000000000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x4da) getsockopt$ARPT_SO_GET_ENTRIES(r0, 0x0, 0x61, 0x0, &(0x7f0000000040)) 03:59:23 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x25d1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000080)="00000600000000000000", 0x0) ioctl$SG_EMULATED_HOST(r1, 0x2203, &(0x7f00000000c0)) write$binfmt_elf32(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000000000000000000000030006000000000000000000380000000000000000000000000020000200000000000000000000000000000000000000000000000000000000040000000000000000000000000000030000000000000000000000000000000200000028e9653bf5f378f24e50b960"], 0x78) execveat(r1, &(0x7f0000000000)='\x00', &(0x7f0000000280), 0x0, 0x1000) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 03:59:23 executing program 2: clone(0x41fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f00000000c0)) syz_open_dev$rtc(&(0x7f0000000080)='/dev/rtc#\x00', 0x0, 0x0) ptrace(0x10, r0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000000)) getsockopt$inet_sctp6_SCTP_NODELAY(0xffffffffffffffff, 0x84, 0x3, &(0x7f0000000140), &(0x7f00000001c0)=0x4) ptrace$setregs(0xf, r0, 0x0, &(0x7f0000000180)) ptrace$getregset(0x4204, r0, 0x2, &(0x7f0000000280)={0x0}) 03:59:23 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x25d1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000080)="00000600000000000000", 0x0) ioctl$SG_EMULATED_HOST(r0, 0x2203, &(0x7f00000000c0)) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000000000000000000000030006000000000000000000380000000000000000000000000020000200000000000000000000000000000000000000000000000000000000040000000000000000000000000000030000000000000000000000000000000200000028e9653bf5f378f24e50b960"], 0x78) execveat(r0, &(0x7f0000000000)='\x00', &(0x7f0000000280), 0x0, 0x1000) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) 03:59:23 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) syz_execute_func(&(0x7f00000000c0)="64ff0941c3c4e2c9975842c4c27d794e0066420fe2e33e0f1110c442019dccd3193e66430f3a0ce397") clone(0x1a02100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet_MCAST_LEAVE_GROUP(r1, 0x0, 0x2d, &(0x7f0000000300)={0xfffffffffffffffc, {{0x2, 0x0, @local}}}, 0x88) write$binfmt_elf32(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="7f454c4684025200d80000000000000003003e0065b700001302000038000000a6030000810000000000200001008100000205000000000053e57464ff0f000002000000ff00000000000000050000008000000004000000ae5c03d8c672bd43fc0ccbb8681c45f2559d91e3c30e464212881f9f6b309eb3e4d790e9de001b72c6b7ed9759779c320b5cb91ece41228af2217903d258b4a9ba463c293d6bc83e9e94b367a5bd6a68ee9886619ee57c83c758674a6813c1cf922187cb3217744f9514b25f897bd2c953df3a7a32b160f26f0070846d70eeb1dee400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x4da) getsockopt$ARPT_SO_GET_ENTRIES(r1, 0x0, 0x61, 0x0, &(0x7f0000000040)) 03:59:23 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, 0x0, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000002000)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001000)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqsrc(r2, 0x0, 0x2000000000000004, &(0x7f0000013ff4)={@remote}, 0xc) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000340)={{{@in=@broadcast, @in=@broadcast, 0x100000000000000, 0x0, 0x0, 0x0, 0xa}}, {{@in6=@local, 0x0, 0x33}, 0x0, @in6=@local}}, 0xe8) close(r2) dup3(r0, r1, 0x0) 03:59:23 executing program 1: r0 = syz_open_dev$mouse(&(0x7f0000000140)='/dev/input/mouse#\x00', 0x0, 0x2000) r1 = perf_event_open(&(0x7f0000000040)={0xfffffffffffffffd, 0x70, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) r2 = memfd_create(&(0x7f00000002c0)="00000600", 0x0) write$binfmt_elf32(r2, &(0x7f0000000200)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003000600000000000000000038000000000000000000000000002000020000000000000000000000000000000000000000000000000000000004000000100000000000000000008f5ff1b54857895200030000000000000000000000000000000200000028e9653bf5f378f24e50b960fbd58ff2158a67ef6ae1de81cbcd0417979507b4ede2c5e6289ab9825934"], 0x78) execveat(r2, &(0x7f0000000000)='\x00', &(0x7f0000000280), 0x0, 0x1000) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) getsockopt$bt_BT_FLUSHABLE(r2, 0x112, 0x8, &(0x7f0000000180)=0x9ff, &(0x7f00000001c0)=0x4) ioctl$TIOCGSID(r2, 0x5429, &(0x7f00000000c0)=0x0) ptrace$getsig(0x4202, r3, 0xffff, &(0x7f0000000100)) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) mlockall(0x1) ioctl$FS_IOC_GETFSLABEL(r0, 0x81009431, &(0x7f0000000300)) eventfd2(0xffffffffffffffff, 0x1) 03:59:23 executing program 2: clone(0x41fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f00000000c0)) syz_open_dev$rtc(&(0x7f0000000080)='/dev/rtc#\x00', 0x0, 0x0) ptrace(0x10, r0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000000)) getsockopt$inet_sctp6_SCTP_NODELAY(0xffffffffffffffff, 0x84, 0x3, &(0x7f0000000140), &(0x7f00000001c0)=0x4) ptrace$setregs(0xf, r0, 0x0, &(0x7f0000000180)) ptrace$getregset(0x4204, r0, 0x2, &(0x7f0000000280)={0x0}) 03:59:23 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x25d1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000080)="00000600000000000000", 0x0) write$binfmt_elf32(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000000000000000000000030006000000000000000000380000000000000000000000000020000200000000000005000000000000000000000000000000000000000000040000000000000000000000000000030000000000000000000000000000000200000028e9653bf5f378f24e50b960"], 0x78) execveat(r1, &(0x7f0000000000)='\x00', &(0x7f0000000280), 0x0, 0x1000) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) getsockopt$inet_sctp6_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f00000000c0)=@assoc_value={0x0, 0x2}, &(0x7f0000000100)=0x8) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f0000000140)={r2, 0x1f, 0x1f}, 0x8) 03:59:23 executing program 2: clone(0x41fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f00000000c0)) syz_open_dev$rtc(&(0x7f0000000080)='/dev/rtc#\x00', 0x0, 0x0) ptrace(0x10, r0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000000)) getsockopt$inet_sctp6_SCTP_NODELAY(0xffffffffffffffff, 0x84, 0x3, &(0x7f0000000140), &(0x7f00000001c0)=0x4) ptrace$setregs(0xf, r0, 0x0, &(0x7f0000000180)) ptrace$getregset(0x4204, r0, 0x2, &(0x7f0000000280)={0x0}) 03:59:23 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, 0x0, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000002000)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001000)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqsrc(r2, 0x0, 0x2000000000000004, &(0x7f0000013ff4)={@remote}, 0xc) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000340)={{{@in=@broadcast, @in=@broadcast, 0x80ffffff, 0x0, 0x0, 0x0, 0xa}}, {{@in6=@local, 0x0, 0x33}, 0x0, @in6=@local}}, 0xe8) close(r2) dup3(r0, r1, 0x0) 03:59:23 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) syz_execute_func(&(0x7f00000000c0)="64ff0941c3c4e2c9975842c4c27d794e0066420fe2e33e0f1110c442019dccd3193e66430f3a0ce397") clone(0x1a02100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet_MCAST_LEAVE_GROUP(r1, 0x0, 0x2d, &(0x7f0000000300)={0xfffffffffffffffc, {{0x2, 0x0, @local}}}, 0x88) write$binfmt_elf32(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x4da) getsockopt$ARPT_SO_GET_ENTRIES(r1, 0x0, 0x61, 0x0, &(0x7f0000000040)) 03:59:23 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x25d1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000080)="00000600000000000000", 0x0) write$binfmt_elf32(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000000000000000000000030006000000000000000000380000000000000000000000000020000200000000000000000000000000000000000000000000000000000000040000000000000000000000000000030000000000000000000000000000000200000028e9653bf5f378f24e50b960"], 0x78) execveat(r1, &(0x7f0000000000)='\x00', &(0x7f0000000280), 0x0, 0x1000) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) futimesat(r1, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)={{r2, r3/1000+30000}, {0x77359400}}) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000180)={{{@in=@empty, @in6}}, {{@in6=@local}, 0x0, @in6=@remote}}, &(0x7f0000000280)=0xe8) clock_gettime(0x4, &(0x7f00000002c0)) 03:59:23 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) syz_execute_func(&(0x7f00000000c0)="64ff0941c3c4e2c9975842c4c27d794e0066420fe2e33e0f1110c442019dccd3193e66430f3a0ce397") clone(0x1a02100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet_MCAST_LEAVE_GROUP(r1, 0x0, 0x2d, &(0x7f0000000300)={0xfffffffffffffffc, {{0x2, 0x0, @local}}}, 0x88) write$binfmt_elf32(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x4da) getsockopt$ARPT_SO_GET_ENTRIES(r1, 0x0, 0x61, 0x0, &(0x7f0000000040)) 03:59:23 executing program 2: clone(0x41fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f00000000c0)) syz_open_dev$rtc(&(0x7f0000000080)='/dev/rtc#\x00', 0x0, 0x0) ptrace(0x10, r0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000000)) getsockopt$inet_sctp6_SCTP_NODELAY(0xffffffffffffffff, 0x84, 0x3, &(0x7f0000000140), &(0x7f00000001c0)=0x4) ptrace$setregs(0xf, r0, 0x0, &(0x7f0000000180)="a96d55a756365db9427f6914f8f5f2324a78") ptrace$getregset(0x4204, r0, 0x2, &(0x7f0000000280)={0x0}) 03:59:23 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x25d1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000080)="00000600000000000000", 0x0) ioctl$SG_EMULATED_HOST(r0, 0x2203, &(0x7f00000000c0)) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000000000000000000000030006000000000000000000380000000000000000000000000020000200000000000000000000000000000000000000000000000000000000040000000000000000000000000000030000000000000000000000000000000200000028e9653bf5f378f24e50b960"], 0x78) execveat(r0, &(0x7f0000000000)='\x00', &(0x7f0000000280), 0x0, 0x1000) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) 03:59:23 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, 0x0, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000002000)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001000)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqsrc(r2, 0x0, 0x2000000000000004, &(0x7f0000013ff4)={@remote}, 0xc) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000340)={{{@in=@broadcast, @in=@broadcast, 0x20000000, 0x0, 0x0, 0x0, 0xa}}, {{@in6=@local, 0x0, 0x33}, 0x0, @in6=@local}}, 0xe8) close(r2) dup3(r0, r1, 0x0) [ 346.642920] cgroup: fork rejected by pids controller in /syz0 03:59:24 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) syz_execute_func(&(0x7f00000000c0)="64ff0941c3c4e2c9975842c4c27d794e0066420fe2e33e0f1110c442019dccd3193e66430f3a0ce397") clone(0x1a02100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet_MCAST_LEAVE_GROUP(r1, 0x0, 0x2d, &(0x7f0000000300)={0xfffffffffffffffc, {{0x2, 0x0, @local}}}, 0x88) write$binfmt_elf32(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x4da) getsockopt$ARPT_SO_GET_ENTRIES(r1, 0x0, 0x61, 0x0, &(0x7f0000000040)) 03:59:25 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x25d1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x40000, 0x0) ioctl$SG_GET_PACK_ID(r1, 0x227c, &(0x7f0000000680)) r2 = memfd_create(&(0x7f0000000080)="00000600000000000000", 0x0) write$binfmt_elf32(r2, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000000000000000000000030006000000000000000000380000000000000000000000000020000200000000000000000000000000000000000000000000000000000000040000000000000000000000000000030000000000000000000000000000000200000028e9653bf5f378f24e50b960"], 0x78) execveat(r2, &(0x7f0000000000)='\x00', &(0x7f0000000280), 0x0, 0x1000) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) syz_read_part_table(0x7f, 0xa, &(0x7f0000000580)=[{&(0x7f00000000c0)="015258871f8e19714279c8d9e7f712d41a62ce6ddce7bef284da1734ccf7baddc33c256e919f90", 0x27, 0x2}, {&(0x7f0000000100)="633156561de5dbf0676ce7aeb91a2dcb2d3c57de498b2e572940eca343e2db3d467cf0d2eb2134dc0883e17d78b5d33ba3930a19c0a1aa0872ca0138f901f6f92937812c8ca5fb1424c4bdc776b336f087d82907a7332b0ef002e4c98ae661f5475fb7b3e50b38b785d3aee4032bcd430751b18d02635dbfda95ae52902313abb1cd3be062fce84225c12c0dc9f8162b59970a0d1a0f90d5a482c4fbd1c92e5b6ae3a3e26b", 0xa5, 0x3}, {&(0x7f00000001c0)="2e0fbe24dce1af908f431f5c665427f9eb019e7a066e7dedcb1ced8098e16ea39ff10fb81ff382fc07bd9c80b20469cfa60b327a251addd662e2c1e0a6bcbe69029114bea9195534ebf61967b53620e87fc9fdf63d70042be6a474d55176f2305becfc3ae5211e146cd053fc6ac57cb79d6b9a3725c934012282e64b3b9dae334d094ed4d37bb0fce57883cee4c449a1658e46897802ec4293956edc891698757c440a10944da90fae3d431960663bac96c021c0f8c9167f6704aa11428710a131f6d14e02e34924ada258cdc6e1f69a96dd3142262008656d", 0xd9, 0x3f}, {&(0x7f00000002c0)="a0962ef4544e4133bf68b26918918015f6c830466e98dc93b335af6ad536bdac53fa87abbed7c4219c15e4c7b1dd00b59f1e15922a071ae26ca578b4b0fd5aadfd74", 0x42, 0x95}, {&(0x7f0000000340)="ad3ca7b689a4c0d3e065c1ede53739355e9deab281229f9e53", 0x19}, {&(0x7f0000000400)="48a5ad2f4661ed2de586d118e836eeb9b1bb43ca6f864060f5f06f5db53dcbdf093723942749c2afd0b0", 0x2a, 0x6}, {&(0x7f0000000440)="5212a7beb65e261b8c884110ffbd7d16770d350061a9eedd7e6ac260", 0x1c, 0x100000001}, {&(0x7f0000000480), 0x0, 0xe713}, {&(0x7f00000004c0)="8bd428ea6d41eba3c6f48a2dab854814f5c7c38b4ffd4fa85f0b955cd3522e2a53840c3318cbf2b53445e27e6050a75e6e", 0x31, 0x67f}, {&(0x7f0000000500)="5c167eba7601f93bcacdb020e0f43c47e32d6f318f45b6057ea0594e16cc07a2a4389333601c1fa19a5a3f5ea4e2fdd922e992acb508cef9a670c71f2d6a78a1463a270741206e59ae4245", 0x4b, 0x7}]) 03:59:25 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, 0x0, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000002000)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001000)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqsrc(r2, 0x0, 0x2000000000000004, &(0x7f0000013ff4)={@remote}, 0xc) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000340)={{{@in=@broadcast, @in=@broadcast, 0x2000, 0x0, 0x0, 0x0, 0xa}}, {{@in6=@local, 0x0, 0x33}, 0x0, @in6=@local}}, 0xe8) close(r2) dup3(r0, r1, 0x0) 03:59:25 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x25d1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000080)="00000600000000000000", 0x0) write$binfmt_elf32(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000000000000000000000030006000000000000000000380000000000000000000000000020000200000000000000000000000000000000000000000000000000000000040000000000000000000000000000030000000000000000000000000000000200000028e9653bf5f378f24e50b960"], 0x78) execveat(r1, &(0x7f0000000000)='\x00', &(0x7f0000000280), 0x0, 0x1000) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) futimesat(r1, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)={{r2, r3/1000+30000}, {0x77359400}}) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000180)={{{@in=@empty, @in6}}, {{@in6=@local}, 0x0, @in6=@remote}}, &(0x7f0000000280)=0xe8) clock_gettime(0x4, &(0x7f00000002c0)) 03:59:25 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x25d1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000080)="00000600000000000000", 0x0) ioctl$SG_EMULATED_HOST(r0, 0x2203, &(0x7f00000000c0)) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000000000000000000000030006000000000000000000380000000000000000000000000020000200000000000000000000000000000000000000000000000000000000040000000000000000000000000000030000000000000000000000000000000200000028e9653bf5f378f24e50b960"], 0x78) execveat(r0, &(0x7f0000000000)='\x00', &(0x7f0000000280), 0x0, 0x1000) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) [ 347.622169] Unknown ioctl 8828 03:59:25 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, 0x0, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000002000)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001000)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqsrc(r2, 0x0, 0x2000000000000004, &(0x7f0000013ff4)={@remote}, 0xc) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000340)={{{@in=@broadcast, @in=@broadcast, 0x200000000000000, 0x0, 0x0, 0x0, 0xa}}, {{@in6=@local, 0x0, 0x33}, 0x0, @in6=@local}}, 0xe8) close(r2) dup3(r0, r1, 0x0) 03:59:25 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x25d1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000080)="00000600000000000000", 0x0) ioctl$SG_EMULATED_HOST(r1, 0x2203, &(0x7f00000000c0)) write$binfmt_elf32(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000000000000000000000030006000000000000000000380000000000000000000000000020000200000000000000000000000000000000000000000000000000000000040000000000000000000000000000030000000000000000000000000000000200000028e9653bf5f378f24e50b960"], 0x78) execveat(r1, &(0x7f0000000000)='\x00', &(0x7f0000000280), 0x0, 0x1000) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 03:59:25 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x25d1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000080)="00000600000000000000", 0x0) write$binfmt_elf32(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000000000000000000000030006000000000000000000380000000000000000000000000020000200000000000000000000000000000000000000000000000000000000040000000000000000000000000000030000000000000000000000000000000200000028e9653bf5f378f24e50b960"], 0x78) execveat(r1, &(0x7f0000000000)='\x00', &(0x7f0000000280), 0x0, 0x1000) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) futimesat(r1, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)={{r2, r3/1000+30000}, {0x77359400}}) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000180)={{{@in=@empty, @in6}}, {{@in6=@local}, 0x0, @in6=@remote}}, &(0x7f0000000280)=0xe8) clock_gettime(0x4, &(0x7f00000002c0)) 03:59:25 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, 0x0, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000002000)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001000)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqsrc(r2, 0x0, 0x2000000000000004, &(0x7f0000013ff4)={@remote}, 0xc) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000340)={{{@in=@broadcast, @in=@broadcast, 0x600, 0x0, 0x0, 0x0, 0xa}}, {{@in6=@local, 0x0, 0x33}, 0x0, @in6=@local}}, 0xe8) close(r2) dup3(r0, r1, 0x0) 03:59:25 executing program 2: clone(0x41fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f00000000c0)) syz_open_dev$rtc(&(0x7f0000000080)='/dev/rtc#\x00', 0x0, 0x0) ptrace(0x10, r0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000000)) getsockopt$inet_sctp6_SCTP_NODELAY(0xffffffffffffffff, 0x84, 0x3, &(0x7f0000000140), &(0x7f00000001c0)=0x4) ptrace$setregs(0xf, r0, 0x0, &(0x7f0000000180)="a96d55a756365db9427f6914f8f5f2324a78") ptrace$getregset(0x4204, r0, 0x2, &(0x7f0000000280)={0x0}) 03:59:25 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x25d1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000080)="00000600000000000000", 0x0) getsockopt$inet_dccp_buf(r1, 0x21, 0x2, &(0x7f0000000240)=""/177, &(0x7f0000000300)=0xb1) write$binfmt_elf32(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000000000000000000000030006000000000000000000380000000000000000e4c7000000000020000200001998000000000000000000000000000000000000000000000000040000000000000000000000000000030000000000000000000000000000000200000028e9653bf5f378f24e50"], 0x78) execveat(r1, &(0x7f0000000000)='\x00', &(0x7f0000000280), 0x0, 0x1000) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) execve(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)=[&(0x7f0000000100)="00000600"], &(0x7f0000000200)=[&(0x7f0000000180)='\x00', &(0x7f00000001c0)='\x00']) setxattr$security_smack_transmute(&(0x7f0000000340)='./file0\x00', &(0x7f0000000400)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000440)='TRUE', 0x4, 0x1) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 03:59:25 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x25d1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/qat_adf_ctl\x00', 0xa0000, 0x0) write$P9_RREADDIR(r1, &(0x7f0000000240)={0xa6, 0x29, 0x2, {0x0, [{{0x24, 0x1, 0x6}, 0x5, 0x7000000000000000, 0x7, './file0'}, {{0x6, 0x1, 0x3}, 0xf8f4993, 0x0, 0x7, './file0'}, {{0x2, 0x0, 0x5}, 0x8, 0x4, 0x7, './file0'}, {{0x21, 0x2, 0x7}, 0x3, 0x1, 0x7, './file0'}, {{0x9d, 0x2, 0x1}, 0x2, 0x101, 0x7, './file0'}]}}, 0xa6) r2 = memfd_create(&(0x7f0000000100)="2f2629776c616e3170726f6324005d4522e3d13cfd7e6f4a22b7bb7be7190821f3a97afe23c87484291578e2501d2ad328c4716b6726b725fb87755ea28d77d062d08f600010964886977002ffb26061fab0183151cae2f1e097710062785cd3e107937bef9bacc9b162249a48c4fd96f391d7c273cd5f75f4d573aff337ba0c09d01777c0cf", 0x3) write$binfmt_elf32(r2, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000320060000000000000000003800000000000000000000000000200002000000000000000000000049adb1d2668f11e200000000000000000038deb93ebf1e1513000000000000d8b51a7619e42b4800030000000000000000000000000000000200000028e9653bf5f378f24e50b960"], 0x78) execveat(r2, &(0x7f0000000000)='\x00', &(0x7f0000000280), 0x0, 0x1000) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) 03:59:26 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) syz_execute_func(&(0x7f00000000c0)="64ff0941c3c4e2c9975842c4c27d794e0066420fe2e33e0f1110c442019dccd3193e66430f3a0ce397") clone(0x1a02100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet_MCAST_LEAVE_GROUP(r1, 0x0, 0x2d, &(0x7f0000000300)={0xfffffffffffffffc, {{0x2, 0x0, @local}}}, 0x88) write$binfmt_elf32(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x4da) getsockopt$ARPT_SO_GET_ENTRIES(r1, 0x0, 0x61, 0x0, &(0x7f0000000040)) 03:59:26 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, 0x0, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000002000)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001000)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqsrc(r2, 0x0, 0x2000000000000004, &(0x7f0000013ff4)={@remote}, 0xc) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000340)={{{@in=@broadcast, @in=@broadcast, 0xffffffff00000000, 0x0, 0x0, 0x0, 0xa}}, {{@in6=@local, 0x0, 0x33}, 0x0, @in6=@local}}, 0xe8) close(r2) dup3(r0, r1, 0x0) 03:59:26 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x25d1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000080)="00000600000000000000", 0x0) ioctl$SG_EMULATED_HOST(r1, 0x2203, &(0x7f00000000c0)) write$binfmt_elf32(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000000000000000000000030006000000000000000000380000000000000000000000000020000200000000000000000000000000000000000000000000000000000000040000000000000000000000000000030000000000000000000000000000000200000028e9653bf5f378f24e50b960"], 0x78) execveat(r1, &(0x7f0000000000)='\x00', &(0x7f0000000280), 0x0, 0x1000) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 03:59:26 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x25d1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000080)="00000600000000000000", 0x0) write$binfmt_elf32(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000000000000000000000030006000000000000000000380000000000000000000000000020000200000000000000000000000000000000000000000000000000000000040000000000000000000000000000030000000000000000000000000000000200000028e9653bf5f378f24e50b960"], 0x78) ioctl$KVM_PPC_GET_PVINFO(r1, 0x4080aea1, &(0x7f0000000400)=""/4096) execveat(r1, &(0x7f0000000000)='\x00', &(0x7f0000000280), 0x0, 0x1000) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 03:59:26 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x25d1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/qat_adf_ctl\x00', 0xa0000, 0x0) write$P9_RREADDIR(r1, &(0x7f0000000240)={0xa6, 0x29, 0x2, {0x0, [{{0x24, 0x1, 0x6}, 0x5, 0x7000000000000000, 0x7, './file0'}, {{0x6, 0x1, 0x3}, 0xf8f4993, 0x0, 0x7, './file0'}, {{0x2, 0x0, 0x5}, 0x8, 0x4, 0x7, './file0'}, {{0x21, 0x2, 0x7}, 0x3, 0x1, 0x7, './file0'}, {{0x9d, 0x2, 0x1}, 0x2, 0x101, 0x7, './file0'}]}}, 0xa6) r2 = memfd_create(&(0x7f0000000100)="2f2629776c616e3170726f6324005d4522e3d13cfd7e6f4a22b7bb7be7190821f3a97afe23c87484291578e2501d2ad328c4716b6726b725fb87755ea28d77d062d08f600010964886977002ffb26061fab0183151cae2f1e097710062785cd3e107937bef9bacc9b162249a48c4fd96f391d7c273cd5f75f4d573aff337ba0c09d01777c0cf", 0x3) write$binfmt_elf32(r2, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000320060000000000000000003800000000000000000000000000200002000000000000000000000049adb1d2668f11e200000000000000000038deb93ebf1e1513000000000000d8b51a7619e42b4800030000000000000000000000000000000200000028e9653bf5f378f24e50b960"], 0x78) execveat(r2, &(0x7f0000000000)='\x00', &(0x7f0000000280), 0x0, 0x1000) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) [ 348.647914] IPVS: ftp: loaded support on port[0] = 21 03:59:26 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, 0x0, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000002000)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001000)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqsrc(r2, 0x0, 0x2000000000000004, &(0x7f0000013ff4)={@remote}, 0xc) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000340)={{{@in=@broadcast, @in=@broadcast, 0x80ffffff00000000, 0x0, 0x0, 0x0, 0xa}}, {{@in6=@local, 0x0, 0x33}, 0x0, @in6=@local}}, 0xe8) close(r2) dup3(r0, r1, 0x0) 03:59:26 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x25d1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000080)="00000600000000000000", 0x0) ioctl$SG_EMULATED_HOST(r1, 0x2203, &(0x7f00000000c0)) write$binfmt_elf32(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000000000000000000000030006000000000000000000380000000000000000000000000020000200000000000000000000000000000000000000000000000000000000040000000000000000000000000000030000000000000000000000000000000200000028e9653bf5f378f24e50b960"], 0x78) execveat(r1, &(0x7f0000000000)='\x00', &(0x7f0000000280), 0x0, 0x1000) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 03:59:26 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x25d1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000080)="00000600000000000000", 0x0) write$binfmt_elf32(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000000000000000000000030006000000000000000000380000000000000000000000000020000200000000000000000000000000000000000000000000000000000000040000000000000000000000000000030000000000000000000000000000000200000028e9653bf5f378f24e50b960"], 0x78) bind$unix(r1, &(0x7f00000000c0)=@file={0x0, './file0\x00'}, 0x6e) execveat(r1, &(0x7f0000000000)='\x00', &(0x7f0000000280), 0x0, 0x1000) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) [ 348.974540] IPVS: ftp: loaded support on port[0] = 21 03:59:26 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x25d1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f00000000c0)="00b6744def17e34a764a6b13559bba708b06399733d7a9efc49b1b47614e7eadac0ee650004232a4bbb1db9d842d2904be8bd139c376885660a6d31e0138615f91a9266b77c031c531cdc00527f0520d7d556ed4", 0x0) write$binfmt_elf32(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c460000000000000000000000000300060000000000000000003800000000000000000000000000200002000000000000000000000000000000000000000000007f0000000000040000000000000000000000000000030000000000000000000000000000000200000028e9653bf5f378f24e50b960"], 0x78) execveat(r1, &(0x7f0000000000)='\x00', &(0x7f0000000280), 0x0, 0x1000) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 03:59:26 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, 0x0, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000002000)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001000)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqsrc(r2, 0x0, 0x2000000000000004, &(0x7f0000013ff4)={@remote}, 0xc) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000340)={{{@in=@broadcast, @in=@broadcast, 0xff0f000000000000, 0x0, 0x0, 0x0, 0xa}}, {{@in6=@local, 0x0, 0x33}, 0x0, @in6=@local}}, 0xe8) close(r2) dup3(r0, r1, 0x0) [ 350.775903] bridge0: port 1(bridge_slave_0) entered blocking state [ 350.796706] bridge0: port 1(bridge_slave_0) entered disabled state [ 350.804243] device bridge_slave_0 entered promiscuous mode [ 350.829669] bridge0: port 1(bridge_slave_0) entered blocking state [ 350.836171] bridge0: port 1(bridge_slave_0) entered disabled state [ 350.843681] device bridge_slave_0 entered promiscuous mode [ 350.868933] bridge0: port 2(bridge_slave_1) entered blocking state [ 350.875479] bridge0: port 2(bridge_slave_1) entered disabled state [ 350.884502] device bridge_slave_1 entered promiscuous mode [ 350.898674] bridge0: port 2(bridge_slave_1) entered blocking state [ 350.905164] bridge0: port 2(bridge_slave_1) entered disabled state [ 350.913094] device bridge_slave_1 entered promiscuous mode [ 350.952149] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 350.994434] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 351.031046] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 351.044736] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 351.214770] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 351.227412] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 351.261980] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 351.279268] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 351.554457] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 351.561463] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 351.583791] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 351.590791] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 351.743223] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 351.750252] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 352.105594] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 352.114112] team0: Port device team_slave_0 added [ 352.263608] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 352.270839] team0: Port device team_slave_0 added [ 352.277377] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 352.284851] team0: Port device team_slave_1 added [ 352.444417] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 352.453514] team0: Port device team_slave_1 added [ 352.460186] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 352.615027] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 352.625379] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 352.634892] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 352.647367] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 352.789787] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 352.797408] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 352.806998] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 352.815619] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 352.825029] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 352.833788] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 352.978277] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 352.988900] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 352.996017] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 353.017066] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 353.025039] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 353.040586] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 353.054411] device bridge_slave_1 left promiscuous mode [ 353.060109] bridge0: port 2(bridge_slave_1) entered disabled state [ 353.107322] device bridge_slave_0 left promiscuous mode [ 353.112786] bridge0: port 1(bridge_slave_0) entered disabled state [ 353.147573] device bridge_slave_1 left promiscuous mode [ 353.153041] bridge0: port 2(bridge_slave_1) entered disabled state [ 353.197309] device bridge_slave_0 left promiscuous mode [ 353.202762] bridge0: port 1(bridge_slave_0) entered disabled state [ 355.172799] bond1 (unregistering): Released all slaves [ 355.183539] team0 (unregistering): Port device team_slave_1 removed [ 355.197965] team0 (unregistering): Port device team_slave_0 removed [ 355.212831] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 355.285674] bond0 (unregistering): Released all slaves [ 355.340576] team0 (unregistering): Port device team_slave_1 removed [ 355.351992] team0 (unregistering): Port device team_slave_0 removed [ 355.361510] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 355.401480] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 355.455216] bond0 (unregistering): Released all slaves [ 355.503238] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 355.517098] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 355.525135] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 356.078234] bridge0: port 2(bridge_slave_1) entered blocking state [ 356.084634] bridge0: port 2(bridge_slave_1) entered forwarding state [ 356.091391] bridge0: port 1(bridge_slave_0) entered blocking state [ 356.097808] bridge0: port 1(bridge_slave_0) entered forwarding state [ 356.133896] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 356.142723] bridge0: port 2(bridge_slave_1) entered blocking state [ 356.149176] bridge0: port 2(bridge_slave_1) entered forwarding state [ 356.155890] bridge0: port 1(bridge_slave_0) entered blocking state [ 356.162309] bridge0: port 1(bridge_slave_0) entered forwarding state [ 356.180481] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 356.526921] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 356.536947] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 358.437741] 8021q: adding VLAN 0 to HW filter on device bond0 [ 358.490805] 8021q: adding VLAN 0 to HW filter on device bond0 [ 358.599822] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 358.648027] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 358.761639] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 358.768630] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 358.775618] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 358.825187] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 358.831646] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 358.847520] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 358.940929] 8021q: adding VLAN 0 to HW filter on device team0 [ 358.992627] 8021q: adding VLAN 0 to HW filter on device team0 03:59:38 executing program 2: clone(0x41fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f00000000c0)) syz_open_dev$rtc(&(0x7f0000000080)='/dev/rtc#\x00', 0x0, 0x0) ptrace(0x10, r0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000000)) getsockopt$inet_sctp6_SCTP_NODELAY(0xffffffffffffffff, 0x84, 0x3, &(0x7f0000000140), &(0x7f00000001c0)=0x4) ptrace$setregs(0xf, r0, 0x0, &(0x7f0000000180)) ptrace$getregset(0x4204, r0, 0x2, &(0x7f0000000280)={0x0}) 03:59:38 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x25d1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000080)="00000600000000000000", 0x0) write$binfmt_elf32(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000000000000000000000030006000000000000000000380000000000000000000000000020000200000000000000000000000000000000000000000000000000000000040000000000000000000000000000030000000000000000000000000000000200000028e9653bf5f378f24e50b960"], 0x78) bind$unix(r1, &(0x7f00000000c0)=@file={0x0, './file0\x00'}, 0x6e) execveat(r1, &(0x7f0000000000)='\x00', &(0x7f0000000280), 0x0, 0x1000) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 03:59:38 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, 0x0, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000002000)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001000)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqsrc(r2, 0x0, 0x2000000000000004, &(0x7f0000013ff4)={@remote}, 0xc) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000340)={{{@in=@broadcast, @in=@broadcast, 0x3, 0x0, 0x0, 0x0, 0xa}}, {{@in6=@local, 0x0, 0x33}, 0x0, @in6=@local}}, 0xe8) close(r2) dup3(r0, r1, 0x0) 03:59:38 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x25d1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000080)="00000600000000000000", 0x0) ioctl$SG_EMULATED_HOST(r1, 0x2203, &(0x7f00000000c0)) execveat(r1, &(0x7f0000000000)='\x00', &(0x7f0000000280), 0x0, 0x1000) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 03:59:38 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x25d1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000080)="00000600000000000000", 0x0) write$binfmt_elf32(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000000000000000000000030006000000000000000000380000000000000000000000000020000200000000000000000000000000000000000000000000000000000000040000000000000000000000000000030000000000000000000000000000000200000028e9653bf5f378f24e50b960"], 0x78) execveat(r1, &(0x7f0000000000)='\x00', &(0x7f0000000280), 0x0, 0x1000) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000240)={0x0, @rand_addr, @broadcast}, &(0x7f0000000280)=0xc) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0xd, 0x7, &(0x7f0000000100)=@raw=[@generic={0x465, 0x4, 0x70000000000000, 0x8001, 0x1}, @call={0x85, 0x0, 0x0, 0x46}, @initr0={0x18, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x3}, @initr0={0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x5}, @generic={0x1d, 0x100, 0x5}], &(0x7f0000000140)='GPL\x00', 0x1ff, 0xac, &(0x7f0000000180)=""/172, 0x40f00, 0x1, [], r2, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) ioctl$TIOCGSOFTCAR(r1, 0x5419, &(0x7f00000000c0)) 03:59:38 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) syz_execute_func(&(0x7f00000000c0)="64ff0941c3c4e2c9975842c4c27d794e0066420fe2e33e0f1110c442019dccd3193e66430f3a0ce397") clone(0x1a02100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet_MCAST_LEAVE_GROUP(r1, 0x0, 0x2d, &(0x7f0000000300)={0xfffffffffffffffc, {{0x2, 0x0, @local}}}, 0x88) write$binfmt_elf32(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x4da) getsockopt$ARPT_SO_GET_ENTRIES(r1, 0x0, 0x61, 0x0, &(0x7f0000000040)) 03:59:38 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) connect$inet6(r0, 0x0, 0x0) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) syz_execute_func(&(0x7f00000000c0)="64ff0941c3c4e2c9975842c4c27d794e0066420fe2e33e0f1110c442019dccd3193e66430f3a0ce397") clone(0x1a02100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet_MCAST_LEAVE_GROUP(r1, 0x0, 0x2d, &(0x7f0000000300)={0xfffffffffffffffc, {{0x2, 0x0, @local}}}, 0x88) write$binfmt_elf32(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x4da) getsockopt$ARPT_SO_GET_ENTRIES(r1, 0x0, 0x61, 0x0, &(0x7f0000000040)) 03:59:38 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) connect$inet6(r0, 0x0, 0x0) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) syz_execute_func(&(0x7f00000000c0)="64ff0941c3c4e2c9975842c4c27d794e0066420fe2e33e0f1110c442019dccd3193e66430f3a0ce397") clone(0x1a02100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet_MCAST_LEAVE_GROUP(r1, 0x0, 0x2d, &(0x7f0000000300)={0xfffffffffffffffc, {{0x2, 0x0, @local}}}, 0x88) write$binfmt_elf32(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x4da) getsockopt$ARPT_SO_GET_ENTRIES(r1, 0x0, 0x61, 0x0, &(0x7f0000000040)) 03:59:38 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) connect$inet6(r0, 0x0, 0x0) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) syz_execute_func(&(0x7f00000000c0)="64ff0941c3c4e2c9975842c4c27d794e0066420fe2e33e0f1110c442019dccd3193e66430f3a0ce397") clone(0x1a02100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet_MCAST_LEAVE_GROUP(r1, 0x0, 0x2d, &(0x7f0000000300)={0xfffffffffffffffc, {{0x2, 0x0, @local}}}, 0x88) write$binfmt_elf32(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x4da) getsockopt$ARPT_SO_GET_ENTRIES(r1, 0x0, 0x61, 0x0, &(0x7f0000000040)) 03:59:38 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, 0x0, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000002000)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001000)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqsrc(r2, 0x0, 0x2000000000000004, &(0x7f0000013ff4)={@remote}, 0xc) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000340)={{{@in=@broadcast, @in=@broadcast, 0xffffff80, 0x0, 0x0, 0x0, 0xa}}, {{@in6=@local, 0x0, 0x33}, 0x0, @in6=@local}}, 0xe8) close(r2) dup3(r0, r1, 0x0) 03:59:38 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x25d1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000080)="00000600000000000000", 0x0) write$binfmt_elf32(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c63000000000000000000000000030006000000000000000000380000000000000000000000000020000200000000000000000000000000000000000000000000000001000000040000000000000000000000000000030000000000000000000000000000000200000028e9653bf5f378f24e50b960"], 0x78) execveat(r1, &(0x7f0000000000)='\x00', &(0x7f0000000280), 0x0, 0x1000) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 03:59:38 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(0xffffffffffffffff, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) syz_execute_func(&(0x7f00000000c0)="64ff0941c3c4e2c9975842c4c27d794e0066420fe2e33e0f1110c442019dccd3193e66430f3a0ce397") clone(0x1a02100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet_MCAST_LEAVE_GROUP(r1, 0x0, 0x2d, &(0x7f0000000300)={0xfffffffffffffffc, {{0x2, 0x0, @local}}}, 0x88) write$binfmt_elf32(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="7f454c4684025200d80000000000000003003e0065b700001302000038000000a6030000810000000000200001008100000205000000000053e57464ff0f000002000000ff00000000000000050000008000000004000000ae5c03d8c672bd43fc0ccbb8681c45f2559d91e3c30e464212881f9f6b309eb3e4d790e9de001b72c6b7ed9759779c320b5cb91ece41228af2217903d258b4a9ba463c293d6bc83e9e94b367a5bd6a68ee9886619ee57c83c758674a6813c1cf922187cb3217744f9514b25f897bd2c953df3a7a32b160f26f0070846d70eeb1dee400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x4da) getsockopt$ARPT_SO_GET_ENTRIES(r1, 0x0, 0x61, 0x0, &(0x7f0000000040)) 03:59:39 executing program 2: clone(0x41fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f00000000c0)) syz_open_dev$rtc(&(0x7f0000000080)='/dev/rtc#\x00', 0x0, 0x0) ptrace(0x10, r0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000000)) getsockopt$inet_sctp6_SCTP_NODELAY(0xffffffffffffffff, 0x84, 0x3, &(0x7f0000000140), &(0x7f00000001c0)=0x4) ptrace$setregs(0xf, r0, 0x0, &(0x7f0000000180)) ptrace$getregset(0x4204, r0, 0x2, &(0x7f0000000280)={0x0}) 03:59:39 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x25d1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000080)="00000600000000000000", 0x0) ioctl$SG_EMULATED_HOST(r1, 0x2203, &(0x7f00000000c0)) execveat(r1, &(0x7f0000000000)='\x00', &(0x7f0000000280), 0x0, 0x1000) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 03:59:39 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x25d1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000080)="00000600000000000000", 0x0) write$binfmt_elf32(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000000000000000000000030006000000000000000000380000000000000000000000000020000200000000000000000000000000000000000000000000000000000000040000000000000000000000000000030000000000000000000000000000000200000028e9653bf5f378f24e50b960"], 0x78) bind$unix(r1, &(0x7f00000000c0)=@file={0x0, './file0\x00'}, 0x6e) execveat(r1, &(0x7f0000000000)='\x00', &(0x7f0000000280), 0x0, 0x1000) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 03:59:39 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, 0x0, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000002000)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001000)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqsrc(r2, 0x0, 0x2000000000000004, &(0x7f0000013ff4)={@remote}, 0xc) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000340)={{{@in=@broadcast, @in=@broadcast, 0x2, 0x0, 0x0, 0x0, 0xa}}, {{@in6=@local, 0x0, 0x33}, 0x0, @in6=@local}}, 0xe8) close(r2) dup3(r0, r1, 0x0) 03:59:39 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(0xffffffffffffffff, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) syz_execute_func(&(0x7f00000000c0)="64ff0941c3c4e2c9975842c4c27d794e0066420fe2e33e0f1110c442019dccd3193e66430f3a0ce397") clone(0x1a02100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet_MCAST_LEAVE_GROUP(r1, 0x0, 0x2d, &(0x7f0000000300)={0xfffffffffffffffc, {{0x2, 0x0, @local}}}, 0x88) write$binfmt_elf32(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x4da) getsockopt$ARPT_SO_GET_ENTRIES(r1, 0x0, 0x61, 0x0, &(0x7f0000000040)) 03:59:39 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x25d1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000080)="00000600000000000000", 0x0) write$binfmt_elf32(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000000000000000000000030006000000000000000000380000000000000000000000000020000200000000000000000000000000000000000000000000000000000000040000000000000000000000000000030000000000000000000000000000000200000028e9653bf5f378f24e50b960"], 0x78) execveat(r1, &(0x7f0000000000)='\x00', &(0x7f0000000280), 0x0, 0x1003) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f00000000c0)={0xbe, 0x1, 0x8, 0x70, 0x1}, 0xc) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 03:59:39 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(0xffffffffffffffff, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) syz_execute_func(&(0x7f00000000c0)="64ff0941c3c4e2c9975842c4c27d794e0066420fe2e33e0f1110c442019dccd3193e66430f3a0ce397") clone(0x1a02100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet_MCAST_LEAVE_GROUP(r1, 0x0, 0x2d, &(0x7f0000000300)={0xfffffffffffffffc, {{0x2, 0x0, @local}}}, 0x88) write$binfmt_elf32(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x4da) getsockopt$ARPT_SO_GET_ENTRIES(r1, 0x0, 0x61, 0x0, &(0x7f0000000040)) 03:59:39 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x25d1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000080)="00000600000000000000", 0x0) write$binfmt_elf32(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000000000000000000000030006000000000000000000380000000000000000000000000020000200000000000000000000000000000000000000000000000000000000040000000000000000000000000000030000000000000000000000000000000200000028e9653bf5f378f24e50b960"], 0x78) mmap$perf(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x4, 0x30, r1, 0x0) ioctl$EVIOCSCLOCKID(r1, 0x400445a0, &(0x7f0000000100)=0x8) execveat(r1, &(0x7f0000000000)='\x00', &(0x7f0000000280), 0x0, 0x1000) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0x0, r1, 0x0, 0x12, &(0x7f0000000140)="656d30776c616e31c57d7d63707573657400"}, 0x30) waitid(0x1, r2, &(0x7f00000001c0), 0x20000000, 0x0) ioctl$VIDIOC_SUBDEV_S_CROP(r1, 0xc038563c, &(0x7f00000000c0)={0xef3c29c00cb65e8f, 0x8, {0x8, 0x5, 0xae6a, 0x1000}}) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 03:59:39 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, 0x0, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000002000)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001000)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqsrc(r2, 0x0, 0x2000000000000004, &(0x7f0000013ff4)={@remote}, 0xc) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000340)={{{@in=@broadcast, @in=@broadcast, 0xffffffa4, 0x0, 0x0, 0x0, 0xa}}, {{@in6=@local, 0x0, 0x33}, 0x0, @in6=@local}}, 0xe8) close(r2) dup3(r0, r1, 0x0) 03:59:39 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) syz_execute_func(&(0x7f00000000c0)="64ff0941c3c4e2c9975842c4c27d794e0066420fe2e33e0f1110c442019dccd3193e66430f3a0ce397") clone(0x1a02100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet_MCAST_LEAVE_GROUP(r1, 0x0, 0x2d, &(0x7f0000000300)={0xfffffffffffffffc, {{0x2, 0x0, @local}}}, 0x88) write$binfmt_elf32(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x4da) getsockopt$ARPT_SO_GET_ENTRIES(r1, 0x0, 0x61, 0x0, &(0x7f0000000040)) 03:59:39 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x25d1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000080)="00000600000000000000", 0x0) ioctl$SG_EMULATED_HOST(r1, 0x2203, &(0x7f00000000c0)) execveat(r1, &(0x7f0000000000)='\x00', &(0x7f0000000280), 0x0, 0x1000) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 03:59:39 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x25d1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000080)="00000600000000000000", 0x0) write$binfmt_elf32(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000000000000000000000030006000000000000000000380000000000000000000000000020000200000000000000000000000000000000000000000000000000000000040000000000000000000000000000030000000000000000000000000000000200000028e9653bf5f378f24e50b960"], 0x78) execveat(r1, &(0x7f0000000000)='\x00', &(0x7f0000000280), 0x0, 0x1003) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f00000000c0)={0xbe, 0x1, 0x8, 0x70, 0x1}, 0xc) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 03:59:39 executing program 2: clone(0x41fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f00000000c0)) syz_open_dev$rtc(&(0x7f0000000080)='/dev/rtc#\x00', 0x0, 0x0) ptrace(0x10, r0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000000)) getsockopt$inet_sctp6_SCTP_NODELAY(0xffffffffffffffff, 0x84, 0x3, &(0x7f0000000140), &(0x7f00000001c0)=0x4) ptrace$setregs(0xf, r0, 0x0, &(0x7f0000000180)) ptrace$getregset(0x4204, r0, 0x2, &(0x7f0000000280)={0x0}) 03:59:39 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) syz_execute_func(&(0x7f00000000c0)="64ff0941c3c4e2c9975842c4c27d794e0066420fe2e33e0f1110c442019dccd3193e66430f3a0ce397") clone(0x1a02100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet_MCAST_LEAVE_GROUP(r1, 0x0, 0x2d, &(0x7f0000000300)={0xfffffffffffffffc, {{0x2, 0x0, @local}}}, 0x88) write$binfmt_elf32(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x4da) getsockopt$ARPT_SO_GET_ENTRIES(r1, 0x0, 0x61, 0x0, &(0x7f0000000040)) 03:59:39 executing program 1: r0 = socket$packet(0x11, 0x0, 0x300) getsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f00000000c0), &(0x7f0000000100)=0x4) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x40000000, 0x0, 0x0, 0x25d1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = memfd_create(&(0x7f0000000080)="00000600000000000000", 0x0) write$binfmt_elf32(r2, &(0x7f0000000280)=ANY=[@ANYBLOB="7f454c4600000000001000000000000003000600000000000000000038000008000000000000000000002200020000000000000000000000000009000000000000000000000000000004ff01000000000000000000000000030000000000000000000000000000000200000028e9653bf5f378f24e50b9608268c2dc890aafe02d917f14f383b1ad1dcfacfb0afd7ee7c1361cf9d7c9c5591c8eb0584b5e86aeece0a388f84f9a1f99627e4adde0f5277851f24a294efffffcd347b4b907eae2f274d428a1eefe5ab4541abf805165cda6afb9d73458459e9c46975f8095be377e707fd81609fef9f0a1729c0f22ec5a9c1e8c7f8864f436fbd130bc23044c5cbbff750ab57b670ec523b6f31c3e1a67b28f22fdc807e259fe"], 0x78) execveat(r2, &(0x7f0000000000)='\x00', &(0x7f0000000280), 0x0, 0x1000) ioctl$RTC_WIE_OFF(r2, 0x7010) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000240)={'vcan0\x00', 0x0}) sendto(r2, &(0x7f0000000140)="ff71e25ef37178e0cf74744c28f4cf99afdf9a8a3e24b42db46c9013a7c339095321a03a0194d5a00a452fe55ae8e1487638b5929df59673e120e464761b5c7165a2431dbfb6b403690f64d79f3d17b6c03e3a0a30b05206b7c1fa78f1df04b903072a5babcdc4f666e86059641fee4df17c9aeefca360adb69e1c9d824e66e16a40d66e55939c94de30144a6f55910073588f58379d57397a46879f9e274e23995e603b6f65df259481ad230e6def7173026459185eee0f12388538e2eebfe334245d4c5799da1414d1a74ca29f13e7fa935bdc94d03a4bd59ad1", 0xdb, 0x0, &(0x7f00000003c0)=@xdp={0x2c, 0x4, r3, 0x29}, 0x80) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000500)=0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x70, 0x5, 0x9, 0x0, 0xfffffffffffffffd, 0x0, 0x2, 0x2000, 0x9, 0x0, 0x2, 0x9372, 0x4, 0x8e39, 0x200000, 0x0, 0x10000, 0x1, 0x0, 0x7, 0x1, 0x101, 0x7, 0x9, 0x80000, 0x1, 0x101, 0x1, 0x2, 0x7af, 0xd32, 0x1ff, 0x7, 0xeff, 0x4, 0x7, 0x80000000, 0x0, 0x2, 0x1, @perf_bp={&(0x7f0000000440), 0x4}, 0x2, 0x800, 0x4, 0x7, 0x7, 0x8, 0x6}, r4, 0x0, r2, 0x8) setsockopt$inet_sctp6_SCTP_NODELAY(r2, 0x84, 0x3, &(0x7f0000000540)=0x4d, 0x4) 03:59:39 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, 0x0, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000002000)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001000)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqsrc(r2, 0x0, 0x2000000000000004, &(0x7f0000013ff4)={@remote}, 0xc) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000340)={{{@in=@broadcast, @in=@broadcast, 0x600000000000000, 0x0, 0x0, 0x0, 0xa}}, {{@in6=@local, 0x0, 0x33}, 0x0, @in6=@local}}, 0xe8) close(r2) dup3(r0, r1, 0x0) 03:59:39 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x25d1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000080)="00000600000000000000", 0x0) write$binfmt_elf32(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="7f454c460000000000000000000000000300060000000000000000003800000000000000000000000000200002000000000000000000000000000000000000000000000000000400000012b8060000000000000000000000030000000000000000000000000000000200000028e9653bf5f378e74e1d8a32eb6376"], 0x78) execveat(r1, &(0x7f0000000000)='\x00', &(0x7f0000000280), 0x0, 0x1000) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x80000, 0x0) 03:59:39 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x25d1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000080)="00000600000000000000", 0x0) write$binfmt_elf32(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000000000000000000000030006000000000000000000380000000000000000000000000020000200000000000000000000000000000000000000000000000000000000040000000000000000000000000000030000000000000000000000000000000200000028e9653bf5f378f24e50b960"], 0x78) execveat(r1, &(0x7f0000000000)='\x00', &(0x7f0000000280), 0x0, 0x1000) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 03:59:39 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) syz_execute_func(&(0x7f00000000c0)="64ff0941c3c4e2c9975842c4c27d794e0066420fe2e33e0f1110c442019dccd3193e66430f3a0ce397") clone(0x1a02100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet_MCAST_LEAVE_GROUP(r1, 0x0, 0x2d, &(0x7f0000000300)={0xfffffffffffffffc, {{0x2, 0x0, @local}}}, 0x88) write$binfmt_elf32(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x4da) getsockopt$ARPT_SO_GET_ENTRIES(r1, 0x0, 0x61, 0x0, &(0x7f0000000040)) 03:59:40 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x25d1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000080)="00000600000000000000", 0x0) write$binfmt_elf32(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000000000000000000000030006000000000000000000380000000000000000000000000020000200000000000000000000000000000000000000000000000000000000040000000000000000000000000000030000000000000000000000000000000200000028e9653bf5f378f24e50b960"], 0x78) execveat(r1, &(0x7f0000000000)='\x00', &(0x7f0000000280), 0x0, 0x1000) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) pipe2(&(0x7f00000000c0), 0x80000) 03:59:40 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, 0x0, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000002000)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001000)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqsrc(r2, 0x0, 0x2000000000000004, &(0x7f0000013ff4)={@remote}, 0xc) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000340)={{{@in=@broadcast, @in=@broadcast, 0xa4ffffff00000000, 0x0, 0x0, 0x0, 0xa}}, {{@in6=@local, 0x0, 0x33}, 0x0, @in6=@local}}, 0xe8) close(r2) dup3(r0, r1, 0x0) 03:59:40 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000440), 0x131f64) syz_execute_func(&(0x7f00000000c0)="64ff0941c3c4e2c9975842c4c27d794e0066420fe2e33e0f1110c442019dccd3193e66430f3a0ce397") clone(0x1a02100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet_MCAST_LEAVE_GROUP(r1, 0x0, 0x2d, &(0x7f0000000300)={0xfffffffffffffffc, {{0x2, 0x0, @local}}}, 0x88) write$binfmt_elf32(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x4da) getsockopt$ARPT_SO_GET_ENTRIES(r1, 0x0, 0x61, 0x0, &(0x7f0000000040)) 03:59:40 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x25d1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000080)="00000600000000000000", 0x0) write$binfmt_elf32(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="7f454c460000000000000000000000000300060000000000000000003800000000000000000000000000200002000000000000000000000000000000000000000000000000000400000012b8060000000000000000000000030000000000000000000000000000000200000028e9653bf5f378e74e1d8a32eb6376"], 0x78) execveat(r1, &(0x7f0000000000)='\x00', &(0x7f0000000280), 0x0, 0x1000) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x80000, 0x0) 03:59:40 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x25d1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000080)="00000600000000000000", 0x0) write$binfmt_elf32(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000000000000000000000030006000000000000000000380000000000000000000000000020000200000000000000000000000000000000000000000000000000000000040000000000000000000000000000030000000000000000000000000000000200000028e9653bf5f378f24e50b960"], 0x78) execveat(r1, &(0x7f0000000000)='\x00', &(0x7f0000000280), 0x0, 0x1000) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 03:59:40 executing program 2: clone(0x41fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f00000000c0)) syz_open_dev$rtc(&(0x7f0000000080)='/dev/rtc#\x00', 0x0, 0x0) ptrace(0x10, r0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000000)) getsockopt$inet_sctp6_SCTP_NODELAY(0xffffffffffffffff, 0x84, 0x3, &(0x7f0000000140), &(0x7f00000001c0)=0x4) ptrace$setregs(0xf, r0, 0x0, &(0x7f0000000180)="a96d55a756365db942") ptrace$getregset(0x4204, r0, 0x2, &(0x7f0000000280)={0x0}) 03:59:40 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000440), 0x131f64) syz_execute_func(&(0x7f00000000c0)="64ff0941c3c4e2c9975842c4c27d794e0066420fe2e33e0f1110c442019dccd3193e66430f3a0ce397") clone(0x1a02100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet_MCAST_LEAVE_GROUP(r1, 0x0, 0x2d, &(0x7f0000000300)={0xfffffffffffffffc, {{0x2, 0x0, @local}}}, 0x88) write$binfmt_elf32(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x4da) getsockopt$ARPT_SO_GET_ENTRIES(r1, 0x0, 0x61, 0x0, &(0x7f0000000040)) 03:59:40 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, 0x0, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000002000)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001000)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqsrc(r2, 0x0, 0x2000000000000004, &(0x7f0000013ff4)={@remote}, 0xc) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000340)={{{@in=@broadcast, @in=@broadcast, 0xa4ffffff, 0x0, 0x0, 0x0, 0xa}}, {{@in6=@local, 0x0, 0x33}, 0x0, @in6=@local}}, 0xe8) close(r2) dup3(r0, r1, 0x0) 03:59:40 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x25d1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000080)="00000600000000000000", 0x0) write$binfmt_elf32(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000000000000000000000030006000000000000000000380000000000000000000000000020000200000000000000000000000000000000000000000000000000000000040000000000000000000000000000030000000000000000000000000000000200000028e9653bf5f378f24e50b960"], 0x78) execveat(r1, &(0x7f0000000000)='\x00', &(0x7f0000000280), 0x0, 0x1000) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) pipe2(&(0x7f00000000c0), 0x80000) 03:59:40 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x25d1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000080)="00000600000000000000", 0x0) write$binfmt_elf32(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000000000000000000000030006000000000000000000380000000000000000000000000020000200000000000000000000000000000000000000000000000000000000040000000000000000000000000000030000000000000000000000000000000200000028e9653bf5f378f24e50b960"], 0x78) execveat(r1, &(0x7f0000000000)='\x00', &(0x7f0000000280), 0x0, 0x1000) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 03:59:40 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x25d1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000080)="00000600000000000000", 0x0) write$binfmt_elf32(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="7f454c460000000000000000000000000300060000000000000000003800000000000000000000000000200002000000000000000000000000000000000000000000000000000400000012b8060000000000000000000000030000000000000000000000000000000200000028e9653bf5f378e74e1d8a32eb6376"], 0x78) execveat(r1, &(0x7f0000000000)='\x00', &(0x7f0000000280), 0x0, 0x1000) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x80000, 0x0) 03:59:40 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000440), 0x131f64) syz_execute_func(&(0x7f00000000c0)="64ff0941c3c4e2c9975842c4c27d794e0066420fe2e33e0f1110c442019dccd3193e66430f3a0ce397") clone(0x1a02100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet_MCAST_LEAVE_GROUP(r1, 0x0, 0x2d, &(0x7f0000000300)={0xfffffffffffffffc, {{0x2, 0x0, @local}}}, 0x88) write$binfmt_elf32(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x4da) getsockopt$ARPT_SO_GET_ENTRIES(r1, 0x0, 0x61, 0x0, &(0x7f0000000040)) 03:59:40 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x25d1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000080)="00000600000000000000", 0x0) write$binfmt_elf32(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000000000000000000000030006000000000000000000380000000000000000000000000020000200000000000000000000000000000000000000000000000000000000040000000000000000000000000000030000000000000000000000000000000200000028e9653bf5f378f24e50b960"], 0x78) execveat(r1, &(0x7f0000000000)='\x00', &(0x7f0000000280), 0x0, 0x1000) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 03:59:40 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x25d1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SG_EMULATED_HOST(0xffffffffffffffff, 0x2203, &(0x7f00000000c0)) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000000000000000000000030006000000000000000000380000000000000000000000000020000200000000000000000000000000000000000000000000000000000000040000000000000000000000000000030000000000000000000000000000000200000028e9653bf5f378f24e50b960"], 0x78) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', &(0x7f0000000280), 0x0, 0x1000) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, 0xffffffffffffffff) 03:59:40 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, 0x0, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000002000)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001000)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqsrc(r2, 0x0, 0x2000000000000004, &(0x7f0000013ff4)={@remote}, 0xc) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000340)={{{@in=@broadcast, @in=@broadcast, 0x2000000000000000, 0x0, 0x0, 0x0, 0xa}}, {{@in6=@local, 0x0, 0x33}, 0x0, @in6=@local}}, 0xe8) close(r2) dup3(r0, r1, 0x0) 03:59:41 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, 0x0, 0x0) syz_execute_func(&(0x7f00000000c0)="64ff0941c3c4e2c9975842c4c27d794e0066420fe2e33e0f1110c442019dccd3193e66430f3a0ce397") clone(0x1a02100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet_MCAST_LEAVE_GROUP(r1, 0x0, 0x2d, &(0x7f0000000300)={0xfffffffffffffffc, {{0x2, 0x0, @local}}}, 0x88) write$binfmt_elf32(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x4da) getsockopt$ARPT_SO_GET_ENTRIES(r1, 0x0, 0x61, 0x0, &(0x7f0000000040)) 03:59:41 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x25d1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000080)="00000600000000000000", 0x0) write$binfmt_elf32(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000000000000000000000030006000000000000000000380000000000000000000000000020000200000000000000000000000000000000000000000000000000000000040000000000000000000000000000030000000000000000000000000000000200000028e9653bf5f378f24e50b960"], 0x78) execveat(r1, &(0x7f0000000000)='\x00', &(0x7f0000000280), 0x0, 0x1000) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) pipe2(&(0x7f00000000c0), 0x80000) 03:59:41 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x25d1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SG_EMULATED_HOST(0xffffffffffffffff, 0x2203, &(0x7f00000000c0)) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000000000000000000000030006000000000000000000380000000000000000000000000020000200000000000000000000000000000000000000000000000000000000040000000000000000000000000000030000000000000000000000000000000200000028e9653bf5f378f24e50b960"], 0x78) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', &(0x7f0000000280), 0x0, 0x1000) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, 0xffffffffffffffff) 03:59:41 executing program 2: clone(0x41fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f00000000c0)) syz_open_dev$rtc(&(0x7f0000000080)='/dev/rtc#\x00', 0x0, 0x0) ptrace(0x10, r0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000000)) getsockopt$inet_sctp6_SCTP_NODELAY(0xffffffffffffffff, 0x84, 0x3, &(0x7f0000000140), &(0x7f00000001c0)=0x4) ptrace$setregs(0xf, r0, 0x0, &(0x7f0000000180)) ptrace$getregset(0x4204, r0, 0x2, &(0x7f0000000280)={0x0}) 03:59:41 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, 0x0, 0x0) syz_execute_func(&(0x7f00000000c0)="64ff0941c3c4e2c9975842c4c27d794e0066420fe2e33e0f1110c442019dccd3193e66430f3a0ce397") clone(0x1a02100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet_MCAST_LEAVE_GROUP(r1, 0x0, 0x2d, &(0x7f0000000300)={0xfffffffffffffffc, {{0x2, 0x0, @local}}}, 0x88) write$binfmt_elf32(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x4da) getsockopt$ARPT_SO_GET_ENTRIES(r1, 0x0, 0x61, 0x0, &(0x7f0000000040)) 03:59:41 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, 0x0, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000002000)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001000)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqsrc(r2, 0x0, 0x2000000000000004, &(0x7f0000013ff4)={@remote}, 0xc) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000340)={{{@in=@broadcast, @in=@broadcast, 0x3000000, 0x0, 0x0, 0x0, 0xa}}, {{@in6=@local, 0x0, 0x33}, 0x0, @in6=@local}}, 0xe8) close(r2) dup3(r0, r1, 0x0) 03:59:41 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x25d1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000080)="00000600000000000000", 0x0) write$binfmt_elf32(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000000000000000000000030006000000000000000000380000000000000000000000000020000200000000000000000000000000000000000000000000000000000000040000000000000000000000000000030000000000000000000000000000000200000028e9653bf5f378f24e50b960"], 0x78) execveat(r1, &(0x7f0000000000)='\x00', &(0x7f0000000280), 0x0, 0x1000) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) ioctl$TCSETSF(r1, 0x5404, &(0x7f00000000c0)={0x80, 0x8, 0x66, 0x3, 0xfffffffffffffffc, 0x7fffffff, 0x10001, 0x0, 0x7f, 0x3, 0x5, 0x7}) 03:59:41 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x25d1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000080)="00000600000000000000", 0x0) write$binfmt_elf32(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000000000000000000000030006000000000000000000380000000000000000000000000020000200000000000000000000000000000000000000000000000000000000040000000000000000000000000000030000000000000000000000000000000200000028e9653bf5f378f24e50b960"], 0x78) execveat(r1, &(0x7f0000000000)='\x00', &(0x7f0000000280), 0x0, 0x1000) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 03:59:41 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, 0x0, 0x0) syz_execute_func(&(0x7f00000000c0)="64ff0941c3c4e2c9975842c4c27d794e0066420fe2e33e0f1110c442019dccd3193e66430f3a0ce397") clone(0x1a02100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet_MCAST_LEAVE_GROUP(r1, 0x0, 0x2d, &(0x7f0000000300)={0xfffffffffffffffc, {{0x2, 0x0, @local}}}, 0x88) write$binfmt_elf32(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x4da) getsockopt$ARPT_SO_GET_ENTRIES(r1, 0x0, 0x61, 0x0, &(0x7f0000000040)) 03:59:41 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x25d1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SG_EMULATED_HOST(0xffffffffffffffff, 0x2203, &(0x7f00000000c0)) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000000000000000000000030006000000000000000000380000000000000000000000000020000200000000000000000000000000000000000000000000000000000000040000000000000000000000000000030000000000000000000000000000000200000028e9653bf5f378f24e50b960"], 0x78) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', &(0x7f0000000280), 0x0, 0x1000) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, 0xffffffffffffffff) 03:59:41 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, 0x0, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000002000)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001000)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqsrc(r2, 0x0, 0x2000000000000004, &(0x7f0000013ff4)={@remote}, 0xc) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000340)={{{@in=@broadcast, @in=@broadcast, 0x6000000, 0x0, 0x0, 0x0, 0xa}}, {{@in6=@local, 0x0, 0x33}, 0x0, @in6=@local}}, 0xe8) close(r2) dup3(r0, r1, 0x0) 03:59:41 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) syz_execute_func(0x0) clone(0x1a02100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet_MCAST_LEAVE_GROUP(r1, 0x0, 0x2d, &(0x7f0000000300)={0xfffffffffffffffc, {{0x2, 0x0, @local}}}, 0x88) write$binfmt_elf32(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x4da) getsockopt$ARPT_SO_GET_ENTRIES(r1, 0x0, 0x61, 0x0, &(0x7f0000000040)) 03:59:41 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x25d1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000080)="00000600000000000000", 0x0) write$binfmt_elf32(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000000000000000000000030006000000000000000000380000000000000000000000000020000200000000000000000000000000000000000000000000000000000000040000000000000000000000000000030000000000000000000000000000000200000028e9653bf5f378f24e50b960"], 0x78) execveat(r1, &(0x7f0000000000)='\x00', &(0x7f0000000280), 0x0, 0x1000) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) ioctl$TCSETSF(r1, 0x5404, &(0x7f00000000c0)={0x80, 0x8, 0x66, 0x3, 0xfffffffffffffffc, 0x7fffffff, 0x10001, 0x0, 0x7f, 0x3, 0x5, 0x7}) 03:59:41 executing program 5: r0 = memfd_create(&(0x7f0000000080)="00000600000000000000", 0x0) ioctl$SG_EMULATED_HOST(r0, 0x2203, &(0x7f00000000c0)) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000000000000000000000030006000000000000000000380000000000000000000000000020000200000000000000000000000000000000000000000000000000000000040000000000000000000000000000030000000000000000000000000000000200000028e9653bf5f378f24e50b960"], 0x78) execveat(r0, &(0x7f0000000000)='\x00', &(0x7f0000000280), 0x0, 0x1000) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r0) 03:59:42 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) syz_execute_func(0x0) clone(0x1a02100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet_MCAST_LEAVE_GROUP(r1, 0x0, 0x2d, &(0x7f0000000300)={0xfffffffffffffffc, {{0x2, 0x0, @local}}}, 0x88) write$binfmt_elf32(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x4da) getsockopt$ARPT_SO_GET_ENTRIES(r1, 0x0, 0x61, 0x0, &(0x7f0000000040)) 03:59:42 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x25d1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000080)="00000600000000000000", 0x0) write$binfmt_elf32(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000000000000000000000030006000000000000000000380000000000000000000000000020000200000000000000000000000000000000000000000000000000000000040000000000000000000000000000030000000000000000000000000000000200000028e9653bf5f378f24e50b960"], 0x78) execveat(r1, &(0x7f0000000000)='\x00', &(0x7f0000000280), 0x0, 0x1000) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 03:59:42 executing program 5: r0 = memfd_create(&(0x7f0000000080)="00000600000000000000", 0x0) ioctl$SG_EMULATED_HOST(r0, 0x2203, &(0x7f00000000c0)) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000000000000000000000030006000000000000000000380000000000000000000000000020000200000000000000000000000000000000000000000000000000000000040000000000000000000000000000030000000000000000000000000000000200000028e9653bf5f378f24e50b960"], 0x78) execveat(r0, &(0x7f0000000000)='\x00', &(0x7f0000000280), 0x0, 0x1000) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r0) 03:59:42 executing program 2: clone(0x41fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f00000000c0)) syz_open_dev$rtc(&(0x7f0000000080)='/dev/rtc#\x00', 0x0, 0x0) ptrace(0x10, r0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000000)) getsockopt$inet_sctp6_SCTP_NODELAY(0xffffffffffffffff, 0x84, 0x3, &(0x7f0000000140), &(0x7f00000001c0)=0x4) ptrace$setregs(0xf, r0, 0x0, &(0x7f0000000180)) ptrace$getregset(0x4204, r0, 0x2, &(0x7f0000000280)={0x0}) 03:59:42 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, 0x0, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000002000)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001000)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqsrc(r2, 0x0, 0x2000000000000004, &(0x7f0000013ff4)={@remote}, 0xc) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000340)={{{@in=@broadcast, @in=@broadcast, 0xff0f0000, 0x0, 0x0, 0x0, 0xa}}, {{@in6=@local, 0x0, 0x33}, 0x0, @in6=@local}}, 0xe8) close(r2) dup3(r0, r1, 0x0) 03:59:42 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) syz_execute_func(0x0) clone(0x1a02100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet_MCAST_LEAVE_GROUP(r1, 0x0, 0x2d, &(0x7f0000000300)={0xfffffffffffffffc, {{0x2, 0x0, @local}}}, 0x88) write$binfmt_elf32(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x4da) getsockopt$ARPT_SO_GET_ENTRIES(r1, 0x0, 0x61, 0x0, &(0x7f0000000040)) 03:59:42 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x25d1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000080)="00000600000000000000", 0x0) write$binfmt_elf32(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000000000000000000000030006000000000000000000380000000000000000000000000020000200000000000000000000000000000000000000000000000000000000040000000000000000000000000000030000000000000000000000000000000200000028e9653bf5f378f24e50b960"], 0x78) execveat(r1, &(0x7f0000000000)='\x00', &(0x7f0000000280), 0x0, 0x1000) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) ioctl$TCSETSF(r1, 0x5404, &(0x7f00000000c0)={0x80, 0x8, 0x66, 0x3, 0xfffffffffffffffc, 0x7fffffff, 0x10001, 0x0, 0x7f, 0x3, 0x5, 0x7}) 03:59:42 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x25d1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rfkill\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000140)={{{@in6, @in6}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@empty}}, &(0x7f0000000240)=0xe8) r2 = memfd_create(&(0x7f0000000080)="00000600000000000000", 0x0) lsetxattr$trusted_overlay_opaque(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='trusted.overlay.opaque\x00', &(0x7f0000000300)='y\x00', 0x2, 0x1) write$binfmt_elf32(r2, &(0x7f0000000100)=ANY=[@ANYRESOCT=r0, @ANYPTR, @ANYRES32=r0, @ANYPTR64], 0x1c9) execveat(r2, &(0x7f0000000000)='\x00', &(0x7f0000000480)=[&(0x7f0000000400)="00000600", &(0x7f0000000440)='/dev/rfkill\x00'], 0x0, 0x1000) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f00000003c0)=0x0) perf_event_open(&(0x7f0000000340)={0x3, 0x70, 0x57, 0x8001, 0x2, 0x1f, 0x0, 0x3, 0x80000, 0x5, 0x10000, 0x7ff, 0x84, 0x478, 0x4, 0x6, 0x5, 0x0, 0xbaa9, 0x6, 0x7, 0x9d, 0x7, 0x0, 0x80000001, 0x3, 0x400, 0x0, 0xac, 0x80000000, 0x7dfe, 0x3, 0xaea, 0xd3, 0x0, 0x800, 0x9, 0x35, 0x0, 0x20, 0x2, @perf_config_ext={0x6, 0x696}, 0x0, 0x7f, 0xc1a4, 0x4, 0x80000000, 0x9, 0x16e79c00}, r3, 0xf, 0xffffffffffffffff, 0x2) ioctl$RTC_WIE_OFF(r2, 0x7010) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) 03:59:42 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) syz_execute_func(&(0x7f00000000c0)="64ff0941c3c4e2c9975842c4c27d794e0066420fe2e33e0f1110c442019dccd3193e66430f3a0ce397") clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet_MCAST_LEAVE_GROUP(r1, 0x0, 0x2d, &(0x7f0000000300)={0xfffffffffffffffc, {{0x2, 0x0, @local}}}, 0x88) write$binfmt_elf32(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x4da) getsockopt$ARPT_SO_GET_ENTRIES(r1, 0x0, 0x61, 0x0, &(0x7f0000000040)) 03:59:42 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x25d1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) times(&(0x7f00000000c0)) r1 = memfd_create(&(0x7f0000000080)="00000600000000000000", 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYRESOCT=r1], 0xfe58) execveat(r1, &(0x7f0000000000)='\x00', &(0x7f0000000280), 0x0, 0x1000) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 03:59:42 executing program 5: r0 = memfd_create(&(0x7f0000000080)="00000600000000000000", 0x0) ioctl$SG_EMULATED_HOST(r0, 0x2203, &(0x7f00000000c0)) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000000000000000000000030006000000000000000000380000000000000000000000000020000200000000000000000000000000000000000000000000000000000000040000000000000000000000000000030000000000000000000000000000000200000028e9653bf5f378f24e50b960"], 0x78) execveat(r0, &(0x7f0000000000)='\x00', &(0x7f0000000280), 0x0, 0x1000) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r0) 03:59:42 executing program 3: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000100)=0x0) r1 = syz_open_procfs$namespace(r0, &(0x7f0000000280)='ns/mnt\x00') syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') getsockopt$IP_VS_SO_GET_INFO(r1, 0x0, 0x481, &(0x7f0000000180), &(0x7f00000001c0)=0xc) socket$inet_dccp(0x2, 0x6, 0x0) 03:59:42 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, 0x0, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000002000)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001000)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqsrc(r2, 0x0, 0x2000000000000004, &(0x7f0000013ff4)={@remote}, 0xc) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000340)={{{@in=@broadcast, @in=@broadcast, 0x300, 0x0, 0x0, 0x0, 0xa}}, {{@in6=@local, 0x0, 0x33}, 0x0, @in6=@local}}, 0xe8) close(r2) dup3(r0, r1, 0x0) 03:59:42 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x40a000) ioctl$int_out(r1, 0x2, &(0x7f0000000040)) r2 = gettid() ioctl$sock_SIOCSPGRP(r0, 0x8902, &(0x7f0000000140)=r2) 03:59:42 executing program 5: r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000080)="00000600000000000000", 0x0) ioctl$SG_EMULATED_HOST(r1, 0x2203, &(0x7f00000000c0)) write$binfmt_elf32(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000000000000000000000030006000000000000000000380000000000000000000000000020000200000000000000000000000000000000000000000000000000000000040000000000000000000000000000030000000000000000000000000000000200000028e9653bf5f378f24e50b960"], 0x78) execveat(r1, &(0x7f0000000000)='\x00', &(0x7f0000000280), 0x0, 0x1000) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 03:59:43 executing program 2: clone(0x41fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f00000000c0)) syz_open_dev$rtc(&(0x7f0000000080)='/dev/rtc#\x00', 0x0, 0x0) ptrace(0x10, r0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000000)) getsockopt$inet_sctp6_SCTP_NODELAY(0xffffffffffffffff, 0x84, 0x3, &(0x7f0000000140), &(0x7f00000001c0)=0x4) ptrace$setregs(0xf, r0, 0x0, &(0x7f0000000180)) ptrace$getregset(0x4204, r0, 0x2, &(0x7f0000000280)={0x0}) 03:59:43 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) syz_execute_func(&(0x7f00000000c0)="64ff0941c3c4e2c9975842c4c27d794e0066420fe2e33e0f1110c442019dccd3193e66430f3a0ce397") clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet_MCAST_LEAVE_GROUP(r1, 0x0, 0x2d, &(0x7f0000000300)={0xfffffffffffffffc, {{0x2, 0x0, @local}}}, 0x88) write$binfmt_elf32(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="7f454c4684025200d80000000000000003003e0065b700001302000038000000a6030000810000000000200001008100000205000000000053e57464ff0f000002000000ff00000000000000050000008000000004000000ae5c03d8c672bd43fc0ccbb8681c45f2559d91e3c30e464212881f9f6b309eb3e4d790e9de001b72c6b7ed9759779c320b5cb91ece41228af2217903d258b4a9ba463c293d6bc83e9e94b367a5bd6a68ee9886619ee57c83c758674a6813c1cf922187cb3217744f9514b25f897bd2c953df3a7a32b160f26f0070846d70eeb1dee400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x4da) getsockopt$ARPT_SO_GET_ENTRIES(r1, 0x0, 0x61, 0x0, &(0x7f0000000040)) 03:59:43 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, 0x0, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000002000)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001000)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqsrc(r2, 0x0, 0x2000000000000004, &(0x7f0000013ff4)={@remote}, 0xc) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000340)={{{@in=@broadcast, @in=@broadcast, 0x0, 0xa4ffffff00000000, 0x0, 0x0, 0xa}}, {{@in6=@local, 0x0, 0x33}, 0x0, @in6=@local}}, 0xe8) close(r2) dup3(r0, r1, 0x0) 03:59:43 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x25d1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) times(&(0x7f00000000c0)) r1 = memfd_create(&(0x7f0000000080)="00000600000000000000", 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYRESOCT=r1], 0xfe58) execveat(r1, &(0x7f0000000000)='\x00', &(0x7f0000000280), 0x0, 0x1000) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 03:59:43 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x801, 0x0) r2 = socket$unix(0x1, 0x1, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@file={0x1, "e91f7189591e9233614b00"}, 0xc) listen(r1, 0x10000000000005) r3 = accept4(r2, &(0x7f0000b17000)=@generic, &(0x7f0000dbd000)=0x80, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x1, "e91f7189591e9233614b00"}, 0xc) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000040)={'\x00', 0x0}) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f0000000180)={r4, 0x1, 0x6, @dev={[], 0xa}}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team_slave_0\x00'}) syz_open_dev$sndpcmc(&(0x7f00000000c0)='/dev/snd/pcmC#D#c\x00', 0x1000, 0x80800) ioctl$KVM_SET_MSRS(0xffffffffffffffff, 0x4008ae89, &(0x7f0000000100)=ANY=[@ANYBLOB="050000000000040000900b000000000000ff0100000000000000000000000100000094080000005d0b00120001000004000000000000000000ff000000000000000000000000000000"]) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000080)) getgid() socket$inet6(0xa, 0x0, 0x0) 03:59:43 executing program 5: r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000080)="00000600000000000000", 0x0) ioctl$SG_EMULATED_HOST(r1, 0x2203, &(0x7f00000000c0)) write$binfmt_elf32(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000000000000000000000030006000000000000000000380000000000000000000000000020000200000000000000000000000000000000000000000000000000000000040000000000000000000000000000030000000000000000000000000000000200000028e9653bf5f378f24e50b960"], 0x78) execveat(r1, &(0x7f0000000000)='\x00', &(0x7f0000000280), 0x0, 0x1000) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 03:59:43 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) syz_execute_func(&(0x7f00000000c0)="64ff0941c3c4e2c9975842c4c27d794e0066420fe2e33e0f1110c442019dccd3193e66430f3a0ce397") clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet_MCAST_LEAVE_GROUP(r1, 0x0, 0x2d, &(0x7f0000000300)={0xfffffffffffffffc, {{0x2, 0x0, @local}}}, 0x88) write$binfmt_elf32(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x4da) getsockopt$ARPT_SO_GET_ENTRIES(r1, 0x0, 0x61, 0x0, &(0x7f0000000040)) 03:59:43 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, 0x0, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000002000)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001000)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqsrc(r2, 0x0, 0x2000000000000004, &(0x7f0000013ff4)={@remote}, 0xc) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000340)={{{@in=@broadcast, @in=@broadcast, 0x0, 0x80ffffff, 0x0, 0x0, 0xa}}, {{@in6=@local, 0x0, 0x33}, 0x0, @in6=@local}}, 0xe8) close(r2) dup3(r0, r1, 0x0) 03:59:43 executing program 5: r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000080)="00000600000000000000", 0x0) ioctl$SG_EMULATED_HOST(r1, 0x2203, &(0x7f00000000c0)) write$binfmt_elf32(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000000000000000000000030006000000000000000000380000000000000000000000000020000200000000000000000000000000000000000000000000000000000000040000000000000000000000000000030000000000000000000000000000000200000028e9653bf5f378f24e50b960"], 0x78) execveat(r1, &(0x7f0000000000)='\x00', &(0x7f0000000280), 0x0, 0x1000) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 03:59:43 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x25d1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) times(&(0x7f00000000c0)) r1 = memfd_create(&(0x7f0000000080)="00000600000000000000", 0x0) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYRESOCT=r1], 0xfe58) execveat(r1, &(0x7f0000000000)='\x00', &(0x7f0000000280), 0x0, 0x1000) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 03:59:43 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x25d1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000080)="00000600000000000000", 0x0) ioctl$SG_EMULATED_HOST(r1, 0x2203, &(0x7f00000000c0)) write$binfmt_elf32(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000000000000000000000030006000000000000000000380000000000000000000000000020000200000000000000000000000000000000000000000000000000000000040000000000000000000000000000030000000000000000000000000000000200000028e9653bf5f378f24e50b960"], 0x78) execveat(r1, &(0x7f0000000000)='\x00', &(0x7f0000000280), 0x0, 0x1000) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 03:59:43 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, 0x0, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000002000)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001000)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqsrc(r2, 0x0, 0x2000000000000004, &(0x7f0000013ff4)={@remote}, 0xc) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000340)={{{@in=@broadcast, @in=@broadcast, 0x0, 0x20000000, 0x0, 0x0, 0xa}}, {{@in6=@local, 0x0, 0x33}, 0x0, @in6=@local}}, 0xe8) close(r2) dup3(r0, r1, 0x0) 03:59:44 executing program 2: clone(0x41fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f00000000c0)) syz_open_dev$rtc(&(0x7f0000000080)='/dev/rtc#\x00', 0x0, 0x0) ptrace(0x10, r0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000000)) getsockopt$inet_sctp6_SCTP_NODELAY(0xffffffffffffffff, 0x84, 0x3, &(0x7f0000000140), &(0x7f00000001c0)=0x4) ptrace$setregs(0xf, r0, 0x0, &(0x7f0000000180)="a96d55a756") ptrace$getregset(0x4204, r0, 0x2, &(0x7f0000000280)={0x0}) 03:59:44 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x25d1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000080)="00000600000000000000", 0x0) ioctl$SG_EMULATED_HOST(r1, 0x2203, &(0x7f00000000c0)) write$binfmt_elf32(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000000000000000000000030006000000000000000000380000000000000000000000000020000200000000000000000000000000000000000000000000000000000000040000000000000000000000000000030000000000000000000000000000000200000028e9653bf5f378f24e50b960"], 0x78) execveat(r1, &(0x7f0000000000)='\x00', &(0x7f0000000280), 0x0, 0x1000) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 03:59:44 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, 0x0, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000002000)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001000)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqsrc(r2, 0x0, 0x2000000000000004, &(0x7f0000013ff4)={@remote}, 0xc) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000340)={{{@in=@broadcast, @in=@broadcast, 0x0, 0xffffffff00000000, 0x0, 0x0, 0xa}}, {{@in6=@local, 0x0, 0x33}, 0x0, @in6=@local}}, 0xe8) close(r2) dup3(r0, r1, 0x0) 03:59:44 executing program 1: ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(0x0, 0x0) pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) r2 = syz_open_dev$dspn(&(0x7f0000000240)='/dev/dsp#\x00', 0x3, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000440)={r0, 0xffffffffffffffff, 0xb, 0x2}, 0x10) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000500)='bpf\x00', 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000140)='bpf\x00', 0x2201001, &(0x7f0000001900)=ANY=[]) mount$bpf(0x0, &(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='bpf\x00', 0x1000000, &(0x7f0000000400)={[], [{@appraise_type='appraise_type=imasig'}, {@obj_type={'obj_type', 0x3d, 'bpf\x00'}}, {@seclabel='seclabel'}]}) mount$bpf(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000280)='bpf\x00', 0x0, &(0x7f0000000b00)=ANY=[]) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, &(0x7f0000000200)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000000)='.