @ANYRES32=0xee01, @ANYRES32], &(0x7f0000002fc0)={0xa0, 0xfffffffffffffff5, 0x0, {{0x1, 0x1, 0x2, 0x7, 0x6, 0x5, {0x6, 0x81, 0x80000000, 0x935d, 0x5, 0x10001, 0x1, 0x100, 0x2, 0x0, 0x0, 0xee01, 0x0, 0x1}}, {0x0, 0x1}}}, &(0x7f0000003080)={0x20, 0x0, 0x7e41, {0x3145ad07, 0x0, 0x0, 0x7}}}) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB="15000000feffff018000000800395032303030"], 0x15) r4 = syz_open_dev$vcsn(&(0x7f00000001c0), 0x2, 0x0) sendto$ax25(r4, &(0x7f0000000440)="67a9c6157eee7d0843c78bebd8be044f9dd7905e451be2e143888394952dbb86f3048fc552c8dfc3ee4db9f6fad3e48242c4fcbe06746ffc83cb438d1eb52158013306b5a3b692af4de104d10baece3422b2ea6c3dad3057db2288ed4d94182842281899384bb83dd684ae4bde0a98a32ffd6b4247032bbd86fc5a840e29686bc412fef520bfe4d728dc8094a788cc49359dc6409187696194", 0x99, 0x4000, &(0x7f0000000500)={{0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, 0x3}, [@default, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @bcast, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) r5 = dup(r3) write$FUSE_BMAP(r5, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_NOTIFY_RETRIEVE(r5, &(0x7f00000000c0)={0x14c}, 0x137) write$FUSE_INIT(r1, 0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000040), 0x0, &(0x7f0000000300)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r5}, 0x2c, {[{@access_uid}], [], 0x6b}}) mount$fuse(0x0, &(0x7f00000042c0)='./file0\x00', &(0x7f0000002000), 0x0, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x2000}}) add_key$keyring(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f00000020c0), &(0x7f0000002100)={'syz', 0x3}, &(0x7f00000021c0)=ANY=[], 0x48, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x6, 0xffffffffffffffff, 0x0) write$FUSE_BMAP(r4, 0x0, 0x0) keyctl$setperm(0x5, 0x0, 0x1c243911) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000700)=@can_delroute={0x70, 0x19, 0x4, 0x70bd2a, 0x25dfdbfc, {0x1d, 0x1, 0x1}, [@CGW_MOD_UID={0x8}, @CGW_CS_XOR={0x8, 0x5, {0xfffffffffffffffa, 0xfffffffffffffff8, 0x1, 0x40}}, @CGW_FILTER={0xc, 0xb, {{0x4, 0x1, 0x0, 0x1}, {0x4, 0x1, 0x0, 0x1}}}, @CGW_MOD_OR={0x15, 0x2, {{{0x2, 0x0, 0x1}, 0x3, 0x3, 0x0, 0x0, "0ae7836b9d5cd6e2"}, 0x4}}, @CGW_MOD_XOR={0x15, 0x3, {{{0x0, 0x0, 0x1}, 0x2, 0x1, 0x0, 0x0, "3e62eff2ef27f8cd"}, 0x5}}, @CGW_MOD_UID={0x8}, @CGW_DST_IF={0x8}]}, 0x70}, 0x1, 0x0, 0x0, 0x20000000}, 0x4008050) write$P9_RUNLINKAT(r3, &(0x7f0000002040)={0x7, 0x4d, 0x1}, 0x7) umount2(&(0x7f0000000080)='./file0\x00', 0x3) 20:06:01 executing program 1: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c47, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x5, 0x8000000}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001080), 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000780)='ext4\x00', &(0x7f0000000240)='./file0\x00', 0x2000480, &(0x7f0000000000)=ANY=[], 0x1, 0x76a, &(0x7f0000000fc0)="$eJzs3d9rW1UcAPDvTdt17aatIOh8KghaGEvtrJuCDxMfRHAw0Ge3kGZlNm1Gk461FNwQwRdBxQdBX/bsj/nmqz9e9b/wQTamdsOJD1K5adJla9KlW5MI+XzgNOfce9Nzvjn3nnuSe0kC6FsT6Z9MxKGI+CiJGKstTyJiqJobjDixud3t9bV8mpLY2Hjzj6S6za31tXw0PCd1oFZ4MiJ+fD/icGZ7veWV1flcsVhYqpWnKgvnp8orq0fOLeTmCnOFxWPTMzNHj79w/NjexfrXL6sHr3/82rPfnPjnvSeufvhTEifiYG1dYxx7ZSImaq/JUPoS3uXVva6sx5JeN4AHkh6aA5tHeRyKsRio5loY6WbLAIBOeTciNgCAPpM4/wNAn6l/DnBrfS1fT739RKK7brwSEfs3469f39xcM1i7Zre/eh109FZy15WRJCLG96D+iYj44ru3v0pTdOg6JEAzly5HxJnxie3jf7LtnoXdeq6NbSbuKRv/oHu+T+c/Lzab/2W25j/RZP4z3OTYfRD3P/4z1/agmpbS+d/LDfe23W6Iv2Z8oFZ6pDrnG0rOnisW0rHt0YiYjKHhtDy9Qx2TN/+92Wpd4/zvz0/e+TKtP328s0Xm2uDw3c+ZzVVyDxNzoxuXI54abBZ/stX/SYv576k263j9pQ8+b7UujT+Nt562x99ZG1cinmna/3fuaEt2vD9xqro7TNV3iia+/fWz0Vb1N/Z/mtL66+8FuiHt/9Gd4x9PGu/XLO++jp+vjP3Qat3942++/+9L3qrm99WWXcxVKkvTEfuSN7YvP3rnufVyffs0/smnmx//O+3/6XvCM23GP3j9968fPP7OSuOf3VX/7z5z9fb8QKv62+v/mWpusraknfGv3QY+zGsHAAAAAAAAAAAAAAAAAAAAAAAAAO3KRMTBSDLZrXwmk81u/ob34zGaKZbKlcNnS8uLs1H9rezxGMrUv+pyrOH7UKdr34dfLx+9p/x8RDwWEZ8Oj1TL2XypONvr4AEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACg5kCL3/9P/Tbc69YBAB2zv9cNAAC6zvkfAPrP7s7/Ix1rBwDQPd7/A0D/cf4HgP7j/A8AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAECHnTp5Mk0bf6+v5dPy7IWV5fnShSOzhfJ8dmE5n82Xls5n50qluWIhmy8ttPxHlzYfiqXS+ZlYXL44VSmUK1PlldXTC6Xlxcrpcwu5ucLpwlDXIgMAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACA9pVXVudzxWJhSUZGRmYr0zhKjPRugAIAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAD4n/svAAD//9EyKso=") open(&(0x7f0000000080)='./bus\x00', 0x6fe44da629969272, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000004400)='./bus\x00', 0x1c1002, 0x0) write$binfmt_misc(r2, &(0x7f0000000500)=ANY=[], 0x5) sendfile(r2, r1, 0x0, 0x1ffff) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x9, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuset.effective_mems\x00', 0x275a, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cgroup.controllers\x00', 0x275a, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r4, 0xc028660f, &(0x7f0000000200)={0x0, r3, 0x1000000000000}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000500)={0x84, 0x2a, 0x7e2881d4b0058261, 0x0, 0x0, {0x1}, [@generic="e4bbac412a17305504ad793ea00a6a8b6af59b93a71efc64f1ba9ffd3d7708256fad7c8c336cf7184b2651994299cad739b99f592c800cf74bc91b2a206bbcf6fb80877577dabf5cd4ec9c33bad91823389f23299d0eeed20059627675267baeec666bd7148a371ce03cab9d2bd75f4e"]}, 0x84}, 0x1, 0x0, 0x0, 0x8}, 0x0) syz_genetlink_get_family_id$devlink(0x0, 0xffffffffffffffff) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r5, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000700)=@newsa={0x138, 0x10, 0x0, 0x0, 0x0, {{@in6=@rand_addr=' \x01\x00', @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}, {@in6=@empty, 0x0, 0x32}, @in=@loopback, {0x0, 0x0, 0xe033, 0x6, 0x0, 0xfffffffffffffffd}}, [@algo_comp={0x48, 0x3, {{'lzs\x00'}}}]}, 0x138}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r4, 0xc018937c, &(0x7f0000000180)={{0x1, 0x1, 0x18, r0}, './bus\x00'}) getsockopt$bt_l2cap_L2CAP_OPTIONS(r6, 0x6, 0x1, &(0x7f0000000280), &(0x7f00000002c0)=0xc) sendmsg$DEVLINK_CMD_SB_POOL_SET(0xffffffffffffffff, 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) syz_open_procfs(0x0, &(0x7f00000001c0)='net/vlan/vlan0\x00') 20:06:01 executing program 2: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) keyctl$get_persistent(0x16, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x42, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(0xffffffffffffffff, 0x0, 0x0) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(0xffffffffffffffff, 0x80089419, &(0x7f0000002200)) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000280), 0x8100, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), 0x0) mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0) syz_fuse_handle_req(r1, 0x0, 0x0, &(0x7f00000030c0)={0x0, &(0x7f0000000040)={0x18, 0x0, 0x0, {0x5}}, &(0x7f0000000300)={0x18, 0x0, 0x0, {0x4}}, &(0x7f0000000380)={0x18, 0x0, 0x0, {0x1}}, &(0x7f00000024c0)={0x18, 0x0, 0x1f}, &(0x7f0000002580)={0x28, 0x0, 0xff, {{0x4, 0x3, 0x2}}}, 0x0, &(0x7f0000002640)={0x18, 0x0, 0x4, {0x7ff}}, &(0x7f0000002680)=ANY=[@ANYBLOB="1d00000000000073636865645f737769746368000000"], &(0x7f00000026c0)={0x20, 0x0, 0x0, {0x0, 0x1}}, &(0x7f0000002700)={0x78, 0x0, 0x0, {0x800, 0x0, 0x0, {0x0, 0x0, 0xccd8, 0x23, 0x8434, 0xd2a, 0x0, 0x80005, 0x5, 0xc000, 0x6, 0x0, 0xee01, 0x0, 0x6}}}, &(0x7f0000002780)={0x90, 0x0, 0x2, {0x0, 0x3, 0x10001, 0x1f, 0xfffffffe, 0x0, {0x1, 0x3f, 0xffffffffffffff80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x45c1, 0x0, 0x3f, 0xee00, 0x0, 0x5, 0x9}}}, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], &(0x7f0000002bc0)=ANY=[@ANYBLOB="6001000000000000080000000000000000000000000000000100000000000000373900000000000031490000000000003f0000000200000001000000000000f0ffffffff000000000800000000000000080000000000000000000000000000000800000000000000070000000300000098bb000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="01000000ffffff7f00000000060000000000000005000000000000000d00000000004c1b73636865645f7377697463680000000004000000000000000300000000000000010000000000000004000000000000008f000000090000000300000000000000060000000000000000000000000000008100000000000000030000000000000001000000000000000000000009000000fd0000000060000000000000", @ANYRES32=0xee01, @ANYRES32], &(0x7f0000002fc0)={0xa0, 0xfffffffffffffff5, 0x0, {{0x1, 0x1, 0x2, 0x7, 0x6, 0x5, {0x6, 0x81, 0x80000000, 0x935d, 0x5, 0x10001, 0x1, 0x100, 0x2, 0x0, 0x0, 0xee01, 0x0, 0x1}}, {0x0, 0x1}}}, &(0x7f0000003080)={0x20, 0x0, 0x7e41, {0x3145ad07, 0x0, 0x0, 0x7}}}) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB="15000000feffff018000000800395032303030"], 0x15) r4 = syz_open_dev$vcsn(&(0x7f00000001c0), 0x2, 0x0) sendto$ax25(r4, &(0x7f0000000440)="67a9c6157eee7d0843c78bebd8be044f9dd7905e451be2e143888394952dbb86f3048fc552c8dfc3ee4db9f6fad3e48242c4fcbe06746ffc83cb438d1eb52158013306b5a3b692af4de104d10baece3422b2ea6c3dad3057db2288ed4d94182842281899384bb83dd684ae4bde0a98a32ffd6b4247032bbd86fc5a840e29686bc412fef520bfe4d728dc8094a788cc49359dc6409187696194", 0x99, 0x4000, &(0x7f0000000500)={{0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, 0x3}, [@default, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @bcast, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) r5 = dup(r3) write$FUSE_BMAP(r5, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_NOTIFY_RETRIEVE(r5, &(0x7f00000000c0)={0x14c}, 0x137) write$FUSE_INIT(r1, 0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000040), 0x0, &(0x7f0000000300)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r5}, 0x2c, {[{@access_uid}], [], 0x6b}}) mount$fuse(0x0, &(0x7f00000042c0)='./file0\x00', &(0x7f0000002000), 0x0, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x2000}}) add_key$keyring(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f00000020c0), &(0x7f0000002100)={'syz', 0x3}, &(0x7f00000021c0)=ANY=[], 0x48, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x6, 0xffffffffffffffff, 0x0) write$FUSE_BMAP(r4, 0x0, 0x0) keyctl$setperm(0x5, 0x0, 0x1c243911) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000700)=@can_delroute={0x70, 0x19, 0x4, 0x70bd2a, 0x25dfdbfc, {0x1d, 0x1, 0x1}, [@CGW_MOD_UID={0x8}, @CGW_CS_XOR={0x8, 0x5, {0xfffffffffffffffa, 0xfffffffffffffff8, 0x1, 0x40}}, @CGW_FILTER={0xc, 0xb, {{0x4, 0x1, 0x0, 0x1}, {0x4, 0x1, 0x0, 0x1}}}, @CGW_MOD_OR={0x15, 0x2, {{{0x2, 0x0, 0x1}, 0x3, 0x3, 0x0, 0x0, "0ae7836b9d5cd6e2"}, 0x4}}, @CGW_MOD_XOR={0x15, 0x3, {{{0x0, 0x0, 0x1}, 0x2, 0x1, 0x0, 0x0, "3e62eff2ef27f8cd"}, 0x5}}, @CGW_MOD_UID={0x8}, @CGW_DST_IF={0x8}]}, 0x70}, 0x1, 0x0, 0x0, 0x20000000}, 0x4008050) write$P9_RUNLINKAT(r3, &(0x7f0000002040)={0x7, 0x4d, 0x1}, 0x7) umount2(&(0x7f0000000080)='./file0\x00', 0x3) 20:06:01 executing program 4: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) keyctl$get_persistent(0x16, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x42, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(0xffffffffffffffff, 0x0, 0x0) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(0xffffffffffffffff, 0x80089419, &(0x7f0000002200)) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000280), 0x8100, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), 0x0) mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0) syz_fuse_handle_req(r1, 0x0, 0x0, &(0x7f00000030c0)={0x0, &(0x7f0000000040)={0x18, 0x0, 0x0, {0x5}}, &(0x7f0000000300)={0x18, 0x0, 0x0, {0x4}}, &(0x7f0000000380)={0x18, 0x0, 0x0, {0x1}}, &(0x7f00000024c0)={0x18, 0x0, 0x1f}, &(0x7f0000002580)={0x28, 0x0, 0xff, {{0x4, 0x3, 0x2}}}, 0x0, &(0x7f0000002640)={0x18, 0x0, 0x4, {0x7ff}}, &(0x7f0000002680)=ANY=[@ANYBLOB="1d00000000000073636865645f737769746368000000"], &(0x7f00000026c0)={0x20, 0x0, 0x0, {0x0, 0x1}}, &(0x7f0000002700)={0x78, 0x0, 0x0, {0x800, 0x0, 0x0, {0x0, 0x0, 0xccd8, 0x23, 0x8434, 0xd2a, 0x0, 0x80005, 0x5, 0xc000, 0x6, 0x0, 0xee01, 0x0, 0x6}}}, &(0x7f0000002780)={0x90, 0x0, 0x2, {0x0, 0x3, 0x10001, 0x1f, 0xfffffffe, 0x0, {0x1, 0x3f, 0xffffffffffffff80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x45c1, 0x0, 0x3f, 0xee00, 0x0, 0x5, 0x9}}}, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], &(0x7f0000002bc0)=ANY=[@ANYBLOB="6001000000000000080000000000000000000000000000000100000000000000373900000000000031490000000000003f0000000200000001000000000000f0ffffffff000000000800000000000000080000000000000000000000000000000800000000000000070000000300000098bb000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="01000000ffffff7f00000000060000000000000005000000000000000d00000000004c1b73636865645f7377697463680000000004000000000000000300000000000000010000000000000004000000000000008f000000090000000300000000000000060000000000000000000000000000008100000000000000030000000000000001000000000000000000000009000000fd0000000060000000000000", @ANYRES32=0xee01, @ANYRES32], &(0x7f0000002fc0)={0xa0, 0xfffffffffffffff5, 0x0, {{0x1, 0x1, 0x2, 0x7, 0x6, 0x5, {0x6, 0x81, 0x80000000, 0x935d, 0x5, 0x10001, 0x1, 0x100, 0x2, 0x0, 0x0, 0xee01, 0x0, 0x1}}, {0x0, 0x1}}}, &(0x7f0000003080)={0x20, 0x0, 0x7e41, {0x3145ad07, 0x0, 0x0, 0x7}}}) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB="15000000feffff018000000800395032303030"], 0x15) r4 = syz_open_dev$vcsn(&(0x7f00000001c0), 0x2, 0x0) sendto$ax25(r4, &(0x7f0000000440)="67a9c6157eee7d0843c78bebd8be044f9dd7905e451be2e143888394952dbb86f3048fc552c8dfc3ee4db9f6fad3e48242c4fcbe06746ffc83cb438d1eb52158013306b5a3b692af4de104d10baece3422b2ea6c3dad3057db2288ed4d94182842281899384bb83dd684ae4bde0a98a32ffd6b4247032bbd86fc5a840e29686bc412fef520bfe4d728dc8094a788cc49359dc6409187696194", 0x99, 0x4000, &(0x7f0000000500)={{0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, 0x3}, [@default, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @bcast, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) r5 = dup(r3) write$FUSE_BMAP(r5, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_NOTIFY_RETRIEVE(r5, &(0x7f00000000c0)={0x14c}, 0x137) write$FUSE_INIT(r1, 0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000040), 0x0, &(0x7f0000000300)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r5}, 0x2c, {[{@access_uid}], [], 0x6b}}) mount$fuse(0x0, &(0x7f00000042c0)='./file0\x00', &(0x7f0000002000), 0x0, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x2000}}) add_key$keyring(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f00000020c0), &(0x7f0000002100)={'syz', 0x3}, &(0x7f00000021c0)=ANY=[], 0x48, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x6, 0xffffffffffffffff, 0x0) write$FUSE_BMAP(r4, 0x0, 0x0) keyctl$setperm(0x5, 0x0, 0x1c243911) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000700)=@can_delroute={0x70, 0x19, 0x4, 0x70bd2a, 0x25dfdbfc, {0x1d, 0x1, 0x1}, [@CGW_MOD_UID={0x8}, @CGW_CS_XOR={0x8, 0x5, {0xfffffffffffffffa, 0xfffffffffffffff8, 0x1, 0x40}}, @CGW_FILTER={0xc, 0xb, {{0x4, 0x1, 0x0, 0x1}, {0x4, 0x1, 0x0, 0x1}}}, @CGW_MOD_OR={0x15, 0x2, {{{0x2, 0x0, 0x1}, 0x3, 0x3, 0x0, 0x0, "0ae7836b9d5cd6e2"}, 0x4}}, @CGW_MOD_XOR={0x15, 0x3, {{{0x0, 0x0, 0x1}, 0x2, 0x1, 0x0, 0x0, "3e62eff2ef27f8cd"}, 0x5}}, @CGW_MOD_UID={0x8}, @CGW_DST_IF={0x8}]}, 0x70}, 0x1, 0x0, 0x0, 0x20000000}, 0x4008050) write$P9_RUNLINKAT(r3, &(0x7f0000002040)={0x7, 0x4d, 0x1}, 0x7) umount2(&(0x7f0000000080)='./file0\x00', 0x3) [ 335.354573] kauditd_printk_skb: 19 callbacks suppressed [ 335.354615] audit: type=1804 audit(1677355561.939:178): pid=15214 uid=0 auid=4294967295 ses=4294967295 op="invalid_pcr" cause="ToMToU" comm="syz-executor.3" name="/root/syzkaller-testdir1377557887/syzkaller.p22EAP/247/bus" dev="sda1" ino=13921 res=1 20:06:02 executing program 2: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) keyctl$get_persistent(0x16, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x42, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(0xffffffffffffffff, 0x0, 0x0) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(0xffffffffffffffff, 0x80089419, &(0x7f0000002200)) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000280), 0x8100, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), 0x0) mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0) syz_fuse_handle_req(r1, 0x0, 0x0, &(0x7f00000030c0)={0x0, &(0x7f0000000040)={0x18, 0x0, 0x0, {0x5}}, &(0x7f0000000300)={0x18, 0x0, 0x0, {0x4}}, &(0x7f0000000380)={0x18, 0x0, 0x0, {0x1}}, &(0x7f00000024c0)={0x18, 0x0, 0x1f}, &(0x7f0000002580)={0x28, 0x0, 0xff, {{0x4, 0x3, 0x2}}}, 0x0, &(0x7f0000002640)={0x18, 0x0, 0x4, {0x7ff}}, &(0x7f0000002680)=ANY=[@ANYBLOB="1d00000000000073636865645f737769746368000000"], &(0x7f00000026c0)={0x20, 0x0, 0x0, {0x0, 0x1}}, &(0x7f0000002700)={0x78, 0x0, 0x0, {0x800, 0x0, 0x0, {0x0, 0x0, 0xccd8, 0x23, 0x8434, 0xd2a, 0x0, 0x80005, 0x5, 0xc000, 0x6, 0x0, 0xee01, 0x0, 0x6}}}, &(0x7f0000002780)={0x90, 0x0, 0x2, {0x0, 0x3, 0x10001, 0x1f, 0xfffffffe, 0x0, {0x1, 0x3f, 0xffffffffffffff80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x45c1, 0x0, 0x3f, 0xee00, 0x0, 0x5, 0x9}}}, &(0x7f0000000580)=ANY=[@ANYBLOB="40010000000000003d0f0000000000000500040000000000050000000000000004000000010000002828292900000000060000000000000000000000000000000300000000000000292427000000000003000000000000000200000000000000040000000010000047504c000900000000000000000000000008000000000000040000008000000047504c00000000050000000000000000000000000000060100000007000000000000000000000003000000000000000104000000000000050000001f0000003a3a2c257e000000000000000000000000000000000000000a000000050000002f6465762f7a65726f000000000000000000000000000000000100000005000000000000000000000001000000000000000300000000000000000000000000002473636865645f7377697663680062a557bbd7cbaf0049"], &(0x7f0000002bc0)=ANY=[@ANYBLOB="6001000000000000080000000000000000000000000000000100000000000000373900000000000031490000000000003f0000000200000001000000000000f0ffffffff000000000800000000000000080000000000000000000000000000000800000000000000070000000300000098bb000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="01000000ffffff7f00000000060000000000000005000000000000000d00000000004c1b73636865645f7377697463680000000004000000000000000300000000000000010000000000000004000000000000008f000000090000000300000000000000060000000000000000000000000000008100000000000000030000000000000001000000000000000000000009000000fd0000000060000000000000", @ANYRES32=0xee01, @ANYRES32], &(0x7f0000002fc0)={0xa0, 0xfffffffffffffff5, 0x0, {{0x1, 0x1, 0x2, 0x7, 0x6, 0x5, {0x6, 0x81, 0x80000000, 0x935d, 0x5, 0x10001, 0x1, 0x100, 0x2, 0x0, 0x0, 0xee01, 0x0, 0x1}}, {0x0, 0x1}}}, &(0x7f0000003080)={0x20, 0x0, 0x7e41, {0x3145ad07, 0x0, 0x0, 0x7}}}) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB="15000000feffff018000000800395032303030"], 0x15) r4 = syz_open_dev$vcsn(&(0x7f00000001c0), 0x2, 0x0) sendto$ax25(r4, &(0x7f0000000440)="67a9c6157eee7d0843c78bebd8be044f9dd7905e451be2e143888394952dbb86f3048fc552c8dfc3ee4db9f6fad3e48242c4fcbe06746ffc83cb438d1eb52158013306b5a3b692af4de104d10baece3422b2ea6c3dad3057db2288ed4d94182842281899384bb83dd684ae4bde0a98a32ffd6b4247032bbd86fc5a840e29686bc412fef520bfe4d728dc8094a788cc49359dc6409187696194", 0x99, 0x4000, &(0x7f0000000500)={{0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, 0x3}, [@default, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @bcast, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) r5 = dup(r3) write$FUSE_BMAP(r5, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_NOTIFY_RETRIEVE(r5, &(0x7f00000000c0)={0x14c}, 0x137) write$FUSE_INIT(r1, 0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000040), 0x0, &(0x7f0000000300)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r5}, 0x2c, {[{@access_uid}], [], 0x6b}}) mount$fuse(0x0, &(0x7f00000042c0)='./file0\x00', &(0x7f0000002000), 0x0, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x2000}}) add_key$keyring(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f00000020c0), &(0x7f0000002100)={'syz', 0x3}, &(0x7f00000021c0)=ANY=[], 0x48, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x6, 0xffffffffffffffff, 0x0) write$FUSE_BMAP(r4, 0x0, 0x0) keyctl$setperm(0x5, 0x0, 0x1c243911) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000700)=@can_delroute={0x70, 0x19, 0x4, 0x70bd2a, 0x25dfdbfc, {0x1d, 0x1, 0x1}, [@CGW_MOD_UID={0x8}, @CGW_CS_XOR={0x8, 0x5, {0xfffffffffffffffa, 0xfffffffffffffff8, 0x1, 0x40}}, @CGW_FILTER={0xc, 0xb, {{0x4, 0x1, 0x0, 0x1}, {0x4, 0x1, 0x0, 0x1}}}, @CGW_MOD_OR={0x15, 0x2, {{{0x2, 0x0, 0x1}, 0x3, 0x3, 0x0, 0x0, "0ae7836b9d5cd6e2"}, 0x4}}, @CGW_MOD_XOR={0x15, 0x3, {{{0x0, 0x0, 0x1}, 0x2, 0x1, 0x0, 0x0, "3e62eff2ef27f8cd"}, 0x5}}, @CGW_MOD_UID={0x8}, @CGW_DST_IF={0x8}]}, 0x70}, 0x1, 0x0, 0x0, 0x20000000}, 0x4008050) write$P9_RUNLINKAT(r3, &(0x7f0000002040)={0x7, 0x4d, 0x1}, 0x7) umount2(&(0x7f0000000080)='./file0\x00', 0x3) 20:06:02 executing program 4: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) keyctl$get_persistent(0x16, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x42, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(0xffffffffffffffff, 0x0, 0x0) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(0xffffffffffffffff, 0x80089419, &(0x7f0000002200)) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000280), 0x8100, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), 0x0) mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0) syz_fuse_handle_req(r1, 0x0, 0x0, &(0x7f00000030c0)={0x0, &(0x7f0000000040)={0x18, 0x0, 0x0, {0x5}}, &(0x7f0000000300)={0x18, 0x0, 0x0, {0x4}}, &(0x7f0000000380)={0x18, 0x0, 0x0, {0x1}}, &(0x7f00000024c0)={0x18, 0x0, 0x1f}, &(0x7f0000002580)={0x28, 0x0, 0xff, {{0x4, 0x3, 0x2}}}, 0x0, &(0x7f0000002640)={0x18, 0x0, 0x4, {0x7ff}}, &(0x7f0000002680)=ANY=[@ANYBLOB="1d00000000000073636865645f737769746368000000"], &(0x7f00000026c0)={0x20, 0x0, 0x0, {0x0, 0x1}}, &(0x7f0000002700)={0x78, 0x0, 0x0, {0x800, 0x0, 0x0, {0x0, 0x0, 0xccd8, 0x23, 0x8434, 0xd2a, 0x0, 0x80005, 0x5, 0xc000, 0x6, 0x0, 0xee01, 0x0, 0x6}}}, &(0x7f0000002780)={0x90, 0x0, 0x2, {0x0, 0x3, 0x10001, 0x1f, 0xfffffffe, 0x0, {0x1, 0x3f, 0xffffffffffffff80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x45c1, 0x0, 0x3f, 0xee00, 0x0, 0x5, 0x9}}}, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], &(0x7f0000002bc0)=ANY=[@ANYBLOB="6001000000000000080000000000000000000000000000000100000000000000373900000000000031490000000000003f0000000200000001000000000000f0ffffffff000000000800000000000000080000000000000000000000000000000800000000000000070000000300000098bb000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="01000000ffffff7f00000000060000000000000005000000000000000d00000000004c1b73636865645f7377697463680000000004000000000000000300000000000000010000000000000004000000000000008f000000090000000300000000000000060000000000000000000000000000008100000000000000030000000000000001000000000000000000000009000000fd0000000060000000000000", @ANYRES32=0xee01, @ANYRES32], &(0x7f0000002fc0)={0xa0, 0xfffffffffffffff5, 0x0, {{0x1, 0x1, 0x2, 0x7, 0x6, 0x5, {0x6, 0x81, 0x80000000, 0x935d, 0x5, 0x10001, 0x1, 0x100, 0x2, 0x0, 0x0, 0xee01, 0x0, 0x1}}, {0x0, 0x1}}}, &(0x7f0000003080)={0x20, 0x0, 0x7e41, {0x3145ad07, 0x0, 0x0, 0x7}}}) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB="15000000feffff018000000800395032303030"], 0x15) r4 = syz_open_dev$vcsn(&(0x7f00000001c0), 0x2, 0x0) sendto$ax25(r4, &(0x7f0000000440)="67a9c6157eee7d0843c78bebd8be044f9dd7905e451be2e143888394952dbb86f3048fc552c8dfc3ee4db9f6fad3e48242c4fcbe06746ffc83cb438d1eb52158013306b5a3b692af4de104d10baece3422b2ea6c3dad3057db2288ed4d94182842281899384bb83dd684ae4bde0a98a32ffd6b4247032bbd86fc5a840e29686bc412fef520bfe4d728dc8094a788cc49359dc6409187696194", 0x99, 0x4000, &(0x7f0000000500)={{0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, 0x3}, [@default, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @bcast, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) r5 = dup(r3) write$FUSE_BMAP(r5, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_NOTIFY_RETRIEVE(r5, &(0x7f00000000c0)={0x14c}, 0x137) write$FUSE_INIT(r1, 0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000040), 0x0, &(0x7f0000000300)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r5}, 0x2c, {[{@access_uid}], [], 0x6b}}) mount$fuse(0x0, &(0x7f00000042c0)='./file0\x00', &(0x7f0000002000), 0x0, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x2000}}) add_key$keyring(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f00000020c0), &(0x7f0000002100)={'syz', 0x3}, &(0x7f00000021c0)=ANY=[], 0x48, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x6, 0xffffffffffffffff, 0x0) write$FUSE_BMAP(r4, 0x0, 0x0) keyctl$setperm(0x5, 0x0, 0x1c243911) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000700)=@can_delroute={0x70, 0x19, 0x4, 0x70bd2a, 0x25dfdbfc, {0x1d, 0x1, 0x1}, [@CGW_MOD_UID={0x8}, @CGW_CS_XOR={0x8, 0x5, {0xfffffffffffffffa, 0xfffffffffffffff8, 0x1, 0x40}}, @CGW_FILTER={0xc, 0xb, {{0x4, 0x1, 0x0, 0x1}, {0x4, 0x1, 0x0, 0x1}}}, @CGW_MOD_OR={0x15, 0x2, {{{0x2, 0x0, 0x1}, 0x3, 0x3, 0x0, 0x0, "0ae7836b9d5cd6e2"}, 0x4}}, @CGW_MOD_XOR={0x15, 0x3, {{{0x0, 0x0, 0x1}, 0x2, 0x1, 0x0, 0x0, "3e62eff2ef27f8cd"}, 0x5}}, @CGW_MOD_UID={0x8}, @CGW_DST_IF={0x8}]}, 0x70}, 0x1, 0x0, 0x0, 0x20000000}, 0x4008050) write$P9_RUNLINKAT(r3, &(0x7f0000002040)={0x7, 0x4d, 0x1}, 0x7) umount2(&(0x7f0000000080)='./file0\x00', 0x3) 20:06:02 executing program 0: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) keyctl$get_persistent(0x16, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x42, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(0xffffffffffffffff, 0x0, 0x0) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(0xffffffffffffffff, 0x80089419, &(0x7f0000002200)) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000280), 0x8100, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), 0x0) mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0) syz_fuse_handle_req(r1, 0x0, 0x0, &(0x7f00000030c0)={0x0, &(0x7f0000000040)={0x18, 0x0, 0x0, {0x5}}, &(0x7f0000000300)={0x18, 0x0, 0x0, {0x4}}, &(0x7f0000000380)={0x18, 0x0, 0x0, {0x1}}, &(0x7f00000024c0)={0x18, 0x0, 0x1f}, &(0x7f0000002580)={0x28, 0x0, 0xff, {{0x4, 0x3, 0x2}}}, 0x0, &(0x7f0000002640)={0x18, 0x0, 0x4, {0x7ff}}, &(0x7f0000002680)=ANY=[@ANYBLOB="1d00000000000073636865645f737769746368000000"], &(0x7f00000026c0)={0x20, 0x0, 0x0, {0x0, 0x1}}, &(0x7f0000002700)={0x78, 0x0, 0x0, {0x800, 0x0, 0x0, {0x0, 0x0, 0xccd8, 0x23, 0x8434, 0xd2a, 0x0, 0x80005, 0x5, 0xc000, 0x6, 0x0, 0xee01, 0x0, 0x6}}}, &(0x7f0000002780)={0x90, 0x0, 0x2, {0x0, 0x3, 0x10001, 0x1f, 0xfffffffe, 0x0, {0x1, 0x3f, 0xffffffffffffff80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x45c1, 0x0, 0x3f, 0xee00, 0x0, 0x5, 0x9}}}, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], &(0x7f0000002bc0)=ANY=[@ANYBLOB="6001000000000000080000000000000000000000000000000100000000000000373900000000000031490000000000003f0000000200000001000000000000f0ffffffff000000000800000000000000080000000000000000000000000000000800000000000000070000000300000098bb000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="01000000ffffff7f00000000060000000000000005000000000000000d00000000004c1b73636865645f7377697463680000000004000000000000000300000000000000010000000000000004000000000000008f000000090000000300000000000000060000000000000000000000000000008100000000000000030000000000000001000000000000000000000009000000fd0000000060000000000000", @ANYRES32=0xee01, @ANYRES32], &(0x7f0000002fc0)={0xa0, 0xfffffffffffffff5, 0x0, {{0x1, 0x1, 0x2, 0x7, 0x6, 0x5, {0x6, 0x81, 0x80000000, 0x935d, 0x5, 0x10001, 0x1, 0x100, 0x2, 0x0, 0x0, 0xee01, 0x0, 0x1}}, {0x0, 0x1}}}, &(0x7f0000003080)={0x20, 0x0, 0x7e41, {0x3145ad07, 0x0, 0x0, 0x7}}}) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB="15000000feffff018000000800395032303030"], 0x15) r4 = syz_open_dev$vcsn(&(0x7f00000001c0), 0x2, 0x0) sendto$ax25(r4, &(0x7f0000000440)="67a9c6157eee7d0843c78bebd8be044f9dd7905e451be2e143888394952dbb86f3048fc552c8dfc3ee4db9f6fad3e48242c4fcbe06746ffc83cb438d1eb52158013306b5a3b692af4de104d10baece3422b2ea6c3dad3057db2288ed4d94182842281899384bb83dd684ae4bde0a98a32ffd6b4247032bbd86fc5a840e29686bc412fef520bfe4d728dc8094a788cc49359dc6409187696194", 0x99, 0x4000, &(0x7f0000000500)={{0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, 0x3}, [@default, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @bcast, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) r5 = dup(r3) write$FUSE_BMAP(r5, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_NOTIFY_RETRIEVE(r5, &(0x7f00000000c0)={0x14c}, 0x137) write$FUSE_INIT(r1, 0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000040), 0x0, &(0x7f0000000300)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r5}, 0x2c, {[{@access_uid}], [], 0x6b}}) mount$fuse(0x0, &(0x7f00000042c0)='./file0\x00', &(0x7f0000002000), 0x0, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x2000}}) add_key$keyring(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f00000020c0), &(0x7f0000002100)={'syz', 0x3}, &(0x7f00000021c0)=ANY=[], 0x48, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x6, 0xffffffffffffffff, 0x0) write$FUSE_BMAP(r4, 0x0, 0x0) keyctl$setperm(0x5, 0x0, 0x1c243911) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000700)=@can_delroute={0x70, 0x19, 0x4, 0x70bd2a, 0x25dfdbfc, {0x1d, 0x1, 0x1}, [@CGW_MOD_UID={0x8}, @CGW_CS_XOR={0x8, 0x5, {0xfffffffffffffffa, 0xfffffffffffffff8, 0x1, 0x40}}, @CGW_FILTER={0xc, 0xb, {{0x4, 0x1, 0x0, 0x1}, {0x4, 0x1, 0x0, 0x1}}}, @CGW_MOD_OR={0x15, 0x2, {{{0x2, 0x0, 0x1}, 0x3, 0x3, 0x0, 0x0, "0ae7836b9d5cd6e2"}, 0x4}}, @CGW_MOD_XOR={0x15, 0x3, {{{0x0, 0x0, 0x1}, 0x2, 0x1, 0x0, 0x0, "3e62eff2ef27f8cd"}, 0x5}}, @CGW_MOD_UID={0x8}, @CGW_DST_IF={0x8}]}, 0x70}, 0x1, 0x0, 0x0, 0x20000000}, 0x4008050) write$P9_RUNLINKAT(r3, &(0x7f0000002040)={0x7, 0x4d, 0x1}, 0x7) umount2(&(0x7f0000000080)='./file0\x00', 0x3) 20:06:02 executing program 2: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) keyctl$get_persistent(0x16, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x42, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(0xffffffffffffffff, 0x0, 0x0) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(0xffffffffffffffff, 0x80089419, &(0x7f0000002200)) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000280), 0x8100, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), 0x0) mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0) syz_fuse_handle_req(r1, 0x0, 0x0, &(0x7f00000030c0)={0x0, &(0x7f0000000040)={0x18, 0x0, 0x0, {0x5}}, &(0x7f0000000300)={0x18, 0x0, 0x0, {0x4}}, &(0x7f0000000380)={0x18, 0x0, 0x0, {0x1}}, &(0x7f00000024c0)={0x18, 0x0, 0x1f}, &(0x7f0000002580)={0x28, 0x0, 0xff, {{0x4, 0x3, 0x2}}}, 0x0, &(0x7f0000002640)={0x18, 0x0, 0x4, {0x7ff}}, &(0x7f0000002680)=ANY=[@ANYBLOB="1d00000000000073636865645f737769746368000000"], &(0x7f00000026c0)={0x20, 0x0, 0x0, {0x0, 0x1}}, &(0x7f0000002700)={0x78, 0x0, 0x0, {0x800, 0x0, 0x0, {0x0, 0x0, 0xccd8, 0x23, 0x8434, 0xd2a, 0x0, 0x80005, 0x5, 0xc000, 0x6, 0x0, 0xee01, 0x0, 0x6}}}, &(0x7f0000002780)={0x90, 0x0, 0x2, {0x0, 0x3, 0x10001, 0x1f, 0xfffffffe, 0x0, {0x1, 0x3f, 0xffffffffffffff80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x45c1, 0x0, 0x3f, 0xee00, 0x0, 0x5, 0x9}}}, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], &(0x7f0000002bc0)=ANY=[@ANYBLOB="6001000000000000080000000000000000000000000000000100000000000000373900000000000031490000000000003f0000000200000001000000000000f0ffffffff000000000800000000000000080000000000000000000000000000000800000000000000070000000300000098bb000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="01000000ffffff7f00000000060000000000000005000000000000000d00000000004c1b73636865645f7377697463680000000004000000000000000300000000000000010000000000000004000000000000008f000000090000000300000000000000060000000000000000000000000000008100000000000000030000000000000001000000000000000000000009000000fd0000000060000000000000", @ANYRES32=0xee01, @ANYRES32], &(0x7f0000002fc0)={0xa0, 0xfffffffffffffff5, 0x0, {{0x1, 0x1, 0x2, 0x7, 0x6, 0x5, {0x6, 0x81, 0x80000000, 0x935d, 0x5, 0x10001, 0x1, 0x100, 0x2, 0x0, 0x0, 0xee01, 0x0, 0x1}}, {0x0, 0x1}}}, &(0x7f0000003080)={0x20, 0x0, 0x7e41, {0x3145ad07, 0x0, 0x0, 0x7}}}) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB="15000000feffff018000000800395032303030"], 0x15) r4 = syz_open_dev$vcsn(&(0x7f00000001c0), 0x2, 0x0) sendto$ax25(r4, &(0x7f0000000440)="67a9c6157eee7d0843c78bebd8be044f9dd7905e451be2e143888394952dbb86f3048fc552c8dfc3ee4db9f6fad3e48242c4fcbe06746ffc83cb438d1eb52158013306b5a3b692af4de104d10baece3422b2ea6c3dad3057db2288ed4d94182842281899384bb83dd684ae4bde0a98a32ffd6b4247032bbd86fc5a840e29686bc412fef520bfe4d728dc8094a788cc49359dc6409187696194", 0x99, 0x4000, &(0x7f0000000500)={{0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, 0x3}, [@default, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @bcast, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) r5 = dup(r3) write$FUSE_BMAP(r5, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_NOTIFY_RETRIEVE(r5, &(0x7f00000000c0)={0x14c}, 0x137) write$FUSE_INIT(r1, 0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000040), 0x0, &(0x7f0000000300)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r5}, 0x2c, {[{@access_uid}], [], 0x6b}}) mount$fuse(0x0, &(0x7f00000042c0)='./file0\x00', &(0x7f0000002000), 0x0, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x2000}}) add_key$keyring(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f00000020c0), &(0x7f0000002100)={'syz', 0x3}, &(0x7f00000021c0)=ANY=[], 0x48, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x6, 0xffffffffffffffff, 0x0) write$FUSE_BMAP(r4, 0x0, 0x0) keyctl$setperm(0x5, 0x0, 0x1c243911) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000700)=@can_delroute={0x70, 0x19, 0x4, 0x70bd2a, 0x25dfdbfc, {0x1d, 0x1, 0x1}, [@CGW_MOD_UID={0x8}, @CGW_CS_XOR={0x8, 0x5, {0xfffffffffffffffa, 0xfffffffffffffff8, 0x1, 0x40}}, @CGW_FILTER={0xc, 0xb, {{0x4, 0x1, 0x0, 0x1}, {0x4, 0x1, 0x0, 0x1}}}, @CGW_MOD_OR={0x15, 0x2, {{{0x2, 0x0, 0x1}, 0x3, 0x3, 0x0, 0x0, "0ae7836b9d5cd6e2"}, 0x4}}, @CGW_MOD_XOR={0x15, 0x3, {{{0x0, 0x0, 0x1}, 0x2, 0x1, 0x0, 0x0, "3e62eff2ef27f8cd"}, 0x5}}, @CGW_MOD_UID={0x8}, @CGW_DST_IF={0x8}]}, 0x70}, 0x1, 0x0, 0x0, 0x20000000}, 0x4008050) write$P9_RUNLINKAT(r3, &(0x7f0000002040)={0x7, 0x4d, 0x1}, 0x7) umount2(&(0x7f0000000080)='./file0\x00', 0x3) 20:06:02 executing program 3: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) keyctl$get_persistent(0x16, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x42, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(0xffffffffffffffff, 0x0, 0x0) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(0xffffffffffffffff, 0x80089419, &(0x7f0000002200)) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000280), 0x8100, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), 0x0) mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0) syz_fuse_handle_req(r1, 0x0, 0x0, &(0x7f00000030c0)={0x0, &(0x7f0000000040)={0x18, 0x0, 0x0, {0x5}}, &(0x7f0000000300)={0x18, 0x0, 0x0, {0x4}}, &(0x7f0000000380)={0x18, 0x0, 0x0, {0x1}}, &(0x7f00000024c0)={0x18, 0x0, 0x1f}, &(0x7f0000002580)={0x28, 0x0, 0xff, {{0x4, 0x3, 0x2}}}, 0x0, &(0x7f0000002640)={0x18, 0x0, 0x4, {0x7ff}}, &(0x7f0000002680)=ANY=[@ANYBLOB="1d00000000000073636865645f737769746368000000"], &(0x7f00000026c0)={0x20, 0x0, 0x0, {0x0, 0x1}}, &(0x7f0000002700)={0x78, 0x0, 0x0, {0x800, 0x0, 0x0, {0x0, 0x0, 0xccd8, 0x23, 0x8434, 0xd2a, 0x0, 0x80005, 0x5, 0xc000, 0x6, 0x0, 0xee01, 0x0, 0x6}}}, &(0x7f0000002780)={0x90, 0x0, 0x2, {0x0, 0x3, 0x10001, 0x1f, 0xfffffffe, 0x0, {0x1, 0x3f, 0xffffffffffffff80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x45c1, 0x0, 0x3f, 0xee00, 0x0, 0x5, 0x9}}}, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], &(0x7f0000002bc0)=ANY=[@ANYBLOB="6001000000000000080000000000000000000000000000000100000000000000373900000000000031490000000000003f0000000200000001000000000000f0ffffffff000000000800000000000000080000000000000000000000000000000800000000000000070000000300000098bb000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="01000000ffffff7f00000000060000000000000005000000000000000d00000000004c1b73636865645f7377697463680000000004000000000000000300000000000000010000000000000004000000000000008f000000090000000300000000000000060000000000000000000000000000008100000000000000030000000000000001000000000000000000000009000000fd0000000060000000000000", @ANYRES32=0xee01, @ANYRES32], &(0x7f0000002fc0)={0xa0, 0xfffffffffffffff5, 0x0, {{0x1, 0x1, 0x2, 0x7, 0x6, 0x5, {0x6, 0x81, 0x80000000, 0x935d, 0x5, 0x10001, 0x1, 0x100, 0x2, 0x0, 0x0, 0xee01, 0x0, 0x1}}, {0x0, 0x1}}}, &(0x7f0000003080)={0x20, 0x0, 0x7e41, {0x3145ad07, 0x0, 0x0, 0x7}}}) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB="15000000feffff018000000800395032303030"], 0x15) r4 = syz_open_dev$vcsn(&(0x7f00000001c0), 0x2, 0x0) sendto$ax25(r4, &(0x7f0000000440)="67a9c6157eee7d0843c78bebd8be044f9dd7905e451be2e143888394952dbb86f3048fc552c8dfc3ee4db9f6fad3e48242c4fcbe06746ffc83cb438d1eb52158013306b5a3b692af4de104d10baece3422b2ea6c3dad3057db2288ed4d94182842281899384bb83dd684ae4bde0a98a32ffd6b4247032bbd86fc5a840e29686bc412fef520bfe4d728dc8094a788cc49359dc6409187696194", 0x99, 0x4000, &(0x7f0000000500)={{0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, 0x3}, [@default, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @bcast, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) r5 = dup(r3) write$FUSE_BMAP(r5, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_NOTIFY_RETRIEVE(r5, &(0x7f00000000c0)={0x14c}, 0x137) write$FUSE_INIT(r1, 0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000040), 0x0, &(0x7f0000000300)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r5}, 0x2c, {[{@access_uid}], [], 0x6b}}) mount$fuse(0x0, &(0x7f00000042c0)='./file0\x00', &(0x7f0000002000), 0x0, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x2000}}) add_key$keyring(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f00000020c0), &(0x7f0000002100)={'syz', 0x3}, &(0x7f00000021c0)=ANY=[], 0x48, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x6, 0xffffffffffffffff, 0x0) write$FUSE_BMAP(r4, 0x0, 0x0) keyctl$setperm(0x5, 0x0, 0x1c243911) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000700)=@can_delroute={0x70, 0x19, 0x4, 0x70bd2a, 0x25dfdbfc, {0x1d, 0x1, 0x1}, [@CGW_MOD_UID={0x8}, @CGW_CS_XOR={0x8, 0x5, {0xfffffffffffffffa, 0xfffffffffffffff8, 0x1, 0x40}}, @CGW_FILTER={0xc, 0xb, {{0x4, 0x1, 0x0, 0x1}, {0x4, 0x1, 0x0, 0x1}}}, @CGW_MOD_OR={0x15, 0x2, {{{0x2, 0x0, 0x1}, 0x3, 0x3, 0x0, 0x0, "0ae7836b9d5cd6e2"}, 0x4}}, @CGW_MOD_XOR={0x15, 0x3, {{{0x0, 0x0, 0x1}, 0x2, 0x1, 0x0, 0x0, "3e62eff2ef27f8cd"}, 0x5}}, @CGW_MOD_UID={0x8}, @CGW_DST_IF={0x8}]}, 0x70}, 0x1, 0x0, 0x0, 0x20000000}, 0x4008050) write$P9_RUNLINKAT(r3, &(0x7f0000002040)={0x7, 0x4d, 0x1}, 0x7) umount2(&(0x7f0000000080)='./file0\x00', 0x3) 20:06:02 executing program 0: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) keyctl$get_persistent(0x16, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x42, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(0xffffffffffffffff, 0x0, 0x0) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(0xffffffffffffffff, 0x80089419, &(0x7f0000002200)) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000280), 0x8100, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), 0x0) mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0) syz_fuse_handle_req(r1, 0x0, 0x0, &(0x7f00000030c0)={0x0, &(0x7f0000000040)={0x18, 0x0, 0x0, {0x5}}, &(0x7f0000000300)={0x18, 0x0, 0x0, {0x4}}, &(0x7f0000000380)={0x18, 0x0, 0x0, {0x1}}, &(0x7f00000024c0)={0x18, 0x0, 0x1f}, &(0x7f0000002580)={0x28, 0x0, 0xff, {{0x4, 0x3, 0x2}}}, 0x0, &(0x7f0000002640)={0x18, 0x0, 0x4, {0x7ff}}, &(0x7f0000002680)=ANY=[@ANYBLOB="1d00000000000073636865645f737769746368000000"], &(0x7f00000026c0)={0x20, 0x0, 0x0, {0x0, 0x1}}, &(0x7f0000002700)={0x78, 0x0, 0x0, {0x800, 0x0, 0x0, {0x0, 0x0, 0xccd8, 0x23, 0x8434, 0xd2a, 0x0, 0x80005, 0x5, 0xc000, 0x6, 0x0, 0xee01, 0x0, 0x6}}}, &(0x7f0000002780)={0x90, 0x0, 0x2, {0x0, 0x3, 0x10001, 0x1f, 0xfffffffe, 0x0, {0x1, 0x3f, 0xffffffffffffff80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x45c1, 0x0, 0x3f, 0xee00, 0x0, 0x5, 0x9}}}, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], &(0x7f0000002bc0)=ANY=[@ANYBLOB="6001000000000000080000000000000000000000000000000100000000000000373900000000000031490000000000003f0000000200000001000000000000f0ffffffff000000000800000000000000080000000000000000000000000000000800000000000000070000000300000098bb000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="01000000ffffff7f00000000060000000000000005000000000000000d00000000004c1b73636865645f7377697463680000000004000000000000000300000000000000010000000000000004000000000000008f000000090000000300000000000000060000000000000000000000000000008100000000000000030000000000000001000000000000000000000009000000fd0000000060000000000000", @ANYRES32=0xee01, @ANYRES32], &(0x7f0000002fc0)={0xa0, 0xfffffffffffffff5, 0x0, {{0x1, 0x1, 0x2, 0x7, 0x6, 0x5, {0x6, 0x81, 0x80000000, 0x935d, 0x5, 0x10001, 0x1, 0x100, 0x2, 0x0, 0x0, 0xee01, 0x0, 0x1}}, {0x0, 0x1}}}, &(0x7f0000003080)={0x20, 0x0, 0x7e41, {0x3145ad07, 0x0, 0x0, 0x7}}}) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB="15000000feffff018000000800395032303030"], 0x15) r4 = syz_open_dev$vcsn(&(0x7f00000001c0), 0x2, 0x0) sendto$ax25(r4, &(0x7f0000000440)="67a9c6157eee7d0843c78bebd8be044f9dd7905e451be2e143888394952dbb86f3048fc552c8dfc3ee4db9f6fad3e48242c4fcbe06746ffc83cb438d1eb52158013306b5a3b692af4de104d10baece3422b2ea6c3dad3057db2288ed4d94182842281899384bb83dd684ae4bde0a98a32ffd6b4247032bbd86fc5a840e29686bc412fef520bfe4d728dc8094a788cc49359dc6409187696194", 0x99, 0x4000, &(0x7f0000000500)={{0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, 0x3}, [@default, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @bcast, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) r5 = dup(r3) write$FUSE_BMAP(r5, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_NOTIFY_RETRIEVE(r5, &(0x7f00000000c0)={0x14c}, 0x137) write$FUSE_INIT(r1, 0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000040), 0x0, &(0x7f0000000300)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r5}, 0x2c, {[{@access_uid}], [], 0x6b}}) mount$fuse(0x0, &(0x7f00000042c0)='./file0\x00', &(0x7f0000002000), 0x0, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x2000}}) add_key$keyring(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f00000020c0), &(0x7f0000002100)={'syz', 0x3}, &(0x7f00000021c0)=ANY=[], 0x48, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x6, 0xffffffffffffffff, 0x0) write$FUSE_BMAP(r4, 0x0, 0x0) keyctl$setperm(0x5, 0x0, 0x1c243911) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000700)=@can_delroute={0x70, 0x19, 0x4, 0x70bd2a, 0x25dfdbfc, {0x1d, 0x1, 0x1}, [@CGW_MOD_UID={0x8}, @CGW_CS_XOR={0x8, 0x5, {0xfffffffffffffffa, 0xfffffffffffffff8, 0x1, 0x40}}, @CGW_FILTER={0xc, 0xb, {{0x4, 0x1, 0x0, 0x1}, {0x4, 0x1, 0x0, 0x1}}}, @CGW_MOD_OR={0x15, 0x2, {{{0x2, 0x0, 0x1}, 0x3, 0x3, 0x0, 0x0, "0ae7836b9d5cd6e2"}, 0x4}}, @CGW_MOD_XOR={0x15, 0x3, {{{0x0, 0x0, 0x1}, 0x2, 0x1, 0x0, 0x0, "3e62eff2ef27f8cd"}, 0x5}}, @CGW_MOD_UID={0x8}, @CGW_DST_IF={0x8}]}, 0x70}, 0x1, 0x0, 0x0, 0x20000000}, 0x4008050) write$P9_RUNLINKAT(r3, &(0x7f0000002040)={0x7, 0x4d, 0x1}, 0x7) umount2(&(0x7f0000000080)='./file0\x00', 0x3) 20:06:02 executing program 3: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) keyctl$get_persistent(0x16, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x42, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(0xffffffffffffffff, 0x0, 0x0) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(0xffffffffffffffff, 0x80089419, &(0x7f0000002200)) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000280), 0x8100, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), 0x0) mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0) syz_fuse_handle_req(r1, 0x0, 0x0, &(0x7f00000030c0)={0x0, &(0x7f0000000040)={0x18, 0x0, 0x0, {0x5}}, &(0x7f0000000300)={0x18, 0x0, 0x0, {0x4}}, &(0x7f0000000380)={0x18, 0x0, 0x0, {0x1}}, &(0x7f00000024c0)={0x18, 0x0, 0x1f}, &(0x7f0000002580)={0x28, 0x0, 0xff, {{0x4, 0x3, 0x2}}}, 0x0, &(0x7f0000002640)={0x18, 0x0, 0x4, {0x7ff}}, &(0x7f0000002680)=ANY=[@ANYBLOB="1d00000000000073636865645f737769746368000000"], &(0x7f00000026c0)={0x20, 0x0, 0x0, {0x0, 0x1}}, &(0x7f0000002700)={0x78, 0x0, 0x0, {0x800, 0x0, 0x0, {0x0, 0x0, 0xccd8, 0x23, 0x8434, 0xd2a, 0x0, 0x80005, 0x5, 0xc000, 0x6, 0x0, 0xee01, 0x0, 0x6}}}, &(0x7f0000002780)={0x90, 0x0, 0x2, {0x0, 0x3, 0x10001, 0x1f, 0xfffffffe, 0x0, {0x1, 0x3f, 0xffffffffffffff80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x45c1, 0x0, 0x3f, 0xee00, 0x0, 0x5, 0x9}}}, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], &(0x7f0000002bc0)=ANY=[@ANYBLOB="6001000000000000080000000000000000000000000000000100000000000000373900000000000031490000000000003f0000000200000001000000000000f0ffffffff000000000800000000000000080000000000000000000000000000000800000000000000070000000300000098bb000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="01000000ffffff7f00000000060000000000000005000000000000000d00000000004c1b73636865645f7377697463680000000004000000000000000300000000000000010000000000000004000000000000008f000000090000000300000000000000060000000000000000000000000000008100000000000000030000000000000001000000000000000000000009000000fd0000000060000000000000", @ANYRES32=0xee01, @ANYRES32], &(0x7f0000002fc0)={0xa0, 0xfffffffffffffff5, 0x0, {{0x1, 0x1, 0x2, 0x7, 0x6, 0x5, {0x6, 0x81, 0x80000000, 0x935d, 0x5, 0x10001, 0x1, 0x100, 0x2, 0x0, 0x0, 0xee01, 0x0, 0x1}}, {0x0, 0x1}}}, &(0x7f0000003080)={0x20, 0x0, 0x7e41, {0x3145ad07, 0x0, 0x0, 0x7}}}) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB="15000000feffff018000000800395032303030"], 0x15) r4 = syz_open_dev$vcsn(&(0x7f00000001c0), 0x2, 0x0) sendto$ax25(r4, &(0x7f0000000440)="67a9c6157eee7d0843c78bebd8be044f9dd7905e451be2e143888394952dbb86f3048fc552c8dfc3ee4db9f6fad3e48242c4fcbe06746ffc83cb438d1eb52158013306b5a3b692af4de104d10baece3422b2ea6c3dad3057db2288ed4d94182842281899384bb83dd684ae4bde0a98a32ffd6b4247032bbd86fc5a840e29686bc412fef520bfe4d728dc8094a788cc49359dc6409187696194", 0x99, 0x4000, &(0x7f0000000500)={{0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, 0x3}, [@default, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @bcast, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) r5 = dup(r3) write$FUSE_BMAP(r5, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_NOTIFY_RETRIEVE(r5, &(0x7f00000000c0)={0x14c}, 0x137) write$FUSE_INIT(r1, 0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000040), 0x0, &(0x7f0000000300)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r5}, 0x2c, {[{@access_uid}], [], 0x6b}}) mount$fuse(0x0, &(0x7f00000042c0)='./file0\x00', &(0x7f0000002000), 0x0, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x2000}}) add_key$keyring(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f00000020c0), &(0x7f0000002100)={'syz', 0x3}, &(0x7f00000021c0)=ANY=[], 0x48, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x6, 0xffffffffffffffff, 0x0) write$FUSE_BMAP(r4, 0x0, 0x0) keyctl$setperm(0x5, 0x0, 0x1c243911) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000700)=@can_delroute={0x70, 0x19, 0x4, 0x70bd2a, 0x25dfdbfc, {0x1d, 0x1, 0x1}, [@CGW_MOD_UID={0x8}, @CGW_CS_XOR={0x8, 0x5, {0xfffffffffffffffa, 0xfffffffffffffff8, 0x1, 0x40}}, @CGW_FILTER={0xc, 0xb, {{0x4, 0x1, 0x0, 0x1}, {0x4, 0x1, 0x0, 0x1}}}, @CGW_MOD_OR={0x15, 0x2, {{{0x2, 0x0, 0x1}, 0x3, 0x3, 0x0, 0x0, "0ae7836b9d5cd6e2"}, 0x4}}, @CGW_MOD_XOR={0x15, 0x3, {{{0x0, 0x0, 0x1}, 0x2, 0x1, 0x0, 0x0, "3e62eff2ef27f8cd"}, 0x5}}, @CGW_MOD_UID={0x8}, @CGW_DST_IF={0x8}]}, 0x70}, 0x1, 0x0, 0x0, 0x20000000}, 0x4008050) write$P9_RUNLINKAT(r3, &(0x7f0000002040)={0x7, 0x4d, 0x1}, 0x7) umount2(&(0x7f0000000080)='./file0\x00', 0x3) [ 335.927885] audit: type=1804 audit(1677355562.509:179): pid=15254 uid=0 auid=4294967295 ses=4294967295 op="invalid_pcr" cause="open_writers" comm="syz-executor.5" name="/root/syzkaller-testdir2782243939/syzkaller.gZJ0jW/257/bus" dev="sda1" ino=14497 res=1 [ 336.111198] audit: type=1804 audit(1677355562.549:180): pid=15228 uid=0 auid=4294967295 ses=4294967295 op="invalid_pcr" cause="ToMToU" comm="syz-executor.5" name="/root/syzkaller-testdir2782243939/syzkaller.gZJ0jW/257/bus" dev="sda1" ino=14497 res=1 [ 336.157254] audit: type=1804 audit(1677355562.579:181): pid=15257 uid=0 auid=4294967295 ses=4294967295 op="invalid_pcr" cause="ToMToU" comm="syz-executor.5" name="/root/syzkaller-testdir2782243939/syzkaller.gZJ0jW/257/bus" dev="sda1" ino=14497 res=1 [ 336.207753] audit: type=1804 audit(1677355562.779:182): pid=15235 uid=0 auid=4294967295 ses=4294967295 op="invalid_pcr" cause="open_writers" comm="syz-executor.1" name="/root/syzkaller-testdir3295352786/syzkaller.7PI3PL/239/bus" dev="sda1" ino=13886 res=1 [ 336.238033] audit: type=1804 audit(1677355562.789:183): pid=15235 uid=0 auid=4294967295 ses=4294967295 op="invalid_pcr" cause="ToMToU" comm="syz-executor.1" name="/root/syzkaller-testdir3295352786/syzkaller.7PI3PL/239/bus" dev="sda1" ino=13886 res=1 20:06:02 executing program 4: syslog(0x2, &(0x7f0000000080)=""/134, 0x86) gettid() ioprio_set$pid(0x0, 0x0, 0x0) msgctl$IPC_SET(0x0, 0x1, 0x0) getegid() getegid() ioprio_set$pid(0x0, 0x0, 0x0) getuid() 20:06:02 executing program 3: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) keyctl$get_persistent(0x16, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x42, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(0xffffffffffffffff, 0x0, 0x0) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(0xffffffffffffffff, 0x80089419, &(0x7f0000002200)) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000280), 0x8100, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), 0x0) mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0) syz_fuse_handle_req(r1, 0x0, 0x0, &(0x7f00000030c0)={0x0, &(0x7f0000000040)={0x18, 0x0, 0x0, {0x5}}, &(0x7f0000000300)={0x18, 0x0, 0x0, {0x4}}, &(0x7f0000000380)={0x18, 0x0, 0x0, {0x1}}, &(0x7f00000024c0)={0x18, 0x0, 0x1f}, &(0x7f0000002580)={0x28, 0x0, 0xff, {{0x4, 0x3, 0x2}}}, 0x0, &(0x7f0000002640)={0x18, 0x0, 0x4, {0x7ff}}, &(0x7f0000002680)=ANY=[@ANYBLOB="1d00000000000073636865645f737769746368000000"], &(0x7f00000026c0)={0x20, 0x0, 0x0, {0x0, 0x1}}, &(0x7f0000002700)={0x78, 0x0, 0x0, {0x800, 0x0, 0x0, {0x0, 0x0, 0xccd8, 0x23, 0x8434, 0xd2a, 0x0, 0x80005, 0x5, 0xc000, 0x6, 0x0, 0xee01, 0x0, 0x6}}}, &(0x7f0000002780)={0x90, 0x0, 0x2, {0x0, 0x3, 0x10001, 0x1f, 0xfffffffe, 0x0, {0x1, 0x3f, 0xffffffffffffff80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x45c1, 0x0, 0x3f, 0xee00, 0x0, 0x5, 0x9}}}, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], &(0x7f0000002bc0)=ANY=[@ANYBLOB="6001000000000000080000000000000000000000000000000100000000000000373900000000000031490000000000003f0000000200000001000000000000f0ffffffff000000000800000000000000080000000000000000000000000000000800000000000000070000000300000098bb000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="01000000ffffff7f00000000060000000000000005000000000000000d00000000004c1b73636865645f7377697463680000000004000000000000000300000000000000010000000000000004000000000000008f000000090000000300000000000000060000000000000000000000000000008100000000000000030000000000000001000000000000000000000009000000fd0000000060000000000000", @ANYRES32=0xee01, @ANYRES32], &(0x7f0000002fc0)={0xa0, 0xfffffffffffffff5, 0x0, {{0x1, 0x1, 0x2, 0x7, 0x6, 0x5, {0x6, 0x81, 0x80000000, 0x935d, 0x5, 0x10001, 0x1, 0x100, 0x2, 0x0, 0x0, 0xee01, 0x0, 0x1}}, {0x0, 0x1}}}, &(0x7f0000003080)={0x20, 0x0, 0x7e41, {0x3145ad07, 0x0, 0x0, 0x7}}}) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB="15000000feffff018000000800395032303030"], 0x15) r4 = syz_open_dev$vcsn(&(0x7f00000001c0), 0x2, 0x0) sendto$ax25(r4, &(0x7f0000000440)="67a9c6157eee7d0843c78bebd8be044f9dd7905e451be2e143888394952dbb86f3048fc552c8dfc3ee4db9f6fad3e48242c4fcbe06746ffc83cb438d1eb52158013306b5a3b692af4de104d10baece3422b2ea6c3dad3057db2288ed4d94182842281899384bb83dd684ae4bde0a98a32ffd6b4247032bbd86fc5a840e29686bc412fef520bfe4d728dc8094a788cc49359dc6409187696194", 0x99, 0x4000, &(0x7f0000000500)={{0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, 0x3}, [@default, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @bcast, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) r5 = dup(r3) write$FUSE_BMAP(r5, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_NOTIFY_RETRIEVE(r5, &(0x7f00000000c0)={0x14c}, 0x137) write$FUSE_INIT(r1, 0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000040), 0x0, &(0x7f0000000300)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r5}, 0x2c, {[{@access_uid}], [], 0x6b}}) mount$fuse(0x0, &(0x7f00000042c0)='./file0\x00', &(0x7f0000002000), 0x0, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x2000}}) add_key$keyring(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f00000020c0), &(0x7f0000002100)={'syz', 0x3}, &(0x7f00000021c0)=ANY=[], 0x48, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x6, 0xffffffffffffffff, 0x0) write$FUSE_BMAP(r4, 0x0, 0x0) keyctl$setperm(0x5, 0x0, 0x1c243911) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000700)=@can_delroute={0x70, 0x19, 0x4, 0x70bd2a, 0x25dfdbfc, {0x1d, 0x1, 0x1}, [@CGW_MOD_UID={0x8}, @CGW_CS_XOR={0x8, 0x5, {0xfffffffffffffffa, 0xfffffffffffffff8, 0x1, 0x40}}, @CGW_FILTER={0xc, 0xb, {{0x4, 0x1, 0x0, 0x1}, {0x4, 0x1, 0x0, 0x1}}}, @CGW_MOD_OR={0x15, 0x2, {{{0x2, 0x0, 0x1}, 0x3, 0x3, 0x0, 0x0, "0ae7836b9d5cd6e2"}, 0x4}}, @CGW_MOD_XOR={0x15, 0x3, {{{0x0, 0x0, 0x1}, 0x2, 0x1, 0x0, 0x0, "3e62eff2ef27f8cd"}, 0x5}}, @CGW_MOD_UID={0x8}, @CGW_DST_IF={0x8}]}, 0x70}, 0x1, 0x0, 0x0, 0x20000000}, 0x4008050) write$P9_RUNLINKAT(r3, &(0x7f0000002040)={0x7, 0x4d, 0x1}, 0x7) umount2(&(0x7f0000000080)='./file0\x00', 0x3) 20:06:03 executing program 3: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x400000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) r1 = syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) r2 = add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r3 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f0000000d00)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=0xffffffffffffffff, @ANYBLOB="00000004000000002e2f62bb75f396a9a27e5e0176eac9506f8a91513129cbe76f93e58a74ce416adbfe800dd0ec81a75eeaa66209eb4d92afa3d6a3eebde7cfb85ce89cb564f1d3b5efb219cf8b5d37a271e7e163656925d1b6e5414087b711c6908cc623d609e7b2753bb6bbcbf510e4393da480ceefae5ff550974932ecb442a333dd8fa9cc6f26a0e45f63c36e4901ab2a827884973cbd71b80595c386661c9c9fc5df8b0f569dd413fa11189d8872604d82681b29bef4df4368bdea68b628a9b3d32f7ab8a1f03f69cb683265ddc5710b659080d0b999c46f81b426af64eb1b1b4238378c072c9b993c2b8d43cf53ee097aaa3b"]) perf_event_open(&(0x7f0000000880)={0x5, 0x80, 0x40, 0x7c, 0x20, 0xc6, 0x0, 0xfffffffffffffff7, 0x20428, 0x6, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x40, 0x4, @perf_config_ext={0xffffffff, 0x4}, 0x10000, 0x55dd, 0x7, 0x3, 0x1, 0x9ac, 0x6a, 0x0, 0x63, 0x0, 0x8001}, r0, 0xa, r4, 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r3) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r3) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400003, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb5, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) ioctl$BTRFS_IOC_QUOTA_RESCAN_STATUS(r1, 0x8040942d, &(0x7f0000000b40)) r5 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r5, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r6 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) r7 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000b80), 0x2, 0x0) write(r7, &(0x7f0000000bc0)="40e470887482237b1f431e10acc071d7e36e45dd841998beab3efbb468747d8dbb333477ff6d7e0b50dd0ed7e7a8392f662f50c4a9a687aacb4edb223f80c48df42d958c815cc79f2ad2d0d04d03daf0f4738e419aa1c9eaf2d50a9a705805d356ba45cd0568a972f712b327a8ebaf0be155a9a3aec7afcf66a4327e7263915228b2792f", 0x84) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r6, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x170, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r8 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, r2) keyctl$revoke(0x3, r8) add_key$user(&(0x7f0000000280), &(0x7f0000000600)={'syz', 0x1}, &(0x7f0000000640)="3d21f0a9279db9b5ff9e49752a55aec5a551ddbe24dde81f61784beb209751af28ab0653e7437dc885adc48b9082a78bd83d547e54939aeb38d31ede5a39aadc49cc790e9e9e321948ddb43d561e94466754761c630e63637e", 