Warning: Permanently added '10.128.0.226' (ECDSA) to the list of known hosts. 2019/11/04 22:09:23 fuzzer started 2019/11/04 22:09:24 dialing manager at 10.128.0.105:42499 2019/11/04 22:09:24 syscalls: 2553 2019/11/04 22:09:24 code coverage: enabled 2019/11/04 22:09:24 comparison tracing: enabled 2019/11/04 22:09:24 extra coverage: extra coverage is not supported by the kernel 2019/11/04 22:09:24 setuid sandbox: enabled 2019/11/04 22:09:24 namespace sandbox: enabled 2019/11/04 22:09:24 Android sandbox: /sys/fs/selinux/policy does not exist 2019/11/04 22:09:24 fault injection: enabled 2019/11/04 22:09:24 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/11/04 22:09:24 net packet injection: enabled 2019/11/04 22:09:24 net device setup: enabled 2019/11/04 22:09:24 concurrency sanitizer: enabled 2019/11/04 22:09:24 devlink PCI setup: PCI device 0000:00:10.0 is not available [ 76.906815][ T7945] KCSAN: could not find function: 'poll_schedule_timeout' 2019/11/04 22:09:40 adding functions to KCSAN blacklist: 'mm_update_next_owner' 'osq_lock' 'blk_mq_get_request' 'xas_find_marked' 'queue_access_lock' 'yama_ptracer_del' 'add_timer_on' '__remove_hrtimer' 'add_timer' '__mark_inode_dirty' 'blk_mq_run_hw_queue' 'bio_chain' '__dev_queue_xmit' 'shmem_file_read_iter' 'page_counter_try_charge' 'blk_mq_dispatch_rq_list' 'fsnotify' 'sctp_assoc_migrate' 'ext4_mark_iloc_dirty' 'ext4_mb_good_group' 'ext4_da_write_end' 'tcp_add_backlog' '__skb_try_recv_from_queue' 'get_signal' 'vti_tunnel_xmit' 'tomoyo_supervisor' '__hrtimer_run_queues' 'get_task_cred' 'balance_dirty_pages' 'rcu_gp_fqs_loop' 'dd_has_work' 'tick_nohz_idle_stop_tick' 'pcpu_alloc' 'kauditd_thread' 'audit_log_start' 'pipe_wait' 'vm_area_dup' 'copy_process' 'virtqueue_get_buf_ctx' 'icmp_global_allow' 'task_dump_owner' 'do_exit' 'padata_find_next' '__neigh_event_send' 'generic_file_read_iter' 'ext4_remount' 'ep_poll' 'ktime_get_with_offset' 'fasync_remove_entry' 'blk_stat_add' 'poll_schedule_timeout' 'ext4_has_free_clusters' 'do_wait' 'list_lru_count_one' 'timer_clear_idle' '__delete_from_page_cache' 'ktime_get_real_seconds' 'snd_seq_prioq_cell_out' 'snapshot_refaults' 'percpu_counter_add_batch' 'find_next_bit' 'run_timer_softirq' 'pipe_poll' 'generic_fillattr' 'blk_mq_sched_dispatch_requests' 'generic_permission' 'find_alive_thread' 'find_get_pages_range_tag' 'do_dentry_open' 'inet_putpeer' 'ext4_nonda_switch' 'process_srcu' '__snd_rawmidi_transmit_ack' 'batadv_tt_local_add' 'wbt_issue' 'tick_do_update_jiffies64' 'ext4_free_inode' 'ksys_read' 'pid_update_inode' 'do_nanosleep' 'mem_cgroup_select_victim_node' 'snd_ctl_notify' 'complete_signal' 'futex_wait_queue_me' 'p9_poll_workfn' 'mod_timer' 'iput' 'lruvec_lru_size' 'taskstats_exit' 'kvm_mmu_notifier_change_pte' 'tick_sched_do_timer' 'generic_write_end' 'kcm_rfree' '__ext4_new_inode' 'do_syslog' 'n_tty_receive_buf_common' 'fanotify_handle_event' 'commit_echoes' 'ktime_get_seconds' 'hrtimer_wakeup' 'ext4_free_inodes_count' 'echo_char' '__wb_calc_thresh' 'rcu_gp_fqs_check_wake' 'kvm_mmu_notifier_invalidate_range_end' 22:13:34 executing program 0: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x1, 0x0) r1 = dup2(r0, r0) ioctl$KVM_SET_ONE_REG(r1, 0x4068aea3, &(0x7f0000000180)) 22:13:34 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_RUN(r2, 0x8004ae98, 0x0) [ 318.260317][ T7949] IPVS: ftp: loaded support on port[0] = 21 [ 318.368038][ T7949] chnl_net:caif_netlink_parms(): no params data found [ 318.445264][ T7949] bridge0: port 1(bridge_slave_0) entered blocking state [ 318.453141][ T7949] bridge0: port 1(bridge_slave_0) entered disabled state [ 318.461084][ T7949] device bridge_slave_0 entered promiscuous mode [ 318.468811][ T7949] bridge0: port 2(bridge_slave_1) entered blocking state [ 318.476794][ T7949] bridge0: port 2(bridge_slave_1) entered disabled state [ 318.484720][ T7949] device bridge_slave_1 entered promiscuous mode [ 318.504777][ T7949] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 318.508062][ T7953] IPVS: ftp: loaded support on port[0] = 21 [ 318.515850][ T7949] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 22:13:34 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000009000/0x18000)=nil, &(0x7f0000000280)=[@textreal={0x8, &(0x7f00000000c0)="f2a6bad004b00fee0f090f3036f30f1a970000660f3806581e0f08bad004b0beeef30f2af8baa100b000ee", 0x2b}], 0x1, 0x0, 0x0, 0x65) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) sendmsg$TIPC_CMD_RESET_LINK_STATS(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20a00050}, 0xc, 0x0}, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x40000004, 0x0, 0x0, 0x0, 0x4cb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 318.555561][ T7949] team0: Port device team_slave_0 added [ 318.573156][ T7949] team0: Port device team_slave_1 added [ 318.635348][ T7949] device hsr_slave_0 entered promiscuous mode [ 318.682756][ T7949] device hsr_slave_1 entered promiscuous mode [ 318.833767][ T7955] IPVS: ftp: loaded support on port[0] = 21 [ 318.848703][ T7953] chnl_net:caif_netlink_parms(): no params data found [ 318.963222][ T7949] bridge0: port 2(bridge_slave_1) entered blocking state [ 318.970317][ T7949] bridge0: port 2(bridge_slave_1) entered forwarding state [ 318.977761][ T7949] bridge0: port 1(bridge_slave_0) entered blocking state [ 318.984843][ T7949] bridge0: port 1(bridge_slave_0) entered forwarding state 22:13:35 executing program 3: openat$apparmor_task_exec(0xffffffffffffff9c, 0x0, 0x3, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x4002) io_setup(0xc32f, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0xb, 0x12, r1, 0x0) r2 = openat$mixer(0xffffffffffffff9c, 0x0, 0x8000, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r2, 0x4010ae67, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ftruncate(r0, 0x48280) r3 = open(&(0x7f00000004c0)='./bus\x00', 0x2, 0x0) write$P9_RATTACH(r3, &(0x7f0000000080)={0x35a}, 0xfffffff4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_submit(0x0, 0x0, 0x0) move_pages(0x0, 0x2000000000000155, &(0x7f0000000000)=[&(0x7f0000001000/0x4000)=nil, &(0x7f000000d000/0x2000)=nil, &(0x7f000000d000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil], 0x0, 0x0, 0x0) [ 319.116079][ T7953] bridge0: port 1(bridge_slave_0) entered blocking state [ 319.134455][ T7953] bridge0: port 1(bridge_slave_0) entered disabled state [ 319.172274][ T7953] device bridge_slave_0 entered promiscuous mode [ 319.212706][ T7953] bridge0: port 2(bridge_slave_1) entered blocking state [ 319.219887][ T7953] bridge0: port 2(bridge_slave_1) entered disabled state [ 319.252346][ T7953] device bridge_slave_1 entered promiscuous mode [ 319.371498][ T7949] 8021q: adding VLAN 0 to HW filter on device bond0 [ 319.403975][ T7953] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 319.441639][ T2405] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 319.450340][ T2405] bridge0: port 1(bridge_slave_0) entered disabled state [ 319.501678][ T2405] bridge0: port 2(bridge_slave_1) entered disabled state [ 319.514332][ T2405] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 319.560062][ T7949] 8021q: adding VLAN 0 to HW filter on device team0 [ 319.570053][ T7953] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 319.623253][ T2405] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 319.625504][ T7983] IPVS: ftp: loaded support on port[0] = 21 [ 319.632383][ T2405] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 319.691887][ T2405] bridge0: port 1(bridge_slave_0) entered blocking state [ 319.699014][ T2405] bridge0: port 1(bridge_slave_0) entered forwarding state [ 319.731894][ T2405] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 319.763084][ T2405] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 319.791989][ T2405] bridge0: port 2(bridge_slave_1) entered blocking state [ 319.799066][ T2405] bridge0: port 2(bridge_slave_1) entered forwarding state [ 319.852247][ T7955] chnl_net:caif_netlink_parms(): no params data found [ 319.861954][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 319.871138][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 319.903087][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 319.922632][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 319.948309][ T7953] team0: Port device team_slave_0 added [ 319.960907][ T7949] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 320.001362][ T7949] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 320.041808][ T7980] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 320.050395][ T7980] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 320.082104][ T7980] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready 22:13:36 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) ioctl(0xffffffffffffffff, 0x0, 0x0) r1 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioprio_get$pid(0x0, 0x0) mkdirat(r1, &(0x7f00000004c0)='./file1\x00', 0x0) creat(0x0, 0x0) fchdir(0xffffffffffffffff) [ 320.114413][ T7980] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 320.145034][ T7980] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 320.182663][ T7980] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 320.221927][ T7980] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 320.262721][ T7953] team0: Port device team_slave_1 added [ 320.301451][ T7980] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 320.322977][ T7980] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 320.330404][ T7980] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 320.416283][ T7949] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 320.495790][ T7953] device hsr_slave_0 entered promiscuous mode [ 320.551704][ T7953] device hsr_slave_1 entered promiscuous mode [ 320.593624][ T7953] debugfs: Directory 'hsr0' with parent '/' already present! 