\x00', &(0x7f0000000080)='bpf\x00', 0x0, &(0x7f0000000040)) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, &(0x7f0000000540)=""/4096) ioctl$TIOCMSET(r1, 0x5418, &(0x7f0000000200)=0x6) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000100)='bpf\x00', 0x5890, &(0x7f0000000480)) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)}}, 0x15) write$P9_RWRITE(r2, &(0x7f0000000340)={0xb, 0x77, 0x2, 0x1}, 0xb) 03:59:44 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x801, 0x0) r2 = socket$unix(0x1, 0x1, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@file={0x1, "e91f7189591e9233614b00"}, 0xc) listen(r1, 0x10000000000005) r3 = accept4(r2, &(0x7f0000b17000)=@generic, &(0x7f0000dbd000)=0x80, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x1, "e91f7189591e9233614b00"}, 0xc) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000040)={'\x00', 0x0}) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f0000000180)={r4, 0x1, 0x6, @dev={[], 0xa}}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team_slave_0\x00'}) syz_open_dev$sndpcmc(&(0x7f00000000c0)='/dev/snd/pcmC#D#c\x00', 0x1000, 0x80800) ioctl$KVM_SET_MSRS(0xffffffffffffffff, 0x4008ae89, &(0x7f0000000100)=ANY=[@ANYBLOB="050000000000040000900b000000000000ff0100000000000000000000000100000094080000005d0b00120001000004000000000000000000ff000000000000000000000000000000"]) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000080)) getgid() socket$inet6(0xa, 0x0, 0x0) 03:59:44 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x25d1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000080)="00000600000000000000", 0x0) ioctl$SG_EMULATED_HOST(r1, 0x2203, &(0x7f00000000c0)) write$binfmt_elf32(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000000000000000000000030006000000000000000000380000000000000000000000000020000200000000000000000000000000000000000000000000000000000000040000000000000000000000000000030000000000000000000000000000000200000028e9653bf5f378f24e50b960"], 0x78) execveat(r1, &(0x7f0000000000)='\x00', &(0x7f0000000280), 0x0, 0x1000) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 03:59:44 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, 0x0, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000002000)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001000)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqsrc(r2, 0x0, 0x2000000000000004, &(0x7f0000013ff4)={@remote}, 0xc) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000340)={{{@in=@broadcast, @in=@broadcast, 0x0, 0x600000000000000, 0x0, 0x0, 0xa}}, {{@in6=@local, 0x0, 0x33}, 0x0, @in6=@local}}, 0xe8) close(r2) dup3(r0, r1, 0x0) 03:59:44 executing program 1: ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(0x0, 0x0) pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) r2 = syz_open_dev$dspn(&(0x7f0000000240)='/dev/dsp#\x00', 0x3, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000440)={r0, 0xffffffffffffffff, 0xb, 0x2}, 0x10) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000500)='bpf\x00', 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000140)='bpf\x00', 0x2201001, &(0x7f0000001900)=ANY=[]) mount$bpf(0x0, &(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='bpf\x00', 0x1000000, &(0x7f0000000400)={[], [{@appraise_type='appraise_type=imasig'}, {@obj_type={'obj_type', 0x3d, 'bpf\x00'}}, {@seclabel='seclabel'}]}) mount$bpf(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000280)='bpf\x00', 0x0, &(0x7f0000000b00)=ANY=[]) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, &(0x7f0000000200)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000000)='.\x00', &(0x7f0000000080)='bpf\x00', 0x0, &(0x7f0000000040)) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, &(0x7f0000000540)=""/4096) ioctl$TIOCMSET(r1, 0x5418, &(0x7f0000000200)=0x6) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000100)='bpf\x00', 0x5890, &(0x7f0000000480)) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)}}, 0x15) write$P9_RWRITE(r2, &(0x7f0000000340)={0xb, 0x77, 0x2, 0x1}, 0xb) 03:59:44 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) syz_execute_func(&(0x7f00000000c0)="64ff0941c3c4e2c9975842c4c27d794e0066420fe2e33e0f1110c442019dccd3193e66430f3a0ce397") clone(0x1a02100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x0, 0x2d, &(0x7f0000000300)={0xfffffffffffffffc, {{0x2, 0x0, @local}}}, 0x88) write$binfmt_elf32(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x4da) getsockopt$ARPT_SO_GET_ENTRIES(r1, 0x0, 0x61, 0x0, &(0x7f0000000040)) 03:59:44 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) syz_execute_func(&(0x7f00000000c0)="64ff0941c3c4e2c9975842c4c27d794e0066420fe2e33e0f1110c442019dccd3193e66430f3a0ce397") clone(0x1a02100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x0, 0x2d, &(0x7f0000000300)={0xfffffffffffffffc, {{0x2, 0x0, @local}}}, 0x88) write$binfmt_elf32(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x4da) getsockopt$ARPT_SO_GET_ENTRIES(r1, 0x0, 0x61, 0x0, &(0x7f0000000040)) 03:59:44 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x25d1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000080)="00000600000000000000", 0x0) ioctl$SG_EMULATED_HOST(r1, 0x2203, &(0x7f00000000c0)) write$binfmt_elf32(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000000000000000000000030006000000000000000000380000000000000000000000000020000200000000000000000000000000000000000000000000000000000000040000000000000000000000000000030000000000000000000000000000000200000028e9653bf5f378f24e50b960"], 0x78) execveat(r1, &(0x7f0000000000)='\x00', &(0x7f0000000280), 0x0, 0x1000) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 03:59:44 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) syz_execute_func(&(0x7f00000000c0)="64ff0941c3c4e2c9975842c4c27d794e0066420fe2e33e0f1110c442019dccd3193e66430f3a0ce397") clone(0x1a02100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x0, 0x2d, &(0x7f0000000300)={0xfffffffffffffffc, {{0x2, 0x0, @local}}}, 0x88) write$binfmt_elf32(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x4da) getsockopt$ARPT_SO_GET_ENTRIES(r1, 0x0, 0x61, 0x0, &(0x7f0000000040)) 03:59:45 executing program 2: clone(0x41fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f00000000c0)) syz_open_dev$rtc(&(0x7f0000000080)='/dev/rtc#\x00', 0x0, 0x0) ptrace(0x10, r0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000000)) getsockopt$inet_sctp6_SCTP_NODELAY(0xffffffffffffffff, 0x84, 0x3, &(0x7f0000000140), &(0x7f00000001c0)=0x4) ptrace$setregs(0xf, r0, 0x0, &(0x7f0000000180)="a9") ptrace$getregset(0x4204, r0, 0x2, &(0x7f0000000280)={0x0}) 03:59:45 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, 0x0, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000002000)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001000)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqsrc(r2, 0x0, 0x2000000000000004, &(0x7f0000013ff4)={@remote}, 0xc) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000340)={{{@in=@broadcast, @in=@broadcast, 0x0, 0x100000000000000, 0x0, 0x0, 0xa}}, {{@in6=@local, 0x0, 0x33}, 0x0, @in6=@local}}, 0xe8) close(r2) dup3(r0, r1, 0x0) 03:59:45 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x25d1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000080)="00000600000000000000", 0x0) ioctl$SG_EMULATED_HOST(r1, 0x2203, &(0x7f00000000c0)) write$binfmt_elf32(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000000000000000000000030006000000000000000000380000000000000000000000000020000200000000000000000000000000000000000000000000000000000000040000000000000000000000000000030000000000000000000000000000000200000028e9653bf5f378f24e50b960"], 0x78) execveat(r1, &(0x7f0000000000)='\x00', &(0x7f0000000280), 0x0, 0x1000) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 03:59:45 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) syz_execute_func(&(0x7f00000000c0)="64ff0941c3c4e2c9975842c4c27d794e0066420fe2e33e0f1110c442019dccd3193e66430f3a0ce397") clone(0x1a02100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet_MCAST_LEAVE_GROUP(r1, 0x0, 0x2d, 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="7f454c4684025200d80000000000000003003e0065b700001302000038000000a6030000810000000000200001008100000205000000000053e57464ff0f000002000000ff00000000000000050000008000000004000000ae5c03d8c672bd43fc0ccbb8681c45f2559d91e3c30e464212881f9f6b309eb3e4d790e9de001b72c6b7ed9759779c320b5cb91ece41228af2217903d258b4a9ba463c293d6bc83e9e94b367a5bd6a68ee9886619ee57c83c758674a6813c1cf922187cb3217744f9514b25f897bd2c953df3a7a32b160f26f0070846d70eeb1dee400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x4da) getsockopt$ARPT_SO_GET_ENTRIES(r1, 0x0, 0x61, 0x0, &(0x7f0000000040)) 03:59:45 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x801, 0x0) r2 = socket$unix(0x1, 0x1, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@file={0x1, "e91f7189591e9233614b00"}, 0xc) listen(r1, 0x10000000000005) r3 = accept4(r2, &(0x7f0000b17000)=@generic, &(0x7f0000dbd000)=0x80, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x1, "e91f7189591e9233614b00"}, 0xc) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000040)={'\x00', 0x0}) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f0000000180)={r4, 0x1, 0x6, @dev={[], 0xa}}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team_slave_0\x00'}) syz_open_dev$sndpcmc(&(0x7f00000000c0)='/dev/snd/pcmC#D#c\x00', 0x1000, 0x80800) ioctl$KVM_SET_MSRS(0xffffffffffffffff, 0x4008ae89, &(0x7f0000000100)=ANY=[@ANYBLOB="050000000000040000900b000000000000ff0100000000000000000000000100000094080000005d0b00120001000004000000000000000000ff000000000000000000000000000000"]) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000080)) getgid() socket$inet6(0xa, 0x0, 0x0) 03:59:45 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000001f40)=[{{&(0x7f0000001700)=@alg, 0x80, &(0x7f0000001c40)=[{&(0x7f0000001780)=""/203, 0xcb}, {&(0x7f0000001880)=""/129, 0x81}], 0x2}}], 0x1, 0x0, &(0x7f0000001e80)) r0 = socket$alg(0x26, 0x5, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xfffffffffffffffd, 0x0, &(0x7f0000000ec0)=ANY=[], &(0x7f00000004c0)='GPL\x00', 0x254, 0xfb, &(0x7f0000000ec0)=""/251, 0x0, 0x0, [], 0x0, 0x4}, 0x48) r2 = socket$kcm(0xa, 0x5, 0x0) r3 = syz_open_dev$audion(&(0x7f0000000200)='/dev/audio#\x00', 0x2, 0x4) ioctl$KVM_GET_SREGS(r3, 0x8138ae83, &(0x7f0000000640)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = socket$inet6(0xa, 0x80002, 0x0) connect$inet6(r7, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback, 0x5}, 0x1c) r8 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r8, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r7, 0x29, 0x42, &(0x7f0000000040)={@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa4ffffff]}}, 0x37) ioctl$SIOCSIFHWADDR(r1, 0x8924, &(0x7f0000000580)={'ip6gretap0\x00', @random="6e5b0750f801"}) ioctl$SIOCSIFHWADDR(r4, 0x8937, &(0x7f0000000280)={"6272696467655f736c6176655f3100f0", @random="01003a1e2410"}) fcntl$getown(r5, 0x9) ioctl$BLKROTATIONAL(r3, 0x127e, &(0x7f00000001c0)) ioctl$TIOCCONS(r3, 0x541d) r9 = dup3(r3, r0, 0x80000) recvmsg$kcm(r5, &(0x7f00000005c0)={&(0x7f0000000800)=@can, 0x80, &(0x7f0000000540)=[{&(0x7f0000000880)=""/163, 0xa3}, {&(0x7f0000000940)=""/207, 0xcf}, {&(0x7f0000000a40)=""/76, 0x4c}, {&(0x7f0000000ac0)=""/144, 0x90}], 0x4, &(0x7f0000000cc0)=""/193, 0xc1, 0x3ff}, 0x10041) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f00000039c0)={{{@in=@dev, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6=@loopback}}, &(0x7f0000000fc0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(r9, 0x8933, &(0x7f0000000bc0)={'vcan0\x00', r10}) r11 = socket$inet(0x2b, 0x1, 0x1) bind$inet(0xffffffffffffffff, &(0x7f0000000600)={0x2, 0x0, @multicast2}, 0x10) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(r3, 0xc0105303, &(0x7f0000000300)={0x3, 0x7ffffffffffff800, 0x800000000000000}) recvmmsg(r11, &(0x7f0000002800)=[{{&(0x7f0000000000)=@can, 0x80, &(0x7f0000000080), 0x0, &(0x7f00000000c0)=""/57, 0xfffffffffffffc8f, 0xffffffffffffff1a}, 0x2}, {{&(0x7f0000000c40)=@ipx, 0x80, &(0x7f0000000f40), 0x0, &(0x7f0000000780)=""/86, 0x56, 0x2}, 0x200}, {{&(0x7f0000001000)=@can, 0x10a, &(0x7f0000002700)=[{&(0x7f0000001080)=""/218, 0xda}, {&(0x7f0000001180)=""/71, 0x47}, {&(0x7f0000001200)=""/194, 0xc2}, {&(0x7f0000001300)=""/33, 0x21}, {&(0x7f0000001340)=""/240, 0xf0}, {&(0x7f0000001440)=""/4096, 0x1000}, {&(0x7f0000002440)=""/138, 0x8a}, {&(0x7f0000002500)=""/89, 0x59}, {&(0x7f0000002580)=""/183, 0x22b}, {&(0x7f0000002640)=""/176, 0xb0}], 0xa, &(0x7f00000027c0), 0x0, 0x7}, 0x1}], 0x3, 0x100, &(0x7f0000002980)) ioctl$FS_IOC_FSSETXATTR(r11, 0x401c5820, &(0x7f0000000080)={0x3c, 0xf3fe, 0x0, 0x6}) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0xf, 0x3}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x890b, &(0x7f0000000000)) 03:59:45 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) syz_execute_func(&(0x7f00000000c0)="64ff0941c3c4e2c9975842c4c27d794e0066420fe2e33e0f1110c442019dccd3193e66430f3a0ce397") clone(0x1a02100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet_MCAST_LEAVE_GROUP(r1, 0x0, 0x2d, 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x4da) getsockopt$ARPT_SO_GET_ENTRIES(r1, 0x0, 0x61, 0x0, &(0x7f0000000040)) 03:59:45 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x25d1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000080)="00000600000000000000", 0x0) ioctl$SG_EMULATED_HOST(r1, 0x2203, &(0x7f00000000c0)) write$binfmt_elf32(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000000000000000000000030006000000000000000000380000000000000000000000000020000200000000000000000000000000000000000000000000000000000000040000000000000000000000000000030000000000000000000000000000000200000028e9653bf5f378f24e50b960"], 0x78) execveat(r1, &(0x7f0000000000)='\x00', &(0x7f0000000280), 0x0, 0x1000) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 03:59:45 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, 0x0, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000002000)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001000)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqsrc(r2, 0x0, 0x2000000000000004, &(0x7f0000013ff4)={@remote}, 0xc) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000340)={{{@in=@broadcast, @in=@broadcast, 0x0, 0x200000000000000, 0x0, 0x0, 0xa}}, {{@in6=@local, 0x0, 0x33}, 0x0, @in6=@local}}, 0xe8) close(r2) dup3(r0, r1, 0x0) 03:59:45 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) syz_execute_func(&(0x7f00000000c0)="64ff0941c3c4e2c9975842c4c27d794e0066420fe2e33e0f1110c442019dccd3193e66430f3a0ce397") clone(0x1a02100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet_MCAST_LEAVE_GROUP(r1, 0x0, 0x2d, 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x4da) getsockopt$ARPT_SO_GET_ENTRIES(r1, 0x0, 0x61, 0x0, &(0x7f0000000040)) 03:59:45 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) syz_execute_func(&(0x7f00000000c0)="64ff0941c3c4e2c9975842c4c27d794e0066420fe2e33e0f1110c442019dccd3193e66430f3a0ce397") clone(0x1a02100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet_MCAST_LEAVE_GROUP(r1, 0x0, 0x2d, 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x4da) getsockopt$ARPT_SO_GET_ENTRIES(r1, 0x0, 0x61, 0x0, &(0x7f0000000040)) 03:59:45 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000001c0)={&(0x7f0000000100), 0x1ef, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x3c, 0x10, 0x707, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip6={{0xc, 0x1, 'ip6tnl\x00'}, {0xc, 0x2, [@tunl6_policy=[@IFLA_IPTUN_FLOWINFO={0x8, 0x10}]]}}}]}, 0x3c}}, 0x0) ioctl$BLKREPORTZONE(r0, 0xc0101282, &(0x7f0000000200)={0x3, 0x8, 0x0, [{0x1d523590, 0x9, 0x8, 0xffffffffffffffff, 0x7, 0x8, 0x2}, {0x1f, 0x7, 0x401, 0xefb, 0x400, 0x3854, 0x8000}, {0x1, 0x2, 0x5, 0x1, 0x400, 0x9, 0x7}, {0x6, 0x7fff, 0x9, 0x3, 0x5f0, 0xbf, 0x1}, {0x3, 0x0, 0x1, 0x401, 0x9, 0xc3300000000, 0xfffffffffffeffff}, {0x1, 0xfffffffffffff800, 0x0, 0x5, 0x4d70, 0x3, 0x4}, {0x1ff, 0xffff, 0x29b800000, 0x5, 0x2bc, 0x3, 0x80}, {0x48, 0x8001, 0x7ff, 0x1, 0x2, 0x5, 0x100}]}) [ 367.919489] netlink: 'syz-executor3': attribute type 16 has an invalid length. [ 367.941815] netlink: 'syz-executor3': attribute type 16 has an invalid length. 03:59:45 executing program 2: clone(0x41fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f00000000c0)) syz_open_dev$rtc(&(0x7f0000000080)='/dev/rtc#\x00', 0x0, 0x0) ptrace(0x10, r0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000000)) getsockopt$inet_sctp6_SCTP_NODELAY(0xffffffffffffffff, 0x84, 0x3, &(0x7f0000000140), &(0x7f00000001c0)=0x4) ptrace$setregs(0xf, r0, 0x0, &(0x7f0000000180)="a9") ptrace$getregset(0x4204, r0, 0x2, &(0x7f0000000280)={0x0}) 03:59:45 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000080)="00000600000000000000", 0x0) ioctl$SG_EMULATED_HOST(r1, 0x2203, &(0x7f00000000c0)) write$binfmt_elf32(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000000000000000000000030006000000000000000000380000000000000000000000000020000200000000000000000000000000000000000000000000000000000000040000000000000000000000000000030000000000000000000000000000000200000028e9653bf5f378f24e50b960"], 0x78) execveat(r1, &(0x7f0000000000)='\x00', &(0x7f0000000280), 0x0, 0x1000) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 03:59:45 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) syz_execute_func(&(0x7f00000000c0)="64ff0941c3c4e2c9975842c4c27d794e0066420fe2e33e0f1110c442019dccd3193e66430f3a0ce397") clone(0x1a02100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet_MCAST_LEAVE_GROUP(r1, 0x0, 0x2d, &(0x7f0000000300)={0x0, {{0x2, 0x0, @local}}}, 0x88) write$binfmt_elf32(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="7f454c4684025200d80000000000000003003e0065b700001302000038000000a6030000810000000000200001008100000205000000000053e57464ff0f000002000000ff00000000000000050000008000000004000000ae5c03d8c672bd43fc0ccbb8681c45f2559d91e3c30e464212881f9f6b309eb3e4d790e9de001b72c6b7ed9759779c320b5cb91ece41228af2217903d258b4a9ba463c293d6bc83e9e94b367a5bd6a68ee9886619ee57c83c758674a6813c1cf922187cb3217744f9514b25f897bd2c953df3a7a32b160f26f0070846d70eeb1dee400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x4da) getsockopt$ARPT_SO_GET_ENTRIES(r1, 0x0, 0x61, 0x0, &(0x7f0000000040)) 03:59:45 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) syz_execute_func(&(0x7f00000000c0)="64ff0941c3c4e2c9975842c4c27d794e0066420fe2e33e0f1110c442019dccd3193e66430f3a0ce397") clone(0x1a02100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet_MCAST_LEAVE_GROUP(r1, 0x0, 0x2d, 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="7f454c4684025200d80000000000000003003e0065b700001302000038000000a6030000810000000000200001008100000205000000000053e57464ff0f000002000000ff00000000000000050000008000000004000000ae5c03d8c672bd43fc0ccbb8681c45f2559d91e3c30e464212881f9f6b309eb3e4d790e9de001b72c6b7ed9759779c320b5cb91ece41228af2217903d258b4a9ba463c293d6bc83e9e94b367a5bd6a68ee9886619ee57c83c758674a6813c1cf922187cb3217744f9514b25f897bd2c953df3a7a32b160f26f0070846d70eeb1dee400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x4da) getsockopt$ARPT_SO_GET_ENTRIES(r1, 0x0, 0x61, 0x0, &(0x7f0000000040)) 03:59:45 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, 0x0, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000002000)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001000)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqsrc(r2, 0x0, 0x2000000000000004, &(0x7f0000013ff4)={@remote}, 0xc) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000340)={{{@in=@broadcast, @in=@broadcast, 0x0, 0x1000000, 0x0, 0x0, 0xa}}, {{@in6=@local, 0x0, 0x33}, 0x0, @in6=@local}}, 0xe8) close(r2) dup3(r0, r1, 0x0) 03:59:45 executing program 3: ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000780)) r0 = getpgrp(0x0) r1 = syz_open_procfs(r0, &(0x7f0000000800)='net/psched\x00') ioctl$sock_inet_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000200)={'rose0\x00', {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x1d}}}) r2 = syz_open_procfs(0x0, &(0x7f0000865ff5)='clear_refs\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$RNDADDTOENTCNT(r2, 0x40045201, &(0x7f0000000740)=0x800000000000000) getsockopt$inet6_mreq(r1, 0x29, 0x15, &(0x7f0000000680)={@mcast1, 0x0}, &(0x7f00000006c0)=0x14) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f0000000700)={@dev={0xfe, 0x80, [], 0xc}, 0x12, r4}) sendmsg$nl_route(r1, &(0x7f00000002c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="200000002200280b00000000ffdbdf250a00a0060200400005cb62a6b4734f34"], 0x1}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) bind$inet(r3, &(0x7f0000000240)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r3, &(0x7f0000000080), 0x0, 0x20000800, &(0x7f0000000080)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1c}}, 0x10) vmsplice(0xffffffffffffffff, &(0x7f0000002680), 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="5fb88c750196077aa3214bebc13f7d74ad4d9320611cf5a33f2a3f09e1c926359dcfe20001c781cb67f79cb0c6f5f4bf8ed60dce2176c22a20b22b9b24172b5569ec67906e7df93b05b19ba5360f2eab62812070fc181a2483366595113b240804d882a7dcd7ac4ba53e06d02558968b978122716d1823dcc7d40155c1bc1e8433f5ba15f5ee48c0ca941fce872e497d1377e2a5bde956f003caaf58c7520f82d7346c266e8ea70dab3bb7af6d78602a31ab8d232b07f6e3ef524b552ed88a1b1c02bc89f4f671855d40a2c1c173d4bb121bc86270c32d39c4c0d09a29b8983169914d8df86417a802b772bb638f72ccdcbb46267b5751816c77b6739f484292d5ca5e1bc4efee06f4e07e6a795faee2af27a8f212", 0x115, 0x0, &(0x7f0000001000)={0xa, 0x0, 0x0, @mcast2}, 0x1c) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) ioctl$FS_IOC_GETFSLABEL(r5, 0x400452c8, &(0x7f0000000100)) 03:59:45 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) syz_execute_func(&(0x7f00000000c0)="64ff0941c3c4e2c9975842c4c27d794e0066420fe2e33e0f1110c442019dccd3193e66430f3a0ce397") clone(0x1a02100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet_MCAST_LEAVE_GROUP(r1, 0x0, 0x2d, &(0x7f0000000300)={0x0, {{0x2, 0x0, @local}}}, 0x88) write$binfmt_elf32(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x4da) getsockopt$ARPT_SO_GET_ENTRIES(r1, 0x0, 0x61, 0x0, &(0x7f0000000040)) 03:59:45 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) syz_execute_func(&(0x7f00000000c0)="64ff0941c3c4e2c9975842c4c27d794e0066420fe2e33e0f1110c442019dccd3193e66430f3a0ce397") clone(0x1a02100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet_MCAST_LEAVE_GROUP(r1, 0x0, 0x2d, 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x4da) getsockopt$ARPT_SO_GET_ENTRIES(r1, 0x0, 0x61, 0x0, &(0x7f0000000040)) 03:59:46 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, 0x0, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000002000)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001000)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqsrc(r2, 0x0, 0x2000000000000004, &(0x7f0000013ff4)={@remote}, 0xc) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000340)={{{@in=@broadcast, @in=@broadcast, 0x0, 0xa4ffffff, 0x0, 0x0, 0xa}}, {{@in6=@local, 0x0, 0x33}, 0x0, @in6=@local}}, 0xe8) close(r2) dup3(r0, r1, 0x0) 03:59:46 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) syz_execute_func(&(0x7f00000000c0)="64ff0941c3c4e2c9975842c4c27d794e0066420fe2e33e0f1110c442019dccd3193e66430f3a0ce397") clone(0x1a02100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet_MCAST_LEAVE_GROUP(r1, 0x0, 0x2d, &(0x7f0000000300)={0x0, {{0x2, 0x0, @local}}}, 0x88) write$binfmt_elf32(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x4da) getsockopt$ARPT_SO_GET_ENTRIES(r1, 0x0, 0x61, 0x0, &(0x7f0000000040)) 03:59:46 executing program 1: r0 = syz_open_dev$radio(&(0x7f00000000c0)='/dev/radio#\x00', 0x0, 0x2) faccessat(r0, &(0x7f00000003c0)='./file0\x00', 0x14, 0x400) ioctl$VIDIOC_QUERYMENU(r0, 0xc02c5625, &(0x7f0000000100)={0x7, 0x2, @name="c18d5ce45dc0a1ac175c9bb132bcdd0139095afdfbe23a359e2ba0110d0e75a6"}) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x15, 0x5, 0x0) bind$inet(r1, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) connect$inet(r1, &(0x7f0000001040)={0x2, 0x0, @multicast2}, 0x10) sendmsg(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000140)}, 0x0) socket$bt_bnep(0x1f, 0x3, 0x4) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000140)={0xffffffffffffffff}, 0x111, 0x1003}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r0, &(0x7f0000000280)={0x15, 0x110, 0xfa00, {r2, 0x9, 0x0, 0x0, 0x0, @ib={0x1b, 0x8, 0x80000001, {"b5391e9760a05b3678756848eafa53fa"}, 0x7, 0x3, 0x6}, @in={0x2, 0x4e22, @rand_addr=0x1}}}, 0x118) r3 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f0000001080)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f00000010c0)) tkill(r3, 0x1000000000010) uselib(&(0x7f0000000080)='./file0\x00') 03:59:46 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000080)="00000600000000000000", 0x0) ioctl$SG_EMULATED_HOST(r1, 0x2203, &(0x7f00000000c0)) write$binfmt_elf32(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000000000000000000000030006000000000000000000380000000000000000000000000020000200000000000000000000000000000000000000000000000000000000040000000000000000000000000000030000000000000000000000000000000200000028e9653bf5f378f24e50b960"], 0x78) execveat(r1, &(0x7f0000000000)='\x00', &(0x7f0000000280), 0x0, 0x1000) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) [ 368.847009] RDS: rds_bind could not find a transport for ::ffff:172.20.20.187, load rds_tcp or rds_rdma? 03:59:46 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) syz_execute_func(&(0x7f00000000c0)="64ff0941c3c4e2c9975842c4c27d794e0066420fe2e33e0f1110c442019dccd3193e66430f3a0ce397") clone(0x1a02100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet_MCAST_LEAVE_GROUP(r1, 0x0, 0x2d, &(0x7f0000000300)={0xfffffffffffffffc, {{0x2, 0x0, @local}}}, 0x88) write$binfmt_elf32(0xffffffffffffffff, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x4da) getsockopt$ARPT_SO_GET_ENTRIES(r1, 0x0, 0x61, 0x0, &(0x7f0000000040)) 03:59:46 executing program 2: clone(0x41fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f00000000c0)) syz_open_dev$rtc(&(0x7f0000000080)='/dev/rtc#\x00', 0x0, 0x0) ptrace(0x10, r0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000000)) getsockopt$inet_sctp6_SCTP_NODELAY(0xffffffffffffffff, 0x84, 0x3, &(0x7f0000000140), &(0x7f00000001c0)=0x4) ptrace$setregs(0xf, r0, 0x0, &(0x7f0000000180)="a9") ptrace$getregset(0x4204, r0, 0x2, &(0x7f0000000280)={0x0}) 03:59:46 executing program 3: ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000780)) r0 = getpgrp(0x0) r1 = syz_open_procfs(r0, &(0x7f0000000800)='net/psched\x00') ioctl$sock_inet_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000200)={'rose0\x00', {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x1d}}}) r2 = syz_open_procfs(0x0, &(0x7f0000865ff5)='clear_refs\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$RNDADDTOENTCNT(r2, 0x40045201, &(0x7f0000000740)=0x800000000000000) getsockopt$inet6_mreq(r1, 0x29, 0x15, &(0x7f0000000680)={@mcast1, 0x0}, &(0x7f00000006c0)=0x14) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f0000000700)={@dev={0xfe, 0x80, [], 0xc}, 0x12, r4}) sendmsg$nl_route(r1, &(0x7f00000002c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="200000002200280b00000000ffdbdf250a00a0060200400005cb62a6b4734f34"], 0x1}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) bind$inet(r3, &(0x7f0000000240)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r3, &(0x7f0000000080), 0x0, 0x20000800, &(0x7f0000000080)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1c}}, 0x10) vmsplice(0xffffffffffffffff, &(0x7f0000002680), 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="5fb88c750196077aa3214bebc13f7d74ad4d9320611cf5a33f2a3f09e1c926359dcfe20001c781cb67f79cb0c6f5f4bf8ed60dce2176c22a20b22b9b24172b5569ec67906e7df93b05b19ba5360f2eab62812070fc181a2483366595113b240804d882a7dcd7ac4ba53e06d02558968b978122716d1823dcc7d40155c1bc1e8433f5ba15f5ee48c0ca941fce872e497d1377e2a5bde956f003caaf58c7520f82d7346c266e8ea70dab3bb7af6d78602a31ab8d232b07f6e3ef524b552ed88a1b1c02bc89f4f671855d40a2c1c173d4bb121bc86270c32d39c4c0d09a29b8983169914d8df86417a802b772bb638f72ccdcbb46267b5751816c77b6739f484292d5ca5e1bc4efee06f4e07e6a795faee2af27a8f212", 0x115, 0x0, &(0x7f0000001000)={0xa, 0x0, 0x0, @mcast2}, 0x1c) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) ioctl$FS_IOC_GETFSLABEL(r5, 0x400452c8, &(0x7f0000000100)) 03:59:46 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, 0x0, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000002000)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001000)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqsrc(r2, 0x0, 0x2000000000000004, &(0x7f0000013ff4)={@remote}, 0xc) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000340)={{{@in=@broadcast, @in=@broadcast, 0x0, 0xff0f, 0x0, 0x0, 0xa}}, {{@in6=@local, 0x0, 0x33}, 0x0, @in6=@local}}, 0xe8) close(r2) dup3(r0, r1, 0x0) 03:59:46 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000080)="00000600000000000000", 0x0) ioctl$SG_EMULATED_HOST(r1, 0x2203, &(0x7f00000000c0)) write$binfmt_elf32(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000000000000000000000030006000000000000000000380000000000000000000000000020000200000000000000000000000000000000000000000000000000000000040000000000000000000000000000030000000000000000000000000000000200000028e9653bf5f378f24e50b960"], 0x78) execveat(r1, &(0x7f0000000000)='\x00', &(0x7f0000000280), 0x0, 0x1000) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 03:59:46 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000080)="00000600000000000000", 0x0) ioctl$SG_EMULATED_HOST(r1, 0x2203, &(0x7f00000000c0)) write$binfmt_elf32(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000000000000000000000030006000000000000000000380000000000000000000000000020000200000000000000000000000000000000000000000000000000000000040000000000000000000000000000030000000000000000000000000000000200000028e9653bf5f378f24e50b960"], 0x78) execveat(r1, &(0x7f0000000000)='\x00', &(0x7f0000000280), 0x0, 0x1000) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 03:59:46 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) syz_execute_func(&(0x7f00000000c0)="64ff0941c3c4e2c9975842c4c27d794e0066420fe2e33e0f1110c442019dccd3193e66430f3a0ce397") clone(0x1a02100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet_MCAST_LEAVE_GROUP(r1, 0x0, 0x2d, &(0x7f0000000300)={0xfffffffffffffffc, {{0x2, 0x0, @local}}}, 0x88) write$binfmt_elf32(0xffffffffffffffff, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x4da) getsockopt$ARPT_SO_GET_ENTRIES(r1, 0x0, 0x61, 0x0, &(0x7f0000000040)) 03:59:46 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) syz_execute_func(&(0x7f00000000c0)="64ff0941c3c4e2c9975842c4c27d794e0066420fe2e33e0f1110c442019dccd3193e66430f3a0ce397") clone(0x1a02100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet_MCAST_LEAVE_GROUP(r1, 0x0, 0x2d, &(0x7f0000000300)={0xfffffffffffffffc, {{0x2, 0x0, @local}}}, 0x88) write$binfmt_elf32(0xffffffffffffffff, &(0x7f00000003c0)=ANY=[@ANYBLOB="7f454c4684025200d80000000000000003003e0065b700001302000038000000a6030000810000000000200001008100000205000000000053e57464ff0f000002000000ff00000000000000050000008000000004000000ae5c03d8c672bd43fc0ccbb8681c45f2559d91e3c30e464212881f9f6b309eb3e4d790e9de001b72c6b7ed9759779c320b5cb91ece41228af2217903d258b4a9ba463c293d6bc83e9e94b367a5bd6a68ee9886619ee57c83c758674a6813c1cf922187cb3217744f9514b25f897bd2c953df3a7a32b160f26f0070846d70eeb1dee400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x4da) getsockopt$ARPT_SO_GET_ENTRIES(r1, 0x0, 0x61, 0x0, &(0x7f0000000040)) 03:59:47 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, 0x0, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000002000)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001000)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqsrc(r2, 0x0, 0x2000000000000004, &(0x7f0000013ff4)={@remote}, 0xc) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000340)={{{@in=@broadcast, @in=@broadcast, 0x0, 0x2000, 0x0, 0x0, 0xa}}, {{@in6=@local, 0x0, 0x33}, 0x0, @in6=@local}}, 0xe8) close(r2) dup3(r0, r1, 0x0) 03:59:47 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, 0x0, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000002000)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001000)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqsrc(r2, 0x0, 0x2000000000000004, &(0x7f0000013ff4)={@remote}, 0xc) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000340)={{{@in=@broadcast, @in=@broadcast, 0x0, 0xff0f, 0x0, 0x0, 0xa}}, {{@in6=@local, 0x0, 0x33}, 0x0, @in6=@local}}, 0xe8) close(r2) dup3(r0, r1, 0x0) 03:59:47 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x25d1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000080)="00000600000000000000", 0x0) ioctl$SG_EMULATED_HOST(r1, 0x2203, &(0x7f00000000c0)) write$binfmt_elf32(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000000000000000000000030006000000000000000000380000000000000000000000000020000200000000000000000000000000000000000000000000000000000000040000000000000000000000000000030000000000000000000000000000000200000028e9653bf5f378f24e50b960"], 0x78) execveat(r1, &(0x7f0000000000)='\x00', &(0x7f0000000280), 0x0, 0x1000) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 03:59:47 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) syz_execute_func(&(0x7f00000000c0)="64ff0941c3c4e2c9975842c4c27d794e0066420fe2e33e0f1110c442019dccd3193e66430f3a0ce397") clone(0x1a02100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet_MCAST_LEAVE_GROUP(r1, 0x0, 0x2d, &(0x7f0000000300)={0xfffffffffffffffc, {{0x2, 0x0, @local}}}, 0x88) write$binfmt_elf32(r1, 0x0, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r1, 0x0, 0x61, 0x0, &(0x7f0000000040)) 03:59:47 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000080)="00000600000000000000", 0x0) ioctl$SG_EMULATED_HOST(r1, 0x2203, &(0x7f00000000c0)) write$binfmt_elf32(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000000000000000000000030006000000000000000000380000000000000000000000000020000200000000000000000000000000000000000000000000000000000000040000000000000000000000000000030000000000000000000000000000000200000028e9653bf5f378f24e50b960"], 0x78) execveat(r1, &(0x7f0000000000)='\x00', &(0x7f0000000280), 0x0, 0x1000) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 03:59:47 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, 0x0, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000002000)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001000)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqsrc(r2, 0x0, 0x2000000000000004, &(0x7f0000013ff4)={@remote}, 0xc) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000340)={{{@in=@broadcast, @in=@broadcast, 0x0, 0x2000000000000000, 0x0, 0x0, 0xa}}, {{@in6=@local, 0x0, 0x33}, 0x0, @in6=@local}}, 0xe8) close(r2) dup3(r0, r1, 0x0) 03:59:47 executing program 2: clone(0x41fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f00000000c0)) syz_open_dev$rtc(&(0x7f0000000080)='/dev/rtc#\x00', 0x0, 0x0) ptrace(0x10, r0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000000)) getsockopt$inet_sctp6_SCTP_NODELAY(0xffffffffffffffff, 0x84, 0x3, &(0x7f0000000140), &(0x7f00000001c0)=0x4) ptrace$setregs(0xf, r0, 0x0, &(0x7f0000000180)="a96d55") ptrace$getregset(0x4204, r0, 0x2, &(0x7f0000000280)={0x0}) 03:59:47 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, 0x0, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000002000)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001000)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqsrc(r2, 0x0, 0x2000000000000004, &(0x7f0000013ff4)={@remote}, 0xc) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000340)={{{@in=@broadcast, @in=@broadcast, 0x0, 0xa4ffffff, 0x0, 0x0, 0xa}}, {{@in6=@local, 0x0, 0x33}, 0x0, @in6=@local}}, 0xe8) close(r2) dup3(r0, r1, 0x0) 03:59:47 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) syz_execute_func(&(0x7f00000000c0)="64ff0941c3c4e2c9975842c4c27d794e0066420fe2e33e0f1110c442019dccd3193e66430f3a0ce397") clone(0x1a02100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet_MCAST_LEAVE_GROUP(r1, 0x0, 0x2d, &(0x7f0000000300)={0xfffffffffffffffc, {{0x2, 0x0, @local}}}, 0x88) write$binfmt_elf32(r1, 0x0, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r1, 0x0, 0x61, 0x0, &(0x7f0000000040)) 03:59:47 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x25d1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000080)="00000600000000000000", 0x0) ioctl$SG_EMULATED_HOST(r1, 0x2203, &(0x7f00000000c0)) write$binfmt_elf32(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000000000000000000000030006000000000000000000380000000000000000000000000020000200000000000000000000000000000000000000000000000000000000040000000000000000000000000000030000000000000000000000000000000200000028e9653bf5f378f24e50b960"], 0x78) execveat(r1, &(0x7f0000000000)='\x00', &(0x7f0000000280), 0x0, 0x1000) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 03:59:47 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, 0x0, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000002000)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001000)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqsrc(r2, 0x0, 0x2000000000000004, &(0x7f0000013ff4)={@remote}, 0xc) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000340)={{{@in=@broadcast, @in=@broadcast, 0x0, 0x3, 0x0, 0x0, 0xa}}, {{@in6=@local, 0x0, 0x33}, 0x0, @in6=@local}}, 0xe8) close(r2) dup3(r0, r1, 0x0) 03:59:47 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000080)="00000600000000000000", 0x0) ioctl$SG_EMULATED_HOST(r1, 0x2203, &(0x7f00000000c0)) write$binfmt_elf32(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000000000000000000000030006000000000000000000380000000000000000000000000020000200000000000000000000000000000000000000000000000000000000040000000000000000000000000000030000000000000000000000000000000200000028e9653bf5f378f24e50b960"], 0x78) execveat(r1, &(0x7f0000000000)='\x00', &(0x7f0000000280), 0x0, 0x1000) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 03:59:47 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) syz_execute_func(&(0x7f00000000c0)="64ff0941c3c4e2c9975842c4c27d794e0066420fe2e33e0f1110c442019dccd3193e66430f3a0ce397") clone(0x1a02100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet_MCAST_LEAVE_GROUP(r1, 0x0, 0x2d, &(0x7f0000000300)={0xfffffffffffffffc, {{0x2, 0x0, @local}}}, 0x88) write$binfmt_elf32(r1, 0x0, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r1, 0x0, 0x61, 0x0, &(0x7f0000000040)) 03:59:47 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x25d1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000080)="00000600000000000000", 0x0) ioctl$SG_EMULATED_HOST(r1, 0x2203, &(0x7f00000000c0)) write$binfmt_elf32(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000000000000000000000030006000000000000000000380000000000000000000000000020000200000000000000000000000000000000000000000000000000000000040000000000000000000000000000030000000000000000000000000000000200000028e9653bf5f378f24e50b960"], 0x78) execveat(r1, &(0x7f0000000000)='\x00', &(0x7f0000000280), 0x0, 0x1000) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 03:59:47 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, 0x0, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000002000)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001000)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqsrc(r2, 0x0, 0x2000000000000004, &(0x7f0000013ff4)={@remote}, 0xc) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000340)={{{@in=@broadcast, @in=@broadcast, 0x0, 0xffffff80, 0x0, 0x0, 0xa}}, {{@in6=@local, 0x0, 0x33}, 0x0, @in6=@local}}, 0xe8) close(r2) dup3(r0, r1, 0x0) 03:59:47 executing program 3: ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000780)) r0 = getpgrp(0x0) r1 = syz_open_procfs(r0, &(0x7f0000000800)='net/psched\x00') ioctl$sock_inet_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000200)={'rose0\x00', {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x1d}}}) r2 = syz_open_procfs(0x0, &(0x7f0000865ff5)='clear_refs\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$RNDADDTOENTCNT(r2, 0x40045201, &(0x7f0000000740)=0x800000000000000) getsockopt$inet6_mreq(r1, 0x29, 0x15, &(0x7f0000000680)={@mcast1, 0x0}, &(0x7f00000006c0)=0x14) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f0000000700)={@dev={0xfe, 0x80, [], 0xc}, 0x12, r4}) sendmsg$nl_route(r1, &(0x7f00000002c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="200000002200280b00000000ffdbdf250a00a0060200400005cb62a6b4734f34"], 0x1}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) bind$inet(r3, &(0x7f0000000240)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r3, &(0x7f0000000080), 0x0, 0x20000800, &(0x7f0000000080)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1c}}, 0x10) vmsplice(0xffffffffffffffff, &(0x7f0000002680), 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="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", 0x115, 0x0, &(0x7f0000001000)={0xa, 0x0, 0x0, @mcast2}, 0x1c) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) ioctl$FS_IOC_GETFSLABEL(r5, 0x400452c8, &(0x7f0000000100)) 03:59:47 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) syz_execute_func(&(0x7f00000000c0)="64ff0941c3c4e2c9975842c4c27d794e0066420fe2e33e0f1110c442019dccd3193e66430f3a0ce397") clone(0x1a02100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet_MCAST_LEAVE_GROUP(r1, 0x0, 0x2d, &(0x7f0000000300)={0xfffffffffffffffc, {{0x2, 0x0, @local}}}, 0x88) write$binfmt_elf32(r1, &(0x7f00000003c0)=ANY=[], 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r1, 0x0, 0x61, 0x0, &(0x7f0000000040)) 03:59:48 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) ioctl$KVM_NMI(r1, 0xae9a) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0xd, 0x4, &(0x7f0000346fc8)=ANY=[@ANYBLOB="184c82354a2b2b43471600fbf42432004c000000000000000000020000000000"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) 03:59:48 executing program 2: clone(0x41fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f00000000c0)) syz_open_dev$rtc(&(0x7f0000000080)='/dev/rtc#\x00', 0x0, 0x0) ptrace(0x10, r0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000000)) getsockopt$inet_sctp6_SCTP_NODELAY(0xffffffffffffffff, 0x84, 0x3, &(0x7f0000000140), &(0x7f00000001c0)=0x4) ptrace$setregs(0xf, r0, 0x0, &(0x7f0000000180)="a96d55") ptrace$getregset(0x4204, r0, 0x2, &(0x7f0000000280)={0x0}) 03:59:48 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) syz_execute_func(&(0x7f00000000c0)="64ff0941c3c4e2c9975842c4c27d794e0066420fe2e33e0f1110c442019dccd3193e66430f3a0ce397") clone(0x1a02100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet_MCAST_LEAVE_GROUP(r1, 0x0, 0x2d, &(0x7f0000000300)={0xfffffffffffffffc, {{0x2, 0x0, @local}}}, 0x88) write$binfmt_elf32(r1, &(0x7f00000003c0)=ANY=[], 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r1, 0x0, 0x61, 0x0, &(0x7f0000000040)) 03:59:48 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$admmidi(&(0x7f0000000380)='/dev/admmidi#\x00', 0xc571, 0x10000) r0 = syz_open_dev$admmidi(&(0x7f0000000540)='/dev/admmidi#\x00', 0x0, 0x0) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000300)=0x0) sched_setattr(r1, &(0x7f0000000240)={0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000001}, 0x0) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x103, 0x0) syz_open_dev$sndtimer(&(0x7f0000000100)='/dev/snd/timer\x00', 0x0, 0x38) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) r5 = syz_open_dev$admmidi(&(0x7f00000002c0)='/dev/admmidi#\x00', 0x7, 0x400) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000080)={0x0}, &(0x7f0000000440)=0x8) setsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r4, 0x84, 0x71, &(0x7f0000000480)={r6, 0x3}, 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, &(0x7f0000000f00)={{{@in6, @in6=@ipv4={[], [], @broadcast}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f0000002040)=0xe8) connect$nfc_llcp(r2, &(0x7f00000004c0)={0x27, 0x0, 0x0, 0x2, 0x9, 0x59e, "26a602b95b9df4650c3a239c69f126d90e9042f9b068e11bffd0f1784408e782382259b82852b4604db32faf1da22ed506e4dd78395cb8b83f10341843ef95", 0x2d}, 0x60) r8 = getuid() setsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000002080)={{{@in6, @in, 0x4e23, 0x7, 0x4e21, 0x81, 0xa, 0x80, 0x80, 0x8, r7, r8}, {0x7, 0xfffffffffffffff7, 0x429, 0x3ff, 0x18, 0x955e, 0x1, 0x3}, {0x7, 0xfffffffffffffff6, 0x1, 0x6}, 0x3, 0x0, 0x1, 0x1, 0x1, 0x1}, {{@in6=@local, 0x4d4, 0x7f}, 0xa, @in=@dev={0xac, 0x14, 0x14, 0x1c}, 0x3507, 0x0, 0x3, 0x400, 0x8, 0x3, 0x3f5}}, 0xe8) setsockopt$inet_mreqn(r4, 0x0, 0xe368adb30c792f1f, &(0x7f0000000340)={@local, @local}, 0xc) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) ioctl$TIOCGSID(r4, 0x5429, &(0x7f0000000100)=0x0) getpeername$unix(r4, &(0x7f00000003c0)=@abs, &(0x7f0000000180)=0x6e) ioctl$sock_SIOCSPGRP(r3, 0x8902, &(0x7f0000000280)=r9) openat$cgroup_procs(r4, &(0x7f00000000c0)='tasks\x00', 0x2, 0x0) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, &(0x7f0000000580), &(0x7f00000005c0)=0xc) unshare(0x40000000) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000040)={'tunl0\x00', @ifru_names='bridge0\x00'}) syz_open_dev$admmidi(&(0x7f0000000140)='/dev/admmidi#\x00', 0x100000000, 0x2000) ioctl(0xffffffffffffffff, 0x5, &(0x7f0000000000)="02380b07") r10 = fcntl$getown(r2, 0x9) ptrace(0x421f, r10) clock_gettime(0x0, &(0x7f0000000080)) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(0xffffffffffffffff, 0x402c5342, &(0x7f00000001c0)={0x8, 0x0, 0xc71a, {}, 0x100000001, 0x8}) 03:59:48 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, 0x0, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000002000)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001000)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqsrc(r2, 0x0, 0x2000000000000004, &(0x7f0000013ff4)={@remote}, 0xc) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000340)={{{@in=@broadcast, @in=@broadcast, 0x0, 0x6, 0x0, 0x0, 0xa}}, {{@in6=@local, 0x0, 0x33}, 0x0, @in6=@local}}, 0xe8) close(r2) dup3(r0, r1, 0x0) 03:59:48 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x25d1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000080)="00000600000000000000", 0x0) ioctl$SG_EMULATED_HOST(r1, 0x2203, &(0x7f00000000c0)) write$binfmt_elf32(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000000000000000000000030006000000000000000000380000000000000000000000000020000200000000000000000000000000000000000000000000000000000000040000000000000000000000000000030000000000000000000000000000000200000028e9653bf5f378f24e50b960"], 0x78) execveat(r1, &(0x7f0000000000)='\x00', &(0x7f0000000280), 0x0, 0x1000) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 03:59:48 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(&(0x7f0000000080)='/dev/midi#\x00', 0xffff, 0x400000) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r0, 0xc058534b, &(0x7f0000000200)={0xfa9, 0x0, 0x1f, 0xfe, 0x4, 0xc6}) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000280)=ANY=[@ANYBLOB="e00433c8a4456fad28b88ab3eeff27ab9598f9a9ebeb3298d6e75e83723879ad1549ca67efa918bd62ad52b95680f6c776785e86e26446ee3df0149e4e4b20b71268f8dbd3db5130e6d0a2a4203a327e"], &(0x7f0000000140)=0x4) tee(r0, r0, 0xfff, 0x3) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f0000000000), &(0x7f00000000c0)=0x68) 03:59:48 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) syz_execute_func(&(0x7f00000000c0)="64ff0941c3c4e2c9975842c4c27d794e0066420fe2e33e0f1110c442019dccd3193e66430f3a0ce397") clone(0x1a02100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet_MCAST_LEAVE_GROUP(r1, 0x0, 0x2d, &(0x7f0000000300)={0xfffffffffffffffc, {{0x2, 0x0, @local}}}, 0x88) write$binfmt_elf32(r1, &(0x7f00000003c0)=ANY=[], 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r1, 0x0, 0x61, 0x0, &(0x7f0000000040)) [ 371.221191] IPVS: ftp: loaded support on port[0] = 21 03:59:48 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(&(0x7f0000000080)='/dev/midi#\x00', 0xffff, 0x400000) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r0, 0xc058534b, &(0x7f0000000200)={0xfa9, 0x0, 0x1f, 0xfe, 0x4, 0xc6}) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000280)=ANY=[@ANYBLOB="e00433c8a4456fad28b88ab3eeff27ab9598f9a9ebeb3298d6e75e83723879ad1549ca67efa918bd62ad52b95680f6c776785e86e26446ee3df0149e4e4b20b71268f8dbd3db5130e6d0a2a4203a327e"], &(0x7f0000000140)=0x4) tee(r0, r0, 0xfff, 0x3) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f0000000000), &(0x7f00000000c0)=0x68) 03:59:49 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x25d1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000080)="00000600000000000000", 0x0) ioctl$SG_EMULATED_HOST(r1, 0x2203, &(0x7f00000000c0)) write$binfmt_elf32(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000000000000000000000030006000000000000000000380000000000000000000000000020000200000000000000000000000000000000000000000000000000000000040000000000000000000000000000030000000000000000000000000000000200000028e9653bf5f378f24e50b960"], 0x78) execveat(r1, &(0x7f0000000000)='\x00', &(0x7f0000000280), 0x0, 0x1000) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 03:59:49 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, 0x0, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000002000)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001000)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqsrc(r2, 0x0, 0x2000000000000004, &(0x7f0000013ff4)={@remote}, 0xc) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000340)={{{@in=@broadcast, @in=@broadcast, 0x0, 0x80ffffff00000000, 0x0, 0x0, 0xa}}, {{@in6=@local, 0x0, 0x33}, 0x0, @in6=@local}}, 0xe8) close(r2) dup3(r0, r1, 0x0) 03:59:49 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) syz_execute_func(&(0x7f00000000c0)="64ff0941c3c4e2c9975842c4c27d794e0066420fe2e33e0f1110c442019dccd3193e66430f3a0ce397") clone(0x1a02100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet_MCAST_LEAVE_GROUP(r1, 0x0, 0x2d, &(0x7f0000000300)={0xfffffffffffffffc, {{0x2, 0x0, @local}}}, 0x88) write$binfmt_elf32(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB], 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r1, 0x0, 0x61, 0x0, &(0x7f0000000040)) 03:59:49 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(&(0x7f0000000080)='/dev/midi#\x00', 0xffff, 0x400000) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r0, 0xc058534b, &(0x7f0000000200)={0xfa9, 0x0, 0x1f, 0xfe, 0x4, 0xc6}) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000280)=ANY=[@ANYBLOB="e00433c8a4456fad28b88ab3eeff27ab9598f9a9ebeb3298d6e75e83723879ad1549ca67efa918bd62ad52b95680f6c776785e86e26446ee3df0149e4e4b20b71268f8dbd3db5130e6d0a2a4203a327e"], &(0x7f0000000140)=0x4) tee(r0, r0, 0xfff, 0x3) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f0000000000), &(0x7f00000000c0)=0x68) [ 371.887715] IPVS: ftp: loaded support on port[0] = 21 03:59:49 executing program 2: clone(0x41fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f00000000c0)) syz_open_dev$rtc(&(0x7f0000000080)='/dev/rtc#\x00', 0x0, 0x0) ptrace(0x10, r0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000000)) getsockopt$inet_sctp6_SCTP_NODELAY(0xffffffffffffffff, 0x84, 0x3, &(0x7f0000000140), &(0x7f00000001c0)=0x4) ptrace$setregs(0xf, r0, 0x0, &(0x7f0000000180)="a96d55") ptrace$getregset(0x4204, r0, 0x2, &(0x7f0000000280)={0x0}) 03:59:49 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x25d1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000080)="00000600000000000000", 0x0) ioctl$SG_EMULATED_HOST(r1, 0x2203, &(0x7f00000000c0)) write$binfmt_elf32(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000000000000000000000030006000000000000000000380000000000000000000000000020000200000000000000000000000000000000000000000000000000000000040000000000000000000000000000030000000000000000000000000000000200000028e9653bf5f378f24e50b960"], 0x78) execveat(r1, &(0x7f0000000000)='\x00', &(0x7f0000000280), 0x0, 0x1000) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 03:59:49 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$admmidi(&(0x7f0000000380)='/dev/admmidi#\x00', 0xc571, 0x10000) r0 = syz_open_dev$admmidi(&(0x7f0000000540)='/dev/admmidi#\x00', 0x0, 0x0) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000300)=0x0) sched_setattr(r1, &(0x7f0000000240)={0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000001}, 0x0) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x103, 0x0) syz_open_dev$sndtimer(&(0x7f0000000100)='/dev/snd/timer\x00', 0x0, 0x38) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) r5 = syz_open_dev$admmidi(&(0x7f00000002c0)='/dev/admmidi#\x00', 0x7, 0x400) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000080)={0x0}, &(0x7f0000000440)=0x8) setsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r4, 0x84, 0x71, &(0x7f0000000480)={r6, 0x3}, 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, &(0x7f0000000f00)={{{@in6, @in6=@ipv4={[], [], @broadcast}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f0000002040)=0xe8) connect$nfc_llcp(r2, &(0x7f00000004c0)={0x27, 0x0, 0x0, 0x2, 0x9, 0x59e, "26a602b95b9df4650c3a239c69f126d90e9042f9b068e11bffd0f1784408e782382259b82852b4604db32faf1da22ed506e4dd78395cb8b83f10341843ef95", 0x2d}, 0x60) r8 = getuid() setsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000002080)={{{@in6, @in, 0x4e23, 0x7, 0x4e21, 0x81, 0xa, 0x80, 0x80, 0x8, r7, r8}, {0x7, 0xfffffffffffffff7, 0x429, 0x3ff, 0x18, 0x955e, 0x1, 0x3}, {0x7, 0xfffffffffffffff6, 0x1, 0x6}, 0x3, 0x0, 0x1, 0x1, 0x1, 0x1}, {{@in6=@local, 0x4d4, 0x7f}, 0xa, @in=@dev={0xac, 0x14, 0x14, 0x1c}, 0x3507, 0x0, 0x3, 0x400, 0x8, 0x3, 0x3f5}}, 0xe8) setsockopt$inet_mreqn(r4, 0x0, 0xe368adb30c792f1f, &(0x7f0000000340)={@local, @local}, 0xc) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) ioctl$TIOCGSID(r4, 0x5429, &(0x7f0000000100)=0x0) getpeername$unix(r4, &(0x7f00000003c0)=@abs, &(0x7f0000000180)=0x6e) ioctl$sock_SIOCSPGRP(r3, 0x8902, &(0x7f0000000280)=r9) openat$cgroup_procs(r4, &(0x7f00000000c0)='tasks\x00', 0x2, 0x0) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, &(0x7f0000000580), &(0x7f00000005c0)=0xc) unshare(0x40000000) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000040)={'tunl0\x00', @ifru_names='bridge0\x00'}) syz_open_dev$admmidi(&(0x7f0000000140)='/dev/admmidi#\x00', 0x100000000, 0x2000) ioctl(0xffffffffffffffff, 0x5, &(0x7f0000000000)="02380b07") r10 = fcntl$getown(r2, 0x9) ptrace(0x421f, r10) clock_gettime(0x0, &(0x7f0000000080)) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(0xffffffffffffffff, 0x402c5342, &(0x7f00000001c0)={0x8, 0x0, 0xc71a, {}, 0x100000001, 0x8}) 03:59:49 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, 0x0, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000002000)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001000)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqsrc(r2, 0x0, 0x2000000000000004, &(0x7f0000013ff4)={@remote}, 0xc) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000340)={{{@in=@broadcast, @in=@broadcast, 0x0, 0x600, 0x0, 0x0, 0xa}}, {{@in6=@local, 0x0, 0x33}, 0x0, @in6=@local}}, 0xe8) close(r2) dup3(r0, r1, 0x0) 03:59:49 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(&(0x7f0000000080)='/dev/midi#\x00', 0xffff, 0x400000) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r0, 0xc058534b, &(0x7f0000000200)={0xfa9, 0x0, 0x1f, 0xfe, 0x4, 0xc6}) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000280)=ANY=[@ANYBLOB="e00433c8a4456fad28b88ab3eeff27ab9598f9a9ebeb3298d6e75e83723879ad1549ca67efa918bd62ad52b95680f6c776785e86e26446ee3df0149e4e4b20b71268f8dbd3db5130e6d0a2a4203a327e"], &(0x7f0000000140)=0x4) tee(r0, r0, 0xfff, 0x3) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f0000000000), &(0x7f00000000c0)=0x68) 03:59:49 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) syz_execute_func(&(0x7f00000000c0)="64ff0941c3c4e2c9975842c4c27d794e0066420fe2e33e0f1110c442019dccd3193e66430f3a0ce397") clone(0x1a02100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet_MCAST_LEAVE_GROUP(r1, 0x0, 0x2d, &(0x7f0000000300)={0xfffffffffffffffc, {{0x2, 0x0, @local}}}, 0x88) write$binfmt_elf32(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB], 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r1, 0x0, 0x61, 0x0, &(0x7f0000000040)) 03:59:49 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x25d1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(0x0, 0x0) ioctl$SG_EMULATED_HOST(r1, 0x2203, &(0x7f00000000c0)) write$binfmt_elf32(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000000000000000000000030006000000000000000000380000000000000000000000000020000200000000000000000000000000000000000000000000000000000000040000000000000000000000000000030000000000000000000000000000000200000028e9653bf5f378f24e50b960"], 0x78) execveat(r1, &(0x7f0000000000)='\x00', &(0x7f0000000280), 0x0, 0x1000) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) [ 372.225310] IPVS: ftp: loaded support on port[0] = 21 03:59:49 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, 0x0, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000002000)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001000)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqsrc(r2, 0x0, 0x2000000000000004, &(0x7f0000013ff4)={@remote}, 0xc) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000340)={{{@in=@broadcast, @in=@broadcast, 0x0, 0x300, 0x0, 0x0, 0xa}}, {{@in6=@local, 0x0, 0x33}, 0x0, @in6=@local}}, 0xe8) close(r2) dup3(r0, r1, 0x0) 03:59:49 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x24000, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'irlan0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000100)={'vcan0\x00', r2}) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r3 = userfaultfd(0x0) ioctl$UFFDIO_API(r3, 0xc018aa3f, &(0x7f0000003fe8)={0xaa, 0x8000000000}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000140)={{&(0x7f0000011000/0x3000)=nil, 0x3000}}) r4 = socket$inet6_sctp(0xa, 0x1, 0x84) listen(r4, 0x800) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r4, 0x84, 0x8, &(0x7f0000013e95), 0x4) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r4, 0x84, 0x6b, &(0x7f00000000c0)=[@in={0x2, 0x0, @local}], 0x10) close(r4) close(r3) 03:59:49 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x25d1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(0x0, 0x0) ioctl$SG_EMULATED_HOST(r1, 0x2203, &(0x7f00000000c0)) write$binfmt_elf32(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000000000000000000000030006000000000000000000380000000000000000000000000020000200000000000000000000000000000000000000000000000000000000040000000000000000000000000000030000000000000000000000000000000200000028e9653bf5f378f24e50b960"], 0x78) execveat(r1, &(0x7f0000000000)='\x00', &(0x7f0000000280), 0x0, 0x1000) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 03:59:49 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) syz_execute_func(&(0x7f00000000c0)="64ff0941c3c4e2c9975842c4c27d794e0066420fe2e33e0f1110c442019dccd3193e66430f3a0ce397") clone(0x1a02100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet_MCAST_LEAVE_GROUP(r1, 0x0, 0x2d, &(0x7f0000000300)={0xfffffffffffffffc, {{0x2, 0x0, @local}}}, 0x88) write$binfmt_elf32(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB], 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r1, 0x0, 0x61, 0x0, &(0x7f0000000040)) 03:59:49 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, 0x0, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000002000)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001000)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqsrc(r2, 0x0, 0x2000000000000004, &(0x7f0000013ff4)={@remote}, 0xc) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000340)={{{@in=@broadcast, @in=@broadcast, 0x0, 0xffffffa4, 0x0, 0x0, 0xa}}, {{@in6=@local, 0x0, 0x33}, 0x0, @in6=@local}}, 0xe8) close(r2) dup3(r0, r1, 0x0) 03:59:50 executing program 2: clone(0x41fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f00000000c0)) syz_open_dev$rtc(&(0x7f0000000080)='/dev/rtc#\x00', 0x0, 0x0) ptrace(0x10, r0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000000)) getsockopt$inet_sctp6_SCTP_NODELAY(0xffffffffffffffff, 0x84, 0x3, &(0x7f0000000140), &(0x7f00000001c0)=0x4) ptrace$setregs(0xf, r0, 0x0, &(0x7f0000000180)="a96d55a7") ptrace$getregset(0x4204, r0, 0x2, &(0x7f0000000280)={0x0}) 03:59:50 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x25d1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(0x0, 0x0) ioctl$SG_EMULATED_HOST(r1, 0x2203, &(0x7f00000000c0)) write$binfmt_elf32(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000000000000000000000030006000000000000000000380000000000000000000000000020000200000000000000000000000000000000000000000000000000000000040000000000000000000000000000030000000000000000000000000000000200000028e9653bf5f378f24e50b960"], 0x78) execveat(r1, &(0x7f0000000000)='\x00', &(0x7f0000000280), 0x0, 0x1000) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 03:59:50 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$admmidi(&(0x7f0000000380)='/dev/admmidi#\x00', 0xc571, 0x10000) r0 = syz_open_dev$admmidi(&(0x7f0000000540)='/dev/admmidi#\x00', 0x0, 0x0) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000300)=0x0) sched_setattr(r1, &(0x7f0000000240)={0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000001}, 0x0) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x103, 0x0) syz_open_dev$sndtimer(&(0x7f0000000100)='/dev/snd/timer\x00', 0x0, 0x38) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) r5 = syz_open_dev$admmidi(&(0x7f00000002c0)='/dev/admmidi#\x00', 0x7, 0x400) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000080)={0x0}, &(0x7f0000000440)=0x8) setsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r4, 0x84, 0x71, &(0x7f0000000480)={r6, 0x3}, 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, &(0x7f0000000f00)={{{@in6, @in6=@ipv4={[], [], @broadcast}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f0000002040)=0xe8) connect$nfc_llcp(r2, &(0x7f00000004c0)={0x27, 0x0, 0x0, 0x2, 0x9, 0x59e, "26a602b95b9df4650c3a239c69f126d90e9042f9b068e11bffd0f1784408e782382259b82852b4604db32faf1da22ed506e4dd78395cb8b83f10341843ef95", 0x2d}, 0x60) r8 = getuid() setsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000002080)={{{@in6, @in, 0x4e23, 0x7, 0x4e21, 0x81, 0xa, 0x80, 0x80, 0x8, r7, r8}, {0x7, 0xfffffffffffffff7, 0x429, 0x3ff, 0x18, 0x955e, 0x1, 0x3}, {0x7, 0xfffffffffffffff6, 0x1, 0x6}, 0x3, 0x0, 0x1, 0x1, 0x1, 0x1}, {{@in6=@local, 0x4d4, 0x7f}, 0xa, @in=@dev={0xac, 0x14, 0x14, 0x1c}, 0x3507, 0x0, 0x3, 0x400, 0x8, 0x3, 0x3f5}}, 0xe8) setsockopt$inet_mreqn(r4, 0x0, 0xe368adb30c792f1f, &(0x7f0000000340)={@local, @local}, 0xc) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) ioctl$TIOCGSID(r4, 0x5429, &(0x7f0000000100)=0x0) getpeername$unix(r4, &(0x7f00000003c0)=@abs, &(0x7f0000000180)=0x6e) ioctl$sock_SIOCSPGRP(r3, 0x8902, &(0x7f0000000280)=r9) openat$cgroup_procs(r4, &(0x7f00000000c0)='tasks\x00', 0x2, 0x0) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, &(0x7f0000000580), &(0x7f00000005c0)=0xc) unshare(0x40000000) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000040)={'tunl0\x00', @ifru_names='bridge0\x00'}) syz_open_dev$admmidi(&(0x7f0000000140)='/dev/admmidi#\x00', 0x100000000, 0x2000) ioctl(0xffffffffffffffff, 0x5, &(0x7f0000000000)="02380b07") r10 = fcntl$getown(r2, 0x9) ptrace(0x421f, r10) clock_gettime(0x0, &(0x7f0000000080)) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(0xffffffffffffffff, 0x402c5342, &(0x7f00000001c0)={0x8, 0x0, 0xc71a, {}, 0x100000001, 0x8}) 03:59:50 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) syz_execute_func(&(0x7f00000000c0)="64ff0941c3c4e2c9975842c4c27d794e0066420fe2e33e0f1110c442019dccd3193e66430f3a0ce397") clone(0x1a02100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet_MCAST_LEAVE_GROUP(r1, 0x0, 0x2d, &(0x7f0000000300)={0xfffffffffffffffc, {{0x2, 0x0, @local}}}, 0x88) write$binfmt_elf32(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB], 0x0) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, 0x0, &(0x7f0000000040)) 03:59:50 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, 0x0, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000002000)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001000)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqsrc(r2, 0x0, 0x2000000000000004, &(0x7f0000013ff4)={@remote}, 0xc) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000340)={{{@in=@broadcast, @in=@broadcast, 0x0, 0x300000000000000, 0x0, 0x0, 0xa}}, {{@in6=@local, 0x0, 0x33}, 0x0, @in6=@local}}, 0xe8) close(r2) dup3(r0, r1, 0x0) 03:59:50 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) syz_execute_func(&(0x7f00000000c0)="64ff0941c3c4e2c9975842c4c27d794e0066420fe2e33e0f1110c442019dccd3193e66430f3a0ce397") clone(0x1a02100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet_MCAST_LEAVE_GROUP(r1, 0x0, 0x2d, &(0x7f0000000300)={0xfffffffffffffffc, {{0x2, 0x0, @local}}}, 0x88) write$binfmt_elf32(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB], 0x0) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, 0x0, &(0x7f0000000040)) 03:59:50 executing program 1: r0 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x7, 0x2040) ioctl$KDSKBMODE(r0, 0x4b45, &(0x7f0000000100)=0x80000000) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) ioctl$RTC_PIE_OFF(r0, 0x7006) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="776f726b6469723d0dd55c4a285e2e2f66696c65315c736d61636b6673726f6f743d2c00"]) 03:59:50 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x25d1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000080)="00000600000000000000", 0x0) ioctl$SG_EMULATED_HOST(0xffffffffffffffff, 0x2203, &(0x7f00000000c0)) write$binfmt_elf32(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000000000000000000000030006000000000000000000380000000000000000000000000020000200000000000000000000000000000000000000000000000000000000040000000000000000000000000000030000000000000000000000000000000200000028e9653bf5f378f24e50b960"], 0x78) execveat(r1, &(0x7f0000000000)='\x00', &(0x7f0000000280), 0x0, 0x1000) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) [ 373.219795] IPVS: ftp: loaded support on port[0] = 21 03:59:50 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) syz_execute_func(&(0x7f00000000c0)="64ff0941c3c4e2c9975842c4c27d794e0066420fe2e33e0f1110c442019dccd3193e66430f3a0ce397") clone(0x1a02100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet_MCAST_LEAVE_GROUP(r1, 0x0, 0x2d, &(0x7f0000000300)={0xfffffffffffffffc, {{0x2, 0x0, @local}}}, 0x88) write$binfmt_elf32(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB], 0x0) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, 0x0, &(0x7f0000000040)) 03:59:50 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, 0x0, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000002000)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001000)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqsrc(r2, 0x0, 0x2000000000000004, &(0x7f0000013ff4)={@remote}, 0xc) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000340)={{{@in=@broadcast, @in=@broadcast, 0x0, 0xff0f000000000000, 0x0, 0x0, 0xa}}, {{@in6=@local, 0x0, 0x33}, 0x0, @in6=@local}}, 0xe8) close(r2) dup3(r0, r1, 0x0) [ 373.290819] overlayfs: option "workdir= Õ\J(^./file1\smackfsroot=" is useless in a non-upper mount, ignore [ 373.409766] overlayfs: missing 'lowerdir' [ 373.564466] overlayfs: option "workdir= Õ\J(^./file1\smackfsroot=" is useless in a non-upper mount, ignore 03:59:51 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) syz_execute_func(&(0x7f00000000c0)="64ff0941c3c4e2c9975842c4c27d794e0066420fe2e33e0f1110c442019dccd3193e66430f3a0ce397") clone(0x1a02100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet_MCAST_LEAVE_GROUP(r1, 0x0, 0x2d, &(0x7f0000000300)={0xfffffffffffffffc, {{0x2, 0x0, @local}}}, 0x88) write$binfmt_elf32(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB], 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r1, 0x0, 0x61, 0x0, 0x0) [ 373.655613] overlayfs: missing 'lowerdir' 03:59:51 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x25d1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000080)="00000600000000000000", 0x0) ioctl$SG_EMULATED_HOST(0xffffffffffffffff, 0x2203, &(0x7f00000000c0)) write$binfmt_elf32(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000000000000000000000030006000000000000000000380000000000000000000000000020000200000000000000000000000000000000000000000000000000000000040000000000000000000000000000030000000000000000000000000000000200000028e9653bf5f378f24e50b960"], 0x78) execveat(r1, &(0x7f0000000000)='\x00', &(0x7f0000000280), 0x0, 0x1000) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 03:59:51 executing program 2: clone(0x41fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f00000000c0)) syz_open_dev$rtc(&(0x7f0000000080)='/dev/rtc#\x00', 0x0, 0x0) ptrace(0x10, r0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000000)) getsockopt$inet_sctp6_SCTP_NODELAY(0xffffffffffffffff, 0x84, 0x3, &(0x7f0000000140), &(0x7f00000001c0)=0x4) ptrace$setregs(0xf, r0, 0x0, &(0x7f0000000180)="a96d55a7") ptrace$getregset(0x4204, r0, 0x2, &(0x7f0000000280)={0x0}) 03:59:51 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, 0x0, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000002000)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001000)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqsrc(r2, 0x0, 0x2000000000000004, &(0x7f0000013ff4)={@remote}, 0xc) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000340)={{{@in=@broadcast, @in=@broadcast, 0x0, 0x2000000, 0x0, 0x0, 0xa}}, {{@in6=@local, 0x0, 0x33}, 0x0, @in6=@local}}, 0xe8) close(r2) dup3(r0, r1, 0x0) 03:59:51 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$admmidi(&(0x7f0000000380)='/dev/admmidi#\x00', 0xc571, 0x10000) r0 = syz_open_dev$admmidi(&(0x7f0000000540)='/dev/admmidi#\x00', 0x0, 0x0) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000300)=0x0) sched_setattr(r1, &(0x7f0000000240)={0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000001}, 0x0) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x103, 0x0) syz_open_dev$sndtimer(&(0x7f0000000100)='/dev/snd/timer\x00', 0x0, 0x38) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) r5 = syz_open_dev$admmidi(&(0x7f00000002c0)='/dev/admmidi#\x00', 0x7, 0x400) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000080)={0x0}, &(0x7f0000000440)=0x8) setsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r4, 0x84, 0x71, &(0x7f0000000480)={r6, 0x3}, 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, &(0x7f0000000f00)={{{@in6, @in6=@ipv4={[], [], @broadcast}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f0000002040)=0xe8) connect$nfc_llcp(r2, &(0x7f00000004c0)={0x27, 0x0, 0x0, 0x2, 0x9, 0x59e, "26a602b95b9df4650c3a239c69f126d90e9042f9b068e11bffd0f1784408e782382259b82852b4604db32faf1da22ed506e4dd78395cb8b83f10341843ef95", 0x2d}, 0x60) r8 = getuid() setsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000002080)={{{@in6, @in, 0x4e23, 0x7, 0x4e21, 0x81, 0xa, 0x80, 0x80, 0x8, r7, r8}, {0x7, 0xfffffffffffffff7, 0x429, 0x3ff, 0x18, 0x955e, 0x1, 0x3}, {0x7, 0xfffffffffffffff6, 0x1, 0x6}, 0x3, 0x0, 0x1, 0x1, 0x1, 0x1}, {{@in6=@local, 0x4d4, 0x7f}, 0xa, @in=@dev={0xac, 0x14, 0x14, 0x1c}, 0x3507, 0x0, 0x3, 0x400, 0x8, 0x3, 0x3f5}}, 0xe8) setsockopt$inet_mreqn(r4, 0x0, 0xe368adb30c792f1f, &(0x7f0000000340)={@local, @local}, 0xc) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) ioctl$TIOCGSID(r4, 0x5429, &(0x7f0000000100)=0x0) getpeername$unix(r4, &(0x7f00000003c0)=@abs, &(0x7f0000000180)=0x6e) ioctl$sock_SIOCSPGRP(r3, 0x8902, &(0x7f0000000280)=r9) openat$cgroup_procs(r4, &(0x7f00000000c0)='tasks\x00', 0x2, 0x0) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, &(0x7f0000000580), &(0x7f00000005c0)=0xc) unshare(0x40000000) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000040)={'tunl0\x00', @ifru_names='bridge0\x00'}) syz_open_dev$admmidi(&(0x7f0000000140)='/dev/admmidi#\x00', 0x100000000, 0x2000) ioctl(0xffffffffffffffff, 0x5, &(0x7f0000000000)="02380b07") r10 = fcntl$getown(r2, 0x9) ptrace(0x421f, r10) clock_gettime(0x0, &(0x7f0000000080)) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(0xffffffffffffffff, 0x402c5342, &(0x7f00000001c0)={0x8, 0x0, 0xc71a, {}, 0x100000001, 0x8}) 03:59:51 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) syz_execute_func(&(0x7f00000000c0)="64ff0941c3c4e2c9975842c4c27d794e0066420fe2e33e0f1110c442019dccd3193e66430f3a0ce397") clone(0x1a02100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet_MCAST_LEAVE_GROUP(r1, 0x0, 0x2d, &(0x7f0000000300)={0xfffffffffffffffc, {{0x2, 0x0, @local}}}, 0x88) write$binfmt_elf32(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB], 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r1, 0x0, 0x61, 0x0, 0x0) 03:59:51 executing program 1: clone(0x41fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x10000) bind$pptp(r0, &(0x7f0000000140)={0x18, 0x2, {0x1, @local}}, 0x1e) r1 = getpid() bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000200)={0x0}, 0x10) rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f00000000c0)) ptrace(0x11, r1) ptrace$setregs(0x200000d, r1, 0x0, &(0x7f0000000180)="8cc6fc4e5b93f76ecfa1b5f082b28956e0662da24044d47a82bd6b") r2 = syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x2, 0x2) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x28) ioctl$VIDIOC_EXPBUF(r2, 0xc0405610, &(0x7f0000000080)={0xa, 0x660d, 0x0, 0x80800, r3}) 03:59:51 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x25d1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000080)="00000600000000000000", 0x0) ioctl$SG_EMULATED_HOST(0xffffffffffffffff, 0x2203, &(0x7f00000000c0)) write$binfmt_elf32(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000000000000000000000030006000000000000000000380000000000000000000000000020000200000000000000000000000000000000000000000000000000000000040000000000000000000000000000030000000000000000000000000000000200000028e9653bf5f378f24e50b960"], 0x78) execveat(r1, &(0x7f0000000000)='\x00', &(0x7f0000000280), 0x0, 0x1000) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 03:59:51 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) syz_execute_func(&(0x7f00000000c0)="64ff0941c3c4e2c9975842c4c27d794e0066420fe2e33e0f1110c442019dccd3193e66430f3a0ce397") clone(0x1a02100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet_MCAST_LEAVE_GROUP(r1, 0x0, 0x2d, &(0x7f0000000300)={0xfffffffffffffffc, {{0x2, 0x0, @local}}}, 0x88) write$binfmt_elf32(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB], 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r1, 0x0, 0x61, 0x0, 0x0) 03:59:51 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, 0x0, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000002000)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001000)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqsrc(r2, 0x0, 0x2000000000000004, &(0x7f0000013ff4)={@remote}, 0xc) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000340)={{{@in=@broadcast, @in=@broadcast, 0x0, 0xff0f0000, 0x0, 0x0, 0xa}}, {{@in6=@local, 0x0, 0x33}, 0x0, @in6=@local}}, 0xe8) close(r2) dup3(r0, r1, 0x0) 03:59:51 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x25d1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000080)="00000600000000000000", 0x0) ioctl$SG_EMULATED_HOST(0xffffffffffffffff, 0x2203, &(0x7f00000000c0)) write$binfmt_elf32(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000000000000000000000030006000000000000000000380000000000000000000000000020000200000000000000000000000000000000000000000000000000000000040000000000000000000000000000030000000000000000000000000000000200000028e9653bf5f378f24e50b960"], 0x78) execveat(r1, &(0x7f0000000000)='\x00', &(0x7f0000000280), 0x0, 0x1000) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) [ 374.427042] IPVS: ftp: loaded support on port[0] = 21 03:59:51 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x25d1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000080)="00000600000000000000", 0x0) ioctl$SG_EMULATED_HOST(r1, 0x2203, 0x0) write$binfmt_elf32(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000000000000000000000030006000000000000000000380000000000000000000000000020000200000000000000000000000000000000000000000000000000000000040000000000000000000000000000030000000000000000000000000000000200000028e9653bf5f378f24e50b960"], 0x78) execveat(r1, &(0x7f0000000000)='\x00', &(0x7f0000000280), 0x0, 0x1000) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 03:59:52 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, 0x0, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000002000)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001000)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqsrc(r2, 0x0, 0x2000000000000004, &(0x7f0000013ff4)={@remote}, 0xc) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000340)={{{@in=@broadcast, @in=@broadcast, 0x0, 0x3000000, 0x0, 0x0, 0xa}}, {{@in6=@local, 0x0, 0x33}, 0x0, @in6=@local}}, 0xe8) close(r2) dup3(r0, r1, 0x0) 03:59:52 executing program 2: clone(0x41fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f00000000c0)) syz_open_dev$rtc(&(0x7f0000000080)='/dev/rtc#\x00', 0x0, 0x0) ptrace(0x10, r0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000000)) getsockopt$inet_sctp6_SCTP_NODELAY(0xffffffffffffffff, 0x84, 0x3, &(0x7f0000000140), &(0x7f00000001c0)=0x4) ptrace$setregs(0xf, r0, 0x0, &(0x7f0000000180)="a96d55a7") ptrace$getregset(0x4204, r0, 0x2, &(0x7f0000000280)={0x0}) 03:59:52 executing program 1 (fault-call:8 fault-nth:0): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) syz_execute_func(&(0x7f00000000c0)="64ff0941c3c4e2c9975842c4c27d794e0066420fe2e33e0f1110c442019dccd3193e66430f3a0ce397") clone(0x1a02100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet_MCAST_LEAVE_GROUP(r1, 0x0, 0x2d, &(0x7f0000000300)={0xfffffffffffffffc, {{0x2, 0x0, @local}}}, 0x88) write$binfmt_elf32(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB], 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r1, 0x0, 0x61, 0x0, &(0x7f0000000040)) [ 375.080542] FAULT_INJECTION: forcing a failure. [ 375.080542] name failslab, interval 1, probability 0, space 0, times 0 [ 375.092118] CPU: 1 PID: 14785 Comm: syz-executor1 Not tainted 4.20.0-rc4+ #360 [ 375.099497] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 375.108942] Call Trace: [ 375.111554] dump_stack+0x244/0x39d [ 375.115208] ? dump_stack_print_info.cold.1+0x20/0x20 [ 375.120426] should_fail.cold.4+0xa/0x17 [ 375.124514] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 375.129803] ? print_usage_bug+0xc0/0xc0 [ 375.133889] ? mark_held_locks+0x130/0x130 [ 375.138143] ? print_usage_bug+0xc0/0xc0 [ 375.142211] ? print_usage_bug+0xc0/0xc0 [ 375.146283] ? zap_class+0x640/0x640 [ 375.150004] ? __lock_acquire+0x62f/0x4c20 [ 375.154246] ? __lock_acquire+0x62f/0x4c20 [ 375.158516] ? __lock_acquire+0x62f/0x4c20 [ 375.162776] ? find_held_lock+0x36/0x1c0 [ 375.166856] ? __sigqueue_alloc+0x251/0x710 [ 375.171202] ? lock_downgrade+0x900/0x900 [ 375.175366] ? check_preemption_disabled+0x48/0x280 [ 375.180415] __should_failslab+0x124/0x180 [ 375.184665] should_failslab+0x9/0x14 [ 375.188474] kmem_cache_alloc+0x47/0x730 [ 375.192559] __sigqueue_alloc+0x3db/0x710 [ 375.196724] ? dequeue_signal+0x630/0x630 [ 375.200906] ? print_usage_bug+0xc0/0xc0 [ 375.204976] ? check_preemption_disabled+0x48/0x280 [ 375.210007] ? print_usage_bug+0xc0/0xc0 [ 375.214079] ? print_usage_bug+0xc0/0xc0 [ 375.218159] ? kasan_check_read+0x11/0x20 [ 375.222334] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 375.227629] ? zap_class+0x640/0x640 [ 375.231346] ? zap_class+0x640/0x640 [ 375.235067] ? find_held_lock+0x36/0x1c0 [ 375.239159] __send_signal+0xe6b/0x1bb0 [ 375.243168] ? prepare_signal+0xe50/0xe50 [ 375.247333] ? __task_pid_nr_ns+0x301/0x640 [ 375.251673] ? lock_downgrade+0x900/0x900 [ 375.255835] ? check_preemption_disabled+0x48/0x280 [ 375.260860] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 375.265800] ? kasan_check_read+0x11/0x20 [ 375.269953] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 375.275236] ? rcu_softirq_qs+0x20/0x20 [ 375.279237] ? __task_pid_nr_ns+0x328/0x640 [ 375.283566] ? delayed_put_pid+0x30/0x30 [ 375.287636] ? zap_other_threads+0x270/0x270 [ 375.292407] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 375.297959] send_signal+0x4a/0xe0 [ 375.301512] do_send_sig_info+0xae/0x170 [ 375.305583] ? __lock_task_sighand+0x430/0x430 [ 375.310181] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 375.315733] send_sig+0x56/0x70 [ 375.319033] sk_stream_error+0xb1/0x110 [ 375.323023] tcp_sendmsg_locked+0x309b/0x3fa0 [ 375.327529] ? rcu_softirq_qs+0x20/0x20 [ 375.331519] ? dput.part.25+0x241/0x860 [ 375.335517] ? lock_downgrade+0x900/0x900 [ 375.339672] ? check_preemption_disabled+0x48/0x280 [ 375.344714] ? tcp_sendpage+0x60/0x60 [ 375.348532] ? zap_class+0x640/0x640 [ 375.352263] ? zap_class+0x640/0x640 [ 375.355990] ? find_held_lock+0x36/0x1c0 [ 375.360064] ? mark_held_locks+0xc7/0x130 [ 375.364220] ? __local_bh_enable_ip+0x160/0x260 [ 375.368899] ? __local_bh_enable_ip+0x160/0x260 [ 375.373579] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 375.378169] ? trace_hardirqs_on+0xbd/0x310 [ 375.382498] ? lock_release+0xa00/0xa00 [ 375.386475] ? lock_sock_nested+0xe2/0x120 [ 375.390719] ? trace_hardirqs_off_caller+0x310/0x310 [ 375.395839] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 375.401388] ? check_preemption_disabled+0x48/0x280 [ 375.406426] ? lock_sock_nested+0x9a/0x120 [ 375.410667] ? lock_sock_nested+0x9a/0x120 [ 375.414914] ? __local_bh_enable_ip+0x160/0x260 [ 375.419601] tcp_sendmsg+0x2f/0x50 [ 375.423159] inet_sendmsg+0x1a1/0x690 [ 375.426969] ? ipip_gro_receive+0x100/0x100 [ 375.431312] ? apparmor_socket_sendmsg+0x29/0x30 [ 375.436078] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 375.441624] ? security_socket_sendmsg+0x94/0xc0 [ 375.446385] ? ipip_gro_receive+0x100/0x100 [ 375.450720] sock_sendmsg+0xd5/0x120 [ 375.454456] sock_write_iter+0x35e/0x5c0 [ 375.454552] ? sock_sendmsg+0x120/0x120 [ 375.462762] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 375.468373] ? iov_iter_init+0xe5/0x210 [ 375.472362] __vfs_write+0x6b8/0x9f0 [ 375.476090] ? kernel_read+0x120/0x120 [ 375.479994] ? apparmor_path_rmdir+0x30/0x30 [ 375.484419] ? apparmor_file_permission+0x24/0x30 [ 375.489282] ? rw_verify_area+0x118/0x360 [ 375.493441] vfs_write+0x1fc/0x560 [ 375.496994] ksys_write+0x101/0x260 [ 375.500628] ? __ia32_sys_read+0xb0/0xb0 [ 375.504714] ? trace_hardirqs_off_caller+0x310/0x310 [ 375.509833] __x64_sys_write+0x73/0xb0 [ 375.513733] do_syscall_64+0x1b9/0x820 [ 375.517634] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 375.523006] ? syscall_return_slowpath+0x5e0/0x5e0 [ 375.527938] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 375.532788] ? trace_hardirqs_on_caller+0x310/0x310 [ 375.537812] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 375.542836] ? prepare_exit_to_usermode+0x291/0x3b0 [ 375.547862] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 375.552716] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 375.557914] RIP: 0033:0x457569 [ 375.561115] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 03:59:53 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x25d1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000080)="00000600000000000000", 0x0) ioctl$SG_EMULATED_HOST(0xffffffffffffffff, 0x2203, &(0x7f00000000c0)) write$binfmt_elf32(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000000000000000000000030006000000000000000000380000000000000000000000000020000200000000000000000000000000000000000000000000000000000000040000000000000000000000000000030000000000000000000000000000000200000028e9653bf5f378f24e50b960"], 0x78) execveat(r1, &(0x7f0000000000)='\x00', &(0x7f0000000280), 0x0, 0x1000) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) [ 375.580030] RSP: 002b:00007f99d8e87c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 375.587745] RAX: ffffffffffffffda RBX: 00007f99d8e87c90 RCX: 0000000000457569 [ 375.595017] RDX: 0000000000000000 RSI: 00000000200003c0 RDI: 0000000000000003 [ 375.602292] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 375.609562] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f99d8e886d3 [ 375.616831] R13: 00000000004c5cde R14: 00000000004da090 R15: 0000000000000004 03:59:53 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000), 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x103, 0x0) r1 = syz_open_dev$sndtimer(&(0x7f0000000100)='/dev/snd/timer\x00', 0x0, 0x42) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) syz_open_dev$admmidi(&(0x7f00000002c0)='/dev/admmidi#\x00', 0x0, 0x10400) name_to_handle_at(r3, &(0x7f0000000240)='./file0\x00', &(0x7f0000000640)=ANY=[@ANYBLOB="a7000000040000007e91768811f5db653ce80fa95aa72828fa11c3356079236bbd949e57e86700fa87fe009d849387fa9dc3ad3e05a4599a146c049012a67d890b02276422bb02f76ceabe0df0704f31c5b3170ee6ab62eb383ccab773a7c71941d4b1801fd6d614c0b0c20bfbb8a7d89d95a1d6267f7fb83fb7821162b588287a2a3f9212cbdda54e840b1b406621772edfb533f59473f8ec7f08be65738ec40b271d34b7d1b3"], &(0x7f0000000280), 0x0) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000080), &(0x7f0000000440)=0x8) setsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r3, 0x84, 0x71, &(0x7f0000000480)={0x0, 0x3}, 0x8) ioctl$UI_SET_FFBIT(0xffffffffffffffff, 