0x59, r2) openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000940), 0x404041, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000980)) r9 = timerfd_create(0x4, 0x800) ioctl(r9, 0x1, &(0x7f0000000c80)="21d5a7ddbbf3bddabc1b13008a14556c5f68fe67f930e3d5e116aeca6e5255d4535c084ee8aaa621fa01f9637ce0755877f60e98b6f2933de1c1f19faacddb8cebd782083526d5c452680c5827b599") 20:06:03 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) sched_setaffinity(0x0, 0x8, &(0x7f00000000c0)=0x105) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000700)={0x0}}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000300)=ANY=[@ANYBLOB="c73c93915f2fbaf9f4c2fe9eca9d3e59700d03670c05dea71d436005165ad04dfcc8d71422f101fbc2619dc93fd11cfe9a720575fcd5238e808c370886ae319dcc9173489dfebfc988d4317fca10c2f9609a7103b7670133eb98a5516cee7db4b5e945d80213cccb8ae48717949de1b462adb22cc2de7544ada36abb91f805f2b8d5e97f45da0025c48e338ce6b53ca38fff"], &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x41000, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x80) sendmsg$DEVLINK_CMD_SB_OCC_MAX_CLEAR(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f00000005c0)={&(0x7f00000004c0)={0xa8, 0x0, 0x800, 0x70bd27, 0x25dfdbff, {}, [{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0xb, 0xfffffff7}}, {@pci={{0x8}, {0x11}}, {0x8}}, {@pci={{0x8}, {0x11}}, {0x8, 0xb, 0xce95}}, {@pci={{0x8}, {0x11}}, {0x8, 0xb, 0xffffffff}}]}, 0xa8}}, 0x4000001) socket$igmp6(0xa, 0x3, 0x2) truncate(&(0x7f0000000400)='./file0\x00', 0x3) setpgid(0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000440)='./file0\x00', 0x40000, 0xfffffffffffffffe, 0x3, 0x0, &(0x7f0000000000)) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040), 0x42, 0x0) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000002140)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}}) 20:06:03 executing program 0: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) keyctl$get_persistent(0x16, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x42, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(0xffffffffffffffff, 0x0, 0x0) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(0xffffffffffffffff, 0x80089419, &(0x7f0000002200)) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000280), 0x8100, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), 0x0) mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0) syz_fuse_handle_req(r1, 0x0, 0x0, &(0x7f00000030c0)={0x0, &(0x7f0000000040)={0x18, 0x0, 0x0, {0x5}}, &(0x7f0000000300)={0x18, 0x0, 0x0, {0x4}}, &(0x7f0000000380)={0x18, 0x0, 0x0, {0x1}}, &(0x7f00000024c0)={0x18, 0x0, 0x1f}, &(0x7f0000002580)={0x28, 0x0, 0xff, {{0x4, 0x3, 0x2}}}, 0x0, &(0x7f0000002640)={0x18, 0x0, 0x4, {0x7ff}}, &(0x7f0000002680)=ANY=[@ANYBLOB="1d00000000000073636865645f737769746368000000"], &(0x7f00000026c0)={0x20, 0x0, 0x0, {0x0, 0x1}}, &(0x7f0000002700)={0x78, 0x0, 0x0, {0x800, 0x0, 0x0, {0x0, 0x0, 0xccd8, 0x23, 0x8434, 0xd2a, 0x0, 0x80005, 0x5, 0xc000, 0x6, 0x0, 0xee01, 0x0, 0x6}}}, &(0x7f0000002780)={0x90, 0x0, 0x2, {0x0, 0x3, 0x10001, 0x1f, 0xfffffffe, 0x0, {0x1, 0x3f, 0xffffffffffffff80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x45c1, 0x0, 0x3f, 0xee00, 0x0, 0x5, 0x9}}}, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], &(0x7f0000002bc0)=ANY=[@ANYBLOB="6001000000000000080000000000000000000000000000000100000000000000373900000000000031490000000000003f0000000200000001000000000000f0ffffffff000000000800000000000000080000000000000000000000000000000800000000000000070000000300000098bb000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="01000000ffffff7f00000000060000000000000005000000000000000d00000000004c1b73636865645f7377697463680000000004000000000000000300000000000000010000000000000004000000000000008f000000090000000300000000000000060000000000000000000000000000008100000000000000030000000000000001000000000000000000000009000000fd0000000060000000000000", @ANYRES32=0xee01, @ANYRES32], &(0x7f0000002fc0)={0xa0, 0xfffffffffffffff5, 0x0, {{0x1, 0x1, 0x2, 0x7, 0x6, 0x5, {0x6, 0x81, 0x80000000, 0x935d, 0x5, 0x10001, 0x1, 0x100, 0x2, 0x0, 0x0, 0xee01, 0x0, 0x1}}, {0x0, 0x1}}}, &(0x7f0000003080)={0x20, 0x0, 0x7e41, {0x3145ad07, 0x0, 0x0, 0x7}}}) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB="15000000feffff018000000800395032303030"], 0x15) r4 = syz_open_dev$vcsn(&(0x7f00000001c0), 0x2, 0x0) sendto$ax25(r4, &(0x7f0000000440)="67a9c6157eee7d0843c78bebd8be044f9dd7905e451be2e143888394952dbb86f3048fc552c8dfc3ee4db9f6fad3e48242c4fcbe06746ffc83cb438d1eb52158013306b5a3b692af4de104d10baece3422b2ea6c3dad3057db2288ed4d94182842281899384bb83dd684ae4bde0a98a32ffd6b4247032bbd86fc5a840e29686bc412fef520bfe4d728dc8094a788cc49359dc6409187696194", 0x99, 0x4000, &(0x7f0000000500)={{0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, 0x3}, [@default, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @bcast, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) r5 = dup(r3) write$FUSE_BMAP(r5, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_NOTIFY_RETRIEVE(r5, &(0x7f00000000c0)={0x14c}, 0x137) write$FUSE_INIT(r1, 0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000040), 0x0, &(0x7f0000000300)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r5}, 0x2c, {[{@access_uid}], [], 0x6b}}) mount$fuse(0x0, &(0x7f00000042c0)='./file0\x00', &(0x7f0000002000), 0x0, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x2000}}) add_key$keyring(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f00000020c0), &(0x7f0000002100)={'syz', 0x3}, &(0x7f00000021c0)=ANY=[], 0x48, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x6, 0xffffffffffffffff, 0x0) write$FUSE_BMAP(r4, 0x0, 0x0) keyctl$setperm(0x5, 0x0, 0x1c243911) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000700)=@can_delroute={0x70, 0x19, 0x4, 0x70bd2a, 0x25dfdbfc, {0x1d, 0x1, 0x1}, [@CGW_MOD_UID={0x8}, @CGW_CS_XOR={0x8, 0x5, {0xfffffffffffffffa, 0xfffffffffffffff8, 0x1, 0x40}}, @CGW_FILTER={0xc, 0xb, {{0x4, 0x1, 0x0, 0x1}, {0x4, 0x1, 0x0, 0x1}}}, @CGW_MOD_OR={0x15, 0x2, {{{0x2, 0x0, 0x1}, 0x3, 0x3, 0x0, 0x0, "0ae7836b9d5cd6e2"}, 0x4}}, @CGW_MOD_XOR={0x15, 0x3, {{{0x0, 0x0, 0x1}, 0x2, 0x1, 0x0, 0x0, "3e62eff2ef27f8cd"}, 0x5}}, @CGW_MOD_UID={0x8}, @CGW_DST_IF={0x8}]}, 0x70}, 0x1, 0x0, 0x0, 0x20000000}, 0x4008050) write$P9_RUNLINKAT(r3, &(0x7f0000002040)={0x7, 0x4d, 0x1}, 0x7) umount2(&(0x7f0000000080)='./file0\x00', 0x3) 20:06:03 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) sched_setaffinity(0x0, 0x8, &(0x7f0000000000)=0x5) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad413e850000000f00000095"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x18, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r3}, 0x10) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$TIPC_NL_NET_GET(r5, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000140)={0x0, 0x14}}, 0x0) getsockname$packet(r5, &(0x7f00000004c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000300)=0x14) r7 = socket$nl_route(0x10, 0x3, 0x0) r8 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r8, 0x8916, &(0x7f0000000100)={@dev={0xfe, 0x80, '\x00', 0x2}, 0x0, r9}) sendmsg$nl_route(r7, &(0x7f0000000440)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0xc0}, 0xc0c5) r10 = socket$nl_route(0x10, 0x3, 0x0) r11 = open(&(0x7f0000000800)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x14000, 0x88) socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), r11) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) sendmsg$nl_route(r10, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000005840)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000600)=ANY=[@ANYBLOB="780000002400518600"/20, @ANYRES32=r12, @ANYBLOB="00000000ffffffff0000000008000100736671"], 0x78}}, 0x0) sendmsg$nl_route(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newlink={0x40, 0x10, 0xffffff1f, 0x1, 0x0, {0x0, 0x0, 0x0, 0x0, 0xffffff81}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @wireguard={{0xe}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x40}}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000000)={0x8, 0x5, &(0x7f0000000640)=ANY=[@ANYBLOB="18000000000000000000000008cb040000000010e0ae68032dc506c43c6ed996701956499ccd691d6bfe98739d5604fe64bcbb46024554d3f7e979dfd5313cb8b35eeb88888530a28fae064fb600000000a9d85a35d158cb8b4d32ba3a06d3b2d297ea0900000000000000d9b6095e9ef9b0db33f2b453da1d6cadc9880900fe9be04163e190efb7093ae99d3547e8b79f9e4fb8326b9ee23a52a97907ebe50e7a5820360000000020745630caa8aad7f4d56e377d12abafa86f0f85f05d671e65ab73af", @ANYRES32, @ANYBLOB="000000000000000095000000000000"], &(0x7f00000001c0)='GPL\x00', 0x2, 0x8a, &(0x7f0000000200)=""/138, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 20:06:03 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$IPSET_CMD_LIST(r2, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={0x0, 0x14}}, 0x0) getsockname$packet(r2, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="00b0720000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000900)=@newqdisc={0x60, 0x24, 0xf1d, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0xfff1, 0xffff}}, [@qdisc_kind_options=@q_tbf={{0x8}, {0x34, 0x2, [@TCA_TBF_PARMS={0x28}, @TCA_TBF_BURST={0x8, 0x6, 0x401}]}}]}, 0x60}}, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) getsockname$packet(r5, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x3) sendmsg$nl_route_sched(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)=@newqdisc={0x34, 0x24, 0xf1d, 0x0, 0x0, {0x0, 0x0, 0x0, r6, {}, {0x0, 0xffff}}, [@qdisc_kind_options=@q_pfifo_fast={0xf}]}, 0x34}}, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) r8 = socket(0x10, 0x803, 0x0) getsockname$packet(r8, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x3) sendmsg$nl_route_sched(r7, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)=@newqdisc={0x24, 0x24, 0xf1d, 0x0, 0x0, {0x0, 0x0, 0x0, r9, {}, {0x0, 0xffff}}}, 0x24}}, 0x0) 20:06:03 executing program 4: perf_event_open(&(0x7f0000000980)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x80000800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) close(r0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3e69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x8) ioctl$TUNGETFILTER(r0, 0x801054db, &(0x7f0000000300)=""/187) getpid() write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00'], 0x6) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='blkio.bfq.idle_time\x00', 0x0, 0x0) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f00000000c0)=0x10000) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'lo\x00', 0x4000}) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0x0, 0x0, 0x8}, 0xc) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x2) openat$cgroup_ro(r1, &(0x7f0000000180)='blkio.bfq.empty_time\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TUNSETLINK(r2, 0x400454cd, 0x0) [ 336.597796] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.1'. [ 336.623481] sch_tbf: burst 1025 is lower than device veth11 mtu (1514) ! 20:06:04 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) sched_setaffinity(0x0, 0x8, &(0x7f0000000000)=0x5) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad413e850000000f00000095"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x18, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r3}, 0x10) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$TIPC_NL_NET_GET(r5, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000140)={0x0, 0x14}}, 0x0) getsockname$packet(r5, &(0x7f00000004c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000300)=0x14) r7 = socket$nl_route(0x10, 0x3, 0x0) r8 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r8, 0x8916, &(0x7f0000000100)={@dev={0xfe, 0x80, '\x00', 0x2}, 0x0, r9}) sendmsg$nl_route(r7, &(0x7f0000000440)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0xc0}, 0xc0c5) r10 = socket$nl_route(0x10, 0x3, 0x0) r11 = open(&(0x7f0000000800)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x14000, 0x88) socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), r11) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) sendmsg$nl_route(r10, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000005840)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000600)=ANY=[@ANYBLOB="780000002400518600"/20, @ANYRES32=r12, @ANYBLOB="00000000ffffffff0000000008000100736671"], 0x78}}, 0x0) sendmsg$nl_route(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newlink={0x40, 0x10, 0xffffff1f, 0x1, 0x0, {0x0, 0x0, 0x0, 0x0, 0xffffff81}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @wireguard={{0xe}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x40}}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000000)={0x8, 0x5, &(0x7f0000000640)=ANY=[@ANYBLOB="18000000000000000000000008cb040000000010e0ae68032dc506c43c6ed996701956499ccd691d6bfe98739d5604fe64bcbb46024554d3f7e979dfd5313cb8b35eeb88888530a28fae064fb600000000a9d85a35d158cb8b4d32ba3a06d3b2d297ea0900000000000000d9b6095e9ef9b0db33f2b453da1d6cadc9880900fe9be04163e190efb7093ae99d3547e8b79f9e4fb8326b9ee23a52a97907ebe50e7a5820360000000020745630caa8aad7f4d56e377d12abafa86f0f85f05d671e65ab73af", @ANYRES32, @ANYBLOB="000000000000000095000000000000"], &(0x7f00000001c0)='GPL\x00', 0x2, 0x8a, &(0x7f0000000200)=""/138, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 20:06:04 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) sched_setaffinity(0x0, 0x8, &(0x7f00000000c0)=0x105) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000700)={0x0}}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000300)=ANY=[@ANYBLOB="c73c93915f2fbaf9f4c2fe9eca9d3e59700d03670c05dea71d436005165ad04dfcc8d71422f101fbc2619dc93fd11cfe9a720575fcd5238e808c370886ae319dcc9173489dfebfc988d4317fca10c2f9609a7103b7670133eb98a5516cee7db4b5e945d80213cccb8ae48717949de1b462adb22cc2de7544ada36abb91f805f2b8d5e97f45da0025c48e338ce6b53ca38fff"], &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x41000, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x80) sendmsg$DEVLINK_CMD_SB_OCC_MAX_CLEAR(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f00000005c0)={&(0x7f00000004c0)={0xa8, 0x0, 0x800, 0x70bd27, 0x25dfdbff, {}, [{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0xb, 0xfffffff7}}, {@pci={{0x8}, {0x11}}, {0x8}}, {@pci={{0x8}, {0x11}}, {0x8, 0xb, 0xce95}}, {@pci={{0x8}, {0x11}}, {0x8, 0xb, 0xffffffff}}]}, 0xa8}}, 0x4000001) socket$igmp6(0xa, 0x3, 0x2) truncate(&(0x7f0000000400)='./file0\x00', 0x3) setpgid(0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000440)='./file0\x00', 0x40000, 0xfffffffffffffffe, 0x3, 0x0, &(0x7f0000000000)) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040), 0x42, 0x0) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000002140)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}}) 20:06:04 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$IPSET_CMD_LIST(r2, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={0x0, 0x14}}, 0x0) getsockname$packet(r2, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="00b0720000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000900)=@newqdisc={0x60, 0x24, 0xf1d, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0xfff1, 0xffff}}, [@qdisc_kind_options=@q_tbf={{0x8}, {0x34, 0x2, [@TCA_TBF_PARMS={0x28}, @TCA_TBF_BURST={0x8, 0x6, 0x401}]}}]}, 0x60}}, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) getsockname$packet(r5, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x3) sendmsg$nl_route_sched(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)=@newqdisc={0x34, 0x24, 0xf1d, 0x0, 0x0, {0x0, 0x0, 0x0, r6, {}, {0x0, 0xffff}}, [@qdisc_kind_options=@q_pfifo_fast={0xf}]}, 0x34}}, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) r8 = socket(0x10, 0x803, 0x0) getsockname$packet(r8, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x3) sendmsg$nl_route_sched(r7, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)=@newqdisc={0x24, 0x24, 0xf1d, 0x0, 0x0, {0x0, 0x0, 0x0, r9, {}, {0x0, 0xffff}}}, 0x24}}, 0x0) 20:06:04 executing program 4: perf_event_open(&(0x7f0000000980)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x80000800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) close(r0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3e69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x8) ioctl$TUNGETFILTER(r0, 0x801054db, &(0x7f0000000300)=""/187) getpid() write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00'], 0x6) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='blkio.bfq.idle_time\x00', 0x0, 0x0) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f00000000c0)=0x10000) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'lo\x00', 0x4000}) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0x0, 0x0, 0x8}, 0xc) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x2) openat$cgroup_ro(r1, &(0x7f0000000180)='blkio.bfq.empty_time\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TUNSETLINK(r2, 0x400454cd, 0x0) 20:06:04 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$IPSET_CMD_LIST(r2, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={0x0, 0x14}}, 0x0) getsockname$packet(r2, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="00b0720000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000900)=@newqdisc={0x60, 0x24, 0xf1d, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0xfff1, 0xffff}}, [@qdisc_kind_options=@q_tbf={{0x8}, {0x34, 0x2, [@TCA_TBF_PARMS={0x28}, @TCA_TBF_BURST={0x8, 0x6, 0x401}]}}]}, 0x60}}, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) getsockname$packet(r5, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x3) sendmsg$nl_route_sched(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)=@newqdisc={0x34, 0x24, 0xf1d, 0x0, 0x0, {0x0, 0x0, 0x0, r6, {}, {0x0, 0xffff}}, [@qdisc_kind_options=@q_pfifo_fast={0xf}]}, 0x34}}, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) r8 = socket(0x10, 0x803, 0x0) getsockname$packet(r8, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x3) sendmsg$nl_route_sched(r7, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)=@newqdisc={0x24, 0x24, 0xf1d, 0x0, 0x0, {0x0, 0x0, 0x0, r9, {}, {0x0, 0xffff}}}, 0x24}}, 0x0) 20:06:04 executing program 4: perf_event_open(&(0x7f0000000980)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x80000800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) close(r0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3e69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x8) ioctl$TUNGETFILTER(r0, 0x801054db, &(0x7f0000000300)=""/187) getpid() write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00'], 0x6) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='blkio.bfq.idle_time\x00', 0x0, 0x0) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f00000000c0)=0x10000) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'lo\x00', 0x4000}) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0x0, 0x0, 0x8}, 0xc) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x2) openat$cgroup_ro(r1, &(0x7f0000000180)='blkio.bfq.empty_time\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TUNSETLINK(r2, 0x400454cd, 0x0) [ 338.251708] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.1'. 20:06:06 executing program 3: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x400000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) r1 = syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) r2 = add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r3 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f0000000d00)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=0xffffffffffffffff, @ANYBLOB="00000004000000002e2f62bb75f396a9a27e5e0176eac9506f8a91513129cbe76f93e58a74ce416adbfe800dd0ec81a75eeaa66209eb4d92afa3d6a3eebde7cfb85ce89cb564f1d3b5efb219cf8b5d37a271e7e163656925d1b6e5414087b711c6908cc623d609e7b2753bb6bbcbf510e4393da480ceefae5ff550974932ecb442a333dd8fa9cc6f26a0e45f63c36e4901ab2a827884973cbd71b80595c386661c9c9fc5df8b0f569dd413fa11189d8872604d82681b29bef4df4368bdea68b628a9b3d32f7ab8a1f03f69cb683265ddc5710b659080d0b999c46f81b426af64eb1b1b4238378c072c9b993c2b8d43cf53ee097aaa3b"]) perf_event_open(&(0x7f0000000880)={0x5, 0x80, 0x40, 0x7c, 0x20, 0xc6, 0x0, 0xfffffffffffffff7, 0x20428, 0x6, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x40, 0x4, @perf_config_ext={0xffffffff, 0x4}, 0x10000, 0x55dd, 0x7, 0x3, 0x1, 0x9ac, 0x6a, 0x0, 0x63, 0x0, 0x8001}, r0, 0xa, r4, 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r3) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r3) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400003, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb5, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) ioctl$BTRFS_IOC_QUOTA_RESCAN_STATUS(r1, 0x8040942d, &(0x7f0000000b40)) r5 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r5, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r6 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) r7 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000b80), 0x2, 0x0) write(r7, &(0x7f0000000bc0)="40e470887482237b1f431e10acc071d7e36e45dd841998beab3efbb468747d8dbb333477ff6d7e0b50dd0ed7e7a8392f662f50c4a9a687aacb4edb223f80c48df42d958c815cc79f2ad2d0d04d03daf0f4738e419aa1c9eaf2d50a9a705805d356ba45cd0568a972f712b327a8ebaf0be155a9a3aec7afcf66a4327e7263915228b2792f", 0x84) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r6, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x170, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r8 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, r2) keyctl$revoke(0x3, r8) add_key$user(&(0x7f0000000280), &(0x7f0000000600)={'syz', 0x1}, &(0x7f0000000640)="3d21f0a9279db9b5ff9e49752a55aec5a551ddbe24dde81f61784beb209751af28ab0653e7437dc885adc48b9082a78bd83d547e54939aeb38d31ede5a39aadc49cc790e9e9e321948ddb43d561e94466754761c630e63637e", 0x59, r2) openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000940), 0x404041, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000980)) r9 = timerfd_create(0x4, 0x800) ioctl(r9, 0x1, &(0x7f0000000c80)="21d5a7ddbbf3bddabc1b13008a14556c5f68fe67f930e3d5e116aeca6e5255d4535c084ee8aaa621fa01f9637ce0755877f60e98b6f2933de1c1f19faacddb8cebd782083526d5c452680c5827b599") 20:06:06 executing program 4: perf_event_open(&(0x7f0000000980)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x80000800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) close(r0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3e69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x8) ioctl$TUNGETFILTER(r0, 0x801054db, &(0x7f0000000300)=""/187) getpid() write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00'], 0x6) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='blkio.bfq.idle_time\x00', 0x0, 0x0) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f00000000c0)=0x10000) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'lo\x00', 0x4000}) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0x0, 0x0, 0x8}, 0xc) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x2) openat$cgroup_ro(r1, &(0x7f0000000180)='blkio.bfq.empty_time\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TUNSETLINK(r2, 0x400454cd, 0x0) [ 339.952829] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. [ 339.981799] sch_tbf: burst 1025 is lower than device veth13 mtu (1514) ! 20:06:06 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$IPSET_CMD_LIST(r2, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={0x0, 0x14}}, 0x0) getsockname$packet(r2, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="00b0720000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000900)=@newqdisc={0x60, 0x24, 0xf1d, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0xfff1, 0xffff}}, [@qdisc_kind_options=@q_tbf={{0x8}, {0x34, 0x2, [@TCA_TBF_PARMS={0x28}, @TCA_TBF_BURST={0x8, 0x6, 0x401}]}}]}, 0x60}}, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) getsockname$packet(r5, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x3) sendmsg$nl_route_sched(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)=@newqdisc={0x34, 0x24, 0xf1d, 0x0, 0x0, {0x0, 0x0, 0x0, r6, {}, {0x0, 0xffff}}, [@qdisc_kind_options=@q_pfifo_fast={0xf}]}, 0x34}}, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) r8 = socket(0x10, 0x803, 0x0) getsockname$packet(r8, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x3) sendmsg$nl_route_sched(r7, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)=@newqdisc={0x24, 0x24, 0xf1d, 0x0, 0x0, {0x0, 0x0, 0x0, r9, {}, {0x0, 0xffff}}}, 0x24}}, 0x0) 20:06:06 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$IPSET_CMD_LIST(r2, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={0x0, 0x14}}, 0x0) getsockname$packet(r2, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="00b0720000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000900)=@newqdisc={0x60, 0x24, 0xf1d, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0xfff1, 0xffff}}, [@qdisc_kind_options=@q_tbf={{0x8}, {0x34, 0x2, [@TCA_TBF_PARMS={0x28}, @TCA_TBF_BURST={0x8, 0x6, 0x401}]}}]}, 0x60}}, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) getsockname$packet(r5, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x3) sendmsg$nl_route_sched(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)=@newqdisc={0x34, 0x24, 0xf1d, 0x0, 0x0, {0x0, 0x0, 0x0, r6, {}, {0x0, 0xffff}}, [@qdisc_kind_options=@q_pfifo_fast={0xf}]}, 0x34}}, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) r8 = socket(0x10, 0x803, 0x0) getsockname$packet(r8, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x3) sendmsg$nl_route_sched(r7, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)=@newqdisc={0x24, 0x24, 0xf1d, 0x0, 0x0, {0x0, 0x0, 0x0, r9, {}, {0x0, 0xffff}}}, 0x24}}, 0x0) 20:06:06 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) sched_setaffinity(0x0, 0x8, &(0x7f00000000c0)=0x105) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000700)={0x0}}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000300)=ANY=[@ANYBLOB="c73c93915f2fbaf9f4c2fe9eca9d3e59700d03670c05dea71d436005165ad04dfcc8d71422f101fbc2619dc93fd11cfe9a720575fcd5238e808c370886ae319dcc9173489dfebfc988d4317fca10c2f9609a7103b7670133eb98a5516cee7db4b5e945d80213cccb8ae48717949de1b462adb22cc2de7544ada36abb91f805f2b8d5e97f45da0025c48e338ce6b53ca38fff"], &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x41000, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x80) sendmsg$DEVLINK_CMD_SB_OCC_MAX_CLEAR(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f00000005c0)={&(0x7f00000004c0)={0xa8, 0x0, 0x800, 0x70bd27, 0x25dfdbff, {}, [{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0xb, 0xfffffff7}}, {@pci={{0x8}, {0x11}}, {0x8}}, {@pci={{0x8}, {0x11}}, {0x8, 0xb, 0xce95}}, {@pci={{0x8}, {0x11}}, {0x8, 0xb, 0xffffffff}}]}, 0xa8}}, 0x4000001) socket$igmp6(0xa, 0x3, 0x2) truncate(&(0x7f0000000400)='./file0\x00', 0x3) setpgid(0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000440)='./file0\x00', 0x40000, 0xfffffffffffffffe, 0x3, 0x0, &(0x7f0000000000)) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040), 0x42, 0x0) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000002140)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}}) 20:06:06 executing program 4: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x400000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) r1 = syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) r2 = add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r3 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f0000000d00)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=0xffffffffffffffff, @ANYBLOB="00000004000000002e2f62bb75f396a9a27e5e0176eac9506f8a91513129cbe76f93e58a74ce416adbfe800dd0ec81a75eeaa66209eb4d92afa3d6a3eebde7cfb85ce89cb564f1d3b5efb219cf8b5d37a271e7e163656925d1b6e5414087b711c6908cc623d609e7b2753bb6bbcbf510e4393da480ceefae5ff550974932ecb442a333dd8fa9cc6f26a0e45f63c36e4901ab2a827884973cbd71b80595c386661c9c9fc5df8b0f569dd413fa11189d8872604d82681b29bef4df4368bdea68b628a9b3d32f7ab8a1f03f69cb683265ddc5710b659080d0b999c46f81b426af64eb1b1b4238378c072c9b993c2b8d43cf53ee097aaa3b"]) perf_event_open(&(0x7f0000000880)={0x5, 0x80, 0x40, 0x7c, 0x20, 0xc6, 0x0, 0xfffffffffffffff7, 0x20428, 0x6, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x40, 0x4, @perf_config_ext={0xffffffff, 0x4}, 0x10000, 0x55dd, 0x7, 0x3, 0x1, 0x9ac, 0x6a, 0x0, 0x63, 0x0, 0x8001}, r0, 0xa, r4, 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r3) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r3) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400003, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb5, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) ioctl$BTRFS_IOC_QUOTA_RESCAN_STATUS(r1, 0x8040942d, &(0x7f0000000b40)) r5 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r5, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r6 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) r7 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000b80), 0x2, 0x0) write(r7, &(0x7f0000000bc0)="40e470887482237b1f431e10acc071d7e36e45dd841998beab3efbb468747d8dbb333477ff6d7e0b50dd0ed7e7a8392f662f50c4a9a687aacb4edb223f80c48df42d958c815cc79f2ad2d0d04d03daf0f4738e419aa1c9eaf2d50a9a705805d356ba45cd0568a972f712b327a8ebaf0be155a9a3aec7afcf66a4327e7263915228b2792f", 0x84) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r6, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x170, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r8 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, r2) keyctl$revoke(0x3, r8) add_key$user(&(0x7f0000000280), &(0x7f0000000600)={'syz', 0x1}, &(0x7f0000000640)="3d21f0a9279db9b5ff9e49752a55aec5a551ddbe24dde81f61784beb209751af28ab0653e7437dc885adc48b9082a78bd83d547e54939aeb38d31ede5a39aadc49cc790e9e9e321948ddb43d561e94466754761c630e63637e", 0x59, r2) openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000940), 0x404041, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000980)) r9 = timerfd_create(0x4, 0x800) ioctl(r9, 0x1, &(0x7f0000000c80)="21d5a7ddbbf3bddabc1b13008a14556c5f68fe67f930e3d5e116aeca6e5255d4535c084ee8aaa621fa01f9637ce0755877f60e98b6f2933de1c1f19faacddb8cebd782083526d5c452680c5827b599") 20:06:06 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) sched_setaffinity(0x0, 0x8, &(0x7f0000000000)=0x5) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad413e850000000f00000095"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x18, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r3}, 0x10) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$TIPC_NL_NET_GET(r5, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000140)={0x0, 0x14}}, 0x0) getsockname$packet(r5, &(0x7f00000004c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000300)=0x14) r7 = socket$nl_route(0x10, 0x3, 0x0) r8 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r8, 0x8916, &(0x7f0000000100)={@dev={0xfe, 0x80, '\x00', 0x2}, 0x0, r9}) sendmsg$nl_route(r7, &(0x7f0000000440)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0xc0}, 0xc0c5) r10 = socket$nl_route(0x10, 0x3, 0x0) r11 = open(&(0x7f0000000800)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x14000, 0x88) socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), r11) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) sendmsg$nl_route(r10, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000005840)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000600)=ANY=[@ANYBLOB="780000002400518600"/20, @ANYRES32=r12, @ANYBLOB="00000000ffffffff0000000008000100736671"], 0x78}}, 0x0) sendmsg$nl_route(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newlink={0x40, 0x10, 0xffffff1f, 0x1, 0x0, {0x0, 0x0, 0x0, 0x0, 0xffffff81}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @wireguard={{0xe}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x40}}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000000)={0x8, 0x5, &(0x7f0000000640)=ANY=[@ANYBLOB="18000000000000000000000008cb040000000010e0ae68032dc506c43c6ed996701956499ccd691d6bfe98739d5604fe64bcbb46024554d3f7e979dfd5313cb8b35eeb88888530a28fae064fb600000000a9d85a35d158cb8b4d32ba3a06d3b2d297ea0900000000000000d9b6095e9ef9b0db33f2b453da1d6cadc9880900fe9be04163e190efb7093ae99d3547e8b79f9e4fb8326b9ee23a52a97907ebe50e7a5820360000000020745630caa8aad7f4d56e377d12abafa86f0f85f05d671e65ab73af", @ANYRES32, @ANYBLOB="000000000000000095000000000000"], &(0x7f00000001c0)='GPL\x00', 0x2, 0x8a, &(0x7f0000000200)=""/138, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 340.089786] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. 20:06:06 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$IPSET_CMD_LIST(r2, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={0x0, 0x14}}, 0x0) getsockname$packet(r2, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="00b0720000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000900)=@newqdisc={0x60, 0x24, 0xf1d, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0xfff1, 0xffff}}, [@qdisc_kind_options=@q_tbf={{0x8}, {0x34, 0x2, [@TCA_TBF_PARMS={0x28}, @TCA_TBF_BURST={0x8, 0x6, 0x401}]}}]}, 0x60}}, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) getsockname$packet(r5, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x3) sendmsg$nl_route_sched(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)=@newqdisc={0x34, 0x24, 0xf1d, 0x0, 0x0, {0x0, 0x0, 0x0, r6, {}, {0x0, 0xffff}}, [@qdisc_kind_options=@q_pfifo_fast={0xf}]}, 0x34}}, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) r8 = socket(0x10, 0x803, 0x0) getsockname$packet(r8, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x3) sendmsg$nl_route_sched(r7, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)=@newqdisc={0x24, 0x24, 0xf1d, 0x0, 0x0, {0x0, 0x0, 0x0, r9, {}, {0x0, 0xffff}}}, 0x24}}, 0x0) [ 340.150918] sch_tbf: burst 1025 is lower than device veth13 mtu (1514) ! [ 340.179634] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. [ 341.257829] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.1'. 20:06:07 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) sched_setaffinity(0x0, 0x8, &(0x7f0000000000)=0x5) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad413e850000000f00000095"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x18, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r3}, 0x10) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$TIPC_NL_NET_GET(r5, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000140)={0x0, 0x14}}, 0x0) getsockname$packet(r5, &(0x7f00000004c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000300)=0x14) r7 = socket$nl_route(0x10, 0x3, 0x0) r8 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r8, 0x8916, &(0x7f0000000100)={@dev={0xfe, 0x80, '\x00', 0x2}, 0x0, r9}) sendmsg$nl_route(r7, &(0x7f0000000440)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0xc0}, 0xc0c5) r10 = socket$nl_route(0x10, 0x3, 0x0) r11 = open(&(0x7f0000000800)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x14000, 0x88) socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), r11) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) sendmsg$nl_route(r10, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000005840)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000600)=ANY=[@ANYBLOB="780000002400518600"/20, @ANYRES32=r12, @ANYBLOB="00000000ffffffff0000000008000100736671"], 0x78}}, 0x0) sendmsg$nl_route(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newlink={0x40, 0x10, 0xffffff1f, 0x1, 0x0, {0x0, 0x0, 0x0, 0x0, 0xffffff81}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @wireguard={{0xe}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x40}}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000000)={0x8, 0x5, &(0x7f0000000640)=ANY=[@ANYBLOB="18000000000000000000000008cb040000000010e0ae68032dc506c43c6ed996701956499ccd691d6bfe98739d5604fe64bcbb46024554d3f7e979dfd5313cb8b35eeb88888530a28fae064fb600000000a9d85a35d158cb8b4d32ba3a06d3b2d297ea0900000000000000d9b6095e9ef9b0db33f2b453da1d6cadc9880900fe9be04163e190efb7093ae99d3547e8b79f9e4fb8326b9ee23a52a97907ebe50e7a5820360000000020745630caa8aad7f4d56e377d12abafa86f0f85f05d671e65ab73af", @ANYRES32, @ANYBLOB="000000000000000095000000000000"], &(0x7f00000001c0)='GPL\x00', 0x2, 0x8a, &(0x7f0000000200)=""/138, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 20:06:08 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) sched_setaffinity(0x0, 0x8, &(0x7f00000000c0)=0x105) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000700)={0x0}}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000300)=ANY=[@ANYBLOB="c73c93915f2fbaf9f4c2fe9eca9d3e59700d03670c05dea71d436005165ad04dfcc8d71422f101fbc2619dc93fd11cfe9a720575fcd5238e808c370886ae319dcc9173489dfebfc988d4317fca10c2f9609a7103b7670133eb98a5516cee7db4b5e945d80213cccb8ae48717949de1b462adb22cc2de7544ada36abb91f805f2b8d5e97f45da0025c48e338ce6b53ca38fff"], &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x41000, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x80) sendmsg$DEVLINK_CMD_SB_OCC_MAX_CLEAR(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f00000005c0)={&(0x7f00000004c0)={0xa8, 0x0, 0x800, 0x70bd27, 0x25dfdbff, {}, [{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0xb, 0xfffffff7}}, {@pci={{0x8}, {0x11}}, {0x8}}, {@pci={{0x8}, {0x11}}, {0x8, 0xb, 0xce95}}, {@pci={{0x8}, {0x11}}, {0x8, 0xb, 0xffffffff}}]}, 0xa8}}, 0x4000001) socket$igmp6(0xa, 0x3, 0x2) truncate(&(0x7f0000000400)='./file0\x00', 0x3) setpgid(0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000440)='./file0\x00', 0x40000, 0xfffffffffffffffe, 0x3, 0x0, &(0x7f0000000000)) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040), 0x42, 0x0) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000002140)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}}) [ 341.366960] sch_tbf: burst 1025 is lower than device veth15 mtu (1514) ! [ 341.395819] sch_tbf: burst 1025 is lower than device veth15 mtu (1514) ! 20:06:08 executing program 0: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x400000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) r1 = syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) r2 = add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r3 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f0000000d00)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=0xffffffffffffffff, @ANYBLOB="00000004000000002e2f62bb75f396a9a27e5e0176eac9506f8a91513129cbe76f93e58a74ce416adbfe800dd0ec81a75eeaa66209eb4d92afa3d6a3eebde7cfb85ce89cb564f1d3b5efb219cf8b5d37a271e7e163656925d1b6e5414087b711c6908cc623d609e7b2753bb6bbcbf510e4393da480ceefae5ff550974932ecb442a333dd8fa9cc6f26a0e45f63c36e4901ab2a827884973cbd71b80595c386661c9c9fc5df8b0f569dd413fa11189d8872604d82681b29bef4df4368bdea68b628a9b3d32f7ab8a1f03f69cb683265ddc5710b659080d0b999c46f81b426af64eb1b1b4238378c072c9b993c2b8d43cf53ee097aaa3b"]) perf_event_open(&(0x7f0000000880)={0x5, 0x80, 0x40, 0x7c, 0x20, 0xc6, 0x0, 0xfffffffffffffff7, 0x20428, 0x6, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x40, 0x4, @perf_config_ext={0xffffffff, 0x4}, 0x10000, 0x55dd, 0x7, 0x3, 0x1, 0x9ac, 0x6a, 0x0, 0x63, 0x0, 0x8001}, r0, 0xa, r4, 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r3) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r3) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400003, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb5, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) ioctl$BTRFS_IOC_QUOTA_RESCAN_STATUS(r1, 0x8040942d, &(0x7f0000000b40)) r5 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r5, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r6 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) r7 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000b80), 0x2, 0x0) write(r7, &(0x7f0000000bc0)="40e470887482237b1f431e10acc071d7e36e45dd841998beab3efbb468747d8dbb333477ff6d7e0b50dd0ed7e7a8392f662f50c4a9a687aacb4edb223f80c48df42d958c815cc79f2ad2d0d04d03daf0f4738e419aa1c9eaf2d50a9a705805d356ba45cd0568a972f712b327a8ebaf0be155a9a3aec7afcf66a4327e7263915228b2792f", 0x84) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r6, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x170, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r8 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, r2) keyctl$revoke(0x3, r8) add_key$user(&(0x7f0000000280), &(0x7f0000000600)={'syz', 0x1}, &(0x7f0000000640)="3d21f0a9279db9b5ff9e49752a55aec5a551ddbe24dde81f61784beb209751af28ab0653e7437dc885adc48b9082a78bd83d547e54939aeb38d31ede5a39aadc49cc790e9e9e321948ddb43d561e94466754761c630e63637e", 0x59, r2) openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000940), 0x404041, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000980)) r9 = timerfd_create(0x4, 0x800) ioctl(r9, 0x1, &(0x7f0000000c80)="21d5a7ddbbf3bddabc1b13008a14556c5f68fe67f930e3d5e116aeca6e5255d4535c084ee8aaa621fa01f9637ce0755877f60e98b6f2933de1c1f19faacddb8cebd782083526d5c452680c5827b599") 20:06:08 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$IPSET_CMD_LIST(r2, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={0x0, 0x14}}, 0x0) getsockname$packet(r2, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="00b0720000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000900)=@newqdisc={0x60, 0x24, 0xf1d, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0xfff1, 0xffff}}, [@qdisc_kind_options=@q_tbf={{0x8}, {0x34, 0x2, [@TCA_TBF_PARMS={0x28}, @TCA_TBF_BURST={0x8, 0x6, 0x401}]}}]}, 0x60}}, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) getsockname$packet(r5, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x3) sendmsg$nl_route_sched(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)=@newqdisc={0x34, 0x24, 0xf1d, 0x0, 0x0, {0x0, 0x0, 0x0, r6, {}, {0x0, 0xffff}}, [@qdisc_kind_options=@q_pfifo_fast={0xf}]}, 0x34}}, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) r8 = socket(0x10, 0x803, 0x0) getsockname$packet(r8, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x3) sendmsg$nl_route_sched(r7, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)=@newqdisc={0x24, 0x24, 0xf1d, 0x0, 0x0, {0x0, 0x0, 0x0, r9, {}, {0x0, 0xffff}}}, 0x24}}, 0x0) 20:06:09 executing program 3: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x400000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) r1 = syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) r2 = add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r3 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f0000000d00)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=0xffffffffffffffff, @ANYBLOB="00000004000000002e2f62bb75f396a9a27e5e0176eac9506f8a91513129cbe76f93e58a74ce416adbfe800dd0ec81a75eeaa66209eb4d92afa3d6a3eebde7cfb85ce89cb564f1d3b5efb219cf8b5d37a271e7e163656925d1b6e5414087b711c6908cc623d609e7b2753bb6bbcbf510e4393da480ceefae5ff550974932ecb442a333dd8fa9cc6f26a0e45f63c36e4901ab2a827884973cbd71b80595c386661c9c9fc5df8b0f569dd413fa11189d8872604d82681b29bef4df4368bdea68b628a9b3d32f7ab8a1f03f69cb683265ddc5710b659080d0b999c46f81b426af64eb1b1b4238378c072c9b993c2b8d43cf53ee097aaa3b"]) perf_event_open(&(0x7f0000000880)={0x5, 0x80, 0x40, 0x7c, 0x20, 0xc6, 0x0, 0xfffffffffffffff7, 0x20428, 0x6, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x40, 0x4, @perf_config_ext={0xffffffff, 0x4}, 0x10000, 0x55dd, 0x7, 0x3, 0x1, 0x9ac, 0x6a, 0x0, 0x63, 0x0, 0x8001}, r0, 0xa, r4, 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r3) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r3) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400003, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb5, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) ioctl$BTRFS_IOC_QUOTA_RESCAN_STATUS(r1, 0x8040942d, &(0x7f0000000b40)) r5 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r5, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r6 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) r7 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000b80), 0x2, 0x0) write(r7, &(0x7f0000000bc0)="40e470887482237b1f431e10acc071d7e36e45dd841998beab3efbb468747d8dbb333477ff6d7e0b50dd0ed7e7a8392f662f50c4a9a687aacb4edb223f80c48df42d958c815cc79f2ad2d0d04d03daf0f4738e419aa1c9eaf2d50a9a705805d356ba45cd0568a972f712b327a8ebaf0be155a9a3aec7afcf66a4327e7263915228b2792f", 0x84) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r6, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x170, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r8 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, r2) keyctl$revoke(0x3, r8) add_key$user(&(0x7f0000000280), &(0x7f0000000600)={'syz', 0x1}, &(0x7f0000000640)="3d21f0a9279db9b5ff9e49752a55aec5a551ddbe24dde81f61784beb209751af28ab0653e7437dc885adc48b9082a78bd83d547e54939aeb38d31ede5a39aadc49cc790e9e9e321948ddb43d561e94466754761c630e63637e", 0x59, r2) openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000940), 0x404041, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000980)) r9 = timerfd_create(0x4, 0x800) ioctl(r9, 0x1, &(0x7f0000000c80)="21d5a7ddbbf3bddabc1b13008a14556c5f68fe67f930e3d5e116aeca6e5255d4535c084ee8aaa621fa01f9637ce0755877f60e98b6f2933de1c1f19faacddb8cebd782083526d5c452680c5827b599") 20:06:09 executing program 2: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x400000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) r1 = syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) r2 = add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r3 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f0000000d00)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=0xffffffffffffffff, @ANYBLOB="00000004000000002e2f62bb75f396a9a27e5e0176eac9506f8a91513129cbe76f93e58a74ce416adbfe800dd0ec81a75eeaa66209eb4d92afa3d6a3eebde7cfb85ce89cb564f1d3b5efb219cf8b5d37a271e7e163656925d1b6e5414087b711c6908cc623d609e7b2753bb6bbcbf510e4393da480ceefae5ff550974932ecb442a333dd8fa9cc6f26a0e45f63c36e4901ab2a827884973cbd71b80595c386661c9c9fc5df8b0f569dd413fa11189d8872604d82681b29bef4df4368bdea68b628a9b3d32f7ab8a1f03f69cb683265ddc5710b659080d0b999c46f81b426af64eb1b1b4238378c072c9b993c2b8d43cf53ee097aaa3b"]) perf_event_open(&(0x7f0000000880)={0x5, 0x80, 0x40, 0x7c, 0x20, 0xc6, 0x0, 0xfffffffffffffff7, 0x20428, 0x6, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x40, 0x4, @perf_config_ext={0xffffffff, 0x4}, 0x10000, 0x55dd, 0x7, 0x3, 0x1, 0x9ac, 0x6a, 0x0, 0x63, 0x0, 0x8001}, r0, 0xa, r4, 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r3) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r3) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400003, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb5, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) ioctl$BTRFS_IOC_QUOTA_RESCAN_STATUS(r1, 0x8040942d, &(0x7f0000000b40)) r5 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r5, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r6 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) r7 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000b80), 0x2, 0x0) write(r7, &(0x7f0000000bc0)="40e470887482237b1f431e10acc071d7e36e45dd841998beab3efbb468747d8dbb333477ff6d7e0b50dd0ed7e7a8392f662f50c4a9a687aacb4edb223f80c48df42d958c815cc79f2ad2d0d04d03daf0f4738e419aa1c9eaf2d50a9a705805d356ba45cd0568a972f712b327a8ebaf0be155a9a3aec7afcf66a4327e7263915228b2792f", 0x84) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r6, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x170, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r8 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, r2) keyctl$revoke(0x3, r8) add_key$user(&(0x7f0000000280), &(0x7f0000000600)={'syz', 0x1}, &(0x7f0000000640)="3d21f0a9279db9b5ff9e49752a55aec5a551ddbe24dde81f61784beb209751af28ab0653e7437dc885adc48b9082a78bd83d547e54939aeb38d31ede5a39aadc49cc790e9e9e321948ddb43d561e94466754761c630e63637e", 0x59, r2) openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000940), 0x404041, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000980)) r9 = timerfd_create(0x4, 0x800) ioctl(r9, 0x1, &(0x7f0000000c80)="21d5a7ddbbf3bddabc1b13008a14556c5f68fe67f930e3d5e116aeca6e5255d4535c084ee8aaa621fa01f9637ce0755877f60e98b6f2933de1c1f19faacddb8cebd782083526d5c452680c5827b599") [ 343.181484] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.1'. 20:06:09 executing program 4: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x400000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) r1 = syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) r2 = add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r3 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f0000000d00)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=0xffffffffffffffff, @ANYBLOB="00000004000000002e2f62bb75f396a9a27e5e0176eac9506f8a91513129cbe76f93e58a74ce416adbfe800dd0ec81a75eeaa66209eb4d92afa3d6a3eebde7cfb85ce89cb564f1d3b5efb219cf8b5d37a271e7e163656925d1b6e5414087b711c6908cc623d609e7b2753bb6bbcbf510e4393da480ceefae5ff550974932ecb442a333dd8fa9cc6f26a0e45f63c36e4901ab2a827884973cbd71b80595c386661c9c9fc5df8b0f569dd413fa11189d8872604d82681b29bef4df4368bdea68b628a9b3d32f7ab8a1f03f69cb683265ddc5710b659080d0b999c46f81b426af64eb1b1b4238378c072c9b993c2b8d43cf53ee097aaa3b"]) perf_event_open(&(0x7f0000000880)={0x5, 0x80, 0x40, 0x7c, 0x20, 0xc6, 0x0, 0xfffffffffffffff7, 0x20428, 0x6, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x40, 0x4, @perf_config_ext={0xffffffff, 0x4}, 0x10000, 0x55dd, 0x7, 0x3, 0x1, 0x9ac, 0x6a, 0x0, 0x63, 0x0, 0x8001}, r0, 0xa, r4, 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r3) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r3) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400003, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb5, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) ioctl$BTRFS_IOC_QUOTA_RESCAN_STATUS(r1, 0x8040942d, &(0x7f0000000b40)) r5 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r5, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r6 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) r7 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000b80), 0x2, 0x0) write(r7, &(0x7f0000000bc0)="40e470887482237b1f431e10acc071d7e36e45dd841998beab3efbb468747d8dbb333477ff6d7e0b50dd0ed7e7a8392f662f50c4a9a687aacb4edb223f80c48df42d958c815cc79f2ad2d0d04d03daf0f4738e419aa1c9eaf2d50a9a705805d356ba45cd0568a972f712b327a8ebaf0be155a9a3aec7afcf66a4327e7263915228b2792f", 0x84) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r6, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x170, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r8 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, r2) keyctl$revoke(0x3, r8) add_key$user(&(0x7f0000000280), &(0x7f0000000600)={'syz', 0x1}, &(0x7f0000000640)="3d21f0a9279db9b5ff9e49752a55aec5a551ddbe24dde81f61784beb209751af28ab0653e7437dc885adc48b9082a78bd83d547e54939aeb38d31ede5a39aadc49cc790e9e9e321948ddb43d561e94466754761c630e63637e", 0x59, r2) openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000940), 0x404041, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000980)) r9 = timerfd_create(0x4, 0x800) ioctl(r9, 0x1, &(0x7f0000000c80)="21d5a7ddbbf3bddabc1b13008a14556c5f68fe67f930e3d5e116aeca6e5255d4535c084ee8aaa621fa01f9637ce0755877f60e98b6f2933de1c1f19faacddb8cebd782083526d5c452680c5827b599") 20:06:09 executing program 5: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x400000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) r1 = syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) r2 = add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r3 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f0000000d00)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=0xffffffffffffffff, @ANYBLOB="00000004000000002e2f62bb75f396a9a27e5e0176eac9506f8a91513129cbe76f93e58a74ce416adbfe800dd0ec81a75eeaa66209eb4d92afa3d6a3eebde7cfb85ce89cb564f1d3b5efb219cf8b5d37a271e7e163656925d1b6e5414087b711c6908cc623d609e7b2753bb6bbcbf510e4393da480ceefae5ff550974932ecb442a333dd8fa9cc6f26a0e45f63c36e4901ab2a827884973cbd71b80595c386661c9c9fc5df8b0f569dd413fa11189d8872604d82681b29bef4df4368bdea68b628a9b3d32f7ab8a1f03f69cb683265ddc5710b659080d0b999c46f81b426af64eb1b1b4238378c072c9b993c2b8d43cf53ee097aaa3b"]) perf_event_open(&(0x7f0000000880)={0x5, 0x80, 0x40, 0x7c, 0x20, 0xc6, 0x0, 0xfffffffffffffff7, 0x20428, 0x6, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x40, 0x4, @perf_config_ext={0xffffffff, 0x4}, 0x10000, 0x55dd, 0x7, 0x3, 0x1, 0x9ac, 0x6a, 0x0, 0x63, 0x0, 0x8001}, r0, 0xa, r4, 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r3) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r3) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400003, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb5, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) ioctl$BTRFS_IOC_QUOTA_RESCAN_STATUS(r1, 0x8040942d, &(0x7f0000000b40)) r5 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r5, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r6 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) r7 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000b80), 0x2, 0x0) write(r7, &(0x7f0000000bc0)="40e470887482237b1f431e10acc071d7e36e45dd841998beab3efbb468747d8dbb333477ff6d7e0b50dd0ed7e7a8392f662f50c4a9a687aacb4edb223f80c48df42d958c815cc79f2ad2d0d04d03daf0f4738e419aa1c9eaf2d50a9a705805d356ba45cd0568a972f712b327a8ebaf0be155a9a3aec7afcf66a4327e7263915228b2792f", 0x84) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r6, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x170, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r8 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, r2) keyctl$revoke(0x3, r8) add_key$user(&(0x7f0000000280), &(0x7f0000000600)={'syz', 0x1}, &(0x7f0000000640)="3d21f0a9279db9b5ff9e49752a55aec5a551ddbe24dde81f61784beb209751af28ab0653e7437dc885adc48b9082a78bd83d547e54939aeb38d31ede5a39aadc49cc790e9e9e321948ddb43d561e94466754761c630e63637e", 0x59, r2) openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000940), 0x404041, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000980)) r9 = timerfd_create(0x4, 0x800) ioctl(r9, 0x1, &(0x7f0000000c80)="21d5a7ddbbf3bddabc1b13008a14556c5f68fe67f930e3d5e116aeca6e5255d4535c084ee8aaa621fa01f9637ce0755877f60e98b6f2933de1c1f19faacddb8cebd782083526d5c452680c5827b599") [ 343.305546] sch_tbf: burst 1025 is lower than device veth17 mtu (1514) ! 