22:13:37 executing program 5: r0 = open(&(0x7f0000000340)='./bus\x00', 0x141042, 0x0) r1 = creat(&(0x7f0000000300)='./file0\x00', 0x0) write$P9_RREMOVE(r1, &(0x7f00000000c0), 0x3bb1) r2 = creat(&(0x7f0000000080)='./bus\x00', 0x0) r3 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) ftruncate(r3, 0x2081fd) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x10, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x6100) write$cgroup_type(r2, &(0x7f0000000200)='threaded\x00', 0xf642e7e) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000100)={0x0, r1}) [ 320.638075][ T7998] IPVS: ftp: loaded support on port[0] = 21 [ 320.663462][ T7955] bridge0: port 1(bridge_slave_0) entered blocking state [ 320.683311][ T7955] bridge0: port 1(bridge_slave_0) entered disabled state [ 320.696369][ T7955] device bridge_slave_0 entered promiscuous mode [ 320.743756][ T7955] bridge0: port 2(bridge_slave_1) entered blocking state [ 320.750851][ T7955] bridge0: port 2(bridge_slave_1) entered disabled state [ 320.788456][ T7955] device bridge_slave_1 entered promiscuous mode [ 320.944706][ T7983] chnl_net:caif_netlink_parms(): no params data found [ 320.959661][ T7955] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 321.053492][ T7953] 8021q: adding VLAN 0 to HW filter on device bond0 [ 321.061926][ T7955] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 22:13:37 executing program 0: r0 = socket$inet6(0xa, 0x80002, 0x0) sendmmsg$inet6(r0, &(0x7f0000007c40)=[{{&(0x7f0000000040)={0xa, 0x4e23, 0x0, @mcast2}, 0x1c, 0x0}}, {{&(0x7f0000001500)={0xa, 0x4e20, 0x0, @loopback}, 0x1c, 0x0, 0x0, &(0x7f0000000000)=[@rthdr={{0x18}}], 0x18}}], 0x2, 0x0) [ 321.141477][ T7952] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 321.149451][ T7952] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 321.171422][ T7983] bridge0: port 1(bridge_slave_0) entered blocking state [ 321.178959][ T7983] bridge0: port 1(bridge_slave_0) entered disabled state [ 321.215296][ T7983] device bridge_slave_0 entered promiscuous mode [ 321.266964][ T7953] 8021q: adding VLAN 0 to HW filter on device team0 [ 321.299825][ T7955] team0: Port device team_slave_0 added [ 321.308565][ T7983] bridge0: port 2(bridge_slave_1) entered blocking state [ 321.328050][ T7983] bridge0: port 2(bridge_slave_1) entered disabled state [ 321.355799][ T7983] device bridge_slave_1 entered promiscuous mode [ 321.407599][ T7955] team0: Port device team_slave_1 added [ 321.412777][ T8028] IPVS: ftp: loaded support on port[0] = 21 [ 321.425116][ T8029] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 321.442061][ T8029] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready 22:13:37 executing program 0: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000000680)='/dev/snd/seq\x00', 0x0, 0x0) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r2 = fcntl$dupfd(r1, 0x0, r1) r3 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r4 = dup2(r2, r3) r5 = dup2(r0, r4) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r5, 0x4040534e, &(0x7f00000002c0)={0x102e7}) [ 321.470593][ T8029] bridge0: port 1(bridge_slave_0) entered blocking state [ 321.477676][ T8029] bridge0: port 1(bridge_slave_0) entered forwarding state [ 321.558592][ T8029] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 321.594653][ T8029] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 321.621714][ T8029] bridge0: port 2(bridge_slave_1) entered blocking state [ 321.628820][ T8029] bridge0: port 2(bridge_slave_1) entered forwarding state [ 321.648448][ T8029] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 321.693709][ T8029] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 321.712481][ T8029] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 321.731853][ T8029] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 321.794912][ T7953] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 321.814167][ T7953] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 321.858127][ T7983] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 321.896112][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready 22:13:38 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) clone(0x800081ff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$EVIOCGREP(r0, 0x80084503, 0x0) [ 321.914258][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 321.942723][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 321.964917][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 322.007252][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 322.032234][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 322.044860][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 322.072052][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 322.181537][ T7955] device hsr_slave_0 entered promiscuous mode [ 322.221610][ T7955] device hsr_slave_1 entered promiscuous mode [ 322.251356][ T7955] debugfs: Directory 'hsr0' with parent '/' already present! [ 322.294907][ T7953] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 322.321912][ T7983] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 322.331096][ T7998] chnl_net:caif_netlink_parms(): no params data found [ 322.356226][ T8029] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 322.372141][ T8029] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 322.389319][ T8029] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 322.516857][ T7983] team0: Port device team_slave_0 added [ 322.611398][ T7998] bridge0: port 1(bridge_slave_0) entered blocking state [ 322.626493][ T7998] bridge0: port 1(bridge_slave_0) entered disabled state [ 322.665347][ T7998] device bridge_slave_0 entered promiscuous mode [ 322.709721][ T7983] team0: Port device team_slave_1 added [ 322.770636][ T7998] bridge0: port 2(bridge_slave_1) entered blocking state [ 322.791055][ T7998] bridge0: port 2(bridge_slave_1) entered disabled state [ 322.855097][ T7998] device bridge_slave_1 entered promiscuous mode [ 322.886066][ T8077] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. [ 323.044160][ T7983] device hsr_slave_0 entered promiscuous mode [ 323.084183][ T7983] device hsr_slave_1 entered promiscuous mode [ 323.164797][ T7983] debugfs: Directory 'hsr0' with parent '/' already present! [ 323.199295][ T7955] 8021q: adding VLAN 0 to HW filter on device bond0 [ 323.257421][ T7998] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 323.311788][ T7955] 8021q: adding VLAN 0 to HW filter on device team0 [ 323.384916][ T7998] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 323.424524][ T7952] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 323.461857][ T7952] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 323.544906][ T7998] team0: Port device team_slave_0 added [ 323.574626][ T8028] chnl_net:caif_netlink_parms(): no params data found [ 323.603441][ T7952] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 323.622826][ T7952] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 323.655697][ T7952] bridge0: port 1(bridge_slave_0) entered blocking state [ 323.662890][ T7952] bridge0: port 1(bridge_slave_0) entered forwarding state [ 323.745818][ T7952] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 323.795227][ T7952] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 323.831745][ T7952] bridge0: port 2(bridge_slave_1) entered blocking state [ 323.838834][ T7952] bridge0: port 2(bridge_slave_1) entered forwarding state [ 323.915519][ T7952] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 323.976628][ T7998] team0: Port device team_slave_1 added [ 324.006573][ T7952] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 324.052531][ T7952] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 324.146655][ T8034] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 324.162563][ T8034] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 324.272390][ T8034] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 324.315393][ T8034] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 324.366495][ T8034] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 324.420378][ T8034] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 324.477599][ T7955] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 324.518789][ T7955] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 324.604348][ T7998] device hsr_slave_0 entered promiscuous mode [ 324.651830][ T7998] device hsr_slave_1 entered promiscuous mode [ 324.701391][ T7998] debugfs: Directory 'hsr0' with parent '/' already present! [ 324.721990][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 324.732604][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 324.771872][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 324.805880][ T8028] bridge0: port 1(bridge_slave_0) entered blocking state [ 324.825637][ T8028] bridge0: port 1(bridge_slave_0) entered disabled state [ 324.846096][ T8028] device bridge_slave_0 entered promiscuous mode [ 324.966812][ T8028] bridge0: port 2(bridge_slave_1) entered blocking state [ 324.977471][ T8028] bridge0: port 2(bridge_slave_1) entered disabled state [ 325.007114][ T8028] device bridge_slave_1 entered promiscuous mode [ 325.043489][ T8034] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 325.051003][ T8034] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 325.117902][ T7955] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 325.216017][ T7983] 8021q: adding VLAN 0 to HW filter on device bond0 [ 325.264744][ T8028] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 325.329311][ T7983] 8021q: adding VLAN 0 to HW filter on device team0 [ 325.367647][ T8028] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 325.392664][ T7952] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 325.411812][ T7952] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 325.477238][ T7998] 8021q: adding VLAN 0 to HW filter on device bond0 [ 325.528403][ T8034] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 325.547367][ T8034] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 325.595412][ T8034] bridge0: port 1(bridge_slave_0) entered blocking state [ 325.602573][ T8034] bridge0: port 1(bridge_slave_0) entered forwarding state [ 325.670966][ T8034] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 325.706646][ T8034] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready 22:13:42 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0xa, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x19, 0x45}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) [ 325.731922][ T8034] bridge0: port 2(bridge_slave_1) entered blocking state [ 325.739038][ T8034] bridge0: port 2(bridge_slave_1) entered forwarding state [ 325.810998][ T8034] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 325.868158][ T7998] 8021q: adding VLAN 0 to HW filter on device team0 [ 325.906071][ T8133] kvm [8130]: vcpu0, guest rIP: 0xca Hyper-V uhandled wrmsr: 0x40000004 data 0x4d00000000f 22:13:42 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) pipe(0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_VAPIC_ADDR(r2, 0x4008ae93, &(0x7f0000000000)=0x2) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x62160554]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, &(0x7f0000000780)={"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"}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) inotify_init1(0x80000) mmap(&(0x7f0000004000/0x2000)=nil, 0x2000, 0x0, 0x11, 0xffffffffffffffff, 0x0) mmap$perf(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x0, 0x11, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000004000/0x2000)=nil, 0x2000, 0x0, 0x11, 0xffffffffffffffff, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 325.968149][ T7983] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 326.003679][ T8133] kvm [8130]: vcpu0, guest rIP: 0xca Hyper-V uhandled wrmsr: 0x40000004 data 0x4d00000000f [ 326.041627][ T7983] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 326.065484][ T8133] kvm [8130]: vcpu0, guest rIP: 0xca Hyper-V uhandled wrmsr: 0x40000004 data 0x4d00000000f [ 326.106988][ T8028] team0: Port device team_slave_0 added [ 326.112790][ T8133] kvm [8130]: vcpu0, guest rIP: 0xca Hyper-V uhandled wrmsr: 0x40000004 data 0x4d00000000f [ 326.112905][ T8133] kvm: pic: non byte write [ 326.151866][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 326.165340][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 326.207434][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 326.238119][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 326.270155][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 326.275805][ T8133] kvm: pic: non byte write [ 326.301619][ T8133] kvm: pic: non byte write [ 326.306365][ T8133] kvm: pic: non byte write [ 326.311080][ T8133] kvm: pic: non byte write [ 326.342375][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 326.361866][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 326.370512][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 326.465433][ T8133] kvm: pic: non byte write [ 326.491562][ T8133] kvm: pic: non byte write [ 326.524225][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 326.532734][ T8133] kvm: pic: non byte write [ 326.565657][ T8133] kvm: pic: non byte write [ 326.582091][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 326.653834][ T8133] kvm: pic: non byte write [ 326.675192][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 326.710859][ T8133] kvm [8130]: vcpu0, guest rIP: 0xca Hyper-V uhandled wrmsr: 0x40000004 data 0x4d00000000f [ 326.763498][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 326.781663][ T8133] kvm [8130]: vcpu0, guest rIP: 0xca Hyper-V uhandled wrmsr: 0x40000004 data 0x4d00000000f [ 326.882135][ T8028] team0: Port device team_slave_1 added [ 326.951805][ C1] hrtimer: interrupt took 36497 ns [ 326.989732][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 327.013167][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 327.101957][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 327.110611][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 327.215789][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 327.222883][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 327.373179][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 327.381108][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 327.505136][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 327.545508][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 327.552594][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 327.653492][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 327.660979][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 327.712799][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 327.764608][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 327.825705][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 327.897996][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 327.953606][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 328.007352][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 328.042596][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 328.062108][ T7983] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 328.124158][ T8028] device hsr_slave_0 entered promiscuous mode 22:13:44 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000400)='gid_map\x00') lseek(r0, 0x20400000, 0x0) read$char_usb(r0, 0x0, 0x0) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) 22:13:44 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_sctp(0x2, 0x5, 0x84) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) [ 328.175725][ T8028] device hsr_slave_1 entered promiscuous mode [ 328.241431][ T8028] debugfs: Directory 'hsr0' with parent '/' already present! [ 328.257215][ T7998] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 328.284615][ T7998] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 328.344064][ T7980] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 328.371897][ T7980] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 328.399604][ T7980] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 328.439923][ T7980] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 328.538134][ T7980] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 328.580293][ T7998] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 328.670738][ T7980] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 