0x4004556b, 0xe) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = getuid() setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002080)={{{@in=@loopback, @in, 0x4e23, 0x7, 0x4e21, 0x81, 0xa, 0x80, 0x80, 0x8, 0x0, r4}, {0x7, 0xfffffffffffffff7, 0x429, 0x3, 0x7, 0x955c, 0x1}, {0x7, 0xfffffffffffffff8, 0x1, 0x6}, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1}, {{@in6=@local, 0x4d4, 0x7f}, 0xa, @in6=@mcast2, 0x3507, 0x7, 0x3, 0x400, 0x8, 0x3, 0x3f5}}, 0xe8) setsockopt$inet_mreqn(r3, 0x0, 0xe368adb30c792f1f, &(0x7f0000000340)={@local, @local}, 0xc) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x4, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000100)=0x0) getpeername$unix(r3, &(0x7f00000003c0)=@abs, &(0x7f0000000600)=0x6e) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, &(0x7f0000000180)=r5) r6 = openat$cgroup_procs(r3, &(0x7f00000000c0)='tasks\x00', 0x2, 0x0) setsockopt$inet_icmp_ICMP_FILTER(r3, 0x1, 0x1, &(0x7f00000001c0)={0x730}, 0x4) getsockopt$IP_VS_SO_GET_TIMEOUT(r2, 0x0, 0x486, &(0x7f0000000580), &(0x7f00000005c0)=0xfffffffffffffeb1) unshare(0x40000000) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000040)={'tunl0\x00', @ifru_names='bridge0\x00'}) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000001000)={{0x3}}) syz_open_dev$admmidi(&(0x7f0000000300)='/dev/admmidi#\x00', 0xffffffff, 0x200000) ioctl(r0, 0x0, &(0x7f0000000000)="025cc807") r7 = fcntl$getown(r6, 0x9) ptrace(0x421f, r7) clock_gettime(0x0, &(0x7f0000000080)) 03:59:53 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) syz_execute_func(&(0x7f00000000c0)="64ff0941c3c4e2c9975842c4c27d794e0066420fe2e33e0f1110c442019dccd3193e66430f3a0ce397") clone(0x1a02100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet_MCAST_LEAVE_GROUP(r1, 0x0, 0x2d, &(0x7f0000000300)={0xfffffffffffffffc, {{0x2, 0x0, @local}}}, 0x88) write$binfmt_elf32(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB], 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r1, 0x0, 0x61, 0x0, &(0x7f0000000040)) 03:59:53 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, 0x0, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000002000)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001000)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqsrc(r2, 0x0, 0x2000000000000004, &(0x7f0000013ff4)={@remote}, 0xc) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000340)={{{@in=@broadcast, @in=@broadcast, 0x0, 0x6000000, 0x0, 0x0, 0xa}}, {{@in6=@local, 0x0, 0x33}, 0x0, @in6=@local}}, 0xe8) close(r2) dup3(r0, r1, 0x0) 03:59:53 executing program 2: clone(0x41fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f00000000c0)) syz_open_dev$rtc(&(0x7f0000000080)='/dev/rtc#\x00', 0x0, 0x0) ptrace(0x10, r0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000000)) getsockopt$inet_sctp6_SCTP_NODELAY(0xffffffffffffffff, 0x84, 0x3, &(0x7f0000000140), &(0x7f00000001c0)=0x4) ptrace$setregs(0xf, r0, 0x0, &(0x7f0000000180)="a96d55a756") ptrace$getregset(0x4204, 0x0, 0x2, &(0x7f0000000280)={0x0}) 03:59:53 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x25d1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000080)="00000600000000000000", 0x0) ioctl$SG_EMULATED_HOST(r1, 0x2203, 0x0) write$binfmt_elf32(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000000000000000000000030006000000000000000000380000000000000000000000000020000200000000000000000000000000000000000000000000000000000000040000000000000000000000000000030000000000000000000000000000000200000028e9653bf5f378f24e50b960"], 0x78) execveat(r1, &(0x7f0000000000)='\x00', &(0x7f0000000280), 0x0, 0x1000) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 03:59:53 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @remote}, 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) syz_execute_func(&(0x7f00000000c0)="64ff0941c3c4e2c9975842c4c27d794e0066420fe2e33e0f1110c442019dccd3193e66430f3a0ce397") clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet_MCAST_LEAVE_GROUP(r1, 0x0, 0x2d, &(0x7f0000000300)={0xfffffffffffffffc, {{0x2, 0x0, @local}}}, 0x88) fsetxattr$security_evm(r1, &(0x7f0000000000)='security.evm\x00', &(0x7f0000000100)=@v2={0x5, 0x2, 0x5, 0x200, 0x1c, "d144dfe001f078217a84b8682179fbc97d863f63fc6a601b170bd128"}, 0x26, 0x0) write$binfmt_elf32(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB], 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r1, 0x0, 0x61, 0x0, &(0x7f0000000040)) 03:59:53 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x25d1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000080)="00000600000000000000", 0x0) ioctl$SG_EMULATED_HOST(r1, 0x2203, 0x0) write$binfmt_elf32(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000000000000000000000030006000000000000000000380000000000000000000000000020000200000000000000000000000000000000000000000000000000000000040000000000000000000000000000030000000000000000000000000000000200000028e9653bf5f378f24e50b960"], 0x78) execveat(r1, &(0x7f0000000000)='\x00', &(0x7f0000000280), 0x0, 0x1000) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 03:59:53 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) syz_execute_func(&(0x7f0000000000)="64ff0941c3c4e2c9975842c4c27d794e0066420fe2e33e0f1110c442019dccd3193e66430f3a0ce397") ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(r1, 0x40405515, &(0x7f00000000c0)={0x6, 0x0, 0x10001, 0x8, 'syz0\x00', 0x1ff}) clone(0x1a02100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet_MCAST_LEAVE_GROUP(r1, 0x0, 0x2d, &(0x7f0000000300)={0xfffffffffffffffc, {{0x2, 0x0, @local}}}, 0x88) write$binfmt_elf32(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB], 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r1, 0x0, 0x61, 0x0, &(0x7f0000000040)) ioctl$VIDIOC_QUERY_DV_TIMINGS(r1, 0x80845663, &(0x7f0000000100)={0x0, @reserved}) 03:59:53 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, 0x0, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000002000)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001000)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqsrc(r2, 0x0, 0x2000000000000004, &(0x7f0000013ff4)={@remote}, 0xc) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000340)={{{@in=@broadcast, @in=@broadcast, 0x0, 0x2, 0x0, 0x0, 0xa}}, {{@in6=@local, 0x0, 0x33}, 0x0, @in6=@local}}, 0xe8) close(r2) dup3(r0, r1, 0x0) 03:59:53 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000140), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) syz_execute_func(&(0x7f00000000c0)="64ff0941c3c4e2c9975842c4c27d794e0066420fe2e33e0f1110c442019dccd3193e66430f3a0ce397") clone(0x1a02100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$VIDIOC_S_OUTPUT(r1, 0xc004562f, &(0x7f0000000100)=0x8e) setsockopt$inet_MCAST_LEAVE_GROUP(r1, 0x0, 0x2d, &(0x7f0000000300)={0xfffffffffffffffc, {{0x2, 0x0, @local}}}, 0x88) write$binfmt_elf32(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="cc193e2135c90400000043697c768654732598b2f68d3a"], 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r1, 0x0, 0x61, 0x0, &(0x7f0000000040)) 03:59:53 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) syz_execute_func(&(0x7f00000000c0)="64ff0941c3c4e2c9975842c4c27d794e0066420fe2e33e0f1110c442019dccd3193e66430f3a0ce397") clone(0x1a02100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet_MCAST_LEAVE_GROUP(r1, 0x0, 0x2d, &(0x7f0000000300)={0xfffffffffffffffc, {{0x2, 0x0, @local}}}, 0x88) write$binfmt_elf32(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="52416a8a94a53912ccf22d38591db7942a87b8cf21f6aa4e912b8ee5e0101879e6782e719919dd64378d4766c456cc0c9d9e5a002f194347d2affaf9de402b484d3fd8f61efa0cc14c7cab6f2b6d6517537df9ba695e1af43e7932c50c77888cc15405002af272993942705c6703"], 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r1, 0x0, 0x61, 0x0, &(0x7f0000000040)) [ 376.644440] IPVS: ftp: loaded support on port[0] = 21 [ 376.754161] IPVS: ftp: loaded support on port[0] = 21 03:59:54 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x25d1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000080)="00000600000000000000", 0x0) ioctl$SG_EMULATED_HOST(0xffffffffffffffff, 0x2203, &(0x7f00000000c0)) write$binfmt_elf32(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000000000000000000000030006000000000000000000380000000000000000000000000020000200000000000000000000000000000000000000000000000000000000040000000000000000000000000000030000000000000000000000000000000200000028e9653bf5f378f24e50b960"], 0x78) execveat(r1, &(0x7f0000000000)='\x00', &(0x7f0000000280), 0x0, 0x1000) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) [ 377.246656] IPVS: ftp: loaded support on port[0] = 21 [ 378.134742] bridge0: port 1(bridge_slave_0) entered blocking state [ 378.141317] bridge0: port 1(bridge_slave_0) entered disabled state [ 378.148831] device bridge_slave_0 entered promiscuous mode [ 378.205582] bridge0: port 2(bridge_slave_1) entered blocking state [ 378.212117] bridge0: port 2(bridge_slave_1) entered disabled state [ 378.220061] device bridge_slave_1 entered promiscuous mode [ 378.266958] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 378.305653] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 378.327714] device bridge_slave_1 left promiscuous mode [ 378.333251] bridge0: port 2(bridge_slave_1) entered disabled state [ 378.377396] device bridge_slave_0 left promiscuous mode [ 378.382844] bridge0: port 1(bridge_slave_0) entered disabled state [ 378.468348] team0 (unregistering): Port device team_slave_1 removed [ 378.479169] team0 (unregistering): Port device team_slave_0 removed [ 378.489835] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 378.570308] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 378.646673] bond0 (unregistering): Released all slaves [ 378.833938] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 378.868176] bond0: Enslaving bond_slave_1 as an active interface with an up link 03:59:56 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) syz_execute_func(&(0x7f00000000c0)="64ff0941c3c4e2c9975842c4c27d794e0066420fe2e33e0f1110c442019dccd3193e66430f3a0ce397") clone(0x1a02100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet_MCAST_LEAVE_GROUP(r1, 0x0, 0x2d, &(0x7f0000000300)={0xfffffffffffffffc, {{0x2, 0x0, @local}}}, 0x88) write$binfmt_elf32(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="2bc4cbf65e3522c6cccfc7acb349ace304b2b503bdb421de883d89fd95536ae43fffa375f83418f95d06a90a85f319fa10753ab3953f5e244038dd4c9ce4cbf6c0449f536bad71831d3851e603c04facd02e39dd76cbfc40008c5c1c5fda3381159fe0f51948d10b1681fe18f438784947b287782fb7ed6cc7"], 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r1, 0x0, 0x61, 0x0, &(0x7f0000000040)) 03:59:56 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, 0x0, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000002000)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001000)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqsrc(r2, 0x0, 0x2000000000000004, &(0x7f0000013ff4)={@remote}, 0xc) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000340)={{{@in=@broadcast, @in=@broadcast, 0x0, 0x0, 0x100000000000000, 0x0, 0xa}}, {{@in6=@local, 0x0, 0x33}, 0x0, @in6=@local}}, 0xe8) close(r2) dup3(r0, r1, 0x0) 03:59:56 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x25d1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000080)="00000600000000000000", 0x0) ioctl$SG_EMULATED_HOST(r1, 0x2203, &(0x7f00000000c0)) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000000000000000000000030006000000000000000000380000000000000000000000000020000200000000000000000000000000000000000000000000000000000000040000000000000000000000000000030000000000000000000000000000000200000028e9653bf5f378f24e50b960"], 0x78) execveat(r1, &(0x7f0000000000)='\x00', &(0x7f0000000280), 0x0, 0x1000) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 03:59:56 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000), 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x103, 0x0) r1 = syz_open_dev$sndtimer(&(0x7f0000000100)='/dev/snd/timer\x00', 0x0, 0x42) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) syz_open_dev$admmidi(&(0x7f00000002c0)='/dev/admmidi#\x00', 0x0, 0x10400) name_to_handle_at(r3, &(0x7f0000000240)='./file0\x00', &(0x7f0000000640)=ANY=[@ANYBLOB="a7000000040000007e91768811f5db653ce80fa95aa72828fa11c3356079236bbd949e57e86700fa87fe009d849387fa9dc3ad3e05a4599a146c049012a67d890b02276422bb02f76ceabe0df0704f31c5b3170ee6ab62eb383ccab773a7c71941d4b1801fd6d614c0b0c20bfbb8a7d89d95a1d6267f7fb83fb7821162b588287a2a3f9212cbdda54e840b1b406621772edfb533f59473f8ec7f08be65738ec40b271d34b7d1b3"], &(0x7f0000000280), 0x0) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000080), &(0x7f0000000440)=0x8) setsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r3, 0x84, 0x71, &(0x7f0000000480)={0x0, 0x3}, 0x8) ioctl$UI_SET_FFBIT(0xffffffffffffffff, 0x4004556b, 0xe) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = getuid() setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002080)={{{@in=@loopback, @in, 0x4e23, 0x7, 0x4e21, 0x81, 0xa, 0x80, 0x80, 0x8, 0x0, r4}, {0x7, 0xfffffffffffffff7, 0x429, 0x3, 0x7, 0x955c, 0x1}, {0x7, 0xfffffffffffffff8, 0x1, 0x6}, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1}, {{@in6=@local, 0x4d4, 0x7f}, 0xa, @in6=@mcast2, 0x3507, 0x7, 0x3, 0x400, 0x8, 0x3, 0x3f5}}, 0xe8) setsockopt$inet_mreqn(r3, 0x0, 0xe368adb30c792f1f, &(0x7f0000000340)={@local, @local}, 0xc) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x4, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000100)=0x0) getpeername$unix(r3, &(0x7f00000003c0)=@abs, &(0x7f0000000600)=0x6e) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, &(0x7f0000000180)=r5) r6 = openat$cgroup_procs(r3, &(0x7f00000000c0)='tasks\x00', 0x2, 0x0) setsockopt$inet_icmp_ICMP_FILTER(r3, 0x1, 0x1, &(0x7f00000001c0)={0x730}, 0x4) getsockopt$IP_VS_SO_GET_TIMEOUT(r2, 0x0, 0x486, &(0x7f0000000580), &(0x7f00000005c0)=0xfffffffffffffeb1) unshare(0x40000000) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000040)={'tunl0\x00', @ifru_names='bridge0\x00'}) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000001000)={{0x3}}) syz_open_dev$admmidi(&(0x7f0000000300)='/dev/admmidi#\x00', 0xffffffff, 0x200000) ioctl(r0, 0x0, &(0x7f0000000000)="025cc807") r7 = fcntl$getown(r6, 0x9) ptrace(0x421f, r7) clock_gettime(0x0, &(0x7f0000000080)) 03:59:56 executing program 2: clone(0x41fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f00000000c0)) syz_open_dev$rtc(&(0x7f0000000080)='/dev/rtc#\x00', 0x0, 0x0) ptrace(0x10, r0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000000)) getsockopt$inet_sctp6_SCTP_NODELAY(0xffffffffffffffff, 0x84, 0x3, &(0x7f0000000140), &(0x7f00000001c0)=0x4) ptrace$setregs(0xf, r0, 0x0, &(0x7f0000000180)="a96d55a756") ptrace$getregset(0x4204, r0, 0x0, &(0x7f0000000280)={0x0}) 03:59:56 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080), 0x3c1) r1 = dup2(r0, r0) getsockopt$inet_sctp_SCTP_NODELAY(r1, 0x84, 0x3, &(0x7f0000000200), &(0x7f0000000240)=0x4) syz_execute_func(&(0x7f00000000c0)="64ff0941c3c4e2c9975842c4c27d794e0066420fe2e33e0f1110c442019dccd3193e66430f3a0ce397") clone(0x1a02100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet_dccp_buf(r1, 0x21, 0xe, &(0x7f0000000000)=""/51, &(0x7f0000000100)=0x33) openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) setsockopt$inet_MCAST_LEAVE_GROUP(r1, 0x0, 0x2d, &(0x7f0000000300)={0xfffffffffffffffc, {{0x2, 0x0, @local}}}, 0x88) write$binfmt_elf32(r1, &(0x7f0000000280)=ANY=[@ANYBLOB="ef2bdd9473a0d9aea1bcdf3f95ee43f268aee2e139d0f1624cff6031638cc07fe9ad2ad159ae15047d983fb6481a003c3bbc2f7a414d514dadc399aeb10cc719269acd23ced2401cdbd96d989e17f45083abe2fa7ef02a9295f8157c29c261e62f21df7e937f"], 0x0) ioctl$SNDRV_CTL_IOCTL_TLV_WRITE(r1, 0xc008551b, &(0x7f0000000140)={0x9, 0x8, [0x7fffffff, 0x4]}) getsockopt$ARPT_SO_GET_ENTRIES(r1, 0x0, 0x61, 0x0, &(0x7f0000000040)) ioctl$DRM_IOCTL_SET_UNIQUE(r1, 0x40106410, &(0x7f00000003c0)={0xe, &(0x7f0000000180)="ee0c76a7d9c0974b8b916d1793ca"}) 03:59:56 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x18, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x0) syz_execute_func(&(0x7f00000000c0)="64ff0941c3c4e2c9975842c4c27d794e0066420fe2e33e0f1110c442019dccd3193e66430f3a0ce397") clone(0x1a02100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet_MCAST_LEAVE_GROUP(r1, 0x0, 0x2d, &(0x7f0000000300)={0xfffffffffffffffc, {{0x2, 0x0, @local}}}, 0x88) write$binfmt_elf32(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="f501e577e46d492d729d532fb95d7e0f10eb54f4e37e66e3aaf5373f920cba4ec61ff1af609fee20de1facb2ae980785122d2c91c41a9ca1fb28e6d0e2d6ffe04c5435162b25bfea668b27d13bf9728c6ff2a76ac228d270351f204047f74d38f9bdfd6cb2cbb4fef8960f4fe626024c3de83c0e0a8a69c0e13c89e23c00c5bb2cf6"], 0x0) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000280)={0x1, 0x5}, 0x8) ioctl$KVM_SET_REGS(r1, 0x4090ae82, &(0x7f0000000100)={[0x9, 0x9, 0x1, 0x0, 0x7, 0x1f, 0x6, 0x0, 0x0, 0x4d10, 0x100000001, 0x0, 0x10001, 0xa8, 0x0, 0x9], 0x2001, 0x151400}) getsockopt$ARPT_SO_GET_ENTRIES(r1, 0x0, 0x61, 0x0, &(0x7f0000000040)) 03:59:56 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, 0x0, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000002000)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001000)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqsrc(r2, 0x0, 0x2000000000000004, &(0x7f0000013ff4)={@remote}, 0xc) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000340)={{{@in=@broadcast, @in=@broadcast, 0x0, 0x0, 0xff0f000000000000, 0x0, 0xa}}, {{@in6=@local, 0x0, 0x33}, 0x0, @in6=@local}}, 0xe8) close(r2) dup3(r0, r1, 0x0) 03:59:56 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) syz_execute_func(&(0x7f00000000c0)="64ff0941c3c4e2c9975842c4c27d794e0066420fe2e33e0f1110c442019dccd3193e66430f3a0ce397") clone(0x1a02100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet_MCAST_LEAVE_GROUP(r1, 0x0, 0x2d, &(0x7f0000000300)={0xfffffffffffffffc, {{0x2, 0x0, @local}}}, 0x88) ioctl$SG_GET_RESERVED_SIZE(r1, 0x2272, &(0x7f0000000000)) write$binfmt_elf32(r1, &(0x7f0000000140)=ANY=[@ANYRES16=r0], 0xfffffffffffffd81) getsockopt$ARPT_SO_GET_ENTRIES(r1, 0x0, 0x61, 0x0, &(0x7f0000000040)) 03:59:56 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x25d1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000080)="00000600000000000000", 0x0) ioctl$SG_EMULATED_HOST(r1, 0x2203, &(0x7f00000000c0)) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000000000000000000000030006000000000000000000380000000000000000000000000020000200000000000000000000000000000000000000000000000000000000040000000000000000000000000000030000000000000000000000000000000200000028e9653bf5f378f24e50b960"], 0x78) execveat(r1, &(0x7f0000000000)='\x00', &(0x7f0000000280), 0x0, 0x1000) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) [ 379.336481] IPVS: ftp: loaded support on port[0] = 21 03:59:56 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080), 0x1c) futex(&(0x7f0000000000)=0x1, 0x8f, 0x1, &(0x7f0000000100)={0x0, 0x1c9c380}, &(0x7f0000000140)=0x1, 0x1) syz_mount_image$bfs(&(0x7f0000000400)='bfs\x00', &(0x7f0000000440)='./file0\x00', 0x3, 0x4, &(0x7f0000000640)=[{&(0x7f0000000480)="b49ddbbfe7a3acd9bfc55778", 0xc, 0x7f}, {&(0x7f00000004c0)="2b55338cec3f4b2e26a6ba411b19b879c00af188582e05da3c237d86a44a", 0x1e, 0x200}, {&(0x7f0000000500)="015223603c69c844b9c531c3e8f706e7b40c866bac72ae36a7a4c034ef9075bb748500957c52cbe663b820b49cf6edc30d49eb94e2ba32437e4f5ae1852fea65ffde9a12265a1addeb795b5a3ad911da8c1b94741477860304ed450b159c834d358e63084609f4a48ad85306d4c721a600e5bf9cb3bae521010c248d44db5bf429febce8293cc8c98698f80276d1afbab2955ce01e8c8ba3cee34f96c15f5784b6ec9bbe69fe2d09c043bf8367", 0xad, 0x9}, {&(0x7f00000005c0)="fe546480a0060d842d5b3a95deee9bebbdcd55711a87e8f513caeacaebad0669726a8e811d58d85171f7ad0cb208bbafbb551afe1dc28b3f07edea1d1e55cc38165642c95abdbaf3d6c9c935527952d64c", 0x51, 0xa8}], 0x108008, 0x0) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) syz_execute_func(&(0x7f00000000c0)="64ff0941c3c4e2c9975842c4c27d794e0066420fe2e33e0f1110c442019dccd3193e66430f3a0ce397") ioctl$EVIOCSABS3F(r1, 0x401845ff, &(0x7f00000006c0)={0x8, 0x5, 0x4, 0x2, 0x3f, 0x1}) clone(0x1a02100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet_MCAST_LEAVE_GROUP(r1, 0x0, 0x2d, &(0x7f0000000300)={0xfffffffffffffffc, {{0x2, 0x0, @local}}}, 0x88) write$binfmt_elf32(r1, &(0x7f0000000000)=ANY=[], 0xffffffea) r2 = add_key(&(0x7f0000000180)='ceph\x00', &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000200)="132f14998f2dfd2e7d53e1edacfc44ae67edc5c1125a790947dfd7f0e5944a953f862873de57f745d3ac3c96f76a7371b562ff1a43403925f803b1259ad00400a33aa59be23a4891828d686ae4c387a287fdcca0fe9cdffe7b70f865d1249d5a4e649dc8a92eaef344a42bfefea8d844e3db7aa65a8d16781e28990be5fe4d966b012ef9499876418f104bc659ccd4cec1be82c33302a56e653ab74e650d10c5524282751f41915504b674a791fa50a7995266cbae56eb8bd48e11c6d68508b2873cb5d2f2b2a64ad0bdf7d21bc4ca6d19365d8c72fc4ccaacfc336f13f247e6d9", 0xe1, 0xfffffffffffffffb) keyctl$describe(0x6, r2, &(0x7f00000003c0)=""/12, 0xc) getsockopt$ARPT_SO_GET_ENTRIES(r1, 0x0, 0x61, 0x0, &(0x7f0000000040)) [ 379.911362] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 379.923752] team0: Port device team_slave_0 added [ 380.015570] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 380.038942] team0: Port device team_slave_1 added [ 380.095801] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 380.102755] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 380.119459] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 380.157390] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 380.164255] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 380.181286] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 380.211707] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 380.218895] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 380.230269] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 380.270507] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 380.277950] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 380.289609] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 380.741862] bridge0: port 2(bridge_slave_1) entered blocking state [ 380.748303] bridge0: port 2(bridge_slave_1) entered forwarding state [ 380.754966] bridge0: port 1(bridge_slave_0) entered blocking state [ 380.761390] bridge0: port 1(bridge_slave_0) entered forwarding state [ 380.768980] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 381.116407] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 382.072175] 8021q: adding VLAN 0 to HW filter on device bond0 [ 382.165633] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 382.257877] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 382.264001] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 382.271964] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 382.356681] 8021q: adding VLAN 0 to HW filter on device team0 04:00:00 executing program 0: unshare(0x20020000) mkdir(&(0x7f0000000380)='./file0\x00', 0x0) r0 = socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f000025c000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = memfd_create(0x0, 0x0) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, &(0x7f0000000740)=""/214) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, r2) creat(0x0, 0x88) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x6) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f00000001c0)) ftruncate(0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(0xffffffffffffffff, 0x1261, &(0x7f0000000500)) sendmsg$key(r0, &(0x7f0000000000)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x2, 0x7, 0x0, 0x0, 0x2}, 0x10}}, 0x0) mkdir(&(0x7f0000000100)='./file1\x00', 0x4) 04:00:00 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, 0x0, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000002000)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001000)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqsrc(r2, 0x0, 0x2000000000000004, &(0x7f0000013ff4)={@remote}, 0xc) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000340)={{{@in=@broadcast, @in=@broadcast, 0x0, 0x0, 0x600000000000000, 0x0, 0xa}}, {{@in6=@local, 0x0, 0x33}, 0x0, @in6=@local}}, 0xe8) close(r2) dup3(r0, r1, 0x0) 04:00:00 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x800, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) name_to_handle_at(r1, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)={0xd4, 0x9, "05b66f2313af70209e6bbba0b1e3f24b20bb85ec665a9126d1ab1edd83c0697f2780f13dc2e92de9a28d9739b5adeea440d7d99fe2976388e4cfe227d83f438410332020717273caa2dcb0a070b5b9f0af1f6173cfff22222eee7f2876d229c8f1b3a7701a0f55eb04215930119db2120c7d01b7fcd9fc0ce2337955d1767d79ad8361a55a9cbdf89cbeb5b645fd1f6cad98830b731659250a4de3425b2703837af0a4731b082ddbf18ea1890e2b0cca1622924d02afba812b82a81acc1f1a241e7a74dae16ac7c6c5df6ed3"}, &(0x7f0000000240), 0x1000) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) syz_execute_func(&(0x7f00000000c0)="64ff0941c3c4e2c9975842c4c27d794e0066420fe2e33e0f1110c442019dccd3193e66430f3a0ce397") clone(0x4000200, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet_MCAST_LEAVE_GROUP(r1, 0x0, 0x2d, &(0x7f0000000300)={0xfffffffffffffffc, {{0x2, 0x0, @local}}}, 0x88) write$binfmt_elf32(r1, &(0x7f00000003c0)=ANY=[], 0x293) getsockopt$ARPT_SO_GET_ENTRIES(r1, 0x0, 0x61, 0x0, &(0x7f0000000040)) 04:00:00 executing program 2: clone(0x41fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f00000000c0)) syz_open_dev$rtc(&(0x7f0000000080)='/dev/rtc#\x00', 0x0, 0x0) ptrace(0x10, r0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000000)) getsockopt$inet_sctp6_SCTP_NODELAY(0xffffffffffffffff, 0x84, 0x3, &(0x7f0000000140), &(0x7f00000001c0)=0x4) ptrace$setregs(0xf, r0, 0x0, &(0x7f0000000180)="a96d55a756") ptrace$getregset(0x4204, r0, 0x2, 0x0) 04:00:00 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x25d1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000080)="00000600000000000000", 0x0) ioctl$SG_EMULATED_HOST(r1, 0x2203, &(0x7f00000000c0)) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000000000000000000000030006000000000000000000380000000000000000000000000020000200000000000000000000000000000000000000000000000000000000040000000000000000000000000000030000000000000000000000000000000200000028e9653bf5f378f24e50b960"], 0x78) execveat(r1, &(0x7f0000000000)='\x00', &(0x7f0000000280), 0x0, 0x1000) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 04:00:00 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ptrace$setregs(0xffffffffffffffff, 0x0, 0x0, 0x0) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="ab553fec94", 0x5) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f00000000c0)=ANY=[], 0x271) recvmmsg(r1, &(0x7f0000004ec0)=[{{0x0, 0x0, &(0x7f00000006c0)=[{0x0}, {&(0x7f0000000340)=""/249, 0xf9}], 0x2}}], 0x1, 0x0, 0x0) 04:00:01 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) syz_execute_func(&(0x7f00000000c0)="64ff0941c3c4e2c9975842c4c27d794e0066420fe2e33e0f1110c442019dccd3193e66430f3a0ce397") clone(0x1a02100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet_MCAST_LEAVE_GROUP(r1, 0x0, 0x2d, &(0x7f0000000300)={0xfffffffffffffffc, {{0x2, 0x0, @local}}}, 0x88) write$binfmt_elf32(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="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"], 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r1, 0x0, 0x61, 0x0, &(0x7f0000000040)) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000240)=0xc) prlimit64(r2, 0xd, &(0x7f0000000280)={0xffffffffffffff18, 0x8}, 0x0) 04:00:01 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, 0x0, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000002000)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001000)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqsrc(r2, 0x0, 0x2000000000000004, &(0x7f0000013ff4)={@remote}, 0xc) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000340)={{{@in=@broadcast, @in=@broadcast, 0x0, 0x0, 0x6000000, 0x0, 0xa}}, {{@in6=@local, 0x0, 0x33}, 0x0, @in6=@local}}, 0xe8) close(r2) dup3(r0, r1, 0x0) 04:00:01 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ptrace$setregs(0xffffffffffffffff, 0x0, 0x0, 0x0) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="ab553fec94", 0x5) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f00000000c0)=ANY=[], 0x271) recvmmsg(r1, &(0x7f0000004ec0)=[{{0x0, 0x0, &(0x7f00000006c0)=[{0x0}, {&(0x7f0000000340)=""/249, 0xf9}], 0x2}}], 0x1, 0x0, 0x0) 04:00:01 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x25d1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000080)="00000600000000000000", 0x0) ioctl$SG_EMULATED_HOST(r1, 0x2203, &(0x7f00000000c0)) write$binfmt_elf32(r1, 0x0, 0x0) execveat(r1, &(0x7f0000000000)='\x00', &(0x7f0000000280), 0x0, 0x1000) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 04:00:01 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) syz_execute_func(&(0x7f00000000c0)="64ff0941c3c4e2c9975842c4c27d794e0066420fe2e33e0f1110c442019dccd3193e66430f3a0ce397") clone(0x1a02100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet_MCAST_LEAVE_GROUP(r1, 0x0, 0x2d, &(0x7f0000000300)={0xfffffffffffffffc, {{0x2, 0x0, @local}}}, 0x88) write$binfmt_elf32(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="3c7901382e09a1db42c5473dcccc300dd52ab8e58e6e36bcfccd68889487b035fd402af09df400013f549f548c922d9891282c2db563a8e73836d45e8719b9cb117ea34708dcde502b01a02809eb27289feaa88175437eef3f0f5b011a536392081b17759f1fa95ca284db06e7b73f523f76be28d4d50c45ea27765446143c1f3fbe9508594de00e977829040268b7c4b5a697e91c18bc0ab5b5161e77b4b6a50da65d5ebb4a0096040965efd8acbdd9bf0a10e0e7c198328066a3957117f77befd41549aba11f033626a7396d0353be677e8e7e08ab492c9e5f170d8b8c5123112a3c19103d56c81658be36771a4d15ade91dc2d104cb4dbaaf71cd6f0272ac"], 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r1, 0x0, 0x61, 0x0, &(0x7f0000000040)) 04:00:01 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, 0x0, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000002000)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001000)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqsrc(r2, 0x0, 0x2000000000000004, &(0x7f0000013ff4)={@remote}, 0xc) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000340)={{{@in=@broadcast, @in=@broadcast, 0x0, 0x0, 0x200000000000000, 0x0, 0xa}}, {{@in6=@local, 0x0, 0x33}, 0x0, @in6=@local}}, 0xe8) close(r2) dup3(r0, r1, 0x0) 04:00:01 executing program 0: unshare(0x20020000) mkdir(&(0x7f0000000380)='./file0\x00', 0x0) r0 = socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f000025c000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = memfd_create(0x0, 0x0) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, &(0x7f0000000740)=""/214) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, r2) creat(0x0, 0x88) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x6) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f00000001c0)) ftruncate(0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(0xffffffffffffffff, 0x1261, &(0x7f0000000500)) sendmsg$key(r0, &(0x7f0000000000)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x2, 0x7, 0x0, 0x0, 0x2}, 0x10}}, 0x0) mkdir(&(0x7f0000000100)='./file1\x00', 0x4) 04:00:01 executing program 3: r0 = socket$unix(0x1, 0x3, 0x0) bind$unix(r0, &(0x7f000000f000)=@abs={0x1}, 0x8) getsockname(r0, 0x0, &(0x7f0000000080)) 04:00:01 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) getsockopt$inet6_int(r0, 0x29, 0xd1, &(0x7f0000000000), &(0x7f0000000100)=0x4) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) syz_execute_func(&(0x7f00000000c0)="64ff0941c3c4e2c9975842c4c27d794e0066420fe2e33e0f1110c442019dccd3193e66430f3a0ce397") clone(0x1a02100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet_MCAST_LEAVE_GROUP(r1, 0x0, 0x2d, &(0x7f0000000300)={0xfffffffffffffffc, {{0x2, 0x0, @local}}}, 0x88) write$binfmt_elf32(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB], 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r1, 0x0, 0x61, 0x0, &(0x7f0000000040)) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0x40106614, &(0x7f0000000140)={0x0, @aes256}) 04:00:01 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/attr/current\x00', 0x2, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x1b, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) setsockopt$inet6_udp_int(r1, 0x11, 0x1, &(0x7f00000001c0)=0x5, 0xfffffffffffffd7a) r2 = syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x119000) ioctl$PIO_FONTRESET(r2, 0x4b6d, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = dup2(r3, 0xffffffffffffffff) syz_open_dev$video4linux(&(0x7f0000000040)='/dev/v4l-subdev#\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000600)={r4, 0x10, &(0x7f0000000480)={&(0x7f0000000500)=""/224, 0xe0, 0xffffffffffffffff}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000640)=r5, 0x4) r6 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r7 = inotify_init1(0x0) r8 = inotify_init() openat(r1, &(0x7f0000000000)='./file0\x00', 0x420000, 0x10) ioctl$sock_bt_hidp_HIDPGETCONNINFO(r2, 0x800448d3, 0x0) fsetxattr$trusted_overlay_nlink(r6, &(0x7f0000000440)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x1) inotify_add_watch(r8, &(0x7f0000000280)='./file0\x00', 0x80000008) inotify_add_watch(r7, &(0x7f0000000180)='./file0\x00', 0xa400295c) r9 = open(&(0x7f00000004c0)='./file0\x00', 0x10000, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') getsockopt$inet_udp_int(r4, 0x11, 0x9, &(0x7f00000000c0), &(0x7f0000000100)=0xdf) r10 = dup2(r7, r9) setsockopt$EBT_SO_SET_ENTRIES(r10, 0x0, 0x80, 0x0, 0x2f7) ioctl$VIDIOC_SUBDEV_G_EDID(0xffffffffffffffff, 0xc0285628, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) 04:00:01 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) io_setup(0x100002000000105, &(0x7f0000000180)=0x0) io_submit(r2, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r1, &(0x7f0000000000), 0x10000}]) 04:00:01 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x25d1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000080)="00000600000000000000", 0x0) ioctl$SG_EMULATED_HOST(r1, 0x2203, &(0x7f00000000c0)) write$binfmt_elf32(r1, 0x0, 0x0) execveat(r1, &(0x7f0000000000)='\x00', &(0x7f0000000280), 0x0, 0x1000) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 04:00:01 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, 0x0, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000002000)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001000)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqsrc(r2, 0x0, 0x2000000000000004, &(0x7f0000013ff4)={@remote}, 0xc) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000340)={{{@in=@broadcast, @in=@broadcast, 0x0, 0x0, 0x80ffffff, 0x0, 0xa}}, {{@in6=@local, 0x0, 0x33}, 0x0, @in6=@local}}, 0xe8) close(r2) dup3(r0, r1, 0x0) 04:00:01 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8991, &(0x7f0000000000)={'bond0\x00', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000000)={'bond0\x00\x00\x00\x00\x00\x00`\x00', @ifru_names='bond_slave_1\x00'}) 04:00:01 executing program 2: r0 = socket$inet_tcp(0x2, 0x3, 0x6) bind$inet(r0, &(0x7f0000000340)={0x2, 0x0, @local}, 0x10) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) write$binfmt_script(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="2321202ed8e9344435308b02d2827fe7c18b9289"], 0x14) [ 384.478291] bond0: Releasing backup interface bond_slave_1 04:00:02 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x25d1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000080)="00000600000000000000", 0x0) ioctl$SG_EMULATED_HOST(r1, 0x2203, &(0x7f00000000c0)) write$binfmt_elf32(r1, 0x0, 0x0) execveat(r1, &(0x7f0000000000)='\x00', &(0x7f0000000280), 0x0, 0x1000) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 04:00:02 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = gettid() ioctl$sock_FIOSETOWN(r0, 0x8901, &(0x7f0000000000)=r1) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080), 0x1c) r2 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) syz_execute_func(&(0x7f00000000c0)="64ff0941c3c4e2c9975842c4c27d794e0066420fe2e33e0f1110c442019dccd3193e66430f3a0ce397") clone(0x1a02100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet_MCAST_LEAVE_GROUP(r2, 0x0, 0x2d, &(0x7f0000000300)={0xfffffffffffffffc, {{0x2, 0x0, @local}}}, 0x88) write$binfmt_elf32(r2, &(0x7f00000003c0)=ANY=[@ANYBLOB], 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r2, 0x0, 0x61, 0x0, &(0x7f0000000040)) 04:00:02 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, 0x0, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000002000)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001000)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqsrc(r2, 0x0, 0x2000000000000004, &(0x7f0000013ff4)={@remote}, 0xc) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000340)={{{@in=@broadcast, @in=@broadcast, 0x0, 0x0, 0x20000000, 0x0, 0xa}}, {{@in6=@local, 0x0, 0x33}, 0x0, @in6=@local}}, 0xe8) close(r2) dup3(r0, r1, 0x0) 04:00:02 executing program 0: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)="636c6561725f7265667300b04978e60c4ba32fd7b949714bcbe80c57af59747c61a31619cbafea034f5b6bb15332860b9f14c654d1012484f5c9d8edcad2f073e0ca5078fc64d38d1e297b9d66a71452b92cae675696216e08f21e87b8b54da0d1b5f3b4d6f8caf34a15ed2b2c98fcbf581297b31beafaffb76778a196ad93aa3d2d7a06720827") r1 = syz_open_procfs(0x0, &(0x7f0000000440)='statm\x00') sendfile(r0, r1, 0x0, 0x1) 04:00:02 executing program 2: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uhid\x00', 0x802, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000340)={0xb, 'syz0\x00', 'syz1\x00', "73797a300000000000000000000000000000000000000000000000000000000000000000200000000000000000000000000000000000000000000094fd00", 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 'G'}, 0x119) close(r0) 04:00:02 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x25d1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000080)="00000600000000000000", 0x0) ioctl$SG_EMULATED_HOST(r1, 0x2203, &(0x7f00000000c0)) write$binfmt_elf32(r1, &(0x7f0000000380)=ANY=[], 0x0) execveat(r1, &(0x7f0000000000)='\x00', &(0x7f0000000280), 0x0, 0x1000) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 04:00:02 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, 0x0, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000002000)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001000)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqsrc(r2, 0x0, 0x2000000000000004, &(0x7f0000013ff4)={@remote}, 0xc) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000340)={{{@in=@broadcast, @in=@broadcast, 0x0, 0x0, 0xff0f0000, 0x0, 0xa}}, {{@in6=@local, 0x0, 0x33}, 0x0, @in6=@local}}, 0xe8) close(r2) dup3(r0, r1, 0x0) [ 384.971729] hid-generic 0000:0000:0000.0001: item fetching failed at offset -646776831 04:00:02 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) ioctl$FIONREAD(r1, 0x5413, &(0x7f0000000040)) [ 385.046794] hid-generic: probe of 0000:0000:0000.0001 failed with error -22 [ 385.110791] bond0: Enslaving bond_slave_1 as an active interface with an up link 04:00:02 executing program 0: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x0) syz_open_dev$evdev(0x0, 0x0, 0x0) ioctl$EVIOCGID(r0, 0x80084502, &(0x7f0000000100)=""/175) 04:00:02 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, 0x0, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000002000)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001000)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqsrc(r2, 0x0, 0x2000000000000004, &(0x7f0000013ff4)={@remote}, 0xc) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000340)={{{@in=@broadcast, @in=@broadcast, 0x0, 0x0, 0xa4ffffff, 0x0, 0xa}}, {{@in6=@local, 0x0, 0x33}, 0x0, @in6=@local}}, 0xe8) close(r2) dup3(r0, r1, 0x0) [ 385.249880] bond0: Releasing backup interface bond_slave_1 04:00:03 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080), 0x1c) io_setup(0x7ab, &(0x7f0000000000)=0x0) r2 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vhci\x00', 0x20000, 0x0) io_submit(r1, 0x3, &(0x7f0000001440)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x3, 0x34, r0, &(0x7f00000003c0)="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", 0x1000, 0x7, 0x0, 0x0, 0xffffffffffffff9c}, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x6, 0x0, r0, &(0x7f0000000140)="c5a0ca973468163127ab4ea96749fda41ee3b2f952f8aa98ef627317a227313e0f4f05761ccc8ff733506c177906cd83acd46a687c605e80c861939c87999f0e5192d463d6c6a15c181aa4c2414cf8c62e83e6c0ae6709d79b7d8d85b29fb6cdfb060d6dfa9d8dd4cefd240f1438a5e03e882a47e0447ed51520e1dc150b47c6c40ed4f7405ba0dd57cef7e4c0fc6147a4981b9b1ee8dea326e6902363ae211cb97bb8d758ed53e80c0dc5c17b8844fb90b593af703863db9804e200052e6948f6fc5bc0db170a7d47118847c581ab068c42e48d9756bf80249ea560cd6aeb8811a529108174a84bf370", 0xea, 0x4, 0x0, 0x0, r2}, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x3, 0x7ec, r0, &(0x7f00000013c0)="ce9858012c8f958fe8fd37178e88d3865f5e8a33236057c341febbc4d26012b86c3a1ed32496b9a86c9cd22812ca9db4e92429de6c9a79c4d392198b346e6f57c0f5bc2faed977e13b7720c83ebf169c0f5d688ba907b3a239a35b901af1fc9d084dc34164b99cdfbdf796", 0x6b, 0x400, 0x0, 0x3, r0}]) symlink(&(0x7f0000001500)='./file0\x00', &(0x7f0000001540)='./file0\x00') r3 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000440), 0x131f64) syz_execute_func(&(0x7f00000000c0)="64ff0941c3c4e2c9975842c4c27d794e0066420fe2e33e0f1110c442019dccd3193e66430f3a0ce397") clone(0x1a02100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet_MCAST_LEAVE_GROUP(r3, 0x0, 0x2d, &(0x7f0000000300)={0xfffffffffffffffc, {{0x2, 0x0, @local}}}, 0x88) write$binfmt_elf32(r3, &(0x7f0000001580)=ANY=[@ANYBLOB="ab08d6b8d69766d56761333345c93d0f9143930efbf70a3a9928288981299087cd9d04a5a467336f459619836198266430fb6bfc3188bb61850b064fa95e02fe17143dc562f20d35f34b814b4e6c6ee81457173a6fd1d13c8bfc2326b1039f47f43c145c94f6982a7f9cb1231ff1ee21ed9a31c33960a894366b55dd5461f2b97d7540cc0d09c29a6d90790596bde35ca48c989819551a19635cb4cc36a18437b4280b1333cdeb1d172fe082cf7971ac4a51a847748c697ee60c01866e5b01069be43b4af28e099fc43a8bd2906a2fb8ac4defca6c0d0fd9"], 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r3, 0x0, 0x61, 0x0, &(0x7f0000000040)) 04:00:03 executing program 3: socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000400)=ANY=[], &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, &(0x7f00000002c0)) r3 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', r5, 0x0) setpgid(r4, r4) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000940)={{}, {}, [{0x2, 0x2, r5}], {0x4, 0x7}, [{0x8, 0x2, r6}, {0x8, 0x2, r6}, {0x8, 0x2}, {0x8, 0x4, r6}, {0x8, 0x0, r6}], {0x10, 0x2}}, 0x54, 0x1) chdir(&(0x7f0000000340)='./file0\x00') symlink(&(0x7f0000000800)='./file0/file0\x00', &(0x7f00000007c0)='./file0\x00') sendmsg$FOU_CMD_ADD(r3, &(0x7f0000000900)={&(0x7f00000002c0), 0xc, &(0x7f0000000480)={&(0x7f00000000c0)=ANY=[@ANYBLOB="000029bd7000fddbdf2501000000"], 0x1}}, 0x0) clone(0x2102001ffa, 0x0, 0xfffffffffffffffe, &(0x7f00000008c0), 0xffffffffffffffff) lstat(&(0x7f0000000600)='./file0/file0\x00', &(0x7f0000000680)) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f0000000080)) r7 = syz_genetlink_get_family_id$team(&(0x7f0000000100)='team\x00') accept4$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000003c0)=0x14, 0x80000) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, 0x0) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f00000004c0)={{{@in6=@remote, @in6=@dev}}, {{@in=@broadcast}, 0x0, @in=@dev}}, &(0x7f00000005c0)=0xe8) accept$packet(r3, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000700)=0x14) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000740)={0x0, @multicast2, @empty}, &(0x7f0000000780)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000000a80)={{{@in=@broadcast, @in=@local}}, {{@in=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000b80)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000000d40)={{{@in=@multicast2, @in=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@remote}}, &(0x7f0000000e40)=0xe8) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000000e80)={0x0, @multicast2, @broadcast}, &(0x7f0000000ec0)=0xc) accept$packet(r3, &(0x7f0000001100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001140)=0x14) accept$packet(r3, &(0x7f0000001240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000001280)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000001400)={{{@in6=@loopback}}, {{@in=@broadcast}, 0x0, @in=@multicast2}}, &(0x7f0000001500)=0xe8) sendmsg$TEAM_CMD_NOOP(r3, &(0x7f0000001a80)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x440012}, 0xc, &(0x7f0000001a40)={&(0x7f0000001540)={0x20, r7, 0x2, 0x70bd28, 0x25dfdbfb, {}, [{{0x8}, {0x4}}]}, 0x20}}, 0x0) 04:00:03 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x1) r1 = syz_open_dev$evdev(0x0, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x26e1, 0x0) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r3, &(0x7f0000000080), 0x1c) r4 = dup2(r3, r3) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r4, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0x4) dup2(r1, r0) 04:00:03 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x25d1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000080)="00000600000000000000", 0x0) ioctl$SG_EMULATED_HOST(r1, 0x2203, &(0x7f00000000c0)) write$binfmt_elf32(r1, &(0x7f0000000380)=ANY=[], 0x0) execveat(r1, &(0x7f0000000000)='\x00', &(0x7f0000000280), 0x0, 0x1000) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 04:00:03 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, 0x0, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000002000)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001000)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqsrc(r2, 0x0, 0x2000000000000004, &(0x7f0000013ff4)={@remote}, 0xc) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000340)={{{@in=@broadcast, @in=@broadcast, 0x0, 0x0, 0xff0f, 0x0, 0xa}}, {{@in6=@local, 0x0, 0x33}, 0x0, @in6=@local}}, 0xe8) close(r2) dup3(r0, r1, 0x0) 04:00:03 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x0, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f00000001c0)={0x0, 0x3}, 0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000640)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x8}, &(0x7f0000000200)={0x0, r1+30000000}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) sendmmsg(r2, &(0x7f0000007e00), 0x400000000000087, 0x0) [ 385.514697] bond0: Enslaving bond_slave_1 as an active interface with an up link 04:00:03 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080), 0x1c) openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/attr/current\x00', 0x2, 0x0) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) syz_execute_func(&(0x7f00000000c0)="64ff0941c3c4e2c9975842c4c27d794e0066420fe2e33e0f1110c442019dccd3193e66430f3a0ce397") clone(0x1a02100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet_MCAST_LEAVE_GROUP(r1, 0x0, 0x2d, &(0x7f0000000300)={0xfffffffffffffffc, {{0x2, 0x0, @local}}}, 0x88) write$binfmt_elf32(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB], 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r1, 0x0, 0x61, 0x0, &(0x7f0000000040)) 04:00:03 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) syz_execute_func(&(0x7f00000000c0)="64ff0941c3c4e2c9975842c4c27d794e0066420fe2e33e0f1110c442019dccd3193e66430f3a0ce397") clone(0x1a02100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet_MCAST_LEAVE_GROUP(r1, 0x0, 0x2d, &(0x7f0000000300)={0xfffffffffffffffc, {{0x2, 0x0, @local}}}, 0x88) write$binfmt_elf32(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="03008be02adf4d62e6045f8176d56b3e51022a627f3f9c0ce68c3a91c537bf096e9754d7c3d385d1f7ce207bdf16f8a465dd9c0b8d907d51bd119750a8719b62002d51ab13b587e8ac37f1639784fbed5eec5697bb6578dd4a33324d9587d97f9cb74424b6186da0b40654e8a46c4da6b727ee178f57af"], 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r1, 0x0, 0x61, 0x0, &(0x7f0000000040)) write$binfmt_elf64(r0, &(0x7f00000003c0)={{0x7f, 0x45, 0x4c, 0x46, 0x4, 0x6, 0x80000001, 0x4, 0xba4, 0x3, 0x3, 0x1, 0x62, 0x40, 0x363, 0x6, 0x9, 0x38, 0x1, 0x4, 0x5, 0x81}, [{0x7, 0x3, 0xfb2, 0xdd9, 0x401, 0x8001, 0xfffffffeffffffff, 0x1ab9cfb}, {0x4, 0x2, 0xff, 0x1, 0x3ff, 0x101, 0x0, 0x9}], "bbbac3e7e87dce24c92b78d09ca25b6322e0d41748fd113e43dfbb6e502b85d039b9b56f310c11650859a9816937d04813c8dc704025e7c61e420457a80eab054675dae20eaf694a129b557e75019409c1f8fe6dd10f8ed535e064d0c2cbf62be2540983cf732320f43379f5ef990410b10391608c46ef0d2160272afa24c0c0f4cc0ff43bc5c39ee5352ccdd29d51de8bc5bc4dcaec8883e853654a70e5910ea70330355970556b6b38a00c8a53d96a01ef95cc4c1cd1d0750a870f6feeaf448ed5e0d1732bfe2423d0bc02d135c24695ffc72226771fb9d0dfb33b", [[]]}, 0x28c) 04:00:03 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) syz_execute_func(&(0x7f00000000c0)="64ff0941c3c4e2c9975842c4c27d794e0066420fe2e33e0f1110c442019dccd3193e66430f3a0ce397") clone(0x1a02100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet_MCAST_LEAVE_GROUP(r1, 0x0, 0x2d, &(0x7f0000000300)={0xfffffffffffffffc, {{0x2, 0x0, @local}}}, 0x88) write$binfmt_elf32(r1, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r1, 0x0, 0x61, 0x0, &(0x7f0000000040)) 04:00:03 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, 0x0, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000002000)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001000)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqsrc(r2, 0x0, 0x2000000000000004, &(0x7f0000013ff4)={@remote}, 0xc) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000340)={{{@in=@broadcast, @in=@broadcast, 0x0, 0x0, 0xffffff80, 0x0, 0xa}}, {{@in6=@local, 0x0, 0x33}, 0x0, @in6=@local}}, 0xe8) close(r2) dup3(r0, r1, 0x0) 04:00:03 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) ioctl$sock_inet_SIOCSARP(r1, 0x8955, &(0x7f0000000100)={{0x2, 0x4e22, @loopback}, {0x1, @broadcast}, 0x2, {0x2, 0x4e20, @remote}, 'ipddp0\x00'}) syz_execute_func(&(0x7f00000000c0)="64ff0941c3c4e2c9975842c4c27d794e0066420fe2e33e0f1110c442019dccd3193e66430f3a0ce397") clone(0x1a02100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet_MCAST_LEAVE_GROUP(r1, 0x0, 0x2d, &(0x7f0000000300)={0xfffffffffffffffc, {{0x2, 0x0, @local}}}, 0x88) write$binfmt_elf32(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB], 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r1, 0x0, 0x61, 0x0, &(0x7f0000000040)) 04:00:03 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x25d1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000080)="00000600000000000000", 0x0) ioctl$SG_EMULATED_HOST(r1, 0x2203, &(0x7f00000000c0)) write$binfmt_elf32(r1, &(0x7f0000000380)=ANY=[], 0x0) execveat(r1, &(0x7f0000000000)='\x00', &(0x7f0000000280), 0x0, 0x1000) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 04:00:03 executing program 3: socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000400)=ANY=[], &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, &(0x7f00000002c0)) r3 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', r5, 0x0) setpgid(r4, r4) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000940)={{}, {}, [{0x2, 0x2, r5}], {0x4, 0x7}, [{0x8, 0x2, r6}, {0x8, 0x2, r6}, {0x8, 0x2}, {0x8, 0x4, r6}, {0x8, 0x0, r6}], {0x10, 0x2}}, 0x54, 0x1) chdir(&(0x7f0000000340)='./file0\x00') symlink(&(0x7f0000000800)='./file0/file0\x00', &(0x7f00000007c0)='./file0\x00') sendmsg$FOU_CMD_ADD(r3, &(0x7f0000000900)={&(0x7f00000002c0), 0xc, &(0x7f0000000480)={&(0x7f00000000c0)=ANY=[@ANYBLOB="000029bd7000fddbdf2501000000"], 0x1}}, 0x0) clone(0x2102001ffa, 0x0, 0xfffffffffffffffe, &(0x7f00000008c0), 0xffffffffffffffff) lstat(&(0x7f0000000600)='./file0/file0\x00', &(0x7f0000000680)) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f0000000080)) r7 = syz_genetlink_get_family_id$team(&(0x7f0000000100)='team\x00') accept4$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000003c0)=0x14, 0x80000) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, 0x0) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f00000004c0)={{{@in6=@remote, @in6=@dev}}, {{@in=@broadcast}, 0x0, @in=@dev}}, &(0x7f00000005c0)=0xe8) accept$packet(r3, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000700)=0x14) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000740)={0x0, @multicast2, @empty}, &(0x7f0000000780)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000000a80)={{{@in=@broadcast, @in=@local}}, {{@in=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000b80)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000000d40)={{{@in=@multicast2, @in=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@remote}}, &(0x7f0000000e40)=0xe8) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000000e80)={0x0, @multicast2, @broadcast}, &(0x7f0000000ec0)=0xc) accept$packet(r3, &(0x7f0000001100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001140)=0x14) accept$packet(r3, &(0x7f0000001240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000001280)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000001400)={{{@in6=@loopback}}, {{@in=@broadcast}, 0x0, @in=@multicast2}}, &(0x7f0000001500)=0xe8) sendmsg$TEAM_CMD_NOOP(r3, &(0x7f0000001a80)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x440012}, 0xc, &(0x7f0000001a40)={&(0x7f0000001540)={0x20, r7, 0x2, 0x70bd28, 0x25dfdbfb, {}, [{{0x8}, {0x4}}]}, 0x20}}, 0x0) 04:00:03 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, 0x0, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000002000)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001000)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqsrc(r2, 0x0, 0x2000000000000004, &(0x7f0000013ff4)={@remote}, 0xc) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000340)={{{@in=@broadcast, @in=@broadcast, 0x0, 0x0, 0x2, 0x0, 0xa}}, {{@in6=@local, 0x0, 0x33}, 0x0, @in6=@local}}, 0xe8) close(r2) dup3(r0, r1, 0x0) 04:00:03 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x0, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f00000001c0)={0x0, 0x3}, 0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000640)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x8}, &(0x7f0000000200)={0x0, r1+30000000}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) sendmmsg(r2, &(0x7f0000007e00), 0x400000000000087, 0x0) 04:00:03 executing program 2: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0xa, 0x200000000000005, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net//..\x00', 0x314ea2ec15e387bd, 0x0) 04:00:03 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) syz_execute_func(&(0x7f00000000c0)="64ff0941c3c4e2c9975842c4c27d794e0066420fe2e33e0f1110c442019dccd3193e66430f3a0ce397") clone(0x1a02100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet_MCAST_LEAVE_GROUP(r1, 0x0, 0x2d, &(0x7f0000000300)={0xfffffffffffffffc, {{0x2, 0x0, @local}}}, 0x88) write$binfmt_elf32(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="27898931c87f2fb343d492dd374843c901bf14dfb3a294b1f92de112abc6e7470a1a48fecad73f314a8ea9662f0590bcc5daf3a25eb37367f1913726f938f5ef2063d49a385db6f84a35613a83edf7dc80792c997bef6a63cf4e19c2d716d5d3d6d7c5be0934469eb5b40e111749266775f6618060f6f991b933790f37dac8e08d8d50035064a88f8c5bfbaceb771e18b627bfeae16f669e1c6a70fb2f8b98e501c5343feb48"], 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r1, 0x0, 0x61, 0x0, &(0x7f0000000040)) ioctl$sock_inet6_tcp_SIOCATMARK(r1, 0x8905, &(0x7f0000000000)) 04:00:03 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) syz_execute_func(&(0x7f0000000000)="64ff0941c3c4e2c9975842c4c27d794e0066420fe2e33e0f1110c442019dccd3193e66430f3a0ce397") ioctl$VIDIOC_G_OUTPUT(r1, 0x8004562e, &(0x7f00000000c0)) clone(0x1a02100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet_MCAST_LEAVE_GROUP(r1, 0x0, 0x2d, &(0x7f0000000300)={0xfffffffffffffffc, {{0x2, 0x0, @local}}}, 0x88) write$binfmt_elf32(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="1dab6ce9475dc8fef87f7f101b5a334e7ef5911f8b0f6ed460c950b5f85de6ba4f9b710c601c21338b4cb9502ef3435d66a2278cf47870824715ae970b"], 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r1, 0x0, 0x61, 0x0, &(0x7f0000000040)) ioctl$VT_ACTIVATE(r1, 0x5606, 0x8) 04:00:03 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f0000000480)=""/11, 0xb) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000012c0)={0xffffffffffffffff, 0xffffffffffffffff}) syz_execute_func(&(0x7f00000002c0)="3666440f50f564ff0941c3c4e2c9975842c4c27d794e0066420fe2e33e0f1110c442019dccd3196f") recvmmsg(r2, &(0x7f0000004380)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) write$binfmt_elf64(r2, 0x0, 0x0) ioctl$PIO_SCRNMAP(r0, 0x4b41, 0x0) dup2(r0, r1) 04:00:03 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, 0x0, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000002000)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001000)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqsrc(r2, 0x0, 0x2000000000000004, &(0x7f0000013ff4)={@remote}, 0xc) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000340)={{{@in=@broadcast, @in=@broadcast, 0x0, 0x0, 0xa4ffffff00000000, 0x0, 0xa}}, {{@in6=@local, 0x0, 0x33}, 0x0, @in6=@local}}, 0xe8) close(r2) dup3(r0, r1, 0x0) 04:00:03 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup(r0) ioctl$VIDIOC_SUBSCRIBE_EVENT(r1, 0x4020565a, &(0x7f0000000000)={0x1, 0x6, 0x2}) r2 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) syz_execute_func(&(0x7f00000000c0)="64ff0941c3c4e2c9975842c4c27d794e0066420fe2e33e0f1110c442019dccd3193e66430f3a0ce397") clone(0x1a02100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet_MCAST_LEAVE_GROUP(r2, 0x0, 0x2d, &(0x7f0000000300)={0xfffffffffffffffc, {{0x2, 0x0, @local}}}, 0x88) write$binfmt_elf32(r2, &(0x7f00000003c0)=ANY=[@ANYBLOB], 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r2, 0x0, 0x61, 0x0, &(0x7f0000000040)) 04:00:03 executing program 3: socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000400)=ANY=[], &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, &(0x7f00000002c0)) r3 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', r5, 0x0) setpgid(r4, r4) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000940)={{}, {}, [{0x2, 0x2, r5}], {0x4, 0x7}, [{0x8, 0x2, r6}, {0x8, 0x2, r6}, {0x8, 0x2}, {0x8, 0x4, r6}, {0x8, 0x0, r6}], {0x10, 0x2}}, 0x54, 0x1) chdir(&(0x7f0000000340)='./file0\x00') symlink(&(0x7f0000000800)='./file0/file0\x00', &(0x7f00000007c0)='./file0\x00') sendmsg$FOU_CMD_ADD(r3, &(0x7f0000000900)={&(0x7f00000002c0), 0xc, &(0x7f0000000480)={&(0x7f00000000c0)=ANY=[@ANYBLOB="000029bd7000fddbdf2501000000"], 0x1}}, 0x0) clone(0x2102001ffa, 0x0, 0xfffffffffffffffe, &(0x7f00000008c0), 0xffffffffffffffff) lstat(&(0x7f0000000600)='./file0/file0\x00', &(0x7f0000000680)) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f0000000080)) r7 = syz_genetlink_get_family_id$team(&(0x7f0000000100)='team\x00') accept4$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000003c0)=0x14, 0x80000) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, 0x0) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f00000004c0)={{{@in6=@remote, @in6=@dev}}, {{@in=@broadcast}, 0x0, @in=@dev}}, &(0x7f00000005c0)=0xe8) accept$packet(r3, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000700)=0x14) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000740)={0x0, @multicast2, @empty}, &(0x7f0000000780)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000000a80)={{{@in=@broadcast, @in=@local}}, {{@in=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000b80)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000000d40)={{{@in=@multicast2, @in=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@remote}}, &(0x7f0000000e40)=0xe8) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000000e80)={0x0, @multicast2, @broadcast}, &(0x7f0000000ec0)=0xc) accept$packet(r3, &(0x7f0000001100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001140)=0x14) accept$packet(r3, &(0x7f0000001240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000001280)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000001400)={{{@in6=@loopback}}, {{@in=@broadcast}, 0x0, @in=@multicast2}}, &(0x7f0000001500)=0xe8) sendmsg$TEAM_CMD_NOOP(r3, &(0x7f0000001a80)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x440012}, 0xc, &(0x7f0000001a40)={&(0x7f0000001540)={0x20, r7, 0x2, 0x70bd28, 0x25dfdbfb, {}, [{{0x8}, {0x4}}]}, 0x20}}, 0x0) 04:00:03 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) syz_execute_func(&(0x7f0000000100)="64ff0941c3c4e2c9975842c4c27d794e0066420fe2e33e0f1110c442019dccd3193e66430f3a0ce397") clone(0x1a02100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet_MCAST_LEAVE_GROUP(r1, 0x0, 0x2d, &(0x7f0000000300)={0xfffffffffffffffc, {{0x2, 0x0, @local}}}, 0x88) write$binfmt_elf32(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB], 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r1, 0x0, 0x61, 0x0, &(0x7f0000000040)) 04:00:04 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x25d1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000080)="00000600000000000000", 0x0) ioctl$SG_EMULATED_HOST(r1, 0x2203, &(0x7f00000000c0)) write$binfmt_elf32(r1, &(0x7f0000000380)=ANY=[@ANYBLOB], 0x0) execveat(r1, &(0x7f0000000000)='\x00', &(0x7f0000000280), 0x0, 0x1000) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 04:00:04 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8915, &(0x7f00000001c0)={'teql0\x00', @ifru_data=&(0x7f0000000080)="a5de9f0c90fe966a1fd1cde5d8c3dbe3f399f019b161f2cb9c50ab5a1c06cc05"}) r1 = dup2(r0, r0) write$binfmt_elf32(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="7f454c467f86a5ff308782480000000003003f0080ffffffcd000000380000004d03000003000000e1ff2000020063f201041900000000001700000005000000010400000101000003000000ffffff7fcdf00000080000007447308d38b3430856945caec628c368bdb999b5c8657bec679eb0506b81103f3b938a0dadf47ef01d711f3ad46f410191c7851036d82770ffd378526df5673614f2ad675817115f6a3747dd5d230000000009000000000000000000"], 0xb6) getsockopt$IP_VS_SO_GET_TIMEOUT(r1, 0x0, 0x486, &(0x7f00000002c0), &(0x7f00000003c0)=0xc) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x6bfbb) syz_execute_func(&(0x7f00000000c0)="64ff0941c3c4e2c9975842c4c27d794e0066420fe2e33e0f1110c442019dccd3193e66430f3a0ce397") clone(0x1a02100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet_MCAST_LEAVE_GROUP(r1, 0x0, 0x2d, &(0x7f0000000300)={0xfffffffffffffffc, {{0x2, 0x0, @local}}}, 0x88) write$binfmt_elf32(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB], 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r1, 0x0, 0x61, 0x0, &(0x7f0000000040)) connect$l2tp(r1, &(0x7f0000000000)=@pppol2tpin6={0x18, 0x1, {0x0, r1, 0x1, 0x4, 0x0, 0x3, {0xa, 0x4e20, 0x2, @loopback, 0x5}}}, 0x32) r2 = semget$private(0x0, 0x2, 0x203) semctl$GETNCNT(r2, 0x1, 0xe, &(0x7f0000000200)=""/142) 04:00:04 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, 0x0, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000002000)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001000)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqsrc(r2, 0x0, 0x2000000000000004, &(0x7f0000013ff4)={@remote}, 0xc) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000340)={{{@in=@broadcast, @in=@broadcast, 0x0, 0x0, 0x80ffffff00000000, 0x0, 0xa}}, {{@in6=@local, 0x0, 0x33}, 0x0, @in6=@local}}, 0xe8) close(r2) dup3(r0, r1, 0x0) 04:00:04 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) ioctl$FIONREAD(r1, 0x541d, 0x0) 04:00:04 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x0, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f00000001c0)={0x0, 0x3}, 0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000640)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x8}, &(0x7f0000000200)={0x0, r1+30000000}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) sendmmsg(r2, &(0x7f0000007e00), 0x400000000000087, 0x0) 04:00:04 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) syz_execute_func(&(0x7f00000000c0)="64ff0941c3c4e2c9975842c4c27d794e0066420fe2e33e0f1110c442019dccd3193e66430f3a0ce397") clone(0x1a02100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet_MCAST_LEAVE_GROUP(r1, 0x0, 0x2d, &(0x7f0000000300)={0xfffffffffffffffc, {{0x2, 0x0, @local}}}, 0x88) r2 = getpgrp(0x0) process_vm_readv(r2, &(0x7f0000000640)=[{&(0x7f0000000000)=""/50, 0x32}, {&(0x7f0000000100)=""/183, 0xb7}, {&(0x7f00000001c0)=""/127, 0x7f}, {&(0x7f0000000240)=""/116, 0x74}, {&(0x7f00000002c0)=""/59, 0x3b}, {&(0x7f00000003c0)=""/109, 0x6d}, {&(0x7f0000000440)=""/93, 0x5d}, {&(0x7f00000004c0)=""/223, 0xdf}, {&(0x7f00000005c0)=""/53, 0x35}, {&(0x7f0000000600)=""/27, 0x1b}], 0xa, &(0x7f00000007c0)=[{&(0x7f0000000700)=""/78, 0x4e}, {&(0x7f0000000780)}], 0x2, 0x0) write$binfmt_elf32(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB], 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r1, 0x0, 0x61, 0x0, &(0x7f0000000040)) 04:00:04 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, 0x0, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000002000)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001000)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqsrc(r2, 0x0, 0x2000000000000004, &(0x7f0000013ff4)={@remote}, 0xc) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000340)={{{@in=@broadcast, @in=@broadcast, 0x0, 0x0, 0xffffffff00000000, 0x0, 0xa}}, {{@in6=@local, 0x0, 0x33}, 0x0, @in6=@local}}, 0xe8) close(r2) dup3(r0, r1, 0x0) 04:00:04 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080), 0x1c) socket$inet6(0xa, 0x7b54e0c941501c3e, 0xfffffffffffffffb) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) syz_execute_func(&(0x7f00000000c0)="64ff0941c3c4e2c9975842c4c27d794e0066420fe2e33e0f1110c442019dccd3193e66430f3a0ce397") clone(0x1a02100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet_MCAST_LEAVE_GROUP(r1, 0x0, 0x2d, &(0x7f0000000300)={0xfffffffffffffffc, {{0x2, 0x0, @local}}}, 0x88) write$binfmt_elf32(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8d1e993380fc936770558271c378fd3582fa1e6066d05c7470ec2a93885913b630e1085ff45bbf27c934882a701d06172f00ec493da42ff95b005423a9fbba33ebc5ca7e4bb8cdb8f1d435e5fa39279ebc381098f3779fdb83df4b78abe7cb4a2624fd992e77078d2e6f932e9d936e5513655992139dfe1c63ac1ee1daea39fb2fdaa546654c7cf9010c07b8e592dc826476e390f27a3a8b3a53d026ca702dd42be0ce4d29fb747251e1ae2857fb28a07e099022609ece93bb6b44f0884ffebe111ae6ed74ea284329f7b57cf9d37216aeeb54a93eb3e12b0f742168d781bd"], 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r1, 0x0, 0x61, 0x0, &(0x7f0000000040)) 04:00:04 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x25d1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000080)="00000600000000000000", 0x0) ioctl$SG_EMULATED_HOST(r1, 0x2203, &(0x7f00000000c0)) write$binfmt_elf32(r1, &(0x7f0000000380)=ANY=[@ANYBLOB], 0x0) execveat(r1, &(0x7f0000000000)='\x00', &(0x7f0000000280), 0x0, 0x1000) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 04:00:04 executing program 2: openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) keyctl$read(0xb, 0xfffffffffffffffd, &(0x7f0000000000)=""/4, 0xfffffffffffffd5c) 04:00:04 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, 0x0, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000002000)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001000)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqsrc(r2, 0x0, 0x2000000000000004, &(0x7f0000013ff4)={@remote}, 0xc) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000340)={{{@in=@broadcast, @in=@broadcast, 0x0, 0x0, 0x3000000, 0x0, 0xa}}, {{@in6=@local, 0x0, 0x33}, 0x0, @in6=@local}}, 0xe8) close(r2) dup3(r0, r1, 0x0) 04:00:04 executing program 3: unshare(0x0) mkdir(&(0x7f0000000380)='./file0\x00', 0x0) r0 = socket$key(0xf, 0x3, 0x2) r1 = perf_event_open(&(0x7f000025c000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x6) ftruncate(0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(0xffffffffffffffff, 0x1261, &(0x7f0000000500)) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) sendmsg$key(r0, &(0x7f0000000000)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x2, 0x7, 0x0, 0x0, 0x2}, 0x10}}, 0x0) mkdir(&(0x7f0000000100)='./file1\x00', 0x4) 04:00:04 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) syz_execute_func(&(0x7f0000000000)="64ff0941c3c4e2c9975842c4c27d794e0066420fe2e33e0f1110c442019dccd3193e66430f3a0ce397") clone(0x1a02100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet_MCAST_LEAVE_GROUP(r1, 0x0, 0x2d, &(0x7f0000000300)={0xfffffffffffffffc, {{0x2, 0x0, @local}}}, 0x88) write$binfmt_elf32(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB], 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r1, 0x0, 0x61, 0x0, &(0x7f0000000040)) 04:00:04 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) syz_execute_func(&(0x7f00000000c0)="64ff0941c3c4e2c9975842c4c27d794e0066420fe2e33e0f1110c442019dccd3193e66430f3a0ce397") clone(0x1a02100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet_MCAST_LEAVE_GROUP(r1, 0x0, 0x2d, &(0x7f0000000300)={0xfffffffffffffffc, {{0x2, 0x0, @local}}}, 0x88) write$binfmt_elf32(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="41edbbf2dcb88510a977bc058c1656cd268e93c4312986e05beed4001ece9158cb766bff625c6143b57ecafa961f1d5d6978789e3a2060c61cb9329342d9b4b37bf2f0b7eaded6f0758cb200800000b55e6cdace"], 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r1, 0x0, 0x61, 0x0, &(0x7f0000000040)) 04:00:04 executing program 2: r0 = socket$inet6(0xa, 0x400000000000803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000006c0)="0a5c2d023c126285718070") mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0xc, 0x32, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x8000000003c) connect$inet6(r1, &(0x7f00000002c0)={0xa, 0x0, 0x0, @dev, 0x9}, 0x1c) sendmsg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="2c7c579a7ae9c96d5cc9ad926a3eea1cf89515d52fc4300c0d33f21c491f50289b7a492cc0c90f234201a5c6f9b830f910b1902ed60d51ad019c73fc9065aa2c519f654874b01f87db4a2807b6a2c2532e9d54e219c9c5f95f", 0x59}], 0x1}, 0xc100) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, 0x0, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000440)="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", 0x257}], 0x1}, 0x8000) socket$packet(0x11, 0x2, 0x300) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001480)="d09a0e63c9476288b671afdbd53a5994e137381f62021d1951b627b8dda57a5d17d744648c81c5703ed8146ab1b0171f89091b1dd3238d03dbb686df460963245dedf2973ee555af99499e44ad420dbf65fd46fbc99a1274429e2d5783751815828ec8cb3553110cca66460215353d19f6d8bbd8fb264eddea60b18e16c31aa5e200000491634ac2fd10e2cd30bcd7fede24263a7fff16e53ea293f3551b7147c33a44ea437fb1515c3e8d4f162fdebf8ebe11ae6fcd9372c8d8f19556ae091fe94215ae9434da412f6fa4cb6561e5f78ff9707844ee5d573fb294437722d9a06dfa61748c32c73d759933a8dd344c947d3efdbe90d0eb049df5fbb0c19f6785264b619c530d97395d44b04f7e2a280d658c7871ad373b792678c49227999651ef3b2ee1bc2b8f3035db376e8e09aa3837233c8713065a8ad131d24f6c42a3220d0e07c3d3e95d59a5dd10c09716b5f874ecf53aadfa5050ff40f2c3c4a629b6445e5836100afff5a8977583653b40ca316f8f11416e5c1bd5499636ddae25fc4970b37209cf5c0bf8e432160c258d14223baa52798e09858645773dd97e68a95310da713cff077b06000000d4f145e9199c126a7f235e5674a3c7f5c7129ac7c1a3319590249b6d34ef6c3d8b94c6fc7cdcbddb053243053f7bc1f230d3bc7dfc4359e33992d0a3946b914a093287a76ac4a249b5b86cc75476466e409553355fefab75e9268a8751ffc9481fcff1f49c475699595b315e2147ee038b7291600c6b1cf7c8f24d587b9464a67e5ccec17820e711b98f4f7d5053642068a3fff704c3fe26ba862b53e2622d6e8b4a4c815fb2ea90ef63e141209dd292fdf886ee3e64b90f47ce22661c7a21f7bc10df0248079b7be17284eb54e5ab5bde9c6857b3cb184586049e7741b2d8b5b1a19e99e1834a25959155720c1c0ef84d7b3c42e1ba282847d476cef0228b1422aba08e5f3c1cd279bbd1c5303c2e9c16a0da4f88f770fca118b09e92b51a33970e32ade003000000", 0x2d5}], 0x1}, 0x0) [ 387.667443] cgroup: fork rejected by pids controller in /syz1 04:00:05 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x0, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f00000001c0)={0x0, 0x3}, 0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000640)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x8}, &(0x7f0000000200)={0x0, r1+30000000}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) sendmmsg(r2, &(0x7f0000007e00), 0x400000000000087, 0x0) 04:00:05 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, 0x0, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000002000)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001000)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqsrc(r2, 0x0, 0x2000000000000004, &(0x7f0000013ff4)={@remote}, 0xc) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000340)={{{@in=@broadcast, @in=@broadcast, 0x0, 0x0, 0x2000000, 0x0, 0xa}}, {{@in6=@local, 0x0, 0x33}, 0x0, @in6=@local}}, 0xe8) close(r2) dup3(r0, r1, 0x0) 04:00:05 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x25d1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000080)="00000600000000000000", 0x0) ioctl$SG_EMULATED_HOST(r1, 0x2203, &(0x7f00000000c0)) write$binfmt_elf32(r1, &(0x7f0000000380)=ANY=[@ANYBLOB], 0x0) execveat(r1, &(0x7f0000000000)='\x00', &(0x7f0000000280), 0x0, 0x1000) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 04:00:05 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) syz_execute_func(&(0x7f00000000c0)="64ff0941c3c4e2c9975842c4c27d794e0066420fe2e33e0f1110c442019dccd3193e66430f3a0ce397") clone(0x80000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet_MCAST_LEAVE_GROUP(r1, 0x0, 0x2d, &(0x7f0000000300)={0xfffffffffffffffc, {{0x2, 0x0, @local}}}, 0x88) write$binfmt_elf32(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="60b1ddb73699ce062e102e1822c3c6615ca9284368a900a7769683472858a2829b5155ce0cad1f62e3236fc2bb22f84b253db6c00f9361f432138cd2c2f0e8326db05c1607f8d7b3e25d37993f704394c1dcc266ff98c10622e5dc57e98a4dacf7dfc844a04513bbdcb722fa711f81ce19223b9b1078195f07dac8bf"], 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r1, 0x0, 0x61, 0x0, &(0x7f0000000040)) 04:00:05 executing program 2: r0 = socket$inet6(0xa, 0x400000000000803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000006c0)="0a5c2d023c126285718070") mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0xc, 0x32, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x8000000003c) connect$inet6(r1, &(0x7f00000002c0)={0xa, 0x0, 0x0, @dev, 0x9}, 0x1c) sendmsg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="2c7c579a7ae9c96d5cc9ad926a3eea1cf89515d52fc4300c0d33f21c491f50289b7a492cc0c90f234201a5c6f9b830f910b1902ed60d51ad019c73fc9065aa2c519f654874b01f87db4a2807b6a2c2532e9d54e219c9c5f95f", 0x59}], 0x1}, 0xc100) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, 0x0, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000440)="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", 0x257}], 0x1}, 0x8000) socket$packet(0x11, 0x2, 0x300) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001480)="d09a0e63c9476288b671afdbd53a5994e137381f62021d1951b627b8dda57a5d17d744648c81c5703ed8146ab1b0171f89091b1dd3238d03dbb686df460963245dedf2973ee555af99499e44ad420dbf65fd46fbc99a1274429e2d5783751815828ec8cb3553110cca66460215353d19f6d8bbd8fb264eddea60b18e16c31aa5e200000491634ac2fd10e2cd30bcd7fede24263a7fff16e53ea293f3551b7147c33a44ea437fb1515c3e8d4f162fdebf8ebe11ae6fcd9372c8d8f19556ae091fe94215ae9434da412f6fa4cb6561e5f78ff9707844ee5d573fb294437722d9a06dfa61748c32c73d759933a8dd344c947d3efdbe90d0eb049df5fbb0c19f6785264b619c530d97395d44b04f7e2a280d658c7871ad373b792678c49227999651ef3b2ee1bc2b8f3035db376e8e09aa3837233c8713065a8ad131d24f6c42a3220d0e07c3d3e95d59a5dd10c09716b5f874ecf53aadfa5050ff40f2c3c4a629b6445e5836100afff5a8977583653b40ca316f8f11416e5c1bd5499636ddae25fc4970b37209cf5c0bf8e432160c258d14223baa52798e09858645773dd97e68a95310da713cff077b06000000d4f145e9199c126a7f235e5674a3c7f5c7129ac7c1a3319590249b6d34ef6c3d8b94c6fc7cdcbddb053243053f7bc1f230d3bc7dfc4359e33992d0a3946b914a093287a76ac4a249b5b86cc75476466e409553355fefab75e9268a8751ffc9481fcff1f49c475699595b315e2147ee038b7291600c6b1cf7c8f24d587b9464a67e5ccec17820e711b98f4f7d5053642068a3fff704c3fe26ba862b53e2622d6e8b4a4c815fb2ea90ef63e141209dd292fdf886ee3e64b90f47ce22661c7a21f7bc10df0248079b7be17284eb54e5ab5bde9c6857b3cb184586049e7741b2d8b5b1a19e99e1834a25959155720c1c0ef84d7b3c42e1ba282847d476cef0228b1422aba08e5f3c1cd279bbd1c5303c2e9c16a0da4f88f770fca118b09e92b51a33970e32ade003000000", 0x2d5}], 0x1}, 0x0) 04:00:05 executing program 3: unshare(0x0) mkdir(&(0x7f0000000380)='./file0\x00', 0x0) r0 = socket$key(0xf, 0x3, 0x2) r1 = perf_event_open(&(0x7f000025c000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x6) ftruncate(0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(0xffffffffffffffff, 0x1261, &(0x7f0000000500)) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) sendmsg$key(r0, &(0x7f0000000000)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x2, 0x7, 0x0, 0x0, 0x2}, 0x10}}, 0x0) mkdir(&(0x7f0000000100)='./file1\x00', 0x4) 04:00:05 executing program 2: r0 = socket$inet6(0xa, 0x400000000000803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000006c0)="0a5c2d023c126285718070") mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0xc, 0x32, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x8000000003c) connect$inet6(r1, &(0x7f00000002c0)={0xa, 0x0, 0x0, @dev, 0x9}, 0x1c) sendmsg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="2c7c579a7ae9c96d5cc9ad926a3eea1cf89515d52fc4300c0d33f21c491f50289b7a492cc0c90f234201a5c6f9b830f910b1902ed60d51ad019c73fc9065aa2c519f654874b01f87db4a2807b6a2c2532e9d54e219c9c5f95f", 0x59}], 0x1}, 0xc100) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, 0x0, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000440)="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", 0x257}], 0x1}, 0x8000) socket$packet(0x11, 0x2, 0x300) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001480)="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", 0x2d5}], 0x1}, 0x0) 04:00:05 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000100)={'syz', 0x3}, &(0x7f0000000140)="1a56442f0a287cfcaa13d77856895dd5a6ed127e703983a75f251b465f40951231971033dd1e0ab743dde03f8fdb5e36cbc853e7dce452dca02dbd1e3ad4e745c59d64586c59d85a0dbb4748c5fd46688616c7073b18e7feb4a048c6d38cb936e2ee8baffdd0ce4006b11b533870d0c4", 0x70, 0xfffffffffffffffc) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000200)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$negate(0xd, r2, 0x9, r3) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) syz_execute_func(&(0x7f00000000c0)="64ff0941c3c4e2c9975842c4c27d794e0066420fe2e33e0f1110c442019dccd3193e66430f3a0ce397") r4 = getuid() syz_mount_image$hfsplus(&(0x7f00000003c0)='hfsplus\x00', &(0x7f0000000400)='./file0\x00', 0x2, 0xa, &(0x7f0000000dc0)=[{&(0x7f0000000440)="360e858f6b2ebe5eb741ba02df08171fe5a3f9dc2965301c7ae0bf1ee1c5e00ad162bb1b7077825fb596cc1ac21a90fc3c03a3da212c1b", 0x37, 0x200}, {&(0x7f00000005c0)="b0ada46e2e1eaf39cfe81741422b5faaf19c4ec96c5be7244c2fc9fc1ecb5797771722ad937a0107b99531c3393f801da136b7584d589dfb01e5ec1bf824aa6c52501d6b080bd0fde0fa213165041428bfeef0b08d82ece57593f2fd805bc9f76e0b9caefb31aa821b42b89080a4adaf3ff82c8acf77a8ee8447076493ec5ad9e5cfd6e4e08ab44a6385c380a35de32ce76db1865929df50c47b199ea11b383f442545851b513123249c3fbe622f47361dd7120423574befc759eff9398d694544090e8ed2fb44be36f1ba12a7759dd6207028f9a241bcbbba5237fdf3a375b18bc6df506e472a8263c5ac6f5847", 0xee, 0x1ff}, {&(0x7f00000006c0)="b3c80ddb09932b51de1ea905d9f4b4a8b88bb254eb7a968bf59477d433e77819143cafcdaf38df42e9819329a3816f76c009a35161bf229640e39e4acd257bdbd9cb13a66f4701cb74671a4b7780c56663429c00320acea1f6b471bb20112cced59cf8308ed3afc023832db974744b44f5adcecc50d444234da90148d280f9c2c4b83469209946bb8691f15772aa5b3f0b32401a10c7a0fe15e41f40d181014ca4b4510de7553c4173e5cc32e08b62bb216621cfb7495fb55c952e8412d831149b80a7619b234d71f8fa2191c2a5d6c2abf8764c938c3fe67fe545fb0e931f8dfb41b0e4fba39aec3ac35bff11", 0xed, 0x101}, {&(0x7f00000007c0)="06602c70355dddb793c6e207bd9e4ce2839601d32db344e7210d16c68f9db8857cd71ced1dd86d0fa5082b7836bff56e00cec2031a063f62a6d6d155f7b2adb850ff278c7a705309b28cf0a0c8c13326a02d67a29ebabb45a8da9170982e6889d7fd07780af56da39c8ae86d951cae34e9bd52a459e0ea3fc1659ebdb43972ba3359b1bfd2f625d05c70912576cbea1b2bdb9a65cbaedb4d81017b5ae9f7a36019645dbc4949a5ca475740f11f5b1234720c5166028a49dd52fe2d9ed58272ec6a650161d67cc063784830b4591e4f121356246832dd804383b430de3838e23fd1fdb0f126ac61394dc446f200dae07fe719cb4fbc29dc984869f1", 0xfb, 0x5e3afba3}, {&(0x7f00000008c0)="593a59b3fb28b3d8fd0c3445a452b6bb782fe8b6ea7f467c017b29b9b3d8e531d79b3211d46fb688d645efc21c25fcabaa6854643e1d3349666b0bd6ee322b14a9801e6191238df4a5502d028aee6ccade9a3335efb64d381a7a7143f07cea6bdd8e335ba29e4ba2c193dbb61cb07de4ea214c55159ac1809645c0de51c9788cc86258d5a14d8b647252fc1cda45e8767795471c793477d78a0db26cbe39af99d456285acc8f00593fa52b8ecb7808c0ca6a30aa99ddf25166e1d669c0c322239c75ac279b26ce645621ac8de92e1b4bf10ca76ef6ff81aaf39436610025b0045d79", 0xe2, 0x6}, {&(0x7f00000009c0)="29fb578fa1499856bd7958f7870c10a2807efcfeeb8f8eabdde5ec1d428ded86c49afaaca0da566ebcf57a191cf86b225cc291dbd3d6c893a944843791e1e29f4eed22b3d46aa7d6ad5edd0a4bbb4915162c6fa861210b3fc9f64fa6ef012fec0157459a4a323d8e0cb7ccfccb7f7df0abb05a72c04b49827160163cad55991b9d1072161e2f2e52fe9b4921323c04273d6bf7a43a88eaf4902978ce4c59b6ee971382e26cd0b7ef6e392a2b99ff381cc35124a855b53b7f2a2238bd42f6aafe2b3a1a0e5cf46adf7c31b9cb65bd68e216", 0xd1, 0x7}, {&(0x7f0000000ac0)="66f518172ff9a0864f9e280d1aa30c625eda4ae54f60401e897b5e4dbb24411c4d7c39936cca6cc61f6fd0c6ccd48c52de7a81a2555cebbaea8d5814d8ebee629e14b94917e21e45158ccf630076d86bfedb138bf3c500daf1299b5c821d9bb9e60526", 0x63, 0xffffffff}, {&(0x7f0000000b40)="0eb1560b175d746270c9c322714c9d13da81cbe12372a4cf0a269cc9fc2ff7be648bfda38833e7cfac20898873c82ced102c8b77e7bfb2f4afa37d8a25f155ac297bc3796a284a95822956154556c34afb4f06c9841070b8d7bb134a1600871da1e6335348f468950195c021f96e02b50e807a380ed0ca4db98ea58949c5db12152093d6b35f12ef0a7b10256f6e2b96f9c8d1f812d8d35816077ffcbdcdbfe483bb5896afbc0bb3d9af90e5462ef0f286a76b6fbb347c9770b3d2921aa556a336319cd6636af66d0b435579788b2e0a7565a8e27a394710a2ae9b90e67959d11d98b5599348ae963c6849001b7e4d928524124d172576395a", 0xf9, 0x5}, {&(0x7f0000000c40)="77cd0ea86155fb25b01d2edcb496b40baa130ed0115ec9d8aac99aec1ec9dc3e5d72d8885a7c6a2bdb1bc81c47f92ee34df237da8975512a5d99a74e226d75cdc8669a476d62d9cfed1bc5da4cb7cd2983f20e6dbdef5fdc7665c9a502670a98b5a326b427621abb7421d1297685a8e93fac25fd4a979b57973182c2793f084ce74b0e86efdacc96cd377f503aa3389b5d5fa20536ca9bbf44a396ad35e18549c5271ad0945bf906951b2ebd67b571f96d6eafe8bf278a570d909e27f8c9105cc33d96daa9e55f1597", 0xc9, 0x8001}, {&(0x7f0000000d40)="b1c6f99b273963b54280b4929a8afedf4525143405accd0b91b233197f303f92fc1c4eac60dd90dcef999e448b683592877028620bc69a9a75a49de4ccceeeb8e95c249ae967f01ce34d4b845c80df3665ed4a92011f359683857a77ddb42a4bd5769d13c6810efa60dda9165d2f59265e35", 0x72, 0x7}], 0x0, &(0x7f0000000ec0)={[{@nls={'nls', 0x3d, 'iso8859-4'}}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@appraise='appraise'}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@fowner_lt={'fowner<', r4}}]}) clone(0x1000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet_MCAST_LEAVE_GROUP(r1, 0x0, 0x2d, &(0x7f0000000300)={0xfffffffffffffffc, {{0x2, 0x0, @local}}}, 0x88) write$binfmt_elf32(r1, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r1, 0x0, 0x61, 0x0, &(0x7f0000000040)) init_module(&(0x7f0000000240)='user\x00', 0x5, &(0x7f0000000280)='\\\x00') ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f00000002c0)={0x4, 0x0, &(0x7f0000ffd000/0x2000)=nil}) 04:00:05 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, 0x0, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000002000)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001000)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqsrc(r2, 0x0, 0x2000000000000004, &(0x7f0000013ff4)={@remote}, 0xc) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000340)={{{@in=@broadcast, @in=@broadcast, 0x0, 0x0, 0x2000, 0x0, 0xa}}, {{@in6=@local, 0x0, 0x33}, 0x0, @in6=@local}}, 0xe8) close(r2) dup3(r0, r1, 0x0) 04:00:05 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x25d1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000080)="00000600000000000000", 0x0) ioctl$SG_EMULATED_HOST(r1, 0x2203, &(0x7f00000000c0)) write$binfmt_elf32(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c460000000000000000000000000300060000000000000000003800000000000000000000000000200002000000000000000000000000000000"], 0x3c) execveat(r1, &(0x7f0000000000)='\x00', &(0x7f0000000280), 0x0, 0x1000) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 04:00:05 executing program 2: r0 = socket$inet6(0xa, 0x400000000000803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000006c0)="0a5c2d023c126285718070") mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0xc, 0x32, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x8000000003c) connect$inet6(r1, &(0x7f00000002c0)={0xa, 0x0, 0x0, @dev, 0x9}, 0x1c) sendmsg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="2c7c579a7ae9c96d5cc9ad926a3eea1cf89515d52fc4300c0d33f21c491f50289b7a492cc0c90f234201a5c6f9b830f910b1902ed60d51ad019c73fc9065aa2c519f654874b01f87db4a2807b6a2c2532e9d54e219c9c5f95f", 0x59}], 0x1}, 0xc100) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, 0x0, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000440)="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", 0x257}], 0x1}, 0x8000) socket$packet(0x11, 0x2, 0x300) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001480)="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", 0x2d5}], 0x1}, 0x0) 04:00:05 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) syz_execute_func(&(0x7f00000000c0)="64ff0941c3c4e2c9975842c4c27d794e0066420fe2e33e0f1110c442019dccd3193e66430f3a0ce397") clone(0x1a02100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet_MCAST_LEAVE_GROUP(r1, 0x0, 0x2d, &(0x7f0000000300)={0xfffffffffffffffc, {{0x2, 0x0, @local}}}, 0x88) write$binfmt_elf32(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="9f7be41980844a27cc3125e110eace596e480c743c4fad303267477721"], 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r1, 0x0, 0x61, 0x0, &(0x7f0000000040)) 04:00:06 executing program 0: 04:00:06 executing program 3: unshare(0x0) mkdir(&(0x7f0000000380)='./file0\x00', 0x0) r0 = socket$key(0xf, 0x3, 0x2) r1 = perf_event_open(&(0x7f000025c000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x6) ftruncate(0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(0xffffffffffffffff, 0x1261, &(0x7f0000000500)) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) sendmsg$key(r0, &(0x7f0000000000)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x2, 0x7, 0x0, 0x0, 0x2}, 0x10}}, 0x0) mkdir(&(0x7f0000000100)='./file1\x00', 0x4) 04:00:06 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, 0x0, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000002000)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001000)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqsrc(r2, 0x0, 0x2000000000000004, &(0x7f0000013ff4)={@remote}, 0xc) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000340)={{{@in=@broadcast, @in=@broadcast, 0x0, 0x0, 