20:06:10 executing program 0: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x400000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) r1 = syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) r2 = add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r3 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f0000000d00)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=0xffffffffffffffff, @ANYBLOB="00000004000000002e2f62bb75f396a9a27e5e0176eac9506f8a91513129cbe76f93e58a74ce416adbfe800dd0ec81a75eeaa66209eb4d92afa3d6a3eebde7cfb85ce89cb564f1d3b5efb219cf8b5d37a271e7e163656925d1b6e5414087b711c6908cc623d609e7b2753bb6bbcbf510e4393da480ceefae5ff550974932ecb442a333dd8fa9cc6f26a0e45f63c36e4901ab2a827884973cbd71b80595c386661c9c9fc5df8b0f569dd413fa11189d8872604d82681b29bef4df4368bdea68b628a9b3d32f7ab8a1f03f69cb683265ddc5710b659080d0b999c46f81b426af64eb1b1b4238378c072c9b993c2b8d43cf53ee097aaa3b"]) perf_event_open(&(0x7f0000000880)={0x5, 0x80, 0x40, 0x7c, 0x20, 0xc6, 0x0, 0xfffffffffffffff7, 0x20428, 0x6, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x40, 0x4, @perf_config_ext={0xffffffff, 0x4}, 0x10000, 0x55dd, 0x7, 0x3, 0x1, 0x9ac, 0x6a, 0x0, 0x63, 0x0, 0x8001}, r0, 0xa, r4, 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r3) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r3) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400003, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb5, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) ioctl$BTRFS_IOC_QUOTA_RESCAN_STATUS(r1, 0x8040942d, &(0x7f0000000b40)) r5 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r5, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r6 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) r7 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000b80), 0x2, 0x0) write(r7, &(0x7f0000000bc0)="40e470887482237b1f431e10acc071d7e36e45dd841998beab3efbb468747d8dbb333477ff6d7e0b50dd0ed7e7a8392f662f50c4a9a687aacb4edb223f80c48df42d958c815cc79f2ad2d0d04d03daf0f4738e419aa1c9eaf2d50a9a705805d356ba45cd0568a972f712b327a8ebaf0be155a9a3aec7afcf66a4327e7263915228b2792f", 0x84) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r6, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x170, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r8 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, r2) keyctl$revoke(0x3, r8) add_key$user(&(0x7f0000000280), &(0x7f0000000600)={'syz', 0x1}, &(0x7f0000000640)="3d21f0a9279db9b5ff9e49752a55aec5a551ddbe24dde81f61784beb209751af28ab0653e7437dc885adc48b9082a78bd83d547e54939aeb38d31ede5a39aadc49cc790e9e9e321948ddb43d561e94466754761c630e63637e", 0x59, r2) openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000940), 0x404041, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000980)) r9 = timerfd_create(0x4, 0x800) ioctl(r9, 0x1, &(0x7f0000000c80)="21d5a7ddbbf3bddabc1b13008a14556c5f68fe67f930e3d5e116aeca6e5255d4535c084ee8aaa621fa01f9637ce0755877f60e98b6f2933de1c1f19faacddb8cebd782083526d5c452680c5827b599") 20:06:10 executing program 1: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x400000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) r1 = syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) r2 = add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r3 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f0000000d00)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=0xffffffffffffffff, @ANYBLOB="00000004000000002e2f62bb75f396a9a27e5e0176eac9506f8a91513129cbe76f93e58a74ce416adbfe800dd0ec81a75eeaa66209eb4d92afa3d6a3eebde7cfb85ce89cb564f1d3b5efb219cf8b5d37a271e7e163656925d1b6e5414087b711c6908cc623d609e7b2753bb6bbcbf510e4393da480ceefae5ff550974932ecb442a333dd8fa9cc6f26a0e45f63c36e4901ab2a827884973cbd71b80595c386661c9c9fc5df8b0f569dd413fa11189d8872604d82681b29bef4df4368bdea68b628a9b3d32f7ab8a1f03f69cb683265ddc5710b659080d0b999c46f81b426af64eb1b1b4238378c072c9b993c2b8d43cf53ee097aaa3b"]) perf_event_open(&(0x7f0000000880)={0x5, 0x80, 0x40, 0x7c, 0x20, 0xc6, 0x0, 0xfffffffffffffff7, 0x20428, 0x6, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x40, 0x4, @perf_config_ext={0xffffffff, 0x4}, 0x10000, 0x55dd, 0x7, 0x3, 0x1, 0x9ac, 0x6a, 0x0, 0x63, 0x0, 0x8001}, r0, 0xa, r4, 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r3) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r3) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400003, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb5, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) ioctl$BTRFS_IOC_QUOTA_RESCAN_STATUS(r1, 0x8040942d, &(0x7f0000000b40)) r5 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r5, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r6 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) r7 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000b80), 0x2, 0x0) write(r7, &(0x7f0000000bc0)="40e470887482237b1f431e10acc071d7e36e45dd841998beab3efbb468747d8dbb333477ff6d7e0b50dd0ed7e7a8392f662f50c4a9a687aacb4edb223f80c48df42d958c815cc79f2ad2d0d04d03daf0f4738e419aa1c9eaf2d50a9a705805d356ba45cd0568a972f712b327a8ebaf0be155a9a3aec7afcf66a4327e7263915228b2792f", 0x84) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r6, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x170, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r8 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, r2) keyctl$revoke(0x3, r8) add_key$user(&(0x7f0000000280), &(0x7f0000000600)={'syz', 0x1}, &(0x7f0000000640)="3d21f0a9279db9b5ff9e49752a55aec5a551ddbe24dde81f61784beb209751af28ab0653e7437dc885adc48b9082a78bd83d547e54939aeb38d31ede5a39aadc49cc790e9e9e321948ddb43d561e94466754761c630e63637e", 0x59, r2) openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000940), 0x404041, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000980)) r9 = timerfd_create(0x4, 0x800) ioctl(r9, 0x1, &(0x7f0000000c80)="21d5a7ddbbf3bddabc1b13008a14556c5f68fe67f930e3d5e116aeca6e5255d4535c084ee8aaa621fa01f9637ce0755877f60e98b6f2933de1c1f19faacddb8cebd782083526d5c452680c5827b599") 20:06:10 executing program 2: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x400000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) r1 = syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) r2 = add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r3 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f0000000d00)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=0xffffffffffffffff, @ANYBLOB="00000004000000002e2f62bb75f396a9a27e5e0176eac9506f8a91513129cbe76f93e58a74ce416adbfe800dd0ec81a75eeaa66209eb4d92afa3d6a3eebde7cfb85ce89cb564f1d3b5efb219cf8b5d37a271e7e163656925d1b6e5414087b711c6908cc623d609e7b2753bb6bbcbf510e4393da480ceefae5ff550974932ecb442a333dd8fa9cc6f26a0e45f63c36e4901ab2a827884973cbd71b80595c386661c9c9fc5df8b0f569dd413fa11189d8872604d82681b29bef4df4368bdea68b628a9b3d32f7ab8a1f03f69cb683265ddc5710b659080d0b999c46f81b426af64eb1b1b4238378c072c9b993c2b8d43cf53ee097aaa3b"]) perf_event_open(&(0x7f0000000880)={0x5, 0x80, 0x40, 0x7c, 0x20, 0xc6, 0x0, 0xfffffffffffffff7, 0x20428, 0x6, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x40, 0x4, @perf_config_ext={0xffffffff, 0x4}, 0x10000, 0x55dd, 0x7, 0x3, 0x1, 0x9ac, 0x6a, 0x0, 0x63, 0x0, 0x8001}, r0, 0xa, r4, 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r3) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r3) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400003, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb5, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) ioctl$BTRFS_IOC_QUOTA_RESCAN_STATUS(r1, 0x8040942d, &(0x7f0000000b40)) r5 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r5, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r6 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) r7 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000b80), 0x2, 0x0) write(r7, &(0x7f0000000bc0)="40e470887482237b1f431e10acc071d7e36e45dd841998beab3efbb468747d8dbb333477ff6d7e0b50dd0ed7e7a8392f662f50c4a9a687aacb4edb223f80c48df42d958c815cc79f2ad2d0d04d03daf0f4738e419aa1c9eaf2d50a9a705805d356ba45cd0568a972f712b327a8ebaf0be155a9a3aec7afcf66a4327e7263915228b2792f", 0x84) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r6, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x170, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r8 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, r2) keyctl$revoke(0x3, r8) add_key$user(&(0x7f0000000280), &(0x7f0000000600)={'syz', 0x1}, &(0x7f0000000640)="3d21f0a9279db9b5ff9e49752a55aec5a551ddbe24dde81f61784beb209751af28ab0653e7437dc885adc48b9082a78bd83d547e54939aeb38d31ede5a39aadc49cc790e9e9e321948ddb43d561e94466754761c630e63637e", 0x59, r2) openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000940), 0x404041, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000980)) r9 = timerfd_create(0x4, 0x800) ioctl(r9, 0x1, &(0x7f0000000c80)="21d5a7ddbbf3bddabc1b13008a14556c5f68fe67f930e3d5e116aeca6e5255d4535c084ee8aaa621fa01f9637ce0755877f60e98b6f2933de1c1f19faacddb8cebd782083526d5c452680c5827b599") 20:06:10 executing program 4: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x400000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) r1 = syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) r2 = add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r3 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f0000000d00)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=0xffffffffffffffff, @ANYBLOB="00000004000000002e2f62bb75f396a9a27e5e0176eac9506f8a91513129cbe76f93e58a74ce416adbfe800dd0ec81a75eeaa66209eb4d92afa3d6a3eebde7cfb85ce89cb564f1d3b5efb219cf8b5d37a271e7e163656925d1b6e5414087b711c6908cc623d609e7b2753bb6bbcbf510e4393da480ceefae5ff550974932ecb442a333dd8fa9cc6f26a0e45f63c36e4901ab2a827884973cbd71b80595c386661c9c9fc5df8b0f569dd413fa11189d8872604d82681b29bef4df4368bdea68b628a9b3d32f7ab8a1f03f69cb683265ddc5710b659080d0b999c46f81b426af64eb1b1b4238378c072c9b993c2b8d43cf53ee097aaa3b"]) perf_event_open(&(0x7f0000000880)={0x5, 0x80, 0x40, 0x7c, 0x20, 0xc6, 0x0, 0xfffffffffffffff7, 0x20428, 0x6, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x40, 0x4, @perf_config_ext={0xffffffff, 0x4}, 0x10000, 0x55dd, 0x7, 0x3, 0x1, 0x9ac, 0x6a, 0x0, 0x63, 0x0, 0x8001}, r0, 0xa, r4, 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r3) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r3) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400003, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb5, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) ioctl$BTRFS_IOC_QUOTA_RESCAN_STATUS(r1, 0x8040942d, &(0x7f0000000b40)) r5 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r5, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r6 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) r7 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000b80), 0x2, 0x0) write(r7, &(0x7f0000000bc0)="40e470887482237b1f431e10acc071d7e36e45dd841998beab3efbb468747d8dbb333477ff6d7e0b50dd0ed7e7a8392f662f50c4a9a687aacb4edb223f80c48df42d958c815cc79f2ad2d0d04d03daf0f4738e419aa1c9eaf2d50a9a705805d356ba45cd0568a972f712b327a8ebaf0be155a9a3aec7afcf66a4327e7263915228b2792f", 0x84) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r6, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x170, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r8 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, r2) keyctl$revoke(0x3, r8) add_key$user(&(0x7f0000000280), &(0x7f0000000600)={'syz', 0x1}, &(0x7f0000000640)="3d21f0a9279db9b5ff9e49752a55aec5a551ddbe24dde81f61784beb209751af28ab0653e7437dc885adc48b9082a78bd83d547e54939aeb38d31ede5a39aadc49cc790e9e9e321948ddb43d561e94466754761c630e63637e", 0x59, r2) openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000940), 0x404041, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000980)) r9 = timerfd_create(0x4, 0x800) ioctl(r9, 0x1, &(0x7f0000000c80)="21d5a7ddbbf3bddabc1b13008a14556c5f68fe67f930e3d5e116aeca6e5255d4535c084ee8aaa621fa01f9637ce0755877f60e98b6f2933de1c1f19faacddb8cebd782083526d5c452680c5827b599") 20:06:11 executing program 3: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x400000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) r1 = syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) r2 = add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r3 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f0000000d00)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=0xffffffffffffffff, @ANYBLOB="00000004000000002e2f62bb75f396a9a27e5e0176eac9506f8a91513129cbe76f93e58a74ce416adbfe800dd0ec81a75eeaa66209eb4d92afa3d6a3eebde7cfb85ce89cb564f1d3b5efb219cf8b5d37a271e7e163656925d1b6e5414087b711c6908cc623d609e7b2753bb6bbcbf510e4393da480ceefae5ff550974932ecb442a333dd8fa9cc6f26a0e45f63c36e4901ab2a827884973cbd71b80595c386661c9c9fc5df8b0f569dd413fa11189d8872604d82681b29bef4df4368bdea68b628a9b3d32f7ab8a1f03f69cb683265ddc5710b659080d0b999c46f81b426af64eb1b1b4238378c072c9b993c2b8d43cf53ee097aaa3b"]) perf_event_open(&(0x7f0000000880)={0x5, 0x80, 0x40, 0x7c, 0x20, 0xc6, 0x0, 0xfffffffffffffff7, 0x20428, 0x6, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x40, 0x4, @perf_config_ext={0xffffffff, 0x4}, 0x10000, 0x55dd, 0x7, 0x3, 0x1, 0x9ac, 0x6a, 0x0, 0x63, 0x0, 0x8001}, r0, 0xa, r4, 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r3) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r3) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400003, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb5, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) ioctl$BTRFS_IOC_QUOTA_RESCAN_STATUS(r1, 0x8040942d, &(0x7f0000000b40)) r5 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r5, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r6 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) r7 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000b80), 0x2, 0x0) write(r7, &(0x7f0000000bc0)="40e470887482237b1f431e10acc071d7e36e45dd841998beab3efbb468747d8dbb333477ff6d7e0b50dd0ed7e7a8392f662f50c4a9a687aacb4edb223f80c48df42d958c815cc79f2ad2d0d04d03daf0f4738e419aa1c9eaf2d50a9a705805d356ba45cd0568a972f712b327a8ebaf0be155a9a3aec7afcf66a4327e7263915228b2792f", 0x84) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r6, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x170, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r8 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, r2) keyctl$revoke(0x3, r8) add_key$user(&(0x7f0000000280), &(0x7f0000000600)={'syz', 0x1}, &(0x7f0000000640)="3d21f0a9279db9b5ff9e49752a55aec5a551ddbe24dde81f61784beb209751af28ab0653e7437dc885adc48b9082a78bd83d547e54939aeb38d31ede5a39aadc49cc790e9e9e321948ddb43d561e94466754761c630e63637e", 0x59, r2) openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000940), 0x404041, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000980)) r9 = timerfd_create(0x4, 0x800) ioctl(r9, 0x1, &(0x7f0000000c80)="21d5a7ddbbf3bddabc1b13008a14556c5f68fe67f930e3d5e116aeca6e5255d4535c084ee8aaa621fa01f9637ce0755877f60e98b6f2933de1c1f19faacddb8cebd782083526d5c452680c5827b599") 20:06:11 executing program 5: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x400000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) r1 = syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) r2 = add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r3 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f0000000d00)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=0xffffffffffffffff, @ANYBLOB="00000004000000002e2f62bb75f396a9a27e5e0176eac9506f8a91513129cbe76f93e58a74ce416adbfe800dd0ec81a75eeaa66209eb4d92afa3d6a3eebde7cfb85ce89cb564f1d3b5efb219cf8b5d37a271e7e163656925d1b6e5414087b711c6908cc623d609e7b2753bb6bbcbf510e4393da480ceefae5ff550974932ecb442a333dd8fa9cc6f26a0e45f63c36e4901ab2a827884973cbd71b80595c386661c9c9fc5df8b0f569dd413fa11189d8872604d82681b29bef4df4368bdea68b628a9b3d32f7ab8a1f03f69cb683265ddc5710b659080d0b999c46f81b426af64eb1b1b4238378c072c9b993c2b8d43cf53ee097aaa3b"]) perf_event_open(&(0x7f0000000880)={0x5, 0x80, 0x40, 0x7c, 0x20, 0xc6, 0x0, 0xfffffffffffffff7, 0x20428, 0x6, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x40, 0x4, @perf_config_ext={0xffffffff, 0x4}, 0x10000, 0x55dd, 0x7, 0x3, 0x1, 0x9ac, 0x6a, 0x0, 0x63, 0x0, 0x8001}, r0, 0xa, r4, 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r3) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r3) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400003, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb5, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) ioctl$BTRFS_IOC_QUOTA_RESCAN_STATUS(r1, 0x8040942d, &(0x7f0000000b40)) r5 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r5, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r6 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) r7 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000b80), 0x2, 0x0) write(r7, &(0x7f0000000bc0)="40e470887482237b1f431e10acc071d7e36e45dd841998beab3efbb468747d8dbb333477ff6d7e0b50dd0ed7e7a8392f662f50c4a9a687aacb4edb223f80c48df42d958c815cc79f2ad2d0d04d03daf0f4738e419aa1c9eaf2d50a9a705805d356ba45cd0568a972f712b327a8ebaf0be155a9a3aec7afcf66a4327e7263915228b2792f", 0x84) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r6, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x170, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r8 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, r2) keyctl$revoke(0x3, r8) add_key$user(&(0x7f0000000280), &(0x7f0000000600)={'syz', 0x1}, &(0x7f0000000640)="3d21f0a9279db9b5ff9e49752a55aec5a551ddbe24dde81f61784beb209751af28ab0653e7437dc885adc48b9082a78bd83d547e54939aeb38d31ede5a39aadc49cc790e9e9e321948ddb43d561e94466754761c630e63637e", 0x59, r2) openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000940), 0x404041, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000980)) r9 = timerfd_create(0x4, 0x800) ioctl(r9, 0x1, &(0x7f0000000c80)="21d5a7ddbbf3bddabc1b13008a14556c5f68fe67f930e3d5e116aeca6e5255d4535c084ee8aaa621fa01f9637ce0755877f60e98b6f2933de1c1f19faacddb8cebd782083526d5c452680c5827b599") 20:06:11 executing program 0: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x400000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) r1 = syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) r2 = add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r3 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f0000000d00)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=0xffffffffffffffff, @ANYBLOB="00000004000000002e2f62bb75f396a9a27e5e0176eac9506f8a91513129cbe76f93e58a74ce416adbfe800dd0ec81a75eeaa66209eb4d92afa3d6a3eebde7cfb85ce89cb564f1d3b5efb219cf8b5d37a271e7e163656925d1b6e5414087b711c6908cc623d609e7b2753bb6bbcbf510e4393da480ceefae5ff550974932ecb442a333dd8fa9cc6f26a0e45f63c36e4901ab2a827884973cbd71b80595c386661c9c9fc5df8b0f569dd413fa11189d8872604d82681b29bef4df4368bdea68b628a9b3d32f7ab8a1f03f69cb683265ddc5710b659080d0b999c46f81b426af64eb1b1b4238378c072c9b993c2b8d43cf53ee097aaa3b"]) perf_event_open(&(0x7f0000000880)={0x5, 0x80, 0x40, 0x7c, 0x20, 0xc6, 0x0, 0xfffffffffffffff7, 0x20428, 0x6, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x40, 0x4, @perf_config_ext={0xffffffff, 0x4}, 0x10000, 0x55dd, 0x7, 0x3, 0x1, 0x9ac, 0x6a, 0x0, 0x63, 0x0, 0x8001}, r0, 0xa, r4, 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r3) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r3) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400003, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb5, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) ioctl$BTRFS_IOC_QUOTA_RESCAN_STATUS(r1, 0x8040942d, &(0x7f0000000b40)) r5 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r5, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r6 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) r7 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000b80), 0x2, 0x0) write(r7, &(0x7f0000000bc0)="40e470887482237b1f431e10acc071d7e36e45dd841998beab3efbb468747d8dbb333477ff6d7e0b50dd0ed7e7a8392f662f50c4a9a687aacb4edb223f80c48df42d958c815cc79f2ad2d0d04d03daf0f4738e419aa1c9eaf2d50a9a705805d356ba45cd0568a972f712b327a8ebaf0be155a9a3aec7afcf66a4327e7263915228b2792f", 0x84) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r6, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x170, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r8 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, r2) keyctl$revoke(0x3, r8) add_key$user(&(0x7f0000000280), &(0x7f0000000600)={'syz', 0x1}, &(0x7f0000000640)="3d21f0a9279db9b5ff9e49752a55aec5a551ddbe24dde81f61784beb209751af28ab0653e7437dc885adc48b9082a78bd83d547e54939aeb38d31ede5a39aadc49cc790e9e9e321948ddb43d561e94466754761c630e63637e", 0x59, r2) openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000940), 0x404041, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000980)) r9 = timerfd_create(0x4, 0x800) ioctl(r9, 0x1, &(0x7f0000000c80)="21d5a7ddbbf3bddabc1b13008a14556c5f68fe67f930e3d5e116aeca6e5255d4535c084ee8aaa621fa01f9637ce0755877f60e98b6f2933de1c1f19faacddb8cebd782083526d5c452680c5827b599") 20:06:11 executing program 1: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x400000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) r1 = syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) r2 = add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r3 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f0000000d00)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=0xffffffffffffffff, @ANYBLOB="00000004000000002e2f62bb75f396a9a27e5e0176eac9506f8a91513129cbe76f93e58a74ce416adbfe800dd0ec81a75eeaa66209eb4d92afa3d6a3eebde7cfb85ce89cb564f1d3b5efb219cf8b5d37a271e7e163656925d1b6e5414087b711c6908cc623d609e7b2753bb6bbcbf510e4393da480ceefae5ff550974932ecb442a333dd8fa9cc6f26a0e45f63c36e4901ab2a827884973cbd71b80595c386661c9c9fc5df8b0f569dd413fa11189d8872604d82681b29bef4df4368bdea68b628a9b3d32f7ab8a1f03f69cb683265ddc5710b659080d0b999c46f81b426af64eb1b1b4238378c072c9b993c2b8d43cf53ee097aaa3b"]) perf_event_open(&(0x7f0000000880)={0x5, 0x80, 0x40, 0x7c, 0x20, 0xc6, 0x0, 0xfffffffffffffff7, 0x20428, 0x6, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x40, 0x4, @perf_config_ext={0xffffffff, 0x4}, 0x10000, 0x55dd, 0x7, 0x3, 0x1, 0x9ac, 0x6a, 0x0, 0x63, 0x0, 0x8001}, r0, 0xa, r4, 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r3) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r3) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400003, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb5, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) ioctl$BTRFS_IOC_QUOTA_RESCAN_STATUS(r1, 0x8040942d, &(0x7f0000000b40)) r5 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r5, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r6 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) r7 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000b80), 0x2, 0x0) write(r7, &(0x7f0000000bc0)="40e470887482237b1f431e10acc071d7e36e45dd841998beab3efbb468747d8dbb333477ff6d7e0b50dd0ed7e7a8392f662f50c4a9a687aacb4edb223f80c48df42d958c815cc79f2ad2d0d04d03daf0f4738e419aa1c9eaf2d50a9a705805d356ba45cd0568a972f712b327a8ebaf0be155a9a3aec7afcf66a4327e7263915228b2792f", 0x84) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r6, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x170, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r8 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, r2) keyctl$revoke(0x3, r8) add_key$user(&(0x7f0000000280), &(0x7f0000000600)={'syz', 0x1}, &(0x7f0000000640)="3d21f0a9279db9b5ff9e49752a55aec5a551ddbe24dde81f61784beb209751af28ab0653e7437dc885adc48b9082a78bd83d547e54939aeb38d31ede5a39aadc49cc790e9e9e321948ddb43d561e94466754761c630e63637e", 0x59, r2) openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000940), 0x404041, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000980)) r9 = timerfd_create(0x4, 0x800) ioctl(r9, 0x1, &(0x7f0000000c80)="21d5a7ddbbf3bddabc1b13008a14556c5f68fe67f930e3d5e116aeca6e5255d4535c084ee8aaa621fa01f9637ce0755877f60e98b6f2933de1c1f19faacddb8cebd782083526d5c452680c5827b599") 20:06:11 executing program 2: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x400000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) r1 = syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) r2 = add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r3 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f0000000d00)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=0xffffffffffffffff, @ANYBLOB="00000004000000002e2f62bb75f396a9a27e5e0176eac9506f8a91513129cbe76f93e58a74ce416adbfe800dd0ec81a75eeaa66209eb4d92afa3d6a3eebde7cfb85ce89cb564f1d3b5efb219cf8b5d37a271e7e163656925d1b6e5414087b711c6908cc623d609e7b2753bb6bbcbf510e4393da480ceefae5ff550974932ecb442a333dd8fa9cc6f26a0e45f63c36e4901ab2a827884973cbd71b80595c386661c9c9fc5df8b0f569dd413fa11189d8872604d82681b29bef4df4368bdea68b628a9b3d32f7ab8a1f03f69cb683265ddc5710b659080d0b999c46f81b426af64eb1b1b4238378c072c9b993c2b8d43cf53ee097aaa3b"]) perf_event_open(&(0x7f0000000880)={0x5, 0x80, 0x40, 0x7c, 0x20, 0xc6, 0x0, 0xfffffffffffffff7, 0x20428, 0x6, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x40, 0x4, @perf_config_ext={0xffffffff, 0x4}, 0x10000, 0x55dd, 0x7, 0x3, 0x1, 0x9ac, 0x6a, 0x0, 0x63, 0x0, 0x8001}, r0, 0xa, r4, 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r3) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r3) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400003, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb5, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) ioctl$BTRFS_IOC_QUOTA_RESCAN_STATUS(r1, 0x8040942d, &(0x7f0000000b40)) r5 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r5, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r6 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) r7 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000b80), 0x2, 0x0) write(r7, &(0x7f0000000bc0)="40e470887482237b1f431e10acc071d7e36e45dd841998beab3efbb468747d8dbb333477ff6d7e0b50dd0ed7e7a8392f662f50c4a9a687aacb4edb223f80c48df42d958c815cc79f2ad2d0d04d03daf0f4738e419aa1c9eaf2d50a9a705805d356ba45cd0568a972f712b327a8ebaf0be155a9a3aec7afcf66a4327e7263915228b2792f", 0x84) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r6, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x170, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r8 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, r2) keyctl$revoke(0x3, r8) add_key$user(&(0x7f0000000280), &(0x7f0000000600)={'syz', 0x1}, &(0x7f0000000640)="3d21f0a9279db9b5ff9e49752a55aec5a551ddbe24dde81f61784beb209751af28ab0653e7437dc885adc48b9082a78bd83d547e54939aeb38d31ede5a39aadc49cc790e9e9e321948ddb43d561e94466754761c630e63637e", 0x59, r2) openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000940), 0x404041, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000980)) r9 = timerfd_create(0x4, 0x800) ioctl(r9, 0x1, &(0x7f0000000c80)="21d5a7ddbbf3bddabc1b13008a14556c5f68fe67f930e3d5e116aeca6e5255d4535c084ee8aaa621fa01f9637ce0755877f60e98b6f2933de1c1f19faacddb8cebd782083526d5c452680c5827b599") 20:06:11 executing program 4: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x400000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) r1 = syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) r2 = add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r3 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f0000000d00)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=0xffffffffffffffff, @ANYBLOB="00000004000000002e2f62bb75f396a9a27e5e0176eac9506f8a91513129cbe76f93e58a74ce416adbfe800dd0ec81a75eeaa66209eb4d92afa3d6a3eebde7cfb85ce89cb564f1d3b5efb219cf8b5d37a271e7e163656925d1b6e5414087b711c6908cc623d609e7b2753bb6bbcbf510e4393da480ceefae5ff550974932ecb442a333dd8fa9cc6f26a0e45f63c36e4901ab2a827884973cbd71b80595c386661c9c9fc5df8b0f569dd413fa11189d8872604d82681b29bef4df4368bdea68b628a9b3d32f7ab8a1f03f69cb683265ddc5710b659080d0b999c46f81b426af64eb1b1b4238378c072c9b993c2b8d43cf53ee097aaa3b"]) perf_event_open(&(0x7f0000000880)={0x5, 0x80, 0x40, 0x7c, 0x20, 0xc6, 0x0, 0xfffffffffffffff7, 0x20428, 0x6, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x40, 0x4, @perf_config_ext={0xffffffff, 0x4}, 0x10000, 0x55dd, 0x7, 0x3, 0x1, 0x9ac, 0x6a, 0x0, 0x63, 0x0, 0x8001}, r0, 0xa, r4, 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r3) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r3) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400003, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb5, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) ioctl$BTRFS_IOC_QUOTA_RESCAN_STATUS(r1, 0x8040942d, &(0x7f0000000b40)) r5 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r5, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r6 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) r7 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000b80), 0x2, 0x0) write(r7, &(0x7f0000000bc0)="40e470887482237b1f431e10acc071d7e36e45dd841998beab3efbb468747d8dbb333477ff6d7e0b50dd0ed7e7a8392f662f50c4a9a687aacb4edb223f80c48df42d958c815cc79f2ad2d0d04d03daf0f4738e419aa1c9eaf2d50a9a705805d356ba45cd0568a972f712b327a8ebaf0be155a9a3aec7afcf66a4327e7263915228b2792f", 0x84) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r6, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x170, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r8 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, r2) keyctl$revoke(0x3, r8) add_key$user(&(0x7f0000000280), &(0x7f0000000600)={'syz', 0x1}, &(0x7f0000000640)="3d21f0a9279db9b5ff9e49752a55aec5a551ddbe24dde81f61784beb209751af28ab0653e7437dc885adc48b9082a78bd83d547e54939aeb38d31ede5a39aadc49cc790e9e9e321948ddb43d561e94466754761c630e63637e", 0x59, r2) openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000940), 0x404041, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000980)) r9 = timerfd_create(0x4, 0x800) ioctl(r9, 0x1, &(0x7f0000000c80)="21d5a7ddbbf3bddabc1b13008a14556c5f68fe67f930e3d5e116aeca6e5255d4535c084ee8aaa621fa01f9637ce0755877f60e98b6f2933de1c1f19faacddb8cebd782083526d5c452680c5827b599") 20:06:11 executing program 3: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x400000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) r1 = syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) r2 = add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r3 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f0000000d00)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=0xffffffffffffffff, @ANYBLOB="00000004000000002e2f62bb75f396a9a27e5e0176eac9506f8a91513129cbe76f93e58a74ce416adbfe800dd0ec81a75eeaa66209eb4d92afa3d6a3eebde7cfb85ce89cb564f1d3b5efb219cf8b5d37a271e7e163656925d1b6e5414087b711c6908cc623d609e7b2753bb6bbcbf510e4393da480ceefae5ff550974932ecb442a333dd8fa9cc6f26a0e45f63c36e4901ab2a827884973cbd71b80595c386661c9c9fc5df8b0f569dd413fa11189d8872604d82681b29bef4df4368bdea68b628a9b3d32f7ab8a1f03f69cb683265ddc5710b659080d0b999c46f81b426af64eb1b1b4238378c072c9b993c2b8d43cf53ee097aaa3b"]) perf_event_open(&(0x7f0000000880)={0x5, 0x80, 0x40, 0x7c, 0x20, 0xc6, 0x0, 0xfffffffffffffff7, 0x20428, 0x6, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x40, 0x4, @perf_config_ext={0xffffffff, 0x4}, 0x10000, 0x55dd, 0x7, 0x3, 0x1, 0x9ac, 0x6a, 0x0, 0x63, 0x0, 0x8001}, r0, 0xa, r4, 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r3) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r3) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400003, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb5, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) ioctl$BTRFS_IOC_QUOTA_RESCAN_STATUS(r1, 0x8040942d, &(0x7f0000000b40)) r5 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r5, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r6 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) r7 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000b80), 0x2, 0x0) write(r7, &(0x7f0000000bc0)="40e470887482237b1f431e10acc071d7e36e45dd841998beab3efbb468747d8dbb333477ff6d7e0b50dd0ed7e7a8392f662f50c4a9a687aacb4edb223f80c48df42d958c815cc79f2ad2d0d04d03daf0f4738e419aa1c9eaf2d50a9a705805d356ba45cd0568a972f712b327a8ebaf0be155a9a3aec7afcf66a4327e7263915228b2792f", 0x84) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r6, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x170, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r8 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, r2) keyctl$revoke(0x3, r8) add_key$user(&(0x7f0000000280), &(0x7f0000000600)={'syz', 0x1}, &(0x7f0000000640)="3d21f0a9279db9b5ff9e49752a55aec5a551ddbe24dde81f61784beb209751af28ab0653e7437dc885adc48b9082a78bd83d547e54939aeb38d31ede5a39aadc49cc790e9e9e321948ddb43d561e94466754761c630e63637e", 0x59, r2) openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000940), 0x404041, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000980)) r9 = timerfd_create(0x4, 0x800) ioctl(r9, 0x1, &(0x7f0000000c80)="21d5a7ddbbf3bddabc1b13008a14556c5f68fe67f930e3d5e116aeca6e5255d4535c084ee8aaa621fa01f9637ce0755877f60e98b6f2933de1c1f19faacddb8cebd782083526d5c452680c5827b599") 20:06:12 executing program 5: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x400000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) r1 = syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) r2 = add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r3 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f0000000d00)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=0xffffffffffffffff, @ANYBLOB="00000004000000002e2f62bb75f396a9a27e5e0176eac9506f8a91513129cbe76f93e58a74ce416adbfe800dd0ec81a75eeaa66209eb4d92afa3d6a3eebde7cfb85ce89cb564f1d3b5efb219cf8b5d37a271e7e163656925d1b6e5414087b711c6908cc623d609e7b2753bb6bbcbf510e4393da480ceefae5ff550974932ecb442a333dd8fa9cc6f26a0e45f63c36e4901ab2a827884973cbd71b80595c386661c9c9fc5df8b0f569dd413fa11189d8872604d82681b29bef4df4368bdea68b628a9b3d32f7ab8a1f03f69cb683265ddc5710b659080d0b999c46f81b426af64eb1b1b4238378c072c9b993c2b8d43cf53ee097aaa3b"]) perf_event_open(&(0x7f0000000880)={0x5, 0x80, 0x40, 0x7c, 0x20, 0xc6, 0x0, 0xfffffffffffffff7, 0x20428, 0x6, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x40, 0x4, @perf_config_ext={0xffffffff, 0x4}, 0x10000, 0x55dd, 0x7, 0x3, 0x1, 0x9ac, 0x6a, 0x0, 0x63, 0x0, 0x8001}, r0, 0xa, r4, 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r3) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r3) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400003, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb5, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) ioctl$BTRFS_IOC_QUOTA_RESCAN_STATUS(r1, 0x8040942d, &(0x7f0000000b40)) r5 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r5, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r6 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) r7 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000b80), 0x2, 0x0) write(r7, &(0x7f0000000bc0)="40e470887482237b1f431e10acc071d7e36e45dd841998beab3efbb468747d8dbb333477ff6d7e0b50dd0ed7e7a8392f662f50c4a9a687aacb4edb223f80c48df42d958c815cc79f2ad2d0d04d03daf0f4738e419aa1c9eaf2d50a9a705805d356ba45cd0568a972f712b327a8ebaf0be155a9a3aec7afcf66a4327e7263915228b2792f", 0x84) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r6, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x170, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r8 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, r2) keyctl$revoke(0x3, r8) add_key$user(&(0x7f0000000280), &(0x7f0000000600)={'syz', 0x1}, &(0x7f0000000640)="3d21f0a9279db9b5ff9e49752a55aec5a551ddbe24dde81f61784beb209751af28ab0653e7437dc885adc48b9082a78bd83d547e54939aeb38d31ede5a39aadc49cc790e9e9e321948ddb43d561e94466754761c630e63637e", 0x59, r2) openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000940), 0x404041, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000980)) r9 = timerfd_create(0x4, 0x800) ioctl(r9, 0x1, &(0x7f0000000c80)="21d5a7ddbbf3bddabc1b13008a14556c5f68fe67f930e3d5e116aeca6e5255d4535c084ee8aaa621fa01f9637ce0755877f60e98b6f2933de1c1f19faacddb8cebd782083526d5c452680c5827b599") 20:06:12 executing program 0: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x400000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) r1 = syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) r2 = add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r3 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f0000000d00)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=0xffffffffffffffff, @ANYBLOB="00000004000000002e2f62bb75f396a9a27e5e0176eac9506f8a91513129cbe76f93e58a74ce416adbfe800dd0ec81a75eeaa66209eb4d92afa3d6a3eebde7cfb85ce89cb564f1d3b5efb219cf8b5d37a271e7e163656925d1b6e5414087b711c6908cc623d609e7b2753bb6bbcbf510e4393da480ceefae5ff550974932ecb442a333dd8fa9cc6f26a0e45f63c36e4901ab2a827884973cbd71b80595c386661c9c9fc5df8b0f569dd413fa11189d8872604d82681b29bef4df4368bdea68b628a9b3d32f7ab8a1f03f69cb683265ddc5710b659080d0b999c46f81b426af64eb1b1b4238378c072c9b993c2b8d43cf53ee097aaa3b"]) perf_event_open(&(0x7f0000000880)={0x5, 0x80, 0x40, 0x7c, 0x20, 0xc6, 0x0, 0xfffffffffffffff7, 0x20428, 0x6, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x40, 0x4, @perf_config_ext={0xffffffff, 0x4}, 0x10000, 0x55dd, 0x7, 0x3, 0x1, 0x9ac, 0x6a, 0x0, 0x63, 0x0, 0x8001}, r0, 0xa, r4, 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r3) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r3) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400003, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb5, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) ioctl$BTRFS_IOC_QUOTA_RESCAN_STATUS(r1, 0x8040942d, &(0x7f0000000b40)) r5 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r5, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r6 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) r7 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000b80), 0x2, 0x0) write(r7, &(0x7f0000000bc0)="40e470887482237b1f431e10acc071d7e36e45dd841998beab3efbb468747d8dbb333477ff6d7e0b50dd0ed7e7a8392f662f50c4a9a687aacb4edb223f80c48df42d958c815cc79f2ad2d0d04d03daf0f4738e419aa1c9eaf2d50a9a705805d356ba45cd0568a972f712b327a8ebaf0be155a9a3aec7afcf66a4327e7263915228b2792f", 0x84) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r6, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x170, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r8 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, r2) keyctl$revoke(0x3, r8) add_key$user(&(0x7f0000000280), &(0x7f0000000600)={'syz', 0x1}, &(0x7f0000000640)="3d21f0a9279db9b5ff9e49752a55aec5a551ddbe24dde81f61784beb209751af28ab0653e7437dc885adc48b9082a78bd83d547e54939aeb38d31ede5a39aadc49cc790e9e9e321948ddb43d561e94466754761c630e63637e", 0x59, r2) openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000940), 0x404041, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000980)) r9 = timerfd_create(0x4, 0x800) ioctl(r9, 0x1, &(0x7f0000000c80)="21d5a7ddbbf3bddabc1b13008a14556c5f68fe67f930e3d5e116aeca6e5255d4535c084ee8aaa621fa01f9637ce0755877f60e98b6f2933de1c1f19faacddb8cebd782083526d5c452680c5827b599") 20:06:12 executing program 2: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x400000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) r1 = syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) r2 = add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r3 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f0000000d00)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=0xffffffffffffffff, @ANYBLOB="00000004000000002e2f62bb75f396a9a27e5e0176eac9506f8a91513129cbe76f93e58a74ce416adbfe800dd0ec81a75eeaa66209eb4d92afa3d6a3eebde7cfb85ce89cb564f1d3b5efb219cf8b5d37a271e7e163656925d1b6e5414087b711c6908cc623d609e7b2753bb6bbcbf510e4393da480ceefae5ff550974932ecb442a333dd8fa9cc6f26a0e45f63c36e4901ab2a827884973cbd71b80595c386661c9c9fc5df8b0f569dd413fa11189d8872604d82681b29bef4df4368bdea68b628a9b3d32f7ab8a1f03f69cb683265ddc5710b659080d0b999c46f81b426af64eb1b1b4238378c072c9b993c2b8d43cf53ee097aaa3b"]) perf_event_open(&(0x7f0000000880)={0x5, 0x80, 0x40, 0x7c, 0x20, 0xc6, 0x0, 0xfffffffffffffff7, 0x20428, 0x6, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x40, 0x4, @perf_config_ext={0xffffffff, 0x4}, 0x10000, 0x55dd, 0x7, 0x3, 0x1, 0x9ac, 0x6a, 0x0, 0x63, 0x0, 0x8001}, r0, 0xa, r4, 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r3) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r3) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400003, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb5, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) ioctl$BTRFS_IOC_QUOTA_RESCAN_STATUS(r1, 0x8040942d, &(0x7f0000000b40)) r5 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r5, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r6 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) r7 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000b80), 0x2, 0x0) write(r7, &(0x7f0000000bc0)="40e470887482237b1f431e10acc071d7e36e45dd841998beab3efbb468747d8dbb333477ff6d7e0b50dd0ed7e7a8392f662f50c4a9a687aacb4edb223f80c48df42d958c815cc79f2ad2d0d04d03daf0f4738e419aa1c9eaf2d50a9a705805d356ba45cd0568a972f712b327a8ebaf0be155a9a3aec7afcf66a4327e7263915228b2792f", 0x84) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r6, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x170, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r8 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, r2) keyctl$revoke(0x3, r8) add_key$user(&(0x7f0000000280), &(0x7f0000000600)={'syz', 0x1}, &(0x7f0000000640)="3d21f0a9279db9b5ff9e49752a55aec5a551ddbe24dde81f61784beb209751af28ab0653e7437dc885adc48b9082a78bd83d547e54939aeb38d31ede5a39aadc49cc790e9e9e321948ddb43d561e94466754761c630e63637e", 0x59, r2) openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000940), 0x404041, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000980)) r9 = timerfd_create(0x4, 0x800) ioctl(r9, 0x1, &(0x7f0000000c80)="21d5a7ddbbf3bddabc1b13008a14556c5f68fe67f930e3d5e116aeca6e5255d4535c084ee8aaa621fa01f9637ce0755877f60e98b6f2933de1c1f19faacddb8cebd782083526d5c452680c5827b599") 20:06:12 executing program 1: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x400000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) r1 = syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) r2 = add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r3 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f0000000d00)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=0xffffffffffffffff, @ANYBLOB="00000004000000002e2f62bb75f396a9a27e5e0176eac9506f8a91513129cbe76f93e58a74ce416adbfe800dd0ec81a75eeaa66209eb4d92afa3d6a3eebde7cfb85ce89cb564f1d3b5efb219cf8b5d37a271e7e163656925d1b6e5414087b711c6908cc623d609e7b2753bb6bbcbf510e4393da480ceefae5ff550974932ecb442a333dd8fa9cc6f26a0e45f63c36e4901ab2a827884973cbd71b80595c386661c9c9fc5df8b0f569dd413fa11189d8872604d82681b29bef4df4368bdea68b628a9b3d32f7ab8a1f03f69cb683265ddc5710b659080d0b999c46f81b426af64eb1b1b4238378c072c9b993c2b8d43cf53ee097aaa3b"]) perf_event_open(&(0x7f0000000880)={0x5, 0x80, 0x40, 0x7c, 0x20, 0xc6, 0x0, 0xfffffffffffffff7, 0x20428, 0x6, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x40, 0x4, @perf_config_ext={0xffffffff, 0x4}, 0x10000, 0x55dd, 0x7, 0x3, 0x1, 0x9ac, 0x6a, 0x0, 0x63, 0x0, 0x8001}, r0, 0xa, r4, 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r3) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r3) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400003, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb5, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) ioctl$BTRFS_IOC_QUOTA_RESCAN_STATUS(r1, 0x8040942d, &(0x7f0000000b40)) r5 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r5, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r6 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) r7 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000b80), 0x2, 0x0) write(r7, &(0x7f0000000bc0)="40e470887482237b1f431e10acc071d7e36e45dd841998beab3efbb468747d8dbb333477ff6d7e0b50dd0ed7e7a8392f662f50c4a9a687aacb4edb223f80c48df42d958c815cc79f2ad2d0d04d03daf0f4738e419aa1c9eaf2d50a9a705805d356ba45cd0568a972f712b327a8ebaf0be155a9a3aec7afcf66a4327e7263915228b2792f", 0x84) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r6, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x170, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r8 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, r2) keyctl$revoke(0x3, r8) add_key$user(&(0x7f0000000280), &(0x7f0000000600)={'syz', 0x1}, &(0x7f0000000640)="3d21f0a9279db9b5ff9e49752a55aec5a551ddbe24dde81f61784beb209751af28ab0653e7437dc885adc48b9082a78bd83d547e54939aeb38d31ede5a39aadc49cc790e9e9e321948ddb43d561e94466754761c630e63637e", 0x59, r2) openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000940), 0x404041, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000980)) r9 = timerfd_create(0x4, 0x800) ioctl(r9, 0x1, &(0x7f0000000c80)="21d5a7ddbbf3bddabc1b13008a14556c5f68fe67f930e3d5e116aeca6e5255d4535c084ee8aaa621fa01f9637ce0755877f60e98b6f2933de1c1f19faacddb8cebd782083526d5c452680c5827b599") 20:06:13 executing program 3: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x400000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) r1 = syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) r2 = add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r3 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f0000000d00)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=0xffffffffffffffff, @ANYBLOB="00000004000000002e2f62bb75f396a9a27e5e0176eac9506f8a91513129cbe76f93e58a74ce416adbfe800dd0ec81a75eeaa66209eb4d92afa3d6a3eebde7cfb85ce89cb564f1d3b5efb219cf8b5d37a271e7e163656925d1b6e5414087b711c6908cc623d609e7b2753bb6bbcbf510e4393da480ceefae5ff550974932ecb442a333dd8fa9cc6f26a0e45f63c36e4901ab2a827884973cbd71b80595c386661c9c9fc5df8b0f569dd413fa11189d8872604d82681b29bef4df4368bdea68b628a9b3d32f7ab8a1f03f69cb683265ddc5710b659080d0b999c46f81b426af64eb1b1b4238378c072c9b993c2b8d43cf53ee097aaa3b"]) perf_event_open(&(0x7f0000000880)={0x5, 0x80, 0x40, 0x7c, 0x20, 0xc6, 0x0, 0xfffffffffffffff7, 0x20428, 0x6, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x40, 0x4, @perf_config_ext={0xffffffff, 0x4}, 0x10000, 0x55dd, 0x7, 0x3, 0x1, 0x9ac, 0x6a, 0x0, 0x63, 0x0, 0x8001}, r0, 0xa, r4, 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r3) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r3) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400003, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb5, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) ioctl$BTRFS_IOC_QUOTA_RESCAN_STATUS(r1, 0x8040942d, &(0x7f0000000b40)) r5 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r5, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r6 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) r7 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000b80), 0x2, 0x0) write(r7, &(0x7f0000000bc0)="40e470887482237b1f431e10acc071d7e36e45dd841998beab3efbb468747d8dbb333477ff6d7e0b50dd0ed7e7a8392f662f50c4a9a687aacb4edb223f80c48df42d958c815cc79f2ad2d0d04d03daf0f4738e419aa1c9eaf2d50a9a705805d356ba45cd0568a972f712b327a8ebaf0be155a9a3aec7afcf66a4327e7263915228b2792f", 0x84) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r6, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x170, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r8 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, r2) keyctl$revoke(0x3, r8) add_key$user(&(0x7f0000000280), &(0x7f0000000600)={'syz', 0x1}, &(0x7f0000000640)="3d21f0a9279db9b5ff9e49752a55aec5a551ddbe24dde81f61784beb209751af28ab0653e7437dc885adc48b9082a78bd83d547e54939aeb38d31ede5a39aadc49cc790e9e9e321948ddb43d561e94466754761c630e63637e", 0x59, r2) openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000940), 0x404041, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000980)) r9 = timerfd_create(0x4, 0x800) ioctl(r9, 0x1, &(0x7f0000000c80)="21d5a7ddbbf3bddabc1b13008a14556c5f68fe67f930e3d5e116aeca6e5255d4535c084ee8aaa621fa01f9637ce0755877f60e98b6f2933de1c1f19faacddb8cebd782083526d5c452680c5827b599") 20:06:13 executing program 4: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x400000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) r1 = syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) r2 = add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r3 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f0000000d00)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=0xffffffffffffffff, @ANYBLOB="00000004000000002e2f62bb75f396a9a27e5e0176eac9506f8a91513129cbe76f93e58a74ce416adbfe800dd0ec81a75eeaa66209eb4d92afa3d6a3eebde7cfb85ce89cb564f1d3b5efb219cf8b5d37a271e7e163656925d1b6e5414087b711c6908cc623d609e7b2753bb6bbcbf510e4393da480ceefae5ff550974932ecb442a333dd8fa9cc6f26a0e45f63c36e4901ab2a827884973cbd71b80595c386661c9c9fc5df8b0f569dd413fa11189d8872604d82681b29bef4df4368bdea68b628a9b3d32f7ab8a1f03f69cb683265ddc5710b659080d0b999c46f81b426af64eb1b1b4238378c072c9b993c2b8d43cf53ee097aaa3b"]) perf_event_open(&(0x7f0000000880)={0x5, 0x80, 0x40, 0x7c, 0x20, 0xc6, 0x0, 0xfffffffffffffff7, 0x20428, 0x6, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x40, 0x4, @perf_config_ext={0xffffffff, 0x4}, 0x10000, 0x55dd, 0x7, 0x3, 0x1, 0x9ac, 0x6a, 0x0, 0x63, 0x0, 0x8001}, r0, 0xa, r4, 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r3) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r3) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400003, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb5, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) ioctl$BTRFS_IOC_QUOTA_RESCAN_STATUS(r1, 0x8040942d, &(0x7f0000000b40)) r5 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r5, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r6 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) r7 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000b80), 0x2, 0x0) write(r7, &(0x7f0000000bc0)="40e470887482237b1f431e10acc071d7e36e45dd841998beab3efbb468747d8dbb333477ff6d7e0b50dd0ed7e7a8392f662f50c4a9a687aacb4edb223f80c48df42d958c815cc79f2ad2d0d04d03daf0f4738e419aa1c9eaf2d50a9a705805d356ba45cd0568a972f712b327a8ebaf0be155a9a3aec7afcf66a4327e7263915228b2792f", 0x84) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r6, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x170, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r8 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, r2) keyctl$revoke(0x3, r8) add_key$user(&(0x7f0000000280), &(0x7f0000000600)={'syz', 0x1}, &(0x7f0000000640)="3d21f0a9279db9b5ff9e49752a55aec5a551ddbe24dde81f61784beb209751af28ab0653e7437dc885adc48b9082a78bd83d547e54939aeb38d31ede5a39aadc49cc790e9e9e321948ddb43d561e94466754761c630e63637e", 0x59, r2) openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000940), 0x404041, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000980)) r9 = timerfd_create(0x4, 0x800) ioctl(r9, 0x1, &(0x7f0000000c80)="21d5a7ddbbf3bddabc1b13008a14556c5f68fe67f930e3d5e116aeca6e5255d4535c084ee8aaa621fa01f9637ce0755877f60e98b6f2933de1c1f19faacddb8cebd782083526d5c452680c5827b599") 20:06:13 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) sched_setaffinity(0x0, 0x8, &(0x7f00000000c0)=0x105) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000700)={0x0}}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000300)=ANY=[@ANYBLOB="c73c93915f2fbaf9f4c2fe9eca9d3e59700d03670c05dea71d436005165ad04dfcc8d71422f101fbc2619dc93fd11cfe9a720575fcd5238e808c370886ae319dcc9173489dfebfc988d4317fca10c2f9609a7103b7670133eb98a5516cee7db4b5e945d80213cccb8ae48717949de1b462adb22cc2de7544ada36abb91f805f2b8d5e97f45da0025c48e338ce6b53ca38fff"], &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x41000, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x80) sendmsg$DEVLINK_CMD_SB_OCC_MAX_CLEAR(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f00000005c0)={&(0x7f00000004c0)={0xa8, 0x0, 0x800, 0x70bd27, 0x25dfdbff, {}, [{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0xb, 0xfffffff7}}, {@pci={{0x8}, {0x11}}, {0x8}}, {@pci={{0x8}, {0x11}}, {0x8, 0xb, 0xce95}}, {@pci={{0x8}, {0x11}}, {0x8, 0xb, 0xffffffff}}]}, 0xa8}}, 0x4000001) socket$igmp6(0xa, 0x3, 0x2) truncate(&(0x7f0000000400)='./file0\x00', 0x3) setpgid(0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000440)='./file0\x00', 0x40000, 0xfffffffffffffffe, 0x3, 0x0, &(0x7f0000000000)) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040), 0x42, 0x0) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000002140)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}}) 20:06:13 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) sched_setaffinity(0x0, 0x8, &(0x7f0000000000)=0x5) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad413e850000000f00000095"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x18, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r3}, 0x10) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$TIPC_NL_NET_GET(r5, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000140)={0x0, 0x14}}, 0x0) getsockname$packet(r5, &(0x7f00000004c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000300)=0x14) r7 = socket$nl_route(0x10, 0x3, 0x0) r8 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r8, 0x8916, &(0x7f0000000100)={@dev={0xfe, 0x80, '\x00', 0x2}, 0x0, r9}) sendmsg$nl_route(r7, &(0x7f0000000440)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0xc0}, 0xc0c5) r10 = socket$nl_route(0x10, 0x3, 0x0) r11 = open(&(0x7f0000000800)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x14000, 0x88) socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), r11) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) sendmsg$nl_route(r10, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000005840)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000600)=ANY=[@ANYBLOB="780000002400518600"/20, @ANYRES32=r12, @ANYBLOB="00000000ffffffff0000000008000100736671"], 0x78}}, 0x0) sendmsg$nl_route(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newlink={0x40, 0x10, 0xffffff1f, 0x1, 0x0, {0x0, 0x0, 0x0, 0x0, 0xffffff81}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @wireguard={{0xe}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x40}}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000000)={0x8, 0x5, &(0x7f0000000640)=ANY=[@ANYBLOB="18000000000000000000000008cb040000000010e0ae68032dc506c43c6ed996701956499ccd691d6bfe98739d5604fe64bcbb46024554d3f7e979dfd5313cb8b35eeb88888530a28fae064fb600000000a9d85a35d158cb8b4d32ba3a06d3b2d297ea0900000000000000d9b6095e9ef9b0db33f2b453da1d6cadc9880900fe9be04163e190efb7093ae99d3547e8b79f9e4fb8326b9ee23a52a97907ebe50e7a5820360000000020745630caa8aad7f4d56e377d12abafa86f0f85f05d671e65ab73af", @ANYRES32, @ANYBLOB="000000000000000095000000000000"], &(0x7f00000001c0)='GPL\x00', 0x2, 0x8a, &(0x7f0000000200)=""/138, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 20:06:13 executing program 0: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x400000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) r1 = syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) r2 = add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r3 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f0000000d00)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=0xffffffffffffffff, @ANYBLOB="00000004000000002e2f62bb75f396a9a27e5e0176eac9506f8a91513129cbe76f93e58a74ce416adbfe800dd0ec81a75eeaa66209eb4d92afa3d6a3eebde7cfb85ce89cb564f1d3b5efb219cf8b5d37a271e7e163656925d1b6e5414087b711c6908cc623d609e7b2753bb6bbcbf510e4393da480ceefae5ff550974932ecb442a333dd8fa9cc6f26a0e45f63c36e4901ab2a827884973cbd71b80595c386661c9c9fc5df8b0f569dd413fa11189d8872604d82681b29bef4df4368bdea68b628a9b3d32f7ab8a1f03f69cb683265ddc5710b659080d0b999c46f81b426af64eb1b1b4238378c072c9b993c2b8d43cf53ee097aaa3b"]) perf_event_open(&(0x7f0000000880)={0x5, 0x80, 0x40, 0x7c, 0x20, 0xc6, 0x0, 0xfffffffffffffff7, 0x20428, 0x6, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x40, 0x4, @perf_config_ext={0xffffffff, 0x4}, 0x10000, 0x55dd, 0x7, 0x3, 0x1, 0x9ac, 0x6a, 0x0, 0x63, 0x0, 0x8001}, r0, 0xa, r4, 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r3) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r3) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400003, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb5, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) ioctl$BTRFS_IOC_QUOTA_RESCAN_STATUS(r1, 0x8040942d, &(0x7f0000000b40)) r5 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r5, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r6 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) r7 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000b80), 0x2, 0x0) write(r7, &(0x7f0000000bc0)="40e470887482237b1f431e10acc071d7e36e45dd841998beab3efbb468747d8dbb333477ff6d7e0b50dd0ed7e7a8392f662f50c4a9a687aacb4edb223f80c48df42d958c815cc79f2ad2d0d04d03daf0f4738e419aa1c9eaf2d50a9a705805d356ba45cd0568a972f712b327a8ebaf0be155a9a3aec7afcf66a4327e7263915228b2792f", 0x84) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r6, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x170, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r8 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, r2) keyctl$revoke(0x3, r8) add_key$user(&(0x7f0000000280), &(0x7f0000000600)={'syz', 0x1}, &(0x7f0000000640)="3d21f0a9279db9b5ff9e49752a55aec5a551ddbe24dde81f61784beb209751af28ab0653e7437dc885adc48b9082a78bd83d547e54939aeb38d31ede5a39aadc49cc790e9e9e321948ddb43d561e94466754761c630e63637e", 0x59, r2) openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000940), 0x404041, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000980)) r9 = timerfd_create(0x4, 0x800) ioctl(r9, 0x1, &(0x7f0000000c80)="21d5a7ddbbf3bddabc1b13008a14556c5f68fe67f930e3d5e116aeca6e5255d4535c084ee8aaa621fa01f9637ce0755877f60e98b6f2933de1c1f19faacddb8cebd782083526d5c452680c5827b599") 20:06:13 executing program 2: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x400000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) r1 = syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) r2 = add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r3 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f0000000d00)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=0xffffffffffffffff, @ANYBLOB="00000004000000002e2f62bb75f396a9a27e5e0176eac9506f8a91513129cbe76f93e58a74ce416adbfe800dd0ec81a75eeaa66209eb4d92afa3d6a3eebde7cfb85ce89cb564f1d3b5efb219cf8b5d37a271e7e163656925d1b6e5414087b711c6908cc623d609e7b2753bb6bbcbf510e4393da480ceefae5ff550974932ecb442a333dd8fa9cc6f26a0e45f63c36e4901ab2a827884973cbd71b80595c386661c9c9fc5df8b0f569dd413fa11189d8872604d82681b29bef4df4368bdea68b628a9b3d32f7ab8a1f03f69cb683265ddc5710b659080d0b999c46f81b426af64eb1b1b4238378c072c9b993c2b8d43cf53ee097aaa3b"]) perf_event_open(&(0x7f0000000880)={0x5, 