328.709069][ T7980] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 328.928626][ T8028] 8021q: adding VLAN 0 to HW filter on device bond0 [ 329.176745][ T8034] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 329.201971][ T8034] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 329.248217][ T8028] 8021q: adding VLAN 0 to HW filter on device team0 [ 329.276974][ T8034] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 329.316837][ T8034] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 329.371687][ T8034] bridge0: port 1(bridge_slave_0) entered blocking state [ 329.378758][ T8034] bridge0: port 1(bridge_slave_0) entered forwarding state [ 329.496277][ T7952] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 329.521929][ T7952] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 329.576276][ T7952] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 329.615236][ T7952] bridge0: port 2(bridge_slave_1) entered blocking state [ 329.622344][ T7952] bridge0: port 2(bridge_slave_1) entered forwarding state [ 329.681195][ T7952] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 329.716548][ T7952] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 329.756262][ T7952] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 329.785499][ T7952] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 329.854343][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 329.875184][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 329.904278][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 329.942230][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 329.981066][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 330.015030][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 330.041915][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 330.062104][ T8028] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 330.120276][ T8028] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 330.137786][ T7952] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 330.149405][ T7952] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready 22:13:46 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast2, 0x2}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x4008080, 0x0, 0x0) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="020d00ff14000000000000000000000008001200000003000000feffffff000006000000000000000000000000000000e0000002000000000000000000000000e000000100000000000000000000000005000500000000000a0000000000000000000000000000000000ffffac147f00000000000000000005000600000000000a00000000000000fe8000000000000000000000000000ff0000000000000000"], 0xa0}}, 0x0) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 22:13:46 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xc, 0x4, 0x4, 0x1, 0x0, r0}, 0x3cf) sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000200), 0xc, 0x0}, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000600)={r1, &(0x7f00000001c0), 0x0}, 0x20) [ 330.262773][ T26] audit: type=1804 audit(1572905626.624:31): pid=8220 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir055147719/syzkaller.g3eFmP/0/bus" dev="sda1" ino=16546 res=1 [ 330.336190][ T26] audit: type=1804 audit(1572905626.664:32): pid=8220 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir055147719/syzkaller.g3eFmP/0/bus" dev="sda1" ino=16546 res=1 [ 330.471398][ T26] audit: type=1804 audit(1572905626.744:33): pid=8220 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir055147719/syzkaller.g3eFmP/0/bus" dev="sda1" ino=16546 res=1 22:13:46 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="d6ac7d3f595131008901"], 0xa) close(r3) socket(0x10, 0x3, 0x0) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000180)="580000001400192340834b80040d8c560a", 0x11}], 0x1) writev(r2, &(0x7f0000000600)=[{&(0x7f0000000380)="f98ac693ce6908", 0x7}], 0x1) accept4$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0x14, 0x0) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r1, 0x0, r3, 0x0, 0x80000001, 0x0) 22:13:46 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x2fe, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100070ad25a80648c6308fb0124fc0012039c400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) [ 330.669857][ T8235] netlink: 'syz-executor.1': attribute type 2 has an invalid length. [ 330.734648][ T8235] device 0 entered promiscuous mode 22:13:47 executing program 5: creat(&(0x7f0000000180)='./file0\x00', 0x0) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000380)='/dev/dlm-monitor\x00', 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000600)) r2 = syz_open_pts(r1, 0x0) mount$9p_fd(0x0, &(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='9p\x00', 0x0, &(0x7f0000000440)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r2}}) 22:13:47 executing program 1: add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) keyctl$assume_authority(0x10, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) setsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f0000000100)=0x3, 0x4) sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) connect$vsock_dgram(0xffffffffffffffff, &(0x7f0000000040)={0x28, 0x0, 0xffffd8ef, @hyper}, 0x10) 22:13:47 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="d6ac7d3f595131008901"], 0xa) close(r3) socket(0x10, 0x3, 0x0) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000180)="580000001400192340834b80040d8c560a", 0x11}], 0x1) writev(r2, &(0x7f0000000600)=[{&(0x7f0000000380)="f98ac693ce6908", 0x7}], 0x1) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r1, 0x0, r3, 0x0, 0x80000001, 0x0) 22:13:47 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) write$binfmt_elf32(r2, &(0x7f00000007c0)=ANY=[@ANYBLOB="955a000004000000a423107d0b6e5fbdf500dfff"], 0x14) r4 = socket$inet(0x2, 0x3, 0x7f) bind$inet(r3, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) setsockopt$inet_int(r4, 0x0, 0x3, &(0x7f0000000140)=0x7ff, 0x4) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, &(0x7f0000000000)=0x80, 0x4) splice(r1, 0x0, r3, 0x0, 0x10005, 0x0) 22:13:47 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="d6ac7d3f595131008901"], 0xa) close(r3) socket(0x10, 0x3, 0x0) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000180)="580000001400192340834b80040d8c560a", 0x11}], 0x1) writev(r2, &(0x7f0000000600)=[{&(0x7f0000000380)="f98ac693ce6908", 0x7}], 0x1) accept4$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0x14, 0x0) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r1, 0x0, r3, 0x0, 0x80000001, 0x0) [ 331.446087][ T8257] netlink: 64 bytes leftover after parsing attributes in process `syz-executor.4'. 22:13:47 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) write$binfmt_elf32(r2, &(0x7f00000007c0)=ANY=[@ANYBLOB="955a000004000000a423107d0b6e5fbdf500dfff"], 0x14) r4 = socket$inet(0x2, 0x3, 0x7f) bind$inet(r3, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) setsockopt$inet_int(r4, 0x0, 0x3, &(0x7f0000000140)=0x7ff, 0x4) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, &(0x7f0000000000)=0x80, 0x4) splice(r1, 0x0, r3, 0x0, 0x10005, 0x0) 22:13:47 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) bind$llc(r1, &(0x7f0000000040), 0x10) getsockname(r1, &(0x7f0000000080)=@xdp={0x2c, 0x0, 0x0}, &(0x7f0000000100)=0x80) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xe, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [], r2}, 0x3c) 22:13:47 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="d6ac7d3f595131008901"], 0xa) close(r3) socket(0x10, 0x3, 0x0) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000180)="580000001400192340834b80040d8c560a", 0x11}], 0x1) writev(r2, &(0x7f0000000600)=[{&(0x7f0000000380)="f98ac693ce6908", 0x7}], 0x1) accept4$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0x14, 0x0) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r1, 0x0, r3, 0x0, 0x80000001, 0x0) 22:13:48 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x6b) setsockopt$inet6_MRT6_ADD_MIF(r0, 0x29, 0xca, 0x0, 0x0) 22:13:48 executing program 5: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x200000000000013, 0x0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000000280)=ANY=[@ANYBLOB="2d63707520ff92b2f197d86ad80547edb4cd282eaa6ef7ad6224d7b3ecb7b7a2436978ac3aad2814b44d3d3a4a9f842473a457206fcb95c665a50bd1a286b2445614306acda196b025e1dfa600a8713bc838b04a459a4600db8401f170d92ee34e1f04ea91df2bacb934a272caa68cb930f14608493b756c3d164ffa1f3c97a8728bf67e946ec1000000000000000035716ed0be9fb90437e907d4ee63c572a67fb888108744339e535a893509d12bb3d06a2e00"/189], 0x5) write$cgroup_subtree(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="2b6370752083ed73a63a01568a87077c7703df8e9c3609e9e541df12d8ea60853f8d7136905eb81e1209cd8814f8f5726fc357e360656f0ea4212190b02ba81808c60def2e460cbeb86d71a4"], 