0x6, 0x0, 0xa}}, {{@in6=@local, 0x0, 0x33}, 0x0, @in6=@local}}, 0xe8) close(r2) dup3(r0, r1, 0x0) 04:00:06 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) syz_execute_func(&(0x7f00000000c0)="64ff0941c3c4e2c9975842c4c27d794e0066420fe2e33e0f1110c442019dccd3193e66430f3a0ce397") clone(0x1a02100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = syz_open_dev$dmmidi(&(0x7f0000000100)='/dev/dmmidi#\x00', 0x0, 0x280) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x8000, 0x0) setsockopt$inet_MCAST_LEAVE_GROUP(r2, 0x0, 0x2d, &(0x7f0000000300)={0xfffffffffffffffc, {{0x2, 0x0, @empty}}}, 0x88) write$binfmt_elf32(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="7c394bc1a4429056611621d80d2d815f1ee99ab8ba426939114d92db04f92c8199ccf09fe00514d1c1a865bd8ceccdb257fde78d1bb44c074ff2fea3d7d178abd8595f3a8d20c235c78e37110fa10142a4a4fa7c7a02ea58fa7c5bf7aae2532bfafe032d914af38802ff8a8f4daf5c08f4aa45965bd87ad857f109dec691f80d41aa2d32c8885191ffac17d822825cc4e11f6fdc62ff73f47f12ba305900800000ff260d5b10b9d400cb65d812be059d0d8f777f54bd6f8f2bd79e466669ebc4657e770a0150238d6cbd935bafc26ef27f2ec1cacfd54b2110937529efba6ea06cb3f7ed2336e30a6f05f0ec6b719b7fe9d363b06dca2c48bbffd7ebfa4fa57cab2804ba91254a0311cf989fe074b05088e9ef556baaedc64bee73048eb12bad2d142c3f70ae5f8359837d03878d49fbf3151f293aded9f19983e75fdf75dadd9cd866f46ff511af1cdfe55976f8af55301cbfaeaa5f4c865dd2eec31d9154d6f5a285b43f921cc6a01de18208242d68a7f28d130708a188d64925b7aab85ee1ce7423c74c2155b8e79b2cf75e589f9306c4ea6b7cf131fbb5400cec94ae524b59c84e5c"], 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r1, 0x0, 0x61, 0x0, &(0x7f0000000040)) 04:00:06 executing program 2: r0 = socket$inet6(0xa, 0x400000000000803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000006c0)="0a5c2d023c126285718070") mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0xc, 0x32, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x8000000003c) connect$inet6(r1, &(0x7f00000002c0)={0xa, 0x0, 0x0, @dev, 0x9}, 0x1c) sendmsg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="2c7c579a7ae9c96d5cc9ad926a3eea1cf89515d52fc4300c0d33f21c491f50289b7a492cc0c90f234201a5c6f9b830f910b1902ed60d51ad019c73fc9065aa2c519f654874b01f87db4a2807b6a2c2532e9d54e219c9c5f95f", 0x59}], 0x1}, 0xc100) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, 0x0, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000440)="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", 0x257}], 0x1}, 0x8000) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001480)="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", 0x2d5}], 0x1}, 0x0) 04:00:06 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x25d1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000080)="00000600000000000000", 0x0) ioctl$SG_EMULATED_HOST(r1, 0x2203, &(0x7f00000000c0)) write$binfmt_elf32(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c460000000000000000000000000300060000000000000000003800000000000000000000000000200002000000000000000000000000000000"], 0x3c) execveat(r1, &(0x7f0000000000)='\x00', &(0x7f0000000280), 0x0, 0x1000) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 04:00:06 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) connect$unix(r2, &(0x7f0000000100)=@abs={0x1, 0x0, 0x4e24}, 0x6e) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty, 0x1000000000000}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000440), 0x131f64) syz_execute_func(&(0x7f00000000c0)="64ff0941c3c4e2c9975842c4c27d794e0066420fe2e33e0f1110c442019dccd3193e66430f3a0ce397") clone(0x1a02100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$BLKIOOPT(r1, 0x1279, &(0x7f0000000240)) setsockopt$inet_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x0, 0x2d, &(0x7f0000000300)={0xfffffffffffffffc, {{0x2, 0x0, @local}}}, 0x88) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000180)=ANY=[@ANYBLOB="27b6ae024c2528f8f96e81771d8241d2e36edc23a1f90abf210adf85f7c3"], 0x0) fsetxattr$trusted_overlay_origin(r1, &(0x7f00000001c0)='trusted.overlay.origin\x00', &(0x7f0000000200)='y\x00', 0x2, 0x3) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, 0x0, &(0x7f0000000040)) 04:00:06 executing program 2: r0 = socket$inet6(0xa, 0x400000000000803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000006c0)="0a5c2d023c126285718070") mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0xc, 0x32, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x8000000003c) connect$inet6(r1, &(0x7f00000002c0)={0xa, 0x0, 0x0, @dev, 0x9}, 0x1c) sendmsg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="2c7c579a7ae9c96d5cc9ad926a3eea1cf89515d52fc4300c0d33f21c491f50289b7a492cc0c90f234201a5c6f9b830f910b1902ed60d51ad019c73fc9065aa2c519f654874b01f87db4a2807b6a2c2532e9d54e219c9c5f95f", 0x59}], 0x1}, 0xc100) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, 0x0, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000440)="b10b938636ea69df7b5a9984bb1bc72ef58d96e56e11df900a707f4946b1637e2096c584b9a1b4e017163fbdb35160a56c11dfbe74df97d36d19ad6a91c6fb4ad19581b8cf707131830f7a22b1b263c9da0e443c5e969ed6a0d3bc508bf75c3147447379f585759ceba0de5cda46291dc1b8f106a83e1cde43a862d95413ce2616b261ed9f79913ae781b3b843ea1b4429a750b8ccb1952a7b863d0bada9f61df6609fe368eaf47c0ce9e46a22b0d75b063deeaa94285d0c43353046e0a308296a76b0b0145f8af9aa0ed0e18bc50509eaef21c8e03842a97df3a462ea3f9d5f83bf1d4d2875f0d5b24e941483f863cd2ea7c769bd3e594fb173dd873c7d9a3fd20939ad1d5867881ed77a078007b4972aba36cae02004373a6a74d74cb15a52c5f8426cb6f235d38048fd91f5d6100fd58a335df10add227d804167ba191c7a035c5a2a916e7fef18a6003578820b3e0be26a22f2c149f40a0335cadcca64a5e44179e6ce4d7f7c16e8a96c5be7cdf66eef901cb8eeabc94bae30acca8c6fa02889c32311044dcbc9a2e02e0632f7f9aa96849abede543773745e4652fccc503003f10cd68ddab594969ad36cb622ed7ba22dc46a80fb63ac2c561a80ae5c10b295b9f75d9536ba1ac24b8e9ae217611ffe79cb9422158475c1a89a51547d13c03b68d75ffb5717a35f381774567871e9e4190272c97eafcfa0a07a751d0bc8eeb0c206e12b2cff1065a3d5622635fa44c0dcb0722ad4c97e6b7d5844b2e9bab9ba1d083fa2930a3ea267d7f15d817e2b2e055ccfbaf019292f6156efd3a9a13ea90ecf59fc1bf35c6626db1c6759a50ed84acefd3cdb", 0x257}], 0x1}, 0x8000) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001480)="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", 0x2d5}], 0x1}, 0x0) 04:00:06 executing program 0: 04:00:06 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, 0x0, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000002000)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001000)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqsrc(r2, 0x0, 0x2000000000000004, &(0x7f0000013ff4)={@remote}, 0xc) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000340)={{{@in=@broadcast, @in=@broadcast, 0x0, 0x0, 0x3, 0x0, 0xa}}, {{@in6=@local, 0x0, 0x33}, 0x0, @in6=@local}}, 0xe8) close(r2) dup3(r0, r1, 0x0) 04:00:06 executing program 2: r0 = socket$inet6(0xa, 0x400000000000803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000006c0)="0a5c2d023c126285718070") mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0xc, 0x32, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x8000000003c) connect$inet6(r1, &(0x7f00000002c0)={0xa, 0x0, 0x0, @dev, 0x9}, 0x1c) sendmsg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="2c7c579a7ae9c96d5cc9ad926a3eea1cf89515d52fc4300c0d33f21c491f50289b7a492cc0c90f234201a5c6f9b830f910b1902ed60d51ad019c73fc9065aa2c519f654874b01f87db4a2807b6a2c2532e9d54e219c9c5f95f", 0x59}], 0x1}, 0xc100) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, 0x0, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000440)="b10b938636ea69df7b5a9984bb1bc72ef58d96e56e11df900a707f4946b1637e2096c584b9a1b4e017163fbdb35160a56c11dfbe74df97d36d19ad6a91c6fb4ad19581b8cf707131830f7a22b1b263c9da0e443c5e969ed6a0d3bc508bf75c3147447379f585759ceba0de5cda46291dc1b8f106a83e1cde43a862d95413ce2616b261ed9f79913ae781b3b843ea1b4429a750b8ccb1952a7b863d0bada9f61df6609fe368eaf47c0ce9e46a22b0d75b063deeaa94285d0c43353046e0a308296a76b0b0145f8af9aa0ed0e18bc50509eaef21c8e03842a97df3a462ea3f9d5f83bf1d4d2875f0d5b24e941483f863cd2ea7c769bd3e594fb173dd873c7d9a3fd20939ad1d5867881ed77a078007b4972aba36cae02004373a6a74d74cb15a52c5f8426cb6f235d38048fd91f5d6100fd58a335df10add227d804167ba191c7a035c5a2a916e7fef18a6003578820b3e0be26a22f2c149f40a0335cadcca64a5e44179e6ce4d7f7c16e8a96c5be7cdf66eef901cb8eeabc94bae30acca8c6fa02889c32311044dcbc9a2e02e0632f7f9aa96849abede543773745e4652fccc503003f10cd68ddab594969ad36cb622ed7ba22dc46a80fb63ac2c561a80ae5c10b295b9f75d9536ba1ac24b8e9ae217611ffe79cb9422158475c1a89a51547d13c03b68d75ffb5717a35f381774567871e9e4190272c97eafcfa0a07a751d0bc8eeb0c206e12b2cff1065a3d5622635fa44c0dcb0722ad4c97e6b7d5844b2e9bab9ba1d083fa2930a3ea267d7f15d817e2b2e055ccfbaf019292f6156efd3a9a13ea90ecf59fc1bf35c6626db1c6759a50ed84acefd3cdb", 0x257}], 0x1}, 0x8000) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001480)="d09a0e63c9476288b671afdbd53a5994e137381f62021d1951b627b8dda57a5d17d744648c81c5703ed8146ab1b0171f89091b1dd3238d03dbb686df460963245dedf2973ee555af99499e44ad420dbf65fd46fbc99a1274429e2d5783751815828ec8cb3553110cca66460215353d19f6d8bbd8fb264eddea60b18e16c31aa5e200000491634ac2fd10e2cd30bcd7fede24263a7fff16e53ea293f3551b7147c33a44ea437fb1515c3e8d4f162fdebf8ebe11ae6fcd9372c8d8f19556ae091fe94215ae9434da412f6fa4cb6561e5f78ff9707844ee5d573fb294437722d9a06dfa61748c32c73d759933a8dd344c947d3efdbe90d0eb049df5fbb0c19f6785264b619c530d97395d44b04f7e2a280d658c7871ad373b792678c49227999651ef3b2ee1bc2b8f3035db376e8e09aa3837233c8713065a8ad131d24f6c42a3220d0e07c3d3e95d59a5dd10c09716b5f874ecf53aadfa5050ff40f2c3c4a629b6445e5836100afff5a8977583653b40ca316f8f11416e5c1bd5499636ddae25fc4970b37209cf5c0bf8e432160c258d14223baa52798e09858645773dd97e68a95310da713cff077b06000000d4f145e9199c126a7f235e5674a3c7f5c7129ac7c1a3319590249b6d34ef6c3d8b94c6fc7cdcbddb053243053f7bc1f230d3bc7dfc4359e33992d0a3946b914a093287a76ac4a249b5b86cc75476466e409553355fefab75e9268a8751ffc9481fcff1f49c475699595b315e2147ee038b7291600c6b1cf7c8f24d587b9464a67e5ccec17820e711b98f4f7d5053642068a3fff704c3fe26ba862b53e2622d6e8b4a4c815fb2ea90ef63e141209dd292fdf886ee3e64b90f47ce22661c7a21f7bc10df0248079b7be17284eb54e5ab5bde9c6857b3cb184586049e7741b2d8b5b1a19e99e1834a25959155720c1c0ef84d7b3c42e1ba282847d476cef0228b1422aba08e5f3c1cd279bbd1c5303c2e9c16a0da4f88f770fca118b09e92b51a33970e32ade003000000", 0x2d5}], 0x1}, 0x0) 04:00:06 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x25d1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000080)="00000600000000000000", 0x0) ioctl$SG_EMULATED_HOST(r1, 0x2203, &(0x7f00000000c0)) write$binfmt_elf32(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c460000000000000000000000000300060000000000000000003800000000000000000000000000200002000000000000000000000000000000"], 0x3c) execveat(r1, &(0x7f0000000000)='\x00', &(0x7f0000000280), 0x0, 0x1000) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 04:00:06 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) syz_execute_func(&(0x7f00000000c0)="64ff0941c3c4e2c9975842c4c27d794e0066420fe2e33e0f1110c442019dccd3193e66430f3a0ce397") clone(0x1a02100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet_MCAST_LEAVE_GROUP(r1, 0x0, 0x2d, &(0x7f0000000300)={0xfffffffffffffffc, {{0x2, 0x0, @local}}}, 0x88) write$binfmt_elf32(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="65dcd0e8c99527f39c8ffd5f031ee4cdf2080a162dd43cfb4a7d6356a04fd072236cbd578df87e67db7d5961d0ee"], 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r1, 0x0, 0x61, 0x0, &(0x7f0000000040)) 04:00:06 executing program 3: 04:00:06 executing program 0: 04:00:06 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, 0x0, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000002000)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001000)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqsrc(r2, 0x0, 0x2000000000000004, &(0x7f0000013ff4)={@remote}, 0xc) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000340)={{{@in=@broadcast, @in=@broadcast, 0x0, 0x0, 0xffffffa4, 0x0, 0xa}}, {{@in6=@local, 0x0, 0x33}, 0x0, @in6=@local}}, 0xe8) close(r2) dup3(r0, r1, 0x0) 04:00:06 executing program 2: r0 = socket$inet6(0xa, 0x400000000000803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000006c0)="0a5c2d023c126285718070") mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0xc, 0x32, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x8000000003c) connect$inet6(r1, &(0x7f00000002c0)={0xa, 0x0, 0x0, @dev, 0x9}, 0x1c) sendmsg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="2c7c579a7ae9c96d5cc9ad926a3eea1cf89515d52fc4300c0d33f21c491f50289b7a492cc0c90f234201a5c6f9b830f910b1902ed60d51ad019c73fc9065aa2c519f654874b01f87db4a2807b6a2c2532e9d54e219c9c5f95f", 0x59}], 0x1}, 0xc100) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, 0x0, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) socket$packet(0x11, 0x2, 0x300) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001480)="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", 0x2d5}], 0x1}, 0x0) 04:00:06 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/mixer\x00', 0x2001, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080), 0x1c) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f00000001c0)) r2 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) syz_execute_func(&(0x7f00000000c0)="64ff0941c3c4e2c9975842c4c27d794e0066420fe2e33e0f1110c442019dccd3193e66430f3a0ce397") ioctl$GIO_UNISCRNMAP(r1, 0x4b69, &(0x7f0000000140)=""/124) setsockopt$bt_hci_HCI_FILTER(r2, 0x0, 0x2, &(0x7f0000000000)={0x8, 0xffffffff, 0xfffffffffffffff7, 0x1000}, 0x10) clone(0x1a02100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet_MCAST_LEAVE_GROUP(r2, 0x0, 0x2d, &(0x7f0000000300)={0xfffffffffffffffc, {{0x2, 0x0, @local}}}, 0x88) write$binfmt_elf32(r2, &(0x7f00000003c0)=ANY=[@ANYBLOB], 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r2, 0x0, 0x61, 0x0, &(0x7f0000000040)) 04:00:06 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x25d1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000080)="00000600000000000000", 0x0) ioctl$SG_EMULATED_HOST(r1, 0x2203, &(0x7f00000000c0)) write$binfmt_elf32(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c460000000000000000000000000300060000000000000000003800000000000000000000000000200002000000000000000000000000000000000000000000000000000000000400000000000000000000000000000300"], 0x5a) execveat(r1, &(0x7f0000000000)='\x00', &(0x7f0000000280), 0x0, 0x1000) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 04:00:06 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = dup2(0xffffffffffffffff, r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x803, 0x9) r3 = memfd_create(&(0x7f0000000400)="e83779d80efa45bb7f48bebc95870bd0cd39bd2830ee47afe7b33fc778bde252c50d2e", 0x0) r4 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x1) r5 = dup2(r4, r3) pselect6(0x40, &(0x7f0000000040), &(0x7f0000000080)={0x1220daf9, 0x0, 0x9, 0x7, 0x0, 0x81, 0x7, 0x7b}, &(0x7f00000000c0)={0x0, 0x9, 0x4c90, 0x2, 0x100000000, 0x7, 0x0, 0x49}, &(0x7f0000000100)={0x0, 0x1c9c380}, &(0x7f0000000180)={&(0x7f0000000140)={0x80}, 0x8}) setxattr$security_selinux(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000440)='security.selinux\x00', &(0x7f0000000540)='system_u:object_r:watchdog_device_t:s0\x00', 0x27, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r5, 0xc08c5332, &(0x7f0000000280)={0x0, 0x0, 0x0, "7175657565310000000000000000313b0000000000000000000000000000000000000000060000000000ccbf7ddd00"}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(r5, 0xc08c5334, &(0x7f00000001c0)={0xf48b, 0x5, 0x200000000, 'queue1\x00', 0x7fffffff}) write$sndseq(r3, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @connect}], 0xffffff76) clock_nanosleep(0x5, 0x0, &(0x7f00000005c0), &(0x7f0000000580)) fstatfs(r2, &(0x7f0000004200)=""/4096) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$VHOST_RESET_OWNER(r1, 0xaf02, 0x0) r6 = openat$null(0xffffffffffffff9c, 0x0, 0x80000, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) clone(0x2e828903, &(0x7f00000003c0)="e8ddef7c212983bf4e7372ad4e9eccaed37965222e9e7e7b55855b57ba4a56fca98359a2a2b3bde5285677b1a93d4b24a53deaa47671af344ebc4f09ad0a4e45d7e7d2254d855597a357a8ddf8a397dde184acdee811611497c58c193eaa58980a11cd1b56c2ec505e1cc82742833fea7fcf4f028b707bfba420634dd9cfe0689fdac28ae8a205a941b9633b94c6ddc8c5d01cce99f780a7efa9b12d77425498c324a8d7ca3f19e9ecc36ac6", 0x0, 0x0, 0x0) ptrace$setopts(0x104207, 0x0, 0xfffffffffffffffe, 0x0) tkill(0x0, 0x8000000000000014) wait4(0x0, &(0x7f0000000040), 0x0, &(0x7f0000000280)) ioctl$VT_GETMODE(r6, 0x5601, &(0x7f0000000100)) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000740)=""/169) syslog(0x0, &(0x7f0000000340)=""/89, 0x59) 04:00:06 executing program 3: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/dev_mcast\x00') sendfile(r0, r0, 0x0, 0x10001) 04:00:06 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x13, 0x0, 0xfffffea2) connect$inet6(r0, &(0x7f0000000080), 0x1c) ioctl$sock_inet_SIOCRTMSG(r1, 0x890d, &(0x7f0000000140)={0x9d, {0x2, 0x4e24, @local}, {0x2, 0x4e20, @multicast2}, {0x2, 0x4e21, @multicast2}, 0x2c8, 0x2, 0x2, 0x9, 0x81, &(0x7f0000000100)='tunl0\x00', 0x1, 0x8, 0x9}) r2 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) syz_execute_func(&(0x7f00000000c0)="64ff0941c3c4e2c9975842c4c27d794e0066420fe2e33e0f1110c442019dccd3193e66430f3a0ce397") clone(0x1a02100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet_MCAST_LEAVE_GROUP(r2, 0x0, 0x2d, &(0x7f0000000300)={0xfffffffffffffffc, {{0x2, 0x0, @local}}}, 0x88) write$binfmt_elf32(r0, &(0x7f00000003c0)=ANY=[@ANYBLOB], 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r2, 0x0, 0x61, 0x0, &(0x7f0000000040)) 04:00:06 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x25d1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000080)="00000600000000000000", 0x0) ioctl$SG_EMULATED_HOST(r1, 0x2203, &(0x7f00000000c0)) write$binfmt_elf32(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c460000000000000000000000000300060000000000000000003800000000000000000000000000200002000000000000000000000000000000000000000000000000000000000400000000000000000000000000000300"], 0x5a) execveat(r1, &(0x7f0000000000)='\x00', &(0x7f0000000280), 0x0, 0x1000) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 04:00:06 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, 0x0, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000002000)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001000)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqsrc(r2, 0x0, 0x2000000000000004, &(0x7f0000013ff4)={@remote}, 0xc) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000340)={{{@in=@broadcast, @in=@broadcast, 0x0, 0x0, 0x300000000000000, 0x0, 0xa}}, {{@in6=@local, 0x0, 0x33}, 0x0, @in6=@local}}, 0xe8) close(r2) dup3(r0, r1, 0x0) 04:00:07 executing program 2: r0 = socket$inet6(0xa, 0x400000000000803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000006c0)="0a5c2d023c126285718070") mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0xc, 0x32, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x8000000003c) connect$inet6(r1, &(0x7f00000002c0)={0xa, 0x0, 0x0, @dev, 0x9}, 0x1c) sendmsg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="2c7c579a7ae9c96d5cc9ad926a3eea1cf89515d52fc4300c0d33f21c491f50289b7a492cc0c90f234201a5c6f9b830f910b1902ed60d51ad019c73fc9065aa2c519f654874b01f87db4a2807b6a2c2532e9d54e219c9c5f95f", 0x59}], 0x1}, 0xc100) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, 0x0, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) socket$packet(0x11, 0x2, 0x300) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001480)="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", 0x2d5}], 0x1}, 0x0) 04:00:07 executing program 3: 04:00:07 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x25d1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000080)="00000600000000000000", 0x0) ioctl$SG_EMULATED_HOST(r1, 0x2203, &(0x7f00000000c0)) write$binfmt_elf32(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c460000000000000000000000000300060000000000000000003800000000000000000000000000200002000000000000000000000000000000000000000000000000000000000400000000000000000000000000000300"], 0x5a) execveat(r1, &(0x7f0000000000)='\x00', &(0x7f0000000280), 0x0, 0x1000) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 04:00:07 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @local}, 0x1c) r1 = dup2(r0, r0) r2 = gettid() fcntl$lock(r1, 0x6, &(0x7f0000000000)={0x1, 0x2, 0x0, 0x5, r2}) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) syz_execute_func(&(0x7f00000000c0)="64ff0941c3c4e2c9975842c4c27d794e0066420fe2e33e0f1110c442019dccd3193e66430f3a0ce397") clone(0x1a02100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet_MCAST_LEAVE_GROUP(r1, 0x0, 0x2d, &(0x7f0000000300)={0xfffffffffffffffc, {{0x2, 0x0, @local}}}, 0x88) write$binfmt_elf32(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB], 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r1, 0x0, 0x61, 0x0, &(0x7f0000000040)) prctl$PR_CAP_AMBIENT(0x2f, 0x2, 0x25) 04:00:07 executing program 2: r0 = socket$inet6(0xa, 0x400000000000803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000006c0)="0a5c2d023c126285718070") mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0xc, 0x32, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x8000000003c) connect$inet6(r1, &(0x7f00000002c0)={0xa, 0x0, 0x0, @dev, 0x9}, 0x1c) sendmsg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="2c7c579a7ae9c96d5cc9ad926a3eea1cf89515d52fc4300c0d33f21c491f50289b7a492cc0c90f234201a5c6f9b830f910b1902ed60d51ad019c73fc9065aa2c519f654874b01f87db4a2807b6a2c2532e9d54e219c9c5f95f", 0x59}], 0x1}, 0xc100) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, 0x0, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) socket$packet(0x11, 0x2, 0x300) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001480)="d09a0e63c9476288b671afdbd53a5994e137381f62021d1951b627b8dda57a5d17d744648c81c5703ed8146ab1b0171f89091b1dd3238d03dbb686df460963245dedf2973ee555af99499e44ad420dbf65fd46fbc99a1274429e2d5783751815828ec8cb3553110cca66460215353d19f6d8bbd8fb264eddea60b18e16c31aa5e200000491634ac2fd10e2cd30bcd7fede24263a7fff16e53ea293f3551b7147c33a44ea437fb1515c3e8d4f162fdebf8ebe11ae6fcd9372c8d8f19556ae091fe94215ae9434da412f6fa4cb6561e5f78ff9707844ee5d573fb294437722d9a06dfa61748c32c73d759933a8dd344c947d3efdbe90d0eb049df5fbb0c19f6785264b619c530d97395d44b04f7e2a280d658c7871ad373b792678c49227999651ef3b2ee1bc2b8f3035db376e8e09aa3837233c8713065a8ad131d24f6c42a3220d0e07c3d3e95d59a5dd10c09716b5f874ecf53aadfa5050ff40f2c3c4a629b6445e5836100afff5a8977583653b40ca316f8f11416e5c1bd5499636ddae25fc4970b37209cf5c0bf8e432160c258d14223baa52798e09858645773dd97e68a95310da713cff077b06000000d4f145e9199c126a7f235e5674a3c7f5c7129ac7c1a3319590249b6d34ef6c3d8b94c6fc7cdcbddb053243053f7bc1f230d3bc7dfc4359e33992d0a3946b914a093287a76ac4a249b5b86cc75476466e409553355fefab75e9268a8751ffc9481fcff1f49c475699595b315e2147ee038b7291600c6b1cf7c8f24d587b9464a67e5ccec17820e711b98f4f7d5053642068a3fff704c3fe26ba862b53e2622d6e8b4a4c815fb2ea90ef63e141209dd292fdf886ee3e64b90f47ce22661c7a21f7bc10df0248079b7be17284eb54e5ab5bde9c6857b3cb184586049e7741b2d8b5b1a19e99e1834a25959155720c1c0ef84d7b3c42e1ba282847d476cef0228b1422aba08e5f3c1cd279bbd1c5303c2e9c16a0da4f88f770fca118b09e92b51a33970e32ade003000000", 0x2d5}], 0x1}, 0x0) 04:00:07 executing program 3: 04:00:07 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, 0x0, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000002000)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001000)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqsrc(r2, 0x0, 0x2000000000000004, &(0x7f0000013ff4)={@remote}, 0xc) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000340)={{{@in=@broadcast, @in=@broadcast, 0x0, 0x0, 0x2000000000000000, 0x0, 0xa}}, {{@in6=@local, 0x0, 0x33}, 0x0, @in6=@local}}, 0xe8) close(r2) dup3(r0, r1, 0x0) 04:00:07 executing program 0: 04:00:07 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) syz_execute_func(&(0x7f00000000c0)="64ff0941c3c4e2c9975842c4c27d794e0066420fe2e33e0f1110c442019dccd3193e66430f3a0ce397") clone(0x1a02100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet_MCAST_LEAVE_GROUP(r1, 0x0, 0x2d, &(0x7f0000000300)={0xfffffffffffffffc, {{0x2, 0x0, @local}}}, 0x88) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f0000000140)={0x16, 0x98, 0xfa00, {&(0x7f0000000100)={0xffffffffffffffff}, 0x3, 0xffffffffffffffff, 0x3c, 0x1, @ib={0x1b, 0x1ff, 0x8, {"c1029f8339d08578801b93885b2471e4"}, 0x80, 0x4, 0xba4}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r1, &(0x7f0000000200)={0x11, 0x10, 0xfa00, {&(0x7f0000000000), r2}}, 0x18) write$binfmt_elf32(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="195ae4802434a070ea18c26dd37f68ff6bb2911bff8f838ef706f9261ff9b259279a1db44b81128e86dc2a0f5d24"], 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r1, 0x0, 0x61, 0x0, &(0x7f0000000040)) 04:00:07 executing program 2: r0 = socket$inet6(0xa, 0x400000000000803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000006c0)="0a5c2d023c126285718070") mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0xc, 0x32, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x8000000003c) connect$inet6(r1, &(0x7f00000002c0)={0xa, 0x0, 0x0, @dev, 0x9}, 0x1c) sendmsg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="2c7c579a7ae9c96d5cc9ad926a3eea1cf89515d52fc4300c0d33f21c491f50289b7a492cc0c90f234201a5c6f9b830f910b1902ed60d51ad019c73fc9065aa2c519f654874b01f87db4a2807b6a2c2532e9d54e219c9c5f95f", 0x59}], 0x1}, 0xc100) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, 0x0, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000440)="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", 0x257}], 0x1}, 0x8000) socket$packet(0x11, 0x2, 0x300) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001480)="d09a0e63c9476288b671afdbd53a5994e137381f62021d1951b627b8dda57a5d17d744648c81c5703ed8146ab1b0171f89091b1dd3238d03dbb686df460963245dedf2973ee555af99499e44ad420dbf65fd46fbc99a1274429e2d5783751815828ec8cb3553110cca66460215353d19f6d8bbd8fb264eddea60b18e16c31aa5e200000491634ac2fd10e2cd30bcd7fede24263a7fff16e53ea293f3551b7147c33a44ea437fb1515c3e8d4f162fdebf8ebe11ae6fcd9372c8d8f19556ae091fe94215ae9434da412f6fa4cb6561e5f78ff9707844ee5d573fb294437722d9a06dfa61748c32c73d759933a8dd344c947d3efdbe90d0eb049df5fbb0c19f6785264b619c530d97395d44b04f7e2a280d658c7871ad373b792678c49227999651ef3b2ee1bc2b8f3035db376e8e09aa3837233c8713065a8ad131d24f6c42a3220d0e07c3d3e95d59a5dd10c09716b5f874ecf53aadfa5050ff40f2c3c4a629b6445e5836100afff5a8977583653b40ca316f8f11416e5c1bd5499636ddae25fc4970b37209cf5c0bf8e432160c258d14223baa52798e09858645773dd97e68a95310da713cff077b06000000d4f145e9199c126a7f235e5674a3c7f5c7129ac7c1a3319590249b6d34ef6c3d8b94c6fc7cdcbddb053243053f7bc1f230d3bc7dfc4359e33992d0a3946b914a093287a76ac4a249b5b86cc75476466e409553355fefab75e9268a8751ffc9481fcff1f49c475699595b315e2147ee038b7291600c6b1cf7c8f24d587b9464a67e5ccec17820e711b98f4f7d5053642068a3fff704c3fe26ba862b53e2622d6e8b4a4c815fb2ea90ef63e141209dd292fdf886ee3e64b90f47ce22661c7a21f7bc10df0248079b7be17284eb54e5ab5bde9c6857b3cb184586049e7741b2d8b5b1a19e99e1834a25959155720c1c0ef84d7b3c42e1ba282847d476cef0228b1422aba08e5f3c1cd279bbd1c5303c2e9c16a0da4f88f770fca118b09e92b51a33970e32ade003000000", 0x2d5}], 0x1}, 0x0) 04:00:07 executing program 3: 04:00:07 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x25d1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000080)="00000600000000000000", 0x0) ioctl$SG_EMULATED_HOST(r1, 0x2203, &(0x7f00000000c0)) write$binfmt_elf32(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c460000000000000000000000000300060000000000000000003800000000000000000000000000200002000000000000000000000000000000000000000000000000000000000400000000000000000000000000000300000000000000000000000000000002"], 0x69) execveat(r1, &(0x7f0000000000)='\x00', &(0x7f0000000280), 0x0, 0x1000) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 04:00:07 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, 0x0, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000002000)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001000)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqsrc(r2, 0x0, 0x2000000000000004, &(0x7f0000013ff4)={@remote}, 0xc) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000340)={{{@in=@broadcast, @in=@broadcast, 0x0, 0x0, 0x1000000, 0x0, 0xa}}, {{@in6=@local, 0x0, 0x33}, 0x0, @in6=@local}}, 0xe8) close(r2) dup3(r0, r1, 0x0) 04:00:07 executing program 0: 04:00:07 executing program 3: 04:00:07 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x16, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x400000, @empty, 0xffffffffffffffff}, 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x1a02100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet_MCAST_LEAVE_GROUP(r1, 0x0, 0x2d, &(0x7f0000000300)={0xfffffffffffffffc, {{0x2, 0x0, @local}}}, 0x88) write$binfmt_elf32(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB], 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r1, 0x0, 0x61, 0x0, &(0x7f0000000040)) 04:00:07 executing program 0: 04:00:07 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x25d1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000080)="00000600000000000000", 0x0) ioctl$SG_EMULATED_HOST(r1, 0x2203, &(0x7f00000000c0)) write$binfmt_elf32(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c460000000000000000000000000300060000000000000000003800000000000000000000000000200002000000000000000000000000000000000000000000000000000000000400000000000000000000000000000300000000000000000000000000000002"], 0x69) execveat(r1, &(0x7f0000000000)='\x00', &(0x7f0000000280), 0x0, 0x1000) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 04:00:07 executing program 2: r0 = socket$inet6(0xa, 0x400000000000803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000006c0)="0a5c2d023c126285718070") mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0xc, 0x32, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x8000000003c) connect$inet6(r1, &(0x7f00000002c0)={0xa, 0x0, 0x0, @dev, 0x9}, 0x1c) sendmsg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="2c7c579a7ae9c96d5cc9ad926a3eea1cf89515d52fc4300c0d33f21c491f50289b7a492cc0c90f234201a5c6f9b830f910b1902ed60d51ad019c73fc9065aa2c519f654874b01f87db4a2807b6a2c2532e9d54e219c9c5f95f", 0x59}], 0x1}, 0xc100) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000440)="b10b938636ea69df7b5a9984bb1bc72ef58d96e56e11df900a707f4946b1637e2096c584b9a1b4e017163fbdb35160a56c11dfbe74df97d36d19ad6a91c6fb4ad19581b8cf707131830f7a22b1b263c9da0e443c5e969ed6a0d3bc508bf75c3147447379f585759ceba0de5cda46291dc1b8f106a83e1cde43a862d95413ce2616b261ed9f79913ae781b3b843ea1b4429a750b8ccb1952a7b863d0bada9f61df6609fe368eaf47c0ce9e46a22b0d75b063deeaa94285d0c43353046e0a308296a76b0b0145f8af9aa0ed0e18bc50509eaef21c8e03842a97df3a462ea3f9d5f83bf1d4d2875f0d5b24e941483f863cd2ea7c769bd3e594fb173dd873c7d9a3fd20939ad1d5867881ed77a078007b4972aba36cae02004373a6a74d74cb15a52c5f8426cb6f235d38048fd91f5d6100fd58a335df10add227d804167ba191c7a035c5a2a916e7fef18a6003578820b3e0be26a22f2c149f40a0335cadcca64a5e44179e6ce4d7f7c16e8a96c5be7cdf66eef901cb8eeabc94bae30acca8c6fa02889c32311044dcbc9a2e02e0632f7f9aa96849abede543773745e4652fccc503003f10cd68ddab594969ad36cb622ed7ba22dc46a80fb63ac2c561a80ae5c10b295b9f75d9536ba1ac24b8e9ae217611ffe79cb9422158475c1a89a51547d13c03b68d75ffb5717a35f381774567871e9e4190272c97eafcfa0a07a751d0bc8eeb0c206e12b2cff1065a3d5622635fa44c0dcb0722ad4c97e6b7d5844b2e9bab9ba1d083fa2930a3ea267d7f15d817e2b2e055ccfbaf019292f6156efd3a9a13ea90ecf59fc1bf35c6626db1c6759a50ed84acefd3cdb", 0x257}], 0x1}, 0x8000) socket$packet(0x11, 0x2, 0x300) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001480)="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", 0x2d5}], 0x1}, 0x0) 04:00:07 executing program 3: 04:00:08 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x200, 0x0, @mcast1, 0x4}, 0x18) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) syz_execute_func(&(0x7f00000000c0)="64ff0941c3c4e2c9975842c4c27d794e0066420fe2e33e0f1110c442019dccd3193e66430f3a0ce397") clone(0x1a02100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet_MCAST_LEAVE_GROUP(r1, 0x0, 0x2d, &(0x7f0000000300)={0xfffffffffffffffc, {{0x2, 0x0, @local}}}, 0x88) write$binfmt_elf32(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="9e249bed6bc9e264dd561982ca9b37b23c6542a46352d8497f24229698cf4b35b0522a860e2d0716ed49434c22b96a4b56765c86a41630a7777b3f7d459e401360cffbb7f8cee7a0536aacfd3bcb21df97a8"], 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r1, 0x0, 0x61, 0x0, &(0x7f0000000040)) 04:00:08 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, 0x0, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000002000)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001000)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqsrc(r2, 0x0, 0x2000000000000004, &(0x7f0000013ff4)={@remote}, 0xc) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000340)={{{@in=@broadcast, @in=@broadcast, 0x0, 0x0, 0x600, 0x0, 0xa}}, {{@in6=@local, 0x0, 0x33}, 0x0, @in6=@local}}, 0xe8) close(r2) dup3(r0, r1, 0x0) 04:00:08 executing program 0: 04:00:08 executing program 2: r0 = socket$inet6(0xa, 0x400000000000803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000006c0)="0a5c2d023c126285718070") mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0xc, 0x32, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x8000000003c) connect$inet6(r1, &(0x7f00000002c0)={0xa, 0x0, 0x0, @dev, 0x9}, 0x1c) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000440)="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", 0x257}], 0x1}, 0x8000) socket$packet(0x11, 0x2, 0x300) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001480)="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", 0x2d5}], 0x1}, 0x0) 04:00:08 executing program 3: 04:00:08 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) syz_execute_func(&(0x7f0000000000)="64ff0941c3c4e2c9975842c4c27d794e0066420fe2e3c46275a8323e0f1110c442019dccd3193e66430f3a0ce397") clone(0x1a02100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet_MCAST_LEAVE_GROUP(r1, 0x0, 0x2d, &(0x7f0000000300)={0xfffffffffffffffc, {{0x2, 0x0, @local}}}, 0x88) write$binfmt_elf32(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB], 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r1, 0x0, 0x61, 0x0, &(0x7f0000000040)) 04:00:08 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, 0x0, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000002000)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001000)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqsrc(r2, 0x0, 0x2000000000000004, &(0x7f0000013ff4)={@remote}, 0xc) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000340)={{{@in=@broadcast, @in=@broadcast, 0x0, 0x0, 0x300, 0x0, 0xa}}, {{@in6=@local, 0x0, 0x33}, 0x0, @in6=@local}}, 0xe8) close(r2) dup3(r0, r1, 0x0) 04:00:08 executing program 0: 04:00:08 executing program 3: 04:00:08 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x25d1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000080)="00000600000000000000", 0x0) ioctl$SG_EMULATED_HOST(r1, 0x2203, &(0x7f00000000c0)) write$binfmt_elf32(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c460000000000000000000000000300060000000000000000003800000000000000000000000000200002000000000000000000000000000000000000000000000000000000000400000000000000000000000000000300000000000000000000000000000002"], 0x69) execveat(r1, &(0x7f0000000000)='\x00', &(0x7f0000000280), 0x0, 0x1000) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 04:00:08 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = semget(0x0, 0x0, 0x0) semctl$GETZCNT(r1, 0x0, 0xf, 0x0) 04:00:08 executing program 2: r0 = socket$inet6(0xa, 0x400000000000803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000006c0)="0a5c2d023c126285718070") mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0xc, 0x32, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x8000000003c) connect$inet6(r1, &(0x7f00000002c0)={0xa, 0x0, 0x0, @dev, 0x9}, 0x1c) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000440)="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", 0x257}], 0x1}, 0x8000) socket$packet(0x11, 0x2, 0x300) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001480)="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", 0x2d5}], 0x1}, 0x0) 04:00:08 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) socketpair(0xa, 0x80000, 0x81, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f0000000180)={0x0, 0x9, 0x1}, &(0x7f00000001c0)=0x8) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r2, 0x84, 0x7b, &(0x7f0000000200)={0x0, 0x81}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f00000003c0)={r3, 0x7, 0x6, 0x8, 0x6, 0x7eb, 0x2, 0x8, {r4, @in={{0x2, 0x4e20, @remote}}, 0x4b, 0xfffffffffffffff8, 0x6, 0x80000000, 0x7fff}}, &(0x7f0000000280)=0xb0) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, &(0x7f0000000100), &(0x7f0000000140)=0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r5 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r5, 0x6, 0x16, &(0x7f0000000440), 0x131f64) syz_execute_func(&(0x7f00000000c0)="64ff0941c3c4e2c9975842c4c27d794e0066420fe2e33e0f1110c442019dccd3193e66430f3a0ce397") clone(0x1a02100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet_MCAST_LEAVE_GROUP(r5, 0x0, 0x2d, &(0x7f0000000300)={0xfffffffffffffffc, {{0x2, 0x0, @local}}}, 0x88) write$binfmt_elf32(r5, &(0x7f00000003c0)=ANY=[@ANYBLOB], 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r5, 0x0, 0x61, 0x0, &(0x7f0000000040)) 04:00:08 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, 0x0, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000002000)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001000)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqsrc(r2, 0x0, 0x2000000000000004, &(0x7f0000013ff4)={@remote}, 0xc) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000340)={{{@in=@broadcast, @in=@broadcast, 0x0, 0x0, 0x0, 0x2000000000000000, 0xa}}, {{@in6=@local, 0x0, 0x33}, 0x0, @in6=@local}}, 0xe8) close(r2) dup3(r0, r1, 0x0) 04:00:08 executing program 3: syz_mount_image$vfat(&(0x7f0000000100)='vfat\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001480)={[{@fat=@nfs='nfs'}]}) 04:00:08 executing program 0: r0 = socket$inet6(0xa, 0x803, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0a5c2d023c126285718070") r1 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x9}, 0xb) sendto$inet(r1, &(0x7f0000a34fff)='H', 0x1, 0x0, 0x0, 0x0) shutdown(r1, 0x1) recvmmsg(r1, &(0x7f0000008f80)=[{{&(0x7f0000000480)=@in6, 0x80, &(0x7f0000000400)=[{&(0x7f0000000000)=""/21, 0x15}, {&(0x7f0000000140)=""/81, 0x51}, {&(0x7f00000001c0)=""/253, 0xfd}, {&(0x7f00000002c0)=""/7, 0x7}, {&(0x7f0000000300)=""/48, 0x30}, {&(0x7f0000000340)=""/140, 0x8c}], 0x6, &(0x7f0000000080)=""/143, 0x8f}}], 0xb2, 0x0, &(0x7f0000009180)={0x0, 0x1c9c380}) 04:00:08 executing program 2: r0 = socket$inet6(0xa, 0x400000000000803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000006c0)="0a5c2d023c126285718070") mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0xc, 0x32, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x8000000003c) connect$inet6(r1, &(0x7f00000002c0)={0xa, 0x0, 0x0, @dev, 0x9}, 0x1c) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000440)="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", 0x257}], 0x1}, 0x8000) socket$packet(0x11, 0x2, 0x300) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001480)="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", 0x2d5}], 0x1}, 0x0) 04:00:08 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x25d1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000080)="00000600000000000000", 0x0) ioctl$SG_EMULATED_HOST(r1, 0x2203, &(0x7f00000000c0)) write$binfmt_elf32(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000000000000000000000030006000000000000000000380000000000000000000000000020000200000000000000000000000000000000000000000000000000000000040000000000000000000000000000030000000000000000000000000000000200000028e9653bf5"], 0x71) execveat(r1, &(0x7f0000000000)='\x00', &(0x7f0000000280), 0x0, 0x1000) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 04:00:08 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001900)=ANY=[@ANYBLOB="2000000000020307000000080000000000000000040002000800030025000000"], 0x20}}, 0x0) 04:00:08 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair(0x0, 0x5, 0x5, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$packet_int(r1, 0x107, 0x17, &(0x7f0000000240), 0x4) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080), 0x1c) r2 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) syz_execute_func(&(0x7f00000000c0)="64ff0941c3c4e2c9975842c4c27d794e0066420fe2e33e0f1110c442019dccd3193e66430f3a0ce397") ioctl$VIDIOC_S_PARM(r2, 0xc0cc5616, &(0x7f0000000100)={0xb, @capture={0x1000, 0x1, {0x101, 0xf622aee}, 0xd1, 0x67a}}) clone(0x8000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet_MCAST_LEAVE_GROUP(r2, 0x0, 0x2d, &(0x7f0000000300)={0xfffffffffffffffc, {{0x2, 0x0, @local}}}, 0x88) write$binfmt_elf32(r2, &(0x7f00000003c0)=ANY=[@ANYBLOB], 0x0) ioctl$EVIOCGKEYCODE_V2(r2, 0x80284504, &(0x7f0000000000)=""/1) getsockopt$ARPT_SO_GET_ENTRIES(r2, 0x0, 0x61, 0x0, &(0x7f0000000040)) 04:00:09 executing program 2: r0 = socket$inet6(0xa, 0x400000000000803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000006c0)="0a5c2d023c126285718070") mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0xc, 0x32, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x8000000003c) sendmsg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="2c7c579a7ae9c96d5cc9ad926a3eea1cf89515d52fc4300c0d33f21c491f50289b7a492cc0c90f234201a5c6f9b830f910b1902ed60d51ad019c73fc9065aa2c519f654874b01f87db4a2807b6a2c2532e9d54e219c9c5f95f", 0x59}], 0x1}, 0xc100) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000440)="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", 0x257}], 0x1}, 0x8000) socket$packet(0x11, 0x2, 0x300) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001480)="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", 0x2d5}], 0x1}, 0x0) [ 391.486456] FAT-fs (loop3): bogus number of reserved sectors [ 391.526453] FAT-fs (loop3): Can't find a valid FAT filesystem 04:00:09 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, 0x0, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000002000)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001000)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqsrc(r2, 0x0, 0x2000000000000004, &(0x7f0000013ff4)={@remote}, 0xc) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000340)={{{@in=@broadcast, @in=@broadcast, 0x0, 0x0, 0x0, 0x300000000000000, 0xa}}, {{@in6=@local, 0x0, 0x33}, 0x0, @in6=@local}}, 0xe8) close(r2) dup3(r0, r1, 0x0) 04:00:09 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) recvmsg$kcm(r1, &(0x7f00000003c0)={&(0x7f0000000100)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000240)=[{&(0x7f0000000180)=""/163, 0xa3}, {&(0x7f0000000000)=""/23, 0x17}], 0x2, &(0x7f0000000280)=""/96, 0x60, 0x2}, 0x2) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) syz_execute_func(&(0x7f00000000c0)="64ff0941c3c4e2c9975842c4c27d794e0066420fe2e33e0f1110c442019dccd3193e66430f3a0ce397") clone(0x1a02100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet_MCAST_LEAVE_GROUP(r1, 0x0, 0x2d, &(0x7f0000000300)={0xfffffffffffffffc, {{0x2, 0x0, @local}}}, 0x88) write$binfmt_elf32(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB], 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r1, 0x0, 0x61, 0x0, &(0x7f0000000040)) 04:00:09 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000002c0)=@ipv4_newroute={0x2c, 0x18, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP={0x8, 0x16, @nested={0x4}}, @RTA_ENCAP_TYPE={0x8, 0x15, 0x7}]}, 0x2c}}, 0x0) [ 391.708601] FAT-fs (loop3): bogus number of reserved sectors [ 391.797929] FAT-fs (loop3): Can't find a valid FAT filesystem 04:00:09 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, 0x0, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000002000)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001000)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqsrc(r2, 0x0, 0x2000000000000004, &(0x7f0000013ff4)={@remote}, 0xc) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000340)={{{@in=@broadcast, @in=@broadcast, 0x0, 0x0, 0x0, 0xa4ffffff00000000, 0xa}}, {{@in6=@local, 0x0, 0x33}, 0x0, @in6=@local}}, 0xe8) close(r2) dup3(r0, r1, 0x0) 04:00:09 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) syz_execute_func(&(0x7f00000000c0)="64ff0941c3c4e2c9975842c4c27d794e0066420fe2e33e0f1110c442019dccd3193e66430f3a0ce397") clone(0x1a02100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet_MCAST_LEAVE_GROUP(r1, 0x0, 0x2d, &(0x7f0000000300)={0xfffffffffffffffc, {{0x2, 0x0, @local}}}, 0x88) write$binfmt_elf32(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="b6a0ae032f651f813c2e104848f0ab95956a98ef5b72e7954c082fd52a2e3d7bc74bda15fa216b069eadd94a3370c85ec65cd0417df9810744070bf33049b3a7722f9cd53ae422"], 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r1, 0x0, 0x61, 0x0, &(0x7f0000000040)) [ 391.864353] netlink: 'syz-executor0': attribute type 21 has an invalid length. 04:00:09 executing program 2: r0 = socket$inet6(0xa, 0x400000000000803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000006c0)="0a5c2d023c126285718070") mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0xc, 0x32, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x8000000003c) sendmsg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="2c7c579a7ae9c96d5cc9ad926a3eea1cf89515d52fc4300c0d33f21c491f50289b7a492cc0c90f234201a5c6f9b830f910b1902ed60d51ad019c73fc9065aa2c519f654874b01f87db4a2807b6a2c2532e9d54e219c9c5f95f", 0x59}], 0x1}, 0xc100) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000440)="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", 0x257}], 0x1}, 0x8000) socket$packet(0x11, 0x2, 0x300) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001480)="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", 0x2d5}], 0x1}, 0x0) 04:00:09 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x25d1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000080)="00000600000000000000", 0x0) ioctl$SG_EMULATED_HOST(r1, 0x2203, &(0x7f00000000c0)) write$binfmt_elf32(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c460000000000000000000000000300060000000000000000003800000000000000000000000000200002000000000000000000000000000000000000000000000000000000000400000000000000000000000000000300"], 0x5a) execveat(r1, &(0x7f0000000000)='\x00', &(0x7f0000000280), 0x0, 0x1000) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 04:00:09 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x25d1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000080)="00000600000000000000", 0x0) ioctl$SG_EMULATED_HOST(r1, 0x2203, &(0x7f00000000c0)) write$binfmt_elf32(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000000000000000000000030006000000000000000000380000000000000000000000000020000200000000000000000000000000000000000000000000000000000000040000000000000000000000000000030000000000000000000000000000000200000028e9653bf5"], 0x71) execveat(r1, &(0x7f0000000000)='\x00', &(0x7f0000000280), 0x0, 0x1000) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) [ 391.956575] netlink: 'syz-executor0': attribute type 21 has an invalid length. 04:00:09 executing program 2: r0 = socket$inet6(0xa, 0x400000000000803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000006c0)="0a5c2d023c126285718070") mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0xc, 0x32, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x8000000003c) sendmsg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="2c7c579a7ae9c96d5cc9ad926a3eea1cf89515d52fc4300c0d33f21c491f50289b7a492cc0c90f234201a5c6f9b830f910b1902ed60d51ad019c73fc9065aa2c519f654874b01f87db4a2807b6a2c2532e9d54e219c9c5f95f", 0x59}], 0x1}, 0xc100) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000440)="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", 0x257}], 0x1}, 0x8000) socket$packet(0x11, 0x2, 0x300) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001480)="d09a0e63c9476288b671afdbd53a5994e137381f62021d1951b627b8dda57a5d17d744648c81c5703ed8146ab1b0171f89091b1dd3238d03dbb686df460963245dedf2973ee555af99499e44ad420dbf65fd46fbc99a1274429e2d5783751815828ec8cb3553110cca66460215353d19f6d8bbd8fb264eddea60b18e16c31aa5e200000491634ac2fd10e2cd30bcd7fede24263a7fff16e53ea293f3551b7147c33a44ea437fb1515c3e8d4f162fdebf8ebe11ae6fcd9372c8d8f19556ae091fe94215ae9434da412f6fa4cb6561e5f78ff9707844ee5d573fb294437722d9a06dfa61748c32c73d759933a8dd344c947d3efdbe90d0eb049df5fbb0c19f6785264b619c530d97395d44b04f7e2a280d658c7871ad373b792678c49227999651ef3b2ee1bc2b8f3035db376e8e09aa3837233c8713065a8ad131d24f6c42a3220d0e07c3d3e95d59a5dd10c09716b5f874ecf53aadfa5050ff40f2c3c4a629b6445e5836100afff5a8977583653b40ca316f8f11416e5c1bd5499636ddae25fc4970b37209cf5c0bf8e432160c258d14223baa52798e09858645773dd97e68a95310da713cff077b06000000d4f145e9199c126a7f235e5674a3c7f5c7129ac7c1a3319590249b6d34ef6c3d8b94c6fc7cdcbddb053243053f7bc1f230d3bc7dfc4359e33992d0a3946b914a093287a76ac4a249b5b86cc75476466e409553355fefab75e9268a8751ffc9481fcff1f49c475699595b315e2147ee038b7291600c6b1cf7c8f24d587b9464a67e5ccec17820e711b98f4f7d5053642068a3fff704c3fe26ba862b53e2622d6e8b4a4c815fb2ea90ef63e141209dd292fdf886ee3e64b90f47ce22661c7a21f7bc10df0248079b7be17284eb54e5ab5bde9c6857b3cb184586049e7741b2d8b5b1a19e99e1834a25959155720c1c0ef84d7b3c42e1ba282847d476cef0228b1422aba08e5f3c1cd279bbd1c5303c2e9c16a0da4f88f770fca118b09e92b51a33970e32ade003000000", 0x2d5}], 0x1}, 0x0) 04:00:09 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) syz_execute_func(&(0x7f00000000c0)="64ff0941c3c4e2c9975842c4c27d794e0066420fe2e33e0f1110c442019dccd3193e66430f3a0ce397") clone(0x1a02100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet_MCAST_LEAVE_GROUP(r1, 0x0, 0x2d, &(0x7f0000000300)={0xffffffffffffffec, {{0x2, 0x0, @local}}}, 0x88) write$binfmt_elf32(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="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"], 0x0) ioctl$KVM_SET_TSC_KHZ(r1, 0xaea2, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r1, 0x0, 0x61, 0x0, &(0x7f0000000040)) 04:00:09 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x25d1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000080)="00000600000000000000", 0x0) ioctl$SG_EMULATED_HOST(r1, 0x2203, &(0x7f00000000c0)) write$binfmt_elf32(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c460000000000000000000000000300060000000000000000003800000000000000000000000000200002000000000000000000000000000000000000000000000000000000000400000000000000000000000000000300"], 0x5a) execveat(r1, &(0x7f0000000000)='\x00', &(0x7f0000000280), 0x0, 0x1000) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 04:00:09 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, 0x0, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000002000)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001000)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqsrc(r2, 0x0, 0x2000000000000004, &(0x7f0000013ff4)={@remote}, 0xc) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000340)={{{@in=@broadcast, @in=@broadcast, 0x0, 0x0, 0x0, 0x100000000000000, 0xa}}, {{@in6=@local, 0x0, 0x33}, 0x0, @in6=@local}}, 0xe8) close(r2) dup3(r0, r1, 0x0) 04:00:09 executing program 2: r0 = socket$inet6(0xa, 0x400000000000803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000006c0)="0a5c2d023c126285718070") mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0xc, 0x32, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x0, 0x0, @dev, 0x9}, 0x1c) sendmsg(0xffffffffffffffff, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="2c7c579a7ae9c96d5cc9ad926a3eea1cf89515d52fc4300c0d33f21c491f50289b7a492cc0c90f234201a5c6f9b830f910b1902ed60d51ad019c73fc9065aa2c519f654874b01f87db4a2807b6a2c2532e9d54e219c9c5f95f", 0x59}], 0x1}, 0xc100) sendmsg(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000440)="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", 0x257}], 0x1}, 0x8000) socket$packet(0x11, 0x2, 0x300) sendmsg(0xffffffffffffffff, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001480)="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", 0x2d5}], 0x1}, 0x0) 04:00:10 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x25d1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000080)="00000600000000000000", 0x0) ioctl$SG_EMULATED_HOST(r1, 0x2203, &(0x7f00000000c0)) write$binfmt_elf32(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000000000000000000000030006000000000000000000380000000000000000000000000020000200000000000000000000000000000000000000000000000000000000040000000000000000000000000000030000000000000000000000000000000200000028e9653bf5"], 0x71) execveat(r1, &(0x7f0000000000)='\x00', &(0x7f0000000280), 0x0, 0x1000) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 04:00:10 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, 0x0, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000002000)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001000)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqsrc(r2, 0x0, 0x2000000000000004, &(0x7f0000013ff4)={@remote}, 0xc) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000340)={{{@in=@broadcast, @in=@broadcast, 0x0, 0x0, 0x0, 0x6000000, 0xa}}, {{@in6=@local, 0x0, 0x33}, 0x0, @in6=@local}}, 0xe8) close(r2) dup3(r0, r1, 0x0) 04:00:10 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x20000000000000f3) syz_execute_func(&(0x7f00000000c0)="64ff0941c3c4e2c9975842c4c27d794e0066420fe2e33e0f1110c442019dccd3193e66430f3a0ce397") clone(0x1a02100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet_MCAST_LEAVE_GROUP(r1, 0x0, 0x2d, &(0x7f0000000300)={0xfffffffffffffffc, {{0x2, 0x0, @local}}}, 0x88) write$binfmt_elf32(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB], 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r1, 0x0, 0x61, 0x0, &(0x7f0000000000)=0x32d) 04:00:10 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x25d1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000080)="00000600000000000000", 0x0) ioctl$SG_EMULATED_HOST(r1, 0x2203, &(0x7f00000000c0)) write$binfmt_elf32(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c460000000000000000000000000300060000000000000000003800000000000000000000000000200002000000000000000000000000000000000000000000000000000000000400000000000000000000000000000300"], 0x5a) execveat(r1, &(0x7f0000000000)='\x00', &(0x7f0000000280), 0x0, 0x1000) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 04:00:10 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x25d1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000080)="00000600000000000000", 0x0) ioctl$SG_EMULATED_HOST(r1, 0x2203, &(0x7f00000000c0)) write$binfmt_elf32(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c460000000000000000000000000300060000000000000000003800000000000000000000000000200002000000000000000000000000000000000000000000000000000000000400000000000000000000000000000300"], 0x5a) execveat(r1, &(0x7f0000000000)='\x00', &(0x7f0000000280), 0x0, 0x1000) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 04:00:10 executing program 2: r0 = socket$inet6(0xa, 0x400000000000803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000006c0)="0a5c2d023c126285718070") mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0xc, 0x32, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x0, 0x0, @dev, 0x9}, 0x1c) sendmsg(0xffffffffffffffff, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="2c7c579a7ae9c96d5cc9ad926a3eea1cf89515d52fc4300c0d33f21c491f50289b7a492cc0c90f234201a5c6f9b830f910b1902ed60d51ad019c73fc9065aa2c519f654874b01f87db4a2807b6a2c2532e9d54e219c9c5f95f", 0x59}], 0x1}, 0xc100) sendmsg(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000440)="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", 0x257}], 0x1}, 0x8000) socket$packet(0x11, 0x2, 0x300) sendmsg(0xffffffffffffffff, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001480)="d09a0e63c9476288b671afdbd53a5994e137381f62021d1951b627b8dda57a5d17d744648c81c5703ed8146ab1b0171f89091b1dd3238d03dbb686df460963245dedf2973ee555af99499e44ad420dbf65fd46fbc99a1274429e2d5783751815828ec8cb3553110cca66460215353d19f6d8bbd8fb264eddea60b18e16c31aa5e200000491634ac2fd10e2cd30bcd7fede24263a7fff16e53ea293f3551b7147c33a44ea437fb1515c3e8d4f162fdebf8ebe11ae6fcd9372c8d8f19556ae091fe94215ae9434da412f6fa4cb6561e5f78ff9707844ee5d573fb294437722d9a06dfa61748c32c73d759933a8dd344c947d3efdbe90d0eb049df5fbb0c19f6785264b619c530d97395d44b04f7e2a280d658c7871ad373b792678c49227999651ef3b2ee1bc2b8f3035db376e8e09aa3837233c8713065a8ad131d24f6c42a3220d0e07c3d3e95d59a5dd10c09716b5f874ecf53aadfa5050ff40f2c3c4a629b6445e5836100afff5a8977583653b40ca316f8f11416e5c1bd5499636ddae25fc4970b37209cf5c0bf8e432160c258d14223baa52798e09858645773dd97e68a95310da713cff077b06000000d4f145e9199c126a7f235e5674a3c7f5c7129ac7c1a3319590249b6d34ef6c3d8b94c6fc7cdcbddb053243053f7bc1f230d3bc7dfc4359e33992d0a3946b914a093287a76ac4a249b5b86cc75476466e409553355fefab75e9268a8751ffc9481fcff1f49c475699595b315e2147ee038b7291600c6b1cf7c8f24d587b9464a67e5ccec17820e711b98f4f7d5053642068a3fff704c3fe26ba862b53e2622d6e8b4a4c815fb2ea90ef63e141209dd292fdf886ee3e64b90f47ce22661c7a21f7bc10df0248079b7be17284eb54e5ab5bde9c6857b3cb184586049e7741b2d8b5b1a19e99e1834a25959155720c1c0ef84d7b3c42e1ba282847d476cef0228b1422aba08e5f3c1cd279bbd1c5303c2e9c16a0da4f88f770fca118b09e92b51a33970e32ade003000000", 0x2d5}], 0x1}, 0x0) 04:00:10 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, 0x0, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000002000)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001000)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqsrc(r2, 0x0, 0x2000000000000004, &(0x7f0000013ff4)={@remote}, 0xc) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000340)={{{@in=@broadcast, @in=@broadcast, 0x0, 0x0, 0x0, 0xff0f0000, 0xa}}, {{@in6=@local, 0x0, 0x33}, 0x0, @in6=@local}}, 0xe8) close(r2) dup3(r0, r1, 0x0) 04:00:10 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) syz_execute_func(&(0x7f00000000c0)="64ff0941c3c4e2c9975842c4c27d794e0066420fe2e33e0f1110c442019dccd3193e66430f3a0ce397") clone(0x1a02100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$FUSE_STATFS(r1, &(0x7f0000000180)={0x60, 0xfffffffffffffff5, 0x7, {{0xffffffffffffff5f, 0x100000000, 0x1, 0xc7c, 0x3f, 0x6, 0x2, 0x20}}}, 0x60) setsockopt$inet_MCAST_LEAVE_GROUP(r1, 0x0, 0x2d, &(0x7f0000000300)={0xfffffffffffffffc, {{0x2, 0x0, @local}}}, 0x88) write$binfmt_elf32(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB], 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(r1, 0x40505331, &(0x7f0000000100)={{0x8, 0x4}, {0x2, 0x3}, 0x3f, 0x2, 0x1}) getsockopt$ARPT_SO_GET_ENTRIES(r1, 0x0, 0x61, 0x0, &(0x7f0000000040)) 04:00:10 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x25d1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000080)="00000600000000000000", 0x0) ioctl$SG_EMULATED_HOST(r1, 0x2203, &(0x7f00000000c0)) write$binfmt_elf32(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000000000000000000000030006000000000000000000380000000000000000000000000020000200000000000000000000000000000000000000000000000000000000040000000000000000000000000000030000000000000000000000000000000200000028e9653bf5f378f24e"], 0x75) execveat(r1, &(0x7f0000000000)='\x00', &(0x7f0000000280), 0x0, 0x1000) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 04:00:10 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x25d1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000080)="00000600000000000000", 0x0) ioctl$SG_EMULATED_HOST(r1, 0x2203, &(0x7f00000000c0)) write$binfmt_elf32(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c460000000000000000000000000300060000000000000000003800000000000000000000000000200002000000000000000000000000000000000000000000000000000000000400000000000000000000000000000300"], 0x5a) execveat(r1, &(0x7f0000000000)='\x00', &(0x7f0000000280), 0x0, 0x1000) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 04:00:10 executing program 2: r0 = socket$inet6(0xa, 0x400000000000803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000006c0)="0a5c2d023c126285718070") mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0xc, 0x32, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x0, 0x0, @dev, 0x9}, 0x1c) sendmsg(0xffffffffffffffff, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="2c7c579a7ae9c96d5cc9ad926a3eea1cf89515d52fc4300c0d33f21c491f50289b7a492cc0c90f234201a5c6f9b830f910b1902ed60d51ad019c73fc9065aa2c519f654874b01f87db4a2807b6a2c2532e9d54e219c9c5f95f", 0x59}], 0x1}, 0xc100) sendmsg(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000440)="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", 0x257}], 0x1}, 0x8000) socket$packet(0x11, 0x2, 0x300) sendmsg(0xffffffffffffffff, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001480)="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", 0x2d5}], 0x1}, 0x0) 04:00:10 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) syz_execute_func(&(0x7f00000000c0)="64ff0941c3c4e2c9975842c4c27d794e0066420fe2e33e0f1110c442019dccd3193e66430f3a0ce397") clone(0x1a02100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet_MCAST_LEAVE_GROUP(r1, 0x0, 0x2d, &(0x7f0000000300)={0xfffffffffffffffc, {{0x2, 0x0, @local}}}, 0x88) write$binfmt_elf32(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB], 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r1, 0x0, 0x61, 0x0, &(0x7f0000000040)) fsetxattr$security_selinux(r0, &(0x7f0000000000)='security.selinux\x00', &(0x7f0000000100)='system_u:object_r:urandom_device_t:s0\x00', 0x26, 0x2) 04:00:10 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, 0x0, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000002000)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001000)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqsrc(r2, 0x0, 0x2000000000000004, &(0x7f0000013ff4)={@remote}, 0xc) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000340)={{{@in=@broadcast, @in=@broadcast, 0x0, 0x0, 0x0, 0xa4ffffff, 0xa}}, {{@in6=@local, 0x0, 0x33}, 0x0, @in6=@local}}, 0xe8) close(r2) dup3(r0, r1, 0x0) 04:00:11 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x25d1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000080)="00000600000000000000", 0x0) ioctl$SG_EMULATED_HOST(r1, 0x2203, &(0x7f00000000c0)) write$binfmt_elf32(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c460000000000000000000000000300060000000000000000003800000000000000000000000000200002000000000000000000000000000000000000000000000000000000000400000000000000000000000000000300"], 0x5a) execveat(r1, &(0x7f0000000000)='\x00', &(0x7f0000000280), 0x0, 0x1000) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 04:00:11 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x25d1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000080)="00000600000000000000", 0x0) ioctl$SG_EMULATED_HOST(r1, 0x2203, &(0x7f00000000c0)) write$binfmt_elf32(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c460000000000000000000000000300060000000000000000003800000000000000000000000000200002000000000000000000000000000000"], 0x3c) execveat(r1, &(0x7f0000000000)='\x00', &(0x7f0000000280), 0x0, 0x1000) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 04:00:11 executing program 2: r0 = socket$inet6(0xa, 0x400000000000803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000006c0)="0a5c2d023c126285718070") r1 = socket$inet6(0xa, 0x3, 0x8000000003c) connect$inet6(r1, &(0x7f00000002c0)={0xa, 0x0, 0x0, @dev, 0x9}, 0x1c) sendmsg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="2c7c579a7ae9c96d5cc9ad926a3eea1cf89515d52fc4300c0d33f21c491f50289b7a492cc0c90f234201a5c6f9b830f910b1902ed60d51ad019c73fc9065aa2c519f654874b01f87db4a2807b6a2c2532e9d54e219c9c5f95f", 0x59}], 0x1}, 0xc100) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000440)="b10b938636ea69df7b5a9984bb1bc72ef58d96e56e11df900a707f4946b1637e2096c584b9a1b4e017163fbdb35160a56c11dfbe74df97d36d19ad6a91c6fb4ad19581b8cf707131830f7a22b1b263c9da0e443c5e969ed6a0d3bc508bf75c3147447379f585759ceba0de5cda46291dc1b8f106a83e1cde43a862d95413ce2616b261ed9f79913ae781b3b843ea1b4429a750b8ccb1952a7b863d0bada9f61df6609fe368eaf47c0ce9e46a22b0d75b063deeaa94285d0c43353046e0a308296a76b0b0145f8af9aa0ed0e18bc50509eaef21c8e03842a97df3a462ea3f9d5f83bf1d4d2875f0d5b24e941483f863cd2ea7c769bd3e594fb173dd873c7d9a3fd20939ad1d5867881ed77a078007b4972aba36cae02004373a6a74d74cb15a52c5f8426cb6f235d38048fd91f5d6100fd58a335df10add227d804167ba191c7a035c5a2a916e7fef18a6003578820b3e0be26a22f2c149f40a0335cadcca64a5e44179e6ce4d7f7c16e8a96c5be7cdf66eef901cb8eeabc94bae30acca8c6fa02889c32311044dcbc9a2e02e0632f7f9aa96849abede543773745e4652fccc503003f10cd68ddab594969ad36cb622ed7ba22dc46a80fb63ac2c561a80ae5c10b295b9f75d9536ba1ac24b8e9ae217611ffe79cb9422158475c1a89a51547d13c03b68d75ffb5717a35f381774567871e9e4190272c97eafcfa0a07a751d0bc8eeb0c206e12b2cff1065a3d5622635fa44c0dcb0722ad4c97e6b7d5844b2e9bab9ba1d083fa2930a3ea267d7f15d817e2b2e055ccfbaf019292f6156efd3a9a13ea90ecf59fc1bf35c6626db1c6759a50ed84acefd3cdb", 0x257}], 0x1}, 0x8000) socket$packet(0x11, 0x2, 0x300) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001480)="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", 0x2d5}], 0x1}, 0x0) 04:00:11 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x25d1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000080)="00000600000000000000", 0x0) ioctl$SG_EMULATED_HOST(r1, 0x2203, &(0x7f00000000c0)) write$binfmt_elf32(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000000000000000000000030006000000000000000000380000000000000000000000000020000200000000000000000000000000000000000000000000000000000000040000000000000000000000000000030000000000000000000000000000000200000028e9653bf5f378f24e"], 0x75) execveat(r1, &(0x7f0000000000)='\x00', &(0x7f0000000280), 0x0, 0x1000) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 04:00:11 executing program 2: r0 = socket$inet6(0xa, 0x400000000000803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000006c0)="0a5c2d023c126285718070") r1 = socket$inet6(0xa, 0x3, 0x8000000003c) connect$inet6(r1, &(0x7f00000002c0)={0xa, 0x0, 0x0, @dev, 0x9}, 0x1c) sendmsg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="2c7c579a7ae9c96d5cc9ad926a3eea1cf89515d52fc4300c0d33f21c491f50289b7a492cc0c90f234201a5c6f9b830f910b1902ed60d51ad019c73fc9065aa2c519f654874b01f87db4a2807b6a2c2532e9d54e219c9c5f95f", 0x59}], 0x1}, 0xc100) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000440)="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", 0x257}], 0x1}, 0x8000) socket$packet(0x11, 0x2, 0x300) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001480)="d09a0e63c9476288b671afdbd53a5994e137381f62021d1951b627b8dda57a5d17d744648c81c5703ed8146ab1b0171f89091b1dd3238d03dbb686df460963245dedf2973ee555af99499e44ad420dbf65fd46fbc99a1274429e2d5783751815828ec8cb3553110cca66460215353d19f6d8bbd8fb264eddea60b18e16c31aa5e200000491634ac2fd10e2cd30bcd7fede24263a7fff16e53ea293f3551b7147c33a44ea437fb1515c3e8d4f162fdebf8ebe11ae6fcd9372c8d8f19556ae091fe94215ae9434da412f6fa4cb6561e5f78ff9707844ee5d573fb294437722d9a06dfa61748c32c73d759933a8dd344c947d3efdbe90d0eb049df5fbb0c19f6785264b619c530d97395d44b04f7e2a280d658c7871ad373b792678c49227999651ef3b2ee1bc2b8f3035db376e8e09aa3837233c8713065a8ad131d24f6c42a3220d0e07c3d3e95d59a5dd10c09716b5f874ecf53aadfa5050ff40f2c3c4a629b6445e5836100afff5a8977583653b40ca316f8f11416e5c1bd5499636ddae25fc4970b37209cf5c0bf8e432160c258d14223baa52798e09858645773dd97e68a95310da713cff077b06000000d4f145e9199c126a7f235e5674a3c7f5c7129ac7c1a3319590249b6d34ef6c3d8b94c6fc7cdcbddb053243053f7bc1f230d3bc7dfc4359e33992d0a3946b914a093287a76ac4a249b5b86cc75476466e409553355fefab75e9268a8751ffc9481fcff1f49c475699595b315e2147ee038b7291600c6b1cf7c8f24d587b9464a67e5ccec17820e711b98f4f7d5053642068a3fff704c3fe26ba862b53e2622d6e8b4a4c815fb2ea90ef63e141209dd292fdf886ee3e64b90f47ce22661c7a21f7bc10df0248079b7be17284eb54e5ab5bde9c6857b3cb184586049e7741b2d8b5b1a19e99e1834a25959155720c1c0ef84d7b3c42e1ba282847d476cef0228b1422aba08e5f3c1cd279bbd1c5303c2e9c16a0da4f88f770fca118b09e92b51a33970e32ade003000000", 0x2d5}], 0x1}, 0x0) 04:00:11 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x14040, 0x0) ioctl$TIOCMSET(r1, 0x5418, &(0x7f0000000100)=0x2) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080), 0x1c) r2 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) syz_execute_func(&(0x7f00000000c0)="64ff0941c3c4e2c9975842c4c27d794e0066420fe2e33e0f1110c442019dccd3193e66430f3a0ce397") clone(0x1a02100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet_MCAST_LEAVE_GROUP(r2, 0x0, 0x2d, &(0x7f0000000300)={0xfffffffffffffffc, {{0x2, 0x0, @local}}}, 0x88) write$binfmt_elf32(r2, &(0x7f00000003c0)=ANY=[@ANYBLOB], 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r2, 0x0, 0x61, 0x0, &(0x7f0000000040)) 04:00:11 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, 0x0, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000002000)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001000)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqsrc(r2, 0x0, 0x2000000000000004, &(0x7f0000013ff4)={@remote}, 0xc) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000340)={{{@in=@broadcast, @in=@broadcast, 0x0, 0x0, 0x0, 0xffffffa4, 0xa}}, {{@in6=@local, 0x0, 0x33}, 0x0, @in6=@local}}, 0xe8) close(r2) dup3(r0, r1, 0x0) 04:00:11 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x25d1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000080)="00000600000000000000", 0x0) ioctl$SG_EMULATED_HOST(r1, 0x2203, &(0x7f00000000c0)) write$binfmt_elf32(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c460000000000000000000000000300060000000000000000003800000000000000000000000000200002000000000000000000000000000000"], 0x3c) execveat(r1, &(0x7f0000000000)='\x00', &(0x7f0000000280), 0x0, 0x1000) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 04:00:11 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000), 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x103, 0x0) r1 = syz_open_dev$sndtimer(&(0x7f0000000100)='/dev/snd/timer\x00', 0x0, 0x42) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) syz_open_dev$admmidi(&(0x7f00000002c0)='/dev/admmidi#\x00', 0x0, 0x10400) name_to_handle_at(r3, &(0x7f0000000240)='./file0\x00', &(0x7f0000000640)=ANY=[@ANYBLOB="a7000000040000007e91768811f5db653ce80fa95aa72828fa11c3356079236bbd949e57e86700fa87fe009d849387fa9dc3ad3e05a4599a146c049012a67d890b02276422bb02f76ceabe0df0704f31c5b3170ee6ab62eb383ccab773a7c71941d4b1801fd6d614c0b0c20bfbb8a7d89d95a1d6267f7fb83fb7821162b588287a2a3f9212cbdda54e840b1b406621772edfb533f59473f8ec7f08be65738ec40b271d34b7d1b3"], &(0x7f0000000280), 0x0) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000080), &(0x7f0000000440)=0x8) setsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r3, 0x84, 0x71, &(0x7f0000000480)={0x0, 0x3}, 0x8) ioctl$UI_SET_FFBIT(0xffffffffffffffff, 0x4004556b, 0xe) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = getuid() setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002080)={{{@in=@loopback, @in, 0x4e23, 0x7, 0x4e21, 0x81, 0xa, 0x80, 0x80, 0x8, 0x0, r4}, {0x7, 0xfffffffffffffff7, 0x429, 0x3, 0x7, 0x955c, 0x1}, {0x7, 0xfffffffffffffff8, 0x1, 0x6}, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1}, {{@in6=@local, 0x4d4, 0x7f}, 0xa, @in6=@mcast2, 0x3507, 0x7, 0x3, 0x400, 0x8, 0x3, 0x3f5}}, 0xe8) setsockopt$inet_mreqn(r3, 0x0, 0xe368adb30c792f1f, &(0x7f0000000340)={@local, @local}, 0xc) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x4, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000100)=0x0) getpeername$unix(r3, &(0x7f00000003c0)=@abs, &(0x7f0000000600)=0x6e) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, &(0x7f0000000180)=r5) r6 = openat$cgroup_procs(r3, &(0x7f00000000c0)='tasks\x00', 0x2, 0x0) setsockopt$inet_icmp_ICMP_FILTER(r3, 0x1, 0x1, &(0x7f00000001c0)={0x730}, 0x4) getsockopt$IP_VS_SO_GET_TIMEOUT(r2, 0x0, 0x486, &(0x7f0000000580), &(0x7f00000005c0)=0xfffffffffffffeb1) unshare(0x40000000) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000040)={'tunl0\x00', @ifru_names='bridge0\x00'}) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000001000)={{0x3}}) syz_open_dev$admmidi(&(0x7f0000000300)='/dev/admmidi#\x00', 0xffffffff, 0x200000) ioctl(r0, 0x0, &(0x7f0000000000)="025cc807") r7 = fcntl$getown(r6, 0x9) ptrace(0x421f, r7) clock_gettime(0x0, &(0x7f0000000080)) 04:00:11 executing program 2: r0 = socket$inet6(0xa, 0x400000000000803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000006c0)="0a5c2d023c126285718070") r1 = socket$inet6(0xa, 0x3, 0x8000000003c) connect$inet6(r1, &(0x7f00000002c0)={0xa, 0x0, 0x0, @dev, 0x9}, 0x1c) sendmsg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="2c7c579a7ae9c96d5cc9ad926a3eea1cf89515d52fc4300c0d33f21c491f50289b7a492cc0c90f234201a5c6f9b830f910b1902ed60d51ad019c73fc9065aa2c519f654874b01f87db4a2807b6a2c2532e9d54e219c9c5f95f", 0x59}], 0x1}, 0xc100) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000440)="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", 0x257}], 0x1}, 0x8000) socket$packet(0x11, 0x2, 0x300) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001480)="d09a0e63c9476288b671afdbd53a5994e137381f62021d1951b627b8dda57a5d17d744648c81c5703ed8146ab1b0171f89091b1dd3238d03dbb686df460963245dedf2973ee555af99499e44ad420dbf65fd46fbc99a1274429e2d5783751815828ec8cb3553110cca66460215353d19f6d8bbd8fb264eddea60b18e16c31aa5e200000491634ac2fd10e2cd30bcd7fede24263a7fff16e53ea293f3551b7147c33a44ea437fb1515c3e8d4f162fdebf8ebe11ae6fcd9372c8d8f19556ae091fe94215ae9434da412f6fa4cb6561e5f78ff9707844ee5d573fb294437722d9a06dfa61748c32c73d759933a8dd344c947d3efdbe90d0eb049df5fbb0c19f6785264b619c530d97395d44b04f7e2a280d658c7871ad373b792678c49227999651ef3b2ee1bc2b8f3035db376e8e09aa3837233c8713065a8ad131d24f6c42a3220d0e07c3d3e95d59a5dd10c09716b5f874ecf53aadfa5050ff40f2c3c4a629b6445e5836100afff5a8977583653b40ca316f8f11416e5c1bd5499636ddae25fc4970b37209cf5c0bf8e432160c258d14223baa52798e09858645773dd97e68a95310da713cff077b06000000d4f145e9199c126a7f235e5674a3c7f5c7129ac7c1a3319590249b6d34ef6c3d8b94c6fc7cdcbddb053243053f7bc1f230d3bc7dfc4359e33992d0a3946b914a093287a76ac4a249b5b86cc75476466e409553355fefab75e9268a8751ffc9481fcff1f49c475699595b315e2147ee038b7291600c6b1cf7c8f24d587b9464a67e5ccec17820e711b98f4f7d5053642068a3fff704c3fe26ba862b53e2622d6e8b4a4c815fb2ea90ef63e141209dd292fdf886ee3e64b90f47ce22661c7a21f7bc10df0248079b7be17284eb54e5ab5bde9c6857b3cb184586049e7741b2d8b5b1a19e99e1834a25959155720c1c0ef84d7b3c42e1ba282847d476cef0228b1422aba08e5f3c1cd279bbd1c5303c2e9c16a0da4f88f770fca118b09e92b51a33970e32ade003000000", 0x2d5}], 0x1}, 0x0) 04:00:11 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) syz_execute_func(&(0x7f00000000c0)="64ff0941c3c4e2c9975842c4c27d794e0066420fe2e33e0f1110c442019dccd3193e66430f3a0ce397") clone(0x81220002, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet_MCAST_LEAVE_GROUP(r1, 0x0, 0x2d, &(0x7f0000000300)={0xfffffffffffffffc, {{0x2, 0x0, @local}}}, 0x88) write$binfmt_elf32(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="0f4b5a"], 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r1, 0x0, 0x61, 0x0, &(0x7f0000000040)) 04:00:11 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, 0x0, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000002000)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001000)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqsrc(r2, 0x0, 0x2000000000000004, &(0x7f0000013ff4)={@remote}, 0xc) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000340)={{{@in=@broadcast, @in=@broadcast, 0x0, 0x0, 0x0, 0x600000000000000, 0xa}}, {{@in6=@local, 0x0, 0x33}, 0x0, @in6=@local}}, 0xe8) close(r2) dup3(r0, r1, 0x0) 04:00:12 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x25d1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000080)="00000600000000000000", 0x0) ioctl$SG_EMULATED_HOST(r1, 0x2203, &(0x7f00000000c0)) write$binfmt_elf32(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000000000000000000000030006000000000000000000380000000000000000000000000020000200000000000000000000000000000000000000000000000000000000040000000000000000000000000000030000000000000000000000000000000200000028e9653bf5f378f24e"], 0x75) execveat(r1, &(0x7f0000000000)='\x00', &(0x7f0000000280), 0x0, 0x1000) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 04:00:12 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x25d1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000080)="00000600000000000000", 0x0) ioctl$SG_EMULATED_HOST(r1, 0x2203, &(0x7f00000000c0)) write$binfmt_elf32(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c460000000000000000000000000300060000000000000000003800000000000000000000000000200002000000000000000000000000000000"], 0x3c) execveat(r1, &(0x7f0000000000)='\x00', &(0x7f0000000280), 0x0, 0x1000) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 04:00:12 executing program 2: socket$inet6(0xa, 0x400000000000803, 0x3) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0xc, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x8000000003c) connect$inet6(r0, &(0x7f00000002c0)={0xa, 0x0, 0x0, @dev, 0x9}, 0x1c) sendmsg(r0, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="2c7c579a7ae9c96d5cc9ad926a3eea1cf89515d52fc4300c0d33f21c491f50289b7a492cc0c90f234201a5c6f9b830f910b1902ed60d51ad019c73fc9065aa2c519f654874b01f87db4a2807b6a2c2532e9d54e219c9c5f95f", 0x59}], 0x1}, 0xc100) sendmsg(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000440)="b10b938636ea69df7b5a9984bb1bc72ef58d96e56e11df900a707f4946b1637e2096c584b9a1b4e017163fbdb35160a56c11dfbe74df97d36d19ad6a91c6fb4ad19581b8cf707131830f7a22b1b263c9da0e443c5e969ed6a0d3bc508bf75c3147447379f585759ceba0de5cda46291dc1b8f106a83e1cde43a862d95413ce2616b261ed9f79913ae781b3b843ea1b4429a750b8ccb1952a7b863d0bada9f61df6609fe368eaf47c0ce9e46a22b0d75b063deeaa94285d0c43353046e0a308296a76b0b0145f8af9aa0ed0e18bc50509eaef21c8e03842a97df3a462ea3f9d5f83bf1d4d2875f0d5b24e941483f863cd2ea7c769bd3e594fb173dd873c7d9a3fd20939ad1d5867881ed77a078007b4972aba36cae02004373a6a74d74cb15a52c5f8426cb6f235d38048fd91f5d6100fd58a335df10add227d804167ba191c7a035c5a2a916e7fef18a6003578820b3e0be26a22f2c149f40a0335cadcca64a5e44179e6ce4d7f7c16e8a96c5be7cdf66eef901cb8eeabc94bae30acca8c6fa02889c32311044dcbc9a2e02e0632f7f9aa96849abede543773745e4652fccc503003f10cd68ddab594969ad36cb622ed7ba22dc46a80fb63ac2c561a80ae5c10b295b9f75d9536ba1ac24b8e9ae217611ffe79cb9422158475c1a89a51547d13c03b68d75ffb5717a35f381774567871e9e4190272c97eafcfa0a07a751d0bc8eeb0c206e12b2cff1065a3d5622635fa44c0dcb0722ad4c97e6b7d5844b2e9bab9ba1d083fa2930a3ea267d7f15d817e2b2e055ccfbaf019292f6156efd3a9a13ea90ecf59fc1bf35c6626db1c6759a50ed84acefd3cdb", 0x257}], 0x1}, 0x8000) socket$packet(0x11, 0x2, 0x300) sendmsg(r0, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001480)="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", 0x2d5}], 0x1}, 0x0) [ 394.648208] IPVS: ftp: loaded support on port[0] = 21 04:00:12 executing program 1: socketpair$inet(0x2, 0x4, 0xfffffffffffffff7, &(0x7f0000000000)={0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffff9c, 0x84, 0x11, &(0x7f0000000100)={0x0, 0x3}, &(0x7f0000000140)=0x8) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000180)={r1, @in6={{0xa, 0x4e24, 0x1, @mcast2, 0x7}}, 0xa1b, 0x5}, 0x90) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) connect$inet6(r2, &(0x7f0000000080), 0x1c) r3 = dup2(r2, r2) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000440), 0x131f64) syz_execute_func(&(0x7f00000000c0)="64ff0941c3c4e2c9975842c4c27d794e0066420fe2e33e0f1110c442019dccd3193e66430f3a0ce397") clone(0x1a02100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet_MCAST_LEAVE_GROUP(r3, 0x0, 0x2d, &(0x7f0000000300)={0xfffffffffffffffc, {{0x2, 0x0, @local}}}, 0x88) ioctl$PERF_EVENT_IOC_QUERY_BPF(r3, 0xc008240a, &(0x7f0000000240)={0x2, 0x0, [0x0, 0x0]}) write$binfmt_elf32(r3, &(0x7f00000003c0)=ANY=[@ANYBLOB], 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r3, 0x0, 0x61, 0x0, &(0x7f0000000040)) 04:00:12 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x25d1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000080)="00000600000000000000", 0x0) ioctl$SG_EMULATED_HOST(r1, 0x2203, 0x0) write$binfmt_elf32(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000000000000000000000030006000000000000000000380000000000000000000000000020000200000000000000000000000000000000000000000000000000000000040000000000000000000000000000030000000000000000000000000000000200000028e9653bf5f378f24e50b960"], 0x78) execveat(r1, &(0x7f0000000000)='\x00', &(0x7f0000000280), 0x0, 0x1000) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 04:00:12 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, 0x0, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000002000)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001000)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqsrc(r2, 0x0, 0x2000000000000004, &(0x7f0000013ff4)={@remote}, 0xc) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000340)={{{@in=@broadcast, @in=@broadcast, 0x0, 0x0, 0x0, 0x3000000, 0xa}}, {{@in6=@local, 0x0, 0x33}, 0x0, @in6=@local}}, 0xe8) close(r2) dup3(r0, r1, 0x0) 04:00:12 executing program 3 (fault-call:8 fault-nth:0): clone(0x41fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f00000000c0)) syz_open_dev$rtc(&(0x7f0000000080)='/dev/rtc#\x00', 0x0, 0x0) ptrace(0x10, r0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000000)) getsockopt$inet_sctp6_SCTP_NODELAY(0xffffffffffffffff, 0x84, 0x3, &(0x7f0000000140), &(0x7f00000001c0)=0x4) ptrace$setregs(0xf, r0, 0x0, &(0x7f0000000180)="a96d55a756") ptrace$getregset(0x4204, r0, 0x2, &(0x7f0000000280)={0x0}) 04:00:12 executing program 2: socket$inet6(0xa, 0x400000000000803, 0x3) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0xc, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x8000000003c) connect$inet6(r0, &(0x7f00000002c0)={0xa, 0x0, 0x0, @dev, 0x9}, 0x1c) sendmsg(r0, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="2c7c579a7ae9c96d5cc9ad926a3eea1cf89515d52fc4300c0d33f21c491f50289b7a492cc0c90f234201a5c6f9b830f910b1902ed60d51ad019c73fc9065aa2c519f654874b01f87db4a2807b6a2c2532e9d54e219c9c5f95f", 0x59}], 0x1}, 0xc100) sendmsg(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000440)="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", 0x257}], 0x1}, 0x8000) socket$packet(0x11, 0x2, 0x300) sendmsg(r0, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001480)="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", 0x2d5}], 0x1}, 0x0) 04:00:12 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000), 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x103, 0x0) r1 = syz_open_dev$sndtimer(&(0x7f0000000100)='/dev/snd/timer\x00', 0x0, 0x42) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) syz_open_dev$admmidi(&(0x7f00000002c0)='/dev/admmidi#\x00', 0x0, 0x10400) name_to_handle_at(r3, &(0x7f0000000240)='./file0\x00', &(0x7f0000000640)=ANY=[@ANYBLOB="a7000000040000007e91768811f5db653ce80fa95aa72828fa11c3356079236bbd949e57e86700fa87fe009d849387fa9dc3ad3e05a4599a146c049012a67d890b02276422bb02f76ceabe0df0704f31c5b3170ee6ab62eb383ccab773a7c71941d4b1801fd6d614c0b0c20bfbb8a7d89d95a1d6267f7fb83fb7821162b588287a2a3f9212cbdda54e840b1b406621772edfb533f59473f8ec7f08be65738ec40b271d34b7d1b3"], &(0x7f0000000280), 0x0) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000080), &(0x7f0000000440)=0x8) setsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r3, 0x84, 0x71, &(0x7f0000000480)={0x0, 0x3}, 0x8) ioctl$UI_SET_FFBIT(0xffffffffffffffff, 0x4004556b, 0xe) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = getuid() setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002080)={{{@in=@loopback, @in, 0x4e23, 0x7, 0x4e21, 0x81, 0xa, 0x80, 0x80, 0x8, 0x0, r4}, {0x7, 0xfffffffffffffff7, 0x429, 0x3, 0x7, 0x955c, 0x1}, {0x7, 0xfffffffffffffff8, 0x1, 0x6}, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1}, {{@in6=@local, 0x4d4, 0x7f}, 0xa, @in6=@mcast2, 0x3507, 0x7, 0x3, 0x400, 0x8, 0x3, 0x3f5}}, 0xe8) setsockopt$inet_mreqn(r3, 0x0, 0xe368adb30c792f1f, &(0x7f0000000340)={@local, @local}, 0xc) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x4, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000100)=0x0) getpeername$unix(r3, &(0x7f00000003c0)=@abs, &(0x7f0000000600)=0x6e) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, &(0x7f0000000180)=r5) r6 = openat$cgroup_procs(r3, &(0x7f00000000c0)='tasks\x00', 0x2, 0x0) setsockopt$inet_icmp_ICMP_FILTER(r3, 0x1, 0x1, &(0x7f00000001c0)={0x730}, 0x4) getsockopt$IP_VS_SO_GET_TIMEOUT(r2, 0x0, 0x486, &(0x7f0000000580), &(0x7f00000005c0)=0xfffffffffffffeb1) unshare(0x40000000) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000040)={'tunl0\x00', @ifru_names='bridge0\x00'}) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000001000)={{0x3}}) syz_open_dev$admmidi(&(0x7f0000000300)='/dev/admmidi#\x00', 0xffffffff, 0x200000) ioctl(r0, 0x0, &(0x7f0000000000)="025cc807") r7 = fcntl$getown(r6, 0x9) ptrace(0x421f, r7) clock_gettime(0x0, &(0x7f0000000080)) 04:00:12 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) syz_execute_func(&(0x7f00000000c0)="64ff0941c3c4e2c9975842c4c27d794e0066420fe2e33e0f1110c442019dccd3193e66430f3a0ce397") clone(0x1a02100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet_MCAST_LEAVE_GROUP(r1, 0x0, 0x2d, &(0x7f0000000300)={0xfffffffffffffffc, {{0x2, 0x0, @local}}}, 0x88) write$binfmt_elf32(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB], 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r1, 0x0, 0x61, 0x0, &(0x7f0000000040)) setsockopt$inet6_tcp_TLS_TX(r0, 0x6, 0x1, &(0x7f0000000000), 0x4) 04:00:12 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, 0x0, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000002000)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001000)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqsrc(r2, 0x0, 0x2000000000000004, &(0x7f0000013ff4)={@remote}, 0xc) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000340)={{{@in=@broadcast, @in=@broadcast, 0x0, 0x0, 0x0, 0x1000000, 0xa}}, {{@in6=@local, 0x0, 0x33}, 0x0, @in6=@local}}, 0xe8) close(r2) dup3(r0, r1, 0x0) 04:00:12 executing program 2: socket$inet6(0xa, 0x400000000000803, 0x3) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0xc, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x8000000003c) connect$inet6(r0, &(0x7f00000002c0)={0xa, 0x0, 0x0, @dev, 0x9}, 0x1c) sendmsg(r0, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="2c7c579a7ae9c96d5cc9ad926a3eea1cf89515d52fc4300c0d33f21c491f50289b7a492cc0c90f234201a5c6f9b830f910b1902ed60d51ad019c73fc9065aa2c519f654874b01f87db4a2807b6a2c2532e9d54e219c9c5f95f", 0x59}], 0x1}, 0xc100) sendmsg(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000440)="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", 0x257}], 0x1}, 0x8000) socket$packet(0x11, 0x2, 