0x80, 0x40, 0x7c, 0x20, 0xc6, 0x0, 0xfffffffffffffff7, 0x20428, 0x6, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x40, 0x4, @perf_config_ext={0xffffffff, 0x4}, 0x10000, 0x55dd, 0x7, 0x3, 0x1, 0x9ac, 0x6a, 0x0, 0x63, 0x0, 0x8001}, r0, 0xa, r4, 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r3) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r3) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400003, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb5, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) ioctl$BTRFS_IOC_QUOTA_RESCAN_STATUS(r1, 0x8040942d, &(0x7f0000000b40)) r5 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r5, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r6 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) r7 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000b80), 0x2, 0x0) write(r7, &(0x7f0000000bc0)="40e470887482237b1f431e10acc071d7e36e45dd841998beab3efbb468747d8dbb333477ff6d7e0b50dd0ed7e7a8392f662f50c4a9a687aacb4edb223f80c48df42d958c815cc79f2ad2d0d04d03daf0f4738e419aa1c9eaf2d50a9a705805d356ba45cd0568a972f712b327a8ebaf0be155a9a3aec7afcf66a4327e7263915228b2792f", 0x84) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r6, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x170, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r8 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, r2) keyctl$revoke(0x3, r8) add_key$user(&(0x7f0000000280), &(0x7f0000000600)={'syz', 0x1}, &(0x7f0000000640)="3d21f0a9279db9b5ff9e49752a55aec5a551ddbe24dde81f61784beb209751af28ab0653e7437dc885adc48b9082a78bd83d547e54939aeb38d31ede5a39aadc49cc790e9e9e321948ddb43d561e94466754761c630e63637e", 0x59, r2) openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000940), 0x404041, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000980)) r9 = timerfd_create(0x4, 0x800) ioctl(r9, 0x1, &(0x7f0000000c80)="21d5a7ddbbf3bddabc1b13008a14556c5f68fe67f930e3d5e116aeca6e5255d4535c084ee8aaa621fa01f9637ce0755877f60e98b6f2933de1c1f19faacddb8cebd782083526d5c452680c5827b599") 20:06:14 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) sched_setaffinity(0x0, 0x8, &(0x7f00000000c0)=0x105) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000700)={0x0}}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000300)=ANY=[@ANYBLOB="c73c93915f2fbaf9f4c2fe9eca9d3e59700d03670c05dea71d436005165ad04dfcc8d71422f101fbc2619dc93fd11cfe9a720575fcd5238e808c370886ae319dcc9173489dfebfc988d4317fca10c2f9609a7103b7670133eb98a5516cee7db4b5e945d80213cccb8ae48717949de1b462adb22cc2de7544ada36abb91f805f2b8d5e97f45da0025c48e338ce6b53ca38fff"], &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x41000, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x80) sendmsg$DEVLINK_CMD_SB_OCC_MAX_CLEAR(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f00000005c0)={&(0x7f00000004c0)={0xa8, 0x0, 0x800, 0x70bd27, 0x25dfdbff, {}, [{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0xb, 0xfffffff7}}, {@pci={{0x8}, {0x11}}, {0x8}}, {@pci={{0x8}, {0x11}}, {0x8, 0xb, 0xce95}}, {@pci={{0x8}, {0x11}}, {0x8, 0xb, 0xffffffff}}]}, 0xa8}}, 0x4000001) socket$igmp6(0xa, 0x3, 0x2) truncate(&(0x7f0000000400)='./file0\x00', 0x3) setpgid(0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000440)='./file0\x00', 0x40000, 0xfffffffffffffffe, 0x3, 0x0, &(0x7f0000000000)) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040), 0x42, 0x0) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000002140)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}}) 20:06:15 executing program 3: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x400000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) r1 = syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) r2 = add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r3 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f0000000d00)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=0xffffffffffffffff, @ANYBLOB="00000004000000002e2f62bb75f396a9a27e5e0176eac9506f8a91513129cbe76f93e58a74ce416adbfe800dd0ec81a75eeaa66209eb4d92afa3d6a3eebde7cfb85ce89cb564f1d3b5efb219cf8b5d37a271e7e163656925d1b6e5414087b711c6908cc623d609e7b2753bb6bbcbf510e4393da480ceefae5ff550974932ecb442a333dd8fa9cc6f26a0e45f63c36e4901ab2a827884973cbd71b80595c386661c9c9fc5df8b0f569dd413fa11189d8872604d82681b29bef4df4368bdea68b628a9b3d32f7ab8a1f03f69cb683265ddc5710b659080d0b999c46f81b426af64eb1b1b4238378c072c9b993c2b8d43cf53ee097aaa3b"]) perf_event_open(&(0x7f0000000880)={0x5, 0x80, 0x40, 0x7c, 0x20, 0xc6, 0x0, 0xfffffffffffffff7, 0x20428, 0x6, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x40, 0x4, @perf_config_ext={0xffffffff, 0x4}, 0x10000, 0x55dd, 0x7, 0x3, 0x1, 0x9ac, 0x6a, 0x0, 0x63, 0x0, 0x8001}, r0, 0xa, r4, 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r3) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r3) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400003, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb5, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) ioctl$BTRFS_IOC_QUOTA_RESCAN_STATUS(r1, 0x8040942d, &(0x7f0000000b40)) r5 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r5, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r6 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) r7 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000b80), 0x2, 0x0) write(r7, &(0x7f0000000bc0)="40e470887482237b1f431e10acc071d7e36e45dd841998beab3efbb468747d8dbb333477ff6d7e0b50dd0ed7e7a8392f662f50c4a9a687aacb4edb223f80c48df42d958c815cc79f2ad2d0d04d03daf0f4738e419aa1c9eaf2d50a9a705805d356ba45cd0568a972f712b327a8ebaf0be155a9a3aec7afcf66a4327e7263915228b2792f", 0x84) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r6, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x170, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r8 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, r2) keyctl$revoke(0x3, r8) add_key$user(&(0x7f0000000280), &(0x7f0000000600)={'syz', 0x1}, &(0x7f0000000640)="3d21f0a9279db9b5ff9e49752a55aec5a551ddbe24dde81f61784beb209751af28ab0653e7437dc885adc48b9082a78bd83d547e54939aeb38d31ede5a39aadc49cc790e9e9e321948ddb43d561e94466754761c630e63637e", 0x59, r2) openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000940), 0x404041, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000980)) r9 = timerfd_create(0x4, 0x800) ioctl(r9, 0x1, &(0x7f0000000c80)="21d5a7ddbbf3bddabc1b13008a14556c5f68fe67f930e3d5e116aeca6e5255d4535c084ee8aaa621fa01f9637ce0755877f60e98b6f2933de1c1f19faacddb8cebd782083526d5c452680c5827b599") 20:06:15 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) sched_setaffinity(0x0, 0x8, &(0x7f0000000000)=0x5) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad413e850000000f00000095"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x18, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r3}, 0x10) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$TIPC_NL_NET_GET(r5, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000140)={0x0, 0x14}}, 0x0) getsockname$packet(r5, &(0x7f00000004c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000300)=0x14) r7 = socket$nl_route(0x10, 0x3, 0x0) r8 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r8, 0x8916, &(0x7f0000000100)={@dev={0xfe, 0x80, '\x00', 0x2}, 0x0, r9}) sendmsg$nl_route(r7, &(0x7f0000000440)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0xc0}, 0xc0c5) r10 = socket$nl_route(0x10, 0x3, 0x0) r11 = open(&(0x7f0000000800)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x14000, 0x88) socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), r11) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) sendmsg$nl_route(r10, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000005840)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000600)=ANY=[@ANYBLOB="780000002400518600"/20, @ANYRES32=r12, @ANYBLOB="00000000ffffffff0000000008000100736671"], 0x78}}, 0x0) sendmsg$nl_route(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newlink={0x40, 0x10, 0xffffff1f, 0x1, 0x0, {0x0, 0x0, 0x0, 0x0, 0xffffff81}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @wireguard={{0xe}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x40}}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000000)={0x8, 0x5, &(0x7f0000000640)=ANY=[@ANYBLOB="18000000000000000000000008cb040000000010e0ae68032dc506c43c6ed996701956499ccd691d6bfe98739d5604fe64bcbb46024554d3f7e979dfd5313cb8b35eeb88888530a28fae064fb600000000a9d85a35d158cb8b4d32ba3a06d3b2d297ea0900000000000000d9b6095e9ef9b0db33f2b453da1d6cadc9880900fe9be04163e190efb7093ae99d3547e8b79f9e4fb8326b9ee23a52a97907ebe50e7a5820360000000020745630caa8aad7f4d56e377d12abafa86f0f85f05d671e65ab73af", @ANYRES32, @ANYBLOB="000000000000000095000000000000"], &(0x7f00000001c0)='GPL\x00', 0x2, 0x8a, &(0x7f0000000200)=""/138, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 20:06:15 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) sched_setaffinity(0x0, 0x8, &(0x7f00000000c0)=0x105) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000700)={0x0}}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000300)=ANY=[@ANYBLOB="c73c93915f2fbaf9f4c2fe9eca9d3e59700d03670c05dea71d436005165ad04dfcc8d71422f101fbc2619dc93fd11cfe9a720575fcd5238e808c370886ae319dcc9173489dfebfc988d4317fca10c2f9609a7103b7670133eb98a5516cee7db4b5e945d80213cccb8ae48717949de1b462adb22cc2de7544ada36abb91f805f2b8d5e97f45da0025c48e338ce6b53ca38fff"], &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x41000, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x80) sendmsg$DEVLINK_CMD_SB_OCC_MAX_CLEAR(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f00000005c0)={&(0x7f00000004c0)={0xa8, 0x0, 0x800, 0x70bd27, 0x25dfdbff, {}, [{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0xb, 0xfffffff7}}, {@pci={{0x8}, {0x11}}, {0x8}}, {@pci={{0x8}, {0x11}}, {0x8, 0xb, 0xce95}}, {@pci={{0x8}, {0x11}}, {0x8, 0xb, 0xffffffff}}]}, 0xa8}}, 0x4000001) socket$igmp6(0xa, 0x3, 0x2) truncate(&(0x7f0000000400)='./file0\x00', 0x3) setpgid(0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000440)='./file0\x00', 0x40000, 0xfffffffffffffffe, 0x3, 0x0, &(0x7f0000000000)) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040), 0x42, 0x0) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000002140)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}}) 20:06:15 executing program 4: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x400000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) r1 = syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) r2 = add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r3 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f0000000d00)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=0xffffffffffffffff, @ANYBLOB="00000004000000002e2f62bb75f396a9a27e5e0176eac9506f8a91513129cbe76f93e58a74ce416adbfe800dd0ec81a75eeaa66209eb4d92afa3d6a3eebde7cfb85ce89cb564f1d3b5efb219cf8b5d37a271e7e163656925d1b6e5414087b711c6908cc623d609e7b2753bb6bbcbf510e4393da480ceefae5ff550974932ecb442a333dd8fa9cc6f26a0e45f63c36e4901ab2a827884973cbd71b80595c386661c9c9fc5df8b0f569dd413fa11189d8872604d82681b29bef4df4368bdea68b628a9b3d32f7ab8a1f03f69cb683265ddc5710b659080d0b999c46f81b426af64eb1b1b4238378c072c9b993c2b8d43cf53ee097aaa3b"]) perf_event_open(&(0x7f0000000880)={0x5, 0x80, 0x40, 0x7c, 0x20, 0xc6, 0x0, 0xfffffffffffffff7, 0x20428, 0x6, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x40, 0x4, @perf_config_ext={0xffffffff, 0x4}, 0x10000, 0x55dd, 0x7, 0x3, 0x1, 0x9ac, 0x6a, 0x0, 0x63, 0x0, 0x8001}, r0, 0xa, r4, 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r3) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r3) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400003, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb5, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) ioctl$BTRFS_IOC_QUOTA_RESCAN_STATUS(r1, 0x8040942d, &(0x7f0000000b40)) r5 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r5, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r6 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) r7 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000b80), 0x2, 0x0) write(r7, &(0x7f0000000bc0)="40e470887482237b1f431e10acc071d7e36e45dd841998beab3efbb468747d8dbb333477ff6d7e0b50dd0ed7e7a8392f662f50c4a9a687aacb4edb223f80c48df42d958c815cc79f2ad2d0d04d03daf0f4738e419aa1c9eaf2d50a9a705805d356ba45cd0568a972f712b327a8ebaf0be155a9a3aec7afcf66a4327e7263915228b2792f", 0x84) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r6, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x170, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r8 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, r2) keyctl$revoke(0x3, r8) add_key$user(&(0x7f0000000280), &(0x7f0000000600)={'syz', 0x1}, &(0x7f0000000640)="3d21f0a9279db9b5ff9e49752a55aec5a551ddbe24dde81f61784beb209751af28ab0653e7437dc885adc48b9082a78bd83d547e54939aeb38d31ede5a39aadc49cc790e9e9e321948ddb43d561e94466754761c630e63637e", 0x59, r2) openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000940), 0x404041, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000980)) r9 = timerfd_create(0x4, 0x800) ioctl(r9, 0x1, &(0x7f0000000c80)="21d5a7ddbbf3bddabc1b13008a14556c5f68fe67f930e3d5e116aeca6e5255d4535c084ee8aaa621fa01f9637ce0755877f60e98b6f2933de1c1f19faacddb8cebd782083526d5c452680c5827b599") 20:06:16 executing program 0: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x400000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) r1 = syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) r2 = add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r3 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f0000000d00)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=0xffffffffffffffff, @ANYBLOB="00000004000000002e2f62bb75f396a9a27e5e0176eac9506f8a91513129cbe76f93e58a74ce416adbfe800dd0ec81a75eeaa66209eb4d92afa3d6a3eebde7cfb85ce89cb564f1d3b5efb219cf8b5d37a271e7e163656925d1b6e5414087b711c6908cc623d609e7b2753bb6bbcbf510e4393da480ceefae5ff550974932ecb442a333dd8fa9cc6f26a0e45f63c36e4901ab2a827884973cbd71b80595c386661c9c9fc5df8b0f569dd413fa11189d8872604d82681b29bef4df4368bdea68b628a9b3d32f7ab8a1f03f69cb683265ddc5710b659080d0b999c46f81b426af64eb1b1b4238378c072c9b993c2b8d43cf53ee097aaa3b"]) perf_event_open(&(0x7f0000000880)={0x5, 0x80, 0x40, 0x7c, 0x20, 0xc6, 0x0, 0xfffffffffffffff7, 0x20428, 0x6, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x40, 0x4, @perf_config_ext={0xffffffff, 0x4}, 0x10000, 0x55dd, 0x7, 0x3, 0x1, 0x9ac, 0x6a, 0x0, 0x63, 0x0, 0x8001}, r0, 0xa, r4, 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r3) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r3) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400003, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb5, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) ioctl$BTRFS_IOC_QUOTA_RESCAN_STATUS(r1, 0x8040942d, &(0x7f0000000b40)) r5 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r5, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r6 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) r7 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000b80), 0x2, 0x0) write(r7, &(0x7f0000000bc0)="40e470887482237b1f431e10acc071d7e36e45dd841998beab3efbb468747d8dbb333477ff6d7e0b50dd0ed7e7a8392f662f50c4a9a687aacb4edb223f80c48df42d958c815cc79f2ad2d0d04d03daf0f4738e419aa1c9eaf2d50a9a705805d356ba45cd0568a972f712b327a8ebaf0be155a9a3aec7afcf66a4327e7263915228b2792f", 0x84) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r6, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x170, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r8 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, r2) keyctl$revoke(0x3, r8) add_key$user(&(0x7f0000000280), &(0x7f0000000600)={'syz', 0x1}, &(0x7f0000000640)="3d21f0a9279db9b5ff9e49752a55aec5a551ddbe24dde81f61784beb209751af28ab0653e7437dc885adc48b9082a78bd83d547e54939aeb38d31ede5a39aadc49cc790e9e9e321948ddb43d561e94466754761c630e63637e", 0x59, r2) openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000940), 0x404041, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000980)) r9 = timerfd_create(0x4, 0x800) ioctl(r9, 0x1, &(0x7f0000000c80)="21d5a7ddbbf3bddabc1b13008a14556c5f68fe67f930e3d5e116aeca6e5255d4535c084ee8aaa621fa01f9637ce0755877f60e98b6f2933de1c1f19faacddb8cebd782083526d5c452680c5827b599") 20:06:16 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000280), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r0, 0x8933, &(0x7f00000002c0)={'wpan0\x00', 0x0}) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_SET_BACKOFF_EXPONENT(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_MAX_BE={0x5}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r2}, @NL802154_ATTR_MIN_BE={0x5}]}, 0x2c}}, 0x0) 20:06:16 executing program 5: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000300)={{0x6, @rose}, [@null, @bcast, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @bcast]}, 0x48) sendto$netrom(r0, 0x0, 0x0, 0x0, &(0x7f0000000180)={{0x6, @rose}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default]}, 0x48) 20:06:16 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) sched_setaffinity(0x0, 0x8, &(0x7f0000000000)=0x5) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad413e850000000f00000095"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x18, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r3}, 0x10) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$TIPC_NL_NET_GET(r5, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000140)={0x0, 0x14}}, 0x0) getsockname$packet(r5, &(0x7f00000004c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000300)=0x14) r7 = socket$nl_route(0x10, 0x3, 0x0) r8 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r8, 0x8916, &(0x7f0000000100)={@dev={0xfe, 0x80, '\x00', 0x2}, 0x0, r9}) sendmsg$nl_route(r7, &(0x7f0000000440)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0xc0}, 0xc0c5) r10 = socket$nl_route(0x10, 0x3, 0x0) r11 = open(&(0x7f0000000800)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x14000, 0x88) socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), r11) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) sendmsg$nl_route(r10, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000005840)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000600)=ANY=[@ANYBLOB="780000002400518600"/20, @ANYRES32=r12, @ANYBLOB="00000000ffffffff0000000008000100736671"], 0x78}}, 0x0) sendmsg$nl_route(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newlink={0x40, 0x10, 0xffffff1f, 0x1, 0x0, {0x0, 0x0, 0x0, 0x0, 0xffffff81}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @wireguard={{0xe}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x40}}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000000)={0x8, 0x5, &(0x7f0000000640)=ANY=[@ANYBLOB="18000000000000000000000008cb040000000010e0ae68032dc506c43c6ed996701956499ccd691d6bfe98739d5604fe64bcbb46024554d3f7e979dfd5313cb8b35eeb88888530a28fae064fb600000000a9d85a35d158cb8b4d32ba3a06d3b2d297ea0900000000000000d9b6095e9ef9b0db33f2b453da1d6cadc9880900fe9be04163e190efb7093ae99d3547e8b79f9e4fb8326b9ee23a52a97907ebe50e7a5820360000000020745630caa8aad7f4d56e377d12abafa86f0f85f05d671e65ab73af", @ANYRES32, @ANYBLOB="000000000000000095000000000000"], &(0x7f00000001c0)='GPL\x00', 0x2, 0x8a, &(0x7f0000000200)=""/138, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 20:06:16 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f00009b1ffc)) r0 = syz_open_dev$ptys(0xc, 0x3, 0x1) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000100)=0x0) timer_settime(r1, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) timer_create(0x0, &(0x7f0000000140)={0x0, 0x23, 0x0, @tid=0xffffffffffffffff}, &(0x7f00000001c0)=0x0) clock_gettime(0x0, &(0x7f0000000200)={0x0, 0x0}) timer_settime(r3, 0x0, &(0x7f0000000240)={{r4, r5+60000000}, {0x77359400}}, &(0x7f0000000300)) clock_nanosleep(0x0, 0x0, &(0x7f0000000280)={0x0, r2+10000000}, &(0x7f00000002c0)) 20:06:17 executing program 2: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x400000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) r1 = syz_mount_image$xfs(&(0x7f00000002c0), &(0x7f0000000300)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) r2 = add_key$keyring(&(0x7f00000000c0), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r3 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f0000000d00)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=0xffffffffffffffff, @ANYBLOB="00000004000000002e2f62bb75f396a9a27e5e0176eac9506f8a91513129cbe76f93e58a74ce416adbfe800dd0ec81a75eeaa66209eb4d92afa3d6a3eebde7cfb85ce89cb564f1d3b5efb219cf8b5d37a271e7e163656925d1b6e5414087b711c6908cc623d609e7b2753bb6bbcbf510e4393da480ceefae5ff550974932ecb442a333dd8fa9cc6f26a0e45f63c36e4901ab2a827884973cbd71b80595c386661c9c9fc5df8b0f569dd413fa11189d8872604d82681b29bef4df4368bdea68b628a9b3d32f7ab8a1f03f69cb683265ddc5710b659080d0b999c46f81b426af64eb1b1b4238378c072c9b993c2b8d43cf53ee097aaa3b"]) perf_event_open(&(0x7f0000000880)={0x5, 0x80, 0x40, 0x7c, 0x20, 0xc6, 0x0, 0xfffffffffffffff7, 0x20428, 0x6, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x40, 0x4, @perf_config_ext={0xffffffff, 0x4}, 0x10000, 0x55dd, 0x7, 0x3, 0x1, 0x9ac, 0x6a, 0x0, 0x63, 0x0, 0x8001}, r0, 0xa, r4, 0x0) add_key(0x0, &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r3) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r3) pselect6(0x40, &(0x7f0000000200)={0x8, 0x3, 0x400003, 0x0, 0x2, 0x5, 0x0, 0x5}, &(0x7f0000000240)={0x203a, 0x0, 0x9, 0x1002, 0x80000000, 0x0, 0x3, 0x6}, &(0x7f00000005c0)={0x8001, 0x4, 0xb5, 0xffffffffffffff81, 0xb, 0x80f3, 0xde6, 0x102}, &(0x7f0000000340)={0x0, 0x3938700}, &(0x7f00000003c0)={&(0x7f0000000380)={[0xa]}, 0x8}) ioctl$BTRFS_IOC_QUOTA_RESCAN_STATUS(r1, 0x8040942d, &(0x7f0000000b40)) r5 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r5, &(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0) r6 = syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x100) r7 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000b80), 0x2, 0x0) write(r7, &(0x7f0000000bc0)="40e470887482237b1f431e10acc071d7e36e45dd841998beab3efbb468747d8dbb333477ff6d7e0b50dd0ed7e7a8392f662f50c4a9a687aacb4edb223f80c48df42d958c815cc79f2ad2d0d04d03daf0f4738e419aa1c9eaf2d50a9a705805d356ba45cd0568a972f712b327a8ebaf0be155a9a3aec7afcf66a4327e7263915228b2792f", 0x84) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r6, 0xc1105517, &(0x7f0000000400)={{0x1009, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x5, 0x170, 0x1, r0, 0x0, 0x0, 'syz0\x00', 0x0}) r8 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, r2) keyctl$revoke(0x3, r8) add_key$user(&(0x7f0000000280), &(0x7f0000000600)={'syz', 0x1}, &(0x7f0000000640)="3d21f0a9279db9b5ff9e49752a55aec5a551ddbe24dde81f61784beb209751af28ab0653e7437dc885adc48b9082a78bd83d547e54939aeb38d31ede5a39aadc49cc790e9e9e321948ddb43d561e94466754761c630e63637e", 0x59, r2) openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000940), 0x404041, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000980)) r9 = timerfd_create(0x4, 0x800) ioctl(r9, 0x1, &(0x7f0000000c80)="21d5a7ddbbf3bddabc1b13008a14556c5f68fe67f930e3d5e116aeca6e5255d4535c084ee8aaa621fa01f9637ce0755877f60e98b6f2933de1c1f19faacddb8cebd782083526d5c452680c5827b599") 20:06:17 executing program 1: creat(&(0x7f0000000f00)='./file0\x00', 0x0) mount(&(0x7f0000000000)=@nullb, &(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)='omfs\x00', 0x8100, 0x0) 20:06:17 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x9, &(0x7f0000000180)=0x7d, 0x4) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) connect$inet(r0, &(0x7f0000000280)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x4, &(0x7f0000000040)=0x9, 0x4) 20:06:17 executing program 4: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001ec0), 0x2, 0x0) ioctl$VHOST_SET_OWNER(r0, 0xaf01, 0x0) ioctl$VHOST_VDPA_GET_CONFIG(r0, 0x4008af24, &(0x7f0000000100)={0x0, 0x29, ""/41}) 20:06:17 executing program 3: ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, 0x0) r0 = openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$6lowpan_control(r0, &(0x7f0000000080)='connect aa:aa:aa:aa:aa:10 0', 0x1b) 20:06:17 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x9, &(0x7f0000000180)=0x7d, 0x4) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) connect$inet(r0, &(0x7f0000000280)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x4, &(0x7f0000000040)=0x9, 0x4) 20:06:18 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x9, &(0x7f0000000180)=0x7d, 0x4) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) connect$inet(r0, &(0x7f0000000280)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x4, &(0x7f0000000040)=0x9, 0x4) 20:06:18 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$TIPC_NL_MON_PEER_GET(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)={0x14, r1, 0x1, 0x0, 0x0, {0x12}}, 0x14}}, 0x0) 20:06:18 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x9, &(0x7f0000000180)=0x7d, 0x4) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) connect$inet(r0, &(0x7f0000000280)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x4, &(0x7f0000000040)=0x9, 0x4) 20:06:18 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x9, &(0x7f0000000180)=0x7d, 0x4) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) connect$inet(r0, &(0x7f0000000280)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x4, &(0x7f0000000040)=0x9, 0x4) 20:06:18 executing program 0: socket(0x0, 0x14, 0x0) 20:06:18 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f00009b1ffc)) r0 = syz_open_dev$ptys(0xc, 0x3, 0x1) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000100)=0x0) timer_settime(r1, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) timer_create(0x0, &(0x7f0000000140)={0x0, 0x23, 0x0, @tid=0xffffffffffffffff}, &(0x7f00000001c0)=0x0) clock_gettime(0x0, &(0x7f0000000200)={0x0, 0x0}) timer_settime(r3, 0x0, &(0x7f0000000240)={{r4, r5+60000000}, {0x77359400}}, &(0x7f0000000300)) clock_nanosleep(0x0, 0x0, &(0x7f0000000280)={0x0, r2+10000000}, &(0x7f00000002c0)) 20:06:18 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r0, 0x0, 0x0) 20:06:18 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x9, &(0x7f0000000180)=0x7d, 0x4) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) connect$inet(r0, &(0x7f0000000280)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x4, &(0x7f0000000040)=0x9, 0x4) 20:06:18 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x9, &(0x7f0000000180)=0x7d, 0x4) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) connect$inet(r0, &(0x7f0000000280)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x4, &(0x7f0000000040)=0x9, 0x4) 20:06:18 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='attr\x00') mknodat$null(r0, &(0x7f0000000180)='./file0\x00', 0x0, 0x103) 20:06:18 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f00009b1ffc)) r0 = syz_open_dev$ptys(0xc, 0x3, 0x1) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000100)=0x0) timer_settime(r1, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) timer_create(0x0, &(0x7f0000000140)={0x0, 0x23, 0x0, @tid=0xffffffffffffffff}, &(0x7f00000001c0)=0x0) clock_gettime(0x0, &(0x7f0000000200)={0x0, 0x0}) timer_settime(r3, 0x0, &(0x7f0000000240)={{r4, r5+60000000}, {0x77359400}}, &(0x7f0000000300)) clock_nanosleep(0x0, 0x0, &(0x7f0000000280)={0x0, r2+10000000}, &(0x7f00000002c0)) 20:06:18 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f00009b1ffc)) r0 = syz_open_dev$ptys(0xc, 0x3, 0x1) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000100)=0x0) timer_settime(r1, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) timer_create(0x0, &(0x7f0000000140)={0x0, 0x23, 0x0, @tid=0xffffffffffffffff}, &(0x7f00000001c0)=0x0) clock_gettime(0x0, &(0x7f0000000200)={0x0, 0x0}) timer_settime(r3, 0x0, &(0x7f0000000240)={{r4, r5+60000000}, {0x77359400}}, &(0x7f0000000300)) clock_nanosleep(0x0, 0x0, &(0x7f0000000280)={0x0, r2+10000000}, &(0x7f00000002c0)) 20:06:18 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f00009b1ffc)) r0 = syz_open_dev$ptys(0xc, 0x3, 0x1) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000100)=0x0) timer_settime(r1, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) timer_create(0x0, &(0x7f0000000140)={0x0, 0x23, 0x0, @tid=0xffffffffffffffff}, &(0x7f00000001c0)=0x0) clock_gettime(0x0, &(0x7f0000000200)={0x0, 0x0}) timer_settime(r3, 0x0, &(0x7f0000000240)={{r4, r5+60000000}, {0x77359400}}, &(0x7f0000000300)) clock_nanosleep(0x0, 0x0, &(0x7f0000000280)={0x0, r2+10000000}, &(0x7f00000002c0)) 20:06:18 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f00009b1ffc)) r0 = syz_open_dev$ptys(0xc, 0x3, 0x1) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000100)=0x0) timer_settime(r1, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) timer_create(0x0, &(0x7f0000000140)={0x0, 0x23, 0x0, @tid=0xffffffffffffffff}, &(0x7f00000001c0)=0x0) clock_gettime(0x0, &(0x7f0000000200)={0x0, 0x0}) timer_settime(r3, 0x0, &(0x7f0000000240)={{r4, r5+60000000}, {0x77359400}}, &(0x7f0000000300)) clock_nanosleep(0x0, 0x0, &(0x7f0000000280)={0x0, r2+10000000}, &(0x7f00000002c0)) 20:06:18 executing program 0: r0 = syz_open_dev$sndctrl(&(0x7f0000000640), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(r0, 0x40405514, 0x0) 20:06:18 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/arp\x00') preadv(r0, &(0x7f00000001c0)=[{&(0x7f0000000280)=""/24, 0x18}], 0x1, 0x4013d, 0x10) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0xef8cb75f7bbafc0a, 0x0, 0x1, 0x80, 0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x32}}, 0x14) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x1, 0x803, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) socket(0x1, 0x803, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000004c0)=ANY=[@ANYBLOB="4c000000520000012500000000dbdf25508de7ac381dff36c5e0ae0a080006000600150000e808000200000000000100000000800001ff070000000000000000000069a59afd1d23dfa30ddd8b93d9000000bb050bb6022bc633e783c92f82c8d0768d90f9a86db014a60029c3ff0f32fe155f7dc0d27ed840f0bd358bfb26154a78a168ca37851e73c96950733cdb8a088cfb961f9a76301ea25ac20eb7b4521a72095ab8b1736b0a3fc81a69c24099afa94ce3eb3d24c802e2a307a41857c5fc4b2b4511e79b0bd3fa490f5ee7008e172f4f6a6292df4aa99fbd31bb10de0abaddea4795ded9c59f559b4a3c", @ANYRES32=0x0, @ANYBLOB="e10700567e44e7e708ca67f370847ecf2898dfc811dc243651b8676202bbe8d8a5747d7dfc3ab46cd182f702d64316840400000000000fdf2bbcd328458f000008175b10250d29e1221034d57637ceb62fbf77e850669e7df919a5aedd488cc273dc87024c87f6237c0eb5c076338f82e838f033fad7fe6239692c84cddb3bcdbe8994fedfe32217838a4897167c3eb3031064d5cb1b65a0cbec62023dc4dfa91ea1b26760ff6fbe26643c00dd322add8e2853c28032a84c592b6099d33e5dedf4a8b48cd84a04f6200dda72e4e6665f75cc6c92a441252ab48909a85daf826dce06a778c230a3045c437b00000000"], 0x4c}, 0x1, 0x0, 0x0, 0x4004}, 0x40046) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000000100)={'sit0\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="00000000000029002000000009001156"]}) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_mr_vif\x00') preadv(r3, &(0x7f0000000200)=[{&(0x7f0000000100)=""/203, 0xcb}], 0x1, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000000880)={'batadv_slave_0\x00', 0x0}) sendmsg$nl_route(r3, &(0x7f0000000940)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)=@bridge_setlink={0x38, 0x13, 0x20, 0x70bd25, 0x25dfdbfc, {0x7, 0x0, 0x0, r4, 0x32902, 0x10}, [@IFLA_OPERSTATE={0x5, 0x10, 0x2}, @IFLA_MTU={0x8, 0x4, 0x20}, @IFLA_LINKMODE={0x5, 0x11, 0x98}]}, 0x38}, 0x1, 0x0, 0x0, 0x4011}, 0x40) r5 = socket$packet(0x11, 0x3, 0x300) r6 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_mr_vif\x00') preadv(r6, &(0x7f0000000200)=[{&(0x7f0000000100)=""/203, 0xcb}], 0x1, 0x1, 0x0) sendmsg$nl_route(r6, &(0x7f0000000800)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)=@ipv4_getrule={0x1c, 0x22, 0x2, 0x70bd2a, 0x25dfdbfb, {0x2, 0x10, 0x0, 0x3, 0x8, 0x0, 0x0, 0x2, 0x3}, [""]}, 0x1c}}, 0x4000080) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r7, 0x1, 0x3, 0x6, @random="df559fdab89a"}, 0x14) r8 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000440)={&(0x7f00000006c0)=ANY=[@ANYBLOB="0000001f0000d08dc98cc271a0bbc36bd4b9e27600020000000000008000000022df10e5a7000000000000e8b90000f1b9fd7fcb99b2ea6830555c098b0583ff7ff49416c3cb12e8dd702233c0091b551e46516ec27ea985eed869e73c5d12a230f24ff85e52f66882f7cd5195b7c70dbd308132881bbdb3f68f1a4e27407398481777427cac421e9eb92f303d51d5dcb456a1c0f9586fd8000000000000000000c583d82cc4b9264f13d18277a2bcd3c22fb91646820ce113c0ca13ab2c1148dcccbf9c683db06af3abd34e8abb1c4587b2883f", @ANYRES32=0x0, @ANYBLOB="0000020000000f00f5ff030008000b000600000008000b000000000008000b00ff03000008000b0008000000"], 0x44}}, 0x10) r9 = socket(0x1, 0x803, 0x0) getsockname$packet(r9, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) socket(0x1, 0x803, 0x0) sendmsg$nl_route(r8, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000002c0)=@newlink={0x94, 0x10, 0x401, 0x0, 0x45d38, {0x0, 0x0, 0x0, 0x0, 0xfec94d44}, [@IFLA_LINKINFO={0x64, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x54, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0x48, 0x2, {0x2, 0x1b}}, @IFLA_VLAN_INGRESS_QOS={0x4}, @IFLA_VLAN_EGRESS_QOS={0x1c, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0xe368, 0x3}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x7f, 0x7}}]}, @IFLA_VLAN_INGRESS_QOS={0x1c, 0x4, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xb, 0x1, {0x2, 0x6d560}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x0, 0x2}}]}]}}}, @IFLA_LINK={0x8, 0x5, r10}, @IFLA_MASTER={0x8}]}, 0x94}}, 0x40046) 20:06:18 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/arp\x00') preadv(r0, &(0x7f00000001c0)=[{&(0x7f0000000280)=""/24, 0x18}], 0x1, 0x4013d, 0x10) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0xef8cb75f7bbafc0a, 0x0, 0x1, 0x80, 0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x32}}, 0x14) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x1, 0x803, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) socket(0x1, 0x803, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000004c0)=ANY=[@ANYBLOB="4c000000520000012500000000dbdf25508de7ac381dff36c5e0ae0a080006000600150000e808000200000000000100000000800001ff070000000000000000000069a59afd1d23dfa30ddd8b93d9000000bb050bb6022bc633e783c92f82c8d0768d90f9a86db014a60029c3ff0f32fe155f7dc0d27ed840f0bd358bfb26154a78a168ca37851e73c96950733cdb8a088cfb961f9a76301ea25ac20eb7b4521a72095ab8b1736b0a3fc81a69c24099afa94ce3eb3d24c802e2a307a41857c5fc4b2b4511e79b0bd3fa490f5ee7008e172f4f6a6292df4aa99fbd31bb10de0abaddea4795ded9c59f559b4a3c", @ANYRES32=0x0, @ANYBLOB="e10700567e44e7e708ca67f370847ecf2898dfc811dc243651b8676202bbe8d8a5747d7dfc3ab46cd182f702d64316840400000000000fdf2bbcd328458f000008175b10250d29e1221034d57637ceb62fbf77e850669e7df919a5aedd488cc273dc87024c87f6237c0eb5c076338f82e838f033fad7fe6239692c84cddb3bcdbe8994fedfe32217838a4897167c3eb3031064d5cb1b65a0cbec62023dc4dfa91ea1b26760ff6fbe26643c00dd322add8e2853c28032a84c592b6099d33e5dedf4a8b48cd84a04f6200dda72e4e6665f75cc6c92a441252ab48909a85daf826dce06a778c230a3045c437b00000000"], 0x4c}, 0x1, 0x0, 0x0, 0x4004}, 0x40046) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000000100)={'sit0\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="00000000000029002000000009001156"]}) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_mr_vif\x00') preadv(r3, &(0x7f0000000200)=[{&(0x7f0000000100)=""/203, 0xcb}], 0x1, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000000880)={'batadv_slave_0\x00', 0x0}) sendmsg$nl_route(r3, &(0x7f0000000940)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)=@bridge_setlink={0x38, 0x13, 0x20, 0x70bd25, 0x25dfdbfc, {0x7, 0x0, 0x0, r4, 0x32902, 0x10}, [@IFLA_OPERSTATE={0x5, 0x10, 0x2}, @IFLA_MTU={0x8, 0x4, 0x20}, @IFLA_LINKMODE={0x5, 0x11, 0x98}]}, 0x38}, 0x1, 0x0, 0x0, 0x4011}, 0x40) r5 = socket$packet(0x11, 0x3, 0x300) r6 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_mr_vif\x00') preadv(r6, &(0x7f0000000200)=[{&(0x7f0000000100)=""/203, 0xcb}], 0x1, 0x1, 0x0) sendmsg$nl_route(r6, &(0x7f0000000800)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)=@ipv4_getrule={0x1c, 0x22, 0x2, 0x70bd2a, 0x25dfdbfb, {0x2, 0x10, 0x0, 0x3, 0x8, 0x0, 0x0, 0x2, 0x3}, [""]}, 0x1c}}, 0x4000080) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r7, 0x1, 0x3, 0x6, @random="df559fdab89a"}, 0x14) r8 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000440)={&(0x7f00000006c0)=ANY=[@ANYBLOB="0000001f0000d08dc98cc271a0bbc36bd4b9e27600020000000000008000000022df10e5a7000000000000e8b90000f1b9fd7fcb99b2ea6830555c098b0583ff7ff49416c3cb12e8dd702233c0091b551e46516ec27ea985eed869e73c5d12a230f24ff85e52f66882f7cd5195b7c70dbd308132881bbdb3f68f1a4e27407398481777427cac421e9eb92f303d51d5dcb456a1c0f9586fd8000000000000000000c583d82cc4b9264f13d18277a2bcd3c22fb91646820ce113c0ca13ab2c1148dcccbf9c683db06af3abd34e8abb1c4587b2883f", @ANYRES32=0x0, @ANYBLOB="0000020000000f00f5ff030008000b000600000008000b000000000008000b00ff03000008000b0008000000"], 0x44}}, 0x10) r9 = socket(0x1, 0x803, 0x0) getsockname$packet(r9, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) socket(0x1, 0x803, 0x0) sendmsg$nl_route(r8, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000002c0)=@newlink={0x94, 0x10, 0x401, 0x0, 0x45d38, {0x0, 0x0, 0x0, 0x0, 0xfec94d44}, [@IFLA_LINKINFO={0x64, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x54, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0x48, 0x2, {0x2, 0x1b}}, @IFLA_VLAN_INGRESS_QOS={0x4}, @IFLA_VLAN_EGRESS_QOS={0x1c, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0xe368, 0x3}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x7f, 0x7}}]}, @IFLA_VLAN_INGRESS_QOS={0x1c, 0x4, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xb, 0x1, {0x2, 0x6d560}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x0, 0x2}}]}]}}}, @IFLA_LINK={0x8, 0x5, r10}, @IFLA_MASTER={0x8}]}, 0x94}}, 0x40046) 20:06:18 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f00009b1ffc)) r0 = syz_open_dev$ptys(0xc, 0x3, 0x1) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000100)=0x0) timer_settime(r1, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) timer_create(0x0, &(0x7f0000000140)={0x0, 0x23, 0x0, @tid=0xffffffffffffffff}, &(0x7f00000001c0)=0x0) clock_gettime(0x0, &(0x7f0000000200)={0x0, 0x0}) timer_settime(r3, 0x0, &(0x7f0000000240)={{r4, r5+60000000}, {0x77359400}}, &(0x7f0000000300)) clock_nanosleep(0x0, 0x0, &(0x7f0000000280)={0x0, r2+10000000}, &(0x7f00000002c0)) 20:06:18 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/arp\x00') preadv(r0, &(0x7f00000001c0)=[{&(0x7f0000000280)=""/24, 0x18}], 0x1, 0x4013d, 0x10) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0xef8cb75f7bbafc0a, 0x0, 0x1, 0x80, 0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x32}}, 0x14) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x1, 0x803, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) socket(0x1, 0x803, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000004c0)=ANY=[@ANYBLOB="4c000000520000012500000000dbdf25508de7ac381dff36c5e0ae0a080006000600150000e808000200000000000100000000800001ff070000000000000000000069a59afd1d23dfa30ddd8b93d9000000bb050bb6022bc633e783c92f82c8d0768d90f9a86db014a60029c3ff0f32fe155f7dc0d27ed840f0bd358bfb26154a78a168ca37851e73c96950733cdb8a088cfb961f9a76301ea25ac20eb7b4521a72095ab8b1736b0a3fc81a69c24099afa94ce3eb3d24c802e2a307a41857c5fc4b2b4511e79b0bd3fa490f5ee7008e172f4f6a6292df4aa99fbd31bb10de0abaddea4795ded9c59f559b4a3c", @ANYRES32=0x0, @ANYBLOB="e10700567e44e7e708ca67f370847ecf2898dfc811dc243651b8676202bbe8d8a5747d7dfc3ab46cd182f702d64316840400000000000fdf2bbcd328458f000008175b10250d29e1221034d57637ceb62fbf77e850669e7df919a5aedd488cc273dc87024c87f6237c0eb5c076338f82e838f033fad7fe6239692c84cddb3bcdbe8994fedfe32217838a4897167c3eb3031064d5cb1b65a0cbec62023dc4dfa91ea1b26760ff6fbe26643c00dd322add8e2853c28032a84c592b6099d33e5dedf4a8b48cd84a04f6200dda72e4e6665f75cc6c92a441252ab48909a85daf826dce06a778c230a3045c437b00000000"], 0x4c}, 0x1, 0x0, 0x0, 0x4004}, 0x40046) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000000100)={'sit0\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="00000000000029002000000009001156"]}) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_mr_vif\x00') preadv(r3, &(0x7f0000000200)=[{&(0x7f0000000100)=""/203, 0xcb}], 0x1, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000000880)={'batadv_slave_0\x00', 0x0}) sendmsg$nl_route(r3, &(0x7f0000000940)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)=@bridge_setlink={0x38, 0x13, 0x20, 0x70bd25, 0x25dfdbfc, {0x7, 0x0, 0x0, r4, 0x32902, 0x10}, [@IFLA_OPERSTATE={0x5, 0x10, 0x2}, @IFLA_MTU={0x8, 0x4, 0x20}, @IFLA_LINKMODE={0x5, 0x11, 0x98}]}, 0x38}, 0x1, 0x0, 0x0, 0x4011}, 0x40) r5 = socket$packet(0x11, 0x3, 0x300) r6 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_mr_vif\x00') preadv(r6, &(0x7f0000000200)=[{&(0x7f0000000100)=""/203, 0xcb}], 0x1, 0x1, 0x0) sendmsg$nl_route(r6, &(0x7f0000000800)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)=@ipv4_getrule={0x1c, 0x22, 0x2, 0x70bd2a, 0x25dfdbfb, {0x2, 0x10, 0x0, 0x3, 0x8, 0x0, 0x0, 0x2, 0x3}, [""]}, 0x1c}}, 0x4000080) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r7, 0x1, 0x3, 0x6, @random="df559fdab89a"}, 0x14) r8 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000440)={&(0x7f00000006c0)=ANY=[@ANYBLOB="0000001f0000d08dc98cc271a0bbc36bd4b9e27600020000000000008000000022df10e5a7000000000000e8b90000f1b9fd7fcb99b2ea6830555c098b0583ff7ff49416c3cb12e8dd702233c0091b551e46516ec27ea985eed869e73c5d12a230f24ff85e52f66882f7cd5195b7c70dbd308132881bbdb3f68f1a4e27407398481777427cac421e9eb92f303d51d5dcb456a1c0f9586fd8000000000000000000c583d82cc4b9264f13d18277a2bcd3c22fb91646820ce113c0ca13ab2c1148dcccbf9c683db06af3abd34e8abb1c4587b2883f", @ANYRES32=0x0, @ANYBLOB="0000020000000f00f5ff030008000b000600000008000b000000000008000b00ff03000008000b0008000000"], 0x44}}, 0x10) r9 = socket(0x1, 0x803, 0x0) getsockname$packet(r9, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) socket(0x1, 0x803, 0x0) sendmsg$nl_route(r8, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000002c0)=@newlink={0x94, 0x10, 0x401, 0x0, 0x45d38, {0x0, 0x0, 0x0, 0x0, 0xfec94d44}, [@IFLA_LINKINFO={0x64, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x54, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0x48, 0x2, {0x2, 0x1b}}, @IFLA_VLAN_INGRESS_QOS={0x4}, @IFLA_VLAN_EGRESS_QOS={0x1c, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0xe368, 0x3}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x7f, 0x7}}]}, @IFLA_VLAN_INGRESS_QOS={0x1c, 0x4, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xb, 0x1, {0x2, 0x6d560}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x0, 0x2}}]}]}}}, @IFLA_LINK={0x8, 0x5, r10}, @IFLA_MASTER={0x8}]}, 0x94}}, 0x40046) 20:06:18 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/arp\x00') preadv(r0, &(0x7f00000001c0)=[{&(0x7f0000000280)=""/24, 0x18}], 0x1, 0x4013d, 0x10) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0xef8cb75f7bbafc0a, 0x0, 0x1, 0x80, 0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x32}}, 0x14) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x1, 0x803, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) socket(0x1, 0x803, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000004c0)=ANY=[@ANYBLOB="4c000000520000012500000000dbdf25508de7ac381dff36c5e0ae0a080006000600150000e808000200000000000100000000800001ff070000000000000000000069a59afd1d23dfa30ddd8b93d9000000bb050bb6022bc633e783c92f82c8d0768d90f9a86db014a60029c3ff0f32fe155f7dc0d27ed840f0bd358bfb26154a78a168ca37851e73c96950733cdb8a088cfb961f9a76301ea25ac20eb7b4521a72095ab8b1736b0a3fc81a69c24099afa94ce3eb3d24c802e2a307a41857c5fc4b2b4511e79b0bd3fa490f5ee7008e172f4f6a6292df4aa99fbd31bb10de0abaddea4795ded9c59f559b4a3c", @ANYRES32=0x0, @ANYBLOB="e10700567e44e7e708ca67f370847ecf2898dfc811dc243651b8676202bbe8d8a5747d7dfc3ab46cd182f702d64316840400000000000fdf2bbcd328458f000008175b10250d29e1221034d57637ceb62fbf77e850669e7df919a5aedd488cc273dc87024c87f6237c0eb5c076338f82e838f033fad7fe6239692c84cddb3bcdbe8994fedfe32217838a4897167c3eb3031064d5cb1b65a0cbec62023dc4dfa91ea1b26760ff6fbe26643c00dd322add8e2853c28032a84c592b6099d33e5dedf4a8b48cd84a04f6200dda72e4e6665f75cc6c92a441252ab48909a85daf826dce06a778c230a3045c437b00000000"], 0x4c}, 0x1, 0x0, 0x0, 0x4004}, 0x40046) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000000100)={'sit0\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="00000000000029002000000009001156"]}) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_mr_vif\x00') preadv(r3, &(0x7f0000000200)=[{&(0x7f0000000100)=""/203, 0xcb}], 0x1, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000000880)={'batadv_slave_0\x00', 0x0}) sendmsg$nl_route(r3, &(0x7f0000000940)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)=@bridge_setlink={0x38, 0x13, 0x20, 0x70bd25, 0x25dfdbfc, {0x7, 0x0, 0x0, r4, 0x32902, 0x10}, [@IFLA_OPERSTATE={0x5, 0x10, 0x2}, @IFLA_MTU={0x8, 0x4, 0x20}, @IFLA_LINKMODE={0x5, 0x11, 0x98}]}, 0x38}, 0x1, 0x0, 0x0, 0x4011}, 0x40) r5 = socket$packet(0x11, 0x3, 0x300) r6 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_mr_vif\x00') preadv(r6, &(0x7f0000000200)=[{&(0x7f0000000100)=""/203, 0xcb}], 0x1, 0x1, 0x0) sendmsg$nl_route(r6, &(0x7f0000000800)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)=@ipv4_getrule={0x1c, 0x22, 0x2, 0x70bd2a, 0x25dfdbfb, {0x2, 0x10, 0x0, 0x3, 0x8, 0x0, 0x0, 0x2, 0x3}, [""]}, 0x1c}}, 0x4000080) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r7, 0x1, 0x3, 0x6, @random="df559fdab89a"}, 0x14) r8 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000440)={&(0x7f00000006c0)=ANY=[@ANYBLOB="0000001f0000d08dc98cc271a0bbc36bd4b9e27600020000000000008000000022df10e5a7000000000000e8b90000f1b9fd7fcb99b2ea6830555c098b0583ff7ff49416c3cb12e8dd702233c0091b551e46516ec27ea985eed869e73c5d12a230f24ff85e52f66882f7cd5195b7c70dbd308132881bbdb3f68f1a4e27407398481777427cac421e9eb92f303d51d5dcb456a1c0f9586fd8000000000000000000c583d82cc4b9264f13d18277a2bcd3c22fb91646820ce113c0ca13ab2c1148dcccbf9c683db06af3abd34e8abb1c4587b2883f", @ANYRES32=0x0, @ANYBLOB="0000020000000f00f5ff030008000b000600000008000b000000000008000b00ff03000008000b0008000000"], 0x44}}, 0x10) r9 = socket(0x1, 0x803, 0x0) getsockname$packet(r9, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) socket(0x1, 0x803, 0x0) sendmsg$nl_route(r8, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000002c0)=@newlink={0x94, 0x10, 0x401, 0x0, 0x45d38, {0x0, 0x0, 0x0, 0x0, 0xfec94d44}, [@IFLA_LINKINFO={0x64, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x54, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0x48, 0x2, {0x2, 0x1b}}, @IFLA_VLAN_INGRESS_QOS={0x4}, @IFLA_VLAN_EGRESS_QOS={0x1c, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0xe368, 0x3}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x7f, 0x7}}]}, @IFLA_VLAN_INGRESS_QOS={0x1c, 0x4, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xb, 0x1, {0x2, 0x6d560}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x0, 0x2}}]}]}}}, @IFLA_LINK={0x8, 0x5, r10}, @IFLA_MASTER={0x8}]}, 0x94}}, 0x40046) 20:06:18 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000002c40), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r0, 0x8933, &(0x7f0000000040)={'wpan1\x00', 0x0}) sendmsg$NL802154_CMD_SET_CHANNEL(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000002d80)={&(0x7f0000000080)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_PAGE={0x5}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r2}, @NL802154_ATTR_CHANNEL={0x5}]}, 0x2c}}, 0x0) 20:06:18 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000002c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000000)="7339850f132b71adb9a86295be8088ecd0", 0x11}], 0x1, &(0x7f0000000080)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f00000005c0)=[{{0x0, 0xf000000, &(0x7f0000000500)=[{&(0x7f0000001800)=""/4096, 0xf0}], 0x5, 0x0, 0x200000000000600, 0x7000000}}], 0x1, 0x0, 0x0) 20:06:19 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f00009b1ffc)) r0 = syz_open_dev$ptys(0xc, 0x3, 0x1) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000100)=0x0) timer_settime(r1, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) timer_create(0x0, &(0x7f0000000140)={0x0, 0x23, 0x0, @tid=0xffffffffffffffff}, &(0x7f00000001c0)=0x0) clock_gettime(0x0, &(0x7f0000000200)={0x0, 0x0}) timer_settime(r3, 0x0, &(0x7f0000000240)={{r4, r5+60000000}, {0x77359400}}, &(0x7f0000000300)) clock_nanosleep(0x0, 0x0, &(0x7f0000000280)={0x0, r2+10000000}, &(0x7f00000002c0)) 20:06:19 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f00009b1ffc)) r0 = syz_open_dev$ptys(0xc, 0x3, 0x1) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000100)=0x0) timer_settime(r1, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) timer_create(0x0, &(0x7f0000000140)={0x0, 0x23, 0x0, @tid=0xffffffffffffffff}, &(0x7f00000001c0)=0x0) clock_gettime(0x0, &(0x7f0000000200)={0x0, 0x0}) timer_settime(r3, 0x0, &(0x7f0000000240)={{r4, r5+60000000}, {0x77359400}}, &(0x7f0000000300)) clock_nanosleep(0x0, 0x0, &(0x7f0000000280)={0x0, r2+10000000}, &(0x7f00000002c0)) 20:06:19 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000002c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000000)="7339850f132b71adb9a86295be8088ecd0", 0x11}], 0x1, &(0x7f0000000080)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f00000005c0)=[{{0x0, 0xf000000, &(0x7f0000000500)=[{&(0x7f0000001800)=""/4096, 0xf0}], 0x5, 0x0, 0x200000000000600, 0x7000000}}], 0x1, 0x0, 0x0) 20:06:19 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f00009b1ffc)) r0 = syz_open_dev$ptys(0xc, 0x3, 0x1) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000100)=0x0) timer_settime(r1, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) timer_create(0x0, &(0x7f0000000140)={0x0, 0x23, 0x0, @tid=0xffffffffffffffff}, &(0x7f00000001c0)=0x0) clock_gettime(0x0, &(0x7f0000000200)={0x0, 0x0}) timer_settime(r3, 0x0, &(0x7f0000000240)={{r4, r5+60000000}, {0x77359400}}, &(0x7f0000000300)) clock_nanosleep(0x0, 0x0, &(0x7f0000000280)={0x0, r2+10000000}, &(0x7f00000002c0)) 20:06:19 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f00009b1ffc)) r0 = syz_open_dev$ptys(0xc, 0x3, 0x1) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000100)=0x0) timer_settime(r1, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) timer_create(0x0, &(0x7f0000000140)={0x0, 0x23, 0x0, @tid=0xffffffffffffffff}, &(0x7f00000001c0)=0x0) clock_gettime(0x0, &(0x7f0000000200)={0x0, 0x0}) timer_settime(r3, 0x0, &(0x7f0000000240)={{r4, r5+60000000}, {0x77359400}}, &(0x7f0000000300)) clock_nanosleep(0x0, 0x0, &(0x7f0000000280)={0x0, r2+10000000}, &(0x7f00000002c0)) 20:06:19 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000002c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000000)="7339850f132b71adb9a86295be8088ecd0", 0x11}], 0x1, &(0x7f0000000080)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f00000005c0)=[{{0x0, 0xf000000, &(0x7f0000000500)=[{&(0x7f0000001800)=""/4096, 0xf0}], 0x5, 0x0, 0x200000000000600, 0x7000000}}], 0x1, 0x0, 0x0) 20:06:19 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f00009b1ffc)) r0 = syz_open_dev$ptys(0xc, 0x3, 0x1) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000100)=0x0) timer_settime(r1, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) timer_create(0x0, &(0x7f0000000140)={0x0, 0x23, 0x0, @tid=0xffffffffffffffff}, &(0x7f00000001c0)=0x0) clock_gettime(0x0, &(0x7f0000000200)={0x0, 0x0}) timer_settime(r3, 0x0, &(0x7f0000000240)={{r4, r5+60000000}, {0x77359400}}, &(0x7f0000000300)) clock_nanosleep(0x0, 0x0, &(0x7f0000000280)={0x0, r2+10000000}, &(0x7f00000002c0)) 20:06:19 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f00009b1ffc)) r0 = syz_open_dev$ptys(0xc, 0x3, 0x1) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000100)=0x0) timer_settime(r1, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) timer_create(0x0, &(0x7f0000000140)={0x0, 0x23, 0x0, @tid=0xffffffffffffffff}, &(0x7f00000001c0)=0x0) clock_gettime(0x0, &(0x7f0000000200)={0x0, 0x0}) timer_settime(r3, 0x0, &(0x7f0000000240)={{r4, r5+60000000}, {0x77359400}}, &(0x7f0000000300)) clock_nanosleep(0x0, 0x0, &(0x7f0000000280)={0x0, r2+10000000}, &(0x7f00000002c0)) 20:06:19 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000002c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000000)="7339850f132b71adb9a86295be8088ecd0", 0x11}], 0x1, &(0x7f0000000080)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f00000005c0)=[{{0x0, 0xf000000, &(0x7f0000000500)=[{&(0x7f0000001800)=""/4096, 0xf0}], 0x5, 0x0, 0x200000000000600, 0x7000000}}], 0x1, 0x0, 0x0) 20:06:19 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f00009b1ffc)) r0 = syz_open_dev$ptys(0xc, 0x3, 0x1) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000100)=0x0) timer_settime(r1, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) timer_create(0x0, &(0x7f0000000140)={0x0, 0x23, 0x0, @tid=0xffffffffffffffff}, &(0x7f00000001c0)=0x0) clock_gettime(0x0, &(0x7f0000000200)={0x0, 0x0}) timer_settime(r3, 0x0, &(0x7f0000000240)={{r4, r5+60000000}, {0x77359400}}, &(0x7f0000000300)) clock_nanosleep(0x0, 0x0, &(0x7f0000000280)={0x0, r2+10000000}, &(0x7f00000002c0)) 20:06:19 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f00009b1ffc)) r0 = syz_open_dev$ptys(0xc, 0x3, 0x1) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000100)=0x0) timer_settime(r1, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) timer_create(0x0, &(0x7f0000000140)={0x0, 0x23, 0x0, @tid=0xffffffffffffffff}, &(0x7f00000001c0)=0x0) clock_gettime(0x0, &(0x7f0000000200)={0x0, 0x0}) timer_settime(r3, 0x0, &(0x7f0000000240)={{r4, r5+60000000}, {0x77359400}}, &(0x7f0000000300)) clock_nanosleep(0x0, 0x0, &(0x7f0000000280)={0x0, r2+10000000}, &(0x7f00000002c0)) 20:06:19 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000002c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000000)="7339850f132b71adb9a86295be8088ecd0", 0x11}], 0x1, &(0x7f0000000080)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f00000005c0)=[{{0x0, 0xf000000, &(0x7f0000000500)=[{&(0x7f0000001800)=""/4096, 0xf0}], 0x5, 0x0, 0x200000000000600, 0x7000000}}], 0x1, 0x0, 0x0) 20:06:19 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f00009b1ffc)) r0 = syz_open_dev$ptys(0xc, 0x3, 0x1) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000100)=0x0) timer_settime(r1, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) timer_create(0x0, &(0x7f0000000140)={0x0, 0x23, 0x0, @tid=0xffffffffffffffff}, &(0x7f00000001c0)=0x0) clock_gettime(0x0, &(0x7f0000000200)={0x0, 0x0}) timer_settime(r3, 0x0, &(0x7f0000000240)={{r4, r5+60000000}, {0x77359400}}, &(0x7f0000000300)) clock_nanosleep(0x0, 0x0, &(0x7f0000000280)={0x0, r2+10000000}, &(0x7f00000002c0)) 20:06:19 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000580)=@ipv4_newroute={0x38, 0x18, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x2}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @LWTUNNEL_IP_OPTS={0x10, 0x4, 0x0, 0x1, @LWTUNNEL_IP_OPTS_VXLAN={0xc, 0x2, 0x0, 0x1, @LWTUNNEL_IP_OPT_VXLAN_GBP={0x8}}}}]}, 0x38}}, 0x0) 20:06:19 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000002c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000000)="7339850f132b71adb9a86295be8088ecd0", 0x11}], 0x1, &(0x7f0000000080)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f00000005c0)=[{{0x0, 0xf000000, &(0x7f0000000500)=[{&(0x7f0000001800)=""/4096, 0xf0}], 0x5, 0x0, 0x200000000000600, 0x7000000}}], 0x1, 0x0, 0x0) 20:06:19 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000580)=@ipv4_newroute={0x38, 0x18, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x2}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @LWTUNNEL_IP_OPTS={0x10, 0x4, 0x0, 0x1, @LWTUNNEL_IP_OPTS_VXLAN={0xc, 0x2, 0x0, 0x1, @LWTUNNEL_IP_OPT_VXLAN_GBP={0x8}}}}]}, 0x38}}, 0x0) 20:06:19 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000002c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000000)="7339850f132b71adb9a86295be8088ecd0", 0x11}], 0x1, &(0x7f0000000080)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f00000005c0)=[{{0x0, 