0x5) 22:13:48 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="d6ac7d3f595131008901"], 0xa) close(r3) socket(0x10, 0x3, 0x0) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000180)="580000001400192340834b80040d8c560a", 0x11}], 0x1) writev(r2, &(0x7f0000000600)=[{&(0x7f0000000380)="f98ac693ce6908", 0x7}], 0x1) accept4$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0x14, 0x0) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r1, 0x0, r3, 0x0, 0x80000001, 0x0) 22:13:48 executing program 1: socketpair$unix(0x1, 0x100000000001, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x8ec0, 0x0) write$P9_RSTATu(r3, &(0x7f00000004c0)=ANY=[@ANYBLOB='u'], 0x1) read$FUSE(r2, &(0x7f0000003340), 0x23) write$P9_RCLUNK(r3, &(0x7f0000000140)={0x7}, 0x7) close(r1) 22:13:48 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) write$binfmt_elf32(r2, &(0x7f00000007c0)=ANY=[@ANYBLOB="955a000004000000a423107d0b6e5fbdf500dfff"], 0x14) r4 = socket$inet(0x2, 0x3, 0x7f) bind$inet(r3, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) setsockopt$inet_int(r4, 0x0, 0x3, &(0x7f0000000140)=0x7ff, 0x4) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, &(0x7f0000000000)=0x80, 0x4) splice(r1, 0x0, r3, 0x0, 0x10005, 0x0) 22:13:48 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) pipe(0x0) write$P9_RSTATFS(0xffffffffffffffff, &(0x7f0000000080)={0x43, 0x9, 0x1, {0x0, 0x4, 0x3, 0x6, 0x0, 0x3, 0x7, 0xffffffffffffffff, 0x7}}, 0x43) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_VAPIC_ADDR(r2, 0x4008ae93, &(0x7f0000000000)=0x2) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62160554]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, &(0x7f0000000780)={"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"}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) inotify_init1(0x0) mmap(&(0x7f0000004000/0x2000)=nil, 0x2000, 0x0, 0x11, 0xffffffffffffffff, 0x0) mmap$perf(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x0, 0x11, 0xffffffffffffffff, 0x4000) mmap(&(0x7f0000004000/0x2000)=nil, 0x2000, 0x0, 0x11, 0xffffffffffffffff, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) ioctl$KVM_RUN(r2, 0xae80, 0x0) 22:13:48 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000140)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) r3 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_MSFILTER(r3, 0x29, 0x30, &(0x7f0000d4b000)={0x100000001, {{0xa, 0x0, 0x0, @mcast1}}, 0x0, 0x5, [{{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @mcast1, 0x1}}, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0xfffe, 0x0, @dev={0xfe, 0x80, [], 0x29}}}, {{0xa, 0x0, 0x0, @mcast1}}]}, 0x310) setsockopt$inet6_MCAST_MSFILTER(r3, 0x29, 0x30, &(0x7f0000dbd000)=ANY=[@ANYBLOB="01000000000000000a00000000000000ff01000000000000000000400000000100"/144], 0x90) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) syz_open_dev$loop(&(0x7f0000000640)='/dev/loop#\x00', 0x0, 0x1c1800) r4 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r4, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) 22:13:48 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x2, 0x3, 0x100000001) connect$inet(r0, &(0x7f0000000180)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x29}}, 0x10) r1 = open(&(0x7f0000000000)='./file0\x00', 0x42, 0x0) write$P9_RVERSION(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB="1500"], 0x2) ftruncate(r1, 0x8007ffc) sendfile(r0, r1, 0x0, 0xffff) 22:13:48 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) write$binfmt_elf32(r2, &(0x7f00000007c0)=ANY=[@ANYBLOB="955a000004000000a423107d0b6e5fbdf500dfff"], 0x14) r4 = socket$inet(0x2, 0x3, 0x7f) bind$inet(r3, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) setsockopt$inet_int(r4, 0x0, 0x3, &(0x7f0000000140)=0x7ff, 0x4) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, &(0x7f0000000000)=0x80, 0x4) splice(r1, 0x0, r3, 0x0, 0x10005, 0x0) 22:13:48 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="d6ac7d3f595131008901"], 0xa) close(r3) socket(0x10, 0x3, 0x0) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000180)="580000001400192340834b80040d8c560a", 0x11}], 0x1) writev(r2, &(0x7f0000000600)=[{&(0x7f0000000380)="f98ac693ce6908", 0x7}], 0x1) accept4$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0x14, 0x0) splice(r1, 0x0, r3, 0x0, 0x80000001, 0x0) [ 332.400547][ T26] audit: type=1800 audit(1572905628.754:34): pid=8312 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.5" name="file0" dev="sda1" ino=16538 res=0 22:13:48 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x0, 0x0, 0x0, 0x0, 0x20000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, 0x0, 0xfffffffffffffef4, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket(0x200000000000011, 0x0, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000240), 0x14) r1 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x0) r2 = creat(&(0x7f0000001600)='./bus\x00', 0x0) fcntl$setstatus(r2, 0x4, 0x44000) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) write$input_event(0xffffffffffffffff, &(0x7f00000001c0)={{}, 0x17, 0x9, 0x3}, 0x18) socket$nl_route(0x10, 0x3, 0x0) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000500)=""/4096) writev(0xffffffffffffffff, 0x0, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) r4 = open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x8000fffffffe) sendmsg$IPVS_CMD_NEW_DAEMON(r2, &(0x7f00000003c0)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000c0}, 0xc, &(0x7f0000000380)={&(0x7f00000002c0)={0x64, 0x0, 0x310, 0x70bd2d, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x81}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x3}, @IPVS_CMD_ATTR_DEST={0xc, 0x2, [@IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x101}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xfffffff7}, @IPVS_CMD_ATTR_DEST={0x2c, 0x2, [@IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x872}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8}, @IPVS_DEST_ATTR_FWD_METHOD={0x8}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x49d}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0x2}]}]}, 0x64}}, 0x800) socket(0x200000000000011, 0x0, 0x0) 22:13:48 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) write$binfmt_elf32(r2, &(0x7f00000007c0)=ANY=[@ANYBLOB="955a000004000000a423107d0b6e5fbdf500dfff"], 0x14) r4 = socket$inet(0x2, 0x3, 0x7f) bind$inet(r3, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) setsockopt$inet_int(r4, 0x0, 0x3, &(0x7f0000000140)=0x7ff, 0x4) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r1, 0x0, r3, 0x0, 0x10005, 0x0) 22:13:48 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="d6ac7d3f595131008901"], 0xa) close(r3) socket(0x10, 0x3, 0x0) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000180)="580000001400192340834b80040d8c560a", 0x11}], 0x1) writev(r2, &(0x7f0000000600)=[{&(0x7f0000000380)="f98ac693ce6908", 0x7}], 0x1) accept4$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0x14, 0x0) splice(r1, 0x0, r3, 0x0, 0x80000001, 0x0) 22:13:48 executing program 5: sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000000c80)={0x0, 0x0, 0x0}, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) io_setup(0x3b24, &(0x7f0000000740)=0x0) io_submit(r4, 0x6c2, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000780), 0x4000}]) 22:13:49 executing program 4: gettid() r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000640)={0x2, 0x0, @loopback}, 0x10) sendmmsg$inet(r0, &(0x7f0000000b00)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @dev, @dev}}}], 0x20}}], 0x2, 0x0) 22:13:49 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="d6ac7d3f595131008901"], 0xa) close(r3) socket(0x10, 0x3, 0x0) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000180)="580000001400192340834b80040d8c560a", 0x11}], 0x1) writev(r2, &(0x7f0000000600)=[{&(0x7f0000000380)="f98ac693ce6908", 0x7}], 0x1) accept4$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0x14, 0x0) splice(r1, 0x0, r3, 0x0, 0x80000001, 0x0) [ 332.758280][ T26] audit: type=1804 audit(1572905629.114:35): pid=8324 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir303623625/syzkaller.v3YKUW/7/bus" dev="sda1" ino=16574 res=1 22:13:49 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) write$binfmt_elf32(r2, &(0x7f00000007c0)=ANY=[@ANYBLOB="955a000004000000a423107d0b6e5fbdf500dfff"], 0x14) r4 = socket$inet(0x2, 0x3, 0x7f) bind$inet(r3, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) setsockopt$inet_int(r4, 0x0, 0x3, &(0x7f0000000140)=0x7ff, 0x4) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r1, 0x0, r3, 0x0, 0x10005, 0x0) [ 332.840165][ T26] audit: type=1804 audit(1572905629.194:36): pid=8332 