0x300) sendmsg(r0, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001480)="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", 0x2d5}], 0x1}, 0x0) 04:00:12 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x25d1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000080)="00000600000000000000", 0x0) ioctl$SG_EMULATED_HOST(r1, 0x2203, &(0x7f00000000c0)) write$binfmt_elf32(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000000000000000000000030006000000000000000000380000000000000000000000000020000200000000000000000000000000000000000000000000000000000000040000000000000000000000000000030000000000000000000000000000000200000028e9653bf5f378f24e50b9"], 0x77) execveat(r1, &(0x7f0000000000)='\x00', &(0x7f0000000280), 0x0, 0x1000) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 04:00:13 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000000)=[@timestamp, @mss={0x2, 0x8}, @timestamp], 0x1) ioctl$INOTIFY_IOC_SETNEXTWD(r1, 0x40044900, 0xffffffffffffff4f) syz_execute_func(&(0x7f00000000c0)="64ff0941c3c4e2c9975842c4c27d794e0066420fe2e33e0f1110c442019dccd3193e66430f3a0ce397") clone(0x1a02100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet_MCAST_LEAVE_GROUP(r1, 0x0, 0x2d, &(0x7f0000000300)={0xfffffffffffffffc, {{0x2, 0x0, @local}}}, 0x88) write$binfmt_elf32(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="f7da42eaaab6bec4d3a09fcb0eb2c8b2b4bfb9066dad7b02905b4587ec439870427ae0370aa3936c837f09c8c0f1f0be98f16e47263384a0f0b0a44d2d9075df886bda3bbfb806a198da0f43977d59d752018bc30385670a49fe0333c4733472567b9fcec041dc132d53a39f56a0a34dabc26569c345019c8646cf124efaaca1f76c5c9de540d624c7d6302c7ce27703fa273955c5a0364d997db63bb7807f52073709929d5d6cf79e"], 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r1, 0x0, 0x61, 0x0, &(0x7f0000000040)) 04:00:13 executing program 2: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000006c0)="0a5c2d023c126285718070") mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0xc, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x8000000003c) connect$inet6(r0, &(0x7f00000002c0)={0xa, 0x0, 0x0, @dev, 0x9}, 0x1c) sendmsg(r0, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="2c7c579a7ae9c96d5cc9ad926a3eea1cf89515d52fc4300c0d33f21c491f50289b7a492cc0c90f234201a5c6f9b830f910b1902ed60d51ad019c73fc9065aa2c519f654874b01f87db4a2807b6a2c2532e9d54e219c9c5f95f", 0x59}], 0x1}, 0xc100) sendmsg(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000440)="b10b938636ea69df7b5a9984bb1bc72ef58d96e56e11df900a707f4946b1637e2096c584b9a1b4e017163fbdb35160a56c11dfbe74df97d36d19ad6a91c6fb4ad19581b8cf707131830f7a22b1b263c9da0e443c5e969ed6a0d3bc508bf75c3147447379f585759ceba0de5cda46291dc1b8f106a83e1cde43a862d95413ce2616b261ed9f79913ae781b3b843ea1b4429a750b8ccb1952a7b863d0bada9f61df6609fe368eaf47c0ce9e46a22b0d75b063deeaa94285d0c43353046e0a308296a76b0b0145f8af9aa0ed0e18bc50509eaef21c8e03842a97df3a462ea3f9d5f83bf1d4d2875f0d5b24e941483f863cd2ea7c769bd3e594fb173dd873c7d9a3fd20939ad1d5867881ed77a078007b4972aba36cae02004373a6a74d74cb15a52c5f8426cb6f235d38048fd91f5d6100fd58a335df10add227d804167ba191c7a035c5a2a916e7fef18a6003578820b3e0be26a22f2c149f40a0335cadcca64a5e44179e6ce4d7f7c16e8a96c5be7cdf66eef901cb8eeabc94bae30acca8c6fa02889c32311044dcbc9a2e02e0632f7f9aa96849abede543773745e4652fccc503003f10cd68ddab594969ad36cb622ed7ba22dc46a80fb63ac2c561a80ae5c10b295b9f75d9536ba1ac24b8e9ae217611ffe79cb9422158475c1a89a51547d13c03b68d75ffb5717a35f381774567871e9e4190272c97eafcfa0a07a751d0bc8eeb0c206e12b2cff1065a3d5622635fa44c0dcb0722ad4c97e6b7d5844b2e9bab9ba1d083fa2930a3ea267d7f15d817e2b2e055ccfbaf019292f6156efd3a9a13ea90ecf59fc1bf35c6626db1c6759a50ed84acefd3cdb", 0x257}], 0x1}, 0x8000) socket$packet(0x11, 0x2, 0x300) sendmsg(r0, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001480)="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", 0x2d5}], 0x1}, 0x0) 04:00:13 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) syz_execute_func(&(0x7f0000000100)="64ff0941c3c4e2c9975842c4c27d794e0066420fe2e33e0f1110c442019dccd3193e66430f3a0ce397") clone(0x1a02100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet_MCAST_LEAVE_GROUP(r1, 0x0, 0x2d, &(0x7f0000000300)={0xfffffffffffffffc, {{0x2, 0x0, @local}}}, 0x88) write$binfmt_elf32(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB], 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r1, 0x0, 0x61, 0x0, &(0x7f0000000040)) 04:00:13 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, 0x0, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000002000)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001000)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqsrc(r2, 0x0, 0x2000000000000004, &(0x7f0000013ff4)={@remote}, 0xc) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000340)={{{@in=@broadcast, @in=@broadcast, 0x0, 0x0, 0x0, 0x300, 0xa}}, {{@in6=@local, 0x0, 0x33}, 0x0, @in6=@local}}, 0xe8) close(r2) dup3(r0, r1, 0x0) 04:00:13 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) syz_execute_func(&(0x7f00000000c0)="64ff0941c3c4e2c9975842c4c27d794e0066420fe2e33e0f1110c442019dccd3193e66430f3a0ce397") clone(0x1a02100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet_MCAST_LEAVE_GROUP(r1, 0x0, 0x2d, &(0x7f0000000180)={0xfffffffffffffffc, {{0x2, 0x0, @local}}}, 0x88) write$binfmt_elf32(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="feafa2909d13ba469498086610b697d124ff0591efa690991a55c9fbde9f170f8ef17813db01f304ce283622b074ad62cac648f4edcc0340a0b621590cef44c8ccaffcfe9723f05f9bce229a51f7dff51b0809e2ba4d8d30066d58b132d575f1600902d27c7254fe2c24d95a55dfc09663bf3c8a01154cc7"], 0x0) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000240)={0x0, @in6={{0xa, 0x4e23, 0x418f, @mcast1, 0x101}}}, &(0x7f0000000000)=0x84) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000300)={r2, 0xb2a}, &(0x7f0000000340)=0xc) getsockopt$ARPT_SO_GET_ENTRIES(r1, 0x0, 0x61, 0x0, &(0x7f0000000040)) 04:00:13 executing program 3: clone(0x41fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f00000000c0)) syz_open_dev$rtc(&(0x7f0000000080)='/dev/rtc#\x00', 0x0, 0x0) ptrace(0x10, r0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000000)) getsockopt$inet_sctp6_SCTP_NODELAY(0xffffffffffffffff, 0x84, 0x3, &(0x7f0000000140), &(0x7f00000001c0)=0x4) ptrace$setregs(0xf, r0, 0x0, &(0x7f0000000180)="a96d55a756") ptrace$getregset(0x4204, r0, 0x2, &(0x7f0000000280)={0x0}) 04:00:13 executing program 2: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000006c0)="0a5c2d023c126285718070") mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0xc, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x8000000003c) connect$inet6(r0, &(0x7f00000002c0)={0xa, 0x0, 0x0, @dev, 0x9}, 0x1c) sendmsg(r0, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="2c7c579a7ae9c96d5cc9ad926a3eea1cf89515d52fc4300c0d33f21c491f50289b7a492cc0c90f234201a5c6f9b830f910b1902ed60d51ad019c73fc9065aa2c519f654874b01f87db4a2807b6a2c2532e9d54e219c9c5f95f", 0x59}], 0x1}, 0xc100) sendmsg(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000440)="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", 0x257}], 0x1}, 0x8000) socket$packet(0x11, 0x2, 0x300) sendmsg(r0, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001480)="d09a0e63c9476288b671afdbd53a5994e137381f62021d1951b627b8dda57a5d17d744648c81c5703ed8146ab1b0171f89091b1dd3238d03dbb686df460963245dedf2973ee555af99499e44ad420dbf65fd46fbc99a1274429e2d5783751815828ec8cb3553110cca66460215353d19f6d8bbd8fb264eddea60b18e16c31aa5e200000491634ac2fd10e2cd30bcd7fede24263a7fff16e53ea293f3551b7147c33a44ea437fb1515c3e8d4f162fdebf8ebe11ae6fcd9372c8d8f19556ae091fe94215ae9434da412f6fa4cb6561e5f78ff9707844ee5d573fb294437722d9a06dfa61748c32c73d759933a8dd344c947d3efdbe90d0eb049df5fbb0c19f6785264b619c530d97395d44b04f7e2a280d658c7871ad373b792678c49227999651ef3b2ee1bc2b8f3035db376e8e09aa3837233c8713065a8ad131d24f6c42a3220d0e07c3d3e95d59a5dd10c09716b5f874ecf53aadfa5050ff40f2c3c4a629b6445e5836100afff5a8977583653b40ca316f8f11416e5c1bd5499636ddae25fc4970b37209cf5c0bf8e432160c258d14223baa52798e09858645773dd97e68a95310da713cff077b06000000d4f145e9199c126a7f235e5674a3c7f5c7129ac7c1a3319590249b6d34ef6c3d8b94c6fc7cdcbddb053243053f7bc1f230d3bc7dfc4359e33992d0a3946b914a093287a76ac4a249b5b86cc75476466e409553355fefab75e9268a8751ffc9481fcff1f49c475699595b315e2147ee038b7291600c6b1cf7c8f24d587b9464a67e5ccec17820e711b98f4f7d5053642068a3fff704c3fe26ba862b53e2622d6e8b4a4c815fb2ea90ef63e141209dd292fdf886ee3e64b90f47ce22661c7a21f7bc10df0248079b7be17284eb54e5ab5bde9c6857b3cb184586049e7741b2d8b5b1a19e99e1834a25959155720c1c0ef84d7b3c42e1ba282847d476cef0228b1422aba08e5f3c1cd279bbd1c5303c2e9c16a0da4f88f770fca118b09e92b51a33970e32ade003000000", 0x2d5}], 0x1}, 0x0) [ 396.045782] IPVS: ftp: loaded support on port[0] = 21 04:00:14 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000), 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x103, 0x0) r1 = syz_open_dev$sndtimer(&(0x7f0000000100)='/dev/snd/timer\x00', 0x0, 0x42) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) syz_open_dev$admmidi(&(0x7f00000002c0)='/dev/admmidi#\x00', 0x0, 0x10400) name_to_handle_at(r3, &(0x7f0000000240)='./file0\x00', &(0x7f0000000640)=ANY=[@ANYBLOB="a7000000040000007e91768811f5db653ce80fa95aa72828fa11c3356079236bbd949e57e86700fa87fe009d849387fa9dc3ad3e05a4599a146c049012a67d890b02276422bb02f76ceabe0df0704f31c5b3170ee6ab62eb383ccab773a7c71941d4b1801fd6d614c0b0c20bfbb8a7d89d95a1d6267f7fb83fb7821162b588287a2a3f9212cbdda54e840b1b406621772edfb533f59473f8ec7f08be65738ec40b271d34b7d1b3"], &(0x7f0000000280), 0x0) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000080), &(0x7f0000000440)=0x8) setsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r3, 0x84, 0x71, &(0x7f0000000480)={0x0, 0x3}, 0x8) ioctl$UI_SET_FFBIT(0xffffffffffffffff, 0x4004556b, 0xe) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = getuid() setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002080)={{{@in=@loopback, @in, 0x4e23, 0x7, 0x4e21, 0x81, 0xa, 0x80, 0x80, 0x8, 0x0, r4}, {0x7, 0xfffffffffffffff7, 0x429, 0x3, 0x7, 0x955c, 0x1}, {0x7, 0xfffffffffffffff8, 0x1, 0x6}, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1}, {{@in6=@local, 0x4d4, 0x7f}, 0xa, @in6=@mcast2, 0x3507, 0x7, 0x3, 0x400, 0x8, 0x3, 0x3f5}}, 0xe8) setsockopt$inet_mreqn(r3, 0x0, 0xe368adb30c792f1f, &(0x7f0000000340)={@local, @local}, 0xc) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x4, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000100)=0x0) getpeername$unix(r3, &(0x7f00000003c0)=@abs, &(0x7f0000000600)=0x6e) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, &(0x7f0000000180)=r5) r6 = openat$cgroup_procs(r3, &(0x7f00000000c0)='tasks\x00', 0x2, 0x0) setsockopt$inet_icmp_ICMP_FILTER(r3, 0x1, 0x1, &(0x7f00000001c0)={0x730}, 0x4) getsockopt$IP_VS_SO_GET_TIMEOUT(r2, 0x0, 0x486, &(0x7f0000000580), &(0x7f00000005c0)=0xfffffffffffffeb1) unshare(0x40000000) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000040)={'tunl0\x00', @ifru_names='bridge0\x00'}) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000001000)={{0x3}}) syz_open_dev$admmidi(&(0x7f0000000300)='/dev/admmidi#\x00', 0xffffffff, 0x200000) ioctl(r0, 0x0, &(0x7f0000000000)="025cc807") r7 = fcntl$getown(r6, 0x9) ptrace(0x421f, r7) clock_gettime(0x0, &(0x7f0000000080)) 04:00:14 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x25d1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000080)="00000600000000000000", 0x0) ioctl$SG_EMULATED_HOST(r1, 0x2203, &(0x7f00000000c0)) write$binfmt_elf32(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000000000000000000000030006000000000000000000380000000000000000000000000020000200000000000000000000000000000000000000000000000000000000040000000000000000000000000000030000000000000000000000000000000200000028e9653bf5f378f24e50b9"], 0x77) execveat(r1, &(0x7f0000000000)='\x00', &(0x7f0000000280), 0x0, 0x1000) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 04:00:14 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, 0x0, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000002000)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001000)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqsrc(r2, 0x0, 0x2000000000000004, &(0x7f0000013ff4)={@remote}, 0xc) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000340)={{{@in=@broadcast, @in=@broadcast, 0x0, 0x0, 0x0, 0xffffff80, 0xa}}, {{@in6=@local, 0x0, 0x33}, 0x0, @in6=@local}}, 0xe8) close(r2) dup3(r0, r1, 0x0) 04:00:14 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) sendfile(r1, r0, &(0x7f0000000180), 0x2) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) syz_execute_func(&(0x7f00000000c0)="64ff0941c3c4e2c9975842c4c27d794e0066420fe2e33e0f1110c442019dccd3193e66430f3a0ce397") clone(0x1a02100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet_MCAST_LEAVE_GROUP(r1, 0x0, 0x2d, &(0x7f0000000300)={0xfffffffffffffffc, {{0x2, 0x0, @local}}}, 0x88) write$binfmt_elf32(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB], 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r1, 0x0, 0x61, 0x0, &(0x7f0000000040)) setxattr$security_evm(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='security.evm\x00', &(0x7f0000000140)=@sha1={0x1, "e6edda89d89b8ccddb4b8a3806e56c87e10e5639"}, 0x15, 0x2) 04:00:14 executing program 2: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000006c0)="0a5c2d023c126285718070") mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0xc, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x8000000003c) connect$inet6(r0, &(0x7f00000002c0)={0xa, 0x0, 0x0, @dev, 0x9}, 0x1c) sendmsg(r0, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="2c7c579a7ae9c96d5cc9ad926a3eea1cf89515d52fc4300c0d33f21c491f50289b7a492cc0c90f234201a5c6f9b830f910b1902ed60d51ad019c73fc9065aa2c519f654874b01f87db4a2807b6a2c2532e9d54e219c9c5f95f", 0x59}], 0x1}, 0xc100) sendmsg(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000440)="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", 0x257}], 0x1}, 0x8000) socket$packet(0x11, 0x2, 0x300) sendmsg(r0, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001480)="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", 0x2d5}], 0x1}, 0x0) 04:00:14 executing program 1: r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x10001, 0x80) setsockopt$inet_mreqsrc(r0, 0x0, 0x28, &(0x7f0000000100)={@empty, @multicast1, @local}, 0xc) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) connect$inet6(r1, &(0x7f0000000080), 0x1c) r2 = dup2(r1, r1) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000140)=[@timestamp, @timestamp, @window={0x3, 0x161d, 0x800}, @window={0x3, 0x5, 0x8}, @sack_perm], 0x20000000000001df) syz_execute_func(&(0x7f00000000c0)="64ff0941c3c4e2c9975842c4c27d794e0066420fe2e33e0f1110c442019dccd3193e66430f3a0ce397") clone(0x1a02100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet_MCAST_LEAVE_GROUP(r2, 0x0, 0x2d, &(0x7f0000000300)={0xfffffffffffffffc, {{0x2, 0x0, @local}}}, 0x88) write$binfmt_elf32(r2, &(0x7f00000003c0)=ANY=[@ANYBLOB], 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r2, 0x0, 0x61, 0x0, &(0x7f0000000040)) 04:00:14 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x25d1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000080)="00000600000000000000", 0x0) ioctl$SG_EMULATED_HOST(r1, 0x2203, &(0x7f00000000c0)) write$binfmt_elf32(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000000000000000000000030006000000000000000000380000000000000000000000000020000200000000000000000000000000000000000000000000000000000000040000000000000000000000000000030000000000000000000000000000000200000028e9653bf5f378f24e50b9"], 0x77) execveat(r1, &(0x7f0000000000)='\x00', &(0x7f0000000280), 0x0, 0x1000) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 04:00:14 executing program 2: r0 = socket$inet6(0xa, 0x0, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000006c0)="0a5c2d023c126285718070") mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0xc, 0x32, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x8000000003c) connect$inet6(r1, &(0x7f00000002c0)={0xa, 0x0, 0x0, @dev, 0x9}, 0x1c) sendmsg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="2c7c579a7ae9c96d5cc9ad926a3eea1cf89515d52fc4300c0d33f21c491f50289b7a492cc0c90f234201a5c6f9b830f910b1902ed60d51ad019c73fc9065aa2c519f654874b01f87db4a2807b6a2c2532e9d54e219c9c5f95f", 0x59}], 0x1}, 0xc100) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000440)="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", 0x257}], 0x1}, 0x8000) socket$packet(0x11, 0x2, 0x300) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001480)="d09a0e63c9476288b671afdbd53a5994e137381f62021d1951b627b8dda57a5d17d744648c81c5703ed8146ab1b0171f89091b1dd3238d03dbb686df460963245dedf2973ee555af99499e44ad420dbf65fd46fbc99a1274429e2d5783751815828ec8cb3553110cca66460215353d19f6d8bbd8fb264eddea60b18e16c31aa5e200000491634ac2fd10e2cd30bcd7fede24263a7fff16e53ea293f3551b7147c33a44ea437fb1515c3e8d4f162fdebf8ebe11ae6fcd9372c8d8f19556ae091fe94215ae9434da412f6fa4cb6561e5f78ff9707844ee5d573fb294437722d9a06dfa61748c32c73d759933a8dd344c947d3efdbe90d0eb049df5fbb0c19f6785264b619c530d97395d44b04f7e2a280d658c7871ad373b792678c49227999651ef3b2ee1bc2b8f3035db376e8e09aa3837233c8713065a8ad131d24f6c42a3220d0e07c3d3e95d59a5dd10c09716b5f874ecf53aadfa5050ff40f2c3c4a629b6445e5836100afff5a8977583653b40ca316f8f11416e5c1bd5499636ddae25fc4970b37209cf5c0bf8e432160c258d14223baa52798e09858645773dd97e68a95310da713cff077b06000000d4f145e9199c126a7f235e5674a3c7f5c7129ac7c1a3319590249b6d34ef6c3d8b94c6fc7cdcbddb053243053f7bc1f230d3bc7dfc4359e33992d0a3946b914a093287a76ac4a249b5b86cc75476466e409553355fefab75e9268a8751ffc9481fcff1f49c475699595b315e2147ee038b7291600c6b1cf7c8f24d587b9464a67e5ccec17820e711b98f4f7d5053642068a3fff704c3fe26ba862b53e2622d6e8b4a4c815fb2ea90ef63e141209dd292fdf886ee3e64b90f47ce22661c7a21f7bc10df0248079b7be17284eb54e5ab5bde9c6857b3cb184586049e7741b2d8b5b1a19e99e1834a25959155720c1c0ef84d7b3c42e1ba282847d476cef0228b1422aba08e5f3c1cd279bbd1c5303c2e9c16a0da4f88f770fca118b09e92b51a33970e32ade003000000", 0x2d5}], 0x1}, 0x0) 04:00:14 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, 0x0, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000002000)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001000)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqsrc(r2, 0x0, 0x2000000000000004, &(0x7f0000013ff4)={@remote}, 0xc) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000340)={{{@in=@broadcast, @in=@broadcast, 0x0, 0x0, 0x0, 0x6, 0xa}}, {{@in6=@local, 0x0, 0x33}, 0x0, @in6=@local}}, 0xe8) close(r2) dup3(r0, r1, 0x0) 04:00:14 executing program 3: clone(0x41fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f00000000c0)) syz_open_dev$rtc(&(0x7f0000000080)='/dev/rtc#\x00', 0x0, 0x0) ptrace(0x10, r0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000000)) getsockopt$inet_sctp6_SCTP_NODELAY(0xffffffffffffffff, 0x84, 0x3, &(0x7f0000000140), &(0x7f00000001c0)=0x4) ptrace$setregs(0xf, r0, 0x0, &(0x7f0000000180)="a96d55a756") ptrace$getregset(0x4203, r0, 0x2, &(0x7f0000000280)={0x0}) 04:00:14 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) fsetxattr(r0, &(0x7f00000000c0)=@random={'os2.', "0f2b2128656d3073656c66265c7b00"}, &(0x7f0000000100)='cgroupwlan1\x00', 0xc, 0x2) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) r2 = gettid() r3 = syz_open_dev$sndseq(&(0x7f0000001380)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r3, 0xc0a85320, &(0x7f0000000000)={{0x80}, "706f72743100000000000000000000000000000000000000000000000000000000000000000000000000bf00"}) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r3, 0x40505330, &(0x7f0000ec6fb0)={{0x0, 0x10001}, {0x80}, 0x0, 0x7}) tkill(r2, 0x9) ioctl$IOC_PR_PREEMPT(r1, 0x401870cb, &(0x7f0000000000)={0x5, 0xfffffffffffffff8, 0x4, 0x800}) clone(0x1a02100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet_MCAST_LEAVE_GROUP(r1, 0x0, 0x2d, &(0x7f0000000300)={0xfffffffffffffffc, {{0x2, 0x0, @local}}}, 0x88) write$binfmt_elf32(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB], 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r1, 0x0, 0x61, 0x0, &(0x7f0000000040)) 04:00:14 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x25d1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000080)="00000600000000000000", 0x0) ioctl$SG_EMULATED_HOST(r1, 0x2203, &(0x7f00000000c0)) write$binfmt_elf32(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000000000000000000000030006000000000000000000380000000000000000000000000020000200000000000000000000000000000000000000000000000000000000040000000000000000000000000000030000000000000000000000000000000200000028e9653bf5f378f24e50b960"], 0x78) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', &(0x7f0000000280), 0x0, 0x1000) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) [ 397.247968] IPVS: ftp: loaded support on port[0] = 21 04:00:15 executing program 0: timer_create(0x3, &(0x7f0000000040)={0x0, 0x2d, 0x0, @thr={&(0x7f00000000c0)="8eca938c22d698440ccc5c90ab69fd756e581dabada06037dfea5f90ea7096c5db5fea7f2ab7dd32deaf20026e951680c09577655dbffa305d20caf6a99ce504f52caf94ca1d15f3e1fb429302c0a753576899a80d338c9f78fd5cd0efd32dcbc76c7f0befd9fe77e436450e7a99a3fd784942c474b0efb586e17889429b6fa60f3d3be8afd720c90e5e1c499380cc00d111d1d46cdbe4dbde9ba1ef4672c8", &(0x7f0000000000)="c97c6168157ef7c6854572dc8b78f1ff9716cc899cb27b7b98803ed8361265ae63bae6823c3fbfedbbf6f5dea0550720815c89"}}, &(0x7f0000000180)=0x0) timer_settime(r0, 0x0, &(0x7f00000001c0)={{0x77359400}, {0x77359400}}, &(0x7f0000000200)) r1 = syz_open_dev$swradio(0x0, 0x1, 0x2) ioctl$VIDIOC_CREATE_BUFS(r1, 0xc100565c, &(0x7f0000000a00)={0x0, 0x4, 0x1ffffffffff, {0x2000000000000000, @pix={0x0, 0x1f}}}) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='pids.events\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) link(&(0x7f0000000200)='./bus\x00', 0x0) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(0xffffffffffffffff, 0xc008551c, 0x0) ioctl$sock_ifreq(r2, 0x0, 0x0) unshare(0x40000000) getsockopt$inet6_dccp_int(0xffffffffffffffff, 0x21, 0xe341739f8b7ef7d6, &(0x7f00000001c0), &(0x7f0000000300)=0x4) fcntl$lock(0xffffffffffffffff, 0x26, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000004100), 0x2a37, 0x2, 0x0) setsockopt$netlink_NETLINK_CAP_ACK(r2, 0x10e, 0xa, &(0x7f0000000100), 0x4) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) getpgrp(0xffffffffffffffff) setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000080)={'filter\x00', 0x4}, 0x68) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='smaps\x00') r4 = creat(&(0x7f00000008c0)='./bus\x00', 0x0) execveat(0xffffffffffffffff, &(0x7f0000000180)='./bus\x00', &(0x7f0000000480)=[&(0x7f0000000380)='pids.events\x00', &(0x7f00000003c0)='[keyring:\x00', &(0x7f0000000400)='pids.events\x00', &(0x7f0000000440)='pids.events\x00'], &(0x7f00000006c0)=[&(0x7f00000004c0)='wlan1\x00', &(0x7f0000000500)='/dev/swradio#\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='user\'\tppp0-!+\x00', 0x0, &(0x7f0000000640)='filter\x00', &(0x7f0000000680)="da70726f632c656d305b7070703076626f786e65743170726f6300"], 0x0) sendfile(r4, r3, 0x0, 0x10013c93a) migrate_pages(0x0, 0x8, 0x0, &(0x7f0000000080)=0x3) 04:00:15 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, 0x0, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000002000)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001000)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqsrc(r2, 0x0, 0x2000000000000004, &(0x7f0000013ff4)={@remote}, 0xc) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000340)={{{@in=@broadcast, @in=@broadcast, 0x0, 0x0, 0x0, 0xff0f000000000000, 0xa}}, {{@in6=@local, 0x0, 0x33}, 0x0, @in6=@local}}, 0xe8) close(r2) dup3(r0, r1, 0x0) 04:00:15 executing program 2: r0 = socket$inet6(0xa, 0x0, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000006c0)="0a5c2d023c126285718070") mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0xc, 0x32, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x8000000003c) connect$inet6(r1, &(0x7f00000002c0)={0xa, 0x0, 0x0, @dev, 0x9}, 0x1c) sendmsg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="2c7c579a7ae9c96d5cc9ad926a3eea1cf89515d52fc4300c0d33f21c491f50289b7a492cc0c90f234201a5c6f9b830f910b1902ed60d51ad019c73fc9065aa2c519f654874b01f87db4a2807b6a2c2532e9d54e219c9c5f95f", 0x59}], 0x1}, 0xc100) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000440)="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", 0x257}], 0x1}, 0x8000) socket$packet(0x11, 0x2, 0x300) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001480)="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", 0x2d5}], 0x1}, 0x0) 04:00:15 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x25d1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000080)="00000600000000000000", 0x0) ioctl$SG_EMULATED_HOST(r1, 0x2203, &(0x7f00000000c0)) write$binfmt_elf32(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000000000000000000000030006000000000000000000380000000000000000000000000020000200000000000000000000000000000000000000000000000000000000040000000000000000000000000000030000000000000000000000000000000200000028e9653bf5f378f24e50b960"], 0x78) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', &(0x7f0000000280), 0x0, 0x1000) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 04:00:15 executing program 3: clone(0x41fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f00000000c0)) syz_open_dev$rtc(&(0x7f0000000080)='/dev/rtc#\x00', 0x0, 0x0) ptrace(0x10, r0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000000)) getsockopt$inet_sctp6_SCTP_NODELAY(0xffffffffffffffff, 0x84, 0x3, &(0x7f0000000140), &(0x7f00000001c0)=0x4) ptrace$setregs(0xf, r0, 0x0, &(0x7f0000000180)="a96d55a756") ptrace$getregset(0x7, r0, 0x2, &(0x7f0000000280)={0x0}) 04:00:15 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x25d1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000080)="00000600000000000000", 0x0) ioctl$SG_EMULATED_HOST(r1, 0x2203, &(0x7f00000000c0)) write$binfmt_elf32(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000000000000000000000030006000000000000000000380000000000000000000000000020000200000000000000000000000000000000000000000000000000000000040000000000000000000000000000030000000000000000000000000000000200000028e9653bf5f378f24e50b960"], 0x78) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', &(0x7f0000000280), 0x0, 0x1000) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) [ 397.897968] IPVS: ftp: loaded support on port[0] = 21 04:00:15 executing program 2: r0 = socket$inet6(0xa, 0x0, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000006c0)="0a5c2d023c126285718070") mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0xc, 0x32, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x8000000003c) connect$inet6(r1, &(0x7f00000002c0)={0xa, 0x0, 0x0, @dev, 0x9}, 0x1c) sendmsg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="2c7c579a7ae9c96d5cc9ad926a3eea1cf89515d52fc4300c0d33f21c491f50289b7a492cc0c90f234201a5c6f9b830f910b1902ed60d51ad019c73fc9065aa2c519f654874b01f87db4a2807b6a2c2532e9d54e219c9c5f95f", 0x59}], 0x1}, 0xc100) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000440)="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", 0x257}], 0x1}, 0x8000) socket$packet(0x11, 0x2, 0x300) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001480)="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", 0x2d5}], 0x1}, 0x0) 04:00:15 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, 0x0, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000002000)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001000)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqsrc(r2, 0x0, 0x2000000000000004, &(0x7f0000013ff4)={@remote}, 0xc) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000340)={{{@in=@broadcast, @in=@broadcast, 0x0, 0x0, 0x0, 0x200000000000000, 0xa}}, {{@in6=@local, 0x0, 0x33}, 0x0, @in6=@local}}, 0xe8) close(r2) dup3(r0, r1, 0x0) 04:00:15 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x25d1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000080)="00000600000000000000", 0x0) ioctl$SG_EMULATED_HOST(r1, 0x2203, &(0x7f00000000c0)) write$binfmt_elf32(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000000000000000000000030006000000000000000000380000000000000000000000000020000200000000000000000000000000000000000000000000000000000000040000000000000000000000000000030000000000000000000000000000000200000028e9653bf5f378f24e50b960"], 0x78) execveat(r1, 0x0, &(0x7f0000000280), 0x0, 0x1000) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 04:00:15 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, 0x0, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000002000)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001000)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqsrc(r2, 0x0, 0x2000000000000004, &(0x7f0000013ff4)={@remote}, 0xc) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000340)={{{@in=@broadcast, @in=@broadcast, 0x0, 0x0, 0x0, 0x20000000, 0xa}}, {{@in6=@local, 0x0, 0x33}, 0x0, @in6=@local}}, 0xe8) close(r2) dup3(r0, r1, 0x0) [ 398.246255] IPVS: ftp: loaded support on port[0] = 21 04:00:15 executing program 2: r0 = socket$inet6(0xa, 0x400000000000803, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000006c0)="0a5c2d023c126285718070") mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0xc, 0x32, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x8000000003c) connect$inet6(r1, &(0x7f00000002c0)={0xa, 0x0, 0x0, @dev, 0x9}, 0x1c) sendmsg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="2c7c579a7ae9c96d5cc9ad926a3eea1cf89515d52fc4300c0d33f21c491f50289b7a492cc0c90f234201a5c6f9b830f910b1902ed60d51ad019c73fc9065aa2c519f654874b01f87db4a2807b6a2c2532e9d54e219c9c5f95f", 0x59}], 0x1}, 0xc100) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000440)="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", 0x257}], 0x1}, 0x8000) socket$packet(0x11, 0x2, 0x300) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001480)="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", 0x2d5}], 0x1}, 0x0) 04:00:15 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x25d1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000080)="00000600000000000000", 0x0) ioctl$SG_EMULATED_HOST(r1, 0x2203, &(0x7f00000000c0)) write$binfmt_elf32(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000000000000000000000030006000000000000000000380000000000000000000000000020000200000000000000000000000000000000000000000000000000000000040000000000000000000000000000030000000000000000000000000000000200000028e9653bf5f378f24e50b960"], 0x78) execveat(r1, 0x0, &(0x7f0000000280), 0x0, 0x1000) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 04:00:15 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) syz_execute_func(&(0x7f00000000c0)="64ff0941c3c4e2c9975842c4c27d794e0066420fe2e33e0f1110c442019dccd3193e66430f3a0ce397") clone(0x1a02100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet_MCAST_LEAVE_GROUP(r1, 0x0, 0x2d, &(0x7f0000000300)={0xfffffffffffffffc, {{0x2, 0x0, @local}}}, 0x88) write$binfmt_elf32(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB], 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r1, 0x0, 0x61, 0x0, &(0x7f0000000040)) 04:00:15 executing program 0: timer_create(0x3, &(0x7f0000000040)={0x0, 0x2d, 0x0, @thr={&(0x7f00000000c0)="8eca938c22d698440ccc5c90ab69fd756e581dabada06037dfea5f90ea7096c5db5fea7f2ab7dd32deaf20026e951680c09577655dbffa305d20caf6a99ce504f52caf94ca1d15f3e1fb429302c0a753576899a80d338c9f78fd5cd0efd32dcbc76c7f0befd9fe77e436450e7a99a3fd784942c474b0efb586e17889429b6fa60f3d3be8afd720c90e5e1c499380cc00d111d1d46cdbe4dbde9ba1ef4672c8", &(0x7f0000000000)="c97c6168157ef7c6854572dc8b78f1ff9716cc899cb27b7b98803ed8361265ae63bae6823c3fbfedbbf6f5dea0550720815c89"}}, &(0x7f0000000180)=0x0) timer_settime(r0, 0x0, &(0x7f00000001c0)={{0x77359400}, {0x77359400}}, &(0x7f0000000200)) r1 = syz_open_dev$swradio(0x0, 0x1, 0x2) ioctl$VIDIOC_CREATE_BUFS(r1, 0xc100565c, &(0x7f0000000a00)={0x0, 0x4, 0x1ffffffffff, {0x2000000000000000, @pix={0x0, 0x1f}}}) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='pids.events\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) link(&(0x7f0000000200)='./bus\x00', 0x0) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(0xffffffffffffffff, 0xc008551c, 0x0) ioctl$sock_ifreq(r2, 0x0, 0x0) unshare(0x40000000) getsockopt$inet6_dccp_int(0xffffffffffffffff, 0x21, 0xe341739f8b7ef7d6, &(0x7f00000001c0), &(0x7f0000000300)=0x4) fcntl$lock(0xffffffffffffffff, 0x26, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000004100), 0x2a37, 0x2, 0x0) setsockopt$netlink_NETLINK_CAP_ACK(r2, 0x10e, 0xa, &(0x7f0000000100), 0x4) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) getpgrp(0xffffffffffffffff) setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000080)={'filter\x00', 0x4}, 0x68) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='smaps\x00') r4 = creat(&(0x7f00000008c0)='./bus\x00', 0x0) execveat(0xffffffffffffffff, &(0x7f0000000180)='./bus\x00', &(0x7f0000000480)=[&(0x7f0000000380)='pids.events\x00', &(0x7f00000003c0)='[keyring:\x00', &(0x7f0000000400)='pids.events\x00', &(0x7f0000000440)='pids.events\x00'], &(0x7f00000006c0)=[&(0x7f00000004c0)='wlan1\x00', &(0x7f0000000500)='/dev/swradio#\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='user\'\tppp0-!+\x00', 0x0, &(0x7f0000000640)='filter\x00', &(0x7f0000000680)="da70726f632c656d305b7070703076626f786e65743170726f6300"], 0x0) sendfile(r4, r3, 0x0, 0x10013c93a) migrate_pages(0x0, 0x8, 0x0, &(0x7f0000000080)=0x3) 04:00:15 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, 0x0, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000002000)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001000)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqsrc(r2, 0x0, 0x2000000000000004, &(0x7f0000013ff4)={@remote}, 0xc) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000340)={{{@in=@broadcast, @in=@broadcast, 0x0, 0x0, 0x0, 0x600, 0xa}}, {{@in6=@local, 0x0, 0x33}, 0x0, @in6=@local}}, 0xe8) close(r2) dup3(r0, r1, 0x0) 04:00:15 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x25d1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000080)="00000600000000000000", 0x0) ioctl$SG_EMULATED_HOST(r1, 0x2203, &(0x7f00000000c0)) write$binfmt_elf32(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000000000000000000000030006000000000000000000380000000000000000000000000020000200000000000000000000000000000000000000000000000000000000040000000000000000000000000000030000000000000000000000000000000200000028e9653bf5f378f24e50b960"], 0x78) execveat(r1, 0x0, &(0x7f0000000280), 0x0, 0x1000) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) [ 398.566605] IPVS: ftp: loaded support on port[0] = 21 04:00:16 executing program 3: clone(0x41fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f00000000c0)) syz_open_dev$rtc(&(0x7f0000000080)='/dev/rtc#\x00', 0x0, 0x0) ptrace(0x10, r0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000000)) getsockopt$inet_sctp6_SCTP_NODELAY(0xffffffffffffffff, 0x84, 0x3, &(0x7f0000000140), &(0x7f00000001c0)=0x4) ptrace$setregs(0xf, r0, 0x0, &(0x7f0000000180)="a96d55a756") ptrace$getregset(0x21, r0, 0x2, &(0x7f0000000280)={0x0}) 04:00:16 executing program 2: r0 = socket$inet6(0xa, 0x400000000000803, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000006c0)="0a5c2d023c126285718070") mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0xc, 0x32, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x8000000003c) connect$inet6(r1, &(0x7f00000002c0)={0xa, 0x0, 0x0, @dev, 0x9}, 0x1c) sendmsg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="2c7c579a7ae9c96d5cc9ad926a3eea1cf89515d52fc4300c0d33f21c491f50289b7a492cc0c90f234201a5c6f9b830f910b1902ed60d51ad019c73fc9065aa2c519f654874b01f87db4a2807b6a2c2532e9d54e219c9c5f95f", 0x59}], 0x1}, 0xc100) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000440)="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", 0x257}], 0x1}, 0x8000) socket$packet(0x11, 0x2, 0x300) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001480)="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", 0x2d5}], 0x1}, 0x0) 04:00:16 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x25d1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000080)="00000600000000000000", 0x0) ioctl$SG_EMULATED_HOST(r1, 0x2203, &(0x7f00000000c0)) write$binfmt_elf32(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000000000000000000000030006000000000000000000380000000000000000000000000020000200000000000000000000000000000000000000000000000000000000040000000000000000000000000000030000000000000000000000000000000200000028e9653bf5f378f24e50b960"], 0x78) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 04:00:16 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, 0x0, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000002000)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001000)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqsrc(r2, 0x0, 0x2000000000000004, &(0x7f0000013ff4)={@remote}, 0xc) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000340)={{{@in=@broadcast, @in=@broadcast, 0x0, 0x0, 0x0, 0xff0f, 0xa}}, {{@in6=@local, 0x0, 0x33}, 0x0, @in6=@local}}, 0xe8) close(r2) dup3(r0, r1, 0x0) 04:00:16 executing program 2: r0 = socket$inet6(0xa, 0x400000000000803, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000006c0)="0a5c2d023c126285718070") mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0xc, 0x32, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x8000000003c) connect$inet6(r1, &(0x7f00000002c0)={0xa, 0x0, 0x0, @dev, 0x9}, 0x1c) sendmsg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="2c7c579a7ae9c96d5cc9ad926a3eea1cf89515d52fc4300c0d33f21c491f50289b7a492cc0c90f234201a5c6f9b830f910b1902ed60d51ad019c73fc9065aa2c519f654874b01f87db4a2807b6a2c2532e9d54e219c9c5f95f", 0x59}], 0x1}, 0xc100) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000440)="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", 0x257}], 0x1}, 0x8000) socket$packet(0x11, 0x2, 0x300) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001480)="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", 0x2d5}], 0x1}, 0x0) [ 398.832659] IPVS: ftp: loaded support on port[0] = 21 04:00:16 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x25d1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000080)="00000600000000000000", 0x0) ioctl$SG_EMULATED_HOST(r1, 0x2203, &(0x7f00000000c0)) write$binfmt_elf32(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000000000000000000000030006000000000000000000380000000000000000000000000020000200000000000000000000000000000000000000000000000000000000040000000000000000000000000000030000000000000000000000000000000200000028e9653bf5f378f24e50b960"], 0x78) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 04:00:16 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, 0x0, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000002000)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001000)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqsrc(r2, 0x0, 0x2000000000000004, &(0x7f0000013ff4)={@remote}, 0xc) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000340)={{{@in=@broadcast, @in=@broadcast, 0x0, 0x0, 0x0, 0x3, 0xa}}, {{@in6=@local, 0x0, 0x33}, 0x0, @in6=@local}}, 0xe8) close(r2) dup3(r0, r1, 0x0) 04:00:16 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r1, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendmsg$nl_route(r0, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f00000005c0)=ANY=[@ANYBLOB="3c00000010000106000000000000000000000000", @ANYRES32=0x0, @ANYBLOB="00000000000000001c0012000c000100626f6e64000000000c0002000800056e3691bb00"], 0x3c}}, 0x0) [ 399.897070] bridge0: port 1(bridge_slave_0) entered blocking state [ 399.903533] bridge0: port 1(bridge_slave_0) entered disabled state [ 399.911329] device bridge_slave_0 entered promiscuous mode [ 399.957713] bridge0: port 2(bridge_slave_1) entered blocking state [ 399.964222] bridge0: port 2(bridge_slave_1) entered disabled state [ 399.972099] device bridge_slave_1 entered promiscuous mode [ 400.012263] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 400.040995] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 400.124038] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 400.154908] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 400.278432] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 400.285618] team0: Port device team_slave_0 added [ 400.326117] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 400.333776] team0: Port device team_slave_1 added [ 400.374401] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 400.381356] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 400.390967] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 400.425845] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 400.433091] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 400.441832] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 400.466169] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 400.473528] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 400.474224] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 400.521622] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 400.528874] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 400.537286] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 400.837995] device bridge_slave_1 left promiscuous mode [ 400.843553] bridge0: port 2(bridge_slave_1) entered disabled state [ 400.877384] device bridge_slave_0 left promiscuous mode [ 400.882874] bridge0: port 1(bridge_slave_0) entered disabled state [ 400.950586] team0 (unregistering): Port device team_slave_1 removed [ 400.962382] team0 (unregistering): Port device team_slave_0 removed [ 400.975681] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 401.010073] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 401.066180] bond0 (unregistering): Released all slaves [ 401.175938] bridge0: port 2(bridge_slave_1) entered blocking state [ 401.182349] bridge0: port 2(bridge_slave_1) entered forwarding state [ 401.189074] bridge0: port 1(bridge_slave_0) entered blocking state [ 401.195426] bridge0: port 1(bridge_slave_0) entered forwarding state [ 401.203130] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 401.356483] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 402.440928] 8021q: adding VLAN 0 to HW filter on device bond0 [ 402.603991] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 402.774748] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 402.781485] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 402.797536] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 402.933204] 8021q: adding VLAN 0 to HW filter on device team0 04:00:21 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) syz_execute_func(&(0x7f00000000c0)="64ff0941c3c4e2c9975842c4c27d794e0066420fe2e33e0f1110c442019dccd3193e66430f3a0ce397") clone(0x1a02100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet_MCAST_LEAVE_GROUP(r1, 0x0, 0x2d, &(0x7f0000000100)={0x1000007, {{0x2, 0x0, @local}}}, 0x88) write$binfmt_elf32(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB], 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r1, 0x0, 0x61, 0x0, &(0x7f0000000040)) 04:00:21 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, 0x0, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000002000)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001000)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqsrc(r2, 0x0, 0x2000000000000004, &(0x7f0000013ff4)={@remote}, 0xc) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000340)={{{@in=@broadcast, @in=@broadcast, 0x0, 0x0, 0x0, 0xffffffff00000000, 0xa}}, {{@in6=@local, 0x0, 0x33}, 0x0, @in6=@local}}, 0xe8) close(r2) dup3(r0, r1, 0x0) 04:00:21 executing program 0: sendmmsg(0xffffffffffffffff, &(0x7f0000007e00)=[{{&(0x7f00000004c0)=@in6={0xa, 0x4e22, 0x0, @mcast2}, 0x80, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1400000000000000290000003e00000000000000"], 0x14}}], 0x1, 0x0) r0 = memfd_create(&(0x7f0000000000)=')$vmnet16}-vmnet0,vmnet1md5sum/{\\\x00', 0x5) sendmmsg(r0, &(0x7f0000000200)=[{{&(0x7f0000000040)=@ethernet={0x0, @random="e1f7c02e07ce"}, 0x80, &(0x7f00000001c0)=[{&(0x7f0000000100)="feeb8d36167ee3efaf1fb6c4faa251385fc052bbf3c118485b66b8700c7c42549df7a99461a41e433ac1c04dfff9ff25445fc47ec83f2becc929249534c726cc8f4d37d297aa5f150e68117a24da2e9aca22b50597256d6982a3da4162fc21d634e712539bb4f74f54", 0x69}, {&(0x7f0000000180)="e9c6cbddf1553e9bb267893cb3", 0xd}], 0x2, 0x0, 0x0, 0x800}, 0x8}], 0x1, 0x4000000) r1 = socket$inet6(0xa, 0x2, 0x0) sendmmsg(r1, &(0x7f0000007e00), 0x15b, 0x8000) 04:00:21 executing program 3: clone(0x41fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f00000000c0)) syz_open_dev$rtc(&(0x7f0000000080)='/dev/rtc#\x00', 0x0, 0x0) ptrace(0x10, r0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000000)) getsockopt$inet_sctp6_SCTP_NODELAY(0xffffffffffffffff, 0x84, 0x3, &(0x7f0000000140), &(0x7f00000001c0)=0x4) ptrace$setregs(0xf, r0, 0x0, &(0x7f0000000180)="a96d55a756") ptrace$getregset(0x4201, r0, 0x2, &(0x7f0000000280)={0x0}) 04:00:21 executing program 2: socket$inet6(0xa, 0x400000000000803, 0x3) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000006c0)="0a5c2d023c126285718070") mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0xc, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x8000000003c) connect$inet6(r0, &(0x7f00000002c0)={0xa, 0x0, 0x0, @dev, 0x9}, 0x1c) sendmsg(r0, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="2c7c579a7ae9c96d5cc9ad926a3eea1cf89515d52fc4300c0d33f21c491f50289b7a492cc0c90f234201a5c6f9b830f910b1902ed60d51ad019c73fc9065aa2c519f654874b01f87db4a2807b6a2c2532e9d54e219c9c5f95f", 0x59}], 0x1}, 0xc100) sendmsg(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000440)="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", 0x257}], 0x1}, 0x8000) socket$packet(0x11, 0x2, 0x300) sendmsg(r0, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001480)="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", 0x2d5}], 0x1}, 0x0) 04:00:21 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x25d1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000080)="00000600000000000000", 0x0) ioctl$SG_EMULATED_HOST(r1, 0x2203, &(0x7f00000000c0)) write$binfmt_elf32(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000000000000000000000030006000000000000000000380000000000000000000000000020000200000000000000000000000000000000000000000000000000000000040000000000000000000000000000030000000000000000000000000000000200000028e9653bf5f378f24e50b960"], 0x78) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 04:00:21 executing program 1: mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x2, &(0x7f0000000140)=ANY=[@ANYBLOB="180000000000000000000000020000007f"], 0x0}, 0x48) mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000100)="03") r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) syz_execute_func(&(0x7f0000000480)="c4827d354718c4c279794e0066420fe2e3c442019dcc36420f3acc5dccfe99a179f7c73e66430f3a0ce397") memfd_create(&(0x7f0000000000)="776c616e306d643573756d75736572707070302d3c2dc5776c616e316d643573756d7b40402a1d6c6f73656c696e75787ba3432c2300", 0x2) clone(0x1a02100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet_MCAST_LEAVE_GROUP(r1, 0x0, 0x2d, &(0x7f0000000300)={0xfffffffffffffffc, {{0x2, 0x0, @local}}}, 0x88) write$binfmt_elf32(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="d2c2e7edad75aa64310c6e4fa77d4e882487eb52ad0b5546407e7888b9e1df16c8a99a1e77491c50b4753aa3d98225d2ded14e22775e84ccf3edaa4cab43196cafef39dfc894b90ece0d4cf3047bfde5cfab7e69380b47d6587db70a4091c310c1ba2f9e402e71b870084c493128"], 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r1, 0x0, 0x61, 0x0, &(0x7f0000000040)) 04:00:21 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x25d1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000080)="00000600000000000000", 0x0) ioctl$SG_EMULATED_HOST(r1, 0x2203, &(0x7f00000000c0)) write$binfmt_elf32(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000000000000000000000030006000000000000000000380000000000000000000000000020000200000000000000000000000000000000000000000000000000000000040000000000000000000000000000030000000000000000000000000000000200000028e9653bf5f378f24e50b960"], 0x78) execveat(r1, &(0x7f0000000000)='\x00', &(0x7f0000000280), 0x0, 0x0) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 04:00:21 executing program 2: socket$inet6(0xa, 0x400000000000803, 0x3) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000006c0)="0a5c2d023c126285718070") mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0xc, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x8000000003c) connect$inet6(r0, &(0x7f00000002c0)={0xa, 0x0, 0x0, @dev, 0x9}, 0x1c) sendmsg(r0, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="2c7c579a7ae9c96d5cc9ad926a3eea1cf89515d52fc4300c0d33f21c491f50289b7a492cc0c90f234201a5c6f9b830f910b1902ed60d51ad019c73fc9065aa2c519f654874b01f87db4a2807b6a2c2532e9d54e219c9c5f95f", 0x59}], 0x1}, 0xc100) sendmsg(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000440)="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", 0x257}], 0x1}, 0x8000) socket$packet(0x11, 0x2, 0x300) sendmsg(r0, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001480)="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", 0x2d5}], 0x1}, 0x0) 04:00:21 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x25d1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000080)="00000600000000000000", 0x0) ioctl$SG_EMULATED_HOST(r1, 0x2203, &(0x7f00000000c0)) write$binfmt_elf32(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000000000000000000000030006000000000000000000380000000000000000000000000020000200000000000000000000000000000000000000000000000000000000040000000000000000000000000000030000000000000000000000000000000200000028e9653bf5f378f24e50b960"], 0x78) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) [ 403.948055] rpcbind: RPC call returned error 13 04:00:21 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, 0x0, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000002000)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001000)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqsrc(r2, 0x0, 0x2000000000000004, &(0x7f0000013ff4)={@remote}, 0xc) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000340)={{{@in=@broadcast, @in=@broadcast, 0x0, 0x0, 0x0, 0x80ffffff00000000, 0xa}}, {{@in6=@local, 0x0, 0x33}, 0x0, @in6=@local}}, 0xe8) close(r2) dup3(r0, r1, 0x0) 04:00:21 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) syz_execute_func(&(0x7f00000001c0)="64ff0941c3c4e2c9975842c4c27d794e0066420fe2e33e0f1110c442019dccd3193e66430f3a0ce397") clone(0x1a02100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0, 0x1}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f0000000140)={r2, 0x1000}, &(0x7f0000000180)=0x8) setsockopt$inet_MCAST_LEAVE_GROUP(r1, 0x0, 0x2d, &(0x7f0000000300)={0xfffffffffffffffc, {{0x2, 0x0, @local}}}, 0x88) write$binfmt_elf32(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB], 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r1, 0x0, 0x61, 0x0, &(0x7f0000000040)) 04:00:21 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x25d1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000080)="00000600000000000000", 0x0) ioctl$SG_EMULATED_HOST(r1, 0x2203, &(0x7f00000000c0)) write$binfmt_elf32(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000000000000000000000030006000000000000000000380000000000000000000000000020000200000000000000000000000000000000000000000000000000000000040000000000000000000000000000030000000000000000000000000000000200000028e9653bf5f378f24e50b960"], 0x78) execveat(r1, &(0x7f0000000000)='\x00', &(0x7f0000000280), 0x0, 0x0) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 04:00:21 executing program 2: socket$inet6(0xa, 0x400000000000803, 0x3) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000006c0)="0a5c2d023c126285718070") mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0xc, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x8000000003c) connect$inet6(r0, &(0x7f00000002c0)={0xa, 0x0, 0x0, @dev, 0x9}, 0x1c) sendmsg(r0, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="2c7c579a7ae9c96d5cc9ad926a3eea1cf89515d52fc4300c0d33f21c491f50289b7a492cc0c90f234201a5c6f9b830f910b1902ed60d51ad019c73fc9065aa2c519f654874b01f87db4a2807b6a2c2532e9d54e219c9c5f95f", 0x59}], 0x1}, 0xc100) sendmsg(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000440)="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", 0x257}], 0x1}, 0x8000) socket$packet(0x11, 0x2, 0x300) sendmsg(r0, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001480)="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", 0x2d5}], 0x1}, 0x0) 04:00:21 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) syz_execute_func(&(0x7f00000000c0)="64ff0941c3c4e2c9975842c4c27d794e0066420fe2e33e0f1110c442019dccd3193e66430f3a0ce397") clone(0x1a02100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet_MCAST_LEAVE_GROUP(r1, 0x0, 0x2d, &(0x7f0000000300)={0xfffffffffffffffc, {{0x2, 0x0, @local}}}, 0x88) write$binfmt_elf32(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="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"], 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r1, 0x0, 0x61, 0x0, &(0x7f0000000040)) 04:00:21 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x25d1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000080)="00000600000000000000", 0x0) ioctl$SG_EMULATED_HOST(r1, 0x2203, &(0x7f00000000c0)) write$binfmt_elf32(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000000000000000000000030006000000000000000000380000000000000000000000000020000200000000000000000000000000000000000000000000000000000000040000000000000000000000000000030000000000000000000000000000000200000028e9653bf5f378f24e50b960"], 0x78) execveat(r1, &(0x7f0000000000)='\x00', &(0x7f0000000280), 0x0, 0x0) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 04:00:21 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) syz_execute_func(&(0x7f00000000c0)="64ff0941c3c4e2c9975842c4c27d794e0066420fe2e33e0f1110c442019dccd3193e66430f3a0ce397") clone(0x1a02100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet_MCAST_LEAVE_GROUP(r1, 0x0, 0x2d, &(0x7f0000000300)={0xfffffffffffffffc, {{0x2, 0x0, @local}}}, 0x88) write$binfmt_elf32(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB], 0x0) socket$inet6(0xa, 0x7, 0x1ff) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f0000000100)={0x3, 0x70, 0x7c7, 0x10000, 0x8, 0xfffffffffffffeff, 0x0, 0x8, 0x800, 0x7, 0x0, 0x6, 0x1, 0x0, 0x6, 0x100000000, 0x7, 0x1, 0x7f, 0x3f, 0xffffffffffffffff, 0x1ff, 0xffffffff, 0x82a, 0x40, 0xab05, 0x9, 0x3, 0x1, 0x1000, 0xa64, 0x81, 0x4, 0x4, 0x2, 0x200, 0xffffffff, 0x7, 0x0, 0xfff, 0x0, @perf_bp={&(0x7f0000000000), 0x2}, 0x29, 0xfff, 0x10000, 0xb, 0x4, 0x9, 0x3}, r2, 0xf, r1, 0x3) getsockopt$ARPT_SO_GET_ENTRIES(r1, 0x0, 0x61, 0x0, &(0x7f0000000040)) 04:00:22 executing program 3: clone(0x41fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f00000000c0)) syz_open_dev$rtc(&(0x7f0000000080)='/dev/rtc#\x00', 0x0, 0x0) ptrace(0x10, r0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000000)) getsockopt$inet_sctp6_SCTP_NODELAY(0xffffffffffffffff, 0x84, 0x3, &(0x7f0000000140), &(0x7f00000001c0)=0x4) ptrace$setregs(0xf, r0, 0x0, &(0x7f0000000180)="a96d55a756") ptrace$getregset(0x4205, r0, 0x2, &(0x7f0000000280)={0x0}) 04:00:22 executing program 2: r0 = socket$inet6(0xa, 0x400000000000803, 0x3) ioctl(r0, 0x0, &(0x7f00000006c0)="0a5c2d023c126285718070") mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0xc, 0x32, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x8000000003c) connect$inet6(r1, &(0x7f00000002c0)={0xa, 0x0, 0x0, @dev, 0x9}, 0x1c) sendmsg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="2c7c579a7ae9c96d5cc9ad926a3eea1cf89515d52fc4300c0d33f21c491f50289b7a492cc0c90f234201a5c6f9b830f910b1902ed60d51ad019c73fc9065aa2c519f654874b01f87db4a2807b6a2c2532e9d54e219c9c5f95f", 0x59}], 0x1}, 0xc100) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000440)="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", 0x257}], 0x1}, 0x8000) socket$packet(0x11, 0x2, 0x300) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001480)="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", 0x2d5}], 0x1}, 0x0) 04:00:22 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, 0x0, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000002000)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001000)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqsrc(r2, 0x0, 0x2000000000000004, &(0x7f0000013ff4)={@remote}, 0xc) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000340)={{{@in=@broadcast, @in=@broadcast, 0x0, 0x0, 0x0, 0x80ffffff, 0xa}}, {{@in6=@local, 0x0, 0x33}, 0x0, @in6=@local}}, 0xe8) close(r2) dup3(r0, r1, 0x0) 04:00:22 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x25d1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000080)="00000600000000000000", 0x0) ioctl$SG_EMULATED_HOST(r1, 0x2203, &(0x7f00000000c0)) write$binfmt_elf32(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000000000000000000000030006000000000000000000380000000000000000000000000020000200000000000000000000000000000000000000000000000000000000040000000000000000000000000000030000000000000000000000000000000200000028e9653bf5f378f24e50b960"], 0x78) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 04:00:22 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) name_to_handle_at(r0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)={0x25, 0xffffffff, "5735d0ee9b24fd3c0810cfba3575e649662aa9428fbde6b3202cbc9795"}, &(0x7f0000000140), 0x1400) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x61f) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) syz_execute_func(&(0x7f00000000c0)="64ff0941c3c4e2c9975842c4c27d794e0066420fe2e33e0f1110c442019dccd3193e66430f3a0ce397") clone(0x1a02100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet_MCAST_LEAVE_GROUP(r1, 0x0, 0x2d, &(0x7f0000000300)={0xfffffffffffffffc, {{0x2, 0x0, @local}}}, 0x88) write$binfmt_elf32(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB], 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r1, 0x0, 0x61, 0x0, &(0x7f0000000040)) 04:00:22 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x25d1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000080)="00000600000000000000", 0x0) ioctl$SG_EMULATED_HOST(r0, 0x2203, &(0x7f00000000c0)) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000000000000000000000030006000000000000000000380000000000000000000000000020000200000000000000000000000000000000000000000000000000000000040000000000000000000000000000030000000000000000000000000000000200000028e9653bf5f378f24e50b960"], 0x78) execveat(r0, &(0x7f0000000000)='\x00', &(0x7f0000000280), 0x0, 0x1000) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r0) 04:00:22 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/nat_icmp_send\x00', 0x2, 0x0) ioctl$DRM_IOCTL_SET_UNIQUE(r1, 0x40106410, &(0x7f0000000180)={0x74, &(0x7f0000000100)="f421d6a654210a6d86840691337427583c90db2a4d56c559fded9bc964a8bd0986b3fa8ab813978018f0c8d362a4dfc5f084b8f3b6578cf2ce35340feea7e6454776c7a5afb48930d0409bfd7139925bc25969a6f44cb19d7230a418dcfe83e645dc390056c7157238451e0ecaa732138baa91bd"}) connect$inet6(r0, &(0x7f0000000080), 0x1c) r2 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) syz_execute_func(&(0x7f00000000c0)="64ff0941c3c4e2c9975842c4c27d794e0066420fe2e33e0f1110c442019dccd3193e66430f3a0ce397") clone(0x1a02100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet_MCAST_LEAVE_GROUP(r2, 0x0, 0x2d, &(0x7f0000000300)={0xfffffffffffffffc, {{0x2, 0x0, @local}}}, 0x88) write$binfmt_elf32(r2, &(0x7f00000003c0)=ANY=[@ANYBLOB], 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r2, 0x0, 0x61, 0x0, &(0x7f0000000040)) 04:00:22 executing program 2: r0 = socket$inet6(0xa, 0x400000000000803, 0x3) ioctl(r0, 0x0, &(0x7f00000006c0)="0a5c2d023c126285718070") mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0xc, 0x32, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x8000000003c) connect$inet6(r1, &(0x7f00000002c0)={0xa, 0x0, 0x0, @dev, 0x9}, 0x1c) sendmsg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="2c7c579a7ae9c96d5cc9ad926a3eea1cf89515d52fc4300c0d33f21c491f50289b7a492cc0c90f234201a5c6f9b830f910b1902ed60d51ad019c73fc9065aa2c519f654874b01f87db4a2807b6a2c2532e9d54e219c9c5f95f", 0x59}], 0x1}, 0xc100) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000440)="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", 0x257}], 0x1}, 0x8000) socket$packet(0x11, 0x2, 0x300) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001480)="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", 0x2d5}], 0x1}, 0x0) 04:00:22 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, 0x0, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000002000)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001000)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqsrc(r2, 0x0, 0x2000000000000004, &(0x7f0000013ff4)={@remote}, 0xc) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000340)={{{@in=@broadcast, @in=@broadcast, 0x0, 0x0, 0x0, 0x2000000, 0xa}}, {{@in6=@local, 0x0, 0x33}, 0x0, @in6=@local}}, 0xe8) close(r2) dup3(r0, r1, 0x0) 04:00:22 executing program 2: r0 = socket$inet6(0xa, 0x400000000000803, 0x3) ioctl(r0, 0x0, &(0x7f00000006c0)="0a5c2d023c126285718070") mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0xc, 0x32, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x8000000003c) connect$inet6(r1, &(0x7f00000002c0)={0xa, 0x0, 0x0, @dev, 0x9}, 0x1c) sendmsg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="2c7c579a7ae9c96d5cc9ad926a3eea1cf89515d52fc4300c0d33f21c491f50289b7a492cc0c90f234201a5c6f9b830f910b1902ed60d51ad019c73fc9065aa2c519f654874b01f87db4a2807b6a2c2532e9d54e219c9c5f95f", 0x59}], 0x1}, 0xc100) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000440)="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", 0x257}], 0x1}, 0x8000) socket$packet(0x11, 0x2, 0x300) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001480)="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", 0x2d5}], 0x1}, 0x0) 04:00:22 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x100013, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) syz_execute_func(&(0x7f00000000c0)="64ff0941c3c4e2c9975842c4c27d794e0066420fe2e33e0f1110c442019dccd3193e66430f3a0ce397") clone(0x1a02100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet_MCAST_LEAVE_GROUP(r1, 0x0, 0x2d, &(0x7f0000000300)={0xfffffffffffffffc, {{0x2, 0x0, @local}}}, 0x88) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r1, 0xc0505405, &(0x7f00000001c0)={{0x0, 0x2, 0x8001, 0x3, 0x7fff}, 0x8001, 0x588, 0xfd2}) write$binfmt_elf32(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="185123b4f3613d72de91fa60bf0ac004e236871cb8cc672b9c78f0749489b505f1580c1cf4bcd2164e8a3a02d9ef19f5100300000064fa01ba"], 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r1, 0x0, 0x61, 0x0, &(0x7f0000000040)) ioctl$SG_SET_DEBUG(r1, 0x227e, &(0x7f0000000240)) ioctl$FS_IOC_GETVERSION(r1, 0x80087601, &(0x7f0000000140)) getsockopt$SO_COOKIE(r1, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000180)=0x8) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000280)={r0}) 04:00:22 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x25d1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000080)="00000600000000000000", 0x0) ioctl$SG_EMULATED_HOST(r0, 0x2203, &(0x7f00000000c0)) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000000000000000000000030006000000000000000000380000000000000000000000000020000200000000000000000000000000000000000000000000000000000000040000000000000000000000000000030000000000000000000000000000000200000028e9653bf5f378f24e50b960"], 0x78) execveat(r0, &(0x7f0000000000)='\x00', &(0x7f0000000280), 0x0, 0x1000) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r0) 04:00:22 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x25d1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000080)="00000600000000000000", 0x0) ioctl$SG_EMULATED_HOST(r1, 0x2203, &(0x7f00000000c0)) write$binfmt_elf32(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000000000000000000000030006000000000000000000380000000000000000000000000020000200000000000000000000000000000000000000000000000000000000040000000000000000000000000000030000000000000000000000000000000200000028e9653bf5f378f24e50b960"], 0x78) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 04:00:22 executing program 3: clone(0x41fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f00000000c0)) syz_open_dev$rtc(&(0x7f0000000080)='/dev/rtc#\x00', 0x0, 0x0) ptrace(0x10, r0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000000)) getsockopt$inet_sctp6_SCTP_NODELAY(0xffffffffffffffff, 0x84, 0x3, &(0x7f0000000140), &(0x7f00000001c0)=0x4) ptrace$setregs(0xf, r0, 0x0, &(0x7f0000000180)="a96d55a756") ptrace$getregset(0x420d, r0, 0x2, &(0x7f0000000280)={0x0}) 04:00:22 executing program 2: r0 = socket$inet6(0xa, 0x400000000000803, 0x3) ioctl(r0, 0x1000008912, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0xc, 0x32, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x8000000003c) connect$inet6(r1, &(0x7f00000002c0)={0xa, 0x0, 0x0, @dev, 0x9}, 0x1c) sendmsg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="2c7c579a7ae9c96d5cc9ad926a3eea1cf89515d52fc4300c0d33f21c491f50289b7a492cc0c90f234201a5c6f9b830f910b1902ed60d51ad019c73fc9065aa2c519f654874b01f87db4a2807b6a2c2532e9d54e219c9c5f95f", 0x59}], 0x1}, 0xc100) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000440)="b10b938636ea69df7b5a9984bb1bc72ef58d96e56e11df900a707f4946b1637e2096c584b9a1b4e017163fbdb35160a56c11dfbe74df97d36d19ad6a91c6fb4ad19581b8cf707131830f7a22b1b263c9da0e443c5e969ed6a0d3bc508bf75c3147447379f585759ceba0de5cda46291dc1b8f106a83e1cde43a862d95413ce2616b261ed9f79913ae781b3b843ea1b4429a750b8ccb1952a7b863d0bada9f61df6609fe368eaf47c0ce9e46a22b0d75b063deeaa94285d0c43353046e0a308296a76b0b0145f8af9aa0ed0e18bc50509eaef21c8e03842a97df3a462ea3f9d5f83bf1d4d2875f0d5b24e941483f863cd2ea7c769bd3e594fb173dd873c7d9a3fd20939ad1d5867881ed77a078007b4972aba36cae02004373a6a74d74cb15a52c5f8426cb6f235d38048fd91f5d6100fd58a335df10add227d804167ba191c7a035c5a2a916e7fef18a6003578820b3e0be26a22f2c149f40a0335cadcca64a5e44179e6ce4d7f7c16e8a96c5be7cdf66eef901cb8eeabc94bae30acca8c6fa02889c32311044dcbc9a2e02e0632f7f9aa96849abede543773745e4652fccc503003f10cd68ddab594969ad36cb622ed7ba22dc46a80fb63ac2c561a80ae5c10b295b9f75d9536ba1ac24b8e9ae217611ffe79cb9422158475c1a89a51547d13c03b68d75ffb5717a35f381774567871e9e4190272c97eafcfa0a07a751d0bc8eeb0c206e12b2cff1065a3d5622635fa44c0dcb0722ad4c97e6b7d5844b2e9bab9ba1d083fa2930a3ea267d7f15d817e2b2e055ccfbaf019292f6156efd3a9a13ea90ecf59fc1bf35c6626db1c6759a50ed84acefd3cdb", 0x257}], 0x1}, 0x8000) socket$packet(0x11, 0x2, 0x300) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001480)="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", 0x2d5}], 0x1}, 0x0) 04:00:22 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, 0x0, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000002000)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001000)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqsrc(r2, 0x0, 0x2000000000000004, &(0x7f0000013ff4)={@remote}, 0xc) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000340)={{{@in=@broadcast, @in=@broadcast, 0x0, 0x0, 0x0, 0x2000, 0xa}}, {{@in6=@local, 0x0, 0x33}, 0x0, @in6=@local}}, 0xe8) close(r2) dup3(r0, r1, 0x0) 04:00:22 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) syz_execute_func(&(0x7f00000000c0)="64ff0941c3c4e2c9975842c4c27d794e0066420fe2e33e0f1110c442019dccd3193e66430f3a0ce397") socket$inet6(0xa, 0x3, 0x3f) clone(0x1a02100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet_MCAST_LEAVE_GROUP(r1, 0x0, 0x2d, &(0x7f0000000300)={0xfffffffffffffffc, {{0x2, 0x0, @local}}}, 0x88) write$binfmt_elf32(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="891f44e7245fce474724b25598810c60b7cc3c17d1e3d8816d37025da106694794ca618e2dcf1053d5bf39ff3aadf64ab4d8acae444b52b866e64ee46ce3f1be8b62de66a215f73edd4b4485767f6f693936bcee6ada69297c5e5b4d7c5356f78351c5457544024ba91ccc6cbe4207393a7931005dce38b9a612aa8e2d864bac3e47cf4dcfb44d67368d469f9ff06aed284a5e5f12591a44d51756dd4b7094f0a6863f53214743d127c622e8ed7bdc7ea95e62cc6920694216a7de2cdd28559c3f3a527ed2590b"], 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r1, 0x0, 0x61, 0x0, &(0x7f0000000040)) ioctl$IOC_PR_PREEMPT_ABORT(r1, 0x401870cc, &(0x7f0000000000)={0xc5, 0x10001, 0xb79977c, 0x20}) 04:00:22 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x25d1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000080)="00000600000000000000", 0x0) ioctl$SG_EMULATED_HOST(r0, 0x2203, &(0x7f00000000c0)) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000000000000000000000030006000000000000000000380000000000000000000000000020000200000000000000000000000000000000000000000000000000000000040000000000000000000000000000030000000000000000000000000000000200000028e9653bf5f378f24e50b960"], 0x78) execveat(r0, &(0x7f0000000000)='\x00', &(0x7f0000000280), 0x0, 0x1000) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r0) 04:00:23 executing program 1: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000180)='/dev/full\x00', 0x10000, 0x0) ioctl$SG_SCSI_RESET(r0, 0x2284, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000080), 0x1c) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) syz_execute_func(&(0x7f00000000c0)="64ff0941c3c4e2c9975842c4c27d794e0066420fe2e33e0f1110c442019dccd3193e66430f3a0ce397") clone(0x1a02100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet_MCAST_LEAVE_GROUP(r1, 0x0, 0x2d, &(0x7f0000000300)={0xfffffffffffffffc, {{0x2, 0x0, @local}}}, 0x88) finit_module(r1, &(0x7f0000000140)='/\x00', 0x1) write$binfmt_elf32(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="02fcccab2ab65994d6a4fdbc77b4237d2b6580d0752a10bf5353d6cc46138ebeec58044d"], 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000100)=r1, 0x4) getsockopt$ARPT_SO_GET_ENTRIES(r1, 0x0, 0x61, 0x0, &(0x7f0000000040)) 04:00:23 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x25d1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000080)="00000600000000000000", 0x0) ioctl$SG_EMULATED_HOST(r1, 0x2203, &(0x7f00000000c0)) write$binfmt_elf32(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000000000000000000000030006000000000000000000380000000000000000000000000020000200000000000000000000000000000000000000000000000000000000040000000000000000000000000000030000000000000000000000000000000200000028e9653bf5f378f24e50b960"], 0x78) execveat(r1, &(0x7f0000000000)='\x00', &(0x7f0000000280), 0x0, 0x1000) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, 0xffffffffffffffff) 04:00:23 executing program 2: r0 = socket$inet6(0xa, 0x400000000000803, 0x3) ioctl(r0, 0x1000008912, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0xc, 0x32, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x8000000003c) connect$inet6(r1, &(0x7f00000002c0)={0xa, 0x0, 0x0, @dev, 0x9}, 0x1c) sendmsg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="2c7c579a7ae9c96d5cc9ad926a3eea1cf89515d52fc4300c0d33f21c491f50289b7a492cc0c90f234201a5c6f9b830f910b1902ed60d51ad019c73fc9065aa2c519f654874b01f87db4a2807b6a2c2532e9d54e219c9c5f95f", 0x59}], 0x1}, 0xc100) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000440)="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", 0x257}], 0x1}, 0x8000) socket$packet(0x11, 0x2, 0x300) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001480)="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", 0x2d5}], 0x1}, 0x0) 04:00:23 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, 0x0, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000002000)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001000)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqsrc(r2, 0x0, 0x2000000000000004, &(0x7f0000013ff4)={@remote}, 0xc) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000340)={{{@in=@broadcast, @in=@broadcast, 0x0, 0x0, 0x0, 0x2, 0xa}}, {{@in6=@local, 0x0, 0x33}, 0x0, @in6=@local}}, 0xe8) close(r2) dup3(r0, r1, 0x0) 04:00:23 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000000), 0x266) syz_execute_func(&(0x7f00000000c0)="64ff0941c3c4e2c9975842c4c27d794e0066420fe2e33e0f1110c442019dccd3193e66430f3a0ce397") clone(0x1a02100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet_MCAST_LEAVE_GROUP(r1, 0x0, 0x2d, &(0x7f0000000300)={0xfffffffffffffffc, {{0x2, 0x0, @local}}}, 0x88) write$binfmt_elf32(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB], 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r1, 0x0, 0x61, 0x0, &(0x7f0000000040)) 04:00:23 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) setsockopt$nfc_llcp_NFC_LLCP_RW(r1, 0x118, 0x0, &(0x7f0000000000)=0xffffffffffffffff, 0x4) syz_execute_func(&(0x7f00000000c0)="64ff0941c3c4e2c9975842c4c27d794e0066420fe2e33e0f1110c442019dccd3193e66430f3a0ce397") clone(0x1a02100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet_MCAST_LEAVE_GROUP(r1, 0x0, 0x2d, &(0x7f0000000300)={0xfffffffffffffffc, {{0x2, 0x0, @local}}}, 0x88) ioctl$SNDRV_TIMER_IOCTL_START(r1, 0x54a0) write$binfmt_elf32(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r1, 0x0, 0x61, 0x0, &(0x7f0000000040)) 04:00:23 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x25d1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000080)="00000600000000000000", 0x0) ioctl$SG_EMULATED_HOST(r0, 0x2203, &(0x7f00000000c0)) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000000000000000000000030006000000000000000000380000000000000000000000000020000200000000000000000000000000000000000000000000000000000000040000000000000000000000000000030000000000000000000000000000000200000028e9653bf5f378f24e50b960"], 0x78) execveat(r0, &(0x7f0000000000)='\x00', &(0x7f0000000280), 0x0, 0x1000) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r0) 04:00:23 executing program 3: clone(0x41fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f00000000c0)) syz_open_dev$rtc(&(0x7f0000000080)='/dev/rtc#\x00', 0x0, 0x0) ptrace(0x10, r0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000000)) getsockopt$inet_sctp6_SCTP_NODELAY(0xffffffffffffffff, 0x84, 0x3, &(0x7f0000000140), &(0x7f00000001c0)=0x4) ptrace$setregs(0xf, r0, 0x0, &(0x7f0000000180)="a96d55a756") ptrace$getregset(0x420c, r0, 0x2, &(0x7f0000000280)={0x0}) 04:00:23 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000180)={0xa, 0xfffffffffffffffd, 0x0, @remote}, 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) syz_execute_func(&(0x7f00000000c0)="64ff0941c3c4e2c9975842c4c27d794e0066420fe2e33e0f1110c442019dccd3193e66430f3a0ce397") clone(0x1a02100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet_MCAST_LEAVE_GROUP(r1, 0x0, 0x2d, &(0x7f0000000300)={0xfffffffffffffffc, {{0x2, 0x0, @local}}}, 0x88) write$binfmt_elf32(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="fdc936f49db994a926f3041a5ac26ab715ea59b863702edd000000000000000000000000000000003fb67f3ca4baace461ed8dac5565330fa2628334ba1dc5df5c2b7bc9c15c1f02130d8f6dc9d69631499a2b9d9551ae7a639c24c3d090dc1d9fdf4dc3c7"], 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r1, 0x0, 0x61, 0x0, &(0x7f0000000040)) ioctl$EVIOCSABS20(r1, 0x401845e0, &(0x7f0000000000)={0x4, 0x10000, 0x80000000, 0x7, 0x9, 0x7}) 04:00:23 executing program 2: r0 = socket$inet6(0xa, 0x400000000000803, 0x3) ioctl(r0, 0x1000008912, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0xc, 0x32, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x8000000003c) connect$inet6(r1, &(0x7f00000002c0)={0xa, 0x0, 0x0, @dev, 0x9}, 0x1c) sendmsg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="2c7c579a7ae9c96d5cc9ad926a3eea1cf89515d52fc4300c0d33f21c491f50289b7a492cc0c90f234201a5c6f9b830f910b1902ed60d51ad019c73fc9065aa2c519f654874b01f87db4a2807b6a2c2532e9d54e219c9c5f95f", 0x59}], 0x1}, 0xc100) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000440)="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", 0x257}], 0x1}, 0x8000) socket$packet(0x11, 0x2, 0x300) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001480)="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", 0x2d5}], 0x1}, 0x0) 04:00:23 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, 0x0, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000002000)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001000)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqsrc(r2, 0x0, 0x2000000000000004, &(0x7f0000013ff4)={@remote}, 0xc) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000340)={{{@in=@broadcast, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x2}}, {{@in6=@local, 0x0, 0x33}, 0x0, @in6=@local}}, 0xe8) close(r2) dup3(r0, r1, 0x0) 04:00:23 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x25d1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000080)="00000600000000000000", 0x0) ioctl$SG_EMULATED_HOST(r1, 0x2203, &(0x7f00000000c0)) write$binfmt_elf32(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000000000000000000000030006000000000000000000380000000000000000000000000020000200000000000000000000000000000000000000000000000000000000040000000000000000000000000000030000000000000000000000000000000200000028e9653bf5f378f24e50b960"], 0x78) execveat(r1, &(0x7f0000000000)='\x00', &(0x7f0000000280), 0x0, 0x1000) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, 0xffffffffffffffff) 04:00:23 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x25d1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000080)="00000600000000000000", 0x0) ioctl$SG_EMULATED_HOST(r0, 0x2203, &(0x7f00000000c0)) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000000000000000000000030006000000000000000000380000000000000000000000000020000200000000000000000000000000000000000000000000000000000000040000000000000000000000000000030000000000000000000000000000000200000028e9653bf5f378f24e50b960"], 0x78) execveat(r0, &(0x7f0000000000)='\x00', &(0x7f0000000280), 0x0, 0x1000) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r0) 04:00:23 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x12, 0x0, 0x67a81d4358ee47c8) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) ioctl$KVM_SIGNAL_MSI(r1, 0x4020aea5, &(0x7f0000000000)={0x6000, 0x1000, 0x80000000, 0x2, 0x8}) syz_execute_func(&(0x7f00000000c0)="64ff0941c3c4e2c9975842c4c27d794e0066420fe2e33e0f1110c442019dccd3193e66430f3a0ce397") clone(0x1a02100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet_MCAST_LEAVE_GROUP(r1, 0x0, 0x2d, &(0x7f0000000300)={0xfffffffffffffffc, {{0x2, 0x0, @local}}}, 0x88) write$binfmt_elf32(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB], 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r1, 0x0, 0x61, 0x0, &(0x7f0000000040)) 04:00:24 executing program 2: r0 = socket$inet6(0xa, 0x400000000000803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000006c0)) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0xc, 0x32, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x8000000003c) connect$inet6(r1, &(0x7f00000002c0)={0xa, 0x0, 0x0, @dev, 0x9}, 0x1c) sendmsg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="2c7c579a7ae9c96d5cc9ad926a3eea1cf89515d52fc4300c0d33f21c491f50289b7a492cc0c90f234201a5c6f9b830f910b1902ed60d51ad019c73fc9065aa2c519f654874b01f87db4a2807b6a2c2532e9d54e219c9c5f95f", 0x59}], 0x1}, 0xc100) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000440)="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", 0x257}], 0x1}, 0x8000) socket$packet(0x11, 0x2, 0x300) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001480)="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", 0x2d5}], 0x1}, 0x0) 04:00:24 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) syz_execute_func(&(0x7f00000000c0)="64ff0941c3c4e2c9975842c4c27d794e0066420fe2e33e0f1110c442019dccd3193e66430f3a0ce397") clone(0x1a02100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet_tcp_buf(r1, 0x6, 0x1a, &(0x7f0000000100)="1cd2a0ab5d8907d164cb3810ac8497d710f52a39015b985a7e2f1130ae86d9725596424c87eb02f1a77efdf6f06602d6b599b5ec504d4d13774669d471ab3d6b683eedfac3f3d89ccfee08cddc7d6095e1c3dd4083c6df67f10d964da0877867a39ec0b1f50c0afe741d932255da80c729c8ab9967cd90a97f0add34997a8ac65bc7a3178a6f14e176d5bbfef751c1bbff9d871f7ac3b060263f9161680e42ea916c626cc610b86ccb6d3dfcf660156db0ce809530ffa5a6e1", 0xb9) setsockopt$inet_MCAST_LEAVE_GROUP(r1, 0x0, 0x2d, &(0x7f0000000300)={0xfffffffffffffffc, {{0x2, 0x0, @local}}}, 0x88) write$binfmt_elf32(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB], 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r1, 0x0, 0x61, 0x0, &(0x7f0000000040)) 04:00:24 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, 0x0, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000002000)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001000)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqsrc(r2, 0x0, 0x2000000000000004, &(0x7f0000013ff4)={@remote}, 0xc) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000340)={{{@in=@broadcast, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0xa, 0x80ffffff00000000}}, {{@in6=@local, 0x0, 0x33}, 0x0, @in6=@local}}, 0xe8) close(r2) dup3(r0, r1, 0x0) 04:00:24 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000340)={'bond_s,ave_1\x00', &(0x7f0000000300)=@ethtool_sfeatures={0x3b, 0x2, [{}, {}]}}) 04:00:24 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x25d1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000080)="00000600000000000000", 0x0) ioctl$SG_EMULATED_HOST(r1, 0x2203, &(0x7f00000000c0)) write$binfmt_elf32(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000000000000000000000030006000000000000000000380000000000000000000000000020000200000000000000000000000000000000000000000000000000000000040000000000000000000000000000030000000000000000000000000000000200000028e9653bf5f378f24e50b960"], 0x78) execveat(r1, &(0x7f0000000000)='\x00', &(0x7f0000000280), 0x0, 0x1000) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, 0xffffffffffffffff) 04:00:24 executing program 2: r0 = socket$inet6(0xa, 0x400000000000803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000006c0)) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0xc, 0x32, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x8000000003c) connect$inet6(r1, &(0x7f00000002c0)={0xa, 0x0, 0x0, @dev, 0x9}, 0x1c) sendmsg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="2c7c579a7ae9c96d5cc9ad926a3eea1cf89515d52fc4300c0d33f21c491f50289b7a492cc0c90f234201a5c6f9b830f910b1902ed60d51ad019c73fc9065aa2c519f654874b01f87db4a2807b6a2c2532e9d54e219c9c5f95f", 0x59}], 0x1}, 0xc100) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000440)="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", 0x257}], 0x1}, 0x8000) socket$packet(0x11, 0x2, 0x300) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001480)="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", 0x2d5}], 0x1}, 0x0) 04:00:24 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) fchdir(r1) syz_execute_func(&(0x7f00000000c0)="64ff0941c3c4e2c9975842c4c27d794e0066420fe2e33e0f1110c442019dccd3193e66430f3a0ce397") clone(0x1a02100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet_MCAST_LEAVE_GROUP(r1, 0x0, 0x2d, &(0x7f0000000300)={0xfffffffffffffffc, {{0x2, 0x0, @local}}}, 0x88) write$binfmt_elf32(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="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"], 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r1, 0x0, 0x61, 0x0, &(0x7f0000000040)) 04:00:24 executing program 0: sched_setaffinity(0x0, 0xac05a2b3902e047b, &(0x7f00000000c0)=0x800000d) r0 = socket$inet(0x2, 0x6000000000000007, 0x6) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='tunl0\x00', 0x10) r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) mq_open(&(0x7f0000000000)='..