0xf000000, &(0x7f0000000500)=[{&(0x7f0000001800)=""/4096, 0xf0}], 0x5, 0x0, 0x200000000000600, 0x7000000}}], 0x1, 0x0, 0x0) 20:06:19 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000580)=@ipv4_newroute={0x38, 0x18, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x2}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @LWTUNNEL_IP_OPTS={0x10, 0x4, 0x0, 0x1, @LWTUNNEL_IP_OPTS_VXLAN={0xc, 0x2, 0x0, 0x1, @LWTUNNEL_IP_OPT_VXLAN_GBP={0x8}}}}]}, 0x38}}, 0x0) 20:06:20 executing program 1: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000c00), 0x2, 0x0) ioctl$IOCTL_VMCI_QUEUEPAIR_DETACH(r0, 0x7aa, 0x0) 20:06:20 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000580)=@ipv4_newroute={0x38, 0x18, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x2}, @RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @LWTUNNEL_IP_OPTS={0x10, 0x4, 0x0, 0x1, @LWTUNNEL_IP_OPTS_VXLAN={0xc, 0x2, 0x0, 0x1, @LWTUNNEL_IP_OPT_VXLAN_GBP={0x8}}}}]}, 0x38}}, 0x0) 20:06:20 executing program 1: syz_init_net_socket$x25(0x9, 0x5, 0x0) mq_open(0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbfs(&(0x7f0000000180), 0x77, 0x1) ioctl$USBDEVFS_IOCTL(r0, 0x80045505, &(0x7f0000000040)=@usbdevfs_connect) r1 = open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r1, 0x0, 0x8400ffdffffa) r2 = syz_open_dev$dri(&(0x7f0000000140), 0x0, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r3, 0x0, 0x40, &(0x7f0000000000)=@nat={'nat\x00', 0x62, 0x5, 0x410, 0x2d0, 0x2d0, 0xffffffff, 0x2d0, 0x0, 0x378, 0x378, 0xffffffff, 0x378, 0x378, 0x4, 0x0, {[{{@uncond, 0x0, 0xc0, 0x120, 0x0, {}, [@common=@unspec=@connlabel={{0x28}, {0x87}}, @common=@ttl={{0x28}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @dev}}}, {{@uncond, 0x0, 0x98, 0xe0, 0x0, {}, [@common=@icmp={{0x28}, {0x0, "08bb"}}]}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x0, @ipv4, @ipv4=@multicast2, @gre_key, @gre_key}}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @broadcast}}}, {{@uncond, 0x0, 0x70, 0xa8}, @DNAT0={0x38, 'DNAT\x00', 0x0, {0x1, {0x0, @remote, @private, @port, @icmp_id}}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x470) ioctl$FS_IOC_SETVERSION(r3, 0x40087602, &(0x7f00000004c0)) ioctl$DRM_IOCTL_MODE_ADDFB2(r2, 0xc06864b8, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x2}) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) r4 = syz_open_dev$usbfs(&(0x7f0000000180), 0x77, 0x1) ioctl$USBDEVFS_IOCTL(r4, 0xc0105512, &(0x7f0000000380)) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xf9, 0xfc, 0x0, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_bp={0x0}, 0x84050, 0xffffffffffffffff}, 0x0, 0x6, 0xffffffffffffffff, 0x0) r5 = syz_open_dev$usbfs(&(0x7f0000000180), 0x77, 0x1) ioctl$USBDEVFS_IOCTL(r5, 0x80045505, &(0x7f0000000040)=@usbdevfs_connect={0x1, 0x5517, 0x1000000}) dup(0xffffffffffffffff) r6 = getpid() sched_setscheduler(r6, 0x0, &(0x7f0000000280)=0x7) sched_setscheduler(r6, 0x2, &(0x7f0000000200)=0x4) 20:06:20 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$IPSET_CMD_LIST(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000580)={0x0, 0x14}}, 0x0) getsockname$packet(r3, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000002c0)=@newqdisc={0x4c, 0x24, 0xf1d, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xfff1, 0xffff}}, [@qdisc_kind_options=@q_netem={{0xa}, {0x1c}}]}, 0x4c}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000005c0)=@delchain={0x64, 0x24, 0xd39, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {0x0, 0xffff}}, [@filter_kind_options=@f_bpf={{0x8, 0x2}, {0x38, 0x2, [@TCA_BPF_ACT={0x34, 0x1, [@m_vlan={0x30, 0x0, 0x0, 0x0, {{0x9}, {0x4}, {0x4}, {0xc}, {0xc}}}]}]}}]}, 0x64}}, 0x0) 20:06:20 executing program 4: r0 = openat$cgroup(0xffffffffffffffff, &(0x7f00000002c0)='syz1\x00', 0x200002, 0x0) bpf$ITER_CREATE(0xb, &(0x7f0000000000), 0x8) perf_event_open$cgroup(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x4, @perf_config_ext={0x2, 0xffffffffa021c0f6}, 0x12100, 0x7, 0x80000000, 0x84a6f5a6df313ae5, 0xffffffffffffffd9, 0x0, 0x8, 0x0, 0x1}, r0, 0x4, 0xffffffffffffffff, 0x0) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000001540), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x4a}) perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0xd8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0), 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000100)={'nicvf0\x00', 0x2}) 20:06:20 executing program 2: syz_mount_image$f2fs(&(0x7f00000000c0), &(0x7f0000010280)='./bus\x00', 0x10, &(0x7f0000007f80)=ANY=[], 0x1, 0x7e64, &(0x7f0000000100)="$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") r0 = open(&(0x7f0000000000)='./bus\x00', 0x60142, 0x0) r1 = open(&(0x7f0000007f80)='./bus\x00', 0x0, 0x0) ioctl$F2FS_IOC_START_ATOMIC_WRITE(r0, 0xf501, 0x0) ioctl$F2FS_IOC_ABORT_ATOMIC_WRITE(r1, 0xf505, 0x0) 20:06:20 executing program 1: syz_init_net_socket$x25(0x9, 0x5, 0x0) mq_open(0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbfs(&(0x7f0000000180), 0x77, 0x1) ioctl$USBDEVFS_IOCTL(r0, 0x80045505, &(0x7f0000000040)=@usbdevfs_connect) r1 = open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r1, 0x0, 0x8400ffdffffa) r2 = syz_open_dev$dri(&(0x7f0000000140), 0x0, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r3, 0x0, 0x40, &(0x7f0000000000)=@nat={'nat\x00', 0x62, 0x5, 0x410, 0x2d0, 0x2d0, 0xffffffff, 0x2d0, 0x0, 0x378, 0x378, 0xffffffff, 0x378, 0x378, 0x4, 0x0, {[{{@uncond, 0x0, 0xc0, 0x120, 0x0, {}, [@common=@unspec=@connlabel={{0x28}, {0x87}}, @common=@ttl={{0x28}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @dev}}}, {{@uncond, 0x0, 0x98, 0xe0, 0x0, {}, [@common=@icmp={{0x28}, {0x0, "08bb"}}]}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x0, @ipv4, @ipv4=@multicast2, @gre_key, @gre_key}}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @broadcast}}}, {{@uncond, 0x0, 0x70, 0xa8}, @DNAT0={0x38, 'DNAT\x00', 0x0, {0x1, {0x0, @remote, @private, @port, @icmp_id}}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x470) ioctl$FS_IOC_SETVERSION(r3, 0x40087602, &(0x7f00000004c0)) ioctl$DRM_IOCTL_MODE_ADDFB2(r2, 0xc06864b8, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x2}) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) r4 = syz_open_dev$usbfs(&(0x7f0000000180), 0x77, 0x1) ioctl$USBDEVFS_IOCTL(r4, 0xc0105512, &(0x7f0000000380)) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xf9, 0xfc, 0x0, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_bp={0x0}, 0x84050, 0xffffffffffffffff}, 0x0, 0x6, 0xffffffffffffffff, 0x0) r5 = syz_open_dev$usbfs(&(0x7f0000000180), 0x77, 0x1) ioctl$USBDEVFS_IOCTL(r5, 0x80045505, &(0x7f0000000040)=@usbdevfs_connect={0x1, 0x5517, 0x1000000}) dup(0xffffffffffffffff) r6 = getpid() sched_setscheduler(r6, 0x0, &(0x7f0000000280)=0x7) sched_setscheduler(r6, 0x2, &(0x7f0000000200)=0x4) [ 354.239465] cannot load conntrack support for proto=2 20:06:20 executing program 0: syz_init_net_socket$x25(0x9, 0x5, 0x0) mq_open(0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbfs(&(0x7f0000000180), 0x77, 0x1) ioctl$USBDEVFS_IOCTL(r0, 0x80045505, &(0x7f0000000040)=@usbdevfs_connect) r1 = open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r1, 0x0, 0x8400ffdffffa) r2 = syz_open_dev$dri(&(0x7f0000000140), 0x0, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r3, 0x0, 0x40, &(0x7f0000000000)=@nat={'nat\x00', 0x62, 0x5, 0x410, 0x2d0, 0x2d0, 0xffffffff, 0x2d0, 0x0, 0x378, 0x378, 0xffffffff, 0x378, 0x378, 0x4, 0x0, {[{{@uncond, 0x0, 0xc0, 0x120, 0x0, {}, [@common=@unspec=@connlabel={{0x28}, {0x87}}, @common=@ttl={{0x28}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @dev}}}, {{@uncond, 0x0, 0x98, 0xe0, 0x0, {}, [@common=@icmp={{0x28}, {0x0, "08bb"}}]}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x0, @ipv4, @ipv4=@multicast2, @gre_key, @gre_key}}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @broadcast}}}, {{@uncond, 0x0, 0x70, 0xa8}, @DNAT0={0x38, 'DNAT\x00', 0x0, {0x1, {0x0, @remote, @private, @port, @icmp_id}}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x470) ioctl$FS_IOC_SETVERSION(r3, 0x40087602, &(0x7f00000004c0)) ioctl$DRM_IOCTL_MODE_ADDFB2(r2, 0xc06864b8, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x2}) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) r4 = syz_open_dev$usbfs(&(0x7f0000000180), 0x77, 0x1) ioctl$USBDEVFS_IOCTL(r4, 0xc0105512, &(0x7f0000000380)) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xf9, 0xfc, 0x0, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_bp={0x0}, 0x84050, 0xffffffffffffffff}, 0x0, 0x6, 0xffffffffffffffff, 0x0) r5 = syz_open_dev$usbfs(&(0x7f0000000180), 0x77, 0x1) ioctl$USBDEVFS_IOCTL(r5, 0x80045505, &(0x7f0000000040)=@usbdevfs_connect={0x1, 0x5517, 0x1000000}) dup(0xffffffffffffffff) r6 = getpid() sched_setscheduler(r6, 0x0, &(0x7f0000000280)=0x7) sched_setscheduler(r6, 0x2, &(0x7f0000000200)=0x4) 20:06:20 executing program 3: syz_init_net_socket$x25(0x9, 0x5, 0x0) mq_open(0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbfs(&(0x7f0000000180), 0x77, 0x1) ioctl$USBDEVFS_IOCTL(r0, 0x80045505, &(0x7f0000000040)=@usbdevfs_connect) r1 = open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r1, 0x0, 0x8400ffdffffa) r2 = syz_open_dev$dri(&(0x7f0000000140), 0x0, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r3, 0x0, 0x40, &(0x7f0000000000)=@nat={'nat\x00', 0x62, 0x5, 0x410, 0x2d0, 0x2d0, 0xffffffff, 0x2d0, 0x0, 0x378, 0x378, 0xffffffff, 0x378, 0x378, 0x4, 0x0, {[{{@uncond, 0x0, 0xc0, 0x120, 0x0, {}, [@common=@unspec=@connlabel={{0x28}, {0x87}}, @common=@ttl={{0x28}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @dev}}}, {{@uncond, 0x0, 0x98, 0xe0, 0x0, {}, [@common=@icmp={{0x28}, {0x0, "08bb"}}]}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x0, @ipv4, @ipv4=@multicast2, @gre_key, @gre_key}}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @broadcast}}}, {{@uncond, 0x0, 0x70, 0xa8}, @DNAT0={0x38, 'DNAT\x00', 0x0, {0x1, {0x0, @remote, @private, @port, @icmp_id}}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x470) ioctl$FS_IOC_SETVERSION(r3, 0x40087602, &(0x7f00000004c0)) ioctl$DRM_IOCTL_MODE_ADDFB2(r2, 0xc06864b8, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x2}) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) r4 = syz_open_dev$usbfs(&(0x7f0000000180), 0x77, 0x1) ioctl$USBDEVFS_IOCTL(r4, 0xc0105512, &(0x7f0000000380)) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xf9, 0xfc, 0x0, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_bp={0x0}, 0x84050, 0xffffffffffffffff}, 0x0, 0x6, 0xffffffffffffffff, 0x0) r5 = syz_open_dev$usbfs(&(0x7f0000000180), 0x77, 0x1) ioctl$USBDEVFS_IOCTL(r5, 0x80045505, &(0x7f0000000040)=@usbdevfs_connect={0x1, 0x5517, 0x1000000}) dup(0xffffffffffffffff) r6 = getpid() sched_setscheduler(r6, 0x0, &(0x7f0000000280)=0x7) sched_setscheduler(r6, 0x2, &(0x7f0000000200)=0x4) [ 354.296571] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.5'. 20:06:21 executing program 4: r0 = openat$cgroup(0xffffffffffffffff, &(0x7f00000002c0)='syz1\x00', 0x200002, 0x0) bpf$ITER_CREATE(0xb, &(0x7f0000000000), 0x8) perf_event_open$cgroup(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x4, @perf_config_ext={0x2, 0xffffffffa021c0f6}, 0x12100, 0x7, 0x80000000, 0x84a6f5a6df313ae5, 0xffffffffffffffd9, 0x0, 0x8, 0x0, 0x1}, r0, 0x4, 0xffffffffffffffff, 0x0) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000001540), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x4a}) perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0xd8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0), 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000100)={'nicvf0\x00', 0x2}) 20:06:21 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$IPSET_CMD_LIST(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000580)={0x0, 0x14}}, 0x0) getsockname$packet(r3, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000002c0)=@newqdisc={0x4c, 0x24, 0xf1d, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xfff1, 0xffff}}, [@qdisc_kind_options=@q_netem={{0xa}, {0x1c}}]}, 0x4c}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000005c0)=@delchain={0x64, 0x24, 0xd39, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {0x0, 0xffff}}, [@filter_kind_options=@f_bpf={{0x8, 0x2}, {0x38, 0x2, [@TCA_BPF_ACT={0x34, 0x1, [@m_vlan={0x30, 0x0, 0x0, 0x0, {{0x9}, {0x4}, {0x4}, {0xc}, {0xc}}}]}]}}]}, 0x64}}, 0x0) 20:06:21 executing program 1: syz_init_net_socket$x25(0x9, 0x5, 0x0) mq_open(0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbfs(&(0x7f0000000180), 0x77, 0x1) ioctl$USBDEVFS_IOCTL(r0, 0x80045505, &(0x7f0000000040)=@usbdevfs_connect) r1 = open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r1, 0x0, 0x8400ffdffffa) r2 = syz_open_dev$dri(&(0x7f0000000140), 0x0, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r3, 0x0, 0x40, &(0x7f0000000000)=@nat={'nat\x00', 0x62, 0x5, 0x410, 0x2d0, 0x2d0, 0xffffffff, 0x2d0, 0x0, 0x378, 0x378, 0xffffffff, 0x378, 0x378, 0x4, 0x0, {[{{@uncond, 0x0, 0xc0, 0x120, 0x0, {}, [@common=@unspec=@connlabel={{0x28}, {0x87}}, @common=@ttl={{0x28}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @dev}}}, {{@uncond, 0x0, 0x98, 0xe0, 0x0, {}, [@common=@icmp={{0x28}, {0x0, "08bb"}}]}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x0, @ipv4, @ipv4=@multicast2, @gre_key, @gre_key}}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @broadcast}}}, {{@uncond, 0x0, 0x70, 0xa8}, @DNAT0={0x38, 'DNAT\x00', 0x0, {0x1, {0x0, @remote, @private, @port, @icmp_id}}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x470) ioctl$FS_IOC_SETVERSION(r3, 0x40087602, &(0x7f00000004c0)) ioctl$DRM_IOCTL_MODE_ADDFB2(r2, 0xc06864b8, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x2}) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) r4 = syz_open_dev$usbfs(&(0x7f0000000180), 0x77, 0x1) ioctl$USBDEVFS_IOCTL(r4, 0xc0105512, &(0x7f0000000380)) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xf9, 0xfc, 0x0, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_bp={0x0}, 0x84050, 0xffffffffffffffff}, 0x0, 0x6, 0xffffffffffffffff, 0x0) r5 = syz_open_dev$usbfs(&(0x7f0000000180), 0x77, 0x1) ioctl$USBDEVFS_IOCTL(r5, 0x80045505, &(0x7f0000000040)=@usbdevfs_connect={0x1, 0x5517, 0x1000000}) dup(0xffffffffffffffff) r6 = getpid() sched_setscheduler(r6, 0x0, &(0x7f0000000280)=0x7) sched_setscheduler(r6, 0x2, &(0x7f0000000200)=0x4) [ 354.415477] cannot load conntrack support for proto=2 [ 354.486993] cannot load conntrack support for proto=2 [ 354.517937] cannot load conntrack support for proto=2 20:06:21 executing program 3: syz_init_net_socket$x25(0x9, 0x5, 0x0) mq_open(0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbfs(&(0x7f0000000180), 0x77, 0x1) ioctl$USBDEVFS_IOCTL(r0, 0x80045505, &(0x7f0000000040)=@usbdevfs_connect) r1 = open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r1, 0x0, 0x8400ffdffffa) r2 = syz_open_dev$dri(&(0x7f0000000140), 0x0, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r3, 0x0, 0x40, &(0x7f0000000000)=@nat={'nat\x00', 0x62, 0x5, 0x410, 0x2d0, 0x2d0, 0xffffffff, 0x2d0, 0x0, 0x378, 0x378, 0xffffffff, 0x378, 0x378, 0x4, 0x0, {[{{@uncond, 0x0, 0xc0, 0x120, 0x0, {}, [@common=@unspec=@connlabel={{0x28}, {0x87}}, @common=@ttl={{0x28}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @dev}}}, {{@uncond, 0x0, 0x98, 0xe0, 0x0, {}, [@common=@icmp={{0x28}, {0x0, "08bb"}}]}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x0, @ipv4, @ipv4=@multicast2, @gre_key, @gre_key}}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @broadcast}}}, {{@uncond, 0x0, 0x70, 0xa8}, @DNAT0={0x38, 'DNAT\x00', 0x0, {0x1, {0x0, @remote, @private, @port, @icmp_id}}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x470) ioctl$FS_IOC_SETVERSION(r3, 0x40087602, &(0x7f00000004c0)) ioctl$DRM_IOCTL_MODE_ADDFB2(r2, 0xc06864b8, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x2}) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) r4 = syz_open_dev$usbfs(&(0x7f0000000180), 0x77, 0x1) ioctl$USBDEVFS_IOCTL(r4, 0xc0105512, &(0x7f0000000380)) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xf9, 0xfc, 0x0, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_bp={0x0}, 0x84050, 0xffffffffffffffff}, 0x0, 0x6, 0xffffffffffffffff, 0x0) r5 = syz_open_dev$usbfs(&(0x7f0000000180), 0x77, 0x1) ioctl$USBDEVFS_IOCTL(r5, 0x80045505, &(0x7f0000000040)=@usbdevfs_connect={0x1, 0x5517, 0x1000000}) dup(0xffffffffffffffff) r6 = getpid() sched_setscheduler(r6, 0x0, &(0x7f0000000280)=0x7) sched_setscheduler(r6, 0x2, &(0x7f0000000200)=0x4) 20:06:21 executing program 0: syz_init_net_socket$x25(0x9, 0x5, 0x0) mq_open(0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbfs(&(0x7f0000000180), 0x77, 0x1) ioctl$USBDEVFS_IOCTL(r0, 0x80045505, &(0x7f0000000040)=@usbdevfs_connect) r1 = open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r1, 0x0, 0x8400ffdffffa) r2 = syz_open_dev$dri(&(0x7f0000000140), 0x0, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r3, 0x0, 0x40, &(0x7f0000000000)=@nat={'nat\x00', 0x62, 0x5, 0x410, 0x2d0, 0x2d0, 0xffffffff, 0x2d0, 0x0, 0x378, 0x378, 0xffffffff, 0x378, 0x378, 0x4, 0x0, {[{{@uncond, 0x0, 0xc0, 0x120, 0x0, {}, [@common=@unspec=@connlabel={{0x28}, {0x87}}, @common=@ttl={{0x28}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @dev}}}, {{@uncond, 0x0, 0x98, 0xe0, 0x0, {}, [@common=@icmp={{0x28}, {0x0, "08bb"}}]}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x0, @ipv4, @ipv4=@multicast2, @gre_key, @gre_key}}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @broadcast}}}, {{@uncond, 0x0, 0x70, 0xa8}, @DNAT0={0x38, 'DNAT\x00', 0x0, {0x1, {0x0, @remote, @private, @port, @icmp_id}}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x470) ioctl$FS_IOC_SETVERSION(r3, 0x40087602, &(0x7f00000004c0)) ioctl$DRM_IOCTL_MODE_ADDFB2(r2, 0xc06864b8, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x2}) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) r4 = syz_open_dev$usbfs(&(0x7f0000000180), 0x77, 0x1) ioctl$USBDEVFS_IOCTL(r4, 0xc0105512, &(0x7f0000000380)) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xf9, 0xfc, 0x0, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_bp={0x0}, 0x84050, 0xffffffffffffffff}, 0x0, 0x6, 0xffffffffffffffff, 0x0) r5 = syz_open_dev$usbfs(&(0x7f0000000180), 0x77, 0x1) ioctl$USBDEVFS_IOCTL(r5, 0x80045505, &(0x7f0000000040)=@usbdevfs_connect={0x1, 0x5517, 0x1000000}) dup(0xffffffffffffffff) r6 = getpid() sched_setscheduler(r6, 0x0, &(0x7f0000000280)=0x7) sched_setscheduler(r6, 0x2, &(0x7f0000000200)=0x4) [ 354.573780] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.5'. 20:06:21 executing program 4: r0 = openat$cgroup(0xffffffffffffffff, &(0x7f00000002c0)='syz1\x00', 0x200002, 0x0) bpf$ITER_CREATE(0xb, &(0x7f0000000000), 0x8) perf_event_open$cgroup(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x4, @perf_config_ext={0x2, 0xffffffffa021c0f6}, 0x12100, 0x7, 0x80000000, 0x84a6f5a6df313ae5, 0xffffffffffffffd9, 0x0, 0x8, 0x0, 0x1}, r0, 0x4, 0xffffffffffffffff, 0x0) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000001540), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x4a}) perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0xd8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0), 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000100)={'nicvf0\x00', 0x2}) [ 354.653921] cannot load conntrack support for proto=2 20:06:21 executing program 1: syz_init_net_socket$x25(0x9, 0x5, 0x0) mq_open(0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbfs(&(0x7f0000000180), 0x77, 0x1) ioctl$USBDEVFS_IOCTL(r0, 0x80045505, &(0x7f0000000040)=@usbdevfs_connect) r1 = open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r1, 0x0, 0x8400ffdffffa) r2 = syz_open_dev$dri(&(0x7f0000000140), 0x0, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r3, 0x0, 0x40, &(0x7f0000000000)=@nat={'nat\x00', 0x62, 0x5, 0x410, 0x2d0, 0x2d0, 0xffffffff, 0x2d0, 0x0, 0x378, 0x378, 0xffffffff, 0x378, 0x378, 0x4, 0x0, {[{{@uncond, 0x0, 0xc0, 0x120, 0x0, {}, [@common=@unspec=@connlabel={{0x28}, {0x87}}, @common=@ttl={{0x28}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @dev}}}, {{@uncond, 0x0, 0x98, 0xe0, 0x0, {}, [@common=@icmp={{0x28}, {0x0, "08bb"}}]}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x0, @ipv4, @ipv4=@multicast2, @gre_key, @gre_key}}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @broadcast}}}, {{@uncond, 0x0, 0x70, 0xa8}, @DNAT0={0x38, 'DNAT\x00', 0x0, {0x1, {0x0, @remote, @private, @port, @icmp_id}}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x470) ioctl$FS_IOC_SETVERSION(r3, 0x40087602, &(0x7f00000004c0)) ioctl$DRM_IOCTL_MODE_ADDFB2(r2, 0xc06864b8, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x2}) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) r4 = syz_open_dev$usbfs(&(0x7f0000000180), 0x77, 0x1) ioctl$USBDEVFS_IOCTL(r4, 0xc0105512, &(0x7f0000000380)) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xf9, 0xfc, 0x0, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_bp={0x0}, 0x84050, 0xffffffffffffffff}, 0x0, 0x6, 0xffffffffffffffff, 0x0) r5 = syz_open_dev$usbfs(&(0x7f0000000180), 0x77, 0x1) ioctl$USBDEVFS_IOCTL(r5, 0x80045505, &(0x7f0000000040)=@usbdevfs_connect={0x1, 0x5517, 0x1000000}) dup(0xffffffffffffffff) r6 = getpid() sched_setscheduler(r6, 0x0, &(0x7f0000000280)=0x7) sched_setscheduler(r6, 0x2, &(0x7f0000000200)=0x4) 20:06:21 executing program 3: syz_init_net_socket$x25(0x9, 0x5, 0x0) mq_open(0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbfs(&(0x7f0000000180), 0x77, 0x1) ioctl$USBDEVFS_IOCTL(r0, 0x80045505, &(0x7f0000000040)=@usbdevfs_connect) r1 = open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r1, 0x0, 0x8400ffdffffa) r2 = syz_open_dev$dri(&(0x7f0000000140), 0x0, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r3, 0x0, 0x40, &(0x7f0000000000)=@nat={'nat\x00', 0x62, 0x5, 0x410, 0x2d0, 0x2d0, 0xffffffff, 0x2d0, 0x0, 0x378, 0x378, 0xffffffff, 0x378, 0x378, 0x4, 0x0, {[{{@uncond, 0x0, 0xc0, 0x120, 0x0, {}, [@common=@unspec=@connlabel={{0x28}, {0x87}}, @common=@ttl={{0x28}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @dev}}}, {{@uncond, 0x0, 0x98, 0xe0, 0x0, {}, [@common=@icmp={{0x28}, {0x0, "08bb"}}]}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x0, @ipv4, @ipv4=@multicast2, @gre_key, @gre_key}}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @broadcast}}}, {{@uncond, 0x0, 0x70, 0xa8}, @DNAT0={0x38, 'DNAT\x00', 0x0, {0x1, {0x0, @remote, @private, @port, @icmp_id}}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x470) ioctl$FS_IOC_SETVERSION(r3, 0x40087602, &(0x7f00000004c0)) ioctl$DRM_IOCTL_MODE_ADDFB2(r2, 0xc06864b8, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x2}) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) r4 = syz_open_dev$usbfs(&(0x7f0000000180), 0x77, 0x1) ioctl$USBDEVFS_IOCTL(r4, 0xc0105512, &(0x7f0000000380)) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xf9, 0xfc, 0x0, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_bp={0x0}, 0x84050, 0xffffffffffffffff}, 0x0, 0x6, 0xffffffffffffffff, 0x0) r5 = syz_open_dev$usbfs(&(0x7f0000000180), 0x77, 0x1) ioctl$USBDEVFS_IOCTL(r5, 0x80045505, &(0x7f0000000040)=@usbdevfs_connect={0x1, 0x5517, 0x1000000}) dup(0xffffffffffffffff) r6 = getpid() sched_setscheduler(r6, 0x0, &(0x7f0000000280)=0x7) sched_setscheduler(r6, 0x2, &(0x7f0000000200)=0x4) [ 354.737419] cannot load conntrack support for proto=2 [ 354.745943] cannot load conntrack support for proto=2 [ 354.851351] cannot load conntrack support for proto=2 [ 354.882356] cannot load conntrack support for proto=2 20:06:21 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000ac0), 0xffffffffffffffff) sendmsg$IPVS_CMD_NEW_DAEMON(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x34, r1, 0x1, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_DAEMON={0x20, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_STATE={0x5}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'ip6_vti0\x00'}]}]}, 0x34}}, 0x0) 20:06:21 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$IPSET_CMD_LIST(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000580)={0x0, 0x14}}, 0x0) getsockname$packet(r3, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000002c0)=@newqdisc={0x4c, 0x24, 0xf1d, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xfff1, 0xffff}}, [@qdisc_kind_options=@q_netem={{0xa}, {0x1c}}]}, 0x4c}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000005c0)=@delchain={0x64, 0x24, 0xd39, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {0x0, 0xffff}}, [@filter_kind_options=@f_bpf={{0x8, 0x2}, {0x38, 0x2, [@TCA_BPF_ACT={0x34, 0x1, [@m_vlan={0x30, 0x0, 0x0, 0x0, {{0x9}, {0x4}, {0x4}, {0xc}, {0xc}}}]}]}}]}, 0x64}}, 0x0) 20:06:21 executing program 0: syz_init_net_socket$x25(0x9, 0x5, 0x0) mq_open(0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbfs(&(0x7f0000000180), 0x77, 0x1) ioctl$USBDEVFS_IOCTL(r0, 0x80045505, &(0x7f0000000040)=@usbdevfs_connect) r1 = open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r1, 0x0, 0x8400ffdffffa) r2 = syz_open_dev$dri(&(0x7f0000000140), 0x0, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r3, 0x0, 0x40, &(0x7f0000000000)=@nat={'nat\x00', 0x62, 0x5, 0x410, 0x2d0, 0x2d0, 0xffffffff, 0x2d0, 0x0, 0x378, 0x378, 0xffffffff, 0x378, 0x378, 0x4, 0x0, {[{{@uncond, 0x0, 0xc0, 0x120, 0x0, {}, [@common=@unspec=@connlabel={{0x28}, {0x87}}, @common=@ttl={{0x28}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @dev}}}, {{@uncond, 0x0, 0x98, 0xe0, 0x0, {}, [@common=@icmp={{0x28}, {0x0, "08bb"}}]}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x0, @ipv4, @ipv4=@multicast2, @gre_key, @gre_key}}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @broadcast}}}, {{@uncond, 0x0, 0x70, 0xa8}, @DNAT0={0x38, 'DNAT\x00', 0x0, {0x1, {0x0, @remote, @private, @port, @icmp_id}}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x470) ioctl$FS_IOC_SETVERSION(r3, 0x40087602, &(0x7f00000004c0)) ioctl$DRM_IOCTL_MODE_ADDFB2(r2, 0xc06864b8, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x2}) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) r4 = syz_open_dev$usbfs(&(0x7f0000000180), 0x77, 0x1) ioctl$USBDEVFS_IOCTL(r4, 0xc0105512, &(0x7f0000000380)) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xf9, 0xfc, 0x0, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_bp={0x0}, 0x84050, 0xffffffffffffffff}, 0x0, 0x6, 0xffffffffffffffff, 0x0) r5 = syz_open_dev$usbfs(&(0x7f0000000180), 0x77, 0x1) ioctl$USBDEVFS_IOCTL(r5, 0x80045505, &(0x7f0000000040)=@usbdevfs_connect={0x1, 0x5517, 0x1000000}) dup(0xffffffffffffffff) r6 = getpid() sched_setscheduler(r6, 0x0, &(0x7f0000000280)=0x7) sched_setscheduler(r6, 0x2, &(0x7f0000000200)=0x4) 20:06:21 executing program 1: syz_init_net_socket$x25(0x9, 0x5, 0x0) mq_open(0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbfs(&(0x7f0000000180), 0x77, 0x1) ioctl$USBDEVFS_IOCTL(r0, 0x80045505, &(0x7f0000000040)=@usbdevfs_connect) r1 = open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r1, 0x0, 0x8400ffdffffa) r2 = syz_open_dev$dri(&(0x7f0000000140), 0x0, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r3, 0x0, 0x40, &(0x7f0000000000)=@nat={'nat\x00', 0x62, 0x5, 0x410, 0x2d0, 0x2d0, 0xffffffff, 0x2d0, 0x0, 0x378, 0x378, 0xffffffff, 0x378, 0x378, 0x4, 0x0, {[{{@uncond, 0x0, 0xc0, 0x120, 0x0, {}, [@common=@unspec=@connlabel={{0x28}, {0x87}}, @common=@ttl={{0x28}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @dev}}}, {{@uncond, 0x0, 0x98, 0xe0, 0x0, {}, [@common=@icmp={{0x28}, {0x0, "08bb"}}]}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x0, @ipv4, @ipv4=@multicast2, @gre_key, @gre_key}}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @broadcast}}}, {{@uncond, 0x0, 0x70, 0xa8}, @DNAT0={0x38, 'DNAT\x00', 0x0, {0x1, {0x0, @remote, @private, @port, @icmp_id}}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x470) ioctl$FS_IOC_SETVERSION(r3, 0x40087602, &(0x7f00000004c0)) ioctl$DRM_IOCTL_MODE_ADDFB2(r2, 0xc06864b8, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x2}) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) r4 = syz_open_dev$usbfs(&(0x7f0000000180), 0x77, 0x1) ioctl$USBDEVFS_IOCTL(r4, 0xc0105512, &(0x7f0000000380)) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xf9, 0xfc, 0x0, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_bp={0x0}, 0x84050, 0xffffffffffffffff}, 0x0, 0x6, 0xffffffffffffffff, 0x0) r5 = syz_open_dev$usbfs(&(0x7f0000000180), 0x77, 0x1) ioctl$USBDEVFS_IOCTL(r5, 0x80045505, &(0x7f0000000040)=@usbdevfs_connect={0x1, 0x5517, 0x1000000}) dup(0xffffffffffffffff) r6 = getpid() sched_setscheduler(r6, 0x0, &(0x7f0000000280)=0x7) sched_setscheduler(r6, 0x2, &(0x7f0000000200)=0x4) 20:06:21 executing program 4: r0 = openat$cgroup(0xffffffffffffffff, &(0x7f00000002c0)='syz1\x00', 0x200002, 0x0) bpf$ITER_CREATE(0xb, &(0x7f0000000000), 0x8) perf_event_open$cgroup(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x4, @perf_config_ext={0x2, 0xffffffffa021c0f6}, 0x12100, 0x7, 0x80000000, 0x84a6f5a6df313ae5, 0xffffffffffffffd9, 0x0, 0x8, 0x0, 0x1}, r0, 0x4, 0xffffffffffffffff, 0x0) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000001540), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x4a}) perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0xd8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0), 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000100)={'nicvf0\x00', 0x2}) 20:06:21 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) bpf$ITER_CREATE(0x21, &(0x7f00000002c0), 0x8) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000280)) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000040)={0xffffffffffffffff}, 0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x1b, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0xc0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) close(r1) socketpair(0x1, 0x1, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89a0, &(0x7f0000000000)='&@[\x00') perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89a1, &(0x7f0000000680)='&@[\x00') openat$cgroup(0xffffffffffffffff, &(0x7f0000000180)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='cpuset.effective_mems\x00', 0x0, 0x0) [ 355.028092] audit: type=1804 audit(1677355581.610:184): pid=15653 uid=0 auid=4294967295 ses=4294967295 op="invalid_pcr" cause="open_writers" comm="syz-executor.2" name="/root/syzkaller-testdir3960867949/syzkaller.8rCAeT/257/bus" dev="sda1" ino=13880 res=1 20:06:21 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000ac0), 0xffffffffffffffff) sendmsg$IPVS_CMD_NEW_DAEMON(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x34, r1, 0x1, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_DAEMON={0x20, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_STATE={0x5}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'ip6_vti0\x00'}]}]}, 0x34}}, 0x0) [ 355.116614] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.5'. [ 355.120576] cannot load conntrack support for proto=2 [ 355.159533] cannot load conntrack support for proto=2 20:06:21 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000ac0), 0xffffffffffffffff) sendmsg$IPVS_CMD_NEW_DAEMON(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x34, r1, 0x1, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_DAEMON={0x20, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_STATE={0x5}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'ip6_vti0\x00'}]}]}, 0x34}}, 0x0) 20:06:21 executing program 4: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='devtmpfs\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) getdents64(r0, 0x0, 0x0) lseek(r0, 0x0, 0x0) 20:06:21 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200), 0x43400) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_subtree(r1, &(0x7f0000000040)=ANY=[], 0x32600) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0xc028660f, &(0x7f00000003c0)=0x400000004) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x7) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='cgroup.controllers\x00', 0x100002, 0x0) r3 = perf_event_open(&(0x7f00000004c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000400)=0x8001) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0xc028660f, &(0x7f00000005c0)=0x3fffffffe) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[], 0x1f007) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[], 0x1f007) perf_event_open$cgroup(&(0x7f00000002c0)={0x1, 0x80, 0x20, 0x3, 0x1, 0x3, 0x0, 0x7fffffffffffffff, 0x401, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x20, 0x0, @perf_bp={&(0x7f0000000040), 0x1}, 0x929, 0x46b, 0xfff, 0x9, 0x51, 0xffff, 0x7ff, 0x0, 0x1, 0x0, 0x64c}, r4, 0x2, 0xffffffffffffffff, 0x2) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x3, 0x0, 0x4, 0x3}, 0x48) 20:06:21 executing program 1: syz_init_net_socket$x25(0x9, 0x5, 0x0) mq_open(0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbfs(&(0x7f0000000180), 0x77, 0x1) ioctl$USBDEVFS_IOCTL(r0, 0x80045505, &(0x7f0000000040)=@usbdevfs_connect) r1 = open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r1, 0x0, 0x8400ffdffffa) r2 = syz_open_dev$dri(&(0x7f0000000140), 0x0, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r3, 0x0, 0x40, &(0x7f0000000000)=@nat={'nat\x00', 0x62, 0x5, 0x410, 0x2d0, 0x2d0, 0xffffffff, 0x2d0, 0x0, 0x378, 0x378, 0xffffffff, 0x378, 0x378, 0x4, 0x0, {[{{@uncond, 0x0, 0xc0, 0x120, 0x0, {}, [@common=@unspec=@connlabel={{0x28}, {0x87}}, @common=@ttl={{0x28}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @dev}}}, {{@uncond, 0x0, 0x98, 0xe0, 0x0, {}, [@common=@icmp={{0x28}, {0x0, "08bb"}}]}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x0, @ipv4, @ipv4=@multicast2, @gre_key, @gre_key}}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @broadcast}}}, {{@uncond, 0x0, 0x70, 0xa8}, @DNAT0={0x38, 'DNAT\x00', 0x0, {0x1, {0x0, @remote, @private, @port, @icmp_id}}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x470) ioctl$FS_IOC_SETVERSION(r3, 0x40087602, &(0x7f00000004c0)) ioctl$DRM_IOCTL_MODE_ADDFB2(r2, 0xc06864b8, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x2}) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) r4 = syz_open_dev$usbfs(&(0x7f0000000180), 0x77, 0x1) ioctl$USBDEVFS_IOCTL(r4, 0xc0105512, &(0x7f0000000380)) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xf9, 0xfc, 0x0, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_bp={0x0}, 0x84050, 0xffffffffffffffff}, 0x0, 0x6, 0xffffffffffffffff, 0x0) r5 = syz_open_dev$usbfs(&(0x7f0000000180), 0x77, 0x1) ioctl$USBDEVFS_IOCTL(r5, 0x80045505, &(0x7f0000000040)=@usbdevfs_connect={0x1, 0x5517, 0x1000000}) dup(0xffffffffffffffff) r6 = getpid() sched_setscheduler(r6, 0x0, &(0x7f0000000280)=0x7) sched_setscheduler(r6, 0x2, &(0x7f0000000200)=0x4) 20:06:21 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000ac0), 0xffffffffffffffff) sendmsg$IPVS_CMD_NEW_DAEMON(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x34, r1, 0x1, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_DAEMON={0x20, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_STATE={0x5}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'ip6_vti0\x00'}]}]}, 0x34}}, 0x0) [ 355.343062] cannot load conntrack support for proto=2 20:06:21 executing program 4: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='devtmpfs\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) getdents64(r0, 0x0, 0x0) lseek(r0, 0x0, 0x0) 20:06:22 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$IPSET_CMD_LIST(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000580)={0x0, 0x14}}, 0x0) getsockname$packet(r3, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000002c0)=@newqdisc={0x4c, 0x24, 0xf1d, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xfff1, 0xffff}}, [@qdisc_kind_options=@q_netem={{0xa}, {0x1c}}]}, 0x4c}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000005c0)=@delchain={0x64, 0x24, 0xd39, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {0x0, 0xffff}}, [@filter_kind_options=@f_bpf={{0x8, 0x2}, {0x38, 0x2, [@TCA_BPF_ACT={0x34, 0x1, [@m_vlan={0x30, 0x0, 0x0, 0x0, {{0x9}, {0x4}, {0x4}, {0xc}, {0xc}}}]}]}}]}, 0x64}}, 0x0) 20:06:22 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='devtmpfs\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) getdents64(r0, 0x0, 0x0) lseek(r0, 0x0, 0x0) 20:06:22 executing program 1: syz_init_net_socket$x25(0x9, 0x5, 0x0) mq_open(0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbfs(&(0x7f0000000180), 0x77, 0x1) ioctl$USBDEVFS_IOCTL(r0, 0x80045505, &(0x7f0000000040)=@usbdevfs_connect) r1 = open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r1, 0x0, 0x8400ffdffffa) r2 = syz_open_dev$dri(&(0x7f0000000140), 0x0, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r3, 0x0, 0x40, &(0x7f0000000000)=@nat={'nat\x00', 0x62, 0x5, 0x410, 0x2d0, 0x2d0, 0xffffffff, 0x2d0, 0x0, 0x378, 0x378, 0xffffffff, 0x378, 0x378, 0x4, 0x0, {[{{@uncond, 0x0, 0xc0, 0x120, 0x0, {}, [@common=@unspec=@connlabel={{0x28}, {0x87}}, @common=@ttl={{0x28}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @dev}}}, {{@uncond, 0x0, 0x98, 0xe0, 0x0, {}, [@common=@icmp={{0x28}, {0x0, "08bb"}}]}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x0, @ipv4, @ipv4=@multicast2, @gre_key, @gre_key}}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @broadcast}}}, {{@uncond, 0x0, 0x70, 0xa8}, @DNAT0={0x38, 'DNAT\x00', 0x0, {0x1, {0x0, @remote, @private, @port, @icmp_id}}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x470) ioctl$FS_IOC_SETVERSION(r3, 0x40087602, &(0x7f00000004c0)) ioctl$DRM_IOCTL_MODE_ADDFB2(r2, 0xc06864b8, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x2}) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) r4 = syz_open_dev$usbfs(&(0x7f0000000180), 0x77, 0x1) ioctl$USBDEVFS_IOCTL(r4, 0xc0105512, &(0x7f0000000380)) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xf9, 0xfc, 0x0, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_bp={0x0}, 0x84050, 0xffffffffffffffff}, 0x0, 0x6, 0xffffffffffffffff, 0x0) r5 = syz_open_dev$usbfs(&(0x7f0000000180), 0x77, 0x1) ioctl$USBDEVFS_IOCTL(r5, 0x80045505, &(0x7f0000000040)=@usbdevfs_connect={0x1, 0x5517, 0x1000000}) dup(0xffffffffffffffff) r6 = getpid() sched_setscheduler(r6, 0x0, &(0x7f0000000280)=0x7) sched_setscheduler(r6, 0x2, &(0x7f0000000200)=0x4) 20:06:22 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) bpf$ITER_CREATE(0x21, &(0x7f00000002c0), 0x8) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000280)) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000040)={0xffffffffffffffff}, 0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x1b, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0xc0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) close(r1) socketpair(0x1, 0x1, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89a0, &(0x7f0000000000)='&@[\x00') perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89a1, &(0x7f0000000680)='&@[\x00') openat$cgroup(0xffffffffffffffff, &(0x7f0000000180)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='cpuset.effective_mems\x00', 0x0, 0x0) 20:06:22 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200), 0x43400) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_subtree(r1, &(0x7f0000000040)=ANY=[], 0x32600) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0xc028660f, &(0x7f00000003c0)=0x400000004) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x7) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='cgroup.controllers\x00', 0x100002, 0x0) r3 = perf_event_open(&(0x7f00000004c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000400)=0x8001) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0xc028660f, &(0x7f00000005c0)=0x3fffffffe) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[], 0x1f007) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[], 0x1f007) perf_event_open$cgroup(&(0x7f00000002c0)={0x1, 0x80, 0x20, 0x3, 0x1, 0x3, 0x0, 0x7fffffffffffffff, 0x401, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x20, 0x0, @perf_bp={&(0x7f0000000040), 0x1}, 0x929, 0x46b, 0xfff, 0x9, 0x51, 0xffff, 0x7ff, 0x0, 0x1, 0x0, 0x64c}, r4, 0x2, 0xffffffffffffffff, 0x2) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x3, 0x0, 0x4, 0x3}, 0x48) [ 355.497270] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.5'. [ 355.557969] cannot load conntrack support for proto=2 20:06:22 executing program 4: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='devtmpfs\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) getdents64(r0, 0x0, 0x0) lseek(r0, 0x0, 0x0) 20:06:22 executing program 5: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4000, 0xffffffffffffffff}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz1\x00', 0x1ff) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x38}}, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaa0086dd60932b1c00142b00fe80000000000000000000c943c38d1ebe87459ce800000000bbfe8000000000000000000000000000aa0000003a", @ANYRES32=0x41424344, @ANYRES64=r0], 0x0) r1 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, r1) syz_open_dev$ttys(0xc, 0x2, 0x1) readv(r0, &(0x7f0000000100)=[{&(0x7f0000000480)=""/246, 0xf6}, {&(0x7f0000000580)=""/204, 0xcc}, {&(0x7f0000000780)=""/251, 0xfb}], 0x3) r2 = syz_open_dev$ttys(0xc, 0x2, 0x1) ioctl$TIOCSPTLCK(r2, 0x5414, &(0x7f0000000000)=0x1) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/power/pm_debug_messages', 0x288401, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r3, 0xc0189374, &(0x7f0000000040)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r2, @ANYBLOB="e6140000000000002e16af696c653000"]) ioctl$TCSETS2(r4, 0x402c542b, &(0x7f00000000c0)={0x5, 0x9, 0x135, 0xffffffff, 0x0, "1db8a98d1924fa2471f348b7c0214bbaf41102", 0x51, 0x9}) write$binfmt_misc(r3, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0x4) ioctl$TIOCVHANGUP(r3, 0x5437, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = socket(0xa, 0x3, 0x3a) setsockopt$MRT6_ADD_MFC(r6, 0x29, 0xd3, &(0x7f0000000080)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @mcast2}}, 0x5c) setsockopt$inet6_tcp_int(r6, 0x6, 0x10, &(0x7f0000000000)=0x20, 0x4) r7 = fcntl$dupfd(r6, 0x406, r6) r8 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r8, &(0x7f0000000080), 0x10) r9 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r9, 0x8933, &(0x7f0000000040)={'vcan0\x00', 0x0}) sendmsg$can_bcm(r8, &(0x7f0000000280)={&(0x7f0000000000)={0x1d, r10}, 0x10, &(0x7f0000000200)={&(0x7f00000002c0)={0x2, 0x11, 0x0, {0x0, 0x2710}, {}, {}, 0x300, @can={{0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, "f5813f23b5e6b9b1"}}, 0x48}, 0x1, 0x0, 0x0, 0x4040800}, 0x0) setsockopt$MRT6_ADD_MIF(r7, 0x29, 0xcb, &(0x7f0000000040)={0x0, 0x0, 0x7f, r10, 0x1}, 0xc) setsockopt$IP6T_SO_SET_REPLACE(r5, 0x29, 0x40, &(0x7f0000000b40)=@raw={'raw\x00', 0x3c1, 0x3, 0x3a8, 0x1e8, 0x9403, 0x0, 0x0, 0x2c0, 0x2d8, 0x3d8, 0x3d8, 0x2d8, 0x3d8, 0x3, 0x0, {[{{@ipv6={@remote, @local, [0xffffffff, 0xff, 0xffffff00, 0xffffffff], [0xffffff00, 0xff000000, 0xffffffff, 0xffffffff], 'erspan0\x00', 'veth0_to_hsr\x00', {0xff}, {}, 0x2f, 0x3, 0x1, 0x7f}, 0x0, 0x1c8, 0x1e8, 0x0, {}, [@common=@inet=@dscp={{0x28}, {0x9, 0x1}}, @common=@inet=@recent0={{0xf8}, {0x0, 0x8, 0x1, 0x0, 'syz0\x00'}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0xf0}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x11000, 0x0, 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x408) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/power/pm_debug_messages', 0x88001, 0x0) 20:06:22 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.current\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000005c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = socket$rds(0x15, 0x5, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000006ffc), 0xe50fb6c50bc849c9) bind$rds(r1, &(0x7f0000000040)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r1, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, 0x0, 0x0, &(0x7f0000000780)=[@rdma_args={0x48, 0x114, 0x1, {{}, {0x0, 0x2c}, &(0x7f00000006c0)=[{&(0x7f0000000100)=""/44, 0x410200}], 0x1}}], 0x48}, 0x0) 20:06:22 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.current\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000005c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = socket$rds(0x15, 0x5, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000006ffc), 0xe50fb6c50bc849c9) bind$rds(r1, &(0x7f0000000040)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r1, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, 0x0, 0x0, &(0x7f0000000780)=[@rdma_args={0x48, 0x114, 0x1, {{}, {0x0, 0x2c}, &(0x7f00000006c0)=[{&(0x7f0000000100)=""/44, 0x410200}], 0x1}}], 0x48}, 0x0) 20:06:22 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='devtmpfs\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) getdents64(r0, 0x0, 0x0) lseek(r0, 0x0, 0x0) 20:06:22 executing program 4: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='devtmpfs\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) getdents64(r0, 0x0, 0x0) lseek(r0, 0x0, 0x0) 20:06:22 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200), 0x43400) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_subtree(r1, &(0x7f0000000040)=ANY=[], 0x32600) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0xc028660f, &(0x7f00000003c0)=0x400000004) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x7) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='cgroup.controllers\x00', 0x100002, 0x0) r3 = perf_event_open(&(0x7f00000004c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000400)=0x8001) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0xc028660f, &(0x7f00000005c0)=0x3fffffffe) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[], 0x1f007) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[], 0x1f007) perf_event_open$cgroup(&(0x7f00000002c0)={0x1, 0x80, 0x20, 0x3, 0x1, 0x3, 0x0, 0x7fffffffffffffff, 0x401, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x20, 0x0, @perf_bp={&(0x7f0000000040), 0x1}, 0x929, 0x46b, 0xfff, 0x9, 0x51, 0xffff, 0x7ff, 0x0, 0x1, 0x0, 0x64c}, r4, 0x2, 0xffffffffffffffff, 0x2) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x3, 0x0, 0x4, 0x3}, 0x48) [ 355.829475] xt_CT: netfilter: NOTRACK target is deprecated, use CT instead or upgrade iptables 20:06:22 executing program 5: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4000, 0xffffffffffffffff}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz1\x00', 0x1ff) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x38}}, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaa0086dd60932b1c00142b00fe80000000000000000000c943c38d1ebe87459ce800000000bbfe8000000000000000000000000000aa0000003a", @ANYRES32=0x41424344, @ANYRES64=r0], 0x0) r1 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, r1) syz_open_dev$ttys(0xc, 0x2, 0x1) readv(r0, &(0x7f0000000100)=[{&(0x7f0000000480)=""/246, 0xf6}, {&(0x7f0000000580)=""/204, 0xcc}, {&(0x7f0000000780)=""/251, 0xfb}], 0x3) r2 = syz_open_dev$ttys(0xc, 0x2, 0x1) ioctl$TIOCSPTLCK(r2, 0x5414, &(0x7f0000000000)=0x1) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/power/pm_debug_messages', 0x288401, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r3, 0xc0189374, &(0x7f0000000040)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r2, @ANYBLOB="e6140000000000002e16af696c653000"]) ioctl$TCSETS2(r4, 0x402c542b, &(0x7f00000000c0)={0x5, 0x9, 0x135, 0xffffffff, 0x0, "1db8a98d1924fa2471f348b7c0214bbaf41102", 0x51, 0x9}) write$binfmt_misc(r3, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0x4) ioctl$TIOCVHANGUP(r3, 0x5437, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = socket(0xa, 0x3, 0x3a) setsockopt$MRT6_ADD_MFC(r6, 0x29, 0xd3, &(0x7f0000000080)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @mcast2}}, 0x5c) setsockopt$inet6_tcp_int(r6, 0x6, 0x10, &(0x7f0000000000)=0x20, 0x4) r7 = fcntl$dupfd(r6, 0x406, r6) r8 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r8, &(0x7f0000000080), 0x10) r9 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r9, 0x8933, &(0x7f0000000040)={'vcan0\x00', 0x0}) sendmsg$can_bcm(r8, &(0x7f0000000280)={&(0x7f0000000000)={0x1d, r10}, 0x10, &(0x7f0000000200)={&(0x7f00000002c0)={0x2, 0x11, 0x0, {0x0, 0x2710}, {}, {}, 0x300, @can={{0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, "f5813f23b5e6b9b1"}}, 0x48}, 0x1, 0x0, 0x0, 0x4040800}, 0x0) setsockopt$MRT6_ADD_MIF(r7, 0x29, 0xcb, &(0x7f0000000040)={0x0, 0x0, 0x7f, r10, 0x1}, 0xc) setsockopt$IP6T_SO_SET_REPLACE(r5, 0x29, 0x40, &(0x7f0000000b40)=@raw={'raw\x00', 0x3c1, 0x3, 0x3a8, 0x1e8, 0x9403, 0x0, 0x0, 0x2c0, 0x2d8, 0x3d8, 0x3d8, 0x2d8, 0x3d8, 0x3, 0x0, {[{{@ipv6={@remote, @local, [0xffffffff, 0xff, 0xffffff00, 0xffffffff], [0xffffff00, 0xff000000, 0xffffffff, 0xffffffff], 'erspan0\x00', 'veth0_to_hsr\x00', {0xff}, {}, 0x2f, 0x3, 0x1, 0x7f}, 0x0, 0x1c8, 0x1e8, 0x0, {}, [@common=@inet=@dscp={{0x28}, {0x9, 0x1}}, @common=@inet=@recent0={{0xf8}, {0x0, 0x8, 0x1, 0x0, 'syz0\x00'}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0xf0}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x11000, 0x0, 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x408) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/power/pm_debug_messages', 0x88001, 0x0) 20:06:22 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) bpf$ITER_CREATE(0x21, &(0x7f00000002c0), 0x8) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000280)) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000040)={0xffffffffffffffff}, 0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x1b, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0xc0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) close(r1) socketpair(0x1, 0x1, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89a0, &(0x7f0000000000)='&@[\x00') perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89a1, &(0x7f0000000680)='&@[\x00') openat$cgroup(0xffffffffffffffff, &(0x7f0000000180)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='cpuset.effective_mems\x00', 0x0, 0x0) 20:06:22 executing program 5: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4000, 0xffffffffffffffff}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz1\x00', 0x1ff) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=ANY=[@ANYBLOB="380000000d0601040000000000000000000000000500010006000000050005000300000012000300686173683a6e65742c706f72740000004f9fd5a2f4179f8da014cb3666c33ef83874469e971a5e4b874cc862604839043936da70eb12e4cec1621ac38abec2e4192e471edb0f6e181e30f12e48f92197521399cda241c8750e229d3655fa022d50b2c9ba03b1792318054d45a5d3fd662a067f89bae78c01b236f38e3ac4cacd6b76e3a78eb8a7a021c4489f285074b458f9ea4a564c453f417696b81ea3b8f1d4d7277dc24ac113c91ea096e05ec5a4996648fb5886dfd109754ab1df27cbe3b2a3140964ff3cb712347c774d7da8bd9de9a7c963c1aae45f6807f0dfd43955b596c182181ae7"], 0x38}}, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaa0086dd60932b1c00142b00fe80000000000000000000c943c38d1ebe87459ce800000000bbfe8000000000000000000000000000aa0000003a", @ANYRES32=0x41424344, @ANYRES64=r0], 0x0) r1 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, r1) syz_open_dev$ttys(0xc, 0x2, 0x1) readv(r0, &(0x7f0000000100)=[{&(0x7f0000000480)=""/246, 0xf6}, {&(0x7f0000000580)=""/204, 0xcc}, {&(0x7f0000000780)=""/251, 0xfb}], 0x3) r2 = syz_open_dev$ttys(0xc, 0x2, 0x1) ioctl$TIOCSPTLCK(r2, 0x5414, &(0x7f0000000000)=0x1) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/power/pm_debug_messages', 0x288401, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r3, 0xc0189374, &(0x7f0000000040)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r2, @ANYBLOB="e6140000000000002e16af696c653000"]) ioctl$TCSETS2(r4, 0x402c542b, &(0x7f00000000c0)={0x5, 0x9, 0x135, 0xffffffff, 0x0, "1db8a98d1924fa2471f348b7c0214bbaf41102", 0x51, 0x9}) write$binfmt_misc(r3, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0x4) ioctl$TIOCVHANGUP(r3, 0x5437, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = socket(0xa, 0x3, 0x3a) setsockopt$MRT6_ADD_MFC(r6, 0x29, 0xd3, &(0x7f0000000080)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @mcast2}}, 0x5c) setsockopt$inet6_tcp_int(r6, 0x6, 0x10, &(0x7f0000000000)=0x20, 0x4) r7 = fcntl$dupfd(r6, 0x406, r6) r8 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r8, &(0x7f0000000080), 0x10) r9 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r9, 0x8933, &(0x7f0000000040)={'vcan0\x00', 0x0}) sendmsg$can_bcm(r8, &(0x7f0000000280)={&(0x7f0000000000)={0x1d, r10}, 0x10, &(0x7f0000000200)={&(0x7f00000002c0)={0x2, 0x11, 0x0, {0x0, 0x2710}, {}, {}, 0x300, @can={{0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, "f5813f23b5e6b9b1"}}, 0x48}, 0x1, 0x0, 0x0, 0x4040800}, 0x0) setsockopt$MRT6_ADD_MIF(r7, 0x29, 0xcb, &(0x7f0000000040)={0x0, 0x0, 0x7f, r10, 0x1}, 0xc) setsockopt$IP6T_SO_SET_REPLACE(r5, 0x29, 0x40, &(0x7f0000000b40)=@raw={'raw\x00', 0x3c1, 0x3, 0x3a8, 0x1e8, 0x9403, 0x0, 0x0, 0x2c0, 0x2d8, 0x3d8, 0x3d8, 0x2d8, 0x3d8, 0x3, 0x0, {[{{@ipv6={@remote, @local, [0xffffffff, 0xff, 0xffffff00, 0xffffffff], [0xffffff00, 0xff000000, 0xffffffff, 0xffffffff], 'erspan0\x00', 'veth0_to_hsr\x00', {0xff}, {}, 0x2f, 0x3, 0x1, 0x7f}, 0x0, 0x1c8, 0x1e8, 0x0, {}, [@common=@inet=@dscp={{0x28}, {0x9, 0x1}}, @common=@inet=@recent0={{0xf8}, {0x0, 0x8, 0x1, 0x0, 'syz0\x00'}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0xf0}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x11000, 0x0, 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x408) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/power/pm_debug_messages', 0x88001, 0x0) 20:06:22 executing program 4: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4000, 0xffffffffffffffff}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz1\x00', 0x1ff) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x38}}, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaa0086dd60932b1c00142b00fe80000000000000000000c943c38d1ebe87459ce800000000bbfe8000000000000000000000000000aa0000003a", @ANYRES32=0x41424344, @ANYRES64=r0], 0x0) r1 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, r1) syz_open_dev$ttys(0xc, 0x2, 0x1) readv(r0, &(0x7f0000000100)=[{&(0x7f0000000480)=""/246, 0xf6}, {&(0x7f0000000580)=""/204, 0xcc}, {&(0x7f0000000780)=""/251, 0xfb}], 0x3) r2 = syz_open_dev$ttys(0xc, 0x2, 0x1) ioctl$TIOCSPTLCK(r2, 0x5414, &(0x7f0000000000)=0x1) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/power/pm_debug_messages', 0x288401, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r3, 0xc0189374, &(0x7f0000000040)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r2, @ANYBLOB="e6140000000000002e16af696c653000"]) ioctl$TCSETS2(r4, 0x402c542b, &(0x7f00000000c0)={0x5, 0x9, 0x135, 0xffffffff, 0x0, "1db8a98d1924fa2471f348b7c0214bbaf41102", 0x51, 0x9}) write$binfmt_misc(r3, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0x4) ioctl$TIOCVHANGUP(r3, 0x5437, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = socket(0xa, 0x3, 0x3a) setsockopt$MRT6_ADD_MFC(r6, 0x29, 0xd3, &(0x7f0000000080)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @mcast2}}, 0x5c) setsockopt$inet6_tcp_int(r6, 0x6, 0x10, &(0x7f0000000000)=0x20, 0x4) r7 = fcntl$dupfd(r6, 0x406, r6) r8 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r8, &(0x7f0000000080), 0x10) r9 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r9, 0x8933, &(0x7f0000000040)={'vcan0\x00', 0x0}) sendmsg$can_bcm(r8, &(0x7f0000000280)={&(0x7f0000000000)={0x1d, r10}, 0x10, &(0x7f0000000200)={&(0x7f00000002c0)={0x2, 0x11, 0x0, {0x0, 0x2710}, {}, {}, 0x300, @can={{0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, "f5813f23b5e6b9b1"}}, 0x48}, 0x1, 0x0, 0x0, 0x4040800}, 0x0) setsockopt$MRT6_ADD_MIF(r7, 0x29, 0xcb, &(0x7f0000000040)={0x0, 0x0, 0x7f, r10, 0x1}, 0xc) setsockopt$IP6T_SO_SET_REPLACE(r5, 0x29, 0x40, &(0x7f0000000b40)=@raw={'raw\x00', 0x3c1, 0x3, 0x3a8, 0x1e8, 0x9403, 0x0, 0x0, 0x2c0, 0x2d8, 0x3d8, 0x3d8, 0x2d8, 0x3d8, 0x3, 0x0, {[{{@ipv6={@remote, @local, [0xffffffff, 0xff, 0xffffff00, 0xffffffff], [0xffffff00, 0xff000000, 0xffffffff, 0xffffffff], 'erspan0\x00', 'veth0_to_hsr\x00', {0xff}, {}, 0x2f, 0x3, 0x1, 0x7f}, 0x0, 0x1c8, 0x1e8, 0x0, {}, [@common=@inet=@dscp={{0x28}, {0x9, 0x1}}, @common=@inet=@recent0={{0xf8}, {0x0, 0x8, 0x1, 0x0, 'syz0\x00'}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0xf0}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x11000, 0x0, 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x408) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/power/pm_debug_messages', 