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir303623625/syzkaller.v3YKUW/7/bus" dev="sda1" ino=16574 res=1 22:13:49 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000001300)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) fcntl$setstatus(r3, 0x4, 0x2800) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000280)="8b", 0x1) recvmmsg(r3, &(0x7f0000006100)=[{{&(0x7f0000000100)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, 0x80, &(0x7f0000000300), 0x0, &(0x7f0000000340)=""/120, 0x6f}}], 0x400000000000653, 0x0, 0x0) 22:13:49 executing program 0: mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x0, 0x2172, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000001000/0x2000)=nil, 0x2000, 0x2000, 0x3, &(0x7f0000009000/0x2000)=nil) 22:13:49 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r0, 0xc0505510, &(0x7f0000000000)={0x0, 0x1, 0x0, 0x0, &(0x7f0000000100)=[{}]}) 22:13:49 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="d6ac7d3f595131008901"], 0xa) close(r3) socket(0x10, 0x3, 0x0) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000180)="580000001400192340834b80040d8c560a", 0x11}], 0x1) writev(r2, &(0x7f0000000600)=[{&(0x7f0000000380)="f98ac693ce6908", 0x7}], 0x1) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r1, 0x0, r3, 0x0, 0x80000001, 0x0) 22:13:49 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) write$binfmt_elf32(r2, &(0x7f00000007c0)=ANY=[@ANYBLOB="955a000004000000a423107d0b6e5fbdf500dfff"], 0x14) r4 = socket$inet(0x2, 0x3, 0x7f) bind$inet(r3, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) setsockopt$inet_int(r4, 0x0, 0x3, &(0x7f0000000140)=0x7ff, 0x4) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r1, 0x0, r3, 0x0, 0x10005, 0x0) 22:13:49 executing program 4: perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = inotify_init1(0x0) ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, &(0x7f0000000040)) [ 333.236556][ T8356] netlink: 64 bytes leftover after parsing attributes in process `syz-executor.3'. 22:13:49 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000740)=0xb8, 0x4) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f0000000780)={@in={{0x2, 0x0, @local}}, 0x0, 0x9, 0x2, "a77760f5a7645bc43c241d69912dda0c63c2a66726f8cfafd6c8fe2c98de7ba44947a79015f0fe57917cb62a93987a938fdedfce7bbba4fec2d8a09c41fb233245f2604b9e07b8ab79ec15ef2818a179"}, 0xd8) bind$inet(r2, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) msgctl$IPC_SET(0x0, 0x1, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000100), 0x4) recvmsg(r2, &(0x7f0000000240)={0x0, 0xfffffffffffffd83, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0x5801}], 0x1}, 0x100) write$binfmt_elf64(r2, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 22:13:49 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="d6ac7d3f595131008901"], 0xa) close(r3) socket(0x10, 0x3, 0x0) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000180)="580000001400192340834b80040d8c560a", 0x11}], 0x1) writev(r2, &(0x7f0000000600)=[{&(0x7f0000000380)="f98ac693ce6908", 0x7}], 0x1) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r1, 0x0, r3, 0x0, 0x80000001, 0x0) 22:13:49 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) fgetxattr(r0, &(0x7f0000000000)=@known='\x00\x00\x00\x00apprity\x00'/26, 0x0, 0x0) 22:13:49 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e20, @multicast2}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) 22:13:49 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) write$binfmt_elf32(r2, &(0x7f00000007c0)=ANY=[@ANYBLOB="955a000004000000a423107d0b6e5fbdf500dfff"], 0x14) r4 = socket$inet(0x2, 0x3, 0x7f) bind$inet(r3, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) setsockopt$inet_int(r4, 0x0, 0x3, &(0x7f0000000140)=0x7ff, 0x4) setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, &(0x7f0000000000)=0x80, 0x4) splice(r1, 0x0, r3, 0x0, 0x10005, 0x0) 22:13:49 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000001300)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) fcntl$setstatus(r3, 0x4, 0x2800) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000280)="8b", 0x1) recvmmsg(r3, &(0x7f0000006100)=[{{&(0x7f0000000100)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, 0x80, &(0x7f0000000300), 0x0, &(0x7f0000000340)=""/120, 0x6f}}], 0x400000000000653, 0x0, 0x0) [ 333.539445][ T8372] netlink: 64 bytes leftover after parsing attributes in process `syz-executor.3'. 22:13:50 executing program 4: r0 = socket$inet(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000140)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000000700)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0xb}}, 0x10) setsockopt$sock_int(r0, 0x1, 0x7, &(0x7f0000000040), 0x4) r1 = socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet(r0, &(0x7f0000000500)="00abe6d29e6101cb8b41eea5cf2e67fea541e9b7b65fe42e517d5f81d2919e1b2f4cf7f77a16fc3e961a0847916c7c2d9b77cd3160567341263cf19b3b2c6177e7065dda850c756c06aede12e9da8118bb5464ad07fa6146f6903ee57345cbd7551f547bdbe947b4f9a0b28cf29a28eda534fc6e2c9bf2c36c87da9ad79e6e7090", 0x4202692d7f740df1, 0x4000801, 0x0, 0xfffffffffffffeda) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) recvfrom$inet(r0, &(0x7f0000000440)=""/98, 0x7cd97198ffceeca1, 0x0, 0x0, 0xffffffffffffffae) socketpair$unix(0x1, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x279) connect$inet6(0xffffffffffffffff, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockname(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f00000000c0)={'lo\x00', 0x101}) read(r0, &(0x7f00000002c0)=""/241, 0xf1) 22:13:50 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="d6ac7d3f595131008901"], 0xa) close(r3) socket(0x10, 0x3, 0x0) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000180)="580000001400192340834b80040d8c560a", 0x11}], 0x1) writev(r2, &(0x7f0000000600)=[{&(0x7f0000000380)="f98ac693ce6908", 0x7}], 0x1) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r1, 0x0, r3, 0x0, 0x80000001, 0x0) [ 333.722234][ T8386] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 22:13:50 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) write$binfmt_elf32(r2, &(0x7f00000007c0)=ANY=[@ANYBLOB="955a000004000000a423107d0b6e5fbdf500dfff"], 0x14) r4 = socket$inet(0x2, 0x3, 0x7f) bind$inet(r3, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) setsockopt$inet_int(r4, 0x0, 0x3, &(0x7f0000000140)=0x7ff, 0x4) setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, &(0x7f0000000000)=0x80, 0x4) splice(r1, 0x0, r3, 0x0, 0x10005, 0x0) 22:13:50 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000740)=0xb8, 0x4) dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f0000000780)={@in={{0x2, 0x0, @local}}, 0x0, 0x9, 0x2, "a77760f5a7645bc43c241d69912dda0c63c2a66726f8cfafd6c8fe2c98de7ba44947a79015f0fe57917cb62a93987a938fdedfce7bbba4fec2d8a09c41fb233245f2604b9e07b8ab79ec15ef2818a179"}, 0xd8) bind$inet(r2, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) msgctl$IPC_SET(0x0, 0x1, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000100), 0x4) recvmsg(r2, &(0x7f0000000240)={0x0, 0xfffffffffffffd83, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0x5801}], 0x1}, 0x100) write$binfmt_elf64(r2, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) [ 333.888696][ T8392] netlink: 64 bytes leftover after parsing attributes in process `syz-executor.3'. [ 333.917779][ T8395] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 22:13:50 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000001300)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) fcntl$setstatus(r3, 0x4, 0x2800) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000280)="8b", 0x1) recvmmsg(r3, &(0x7f0000006100)=[{{&(0x7f0000000100)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, 0x80, &(0x7f0000000300), 0x0, &(0x7f0000000340)=""/120, 0x6f}}], 0x400000000000653, 0x0, 0x0) 22:13:50 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="d6ac7d3f595131008901"], 0xa) close(r3) socket(0x10, 0x3, 0x0) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000180)="580000001400192340834b80040d8c560a", 0x11}], 0x1) accept4$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0x14, 0x0) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r1, 0x0, r3, 0x0, 0x80000001, 0x0) [ 334.224515][ T8412] device lo entered promiscuous mode 22:13:50 executing program 5: ioctl$BLKRESETZONE(0xffffffffffffffff, 0x40101283, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) io_submit(0x0, 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) sched_setaffinity(0x0, 0x0, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000001300)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000280)="8b", 0x1) recvmmsg(r3, &(0x7f0000006100)=[{{&(0x7f0000000100)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, 