\x00', 0x0, 0x0, &(0x7f0000000040)) r2 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x9) setsockopt(r2, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) getsockopt$inet_mreqsrc(r2, 0x0, 0x2d, &(0x7f0000000240)={@loopback, @loopback, @remote}, &(0x7f0000000280)=0xc) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) connect$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xcc, &(0x7f0000000400)={{0xa, 0x4e24, 0x8, @remote, 0x8001}, {0xa, 0x4e20, 0x2, @mcast1, 0x100}, 0x40, [0xff, 0xffffffff, 0x8, 0x7263, 0xfff, 0x10000, 0x7, 0x80000001]}, 0x5c) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000340)='tls\x00', 0x4) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x2710}, 0x10) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x0) write(0xffffffffffffffff, &(0x7f00000001c0), 0x0) creat(&(0x7f00000003c0)='./file0\x00', 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000a40)) getuid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000e00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000f00)) getuid() getegid() sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000f80)={&(0x7f0000000380)=@proc, 0xc, &(0x7f0000000ec0), 0x0, &(0x7f0000000f40)}, 0x0) syz_open_dev$amidi(&(0x7f00000002c0)='/dev/amidi#\x00', 0x0, 0x0) sendmmsg(r2, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x3a6, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000100)='team0\x00', 0x10) sendmmsg(r2, &(0x7f000000a080)=[{{&(0x7f0000005440)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2, {0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x80, &(0x7f0000005640)=[{&(0x7f00000097c0)="bf", 0x1}], 0x1, &(0x7f00000098c0)}}], 0x1, 0x0) 04:00:24 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, 0x0, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000002000)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001000)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqsrc(r2, 0x0, 0x2000000000000004, &(0x7f0000013ff4)={@remote}, 0xc) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000340)={{{@in=@broadcast, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0xa, 0x2000000000000000}}, {{@in6=@local, 0x0, 0x33}, 0x0, @in6=@local}}, 0xe8) close(r2) dup3(r0, r1, 0x0) 04:00:24 executing program 3: clone(0x41fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f00000000c0)) syz_open_dev$rtc(&(0x7f0000000080)='/dev/rtc#\x00', 0x0, 0x0) ptrace(0x10, r0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000000)) getsockopt$inet_sctp6_SCTP_NODELAY(0xffffffffffffffff, 0x84, 0x3, &(0x7f0000000140), &(0x7f00000001c0)=0x4) ptrace$setregs(0xf, r0, 0x0, &(0x7f0000000180)="a96d55a756") ptrace$getregset(0x4206, r0, 0x2, &(0x7f0000000280)={0x0}) 04:00:24 executing program 5 (fault-call:4 fault-nth:0): r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x25d1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000080)="00000600000000000000", 0x0) ioctl$SG_EMULATED_HOST(r1, 0x2203, &(0x7f00000000c0)) write$binfmt_elf32(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000000000000000000000030006000000000000000000380000000000000000000000000020000200000000000000000000000000000000000000000000000000000000040000000000000000000000000000030000000000000000000000000000000200000028e9653bf5f378f24e50b960"], 0x78) execveat(r1, &(0x7f0000000000)='\x00', &(0x7f0000000280), 0x0, 0x1000) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 04:00:24 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) syz_execute_func(&(0x7f00000000c0)="64ff0941c3c4e2c9975842c4c27d794e0066420fe2e33e0f1110c442019dccd3193e66430f3a0ce397") clone(0x1a02100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = syz_open_dev$audion(&(0x7f0000000280)='/dev/audio#\x00', 0x6, 0xc000) setsockopt$inet_MCAST_LEAVE_GROUP(r1, 0x0, 0x2d, &(0x7f0000000300)={0xfffffffffffffffc, {{0x2, 0x0, @local}}}, 0x88) write$binfmt_elf32(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="0b5cbba0ad9c0ee492b82e25523d1553f53aaafc9806f805b128ac70df"], 0x1d) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000140)={0x0, 0x8}, &(0x7f00000001c0)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r1, 0x84, 0x6d, &(0x7f0000000200)={r3, 0xb, "c87dda0235312b12615cb1578cb4b87fcd8204a61181b4f81469afd85ca382f176d02aa78d16c5"}, &(0x7f0000000240)=0x2f) recvfrom$inet(r1, &(0x7f0000000000)=""/23, 0x17, 0x10000, &(0x7f0000000100)={0x2, 0x4e22, @empty}, 0x10) getsockopt$ARPT_SO_GET_ENTRIES(r1, 0x0, 0x61, 0x0, &(0x7f0000000040)) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f00000002c0)={0x2, 0x0, [{0xc0000001, 0xffffffffffffffff, 0x8000, 0x400, 0x6}, {0xc0000009, 0x0, 0x100000000, 0x401}]}) [ 407.328931] FAULT_INJECTION: forcing a failure. [ 407.328931] name failslab, interval 1, probability 0, space 0, times 0 [ 407.368020] CPU: 1 PID: 16713 Comm: syz-executor5 Not tainted 4.20.0-rc4+ #360 [ 407.375434] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 407.384802] Call Trace: [ 407.387416] dump_stack+0x244/0x39d [ 407.391074] ? dump_stack_print_info.cold.1+0x20/0x20 [ 407.396291] ? trace_hardirqs_on_caller+0xc0/0x310 [ 407.401255] should_fail.cold.4+0xa/0x17 [ 407.405346] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 407.410459] ? __f_unlock_pos+0x19/0x20 [ 407.414451] ? lock_downgrade+0x900/0x900 [ 407.418617] ? retint_kernel+0x2d/0x2d [ 407.422537] ? find_held_lock+0x36/0x1c0 [ 407.426634] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 407.431233] ? perf_trace_sched_process_exec+0x860/0x860 [ 407.436697] ? trace_hardirqs_on_caller+0xc0/0x310 [ 407.441643] ? check_preemption_disabled+0x48/0x280 [ 407.446678] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 407.451459] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 407.456933] __should_failslab+0x124/0x180 [ 407.461189] should_failslab+0x9/0x14 [ 407.465012] kmem_cache_alloc+0x2be/0x730 [ 407.469193] getname_flags+0xd0/0x590 [ 407.473010] __x64_sys_execveat+0xd4/0x130 04:00:24 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) syz_execute_func(&(0x7f00000000c0)="64ff0941c3c4e2c9975842c4c27d794e0066420fe2e33e0f1110c442019dccd3193e66430f3a0ce397") clone(0x1a02100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet_MCAST_LEAVE_GROUP(r1, 0x0, 0x2d, &(0x7f0000000300)={0xfffffffffffffffc, {{0x2, 0x0, @local}}}, 0x88) write$binfmt_elf32(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB], 0x0) sendfile(r0, r0, &(0x7f0000000000)=0x42, 0x6) getsockopt$ARPT_SO_GET_ENTRIES(r1, 0x0, 0x61, 0x0, &(0x7f0000000040)) [ 407.477263] do_syscall_64+0x1b9/0x820 [ 407.481170] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 407.486552] ? syscall_return_slowpath+0x5e0/0x5e0 [ 407.491493] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 407.496350] ? trace_hardirqs_on_caller+0x310/0x310 [ 407.501384] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 407.506414] ? prepare_exit_to_usermode+0x291/0x3b0 [ 407.506437] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 407.506461] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 407.521507] RIP: 0033:0x457569 04:00:25 executing program 5 (fault-call:4 fault-nth:1): r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x25d1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000080)="00000600000000000000", 0x0) ioctl$SG_EMULATED_HOST(r1, 0x2203, &(0x7f00000000c0)) write$binfmt_elf32(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000000000000000000000030006000000000000000000380000000000000000000000000020000200000000000000000000000000000000000000000000000000000000040000000000000000000000000000030000000000000000000000000000000200000028e9653bf5f378f24e50b960"], 0x78) execveat(r1, &(0x7f0000000000)='\x00', &(0x7f0000000280), 0x0, 0x1000) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 04:00:25 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000180)=[@sack_perm, @window={0x3, 0xfffffffffffffffa}, @sack_perm], 0x3) syz_execute_func(&(0x7f00000000c0)="64ff0941c3c4e2c9975842c4c27d794e0066420fe2e33e0f1110c442019dccd3193e66430f3a0ce397") clone(0x1a02100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet_MCAST_LEAVE_GROUP(r1, 0x0, 0x2d, &(0x7f0000000300)={0xfffffffffffffffc, {{0x2, 0x0, @local}}}, 0x88) write$binfmt_elf32(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="066d15a52d0000bcc980612747c216163f"], 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r1, 0x0, 0x61, 0x0, &(0x7f0000000040)) [ 407.521525] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 407.521535] RSP: 002b:00007fccba6d7c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 407.521551] RAX: ffffffffffffffda RBX: 00007fccba6d7c90 RCX: 0000000000457569 [ 407.521561] RDX: 0000000020000280 RSI: 0000000020000000 RDI: 0000000000000004 [ 407.521571] RBP: 000000000072bf00 R08: 0000000000001000 R09: 0000000000000000 [ 407.521581] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fccba6d86d4 [ 407.521589] R13: 00000000004bdc9b R14: 00000000004cd1d8 R15: 0000000000000005 04:00:25 executing program 2: r0 = socket$inet6(0xa, 0x400000000000803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000006c0)) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0xc, 0x32, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x8000000003c) connect$inet6(r1, &(0x7f00000002c0)={0xa, 0x0, 0x0, @dev, 0x9}, 0x1c) sendmsg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="2c7c579a7ae9c96d5cc9ad926a3eea1cf89515d52fc4300c0d33f21c491f50289b7a492cc0c90f234201a5c6f9b830f910b1902ed60d51ad019c73fc9065aa2c519f654874b01f87db4a2807b6a2c2532e9d54e219c9c5f95f", 0x59}], 0x1}, 0xc100) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000440)="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", 0x257}], 0x1}, 0x8000) socket$packet(0x11, 0x2, 0x300) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001480)="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", 0x2d5}], 0x1}, 0x0) 04:00:25 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, 0x0, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000002000)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001000)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqsrc(r2, 0x0, 0x2000000000000004, &(0x7f0000013ff4)={@remote}, 0xc) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000340)={{{@in=@broadcast, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3000000}}, {{@in6=@local, 0x0, 0x33}, 0x0, @in6=@local}}, 0xe8) close(r2) dup3(r0, r1, 0x0) [ 407.624330] FAULT_INJECTION: forcing a failure. [ 407.624330] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 407.636185] CPU: 0 PID: 16745 Comm: syz-executor5 Not tainted 4.20.0-rc4+ #360 [ 407.643552] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 407.652914] Call Trace: [ 407.655540] dump_stack+0x244/0x39d [ 407.659197] ? dump_stack_print_info.cold.1+0x20/0x20 [ 407.664422] should_fail.cold.4+0xa/0x17 [ 407.668503] ? fault_create_debugfs_attr+0x1f0/0x1f0 04:00:25 executing program 0: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0}, &(0x7f0000000080)=0xc) r1 = socket(0x4, 0x3, 0xff) bind$bt_l2cap(r1, &(0x7f0000000140)={0x1f, 0x1, {0x3, 0x1000, 0x2, 0x100, 0x9}, 0xc000000000, 0x2}, 0xe) r2 = openat$audio(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/audio\x00', 0x101, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r2, 0xc0206434, &(0x7f00000002c0)={0x1, 0x0, 0x0, 0x40}) ioctl$DRM_IOCTL_AGP_ALLOC(r2, 0xc0206434, &(0x7f0000000300)={0x7fffffff, r3, 0x10000}) ioctl$KVM_SET_ONE_REG(r2, 0x4010aeac, &(0x7f0000000200)={0x9, 0x9}) capset(&(0x7f00000000c0)={0x399f1336, r0}, &(0x7f0000000100)={0x3, 0x6, 0x646, 0x8000, 0x8, 0x3}) mknod(&(0x7f000086c000)='./file0\x00', 0x103d, 0x0) ioctl$KVM_SET_DEBUGREGS(r2, 0x4080aea2, &(0x7f0000000340)={[0x4, 0x4000, 0xd000, 0xd000], 0x5, 0x0, 0x7}) bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x2, 0xff, 0x400, 0x6, 0x10, r2, 0x6}, 0x2c) open(&(0x7f0000000000)='./file0\x00', 0x7, 0x0) write$FUSE_NOTIFY_POLL(r2, &(0x7f0000000240)={0x18, 0x1, 0x0, {0x8}}, 0xfffffc9f) [ 407.673626] ? zap_class+0x640/0x640 [ 407.677390] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 407.682944] ? _kstrtoull+0x188/0x250 [ 407.686765] ? mark_held_locks+0x130/0x130 [ 407.691008] ? find_held_lock+0x36/0x1c0 [ 407.695084] ? zap_class+0x640/0x640 [ 407.698813] ? get_pid_task+0xd6/0x1a0 [ 407.702715] ? lock_downgrade+0x900/0x900 [ 407.706886] ? check_preemption_disabled+0x48/0x280 [ 407.711921] ? find_held_lock+0x36/0x1c0 [ 407.716000] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 407.721554] ? should_fail+0x22d/0xd01 [ 407.725466] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 407.730577] ? __f_unlock_pos+0x19/0x20 [ 407.734573] __alloc_pages_nodemask+0x366/0xea0 [ 407.739266] ? proc_fail_nth_write+0x9e/0x210 [ 407.743771] ? proc_cwd_link+0x1d0/0x1d0 [ 407.743793] ? __alloc_pages_slowpath+0x2de0/0x2de0 [ 407.743820] ? find_held_lock+0x36/0x1c0 [ 407.743863] ? trace_hardirqs_off+0xb8/0x310 [ 407.743885] cache_grow_begin+0xa5/0x8c0 [ 407.743906] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 407.752978] ? check_preemption_disabled+0x48/0x280 [ 407.753003] kmem_cache_alloc+0x66b/0x730 [ 407.753021] ? do_syscall_64+0x9a/0x820 [ 407.753039] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 407.753064] getname_flags+0xd0/0x590 [ 407.753086] __x64_sys_execveat+0xd4/0x130 [ 407.753106] do_syscall_64+0x1b9/0x820 [ 407.761561] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 407.761582] ? syscall_return_slowpath+0x5e0/0x5e0 [ 407.761598] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 407.761618] ? trace_hardirqs_on_caller+0x310/0x310 04:00:25 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) syz_execute_func(&(0x7f00000000c0)="64ff0941c3c4e2c9975842c4c27d794e0066420fe2e33e0f1110c442019dccd3193e66430f3a0ce397") clone(0x1a02100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet_MCAST_LEAVE_GROUP(r1, 0x0, 0x2d, &(0x7f0000000300)={0xfffffffffffffffc, {{0x2, 0x0, @local}}}, 0x88) write$binfmt_elf32(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB], 0x0) r2 = semget(0x2, 0x1, 0x80) semget(0x1, 0x0, 0x10) semctl$IPC_RMID(r2, 0x0, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r1, 0x0, 0x61, 0x0, &(0x7f0000000040)) 04:00:25 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000000)={0x9, &(0x7f0000000100)=[{0x3, 0x4, 0x1, 0x9}, {0x101, 0x6, 0xfffffffffffffffd, 0xfffffffffffffffe}, {0x10000, 0x7ab, 0x3ff, 0x5}, {0x3, 0x8000000000000, 0x8001, 0x7518}, {0xe, 0xfffffffffffffff9, 0x100, 0x81}, {0x7, 0x40, 0x0, 0x6}, {0x20, 0xe274, 0x1ab, 0x3}, {0x8, 0x4e, 0x40, 0x8}, {0x4, 0x0, 0x3f, 0x9}]}) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) syz_execute_func(&(0x7f00000000c0)="64ff0941c3c4e2c9975842c4c27d794e0066420fe2e33e0f1110c442019dccd3193e66430f3a0ce397") clone(0x1a02100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet_MCAST_LEAVE_GROUP(r1, 0x0, 0x2d, &(0x7f0000000300)={0xfffffffffffffffc, {{0x2, 0x0, @local}}}, 0x88) write$binfmt_elf32(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB], 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r1, 0x0, 0x61, 0x0, &(0x7f0000000040)) [ 407.761637] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 407.761656] ? prepare_exit_to_usermode+0x291/0x3b0 [ 407.761679] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 407.761700] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 407.771277] RIP: 0033:0x457569 [ 407.771305] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 407.771313] RSP: 002b:00007fccba6d7c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 407.771328] RAX: ffffffffffffffda RBX: 00007fccba6d7c90 RCX: 0000000000457569 [ 407.771338] RDX: 0000000020000280 RSI: 0000000020000000 RDI: 0000000000000004 [ 407.771347] RBP: 000000000072bf00 R08: 0000000000001000 R09: 0000000000000000 [ 407.771357] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fccba6d86d4 [ 407.771367] R13: 00000000004bdc9b R14: 00000000004cd1d8 R15: 0000000000000005 04:00:25 executing program 5 (fault-call:4 fault-nth:2): r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x25d1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000080)="00000600000000000000", 0x0) ioctl$SG_EMULATED_HOST(r1, 0x2203, &(0x7f00000000c0)) write$binfmt_elf32(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000000000000000000000030006000000000000000000380000000000000000000000000020000200000000000000000000000000000000000000000000000000000000040000000000000000000000000000030000000000000000000000000000000200000028e9653bf5f378f24e50b960"], 0x78) execveat(r1, &(0x7f0000000000)='\x00', &(0x7f0000000280), 0x0, 0x1000) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 04:00:25 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, 0x0, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000002000)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001000)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqsrc(r2, 0x0, 0x2000000000000004, &(0x7f0000013ff4)={@remote}, 0xc) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000340)={{{@in=@broadcast, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0xa, 0xff0f0000}}, {{@in6=@local, 0x0, 0x33}, 0x0, @in6=@local}}, 0xe8) close(r2) dup3(r0, r1, 0x0) [ 407.991244] audit: type=1326 audit(1543809625.457:50): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=16765 comm="syz-executor1" exe="/root/syz-executor1" sig=9 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0x0 [ 408.103745] FAULT_INJECTION: forcing a failure. [ 408.103745] name failslab, interval 1, probability 0, space 0, times 0 [ 408.115581] CPU: 1 PID: 16777 Comm: syz-executor5 Not tainted 4.20.0-rc4+ #360 [ 408.122957] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 408.132336] Call Trace: [ 408.134931] dump_stack+0x244/0x39d [ 408.138565] ? dump_stack_print_info.cold.1+0x20/0x20 [ 408.143770] ? mark_held_locks+0xc7/0x130 [ 408.147936] should_fail.cold.4+0xa/0x17 [ 408.152002] ? retint_kernel+0x2d/0x2d [ 408.155903] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 408.161013] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 408.166505] ? find_held_lock+0x36/0x1c0 [ 408.170592] ? perf_trace_sched_process_exec+0x860/0x860 [ 408.176044] ? _raw_spin_unlock_irq+0x27/0x80 [ 408.180562] __should_failslab+0x124/0x180 [ 408.184805] should_failslab+0x9/0x14 [ 408.188609] kmem_cache_alloc+0x2be/0x730 [ 408.192767] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 408.198345] dup_fd+0x11c/0xf50 [ 408.201633] ? __switch_to_asm+0x34/0x70 [ 408.205701] ? preempt_notifier_register+0x200/0x200 [ 408.210804] ? __switch_to_asm+0x34/0x70 [ 408.214871] ? __switch_to_asm+0x40/0x70 [ 408.218935] ? __fdget+0x20/0x20 [ 408.222305] ? __switch_to_asm+0x34/0x70 [ 408.226368] ? __switch_to_asm+0x34/0x70 [ 408.230429] ? __switch_to_asm+0x40/0x70 [ 408.234491] ? __switch_to_asm+0x34/0x70 [ 408.238550] ? __switch_to_asm+0x40/0x70 [ 408.242609] ? __switch_to_asm+0x34/0x70 [ 408.246671] ? __switch_to_asm+0x40/0x70 [ 408.250743] ? __schedule+0x8d7/0x21d0 [ 408.254643] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 408.259237] ? __sched_text_start+0x8/0x8 [ 408.263407] unshare_fd+0x200/0x2c0 [ 408.267038] ? mmdrop_async_fn+0x20/0x20 [ 408.271106] ? trace_hardirqs_on_caller+0xc0/0x310 [ 408.276042] ? retint_kernel+0x1b/0x2d [ 408.279935] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 408.284706] unshare_files+0xab/0x2d0 [ 408.288525] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 408.293297] ? __ia32_sys_unshare+0x40/0x40 [ 408.297632] ? retint_kernel+0x2d/0x2d [ 408.301531] __do_execve_file.isra.33+0x360/0x25d0 [ 408.306468] ? __check_object_size+0x4ea/0x782 [ 408.311074] ? prepare_bprm_creds+0x120/0x120 [ 408.315581] ? usercopy_warn+0x110/0x110 [ 408.319659] ? check_preemption_disabled+0x48/0x280 [ 408.324687] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 408.330241] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 408.335801] ? strncpy_from_user+0x411/0x5a0 [ 408.340221] ? digsig_verify+0x1530/0x1530 [ 408.344457] ? kmem_cache_alloc+0x33a/0x730 [ 408.348798] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 408.354349] __x64_sys_execveat+0xed/0x130 [ 408.358598] do_syscall_64+0x1b9/0x820 [ 408.362505] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 408.367876] ? syscall_return_slowpath+0x5e0/0x5e0 [ 408.372810] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 408.377663] ? trace_hardirqs_on_caller+0x310/0x310 [ 408.382692] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 408.388239] ? prepare_exit_to_usermode+0x291/0x3b0 [ 408.393275] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 408.398146] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 408.403338] RIP: 0033:0x457569 [ 408.406539] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 408.425452] RSP: 002b:00007fccba6d7c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 408.433173] RAX: ffffffffffffffda RBX: 00007fccba6d7c90 RCX: 0000000000457569 [ 408.440450] RDX: 0000000020000280 RSI: 0000000020000000 RDI: 0000000000000004 [ 408.447720] RBP: 000000000072bf00 R08: 0000000000001000 R09: 0000000000000000 04:00:25 executing program 3: clone(0x41fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f00000000c0)) syz_open_dev$rtc(&(0x7f0000000080)='/dev/rtc#\x00', 0x0, 0x0) ptrace(0x10, r0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000000)) getsockopt$inet_sctp6_SCTP_NODELAY(0xffffffffffffffff, 0x84, 0x3, &(0x7f0000000140), &(0x7f00000001c0)=0x4) ptrace$setregs(0xf, r0, 0x0, &(0x7f0000000180)="a96d55a756") ptrace$getregset(0x4207, r0, 0x2, &(0x7f0000000280)={0x0}) 04:00:25 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000100)={0xffffffffffffffff}, 0x117, 0xb}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, &(0x7f0000000180)={0x1, 0x10, 0xfa00, {&(0x7f0000000000), r2}}, 0x18) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) syz_execute_func(&(0x7f00000000c0)="64ff0941c3c4e2c9975842c4c27d794e0066420fe2e33e0f1110c442019dccd3193e66430f3a0ce397") clone(0x1a02100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet_MCAST_LEAVE_GROUP(r1, 0x0, 0x2d, &(0x7f0000000300)={0xfffffffffffffffc, {{0x2, 0x0, @local}}}, 0x88) write$binfmt_elf32(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB], 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r1, 0x0, 0x61, 0x0, &(0x7f0000000040)) 04:00:25 executing program 2: r0 = socket$inet6(0xa, 0x400000000000803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000006c0)="0a5c2d023c12") mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0xc, 0x32, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x8000000003c) connect$inet6(r1, &(0x7f00000002c0)={0xa, 0x0, 0x0, @dev, 0x9}, 0x1c) sendmsg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="2c7c579a7ae9c96d5cc9ad926a3eea1cf89515d52fc4300c0d33f21c491f50289b7a492cc0c90f234201a5c6f9b830f910b1902ed60d51ad019c73fc9065aa2c519f654874b01f87db4a2807b6a2c2532e9d54e219c9c5f95f", 0x59}], 0x1}, 0xc100) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000440)="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", 0x257}], 0x1}, 0x8000) socket$packet(0x11, 0x2, 0x300) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001480)="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", 0x2d5}], 0x1}, 0x0) [ 408.455014] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fccba6d86d4 [ 408.462293] R13: 00000000004bdc9b R14: 00000000004cd1d8 R15: 0000000000000005 04:00:25 executing program 5 (fault-call:4 fault-nth:3): r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x25d1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000080)="00000600000000000000", 0x0) ioctl$SG_EMULATED_HOST(r1, 0x2203, &(0x7f00000000c0)) write$binfmt_elf32(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000000000000000000000030006000000000000000000380000000000000000000000000020000200000000000000000000000000000000000000000000000000000000040000000000000000000000000000030000000000000000000000000000000200000028e9653bf5f378f24e50b960"], 0x78) execveat(r1, &(0x7f0000000000)='\x00', &(0x7f0000000280), 0x0, 0x1000) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 04:00:26 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, 0x0, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000002000)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001000)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqsrc(r2, 0x0, 0x2000000000000004, &(0x7f0000013ff4)={@remote}, 0xc) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000340)={{{@in=@broadcast, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0xa, 0x6}}, {{@in6=@local, 0x0, 0x33}, 0x0, @in6=@local}}, 0xe8) close(r2) dup3(r0, r1, 0x0) [ 408.522020] cgroup: fork rejected by pids controller in /syz3 04:00:26 executing program 1: pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000240), 0x4) getsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f0000000180)={@empty, @multicast1, @local}, &(0x7f00000001c0)=0xc) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x1a, 0x0, 0xff36) connect$inet6(r2, &(0x7f0000000080), 0x1c) r3 = dup2(r2, r2) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000440), 0x131f64) ioctl$VT_RESIZE(r3, 0x5609, &(0x7f0000000100)={0x8, 0x0, 0x5}) syz_execute_func(&(0x7f00000000c0)="64ff0941c3c4e2c9975842c4c27d794e0066420fe2e33e0f1110c442019dccd3193e66430f3a0ce397") syz_open_dev$usbmon(&(0x7f00000003c0)='/dev/usbmon#\x00', 0x80000000, 0x2) clone(0x1a02100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet_MCAST_LEAVE_GROUP(r3, 0x0, 0x2d, &(0x7f0000000300)={0xfffffffffffffffc, {{0x2, 0x0, @local}}}, 0x88) write$binfmt_elf32(r3, &(0x7f0000000000)=ANY=[@ANYBLOB="fb1be060442a5439f6ee00200000000000"], 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r3, 0x0, 0x61, 0x0, &(0x7f0000000040)) openat$vcs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vcs\x00', 0x0, 0x0) 04:00:26 executing program 2: r0 = socket$inet6(0xa, 0x400000000000803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000006c0)="0a5c2d023c12") mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0xc, 0x32, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x8000000003c) connect$inet6(r1, &(0x7f00000002c0)={0xa, 0x0, 0x0, @dev, 0x9}, 0x1c) sendmsg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="2c7c579a7ae9c96d5cc9ad926a3eea1cf89515d52fc4300c0d33f21c491f50289b7a492cc0c90f234201a5c6f9b830f910b1902ed60d51ad019c73fc9065aa2c519f654874b01f87db4a2807b6a2c2532e9d54e219c9c5f95f", 0x59}], 0x1}, 0xc100) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000440)="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", 0x257}], 0x1}, 0x8000) socket$packet(0x11, 0x2, 0x300) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001480)="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", 0x2d5}], 0x1}, 0x0) [ 408.610627] FAULT_INJECTION: forcing a failure. [ 408.610627] name failslab, interval 1, probability 0, space 0, times 0 [ 408.629795] CPU: 1 PID: 16796 Comm: syz-executor5 Not tainted 4.20.0-rc4+ #360 [ 408.637193] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 408.646566] Call Trace: [ 408.649188] dump_stack+0x244/0x39d [ 408.652840] ? dump_stack_print_info.cold.1+0x20/0x20 [ 408.658051] ? is_bpf_text_address+0xd3/0x170 [ 408.662574] should_fail.cold.4+0xa/0x17 [ 408.666646] ? __save_stack_trace+0x8d/0xf0 [ 408.670984] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 408.676111] ? save_stack+0xa9/0xd0 [ 408.679776] ? kasan_kmalloc+0xc7/0xe0 [ 408.683688] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 408.688460] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 408.693055] ? find_held_lock+0x36/0x1c0 [ 408.697163] ? perf_trace_sched_process_exec+0x860/0x860 [ 408.702636] ? dup_fd+0xa42/0xf50 [ 408.706106] __should_failslab+0x124/0x180 [ 408.710372] should_failslab+0x9/0x14 [ 408.714189] kmem_cache_alloc_trace+0x2d7/0x750 [ 408.718938] ? do_raw_spin_unlock+0xa7/0x330 [ 408.723359] ? do_raw_spin_trylock+0x270/0x270 [ 408.727951] ? __lock_is_held+0xb5/0x140 [ 408.732030] alloc_fdtable+0x89/0x280 [ 408.735847] dup_fd+0xa71/0xf50 [ 408.739154] ? __fdget+0x20/0x20 [ 408.742534] ? find_held_lock+0x36/0x1c0 [ 408.746623] ? is_bpf_text_address+0xac/0x170 [ 408.751129] ? lock_downgrade+0x900/0x900 [ 408.755608] ? check_preemption_disabled+0x48/0x280 [ 408.760641] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 408.765580] ? kasan_check_read+0x11/0x20 [ 408.769735] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 408.775021] ? rcu_softirq_qs+0x20/0x20 [ 408.779007] ? rcu_softirq_qs+0x20/0x20 [ 408.782989] ? unwind_dump+0x190/0x190 [ 408.786892] unshare_fd+0x200/0x2c0 [ 408.790543] ? mmdrop_async_fn+0x20/0x20 [ 408.794618] ? kernel_text_address+0x79/0xf0 [ 408.799039] ? __kernel_text_address+0xd/0x40 [ 408.803546] ? unwind_get_return_address+0x61/0xa0 [ 408.808490] ? __save_stack_trace+0x8d/0xf0 [ 408.812834] unshare_files+0xab/0x2d0 [ 408.816650] ? __ia32_sys_unshare+0x40/0x40 [ 408.820983] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 408.825571] ? retint_kernel+0x2d/0x2d [ 408.829468] ? trace_hardirqs_on_caller+0xc0/0x310 [ 408.834430] __do_execve_file.isra.33+0x360/0x25d0 [ 408.839369] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 408.844158] ? prepare_bprm_creds+0x120/0x120 [ 408.848683] ? usercopy_warn+0x110/0x110 [ 408.852756] ? retint_kernel+0x2d/0x2d [ 408.856662] ? strncpy_from_user+0xfb/0x5a0 [ 408.860999] ? check_memory_region+0xa2/0x1b0 [ 408.865518] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 408.871070] ? strncpy_from_user+0x411/0x5a0 [ 408.875511] ? digsig_verify+0x1530/0x1530 [ 408.879760] ? kmem_cache_alloc+0x33a/0x730 [ 408.884145] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 408.888746] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 408.894312] __x64_sys_execveat+0xed/0x130 [ 408.898566] do_syscall_64+0x1b9/0x820 [ 408.902479] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 408.907855] ? syscall_return_slowpath+0x5e0/0x5e0 [ 408.912797] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 408.917657] ? trace_hardirqs_on_caller+0x310/0x310 [ 408.922686] ? prepare_exit_to_usermode+0x291/0x3b0 [ 408.927722] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 408.932592] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 408.937786] RIP: 0033:0x457569 [ 408.940989] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 04:00:26 executing program 0: symlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='./file0/file0\x00') syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) fcntl$notify(r0, 0x402, 0x10) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) r2 = dup(r0) unshare(0x40000000) fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, &(0x7f0000000080)='trusted.overlay.redirect\x00', &(0x7f0000000140)='./file0\x00', 0x8, 0x0) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f0000000440)=r2) sysinfo(&(0x7f0000000500)=""/94) fsetxattr$trusted_overlay_opaque(r0, &(0x7f0000000340)='trusted.overlay.opaque\x00', &(0x7f0000000180)='y\x00', 0xffffffffffffff32, 0x3) clone(0x400000000020000, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r3 = socket$inet_udp(0x2, 0x2, 0x0) r4 = getpid() renameat2(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f00000002c0)='./file0/bus\x00', 0x3) fcntl$setsig(r0, 0xa, 0x1e) fsetxattr$security_selinux(r3, &(0x7f0000000380)='security.selinux\x00', &(0x7f00000003c0)='system_u:object_r:shell_exec_t:s0\x00', 0x22, 0x3) sched_setscheduler(r4, 0x5, &(0x7f0000000200)) open$dir(&(0x7f0000eb6000)='./file0/bus\x00', 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="73797a3184d351d02a1683a22f50d3172a79680c45f6a5b222fa"], 0x1a) creat(&(0x7f0000000580)='./file0/file0\x00', 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0xfffffffffffffffe, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="000000000000000000000000000000000000000000000000e0e51532000000000200880126000100000064000000000127008e030c00650000006400000000030d00f0043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) ptrace$setregs(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001680)) 04:00:26 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000440)='/dev/audio\x00', 0x40, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r1, 0x0, 0x61, &(0x7f0000000480)={'filter\x00', 0xd0, "f8cfb2a848a1083a37ebf70b5df34743b1f13c0b1c707b837c15ed724adc2c9158742acb5b4c208f0356c5a93d85e0549223c612a79516aaf056902700f95fbfe4447ce17b5725649ddb640c8f1e753d6c25cc4d78b0665eb4ed2841aaca761c847708347de31f638ffc92e554dabd5626391e4e82ec6ca28bf03dbf83a62d1605ea217cb52ac820e2d62d6264f363a6fe4a4c6e15fa525f57e4e5a115115c6e82d7ad1ef94b33aafc11fbf173d00a7851141210668fd7502ed1370e1a408e4b174eb89ffea292142c4aaae539d8f317"}, &(0x7f0000000580)=0xf4) r2 = syz_open_dev$mice(&(0x7f0000000200)='/dev/input/mice\x00', 0x0, 0x2000) sendmsg$nl_netfilter(r2, &(0x7f0000000400)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000280)={0x50, 0x13, 0xf, 0xf00, 0x70bd29, 0x25dfdbfd, {0xf, 0x0, 0x8}, [@typed={0x4, 0x53}, @generic="f2152778746580a80017b6646df6463e0f3032f6c4642e913b0e0a17bf8cbb27cec4a79a8efbf57fa29c69b840ae32", @typed={0x8, 0x47, @str='.\'\x00'}]}, 0x50}, 0x1, 0x0, 0x0, 0x4000000}, 0x40810) r3 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000440), 0x131f64) syz_execute_func(&(0x7f00000000c0)="64ff0941c3c4e2c9975842c4c27d794e0066420fe2e33e0f1110c442019dccd3193e66430f3a0ce397") setsockopt$inet6_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f0000000640)=0xffffffffffffffff, 0x4) clone(0x1a02100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet_MCAST_LEAVE_GROUP(r3, 0x0, 0x2d, &(0x7f0000000300)={0xfffffffffffffffc, {{0x2, 0x0, @local}}}, 0x88) write$binfmt_elf32(r3, &(0x7f0000000100)=ANY=[@ANYBLOB="e7a74fac0166203ad5c65b9eef952221fce8ee1a71cf86d02057b5d29705d93f886c07dd2ee69a0f9cdb2119675b2f048679bfd07f33ffac9c1de8276dc06d42b14e72acbba7c9e80986e5487a490cced8b93b684b64b52babf0ff68e46b55a34fc7c598c273113d0dc672263a8c0e1a78bb8239e64b3dc1baf453f0eed5d15563b699c9bdfcefc86cfcd0c79aa9adfc74076e2f79630220b4680a30416feadd3950d69071f250bc57d3158959fd984803ad59d7586542f13137912aff4c3c3f951319f36f4875c8fcbe9686a8f2446969becc36db1b6ef74e93d8f8e0712250a7b3571a9e40"], 0x0) shmget$private(0x0, 0x400000, 0x524, &(0x7f0000c00000/0x400000)=nil) fsetxattr(r3, &(0x7f00000005c0)=@random={'trusted.', '.\'\x00'}, &(0x7f0000000600)='/dev/input/mice\x00', 0x10, 0x2) ioctl$VIDIOC_CROPCAP(r3, 0xc02c563a, &(0x7f0000000000)={0x0, {0x5, 0x1, 0x1, 0x3}, {0xfffffffffffffffa, 0x2, 0x4, 0xfff}, {0x6, 0x4e}}) getsockopt$ARPT_SO_GET_ENTRIES(r3, 0x0, 0x61, 0x0, &(0x7f0000000040)) [ 408.959929] RSP: 002b:00007fccba6d7c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 408.959945] RAX: ffffffffffffffda RBX: 00007fccba6d7c90 RCX: 0000000000457569 [ 408.959954] RDX: 0000000020000280 RSI: 0000000020000000 RDI: 0000000000000004 [ 408.959963] RBP: 000000000072bf00 R08: 0000000000001000 R09: 0000000000000000 [ 408.959973] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fccba6d86d4 [ 408.959988] R13: 00000000004bdc9b R14: 00000000004cd1d8 R15: 0000000000000005 04:00:26 executing program 5 (fault-call:4 fault-nth:4): r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x25d1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000080)="00000600000000000000", 0x0) ioctl$SG_EMULATED_HOST(r1, 0x2203, &(0x7f00000000c0)) write$binfmt_elf32(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000000000000000000000030006000000000000000000380000000000000000000000000020000200000000000000000000000000000000000000000000000000000000040000000000000000000000000000030000000000000000000000000000000200000028e9653bf5f378f24e50b960"], 0x78) execveat(r1, &(0x7f0000000000)='\x00', &(0x7f0000000280), 0x0, 0x1000) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 04:00:26 executing program 2: r0 = socket$inet6(0xa, 0x400000000000803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000006c0)="0a5c2d023c12") mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0xc, 0x32, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x8000000003c) connect$inet6(r1, &(0x7f00000002c0)={0xa, 0x0, 0x0, @dev, 0x9}, 0x1c) sendmsg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="2c7c579a7ae9c96d5cc9ad926a3eea1cf89515d52fc4300c0d33f21c491f50289b7a492cc0c90f234201a5c6f9b830f910b1902ed60d51ad019c73fc9065aa2c519f654874b01f87db4a2807b6a2c2532e9d54e219c9c5f95f", 0x59}], 0x1}, 0xc100) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000440)="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", 0x257}], 0x1}, 0x8000) socket$packet(0x11, 0x2, 0x300) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001480)="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", 0x2d5}], 0x1}, 0x0) 04:00:26 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, 0x0, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000002000)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001000)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqsrc(r2, 0x0, 0x2000000000000004, &(0x7f0000013ff4)={@remote}, 0xc) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000340)={{{@in=@broadcast, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0xa, 0xff0f000000000000}}, {{@in6=@local, 0x0, 0x33}, 0x0, @in6=@local}}, 0xe8) close(r2) dup3(r0, r1, 0x0) [ 409.190909] FAULT_INJECTION: forcing a failure. [ 409.190909] name failslab, interval 1, probability 0, space 0, times 0 [ 409.231758] CPU: 0 PID: 16825 Comm: syz-executor5 Not tainted 4.20.0-rc4+ #360 [ 409.239197] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 409.248569] Call Trace: [ 409.251188] dump_stack+0x244/0x39d [ 409.254842] ? dump_stack_print_info.cold.1+0x20/0x20 [ 409.260062] should_fail.cold.4+0xa/0x17 [ 409.264172] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 409.269301] ? trace_hardirqs_on_caller+0xc0/0x310 [ 409.274256] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 409.279025] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 409.284507] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 409.284980] IPVS: ftp: loaded support on port[0] = 21 [ 409.289279] ? retint_kernel+0x2d/0x2d [ 409.289316] ? rcu_softirq_qs+0x20/0x20 [ 409.289332] ? perf_trace_sched_process_exec+0x860/0x860 [ 409.289350] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 409.289369] ? check_preemption_disabled+0x48/0x280 [ 409.289395] __should_failslab+0x124/0x180 [ 409.289417] should_failslab+0x9/0x14 [ 409.289434] kmem_cache_alloc_node_trace+0x270/0x740 [ 409.289467] __kmalloc_node+0x3c/0x70 [ 409.335386] kvmalloc_node+0x65/0xf0 [ 409.339116] alloc_fdtable+0xd9/0x280 [ 409.342938] dup_fd+0xa71/0xf50 [ 409.346237] ? __fdget+0x20/0x20 [ 409.349621] ? find_held_lock+0x36/0x1c0 [ 409.349651] ? is_bpf_text_address+0xac/0x170 [ 409.349669] ? lock_downgrade+0x900/0x900 [ 409.349690] ? check_preemption_disabled+0x48/0x280 [ 409.349707] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 409.349722] ? kasan_check_read+0x11/0x20 [ 409.349733] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 409.349744] ? rcu_softirq_qs+0x20/0x20 [ 409.349757] ? rcu_softirq_qs+0x20/0x20 [ 409.349769] ? unwind_dump+0x190/0x190 [ 409.349788] unshare_fd+0x200/0x2c0 [ 409.368051] ? mmdrop_async_fn+0x20/0x20 [ 409.368070] ? kernel_text_address+0x79/0xf0 [ 409.368088] ? __kernel_text_address+0xd/0x40 [ 409.368105] ? unwind_get_return_address+0x61/0xa0 [ 409.368125] ? __save_stack_trace+0x8d/0xf0 [ 409.368159] unshare_files+0xab/0x2d0 [ 409.377238] ? __ia32_sys_unshare+0x40/0x40 [ 409.377266] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 409.377282] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 409.377319] __do_execve_file.isra.33+0x360/0x25d0 [ 409.377337] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 409.377367] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 409.377390] ? prepare_bprm_creds+0x120/0x120 [ 409.377409] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 409.377432] ? retint_kernel+0x2d/0x2d [ 409.377461] ? strncpy_from_user+0x1a7/0x5a0 [ 409.386778] ? strncpy_from_user+0x1ad/0x5a0 [ 409.386797] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 409.386814] ? strncpy_from_user+0x411/0x5a0 [ 409.386837] ? digsig_verify+0x1530/0x1530 [ 409.386853] ? kmem_cache_alloc+0x33a/0x730 [ 409.386879] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 409.386901] __x64_sys_execveat+0xed/0x130 [ 409.386923] do_syscall_64+0x1b9/0x820 [ 409.411331] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 409.411354] ? syscall_return_slowpath+0x5e0/0x5e0 [ 409.411371] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 409.411390] ? trace_hardirqs_on_caller+0x310/0x310 [ 409.411410] ? prepare_exit_to_usermode+0x291/0x3b0 [ 409.420667] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 409.420693] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 409.420705] RIP: 0033:0x457569 [ 409.420724] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 409.420732] RSP: 002b:00007fccba6d7c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 409.420747] RAX: ffffffffffffffda RBX: 00007fccba6d7c90 RCX: 0000000000457569 [ 409.420756] RDX: 0000000020000280 RSI: 0000000020000000 RDI: 0000000000000004 [ 409.420766] RBP: 000000000072bf00 R08: 0000000000001000 R09: 0000000000000000 [ 409.420776] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fccba6d86d4 [ 409.420785] R13: 00000000004bdc9b R14: 00000000004cd1d8 R15: 0000000000000005 [ 409.673103] loop0: p1 p2 p3 p4 < > 04:00:27 executing program 3: clone(0x41fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f00000000c0)) syz_open_dev$rtc(&(0x7f0000000080)='/dev/rtc#\x00', 0x0, 0x0) ptrace(0x10, r0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000000)) getsockopt$inet_sctp6_SCTP_NODELAY(0xffffffffffffffff, 0x84, 0x3, &(0x7f0000000140), &(0x7f00000001c0)=0x4) ptrace$setregs(0xf, r0, 0x0, &(0x7f0000000180)="a96d55a756") ptrace$getregset(0x10, r0, 0x2, &(0x7f0000000280)={0x0}) 04:00:27 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) openat$vimc1(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video1\x00', 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e24, 0x20000}, 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000240)=[@window={0x3, 0x49d, 0xfb}, @sack_perm, @window={0x3, 0x1, 0x2}], 0x3) syz_execute_func(&(0x7f00000000c0)="64ff0941c3c4e2c9975842c4c27d794e0066420fe2e33e0f1110c442019dccd3193e66430f3a0ce397") clone(0x1a02100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet_MCAST_LEAVE_GROUP(r1, 0x0, 0x2d, &(0x7f0000000300)={0xfffffffffffffffc, {{0x2, 0x0, @local}}}, 0x88) ioctl$EVIOCGPROP(r1, 0x80404509, &(0x7f0000000140)=""/125) write$binfmt_elf32(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB], 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r1, 0x0, 0x61, 0x0, &(0x7f0000000040)) 04:00:27 executing program 5 (fault-call:4 fault-nth:5): r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x25d1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000080)="00000600000000000000", 0x0) ioctl$SG_EMULATED_HOST(r1, 0x2203, &(0x7f00000000c0)) write$binfmt_elf32(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000000000000000000000030006000000000000000000380000000000000000000000000020000200000000000000000000000000000000000000000000000000000000040000000000000000000000000000030000000000000000000000000000000200000028e9653bf5f378f24e50b960"], 0x78) execveat(r1, &(0x7f0000000000)='\x00', &(0x7f0000000280), 0x0, 0x1000) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 04:00:27 executing program 2: r0 = socket$inet6(0xa, 0x400000000000803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000006c0)="0a5c2d023c12628571") mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0xc, 0x32, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x8000000003c) connect$inet6(r1, &(0x7f00000002c0)={0xa, 0x0, 0x0, @dev, 0x9}, 0x1c) sendmsg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="2c7c579a7ae9c96d5cc9ad926a3eea1cf89515d52fc4300c0d33f21c491f50289b7a492cc0c90f234201a5c6f9b830f910b1902ed60d51ad019c73fc9065aa2c519f654874b01f87db4a2807b6a2c2532e9d54e219c9c5f95f", 0x59}], 0x1}, 0xc100) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000440)="b10b938636ea69df7b5a9984bb1bc72ef58d96e56e11df900a707f4946b1637e2096c584b9a1b4e017163fbdb35160a56c11dfbe74df97d36d19ad6a91c6fb4ad19581b8cf707131830f7a22b1b263c9da0e443c5e969ed6a0d3bc508bf75c3147447379f585759ceba0de5cda46291dc1b8f106a83e1cde43a862d95413ce2616b261ed9f79913ae781b3b843ea1b4429a750b8ccb1952a7b863d0bada9f61df6609fe368eaf47c0ce9e46a22b0d75b063deeaa94285d0c43353046e0a308296a76b0b0145f8af9aa0ed0e18bc50509eaef21c8e03842a97df3a462ea3f9d5f83bf1d4d2875f0d5b24e941483f863cd2ea7c769bd3e594fb173dd873c7d9a3fd20939ad1d5867881ed77a078007b4972aba36cae02004373a6a74d74cb15a52c5f8426cb6f235d38048fd91f5d6100fd58a335df10add227d804167ba191c7a035c5a2a916e7fef18a6003578820b3e0be26a22f2c149f40a0335cadcca64a5e44179e6ce4d7f7c16e8a96c5be7cdf66eef901cb8eeabc94bae30acca8c6fa02889c32311044dcbc9a2e02e0632f7f9aa96849abede543773745e4652fccc503003f10cd68ddab594969ad36cb622ed7ba22dc46a80fb63ac2c561a80ae5c10b295b9f75d9536ba1ac24b8e9ae217611ffe79cb9422158475c1a89a51547d13c03b68d75ffb5717a35f381774567871e9e4190272c97eafcfa0a07a751d0bc8eeb0c206e12b2cff1065a3d5622635fa44c0dcb0722ad4c97e6b7d5844b2e9bab9ba1d083fa2930a3ea267d7f15d817e2b2e055ccfbaf019292f6156efd3a9a13ea90ecf59fc1bf35c6626db1c6759a50ed84acefd3cdb", 0x257}], 0x1}, 0x8000) socket$packet(0x11, 0x2, 0x300) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001480)="d09a0e63c9476288b671afdbd53a5994e137381f62021d1951b627b8dda57a5d17d744648c81c5703ed8146ab1b0171f89091b1dd3238d03dbb686df460963245dedf2973ee555af99499e44ad420dbf65fd46fbc99a1274429e2d5783751815828ec8cb3553110cca66460215353d19f6d8bbd8fb264eddea60b18e16c31aa5e200000491634ac2fd10e2cd30bcd7fede24263a7fff16e53ea293f3551b7147c33a44ea437fb1515c3e8d4f162fdebf8ebe11ae6fcd9372c8d8f19556ae091fe94215ae9434da412f6fa4cb6561e5f78ff9707844ee5d573fb294437722d9a06dfa61748c32c73d759933a8dd344c947d3efdbe90d0eb049df5fbb0c19f6785264b619c530d97395d44b04f7e2a280d658c7871ad373b792678c49227999651ef3b2ee1bc2b8f3035db376e8e09aa3837233c8713065a8ad131d24f6c42a3220d0e07c3d3e95d59a5dd10c09716b5f874ecf53aadfa5050ff40f2c3c4a629b6445e5836100afff5a8977583653b40ca316f8f11416e5c1bd5499636ddae25fc4970b37209cf5c0bf8e432160c258d14223baa52798e09858645773dd97e68a95310da713cff077b06000000d4f145e9199c126a7f235e5674a3c7f5c7129ac7c1a3319590249b6d34ef6c3d8b94c6fc7cdcbddb053243053f7bc1f230d3bc7dfc4359e33992d0a3946b914a093287a76ac4a249b5b86cc75476466e409553355fefab75e9268a8751ffc9481fcff1f49c475699595b315e2147ee038b7291600c6b1cf7c8f24d587b9464a67e5ccec17820e711b98f4f7d5053642068a3fff704c3fe26ba862b53e2622d6e8b4a4c815fb2ea90ef63e141209dd292fdf886ee3e64b90f47ce22661c7a21f7bc10df0248079b7be17284eb54e5ab5bde9c6857b3cb184586049e7741b2d8b5b1a19e99e1834a25959155720c1c0ef84d7b3c42e1ba282847d476cef0228b1422aba08e5f3c1cd279bbd1c5303c2e9c16a0da4f88f770fca118b09e92b51a33970e32ade003000000", 0x2d5}], 0x1}, 0x0) 04:00:27 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, 0x0, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000002000)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001000)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqsrc(r2, 0x0, 0x2000000000000004, &(0x7f0000013ff4)={@remote}, 0xc) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000340)={{{@in=@broadcast, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0xa, 0xa4ffffff00000000}}, {{@in6=@local, 0x0, 0x33}, 0x0, @in6=@local}}, 0xe8) close(r2) dup3(r0, r1, 0x0) [ 410.168104] FAULT_INJECTION: forcing a failure. [ 410.168104] name failslab, interval 1, probability 0, space 0, times 0 [ 410.180368] CPU: 1 PID: 16854 Comm: syz-executor5 Not tainted 4.20.0-rc4+ #360 [ 410.187772] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 410.197148] Call Trace: [ 410.199768] dump_stack+0x244/0x39d [ 410.203423] ? dump_stack_print_info.cold.1+0x20/0x20 [ 410.208644] should_fail.cold.4+0xa/0x17 [ 410.212719] ? retint_kernel+0x2d/0x2d [ 410.216629] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 410.221760] ? depot_save_stack+0xa3/0x470 [ 410.226022] ? save_stack+0xa9/0xd0 [ 410.229678] ? find_held_lock+0x36/0x1c0 [ 410.233763] ? do_output_route4+0x4e8/0x560 [ 410.238119] ? perf_trace_sched_process_exec+0x860/0x860 [ 410.243596] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 410.249172] __should_failslab+0x124/0x180 [ 410.253423] should_failslab+0x9/0x14 [ 410.257240] kmem_cache_alloc_node_trace+0x270/0x740 [ 410.262359] ? kasan_unpoison_shadow+0x35/0x50 [ 410.266964] __kmalloc_node+0x3c/0x70 [ 410.270433] IPVS: ftp: loaded support on port[0] = 21 [ 410.270791] kvmalloc_node+0x65/0xf0 [ 410.270828] alloc_fdtable+0x145/0x280 [ 410.283644] dup_fd+0xa71/0xf50 [ 410.286945] ? __fdget+0x20/0x20 [ 410.290323] ? find_held_lock+0x36/0x1c0 [ 410.294407] ? is_bpf_text_address+0xac/0x170 [ 410.298928] ? lock_downgrade+0x900/0x900 [ 410.303095] ? check_preemption_disabled+0x48/0x280 [ 410.308132] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 410.313090] ? kasan_check_read+0x11/0x20 [ 410.317249] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 410.320871] IPVS: ftp: loaded support on port[0] = 21 [ 410.322539] ? rcu_softirq_qs+0x20/0x20 [ 410.322556] ? rcu_softirq_qs+0x20/0x20 [ 410.322570] ? unwind_dump+0x190/0x190 [ 410.322593] unshare_fd+0x200/0x2c0 [ 410.322611] ? mmdrop_async_fn+0x20/0x20 [ 410.322628] ? kernel_text_address+0x79/0xf0 [ 410.322646] ? __kernel_text_address+0xd/0x40 [ 410.322661] ? unwind_get_return_address+0x61/0xa0 [ 410.322684] ? __save_stack_trace+0x8d/0xf0 [ 410.365494] unshare_files+0xab/0x2d0 [ 410.369316] ? __ia32_sys_unshare+0x40/0x40 [ 410.373681] ? save_stack+0x43/0xd0 [ 410.377320] ? kasan_kmalloc+0xc7/0xe0 [ 410.381217] ? kasan_slab_alloc+0x12/0x20 [ 410.385383] __do_execve_file.isra.33+0x360/0x25d0 [ 410.390332] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 410.395107] ? prepare_bprm_creds+0x120/0x120 [ 410.395125] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 410.395158] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 410.395174] ? retint_kernel+0x2d/0x2d [ 410.395192] ? trace_hardirqs_on_caller+0xc0/0x310 [ 410.395209] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 410.395227] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 410.395250] ? check_preemption_disabled+0x48/0x280 [ 410.404514] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 410.404537] ? retint_kernel+0x2d/0x2d [ 410.404566] ? getname_flags+0x197/0x590 [ 410.404585] ? __sanitizer_cov_trace_pc+0x48/0x50 [ 410.404611] __x64_sys_execveat+0xed/0x130 [ 410.404634] do_syscall_64+0x1b9/0x820 [ 410.404649] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 410.404669] ? syscall_return_slowpath+0x5e0/0x5e0 [ 410.413117] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 410.413148] ? trace_hardirqs_on_caller+0x310/0x310 [ 410.413171] ? prepare_exit_to_usermode+0x291/0x3b0 [ 410.413194] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 410.413218] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 410.413231] RIP: 0033:0x457569 [ 410.413249] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 04:00:28 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, 0x0, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000002000)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001000)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqsrc(r2, 0x0, 0x2000000000000004, &(0x7f0000013ff4)={@remote}, 0xc) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000340)={{{@in=@broadcast, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0xa, 0x600000000000000}}, {{@in6=@local, 0x0, 0x33}, 0x0, @in6=@local}}, 0xe8) close(r2) dup3(r0, r1, 0x0) 04:00:28 executing program 5 (fault-call:4 fault-nth:6): r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x25d1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000080)="00000600000000000000", 0x0) ioctl$SG_EMULATED_HOST(r1, 0x2203, &(0x7f00000000c0)) write$binfmt_elf32(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000000000000000000000030006000000000000000000380000000000000000000000000020000200000000000000000000000000000000000000000000000000000000040000000000000000000000000000030000000000000000000000000000000200000028e9653bf5f378f24e50b960"], 0x78) execveat(r1, &(0x7f0000000000)='\x00', &(0x7f0000000280), 0x0, 0x1000) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) [ 410.413258] RSP: 002b:00007fccba6d7c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 410.413274] RAX: ffffffffffffffda RBX: 00007fccba6d7c90 RCX: 0000000000457569 [ 410.413283] RDX: 0000000020000280 RSI: 0000000020000000 RDI: 0000000000000004 [ 410.413293] RBP: 000000000072bf00 R08: 0000000000001000 R09: 0000000000000000 [ 410.413307] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fccba6d86d4 [ 410.422970] R13: 00000000004bdc9b R14: 00000000004cd1d8 R15: 0000000000000005 [ 410.634726] FAULT_INJECTION: forcing a failure. [ 410.634726] name failslab, interval 1, probability 0, space 0, times 0 [ 410.684799] CPU: 1 PID: 16867 Comm: syz-executor5 Not tainted 4.20.0-rc4+ #360 [ 410.692232] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 410.701601] Call Trace: [ 410.704216] dump_stack+0x244/0x39d [ 410.707890] ? dump_stack_print_info.cold.1+0x20/0x20 [ 410.713119] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 410.717732] ? retint_kernel+0x2d/0x2d [ 410.721650] ? memset+0x31/0x40 [ 410.724954] should_fail.cold.4+0xa/0x17 [ 410.729033] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 410.734158] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 410.738938] ? retint_kernel+0x2d/0x2d [ 410.742853] ? find_held_lock+0x36/0x1c0 [ 410.746951] ? perf_trace_sched_process_exec+0x860/0x860 [ 410.752416] ? unwind_get_return_address+0x61/0xa0 [ 410.757388] __should_failslab+0x124/0x180 [ 410.761639] should_failslab+0x9/0x14 [ 410.765478] kmem_cache_alloc_trace+0x2d7/0x750 [ 410.770167] ? retint_kernel+0x2d/0x2d [ 410.774083] __do_execve_file.isra.33+0x425/0x25d0 [ 410.779050] ? check_stack_object+0x109/0x150 [ 410.783572] ? prepare_bprm_creds+0x120/0x120 [ 410.788085] ? usercopy_warn+0x110/0x110 [ 410.792180] ? check_preemption_disabled+0x48/0x280 [ 410.797233] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 410.802795] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 410.808349] ? strncpy_from_user+0x411/0x5a0 [ 410.812785] ? digsig_verify+0x1530/0x1530 [ 410.817037] ? kmem_cache_alloc+0x33a/0x730 [ 410.821639] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 410.827195] __x64_sys_execveat+0xed/0x130 [ 410.831448] do_syscall_64+0x1b9/0x820 [ 410.835347] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 410.840721] ? syscall_return_slowpath+0x5e0/0x5e0 [ 410.845669] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 410.850529] ? trace_hardirqs_on_caller+0x310/0x310 [ 410.855557] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 410.860588] ? prepare_exit_to_usermode+0x291/0x3b0 [ 410.865622] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 410.870488] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 410.875688] RIP: 0033:0x457569 [ 410.878892] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 410.897811] RSP: 002b:00007fccba6d7c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 410.905534] RAX: ffffffffffffffda RBX: 00007fccba6d7c90 RCX: 0000000000457569 [ 410.912813] RDX: 0000000020000280 RSI: 0000000020000000 RDI: 0000000000000004 [ 410.920092] RBP: 000000000072bf00 R08: 0000000000001000 R09: 0000000000000000 [ 410.927378] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fccba6d86d4 [ 410.934654] R13: 00000000004bdc9b R14: 00000000004cd1d8 R15: 0000000000000005 [ 413.923770] bridge0: port 1(bridge_slave_0) entered blocking state [ 413.930364] bridge0: port 1(bridge_slave_0) entered disabled state [ 413.938297] device bridge_slave_0 entered promiscuous mode [ 414.033577] bridge0: port 2(bridge_slave_1) entered blocking state [ 414.041186] bridge0: port 2(bridge_slave_1) entered disabled state [ 414.049244] device bridge_slave_1 entered promiscuous mode [ 414.252169] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 414.339122] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 414.585981] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 414.651087] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 414.680355] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 414.687793] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready 04:00:32 executing program 0: symlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='./file0/file0\x00') syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) fcntl$notify(r0, 0x402, 0x10) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) r2 = dup(r0) unshare(0x40000000) fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, &(0x7f0000000080)='trusted.overlay.redirect\x00', &(0x7f0000000140)='./file0\x00', 0x8, 0x0) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f0000000440)=r2) sysinfo(&(0x7f0000000500)=""/94) fsetxattr$trusted_overlay_opaque(r0, &(0x7f0000000340)='trusted.overlay.opaque\x00', &(0x7f0000000180)='y\x00', 0xffffffffffffff32, 0x3) clone(0x400000000020000, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r3 = socket$inet_udp(0x2, 0x2, 0x0) r4 = getpid() renameat2(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f00000002c0)='./file0/bus\x00', 0x3) fcntl$setsig(r0, 0xa, 0x1e) fsetxattr$security_selinux(r3, &(0x7f0000000380)='security.selinux\x00', &(0x7f00000003c0)='system_u:object_r:shell_exec_t:s0\x00', 0x22, 0x3) sched_setscheduler(r4, 0x5, &(0x7f0000000200)) open$dir(&(0x7f0000eb6000)='./file0/bus\x00', 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="73797a3184d351d02a1683a22f50d3172a79680c45f6a5b222fa"], 0x1a) creat(&(0x7f0000000580)='./file0/file0\x00', 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0xfffffffffffffffe, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="000000000000000000000000000000000000000000000000e0e51532000000000200880126000100000064000000000127008e030c00650000006400000000030d00f0043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) ptrace$setregs(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001680)) 04:00:32 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x13, 0x0, 0xfffffffffffffe21) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) syz_execute_func(&(0x7f00000000c0)="64ff0941c3c4e2c9975842c4c27d794e0066420fe2e33e0f1110c442019dccd3193e66430f3a0ce397") clone(0x1a02100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lstat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mlockall(0x3) getgroups(0x8, &(0x7f00000009c0)=[0xee00, 0x0, 0x0, 0x0, 0x0, 0xee00, 0xee01, 0xffffffffffffffff]) lstat(&(0x7f0000000a00)='./file0\x00', &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$RTC_ALM_READ(r1, 0x80247008, &(0x7f0000000e40)) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000ac0)={{{@in, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in6=@local}}, &(0x7f0000000bc0)=0xe8) stat(&(0x7f0000000c00)='./file0\x00', &(0x7f0000000c40)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$hfsplus(&(0x7f0000000280)='hfsplus\x00', &(0x7f00000002c0)='./file0\x00', 0x10000, 0x8, &(0x7f0000000840)=[{&(0x7f00000003c0)="6173309266be09e008be1c49f15d9c018ad00566f056ffa4ba7d35aa3fcb84bcef069fe5889103be640b37154eb23f43e840ebc5b502fe7c6f0287f99a44f350233e8648aa6b2c45bb667d5182f59b37f44bd0ea6d57451bf9f8ecdbf4d1ec38514cf7ca882d8b812e670266fe736f325ba2fb615972749872de7c69dc543e7cee3d02a9ff3fbfa529edd2dcb24e8649c4db9f9db8d40675d60aa708faea813ae6ce2a666518298e5958c39aabcc1baafcde96b6c1b79196ea9eb1a5548b4b8fa6907561ac2aaff1e269a93e7fba35cb84ba7c36da1663c68e95e4891016913872250ef0559f6c5807086775360c16978ccaed0b1ba5f3", 0xf7, 0x6}, {&(0x7f00000004c0)="adcc23c7bdb9791d7a45e3c38ebeb0829f2138735c2ba8e977c75d943fab1e20da65e156654a8839cc8a4e1edf973de3a22ae5a52aa026d9b113", 0x3a, 0x8}, {&(0x7f0000000500)="be41dc2163f388a0c6c5f8c889d3a04fd659b4abe592a6306e808801b58ae5a30730cb1db0aba5ecf7042c875101fcd3ca968c0a11b1c21a8e84c6d29542b25f1c39cc7d4009aea758d0e98b54baa2873e43b34140c0400f04a6c445ff57076ca4b74a55923dd683b1f39d042695db57e8909b46fb82646ee372c60b045ee115c1b4ea66feb207155d02edeb2e93a1a95083364f25d53a05e424c07965b09c346685e99a5c25f919224c3c3054", 0xad, 0x20}, {&(0x7f00000005c0)="7b37b00c2259bf1002339ddf2a7638e76e05b9a7e6b448c359b5ec8757241e646b189998deb70a", 0x27, 0x7fffffff}, {&(0x7f0000000600)="8f64ff37846961432e864327cd80eed6ed343251029fb27453048fbe82a62cccf982454d1b823c3e3884fd02e80e88bc74ee6154212a25a25897b04a8a4611a49b86382d9dd2f21227e62ed736320e07ab49a67439d6c61d86b9c3d0367193a3b5817e99bcdc214782f5475d24923242082b165b58e32698adf2ab7dc9fcecacec86ca6a2316c7f4f23f60ef8735c2ea83f17daadf", 0x95, 0x2}, {&(0x7f00000006c0)="8766ce280de59d4a752c0978cd147164b04bbf71279f873b7e57c883d11d978d85e04e6494df2ed2f79c2bb337e5f94124875330", 0x34, 0x4}, {&(0x7f0000000700)="3e640694f5f69e882251099008d0bd048b2bac307b76e037ef7904ef58588c08d30ee85c7dfcb9d14914", 0x2a, 0x6}, {&(0x7f0000000740)="06983df5c7713255f856f3941b0d7978d566f86835bed58e42453c3bb978d6be8beb9059ab8ec2d1c006314b26828976eb04a7c5c0a188a637b9d124e2e0daa7427ad024a7b5effa1b63e3cd6d48f013ed8dc8843d80ba48d33597c554d114aabfb09e69fbd6986c54c808c317e73c88f44136247e8885bae3cef10f24e2b7c6e8844c5f28ae8e92dc5b06536bd9a0ad98f9702c0d38e167d67af6a931307bf5cc4dab353f991891439c6a641d0a6fbbd7ea4e3de1f0546e187f7070c7d2116a0b10604bcf", 0xc5, 0x200}], 0x800000, &(0x7f0000000cc0)=ANY=[@ANYBLOB="637265614373746f863db7c42ab32c4769", @ANYRESHEX=r2, @ANYBLOB=',nls=koi8-r,gid=', @ANYRESHEX=r3, @ANYBLOB=',session=0x0000000000000400,gid=', @ANYRESHEX=r4, @ANYBLOB="2c6465636f6d706f73652c747970653d7988d8f22c7569643c", @ANYRESDEC=r5, @ANYBLOB=',subj_role=selfselinux-keyring,dont_measure,func=FILE_MMAP,euid<', @ANYRESDEC=r6, @ANYBLOB="2c7063723d30303030303030303030303030303030303030332c736d61636b6673726f6f743d2c686173682c7375626a5f726f6c653d2e1f2447504c2c00"]) ioctl$KVM_SET_DEVICE_ATTR(r1, 0x4018aee1, &(0x7f0000000100)={0x0, 0x10000, 0xfffffffffffffff8, &(0x7f0000000000)=0x8}) setsockopt$inet_MCAST_LEAVE_GROUP(r1, 0x0, 0x2d, &(0x7f0000000300)={0xfffffffffffffffc, {{0x2, 0x0, @local}}}, 0x88) write$binfmt_elf32(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="77add850c53200c6ed00000040d044019b582d7a551d1d6d8679f39f1dafab7dc6fa7f8de16c6655b577d01cfe56b9e36cb340c43649a60aed8868fb465ecb6b024d7dee4d1d05f48f1ab0738dda3432de10bb711c7931b964e0e0ef1e02bf86ae9b8658bb979592c5fdfc37259743b41a50589acb2686489eab4bdb525fc69937ae6f5c517b3fbb345d60abf2fa1e52fbf37c121c369a2902e3e269e77b887026d421980f6568"], 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r1, 0x0, 0x61, 0x0, &(0x7f0000000e00)) getsockopt$inet_sctp_SCTP_NODELAY(r1, 0x84, 0x3, &(0x7f0000000200), &(0x7f0000000240)=0x4) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000040)='dctcp-reno\x00', 0xb) 04:00:32 executing program 2: r0 = socket$inet6(0xa, 0x400000000000803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000006c0)="0a5c2d023c12628571") mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0xc, 0x32, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x8000000003c) connect$inet6(r1, &(0x7f00000002c0)={0xa, 0x0, 0x0, @dev, 0x9}, 0x1c) sendmsg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="2c7c579a7ae9c96d5cc9ad926a3eea1cf89515d52fc4300c0d33f21c491f50289b7a492cc0c90f234201a5c6f9b830f910b1902ed60d51ad019c73fc9065aa2c519f654874b01f87db4a2807b6a2c2532e9d54e219c9c5f95f", 0x59}], 0x1}, 0xc100) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000440)="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", 0x257}], 0x1}, 0x8000) socket$packet(0x11, 0x2, 0x300) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001480)="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", 0x2d5}], 0x1}, 0x0) 04:00:32 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, 0x0, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000002000)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001000)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqsrc(r2, 0x0, 0x2000000000000004, &(0x7f0000013ff4)={@remote}, 0xc) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000340)={{{@in=@broadcast, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0xa, 0x20000000}}, {{@in6=@local, 0x0, 0x33}, 0x0, @in6=@local}}, 0xe8) close(r2) dup3(r0, r1, 0x0) 04:00:32 executing program 5 (fault-call:4 fault-nth:7): r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x25d1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000080)="00000600000000000000", 0x0) ioctl$SG_EMULATED_HOST(r1, 0x2203, &(0x7f00000000c0)) write$binfmt_elf32(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000000000000000000000030006000000000000000000380000000000000000000000000020000200000000000000000000000000000000000000000000000000000000040000000000000000000000000000030000000000000000000000000000000200000028e9653bf5f378f24e50b960"], 0x78) execveat(r1, &(0x7f0000000000)='\x00', &(0x7f0000000280), 0x0, 0x1000) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) [ 414.839532] FAULT_INJECTION: forcing a failure. [ 414.839532] name failslab, interval 1, probability 0, space 0, times 0 [ 414.872018] CPU: 1 PID: 16944 Comm: syz-executor5 Not tainted 4.20.0-rc4+ #360 [ 414.879435] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 414.888799] Call Trace: [ 414.891406] dump_stack+0x244/0x39d [ 414.895060] ? dump_stack_print_info.cold.1+0x20/0x20 [ 414.900270] ? prepare_bprm_creds+0x53/0x120 [ 414.904726] should_fail.cold.4+0xa/0x17 [ 414.908827] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 414.913956] ? mark_held_locks+0xc7/0x130 [ 414.918121] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 414.922908] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 414.927511] ? retint_kernel+0x2d/0x2d [ 414.931413] ? trace_hardirqs_on_caller+0xc0/0x310 [ 414.936354] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 414.941133] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 414.946613] ? __lock_is_held+0xb5/0x140 [ 414.950700] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 414.955500] ? retint_kernel+0x2d/0x2d [ 414.959415] __should_failslab+0x124/0x180 [ 414.963666] should_failslab+0x9/0x14 [ 414.967482] kmem_cache_alloc+0x2be/0x730 [ 414.971646] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 414.977203] ? check_preemption_disabled+0x48/0x280 [ 414.982243] prepare_creds+0xab/0x4d0 [ 414.986058] ? abort_creds+0x2a0/0x2a0 [ 414.989973] ? __do_execve_file.isra.33+0x425/0x25d0 [ 414.995101] ? rcu_read_lock_sched_held+0x14f/0x180 [ 415.000160] prepare_exec_creds+0x11/0xf0 [ 415.004327] prepare_bprm_creds+0x70/0x120 [ 415.008582] __do_execve_file.isra.33+0x445/0x25d0 [ 415.013523] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 415.018332] ? prepare_bprm_creds+0x120/0x120 [ 415.022856] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 415.027632] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 415.032228] ? retint_kernel+0x2d/0x2d [ 415.036153] ? trace_hardirqs_on_caller+0xc0/0x310 [ 415.041122] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 415.045907] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 415.051381] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 415.056951] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 415.061732] ? retint_kernel+0x2d/0x2d [ 415.065660] __x64_sys_execveat+0xed/0x130 [ 415.069917] do_syscall_64+0x1b9/0x820 [ 415.073821] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 415.079221] ? syscall_return_slowpath+0x5e0/0x5e0 [ 415.084182] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 415.089041] ? trace_hardirqs_on_caller+0x310/0x310 [ 415.094086] ? prepare_exit_to_usermode+0x291/0x3b0 [ 415.099132] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 415.104009] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 415.109207] RIP: 0033:0x457569 [ 415.112416] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 415.131349] RSP: 002b:00007fccba6d7c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 04:00:32 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, 0x0, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000002000)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001000)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqsrc(r2, 0x0, 0x2000000000000004, &(0x7f0000013ff4)={@remote}, 0xc) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000340)={{{@in=@broadcast, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0xa, 0xa4ffffff}}, {{@in6=@local, 0x0, 0x33}, 0x0, @in6=@local}}, 0xe8) close(r2) dup3(r0, r1, 0x0) [ 415.139090] RAX: ffffffffffffffda RBX: 00007fccba6d7c90 RCX: 0000000000457569 [ 415.146371] RDX: 0000000020000280 RSI: 0000000020000000 RDI: 0000000000000004 [ 415.153656] RBP: 000000000072bf00 R08: 0000000000001000 R09: 0000000000000000 [ 415.160939] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fccba6d86d4 [ 415.168230] R13: 00000000004bdc9b R14: 00000000004cd1d8 R15: 0000000000000005 [ 415.224498] IPVS: ftp: loaded support on port[0] = 21 [ 415.338177] device bridge_slave_1 left promiscuous mode [ 415.343734] bridge0: port 2(bridge_slave_1) entered disabled state [ 415.428511] device bridge_slave_0 left promiscuous mode [ 415.434051] bridge0: port 1(bridge_slave_0) entered disabled state [ 415.518839] loop0: p1 p2 p3 p4 < > [ 417.651945] team0 (unregistering): Port device team_slave_1 removed [ 417.662072] team0 (unregistering): Port device team_slave_0 removed [ 417.672605] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 417.711365] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 417.777288] bond0 (unregistering): Released all slaves [ 418.003387] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 418.011128] team0: Port device team_slave_0 added [ 418.105966] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 418.127110] team0: Port device team_slave_1 added [ 418.237067] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 418.309537] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 418.397624] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 418.404857] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 418.422000] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 418.461488] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 418.469280] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 418.486633] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 419.126169] bridge0: port 2(bridge_slave_1) entered blocking state [ 419.132643] bridge0: port 2(bridge_slave_1) entered forwarding state [ 419.139408] bridge0: port 1(bridge_slave_0) entered blocking state [ 419.145800] bridge0: port 1(bridge_slave_0) entered forwarding state [ 419.154447] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 419.918634] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 420.572533] 8021q: adding VLAN 0 to HW filter on device bond0 [ 420.664596] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 420.755544] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 420.761779] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 420.769589] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 420.857285] 8021q: adding VLAN 0 to HW filter on device team0 04:00:39 executing program 3: clone(0x41fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f00000000c0)) syz_open_dev$rtc(&(0x7f0000000080)='/dev/rtc#\x00', 0x0, 0x0) ptrace(0x10, r0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000000)) getsockopt$inet_sctp6_SCTP_NODELAY(0xffffffffffffffff, 0x84, 0x3, &(0x7f0000000140), &(0x7f00000001c0)=0x4) ptrace$setregs(0xf, r0, 0x0, &(0x7f0000000180)="a96d55a756") ptrace$getregset(0x18, r0, 0x2, &(0x7f0000000280)={0x0}) 04:00:39 executing program 5 (fault-call:4 fault-nth:8): r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x25d1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000080)="00000600000000000000", 0x0) ioctl$SG_EMULATED_HOST(r1, 0x2203, &(0x7f00000000c0)) write$binfmt_elf32(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000000000000000000000030006000000000000000000380000000000000000000000000020000200000000000000000000000000000000000000000000000000000000040000000000000000000000000000030000000000000000000000000000000200000028e9653bf5f378f24e50b960"], 0x78) execveat(r1, &(0x7f0000000000)='\x00', &(0x7f0000000280), 0x0, 0x1000) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 04:00:39 executing program 2: r0 = socket$inet6(0xa, 0x400000000000803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000006c0)="0a5c2d023c12628571") mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0xc, 0x32, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x8000000003c) connect$inet6(r1, &(0x7f00000002c0)={0xa, 0x0, 0x0, @dev, 0x9}, 0x1c) sendmsg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="2c7c579a7ae9c96d5cc9ad926a3eea1cf89515d52fc4300c0d33f21c491f50289b7a492cc0c90f234201a5c6f9b830f910b1902ed60d51ad019c73fc9065aa2c519f654874b01f87db4a2807b6a2c2532e9d54e219c9c5f95f", 0x59}], 0x1}, 0xc100) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000440)="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", 0x257}], 0x1}, 0x8000) socket$packet(0x11, 0x2, 0x300) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001480)="d09a0e63c9476288b671afdbd53a5994e137381f62021d1951b627b8dda57a5d17d744648c81c5703ed8146ab1b0171f89091b1dd3238d03dbb686df460963245dedf2973ee555af99499e44ad420dbf65fd46fbc99a1274429e2d5783751815828ec8cb3553110cca66460215353d19f6d8bbd8fb264eddea60b18e16c31aa5e200000491634ac2fd10e2cd30bcd7fede24263a7fff16e53ea293f3551b7147c33a44ea437fb1515c3e8d4f162fdebf8ebe11ae6fcd9372c8d8f19556ae091fe94215ae9434da412f6fa4cb6561e5f78ff9707844ee5d573fb294437722d9a06dfa61748c32c73d759933a8dd344c947d3efdbe90d0eb049df5fbb0c19f6785264b619c530d97395d44b04f7e2a280d658c7871ad373b792678c49227999651ef3b2ee1bc2b8f3035db376e8e09aa3837233c8713065a8ad131d24f6c42a3220d0e07c3d3e95d59a5dd10c09716b5f874ecf53aadfa5050ff40f2c3c4a629b6445e5836100afff5a8977583653b40ca316f8f11416e5c1bd5499636ddae25fc4970b37209cf5c0bf8e432160c258d14223baa52798e09858645773dd97e68a95310da713cff077b06000000d4f145e9199c126a7f235e5674a3c7f5c7129ac7c1a3319590249b6d34ef6c3d8b94c6fc7cdcbddb053243053f7bc1f230d3bc7dfc4359e33992d0a3946b914a093287a76ac4a249b5b86cc75476466e409553355fefab75e9268a8751ffc9481fcff1f49c475699595b315e2147ee038b7291600c6b1cf7c8f24d587b9464a67e5ccec17820e711b98f4f7d5053642068a3fff704c3fe26ba862b53e2622d6e8b4a4c815fb2ea90ef63e141209dd292fdf886ee3e64b90f47ce22661c7a21f7bc10df0248079b7be17284eb54e5ab5bde9c6857b3cb184586049e7741b2d8b5b1a19e99e1834a25959155720c1c0ef84d7b3c42e1ba282847d476cef0228b1422aba08e5f3c1cd279bbd1c5303c2e9c16a0da4f88f770fca118b09e92b51a33970e32ade003000000", 0x2d5}], 0x1}, 0x0) 04:00:39 executing program 1: socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_mreqsrc(r0, 0x0, 0x28, &(0x7f0000000180)={@local, @dev={0xac, 0x14, 0x14, 0x21}, @rand_addr=0x20}, 0xc) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) connect$inet6(r1, &(0x7f0000000080), 0x1c) r2 = dup2(r1, r1) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000100)=[@window={0x3, 0x8, 0x1}, @mss={0x2, 0xffffffffffffff1c}, @mss, @mss={0x2, 0x40}, @timestamp], 0x5) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) syz_execute_func(&(0x7f00000000c0)="64ff0941c3c4e2c9975842c4c27d794e0066420fe2e33e0f1110c442019dccd3193e66430f3a0ce397") syz_genetlink_get_family_id$team(&(0x7f0000000000)='team\x00') clone(0x8000000008, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet_MCAST_LEAVE_GROUP(r2, 0x0, 0x2d, &(0x7f0000000300)={0xfffffffffffffffc, {{0x2, 0x0, @local}}}, 0x88) write$binfmt_elf32(r2, &(0x7f00000003c0)=ANY=[@ANYBLOB], 0x0) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r4 = getpid() sched_setscheduler(r4, 0x5, &(0x7f0000000200)) fallocate(r3, 0x51, 0x0, 0x3f) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000007080)={{{@in6=@loopback}}, {{@in6=@mcast1}, 0x0, @in=@loopback}}, &(0x7f0000007180)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(r3, 0x8933, &(0x7f0000007600)={'team0\x00'}) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, &(0x7f0000007cc0)={@multicast1, @local}, &(0x7f0000007d00)=0xc) getsockopt$ARPT_SO_GET_ENTRIES(r2, 0x0, 0x61, 0x0, &(0x7f0000000040)) 04:00:39 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, 0x0, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000002000)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001000)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqsrc(r2, 0x0, 0x2000000000000004, &(0x7f0000013ff4)={@remote}, 0xc) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000340)={{{@in=@broadcast, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0xa, 0x1000000}}, {{@in6=@local, 0x0, 0x33}, 0x0, @in6=@local}}, 0xe8) close(r2) dup3(r0, r1, 0x0) 04:00:39 executing program 0: symlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='./file0/file0\x00') syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) fcntl$notify(r0, 0x402, 0x10) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) r2 = dup(r0) unshare(0x40000000) fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, &(0x7f0000000080)='trusted.overlay.redirect\x00', &(0x7f0000000140)='./file0\x00', 0x8, 0x0) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f0000000440)=r2) sysinfo(&(0x7f0000000500)=""/94) fsetxattr$trusted_overlay_opaque(r0, &(0x7f0000000340)='trusted.overlay.opaque\x00', &(0x7f0000000180)='y\x00', 0xffffffffffffff32, 0x3) clone(0x400000000020000, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r3 = socket$inet_udp(0x2, 0x2, 0x0) r4 = getpid() renameat2(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f00000002c0)='./file0/bus\x00', 0x3) fcntl$setsig(r0, 0xa, 0x1e) fsetxattr$security_selinux(r3, &(0x7f0000000380)='security.selinux\x00', &(0x7f00000003c0)='system_u:object_r:shell_exec_t:s0\x00', 0x22, 0x3) sched_setscheduler(r4, 0x5, &(0x7f0000000200)) open$dir(&(0x7f0000eb6000)='./file0/bus\x00', 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="73797a3184d351d02a1683a22f50d3172a79680c45f6a5b222fa"], 0x1a) creat(&(0x7f0000000580)='./file0/file0\x00', 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0xfffffffffffffffe, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="000000000000000000000000000000000000000000000000e0e51532000000000200880126000100000064000000000127008e030c00650000006400000000030d00f0043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) ptrace$setregs(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001680)) [ 422.243204] FAULT_INJECTION: forcing a failure. [ 422.243204] name failslab, interval 1, probability 0, space 0, times 0 [ 422.296563] CPU: 0 PID: 17187 Comm: syz-executor5 Not tainted 4.20.0-rc4+ #360 [ 422.303987] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 422.313368] Call Trace: [ 422.315982] dump_stack+0x244/0x39d [ 422.319635] ? dump_stack_print_info.cold.1+0x20/0x20 [ 422.324868] should_fail.cold.4+0xa/0x17 [ 422.328957] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 422.332484] IPVS: ftp: loaded support on port[0] = 21 [ 422.334070] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 422.343906] ? retint_kernel+0x2d/0x2d [ 422.347815] ? print_usage_bug+0xc0/0xc0 [ 422.351893] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 422.357363] ? zap_class+0x640/0x640 [ 422.361099] ? find_held_lock+0x36/0x1c0 [ 422.365195] ? __lock_is_held+0xb5/0x140 [ 422.369288] ? perf_trace_sched_process_exec+0x860/0x860 [ 422.374758] ? __lock_acquire+0x62f/0x4c20 [ 422.379020] __should_failslab+0x124/0x180 [ 422.383284] should_failslab+0x9/0x14 [ 422.387099] kmem_cache_alloc+0x2be/0x730 [ 422.391280] ? __lock_acquire+0x62f/0x4c20 [ 422.395527] ? mark_held_locks+0x130/0x130 [ 422.395552] __alloc_file+0xa8/0x470 [ 422.395571] ? file_free_rcu+0xd0/0xd0 [ 422.395594] ? __lock_acquire+0x62f/0x4c20 [ 422.411648] ? find_held_lock+0x36/0x1c0 [ 422.415732] alloc_empty_file+0x72/0x170 [ 422.419816] path_openat+0x170/0x5150 [ 422.423632] ? lock_downgrade+0x900/0x900 [ 422.427790] ? check_preemption_disabled+0x48/0x280 [ 422.427808] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 422.427823] ? kasan_check_read+0x11/0x20 [ 422.427839] ? print_usage_bug+0xc0/0xc0 [ 422.427857] ? print_usage_bug+0xc0/0xc0 [ 422.427872] ? rcu_softirq_qs+0x20/0x20 [ 422.427886] ? unwind_dump+0x190/0x190 [ 422.427906] ? path_lookupat.isra.43+0xc00/0xc00 [ 422.427929] ? is_bpf_text_address+0xd3/0x170 [ 422.427950] ? kernel_text_address+0x79/0xf0 [ 422.437902] ? __lock_acquire+0x62f/0x4c20 [ 422.437937] ? mark_held_locks+0x130/0x130 [ 422.446170] ? kasan_kmalloc+0xc7/0xe0 [ 422.446188] ? kasan_slab_alloc+0x12/0x20 [ 422.446207] ? kmem_cache_alloc+0x12e/0x730 [ 422.446233] ? prepare_creds+0xab/0x4d0 [ 422.446251] ? prepare_exec_creds+0x11/0xf0 [ 422.454283] ? prepare_bprm_creds+0x70/0x120 [ 422.454309] ? __do_execve_file.isra.33+0x445/0x25d0 [ 422.454327] ? __x64_sys_execveat+0xed/0x130 [ 422.454344] ? do_syscall_64+0x1b9/0x820 [ 422.454361] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 422.454384] ? percpu_ref_put_many+0x11c/0x260 [ 422.463024] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 422.463042] ? refcount_inc_not_zero_checked+0x1e5/0x2f0 [ 422.463063] ? refcount_add_not_zero_checked+0x330/0x330 [ 422.463082] do_filp_open+0x255/0x380 [ 422.463099] ? may_open_dev+0x100/0x100 [ 422.471999] ? zap_class+0x640/0x640 [ 422.472017] ? zap_class+0x640/0x640 [ 422.472035] ? apparmor_cred_prepare+0x30c/0x5a0 [ 422.472056] ? apparmor_task_free+0x1e0/0x1e0 [ 422.472085] ? find_held_lock+0x36/0x1c0 [ 422.480544] do_open_execat+0x221/0x8e0 [ 422.480563] ? __do_execve_file.isra.33+0x8a4/0x25d0 [ 422.480581] ? unregister_binfmt+0x2a0/0x2a0 [ 422.488617] ? check_preemption_disabled+0x48/0x280 [ 422.488639] ? kasan_check_read+0x11/0x20 [ 422.488655] ? do_raw_spin_trylock+0x270/0x270 [ 422.488672] ? key_put+0x33/0x80 [ 422.488698] __do_execve_file.isra.33+0x176f/0x25d0 [ 422.488726] ? prepare_bprm_creds+0x120/0x120 [ 422.488749] ? usercopy_warn+0x110/0x110 [ 422.488775] ? check_preemption_disabled+0x48/0x280 [ 422.488803] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 422.488825] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 422.488846] ? strncpy_from_user+0x411/0x5a0 [ 422.501466] ? digsig_verify+0x1530/0x1530 [ 422.501484] ? kmem_cache_alloc+0x33a/0x730 [ 422.501509] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 422.511025] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 422.511050] __x64_sys_execveat+0xed/0x130 [ 422.511077] do_syscall_64+0x1b9/0x820 [ 422.519535] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 422.519565] ? syscall_return_slowpath+0x5e0/0x5e0 [ 422.519579] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 422.519596] ? trace_hardirqs_on_caller+0x310/0x310 [ 422.519619] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 422.519637] ? prepare_exit_to_usermode+0x291/0x3b0 [ 422.519660] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 422.519684] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 422.519696] RIP: 0033:0x457569 [ 422.519713] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 422.519721] RSP: 002b:00007fccba6d7c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 422.519736] RAX: ffffffffffffffda RBX: 00007fccba6d7c90 RCX: 0000000000457569 04:00:40 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x25d1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000080)="00000600000000000000", 0x0) ioctl$SG_EMULATED_HOST(r1, 0x2203, &(0x7f00000000c0)) write$binfmt_elf32(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000000000000000000000030006000000000000000000380000000000000000000000000020000200000000000000000000000000000000000000000000000000000000040000000000000000000000000000030000000000000000000000000000000200000028e9653bf5f378f24e50b960"], 0x78) execveat(r1, &(0x7f0000000000)='\x00', &(0x7f0000000280), 0x0, 0x1000) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 04:00:40 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, 0x0, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000002000)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001000)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqsrc(r2, 0x0, 0x2000000000000004, &(0x7f0000013ff4)={@remote}, 0xc) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000340)={{{@in=@broadcast, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0xa, 0x2000}}, {{@in6=@local, 0x0, 0x33}, 0x0, @in6=@local}}, 0xe8) close(r2) dup3(r0, r1, 0x0) [ 422.519746] RDX: 0000000020000280 RSI: 0000000020000000 RDI: 0000000000000004 [ 422.519754] RBP: 000000000072bf00 R08: 0000000000001000 R09: 0000000000000000 [ 422.519764] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fccba6d86d4 [ 422.519774] R13: 00000000004bdc9b R14: 00000000004cd1d8 R15: 0000000000000005 04:00:40 executing program 2: r0 = socket$inet6(0xa, 0x400000000000803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000006c0)="0a5c2d023c1262857180") mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0xc, 0x32, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x8000000003c) connect$inet6(r1, &(0x7f00000002c0)={0xa, 0x0, 0x0, @dev, 0x9}, 0x1c) sendmsg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="2c7c579a7ae9c96d5cc9ad926a3eea1cf89515d52fc4300c0d33f21c491f50289b7a492cc0c90f234201a5c6f9b830f910b1902ed60d51ad019c73fc9065aa2c519f654874b01f87db4a2807b6a2c2532e9d54e219c9c5f95f", 0x59}], 0x1}, 0xc100) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000440)="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", 0x257}], 0x1}, 0x8000) socket$packet(0x11, 0x2, 0x300) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001480)="d09a0e63c9476288b671afdbd53a5994e137381f62021d1951b627b8dda57a5d17d744648c81c5703ed8146ab1b0171f89091b1dd3238d03dbb686df460963245dedf2973ee555af99499e44ad420dbf65fd46fbc99a1274429e2d5783751815828ec8cb3553110cca66460215353d19f6d8bbd8fb264eddea60b18e16c31aa5e200000491634ac2fd10e2cd30bcd7fede24263a7fff16e53ea293f3551b7147c33a44ea437fb1515c3e8d4f162fdebf8ebe11ae6fcd9372c8d8f19556ae091fe94215ae9434da412f6fa4cb6561e5f78ff9707844ee5d573fb294437722d9a06dfa61748c32c73d759933a8dd344c947d3efdbe90d0eb049df5fbb0c19f6785264b619c530d97395d44b04f7e2a280d658c7871ad373b792678c49227999651ef3b2ee1bc2b8f3035db376e8e09aa3837233c8713065a8ad131d24f6c42a3220d0e07c3d3e95d59a5dd10c09716b5f874ecf53aadfa5050ff40f2c3c4a629b6445e5836100afff5a8977583653b40ca316f8f11416e5c1bd5499636ddae25fc4970b37209cf5c0bf8e432160c258d14223baa52798e09858645773dd97e68a95310da713cff077b06000000d4f145e9199c126a7f235e5674a3c7f5c7129ac7c1a3319590249b6d34ef6c3d8b94c6fc7cdcbddb053243053f7bc1f230d3bc7dfc4359e33992d0a3946b914a093287a76ac4a249b5b86cc75476466e409553355fefab75e9268a8751ffc9481fcff1f49c475699595b315e2147ee038b7291600c6b1cf7c8f24d587b9464a67e5ccec17820e711b98f4f7d5053642068a3fff704c3fe26ba862b53e2622d6e8b4a4c815fb2ea90ef63e141209dd292fdf886ee3e64b90f47ce22661c7a21f7bc10df0248079b7be17284eb54e5ab5bde9c6857b3cb184586049e7741b2d8b5b1a19e99e1834a25959155720c1c0ef84d7b3c42e1ba282847d476cef0228b1422aba08e5f3c1cd279bbd1c5303c2e9c16a0da4f88f770fca118b09e92b51a33970e32ade003000000", 0x2d5}], 0x1}, 0x0) 04:00:40 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) syz_execute_func(&(0x7f00000000c0)="64ff0941c3c4e2c9975842c4c27d794e0066420fe2e33e0f1110c442019dccd3193e66430f3a0ce397") clone(0x1a02100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet_MCAST_LEAVE_GROUP(r1, 0x0, 0x2d, &(0x7f0000000300)={0xfffffffffffffffc, {{0x2, 0x0, @local}}}, 0x88) write$binfmt_elf32(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="ca1179b5b704c1baad7db37a6905f30100c6892ebd758c96356e8cfce2f7ec1672d8555c4b0e271a6313c14942430194a20db14df919b83f3f91961b854c0e7dc74632e744c6fb56ce162b8b3fffab0bb45443a96f82aa8c83e0e3acd85c5ac17716b6d9d54d"], 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r1, 0x0, 0x61, 0x0, &(0x7f0000000040)) 04:00:40 executing program 3: clone(0x41fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f00000000c0)) syz_open_dev$rtc(&(0x7f0000000080)='/dev/rtc#\x00', 0x0, 0x0) ptrace(0x10, r0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000000)) getsockopt$inet_sctp6_SCTP_NODELAY(0xffffffffffffffff, 0x84, 0x3, &(0x7f0000000140), &(0x7f00000001c0)=0x4) ptrace$setregs(0xf, r0, 0x0, &(0x7f0000000180)="a96d55a756") ptrace$getregset(0x2, r0, 0x2, &(0x7f0000000280)={0x0}) 04:00:40 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, 0x0, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000002000)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001000)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqsrc(r2, 0x0, 0x2000000000000004, &(0x7f0000013ff4)={@remote}, 0xc) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000340)={{{@in=@broadcast, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0xa, 0xff0f}}, {{@in6=@local, 0x0, 0x33}, 0x0, @in6=@local}}, 0xe8) close(r2) dup3(r0, r1, 0x0) 04:00:40 executing program 2: r0 = socket$inet6(0xa, 0x400000000000803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000006c0)="0a5c2d023c1262857180") mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0xc, 0x32, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x8000000003c) connect$inet6(r1, &(0x7f00000002c0)={0xa, 0x0, 0x0, @dev, 0x9}, 0x1c) sendmsg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="2c7c579a7ae9c96d5cc9ad926a3eea1cf89515d52fc4300c0d33f21c491f50289b7a492cc0c90f234201a5c6f9b830f910b1902ed60d51ad019c73fc9065aa2c519f654874b01f87db4a2807b6a2c2532e9d54e219c9c5f95f", 0x59}], 0x1}, 0xc100) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000440)="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", 0x257}], 0x1}, 0x8000) socket$packet(0x11, 0x2, 0x300) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001480)="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", 0x2d5}], 0x1}, 0x0) 04:00:40 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) syz_execute_func(&(0x7f00000000c0)="64ff0941c3c4e2c9975842c4c27d794e0066420fe2e33e0f1110c442019dccd3193e66430f3a0ce397") clone(0x1a02100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet_MCAST_LEAVE_GROUP(r1, 0x0, 0x2d, &(0x7f0000000300)={0xfffffffffffffffc, {{0x2, 0x0, @local}}}, 0x88) write$binfmt_elf32(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="f3d825d449503301ba11ff3a50fdda5845760102285fbcb713aafbbc7070e2704bda79e0543744fa730d08a0fdeb79b24ff645a1e2eb2d1af001f56cd7ad0ff8377fa6a1e63c85b72e47d8c63ca2168dc4b2bfb4361c22ab46c67513d4734e3b9ae4ac245d"], 