0x88001, 0x0) 20:06:22 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='devtmpfs\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) getdents64(r0, 0x0, 0x0) lseek(r0, 0x0, 0x0) 20:06:22 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.current\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000005c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = socket$rds(0x15, 0x5, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000006ffc), 0xe50fb6c50bc849c9) bind$rds(r1, &(0x7f0000000040)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r1, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, 0x0, 0x0, &(0x7f0000000780)=[@rdma_args={0x48, 0x114, 0x1, {{}, {0x0, 0x2c}, &(0x7f00000006c0)=[{&(0x7f0000000100)=""/44, 0x410200}], 0x1}}], 0x48}, 0x0) 20:06:22 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200), 0x43400) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_subtree(r1, &(0x7f0000000040)=ANY=[], 0x32600) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0xc028660f, &(0x7f00000003c0)=0x400000004) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x7) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='cgroup.controllers\x00', 0x100002, 0x0) r3 = perf_event_open(&(0x7f00000004c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000400)=0x8001) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0xc028660f, &(0x7f00000005c0)=0x3fffffffe) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[], 0x1f007) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[], 0x1f007) perf_event_open$cgroup(&(0x7f00000002c0)={0x1, 0x80, 0x20, 0x3, 0x1, 0x3, 0x0, 0x7fffffffffffffff, 0x401, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x20, 0x0, @perf_bp={&(0x7f0000000040), 0x1}, 0x929, 0x46b, 0xfff, 0x9, 0x51, 0xffff, 0x7ff, 0x0, 0x1, 0x0, 0x64c}, r4, 0x2, 0xffffffffffffffff, 0x2) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x3, 0x0, 0x4, 0x3}, 0x48) 20:06:22 executing program 5: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4000, 0xffffffffffffffff}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz1\x00', 0x1ff) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x38}}, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaa0086dd60932b1c00142b00fe80000000000000000000c943c38d1ebe87459ce800000000bbfe8000000000000000000000000000aa0000003a", @ANYRES32=0x41424344, @ANYRES64=r0], 0x0) r1 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, r1) syz_open_dev$ttys(0xc, 0x2, 0x1) readv(r0, &(0x7f0000000100)=[{&(0x7f0000000480)=""/246, 0xf6}, {&(0x7f0000000580)=""/204, 0xcc}, {&(0x7f0000000780)=""/251, 0xfb}], 0x3) r2 = syz_open_dev$ttys(0xc, 0x2, 0x1) ioctl$TIOCSPTLCK(r2, 0x5414, &(0x7f0000000000)=0x1) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/power/pm_debug_messages', 0x288401, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r3, 0xc0189374, &(0x7f0000000040)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r2, @ANYBLOB="e6140000000000002e16af696c653000"]) ioctl$TCSETS2(r4, 0x402c542b, &(0x7f00000000c0)={0x5, 0x9, 0x135, 0xffffffff, 0x0, "1db8a98d1924fa2471f348b7c0214bbaf41102", 0x51, 0x9}) write$binfmt_misc(r3, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0x4) ioctl$TIOCVHANGUP(r3, 0x5437, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = socket(0xa, 0x3, 0x3a) setsockopt$MRT6_ADD_MFC(r6, 0x29, 0xd3, &(0x7f0000000080)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @mcast2}}, 0x5c) setsockopt$inet6_tcp_int(r6, 0x6, 0x10, &(0x7f0000000000)=0x20, 0x4) r7 = fcntl$dupfd(r6, 0x406, r6) r8 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r8, &(0x7f0000000080), 0x10) r9 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r9, 0x8933, &(0x7f0000000040)={'vcan0\x00', 0x0}) sendmsg$can_bcm(r8, &(0x7f0000000280)={&(0x7f0000000000)={0x1d, r10}, 0x10, &(0x7f0000000200)={&(0x7f00000002c0)={0x2, 0x11, 0x0, {0x0, 0x2710}, {}, {}, 0x300, @can={{0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, "f5813f23b5e6b9b1"}}, 0x48}, 0x1, 0x0, 0x0, 0x4040800}, 0x0) setsockopt$MRT6_ADD_MIF(r7, 0x29, 0xcb, &(0x7f0000000040)={0x0, 0x0, 0x7f, r10, 0x1}, 0xc) setsockopt$IP6T_SO_SET_REPLACE(r5, 0x29, 0x40, &(0x7f0000000b40)=@raw={'raw\x00', 0x3c1, 0x3, 0x3a8, 0x1e8, 0x9403, 0x0, 0x0, 0x2c0, 0x2d8, 0x3d8, 0x3d8, 0x2d8, 0x3d8, 0x3, 0x0, {[{{@ipv6={@remote, @local, [0xffffffff, 0xff, 0xffffff00, 0xffffffff], [0xffffff00, 0xff000000, 0xffffffff, 0xffffffff], 'erspan0\x00', 'veth0_to_hsr\x00', {0xff}, {}, 0x2f, 0x3, 0x1, 0x7f}, 0x0, 0x1c8, 0x1e8, 0x0, {}, [@common=@inet=@dscp={{0x28}, {0x9, 0x1}}, @common=@inet=@recent0={{0xf8}, {0x0, 0x8, 0x1, 0x0, 'syz0\x00'}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0xf0}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x11000, 0x0, 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x408) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/power/pm_debug_messages', 0x88001, 0x0) [ 356.263696] xt_CT: netfilter: NOTRACK target is deprecated, use CT instead or upgrade iptables 20:06:22 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) bpf$ITER_CREATE(0x21, &(0x7f00000002c0), 0x8) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000280)) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000040)={0xffffffffffffffff}, 0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x1b, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0xc0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) close(r1) socketpair(0x1, 0x1, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89a0, &(0x7f0000000000)='&@[\x00') perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89a1, &(0x7f0000000680)='&@[\x00') openat$cgroup(0xffffffffffffffff, &(0x7f0000000180)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='cpuset.effective_mems\x00', 0x0, 0x0) 20:06:22 executing program 4: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4000, 0xffffffffffffffff}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz1\x00', 0x1ff) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x38}}, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaa0086dd60932b1c00142b00fe80000000000000000000c943c38d1ebe87459ce800000000bbfe8000000000000000000000000000aa0000003a", @ANYRES32=0x41424344, @ANYRES64=r0], 0x0) r1 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, r1) syz_open_dev$ttys(0xc, 0x2, 0x1) readv(r0, &(0x7f0000000100)=[{&(0x7f0000000480)=""/246, 0xf6}, {&(0x7f0000000580)=""/204, 0xcc}, {&(0x7f0000000780)=""/251, 0xfb}], 0x3) r2 = syz_open_dev$ttys(0xc, 0x2, 0x1) ioctl$TIOCSPTLCK(r2, 0x5414, &(0x7f0000000000)=0x1) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/power/pm_debug_messages', 0x288401, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r3, 0xc0189374, &(0x7f0000000040)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r2, @ANYBLOB="e6140000000000002e16af696c653000"]) ioctl$TCSETS2(r4, 0x402c542b, &(0x7f00000000c0)={0x5, 0x9, 0x135, 0xffffffff, 0x0, "1db8a98d1924fa2471f348b7c0214bbaf41102", 0x51, 0x9}) write$binfmt_misc(r3, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0x4) ioctl$TIOCVHANGUP(r3, 0x5437, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = socket(0xa, 0x3, 0x3a) setsockopt$MRT6_ADD_MFC(r6, 0x29, 0xd3, &(0x7f0000000080)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @mcast2}}, 0x5c) setsockopt$inet6_tcp_int(r6, 0x6, 0x10, &(0x7f0000000000)=0x20, 0x4) r7 = fcntl$dupfd(r6, 0x406, r6) r8 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r8, &(0x7f0000000080), 0x10) r9 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r9, 0x8933, &(0x7f0000000040)={'vcan0\x00', 0x0}) sendmsg$can_bcm(r8, &(0x7f0000000280)={&(0x7f0000000000)={0x1d, r10}, 0x10, &(0x7f0000000200)={&(0x7f00000002c0)={0x2, 0x11, 0x0, {0x0, 0x2710}, {}, {}, 0x300, @can={{0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, "f5813f23b5e6b9b1"}}, 0x48}, 0x1, 0x0, 0x0, 0x4040800}, 0x0) setsockopt$MRT6_ADD_MIF(r7, 0x29, 0xcb, &(0x7f0000000040)={0x0, 0x0, 0x7f, r10, 0x1}, 0xc) setsockopt$IP6T_SO_SET_REPLACE(r5, 0x29, 0x40, &(0x7f0000000b40)=@raw={'raw\x00', 0x3c1, 0x3, 0x3a8, 0x1e8, 0x9403, 0x0, 0x0, 0x2c0, 0x2d8, 0x3d8, 0x3d8, 0x2d8, 0x3d8, 0x3, 0x0, {[{{@ipv6={@remote, @local, [0xffffffff, 0xff, 0xffffff00, 0xffffffff], [0xffffff00, 0xff000000, 0xffffffff, 0xffffffff], 'erspan0\x00', 'veth0_to_hsr\x00', {0xff}, {}, 0x2f, 0x3, 0x1, 0x7f}, 0x0, 0x1c8, 0x1e8, 0x0, {}, [@common=@inet=@dscp={{0x28}, {0x9, 0x1}}, @common=@inet=@recent0={{0xf8}, {0x0, 0x8, 0x1, 0x0, 'syz0\x00'}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0xf0}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x11000, 0x0, 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x408) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/power/pm_debug_messages', 0x88001, 0x0) 20:06:22 executing program 2: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4000, 0xffffffffffffffff}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz1\x00', 0x1ff) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x38}}, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaa0086dd60932b1c00142b00fe80000000000000000000c943c38d1ebe87459ce800000000bbfe8000000000000000000000000000aa0000003a", @ANYRES32=0x41424344, @ANYRES64=r0], 0x0) r1 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, r1) syz_open_dev$ttys(0xc, 0x2, 0x1) readv(r0, &(0x7f0000000100)=[{&(0x7f0000000480)=""/246, 0xf6}, {&(0x7f0000000580)=""/204, 0xcc}, {&(0x7f0000000780)=""/251, 0xfb}], 0x3) r2 = syz_open_dev$ttys(0xc, 0x2, 0x1) ioctl$TIOCSPTLCK(r2, 0x5414, &(0x7f0000000000)=0x1) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/power/pm_debug_messages', 0x288401, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r3, 0xc0189374, &(0x7f0000000040)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r2, @ANYBLOB="e6140000000000002e16af696c653000"]) ioctl$TCSETS2(r4, 0x402c542b, &(0x7f00000000c0)={0x5, 0x9, 0x135, 0xffffffff, 0x0, "1db8a98d1924fa2471f348b7c0214bbaf41102", 0x51, 0x9}) write$binfmt_misc(r3, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0x4) ioctl$TIOCVHANGUP(r3, 0x5437, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = socket(0xa, 0x3, 0x3a) setsockopt$MRT6_ADD_MFC(r6, 0x29, 0xd3, &(0x7f0000000080)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @mcast2}}, 0x5c) setsockopt$inet6_tcp_int(r6, 0x6, 0x10, &(0x7f0000000000)=0x20, 0x4) r7 = fcntl$dupfd(r6, 0x406, r6) r8 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r8, &(0x7f0000000080), 0x10) r9 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r9, 0x8933, &(0x7f0000000040)={'vcan0\x00', 0x0}) sendmsg$can_bcm(r8, &(0x7f0000000280)={&(0x7f0000000000)={0x1d, r10}, 0x10, &(0x7f0000000200)={&(0x7f00000002c0)={0x2, 0x11, 0x0, {0x0, 0x2710}, {}, {}, 0x300, @can={{0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, "f5813f23b5e6b9b1"}}, 0x48}, 0x1, 0x0, 0x0, 0x4040800}, 0x0) setsockopt$MRT6_ADD_MIF(r7, 0x29, 0xcb, &(0x7f0000000040)={0x0, 0x0, 0x7f, r10, 0x1}, 0xc) setsockopt$IP6T_SO_SET_REPLACE(r5, 0x29, 0x40, &(0x7f0000000b40)=@raw={'raw\x00', 0x3c1, 0x3, 0x3a8, 0x1e8, 0x9403, 0x0, 0x0, 0x2c0, 0x2d8, 0x3d8, 0x3d8, 0x2d8, 0x3d8, 0x3, 0x0, {[{{@ipv6={@remote, @local, [0xffffffff, 0xff, 0xffffff00, 0xffffffff], [0xffffff00, 0xff000000, 0xffffffff, 0xffffffff], 'erspan0\x00', 'veth0_to_hsr\x00', {0xff}, {}, 0x2f, 0x3, 0x1, 0x7f}, 0x0, 0x1c8, 0x1e8, 0x0, {}, [@common=@inet=@dscp={{0x28}, {0x9, 0x1}}, @common=@inet=@recent0={{0xf8}, {0x0, 0x8, 0x1, 0x0, 'syz0\x00'}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0xf0}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x11000, 0x0, 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x408) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/power/pm_debug_messages', 0x88001, 0x0) 20:06:23 executing program 5: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4000, 0xffffffffffffffff}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz1\x00', 0x1ff) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=ANY=[@ANYBLOB="380000000d0601040000000000000000000000000500010006000000050005000300000012000300686173683a6e65742c706f72740000004f9fd5a2f4179f8da014cb3666c33ef83874469e971a5e4b874cc862604839043936da70eb12e4cec1621ac38abec2e4192e471edb0f6e181e30f12e48f92197521399cda241c8750e229d3655fa022d50b2c9ba03b1792318054d45a5d3fd662a067f89bae78c01b236f38e3ac4cacd6b76e3a78eb8a7a021c4489f285074b458f9ea4a564c453f417696b81ea3b8f1d4d7277dc24ac113c91ea096e05ec5a4996648fb5886dfd109754ab1df27cbe3b2a3140964ff3cb712347c774d7da8bd9de9a7c963c1aae45f6807f0dfd43955b596c182181ae7"], 0x38}}, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaa0086dd60932b1c00142b00fe80000000000000000000c943c38d1ebe87459ce800000000bbfe8000000000000000000000000000aa0000003a", @ANYRES32=0x41424344, @ANYRES64=r0], 0x0) r1 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, r1) syz_open_dev$ttys(0xc, 0x2, 0x1) readv(r0, &(0x7f0000000100)=[{&(0x7f0000000480)=""/246, 0xf6}, {&(0x7f0000000580)=""/204, 0xcc}, {&(0x7f0000000780)=""/251, 0xfb}], 0x3) r2 = syz_open_dev$ttys(0xc, 0x2, 0x1) ioctl$TIOCSPTLCK(r2, 0x5414, &(0x7f0000000000)=0x1) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/power/pm_debug_messages', 0x288401, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r3, 0xc0189374, &(0x7f0000000040)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r2, @ANYBLOB="e6140000000000002e16af696c653000"]) ioctl$TCSETS2(r4, 0x402c542b, &(0x7f00000000c0)={0x5, 0x9, 0x135, 0xffffffff, 0x0, "1db8a98d1924fa2471f348b7c0214bbaf41102", 0x51, 0x9}) write$binfmt_misc(r3, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0x4) ioctl$TIOCVHANGUP(r3, 0x5437, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = socket(0xa, 0x3, 0x3a) setsockopt$MRT6_ADD_MFC(r6, 0x29, 0xd3, &(0x7f0000000080)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @mcast2}}, 0x5c) setsockopt$inet6_tcp_int(r6, 0x6, 0x10, &(0x7f0000000000)=0x20, 0x4) r7 = fcntl$dupfd(r6, 0x406, r6) r8 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r8, &(0x7f0000000080), 0x10) r9 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r9, 0x8933, &(0x7f0000000040)={'vcan0\x00', 0x0}) sendmsg$can_bcm(r8, &(0x7f0000000280)={&(0x7f0000000000)={0x1d, r10}, 0x10, &(0x7f0000000200)={&(0x7f00000002c0)={0x2, 0x11, 0x0, {0x0, 0x2710}, {}, {}, 0x300, @can={{0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, "f5813f23b5e6b9b1"}}, 0x48}, 0x1, 0x0, 0x0, 0x4040800}, 0x0) setsockopt$MRT6_ADD_MIF(r7, 0x29, 0xcb, &(0x7f0000000040)={0x0, 0x0, 0x7f, r10, 0x1}, 0xc) setsockopt$IP6T_SO_SET_REPLACE(r5, 0x29, 0x40, &(0x7f0000000b40)=@raw={'raw\x00', 0x3c1, 0x3, 0x3a8, 0x1e8, 0x9403, 0x0, 0x0, 0x2c0, 0x2d8, 0x3d8, 0x3d8, 0x2d8, 0x3d8, 0x3, 0x0, {[{{@ipv6={@remote, @local, [0xffffffff, 0xff, 0xffffff00, 0xffffffff], [0xffffff00, 0xff000000, 0xffffffff, 0xffffffff], 'erspan0\x00', 'veth0_to_hsr\x00', {0xff}, {}, 0x2f, 0x3, 0x1, 0x7f}, 0x0, 0x1c8, 0x1e8, 0x0, {}, [@common=@inet=@dscp={{0x28}, {0x9, 0x1}}, @common=@inet=@recent0={{0xf8}, {0x0, 0x8, 0x1, 0x0, 'syz0\x00'}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0xf0}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x11000, 0x0, 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x408) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/power/pm_debug_messages', 0x88001, 0x0) 20:06:23 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.current\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000005c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = socket$rds(0x15, 0x5, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000006ffc), 0xe50fb6c50bc849c9) bind$rds(r1, &(0x7f0000000040)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r1, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, 0x0, 0x0, &(0x7f0000000780)=[@rdma_args={0x48, 0x114, 0x1, {{}, {0x0, 0x2c}, &(0x7f00000006c0)=[{&(0x7f0000000100)=""/44, 0x410200}], 0x1}}], 0x48}, 0x0) 20:06:23 executing program 0: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4000, 0xffffffffffffffff}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz1\x00', 0x1ff) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x38}}, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaa0086dd60932b1c00142b00fe80000000000000000000c943c38d1ebe87459ce800000000bbfe8000000000000000000000000000aa0000003a", @ANYRES32=0x41424344, @ANYRES64=r0], 0x0) r1 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, r1) syz_open_dev$ttys(0xc, 0x2, 0x1) readv(r0, &(0x7f0000000100)=[{&(0x7f0000000480)=""/246, 0xf6}, {&(0x7f0000000580)=""/204, 0xcc}, {&(0x7f0000000780)=""/251, 0xfb}], 0x3) r2 = syz_open_dev$ttys(0xc, 0x2, 0x1) ioctl$TIOCSPTLCK(r2, 0x5414, &(0x7f0000000000)=0x1) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/power/pm_debug_messages', 0x288401, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r3, 0xc0189374, &(0x7f0000000040)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r2, @ANYBLOB="e6140000000000002e16af696c653000"]) ioctl$TCSETS2(r4, 0x402c542b, &(0x7f00000000c0)={0x5, 0x9, 0x135, 0xffffffff, 0x0, "1db8a98d1924fa2471f348b7c0214bbaf41102", 0x51, 0x9}) write$binfmt_misc(r3, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0x4) ioctl$TIOCVHANGUP(r3, 0x5437, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = socket(0xa, 0x3, 0x3a) setsockopt$MRT6_ADD_MFC(r6, 0x29, 0xd3, &(0x7f0000000080)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @mcast2}}, 0x5c) setsockopt$inet6_tcp_int(r6, 0x6, 0x10, &(0x7f0000000000)=0x20, 0x4) r7 = fcntl$dupfd(r6, 0x406, r6) r8 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r8, &(0x7f0000000080), 0x10) r9 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r9, 0x8933, &(0x7f0000000040)={'vcan0\x00', 0x0}) sendmsg$can_bcm(r8, &(0x7f0000000280)={&(0x7f0000000000)={0x1d, r10}, 0x10, &(0x7f0000000200)={&(0x7f00000002c0)={0x2, 0x11, 0x0, {0x0, 0x2710}, {}, {}, 0x300, @can={{0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, "f5813f23b5e6b9b1"}}, 0x48}, 0x1, 0x0, 0x0, 0x4040800}, 0x0) setsockopt$MRT6_ADD_MIF(r7, 0x29, 0xcb, &(0x7f0000000040)={0x0, 0x0, 0x7f, r10, 0x1}, 0xc) setsockopt$IP6T_SO_SET_REPLACE(r5, 0x29, 0x40, &(0x7f0000000b40)=@raw={'raw\x00', 0x3c1, 0x3, 0x3a8, 0x1e8, 0x9403, 0x0, 0x0, 0x2c0, 0x2d8, 0x3d8, 0x3d8, 0x2d8, 0x3d8, 0x3, 0x0, {[{{@ipv6={@remote, @local, [0xffffffff, 0xff, 0xffffff00, 0xffffffff], [0xffffff00, 0xff000000, 0xffffffff, 0xffffffff], 'erspan0\x00', 'veth0_to_hsr\x00', {0xff}, {}, 0x2f, 0x3, 0x1, 0x7f}, 0x0, 0x1c8, 0x1e8, 0x0, {}, [@common=@inet=@dscp={{0x28}, {0x9, 0x1}}, @common=@inet=@recent0={{0xf8}, {0x0, 0x8, 0x1, 0x0, 'syz0\x00'}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0xf0}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x11000, 0x0, 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x408) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/power/pm_debug_messages', 0x88001, 0x0) 20:06:23 executing program 4: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4000, 0xffffffffffffffff}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz1\x00', 0x1ff) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x38}}, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaa0086dd60932b1c00142b00fe80000000000000000000c943c38d1ebe87459ce800000000bbfe8000000000000000000000000000aa0000003a", @ANYRES32=0x41424344, @ANYRES64=r0], 0x0) r1 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, r1) syz_open_dev$ttys(0xc, 0x2, 0x1) readv(r0, &(0x7f0000000100)=[{&(0x7f0000000480)=""/246, 0xf6}, {&(0x7f0000000580)=""/204, 0xcc}, {&(0x7f0000000780)=""/251, 0xfb}], 0x3) r2 = syz_open_dev$ttys(0xc, 0x2, 0x1) ioctl$TIOCSPTLCK(r2, 0x5414, &(0x7f0000000000)=0x1) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/power/pm_debug_messages', 0x288401, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r3, 0xc0189374, &(0x7f0000000040)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r2, @ANYBLOB="e6140000000000002e16af696c653000"]) ioctl$TCSETS2(r4, 0x402c542b, &(0x7f00000000c0)={0x5, 0x9, 0x135, 0xffffffff, 0x0, "1db8a98d1924fa2471f348b7c0214bbaf41102", 0x51, 0x9}) write$binfmt_misc(r3, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0x4) ioctl$TIOCVHANGUP(r3, 0x5437, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = socket(0xa, 0x3, 0x3a) setsockopt$MRT6_ADD_MFC(r6, 0x29, 0xd3, &(0x7f0000000080)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @mcast2}}, 0x5c) setsockopt$inet6_tcp_int(r6, 0x6, 0x10, &(0x7f0000000000)=0x20, 0x4) r7 = fcntl$dupfd(r6, 0x406, r6) r8 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r8, &(0x7f0000000080), 0x10) r9 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r9, 0x8933, &(0x7f0000000040)={'vcan0\x00', 0x0}) sendmsg$can_bcm(r8, &(0x7f0000000280)={&(0x7f0000000000)={0x1d, r10}, 0x10, &(0x7f0000000200)={&(0x7f00000002c0)={0x2, 0x11, 0x0, {0x0, 0x2710}, {}, {}, 0x300, @can={{0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, "f5813f23b5e6b9b1"}}, 0x48}, 0x1, 0x0, 0x0, 0x4040800}, 0x0) setsockopt$MRT6_ADD_MIF(r7, 0x29, 0xcb, &(0x7f0000000040)={0x0, 0x0, 0x7f, r10, 0x1}, 0xc) setsockopt$IP6T_SO_SET_REPLACE(r5, 0x29, 0x40, &(0x7f0000000b40)=@raw={'raw\x00', 0x3c1, 0x3, 0x3a8, 0x1e8, 0x9403, 0x0, 0x0, 0x2c0, 0x2d8, 0x3d8, 0x3d8, 0x2d8, 0x3d8, 0x3, 0x0, {[{{@ipv6={@remote, @local, [0xffffffff, 0xff, 0xffffff00, 0xffffffff], [0xffffff00, 0xff000000, 0xffffffff, 0xffffffff], 'erspan0\x00', 'veth0_to_hsr\x00', {0xff}, {}, 0x2f, 0x3, 0x1, 0x7f}, 0x0, 0x1c8, 0x1e8, 0x0, {}, [@common=@inet=@dscp={{0x28}, {0x9, 0x1}}, @common=@inet=@recent0={{0xf8}, {0x0, 0x8, 0x1, 0x0, 'syz0\x00'}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0xf0}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x11000, 0x0, 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x408) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/power/pm_debug_messages', 0x88001, 0x0) [ 356.651123] xt_CT: netfilter: NOTRACK target is deprecated, use CT instead or upgrade iptables 20:06:23 executing program 5: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4000, 0xffffffffffffffff}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz1\x00', 0x1ff) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x38}}, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaa0086dd60932b1c00142b00fe80000000000000000000c943c38d1ebe87459ce800000000bbfe8000000000000000000000000000aa0000003a", @ANYRES32=0x41424344, @ANYRES64=r0], 0x0) r1 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, r1) syz_open_dev$ttys(0xc, 0x2, 0x1) readv(r0, &(0x7f0000000100)=[{&(0x7f0000000480)=""/246, 0xf6}, {&(0x7f0000000580)=""/204, 0xcc}, {&(0x7f0000000780)=""/251, 0xfb}], 0x3) r2 = syz_open_dev$ttys(0xc, 0x2, 0x1) ioctl$TIOCSPTLCK(r2, 0x5414, &(0x7f0000000000)=0x1) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/power/pm_debug_messages', 0x288401, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r3, 0xc0189374, &(0x7f0000000040)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r2, @ANYBLOB="e6140000000000002e16af696c653000"]) ioctl$TCSETS2(r4, 0x402c542b, &(0x7f00000000c0)={0x5, 0x9, 0x135, 0xffffffff, 0x0, "1db8a98d1924fa2471f348b7c0214bbaf41102", 0x51, 0x9}) write$binfmt_misc(r3, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0x4) ioctl$TIOCVHANGUP(r3, 0x5437, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = socket(0xa, 0x3, 0x3a) setsockopt$MRT6_ADD_MFC(r6, 0x29, 0xd3, &(0x7f0000000080)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @mcast2}}, 0x5c) setsockopt$inet6_tcp_int(r6, 0x6, 0x10, &(0x7f0000000000)=0x20, 0x4) r7 = fcntl$dupfd(r6, 0x406, r6) r8 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r8, &(0x7f0000000080), 0x10) r9 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r9, 0x8933, &(0x7f0000000040)={'vcan0\x00', 0x0}) sendmsg$can_bcm(r8, &(0x7f0000000280)={&(0x7f0000000000)={0x1d, r10}, 0x10, &(0x7f0000000200)={&(0x7f00000002c0)={0x2, 0x11, 0x0, {0x0, 0x2710}, {}, {}, 0x300, @can={{0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, "f5813f23b5e6b9b1"}}, 0x48}, 0x1, 0x0, 0x0, 0x4040800}, 0x0) setsockopt$MRT6_ADD_MIF(r7, 0x29, 0xcb, &(0x7f0000000040)={0x0, 0x0, 0x7f, r10, 0x1}, 0xc) setsockopt$IP6T_SO_SET_REPLACE(r5, 0x29, 0x40, &(0x7f0000000b40)=@raw={'raw\x00', 0x3c1, 0x3, 0x3a8, 0x1e8, 0x9403, 0x0, 0x0, 0x2c0, 0x2d8, 0x3d8, 0x3d8, 0x2d8, 0x3d8, 0x3, 0x0, {[{{@ipv6={@remote, @local, [0xffffffff, 0xff, 0xffffff00, 0xffffffff], [0xffffff00, 0xff000000, 0xffffffff, 0xffffffff], 'erspan0\x00', 'veth0_to_hsr\x00', {0xff}, {}, 0x2f, 0x3, 0x1, 0x7f}, 0x0, 0x1c8, 0x1e8, 0x0, {}, [@common=@inet=@dscp={{0x28}, {0x9, 0x1}}, @common=@inet=@recent0={{0xf8}, {0x0, 0x8, 0x1, 0x0, 'syz0\x00'}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0xf0}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x11000, 0x0, 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x408) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/power/pm_debug_messages', 0x88001, 0x0) [ 356.699084] xt_CT: netfilter: NOTRACK target is deprecated, use CT instead or upgrade iptables 20:06:23 executing program 0: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4000, 0xffffffffffffffff}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz1\x00', 0x1ff) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x38}}, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaa0086dd60932b1c00142b00fe80000000000000000000c943c38d1ebe87459ce800000000bbfe8000000000000000000000000000aa0000003a", @ANYRES32=0x41424344, @ANYRES64=r0], 0x0) r1 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, r1) syz_open_dev$ttys(0xc, 0x2, 0x1) readv(r0, &(0x7f0000000100)=[{&(0x7f0000000480)=""/246, 0xf6}, {&(0x7f0000000580)=""/204, 0xcc}, {&(0x7f0000000780)=""/251, 0xfb}], 0x3) r2 = syz_open_dev$ttys(0xc, 0x2, 0x1) ioctl$TIOCSPTLCK(r2, 0x5414, &(0x7f0000000000)=0x1) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/power/pm_debug_messages', 0x288401, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r3, 0xc0189374, &(0x7f0000000040)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r2, @ANYBLOB="e6140000000000002e16af696c653000"]) ioctl$TCSETS2(r4, 0x402c542b, &(0x7f00000000c0)={0x5, 0x9, 0x135, 0xffffffff, 0x0, "1db8a98d1924fa2471f348b7c0214bbaf41102", 0x51, 0x9}) write$binfmt_misc(r3, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0x4) ioctl$TIOCVHANGUP(r3, 0x5437, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = socket(0xa, 0x3, 0x3a) setsockopt$MRT6_ADD_MFC(r6, 0x29, 0xd3, &(0x7f0000000080)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @mcast2}}, 0x5c) setsockopt$inet6_tcp_int(r6, 0x6, 0x10, &(0x7f0000000000)=0x20, 0x4) r7 = fcntl$dupfd(r6, 0x406, r6) r8 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r8, &(0x7f0000000080), 0x10) r9 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r9, 0x8933, &(0x7f0000000040)={'vcan0\x00', 0x0}) sendmsg$can_bcm(r8, &(0x7f0000000280)={&(0x7f0000000000)={0x1d, r10}, 0x10, &(0x7f0000000200)={&(0x7f00000002c0)={0x2, 0x11, 0x0, {0x0, 0x2710}, {}, {}, 0x300, @can={{0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, "f5813f23b5e6b9b1"}}, 0x48}, 0x1, 0x0, 0x0, 0x4040800}, 0x0) setsockopt$MRT6_ADD_MIF(r7, 0x29, 0xcb, &(0x7f0000000040)={0x0, 0x0, 0x7f, r10, 0x1}, 0xc) setsockopt$IP6T_SO_SET_REPLACE(r5, 0x29, 0x40, &(0x7f0000000b40)=@raw={'raw\x00', 0x3c1, 0x3, 0x3a8, 0x1e8, 0x9403, 0x0, 0x0, 0x2c0, 0x2d8, 0x3d8, 0x3d8, 0x2d8, 0x3d8, 0x3, 0x0, {[{{@ipv6={@remote, @local, [0xffffffff, 0xff, 0xffffff00, 0xffffffff], [0xffffff00, 0xff000000, 0xffffffff, 0xffffffff], 'erspan0\x00', 'veth0_to_hsr\x00', {0xff}, {}, 0x2f, 0x3, 0x1, 0x7f}, 0x0, 0x1c8, 0x1e8, 0x0, {}, [@common=@inet=@dscp={{0x28}, {0x9, 0x1}}, @common=@inet=@recent0={{0xf8}, {0x0, 0x8, 0x1, 0x0, 'syz0\x00'}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0xf0}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x11000, 0x0, 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x408) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/power/pm_debug_messages', 0x88001, 0x0) 20:06:23 executing program 2: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4000, 0xffffffffffffffff}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz1\x00', 0x1ff) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x38}}, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaa0086dd60932b1c00142b00fe80000000000000000000c943c38d1ebe87459ce800000000bbfe8000000000000000000000000000aa0000003a", @ANYRES32=0x41424344, @ANYRES64=r0], 0x0) r1 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, r1) syz_open_dev$ttys(0xc, 0x2, 0x1) readv(r0, &(0x7f0000000100)=[{&(0x7f0000000480)=""/246, 0xf6}, {&(0x7f0000000580)=""/204, 0xcc}, {&(0x7f0000000780)=""/251, 0xfb}], 0x3) r2 = syz_open_dev$ttys(0xc, 0x2, 0x1) ioctl$TIOCSPTLCK(r2, 0x5414, &(0x7f0000000000)=0x1) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/power/pm_debug_messages', 0x288401, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r3, 0xc0189374, &(0x7f0000000040)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r2, @ANYBLOB="e6140000000000002e16af696c653000"]) ioctl$TCSETS2(r4, 0x402c542b, &(0x7f00000000c0)={0x5, 0x9, 0x135, 0xffffffff, 0x0, "1db8a98d1924fa2471f348b7c0214bbaf41102", 0x51, 0x9}) write$binfmt_misc(r3, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0x4) ioctl$TIOCVHANGUP(r3, 0x5437, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = socket(0xa, 0x3, 0x3a) setsockopt$MRT6_ADD_MFC(r6, 0x29, 0xd3, &(0x7f0000000080)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @mcast2}}, 0x5c) setsockopt$inet6_tcp_int(r6, 0x6, 0x10, &(0x7f0000000000)=0x20, 0x4) r7 = fcntl$dupfd(r6, 0x406, r6) r8 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r8, &(0x7f0000000080), 0x10) r9 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r9, 0x8933, &(0x7f0000000040)={'vcan0\x00', 0x0}) sendmsg$can_bcm(r8, &(0x7f0000000280)={&(0x7f0000000000)={0x1d, r10}, 0x10, &(0x7f0000000200)={&(0x7f00000002c0)={0x2, 0x11, 0x0, {0x0, 0x2710}, {}, {}, 0x300, @can={{0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, "f5813f23b5e6b9b1"}}, 0x48}, 0x1, 0x0, 0x0, 0x4040800}, 0x0) setsockopt$MRT6_ADD_MIF(r7, 0x29, 0xcb, &(0x7f0000000040)={0x0, 0x0, 0x7f, r10, 0x1}, 0xc) setsockopt$IP6T_SO_SET_REPLACE(r5, 0x29, 0x40, &(0x7f0000000b40)=@raw={'raw\x00', 0x3c1, 0x3, 0x3a8, 0x1e8, 0x9403, 0x0, 0x0, 0x2c0, 0x2d8, 0x3d8, 0x3d8, 0x2d8, 0x3d8, 0x3, 0x0, {[{{@ipv6={@remote, @local, [0xffffffff, 0xff, 0xffffff00, 0xffffffff], [0xffffff00, 0xff000000, 0xffffffff, 0xffffffff], 'erspan0\x00', 'veth0_to_hsr\x00', {0xff}, {}, 0x2f, 0x3, 0x1, 0x7f}, 0x0, 0x1c8, 0x1e8, 0x0, {}, [@common=@inet=@dscp={{0x28}, {0x9, 0x1}}, @common=@inet=@recent0={{0xf8}, {0x0, 0x8, 0x1, 0x0, 'syz0\x00'}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0xf0}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x11000, 0x0, 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x408) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/power/pm_debug_messages', 0x88001, 0x0) 20:06:23 executing program 5: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4000, 0xffffffffffffffff}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz1\x00', 0x1ff) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=ANY=[@ANYBLOB="380000000d0601040000000000000000000000000500010006000000050005000300000012000300686173683a6e65742c706f72740000004f9fd5a2f4179f8da014cb3666c33ef83874469e971a5e4b874cc862604839043936da70eb12e4cec1621ac38abec2e4192e471edb0f6e181e30f12e48f92197521399cda241c8750e229d3655fa022d50b2c9ba03b1792318054d45a5d3fd662a067f89bae78c01b236f38e3ac4cacd6b76e3a78eb8a7a021c4489f285074b458f9ea4a564c453f417696b81ea3b8f1d4d7277dc24ac113c91ea096e05ec5a4996648fb5886dfd109754ab1df27cbe3b2a3140964ff3cb712347c774d7da8bd9de9a7c963c1aae45f6807f0dfd43955b596c182181ae7"], 0x38}}, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaa0086dd60932b1c00142b00fe80000000000000000000c943c38d1ebe87459ce800000000bbfe8000000000000000000000000000aa0000003a", @ANYRES32=0x41424344, @ANYRES64=r0], 0x0) r1 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, r1) syz_open_dev$ttys(0xc, 0x2, 0x1) readv(r0, &(0x7f0000000100)=[{&(0x7f0000000480)=""/246, 0xf6}, {&(0x7f0000000580)=""/204, 0xcc}, {&(0x7f0000000780)=""/251, 0xfb}], 0x3) r2 = syz_open_dev$ttys(0xc, 0x2, 0x1) ioctl$TIOCSPTLCK(r2, 0x5414, &(0x7f0000000000)=0x1) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/power/pm_debug_messages', 0x288401, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r3, 0xc0189374, &(0x7f0000000040)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r2, @ANYBLOB="e6140000000000002e16af696c653000"]) ioctl$TCSETS2(r4, 0x402c542b, &(0x7f00000000c0)={0x5, 0x9, 0x135, 0xffffffff, 0x0, "1db8a98d1924fa2471f348b7c0214bbaf41102", 0x51, 0x9}) write$binfmt_misc(r3, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0x4) ioctl$TIOCVHANGUP(r3, 0x5437, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = socket(0xa, 0x3, 0x3a) setsockopt$MRT6_ADD_MFC(r6, 0x29, 0xd3, &(0x7f0000000080)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @mcast2}}, 0x5c) setsockopt$inet6_tcp_int(r6, 0x6, 0x10, &(0x7f0000000000)=0x20, 0x4) r7 = fcntl$dupfd(r6, 0x406, r6) r8 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r8, &(0x7f0000000080), 0x10) r9 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r9, 0x8933, &(0x7f0000000040)={'vcan0\x00', 0x0}) sendmsg$can_bcm(r8, &(0x7f0000000280)={&(0x7f0000000000)={0x1d, r10}, 0x10, &(0x7f0000000200)={&(0x7f00000002c0)={0x2, 0x11, 0x0, {0x0, 0x2710}, {}, {}, 0x300, @can={{0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, "f5813f23b5e6b9b1"}}, 0x48}, 0x1, 0x0, 0x0, 0x4040800}, 0x0) setsockopt$MRT6_ADD_MIF(r7, 0x29, 0xcb, &(0x7f0000000040)={0x0, 0x0, 0x7f, r10, 0x1}, 0xc) setsockopt$IP6T_SO_SET_REPLACE(r5, 0x29, 0x40, &(0x7f0000000b40)=@raw={'raw\x00', 0x3c1, 0x3, 0x3a8, 0x1e8, 0x9403, 0x0, 0x0, 0x2c0, 0x2d8, 0x3d8, 0x3d8, 0x2d8, 0x3d8, 0x3, 0x0, {[{{@ipv6={@remote, @local, [0xffffffff, 0xff, 0xffffff00, 0xffffffff], [0xffffff00, 0xff000000, 0xffffffff, 0xffffffff], 'erspan0\x00', 'veth0_to_hsr\x00', {0xff}, {}, 0x2f, 0x3, 0x1, 0x7f}, 0x0, 0x1c8, 0x1e8, 0x0, {}, [@common=@inet=@dscp={{0x28}, {0x9, 0x1}}, @common=@inet=@recent0={{0xf8}, {0x0, 0x8, 0x1, 0x0, 'syz0\x00'}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0xf0}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x11000, 0x0, 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x408) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/power/pm_debug_messages', 0x88001, 0x0) 20:06:23 executing program 0: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4000, 0xffffffffffffffff}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz1\x00', 0x1ff) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=ANY=[@ANYBLOB="380000000d0601040000000000000000000000000500010006000000050005000300000012000300686173683a6e65742c706f72740000004f9fd5a2f4179f8da014cb3666c33ef83874469e971a5e4b874cc862604839043936da70eb12e4cec1621ac38abec2e4192e471edb0f6e181e30f12e48f92197521399cda241c8750e229d3655fa022d50b2c9ba03b1792318054d45a5d3fd662a067f89bae78c01b236f38e3ac4cacd6b76e3a78eb8a7a021c4489f285074b458f9ea4a564c453f417696b81ea3b8f1d4d7277dc24ac113c91ea096e05ec5a4996648fb5886dfd109754ab1df27cbe3b2a3140964ff3cb712347c774d7da8bd9de9a7c963c1aae45f6807f0dfd43955b596c182181ae7"], 0x38}}, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaa0086dd60932b1c00142b00fe80000000000000000000c943c38d1ebe87459ce800000000bbfe8000000000000000000000000000aa0000003a", @ANYRES32=0x41424344, @ANYRES64=r0], 0x0) r1 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, r1) syz_open_dev$ttys(0xc, 0x2, 0x1) readv(r0, &(0x7f0000000100)=[{&(0x7f0000000480)=""/246, 0xf6}, {&(0x7f0000000580)=""/204, 0xcc}, {&(0x7f0000000780)=""/251, 0xfb}], 0x3) r2 = syz_open_dev$ttys(0xc, 0x2, 0x1) ioctl$TIOCSPTLCK(r2, 0x5414, &(0x7f0000000000)=0x1) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/power/pm_debug_messages', 0x288401, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r3, 0xc0189374, &(0x7f0000000040)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r2, @ANYBLOB="e6140000000000002e16af696c653000"]) ioctl$TCSETS2(r4, 0x402c542b, &(0x7f00000000c0)={0x5, 0x9, 0x135, 0xffffffff, 0x0, "1db8a98d1924fa2471f348b7c0214bbaf41102", 0x51, 0x9}) write$binfmt_misc(r3, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0x4) ioctl$TIOCVHANGUP(r3, 0x5437, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = socket(0xa, 0x3, 0x3a) setsockopt$MRT6_ADD_MFC(r6, 0x29, 0xd3, &(0x7f0000000080)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @mcast2}}, 0x5c) setsockopt$inet6_tcp_int(r6, 0x6, 0x10, &(0x7f0000000000)=0x20, 0x4) r7 = fcntl$dupfd(r6, 0x406, r6) r8 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r8, &(0x7f0000000080), 0x10) r9 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r9, 0x8933, &(0x7f0000000040)={'vcan0\x00', 0x0}) sendmsg$can_bcm(r8, &(0x7f0000000280)={&(0x7f0000000000)={0x1d, r10}, 0x10, &(0x7f0000000200)={&(0x7f00000002c0)={0x2, 0x11, 0x0, {0x0, 0x2710}, {}, {}, 0x300, @can={{0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, "f5813f23b5e6b9b1"}}, 0x48}, 0x1, 0x0, 0x0, 0x4040800}, 0x0) setsockopt$MRT6_ADD_MIF(r7, 0x29, 0xcb, &(0x7f0000000040)={0x0, 0x0, 0x7f, r10, 0x1}, 0xc) setsockopt$IP6T_SO_SET_REPLACE(r5, 0x29, 0x40, &(0x7f0000000b40)=@raw={'raw\x00', 0x3c1, 0x3, 0x3a8, 0x1e8, 0x9403, 0x0, 0x0, 0x2c0, 0x2d8, 0x3d8, 0x3d8, 0x2d8, 0x3d8, 0x3, 0x0, {[{{@ipv6={@remote, @local, [0xffffffff, 0xff, 0xffffff00, 0xffffffff], [0xffffff00, 0xff000000, 0xffffffff, 0xffffffff], 'erspan0\x00', 'veth0_to_hsr\x00', {0xff}, {}, 0x2f, 0x3, 0x1, 0x7f}, 0x0, 0x1c8, 0x1e8, 0x0, {}, [@common=@inet=@dscp={{0x28}, {0x9, 0x1}}, @common=@inet=@recent0={{0xf8}, {0x0, 0x8, 0x1, 0x0, 'syz0\x00'}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0xf0}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x11000, 0x0, 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x408) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/power/pm_debug_messages', 0x88001, 0x0) 20:06:23 executing program 3: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4000, 0xffffffffffffffff}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz1\x00', 0x1ff) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x38}}, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaa0086dd60932b1c00142b00fe80000000000000000000c943c38d1ebe87459ce800000000bbfe8000000000000000000000000000aa0000003a", @ANYRES32=0x41424344, @ANYRES64=r0], 0x0) r1 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, r1) syz_open_dev$ttys(0xc, 0x2, 0x1) readv(r0, &(0x7f0000000100)=[{&(0x7f0000000480)=""/246, 0xf6}, {&(0x7f0000000580)=""/204, 0xcc}, {&(0x7f0000000780)=""/251, 0xfb}], 0x3) r2 = syz_open_dev$ttys(0xc, 0x2, 0x1) ioctl$TIOCSPTLCK(r2, 0x5414, &(0x7f0000000000)=0x1) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/power/pm_debug_messages', 0x288401, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r3, 0xc0189374, &(0x7f0000000040)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r2, @ANYBLOB="e6140000000000002e16af696c653000"]) ioctl$TCSETS2(r4, 0x402c542b, &(0x7f00000000c0)={0x5, 0x9, 0x135, 0xffffffff, 0x0, "1db8a98d1924fa2471f348b7c0214bbaf41102", 0x51, 0x9}) write$binfmt_misc(r3, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0x4) ioctl$TIOCVHANGUP(r3, 0x5437, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = socket(0xa, 0x3, 0x3a) setsockopt$MRT6_ADD_MFC(r6, 0x29, 0xd3, &(0x7f0000000080)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @mcast2}}, 0x5c) setsockopt$inet6_tcp_int(r6, 0x6, 0x10, &(0x7f0000000000)=0x20, 0x4) r7 = fcntl$dupfd(r6, 0x406, r6) r8 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r8, &(0x7f0000000080), 0x10) r9 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r9, 0x8933, &(0x7f0000000040)={'vcan0\x00', 0x0}) sendmsg$can_bcm(r8, &(0x7f0000000280)={&(0x7f0000000000)={0x1d, r10}, 0x10, &(0x7f0000000200)={&(0x7f00000002c0)={0x2, 0x11, 0x0, {0x0, 0x2710}, {}, {}, 0x300, @can={{0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, "f5813f23b5e6b9b1"}}, 0x48}, 0x1, 0x0, 0x0, 0x4040800}, 0x0) setsockopt$MRT6_ADD_MIF(r7, 0x29, 0xcb, &(0x7f0000000040)={0x0, 0x0, 0x7f, r10, 0x1}, 0xc) setsockopt$IP6T_SO_SET_REPLACE(r5, 0x29, 0x40, &(0x7f0000000b40)=@raw={'raw\x00', 0x3c1, 0x3, 0x3a8, 0x1e8, 0x9403, 0x0, 0x0, 0x2c0, 0x2d8, 0x3d8, 0x3d8, 0x2d8, 0x3d8, 0x3, 0x0, {[{{@ipv6={@remote, @local, [0xffffffff, 0xff, 0xffffff00, 0xffffffff], [0xffffff00, 0xff000000, 0xffffffff, 0xffffffff], 'erspan0\x00', 'veth0_to_hsr\x00', {0xff}, {}, 0x2f, 0x3, 0x1, 0x7f}, 0x0, 0x1c8, 0x1e8, 0x0, {}, [@common=@inet=@dscp={{0x28}, {0x9, 0x1}}, @common=@inet=@recent0={{0xf8}, {0x0, 0x8, 0x1, 0x0, 'syz0\x00'}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0xf0}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x11000, 0x0, 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x408) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/power/pm_debug_messages', 0x88001, 0x0) 20:06:23 executing program 2: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4000, 0xffffffffffffffff}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz1\x00', 0x1ff) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x38}}, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaa0086dd60932b1c00142b00fe80000000000000000000c943c38d1ebe87459ce800000000bbfe8000000000000000000000000000aa0000003a", @ANYRES32=0x41424344, @ANYRES64=r0], 0x0) r1 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, r1) syz_open_dev$ttys(0xc, 0x2, 0x1) readv(r0, &(0x7f0000000100)=[{&(0x7f0000000480)=""/246, 0xf6}, {&(0x7f0000000580)=""/204, 0xcc}, {&(0x7f0000000780)=""/251, 0xfb}], 0x3) r2 = syz_open_dev$ttys(0xc, 0x2, 0x1) ioctl$TIOCSPTLCK(r2, 0x5414, &(0x7f0000000000)=0x1) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/power/pm_debug_messages', 0x288401, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r3, 0xc0189374, &(0x7f0000000040)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r2, @ANYBLOB="e6140000000000002e16af696c653000"]) ioctl$TCSETS2(r4, 0x402c542b, &(0x7f00000000c0)={0x5, 0x9, 0x135, 0xffffffff, 0x0, "1db8a98d1924fa2471f348b7c0214bbaf41102", 0x51, 0x9}) write$binfmt_misc(r3, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0x4) ioctl$TIOCVHANGUP(r3, 0x5437, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = socket(0xa, 0x3, 0x3a) setsockopt$MRT6_ADD_MFC(r6, 0x29, 0xd3, &(0x7f0000000080)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @mcast2}}, 0x5c) setsockopt$inet6_tcp_int(r6, 0x6, 0x10, &(0x7f0000000000)=0x20, 0x4) r7 = fcntl$dupfd(r6, 0x406, r6) r8 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r8, &(0x7f0000000080), 0x10) r9 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r9, 0x8933, &(0x7f0000000040)={'vcan0\x00', 0x0}) sendmsg$can_bcm(r8, &(0x7f0000000280)={&(0x7f0000000000)={0x1d, r10}, 0x10, &(0x7f0000000200)={&(0x7f00000002c0)={0x2, 0x11, 0x0, {0x0, 0x2710}, {}, {}, 0x300, @can={{0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, "f5813f23b5e6b9b1"}}, 0x48}, 0x1, 0x0, 0x0, 0x4040800}, 0x0) setsockopt$MRT6_ADD_MIF(r7, 0x29, 0xcb, &(0x7f0000000040)={0x0, 0x0, 0x7f, r10, 0x1}, 0xc) setsockopt$IP6T_SO_SET_REPLACE(r5, 0x29, 0x40, &(0x7f0000000b40)=@raw={'raw\x00', 0x3c1, 0x3, 0x3a8, 0x1e8, 0x9403, 0x0, 0x0, 0x2c0, 0x2d8, 0x3d8, 0x3d8, 0x2d8, 0x3d8, 0x3, 0x0, {[{{@ipv6={@remote, @local, [0xffffffff, 0xff, 0xffffff00, 0xffffffff], [0xffffff00, 0xff000000, 0xffffffff, 0xffffffff], 'erspan0\x00', 'veth0_to_hsr\x00', {0xff}, {}, 0x2f, 0x3, 0x1, 0x7f}, 0x0, 0x1c8, 0x1e8, 0x0, {}, [@common=@inet=@dscp={{0x28}, {0x9, 0x1}}, @common=@inet=@recent0={{0xf8}, {0x0, 0x8, 0x1, 0x0, 'syz0\x00'}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0xf0}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x11000, 0x0, 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x408) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/power/pm_debug_messages', 0x88001, 0x0) 20:06:23 executing program 1: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4000, 0xffffffffffffffff}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz1\x00', 0x1ff) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x38}}, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaa0086dd60932b1c00142b00fe80000000000000000000c943c38d1ebe87459ce800000000bbfe8000000000000000000000000000aa0000003a", @ANYRES32=0x41424344, @ANYRES64=r0], 0x0) r1 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, r1) syz_open_dev$ttys(0xc, 0x2, 0x1) readv(r0, &(0x7f0000000100)=[{&(0x7f0000000480)=""/246, 0xf6}, {&(0x7f0000000580)=""/204, 0xcc}, {&(0x7f0000000780)=""/251, 0xfb}], 0x3) r2 = syz_open_dev$ttys(0xc, 0x2, 0x1) ioctl$TIOCSPTLCK(r2, 0x5414, &(0x7f0000000000)=0x1) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/power/pm_debug_messages', 0x288401, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r3, 0xc0189374, &(0x7f0000000040)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r2, @ANYBLOB="e6140000000000002e16af696c653000"]) ioctl$TCSETS2(r4, 0x402c542b, &(0x7f00000000c0)={0x5, 0x9, 0x135, 0xffffffff, 0x0, "1db8a98d1924fa2471f348b7c0214bbaf41102", 0x51, 0x9}) write$binfmt_misc(r3, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0x4) ioctl$TIOCVHANGUP(r3, 0x5437, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = socket(0xa, 0x3, 0x3a) setsockopt$MRT6_ADD_MFC(r6, 0x29, 0xd3, &(0x7f0000000080)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @mcast2}}, 0x5c) setsockopt$inet6_tcp_int(r6, 0x6, 0x10, &(0x7f0000000000)=0x20, 0x4) r7 = fcntl$dupfd(r6, 0x406, r6) r8 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r8, &(0x7f0000000080), 0x10) r9 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r9, 0x8933, &(0x7f0000000040)={'vcan0\x00', 0x0}) sendmsg$can_bcm(r8, &(0x7f0000000280)={&(0x7f0000000000)={0x1d, r10}, 0x10, &(0x7f0000000200)={&(0x7f00000002c0)={0x2, 0x11, 0x0, {0x0, 0x2710}, {}, {}, 0x300, @can={{0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, "f5813f23b5e6b9b1"}}, 0x48}, 0x1, 0x0, 0x0, 0x4040800}, 0x0) setsockopt$MRT6_ADD_MIF(r7, 0x29, 0xcb, &(0x7f0000000040)={0x0, 0x0, 0x7f, r10, 0x1}, 0xc) setsockopt$IP6T_SO_SET_REPLACE(r5, 0x29, 0x40, &(0x7f0000000b40)=@raw={'raw\x00', 0x3c1, 0x3, 0x3a8, 0x1e8, 0x9403, 0x0, 0x0, 0x2c0, 0x2d8, 0x3d8, 0x3d8, 0x2d8, 0x3d8, 0x3, 0x0, {[{{@ipv6={@remote, @local, [0xffffffff, 0xff, 0xffffff00, 0xffffffff], [0xffffff00, 0xff000000, 0xffffffff, 0xffffffff], 'erspan0\x00', 'veth0_to_hsr\x00', {0xff}, {}, 0x2f, 0x3, 0x1, 0x7f}, 0x0, 0x1c8, 0x1e8, 0x0, {}, [@common=@inet=@dscp={{0x28}, {0x9, 0x1}}, @common=@inet=@recent0={{0xf8}, {0x0, 0x8, 0x1, 0x0, 'syz0\x00'}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0xf0}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x11000, 0x0, 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x408) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/power/pm_debug_messages', 0x88001, 0x0) 20:06:23 executing program 4: r0 = socket$pppl2tp(0x18, 0x1, 0x1) r1 = socket$inet6_udp(0xa, 0x2, 0x0) connect$pppl2tp(r0, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x3, r1, {0x2, 0x0, @multicast2}, 0x3}}, 0x2e) r2 = socket$pppl2tp(0x18, 0x1, 0x1) connect$pppl2tp(r2, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x3, 0xffffffffffffffff, {0x2, 0x0, @remote}, 0x3, 0x200000}}, 0x2e) ioctl$PPPIOCGL2TPSTATS(r2, 0x80487436, &(0x7f0000000040)) 20:06:23 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) write$cgroup_type(r0, &(0x7f0000000080), 0x11ffffce1) r1 = perf_event_open(&(0x7f0000001940)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000000000000000000004b64ffec850000006d000000850000000500000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='blkio.bfq.dequeue\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x660c, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x80, 0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x100, 0x4, @perf_bp, 0x18088, 0x0, 0x0, 0x0, 0x7, 0x81, 0x7f, 0x0, 0x536, 0x0, 0x6}, 0x0, 0x0, r1, 0x0) 20:06:23 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f0000000680)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x70d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$netlink(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000029c0)={0x114, 0x30, 0xc85, 0x0, 0x0, "", [@nested={0x102, 0x0, 0x0, 0x1, [@typed={0x8, 0x0, 0x0, 0x0, @uid}, @generic="b6eb4ac7aa944446bde905d0a963c491e238ec84f770f6919352ba09fb0fd872ba7c45cf1e5edf30d509b34ea18e3d37ae2b3554a389a95bf27a80994fb21255670196645f7dc09414e9503092189e1209264abedfa5714793d8d3446e718d8320dbc935b4755a40ddc5ca584e156b5dfdaa30769faf09110ca2cf81db2c9d6dd4d814495adf053ea3b1f04ef9b073f227ba293170904fa053da0bf02942e79c1ad006f2e22f823757289852e7f0ae368de5083a1433474a1b3dbc0740e111f892c25b0c583eb555c87ab5940bde91fa4a2632a6591a75567e169498f42f2cb012e0ebebfea09b0cb55ec18923e72110b04ceb6803ef"]}]}, 0x114}], 0x1}, 0x0) [ 357.106497] xt_CT: netfilter: NOTRACK target is deprecated, use CT instead or upgrade iptables 20:06:23 executing program 2: socket$netlink(0x10, 0x3, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_CRIT_PROTOCOL_START(r2, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={0x0, 0x1c}}, 0x0) getsockname$packet(r2, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="3c00000010008506f7002000fe6122314a000800", @ANYRES32=r3, @ANYBLOB="2377f292252155b21c0012000c000100626f6e64000000000c0002000800010001"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000100)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @ip6gre={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r3}]}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x44}}, 0x0) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, &(0x7f0000000080), 0x4) 20:06:23 executing program 4: r0 = socket$pppl2tp(0x18, 0x1, 0x1) r1 = socket$inet6_udp(0xa, 0x2, 0x0) connect$pppl2tp(r0, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x3, r1, {0x2, 0x0, @multicast2}, 0x3}}, 0x2e) r2 = socket$pppl2tp(0x18, 0x1, 0x1) connect$pppl2tp(r2, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x3, 0xffffffffffffffff, {0x2, 0x0, @remote}, 0x3, 0x200000}}, 0x2e) ioctl$PPPIOCGL2TPSTATS(r2, 0x80487436, &(0x7f0000000040)) 20:06:23 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f0000000680)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x70d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$netlink(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000029c0)={0x114, 0x30, 0xc85, 0x0, 0x0, "", [@nested={0x102, 0x0, 0x0, 0x1, [@typed={0x8, 0x0, 0x0, 0x0, @uid}, @generic="b6eb4ac7aa944446bde905d0a963c491e238ec84f770f6919352ba09fb0fd872ba7c45cf1e5edf30d509b34ea18e3d37ae2b3554a389a95bf27a80994fb21255670196645f7dc09414e9503092189e1209264abedfa5714793d8d3446e718d8320dbc935b4755a40ddc5ca584e156b5dfdaa30769faf09110ca2cf81db2c9d6dd4d814495adf053ea3b1f04ef9b073f227ba293170904fa053da0bf02942e79c1ad006f2e22f823757289852e7f0ae368de5083a1433474a1b3dbc0740e111f892c25b0c583eb555c87ab5940bde91fa4a2632a6591a75567e169498f42f2cb012e0ebebfea09b0cb55ec18923e72110b04ceb6803ef"]}]}, 0x114}], 0x1}, 0x0) [ 357.197239] netlink: 252 bytes leftover after parsing attributes in process `syz-executor.0'. [ 357.225038] xt_CT: netfilter: NOTRACK target is deprecated, use CT instead or upgrade iptables 20:06:23 executing program 4: r0 = socket$pppl2tp(0x18, 0x1, 0x1) r1 = socket$inet6_udp(0xa, 0x2, 0x0) connect$pppl2tp(r0, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x3, r1, {0x2, 0x0, @multicast2}, 0x3}}, 0x2e) r2 = socket$pppl2tp(0x18, 0x1, 0x1) connect$pppl2tp(r2, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x3, 0xffffffffffffffff, {0x2, 0x0, @remote}, 0x3, 0x200000}}, 0x2e) ioctl$PPPIOCGL2TPSTATS(r2, 0x80487436, &(0x7f0000000040)) 20:06:23 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f0000000680)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x70d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$netlink(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000029c0)={0x114, 0x30, 0xc85, 0x0, 0x0, "", [@nested={0x102, 0x0, 0x0, 0x1, [@typed={0x8, 0x0, 0x0, 0x0, @uid}, @generic="b6eb4ac7aa944446bde905d0a963c491e238ec84f770f6919352ba09fb0fd872ba7c45cf1e5edf30d509b34ea18e3d37ae2b3554a389a95bf27a80994fb21255670196645f7dc09414e9503092189e1209264abedfa5714793d8d3446e718d8320dbc935b4755a40ddc5ca584e156b5dfdaa30769faf09110ca2cf81db2c9d6dd4d814495adf053ea3b1f04ef9b073f227ba293170904fa053da0bf02942e79c1ad006f2e22f823757289852e7f0ae368de5083a1433474a1b3dbc0740e111f892c25b0c583eb555c87ab5940bde91fa4a2632a6591a75567e169498f42f2cb012e0ebebfea09b0cb55ec18923e72110b04ceb6803ef"]}]}, 0x114}], 0x1}, 0x0) 20:06:23 executing program 4: r0 = socket$pppl2tp(0x18, 0x1, 0x1) r1 = socket$inet6_udp(0xa, 0x2, 0x0) connect$pppl2tp(r0, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x3, r1, {0x2, 0x0, @multicast2}, 0x3}}, 0x2e) r2 = socket$pppl2tp(0x18, 0x1, 0x1) connect$pppl2tp(r2, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x3, 0xffffffffffffffff, {0x2, 0x0, @remote}, 0x3, 0x200000}}, 0x2e) ioctl$PPPIOCGL2TPSTATS(r2, 0x80487436, &(0x7f0000000040)) [ 357.352908] netlink: 252 bytes leftover after parsing attributes in process `syz-executor.0'. [ 357.418331] netlink: 252 bytes leftover after parsing attributes in process `syz-executor.0'. [ 357.504348] device bond1 entered promiscuous mode [ 357.524297] IPv6: ADDRCONF(NETDEV_UP): bond1: link is not ready [ 357.541520] 8021q: adding VLAN 0 to HW filter on device bond1 20:06:24 executing program 3: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4000, 0xffffffffffffffff}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz1\x00', 0x1ff) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x38}}, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaa0086dd60932b1c00142b00fe80000000000000000000c943c38d1ebe87459ce800000000bbfe8000000000000000000000000000aa0000003a", @ANYRES32=0x41424344, @ANYRES64=r0], 0x0) r1 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, r1) syz_open_dev$ttys(0xc, 0x2, 0x1) readv(r0, &(0x7f0000000100)=[{&(0x7f0000000480)=""/246, 0xf6}, {&(0x7f0000000580)=""/204, 0xcc}, {&(0x7f0000000780)=""/251, 0xfb}], 0x3) r2 = syz_open_dev$ttys(0xc, 0x2, 0x1) ioctl$TIOCSPTLCK(r2, 0x5414, &(0x7f0000000000)=0x1) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/power/pm_debug_messages', 0x288401, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r3, 0xc0189374, &(0x7f0000000040)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r2, @ANYBLOB="e6140000000000002e16af696c653000"]) ioctl$TCSETS2(r4, 0x402c542b, &(0x7f00000000c0)={0x5, 0x9, 0x135, 0xffffffff, 0x0, "1db8a98d1924fa2471f348b7c0214bbaf41102", 0x51, 0x9}) write$binfmt_misc(r3, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0x4) ioctl$TIOCVHANGUP(r3, 0x5437, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = socket(0xa, 0x3, 0x3a) setsockopt$MRT6_ADD_MFC(r6, 0x29, 0xd3, &(0x7f0000000080)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @mcast2}}, 0x5c) setsockopt$inet6_tcp_int(r6, 0x6, 0x10, &(0x7f0000000000)=0x20, 0x4) r7 = fcntl$dupfd(r6, 0x406, r6) r8 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r8, &(0x7f0000000080), 0x10) r9 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r9, 0x8933, &(0x7f0000000040)={'vcan0\x00', 0x0}) sendmsg$can_bcm(r8, &(0x7f0000000280)={&(0x7f0000000000)={0x1d, r10}, 0x10, &(0x7f0000000200)={&(0x7f00000002c0)={0x2, 0x11, 0x0, {0x0, 0x2710}, {}, {}, 0x300, @can={{0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, "f5813f23b5e6b9b1"}}, 0x48}, 0x1, 0x0, 0x0, 0x4040800}, 0x0) setsockopt$MRT6_ADD_MIF(r7, 0x29, 0xcb, &(0x7f0000000040)={0x0, 0x0, 0x7f, r10, 0x1}, 0xc) setsockopt$IP6T_SO_SET_REPLACE(r5, 0x29, 0x40, &(0x7f0000000b40)=@raw={'raw\x00', 0x3c1, 0x3, 0x3a8, 0x1e8, 0x9403, 0x0, 0x0, 0x2c0, 0x2d8, 0x3d8, 0x3d8, 0x2d8, 0x3d8, 0x3, 0x0, {[{{@ipv6={@remote, @local, [0xffffffff, 0xff, 0xffffff00, 0xffffffff], [0xffffff00, 0xff000000, 0xffffffff, 0xffffffff], 'erspan0\x00', 'veth0_to_hsr\x00', {0xff}, {}, 0x2f, 0x3, 0x1, 0x7f}, 0x0, 0x1c8, 0x1e8, 0x0, {}, [@common=@inet=@dscp={{0x28}, {0x9, 0x1}}, @common=@inet=@recent0={{0xf8}, {0x0, 0x8, 0x1, 0x0, 'syz0\x00'}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0xf0}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x11000, 0x0, 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x408) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/power/pm_debug_messages', 0x88001, 0x0) 20:06:24 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f0000000680)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x70d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$netlink(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000029c0)={0x114, 0x30, 0xc85, 0x0, 0x0, "", [@nested={0x102, 