0x80, &(0x7f0000000300), 0x0, &(0x7f0000000340)=""/120, 0x6f}}], 0x400000000000653, 0x0, 0x0) 22:13:50 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) write$binfmt_elf32(r2, &(0x7f00000007c0)=ANY=[@ANYBLOB="955a000004000000a423107d0b6e5fbdf500dfff"], 0x14) r4 = socket$inet(0x2, 0x3, 0x7f) bind$inet(r3, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) setsockopt$inet_int(r4, 0x0, 0x3, &(0x7f0000000140)=0x7ff, 0x4) setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, &(0x7f0000000000)=0x80, 0x4) splice(r1, 0x0, r3, 0x0, 0x10005, 0x0) 22:13:50 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000140)={0x81}) 22:13:50 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="d6ac7d3f595131008901"], 0xa) close(r3) socket(0x10, 0x3, 0x0) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000180)="580000001400192340834b80040d8c560a", 0x11}], 0x1) accept4$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0x14, 0x0) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r1, 0x0, r3, 0x0, 0x80000001, 0x0) 22:13:50 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) write$binfmt_elf32(r2, &(0x7f00000007c0)=ANY=[@ANYBLOB="955a000004000000a423107d0b6e5fbdf500dfff"], 0x14) socket$inet(0x2, 0x3, 0x7f) bind$inet(r3, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, &(0x7f0000000000)=0x80, 0x4) splice(r1, 0x0, r3, 0x0, 0x10005, 0x0) 22:13:51 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="d6ac7d3f595131008901"], 0xa) close(r3) socket(0x10, 0x3, 0x0) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000180)="580000001400192340834b80040d8c560a", 0x11}], 0x1) accept4$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0x14, 0x0) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r1, 0x0, r3, 0x0, 0x80000001, 0x0) 22:13:51 executing program 4: 22:13:51 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$ARPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x63, &(0x7f0000000100)={'IDLETIMER\x00'}, &(0x7f0000000140)=0x1e) 22:13:51 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) write$binfmt_elf32(r2, &(0x7f00000007c0)=ANY=[@ANYBLOB="955a000004000000a423107d0b6e5fbdf500dfff"], 0x14) socket$inet(0x2, 0x3, 0x7f) bind$inet(r3, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, &(0x7f0000000000)=0x80, 0x4) splice(r1, 0x0, r3, 0x0, 0x10005, 0x0) 22:13:51 executing program 0: 22:13:51 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="d6ac7d3f595131008901"], 0xa) close(r3) socket(0x10, 0x3, 0x0) writev(r2, &(0x7f0000000600)=[{&(0x7f0000000380)="f98ac693ce6908", 0x7}], 0x1) accept4$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0x14, 0x0) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r1, 0x0, r3, 0x0, 0x80000001, 0x0) 22:13:51 executing program 5: 22:13:51 executing program 1: 22:13:51 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="d6ac7d3f595131008901"], 0xa) close(r3) socket(0x10, 0x3, 0x0) writev(r2, &(0x7f0000000600)=[{&(0x7f0000000380)="f98ac693ce6908", 0x7}], 0x1) accept4$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0x14, 0x0) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r1, 0x0, r3, 0x0, 0x80000001, 0x0) 22:13:51 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) write$binfmt_elf32(r2, &(0x7f00000007c0)=ANY=[@ANYBLOB="955a000004000000a423107d0b6e5fbdf500dfff"], 0x14) socket$inet(0x2, 0x3, 0x7f) bind$inet(r3, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, &(0x7f0000000000)=0x80, 0x4) splice(r1, 0x0, r3, 0x0, 0x10005, 0x0) 22:13:51 executing program 4: 22:13:51 executing program 0: 22:13:51 executing program 5: 22:13:51 executing program 0: 22:13:51 executing program 4: 22:13:51 executing program 1: 22:13:51 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="d6ac7d3f595131008901"], 0xa) close(r3) socket(0x10, 0x3, 0x0) writev(r2, &(0x7f0000000600)=[{&(0x7f0000000380)="f98ac693ce6908", 0x7}], 0x1) accept4$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0x14, 0x0) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r1, 0x0, r3, 0x0, 0x80000001, 0x0) 22:13:51 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) write$binfmt_elf32(r2, &(0x7f00000007c0)=ANY=[@ANYBLOB="955a000004000000a423107d0b6e5fbdf500dfff"], 0x14) r4 = socket$inet(0x2, 0x3, 0x7f) setsockopt$inet_int(r4, 0x0, 0x3, &(0x7f0000000140)=0x7ff, 0x4) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, &(0x7f0000000000)=0x80, 0x4) splice(r1, 0x0, r3, 0x0, 0x10005, 0x0) 22:13:52 executing program 1: 22:13:52 executing program 5: 22:13:52 executing program 4: 22:13:52 executing program 0: 22:13:52 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) write$binfmt_elf32(r2, &(0x7f00000007c0)=ANY=[@ANYBLOB="955a000004000000a423107d0b6e5fbdf500dfff"], 0x14) r4 = socket$inet(0x2, 0x3, 0x7f) setsockopt$inet_int(r4, 0x0, 0x3, &(0x7f0000000140)=0x7ff, 0x4) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, &(0x7f0000000000)=0x80, 0x4) splice(r1, 0x0, r3, 0x0, 0x10005, 0x0) 22:13:52 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="d6ac7d3f595131008901"], 0xa) close(r3) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000180)="580000001400192340834b80040d8c560a", 0x11}], 0x1) writev(r2, &(0x7f0000000600)=[{&(0x7f0000000380)="f98ac693ce6908", 0x7}], 0x1) accept4$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0x14, 0x0) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r1, 0x0, r3, 0x0, 0x80000001, 0x0) 22:13:52 executing program 0: 22:13:52 executing program 1: 22:13:52 executing program 4: 22:13:52 executing program 5: 22:13:52 executing program 0: 22:13:52 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="d6ac7d3f595131008901"], 0xa) close(r3) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000180)="580000001400192340834b80040d8c560a", 0x11}], 0x1) writev(r2, &(0x7f0000000600)=[{&(0x7f0000000380)="f98ac693ce6908", 0x7}], 0x1) accept4$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0x14, 0x0) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r1, 0x0, r3, 0x0, 0x80000001, 0x0) 22:13:52 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) write$binfmt_elf32(r2, &(0x7f00000007c0)=ANY=[@ANYBLOB="955a000004000000a423107d0b6e5fbdf500dfff"], 0x14) r4 = socket$inet(0x2, 0x3, 0x7f) setsockopt$inet_int(r4, 0x0, 0x3, &(0x7f0000000140)=0x7ff, 0x4) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, &(0x7f0000000000)=0x80, 0x4) splice(r1, 0x0, r3, 0x0, 0x10005, 0x0) 22:13:52 executing program 1: 22:13:52 executing program 4: 22:13:52 executing program 5: 22:13:52 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) write$binfmt_elf32(r2, &(0x7f00000007c0)=ANY=[@ANYBLOB="955a000004000000a423107d0b6e5fbdf500dfff"], 0x14) bind$inet(r3, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x3, &(0x7f0000000140)=0x7ff, 0x4) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, &(0x7f0000000000)=0x80, 0x4) splice(r1, 0x0, r3, 0x0, 0x10005, 0x0) 22:13:52 executing program 1: 22:13:52 executing program 0: 22:13:52 executing program 4: 22:13:52 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="d6ac7d3f595131008901"], 0xa) close(r3) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000180)="580000001400192340834b80040d8c560a", 0x11}], 0x1) writev(r2, &(0x7f0000000600)=[{&(0x7f0000000380)="f98ac693ce6908", 0x7}], 0x1) accept4$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0x14, 0x0) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r1, 0x0, r3, 0x0, 0x80000001, 0x0) 22:13:53 executing program 5: 22:13:53 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) write$binfmt_elf32(r2, &(0x7f00000007c0)=ANY=[@ANYBLOB="955a000004000000a423107d0b6e5fbdf500dfff"], 0x14) bind$inet(r3, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x3, &(0x7f0000000140)=0x7ff, 0x4) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, &(0x7f0000000000)=0x80, 0x4) splice(r1, 0x0, r3, 0x0, 0x10005, 0x0) 22:13:53 executing program 1: 22:13:53 executing program 4: 22:13:53 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="d6ac7d3f595131008901"], 0xa) socket(0x10, 0x3, 0x0) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000180)="580000001400192340834b80040d8c560a", 0x11}], 0x1) writev(r2, &(0x7f0000000600)=[{&(0x7f0000000380)="f98ac693ce6908", 0x7}], 0x1) accept4$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0x14, 0x0) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r1, 0x0, r3, 0x0, 0x80000001, 0x0) 22:13:53 executing program 0: 22:13:53 executing program 5: 22:13:53 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) write$binfmt_elf32(r2, &(0x7f00000007c0)=ANY=[@ANYBLOB="955a000004000000a423107d0b6e5fbdf500dfff"], 0x14) bind$inet(r3, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x3, &(0x7f0000000140)=0x7ff, 0x4) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, &(0x7f0000000000)=0x80, 