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r1, 0x0, 0x61, 0x0, &(0x7f0000000040)) 04:00:40 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x25d1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000080)="00000600000000000000", 0x0) ioctl$SG_EMULATED_HOST(r1, 0x2203, &(0x7f00000000c0)) signalfd(r0, &(0x7f0000000100)={0x4}, 0x8) write$binfmt_elf32(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="7f940a460000000000000000000000000300060000000000000000003800000000000000000000000000200002000000000000000000000000000000040000000000000000000000000000030000000000000000000000000000000200000028e9653bf5f378014e50b96000000000000000000000000000f013b9f52501a2e4d957a3c4"], 0x78) execveat(r1, &(0x7f0000000000)='\x00', &(0x7f0000000280), 0x0, 0x1000) setsockopt$inet6_tcp_int(r1, 0x6, 0x1e, &(0x7f0000000140)=0x4, 0x4) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000240)=0x0) sched_getaffinity(r2, 0x8, &(0x7f0000000280)) 04:00:40 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x25d1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000080)="00000600000000000000", 0x0) ioctl$SG_EMULATED_HOST(r1, 0x2203, &(0x7f00000000c0)) write$binfmt_elf32(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c461472257f0000000000f7ff0000000000030006008000000000000000050000005938000000000000000000000000002000020000000000000000000000000000000000000800000000000000000004000000000000000000000000000000000200000028e9653bf5f3780000000000000000000000000000"], 0x78) execveat(r1, &(0x7f0000000000)='\x00', &(0x7f0000000280), 0x0, 0x1000) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) syz_open_dev$dmmidi(&(0x7f0000000100)='/dev/dmmidi#\x00', 0x2, 0x40) 04:00:40 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) ioctl$sock_netdev_private(r0, 0x89f9, &(0x7f00000001c0)="50765b4d9e7949301a13ed1280bcf12cff666472bfb9ce6e722049b1890bf49ce773f5b1415ab1c082ce6ec9a81b93f47dae1f0163d4dc4ee489441bbc21473517") connect$inet6(r0, &(0x7f0000000080), 0x1c) socket$nl_generic(0x10, 0x3, 0x10) r1 = dup2(r0, r0) syz_execute_func(&(0x7f00000000c0)="64ff0941c3c4e2c9975842c4c27d794e0066420fe2e33e0f1110c442019dccd3193e66430f3a0ce397") clone(0x1a02100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet_MCAST_LEAVE_GROUP(r1, 0x0, 0x2d, &(0x7f0000000300)={0xfffffffffffffffc, {{0x2, 0x0, @local}}}, 0x88) getsockopt$ARPT_SO_GET_INFO(r1, 0x0, 0x60, &(0x7f0000000100)={'filter\x00'}, &(0x7f0000000180)=0x44) write$binfmt_elf32(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="7f8c4018d5b938359b15f6ea05314df9b4a1e2c7"], 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r1, 0x0, 0x61, 0x0, &(0x7f0000000040)) [ 423.547813] loop0: p1 p2 p3 p4 < > 04:00:41 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x25d1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000080)="00000600000000000000", 0x0) ioctl$SG_EMULATED_HOST(r1, 0x2203, &(0x7f00000000c0)) signalfd(r0, &(0x7f0000000100)={0x4}, 0x8) write$binfmt_elf32(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="7f940a460000000000000000000000000300060000000000000000003800000000000000000000000000200002000000000000000000000000000000040000000000000000000000000000030000000000000000000000000000000200000028e9653bf5f378014e50b96000000000000000000000000000f013b9f52501a2e4d957a3c4"], 0x78) execveat(r1, &(0x7f0000000000)='\x00', &(0x7f0000000280), 0x0, 0x1000) setsockopt$inet6_tcp_int(r1, 0x6, 0x1e, &(0x7f0000000140)=0x4, 0x4) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000240)=0x0) sched_getaffinity(r2, 0x8, &(0x7f0000000280)) 04:00:41 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, 0x0, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000002000)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001000)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqsrc(r2, 0x0, 0x2000000000000004, &(0x7f0000013ff4)={@remote}, 0xc) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000340)={{{@in=@broadcast, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0xa, 0x300}}, {{@in6=@local, 0x0, 0x33}, 0x0, @in6=@local}}, 0xe8) close(r2) dup3(r0, r1, 0x0) 04:00:41 executing program 2: r0 = socket$inet6(0xa, 0x400000000000803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000006c0)="0a5c2d023c1262857180") mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0xc, 0x32, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x8000000003c) connect$inet6(r1, &(0x7f00000002c0)={0xa, 0x0, 0x0, @dev, 0x9}, 0x1c) sendmsg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="2c7c579a7ae9c96d5cc9ad926a3eea1cf89515d52fc4300c0d33f21c491f50289b7a492cc0c90f234201a5c6f9b830f910b1902ed60d51ad019c73fc9065aa2c519f654874b01f87db4a2807b6a2c2532e9d54e219c9c5f95f", 0x59}], 0x1}, 0xc100) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000440)="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", 0x257}], 0x1}, 0x8000) socket$packet(0x11, 0x2, 0x300) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001480)="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", 0x2d5}], 0x1}, 0x0) 04:00:41 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) syz_execute_func(&(0x7f00000000c0)="64ff0941c3c4e2c9975842c4c27d794e0066420fe2e33e0f1110c442019dccd3193e66430f3a0ce397") clone(0x1a02100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet_MCAST_LEAVE_GROUP(r1, 0x0, 0x2d, &(0x7f0000000300)={0xfffffffffffffffc, {{0x2, 0x0, @local}}}, 0x88) write$binfmt_elf32(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="217ab9f3f7a2289de92664d9c2d62398b67ad3a1278f3e3269b1f2de4ecaf5959e9b9fd2a074e504d5"], 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000100)=[@sack_perm, @window={0x3, 0xb, 0xfffffffffffffff7}, @window={0x3, 0x5, 0x7f}, @sack_perm, @window={0x3, 0x8, 0xfffffffffffffff9}, @window={0x3, 0x7ff, 0x7fffffff}, @sack_perm, @mss={0x2, 0xfde}], 0x8) getsockopt$ARPT_SO_GET_ENTRIES(r1, 0x0, 0x61, 0x0, &(0x7f0000000040)) 04:00:41 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) syz_execute_func(&(0x7f00000000c0)="64ff0941c3c4e2c9975842c4c27d794e0066420fe2e33e0f1110c442019dccd3193e66430f3a0ce397") clone(0xffffffffffffffff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet_MCAST_LEAVE_GROUP(r1, 0x0, 0x2d, &(0x7f0000000300)={0xfffffffffffffffc, {{0x2, 0x0, @local}}}, 0x88) write$binfmt_elf32(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB], 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r1, 0x0, 0x61, 0x0, &(0x7f0000000040)) 04:00:43 executing program 3: clone(0x41fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f00000000c0)) syz_open_dev$rtc(&(0x7f0000000080)='/dev/rtc#\x00', 0x0, 0x0) ptrace(0x10, r0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000000)) getsockopt$inet_sctp6_SCTP_NODELAY(0xffffffffffffffff, 0x84, 0x3, &(0x7f0000000140), &(0x7f00000001c0)=0x4) ptrace$setregs(0xf, r0, 0x0, &(0x7f0000000180)="a96d55a756") ptrace$getregset(0x420a, r0, 0x2, &(0x7f0000000280)={0x0}) 04:00:43 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x25d1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000080)="00000600000000000000", 0x0) ioctl$SG_EMULATED_HOST(r1, 0x2203, &(0x7f00000000c0)) write$binfmt_elf32(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="7f454c46000031dc9384d2791d000000000000000000000300060000000000000000003800000000002000000000000000000000000000000000040080000000000000000000000000030000000000000000000000000000000300000428e9653bf5f378f24e50b960a0911402546f7823e0927000000000000000"], 0x78) clock_gettime(0x0, &(0x7f00000001c0)={0x0, 0x0}) nanosleep(&(0x7f0000000200)={r2, r3+30000000}, 0x0) execveat(r1, &(0x7f0000000000)='\x00', &(0x7f0000000280), 0x0, 0x1000) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 04:00:43 executing program 2: r0 = socket$inet6(0xa, 0x400000000000803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000006c0)="0a5c2d023c126285718070") mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x8000000003c) connect$inet6(r1, &(0x7f00000002c0)={0xa, 0x0, 0x0, @dev, 0x9}, 0x1c) sendmsg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="2c7c579a7ae9c96d5cc9ad926a3eea1cf89515d52fc4300c0d33f21c491f50289b7a492cc0c90f234201a5c6f9b830f910b1902ed60d51ad019c73fc9065aa2c519f654874b01f87db4a2807b6a2c2532e9d54e219c9c5f95f", 0x59}], 0x1}, 0xc100) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000440)="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", 0x257}], 0x1}, 0x8000) socket$packet(0x11, 0x2, 0x300) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001480)="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", 0x2d5}], 0x1}, 0x0) 04:00:43 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, 0x0, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000002000)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001000)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqsrc(r2, 0x0, 0x2000000000000004, &(0x7f0000013ff4)={@remote}, 0xc) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000340)={{{@in=@broadcast, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0xa, 0xffffff80}}, {{@in6=@local, 0x0, 0x33}, 0x0, @in6=@local}}, 0xe8) close(r2) dup3(r0, r1, 0x0) 04:00:43 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) syz_execute_func(&(0x7f00000000c0)="64ff0941c3c4e2c9975842c4c27d794e0066420fe2e33e0f1110c442019dccd3193e66430f3a0ce397") clone(0x1a02100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet_MCAST_LEAVE_GROUP(r1, 0x0, 0x2d, &(0x7f0000000300)={0xfffffffffffffffc, {{0x2, 0x0, @local}}}, 0x88) write$binfmt_elf32(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="53269a8b634769acd04046c77d95b4b02558b0a8bc38f543ef53ce331b68e2615ad3c513caa44d7151a494177188e2b877154b42376e15c55c7d18497de2472c7bc57988dbce2f9c244fde1231a6e90f0031d492eb0fb78ac6"], 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r1, 0x0, 0x61, 0x0, &(0x7f0000000040)) ioctl$EVIOCGVERSION(r1, 0x80044501, &(0x7f0000000180)=""/114) 04:00:43 executing program 0: r0 = socket$inet6(0xa, 0x400000000000803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000006c0)="0a5c2d023c12628571") mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0xc, 0x32, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x8000000003c) connect$inet6(r1, &(0x7f00000002c0)={0xa, 0x0, 0x0, @dev, 0x9}, 0x1c) sendmsg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="2c7c579a7ae9c96d5cc9ad926a3eea1cf89515d52fc4300c0d33f21c491f50289b7a492cc0c90f234201a5c6f9b830f910b1902ed60d51ad019c73fc9065aa2c519f654874b01f87db4a2807b6a2c2532e9d54e219c9c5f95f", 0x59}], 0x1}, 0xc100) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000440)="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", 0x257}], 0x1}, 0x8000) socket$packet(0x11, 0x2, 0x300) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001480)="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", 0x2d5}], 0x1}, 0x0) 04:00:43 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) syz_execute_func(&(0x7f00000000c0)="64ff0941c3c4e2c9975842c4c27d794e0066420fe2e33e0f1110c442019dccd3193e66430f3a0ce397") clone(0x1a02100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet_MCAST_LEAVE_GROUP(r1, 0x0, 0x2d, &(0x7f0000000300)={0xfffffffffffffffc, {{0x2, 0x0, @local}}}, 0x88) write$binfmt_elf32(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="65f181162217c3c6aadb7538c6daa3a0ebf7b39c6239b3227ff4d5986ed4913c528158b8b58bc908000000000000007362c71d815873a4f1b2314292f9"], 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r1, 0x0, 0x61, 0x0, &(0x7f0000000040)) 04:00:43 executing program 2: r0 = socket$inet6(0xa, 0x400000000000803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000006c0)="0a5c2d023c126285718070") mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0xc, 0x10, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x8000000003c) connect$inet6(r1, &(0x7f00000002c0)={0xa, 0x0, 0x0, @dev, 0x9}, 0x1c) sendmsg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="2c7c579a7ae9c96d5cc9ad926a3eea1cf89515d52fc4300c0d33f21c491f50289b7a492cc0c90f234201a5c6f9b830f910b1902ed60d51ad019c73fc9065aa2c519f654874b01f87db4a2807b6a2c2532e9d54e219c9c5f95f", 0x59}], 0x1}, 0xc100) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000440)="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", 0x257}], 0x1}, 0x8000) socket$packet(0x11, 0x2, 0x300) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001480)="d09a0e63c9476288b671afdbd53a5994e137381f62021d1951b627b8dda57a5d17d744648c81c5703ed8146ab1b0171f89091b1dd3238d03dbb686df460963245dedf2973ee555af99499e44ad420dbf65fd46fbc99a1274429e2d5783751815828ec8cb3553110cca66460215353d19f6d8bbd8fb264eddea60b18e16c31aa5e200000491634ac2fd10e2cd30bcd7fede24263a7fff16e53ea293f3551b7147c33a44ea437fb1515c3e8d4f162fdebf8ebe11ae6fcd9372c8d8f19556ae091fe94215ae9434da412f6fa4cb6561e5f78ff9707844ee5d573fb294437722d9a06dfa61748c32c73d759933a8dd344c947d3efdbe90d0eb049df5fbb0c19f6785264b619c530d97395d44b04f7e2a280d658c7871ad373b792678c49227999651ef3b2ee1bc2b8f3035db376e8e09aa3837233c8713065a8ad131d24f6c42a3220d0e07c3d3e95d59a5dd10c09716b5f874ecf53aadfa5050ff40f2c3c4a629b6445e5836100afff5a8977583653b40ca316f8f11416e5c1bd5499636ddae25fc4970b37209cf5c0bf8e432160c258d14223baa52798e09858645773dd97e68a95310da713cff077b06000000d4f145e9199c126a7f235e5674a3c7f5c7129ac7c1a3319590249b6d34ef6c3d8b94c6fc7cdcbddb053243053f7bc1f230d3bc7dfc4359e33992d0a3946b914a093287a76ac4a249b5b86cc75476466e409553355fefab75e9268a8751ffc9481fcff1f49c475699595b315e2147ee038b7291600c6b1cf7c8f24d587b9464a67e5ccec17820e711b98f4f7d5053642068a3fff704c3fe26ba862b53e2622d6e8b4a4c815fb2ea90ef63e141209dd292fdf886ee3e64b90f47ce22661c7a21f7bc10df0248079b7be17284eb54e5ab5bde9c6857b3cb184586049e7741b2d8b5b1a19e99e1834a25959155720c1c0ef84d7b3c42e1ba282847d476cef0228b1422aba08e5f3c1cd279bbd1c5303c2e9c16a0da4f88f770fca118b09e92b51a33970e32ade003000000", 0x2d5}], 0x1}, 0x0) 04:00:43 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) syz_execute_func(&(0x7f00000000c0)="64ff0941c3c4e2c9975842c4c27d794e0066420fe2e33e0f1110c442019dccd3193e66430f3a0ce397") clone(0x1a02100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet_MCAST_LEAVE_GROUP(r1, 0x0, 0x2d, &(0x7f0000000300)={0xfffffffffffffffc, {{0x2, 0x0, @local}}}, 0x88) accept$unix(r1, 0x0, &(0x7f0000000000)) write$binfmt_elf32(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB], 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r1, 0x0, 0x61, 0x0, &(0x7f0000000040)) 04:00:43 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) syz_execute_func(&(0x7f00000000c0)="64ff0941c3c4e2c9975842c4c27d794e0066420fe2e33e0f1110c442019dccd3193e66430f3a0ce397") clone(0x1a02100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet_MCAST_LEAVE_GROUP(r1, 0x0, 0x2d, &(0x7f0000000300)={0xfffffffffffffffc, {{0x2, 0x0, @local}}}, 0x88) write$binfmt_elf32(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="65f181162217c3c6aadb7538c6daa3a0ebf7b39c6239b3227ff4d5986ed4913c528158b8b58bc908000000000000007362c71d815873a4f1b2314292f9"], 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r1, 0x0, 0x61, 0x0, &(0x7f0000000040)) 04:00:43 executing program 5: r0 = syz_open_dev$ndb(&(0x7f0000000100)='/dev/nbd#\x00', 0x0, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f0000000180)) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x25d1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = memfd_create(&(0x7f0000000140)="00000600000000000000", 0x0) ioctl$SG_EMULATED_HOST(r2, 0x2203, &(0x7f00000000c0)) write$binfmt_elf32(r2, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000000000000000000000030006000000000000000000380000000000000000000000000020000200000000000000000000000000000000000000000000000000000000040000000000000000000000000000030000000000000000000000000000000200000028e9653bf5f378f24e50b960"], 0x78) execveat(r2, &(0x7f0000000000)='\x00', &(0x7f0000000280), 0x0, 0x1000) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) 04:00:44 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, 0x0, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000002000)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001000)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqsrc(r2, 0x0, 0x2000000000000004, &(0x7f0000013ff4)={@remote}, 0xc) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000340)={{{@in=@broadcast, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0xa, 0xffffffa4}}, {{@in6=@local, 0x0, 0x33}, 0x0, @in6=@local}}, 0xe8) close(r2) dup3(r0, r1, 0x0) 04:00:44 executing program 3: clone(0x41fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f00000000c0)) syz_open_dev$rtc(&(0x7f0000000080)='/dev/rtc#\x00', 0x0, 0x0) ptrace(0x10, r0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000000)) getsockopt$inet_sctp6_SCTP_NODELAY(0xffffffffffffffff, 0x84, 0x3, &(0x7f0000000140), &(0x7f00000001c0)=0x4) ptrace$setregs(0xf, r0, 0x0, &(0x7f0000000180)="a96d55a756") ptrace$getregset(0x5, r0, 0x2, &(0x7f0000000280)={0x0}) 04:00:44 executing program 0: symlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='./file0/file0\x00') syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) fcntl$notify(r0, 0x402, 0x10) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigprocmask(0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) r2 = dup(r0) unshare(0x40000000) fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, &(0x7f0000000080)='trusted.overlay.redirect\x00', &(0x7f0000000140)='./file0\x00', 0x8, 0x0) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f0000000440)=r2) sysinfo(&(0x7f0000000500)=""/94) fsetxattr$trusted_overlay_opaque(r0, &(0x7f0000000340)='trusted.overlay.opaque\x00', &(0x7f0000000180)='y\x00', 0xffffffffffffff32, 0x3) clone(0x400000000020000, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r3 = socket$inet_udp(0x2, 0x2, 0x0) r4 = getpid() renameat2(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f00000002c0)='./file0/bus\x00', 0x3) fcntl$setsig(r0, 0xa, 0x1e) fsetxattr$security_selinux(r3, &(0x7f0000000380)='security.selinux\x00', &(0x7f00000003c0)='system_u:object_r:shell_exec_t:s0\x00', 0x22, 0x3) sched_setscheduler(r4, 0x5, &(0x7f0000000200)) open$dir(&(0x7f0000eb6000)='./file0/bus\x00', 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="73797a3184d351d02a1683a22f50d3172a79680c45f6a5b222fa"], 0x1a) creat(&(0x7f0000000580)='./file0/file0\x00', 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0xfffffffffffffffe, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="000000000000000000000000000000000000000000000000e0e51532000000000200880126000100000064000000000127008e030c00650000006400000000030d00f0043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) ptrace$setregs(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001680)) 04:00:44 executing program 2: r0 = socket$inet6(0xa, 0x400000000000803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000006c0)="0a5c2d023c126285718070") mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0xc, 0x10, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x8000000003c) connect$inet6(r1, &(0x7f00000002c0)={0xa, 0x0, 0x0, @dev, 0x9}, 0x1c) sendmsg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="2c7c579a7ae9c96d5cc9ad926a3eea1cf89515d52fc4300c0d33f21c491f50289b7a492cc0c90f234201a5c6f9b830f910b1902ed60d51ad019c73fc9065aa2c519f654874b01f87db4a2807b6a2c2532e9d54e219c9c5f95f", 0x59}], 0x1}, 0xc100) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000440)="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", 0x257}], 0x1}, 0x8000) socket$packet(0x11, 0x2, 0x300) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001480)="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", 0x2d5}], 0x1}, 0x0) 04:00:44 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) syz_execute_func(&(0x7f00000000c0)="64ff0941c3c4e2c9975842c4c27d794e0066420fe2e33e0f1110c442019dccd3193e66430f3a0ce397") clone(0x1a02100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet_MCAST_LEAVE_GROUP(r1, 0x0, 0x2d, &(0x7f0000000300)={0xfffffffffffffffc, {{0x2, 0x0, @local}}}, 0x88) write$binfmt_elf32(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB], 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r1, 0x0, 0x61, 0x0, &(0x7f0000000040)) ioctl$int_in(r1, 0x5452, &(0x7f0000000000)=0x1000) 04:00:44 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x25d1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000080)="00000600000000000000", 0x0) ioctl$BLKIOMIN(r1, 0x1278, &(0x7f0000000180)) ioctl$sock_SIOCSIFBR(r1, 0x8941, &(0x7f0000000140)=@add_del={0x2, &(0x7f0000000100)='team0\x00', 0x4b}) ioctl$SG_EMULATED_HOST(r1, 0x2203, &(0x7f00000000c0)) write$binfmt_elf32(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000000000000000000000030006000000000000000000380000000000000000000000000020000200000000000000000000000000000000000000000000000000000000040000000000000000000000000000030000000000000000000000000000000200000028e9653bf5f378f24e50b960"], 0x78) execveat(r1, &(0x7f0000000000)='\x00', &(0x7f0000000280), 0x0, 0x1000) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 04:00:44 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, 0x0, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000002000)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001000)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqsrc(r2, 0x0, 0x2000000000000004, &(0x7f0000013ff4)={@remote}, 0xc) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000340)={{{@in=@broadcast, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0xa, 0x2}}, {{@in6=@local, 0x0, 0x33}, 0x0, @in6=@local}}, 0xe8) close(r2) dup3(r0, r1, 0x0) 04:00:44 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) syz_execute_func(&(0x7f00000000c0)="64ff0941c3c4e2c9975842c4c27d794e0066420fe2e33e0f1110c442019dccd3193e66430f3a0ce397") clone(0x1000001, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet_MCAST_LEAVE_GROUP(r1, 0x0, 0x2d, &(0x7f0000000300)={0xfffffffffffffffc, {{0x2, 0x0, @local}}}, 0x88) write$binfmt_elf32(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB], 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r1, 0x404c534a, &(0x7f0000000100)={0x4, 0x7, 0xf4}) getsockopt$ARPT_SO_GET_ENTRIES(r1, 0x0, 0x61, 0x0, &(0x7f0000000040)) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x2, 0x0) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) 04:00:44 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x25d1}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000080)="00000600000000000000", 0x0) ioctl$UI_SET_SNDBIT(r1, 0x4004556a, 0x0) ioctl$SG_EMULATED_HOST(r1, 0x2203, &(0x7f00000000c0)) write$binfmt_elf32(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000002000020000000000000000000000000000f90000f700000000000000000000040000000000000000000000000000030000000028e9653bf5f378f24e50b9609bc4d5a0a52000000000000000000000000000000000000000"], 0x78) execveat(r1, &(0x7f0000000000)='\x00', &(0x7f0000000280), 0x0, 0x1000) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r1, 0x6, 0x15, &(0x7f0000000100)=0x1, 0x4) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 04:00:44 executing program 2: r0 = socket$inet6(0xa, 0x400000000000803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000006c0)="0a5c2d023c126285718070") mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0xc, 0x10, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x8000000003c) connect$inet6(r1, &(0x7f00000002c0)={0xa, 0x0, 0x0, @dev, 0x9}, 0x1c) sendmsg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="2c7c579a7ae9c96d5cc9ad926a3eea1cf89515d52fc4300c0d33f21c491f50289b7a492cc0c90f234201a5c6f9b830f910b1902ed60d51ad019c73fc9065aa2c519f654874b01f87db4a2807b6a2c2532e9d54e219c9c5f95f", 0x59}], 0x1}, 0xc100) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000440)="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", 0x257}], 0x1}, 0x8000) socket$packet(0x11, 0x2, 0x300) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001480)="d09a0e63c9476288b671afdbd53a5994e137381f62021d1951b627b8dda57a5d17d744648c81c5703ed8146ab1b0171f89091b1dd3238d03dbb686df460963245dedf2973ee555af99499e44ad420dbf65fd46fbc99a1274429e2d5783751815828ec8cb3553110cca66460215353d19f6d8bbd8fb264eddea60b18e16c31aa5e200000491634ac2fd10e2cd30bcd7fede24263a7fff16e53ea293f3551b7147c33a44ea437fb1515c3e8d4f162fdebf8ebe11ae6fcd9372c8d8f19556ae091fe94215ae9434da412f6fa4cb6561e5f78ff9707844ee5d573fb294437722d9a06dfa61748c32c73d759933a8dd344c947d3efdbe90d0eb049df5fbb0c19f6785264b619c530d97395d44b04f7e2a280d658c7871ad373b792678c49227999651ef3b2ee1bc2b8f3035db376e8e09aa3837233c8713065a8ad131d24f6c42a3220d0e07c3d3e95d59a5dd10c09716b5f874ecf53aadfa5050ff40f2c3c4a629b6445e5836100afff5a8977583653b40ca316f8f11416e5c1bd5499636ddae25fc4970b37209cf5c0bf8e432160c258d14223baa52798e09858645773dd97e68a95310da713cff077b06000000d4f145e9199c126a7f235e5674a3c7f5c7129ac7c1a3319590249b6d34ef6c3d8b94c6fc7cdcbddb053243053f7bc1f230d3bc7dfc4359e33992d0a3946b914a093287a76ac4a249b5b86cc75476466e409553355fefab75e9268a8751ffc9481fcff1f49c475699595b315e2147ee038b7291600c6b1cf7c8f24d587b9464a67e5ccec17820e711b98f4f7d5053642068a3fff704c3fe26ba862b53e2622d6e8b4a4c815fb2ea90ef63e141209dd292fdf886ee3e64b90f47ce22661c7a21f7bc10df0248079b7be17284eb54e5ab5bde9c6857b3cb184586049e7741b2d8b5b1a19e99e1834a25959155720c1c0ef84d7b3c42e1ba282847d476cef0228b1422aba08e5f3c1cd279bbd1c5303c2e9c16a0da4f88f770fca118b09e92b51a33970e32ade003000000", 0x2d5}], 0x1}, 0x0) 04:00:44 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, 0x0, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000002000)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001000)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqsrc(r2, 0x0, 0x2000000000000004, &(0x7f0000013ff4)={@remote}, 0xc) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000340)={{{@in=@broadcast, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0xa, 0x100000000000000}}, {{@in6=@local, 0x0, 0x33}, 0x0, @in6=@local}}, 0xe8) close(r2) dup3(r0, r1, 0x0) 04:00:44 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x17, 0x0, 0xfffffcb1) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) syz_execute_func(&(0x7f00000000c0)="64ff0941c3c4e2c9975842c4c27d794e0066420fe2e33e0f1110c442019dccd3193e66430f3a0ce397") getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000280)=@assoc_value={0x0}, &(0x7f00000002c0)=0x8) clone(0x80001a02100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet_MCAST_LEAVE_GROUP(r1, 0x0, 0x2d, &(0x7f0000000300)={0xfffffffffffffffc, {{0x2, 0x0, @local}}}, 0x88) write$P9_RRENAMEAT(r1, &(0x7f0000000000)={0x7, 0x4b, 0x1}, 0x7) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f00000003c0)={r2, 0xffff, 0x10}, 0xc) write$binfmt_elf32(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r1, 0x0, 0x61, 0x0, &(0x7f0000000040)) ioctl$RNDGETENTCNT(r1, 0x80045200, &(0x7f0000000240)) [ 427.532184] IPVS: ftp: loaded support on port[0] = 21 04:00:45 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x25d1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000080)="00000600000000000000", 0x0) ioctl$KVM_GET_XCRS(r1, 0x8188aea6, &(0x7f0000000100)={0x3, 0x3, [{0xd0, 0x0, 0x9}, {0x200, 0x0, 0x8}, {0x8, 0x0, 0xfff}]}) ioctl$SG_EMULATED_HOST(r1, 0x2203, &(0x7f00000000c0)) write$binfmt_elf32(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000000000000000000000030006000000000000000000380000000000000000000000000020000200000000000000000000000000000000000000000000000000000000040000000000000000000000000000030000000000000000000000000000000200000028e9653bf5f378f24e50b960"], 0x78) execveat(r1, &(0x7f0000000000)='\x00', &(0x7f0000000280), 0x0, 0x1000) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 04:00:45 executing program 3: clone(0x41fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f00000000c0)) syz_open_dev$rtc(&(0x7f0000000080)='/dev/rtc#\x00', 0x0, 0x0) ptrace(0x10, r0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000000)) getsockopt$inet_sctp6_SCTP_NODELAY(0xffffffffffffffff, 0x84, 0x3, &(0x7f0000000140), &(0x7f00000001c0)=0x4) ptrace$setregs(0xf, r0, 0x0, &(0x7f0000000180)="a96d55a756") ptrace$getregset(0x9, r0, 0x2, &(0x7f0000000280)={0x0}) 04:00:45 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, 0x0, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000002000)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001000)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqsrc(r2, 0x0, 0x2000000000000004, &(0x7f0000013ff4)={@remote}, 0xc) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000340)={{{@in=@broadcast, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0xa, 0x200000000000000}}, {{@in6=@local, 0x0, 0x33}, 0x0, @in6=@local}}, 0xe8) close(r2) dup3(r0, r1, 0x0) 04:00:45 executing program 2: r0 = socket$inet6(0xa, 0x400000000000803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000006c0)="0a5c2d023c126285718070") mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0xc, 0x32, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x0, 0x8000000003c) connect$inet6(r1, &(0x7f00000002c0)={0xa, 0x0, 0x0, @dev, 0x9}, 0x1c) sendmsg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="2c7c579a7ae9c96d5cc9ad926a3eea1cf89515d52fc4300c0d33f21c491f50289b7a492cc0c90f234201a5c6f9b830f910b1902ed60d51ad019c73fc9065aa2c519f654874b01f87db4a2807b6a2c2532e9d54e219c9c5f95f", 0x59}], 0x1}, 0xc100) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000440)="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", 0x257}], 0x1}, 0x8000) socket$packet(0x11, 0x2, 0x300) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001480)="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", 0x2d5}], 0x1}, 0x0) 04:00:45 executing program 1: r0 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x1, 0x101200) ioctl$sock_SIOCGIFBR(r0, 0x8940, &(0x7f00000001c0)=@add_del={0x2, &(0x7f0000000180)='veth1_to_team\x00', 0x6}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) connect$inet6(r1, &(0x7f0000000080), 0x1c) r2 = dup2(r1, r1) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) syz_execute_func(&(0x7f00000000c0)="64ff0941c3c4e2c9975842c4c27d794e0066420fe2e33e0f1110c442019dccd3193e66430f3a0ce397") clone(0x1a02100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x1ff, 0x9, 0x6, 0xffffffff, 0x0, 0x2d5, 0x1, 0x2, 0xff, 0x5, 0x1000, 0x71, 0x8, 0x100000001, 0x6, 0x4, 0x40, 0x7fffffff, 0x4, 0x1000, 0x0, 0x100000000, 0x4, 0x1, 0x100000001000000, 0x3, 0x8001, 0x5, 0x1, 0x4, 0x9, 0x0, 0x101, 0x0, 0x804, 0x401, 0x0, 0x1ff, 0x4, @perf_bp={&(0x7f0000000040), 0x2}, 0x0, 0x0, 0x5, 0x5, 0xaeb7, 0x1000, 0x1}, 0xffffffffffffffff, 0x2, r2, 0x2) setsockopt$inet_MCAST_LEAVE_GROUP(r2, 0x0, 0x2d, &(0x7f0000000300)={0xfffffffffffffffc, {{0x2, 0x0, @local}}}, 0x88) r3 = shmat(0xffffffffffffffff, &(0x7f0000fff000/0x1000)=nil, 0x1000) shmdt(r3) write$binfmt_elf32(r2, &(0x7f00000003c0)=ANY=[@ANYBLOB], 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r0, 0x0, 0x61, 0x0, &(0x7f0000000200)) ioctl$VIDIOC_G_SLICED_VBI_CAP(r2, 0xc0745645, &(0x7f0000000100)={0x5, [0x7, 0x5, 0x7ff, 0x1, 0xf89, 0x7f, 0x8, 0x80000001, 0xff, 0x2, 0x5, 0x4, 0x5, 0x8001, 0x5, 0x63, 0xe70f, 0x10000, 0x4, 0x1, 0x7ff, 0x0, 0x8, 0xc, 0xffffffffffff6ddb, 0x9, 0x6, 0xfffffffffffff44c, 0x4, 0xb4, 0x80, 0x9, 0x9, 0x778bd9ad, 0xac16, 0x3, 0x6, 0x7fff, 0x8, 0x5, 0x3, 0x6, 0x7, 0x8, 0x1000, 0x0, 0x9211, 0x7], 0xb}) 04:00:45 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x25d1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000080)="00000600000000000000", 0x0) ioctl$BLKIOMIN(r1, 0x1278, &(0x7f0000000180)) ioctl$sock_SIOCSIFBR(r1, 0x8941, &(0x7f0000000140)=@add_del={0x2, &(0x7f0000000100)='team0\x00', 0x4b}) ioctl$SG_EMULATED_HOST(r1, 0x2203, &(0x7f00000000c0)) write$binfmt_elf32(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000000000000000000000030006000000000000000000380000000000000000000000000020000200000000000000000000000000000000000000000000000000000000040000000000000000000000000000030000000000000000000000000000000200000028e9653bf5f378f24e50b960"], 0x78) execveat(r1, &(0x7f0000000000)='\x00', &(0x7f0000000280), 0x0, 0x1000) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 04:00:45 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x8, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x25d1, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0xff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000100)="00000600", 0x0) ioctl$SG_EMULATED_HOST(r1, 0x2203, &(0x7f00000000c0)) write$binfmt_elf32(r1, &(0x7f0000000280)=ANY=[@ANYBLOB="7f454c46000000000000800000000000030006000000000000000000380000000000000000000000794a0300040000000000000000000000000000000000000000000000e3ff000000000000000400000000000000000000000000000300000000001b000000e000fd81f0a282a2e9653bf5f378f24e50b97c23b188cff6fbce353be2b9c1fccdf272eeff462417563cf044f8e73a18fef9b4d6efa5687b399f52f0845e33e110a001e800000000000000000000000000000000000000"], 0x78) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x2) execveat(r1, &(0x7f0000000000)='\x00', &(0x7f0000000240)=[&(0x7f0000000200)="00000600"], 0x0, 0x1400) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000140)=r1, 0x4) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 04:00:45 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x115, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x3, 0x0, 0x2, 0x0, 0x6, 0x0, 0x25d1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x100000001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000080)="00000600000000000000", 0x0) ioctl$SG_EMULATED_HOST(r1, 0x2203, &(0x7f00000000c0)) write$binfmt_elf32(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="7f454c460000000000000000000000000300060000cf53473f622a01a6393ae09a8e89fd6c9a0df9bfe40000000000000038000000000000000000000000002000020000000000000000000000000000000000000000000000000000000004000006000091ab2de1a8a3403800030000000000000000000000000000000200000028"], 0x78) execveat(r1, &(0x7f0000000000)='\x00', &(0x7f0000000280), 0x0, 0x1000) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) r2 = semget$private(0x0, 0x0, 0x40) semctl$SEM_INFO(r2, 0x0, 0x13, &(0x7f00000011c0)=""/4096) 04:00:45 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x9, 0x8, 0x8, 0x100}, 0x2c) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x600000, 0x0) lstat(&(0x7f0000000400)='./file0\x00', &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r3 = getegid() write$P9_RGETATTR(r1, &(0x7f0000000280)={0xa0, 0x19, 0x0, {0x800, {0x0, 0x2, 0x3}, 0x88, r2, r3, 0x88, 0x4, 0x2, 0x5, 0x1, 0x7fffffff, 0x5a, 0x6, 0x80000001, 0xfffffffffffffe01, 0x7ff, 0x9, 0x7c6, 0xd2, 0x1ff}}, 0xa0) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000000240)={r0, &(0x7f0000000740), &(0x7f0000000140)=""/26}, 0x18) ioctl$sock_ifreq(r1, 0x89b7, &(0x7f0000000040)={'dummy0\x00', @ifru_flags=0x3000}) 04:00:46 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000080)={0xaa, 0x1}) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r2, 0x84, 0x24, &(0x7f00000000c0)={0x0, @in6}, 0x90) close(r2) close(r1) 04:00:46 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, 0x0, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000002000)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001000)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqsrc(r2, 0x0, 0x2000000000000004, &(0x7f0000013ff4)={@remote}, 0xc) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000340)={{{@in=@broadcast, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0xa, 0xffffffff00000000}}, {{@in6=@local, 0x0, 0x33}, 0x0, @in6=@local}}, 0xe8) close(r2) dup3(r0, r1, 0x0) 04:00:46 executing program 2: r0 = socket$inet6(0xa, 0x400000000000803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000006c0)="0a5c2d023c126285718070") mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0xc, 0x32, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x0, 0x8000000003c) connect$inet6(r1, &(0x7f00000002c0)={0xa, 0x0, 0x0, @dev, 0x9}, 0x1c) sendmsg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="2c7c579a7ae9c96d5cc9ad926a3eea1cf89515d52fc4300c0d33f21c491f50289b7a492cc0c90f234201a5c6f9b830f910b1902ed60d51ad019c73fc9065aa2c519f654874b01f87db4a2807b6a2c2532e9d54e219c9c5f95f", 0x59}], 0x1}, 0xc100) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000440)="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", 0x257}], 0x1}, 0x8000) socket$packet(0x11, 0x2, 0x300) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001480)="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", 0x2d5}], 0x1}, 0x0) 04:00:46 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x9, 0x8, 0x8, 0x100}, 0x2c) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x600000, 0x0) lstat(&(0x7f0000000400)='./file0\x00', &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r3 = getegid() write$P9_RGETATTR(r1, &(0x7f0000000280)={0xa0, 0x19, 0x0, {0x800, {0x0, 0x2, 0x3}, 0x88, r2, r3, 0x88, 0x4, 0x2, 0x5, 0x1, 0x7fffffff, 0x5a, 0x6, 0x80000001, 0xfffffffffffffe01, 0x7ff, 0x9, 0x7c6, 0xd2, 0x1ff}}, 0xa0) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000000240)={r0, &(0x7f0000000740), &(0x7f0000000140)=""/26}, 0x18) ioctl$sock_ifreq(r1, 0x89b7, &(0x7f0000000040)={'dummy0\x00', @ifru_flags=0x3000}) 04:00:46 executing program 3: clone(0x41fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f00000000c0)) syz_open_dev$rtc(&(0x7f0000000080)='/dev/rtc#\x00', 0x0, 0x0) ptrace(0x10, r0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000000)) getsockopt$inet_sctp6_SCTP_NODELAY(0xffffffffffffffff, 0x84, 0x3, &(0x7f0000000140), &(0x7f00000001c0)=0x4) ptrace$setregs(0xf, r0, 0x0, &(0x7f0000000180)="a96d55a756") ptrace$getregset(0x4202, r0, 0x2, &(0x7f0000000280)={0x0}) 04:00:46 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknod$loop(0x0, 0x0, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x80002, 0x88) bind$inet6(r0, &(0x7f0000009400)={0xa, 0x10000000004e20, 0x0, @mcast2, 0x5}, 0x1c) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x40, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffff9c, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {&(0x7f0000000080)={0xffffffffffffffff}, 0x2, 0xffffffffffffffff, 0x10, 0x1, @in6={0xa, 0x4e21, 0xa5, @loopback, 0xffffffff}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r1, &(0x7f00000000c0)={0x11, 0x10, 0xfa00, {&(0x7f0000000040), r2}}, 0x18) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, 0x0, 0xffffffffffffff04) syz_emit_ethernet(0x83, &(0x7f0000000340)={@local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "1bfc97", 0x4d, 0x88, 0x0, @dev, @mcast2, {[], @udp={0x0, 0x4e20, 0x4d, 0x0, [], "e29607149378d33e1db1c73936c77aa3f7fac33b042bd368236862531934ecb1c373d6ea51369e92fb96cc7c6fe4e24d1fcafff87429e50b32881721afab69cc3712c37ed0"}}}}}}, 0x0) 04:00:46 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x25d1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000080)="00000600000000000000", 0x0) ioctl$SG_EMULATED_HOST(r1, 0x2203, &(0x7f00000000c0)) write$binfmt_elf32(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000000000000000000000030006000000000000000000380000000000000000000000000020000200000000000000000000000000000000000000000000000000000000040000000000000000000000000000030000000000000000000000000000000200000028e9653bf5f378f24e50b960"], 0x78) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000300)={r0, 0x10, &(0x7f00000002c0)={&(0x7f0000000400)=""/4096, 0x1000, 0xffffffffffffffff}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340)=r2, 0x4) execveat(r1, &(0x7f0000000000)='\x00', &(0x7f0000000280), 0x0, 0x1000) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) ioctl$DRM_IOCTL_SET_UNIQUE(r1, 0x40106410, &(0x7f00000001c0)={0xb7, &(0x7f0000000100)="df5140ff5e47e54bdfe3e8090289197e657e38ffdd786c69fe25aa817ed1a57e0c0230babaabddd9f1842fed5b7ea3f0d066c395faace230133220e734615dfc95a34a49d442828cb7e20ffc85e570fd0169970acfb58a4f29244456dafb74633eee4482ee87631e234e4273247b745b3de051e135cd10aeba4731b88c0c2e8a92a86139edcf1645cf138964a4a963944df781f2bf331d717e3259a8eeb0732d4993e5750c71507695b88f135db41cc0d0d67dbb114511"}) r3 = request_key(&(0x7f0000000200)='asymmetric\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="00000600", 0xfffffffffffffff9) keyctl$clear(0x7, r3) 04:00:46 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, 0x0, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000002000)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001000)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqsrc(r2, 0x0, 0x2000000000000004, &(0x7f0000013ff4)={@remote}, 0xc) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000340)={{{@in=@broadcast, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0xa, 0x600}}, {{@in6=@local, 0x0, 0x33}, 0x0, @in6=@local}}, 0xe8) close(r2) dup3(r0, r1, 0x0) 04:00:46 executing program 2: r0 = socket$inet6(0xa, 0x400000000000803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000006c0)="0a5c2d023c126285718070") mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0xc, 0x32, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x0, 0x8000000003c) connect$inet6(r1, &(0x7f00000002c0)={0xa, 0x0, 0x0, @dev, 0x9}, 0x1c) sendmsg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="2c7c579a7ae9c96d5cc9ad926a3eea1cf89515d52fc4300c0d33f21c491f50289b7a492cc0c90f234201a5c6f9b830f910b1902ed60d51ad019c73fc9065aa2c519f654874b01f87db4a2807b6a2c2532e9d54e219c9c5f95f", 0x59}], 0x1}, 0xc100) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000440)="b10b938636ea69df7b5a9984bb1bc72ef58d96e56e11df900a707f4946b1637e2096c584b9a1b4e017163fbdb35160a56c11dfbe74df97d36d19ad6a91c6fb4ad19581b8cf707131830f7a22b1b263c9da0e443c5e969ed6a0d3bc508bf75c3147447379f585759ceba0de5cda46291dc1b8f106a83e1cde43a862d95413ce2616b261ed9f79913ae781b3b843ea1b4429a750b8ccb1952a7b863d0bada9f61df6609fe368eaf47c0ce9e46a22b0d75b063deeaa94285d0c43353046e0a308296a76b0b0145f8af9aa0ed0e18bc50509eaef21c8e03842a97df3a462ea3f9d5f83bf1d4d2875f0d5b24e941483f863cd2ea7c769bd3e594fb173dd873c7d9a3fd20939ad1d5867881ed77a078007b4972aba36cae02004373a6a74d74cb15a52c5f8426cb6f235d38048fd91f5d6100fd58a335df10add227d804167ba191c7a035c5a2a916e7fef18a6003578820b3e0be26a22f2c149f40a0335cadcca64a5e44179e6ce4d7f7c16e8a96c5be7cdf66eef901cb8eeabc94bae30acca8c6fa02889c32311044dcbc9a2e02e0632f7f9aa96849abede543773745e4652fccc503003f10cd68ddab594969ad36cb622ed7ba22dc46a80fb63ac2c561a80ae5c10b295b9f75d9536ba1ac24b8e9ae217611ffe79cb9422158475c1a89a51547d13c03b68d75ffb5717a35f381774567871e9e4190272c97eafcfa0a07a751d0bc8eeb0c206e12b2cff1065a3d5622635fa44c0dcb0722ad4c97e6b7d5844b2e9bab9ba1d083fa2930a3ea267d7f15d817e2b2e055ccfbaf019292f6156efd3a9a13ea90ecf59fc1bf35c6626db1c6759a50ed84acefd3cdb", 0x257}], 0x1}, 0x8000) socket$packet(0x11, 0x2, 0x300) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001480)="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", 0x2d5}], 0x1}, 0x0) 04:00:46 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x8806) fdatasync(0xffffffffffffff9c) socket$inet6(0xa, 0x3, 0xb8d) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000040)={&(0x7f00000008c0)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x90}, 0xfffffffffffffffd) r1 = syz_open_procfs(0x0, &(0x7f0000000200)="2f6578650000c10000000000e9ff0700000000000054fa07424adee916d2da75afe70b35a0fd6a1f0200f5ab26d7a071fb35331ce39c5a6568641006d7c0206a74e33326530000000000000000000000") fcntl$setstatus(r1, 0x4, 0x4800) r2 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) mq_open(&(0x7f0000000000)='..\x00', 0x0, 0x0, &(0x7f0000000040)) r3 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r2, 0x6) setsockopt(r3, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r3, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r0) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000440)={'bcsh0\x00', &(0x7f00000002c0)=@ethtool_perm_addr={0x20, 0x69, "3ac6a7be1146f1b82a29b37471c2335f9efe2f6853a7431dadbb66a0a63e7eb8801772f37289412b769e87e04cdea2e149004df07a48aed39bdf1f681271e92dbceff91524497acfe6d5cd22d44e62d88c82211ef49cfd0e7743bc7a055821ff1cfce9728d3390897c"}}) r4 = accept(r2, 0x0, &(0x7f0000000080)=0xfe0f) connect$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) read(r3, &(0x7f0000000480)=""/144, 0x90) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000340)='tls\x00', 0x4) setsockopt$sock_timeval(r0, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x2710}, 0x10) syz_open_dev$adsp(&(0x7f0000000240)='/dev/adsp#\x00', 0x101, 0x40000) inotify_add_watch(r3, &(0x7f0000000180)='./file0\x00', 0x9) write(0xffffffffffffffff, &(0x7f00000001c0), 0xfffffffffffffd45) socket$inet6(0xa, 0x7, 0x8) sendmmsg(r3, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x3a6, 0x0) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000100)='erspan0\x00', 0xfc) sendmmsg(r3, &(0x7f000000a080)=[{{&(0x7f0000005440)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2, {0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x80, &(0x7f0000005640)=[{&(0x7f00000097c0)="bf", 0x1}], 0x1, &(0x7f00000098c0), 0x0, 0x1}}], 0x1, 0x0) 04:00:46 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, 0x0, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000002000)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001000)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqsrc(r2, 0x0, 0x2000000000000004, &(0x7f0000013ff4)={@remote}, 0xc) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000340)={{{@in=@broadcast, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0xa, 0x3}}, {{@in6=@local, 0x0, 0x33}, 0x0, @in6=@local}}, 0xe8) close(r2) dup3(r0, r1, 0x0) 04:00:46 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) pkey_mprotect(&(0x7f0000940000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) mlock(&(0x7f00002bb000/0x4000)=nil, 0x4000) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, &(0x7f0000527ff8), 0x2, 0x0) mbind(&(0x7f0000126000/0x3000)=nil, 0x3321a8df32ee8487, 0x0, &(0x7f000016e000), 0x5, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) 04:00:46 executing program 2: r0 = socket$inet6(0xa, 0x400000000000803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000006c0)="0a5c2d023c126285718070") mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0xc, 0x32, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x0) connect$inet6(r1, &(0x7f00000002c0)={0xa, 0x0, 0x0, @dev, 0x9}, 0x1c) sendmsg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="2c7c579a7ae9c96d5cc9ad926a3eea1cf89515d52fc4300c0d33f21c491f50289b7a492cc0c90f234201a5c6f9b830f910b1902ed60d51ad019c73fc9065aa2c519f654874b01f87db4a2807b6a2c2532e9d54e219c9c5f95f", 0x59}], 0x1}, 0xc100) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000440)="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", 0x257}], 0x1}, 0x8000) socket$packet(0x11, 0x2, 0x300) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001480)="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", 0x2d5}], 0x1}, 0x0) 04:00:46 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x25d1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000080)="00000600000000000000", 0x0) ioctl$SG_EMULATED_HOST(r1, 0x2203, &(0x7f00000000c0)) write$binfmt_elf32(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x78) execveat(r1, &(0x7f0000000000)='\x00', &(0x7f0000000280), 0x0, 0x1000) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) [ 429.342289] dccp_check_seqno: Step 6 failed for RESET packet, (LSWL(215457355821139) <= P.seqno(0) <= S.SWH(215457355821213)) and (P.ackno exists or LAWL(189487651300707) <= P.ackno(189487651300708) <= S.AWH(189487651300708), sending SYNC... 04:00:47 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, 0x0, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000002000)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001000)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqsrc(r2, 0x0, 0x2000000000000004, &(0x7f0000013ff4)={@remote}, 0xc) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000340)={{{@in=@broadcast, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0xa, 0x300000000000000}}, {{@in6=@local, 0x0, 0x33}, 0x0, @in6=@local}}, 0xe8) close(r2) dup3(r0, r1, 0x0) 04:00:47 executing program 0: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) sendmsg$xdp(r1, &(0x7f0000002640)={0x0, 0x0, &(0x7f0000002580)=[{&(0x7f0000000040)="2bf1e4c0c2ddb587b62eff8015b6291d4f68a1a2a504e45e04a8a78af491c0ed89760f979b3d62cfe582", 0x2a}, {&(0x7f0000000080)="aeaa423f3462c23303f53bc09cd6b3f96ef349a5e86dd463cb876aa2a827f6f037a83eec915f858b6376608da83d04c4551fa708b770990f1ebbb2192476bbf759748cad77cb2aa2e450fb24a84053ec908fe481007c63a2ce1cf8ffd388991573a1cd021432ac0b6fef384f8feef48fcaa1b37b97243c0711bbe1b9299baa7c24c5e7ee4bb9ff956785567c087e7a65ebb6b50d26bfc4df240ba70babcaf0f9caff87946286bf6747", 0xa9}, {&(0x7f0000000140)="13bc812d14bac120d2b411cb22673566b1417c1744ebc6ea81c075a3680ca0e677d032e6e4bbb0470d2a731f1e4f2c61dc682e3dd5e7de7c01c0911a89bb7c9b4734f624c23e085afa30ffed45fda7f27ba3668aac0c847905c73e949b22932dd7a036cf172094856606dfead6557d36e89d31208b734465fc4d763c63f4789157ba8ab77ef510a08105f90cb7632fdd43c3a5e31d23758f71f68118a27b1ee09095c9f9dc628591fecc773a35b54a36becb9db831276eaea6d32a76271051b5ddc9647e100ff854c0c29463ef6cc16c3a7a3ffe7a56", 0xd6}, {&(0x7f0000000240)="aa1a5bb37ffd526e0f84b86397f67019d4f22f838bd55d21b41052edb066273885aea93b1c1c3cd1193def385eba15ae97e0a43789261c0053ad48e18df3855969019a2f5be7eb8d0754781d66d7ab676eb5e5fa262c2ad99b33916c7982ec839fe53e269f1fb86b895b4f5f4a6adf88cac11d9d9e223bad83931894f3f53d363c45893085225fb4fb35da8dda1b37c99ed61fc839357e05516749ef1ce0de96dc176639d56783e1347d7896b59f354abd1054f2ebaba791d7d040", 0xbb}, {&(0x7f0000000300)="784123abfef01567d884cdb836a30aadec9e0892be7a7261a19c6c3e77a41ea2b9f4c0ff7a307175e70d72c50bac7bcc561b7b36f5fe91b3f9ddd3ba9c274efc89b3454d", 0x44}, {&(0x7f0000000380)="fa69a93f3e951e215f99ac55b93817659822c82907de2df0446d3b4376d7807faf7d9e75a1a1e2d13167a39c277dc6341cefc56a2eb1910660cf475aa24f9370d8b60af5e278ea95098ba99570135611", 0x50}, {&(0x7f0000000400)="3883783e0454226466041c6a51a335a854001e472187a8ab477e0949ceaaca835b83254ee7dfcc65483209adc77536f72eb0a7d35514c7f1480767f066ebd3a131127ac654c49cf73f423e2c6820ac4f38374b059f64ee0809fb36b5653643eb0f71525f7532a1f6dbd7990f6e87f2db88fc937fe9f53ea94111f0fb9808e37bea5864432884b2", 0x87}, {&(0x7f00000004c0)="2de00ea03941d33c569738a408c0d3aad6d0aea75e843f92507ff0e1c9a392b89aea76230ab4678b389137ef7d8fac52055b092d3e2c4f225cb993b0d1902e6d5cb4354528b89123e341b3824239b27eac8ccbb56e483c2dd2c8507fd83ace134e8d17eaf9b92ae93ec0895a2191dcbd91bc54dc13304af35dcfccd1c535c3f12492546382210bf1e71034756ef7579688a83faec4eab8a6edceae49", 0x9c}, {&(0x7f0000000580)="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", 0x1000}, {&(0x7f0000001580)="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", 0x1000}], 0xa, 0x0, 0x0, 0x4000000}, 0x4005) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r1, 0xc08c5336, &(0x7f0000002680)={0x200, 0x1, 0x4, 'queue0\x00', 0x5}) r2 = syz_open_dev$usb(&(0x7f0000002740)='/dev/bus/usb/00#/00#\x00', 0x81, 0x101000) name_to_handle_at(r0, &(0x7f0000002780)='./file0\x00', &(0x7f00000027c0)={0xca, 0xadd, "a1c9c156047e505027df1cc92abf5da3326d243dcac4bb73b9fb1469911ff15c26cf947c9ea4ab74e649617710a6427cb1614036b80896392d1fd213808bec076a3713825daa326c701a5e71d742422b75269bd3be5623e2e4231f568d0e6ebde28baea85f3bc39c02c55a0952f82373a829796072129bf76441c8f6d6caaa1a479541f44da1b1bb3187e2878b6280fd6818c65264bb91f0d41b1528d1cd5edaf0b3853523927478376f5e07d0e74706545ca8ab2280ae96ed9fbae7d351c9479e9a"}, &(0x7f00000028c0), 0x1000) fstat(r2, &(0x7f0000002900)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r5 = geteuid() getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000002980)={{{@in6, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in=@multicast2}}, &(0x7f0000002a80)=0xe8) setresuid(r3, r5, r6) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000002ac0)={0x40, @tick, 0x7fff, {0x401, 0xffffffff}, 0xea, 0x2, 0x100000001}) ioctl$VIDIOC_DECODER_CMD(r0, 0xc0485660, &(0x7f0000002b40)={0x1, 0x2, @stop_pts=0x5}) ioctl$VIDIOC_DECODER_CMD(r2, 0xc0485660, &(0x7f0000002bc0)={0x0, 0x2, @start={0x46d, 0x1}}) r7 = semget$private(0x0, 0x0, 0x248) semctl$GETZCNT(r7, 0x2, 0xf, &(0x7f0000002c40)=""/58) getpeername$unix(r2, &(0x7f0000002c80), &(0x7f0000002d00)=0x6e) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000002d40)={'ah\x00'}, &(0x7f0000002d80)=0x1e) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r2, 0x80045300, &(0x7f0000002dc0)) ioctl$SNDRV_CTL_IOCTL_HWDEP_NEXT_DEVICE(r1, 0xc0045520, &(0x7f0000002e00)=0x7) sendmsg(r0, &(0x7f0000005140)={&(0x7f0000002e40)=@nfc_llcp={0x27, 0x1, 0x1, 0x7, 0x4, 0x1, "e32e911f11c20262a8faac7f73eef6f6a7fda020cda1e899005dbe52c1862e3dc4f3fb0b0c75b4a7160e9598f0e461d5f6b9328706fb98377c1b48a7fc2a42", 0x2b}, 0x80, &(0x7f0000003f40)=[{&(0x7f0000002ec0)="589cb6f29b0d23761689deb5a86ad40a0360a2fc95f2961f0f1b6f04e3ae47fa37e4506a56dd617c901b09d1cc060e71c814916a71154122abe4931f00ad821a596047eb189f08b4", 0x48}, {&(0x7f0000002f40)="300dc471a46fd799d85535f033b7675c91cff79180d553211e06aa044ff4b1ed176963ce0ac56a61ffecb37f8a5304d1333fa7f0e916fb87f0f93087ce2d65a25e19b4c5f30de1da7ba85eb1a791afa6babc1475052cfb7f4fd0bc377935ce82d4b67ff12c942d5af0f83ce67fddeee0f30ffc4adeb36fb843a1a4bb0826432a9ed076298e368c379c4a41d288d2707b87e821d3bfef46031658b69cfd49cfbd3fdf63f6cbd4145a2cdcc5fb7e32089683ec2fef027f9ef9687a64e7fa8afe9a914cf28fd7e6f2f95ecaef71e893ff80da71dc73ced6d51692c0c45ea4b544c0c0038b48317967a7a15abec425cc4c9ef4ff71207c93ad87b637576e0a3df64fd811e332e8fcb81bc1ad4f7c604c1e07cdd77b5d5d191159e67730f2a177705d8034a7d0712e0ceaea8f4def184cdb764a89a8c4b62e28a954ae05be4dbe5f32cef5d8a80b953d9167b935e939ed220fe696fb82d2cb8f32911c8cee39e75954deef99b85b030d376599acf6ee52e4a6c6b1641e8cf9167b69c40da8a1ef991de1a17c61e4246cafe03436a401d871db5376bc1ad3542fd7eb1b856267d11c544ebbc3d8a8a36b58692aef074860c7f72fc24e1598771cad5c4fbfa023041cc599ab563a344162cd8b888c26e95d32f84710c0e186ce8eef997f98915981945d3f2d3362a10b9bc8119ecd39124ccb535659f46fa9076f20da2861b95d5d4968e79cfc9c62cd50066bee9bf5cdeae76ff19ea22c8a85b2aab7ced0c692ea2bd4b038ac8561bdbb0deed80d5001bce674402f7ca208557e7740c7f0c97f3456ad4250981a8dcbc0921b6af0286a31527e327c77f2026bdc29a907c1eab27f00531daa089ff1aa656788c70cc0a6a144ea24d5801a8eaf252c3e109efcea9f3ffb102a806fe3f75b16671c4498fba6c1cd5d88916678e0ab5ca811bc05d2677acff5083bb028b42eab8049cd2cf31777d7116230c905a322bb282562683d17e29badafb37ba9c5d10ca598363f7d12e410d495f534eda3faa56e3043944d2c87d0c8be394e1712052b3adb512064c9fd1b466100f251e80fb121c73bca83e10a0b33b94fbf44bd629bfc9f23dfec65f3cc55178bff1b01c7b881cfd6967fcb8578bbe42d7a137d7e1075a63fb95a926b05468cac7a5c36d34eceb337b205467da778cc77ae1b6ffd20d1fe8c1696ccd24bacb47114ad3b5276ca72d9fa6661812a9016ae60eeba879ed6f9842136d086ce2a980765b902034bdfb8b9ad3716ffc51fcba6f2489a990fbb8bffb649c6158985b9ee379e0ba1b0c56dda91565ad890c335309cfbb5721315defbf5f3f5766066f08b0e7bb7e7c0c70c3706134d6b56c6aa1a8ccc13db8854d41c50ba21bea94c12cd3f74bf403bd0b341d72e172fc5b251f7da595952dbdaa5d5456cbe08db4785d80ca347e9f146bf3db9f2801e4bd70939a995bd4079dc10cf832a4ad939cd81cee836616abeebbc3f47e3082b8d78ab51bf417dcf53400df6c0f3b2c4cd887bc5b448a26c178f0d38993aeef0ab3379ef4d86f7ffe4ed9bec49fed199d4006c3c21b58b8fd74833b8e973e035bae7a950d3e2fe41be656568a6e44dd072c8334238e5a0653e6da7bf170c61a53706d71d69237510f224ed08ba6a1e8a3ff49c6eae47c711dad7ab557feb9f7357d91dd37b025e9ebc1ab59645c3a8d90b0c3b273208d8de1c1ad6c8ad74f348930a6e907cb8e11f6f87d4ccdda85837902b47c5a93cf13f1a99f2d106f0f91dced3cc81b037cfd6a857154b3d7df0e48c4d43b76fbb05b6fbec96aaa8ace68dfde3833500c1d2f36a3a13eb31d069572fae07d23f4db879699e3e790d9b0de587e881fc78ad086d105721fbbd59c81900236de03e633b233d8484a143ec7a838d8bc2c9dcc64ecda6f3e12e9c62380a360c346c413695a920ac2865702b09dccc8e502b80df18268c776c13a44f67ac8ad172a86bd5aab7c28d3bfce7726ac68c56f6ad56b563b1dae5ad601aa97767ecc4b2517a9ff7c3dea55b9f0d01e8c5030c6c4a891e45e7e3d964c2ec4cbeea200c4a3281b655d4682ff3affca644d36921bb9b15ed9076b5159ef8ff7efbc2732b12d4497fbc2cff28408203f3a71d575bd2390e43d501fba599a91acd0583a287c2031fbcd87f9c1632a6a1975681a8c27ee0b2252d18ccdae88c9d9d2347f3ee6e92b1b8a892ba76711aff7f3cc01edac9939e532840cd3ebb8f332f59b6319ab6c07138ee433ec398f82ad4898dcb511a483a98b617fee359c90e02f555cb1263ce6d24b03f1365309a201c8184e13f46dd01fe770e85317bac90ba0542aa4e5d3862e249d61248b7b3f7ad7bf424362232e9e9a4fef7cf84fbef9a36374f071baaf5f8227b41e71e469b089a229a65b300d7729fdcb07992a59ede9bbcc56f488e0014ad1c3016914e36cc8278d1c95c1e157ff81339ce979a944a76b69b9c64f380b652cfe45cd5b504612332c84a497bf7bf90ae51ec30fbec217ee711f3ca8081d654b0d9a6fb1895b9405d5dc05b3e067d5a949a51ac77694a71618de3e9b1e98a034932a3a2950091e6b651627eeb4a92d8171a8f424ec357b6cceb659f72cf909243d9c00fc17f2d4c288afe1b66f8410e979b530fd6761ab916db0f088a033f4fb104948d0176f590f3394e4864903f171a792651626b8a74b033e912852aba77e1adc4aa88479da08c2b2b4bd5e66b505a2e3343740dbfc67b1792166196250de2827c71c8e86a1ec4c311d1f87144c5c96e2215baa9d313d02eced2f4376d1bbf88d9df03d0a7bb674b169bc96d183b39939c29359d9d790c494471c8f4bf36baa174ca7f0cff10020c924abaa9e3672cb591bdef5f7cc80ff77b9cc31bee826e54ac8c3efcd4e781f37e3d549fc6bd38893d69e86553a36169a8f2dcf55c52c3c48d01a81dad1ddb83487eff9e7901b95ed09ba214fc535ae26436c86a07bfd73f5a1146426b740e28be9fadb6a5928ee8726a2a8e85b1eeaf4d023b22d0c1aaadcdfab16dcc9b61d859efbaaf30571b8bec212b9f993c83e2a8e0f91c38d1d290ea4050e1a74a938afc7cb1d853fa451f6854deb7a054d126e1ecbc0dd5af8e1dc62c6e48964c92cc31db51f94c3c0bc5dc457fcaddbfe9d627e03e1c2183d92e9fbd36d72a58f41074acd4f3ae7ba1f104866fbdd5ea65b6a84efeabb7ef4d824b4f20e319919e426c775bb199bd2e8a2570ba1a43375f0a283d40b2cc5fa914d3d858f8f99f6375aa7c7335bacb33e8e7522b1d9791adf13b0c3e684ce3ee4e1a8c9fb5e7cc752ac6c7075bed6f8b915b2795f29463b978e73cfeb6f049e5163485a003382f1ca52cdf2e87fbb610c47056fd68c0528601f23f21830a556b35e48b00e4cfe20eaf0a8b09b97d655bfc594464fbdf2e2944c20bd945b37a89bf2e8221bc86508ee661942b8cf550eb61d33903a7987436f92a6f4c426b96d4062f2ad30b04c8ded04248e4fd1c6c4ae22c9ca28802ac28a1d4bbdf9049fd40a053debc755ad1f9381f8b707d343cfc007f0128c04cdb8bdd22fad68e6a8f29659b8dcd0d5d621591017d3569fb111d81c6bf5de0aa94a83159cd0d80be7b3faafcee58243807fa70db20ae847895cdcb298d812c0bc9cd32489fb3e0517a530dc8ea22d3d9ffdcc38d057957a486778a78502a3c2ef416ba9c8ebbc792a811005cda34950397704cc2a1e6e21e1dfe77d324e41dcc48269841effa1c0a690abd51af53d24f4246053f46dee74142dfa99ecdf15387304cb6a1e781650b4029e8fd02621119bab171c3c1a953476cd9595bd0971e10e032f21c29ff324bcc9046721a7c6f1ca69df499d825f2d4f97f477159b958bdf3782cd37e6ab4bec61a17dddd0a6f24638582918f6b0fe765892dc17e7d55b1deb3a21818a8a94f06cde741d0e3d00bdf66885ad4d32989b0af92b979456e612f89f67dbd8b0a188a2fe4ad3408f32c3c60da0caac759bcca411bf07cb836e422de21511a3dd00752c46c895f65ac8400da42df1c92625cf26b579338a8f7bd3fb684128bb03046f209c2da983443cdcd368232f73f5484c033377017f478cc62a198890254b241c731d14f2c1cddbc30bdd115b425b5e73e52f20f7dcceb64fd3482117daf2bcb3091f9363d82d920fd5a127ea8426fd596d1841093f5f775d23298aec2789a9c2d820ddffbd4cf4d2d855ed14ab1fae95c91009d70823dc1a2a79033ba5c3048402e64d3713d883bcba283b8dc37e81919c3735c41d9ea9d4da8478d6ad41e8a7024b8b0e33b03a540c4143644a59df93b67a12145777c4541d990f7a7163ec05eb7dfbc8d8549374000cc3e61bba777626d5c8150bc0aa055de3496eb3a1057fd6a94faacf11307de5afdadc198710d0452446eb220b18810defd3db5aafdf2855807e56145055ad3d0b70248f4ac426473cf813779ded776fe90503f77fed0c46b2f25c83b2d80c7d37db83786cd480e935b5fd15828a78a630670c995772f3b4c1adc3150a6eb40c0c1878bd554b242ba094a607ab0cd36b8f7a03970d518e6972e5f4528f88ee51ef43a95a496b89aa45631c319a01774c5c64ecc67bc64f319e2b0f143d27f08a7e7d612a29e7227eacd31c5c5c5b98882436a394143284302c176be53f2a44ebf6b0937bd1c8b63ca7f8947014ce4d832e13e3577f06a8982dabb9db49322e23672691d99ea383fa6283875e6433cb06cd34aa916796e917a4a3a8cbfe16d25d76fc401fb2275e12a2c127702a3f2bb807316556ae877daec931452822b91ee9838d110df33aea21712812acfa735e3ca4d758e530d36714821038a2ba61b37510b3b179934c811e05bacddff204f5fe82498f5088e1f0c7b1cbbc57ddd2882cc4222032bf1699b93df5385290ee5a1c5d34c38bc1b47bb0495a27ea3487e04b9eaeee08ef4954c1d074553bdf55b307ea8f78f48e65dea6cf4824da1d5d0d545da7b74824ffbb6e6285f7cdca7cfb38ab964863d6dce0421200ab39ee5c3149a00ecada916dafac712546bb5c8c5d6e76d2e81d25a490d70aa7b5d164f796936042cf02f604cfc8a1f4b3eda7536ca726a2dc54de12b67a3799a76fe210edf3324b082912f933205d68c13765d2e166d65da982085939a99da0f4e7ba7e3b7d0b6b7bbf36423df7b0ed88ccec86d6b7f90dfe74f9f916581d49f067307e735af09ae3036ca70a3cdc971c094ccfbf96ce7f67628f13133a6da089df107fea95c96e6316615927250eacedb7705ee067f09f7cc001e77c2a27840988b84e2b559c81b41e4fe7fba8b86cd1b5c7bbe7c940a2a65de5fb9007c42d081803ebc2eae36df7d5d90f5f045ccc5db76495f33dbb5a310ebb18b47d1c35ab022c8e8907411443adbefaf890d6b8184646c1c7b0b3b3a5c82c1fd712826587d6444aee4cb2203d2178af5ee64a16e94fe2dc33f2f85d193ad935466de3a108e105a7dddb1497ccf63c0081534d43f5f3cb7aa91229e5ef2c5ba7396f37b95df061aacee82769c98b5abe85e192321119a5f8015980eec2fac5eeea5b936ab8c20f0aaa4dee8ad79d287df378eba498549b0b75409fab3c5aaa45ceaee075531a202f2d26930e9f2989ed25c5fb9520a40e3c27f1d73eb5019deef7e06643c510709f4863f511ad700aec18ed423a21040c067ac02ce566e4e1a6fc8dc8f10f9c177b30f87d022c49aa7719a5c2820cfa2d09da552462ce80b7d9d700d009143b99ecb2c76fdb8cf02554d1e27244884be086aad64c149005522abb41eb0ea24cce270d666f9", 0x1000}], 0x2, &(0x7f0000003f80)=[{0x1010, 0xea67217902dc70b7, 0x80000001, "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"}, {0x18, 0x11b, 0x3, "a831b36d79"}, {0x20, 0x0, 0x7, "fb9d978aa4e9fe1cf17a3053e1"}, {0x28, 0x119, 0x0, "83fcbfd6951b1e293d4a408512346e5429535fe8d563"}, {0x88, 0x113, 0x1, "dce9482eea070c37dc6456752658e198c543d3bd31a93b6ce53df6cac164a045e262719f8a385e4881a1031069ba9168cc68eebadcc935072323437b62000a49097986b6b8f6e4a2c735c30137116ef11e13a5adebce313d465497faaf47b19ae27aec26f39eb26d89460e9d9b26560e76bb283e95fe8c"}, {0xb8, 0x0, 0x2, "075bf7b475cced4617254df1826cdae88db68a3627e8d8db9bed4b2d99933dfe58bcb6723be034f30dcf95d14979cf36275603c67dc9a4dd98a0ba14c9b3206a058b6adb25ae9e7579cc11107f42933f75e28122e627ea244144a4088900fa721d9a056bce43ca4ae4f8678b8a2d7910156a82f213bf600b1f63a6417e872190111cb41306f9c4897a6b2ff990076e522ac886dfbf9721bcf53240c0d6ca7f0f8356"}], 0x11b0, 0x4000000}, 0x4) ioctl$EVIOCSABS3F(r0, 0x401845ff, &(0x7f0000005180)={0x7, 0x5, 0x34d224a4, 0x5, 0x3, 0x10000}) modify_ldt$read_default(0x2, &(0x7f00000051c0)=""/4096, 0x1000) sendmmsg$alg(r0, &(0x7f00000083c0)=[{0x0, 0x0, &(0x7f0000006280)=[{&(0x7f00000061c0)="18b55232571f46385891b2506304692f8cc22f4077634119b9f3408208cbd0a5c540106c18569c83f070dcd59af57fa1db1fd5aacb28eaed3f4f952e2b25524df8ba793c38aa9f72b121bffd1b", 0x4d}, {&(0x7f0000006240)="4138590e3d97249040c43a9f16", 0xd}], 0x2, &(0x7f00000062c0)=[@assoc={0x18, 0x117, 0x4, 0x1}, @op={0x18}, @assoc={0x18, 0x117, 0x4, 0x6}, @assoc={0x18, 0x117, 0x4, 0x2}, @iv={0xd8, 0x117, 0x2, 0xbf, "e42790e09986ad2f2210b5bc4db7eab7a5d6188b47f516922055fe6d437b9d7e9dd55ec880cdeb46f51af1a21dba2d8235fcb70f919dc967a7efeff76f1735a1c1badbcc2ef8ceb97f11abf1032ede58606f680da0488a2d46ea87df532084bca4101399828609e13ef9ee463eefb860d5c24a755582f950991bd10b56bbecf4238c94bce9db17e5db006fa44dc8e59f46da5026d481a59f88859b8f2922e0aad89e7315c1028ea28dd443d14388cdfbab22bfa970c2a899dacc6333af93b8"}, @assoc={0x18, 0x117, 0x4, 0x4}, @iv={0xc8, 0x117, 0x2, 0xad, "76867de60b6ecd60fb5c316da9d3d810217f3601cdd43359e7234b033aea41a724c0afc19f1cda324be74f3bf6c854e4d11af046a3cb94f4813c01ede72c86071e68736f6facb306d89acdb5476ad0ad9508fdaba3077b507ef4a32fd542b931f6c61462ce0315c5174ed3fcb5cb464bb4ebd2b2915d3183e0a2a00242796dc377051c69bc09809677340130bd4d51dff6a3a453ef960bb7df52d38c02120c17cdf790ce8047dfaab135b4267d"}, @assoc={0x18, 0x117, 0x4, 0x7}], 0x230, 0x4010}, {0x0, 0x0, &(0x7f0000006500), 0x0, &(0x7f0000006540)=[@op={0x18}, @op={0x18, 0x117, 0x3, 0x1}, @op={0x18}, @assoc={0x18}, @iv={0x110, 0x117, 0x2, 0xf6, "a1e50d9eb01e565ea636d273af1b4753dfd03cb6aca7ee243a480e25686695c8f204912821f2f724e2baebf70f99526ada507842cd5561da27833a207509c67339c9b532a1863f32311dc92629d7d16959ec1a6bb278d69c673e537034e7f0ef39035ef4ec3e27d143c298f9a9112b5c5efa6818e5f118d687dcac28e33d3e1d3b9796a1462730fbe06dbd1ea650813ae44da6ed029fb4a04a89c7c7722e20229f6528a506dc887312049ed592329a0de8eb9deae2c62fd5d4d5cbe8efd04e7b2b4175407b9fc5e1c943fb8101065860a1a680c35db56b5ed3f8299e3723f6fd12fce45d4787947da64b07bc8fe333ec350c1902a33c"}, @op={0x18, 0x117, 0x3, 0x1}], 0x188, 0x10}, {0x0, 0x0, &(0x7f0000006c00)=[{&(0x7f0000006700)="e55511831ac1b288f9cfc465fe1f8763feeec0ffb999a327a6ff55f85bbdba88a7c151f0646155dc06e2bdf2fde43d6d7a64b43c912a6b5ec0963d6d655ae91dc403", 0x42}, {&(0x7f0000006780)="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", 0xfb}, {&(0x7f0000006880)="a850b3c0a99910e231d0db1145608e9e4a26926c1a51ce9f5f73cfda7d9cd9267285f6025231ce32796c327526346d8f365c94d11dc6c5eaf24d9734e08b2efd7acc26e04faf8534815a08fa93f26ef9002b75d45d12413c99193dabc6f798e0a7b66e45ab3b28835905e8ea0a2ddefc66d3771229c39d6f85b1b5285a40d46193811be0d6384196c5103fba3cf4ad84c0288e807b54be818e740b4435790ab897e10c3996490e0af99e6ba12eca68549c4f856d252a29cdc8d8348e964ee7c229ef426f7eb1e75172c0d4181352babab83b24c8790199c56687eaf0a83f8bb9360d7f1fb7499fc8e558233080", 0xed}, {&(0x7f0000006980)="3db1ee477b2053e3f18ec38d8a84acd8ebfd679bafb3e288f33aaed81daa8ab21d8c55cec5fe0a01f0df0f1ef69b7111b80cd91b65ea15349e7efb33d86c5cd9e00c281ea95286c78d3727ba1ce8855df498b170d7ff84b7e8d68a04ae45406a8ea43885a0e6ecf399db4425be978d8ef476a3e0955fc196b515f0a3b279bb028f5729cfd82708edc7aaf1d44974fbd3fa6ffd3945eb94f70f94af866a60ab073508f57aecc9ec473d", 0xa9}, {&(0x7f0000006a40)="ee157ecf32214dd70c854c517e060ae513eff8e95574345b48adf19b1c48425a2cbafc54dcbe3f45aca0c29c5a1ef0b2cafd3756b2ac678048fc9106775675eb1a6f2fa50b1b7be1ef5849e6a0afdcf73d43301c4336bf7b86d3419e7fe53c64d10dacc00e8937b349a2e24f8f0d120cd5771b68804d932ce51642dc2d37792bc7ef73f58769d915f24be9f227ffbe0bae2ed0793877227b3a6a72b8ec702a86aae272ead12a754d8d2ffc8df69d", 0xae}, {&(0x7f0000006b00)="39449f91a21258395d4f812c4c8e309b9133e8bb4265e11eb1c91dc475ec8a864d35d8b487e2be3264fe200a85ef6d3f8c9f2d8786597c00a759815af9201808b604312f8e401b000bd58645a7c89011985e25d35ce9452972fd6da245de", 0x5e}, {&(0x7f0000006b80)="0e7efba7f5aaea4ec1e56bbbb1d1dcaccf9fa0c4b9e09671314ba104324c880ab6622754d069084a0f474e0f464bf39f5fcad7ce8c3eb989925616b611b1dfc8f3f0ce999bf736aed9d85bacf3117147fbc8fe506f56c595de3b3deb", 0x5c}], 0x7, &(0x7f0000006c80)=[@op={0x18, 0x117, 0x3, 0x1}, @iv={0x1018, 0x117, 0x2, 0x1000, "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"}], 0x1030}, {0x0, 0x0, &(0x7f0000007d80)=[{&(0x7f0000007cc0)="0a9657cc4c675255c014d3b39fd7e07dd6f747ac95d3439f47a407c16d62edf3b6b48b1ad80e9df2561372f7e47b978239c24d98cd4922a13f0f6c40d25bbbf550", 0x41}, {&(0x7f0000007d40)="491c0f84a0e53b037b", 0x9}], 0x2, &(0x7f0000007dc0)=[@assoc={0x18, 0x117, 0x4, 0x9}, @iv={0x48, 0x117, 0x2, 0x2e, "881007b1f255b7910d945c469b93a54dd5ba958e81e3f106cb0647960bf5a1159bb1a6a1326d3a70e2163b47ff05"}, @iv={0x40, 0x117, 0x2, 0x25, "33a440ee57ec5d41b971ca9df86e3612f5396fe94b5165da9f9197af9033488476d37ae716"}, @iv={0x70, 0x117, 0x2, 0x5c, "83b95783b8f63d8001c9371c2044c35390630c3176e91470d601369b62db223caa7a0181f062f0c2dfb0fc86feda1be574053b795da2a2a69de2a81b42fa7e30eafaf5a1a24a1281ff03101930d7c4b6f05a7ec96de2dc16183424a2"}], 0x110, 0x40005}, {0x0, 0x0, &(0x7f0000008100)=[{&(0x7f0000007f00)="1bb0829d157b718526e27fcc46d1a3a422f56ad8298903342a3201bcf7e18d50b3934b9bcc23e5176f2d228315fc164879c084ebbd6163b9cba7a5702268c9c083b73ebc82001b7ddf4a6d4a2a1b3d6644fbac8c308212390d09fd0a", 0x5c}, {&(0x7f0000007f80)="708baf120b823c25c4f4452d75c95f4e8301856c229a0db4e35ae032929a1413a8621e6ef0532a7caf0d17163d5c901644ed79fe290ac4d0aee223b2e9115e3d1efcf6ba305d12595fb961394d7528d461cee2d35691de89a7e8b97da8e55a89f8d7ad1f69f82a80c6d1ab71e42f1218916461c6cdad125d0f97a57b14e53911f84cf84ca72e665ff2fe68071aa9", 0x8e}, {&(0x7f0000008040)="2eec352b14f24e1ce0eed3906f62291f1a7f0865854c4438ab", 0x19}, {&(0x7f0000008080)="228d867ba39472729e23534cb69f5a2838b7013c636f154e1fe01746c6172a664d24bec5271276539f651f169d69085c3656d945db55278e7cff6bfa1098f30dc37729de943756", 0x47}], 0x4, &(0x7f0000008140)=[@op={0x18}, @assoc={0x18, 0x117, 0x4, 0x401}, @op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x2}, @op={0x18, 0x117, 0x3, 0x1}], 0x78, 0x4000000}, {0x0, 0x0, &(0x7f0000008380)=[{&(0x7f00000081c0)="1377976a9e5df04257c8dd8f5d3e52632a4fa21eb5f9e3659a4bb5c156599429d32d008a19274b9f6b53e19bd2650a28be468f5e34f7b38a779e2164de5fa64f6d2eee8ac386077014419102c0a0e22fb8820dc280bd9d189b7756556c39379b48695266250ecad44b121f13edfca12e540b472ebe88cbc6e06258b4c3e3ab55ecbf10e65545e266085570d745", 0x8d}, {&(0x7f0000008280)="204a7984d3ff21511a6a41a888eeb3ad9b51aa124f662b9f1a704dba08c851f218b8cadb5d9f1f0b8b58489e110140bbb8cdb05fa6bec9372ba62b641c0f701c33763e136df27afff820f3105c70671d6283b880d4448e16d56b910d85fdf543592612306d85d7d8de92987d5864f9c6e5d9ed3421ba352e1e61b1881be41534102874aeb3171e752e1529414929e5f8d34cb86cdf38b021211d4bd03f35a40173fe483ef15d23f82c9cd6f4d5e06e08339ef51dcfbfa7c696f9da4629d3a5d4c4368d3d0ec40b7492ae4e46e51a8114c25396216ae2dc0b08eea1d30579514ed8a4fa69aa1387c8fd55d6efc1", 0xed}], 0x2, 0x0, 0x0, 0x4000}], 0x6, 0x8040) ioctl$EVIOCGMTSLOTS(r0, 0x8040450a, &(0x7f0000008540)=""/162) ioctl$IOC_PR_RESERVE(r0, 0x401070c9, &(0x7f0000008600)={0x9, 0x80}) ioctl$UI_SET_EVBIT(r2, 0x40045564, 0x1) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000008840)={0x0}, &(0x7f0000008880)=0xc) ioctl$sock_FIOGETOWN(r2, 0x8903, &(0x7f00000088c0)=0x0) r10 = getpid() r11 = getpgid(0x0) sendmsg$unix(r2, &(0x7f00000089c0)={&(0x7f0000008640)=@abs={0x0, 0x0, 0x4e21}, 0x6e, &(0x7f0000008800)=[{&(0x7f00000086c0)="fe633f987a80fcfd44ada3d86832877183657d6c3748088bc96585103ffb77d90189748fe55a3c9c506c91dd146cd1f4ed27fe73afc41e7c242c32feacfa49ccab82bec7d09eb94e1d91477e4ef48e6d4603ab15953b59c1d90597c4e14a746f0738be1d22e303c2844200c8ac205e638d07a6c00fbc9a095114db6ffcbeb2423c5439fe4f2e3b61b84c5ca12c9bff07633d703eac84377dab6364714b1a4e487756beb0f72c9aa2257b", 0xaa}, {&(0x7f0000008780)="91f5b2f31bdff0a955ccf8de9aa8c49f7c0045", 0x13}, {&(0x7f00000087c0)="a25412bacbb11491ecaa6b4f943bf84e9bf59a615d517fa3", 0x18}], 0x3, &(0x7f0000008900)=[@cred={0x20, 0x1, 0x2, r8, r5, r4}, @cred={0x20, 0x1, 0x2, r9, r3, r4}, @cred={0x20, 0x1, 0x2, r10, r6, r4}, @rights={0x30, 0x1, 0x1, [r1, r1, r1, r1, r2, r1, r2]}, @cred={0x20, 0x1, 0x2, r11, r5, r4}], 0xb0, 0x20008080}, 0x0) [ 429.808796] dccp_close: ABORT with 1061 bytes unread 04:00:47 executing program 3: clone(0x41fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f00000000c0)) syz_open_dev$rtc(&(0x7f0000000080)='/dev/rtc#\x00', 0x0, 0x0) ptrace(0x10, r0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000000)) getsockopt$inet_sctp6_SCTP_NODELAY(0xffffffffffffffff, 0x84, 0x3, &(0x7f0000000140), &(0x7f00000001c0)=0x4) ptrace$setregs(0xf, r0, 0x0, &(0x7f0000000180)="a96d55a756") ptrace$getregset(0x4200, r0, 0x2, &(0x7f0000000280)={0x0}) 04:00:47 executing program 2: r0 = socket$inet6(0xa, 0x400000000000803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000006c0)="0a5c2d023c126285718070") mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0xc, 0x32, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x0) connect$inet6(r1, &(0x7f00000002c0)={0xa, 0x0, 0x0, @dev, 0x9}, 0x1c) sendmsg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="2c7c579a7ae9c96d5cc9ad926a3eea1cf89515d52fc4300c0d33f21c491f50289b7a492cc0c90f234201a5c6f9b830f910b1902ed60d51ad019c73fc9065aa2c519f654874b01f87db4a2807b6a2c2532e9d54e219c9c5f95f", 0x59}], 0x1}, 0xc100) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000440)="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", 0x257}], 0x1}, 0x8000) socket$packet(0x11, 0x2, 0x300) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001480)="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", 0x2d5}], 0x1}, 0x0) 04:00:47 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x8806) fdatasync(0xffffffffffffff9c) socket$inet6(0xa, 0x3, 0xb8d) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000040)={&(0x7f00000008c0)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x90}, 0xfffffffffffffffd) r1 = syz_open_procfs(0x0, &(0x7f0000000200)="2f6578650000c10000000000e9ff0700000000000054fa07424adee916d2da75afe70b35a0fd6a1f0200f5ab26d7a071fb35331ce39c5a6568641006d7c0206a74e33326530000000000000000000000") fcntl$setstatus(r1, 0x4, 0x4800) r2 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) mq_open(&(0x7f0000000000)='..\x00', 0x0, 0x0, &(0x7f0000000040)) r3 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r2, 0x6) setsockopt(r3, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r3, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r0) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000440)={'bcsh0\x00', &(0x7f00000002c0)=@ethtool_perm_addr={0x20, 0x69, "3ac6a7be1146f1b82a29b37471c2335f9efe2f6853a7431dadbb66a0a63e7eb8801772f37289412b769e87e04cdea2e149004df07a48aed39bdf1f681271e92dbceff91524497acfe6d5cd22d44e62d88c82211ef49cfd0e7743bc7a055821ff1cfce9728d3390897c"}}) r4 = accept(r2, 0x0, &(0x7f0000000080)=0xfe0f) connect$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) read(r3, &(0x7f0000000480)=""/144, 0x90) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000340)='tls\x00', 0x4) setsockopt$sock_timeval(r0, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x2710}, 0x10) syz_open_dev$adsp(&(0x7f0000000240)='/dev/adsp#\x00', 0x101, 0x40000) inotify_add_watch(r3, &(0x7f0000000180)='./file0\x00', 0x9) write(0xffffffffffffffff, &(0x7f00000001c0), 0xfffffffffffffd45) socket$inet6(0xa, 0x7, 0x8) sendmmsg(r3, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x3a6, 0x0) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000100)='erspan0\x00', 0xfc) sendmmsg(r3, &(0x7f000000a080)=[{{&(0x7f0000005440)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2, {0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x80, &(0x7f0000005640)=[{&(0x7f00000097c0)="bf", 0x1}], 0x1, &(0x7f00000098c0), 0x0, 0x1}}], 0x1, 0x0) 04:00:47 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x25d1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000080)="00000600000000000000", 0x0) ioctl$SG_EMULATED_HOST(r1, 0x2203, &(0x7f00000000c0)) write$binfmt_elf32(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000000000000000000000030006000000000000000000380000000000000000000000000020000200000000000000000000000000000000000000000000000000000000040000000000000000000000000000030000000000000000000000000000000200000028e9653bf5f378f24e50b960"], 0x78) execveat(r1, &(0x7f0000000000)='\x00', &(0x7f0000000280), 0x0, 0x1000) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 04:00:47 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet6(0xa, 0x803, 0x7) ioctl(r2, 0x1000008912, &(0x7f0000000000)="0a5c2d023c126285718070") r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r4 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r4, r3, &(0x7f0000000000/0x18000)=nil, 0x0, 0x1db, 0x0, 0x0, 0x0) 04:00:47 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, 0x0, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000002000)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001000)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqsrc(r2, 0x0, 0x2000000000000004, &(0x7f0000013ff4)={@remote}, 0xc) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000340)={{{@in=@broadcast, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0xa, 0x6000000}}, {{@in6=@local, 0x0, 0x33}, 0x0, @in6=@local}}, 0xe8) close(r2) dup3(r0, r1, 0x0) [ 430.179982] dccp_check_seqno: Step 6 failed for RESET packet, (LSWL(22657905782112) <= P.seqno(0) <= S.SWH(22657905782186)) and (P.ackno exists or LAWL(272566881449420) <= P.ackno(272566881449421) <= S.AWH(272566881449421), sending SYNC... 04:00:47 executing program 2: r0 = socket$inet6(0xa, 0x400000000000803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000006c0)="0a5c2d023c126285718070") mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0xc, 0x32, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x0) connect$inet6(r1, &(0x7f00000002c0)={0xa, 0x0, 0x0, @dev, 0x9}, 0x1c) sendmsg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="2c7c579a7ae9c96d5cc9ad926a3eea1cf89515d52fc4300c0d33f21c491f50289b7a492cc0c90f234201a5c6f9b830f910b1902ed60d51ad019c73fc9065aa2c519f654874b01f87db4a2807b6a2c2532e9d54e219c9c5f95f", 0x59}], 0x1}, 0xc100) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000440)="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", 0x257}], 0x1}, 0x8000) socket$packet(0x11, 0x2, 0x300) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001480)="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", 0x2d5}], 0x1}, 0x0) 04:00:47 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x25d1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000580)='/dev/vcsa#\x00', 0xff, 0x0) ioctl$EVIOCGBITSW(r1, 0x80404525, &(0x7f0000001700)=""/4096) r2 = memfd_create(&(0x7f0000000080)="00000600000000000000", 0x2) ioctl$SG_EMULATED_HOST(r2, 0x2203, &(0x7f00000000c0)) timer_create(0x0, &(0x7f0000000500)={0x0, 0x29, 0x4, @thr={&(0x7f0000000400)="499d55c4c4ac97191b53f41049e81be0860341b86de13ae68062cf7cee73c7f1db3527615891fd447c0a0dfaadca69d1b806fce0b37b0e3abf2d0ad1f9569a9dbcff92ec785581892e1d98788cd2a1e7f99f55990b2cd5b177fc487c9f1781ea50835bc856b62c6fcaf068b6430e723113cb43e3fc03a2bfe9e72b9597df0f3fdca6ab12a7a6624ec7fe537249a4dcc519a3cd15277c1786d38000d6db6d6d11f820f0b7fc5045a34dea", &(0x7f00000004c0)="2da80e0051dd4a488bb583a01139c1a473a0d8b9d0a6120811dc549fc932570f410ba657acbfcd7ccef12d601f"}}, &(0x7f0000000540)) fgetxattr(r2, &(0x7f0000000380)=@known='user.syz\x00', &(0x7f00000003c0)=""/24, 0x18) write$binfmt_elf32(r2, &(0x7f0000000100)=ANY=[@ANYBLOB="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"], 0x78) finit_module(r0, &(0x7f00000002c0)="00000600", 0x3) write$P9_RFSYNC(r1, &(0x7f00000007c0)={0x7, 0x33, 0x1}, 0x7) execveat(r2, &(0x7f0000000000)='\x00', &(0x7f0000000280), 0x0, 0x1000) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) bind$alg(r1, &(0x7f0000000300)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_hmac_sha256\x00'}, 0x58) r3 = getpid() bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001680)={r1, 0x50, &(0x7f0000001600)={0x0, 0x0}}, 0x10) sendto$llc(r1, &(0x7f00000005c0)="3208e2474cf6ef885089a549115eaaac593685d03a3e3fca744db181c608bd8a917fce941a8664ba787a18d2297244cfd6e2cd072771cb74f28a7116785e8f7ff2c305e49032a329b750ce47165a7c923bdd4b4f3bb2a49da3ddbb28e2012c8ee86d2d59cb600c7abe90ad7f26026af9aed4b46bdde32edfc02962eba50f0eaf9a86bfa6d419a5f6fd5cbb2bd068d241cfacbb94f4b113e36250562689a30a12133eff338a7fded0ae95c91151f57364e75cfe573efefc6c925842b517fedb76028c85bc0527bc31c239164bdb012907b1c9748a3552cf87a7ac7a7de618400739", 0xe1, 0x24000001, &(0x7f00000006c0)={0x1a, 0x2, 0x8000, 0xdf06, 0xa884, 0x400, @remote}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000016c0)={r3, r0, 0x0, 0xb, &(0x7f00000015c0)='/dev/vcsa#\x00', r4}, 0x30) ppoll(&(0x7f0000000700)=[{r0, 0x1100}], 0x1, &(0x7f0000000740)={0x77359400}, &(0x7f0000000780)={0x2}, 0x8) 04:00:47 executing program 0: socketpair$unix(0x1, 0x200000000000005, 0x0, &(0x7f0000000000)) r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x64080, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/raw6\x00') ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f00000000c0)={0x3, r1}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x80000000000020) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f00000001c0)={0x7, 0xfffffffeffffffff, 0x4, 0x1, 0x3, [{0x797, 0x81, 0x4, 0x0, 0x0, 0x100}, {0xffffffff, 0x1, 0x9, 0x0, 0x0, 0x800}, {0x1, 0x3, 0x5, 0x0, 0x0, 0x1000}]}) syz_mount_image$btrfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x2000, &(0x7f0000000680)={[{@ssd='ssd'}, {@nodatacow='nodatacow'}, {@metadata_ratio={'metadata_ratio', 0x3d, 0x2}}, {@nodatacow='nodatacow'}, {@noacl='noacl'}, {@skip_balance='skip_balance'}], [{@dont_appraise='dont_appraise'}, {@fsname={'fsname', 0x3d, '\'+%'}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@fowner_lt={'fowner<'}}, {@fowner_eq={'fowner'}}, {@func={'func', 0x3d, 'BPRM_CHECK'}}, {@dont_appraise='dont_appraise'}, {@fsname={'fsname', 0x3d, 'trusted.overlay.nlink\x00'}}]}) [ 430.332469] dccp_close: ABORT with 1061 bytes unread 04:00:47 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, 0x0, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000002000)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001000)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqsrc(r2, 0x0, 0x2000000000000004, &(0x7f0000013ff4)={@remote}, 0xc) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000340)={{{@in=@broadcast, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0xa, 0x80ffffff}}, {{@in6=@local, 0x0, 0x33}, 0x0, @in6=@local}}, 0xe8) close(r2) dup3(r0, r1, 0x0) 04:00:47 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x200000000000011, 0x803, 0x1000000080081) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000400)={'vcan0\x00', 0x0}) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000040)={0x30, {0x2, 0x4e22, @multicast2=0xe0006c02}, {0x2, 0x4e21, @remote}, {0x2, 0x4e22, @loopback}, 0x9f783104a14e79fd, 0x0, 0x9, 0x200}) bind$packet(r2, &(0x7f0000000000)={0x11, 0x0, r3}, 0x14) r4 = syz_open_dev$usbmon(&(0x7f00000000c0)='/dev/usbmon#\x00', 0xa7, 0x4000) ioctl$SCSI_IOCTL_START_UNIT(r4, 0x5) sendto$inet(r2, &(0x7f0000000140)="6f255b6fb6fdf214bfc28e01138727e0c27d695cf5b04434f33f0642444d18db5d57eb71c155694a1b37a867f70ec81c2abe84068c0ff2b2d594bb953460db80b291d0c9ba3c2b9b5c6e017ae731ef0c44ccd3ce1e9a79d449fa837b9a65ca948df6bd47d2b036f98cf228378faa116885dfa01823f32b586919f0a24dd3af40dd38166176491aa6527c4b58f676f82b68041ea2a465b3b7e9018a78406d96f3ff5951bcd8d88b", 0xa7, 0x0, 0x0, 0x0) getresuid(&(0x7f0000000240), &(0x7f0000000280)=0x0, &(0x7f00000002c0)) ioprio_get$uid(0x3, r5) ioctl$SCSI_IOCTL_DOORLOCK(r4, 0x5380) sendmmsg$inet_sctp(r2, &(0x7f0000871fc8), 0x71, 0x0) ioctl$sock_inet_udp_SIOCINQ(r2, 0x541b, &(0x7f0000000100)) r6 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r7 = eventfd(0xfffffffffffffffa) r8 = fcntl$getown(r0, 0x9) fcntl$getownex(r0, 0x10, &(0x7f0000000040)={0x0, 0x0}) setpgid(r8, r9) sendmsg$nl_generic(r4, &(0x7f0000000380)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000340)={&(0x7f0000000440)=ANY=[@ANYBLOB="400000002800b5a0b5356ac885ba855a11f3e21bb6f1100127bd7000fbdbdf25050000002c00620034db952d27d4d670d0712f4586b74808db9678a2053bf49f"], 0x40}}, 0x4000000) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, &(0x7f0000000480)={{{@in6=@loopback, @in6=@loopback}}, {{@in=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000200)=0xe8) ioctl$KVM_IRQFD(r6, 0x4020ae76, &(0x7f0000000000)={r7, 0x0, 0x2, r7}) 04:00:48 executing program 0: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000680)={0x8bb, 0x200, 0x6, 0x1000, 0x0}, &(0x7f00000006c0)=0x10) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f00000009c0)={'HL\x00'}, &(0x7f0000000a00)=0x1e) setsockopt$inet_sctp_SCTP_RESET_ASSOC(r0, 0x84, 0x78, &(0x7f0000000880)=r1, 0x4) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000a40)={r1, 0x7}, &(0x7f0000000a80)=0x8) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$inet_buf(r3, 0x0, 0x2f, &(0x7f00000001c0)=""/156, &(0x7f0000000280)=0x9c) setsockopt$inet_tcp_int(r3, 0x6, 0x22, &(0x7f0000000140)=0xffffffffffffffdf, 0x317) ioctl$sock_inet_SIOCADDRT(r3, 0x890b, &(0x7f00000002c0)={0x8, {0x2, 0x4e24, @broadcast}, {0x2, 0x4e22, @local}, {0x2, 0x4e24, @broadcast}, 0x0, 0x101, 0x2, 0x3, 0x0, 0x0, 0x0, 0x0, 0x8001}) seccomp(0x1, 0x1, &(0x7f0000000180)={0x9, &(0x7f0000000040)=[{0x1000, 0x212f, 0x0, 0xf682}, {0xa7, 0x3, 0x9}, {0x8001, 0x101, 0x80, 0x7fff}, {0x3, 0xfff, 0x7f, 0x1}, {0x2, 0x4, 0x1, 0x8}, {0xad, 0x8000, 0x8, 0x2}, {0x6, 0x9d, 0x6, 0x9}, {0x9, 0x1ff, 0x80000000, 0x3}, {0x0, 0x8, 0xd74}]}) keyctl$join(0x1, &(0x7f0000000800)={'syz', 0x3}) membarrier(0x10, 0x0) bind$inet(r3, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) r4 = open(&(0x7f0000000000)='./file0\x00', 0x80, 0xa1) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000000340)={{{@in, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in=@multicast1}}, &(0x7f0000000440)=0xe8) setsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000000480)={{{@in=@multicast2, @in6=@dev={0xfe, 0x80, [], 0x14}, 0x4e21, 0x8000, 0x4e24, 0x1, 0x9, 0x20, 0x80, 0x23a, 0x0, r6}, {0x712, 0x2, 0x0, 0xffffffff00000000, 0x7f, 0x6, 0x6, 0x1}, {0x401, 0x100000000, 0x7, 0xccf3}, 0x9, 0x4, 0x0, 0x1, 0x3, 0x3}, {{@in=@local, 0x4d4}, 0xa, @in=@local, 0x3504, 0x2, 0x3, 0x7fffffff, 0xfffffffffffffffc, 0x7, 0x7f}}, 0xe8) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000780), &(0x7f00000007c0)=0xc) ioctl$FIBMAP(r2, 0x1, &(0x7f0000000100)=0x4) setsockopt$inet_tcp_int(r3, 0x6, 0x14, &(0x7f0000000580)=0x100, 0x4) setsockopt$packet_drop_memb(r4, 0x107, 0x2, &(0x7f0000000700)={r5, 0x1, 0x6, @dev={[], 0xd}}, 0x10) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(r4, 0x84, 0x20, &(0x7f0000000600), &(0x7f0000000640)=0x4) sendto$inet(r3, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) ioctl$FIDEDUPERANGE(r3, 0xc0189436, &(0x7f00000008c0)=ANY=[@ANYBLOB="0000000009000000000000000000000000000000000000000000000006fdba55bc96b4656950bd50be0c7a64237894cd1c5df718ed7c93752567159cf1ff8a85dcaa6f5c6337048771c278f5af7fad1fef0700000098315d7926b5f0f4cba22b6f2cea745d602f047ad4d1e4e36aa767657a26838788e07a9d9273082ad5c5bb45d9f84c43e51f7fdeac30f76e224a3ce34fe11d49f751e0a3b4c825d7bbe416"]) ioctl$DRM_IOCTL_RES_CTX(r4, 0xc0106426, &(0x7f0000000980)={0x3, &(0x7f0000000840)=[{}, {}, {}]}) setsockopt$inet_buf(r4, 0x0, 0x2e, &(0x7f00000005c0)="f2ce2f9bab80b6835a3c52cc4aed8ff60deb9dff2f8b7fe97db90be2d48b4d9b40651b8791fede95969fc5c5ae0b0a209e4f42b7e1ee3b6e8e86afb56ada", 0x3e) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000740)='./cgroup/syz1\x00', 0x1ff) sendto$inet(r3, &(0x7f0000000000), 0xc3c, 0x0, &(0x7f00000000c0)={0x2, 0x0, @dev}, 0x10) setsockopt$IP_VS_SO_SET_FLUSH(r3, 0x0, 0x485, 0x0, 0x0) 04:00:48 executing program 3: clone(0x41fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f00000000c0)) syz_open_dev$rtc(&(0x7f0000000080)='/dev/rtc#\x00', 0x0, 0x0) ptrace(0x10, r0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000000)) getsockopt$inet_sctp6_SCTP_NODELAY(0xffffffffffffffff, 0x84, 0x3, &(0x7f0000000140), &(0x7f00000001c0)=0x4) ptrace$setregs(0xf, r0, 0x0, &(0x7f0000000180)="a96d55a756") ptrace$getregset(0x4208, r0, 0x2, &(0x7f0000000280)={0x0}) 04:00:48 executing program 2: r0 = socket$inet6(0xa, 0x400000000000803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000006c0)="0a5c2d023c126285718070") mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0xc, 0x32, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x8000000003c) connect$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x0, 0x0, @dev, 0x9}, 0x1c) sendmsg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="2c7c579a7ae9c96d5cc9ad926a3eea1cf89515d52fc4300c0d33f21c491f50289b7a492cc0c90f234201a5c6f9b830f910b1902ed60d51ad019c73fc9065aa2c519f654874b01f87db4a2807b6a2c2532e9d54e219c9c5f95f", 0x59}], 0x1}, 0xc100) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000440)="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", 0x257}], 0x1}, 0x8000) socket$packet(0x11, 0x2, 0x300) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001480)="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", 