0x0, 0x0, 0x1, [@typed={0x8, 0x0, 0x0, 0x0, @uid}, @generic="b6eb4ac7aa944446bde905d0a963c491e238ec84f770f6919352ba09fb0fd872ba7c45cf1e5edf30d509b34ea18e3d37ae2b3554a389a95bf27a80994fb21255670196645f7dc09414e9503092189e1209264abedfa5714793d8d3446e718d8320dbc935b4755a40ddc5ca584e156b5dfdaa30769faf09110ca2cf81db2c9d6dd4d814495adf053ea3b1f04ef9b073f227ba293170904fa053da0bf02942e79c1ad006f2e22f823757289852e7f0ae368de5083a1433474a1b3dbc0740e111f892c25b0c583eb555c87ab5940bde91fa4a2632a6591a75567e169498f42f2cb012e0ebebfea09b0cb55ec18923e72110b04ceb6803ef"]}]}, 0x114}], 0x1}, 0x0) [ 357.561014] bond1: The slave device specified does not support setting the MAC address [ 357.592117] netlink: 252 bytes leftover after parsing attributes in process `syz-executor.0'. [ 357.621862] bond1: Setting fail_over_mac to active for active-backup mode [ 357.676852] bond1: making interface ip6gre1 the new active one [ 357.695819] device ip6gre1 entered promiscuous mode [ 357.710254] bond1: Enslaving ip6gre1 as an active interface with an up link 20:06:24 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) madvise(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x80000000e) mremap(&(0x7f0000a96000/0x1000)=nil, 0x1000, 0x400000, 0x3, &(0x7f0000000000/0x400000)=nil) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000680)={0x50, 0x0, 0x0, {0x7, 0x21}}, 0x50) r0 = shmget$private(0x0, 0x2000, 0x0, &(0x7f0000115000/0x2000)=nil) shmat(r0, &(0x7f00001d5000/0x4000)=nil, 0x5000) openat$procfs(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/cpuinfo\x00', 0x0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='numa_maps\x00') readv(r1, &(0x7f00000012c0)=[{&(0x7f0000001400)=""/4110, 0x100e}], 0x2d) 20:06:24 executing program 1: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4000, 0xffffffffffffffff}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz1\x00', 0x1ff) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x38}}, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaa0086dd60932b1c00142b00fe80000000000000000000c943c38d1ebe87459ce800000000bbfe8000000000000000000000000000aa0000003a", @ANYRES32=0x41424344, @ANYRES64=r0], 0x0) r1 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, r1) syz_open_dev$ttys(0xc, 0x2, 0x1) readv(r0, &(0x7f0000000100)=[{&(0x7f0000000480)=""/246, 0xf6}, {&(0x7f0000000580)=""/204, 0xcc}, {&(0x7f0000000780)=""/251, 0xfb}], 0x3) r2 = syz_open_dev$ttys(0xc, 0x2, 0x1) ioctl$TIOCSPTLCK(r2, 0x5414, &(0x7f0000000000)=0x1) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/power/pm_debug_messages', 0x288401, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r3, 0xc0189374, &(0x7f0000000040)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r2, @ANYBLOB="e6140000000000002e16af696c653000"]) ioctl$TCSETS2(r4, 0x402c542b, &(0x7f00000000c0)={0x5, 0x9, 0x135, 0xffffffff, 0x0, "1db8a98d1924fa2471f348b7c0214bbaf41102", 0x51, 0x9}) write$binfmt_misc(r3, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0x4) ioctl$TIOCVHANGUP(r3, 0x5437, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = socket(0xa, 0x3, 0x3a) setsockopt$MRT6_ADD_MFC(r6, 0x29, 0xd3, &(0x7f0000000080)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @mcast2}}, 0x5c) setsockopt$inet6_tcp_int(r6, 0x6, 0x10, &(0x7f0000000000)=0x20, 0x4) r7 = fcntl$dupfd(r6, 0x406, r6) r8 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r8, &(0x7f0000000080), 0x10) r9 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r9, 0x8933, &(0x7f0000000040)={'vcan0\x00', 0x0}) sendmsg$can_bcm(r8, &(0x7f0000000280)={&(0x7f0000000000)={0x1d, r10}, 0x10, &(0x7f0000000200)={&(0x7f00000002c0)={0x2, 0x11, 0x0, {0x0, 0x2710}, {}, {}, 0x300, @can={{0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, "f5813f23b5e6b9b1"}}, 0x48}, 0x1, 0x0, 0x0, 0x4040800}, 0x0) setsockopt$MRT6_ADD_MIF(r7, 0x29, 0xcb, &(0x7f0000000040)={0x0, 0x0, 0x7f, r10, 0x1}, 0xc) setsockopt$IP6T_SO_SET_REPLACE(r5, 0x29, 0x40, &(0x7f0000000b40)=@raw={'raw\x00', 0x3c1, 0x3, 0x3a8, 0x1e8, 0x9403, 0x0, 0x0, 0x2c0, 0x2d8, 0x3d8, 0x3d8, 0x2d8, 0x3d8, 0x3, 0x0, {[{{@ipv6={@remote, @local, [0xffffffff, 0xff, 0xffffff00, 0xffffffff], [0xffffff00, 0xff000000, 0xffffffff, 0xffffffff], 'erspan0\x00', 'veth0_to_hsr\x00', {0xff}, {}, 0x2f, 0x3, 0x1, 0x7f}, 0x0, 0x1c8, 0x1e8, 0x0, {}, [@common=@inet=@dscp={{0x28}, {0x9, 0x1}}, @common=@inet=@recent0={{0xf8}, {0x0, 0x8, 0x1, 0x0, 'syz0\x00'}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0xf0}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x11000, 0x0, 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x408) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/power/pm_debug_messages', 0x88001, 0x0) [ 357.741747] IPv6: ADDRCONF(NETDEV_CHANGE): bond1: link becomes ready 20:06:24 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) write$cgroup_type(r0, &(0x7f0000000080), 0x11ffffce1) r1 = perf_event_open(&(0x7f0000001940)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000000000000000000004b64ffec850000006d000000850000000500000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='blkio.bfq.dequeue\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x660c, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x80, 0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x100, 0x4, @perf_bp, 0x18088, 0x0, 0x0, 0x0, 0x7, 0x81, 0x7f, 0x0, 0x536, 0x0, 0x6}, 0x0, 0x0, r1, 0x0) 20:06:24 executing program 0: open(&(0x7f0000000080)='./bus\x00', 0x40842, 0x0) r0 = open(&(0x7f0000000180)='./bus\x00', 0x4c03e, 0x0) r1 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r1, 0x800) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x0, 0x0) r3 = socket$inet6(0xa, 0x401000000001, 0x0) close(r3) r4 = open(&(0x7f0000000400)='./bus\x00', 0x104e042, 0x0) sendfile(r4, r3, 0x0, 0xfffffffb) sendfile(r4, r2, 0x0, 0xfffd) mmap(&(0x7f0000000000/0x600000)=nil, 0x600204, 0x7ffffe, 0x4002011, r0, 0x0) r5 = socket(0x2, 0x2, 0x1) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000040)='bridge0\x00', 0x10) sendmsg$DEVLINK_CMD_SB_PORT_POOL_SET(r5, &(0x7f0000001280)={&(0x7f0000000000)={0x2, 0x0, 0xe0}, 0x10, &(0x7f0000001240)={&(0x7f0000000c00)=ANY=[@ANYBLOB='\b\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="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"], 0xffeb}}, 0x0) 20:06:24 executing program 2: socket$netlink(0x10, 0x3, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_CRIT_PROTOCOL_START(r2, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={0x0, 0x1c}}, 0x0) getsockname$packet(r2, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="3c00000010008506f7002000fe6122314a000800", @ANYRES32=r3, @ANYBLOB="2377f292252155b21c0012000c000100626f6e64000000000c0002000800010001"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000100)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @ip6gre={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r3}]}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x44}}, 0x0) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, &(0x7f0000000080), 0x4) 20:06:24 executing program 3: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4000, 0xffffffffffffffff}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz1\x00', 0x1ff) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x38}}, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaa0086dd60932b1c00142b00fe80000000000000000000c943c38d1ebe87459ce800000000bbfe8000000000000000000000000000aa0000003a", @ANYRES32=0x41424344, @ANYRES64=r0], 0x0) r1 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, r1) syz_open_dev$ttys(0xc, 0x2, 0x1) readv(r0, &(0x7f0000000100)=[{&(0x7f0000000480)=""/246, 0xf6}, {&(0x7f0000000580)=""/204, 0xcc}, {&(0x7f0000000780)=""/251, 0xfb}], 0x3) r2 = syz_open_dev$ttys(0xc, 0x2, 0x1) ioctl$TIOCSPTLCK(r2, 0x5414, &(0x7f0000000000)=0x1) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/power/pm_debug_messages', 0x288401, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r3, 0xc0189374, &(0x7f0000000040)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r2, @ANYBLOB="e6140000000000002e16af696c653000"]) ioctl$TCSETS2(r4, 0x402c542b, &(0x7f00000000c0)={0x5, 0x9, 0x135, 0xffffffff, 0x0, "1db8a98d1924fa2471f348b7c0214bbaf41102", 0x51, 0x9}) write$binfmt_misc(r3, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0x4) ioctl$TIOCVHANGUP(r3, 0x5437, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = socket(0xa, 0x3, 0x3a) setsockopt$MRT6_ADD_MFC(r6, 0x29, 0xd3, &(0x7f0000000080)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @mcast2}}, 0x5c) setsockopt$inet6_tcp_int(r6, 0x6, 0x10, &(0x7f0000000000)=0x20, 0x4) r7 = fcntl$dupfd(r6, 0x406, r6) r8 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r8, &(0x7f0000000080), 0x10) r9 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r9, 0x8933, &(0x7f0000000040)={'vcan0\x00', 0x0}) sendmsg$can_bcm(r8, &(0x7f0000000280)={&(0x7f0000000000)={0x1d, r10}, 0x10, &(0x7f0000000200)={&(0x7f00000002c0)={0x2, 0x11, 0x0, {0x0, 0x2710}, {}, {}, 0x300, @can={{0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, "f5813f23b5e6b9b1"}}, 0x48}, 0x1, 0x0, 0x0, 0x4040800}, 0x0) setsockopt$MRT6_ADD_MIF(r7, 0x29, 0xcb, &(0x7f0000000040)={0x0, 0x0, 0x7f, r10, 0x1}, 0xc) setsockopt$IP6T_SO_SET_REPLACE(r5, 0x29, 0x40, &(0x7f0000000b40)=@raw={'raw\x00', 0x3c1, 0x3, 0x3a8, 0x1e8, 0x9403, 0x0, 0x0, 0x2c0, 0x2d8, 0x3d8, 0x3d8, 0x2d8, 0x3d8, 0x3, 0x0, {[{{@ipv6={@remote, @local, [0xffffffff, 0xff, 0xffffff00, 0xffffffff], [0xffffff00, 0xff000000, 0xffffffff, 0xffffffff], 'erspan0\x00', 'veth0_to_hsr\x00', {0xff}, {}, 0x2f, 0x3, 0x1, 0x7f}, 0x0, 0x1c8, 0x1e8, 0x0, {}, [@common=@inet=@dscp={{0x28}, {0x9, 0x1}}, @common=@inet=@recent0={{0xf8}, {0x0, 0x8, 0x1, 0x0, 'syz0\x00'}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0xf0}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x11000, 0x0, 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x408) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/power/pm_debug_messages', 0x88001, 0x0) 20:06:24 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) madvise(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x80000000e) mremap(&(0x7f0000a96000/0x1000)=nil, 0x1000, 0x400000, 0x3, &(0x7f0000000000/0x400000)=nil) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000680)={0x50, 0x0, 0x0, {0x7, 0x21}}, 0x50) r0 = shmget$private(0x0, 0x2000, 0x0, &(0x7f0000115000/0x2000)=nil) shmat(r0, &(0x7f00001d5000/0x4000)=nil, 0x5000) openat$procfs(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/cpuinfo\x00', 0x0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='numa_maps\x00') readv(r1, &(0x7f00000012c0)=[{&(0x7f0000001400)=""/4110, 0x100e}], 0x2d) 20:06:24 executing program 1: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4000, 0xffffffffffffffff}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz1\x00', 0x1ff) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=ANY=[@ANYBLOB="380000000d0601040000000000000000000000000500010006000000050005000300000012000300686173683a6e65742c706f72740000004f9fd5a2f4179f8da014cb3666c33ef83874469e971a5e4b874cc862604839043936da70eb12e4cec1621ac38abec2e4192e471edb0f6e181e30f12e48f92197521399cda241c8750e229d3655fa022d50b2c9ba03b1792318054d45a5d3fd662a067f89bae78c01b236f38e3ac4cacd6b76e3a78eb8a7a021c4489f285074b458f9ea4a564c453f417696b81ea3b8f1d4d7277dc24ac113c91ea096e05ec5a4996648fb5886dfd109754ab1df27cbe3b2a3140964ff3cb712347c774d7da8bd9de9a7c963c1aae45f6807f0dfd43955b596c182181ae7"], 0x38}}, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaa0086dd60932b1c00142b00fe80000000000000000000c943c38d1ebe87459ce800000000bbfe8000000000000000000000000000aa0000003a", @ANYRES32=0x41424344, @ANYRES64=r0], 0x0) r1 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, r1) syz_open_dev$ttys(0xc, 0x2, 0x1) readv(r0, &(0x7f0000000100)=[{&(0x7f0000000480)=""/246, 0xf6}, {&(0x7f0000000580)=""/204, 0xcc}, {&(0x7f0000000780)=""/251, 0xfb}], 0x3) r2 = syz_open_dev$ttys(0xc, 0x2, 0x1) ioctl$TIOCSPTLCK(r2, 0x5414, &(0x7f0000000000)=0x1) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/power/pm_debug_messages', 0x288401, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r3, 0xc0189374, &(0x7f0000000040)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r2, @ANYBLOB="e6140000000000002e16af696c653000"]) ioctl$TCSETS2(r4, 0x402c542b, &(0x7f00000000c0)={0x5, 0x9, 0x135, 0xffffffff, 0x0, "1db8a98d1924fa2471f348b7c0214bbaf41102", 0x51, 0x9}) write$binfmt_misc(r3, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0x4) ioctl$TIOCVHANGUP(r3, 0x5437, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = socket(0xa, 0x3, 0x3a) setsockopt$MRT6_ADD_MFC(r6, 0x29, 0xd3, &(0x7f0000000080)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @mcast2}}, 0x5c) setsockopt$inet6_tcp_int(r6, 0x6, 0x10, &(0x7f0000000000)=0x20, 0x4) r7 = fcntl$dupfd(r6, 0x406, r6) r8 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r8, &(0x7f0000000080), 0x10) r9 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r9, 0x8933, &(0x7f0000000040)={'vcan0\x00', 0x0}) sendmsg$can_bcm(r8, &(0x7f0000000280)={&(0x7f0000000000)={0x1d, r10}, 0x10, &(0x7f0000000200)={&(0x7f00000002c0)={0x2, 0x11, 0x0, {0x0, 0x2710}, {}, {}, 0x300, @can={{0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, "f5813f23b5e6b9b1"}}, 0x48}, 0x1, 0x0, 0x0, 0x4040800}, 0x0) setsockopt$MRT6_ADD_MIF(r7, 0x29, 0xcb, &(0x7f0000000040)={0x0, 0x0, 0x7f, r10, 0x1}, 0xc) setsockopt$IP6T_SO_SET_REPLACE(r5, 0x29, 0x40, &(0x7f0000000b40)=@raw={'raw\x00', 0x3c1, 0x3, 0x3a8, 0x1e8, 0x9403, 0x0, 0x0, 0x2c0, 0x2d8, 0x3d8, 0x3d8, 0x2d8, 0x3d8, 0x3, 0x0, {[{{@ipv6={@remote, @local, [0xffffffff, 0xff, 0xffffff00, 0xffffffff], [0xffffff00, 0xff000000, 0xffffffff, 0xffffffff], 'erspan0\x00', 'veth0_to_hsr\x00', {0xff}, {}, 0x2f, 0x3, 0x1, 0x7f}, 0x0, 0x1c8, 0x1e8, 0x0, {}, [@common=@inet=@dscp={{0x28}, {0x9, 0x1}}, @common=@inet=@recent0={{0xf8}, {0x0, 0x8, 0x1, 0x0, 'syz0\x00'}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0xf0}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x11000, 0x0, 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x408) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/power/pm_debug_messages', 0x88001, 0x0) [ 357.987455] audit: type=1804 audit(1677355584.570:185): pid=15960 uid=0 auid=4294967295 ses=4294967295 op="invalid_pcr" cause="open_writers" comm="syz-executor.0" name="/root/syzkaller-testdir3392027881/syzkaller.HZ3dQw/292/bus" dev="sda1" ino=14197 res=1 20:06:24 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) madvise(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x80000000e) mremap(&(0x7f0000a96000/0x1000)=nil, 0x1000, 0x400000, 0x3, &(0x7f0000000000/0x400000)=nil) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000680)={0x50, 0x0, 0x0, {0x7, 0x21}}, 0x50) r0 = shmget$private(0x0, 0x2000, 0x0, &(0x7f0000115000/0x2000)=nil) shmat(r0, &(0x7f00001d5000/0x4000)=nil, 0x5000) openat$procfs(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/cpuinfo\x00', 0x0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='numa_maps\x00') readv(r1, &(0x7f00000012c0)=[{&(0x7f0000001400)=""/4110, 0x100e}], 0x2d) [ 358.101436] audit: type=1804 audit(1677355584.570:186): pid=15960 uid=0 auid=4294967295 ses=4294967295 op="invalid_pcr" cause="ToMToU" comm="syz-executor.0" name="/root/syzkaller-testdir3392027881/syzkaller.HZ3dQw/292/bus" dev="sda1" ino=14197 res=1 [ 358.164906] device bond2 entered promiscuous mode [ 358.173099] IPv6: ADDRCONF(NETDEV_UP): bond2: link is not ready [ 358.179210] 8021q: adding VLAN 0 to HW filter on device bond2 20:06:24 executing program 0: open(&(0x7f0000000080)='./bus\x00', 0x40842, 0x0) r0 = open(&(0x7f0000000180)='./bus\x00', 0x4c03e, 0x0) r1 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r1, 0x800) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x0, 0x0) r3 = socket$inet6(0xa, 0x401000000001, 0x0) close(r3) r4 = open(&(0x7f0000000400)='./bus\x00', 0x104e042, 0x0) sendfile(r4, r3, 0x0, 0xfffffffb) sendfile(r4, r2, 0x0, 0xfffd) mmap(&(0x7f0000000000/0x600000)=nil, 0x600204, 0x7ffffe, 0x4002011, r0, 0x0) r5 = socket(0x2, 0x2, 0x1) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000040)='bridge0\x00', 0x10) sendmsg$DEVLINK_CMD_SB_PORT_POOL_SET(r5, &(0x7f0000001280)={&(0x7f0000000000)={0x2, 0x0, 0xe0}, 0x10, &(0x7f0000001240)={&(0x7f0000000c00)=ANY=[@ANYBLOB='\b\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="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"], 0xffeb}}, 0x0) 20:06:24 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) madvise(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x80000000e) mremap(&(0x7f0000a96000/0x1000)=nil, 0x1000, 0x400000, 0x3, &(0x7f0000000000/0x400000)=nil) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000680)={0x50, 0x0, 0x0, {0x7, 0x21}}, 0x50) r0 = shmget$private(0x0, 0x2000, 0x0, &(0x7f0000115000/0x2000)=nil) shmat(r0, &(0x7f00001d5000/0x4000)=nil, 0x5000) openat$procfs(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/cpuinfo\x00', 0x0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='numa_maps\x00') readv(r1, &(0x7f00000012c0)=[{&(0x7f0000001400)=""/4110, 0x100e}], 0x2d) [ 358.198744] audit: type=1804 audit(1677355584.660:187): pid=15971 uid=0 auid=4294967295 ses=4294967295 op="invalid_pcr" cause="ToMToU" comm="syz-executor.0" name="/root/syzkaller-testdir3392027881/syzkaller.HZ3dQw/292/bus" dev="sda1" ino=14197 res=1 [ 358.237048] bond2: The slave device specified does not support setting the MAC address [ 358.299751] bond2: Setting fail_over_mac to active for active-backup mode [ 358.315254] audit: type=1804 audit(1677355584.900:188): pid=16014 uid=0 auid=4294967295 ses=4294967295 op="invalid_pcr" cause="open_writers" comm="syz-executor.0" name="/root/syzkaller-testdir3392027881/syzkaller.HZ3dQw/293/bus" dev="sda1" ino=14387 res=1 [ 358.324035] bond2: making interface ip6gre2 the new active one 20:06:24 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) madvise(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x80000000e) mremap(&(0x7f0000a96000/0x1000)=nil, 0x1000, 0x400000, 0x3, &(0x7f0000000000/0x400000)=nil) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000680)={0x50, 0x0, 0x0, {0x7, 0x21}}, 0x50) r0 = shmget$private(0x0, 0x2000, 0x0, &(0x7f0000115000/0x2000)=nil) shmat(r0, &(0x7f00001d5000/0x4000)=nil, 0x5000) openat$procfs(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/cpuinfo\x00', 0x0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='numa_maps\x00') readv(r1, &(0x7f00000012c0)=[{&(0x7f0000001400)=""/4110, 0x100e}], 0x2d) 20:06:25 executing program 3: syz_open_procfs(0x0, 0x0) r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xddf000)=nil, 0xddf000, 0x3000001, 0x32, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x6100) write$cgroup_type(r0, &(0x7f0000000200), 0x3fe00) r1 = socket$packet(0x11, 0x0, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, 0x0) socket(0x0, 0x0, 0x0) socket(0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) [ 358.349768] device ip6gre2 entered promiscuous mode [ 358.361800] bond2: Enslaving ip6gre2 as an active interface with an up link [ 358.370169] IPv6: ADDRCONF(NETDEV_CHANGE): bond2: link becomes ready 20:06:25 executing program 2: socket$netlink(0x10, 0x3, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_CRIT_PROTOCOL_START(r2, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={0x0, 0x1c}}, 0x0) getsockname$packet(r2, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="3c00000010008506f7002000fe6122314a000800", @ANYRES32=r3, @ANYBLOB="2377f292252155b21c0012000c000100626f6e64000000000c0002000800010001"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000100)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @ip6gre={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r3}]}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x44}}, 0x0) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, &(0x7f0000000080), 0x4) [ 358.500733] audit: type=1804 audit(1677355584.930:189): pid=16014 uid=0 auid=4294967295 ses=4294967295 op="invalid_pcr" cause="ToMToU" comm="syz-executor.0" name="/root/syzkaller-testdir3392027881/syzkaller.HZ3dQw/293/bus" dev="sda1" ino=14387 res=1 [ 358.664115] audit: type=1804 audit(1677355585.000:190): pid=16021 uid=0 auid=4294967295 ses=4294967295 op="invalid_pcr" cause="ToMToU" comm="syz-executor.0" name="/root/syzkaller-testdir3392027881/syzkaller.HZ3dQw/293/bus" dev="sda1" ino=14387 res=1 [ 358.702885] device bond3 entered promiscuous mode [ 358.708505] IPv6: ADDRCONF(NETDEV_UP): bond3: link is not ready [ 358.715274] 8021q: adding VLAN 0 to HW filter on device bond3 [ 358.727998] bond3: The slave device specified does not support setting the MAC address [ 358.738166] bond3: Setting fail_over_mac to active for active-backup mode [ 358.753647] bond3: making interface ip6gre3 the new active one [ 358.759868] device ip6gre3 entered promiscuous mode [ 358.773274] bond3: Enslaving ip6gre3 as an active interface with an up link [ 358.781366] IPv6: ADDRCONF(NETDEV_CHANGE): bond3: link becomes ready 20:06:25 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) write$cgroup_type(r0, &(0x7f0000000080), 0x11ffffce1) r1 = perf_event_open(&(0x7f0000001940)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000000000000000000004b64ffec850000006d000000850000000500000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='blkio.bfq.dequeue\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x660c, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x80, 0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x100, 0x4, @perf_bp, 0x18088, 0x0, 0x0, 0x0, 0x7, 0x81, 0x7f, 0x0, 0x536, 0x0, 0x6}, 0x0, 0x0, r1, 0x0) 20:06:25 executing program 4: r0 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000080)='.log\x00', 0xc0040, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x0) 20:06:25 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) madvise(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x80000000e) mremap(&(0x7f0000a96000/0x1000)=nil, 0x1000, 0x400000, 0x3, &(0x7f0000000000/0x400000)=nil) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000680)={0x50, 0x0, 0x0, {0x7, 0x21}}, 0x50) r0 = shmget$private(0x0, 0x2000, 0x0, &(0x7f0000115000/0x2000)=nil) shmat(r0, &(0x7f00001d5000/0x4000)=nil, 0x5000) openat$procfs(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/cpuinfo\x00', 0x0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='numa_maps\x00') readv(r1, &(0x7f00000012c0)=[{&(0x7f0000001400)=""/4110, 0x100e}], 0x2d) 20:06:25 executing program 0: open(&(0x7f0000000080)='./bus\x00', 0x40842, 0x0) r0 = open(&(0x7f0000000180)='./bus\x00', 0x4c03e, 0x0) r1 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r1, 0x800) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x0, 0x0) r3 = socket$inet6(0xa, 0x401000000001, 0x0) close(r3) r4 = open(&(0x7f0000000400)='./bus\x00', 0x104e042, 0x0) sendfile(r4, r3, 0x0, 0xfffffffb) sendfile(r4, r2, 0x0, 0xfffd) mmap(&(0x7f0000000000/0x600000)=nil, 0x600204, 0x7ffffe, 0x4002011, r0, 0x0) r5 = socket(0x2, 0x2, 0x1) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000040)='bridge0\x00', 0x10) sendmsg$DEVLINK_CMD_SB_PORT_POOL_SET(r5, &(0x7f0000001280)={&(0x7f0000000000)={0x2, 0x0, 0xe0}, 0x10, &(0x7f0000001240)={&(0x7f0000000c00)=ANY=[@ANYBLOB='\b\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="0000000000000000000014000000d6fe01007063690011000200303030303a30303a31302e3000000000080003000000000032000b000000000006001100000000000800150000000000000001006e657464657673696d000000000002006e657464657673696d300000080003000000000008000b000000000006001100000000000800150000000000f566000000000000657673696d0000000f0002006e657464657673696d300000080003000000000008000b000000000006001100000000000800150000000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000000000006001100000000001100150000000000a687fed5b71afd0d1ed82cb84adebf4b0a0bad544d239829f84e4daafc3900609563436f2056b6a47f1a0ec4a8f7eb672df594077e"], 0xffeb}}, 0x0) 20:06:25 executing program 3: syz_open_procfs(0x0, 0x0) r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xddf000)=nil, 0xddf000, 0x3000001, 0x32, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x6100) write$cgroup_type(r0, &(0x7f0000000200), 0x3fe00) r1 = socket$packet(0x11, 0x0, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, 0x0) socket(0x0, 0x0, 0x0) socket(0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) 20:06:25 executing program 2: socket$netlink(0x10, 0x3, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_CRIT_PROTOCOL_START(r2, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={0x0, 0x1c}}, 0x0) getsockname$packet(r2, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="3c00000010008506f7002000fe6122314a000800", @ANYRES32=r3, @ANYBLOB="2377f292252155b21c0012000c000100626f6e64000000000c0002000800010001"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000100)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @ip6gre={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r3}]}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x44}}, 0x0) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, &(0x7f0000000080), 0x4) 20:06:25 executing program 4: syz_open_procfs(0x0, 0x0) r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xddf000)=nil, 0xddf000, 0x3000001, 0x32, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x6100) write$cgroup_type(r0, &(0x7f0000000200), 0x3fe00) r1 = socket$packet(0x11, 0x0, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, 0x0) socket(0x0, 0x0, 0x0) socket(0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) 20:06:25 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) madvise(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x80000000e) mremap(&(0x7f0000a96000/0x1000)=nil, 0x1000, 0x400000, 0x3, &(0x7f0000000000/0x400000)=nil) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000680)={0x50, 0x0, 0x0, {0x7, 0x21}}, 0x50) r0 = shmget$private(0x0, 0x2000, 0x0, &(0x7f0000115000/0x2000)=nil) shmat(r0, &(0x7f00001d5000/0x4000)=nil, 0x5000) openat$procfs(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/cpuinfo\x00', 0x0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='numa_maps\x00') readv(r1, &(0x7f00000012c0)=[{&(0x7f0000001400)=""/4110, 0x100e}], 0x2d) [ 358.954889] audit: type=1804 audit(1677355585.540:191): pid=16075 uid=0 auid=4294967295 ses=4294967295 op="invalid_pcr" cause="open_writers" comm="syz-executor.0" name="/root/syzkaller-testdir3392027881/syzkaller.HZ3dQw/294/bus" dev="sda1" ino=13976 res=1 [ 359.017634] audit: type=1804 audit(1677355585.580:192): pid=16075 uid=0 auid=4294967295 ses=4294967295 op="invalid_pcr" cause="ToMToU" comm="syz-executor.0" name="/root/syzkaller-testdir3392027881/syzkaller.HZ3dQw/294/bus" dev="sda1" ino=13976 res=1 20:06:25 executing program 3: syz_open_procfs(0x0, 0x0) r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xddf000)=nil, 0xddf000, 0x3000001, 0x32, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x6100) write$cgroup_type(r0, &(0x7f0000000200), 0x3fe00) r1 = socket$packet(0x11, 0x0, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, 0x0) socket(0x0, 0x0, 0x0) socket(0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) 20:06:25 executing program 4: syz_open_procfs(0x0, 0x0) r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xddf000)=nil, 0xddf000, 0x3000001, 0x32, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x6100) write$cgroup_type(r0, &(0x7f0000000200), 0x3fe00) r1 = socket$packet(0x11, 0x0, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, 0x0) socket(0x0, 0x0, 0x0) socket(0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) [ 359.114638] device bond4 entered promiscuous mode [ 359.133223] IPv6: ADDRCONF(NETDEV_UP): bond4: link is not ready [ 359.177968] 8021q: adding VLAN 0 to HW filter on device bond4 [ 359.199883] audit: type=1804 audit(1677355585.640:193): pid=16100 uid=0 auid=4294967295 ses=4294967295 op="invalid_pcr" cause="ToMToU" comm="syz-executor.0" name="/root/syzkaller-testdir3392027881/syzkaller.HZ3dQw/294/bus" dev="sda1" ino=13976 res=1 20:06:25 executing program 1: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vbi(&(0x7f0000000100), 0x1, 0x2) r1 = memfd_create(&(0x7f0000000140)='\\vn\x81t0?\xd4\x9d^\xab\x86\\\x8do\xca7\x8aIe\x88\x93.et1', 0x4) ftruncate(r1, 0x1000000) sendfile(r0, r1, &(0x7f0000000040)=0xf18003, 0xeefffdef) 20:06:25 executing program 0: open(&(0x7f0000000080)='./bus\x00', 0x40842, 0x0) r0 = open(&(0x7f0000000180)='./bus\x00', 0x4c03e, 0x0) r1 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r1, 0x800) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x0, 0x0) r3 = socket$inet6(0xa, 0x401000000001, 0x0) close(r3) r4 = open(&(0x7f0000000400)='./bus\x00', 0x104e042, 0x0) sendfile(r4, r3, 0x0, 0xfffffffb) sendfile(r4, r2, 0x0, 0xfffd) mmap(&(0x7f0000000000/0x600000)=nil, 0x600204, 0x7ffffe, 0x4002011, r0, 0x0) r5 = socket(0x2, 0x2, 0x1) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000040)='bridge0\x00', 0x10) sendmsg$DEVLINK_CMD_SB_PORT_POOL_SET(r5, &(0x7f0000001280)={&(0x7f0000000000)={0x2, 0x0, 0xe0}, 0x10, &(0x7f0000001240)={&(0x7f0000000c00)=ANY=[@ANYBLOB='\b\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="0000000000000000000014000000d6fe01007063690011000200303030303a30303a31302e3000000000080003000000000032000b000000000006001100000000000800150000000000000001006e657464657673696d000000000002006e657464657673696d300000080003000000000008000b000000000006001100000000000800150000000000f566000000000000657673696d0000000f0002006e657464657673696d300000080003000000000008000b000000000006001100000000000800150000000000080001007063690011000200303030303a30303a31302e3000000000080003000000000008000b000000000006001100000000001100150000000000a687fed5b71afd0d1ed82cb84adebf4b0a0bad544d239829f84e4daafc3900609563436f2056b6a47f1a0ec4a8f7eb672df594077e"], 0xffeb}}, 0x0) [ 359.227196] bond4: The slave device specified does not support setting the MAC address [ 359.275654] bond4: Setting fail_over_mac to active for active-backup mode [ 359.322406] bond4: making interface ip6gre4 the new active one [ 359.328458] device ip6gre4 entered promiscuous mode [ 359.354845] bond4: Enslaving ip6gre4 as an active interface with an up link [ 359.368917] IPv6: ADDRCONF(NETDEV_CHANGE): bond4: link becomes ready 20:06:26 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) write$cgroup_type(r0, &(0x7f0000000080), 0x11ffffce1) r1 = perf_event_open(&(0x7f0000001940)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000000000000000000004b64ffec850000006d000000850000000500000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='blkio.bfq.dequeue\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x660c, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x80, 0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x100, 0x4, @perf_bp, 0x18088, 0x0, 0x0, 0x0, 0x7, 0x81, 0x7f, 0x0, 0x536, 0x0, 0x6}, 0x0, 0x0, r1, 0x0) 20:06:26 executing program 1: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vbi(&(0x7f0000000100), 0x1, 0x2) r1 = memfd_create(&(0x7f0000000140)='\\vn\x81t0?\xd4\x9d^\xab\x86\\\x8do\xca7\x8aIe\x88\x93.et1', 0x4) ftruncate(r1, 0x1000000) sendfile(r0, r1, &(0x7f0000000040)=0xf18003, 0xeefffdef) 20:06:26 executing program 3: syz_open_procfs(0x0, 0x0) r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xddf000)=nil, 0xddf000, 0x3000001, 0x32, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x6100) write$cgroup_type(r0, &(0x7f0000000200), 0x3fe00) r1 = socket$packet(0x11, 0x0, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, 0x0) socket(0x0, 0x0, 0x0) socket(0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) 20:06:26 executing program 4: syz_open_procfs(0x0, 0x0) r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xddf000)=nil, 0xddf000, 0x3000001, 0x32, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x6100) write$cgroup_type(r0, &(0x7f0000000200), 0x3fe00) r1 = socket$packet(0x11, 0x0, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, 0x0) socket(0x0, 0x0, 0x0) socket(0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) 20:06:26 executing program 2: r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c1142, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r0, 0x0) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x6100) ftruncate(r1, 0x8200) write$cgroup_type(r1, &(0x7f0000000200), 0x175d900f) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x9) r2 = socket$inet6(0xa, 0x1, 0x0) close(r2) open(&(0x7f00000002c0)='./bus\x00', 0x14d842, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000002300)={0x0, 0x0, 0x0}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000075c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) sendfile(r2, r2, 0x0, 0x201000) 20:06:26 executing program 0: ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, &(0x7f0000000040)={0x0, 0x0, "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", "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"}) timer_create(0x0, &(0x7f0000000080)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000140)) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) timer_settime(0x0, 0x1, &(0x7f0000000100)={{0x77359400}}, 0x0) 20:06:26 executing program 0: ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, &(0x7f0000000040)={0x0, 0x0, "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", "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"}) timer_create(0x0, &(0x7f0000000080)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000140)) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) timer_settime(0x0, 0x1, &(0x7f0000000100)={{0x77359400}}, 0x0) 20:06:26 executing program 1: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vbi(&(0x7f0000000100), 0x1, 0x2) r1 = memfd_create(&(0x7f0000000140)='\\vn\x81t0?\xd4\x9d^\xab\x86\\\x8do\xca7\x8aIe\x88\x93.et1', 0x4) ftruncate(r1, 0x1000000) sendfile(r0, r1, &(0x7f0000000040)=0xf18003, 0xeefffdef) 20:06:26 executing program 0: ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, &(0x7f0000000040)={0x0, 0x0, "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", "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"}) timer_create(0x0, &(0x7f0000000080)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000140)) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) timer_settime(0x0, 0x1, &(0x7f0000000100)={{0x77359400}}, 0x0) 20:06:26 executing program 2: r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c1142, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r0, 0x0) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x6100) ftruncate(r1, 0x8200) write$cgroup_type(r1, &(0x7f0000000200), 0x175d900f) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x9) r2 = socket$inet6(0xa, 0x1, 0x0) close(r2) open(&(0x7f00000002c0)='./bus\x00', 0x14d842, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000002300)={0x0, 0x0, 0x0}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000075c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) sendfile(r2, r2, 0x0, 0x201000) 20:06:26 executing program 1: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vbi(&(0x7f0000000100), 0x1, 0x2) r1 = memfd_create(&(0x7f0000000140)='\\vn\x81t0?\xd4\x9d^\xab\x86\\\x8do\xca7\x8aIe\x88\x93.et1', 0x4) ftruncate(r1, 0x1000000) sendfile(r0, r1, &(0x7f0000000040)=0xf18003, 0xeefffdef) 20:06:26 executing program 3: r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c1142, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r0, 0x0) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x6100) ftruncate(r1, 0x8200) write$cgroup_type(r1, &(0x7f0000000200), 0x175d900f) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x9) r2 = socket$inet6(0xa, 0x1, 0x0) close(r2) open(&(0x7f00000002c0)='./bus\x00', 0x14d842, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000002300)={0x0, 0x0, 0x0}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000075c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) sendfile(r2, r2, 0x0, 0x201000) 20:06:27 executing program 4: r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x3, @broadcast, 'macsec0\x00'}}, 0x1e) ioctl$PPPOEIOCSFWD(r0, 0x80047437, 0x0) 20:06:27 executing program 0: ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, &(0x7f0000000040)={0x0, 0x0, "9b2e70ac30857323e172d762b89f90b274e0b043acbf0dbd23e56c160f906d4b1626a0e3b8b9241875c19c2dffad568e29a01afc1cb9400e744090a9d50629af6bfe78ed2d8f58c4acc732c317498cf123f87cff3e7b9153eab9fee0bca742c506084c199580d4f158e0fc4e448015260890104397d2b586dda84b914c40109936d3e791d914a2001cb8e6764be449d9d7032019cdcca17d41db16e078f2b446d4e813af2dfeb16de52b813976ca0b6c53262f2755449ac18ed88039c7ef6e1a3c21bcc33375a3e6dfd7a5ac80bc6dacfdc99f435dd40e999a07e6f71ac66a82242f753e4a069863f490a1e3bcf69fbf242b87605647ae3c1269a75d88a45a1f", "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"}) timer_create(0x0, &(0x7f0000000080)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000140)) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) timer_settime(0x0, 0x1, &(0x7f0000000100)={{0x77359400}}, 0x0) 20:06:27 executing program 3: r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c1142, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r0, 0x0) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x6100) ftruncate(r1, 0x8200) write$cgroup_type(r1, &(0x7f0000000200), 0x175d900f) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x9) r2 = socket$inet6(0xa, 0x1, 0x0) close(r2) open(&(0x7f00000002c0)='./bus\x00', 0x14d842, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000002300)={0x0, 0x0, 0x0}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000075c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) sendfile(r2, r2, 0x0, 0x201000) 20:06:27 executing program 1: alarm(0x6) alarm(0x0) 20:06:27 executing program 2: r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c1142, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r0, 0x0) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x6100) ftruncate(r1, 0x8200) write$cgroup_type(r1, &(0x7f0000000200), 0x175d900f) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x9) r2 = socket$inet6(0xa, 0x1, 0x0) close(r2) open(&(0x7f00000002c0)='./bus\x00', 0x14d842, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000002300)={0x0, 0x0, 0x0}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000075c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) sendfile(r2, r2, 0x0, 0x201000) 20:06:27 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa95, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002980)={0x0, 0x0, &(0x7f0000002940)={&(0x7f0000000000)=ANY=[@ANYBLOB="7000000030003b050000000000000000000000005c000100580001000b00010073616d706c6500002c00028008000500000000000800030004000000180002"], 0x70}}, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) 20:06:27 executing program 1: r0 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000540), 0xffffffffffffffff) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_SET_PAN_ID(r1, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000700)={&(0x7f0000000680)={0x20, r0, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}]}, 0x20}}, 0x0) 20:06:27 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmmsg$inet_sctp(r0, &(0x7f00000031c0)=[{&(0x7f00000000c0)=@in={0x2, 0x0, @loopback}, 0x10, &(0x7f00000006c0)=[{&(0x7f00000002c0)="d5", 0x1}], 0x1}], 0x1, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000700)={0x0, 0x360, "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"}, &(0x7f0000000000)=0x368) 20:06:27 executing program 0: socket(0x1a, 0x0, 0x0) [ 360.647865] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. 20:06:27 executing program 1: fcntl$setlease(0xffffffffffffffff, 0x400, 0x2) r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfb, 0x1, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2}}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x5777d6ab86fd3dc9) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xff7fffffffffffff, r0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000180), 0x1000000000000000, 0x103380) r2 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) syz_emit_ethernet(0x90, &(0x7f0000000380)=ANY=[], 0x0) syz_emit_ethernet(0xe, &(0x7f0000000440)=ANY=[], 0x0) fgetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0) pwritev(r2, &(0x7f0000000280)=[{&(0x7f0000000340)='?', 0x1}], 0x1, 0x81806, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) socketpair$unix(0x1, 0x1, 0x0, 0x0) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000000)={'syz_tun\x00', 0x0}) setsockopt$packet_add_memb(r3, 0x107, 0x1, &(0x7f00000000c0)={r4, 0x1, 0x6, @dev}, 0x10) setsockopt$packet_add_memb(r3, 0x107, 0x2, &(0x7f0000000040)={0x0, 0x1, 0x6, @multicast}, 0x10) write$binfmt_script(r3, &(0x7f0000000100)={'#! ', './file0', [{0x20, '.^\xc5'}], 0xa, "7c52d020c62c96efa93ffacd5d6be9e358933eb548df73dd80c2e317e152e0945b6167ecc5054c75ac4142b6a556349d"}, 0x3f) syz_emit_ethernet(0x56, &(0x7f00000001c0)=ANY=[@ANYBLOB="bbbbbbbbbbbbaaaaaaaaaaaa000d020000602103000034eff83e97589a4782022240572a234bb4f4e1a551d23eab08ac5059aeec528a7a45d71f6532b47909d5e7531c4615a49bc14d53e86bb4a11e643c3e22944761"], &(0x7f00000002c0)={0x0, 0x1, [0xae0, 0x217, 0x53e, 0xfc7]}) sendfile(0xffffffffffffffff, r1, 0x0, 0x24002da8) ioctl$LOOP_CLR_FD(r1, 0x4c01) [ 360.688625] [ 360.690436] ============================= [ 360.715194] WARNING: suspicious RCU usage [ 360.730758] 4.14.307-syzkaller #0 Not tainted 20:06:27 executing program 0: perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0xd8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000008c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000880), 0xfffffffffffffddd}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000140)="3d6ee2e04b91ab10143d9abe86dd", 0x0, 0xe04, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) [ 360.738738] ----------------------------- [ 360.769644] net/sched/act_sample.c:95 suspicious rcu_dereference_protected() usage! [ 360.797807] [ 360.797807] other info that might help us debug this: [ 360.797807] [ 360.820196] [ 360.820196] rcu_scheduler_active = 2, debug_locks = 1 [ 360.828109] 1 lock held by syz-executor.4/16188: [ 360.837071] #0: (rtnl_mutex){+.+.}, at: [] rtnetlink_rcv_msg+0x31d/0xb10 [ 360.848498] [ 360.848498] stack backtrace: [ 360.854719] CPU: 0 PID: 16188 Comm: syz-executor.4 Not tainted 4.14.307-syzkaller #0 [ 360.862631] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [ 360.871995] Call Trace: [ 360.874609] dump_stack+0x1b2/0x281 [ 360.878262] tcf_sample_init+0x71c/0x8c0 [ 360.882341] ? tcf_sample_cleanup_rcu+0x60/0x60 [ 360.887034] tcf_action_init_1+0x51a/0x9e0 [ 360.891280] ? __lock_acquire+0x5fc/0x3f20 [ 360.895528] ? tcf_action_dump_old+0x80/0x80 [ 360.899964] ? nla_parse+0x157/0x1f0 [ 360.903691] tcf_action_init+0x26d/0x400 [ 360.907773] ? tcf_action_init_1+0x9e0/0x9e0 [ 360.912284] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 360.917082] ? memset+0x20/0x40 [ 360.920373] ? nla_parse+0x157/0x1f0 [ 360.924134] tc_ctl_action+0x2e3/0x510 [ 360.928035] ? tca_action_gd+0x790/0x790 [ 360.932103] ? rtnetlink_rcv_msg+0x2e8/0xb10 [ 360.936531] ? tca_action_gd+0x790/0x790 [ 360.940606] rtnetlink_rcv_msg+0x3be/0xb10 [ 360.944856] ? rtnl_calcit.isra.0+0x3a0/0x3a0 [ 360.949368] ? retint_kernel+0x2d/0x2d [ 360.953268] ? trace_hardirqs_on_caller+0x3a8/0x580 [ 360.958300] netlink_rcv_skb+0x125/0x390 [ 360.962379] ? rtnl_calcit.isra.0+0x3a0/0x3a0 [ 360.966889] ? netlink_ack+0x9a0/0x9a0 [ 360.970830] ? netlink_skb_set_owner_r+0xb9/0x1a0 [ 360.975685] netlink_unicast+0x437/0x610 [ 360.979779] ? netlink_sendskb+0xd0/0xd0 [ 360.983855] netlink_sendmsg+0x651/0xbc0 [ 360.987933] ? nlmsg_notify+0x1b0/0x1b0 [ 360.991913] ? kernel_recvmsg+0x210/0x210 [ 360.996076] ? security_socket_sendmsg+0x83/0xb0 [ 361.000841] ? nlmsg_notify+0x1b0/0x1b0 [ 361.004825] sock_sendmsg+0xb5/0x100 [ 361.008546] ___sys_sendmsg+0x6c8/0x800 [ 361.012531] ? copy_msghdr_from_user+0x3b0/0x3b0 [ 361.017326] ? retint_kernel+0x2d/0x2d [ 361.021231] ? do_futex+0x127/0x1570 [ 361.024953] ? __fget+0x23e/0x3e0 [ 361.028418] ? lock_acquire+0x170/0x3f0 [ 361.032400] ? lock_downgrade+0x740/0x740 [ 361.036647] ? __fget+0x265/0x3e0 [ 361.040120] ? __fdget+0x19b/0x1f0 [ 361.043671] ? sockfd_lookup_light+0xb2/0x160 [ 361.048183] __sys_sendmsg+0xa3/0x120 [ 361.052008] ? SyS_shutdown+0x160/0x160 [ 361.056010] ? move_addr_to_kernel+0x60/0x60 [ 361.060434] SyS_sendmsg+0x27/0x40 [ 361.063982] ? __sys_sendmsg+0x120/0x120 [ 361.068055] do_syscall_64+0x1d5/0x640 [ 361.071959] entry_SYSCALL_64_after_hwframe+0x5e/0xd3 [ 361.077157] RIP: 0033:0x7f77990550f9 [ 361.080893] RSP: 002b:00007f77975c7168 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 361.088628] RAX: ffffffffffffffda RBX: 00007f7799174f80 RCX: 00007f77990550f9 [ 361.095904] RDX: 0000000000000000 RSI: 0000000020002980 RDI: 0000000000000004 [ 361.103180] RBP: 00007f77990b0ae9 R08: 0000000000000000 R09: 0000000000000000 [ 361.110463] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 20:06:27 executing program 3: r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c1142, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r0, 0x0) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x6100) ftruncate(r1, 0x8200) write$cgroup_type(r1, &(0x7f0000000200), 0x175d900f) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x9) r2 = socket$inet6(0xa, 0x1, 0x0) close(r2) open(&(0x7f00000002c0)='./bus\x00', 0x14d842, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000002300)={0x0, 0x0, 0x0}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000075c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) sendfile(r2, r2, 0x0, 0x201000) [ 361.117766] R13: 00007ffc69ec2b5f R14: 00007f77975c7300 R15: 0000000000022000 20:06:27 executing program 2: r0 = open(&(0x7f0000000080)='./bus\x00', 0x1c1142, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r0, 0x0) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x6100) ftruncate(r1, 0x8200) write$cgroup_type(r1, &(0x7f0000000200), 0x175d900f) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x9) r2 = socket$inet6(0xa, 0x1, 0x0) close(r2) open(&(0x7f00000002c0)='./bus\x00', 0x14d842, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000002300)={0x0, 0x0, 0x0}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000075c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) sendfile(r2, r2, 0x0, 0x201000) 20:06:27 executing program 0: perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0xd8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000008c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000880), 0xfffffffffffffddd}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000140)="3d6ee2e04b91ab10143d9abe86dd", 0x0, 0xe04, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) [ 361.243993] device syz_tun entered promiscuous mode 20:06:27 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa95, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002980)={0x0, 0x0, &(0x7f0000002940)={&(0x7f0000000000)=ANY=[@ANYBLOB="7000000030003b050000000000000000000000005c000100580001000b00010073616d706c6500002c00028008000500000000000800030004000000180002"], 0x70}}, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) 20:06:27 executing program 1: fcntl$setlease(0xffffffffffffffff, 0x400, 0x2) r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfb, 0x1, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2}}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x5777d6ab86fd3dc9) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xff7fffffffffffff, r0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000180), 0x1000000000000000, 0x103380) r2 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) syz_emit_ethernet(0x90, &(0x7f0000000380)=ANY=[], 0x0) syz_emit_ethernet(0xe, &(0x7f0000000440)=ANY=[], 0x0) fgetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0) pwritev(r2, &(0x7f0000000280)=[{&(0x7f0000000340)='?', 0x1}], 0x1, 0x81806, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) socketpair$unix(0x1, 0x1, 0x0, 0x0) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000000)={'syz_tun\x00', 0x0}) setsockopt$packet_add_memb(r3, 0x107, 0x1, &(0x7f00000000c0)={r4, 0x1, 0x6, @dev}, 0x10) setsockopt$packet_add_memb(r3, 0x107, 0x2, &(0x7f0000000040)={0x0, 0x1, 0x6, @multicast}, 0x10) write$binfmt_script(r3, &(0x7f0000000100)={'#! ', './file0', [{0x20, '.^\xc5'}], 0xa, "7c52d020c62c96efa93ffacd5d6be9e358933eb548df73dd80c2e317e152e0945b6167ecc5054c75ac4142b6a556349d"}, 0x3f) syz_emit_ethernet(0x56, &(0x7f00000001c0)=ANY=[@ANYBLOB="bbbbbbbbbbbbaaaaaaaaaaaa000d020000602103000034eff83e97589a4782022240572a234bb4f4e1a551d23eab08ac5059aeec528a7a45d71f6532b47909d5e7531c4615a49bc14d53e86bb4a11e643c3e22944761"], &(0x7f00000002c0)={0x0, 0x1, [0xae0, 0x217, 0x53e, 0xfc7]}) sendfile(0xffffffffffffffff, r1, 0x0, 0x24002da8) ioctl$LOOP_CLR_FD(r1, 0x4c01) [ 361.265272] device syz_tun left promiscuous mode 20:06:27 executing program 3: fcntl$setlease(0xffffffffffffffff, 0x400, 0x2) r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfb, 0x1, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2}}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x5777d6ab86fd3dc9) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xff7fffffffffffff, r0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000180), 0x1000000000000000, 0x103380) r2 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) syz_emit_ethernet(0x90, &(0x7f0000000380)=ANY=[], 0x0) syz_emit_ethernet(0xe, &(0x7f0000000440)=ANY=[], 0x0) fgetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0) pwritev(r2, &(0x7f0000000280)=[{&(0x7f0000000340)='?', 0x1}], 0x1, 0x81806, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) socketpair$unix(0x1, 0x1, 0x0, 0x0) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000000)={'syz_tun\x00', 0x0}) setsockopt$packet_add_memb(r3, 0x107, 0x1, &(0x7f00000000c0)={r4, 0x1, 0x6, @dev}, 0x10) setsockopt$packet_add_memb(r3, 0x107, 0x2, &(0x7f0000000040)={0x0, 0x1, 0x6, @multicast}, 0x10) write$binfmt_script(r3, &(0x7f0000000100)={'#! ', './file0', [{0x20, '.^\xc5'}], 0xa, "7c52d020c62c96efa93ffacd5d6be9e358933eb548df73dd80c2e317e152e0945b6167ecc5054c75ac4142b6a556349d"}, 0x3f) syz_emit_ethernet(0x56, &(0x7f00000001c0)=ANY=[@ANYBLOB="bbbbbbbbbbbbaaaaaaaaaaaa000d020000602103000034eff83e97589a4782022240572a234bb4f4e1a551d23eab08ac5059aeec528a7a45d71f6532b47909d5e7531c4615a49bc14d53e86bb4a11e643c3e22944761"], &(0x7f00000002c0)={0x0, 0x1, [0xae0, 0x217, 0x53e, 0xfc7]}) sendfile(0xffffffffffffffff, r1, 0x0, 0x24002da8) ioctl$LOOP_CLR_FD(r1, 0x4c01) [ 361.346384] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. 20:06:27 executing program 0: perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0xd8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000008c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000880), 0xfffffffffffffddd}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000140)="3d6ee2e04b91ab10143d9abe86dd", 0x0, 0xe04, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) [ 361.407668] device syz_tun entered promiscuous mode 20:06:28 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa95, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002980)={0x0, 0x0, &(0x7f0000002940)={&(0x7f0000000000)=ANY=[@ANYBLOB="7000000030003b050000000000000000000000005c000100580001000b00010073616d706c6500002c00028008000500000000000800030004000000180002"], 0x70}}, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) [ 361.427944] device syz_tun left promiscuous mode [ 361.459359] device syz_tun entered promiscuous mode [ 361.487349] device syz_tun left promiscuous mode [ 361.518248] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. 20:06:28 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmmsg$inet_sctp(r0, &(0x7f00000031c0)=[{&(0x7f00000000c0)=@in={0x2, 0x0, @loopback}, 0x10, &(0x7f00000006c0)=[{&(0x7f00000002c0)="d5", 0x1}], 0x1}], 0x1, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000700)={0x0, 0x360, "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"}, &(0x7f0000000000)=0x368) 20:06:28 executing program 1: fcntl$setlease(0xffffffffffffffff, 0x400, 0x2) r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfb, 0x1, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2}}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x5777d6ab86fd3dc9) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xff7fffffffffffff, r0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000180), 0x1000000000000000, 0x103380) r2 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) syz_emit_ethernet(0x90, &(0x7f0000000380)=ANY=[], 0x0) syz_emit_ethernet(0xe, &(0x7f0000000440)=ANY=[], 0x0) fgetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0) pwritev(r2, &(0x7f0000000280)=[{&(0x7f0000000340)='?', 0x1}], 0x1, 0x81806, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) socketpair$unix(0x1, 0x1, 0x0, 0x0) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000000)={'syz_tun\x00', 0x0}) setsockopt$packet_add_memb(r3, 0x107, 0x1, &(0x7f00000000c0)={r4, 0x1, 0x6, @dev}, 0x10) setsockopt$packet_add_memb(r3, 0x107, 0x2, &(0x7f0000000040)={0x0, 0x1, 0x6, @multicast}, 0x10) write$binfmt_script(r3, &(0x7f0000000100)={'#! ', './file0', [{0x20, '.^\xc5'}], 0xa, "7c52d020c62c96efa93ffacd5d6be9e358933eb548df73dd80c2e317e152e0945b6167ecc5054c75ac4142b6a556349d"}, 0x3f) syz_emit_ethernet(0x56, &(0x7f00000001c0)=ANY=[@ANYBLOB="bbbbbbbbbbbbaaaaaaaaaaaa000d020000602103000034eff83e97589a4782022240572a234bb4f4e1a551d23eab08ac5059aeec528a7a45d71f6532b47909d5e7531c4615a49bc14d53e86bb4a11e643c3e22944761"], &(0x7f00000002c0)={0x0, 0x1, [0xae0, 0x217, 0x53e, 0xfc7]}) sendfile(0xffffffffffffffff, r1, 0x0, 0x24002da8) ioctl$LOOP_CLR_FD(r1, 0x4c01) 20:06:28 executing program 3: fcntl$setlease(0xffffffffffffffff, 0x400, 0x2) r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfb, 0x1, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2}}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x5777d6ab86fd3dc9) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xff7fffffffffffff, r0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000180), 0x1000000000000000, 0x103380) r2 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) syz_emit_ethernet(0x90, &(0x7f0000000380)=ANY=[], 0x0) syz_emit_ethernet(0xe, &(0x7f0000000440)=ANY=[], 0x0) fgetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0) pwritev(r2, &(0x7f0000000280)=[{&(0x7f0000000340)='?', 0x1}], 0x1, 0x81806, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) socketpair$unix(0x1, 0x1, 0x0, 0x0) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000000)={'syz_tun\x00', 0x0}) setsockopt$packet_add_memb(r3, 0x107, 0x1, &(0x7f00000000c0)={r4, 0x1, 0x6, @dev}, 0x10) setsockopt$packet_add_memb(r3, 0x107, 0x2, &(0x7f0000000040)={0x0, 0x1, 0x6, @multicast}, 0x10) write$binfmt_script(r3, &(0x7f0000000100)={'#! ', './file0', [{0x20, '.^\xc5'}], 0xa, "7c52d020c62c96efa93ffacd5d6be9e358933eb548df73dd80c2e317e152e0945b6167ecc5054c75ac4142b6a556349d"}, 0x3f) syz_emit_ethernet(0x56, &(0x7f00000001c0)=ANY=[@ANYBLOB="bbbbbbbbbbbbaaaaaaaaaaaa000d020000602103000034eff83e97589a4782022240572a234bb4f4e1a551d23eab08ac5059aeec528a7a45d71f6532b47909d5e7531c4615a49bc14d53e86bb4a11e643c3e22944761"], &(0x7f00000002c0)={0x0, 0x1, [0xae0, 0x217, 0x53e, 0xfc7]}) sendfile(0xffffffffffffffff, r1, 0x0, 0x24002da8) ioctl$LOOP_CLR_FD(r1, 0x4c01) 20:06:28 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa95, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002980)={0x0, 0x0, &(0x7f0000002940)={&(0x7f0000000000)=ANY=[@ANYBLOB="7000000030003b050000000000000000000000005c000100580001000b00010073616d706c6500002c00028008000500000000000800030004000000180002"], 0x70}}, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) 20:06:28 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) gettid() bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000640)={&(0x7f0000000600)='mm_migrate_pages\x00', r0}, 0x10) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000a7e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r2, &(0x7f0000000180), 0xfdef) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) syz_clone(0x20400, 0x0, 0x0, &(0x7f00000001c0), &(0x7f0000000500), 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000400)={0x3, 0x80, 0x0, 0x87, 0xf8, 0x7, 0x0, 0x8, 0x10, 0x4, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, @perf_bp={&(0x7f0000000140)}, 0x82080, 0x200000014a8c04, 0xc5, 0x0, 0x100, 0x6, 0x5, 0x0, 0x3, 0x0, 0x6}, 0x0, 0x0, r3, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000480)=0x81) write$cgroup_pid(0xffffffffffffffff, &(0x7f00000000c0), 0x12) r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$ITER_CREATE(0xb, &(0x7f0000000100)={r4}, 0x8) perf_event_open(&(0x7f0000000680)={0x2, 0x80, 0x0, 0xe3, 0x92, 0x81, 0x0, 0x81, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x100, 0x1, @perf_config_ext={0x9}, 0x10, 0x0, 0x4, 0x1, 0x271e, 0xfff, 0x55, 0x0, 0x7fff, 0x0, 0x5}, 0x0, 0xd, r4, 0x3) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(r5, &(0x7f0000000940)=ANY=[], 0xda00) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000540)={r5, 0x8, 0x0, 0x14da, &(0x7f00000004c0)=[0x0], 0x1}, 0x20) 20:06:28 executing program 0: perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0xd8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000008c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000880), 0xfffffffffffffddd}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000140)="3d6ee2e04b91ab10143d9abe86dd", 0x0, 0xe04, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) 20:06:28 executing program 3: fcntl$setlease(0xffffffffffffffff, 0x400, 0x2) r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfb, 0x1, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2}}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x5777d6ab86fd3dc9) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xff7fffffffffffff, r0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000180), 0x1000000000000000, 0x103380) r2 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) syz_emit_ethernet(0x90, &(0x7f0000000380)=ANY=[], 0x0) syz_emit_ethernet(0xe, &(0x7f0000000440)=ANY=[], 0x0) fgetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0) pwritev(r2, &(0x7f0000000280)=[{&(0x7f0000000340)='?', 0x1}], 0x1, 0x81806, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) socketpair$unix(0x1, 0x1, 0x0, 0x0) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000000)={'syz_tun\x00', 0x0}) setsockopt$packet_add_memb(r3, 0x107, 0x1, &(0x7f00000000c0)={r4, 0x1, 0x6, @dev}, 0x10) setsockopt$packet_add_memb(r3, 0x107, 0x2, &(0x7f0000000040)={0x0, 0x1, 0x6, @multicast}, 0x10) write$binfmt_script(r3, &(0x7f0000000100)={'#! ', './file0', [{0x20, '.^\xc5'}], 0xa, "7c52d020c62c96efa93ffacd5d6be9e358933eb548df73dd80c2e317e152e0945b6167ecc5054c75ac4142b6a556349d"}, 0x3f) syz_emit_ethernet(0x56, &(0x7f00000001c0)=ANY=[@ANYBLOB="bbbbbbbbbbbbaaaaaaaaaaaa000d020000602103000034eff83e97589a4782022240572a234bb4f4e1a551d23eab08ac5059aeec528a7a45d71f6532b47909d5e7531c4615a49bc14d53e86bb4a11e643c3e22944761"], &(0x7f00000002c0)={0x0, 0x1, [0xae0, 0x217, 0x53e, 0xfc7]}) sendfile(0xffffffffffffffff, r1, 0x0, 0x24002da8) ioctl$LOOP_CLR_FD(r1, 0x4c01) [ 361.789865] device syz_tun entered promiscuous mode [ 361.803760] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 361.819109] device syz_tun entered promiscuous mode [ 361.832011] device syz_tun left promiscuous mode 20:06:28 executing program 1: fcntl$setlease(0xffffffffffffffff, 0x400, 0x2) r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfb, 0x1, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2}}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x5777d6ab86fd3dc9) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xff7fffffffffffff, r0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000180), 0x1000000000000000, 0x103380) r2 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) syz_emit_ethernet(0x90, &(0x7f0000000380)=ANY=[], 0x0) syz_emit_ethernet(0xe, &(0x7f0000000440)=ANY=[], 0x0) fgetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0) pwritev(r2, &(0x7f0000000280)=[{&(0x7f0000000340)='?', 0x1}], 0x1, 0x81806, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) socketpair$unix(0x1, 0x1, 0x0, 0x0) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000000)={'syz_tun\x00', 0x0}) setsockopt$packet_add_memb(r3, 0x107, 0x1, &(0x7f00000000c0)={r4, 0x1, 0x6, @dev}, 0x10) setsockopt$packet_add_memb(r3, 0x107, 0x2, &(0x7f0000000040)={0x0, 0x1, 0x6, @multicast}, 0x10) write$binfmt_script(r3, &(0x7f0000000100)={'#! ', './file0', [{0x20, '.^\xc5'}], 0xa, "7c52d020c62c96efa93ffacd5d6be9e358933eb548df73dd80c2e317e152e0945b6167ecc5054c75ac4142b6a556349d"}, 0x3f) syz_emit_ethernet(0x56, &(0x7f00000001c0)=ANY=[@ANYBLOB="bbbbbbbbbbbbaaaaaaaaaaaa000d020000602103000034eff83e97589a4782022240572a234bb4f4e1a551d23eab08ac5059aeec528a7a45d71f6532b47909d5e7531c4615a49bc14d53e86bb4a11e643c3e22944761"], &(0x7f00000002c0)={0x0, 0x1, [0xae0, 0x217, 0x53e, 0xfc7]}) sendfile(0xffffffffffffffff, r1, 0x0, 0x24002da8) ioctl$LOOP_CLR_FD(r1, 0x4c01) [ 361.850165] device syz_tun left promiscuous mode 20:06:28 executing program 4: r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) close(r0) openat$uhid(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) poll(&(0x7f0000000080)=[{r0}], 0x1, 0x4) [ 361.917413] device syz_tun entered promiscuous mode [ 361.936905] device syz_tun left promiscuous mode 20:06:28 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000040)=0xc) flock(r0, 0x5) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f00000003c0)=[{&(0x7f0000000180)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000400)="390000001300034700bb5be1c3e4feff06000000010000004500000025000000190004000400ad000200000000000006040000000000f93132", 0x39}], 0x1) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f00000004c0)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x0, 0x7, 0x0, "98d3340600c7aa11897ecaab876eab79576839c5656be8410f2802e944af80373be2666b665770173fbd1883303b6ac4749393ad08f139a68f00"}, 0xd8) bind$inet(r2, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) r3 = syz_genetlink_get_family_id$tipc2(0x0, 0xffffffffffffffff) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000000000)={0x2, 0x24e23, @loopback}, 0x10) recvmmsg(r2, &(0x7f0000001840)=[{{0x0, 0x240, &(0x7f0000001500)=[{&(0x7f0000004ac0)=""/102389, 0x18ff5}], 0x1}}], 0x1, 0x100, 0x0) write$binfmt_elf64(r2, &(0x7f00000000c0)=ANY=[@ANYRESHEX=r3], 0xc63b9e35) 20:06:28 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) gettid() bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000640)={&(0x7f0000000600)='mm_migrate_pages\x00', r0}, 0x10) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000a7e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r2, &(0x7f0000000180), 0xfdef) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) syz_clone(0x20400, 0x0, 0x0, &(0x7f00000001c0), &(0x7f0000000500), 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000400)={0x3, 0x80, 0x0, 0x87, 0xf8, 0x7, 0x0, 0x8, 0x10, 0x4, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, @perf_bp={&(0x7f0000000140)}, 0x82080, 0x200000014a8c04, 0xc5, 0x0, 0x100, 0x6, 0x5, 0x0, 0x3, 0x0, 0x6}, 0x0, 0x0, r3, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000480)=0x81) write$cgroup_pid(0xffffffffffffffff, &(0x7f00000000c0), 0x12) r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$ITER_CREATE(0xb, &(0x7f0000000100)={r4}, 0x8) perf_event_open(&(0x7f0000000680)={0x2, 0x80, 0x0, 0xe3, 0x92, 0x81, 0x0, 0x81, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x100, 0x1, @perf_config_ext={0x9}, 0x10, 0x0, 0x4, 0x1, 0x271e, 0xfff, 0x55, 0x0, 0x7fff, 0x0, 0x5}, 0x0, 0xd, r4, 0x3) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(r5, &(0x7f0000000940)=ANY=[], 0xda00) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000540)={r5, 0x8, 0x0, 0x14da, &(0x7f00000004c0)=[0x0], 0x1}, 0x20) 20:06:28 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) gettid() bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000640)={&(0x7f0000000600)='mm_migrate_pages\x00', r0}, 0x10) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000a7e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r2, &(0x7f0000000180), 0xfdef) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) syz_clone(0x20400, 0x0, 0x0, &(0x7f00000001c0), &(0x7f0000000500), 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000400)={0x3, 0x80, 0x0, 0x87, 0xf8, 0x7, 0x0, 0x8, 0x10, 0x4, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, @perf_bp={&(0x7f0000000140)}, 0x82080, 0x200000014a8c04, 0xc5, 0x0, 0x100, 0x6, 0x5, 0x0, 0x3, 0x0, 0x6}, 0x0, 0x0, r3, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000480)=0x81) write$cgroup_pid(0xffffffffffffffff, &(0x7f00000000c0), 0x12) r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$ITER_CREATE(0xb, &(0x7f0000000100)={r4}, 0x8) perf_event_open(&(0x7f0000000680)={0x2, 0x80, 0x0, 0xe3, 0x92, 0x81, 0x0, 0x81, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x100, 0x1, @perf_config_ext={0x9}, 0x10, 0x0, 0x4, 0x1, 0x271e, 0xfff, 0x55, 0x0, 0x7fff, 0x0, 0x5}, 0x0, 0xd, r4, 0x3) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(r5, &(0x7f0000000940)=ANY=[], 0xda00) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000540)={r5, 0x8, 0x0, 0x14da, &(0x7f00000004c0)=[0x0], 0x1}, 0x20) [ 361.998506] device syz_tun entered promiscuous mode [ 362.046689] device syz_tun left promiscuous mode 20:06:29 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmmsg$inet_sctp(r0, &(0x7f00000031c0)=[{&(0x7f00000000c0)=@in={0x2, 0x0, @loopback}, 0x10, &(0x7f00000006c0)=[{&(0x7f00000002c0)="d5", 0x1}], 0x1}], 0x1, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000700)={0x0, 0x360, "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"}, &(0x7f0000000000)=0x368) 20:06:29 executing program 0: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(0xffffffffffffffff, &(0x7f0000000140)='^', 0x34000, 0x0, &(0x7f0000004ff0)={0x2, 0x0, @rand_addr=0xfffffffffffffffe}, 0x10) listen(0xffffffffffffffff, 0xda8c) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6e, &(0x7f0000000240)=[@in={0x2, 0x0, @private=0xa010101}], 0x10) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f0000000280)={0x0, 0x1f}, 0x8) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000300)={&(0x7f0000000400)=ANY=[@ANYRES64, @ANYRES8=r1, @ANYRES32=0x0], 0x34}, 0x1, 0x0, 0x0, 0x200048d1}, 0x40800) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0, 0x6}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000300), 0xffffffffffffffff) syz_mount_image$squashfs(&(0x7f0000000100), &(0x7f00000000c0)='./file1\x00', 0x700, &(0x7f0000000040)=ANY=[@ANYRES8=r2, @ANYRES8], 0x1, 0x1c4, &(0x7f0000000140)="$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") open(&(0x7f0000000340)='./file1\x00', 0x0, 0x0) 20:06:29 executing program 1: socket$inet_tcp(0x2, 0x1, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) setsockopt$bt_BT_FLUSHABLE(r0, 0x112, 0x7, 0x0, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r0, 0xc400941d, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x1}) ioctl$BTRFS_IOC_GET_DEV_STATS(0xffffffffffffffff, 0xc4089434, &(0x7f0000000000)={0x0, 0xa290000000000000, 0x1}) syz_open_dev$ptys(0xc, 0x3, 0x1) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$int_in(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) syz_open_dev$sndmidi(0x0, 0x0, 0x0) dup(0xffffffffffffffff) write$6lowpan_enable(0xffffffffffffffff, 0x0, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x22004811, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000000080)="44f9b108b1cdc885c9c533d21f474bec8bfef1df1e2da71e578dc6b91d09f7ab15378571d8e27546090011006e75436914ab717528ee4b7a9beaf908d11137c11903064e83b4951f4d433a5404970c85d92d7083fd38844cbb0c6c5eb508ddc2dc7a590aa7941b1e9eeb5a688138dea09b776cbfa784cbf550bf3074fb0d775da4df5a3f48bbdf452eeb6b923da9d0e25b80f76a873664b5753444fe05f33e5f91045240836c3cd6af10f0cd018f0c6f57f926ac959a5628c45088fbe0c87fbe6cbcda4662d2a12f6d00"/215, 0xd7, 0x4881, 0x0, 0x0) recvmmsg(r1, &(0x7f0000005880)=[{{0x0, 0x0, &(0x7f0000005800)=[{&(0x7f0000002580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x10021, 0x0) 20:06:29 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) gettid() bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000640)={&(0x7f0000000600)='mm_migrate_pages\x00', r0}, 0x10) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000a7e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r2, &(0x7f0000000180), 0xfdef) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) syz_clone(0x20400, 0x0, 0x0, &(0x7f00000001c0), &(0x7f0000000500), 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000400)={0x3, 0x80, 0x0, 0x87, 0xf8, 0x7, 0x0, 0x8, 0x10, 0x4, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, @perf_bp={&(0x7f0000000140)}, 0x82080, 0x200000014a8c04, 0xc5, 0x0, 0x100, 0x6, 0x5, 0x0, 0x3, 0x0, 0x6}, 0x0, 0x0, r3, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000480)=0x81) write$cgroup_pid(0xffffffffffffffff, &(0x7f00000000c0), 0x12) r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$ITER_CREATE(0xb, &(0x7f0000000100)={r4}, 0x8) perf_event_open(&(0x7f0000000680)={0x2, 0x80, 0x0, 0xe3, 0x92, 0x81, 0x0, 0x81, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x100, 0x1, @perf_config_ext={0x9}, 0x10, 0x0, 0x4, 0x1, 0x271e, 0xfff, 0x55, 0x0, 0x7fff, 0x0, 0x5}, 0x0, 0xd, r4, 0x3) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(r5, &(0x7f0000000940)=ANY=[], 0xda00) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000540)={r5, 0x8, 0x0, 0x14da, &(0x7f00000004c0)=[0x0], 0x1}, 0x20) 20:06:29 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) gettid() bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000640)={&(0x7f0000000600)='mm_migrate_pages\x00', r0}, 0x10) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000a7e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r2, &(0x7f0000000180), 0xfdef) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) syz_clone(0x20400, 0x0, 0x0, &(0x7f00000001c0), &(0x7f0000000500), 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000400)={0x3, 0x80, 0x0, 0x87, 0xf8, 0x7, 0x0, 0x8, 0x10, 0x4, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, @perf_bp={&(0x7f0000000140)}, 0x82080, 0x200000014a8c04, 0xc5, 0x0, 0x100, 0x6, 0x5, 0x0, 0x3, 0x0, 0x6}, 0x0, 0x0, r3, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000480)=0x81) write$cgroup_pid(0xffffffffffffffff, &(0x7f00000000c0), 0x12) r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$ITER_CREATE(0xb, &(0x7f0000000100)={r4}, 0x8) perf_event_open(&(0x7f0000000680)={0x2, 0x80, 0x0, 0xe3, 0x92, 0x81, 0x0, 0x81, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x100, 0x1, @perf_config_ext={0x9}, 0x10, 0x0, 0x4, 0x1, 0x271e, 0xfff, 0x55, 0x0, 0x7fff, 0x0, 0x5}, 0x0, 0xd, r4, 0x3) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(r5, &(0x7f0000000940)=ANY=[], 0xda00) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000540)={r5, 0x8, 0x0, 0x14da, &(0x7f00000004c0)=[0x0], 0x1}, 0x20) 20:06:29 executing program 1: socket$inet_tcp(0x2, 0x1, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) setsockopt$bt_BT_FLUSHABLE(r0, 0x112, 0x7, 0x0, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r0, 0xc400941d, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x1}) ioctl$BTRFS_IOC_GET_DEV_STATS(0xffffffffffffffff, 0xc4089434, &(0x7f0000000000)={0x0, 0xa290000000000000, 0x1}) syz_open_dev$ptys(0xc, 0x3, 0x1) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$int_in(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) syz_open_dev$sndmidi(0x0, 0x0, 0x0) dup(0xffffffffffffffff) write$6lowpan_enable(0xffffffffffffffff, 0x0, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x22004811, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000000080)="44f9b108b1cdc885c9c533d21f474bec8bfef1df1e2da71e578dc6b91d09f7ab15378571d8e27546090011006e75436914ab717528ee4b7a9beaf908d11137c11903064e83b4951f4d433a5404970c85d92d7083fd38844cbb0c6c5eb508ddc2dc7a590aa7941b1e9eeb5a688138dea09b776cbfa784cbf550bf3074fb0d775da4df5a3f48bbdf452eeb6b923da9d0e25b80f76a873664b5753444fe05f33e5f91045240836c3cd6af10f0cd018f0c6f57f926ac959a5628c45088fbe0c87fbe6cbcda4662d2a12f6d00"/215, 0xd7, 0x4881, 0x0, 0x0) recvmmsg(r1, &(0x7f0000005880)=[{{0x0, 0x0, &(0x7f0000005800)=[{&(0x7f0000002580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x10021, 0x0) 20:06:29 executing program 1: socket$inet_tcp(0x2, 0x1, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) setsockopt$bt_BT_FLUSHABLE(r0, 0x112, 0x7, 0x0, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r0, 0xc400941d, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x1}) ioctl$BTRFS_IOC_GET_DEV_STATS(0xffffffffffffffff, 0xc4089434, &(0x7f0000000000)={0x0, 0xa290000000000000, 0x1}) syz_open_dev$ptys(0xc, 0x3, 0x1) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$int_in(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) syz_open_dev$sndmidi(0x0, 0x0, 0x0) dup(0xffffffffffffffff) write$6lowpan_enable(0xffffffffffffffff, 0x0, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x22004811, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000000080)="44f9b108b1cdc885c9c533d21f474bec8bfef1df1e2da71e578dc6b91d09f7ab15378571d8e27546090011006e75436914ab717528ee4b7a9beaf908d11137c11903064e83b4951f4d433a5404970c85d92d7083fd38844cbb0c6c5eb508ddc2dc7a590aa7941b1e9eeb5a688138dea09b776cbfa784cbf550bf3074fb0d775da4df5a3f48bbdf452eeb6b923da9d0e25b80f76a873664b5753444fe05f33e5f91045240836c3cd6af10f0cd018f0c6f57f926ac959a5628c45088fbe0c87fbe6cbcda4662d2a12f6d00"/215, 0xd7, 0x4881, 0x0, 0x0) recvmmsg(r1, &(0x7f0000005880)=[{{0x0, 0x0, &(0x7f0000005800)=[{&(0x7f0000002580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x10021, 0x0) 20:06:29 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) gettid() bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000640)={&(0x7f0000000600)='mm_migrate_pages\x00', r0}, 0x10) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000a7e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r2, &(0x7f0000000180), 0xfdef) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) syz_clone(0x20400, 0x0, 0x0, &(0x7f00000001c0), &(0x7f0000000500), 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000400)={0x3, 0x80, 0x0, 0x87, 0xf8, 0x7, 0x0, 0x8, 0x10, 0x4, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, @perf_bp={&(0x7f0000000140)}, 0x82080, 0x200000014a8c04, 0xc5, 0x0, 0x100, 0x6, 0x5, 0x0, 0x3, 0x0, 0x6}, 0x0, 0x0, r3, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000480)=0x81) write$cgroup_pid(0xffffffffffffffff, &(0x7f00000000c0), 0x12) r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$ITER_CREATE(0xb, &(0x7f0000000100)={r4}, 0x8) perf_event_open(&(0x7f0000000680)={0x2, 0x80, 0x0, 0xe3, 0x92, 0x81, 0x0, 0x81, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x100, 0x1, @perf_config_ext={0x9}, 0x10, 0x0, 0x4, 0x1, 0x271e, 0xfff, 0x55, 0x0, 0x7fff, 0x0, 0x5}, 0x0, 0xd, r4, 0x3) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(r5, &(0x7f0000000940)=ANY=[], 0xda00) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000540)={r5, 0x8, 0x0, 0x14da, &(0x7f00000004c0)=[0x0], 0x1}, 0x20) 20:06:29 executing program 1: socket$inet_tcp(0x2, 0x1, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) setsockopt$bt_BT_FLUSHABLE(r0, 0x112, 0x7, 0x0, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r0, 0xc400941d, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x1}) ioctl$BTRFS_IOC_GET_DEV_STATS(0xffffffffffffffff, 0xc4089434, &(0x7f0000000000)={0x0, 0xa290000000000000, 0x1}) syz_open_dev$ptys(0xc, 0x3, 0x1) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$int_in(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) syz_open_dev$sndmidi(0x0, 0x0, 0x0) dup(0xffffffffffffffff) write$6lowpan_enable(0xffffffffffffffff, 0x0, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x22004811, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000000080)="44f9b108b1cdc885c9c533d21f474bec8bfef1df1e2da71e578dc6b91d09f7ab15378571d8e27546090011006e75436914ab717528ee4b7a9beaf908d11137c11903064e83b4951f4d433a5404970c85d92d7083fd38844cbb0c6c5eb508ddc2dc7a590aa7941b1e9eeb5a688138dea09b776cbfa784cbf550bf3074fb0d775da4df5a3f48bbdf452eeb6b923da9d0e25b80f76a873664b5753444fe05f33e5f91045240836c3cd6af10f0cd018f0c6f57f926ac959a5628c45088fbe0c87fbe6cbcda4662d2a12f6d00"/215, 0xd7, 0x4881, 0x0, 0x0) recvmmsg(r1, &(0x7f0000005880)=[{{0x0, 0x0, &(0x7f0000005800)=[{&(0x7f0000002580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x10021, 0x0) 20:06:29 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000040)=0xc) flock(r0, 0x5) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f00000003c0)=[{&(0x7f0000000180)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000400)="390000001300034700bb5be1c3e4feff06000000010000004500000025000000190004000400ad000200000000000006040000000000f93132", 0x39}], 0x1) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f00000004c0)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x0, 0x7, 0x0, "98d3340600c7aa11897ecaab876eab79576839c5656be8410f2802e944af80373be2666b665770173fbd1883303b6ac4749393ad08f139a68f00"}, 0xd8) bind$inet(r2, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) r3 = syz_genetlink_get_family_id$tipc2(0x0, 0xffffffffffffffff) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000000000)={0x2, 0x24e23, @loopback}, 0x10) recvmmsg(r2, &(0x7f0000001840)=[{{0x0, 0x240, &(0x7f0000001500)=[{&(0x7f0000004ac0)=""/102389, 0x18ff5}], 0x1}}], 0x1, 0x100, 0x0) write$binfmt_elf64(r2, &(0x7f00000000c0)=ANY=[@ANYRESHEX=r3], 0xc63b9e35) 20:06:29 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) gettid() bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000640)={&(0x7f0000000600)='mm_migrate_pages\x00', r0}, 0x10) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000a7e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r2, &(0x7f0000000180), 0xfdef) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) syz_clone(0x20400, 0x0, 0x0, &(0x7f00000001c0), &(0x7f0000000500), 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000400)={0x3, 0x80, 0x0, 0x87, 0xf8, 0x7, 0x0, 0x8, 0x10, 0x4, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, @perf_bp={&(0x7f0000000140)}, 0x82080, 0x200000014a8c04, 0xc5, 0x0, 0x100, 0x6, 0x5, 0x0, 0x3, 0x0, 0x6}, 0x0, 0x0, r3, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000480)=0x81) write$cgroup_pid(0xffffffffffffffff, &(0x7f00000000c0), 0x12) r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$ITER_CREATE(0xb, &(0x7f0000000100)={r4}, 0x8) perf_event_open(&(0x7f0000000680)={0x2, 0x80, 0x0, 0xe3, 0x92, 0x81, 0x0, 0x81, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x100, 0x1, @perf_config_ext={0x9}, 0x10, 0x0, 0x4, 0x1, 0x271e, 0xfff, 0x55, 0x0, 0x7fff, 0x0, 0x5}, 0x0, 0xd, r4, 0x3) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(r5, &(0x7f0000000940)=ANY=[], 0xda00) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000540)={r5, 0x8, 0x0, 0x14da, &(0x7f00000004c0)=[0x0], 0x1}, 0x20) 20:06:29 executing program 1: fallocate(0xffffffffffffffff, 0x11, 0x0, 0x2000000000000000) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x4501}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$squashfs(&(0x7f0000000240), &(0x7f0000000280)='./file0\x00', 0x0, &(0x7f0000001a40)=ANY=[@ANYBLOB="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"], 0x1, 0x228, &(0x7f0000000300)="$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") r1 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000005c0)={0x0, 0x0}) perf_event_open(&(0x7f0000000540)={0x2, 0x80, 0x2, 0x81, 0x7, 0x3f, 0x0, 0x101, 0x80408, 0x4, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x40, 0x2, @perf_bp={&(0x7f00000001c0), 0x4}, 0x8244, 0xffffffffffffffc1, 0x81, 0x9, 0x306, 0x5af, 0x0, 0x0, 0x20, 0x0, 0x7a3e}, r2, 0xb, 0xffffffffffffffff, 0x1) ptrace(0x10, r1) perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0x0) r3 = perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x3, 0x0, 0x7f, 0x2, 0x0, 0x400000001, 0x80, 0x4, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0xa17, 0x0, @perf_config_ext={0x7, 0x4}, 0x80, 0x6, 0x3ff, 0x4, 0x4, 0x401, 0x6, 0x0, 0x1ff, 0x0, 0x40}, r1, 0xd, r0, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r4, &(0x7f0000000040)={&(0x7f0000000880)={0xa, 0x4e24, 0x0, @mcast2}, 0x1c, 0x0, 0x0, &(0x7f0000000240)}, 0x0) ioctl$VFAT_IOCTL_READDIR_BOTH(r4, 0x82307201, &(0x7f0000001800)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) r5 = openat(0xffffffffffffff9c, &(0x7f0000002040)='./file0/file0\x00', 0x0, 0x0) r6 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r6, 0x107, 0xf, &(0x7f0000006ffc)=0x4000000000000200, 0xe50fb6c50bc849c9) r7 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) bind$packet(r6, &(0x7f0000000040)={0x11, 0x0, r8, 0x1, 0x0, 0x6, @dev}, 0x14) sendto$inet6(r6, &(0x7f0000000280)="4103f5f21116480401020200c52cf7c25975e005b02f0800eb2b2ff0dac8897c6b118777faffffff3066090cb600c5471d130a66321a54e7df305f80a88161b6fd8f24286a57c3feffff", 0xf2ff, 0x800, 0x0, 0x2f) r9 = openat$cgroup_netprio_ifpriomap(r5, &(0x7f00000006c0), 0x2, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r9, 0xd000941e, &(0x7f0000000800)={0x0, "98914bed1f0c62c29e0c89cb385ab41f"}) ioctl$F2FS_IOC_GET_PIN_FILE(r6, 0x8004f50e, &(0x7f0000000200)) perf_event_open(&(0x7f0000000100)={0x6, 0x80, 0x40, 0xff, 0x0, 0x1f, 0x0, 0x7ff, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1ff, 0x4, @perf_config_ext={0x1, 0x8}, 0x80005, 0x9, 0x5, 0x8, 0x2b, 0x9, 0x6, 0x0, 0x162, 0x0, 0x8000}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000700)={0x0, 0x80, 0x8, 0x40, 0xf7, 0x0, 0x0, 0x4, 0x5, 0x8, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x18eb, 0x4, @perf_config_ext={0x5, 0xffffffff}, 0x80130, 0x7, 0x34, 0x1, 0x9, 0x3, 0x43c, 0x0, 0x8, 0x0, 0x1}, 0xffffffffffffffff, 0x0, r5, 0x8) ioctl$SG_IO(r5, 0x2285, &(0x7f0000002300)={0x53, 0xfffffffffffffffd, 0xd, 0x0, @buffer={0x0, 0xd1, &(0x7f00000021c0)=""/209}, &(0x7f00000020c0)="7155640d559dcb778937fb86e0", 0x0, 0x216, 0x0, 0x0, 0x0}) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000180)=0x0) r11 = creat(&(0x7f0000002440)='./file0\x00', 0x80) write$cgroup_type(r11, &(0x7f0000000240), 0xfb3f) fallocate(r11, 0x0, 0x7ffd, 0x80) perf_event_open(&(0x7f0000000000)={0x4, 0x80, 0x1f, 0x2, 0x2, 0xa0, 0x0, 0x7f2f, 0x0, 0xb, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, @perf_config_ext={0x8a, 0x800000000000008}, 0x80b0, 0x4, 0x0, 0x1, 0x77dd, 0x5, 0x8000, 0x0, 0x8, 0x0, 0x33}, r10, 0xd, r3, 0x0) 20:06:30 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmmsg$inet_sctp(r0, &(0x7f00000031c0)=[{&(0x7f00000000c0)=@in={0x2, 0x0, @loopback}, 0x10, &(0x7f00000006c0)=[{&(0x7f00000002c0)="d5", 0x1}], 0x1}], 0x1, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000700)={0x0, 0x360, "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"}, &(0x7f0000000000)=0x368) 20:06:30 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r1) ioctl$sock_SIOCGIFINDEX_802154(r0, 0x8933, &(0x7f0000000180)={'wpan1\x00', 0x0}) sendmsg$IEEE802154_SET_MACPARAMS(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)={0x24, r2, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_CSMA_RETRIES={0x5}, @IEEE802154_ATTR_DEV_INDEX={0x8, 0x2, r3}]}, 0x24}}, 0x0) 20:06:30 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000080)={@broadcast, @local, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x3, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @private, @multicast1}, {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x6558}}}}}}, 0x0) 20:06:30 executing program 1: fallocate(0xffffffffffffffff, 0x11, 0x0, 0x2000000000000000) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x4501}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$squashfs(&(0x7f0000000240), &(0x7f0000000280)='./file0\x00', 0x0, &(0x7f0000001a40)=ANY=[@ANYBLOB="dc03e7fa95cda7005d867c8fac3d5aabfdcbedd3e3e983d352db49a2760e927c8570f403f3e2c4d0707df28d6a74e37b2011419f84c842583deb006825c6edac1b30d7e406ccd9081ad69eb960e16307fd85b515d32820f4a0ec793a7f2697932f339176dad23e7404aeb3574d48ffffffff00000000f04c5e9927eabd3da71deb9b1000000000000000000000c964d06d8081d349c2d9abdf44b6ea290d12fb2b7636483ed387ebf168589ca17b758366ad422b70f59537a9d520b69483b0a44c7fea7129308abe0210f9000000000000000000f32a3226bdb5b8263924a86f7fd3fe09ae20837c281c57c9bcb65a55a07639fe0e204c4f35feaeb7e8bbbb9cfc5dee14236eec464358f56c5c3b42068e40c7519d84c2930ef1a24f9d68c3337507254c35831e67fd268c7e833ba41f373acf33b269bf84d653d56d2a8bd64fd180c4483b2659cddf4a9c29b44e0d507bb74d071830094c7774a27920d00af6c794df068a52167e19e709000000c7c65ab24e141f09815221f4c4bfa7c01d235329f5594c15bb11a6b1007315ed93041876827e7f06549576c101b94ede259bf59fd9a84d8939aa489bc0b531a778cb530567de67c787ef892e03949f7d2de60b4ed53e69ad8545a65e632b79d1e4663aadaf12ad3e35ec3f5869ac19ae82625aed07d1495597fd200fecda197416b864cf1fbc4a1510205b53bbb54812c9ae5eda1423576909630c64745ebbace318caf64062580e53efaf4a2443b222b427e7fca15e321879041c28784dfc9e70cdbfa3aac73207f989373136d7e4a152ee80656f0d6e4c497f04ebc1fb73db1686cb8cc5e2a4549aa6a47274f3b496c1f2b768923dc210c2ac2ffc703465fbd8beb00a6be9afa9a7f7a3de0257c3c09000f5cd6ead8d728009a6c1016ad8ddb691fe25b22eb97c7de02e0e67"], 0x1, 0x228, &(0x7f0000000300)="$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") r1 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000005c0)={0x0, 0x0}) perf_event_open(&(0x7f0000000540)={0x2, 0x80, 0x2, 0x81, 0x7, 0x3f, 0x0, 0x101, 0x80408, 0x4, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x40, 0x2, @perf_bp={&(0x7f00000001c0), 0x4}, 0x8244, 0xffffffffffffffc1, 0x81, 0x9, 0x306, 0x5af, 0x0, 0x0, 0x20, 0x0, 0x7a3e}, r2, 0xb, 0xffffffffffffffff, 0x1) ptrace(0x10, r1) perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0x0) r3 = perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x3, 0x0, 0x7f, 0x2, 0x0, 0x400000001, 0x80, 0x4, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0xa17, 0x0, @perf_config_ext={0x7, 0x4}, 0x80, 0x6, 0x3ff, 0x4, 0x4, 0x401, 0x6, 0x0, 0x1ff, 0x0, 0x40}, r1, 0xd, r0, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r4, &(0x7f0000000040)={&(0x7f0000000880)={0xa, 0x4e24, 0x0, @mcast2}, 0x1c, 0x0, 0x0, &(0x7f0000000240)}, 0x0) ioctl$VFAT_IOCTL_READDIR_BOTH(r4, 0x82307201, &(0x7f0000001800)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) r5 = openat(0xffffffffffffff9c, &(0x7f0000002040)='./file0/file0\x00', 0x0, 0x0) r6 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r6, 0x107, 0xf, &(0x7f0000006ffc)=0x4000000000000200, 0xe50fb6c50bc849c9) r7 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) bind$packet(r6, &(0x7f0000000040)={0x11, 0x0, r8, 0x1, 0x0, 0x6, @dev}, 0x14) sendto$inet6(r6, &(0x7f0000000280)="4103f5f21116480401020200c52cf7c25975e005b02f0800eb2b2ff0dac8897c6b118777faffffff3066090cb600c5471d130a66321a54e7df305f80a88161b6fd8f24286a57c3feffff", 0xf2ff, 0x800, 0x0, 0x2f) r9 = openat$cgroup_netprio_ifpriomap(r5, &(0x7f00000006c0), 0x2, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r9, 0xd000941e, &(0x7f0000000800)={0x0, "98914bed1f0c62c29e0c89cb385ab41f"}) ioctl$F2FS_IOC_GET_PIN_FILE(r6, 0x8004f50e, &(0x7f0000000200)) perf_event_open(&(0x7f0000000100)={0x6, 0x80, 0x40, 0xff, 0x0, 0x1f, 0x0, 0x7ff, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1ff, 0x4, @perf_config_ext={0x1, 0x8}, 0x80005, 0x9, 0x5, 0x8, 0x2b, 0x9, 0x6, 0x0, 0x162, 0x0, 0x8000}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000700)={0x0, 0x80, 0x8, 0x40, 0xf7, 0x0, 0x0, 0x4, 0x5, 0x8, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x18eb, 0x4, @perf_config_ext={0x5, 0xffffffff}, 0x80130, 0x7, 0x34, 0x1, 0x9, 0x3, 0x43c, 0x0, 0x8, 0x0, 0x1}, 0xffffffffffffffff, 0x0, r5, 0x8) ioctl$SG_IO(r5, 0x2285, &(0x7f0000002300)={0x53, 0xfffffffffffffffd, 0xd, 0x0, @buffer={0x0, 0xd1, &(0x7f00000021c0)=""/209}, &(0x7f00000020c0)="7155640d559dcb778937fb86e0", 0x0, 0x216, 0x0, 0x0, 0x0}) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000180)=0x0) r11 = creat(&(0x7f0000002440)='./file0\x00', 0x80) write$cgroup_type(r11, &(0x7f0000000240), 0xfb3f) fallocate(r11, 0x0, 0x7ffd, 0x80) perf_event_open(&(0x7f0000000000)={0x4, 0x80, 0x1f, 0x2, 0x2, 0xa0, 0x0, 0x7f2f, 0x0, 0xb, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, @perf_config_ext={0x8a, 0x800000000000008}, 0x80b0, 0x4, 0x0, 0x1, 0x77dd, 0x5, 0x8000, 0x0, 0x8, 0x0, 0x33}, r10, 0xd, r3, 0x0) 20:06:30 executing program 0: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(0xffffffffffffffff, &(0x7f0000000140)='^', 0x34000, 0x0, &(0x7f0000004ff0)={0x2, 0x0, @rand_addr=0xfffffffffffffffe}, 0x10) listen(0xffffffffffffffff, 0xda8c) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6e, &(0x7f0000000240)=[@in={0x2, 0x0, @private=0xa010101}], 0x10) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f0000000280)={0x0, 0x1f}, 0x8) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000300)={&(0x7f0000000400)=ANY=[@ANYRES64, @ANYRES8=r1, @ANYRES32=0x0], 0x34}, 0x1, 0x0, 0x0, 0x200048d1}, 0x40800) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0, 0x6}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000300), 0xffffffffffffffff) syz_mount_image$squashfs(&(0x7f0000000100), &(0x7f00000000c0)='./file1\x00', 0x700, &(0x7f0000000040)=ANY=[@ANYRES8=r2, @ANYRES8], 0x1, 0x1c4, &(0x7f0000000140)="$eJzslb9qVEEUxn/n7uxuohapbQ0mje7uDQTfwFRWPoCXzTWG3Pgnd0F3SXGt0liILxHwEawsBB/AQkSwiYWCFrEMyJX5c8cJFomyqwbmg8v5zplzvntmhpm5Uz4ou8D3w90hCxgIF3gvggKWxMZudK391rF21fmflLUDF3/u7Edny/HkzRNLJ1tZUeQ75fgEIgIn5Rwjp0r6cyLMSnnqpGVXfCt7emxI79UvyS27K/zrnv8K+TxtwTaz7hl8RE5R9e6Z3c7/ZMFnRZLfqipx11d5/XHCV+O8PdwdanILqOu61rF1+zVHwuRo51WQc1FBBdKi9jrK3JawBPRG2/d75XhyZXM728g38rtpurLaf33eKhZ5v3d7s8j7ErSRaKLw0Od0PhhvAx9+jlcEkKA1jXMgYa2+f1+42uVLQeE8JEFtqGF1X3oNd8ebdbnJZeaAh5XQrCosotUUZmprCC3nDFTQJxyRMGcGrg7vFet7CNKU7aO8xuCAtnfS0Fm55qe/F/xcY83ZfWcPnG3eruZNUkbhi/OWK+jwKBuNdszjZZmPpT6WLvg/J672qBNODha7REREREREREScEfwIAAD//5nFTvQ=") open(&(0x7f0000000340)='./file1\x00', 0x0, 0x0) 20:06:30 executing program 4: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(0xffffffffffffffff, &(0x7f0000000140)='^', 0x34000, 0x0, &(0x7f0000004ff0)={0x2, 0x0, @rand_addr=0xfffffffffffffffe}, 0x10) listen(0xffffffffffffffff, 0xda8c) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6e, &(0x7f0000000240)=[@in={0x2, 0x0, @private=0xa010101}], 0x10) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f0000000280)={0x0, 0x1f}, 0x8) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000300)={&(0x7f0000000400)=ANY=[@ANYRES64, @ANYRES8=r1, @ANYRES32=0x0], 0x34}, 0x1, 0x0, 0x0, 0x200048d1}, 0x40800) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0, 0x6}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000300), 0xffffffffffffffff) syz_mount_image$squashfs(&(0x7f0000000100), &(0x7f00000000c0)='./file1\x00', 0x700, &(0x7f0000000040)=ANY=[@ANYRES8=r2, @ANYRES8], 0x1, 0x1c4, &(0x7f0000000140)="$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") open(&(0x7f0000000340)='./file1\x00', 0x0, 0x0) 20:06:30 executing program 2: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(0xffffffffffffffff, &(0x7f0000000140)='^', 0x34000, 0x0, &(0x7f0000004ff0)={0x2, 0x0, @rand_addr=0xfffffffffffffffe}, 0x10) listen(0xffffffffffffffff, 0xda8c) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6e, &(0x7f0000000240)=[@in={0x2, 0x0, @private=0xa010101}], 0x10) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f0000000280)={0x0, 0x1f}, 0x8) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000300)={&(0x7f0000000400)=ANY=[@ANYRES64, @ANYRES8=r1, @ANYRES32=0x0], 0x34}, 0x1, 0x0, 0x0, 0x200048d1}, 0x40800) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0, 0x6}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000300), 0xffffffffffffffff) syz_mount_image$squashfs(&(0x7f0000000100), &(0x7f00000000c0)='./file1\x00', 0x700, &(0x7f0000000040)=ANY=[@ANYRES8=r2, @ANYRES8], 0x1, 0x1c4, &(0x7f0000000140)="$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") open(&(0x7f0000000340)='./file1\x00', 0x0, 0x0) 20:06:30 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000040)=0xc) flock(r0, 0x5) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f00000003c0)=[{&(0x7f0000000180)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000400)="390000001300034700bb5be1c3e4feff06000000010000004500000025000000190004000400ad000200000000000006040000000000f93132", 0x39}], 0x1) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f00000004c0)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x0, 0x7, 0x0, "98d3340600c7aa11897ecaab876eab79576839c5656be8410f2802e944af80373be2666b665770173fbd1883303b6ac4749393ad08f139a68f00"}, 0xd8) bind$inet(r2, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) r3 = syz_genetlink_get_family_id$tipc2(0x0, 0xffffffffffffffff) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000000000)={0x2, 0x24e23, @loopback}, 0x10) recvmmsg(r2, &(0x7f0000001840)=[{{0x0, 0x240, &(0x7f0000001500)=[{&(0x7f0000004ac0)=""/102389, 0x18ff5}], 0x1}}], 0x1, 0x100, 0x0) write$binfmt_elf64(r2, &(0x7f00000000c0)=ANY=[@ANYRESHEX=r3], 0xc63b9e35) 20:06:30 executing program 1: fallocate(0xffffffffffffffff, 0x11, 0x0, 0x2000000000000000) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x4501}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$squashfs(&(0x7f0000000240), &(0x7f0000000280)='./file0\x00', 0x0, &(0x7f0000001a40)=ANY=[@ANYBLOB="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"], 0x1, 0x228, &(0x7f0000000300)="$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") r1 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000005c0)={0x0, 0x0}) perf_event_open(&(0x7f0000000540)={0x2, 0x80, 0x2, 0x81, 0x7, 0x3f, 0x0, 0x101, 0x80408, 0x4, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x40, 0x2, @perf_bp={&(0x7f00000001c0), 0x4}, 0x8244, 0xffffffffffffffc1, 0x81, 0x9, 0x306, 0x5af, 0x0, 0x0, 0x20, 0x0, 0x7a3e}, r2, 0xb, 0xffffffffffffffff, 0x1) ptrace(0x10, r1) perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0x0) r3 = perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x3, 0x0, 0x7f, 0x2, 0x0, 0x400000001, 0x80, 0x4, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0xa17, 0x0, @perf_config_ext={0x7, 0x4}, 0x80, 0x6, 0x3ff, 0x4, 0x4, 0x401, 0x6, 0x0, 0x1ff, 0x0, 0x40}, r1, 0xd, r0, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r4, &(0x7f0000000040)={&(0x7f0000000880)={0xa, 0x4e24, 0x0, @mcast2}, 0x1c, 0x0, 0x0, &(0x7f0000000240)}, 0x0) ioctl$VFAT_IOCTL_READDIR_BOTH(r4, 0x82307201, &(0x7f0000001800)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) r5 = openat(0xffffffffffffff9c, &(0x7f0000002040)='./file0/file0\x00', 0x0, 0x0) r6 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r6, 0x107, 0xf, &(0x7f0000006ffc)=0x4000000000000200, 0xe50fb6c50bc849c9) r7 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) bind$packet(r6, &(0x7f0000000040)={0x11, 0x0, r8, 0x1, 0x0, 0x6, @dev}, 0x14) sendto$inet6(r6, &(0x7f0000000280)="4103f5f21116480401020200c52cf7c25975e005b02f0800eb2b2ff0dac8897c6b118777faffffff3066090cb600c5471d130a66321a54e7df305f80a88161b6fd8f24286a57c3feffff", 0xf2ff, 0x800, 0x0, 0x2f) r9 = openat$cgroup_netprio_ifpriomap(r5, &(0x7f00000006c0), 0x2, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r9, 0xd000941e, &(0x7f0000000800)={0x0, "98914bed1f0c62c29e0c89cb385ab41f"}) ioctl$F2FS_IOC_GET_PIN_FILE(r6, 0x8004f50e, &(0x7f0000000200)) perf_event_open(&(0x7f0000000100)={0x6, 0x80, 0x40, 0xff, 0x0, 0x1f, 0x0, 0x7ff, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1ff, 0x4, @perf_config_ext={0x1, 0x8}, 0x80005, 0x9, 0x5, 0x8, 0x2b, 0x9, 0x6, 0x0, 0x162, 0x0, 0x8000}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000700)={0x0, 0x80, 0x8, 0x40, 0xf7, 0x0, 0x0, 0x4, 0x5, 0x8, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x18eb, 0x4, @perf_config_ext={0x5, 0xffffffff}, 0x80130, 0x7, 0x34, 0x1, 0x9, 0x3, 0x43c, 0x0, 0x8, 0x0, 0x1}, 0xffffffffffffffff, 0x0, r5, 0x8) ioctl$SG_IO(r5, 0x2285, &(0x7f0000002300)={0x53, 0xfffffffffffffffd, 0xd, 0x0, @buffer={0x0, 0xd1, &(0x7f00000021c0)=""/209}, &(0x7f00000020c0)="7155640d559dcb778937fb86e0", 0x0, 0x216, 0x0, 0x0, 0x0}) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000180)=0x0) r11 = creat(&(0x7f0000002440)='./file0\x00', 0x80) write$cgroup_type(r11, &(0x7f0000000240), 0xfb3f) fallocate(r11, 0x0, 0x7ffd, 0x80) perf_event_open(&(0x7f0000000000)={0x4, 0x80, 0x1f, 0x2, 0x2, 0xa0, 0x0, 0x7f2f, 0x0, 0xb, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, @perf_config_ext={0x8a, 0x800000000000008}, 0x80b0, 0x4, 0x0, 0x1, 0x77dd, 0x5, 0x8000, 0x0, 0x8, 0x0, 0x33}, r10, 0xd, r3, 0x0) 20:06:30 executing program 1: fallocate(0xffffffffffffffff, 0x11, 0x0, 0x2000000000000000) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x4501}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$squashfs(&(0x7f0000000240), &(0x7f0000000280)='./file0\x00', 0x0, &(0x7f0000001a40)=ANY=[@ANYBLOB="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"], 0x1, 0x228, &(0x7f0000000300)="$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") r1 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000005c0)={0x0, 0x0}) perf_event_open(&(0x7f0000000540)={0x2, 0x80, 0x2, 0x81, 0x7, 0x3f, 0x0, 0x101, 0x80408, 0x4, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x40, 0x2, @perf_bp={&(0x7f00000001c0), 0x4}, 0x8244, 0xffffffffffffffc1, 0x81, 0x9, 0x306, 0x5af, 0x0, 0x0, 0x20, 0x0, 0x7a3e}, r2, 0xb, 0xffffffffffffffff, 0x1) ptrace(0x10, r1) perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0x0) r3 = perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x3, 0x0, 0x7f, 0x2, 0x0, 0x400000001, 0x80, 0x4, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0xa17, 0x0, @perf_config_ext={0x7, 0x4}, 0x80, 0x6, 0x3ff, 0x4, 0x4, 0x401, 0x6, 0x0, 0x1ff, 0x0, 0x40}, r1, 0xd, r0, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r4, &(0x7f0000000040)={&(0x7f0000000880)={0xa, 0x4e24, 0x0, @mcast2}, 0x1c, 0x0, 0x0, &(0x7f0000000240)}, 0x0) ioctl$VFAT_IOCTL_READDIR_BOTH(r4, 0x82307201, &(0x7f0000001800)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) r5 = openat(0xffffffffffffff9c, &(0x7f0000002040)='./file0/file0\x00', 0x0, 0x0) r6 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r6, 0x107, 0xf, &(0x7f0000006ffc)=0x4000000000000200, 0xe50fb6c50bc849c9) r7 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) bind$packet(r6, &(0x7f0000000040)={0x11, 0x0, r8, 0x1, 0x0, 0x6, @dev}, 0x14) sendto$inet6(r6, &(0x7f0000000280)="4103f5f21116480401020200c52cf7c25975e005b02f0800eb2b2ff0dac8897c6b118777faffffff3066090cb600c5471d130a66321a54e7df305f80a88161b6fd8f24286a57c3feffff", 0xf2ff, 0x800, 0x0, 0x2f) r9 = openat$cgroup_netprio_ifpriomap(r5, &(0x7f00000006c0), 0x2, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r9, 0xd000941e, &(0x7f0000000800)={0x0, "98914bed1f0c62c29e0c89cb385ab41f"}) ioctl$F2FS_IOC_GET_PIN_FILE(r6, 0x8004f50e, &(0x7f0000000200)) perf_event_open(&(0x7f0000000100)={0x6, 0x80, 0x40, 0xff, 0x0, 0x1f, 0x0, 0x7ff, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1ff, 0x4, @perf_config_ext={0x1, 0x8}, 0x80005, 0x9, 0x5, 0x8, 0x2b, 0x9, 0x6, 0x0, 0x162, 0x0, 0x8000}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000700)={0x0, 0x80, 0x8, 0x40, 0xf7, 0x0, 0x0, 0x4, 0x5, 0x8, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x18eb, 0x4, @perf_config_ext={0x5, 0xffffffff}, 0x80130, 0x7, 0x34, 0x1, 0x9, 0x3, 0x43c, 0x0, 0x8, 0x0, 0x1}, 0xffffffffffffffff, 0x0, r5, 0x8) ioctl$SG_IO(r5, 0x2285, &(0x7f0000002300)={0x53, 0xfffffffffffffffd, 0xd, 0x0, @buffer={0x0, 0xd1, &(0x7f00000021c0)=""/209}, &(0x7f00000020c0)="7155640d559dcb778937fb86e0", 0x0, 0x216, 0x0, 0x0, 0x0}) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000180)=0x0) r11 = creat(&(0x7f0000002440)='./file0\x00', 0x80) write$cgroup_type(r11, &(0x7f0000000240), 0xfb3f) fallocate(r11, 0x0, 0x7ffd, 0x80) perf_event_open(&(0x7f0000000000)={0x4, 0x80, 0x1f, 0x2, 0x2, 0xa0, 0x0, 0x7f2f, 0x0, 0xb, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, @perf_config_ext={0x8a, 0x800000000000008}, 0x80b0, 0x4, 0x0, 0x1, 0x77dd, 0x5, 0x8000, 0x0, 0x8, 0x0, 0x33}, r10, 0xd, r3, 0x0) 20:06:30 executing program 1: fallocate(0xffffffffffffffff, 0x11, 0x0, 0x2000000000000000) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x4501}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$squashfs(&(0x7f0000000240), &(0x7f0000000280)='./file0\x00', 0x0, &(0x7f0000001a40)=ANY=[@ANYBLOB="dc03e7fa95cda7005d867c8fac3d5aabfdcbedd3e3e983d352db49a2760e927c8570f403f3e2c4d0707df28d6a74e37b2011419f84c842583deb006825c6edac1b30d7e406ccd9081ad69eb960e16307fd85b515d32820f4a0ec793a7f2697932f339176dad23e7404aeb3574d48ffffffff00000000f04c5e9927eabd3da71deb9b1000000000000000000000c964d06d8081d349c2d9abdf44b6ea290d12fb2b7636483ed387ebf168589ca17b758366ad422b70f59537a9d520b69483b0a44c7fea7129308abe0210f9000000000000000000f32a3226bdb5b8263924a86f7fd3fe09ae20837c281c57c9bcb65a55a07639fe0e204c4f35feaeb7e8bbbb9cfc5dee14236eec464358f56c5c3b42068e40c7519d84c2930ef1a24f9d68c3337507254c35831e67fd268c7e833ba41f373acf33b269bf84d653d56d2a8bd64fd180c4483b2659cddf4a9c29b44e0d507bb74d071830094c7774a27920d00af6c794df068a52167e19e709000000c7c65ab24e141f09815221f4c4bfa7c01d235329f5594c15bb11a6b1007315ed93041876827e7f06549576c101b94ede259bf59fd9a84d8939aa489bc0b531a778cb530567de67c787ef892e03949f7d2de60b4ed53e69ad8545a65e632b79d1e4663aadaf12ad3e35ec3f5869ac19ae82625aed07d1495597fd200fecda197416b864cf1fbc4a1510205b53bbb54812c9ae5eda1423576909630c64745ebbace318caf64062580e53efaf4a2443b222b427e7fca15e321879041c28784dfc9e70cdbfa3aac73207f989373136d7e4a152ee80656f0d6e4c497f04ebc1fb73db1686cb8cc5e2a4549aa6a47274f3b496c1f2b768923dc210c2ac2ffc703465fbd8beb00a6be9afa9a7f7a3de0257c3c09000f5cd6ead8d728009a6c1016ad8ddb691fe25b22eb97c7de02e0e67"], 0x1, 0x228, &(0x7f0000000300)="$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") r1 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000005c0)={0x0, 0x0}) perf_event_open(&(0x7f0000000540)={0x2, 0x80, 0x2, 0x81, 0x7, 0x3f, 0x0, 0x101, 0x80408, 0x4, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x40, 0x2, @perf_bp={&(0x7f00000001c0), 0x4}, 0x8244, 0xffffffffffffffc1, 0x81, 0x9, 0x306, 0x5af, 0x0, 0x0, 0x20, 0x0, 0x7a3e}, r2, 0xb, 0xffffffffffffffff, 0x1) ptrace(0x10, r1) perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0x0) r3 = perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x3, 0x0, 0x7f, 0x2, 0x0, 0x400000001, 0x80, 0x4, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0xa17, 0x0, @perf_config_ext={0x7, 0x4}, 0x80, 0x6, 0x3ff, 0x4, 0x4, 0x401, 0x6, 0x0, 0x1ff, 0x0, 0x40}, r1, 0xd, r0, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r4, &(0x7f0000000040)={&(0x7f0000000880)={0xa, 0x4e24, 0x0, @mcast2}, 0x1c, 0x0, 0x0, &(0x7f0000000240)}, 0x0) ioctl$VFAT_IOCTL_READDIR_BOTH(r4, 0x82307201, &(0x7f0000001800)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) r5 = openat(0xffffffffffffff9c, &(0x7f0000002040)='./file0/file0\x00', 0x0, 0x0) r6 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r6, 0x107, 0xf, &(0x7f0000006ffc)=0x4000000000000200, 0xe50fb6c50bc849c9) r7 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) bind$packet(r6, &(0x7f0000000040)={0x11, 0x0, r8, 0x1, 0x0, 0x6, @dev}, 0x14) sendto$inet6(r6, &(0x7f0000000280)="4103f5f21116480401020200c52cf7c25975e005b02f0800eb2b2ff0dac8897c6b118777faffffff3066090cb600c5471d130a66321a54e7df305f80a88161b6fd8f24286a57c3feffff", 0xf2ff, 0x800, 0x0, 0x2f) r9 = openat$cgroup_netprio_ifpriomap(r5, &(0x7f00000006c0), 0x2, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r9, 0xd000941e, &(0x7f0000000800)={0x0, "98914bed1f0c62c29e0c89cb385ab41f"}) ioctl$F2FS_IOC_GET_PIN_FILE(r6, 0x8004f50e, &(0x7f0000000200)) perf_event_open(&(0x7f0000000100)={0x6, 0x80, 0x40, 0xff, 0x0, 0x1f, 0x0, 0x7ff, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1ff, 0x4, @perf_config_ext={0x1, 0x8}, 0x80005, 0x9, 0x5, 0x8, 0x2b, 0x9, 0x6, 0x0, 0x162, 0x0, 0x8000}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000700)={0x0, 0x80, 0x8, 0x40, 0xf7, 0x0, 0x0, 0x4, 0x5, 0x8, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x18eb, 0x4, @perf_config_ext={0x5, 0xffffffff}, 0x80130, 0x7, 0x34, 0x1, 0x9, 0x3, 0x43c, 0x0, 0x8, 0x0, 0x1}, 0xffffffffffffffff, 0x0, r5, 0x8) ioctl$SG_IO(r5, 0x2285, &(0x7f0000002300)={0x53, 0xfffffffffffffffd, 0xd, 0x0, @buffer={0x0, 0xd1, &(0x7f00000021c0)=""/209}, &(0x7f00000020c0)="7155640d559dcb778937fb86e0", 0x0, 0x216, 0x0, 0x0, 0x0}) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000180)=0x0) r11 = creat(&(0x7f0000002440)='./file0\x00', 0x80) write$cgroup_type(r11, &(0x7f0000000240), 0xfb3f) fallocate(r11, 0x0, 0x7ffd, 0x80) perf_event_open(&(0x7f0000000000)={0x4, 0x80, 0x1f, 0x2, 0x2, 0xa0, 0x0, 0x7f2f, 0x0, 0xb, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, @perf_config_ext={0x8a, 0x800000000000008}, 0x80b0, 0x4, 0x0, 0x1, 0x77dd, 0x5, 0x8000, 0x0, 0x8, 0x0, 0x33}, r10, 0xd, r3, 0x0) 20:06:30 executing program 1: fallocate(0xffffffffffffffff, 0x11, 0x0, 0x2000000000000000) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x4501}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$squashfs(&(0x7f0000000240), &(0x7f0000000280)='./file0\x00', 0x0, &(0x7f0000001a40)=ANY=[@ANYBLOB="dc03e7fa95cda7005d867c8fac3d5aabfdcbedd3e3e983d352db49a2760e927c8570f403f3e2c4d0707df28d6a74e37b2011419f84c842583deb006825c6edac1b30d7e406ccd9081ad69eb960e16307fd85b515d32820f4a0ec793a7f2697932f339176dad23e7404aeb3574d48ffffffff00000000f04c5e9927eabd3da71deb9b1000000000000000000000c964d06d8081d349c2d9abdf44b6ea290d12fb2b7636483ed387ebf168589ca17b758366ad422b70f59537a9d520b69483b0a44c7fea7129308abe0210f9000000000000000000f32a3226bdb5b8263924a86f7fd3fe09ae20837c281c57c9bcb65a55a07639fe0e204c4f35feaeb7e8bbbb9cfc5dee14236eec464358f56c5c3b42068e40c7519d84c2930ef1a24f9d68c3337507254c35831e67fd268c7e833ba41f373acf33b269bf84d653d56d2a8bd64fd180c4483b2659cddf4a9c29b44e0d507bb74d071830094c7774a27920d00af6c794df068a52167e19e709000000c7c65ab24e141f09815221f4c4bfa7c01d235329f5594c15bb11a6b1007315ed93041876827e7f06549576c101b94ede259bf59fd9a84d8939aa489bc0b531a778cb530567de67c787ef892e03949f7d2de60b4ed53e69ad8545a65e632b79d1e4663aadaf12ad3e35ec3f5869ac19ae82625aed07d1495597fd200fecda197416b864cf1fbc4a1510205b53bbb54812c9ae5eda1423576909630c64745ebbace318caf64062580e53efaf4a2443b222b427e7fca15e321879041c28784dfc9e70cdbfa3aac73207f989373136d7e4a152ee80656f0d6e4c497f04ebc1fb73db1686cb8cc5e2a4549aa6a47274f3b496c1f2b768923dc210c2ac2ffc703465fbd8beb00a6be9afa9a7f7a3de0257c3c09000f5cd6ead8d728009a6c1016ad8ddb691fe25b22eb97c7de02e0e67"], 0x1, 0x228, &(0x7f0000000300)="$eJzKKC4sZmdgYPj7sSaZgUGAAQRYGEQYLjAwMrAwMDDIM4KFGD4yQeipUPomlGaDyl+B0r5Q8XYo/de8KiKKgYExU+meGdMB8RRFRgEGHpGvpx4wJDPwxzJYzvNecykoc8pVobdL94PUe4VWbmJgVE/hXzRnwwSnmbxgYxkjo5DNYT4gM4sDZBADA8PkPxH3HrBIMoggmSXK8U/sVMvyVWad9xlmdExLY2A0mMXBwMCgd0R3pp0BbzcT1MziyqrsxJyc1KLiMwyo5k9m3M+kyAhSd+bv1eAHjHYM3bEMjAxyG/zVFn/7I1W5cVN95PSqiJqp3U03l66PY9im//eKidT7iRlh/x8cEtSyyMv/ME9G6fvmhjkfauqemDh2NirP5W+9/Pfd+5ja4gQ1psfiXYVs/AluWjWfnJ3cLB/PTa9u31KsuCArzWXisakX/yYcX8vAMPnCE1v9mjOH4hVjOKXcKufG3HWLF+Rapn6+7g0Dw8GozxMZGJcz7mdiYJgZtnMPsr/KG6CRwcDMwMCgwsDAwMTAwpCWmZNq4MHAyMAM5RiyQFXBVDMxcIAl9JLzc1LaGRjBSQCsbTkDC9wMw8cMrHCOETLH2KIBahJDO5RWgdIeUHo5lH4MpeXRkg0L2IR+KE+jgYGBjaEisaSkyJCNgQHKgosZwcWMBOA2M0FtncuE6rnjTAyjYBSMglEwCkbBKBgFo2AUjIJRMJIBIAAA///ZbLn7") r1 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000005c0)={0x0, 0x0}) perf_event_open(&(0x7f0000000540)={0x2, 0x80, 0x2, 0x81, 0x7, 0x3f, 0x0, 0x101, 0x80408, 0x4, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x40, 0x2, @perf_bp={&(0x7f00000001c0), 0x4}, 0x8244, 0xffffffffffffffc1, 0x81, 0x9, 0x306, 0x5af, 0x0, 0x0, 0x20, 0x0, 0x7a3e}, r2, 0xb, 0xffffffffffffffff, 0x1) ptrace(0x10, r1) perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0x0) r3 = perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x3, 0x0, 0x7f, 0x2, 0x0, 0x400000001, 0x80, 0x4, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0xa17, 0x0, @perf_config_ext={0x7, 0x4}, 0x80, 0x6, 0x3ff, 0x4, 0x4, 0x401, 0x6, 0x0, 0x1ff, 0x0, 0x40}, r1, 0xd, r0, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r4, &(0x7f0000000040)={&(0x7f0000000880)={0xa, 0x4e24, 0x0, @mcast2}, 0x1c, 0x0, 0x0, &(0x7f0000000240)}, 0x0) ioctl$VFAT_IOCTL_READDIR_BOTH(r4, 0x82307201, &(0x7f0000001800)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) r5 = openat(0xffffffffffffff9c, &(0x7f0000002040)='./file0/file0\x00', 0x0, 0x0) r6 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r6, 0x107, 0xf, &(0x7f0000006ffc)=0x4000000000000200, 0xe50fb6c50bc849c9) r7 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) bind$packet(r6, &(0x7f0000000040)={0x11, 0x0, r8, 0x1, 0x0, 0x6, @dev}, 0x14) sendto$inet6(r6, &(0x7f0000000280)="4103f5f21116480401020200c52cf7c25975e005b02f0800eb2b2ff0dac8897c6b118777faffffff3066090cb600c5471d130a66321a54e7df305f80a88161b6fd8f24286a57c3feffff", 0xf2ff, 0x800, 0x0, 0x2f) r9 = openat$cgroup_netprio_ifpriomap(r5, &(0x7f00000006c0), 0x2, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r9, 0xd000941e, &(0x7f0000000800)={0x0, "98914bed1f0c62c29e0c89cb385ab41f"}) ioctl$F2FS_IOC_GET_PIN_FILE(r6, 0x8004f50e, &(0x7f0000000200)) perf_event_open(&(0x7f0000000100)={0x6, 0x80, 0x40, 0xff, 0x0, 0x1f, 0x0, 0x7ff, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1ff, 0x4, @perf_config_ext={0x1, 0x8}, 0x80005, 0x9, 0x5, 0x8, 0x2b, 0x9, 0x6, 0x0, 0x162, 0x0, 0x8000}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000700)={0x0, 0x80, 0x8, 0x40, 0xf7, 0x0, 0x0, 0x4, 0x5, 0x8, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x18eb, 0x4, @perf_config_ext={0x5, 0xffffffff}, 0x80130, 0x7, 0x34, 0x1, 0x9, 0x3, 0x43c, 0x0, 0x8, 0x0, 0x1}, 0xffffffffffffffff, 0x0, r5, 0x8) ioctl$SG_IO(r5, 0x2285, &(0x7f0000002300)={0x53, 0xfffffffffffffffd, 0xd, 0x0, @buffer={0x0, 0xd1, &(0x7f00000021c0)=""/209}, &(0x7f00000020c0)="7155640d559dcb778937fb86e0", 0x0, 0x216, 0x0, 0x0, 0x0}) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000180)=0x0) r11 = creat(&(0x7f0000002440)='./file0\x00', 0x80) write$cgroup_type(r11, &(0x7f0000000240), 0xfb3f) fallocate(r11, 0x0, 0x7ffd, 0x80) perf_event_open(&(0x7f0000000000)={0x4, 0x80, 0x1f, 0x2, 0x2, 0xa0, 0x0, 0x7f2f, 0x0, 0xb, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, @perf_config_ext={0x8a, 0x800000000000008}, 0x80b0, 0x4, 0x0, 0x1, 0x77dd, 0x5, 0x8000, 0x0, 0x8, 0x0, 0x33}, r10, 0xd, r3, 0x0) 20:06:31 executing program 5: fallocate(0xffffffffffffffff, 0x11, 0x0, 0x2000000000000000) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x4501}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$squashfs(&(0x7f0000000240), &(0x7f0000000280)='./file0\x00', 0x0, &(0x7f0000001a40)=ANY=[@ANYBLOB="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"], 0x1, 0x228, &(0x7f0000000300)="$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") r1 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000005c0)={0x0, 0x0}) perf_event_open(&(0x7f0000000540)={0x2, 0x80, 0x2, 0x81, 0x7, 0x3f, 0x0, 0x101, 0x80408, 0x4, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x40, 0x2, @perf_bp={&(0x7f00000001c0), 0x4}, 0x8244, 0xffffffffffffffc1, 0x81, 0x9, 0x306, 0x5af, 0x0, 0x0, 0x20, 0x0, 0x7a3e}, r2, 0xb, 0xffffffffffffffff, 0x1) ptrace(0x10, r1) perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0x0) r3 = perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x3, 0x0, 0x7f, 0x2, 0x0, 0x400000001, 0x80, 0x4, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0xa17, 0x0, @perf_config_ext={0x7, 0x4}, 0x80, 0x6, 0x3ff, 0x4, 0x4, 0x401, 0x6, 0x0, 0x1ff, 0x0, 0x40}, r1, 0xd, r0, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r4, &(0x7f0000000040)={&(0x7f0000000880)={0xa, 0x4e24, 0x0, @mcast2}, 0x1c, 0x0, 0x0, &(0x7f0000000240)}, 0x0) ioctl$VFAT_IOCTL_READDIR_BOTH(r4, 0x82307201, &(0x7f0000001800)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) r5 = openat(0xffffffffffffff9c, &(0x7f0000002040)='./file0/file0\x00', 0x0, 0x0) r6 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r6, 0x107, 0xf, &(0x7f0000006ffc)=0x4000000000000200, 0xe50fb6c50bc849c9) r7 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) bind$packet(r6, &(0x7f0000000040)={0x11, 0x0, r8, 0x1, 0x0, 0x6, @dev}, 0x14) sendto$inet6(r6, &(0x7f0000000280)="4103f5f21116480401020200c52cf7c25975e005b02f0800eb2b2ff0dac8897c6b118777faffffff3066090cb600c5471d130a66321a54e7df305f80a88161b6fd8f24286a57c3feffff", 0xf2ff, 0x800, 0x0, 0x2f) r9 = openat$cgroup_netprio_ifpriomap(r5, &(0x7f00000006c0), 0x2, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r9, 0xd