0x2d5}], 0x1}, 0x0) 04:00:48 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x25d1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000080)="00000600000000000000", 0x0) ioctl$SG_EMULATED_HOST(r1, 0x2203, &(0x7f00000000c0)) write$binfmt_elf32(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000000000000000000000030006000000000000000000380000000000000000000000000020000200000000000000000000000000000000000000000000000000000000040000000000000000000000000000030000000000000000000000000000000200000028e9653bf5f378f24e50b960"], 0x78) execveat(r1, &(0x7f0000000000)='\x00', &(0x7f0000000280), 0x0, 0x1000) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 04:00:48 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, 0x0, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000002000)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001000)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqsrc(r2, 0x0, 0x2000000000000004, &(0x7f0000013ff4)={@remote}, 0xc) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000340)={{{@in=@broadcast, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0xa, 0x2000000}}, {{@in6=@local, 0x0, 0x33}, 0x0, @in6=@local}}, 0xe8) close(r2) dup3(r0, r1, 0x0) 04:00:48 executing program 0: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000680)={0x8bb, 0x200, 0x6, 0x1000, 0x0}, &(0x7f00000006c0)=0x10) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f00000009c0)={'HL\x00'}, &(0x7f0000000a00)=0x1e) setsockopt$inet_sctp_SCTP_RESET_ASSOC(r0, 0x84, 0x78, &(0x7f0000000880)=r1, 0x4) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000a40)={r1, 0x7}, &(0x7f0000000a80)=0x8) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$inet_buf(r3, 0x0, 0x2f, &(0x7f00000001c0)=""/156, &(0x7f0000000280)=0x9c) setsockopt$inet_tcp_int(r3, 0x6, 0x22, &(0x7f0000000140)=0xffffffffffffffdf, 0x317) ioctl$sock_inet_SIOCADDRT(r3, 0x890b, &(0x7f00000002c0)={0x8, {0x2, 0x4e24, @broadcast}, {0x2, 0x4e22, @local}, {0x2, 0x4e24, @broadcast}, 0x0, 0x101, 0x2, 0x3, 0x0, 0x0, 0x0, 0x0, 0x8001}) seccomp(0x1, 0x1, &(0x7f0000000180)={0x9, &(0x7f0000000040)=[{0x1000, 0x212f, 0x0, 0xf682}, {0xa7, 0x3, 0x9}, {0x8001, 0x101, 0x80, 0x7fff}, {0x3, 0xfff, 0x7f, 0x1}, {0x2, 0x4, 0x1, 0x8}, {0xad, 0x8000, 0x8, 0x2}, {0x6, 0x9d, 0x6, 0x9}, {0x9, 0x1ff, 0x80000000, 0x3}, {0x0, 0x8, 0xd74}]}) keyctl$join(0x1, &(0x7f0000000800)={'syz', 0x3}) membarrier(0x10, 0x0) bind$inet(r3, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) r4 = open(&(0x7f0000000000)='./file0\x00', 0x80, 0xa1) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000000340)={{{@in, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in=@multicast1}}, &(0x7f0000000440)=0xe8) setsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000000480)={{{@in=@multicast2, @in6=@dev={0xfe, 0x80, [], 0x14}, 0x4e21, 0x8000, 0x4e24, 0x1, 0x9, 0x20, 0x80, 0x23a, 0x0, r6}, {0x712, 0x2, 0x0, 0xffffffff00000000, 0x7f, 0x6, 0x6, 0x1}, {0x401, 0x100000000, 0x7, 0xccf3}, 0x9, 0x4, 0x0, 0x1, 0x3, 0x3}, {{@in=@local, 0x4d4}, 0xa, @in=@local, 0x3504, 0x2, 0x3, 0x7fffffff, 0xfffffffffffffffc, 0x7, 0x7f}}, 0xe8) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000780), &(0x7f00000007c0)=0xc) ioctl$FIBMAP(r2, 0x1, &(0x7f0000000100)=0x4) setsockopt$inet_tcp_int(r3, 0x6, 0x14, &(0x7f0000000580)=0x100, 0x4) setsockopt$packet_drop_memb(r4, 0x107, 0x2, &(0x7f0000000700)={r5, 0x1, 0x6, @dev={[], 0xd}}, 0x10) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(r4, 0x84, 0x20, &(0x7f0000000600), &(0x7f0000000640)=0x4) sendto$inet(r3, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) ioctl$FIDEDUPERANGE(r3, 0xc0189436, &(0x7f00000008c0)=ANY=[@ANYBLOB="0000000009000000000000000000000000000000000000000000000006fdba55bc96b4656950bd50be0c7a64237894cd1c5df718ed7c93752567159cf1ff8a85dcaa6f5c6337048771c278f5af7fad1fef0700000098315d7926b5f0f4cba22b6f2cea745d602f047ad4d1e4e36aa767657a26838788e07a9d9273082ad5c5bb45d9f84c43e51f7fdeac30f76e224a3ce34fe11d49f751e0a3b4c825d7bbe416"]) ioctl$DRM_IOCTL_RES_CTX(r4, 0xc0106426, &(0x7f0000000980)={0x3, &(0x7f0000000840)=[{}, {}, {}]}) setsockopt$inet_buf(r4, 0x0, 0x2e, &(0x7f00000005c0)="f2ce2f9bab80b6835a3c52cc4aed8ff60deb9dff2f8b7fe97db90be2d48b4d9b40651b8791fede95969fc5c5ae0b0a209e4f42b7e1ee3b6e8e86afb56ada", 0x3e) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000740)='./cgroup/syz1\x00', 0x1ff) sendto$inet(r3, &(0x7f0000000000), 0xc3c, 0x0, &(0x7f00000000c0)={0x2, 0x0, @dev}, 0x10) setsockopt$IP_VS_SO_SET_FLUSH(r3, 0x0, 0x485, 0x0, 0x0) 04:00:48 executing program 2: r0 = socket$inet6(0xa, 0x400000000000803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000006c0)="0a5c2d023c126285718070") mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0xc, 0x32, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x8000000003c) connect$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x0, 0x0, @dev, 0x9}, 0x1c) sendmsg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="2c7c579a7ae9c96d5cc9ad926a3eea1cf89515d52fc4300c0d33f21c491f50289b7a492cc0c90f234201a5c6f9b830f910b1902ed60d51ad019c73fc9065aa2c519f654874b01f87db4a2807b6a2c2532e9d54e219c9c5f95f", 0x59}], 0x1}, 0xc100) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000440)="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", 0x257}], 0x1}, 0x8000) socket$packet(0x11, 0x2, 0x300) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001480)="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", 0x2d5}], 0x1}, 0x0) 04:00:48 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, 0x0, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000002000)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001000)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqsrc(r2, 0x0, 0x2000000000000004, &(0x7f0000013ff4)={@remote}, 0xc) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000340)={{{@in=@broadcast, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x2000}}, {{@in6=@local, 0x0, 0x33}, 0x0, @in6=@local}}, 0xe8) close(r2) dup3(r0, r1, 0x0) 04:00:48 executing program 2: r0 = socket$inet6(0xa, 0x400000000000803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000006c0)="0a5c2d023c126285718070") mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0xc, 0x32, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x8000000003c) connect$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x0, 0x0, @dev, 0x9}, 0x1c) sendmsg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="2c7c579a7ae9c96d5cc9ad926a3eea1cf89515d52fc4300c0d33f21c491f50289b7a492cc0c90f234201a5c6f9b830f910b1902ed60d51ad019c73fc9065aa2c519f654874b01f87db4a2807b6a2c2532e9d54e219c9c5f95f", 0x59}], 0x1}, 0xc100) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000440)="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", 0x257}], 0x1}, 0x8000) socket$packet(0x11, 0x2, 0x300) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001480)="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", 0x2d5}], 0x1}, 0x0) 04:00:48 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x25d1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000180)='/dev/snapshot\x00', 0x4000, 0x0) r2 = memfd_create(&(0x7f0000000080)="00000600000000000000", 0x0) ioctl$SG_EMULATED_HOST(r2, 0x2203, &(0x7f00000000c0)) write$binfmt_elf32(r2, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003000600000000000000000038000000000000000000000000002000020000000000000000000000000000000000000000000000000000000004000000000000000000000000000003fbffffff00000000000000000000000200000028e9653bf5f378f24e50b960"], 0x78) execveat(r2, &(0x7f0000000000)='\x00', &(0x7f0000000280), 0x0, 0x1000) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r2, 0x28, 0x1, &(0x7f0000000140)=0x9, 0x8) ioctl$GIO_CMAP(r2, 0x4b70, &(0x7f0000000100)) 04:00:48 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x25d1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000580)='/dev/vcsa#\x00', 0xff, 0x0) ioctl$EVIOCGBITSW(r1, 0x80404525, &(0x7f0000001700)=""/4096) r2 = memfd_create(&(0x7f0000000080)="00000600000000000000", 0x2) ioctl$SG_EMULATED_HOST(r2, 0x2203, &(0x7f00000000c0)) timer_create(0x0, &(0x7f0000000500)={0x0, 0x29, 0x4, @thr={&(0x7f0000000400)="499d55c4c4ac97191b53f41049e81be0860341b86de13ae68062cf7cee73c7f1db3527615891fd447c0a0dfaadca69d1b806fce0b37b0e3abf2d0ad1f9569a9dbcff92ec785581892e1d98788cd2a1e7f99f55990b2cd5b177fc487c9f1781ea50835bc856b62c6fcaf068b6430e723113cb43e3fc03a2bfe9e72b9597df0f3fdca6ab12a7a6624ec7fe537249a4dcc519a3cd15277c1786d38000d6db6d6d11f820f0b7fc5045a34dea", &(0x7f00000004c0)="2da80e0051dd4a488bb583a01139c1a473a0d8b9d0a6120811dc549fc932570f410ba657acbfcd7ccef12d601f"}}, &(0x7f0000000540)) fgetxattr(r2, &(0x7f0000000380)=@known='user.syz\x00', &(0x7f00000003c0)=""/24, 0x18) write$binfmt_elf32(r2, &(0x7f0000000100)=ANY=[@ANYBLOB="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"], 0x78) finit_module(r0, &(0x7f00000002c0)="00000600", 0x3) write$P9_RFSYNC(r1, &(0x7f00000007c0)={0x7, 0x33, 0x1}, 0x7) execveat(r2, &(0x7f0000000000)='\x00', &(0x7f0000000280), 0x0, 0x1000) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) bind$alg(r1, &(0x7f0000000300)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_hmac_sha256\x00'}, 0x58) r3 = getpid() bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001680)={r1, 0x50, &(0x7f0000001600)={0x0, 0x0}}, 0x10) sendto$llc(r1, &(0x7f00000005c0)="3208e2474cf6ef885089a549115eaaac593685d03a3e3fca744db181c608bd8a917fce941a8664ba787a18d2297244cfd6e2cd072771cb74f28a7116785e8f7ff2c305e49032a329b750ce47165a7c923bdd4b4f3bb2a49da3ddbb28e2012c8ee86d2d59cb600c7abe90ad7f26026af9aed4b46bdde32edfc02962eba50f0eaf9a86bfa6d419a5f6fd5cbb2bd068d241cfacbb94f4b113e36250562689a30a12133eff338a7fded0ae95c91151f57364e75cfe573efefc6c925842b517fedb76028c85bc0527bc31c239164bdb012907b1c9748a3552cf87a7ac7a7de618400739", 0xe1, 0x24000001, &(0x7f00000006c0)={0x1a, 0x2, 0x8000, 0xdf06, 0xa884, 0x400, @remote}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000016c0)={r3, r0, 0x0, 0xb, &(0x7f00000015c0)='/dev/vcsa#\x00', r4}, 0x30) ppoll(&(0x7f0000000700)=[{r0, 0x1100}], 0x1, &(0x7f0000000740)={0x77359400}, &(0x7f0000000780)={0x2}, 0x8) 04:00:48 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, 0x0, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000002000)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001000)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqsrc(r2, 0x0, 0x2000000000000004, &(0x7f0000013ff4)={@remote}, 0xc) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000340)={{{@in=@broadcast, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0xffffffa4}}, {{@in6=@local, 0x0, 0x33}, 0x0, @in6=@local}}, 0xe8) close(r2) dup3(r0, r1, 0x0) 04:00:48 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x200000000000011, 0x803, 0x1000000080081) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000400)={'vcan0\x00', 0x0}) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000040)={0x30, {0x2, 0x4e22, @multicast2=0xe0006c02}, {0x2, 0x4e21, @remote}, {0x2, 0x4e22, @loopback}, 0x9f783104a14e79fd, 0x0, 0x9, 0x200}) bind$packet(r2, &(0x7f0000000000)={0x11, 0x0, r3}, 0x14) r4 = syz_open_dev$usbmon(&(0x7f00000000c0)='/dev/usbmon#\x00', 0xa7, 0x4000) ioctl$SCSI_IOCTL_START_UNIT(r4, 0x5) sendto$inet(r2, &(0x7f0000000140)="6f255b6fb6fdf214bfc28e01138727e0c27d695cf5b04434f33f0642444d18db5d57eb71c155694a1b37a867f70ec81c2abe84068c0ff2b2d594bb953460db80b291d0c9ba3c2b9b5c6e017ae731ef0c44ccd3ce1e9a79d449fa837b9a65ca948df6bd47d2b036f98cf228378faa116885dfa01823f32b586919f0a24dd3af40dd38166176491aa6527c4b58f676f82b68041ea2a465b3b7e9018a78406d96f3ff5951bcd8d88b", 0xa7, 0x0, 0x0, 0x0) getresuid(&(0x7f0000000240), &(0x7f0000000280)=0x0, &(0x7f00000002c0)) ioprio_get$uid(0x3, r5) ioctl$SCSI_IOCTL_DOORLOCK(r4, 0x5380) sendmmsg$inet_sctp(r2, &(0x7f0000871fc8), 0x71, 0x0) ioctl$sock_inet_udp_SIOCINQ(r2, 0x541b, &(0x7f0000000100)) r6 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r7 = eventfd(0xfffffffffffffffa) r8 = fcntl$getown(r0, 0x9) fcntl$getownex(r0, 0x10, &(0x7f0000000040)={0x0, 0x0}) setpgid(r8, r9) sendmsg$nl_generic(r4, &(0x7f0000000380)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000340)={&(0x7f0000000440)=ANY=[@ANYBLOB="400000002800b5a0b5356ac885ba855a11f3e21bb6f1100127bd7000fbdbdf25050000002c00620034db952d27d4d670d0712f4586b74808db9678a2053bf49f"], 0x40}}, 0x4000000) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, &(0x7f0000000480)={{{@in6=@loopback, @in6=@loopback}}, {{@in=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000200)=0xe8) ioctl$KVM_IRQFD(r6, 0x4020ae76, &(0x7f0000000000)={r7, 0x0, 0x2, r7}) [ 431.388664] [ 431.390495] ==================================== [ 431.415349] WARNING: syz-executor5/17635 still has locks held! [ 431.426225] 4.20.0-rc4+ #360 Not tainted [ 431.429806] kobject: 'loop0' (00000000b22beada): kobject_uevent_env [ 431.431072] ------------------------------------ [ 431.442176] 1 lock held by syz-executor5/17635: [ 431.444276] kobject: 'loop0' (00000000b22beada): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 431.460788] #0: 0000000029fc3875 (&sig->cred_guard_mutex){+.+.}, at: prepare_bprm_creds+0x53/0x120 [ 431.478437] [ 431.478437] stack backtrace: [ 431.485135] kobject: 'loop2' (000000002286d61a): kobject_uevent_env [ 431.489859] CPU: 0 PID: 17635 Comm: syz-executor5 Not tainted 4.20.0-rc4+ #360 [ 431.493942] kobject: 'loop2' (000000002286d61a): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 431.498925] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 431.498931] Call Trace: [ 431.498954] dump_stack+0x244/0x39d [ 431.498974] ? dump_stack_print_info.cold.1+0x20/0x20 [ 431.499000] ? vprintk_func+0x85/0x181 [ 431.533154] debug_check_no_locks_held.cold.49+0x93/0x9f [ 431.538619] flush_old_exec+0x69e/0x2480 [ 431.542691] ? __kmalloc+0x15b/0x760 [ 431.546478] ? load_elf_phdrs+0x173/0x270 [ 431.550652] ? copy_strings_kernel+0x110/0x110 [ 431.555249] ? iov_iter_init+0xe5/0x210 [ 431.559244] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 431.564804] ? __vfs_read+0x11f/0x9b0 [ 431.568615] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 431.574208] ? fsnotify+0x50e/0xef0 [ 431.577852] ? fsnotify+0xef0/0xef0 [ 431.581495] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 431.587044] ? fsnotify_first_mark+0x350/0x350 [ 431.591637] ? __fsnotify_parent+0xcc/0x430 [ 431.595966] ? fsnotify+0xef0/0xef0 [ 431.599607] ? rw_verify_area+0x118/0x360 [ 431.603760] ? vfs_read+0x1ce/0x3c0 [ 431.607402] ? kernel_read+0xab/0x120 [ 431.611213] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 431.616232] ? load_elf_phdrs+0x1e4/0x270 [ 431.620420] ? writenote+0x3d0/0x3d0 [ 431.624139] ? __kasan_slab_free+0x119/0x150 [ 431.628571] load_elf_binary+0xa9a/0x5cf0 [ 431.632726] ? find_held_lock+0x36/0x1c0 04:00:49 executing program 3: clone(0x41fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f00000000c0)) syz_open_dev$rtc(&(0x7f0000000080)='/dev/rtc#\x00', 0x0, 0x0) ptrace(0x10, r0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000000)) getsockopt$inet_sctp6_SCTP_NODELAY(0xffffffffffffffff, 0x84, 0x3, &(0x7f0000000140), &(0x7f00000001c0)=0x4) ptrace$setregs(0xf, r0, 0x0, &(0x7f0000000180)="a96d55a756") ptrace$getregset(0x4209, r0, 0x2, &(0x7f0000000280)={0x0}) 04:00:49 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x200000000000011, 0x803, 0x1000000080081) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000400)={'vcan0\x00', 0x0}) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000040)={0x30, {0x2, 0x4e22, @multicast2=0xe0006c02}, {0x2, 0x4e21, @remote}, {0x2, 0x4e22, @loopback}, 0x9f783104a14e79fd, 0x0, 0x9, 0x200}) bind$packet(r2, &(0x7f0000000000)={0x11, 0x0, r3}, 0x14) r4 = syz_open_dev$usbmon(&(0x7f00000000c0)='/dev/usbmon#\x00', 0xa7, 0x4000) ioctl$SCSI_IOCTL_START_UNIT(r4, 0x5) sendto$inet(r2, &(0x7f0000000140)="6f255b6fb6fdf214bfc28e01138727e0c27d695cf5b04434f33f0642444d18db5d57eb71c155694a1b37a867f70ec81c2abe84068c0ff2b2d594bb953460db80b291d0c9ba3c2b9b5c6e017ae731ef0c44ccd3ce1e9a79d449fa837b9a65ca948df6bd47d2b036f98cf228378faa116885dfa01823f32b586919f0a24dd3af40dd38166176491aa6527c4b58f676f82b68041ea2a465b3b7e9018a78406d96f3ff5951bcd8d88b", 0xa7, 0x0, 0x0, 0x0) getresuid(&(0x7f0000000240), &(0x7f0000000280)=0x0, &(0x7f00000002c0)) ioprio_get$uid(0x3, r5) ioctl$SCSI_IOCTL_DOORLOCK(r4, 0x5380) sendmmsg$inet_sctp(r2, &(0x7f0000871fc8), 0x71, 0x0) ioctl$sock_inet_udp_SIOCINQ(r2, 0x541b, &(0x7f0000000100)) r6 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r7 = eventfd(0xfffffffffffffffa) r8 = fcntl$getown(r0, 0x9) fcntl$getownex(r0, 0x10, &(0x7f0000000040)={0x0, 0x0}) setpgid(r8, r9) sendmsg$nl_generic(r4, &(0x7f0000000380)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000340)={&(0x7f0000000440)=ANY=[@ANYBLOB="400000002800b5a0b5356ac885ba855a11f3e21bb6f1100127bd7000fbdbdf25050000002c00620034db952d27d4d670d0712f4586b74808db9678a2053bf49f"], 0x40}}, 0x4000000) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, &(0x7f0000000480)={{{@in6=@loopback, @in6=@loopback}}, {{@in=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000200)=0xe8) ioctl$KVM_IRQFD(r6, 0x4020ae76, &(0x7f0000000000)={r7, 0x0, 0x2, r7}) 04:00:49 executing program 2: r0 = socket$inet6(0xa, 0x400000000000803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000006c0)="0a5c2d023c126285718070") mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0xc, 0x32, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x8000000003c) connect$inet6(r1, 0x0, 0x0) sendmsg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="2c7c579a7ae9c96d5cc9ad926a3eea1cf89515d52fc4300c0d33f21c491f50289b7a492cc0c90f234201a5c6f9b830f910b1902ed60d51ad019c73fc9065aa2c519f654874b01f87db4a2807b6a2c2532e9d54e219c9c5f95f", 0x59}], 0x1}, 0xc100) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000440)="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", 0x257}], 0x1}, 0x8000) socket$packet(0x11, 0x2, 0x300) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001480)="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", 0x2d5}], 0x1}, 0x0) [ 431.636809] ? notesize.isra.6+0x80/0x80 [ 431.640875] ? ima_file_mmap+0x160/0x160 [ 431.644937] ? lock_downgrade+0x900/0x900 [ 431.649104] ? kasan_check_write+0x14/0x20 [ 431.653350] search_binary_handler+0x17d/0x570 [ 431.657943] __do_execve_file.isra.33+0x1661/0x25d0 [ 431.662974] ? prepare_bprm_creds+0x120/0x120 [ 431.667480] ? usercopy_warn+0x110/0x110 [ 431.671560] ? check_preemption_disabled+0x48/0x280 [ 431.676595] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 431.682161] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 431.687230] kobject: 'loop3' (00000000a86c84e3): kobject_uevent_env [ 431.687709] ? strncpy_from_user+0x411/0x5a0 [ 431.694127] kobject: 'loop3' (00000000a86c84e3): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 431.698509] ? digsig_verify+0x1530/0x1530 [ 431.698524] ? kmem_cache_alloc+0x33a/0x730 [ 431.698551] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 431.698571] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 431.698591] __x64_sys_execveat+0xed/0x130 [ 431.730891] do_syscall_64+0x1b9/0x820 [ 431.734796] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 431.740193] ? syscall_return_slowpath+0x5e0/0x5e0 [ 431.745138] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 431.750002] ? trace_hardirqs_on_caller+0x310/0x310 [ 431.755034] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 431.760062] ? prepare_exit_to_usermode+0x291/0x3b0 [ 431.765090] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 431.769953] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 431.775164] RIP: 0033:0x457569 [ 431.778367] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 431.797280] RSP: 002b:00007fccba6b6c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 431.804995] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 0000000000457569 [ 431.812267] RDX: 0000000020000280 RSI: 0000000020000000 RDI: 0000000000000005 [ 431.819536] RBP: 000000000072bfa0 R08: 0000000000001000 R09: 0000000000000000 [ 431.826812] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fccba6b76d4 04:00:49 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, 0x0, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000002000)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001000)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqsrc(r2, 0x0, 0x2000000000000004, &(0x7f0000013ff4)={@remote}, 0xc) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000340)={{{@in=@broadcast, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x80ffffff00000000}}, {{@in6=@local, 0x0, 0x33}, 0x0, @in6=@local}}, 0xe8) close(r2) dup3(r0, r1, 0x0) 04:00:49 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x25d1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000080)="00000600000000000000", 0x0) ioctl$SG_EMULATED_HOST(r1, 0x2203, &(0x7f00000000c0)) write$binfmt_elf32(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="7f454c460000000000000000000000000300060000000000000000003835b6b2b80000000000000000000000000020000200000000000000000000000000000000000000000000000000000000040000000000000000000000000000030000000000000000000000000000000200000028e9653bf5f378f24e50b960"], 0x78) execveat(r1, &(0x7f0000000000)='\x00', &(0x7f0000000280), 0x0, 0x1000) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) [ 431.834080] R13: 00000000004bdc9b R14: 00000000004cd1d8 R15: 00000000ffffffff [ 431.857289] kobject: 'loop4' (0000000061a206ed): kobject_uevent_env [ 431.863811] kobject: 'loop4' (0000000061a206ed): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 431.907052] kobject: 'loop5' (00000000092c6588): kobject_uevent_env [ 431.926548] kobject: 'loop5' (00000000092c6588): fill_kobj_path: path = '/devices/virtual/block/loop5' 04:00:49 executing program 2: r0 = socket$inet6(0xa, 0x400000000000803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000006c0)="0a5c2d023c126285718070") mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0xc, 0x32, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x8000000003c) connect$inet6(r1, 0x0, 0x0) sendmsg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="2c7c579a7ae9c96d5cc9ad926a3eea1cf89515d52fc4300c0d33f21c491f50289b7a492cc0c90f234201a5c6f9b830f910b1902ed60d51ad019c73fc9065aa2c519f654874b01f87db4a2807b6a2c2532e9d54e219c9c5f95f", 0x59}], 0x1}, 0xc100) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000440)="b10b938636ea69df7b5a9984bb1bc72ef58d96e56e11df900a707f4946b1637e2096c584b9a1b4e017163fbdb35160a56c11dfbe74df97d36d19ad6a91c6fb4ad19581b8cf707131830f7a22b1b263c9da0e443c5e969ed6a0d3bc508bf75c3147447379f585759ceba0de5cda46291dc1b8f106a83e1cde43a862d95413ce2616b261ed9f79913ae781b3b843ea1b4429a750b8ccb1952a7b863d0bada9f61df6609fe368eaf47c0ce9e46a22b0d75b063deeaa94285d0c43353046e0a308296a76b0b0145f8af9aa0ed0e18bc50509eaef21c8e03842a97df3a462ea3f9d5f83bf1d4d2875f0d5b24e941483f863cd2ea7c769bd3e594fb173dd873c7d9a3fd20939ad1d5867881ed77a078007b4972aba36cae02004373a6a74d74cb15a52c5f8426cb6f235d38048fd91f5d6100fd58a335df10add227d804167ba191c7a035c5a2a916e7fef18a6003578820b3e0be26a22f2c149f40a0335cadcca64a5e44179e6ce4d7f7c16e8a96c5be7cdf66eef901cb8eeabc94bae30acca8c6fa02889c32311044dcbc9a2e02e0632f7f9aa96849abede543773745e4652fccc503003f10cd68ddab594969ad36cb622ed7ba22dc46a80fb63ac2c561a80ae5c10b295b9f75d9536ba1ac24b8e9ae217611ffe79cb9422158475c1a89a51547d13c03b68d75ffb5717a35f381774567871e9e4190272c97eafcfa0a07a751d0bc8eeb0c206e12b2cff1065a3d5622635fa44c0dcb0722ad4c97e6b7d5844b2e9bab9ba1d083fa2930a3ea267d7f15d817e2b2e055ccfbaf019292f6156efd3a9a13ea90ecf59fc1bf35c6626db1c6759a50ed84acefd3cdb", 0x257}], 0x1}, 0x8000) socket$packet(0x11, 0x2, 0x300) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001480)="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", 0x2d5}], 0x1}, 0x0) [ 431.953506] kobject: 'kvm' (00000000bfce22fc): kobject_uevent_env [ 431.974557] kobject: 'loop2' (000000002286d61a): kobject_uevent_env [ 431.983192] kobject: 'kvm' (00000000bfce22fc): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 431.983494] kobject: 'loop2' (000000002286d61a): fill_kobj_path: path = '/devices/virtual/block/loop2' 04:00:49 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, 0x0, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000002000)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001000)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqsrc(r2, 0x0, 0x2000000000000004, &(0x7f0000013ff4)={@remote}, 0xc) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000340)={{{@in=@broadcast, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0xff0f000000000000}}, {{@in6=@local, 0x0, 0x33}, 0x0, @in6=@local}}, 0xe8) close(r2) dup3(r0, r1, 0x0) [ 432.022962] kobject: 'kvm' (00000000bfce22fc): kobject_uevent_env [ 432.036210] kobject: 'kvm' (00000000bfce22fc): fill_kobj_path: path = '/devices/virtual/misc/kvm' 04:00:49 executing program 2: r0 = socket$inet6(0xa, 0x400000000000803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000006c0)="0a5c2d023c126285718070") mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0xc, 0x32, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x8000000003c) connect$inet6(r1, 0x0, 0x0) sendmsg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="2c7c579a7ae9c96d5cc9ad926a3eea1cf89515d52fc4300c0d33f21c491f50289b7a492cc0c90f234201a5c6f9b830f910b1902ed60d51ad019c73fc9065aa2c519f654874b01f87db4a2807b6a2c2532e9d54e219c9c5f95f", 0x59}], 0x1}, 0xc100) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000440)="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", 0x257}], 0x1}, 0x8000) socket$packet(0x11, 0x2, 0x300) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001480)="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", 0x2d5}], 0x1}, 0x0) [ 432.065544] kobject: 'loop4' (0000000061a206ed): kobject_uevent_env [ 432.088838] kobject: 'loop4' (0000000061a206ed): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 432.119894] kobject: 'loop2' (000000002286d61a): kobject_uevent_env [ 432.136522] kobject: 'kvm' (00000000bfce22fc): kobject_uevent_env [ 432.140178] kobject: 'loop2' (000000002286d61a): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 432.144077] kobject: 'kvm' (00000000bfce22fc): fill_kobj_path: path = '/devices/virtual/misc/kvm' 04:00:49 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, 0x0, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000002000)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001000)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqsrc(r2, 0x0, 0x2000000000000004, &(0x7f0000013ff4)={@remote}, 0xc) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000340)={{{@in=@broadcast, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x80ffffff00000000}}, {{@in6=@local, 0x0, 0x33}, 0x0, @in6=@local}}, 0xe8) close(r2) dup3(r0, r1, 0x0) [ 432.189544] kobject: 'kvm' (00000000bfce22fc): kobject_uevent_env [ 432.195877] kobject: 'kvm' (00000000bfce22fc): fill_kobj_path: path = '/devices/virtual/misc/kvm' 04:00:49 executing program 2: r0 = socket$inet6(0xa, 0x400000000000803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000006c0)="0a5c2d023c126285718070") mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0xc, 0x32, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x8000000003c) connect$inet6(r1, &(0x7f00000002c0)={0xa, 0x0, 0x0, @dev}, 0x1c) sendmsg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="2c7c579a7ae9c96d5cc9ad926a3eea1cf89515d52fc4300c0d33f21c491f50289b7a492cc0c90f234201a5c6f9b830f910b1902ed60d51ad019c73fc9065aa2c519f654874b01f87db4a2807b6a2c2532e9d54e219c9c5f95f", 0x59}], 0x1}, 0xc100) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000440)="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", 0x257}], 0x1}, 0x8000) socket$packet(0x11, 0x2, 0x300) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001480)="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", 0x2d5}], 0x1}, 0x0) 04:00:49 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, 0x0, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000002000)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001000)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqsrc(r2, 0x0, 0x2000000000000004, &(0x7f0000013ff4)={@remote}, 0xc) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000340)={{{@in=@broadcast, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x300}}, {{@in6=@local, 0x0, 0x33}, 0x0, @in6=@local}}, 0xe8) close(r2) dup3(r0, r1, 0x0) [ 432.238370] kobject: 'loop0' (00000000b22beada): kobject_uevent_env [ 432.251018] kobject: 'loop0' (00000000b22beada): fill_kobj_path: path = '/devices/virtual/block/loop0' 04:00:49 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, 0x0, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000002000)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001000)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqsrc(r2, 0x0, 0x2000000000000004, &(0x7f0000013ff4)={@remote}, 0xc) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000340)={{{@in=@broadcast, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0xff0f000000000000}}, {{@in6=@local, 0x0, 0x33}, 0x0, @in6=@local}}, 0xe8) close(r2) dup3(r0, r1, 0x0) [ 432.282914] kobject: 'loop2' (000000002286d61a): kobject_uevent_env [ 432.293527] kobject: 'loop2' (000000002286d61a): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 432.321353] kobject: 'loop4' (0000000061a206ed): kobject_uevent_env [ 432.341641] kobject: 'loop4' (0000000061a206ed): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 432.395841] kobject: 'loop1' (0000000008b6de74): kobject_uevent_env [ 432.410867] kobject: 'loop1' (0000000008b6de74): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 432.420840] kobject: 'loop5' (00000000092c6588): kobject_uevent_env [ 432.427321] kobject: 'loop5' (00000000092c6588): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 432.437637] kobject: 'loop2' (000000002286d61a): kobject_uevent_env [ 432.444084] kobject: 'loop2' (000000002286d61a): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 432.509614] kobject: 'loop1' (0000000008b6de74): kobject_uevent_env [ 432.516101] kobject: 'loop1' (0000000008b6de74): fill_kobj_path: path = '/devices/virtual/block/loop1' 04:00:50 executing program 3: clone(0x41fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f00000000c0)) syz_open_dev$rtc(&(0x7f0000000080)='/dev/rtc#\x00', 0x0, 0x0) ptrace(0x10, r0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000000)) getsockopt$inet_sctp6_SCTP_NODELAY(0xffffffffffffffff, 0x84, 0x3, &(0x7f0000000140), &(0x7f00000001c0)=0x4) ptrace$setregs(0xf, r0, 0x0, &(0x7f0000000180)="a96d55a756") ptrace$getregset(0x4, r0, 0x2, &(0x7f0000000280)={0x0}) 04:00:50 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x25d1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000080)="00000600000000000000", 0x0) ioctl$SG_EMULATED_HOST(r1, 0x2203, &(0x7f0000000280)) write$binfmt_elf32(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="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"], 0x78) execveat(r1, &(0x7f0000000000)='\x00', &(0x7f0000000280), 0x0, 0x1000) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r0) 04:00:50 executing program 2: r0 = socket$inet6(0xa, 0x400000000000803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000006c0)="0a5c2d023c126285718070") mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0xc, 0x32, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x8000000003c) connect$inet6(r1, &(0x7f00000002c0)={0xa, 0x0, 0x0, @dev}, 0x1c) sendmsg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="2c7c579a7ae9c96d5cc9ad926a3eea1cf89515d52fc4300c0d33f21c491f50289b7a492cc0c90f234201a5c6f9b830f910b1902ed60d51ad019c73fc9065aa2c519f654874b01f87db4a2807b6a2c2532e9d54e219c9c5f95f", 0x59}], 0x1}, 0xc100) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000440)="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", 0x257}], 0x1}, 0x8000) socket$packet(0x11, 0x2, 0x300) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001480)="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", 0x2d5}], 0x1}, 0x0) 04:00:50 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, 0x0, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000002000)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001000)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqsrc(r2, 0x0, 0x2000000000000004, &(0x7f0000013ff4)={@remote}, 0xc) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000340)={{{@in=@broadcast, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x80ffffff00000000}}, {{@in6=@local, 0x0, 0x33}, 0x0, @in6=@local}}, 0xe8) close(r2) dup3(r0, r1, 0x0) 04:00:50 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, 0x0, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000002000)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001000)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqsrc(r2, 0x0, 0x2000000000000004, &(0x7f0000013ff4)={@remote}, 0xc) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000340)={{{@in=@broadcast, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x1000000}}, {{@in6=@local, 0x0, 0x33}, 0x0, @in6=@local}}, 0xe8) close(r2) dup3(r0, r1, 0x0) 04:00:50 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, 0x0, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000002000)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001000)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqsrc(r2, 0x0, 0x2000000000000004, &(0x7f0000013ff4)={@remote}, 0xc) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000340)={{{@in=@broadcast, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0xff0f000000000000}}, {{@in6=@local, 0x0, 0x33}, 0x0, @in6=@local}}, 0xe8) close(r2) dup3(r0, r1, 0x0) [ 432.687801] kobject: 'loop3' (00000000a86c84e3): kobject_uevent_env [ 432.698916] kobject: 'loop3' (00000000a86c84e3): fill_kobj_path: path = '/devices/virtual/block/loop3' 04:00:50 executing program 2: r0 = socket$inet6(0xa, 0x400000000000803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000006c0)="0a5c2d023c126285718070") mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0xc, 0x32, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x8000000003c) connect$inet6(r1, &(0x7f00000002c0)={0xa, 0x0, 0x0, @dev}, 0x1c) sendmsg(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="2c7c579a7ae9c96d5cc9ad926a3eea1cf89515d52fc4300c0d33f21c491f50289b7a492cc0c90f234201a5c6f9b830f910b1902ed60d51ad019c73fc9065aa2c519f654874b01f87db4a2807b6a2c2532e9d54e219c9c5f95f", 0x59}], 0x1}, 0xc100) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000440)="b10b938636ea69df7b5a9984bb1bc72ef58d96e56e11df900a707f4946b1637e2096c584b9a1b4e017163fbdb35160a56c11dfbe74df97d36d19ad6a91c6fb4ad19581b8cf707131830f7a22b1b263c9da0e443c5e969ed6a0d3bc508bf75c3147447379f585759ceba0de5cda46291dc1b8f106a83e1cde43a862d95413ce2616b261ed9f79913ae781b3b843ea1b4429a750b8ccb1952a7b863d0bada9f61df6609fe368eaf47c0ce9e46a22b0d75b063deeaa94285d0c43353046e0a308296a76b0b0145f8af9aa0ed0e18bc50509eaef21c8e03842a97df3a462ea3f9d5f83bf1d4d2875f0d5b24e941483f863cd2ea7c769bd3e594fb173dd873c7d9a3fd20939ad1d5867881ed77a078007b4972aba36cae02004373a6a74d74cb15a52c5f8426cb6f235d38048fd91f5d6100fd58a335df10add227d804167ba191c7a035c5a2a916e7fef18a6003578820b3e0be26a22f2c149f40a0335cadcca64a5e44179e6ce4d7f7c16e8a96c5be7cdf66eef901cb8eeabc94bae30acca8c6fa02889c32311044dcbc9a2e02e0632f7f9aa96849abede543773745e4652fccc503003f10cd68ddab594969ad36cb622ed7ba22dc46a80fb63ac2c561a80ae5c10b295b9f75d9536ba1ac24b8e9ae217611ffe79cb9422158475c1a89a51547d13c03b68d75ffb5717a35f381774567871e9e4190272c97eafcfa0a07a751d0bc8eeb0c206e12b2cff1065a3d5622635fa44c0dcb0722ad4c97e6b7d5844b2e9bab9ba1d083fa2930a3ea267d7f15d817e2b2e055ccfbaf019292f6156efd3a9a13ea90ecf59fc1bf35c6626db1c6759a50ed84acefd3cdb", 0x257}], 0x1}, 0x8000) socket$packet(0x11, 0x2, 0x300) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001480)="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", 0x2d5}], 0x1}, 0x0) 04:00:50 executing program 5: r0 = memfd_create(&(0x7f0000000080)="00000600000000000000", 0x0) ioctl$SG_EMULATED_HOST(r0, 0x2203, &(0x7f00000000c0)) write$binfmt_elf32(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="7f454c46000000007e9a7235f9c39e1fe5cf5800000000000000000300060000000000000000003800000000000000000000230000200002000000000000000000000000000000000000000f0000000000000000040000000000000000000000000000030000000000000000000000000000000200000028e9653bf5f378f24e50b960b8210a81e42018b86f966ac0b5051e95013ceb0f4ae4b8505e86ee04ec4dd6d5451a95197f6ef91a1e4efb41c6af5276c3516e0fd8589f3e87184a97f8aee4d163948cd0c42030b91c3621256f5fa01dd29a69ddb60266843b66a7f4ccd68f315f3f0f9aa8164bf67db5e69fcc92d8c20e3651d4dabdc3c0fb49a7d2000000000000000000000000"], 0x78) execveat(r0, &(0x7f0000000000)='\x00', &(0x7f0000000280), 0x0, 0x1000) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r0) ioctl$FS_IOC_SETVERSION(r0, 0x40087602, &(0x7f0000000040)=0x1) [ 432.762786] kobject: 'loop2' (000000002286d61a): kobject_uevent_env [ 432.769693] kobject: 'loop2' (000000002286d61a): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 432.789920] kobject: 'loop5' (00000000092c6588): kobject_uevent_env 04:00:50 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, 0x0, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000002000)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001000)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqsrc(r2, 0x0, 0x2000000000000004, &(0x7f0000013ff4)={@remote}, 0xc) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000340)={{{@in=@broadcast, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0xff0f000000000000}}, {{@in6=@local, 0x0, 0x33}, 0x0, @in6=@local}}, 0xe8) close(r2) dup3(r0, r1, 0x0) 04:00:50 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x25d1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000080)="00000600000000000000", 0x0) ioctl$SG_EMULATED_HOST(r0, 0x2203, &(0x7f00000000c0)) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000100)={0x0, 0x3}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000180)={0x1d, 0xa, 0x400000000000000, 0x7, r1}, 0xfffffffffffffffd) write$binfmt_elf32(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000000000000000000030344fb9c2a29c2e000000000000380000000000000000000000000020000200000000000000000000000000000000000000000000000000000000040000000000000000000000000000030000000000000000000000000000000200000028e9653bf5f378f24e50b960a708174145bb01d6a50f2fc829fd80963e3bf5c2d2e615d315d714f05a1122491e1755108541bc36db45d3e98c2dcc3c3e8c8bf378610d5a14e853853b448e0a58b414df7c75e9370f81825c4b8d5ff26442e77fbc10396c67d02e5b06c2d20ee86d7baa0a29187bdd215a71fc5869442dd02acb9dd597af62ee7901241c5ca85825a8"], 0x78) execveat(r0, &(0x7f0000000000)='\x00', &(0x7f0000000280), 0x0, 0x1000) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r0) 04:00:50 executing program 2: r0 = socket$inet6(0xa, 0x400000000000803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000006c0)="0a5c2d023c126285718070") mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0xc, 0x32, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x8000000003c) connect$inet6(r1, &(0x7f00000002c0)={0xa, 0x0, 0x0, @dev, 0x9}, 0x1c) sendmsg(0xffffffffffffffff, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="2c7c579a7ae9c96d5cc9ad926a3eea1cf89515d52fc4300c0d33f21c491f50289b7a492cc0c90f234201a5c6f9b830f910b1902ed60d51ad019c73fc9065aa2c519f654874b01f87db4a2807b6a2c2532e9d54e219c9c5f95f", 0x59}], 0x1}, 0xc100) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000440)="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", 0x257}], 0x1}, 0x8000) socket$packet(0x11, 0x2, 0x300) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001480)="d09a0e63c9476288b671afdbd53a5994e137381f62021d1951b627b8dda57a5d17d744648c81c5703ed8146ab1b0171f89091b1dd3238d03dbb686df460963245dedf2973ee555af99499e44ad420dbf65fd46fbc99a1274429e2d5783751815828ec8cb3553110cca66460215353d19f6d8bbd8fb264eddea60b18e16c31aa5e200000491634ac2fd10e2cd30bcd7fede24263a7fff16e53ea293f3551b7147c33a44ea437fb1515c3e8d4f162fdebf8ebe11ae6fcd9372c8d8f19556ae091fe94215ae9434da412f6fa4cb6561e5f78ff9707844ee5d573fb294437722d9a06dfa61748c32c73d759933a8dd344c947d3efdbe90d0eb049df5fbb0c19f6785264b619c530d97395d44b04f7e2a280d658c7871ad373b792678c49227999651ef3b2ee1bc2b8f3035db376e8e09aa3837233c8713065a8ad131d24f6c42a3220d0e07c3d3e95d59a5dd10c09716b5f874ecf53aadfa5050ff40f2c3c4a629b6445e5836100afff5a8977583653b40ca316f8f11416e5c1bd5499636ddae25fc4970b37209cf5c0bf8e432160c258d14223baa52798e09858645773dd97e68a95310da713cff077b06000000d4f145e9199c126a7f235e5674a3c7f5c7129ac7c1a3319590249b6d34ef6c3d8b94c6fc7cdcbddb053243053f7bc1f230d3bc7dfc4359e33992d0a3946b914a093287a76ac4a249b5b86cc75476466e409553355fefab75e9268a8751ffc9481fcff1f49c475699595b315e2147ee038b7291600c6b1cf7c8f24d587b9464a67e5ccec17820e711b98f4f7d5053642068a3fff704c3fe26ba862b53e2622d6e8b4a4c815fb2ea90ef63e141209dd292fdf886ee3e64b90f47ce22661c7a21f7bc10df0248079b7be17284eb54e5ab5bde9c6857b3cb184586049e7741b2d8b5b1a19e99e1834a25959155720c1c0ef84d7b3c42e1ba282847d476cef0228b1422aba08e5f3c1cd279bbd1c5303c2e9c16a0da4f88f770fca118b09e92b51a33970e32ade003000000", 0x2d5}], 0x1}, 0x0) [ 432.803975] kobject: 'loop5' (00000000092c6588): fill_kobj_path: path = '/devices/virtual/block/loop5' 04:00:50 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, 0x0, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000002000)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001000)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqsrc(r2, 0x0, 0x2000000000000004, &(0x7f0000013ff4)={@remote}, 0xc) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000340)={{{@in=@broadcast, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x80ffffff00000000}}, {{@in6=@local, 0x0, 0x33}, 0x0, @in6=@local}}, 0xe8) close(r2) dup3(r0, r1, 0x0) [ 432.858821] kobject: 'loop2' (000000002286d61a): kobject_uevent_env [ 432.887799] kobject: 'loop2' (000000002286d61a): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 432.906217] kobject: 'loop1' (0000000008b6de74): kobject_uevent_env [ 432.917161] kobject: 'loop1' (0000000008b6de74): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 432.928196] kobject: 'loop4' (0000000061a206ed): kobject_uevent_env [ 432.935253] kobject: 'loop4' (0000000061a206ed): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 432.945342] kobject: 'loop0' (00000000b22beada): kobject_uevent_env [ 432.951978] kobject: 'loop0' (00000000b22beada): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 432.962001] kobject: 'loop5' (00000000092c6588): kobject_uevent_env [ 432.968596] kobject: 'loop5' (00000000092c6588): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 432.979118] kobject: 'loop2' (000000002286d61a): kobject_uevent_env [ 432.985560] kobject: 'loop2' (000000002286d61a): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 433.014778] kobject: 'loop1' (0000000008b6de74): kobject_uevent_env [ 433.027054] kobject: 'loop1' (0000000008b6de74): fill_kobj_path: path = '/devices/virtual/block/loop1' 04:00:50 executing program 3: clone(0x41fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f00000000c0)) syz_open_dev$rtc(&(0x7f0000000080)='/dev/rtc#\x00', 0x0, 0x0) ptrace(0x10, r0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000000)) getsockopt$inet_sctp6_SCTP_NODELAY(0xffffffffffffffff, 0x84, 0x3, &(0x7f0000000140), &(0x7f00000001c0)=0x4) ptrace$setregs(0xf, r0, 0x0, &(0x7f0000000180)="a96d55a756") ptrace$getregset(0x420b, r0, 0x2, &(0x7f0000000280)={0x0}) 04:00:50 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, 0x0, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000002000)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001000)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqsrc(r2, 0x0, 0x2000000000000004, &(0x7f0000013ff4)={@remote}, 0xc) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000340)={{{@in=@broadcast, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x6000000}}, {{@in6=@local, 0x0, 0x33}, 0x0, @in6=@local}}, 0xe8) close(r2) dup3(r0, r1, 0x0) 04:00:50 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x25d1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000080)="00000600000000000000", 0x0) ioctl$SG_EMULATED_HOST(r1, 0x2203, &(0x7f00000000c0)) write$binfmt_elf32(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000000000000000000000030006000000000000000000380000000000000000000000000020000200000000000000000000000000000000000000000000000000000000040000000000000000000000000000030000000000000000000000000000000200000028e9653bf5f378f24e50b960"], 0x78) execveat(r1, &(0x7f0000000000)='\x00', &(0x7f0000000280), 0x0, 0x1000) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 04:00:50 executing program 2: r0 = socket$inet6(0xa, 0x400000000000803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000006c0)="0a5c2d023c126285718070") mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0xc, 0x32, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x8000000003c) connect$inet6(r1, &(0x7f00000002c0)={0xa, 0x0, 0x0, @dev, 0x9}, 0x1c) sendmsg(0xffffffffffffffff, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="2c7c579a7ae9c96d5cc9ad926a3eea1cf89515d52fc4300c0d33f21c491f50289b7a492cc0c90f234201a5c6f9b830f910b1902ed60d51ad019c73fc9065aa2c519f654874b01f87db4a2807b6a2c2532e9d54e219c9c5f95f", 0x59}], 0x1}, 0xc100) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000440)="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", 0x257}], 0x1}, 0x8000) socket$packet(0x11, 0x2, 0x300) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001480)="d09a0e63c9476288b671afdbd53a5994e137381f62021d1951b627b8dda57a5d17d744648c81c5703ed8146ab1b0171f89091b1dd3238d03dbb686df460963245dedf2973ee555af99499e44ad420dbf65fd46fbc99a1274429e2d5783751815828ec8cb3553110cca66460215353d19f6d8bbd8fb264eddea60b18e16c31aa5e200000491634ac2fd10e2cd30bcd7fede24263a7fff16e53ea293f3551b7147c33a44ea437fb1515c3e8d4f162fdebf8ebe11ae6fcd9372c8d8f19556ae091fe94215ae9434da412f6fa4cb6561e5f78ff9707844ee5d573fb294437722d9a06dfa61748c32c73d759933a8dd344c947d3efdbe90d0eb049df5fbb0c19f6785264b619c530d97395d44b04f7e2a280d658c7871ad373b792678c49227999651ef3b2ee1bc2b8f3035db376e8e09aa3837233c8713065a8ad131d24f6c42a3220d0e07c3d3e95d59a5dd10c09716b5f874ecf53aadfa5050ff40f2c3c4a629b6445e5836100afff5a8977583653b40ca316f8f11416e5c1bd5499636ddae25fc4970b37209cf5c0bf8e432160c258d14223baa52798e09858645773dd97e68a95310da713cff077b06000000d4f145e9199c126a7f235e5674a3c7f5c7129ac7c1a3319590249b6d34ef6c3d8b94c6fc7cdcbddb053243053f7bc1f230d3bc7dfc4359e33992d0a3946b914a093287a76ac4a249b5b86cc75476466e409553355fefab75e9268a8751ffc9481fcff1f49c475699595b315e2147ee038b7291600c6b1cf7c8f24d587b9464a67e5ccec17820e711b98f4f7d5053642068a3fff704c3fe26ba862b53e2622d6e8b4a4c815fb2ea90ef63e141209dd292fdf886ee3e64b90f47ce22661c7a21f7bc10df0248079b7be17284eb54e5ab5bde9c6857b3cb184586049e7741b2d8b5b1a19e99e1834a25959155720c1c0ef84d7b3c42e1ba282847d476cef0228b1422aba08e5f3c1cd279bbd1c5303c2e9c16a0da4f88f770fca118b09e92b51a33970e32ade003000000", 0x2d5}], 0x1}, 0x0) 04:00:50 executing program 1: socket$inet6(0xa, 0x1, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, 0x0, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000002000)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000001000)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqsrc(r1, 0x0, 0x2000000000000004, &(0x7f0000013ff4)={@remote}, 0xc) setsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000340)={{{@in=@broadcast, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0xff0f000000000000}}, {{@in6=@local, 0x0, 0x33}, 0x0, @in6=@local}}, 0xe8) close(r1) 04:00:50 executing program 0: socket$inet6(0xa, 0x1, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, 0x0, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000002000)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000001000)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqsrc(r1, 0x0, 0x2000000000000004, &(0x7f0000013ff4)={@remote}, 0xc) setsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000340)={{{@in=@broadcast, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x80ffffff00000000}}, {{@in6=@local, 0x0, 0x33}, 0x0, @in6=@local}}, 0xe8) close(r1) [ 433.524774] kobject: 'loop3' (00000000a86c84e3): kobject_uevent_env [ 433.559535] kobject: 'loop3' (00000000a86c84e3): fill_kobj_path: path = '/devices/virtual/block/loop3' 04:00:51 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x25d1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000080)="00000600000000000000", 0x0) ioctl$SG_EMULATED_HOST(r1, 0x2203, &(0x7f0000000280)) getsockopt$inet_sctp6_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000000100)={0x0, 0x0, 0x81, 0xffffffffffffffc0, 0x8000, 0x6, 0x6, 0x7, {0x0, @in6={{0xa, 0x4e21, 0x5, @mcast1, 0x5}}, 0x6, 0x1000, 0xfffffffffffffe01, 0x4, 0x6}}, &(0x7f00000001c0)=0xb0) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f0000000200)={0x568, 0x1, 0x9, 0x7, r2}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000000000000000000000030006000000000000000000380000000000000000000000000020000200000000000000000000000000000000000000000000000000000000040000000000000000000000000000030000000000000000000000000000000200000028e9653bf5f378f24e50b960"], 0x78) execveat(r1, &(0x7f0000000000)='\x00', &(0x7f0000000280), 0x0, 0x1000) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 04:00:51 executing program 2: r0 = socket$inet6(0xa, 0x400000000000803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000006c0)="0a5c2d023c126285718070") mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0xc, 0x32, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x8000000003c) connect$inet6(r1, &(0x7f00000002c0)={0xa, 0x0, 0x0, @dev, 0x9}, 0x1c) sendmsg(0xffffffffffffffff, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="2c7c579a7ae9c96d5cc9ad926a3eea1cf89515d52fc4300c0d33f21c491f50289b7a492cc0c90f234201a5c6f9b830f910b1902ed60d51ad019c73fc9065aa2c519f654874b01f87db4a2807b6a2c2532e9d54e219c9c5f95f", 0x59}], 0x1}, 0xc100) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000440)="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", 0x257}], 0x1}, 0x8000) socket$packet(0x11, 0x2, 0x300) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001480)="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", 0x2d5}], 0x1}, 0x0) 04:00:51 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, 0x0, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000002000)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001000)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqsrc(r2, 0x0, 0x2000000000000004, &(0x7f0000013ff4)={@remote}, 0xc) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000340)={{{@in=@broadcast, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x3000000}}, {{@in6=@local, 0x0, 0x33}, 0x0, @in6=@local}}, 0xe8) close(r2) dup3(r0, r1, 0x0) [ 433.606183] kobject: 'loop2' (000000002286d61a): kobject_uevent_env [ 433.613104] kobject: 'loop2' (000000002286d61a): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 433.632628] kobject: 'loop5' (00000000092c6588): kobject_uevent_env [ 433.643793] kobject: 'loop5' (00000000092c6588): fill_kobj_path: path = '/devices/virtual/block/loop5' 04:00:51 executing program 2: r0 = socket$inet6(0xa, 0x400000000000803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000006c0)="0a5c2d023c126285718070") mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0xc, 0x32, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x8000000003c) connect$inet6(r1, &(0x7f00000002c0)={0xa, 0x0, 0x0, @dev, 0x9}, 0x1c) sendmsg(r1, 0x0, 0xc100) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000440)="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", 0x257}], 0x1}, 0x8000) socket$packet(0x11, 0x2, 0x300) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001480)="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", 0x2d5}], 0x1}, 0x0) 04:00:51 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x25d1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000080)="00000600000000000000", 0x0) ioctl$SG_EMULATED_HOST(r0, 0x2203, &(0x7f00000000c0)) write$binfmt_elf32(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="7f454c46000000000000000000000000030006000000000000000000380000000000fed454e8ce4c334b000000000000000020000200000000000000000000000000000000000000000000000000000000040000000000000000000000000000030000000000001917513583d3f673000200000028e9653bf5f378f24e50b960"], 0x78) execveat(r0, &(0x7f0000000000)='\x00', &(0x7f0000000280), 0x0, 0x1000) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) [ 433.673675] kobject: 'loop4' (0000000061a206ed): kobject_uevent_env [ 433.693673] kobject: 'loop4' (0000000061a206ed): fill_kobj_path: path = '/devices/virtual/block/loop4' 04:00:51 executing program 2: r0 = socket$inet6(0xa, 0x400000000000803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000006c0)="0a5c2d023c126285718070") mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0xc, 0x32, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x8000000003c) connect$inet6(r1, &(0x7f00000002c0)={0xa, 0x0, 0x0, @dev, 0x9}, 0x1c) sendmsg(r1, 0x0, 0xc100) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000440)="b10b938636ea69df7b5a9984bb1bc72ef58d96e56e11df900a707f4946b1637e2096c584b9a1b4e017163fbdb35160a56c11dfbe74df97d36d19ad6a91c6fb4ad19581b8cf707131830f7a22b1b263c9da0e443c5e969ed6a0d3bc508bf75c3147447379f585759ceba0de5cda46291dc1b8f106a83e1cde43a862d95413ce2616b261ed9f79913ae781b3b843ea1b4429a750b8ccb1952a7b863d0bada9f61df6609fe368eaf47c0ce9e46a22b0d75b063deeaa94285d0c43353046e0a308296a76b0b0145f8af9aa0ed0e18bc50509eaef21c8e03842a97df3a462ea3f9d5f83bf1d4d2875f0d5b24e941483f863cd2ea7c769bd3e594fb173dd873c7d9a3fd20939ad1d5867881ed77a078007b4972aba36cae02004373a6a74d74cb15a52c5f8426cb6f235d38048fd91f5d6100fd58a335df10add227d804167ba191c7a035c5a2a916e7fef18a6003578820b3e0be26a22f2c149f40a0335cadcca64a5e44179e6ce4d7f7c16e8a96c5be7cdf66eef901cb8eeabc94bae30acca8c6fa02889c32311044dcbc9a2e02e0632f7f9aa96849abede543773745e4652fccc503003f10cd68ddab594969ad36cb622ed7ba22dc46a80fb63ac2c561a80ae5c10b295b9f75d9536ba1ac24b8e9ae217611ffe79cb9422158475c1a89a51547d13c03b68d75ffb5717a35f381774567871e9e4190272c97eafcfa0a07a751d0bc8eeb0c206e12b2cff1065a3d5622635fa44c0dcb0722ad4c97e6b7d5844b2e9bab9ba1d083fa2930a3ea267d7f15d817e2b2e055ccfbaf019292f6156efd3a9a13ea90ecf59fc1bf35c6626db1c6759a50ed84acefd3cdb", 0x257}], 0x1}, 0x8000) socket$packet(0x11, 0x2, 0x300) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001480)="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", 0x2d5}], 0x1}, 0x0) [ 433.728007] kobject: 'loop2' (000000002286d61a): kobject_uevent_env [ 433.736516] kobject: 'loop2' (000000002286d61a): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 433.751168] kobject: 'loop5' (00000000092c6588): kobject_uevent_env [ 433.760171] kobject: 'loop5' (00000000092c6588): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 433.823034] kobject: 'loop4' (0000000061a206ed): kobject_uevent_env [ 433.830839] kobject: 'loop4' (0000000061a206ed): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 433.852126] kobject: 'loop5' (00000000092c6588): kobject_uevent_env [ 433.858980] kobject: 'loop5' (00000000092c6588): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 433.872532] kobject: 'loop2' (000000002286d61a): kobject_uevent_env [ 433.879451] kobject: 'loop2' (000000002286d61a): fill_kobj_path: path = '/devices/virtual/block/loop2' 04:00:51 executing program 3: clone(0x41fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f00000000c0)) syz_open_dev$rtc(&(0x7f0000000080)='/dev/rtc#\x00', 0x0, 0x0) ptrace(0x10, r0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000000)) getsockopt$inet_sctp6_SCTP_NODELAY(0xffffffffffffffff, 0x84, 0x3, &(0x7f0000000140), &(0x7f00000001c0)=0x4) ptrace$setregs(0xf, r0, 0x0, &(0x7f0000000180)="a96d55a756") ptrace$getregset(0x8, r0, 0x2, &(0x7f0000000280)={0x0}) 04:00:51 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, 0x0, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000002000)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001000)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqsrc(r2, 0x0, 0x2000000000000004, &(0x7f0000013ff4)={@remote}, 0xc) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000340)={{{@in=@broadcast, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x600}}, {{@in6=@local, 0x0, 0x33}, 0x0, @in6=@local}}, 0xe8) close(r2) dup3(r0, r1, 0x0) 04:00:51 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x25d1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$int_in(r0, 0x5473, &(0x7f0000000100)=0x1) r1 = memfd_create(&(0x7f0000000080)="00000600000000000000", 0x0) ioctl$SG_EMULATED_HOST(r1, 0x2203, &(0x7f00000000c0)) write$binfmt_elf32(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000000000000000f6ffff020006000000000000000000380000000000000000000200000000000000000000000000000000000000000000000000000000040000000000000000000000000000030000000000000000000000000000000200000028e9653bf5f379f24e50b960000000000000"], 0x78) syz_open_dev$vcsa(&(0x7f0000000140)='/dev/vcsa#\x00', 0x6, 0x100) execveat(r1, &(0x7f0000000000)='\x00', &(0x7f0000000280), 0x0, 0x1000) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 04:00:51 executing program 2: r0 = socket$inet6(0xa, 0x400000000000803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000006c0)="0a5c2d023c126285718070") mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0xc, 0x32, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x8000000003c) connect$inet6(r1, &(0x7f00000002c0)={0xa, 0x0, 0x0, @dev, 0x9}, 0x1c) sendmsg(r1, 0x0, 0xc100) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000440)="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", 0x257}], 0x1}, 0x8000) socket$packet(0x11, 0x2, 0x300) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001480)="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", 0x2d5}], 0x1}, 0x0) 04:00:51 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, 0x0, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000002000)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001000)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqsrc(r2, 0x0, 0x2000000000000004, &(0x7f0000013ff4)={@remote}, 0xc) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000340)={{{@in=@broadcast, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0xff0f000000000000}}, {{@in6=@local, 0x0, 0x33}, 0x0, @in6=@local}}, 0xe8) dup3(r0, r1, 0x0) 04:00:51 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, 0x0, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000002000)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001000)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqsrc(r2, 0x0, 0x2000000000000004, &(0x7f0000013ff4)={@remote}, 0xc) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000340)={{{@in=@broadcast, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x80ffffff00000000}}, {{@in6=@local, 0x0, 0x33}, 0x0, @in6=@local}}, 0xe8) dup3(r0, r1, 0x0) [ 434.360173] kobject: 'loop1' (0000000008b6de74): kobject_uevent_env [ 434.366859] kobject: 'loop1' (0000000008b6de74): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 434.377270] kobject: 'loop0' (00000000b22beada): kobject_uevent_env 04:00:51 executing program 2: r0 = socket$inet6(0xa, 0x400000000000803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000006c0)="0a5c2d023c126285718070") mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0xc, 0x32, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x8000000003c) connect$inet6(r1, &(0x7f00000002c0)={0xa, 0x0, 0x0, @dev, 0x9}, 0x1c) sendmsg(r1, &(0x7f0000000800)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000440)="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", 0x257}], 0x1}, 0x8000) socket$packet(0x11, 0x2, 0x300) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001480)="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", 0x2d5}], 0x1}, 0x0) [ 434.425636] kobject: 'loop0' (00000000b22beada): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 434.440451] kobject: 'loop3' (00000000a86c84e3): kobject_uevent_env [ 434.447106] kobject: 'loop3' (00000000a86c84e3): fill_kobj_path: path = '/devices/virtual/block/loop3' 04:00:51 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x25d1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000080)="00000600000000000000", 0x0) ioctl$SG_EMULATED_HOST(r1, 0x2203, &(0x7f00000000c0)) write$binfmt_elf32(r1, &(0x7f0000000380)=ANY=[], 0xfffffc1f) execveat(r1, &(0x7f0000000000)='\x00', &(0x7f0000000280), 0x0, 0x1000) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) ioctl$VIDIOC_S_EXT_CTRLS(r1, 0xc0205648, &(0x7f0000000180)={0x0, 0x6, 0xfffffffffffffffb, [], &(0x7f0000000140)={0x0, 0x0, [], @string=&(0x7f0000000100)=0x7ff}}) setsockopt$bt_l2cap_L2CAP_OPTIONS(r1, 0x6, 0x1, &(0x7f00000001c0)={0x1ff, 0x80, 0x8, 0x5, 0x9, 0x6, 0x7f}, 0xc) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) [ 434.475789] kobject: 'loop2' (000000002286d61a): kobject_uevent_env [ 434.486771] kobject: 'loop2' (000000002286d61a): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 434.512715] kobject: 'loop5' (00000000092c6588): kobject_uevent_env 04:00:52 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, 0x0, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000002000)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001000)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqsrc(r2, 0x0, 0x2000000000000004, &(0x7f0000013ff4)={@remote}, 0xc) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000340)={{{@in=@broadcast, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0xff0f000000000000}}, {{@in6=@local, 0x0, 0x33}, 0x0, @in6=@local}}, 0xe8) dup3(r0, r1, 0x0) 04:00:52 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, 0x0, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000002000)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001000)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqsrc(r2, 0x0, 0x2000000000000004, &(0x7f0000013ff4)={@remote}, 0xc) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000340)={{{@in=@broadcast, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x80ffffff00000000}}, {{@in6=@local, 0x0, 0x33}, 0x0, @in6=@local}}, 0xe8) dup3(r0, r1, 0x0) 04:00:52 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, 0x0, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000002000)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001000)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqsrc(r2, 0x0, 0x2000000000000004, &(0x7f0000013ff4)={@remote}, 0xc) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000340)={{{@in=@broadcast, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0xffffffff00000000}}, {{@in6=@local, 0x0, 0x33}, 0x0, @in6=@local}}, 0xe8) close(r2) dup3(r0, r1, 0x0) [ 434.530814] kobject: 'loop5' (00000000092c6588): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 434.574236] kobject: 'loop1' (0000000008b6de74): kobject_uevent_env [ 434.587995] kobject: 'loop1' (0000000008b6de74): fill_kobj_path: path = '/devices/virtual/block/loop1' 04:00:52 executing program 2: r0 = socket$inet6(0xa, 0x400000000000803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000006c0)="0a5c2d023c126285718070") mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0xc, 0x32, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x8000000003c) connect$inet6(r1, &(0x7f00000002c0)={0xa, 0x0, 0x0, @dev, 0x9}, 0x1c) sendmsg(r1, &(0x7f0000000800)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000440)="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", 0x257}], 0x1}, 0x8000) socket$packet(0x11, 0x2, 0x300) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001480)="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", 0x2d5}], 0x1}, 0x0) [ 434.616160] kobject: 'loop0' (00000000b22beada): kobject_uevent_env [ 434.623073] kobject: 'loop0' (00000000b22beada): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 434.636992] kobject: 'loop4' (0000000061a206ed): kobject_uevent_env [ 434.649454] kobject: 'loop4' (0000000061a206ed): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 434.677596] kobject: 'loop2' (000000002286d61a): kobject_uevent_env [ 434.685069] kobject: 'loop2' (000000002286d61a): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 434.700071] kobject: 'loop5' (00000000092c6588): kobject_uevent_env [ 434.706747] kobject: 'loop5' (00000000092c6588): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 434.750075] kobject: 'loop2' (000000002286d61a): kobject_uevent_env [ 434.758244] kobject: 'loop2' (000000002286d61a): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 434.773044] kobject: 'loop1' (0000000008b6de74): kobject_uevent_env [ 434.780585] kobject: 'loop1' (0000000008b6de74): fill_kobj_path: path = '/devices/virtual/block/loop1' 04:00:52 executing program 3: clone(0x41fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f00000000c0)) syz_open_dev$rtc(&(0x7f0000000080)='/dev/rtc#\x00', 0x0, 0x0) ptrace(0x10, r0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000000)) getsockopt$inet_sctp6_SCTP_NODELAY(0xffffffffffffffff, 0x84, 0x3, &(0x7f0000000140), &(0x7f00000001c0)=0x4) ptrace$setregs(0xf, r0, 0x0, &(0x7f0000000180)="a96d55a756") ptrace$getregset(0x15, r0, 0x2, &(0x7f0000000280)={0x0}) 04:00:52 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x25d1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000080)="00000600000000000000", 0x0) ioctl$SG_EMULATED_HOST(r1, 0x2203, &(0x7f00000000c0)) write$binfmt_elf32(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000000000000000000000030006000000000000000000380000000000000000000000000020000200000000000000000000000000000000000000000000000000000000040000000000000000000000000000030000000000000000000000000000000200000028e9653bf5f378f24e50b960"], 0x3fd) execveat(r1, &(0x7f0000000000)='\x00', &(0x7f0000000280), 0x0, 0x1000) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 04:00:52 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, 0x0, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000002000)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001000)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqsrc(r2, 0x0, 0x2000000000000004, &(0x7f0000013ff4)={@remote}, 0xc) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000340)={{{@in=@broadcast, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x80ffffff00000000}}, {{@in6=@local, 0x0, 0x33}, 0x0, @in6=@local}}, 0xe8) dup3(r0, r1, 0x0) 04:00:52 executing program 2: r0 = socket$inet6(0xa, 0x400000000000803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000006c0)="0a5c2d023c126285718070") mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0xc, 0x32, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x8000000003c) connect$inet6(r1, &(0x7f00000002c0)={0xa, 0x0, 0x0, @dev, 0x9}, 0x1c) sendmsg(r1, &(0x7f0000000800)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000440)="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", 0x257}], 0x1}, 0x8000) socket$packet(0x11, 0x2, 0x300) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001480)="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", 0x2d5}], 0x1}, 0x0) 04:00:52 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, 0x0, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000002000)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001000)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqsrc(r2, 0x0, 0x2000000000000004, &(0x7f0000013ff4)={@remote}, 0xc) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000340)={{{@in=@broadcast, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x100000000000000}}, {{@in6=@local, 0x0, 0x33}, 0x0, @in6=@local}}, 0xe8) close(r2) dup3(r0, r1, 0x0) 04:00:52 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, 0x0, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000002000)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001000)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqsrc(r2, 0x0, 0x2000000000000004, &(0x7f0000013ff4)={@remote}, 0xc) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000340)={{{@in=@broadcast, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0xff0f000000000000}}, {{@in6=@local, 0x0, 0x33}, 0x0, @in6=@local}}, 0xe8) dup3(r0, r1, 0x0) [ 435.221854] kobject: 'loop3' (00000000a86c84e3): kobject_uevent_env [ 435.232950] kobject: 'loop3' (00000000a86c84e3): fill_kobj_path: path = '/devices/virtual/block/loop3' 04:00:52 executing program 2: r0 = socket$inet6(0xa, 0x400000000000803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000006c0)="0a5c2d023c126285718070") mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0xc, 0x32, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x8000000003c) connect$inet6(r1, &(0x7f00000002c0)={0xa, 0x0, 0x0, @dev, 0x9}, 0x1c) sendmsg(r1, &(0x7f0000000800), 0xc100) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000440)="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", 0x257}], 0x1}, 0x8000) socket$packet(0x11, 0x2, 0x300) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001480)="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", 0x2d5}], 0x1}, 0x0) 04:00:52 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x25d1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000080)="00000600000000000000", 0x0) ioctl$SG_EMULATED_HOST(r1, 0x2203, &(0x7f00000000c0)) write$binfmt_elf32(r0, &(0x7f00000007c0)=ANY=[], 0xffffff8f) execveat(r1, &(0x7f0000000000)='\x00', &(0x7f0000000280), 0x0, 0x1000) r2 = mmap$binder(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x812, r1, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000001c0)={0x18, 0x0, &(0x7f0000000140)=[@register_looper, @acquire={0x40046305, 0x4}, @free_buffer={0x40086303, r2}], 0x3a, 0x0, &(0x7f0000000180)="c280e1c1528edb3394e143a1bca79010ee7044cd9fa83bf7c63999cd678614504450ecb5038ec0b7b83b4db8e3bfe0a5a4147f48dc55d79e59a3"}) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) ioctl$EVIOCSFF(r1, 0x40304580, &(0x7f0000000100)={0x57, 0x7, 0x1000, {0x1, 0x5}, {0xfffffffffffff801, 0x8}, @rumble={0x3490fc2b}}) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r1, 0x84, 0x20, &(0x7f0000000200)=0x10000, 0x4) [ 435.305727] kobject: 'loop2' (000000002286d61a): kobject_uevent_env [ 435.317913] kobject: 'loop2' (000000002286d61a): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 435.340220] kobject: 'loop5' (00000000092c6588): kobject_uevent_env 04:00:52 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, 0x0, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000002000)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001000)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000340)={{{@in=@broadcast, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0xff0f000000000000}}, {{@in6=@local, 0x0, 0x33}, 0x0, @in6=@local}}, 0xe8) close(r2) dup3(r0, r1, 0x0) 04:00:52 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, 0x0, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000002000)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001000)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000340)={{{@in=@broadcast, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x80ffffff00000000}}, {{@in6=@local, 0x0, 0x33}, 0x0, @in6=@local}}, 0xe8) close(r2) dup3(r0, r1, 0x0) 04:00:52 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, 0x0, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000002000)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001000)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqsrc(r2, 0x0, 0x2000000000000004, &(0x7f0000013ff4)={@remote}, 0xc) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000340)={{{@in=@broadcast, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0xff0f0000}}, {{@in6=@local, 0x0, 0x33}, 0x0, @in6=@local}}, 0xe8) close(r2) dup3(r0, r1, 0x0) [ 435.364136] kobject: 'loop5' (00000000092c6588): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 435.399416] kobject: 'loop0' (00000000b22beada): kobject_uevent_env 04:00:52 executing program 2: r0 = socket$inet6(0xa, 0x400000000000803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000006c0)="0a5c2d023c126285718070") mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0xc, 0x32, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x8000000003c) connect$inet6(r1, &(0x7f00000002c0)={0xa, 0x0, 0x0, @dev, 0x9}, 0x1c) sendmsg(r1, &(0x7f0000000800), 0xc100) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000440)="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", 0x257}], 0x1}, 0x8000) socket$packet(0x11, 0x2, 0x300) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001480)="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", 0x2d5}], 0x1}, 0x0) [ 435.445472] kobject: 'loop0' (00000000b22beada): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 435.481523] kobject: 'loop4' (0000000061a206ed): kobject_uevent_env [ 435.501092] kobject: 'loop4' (0000000061a206ed): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 435.524513] kobject: 'loop1' (0000000008b6de74): kobject_uevent_env [ 435.546480] kobject: 'loop1' (0000000008b6de74): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 435.559596] kobject: 'loop2' (000000002286d61a): kobject_uevent_env [ 435.566108] kobject: 'loop2' (000000002286d61a): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 435.577097] kobject: 'loop5' (00000000092c6588): kobject_uevent_env [ 435.583603] kobject: 'loop5' (00000000092c6588): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 435.593530] kobject: 'loop2' (000000002286d61a): kobject_uevent_env [ 435.600736] kobject: 'loop2' (000000002286d61a): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 435.610548] kobject: 'loop1' (0000000008b6de74): kobject_uevent_env [ 435.617011] kobject: 'loop1' (0000000008b6de74): fill_kobj_path: path = '/devices/virtual/block/loop1' 04:00:53 executing program 3: clone(0x41fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f00000000c0)) syz_open_dev$rtc(&(0x7f0000000080)='/dev/rtc#\x00', 0x0, 0x0) ptrace(0x10, r0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000000)) getsockopt$inet_sctp6_SCTP_NODELAY(0xffffffffffffffff, 0x84, 0x3, &(0x7f0000000140), &(0x7f00000001c0)=0x4) ptrace$setregs(0xf, r0, 0x0, &(0x7f0000000180)="a96d55a756") ptrace$getregset(0x11, r0, 0x2, &(0x7f0000000280)={0x0}) 04:00:53 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, 0x0, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000002000)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001000)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000340)={{{@in=@broadcast, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x80ffffff00000000}}, {{@in6=@local, 0x0, 0x33}, 0x0, @in6=@local}}, 0xe8) close(r2) dup3(r0, r1, 0x0) 04:00:53 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x25d1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000080)="00000600000000000000", 0x0) ioctl$SG_EMULATED_HOST(r1, 0x2203, &(0x7f00000000c0)) write$binfmt_elf32(r1, &(0x7f0000000240)=ANY=[@ANYRES16=r1], 0xffffffffffffff07) execveat(r1, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280), 0x0, 0x1000) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f0000000180), &(0x7f0000000200)=0x68) socket$vsock_stream(0x28, 0x1, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/autofs\x00', 0x200080, 0x0) 04:00:53 executing program 2: r0 = socket$inet6(0xa, 0x400000000000803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000006c0)="0a5c2d023c126285718070") mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0xc, 0x32, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x8000000003c) connect$inet6(r1, &(0x7f00000002c0)={0xa, 0x0, 0x0, @dev, 0x9}, 0x1c) sendmsg(r1, &(0x7f0000000800), 0xc100) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000440)="b10b938636ea69df7b5a9984bb1bc72ef58d96e56e11df900a707f4946b1637e2096c584b9a1b4e017163fbdb35160a56c11dfbe74df97d36d19ad6a91c6fb4ad19581b8cf707131830f7a22b1b263c9da0e443c5e969ed6a0d3bc508bf75c3147447379f585759ceba0de5cda46291dc1b8f106a83e1cde43a862d95413ce2616b261ed9f79913ae781b3b843ea1b4429a750b8ccb1952a7b863d0bada9f61df6609fe368eaf47c0ce9e46a22b0d75b063deeaa94285d0c43353046e0a308296a76b0b0145f8af9aa0ed0e18bc50509eaef21c8e03842a97df3a462ea3f9d5f83bf1d4d2875f0d5b24e941483f863cd2ea7c769bd3e594fb173dd873c7d9a3fd20939ad1d5867881ed77a078007b4972aba36cae02004373a6a74d74cb15a52c5f8426cb6f235d38048fd91f5d6100fd58a335df10add227d804167ba191c7a035c5a2a916e7fef18a6003578820b3e0be26a22f2c149f40a0335cadcca64a5e44179e6ce4d7f7c16e8a96c5be7cdf66eef901cb8eeabc94bae30acca8c6fa02889c32311044dcbc9a2e02e0632f7f9aa96849abede543773745e4652fccc503003f10cd68ddab594969ad36cb622ed7ba22dc46a80fb63ac2c561a80ae5c10b295b9f75d9536ba1ac24b8e9ae217611ffe79cb9422158475c1a89a51547d13c03b68d75ffb5717a35f381774567871e9e4190272c97eafcfa0a07a751d0bc8eeb0c206e12b2cff1065a3d5622635fa44c0dcb0722ad4c97e6b7d5844b2e9bab9ba1d083fa2930a3ea267d7f15d817e2b2e055ccfbaf019292f6156efd3a9a13ea90ecf59fc1bf35c6626db1c6759a50ed84acefd3cdb", 0x257}], 0x1}, 0x8000) socket$packet(0x11, 0x2, 0x300) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001480)="d09a0e63c9476288b671afdbd53a5994e137381f62021d1951b627b8dda57a5d17d744648c81c5703ed8146ab1b0171f89091b1dd3238d03dbb686df460963245dedf2973ee555af99499e44ad420dbf65fd46fbc99a1274429e2d5783751815828ec8cb3553110cca66460215353d19f6d8bbd8fb264eddea60b18e16c31aa5e200000491634ac2fd10e2cd30bcd7fede24263a7fff16e53ea293f3551b7147c33a44ea437fb1515c3e8d4f162fdebf8ebe11ae6fcd9372c8d8f19556ae091fe94215ae9434da412f6fa4cb6561e5f78ff9707844ee5d573fb294437722d9a06dfa61748c32c73d759933a8dd344c947d3efdbe90d0eb049df5fbb0c19f6785264b619c530d97395d44b04f7e2a280d658c7871ad373b792678c49227999651ef3b2ee1bc2b8f3035db376e8e09aa3837233c8713065a8ad131d24f6c42a3220d0e07c3d3e95d59a5dd10c09716b5f874ecf53aadfa5050ff40f2c3c4a629b6445e5836100afff5a8977583653b40ca316f8f11416e5c1bd5499636ddae25fc4970b37209cf5c0bf8e432160c258d14223baa52798e09858645773dd97e68a95310da713cff077b06000000d4f145e9199c126a7f235e5674a3c7f5c7129ac7c1a3319590249b6d34ef6c3d8b94c6fc7cdcbddb053243053f7bc1f230d3bc7dfc4359e33992d0a3946b914a093287a76ac4a249b5b86cc75476466e409553355fefab75e9268a8751ffc9481fcff1f49c475699595b315e2147ee038b7291600c6b1cf7c8f24d587b9464a67e5ccec17820e711b98f4f7d5053642068a3fff704c3fe26ba862b53e2622d6e8b4a4c815fb2ea90ef63e141209dd292fdf886ee3e64b90f47ce22661c7a21f7bc10df0248079b7be17284eb54e5ab5bde9c6857b3cb184586049e7741b2d8b5b1a19e99e1834a25959155720c1c0ef84d7b3c42e1ba282847d476cef0228b1422aba08e5f3c1cd279bbd1c5303c2e9c16a0da4f88f770fca118b09e92b51a33970e32ade003000000", 0x2d5}], 0x1}, 0x0) 04:00:53 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, 0x0, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000002000)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001000)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000340)={{{@in=@broadcast, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0xff0f000000000000}}, {{@in6=@local, 0x0, 0x33}, 0x0, @in6=@local}}, 0xe8) close(r2) dup3(r0, r1, 0x0) 04:00:53 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, 0x0, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000002000)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001000)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqsrc(r2, 0x0, 0x2000000000000004, &(0x7f0000013ff4)={@remote}, 0xc) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000340)={{{@in=@broadcast, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0xa4ffffff}}, {{@in6=@local, 0x0, 0x33}, 0x0, @in6=@local}}, 0xe8) close(r2) dup3(r0, r1, 0x0) [ 436.076973] kobject: 'loop3' (00000000a86c84e3): kobject_uevent_env [ 436.083452] kobject: 'loop3' (00000000a86c84e3): fill_kobj_path: path = '/devices/virtual/block/loop3' 04:00:53 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, 0x0, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000002000)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001000)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000340)={{{@in=@broadcast, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x80ffffff00000000}}, {{@in6=@local, 0x0, 0x33}, 0x0, @in6=@local}}, 0xe8) close(r2) dup3(r0, r1, 0x0) 04:00:53 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, 0x0, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000002000)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001000)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000340)={{{@in=@broadcast, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0xff0f000000000000}}, {{@in6=@local, 0x0, 0x33}, 0x0, @in6=@local}}, 0xe8) close(r2) dup3(r0, r1, 0x0) 04:00:53 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x25d1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000080)="00000600000000000000", 0x0) ioctl$SG_EMULATED_HOST(r1, 0x2203, &(0x7f00000000c0)) write$binfmt_elf32(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000000000000000000000030006000000000000000000380000000000000000000000000020000200000000000000000000000000000000000000000000000000000000040000000000000000000000000000030000000000000000000000000000000200000028e9653bf5f378f24e50b960"], 0x78) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r1, 0x6612) execveat(r1, &(0x7f0000000000)='\x00', &(0x7f0000000280), 0x0, 0x1000) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) r2 = syz_open_dev$usbmon(&(0x7f0000000100)='/dev/usbmon#\x00', 0x3f, 0x400) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xcc, &(0x7f0000000140)={{0xa, 0x4e20, 0x4, @mcast1, 0x8000}, {0xa, 0x4e20, 0x7, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x1f}}, 0x2}, 0x0, [0x1, 0x3, 0x80, 0x80, 0x7, 0x0, 0x1, 0xfffffffffffff801]}, 0x5c) pwrite64(r1, &(0x7f0000000400)="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", 0x1000, 0x3d) setsockopt$RDS_CONG_MONITOR(r2, 0x114, 0x6, &(0x7f00000001c0)=0x1, 0x4) ioctl$SG_EMULATED_HOST(r2, 0x2203, &(0x7f0000000200)) symlinkat(&(0x7f0000000240)='./file0\x00', r2, &(0x7f0000000280)='./file0\x00') [ 436.148231] kobject: 'loop1' (0000000008b6de74): kobject_uevent_env [ 436.154702] kobject: 'loop1' (0000000008b6de74): fill_kobj_path: path = '/devices/virtual/block/loop1' 04:00:53 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, 0x0, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000002000)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001000)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x2000000000000004, &(0x7f0000013ff4)={@remote}, 0xc) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000340)={{{@in=@broadcast, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0xff0f000000000000}}, {{@in6=@local, 0x0, 0x33}, 0x0, @in6=@local}}, 0xe8) close(0xffffffffffffffff) dup3(r0, r1, 0x0) 04:00:53 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, 0x0, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000002000)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001000)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqsrc(r2, 0x0, 0x2000000000000004, &(0x7f0000013ff4)={@remote}, 0xc) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000340)={{{@in=@broadcast, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x2000000}}, {{@in6=@local, 0x0, 0x33}, 0x0, @in6=@local}}, 0xe8) close(r2) dup3(r0, r1, 0x0) 04:00:53 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, 0x0, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000002000)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001000)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x2000000000000004, &(0x7f0000013ff4)={@remote}, 0xc) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000340)={{{@in=@broadcast, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x80ffffff00000000}}, {{@in6=@local, 0x0, 0x33}, 0x0, @in6=@local}}, 0xe8) close(0xffffffffffffffff) dup3(r0, r1, 0x0) [ 436.204516] kobject: 'loop0' (00000000b22beada): kobject_uevent_env [ 436.227927] kobject: 'loop0' (00000000b22beada): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 436.270085] kobject: 'loop5' (00000000092c6588): kobject_uevent_env [ 436.286771] kobject: 'loop5' (00000000092c6588): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 436.323764] kobject: 'loop4' (0000000061a206ed): kobject_uevent_env [ 436.335728] kobject: 'loop4' (0000000061a206ed): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 436.358986] kobject: 'loop1' (0000000008b6de74): kobject_uevent_env [ 436.365586] kobject: 'loop1' (0000000008b6de74): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 436.381928] kobject: 'loop0' (00000000b22beada): kobject_uevent_env [ 436.395322] kobject: 'loop0' (00000000b22beada): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 436.500753] kobject: 'loop5' (00000000092c6588): kobject_uevent_env [ 436.511085] kobject: 'loop5' (00000000092c6588): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 436.522451] kobject: 'loop2' (000000002286d61a): kobject_uevent_env [ 436.532675] kobject: 'loop2' (000000002286d61a): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 436.550012] kobject: 'rx-0' (00000000ef012455): kobject_cleanup, parent 0000000058f2a444 [ 436.558900] kobject: 'rx-0' (00000000ef012455): auto cleanup 'remove' event [ 436.566016] kobject: 'rx-0' (00000000ef012455): kobject_uevent_env [ 436.572667] kobject: 'rx-0' (00000000ef012455): fill_kobj_path: path = '/devices/virtual/net/syz_tun/queues/rx-0' [ 436.583317] kobject: 'rx-0' (00000000ef012455): auto cleanup kobject_del [ 436.590541] kobject: 'rx-0' (00000000ef012455): calling ktype release [ 436.597152] kobject: 'rx-0': free name [ 436.601075] kobject: 'tx-0' (0000000013f605b7): kobject_cleanup, parent 0000000058f2a444 [ 436.609403] kobject: 'tx-0' (0000000013f605b7): auto cleanup 'remove' event [ 436.616584] kobject: 'tx-0' (0000000013f605b7): kobject_uevent_env [ 436.622906] kobject: 'tx-0' (0000000013f605b7): fill_kobj_path: path = '/devices/virtual/net/syz_tun/queues/tx-0' [ 436.633755] kobject: 'tx-0' (0000000013f605b7): auto cleanup kobject_del [ 436.640739] kobject: 'tx-0' (0000000013f605b7): calling ktype release [ 436.647398] kobject: 'tx-0': free name [ 436.651287] kobject: 'queues' (0000000058f2a444): kobject_cleanup, parent (null) [ 436.659894] kobject: 'queues' (0000000058f2a444): calling ktype release [ 436.666673] kobject: 'queues' (0000000058f2a444): kset_release [ 436.672630] kobject: 'queues': free name [ 436.677026] kobject: 'syz_tun' (000000009b500169): kobject_uevent_env [ 436.683628] kobject: 'syz_tun' (000000009b500169): fill_kobj_path: path = '/devices/virtual/net/syz_tun' [ 436.726467] kobject: 'syz_tun' (000000009b500169): kobject_cleanup, parent (null) [ 436.735015] kobject: 'syz_tun' (000000009b500169): calling ktype release [ 436.741981] kobject: 'syz_tun': free name 04:00:54 executing program 3: clone(0x41fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f00000000c0)) syz_open_dev$rtc(&(0x7f0000000080)='/dev/rtc#\x00', 0x0, 0x0) ptrace(0x10, r0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000000)) getsockopt$inet_sctp6_SCTP_NODELAY(0xffffffffffffffff, 0x84, 0x3, &(0x7f0000000140), &(0x7f00000001c0)=0x4) ptrace$setregs(0xf