0x4) splice(r1, 0x0, r3, 0x0, 0x10005, 0x0) 22:13:53 executing program 0: 22:13:53 executing program 1: 22:13:53 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="d6ac7d3f595131008901"], 0xa) socket(0x10, 0x3, 0x0) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000180)="580000001400192340834b80040d8c560a", 0x11}], 0x1) writev(r2, &(0x7f0000000600)=[{&(0x7f0000000380)="f98ac693ce6908", 0x7}], 0x1) accept4$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0x14, 0x0) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r1, 0x0, r3, 0x0, 0x80000001, 0x0) 22:13:53 executing program 4: 22:13:53 executing program 5: 22:13:53 executing program 1: 22:13:53 executing program 0: 22:13:53 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") pipe(&(0x7f0000000240)={0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet(0x2, 0x3, 0x7f) bind$inet(r2, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) setsockopt$inet_int(r3, 0x0, 0x3, &(0x7f0000000140)=0x7ff, 0x4) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) setsockopt$SO_TIMESTAMPING(r2, 0x1, 0x25, &(0x7f0000000000)=0x80, 0x4) splice(r1, 0x0, r2, 0x0, 0x10005, 0x0) 22:13:53 executing program 4: 22:13:53 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="d6ac7d3f595131008901"], 0xa) socket(0x10, 0x3, 0x0) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000180)="580000001400192340834b80040d8c560a", 0x11}], 0x1) writev(r2, &(0x7f0000000600)=[{&(0x7f0000000380)="f98ac693ce6908", 0x7}], 0x1) accept4$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0x14, 0x0) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r1, 0x0, r3, 0x0, 0x80000001, 0x0) 22:13:54 executing program 1: 22:13:54 executing program 5: 22:13:54 executing program 0: 22:13:54 executing program 4: 22:13:54 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) close(r3) socket(0x10, 0x3, 0x0) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000180)="580000001400192340834b80040d8c560a", 0x11}], 0x1) writev(r2, &(0x7f0000000600)=[{&(0x7f0000000380)="f98ac693ce6908", 0x7}], 0x1) accept4$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0x14, 0x0) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r1, 0x0, r3, 0x0, 0x80000001, 0x0) 22:13:54 executing program 5: 22:13:54 executing program 1: 22:13:54 executing program 5: 22:13:54 executing program 0: 22:13:54 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") pipe(&(0x7f0000000240)={0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet(0x2, 0x3, 0x7f) bind$inet(r2, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) setsockopt$inet_int(r3, 0x0, 0x3, &(0x7f0000000140)=0x7ff, 0x4) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) setsockopt$SO_TIMESTAMPING(r2, 0x1, 0x25, &(0x7f0000000000)=0x80, 0x4) splice(r1, 0x0, r2, 0x0, 0x10005, 0x0) 22:13:54 executing program 4: 22:13:54 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) close(r3) socket(0x10, 0x3, 0x0) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000180)="580000001400192340834b80040d8c560a", 0x11}], 0x1) writev(r2, &(0x7f0000000600)=[{&(0x7f0000000380)="f98ac693ce6908", 0x7}], 0x1) accept4$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0x14, 0x0) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r1, 0x0, r3, 0x0, 0x80000001, 0x0) 22:13:54 executing program 0: 22:13:54 executing program 1: 22:13:54 executing program 5: 22:13:54 executing program 0: 22:13:54 executing program 1: 22:13:54 executing program 5: 22:13:54 executing program 4: 22:13:54 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) close(r3) socket(0x10, 0x3, 0x0) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000180)="580000001400192340834b80040d8c560a", 0x11}], 0x1) writev(r2, &(0x7f0000000600)=[{&(0x7f0000000380)="f98ac693ce6908", 0x7}], 0x1) accept4$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0x14, 0x0) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r1, 0x0, r3, 0x0, 0x80000001, 0x0) 22:13:55 executing program 1: 22:13:55 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") pipe(&(0x7f0000000240)={0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet(0x2, 0x3, 0x7f) bind$inet(r2, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) setsockopt$inet_int(r3, 0x0, 0x3, &(0x7f0000000140)=0x7ff, 0x4) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) setsockopt$SO_TIMESTAMPING(r2, 0x1, 0x25, &(0x7f0000000000)=0x80, 0x4) splice(r1, 0x0, r2, 0x0, 0x10005, 0x0) 22:13:55 executing program 0: 22:13:55 executing program 5: 22:13:55 executing program 4: 22:13:55 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) write$binfmt_elf64(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="d6ac7d3f595131008901"], 0xa) close(r3) socket(0x10, 0x3, 0x0) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000180)="580000001400192340834b80040d8c560a", 0x11}], 0x1) writev(r2, &(0x7f0000000600)=[{&(0x7f0000000380)="f98ac693ce6908", 0x7}], 0x1) accept4$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0x14, 0x0) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r1, 0x0, r3, 0x0, 0x80000001, 0x0) 22:13:55 executing program 1: 22:13:55 executing program 1: 22:13:55 executing program 5: 22:13:55 executing program 4: creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)='\x00|\f\xbb\xd4\x1aF\x00t\x15\r\x06\xf2\x9a^\xc8\xca\xc8\x1bz\xa7\'\xa9\x8f\x7f\xe1\xb3Y\x016\x16\xf7\xabq9\xc9\x93N\"\xafG\x0e\x8c\x9e>\xba9\xf3\xc6l1\xee1<\xdd0\x99\x18\xc5\xe2<\xcc56\xa4-\xf6i\xe1\x9aNQ(\xb0ek}\xa2\xa2O6\xc5k\xa3F\xf9\xf7b\x1d\xdc\xa4*\xf7', 0x0, 0x0) r0 = gettid() tkill(r0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, &(0x7f0000000640)={0x2, 0x0, @loopback}, 0x10) sendmmsg$inet(r1, &(0x7f0000000b00)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @dev, @dev}}}], 0x20}}], 0x2, 0x0) 22:13:55 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={'eql\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\b', 0x2000003ffe}) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000040)={'eql\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\b', 0x2000003ffe}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_ifreq(r4, 0x8922, &(0x7f00000000c0)={'eql\x00\x00\x00\xa9[\x00', @ifru_map={0x1ff}}) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x2003}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 22:13:55 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) write$binfmt_elf64(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="d6ac7d3f595131008901"], 0xa) close(r3) socket(0x10, 0x3, 0x0) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000180)="580000001400192340834b80040d8c560a", 0x11}], 0x1) writev(r2, &(0x7f0000000600)=[{&(0x7f0000000380)="f98ac693ce6908", 0x7}], 0x1) accept4$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0x14, 0x0) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r1, 0x0, r3, 0x0, 0x80000001, 0x0) 22:13:56 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x30, 0x228, 0x2, &(0x7f0000000080)="e460cdfbef24080000000a9386dd6a00000000072feb3014cd3ec8a755c1e138008109ad0000f0e8d5000000010000001400000500242f09880b5d90fb16", 0x0, 0xffffffff00000021, 0x0, 0xfffffffffffffda2}, 0x28) [ 339.704951][ T8647] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 339.722648][ T8647] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 339.801495][ T8647] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 339.922483][ T8647] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 339.971393][ T8647] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 22:13:56 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) write$binfmt_elf32(r2, &(0x7f00000007c0)=ANY=[@ANYBLOB="955a000004000000a423107d0b6e5fbdf500dfff"], 0x14) r4 = socket$inet(0x2, 0x3, 0x7f) bind$inet(r3, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) setsockopt$inet_int(r4, 0x0, 0x3, &(0x7f0000000140)=0x7ff, 0x4) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, &(0x7f0000000000)=0x80, 0x4) splice(r1, 0x0, r3, 0x0, 0x10005, 0x0) 22:13:56 executing program 4: creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)='\x00|\f\xbb\xd4\x1aF\x00t\x15\r\x06\xf2\x9a^\xc8\xca\xc8\x1bz\xa7\'\xa9\x8f\x7f\xe1\xb3Y\x016\x16\xf7\xabq9\xc9\x93N\"\xafG\x0e\x8c\x9e>\xba9\xf3\xc6l1\xee1<\xdd0\x99\x18\xc5\xe2<\xcc56\xa4-\xf6i\xe1\x9aNQ(\xb0ek}\xa2\xa2O6\xc5k\xa3F\xf9\xf7b\x1d\xdc\xa4*\xf7', 0x0, 0x0) r0 = gettid() tkill(r0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, &(0x7f0000000640)={0x2, 0x0, @loopback}, 0x10) sendmmsg$inet(r1, &(0x7f0000000b00)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @dev, @dev}}}], 0x20}}], 0x2, 0x0) 22:13:56 executing program 1: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x1e, 0x8000000000000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') sendfile(r0, r0, &(0x7f0000000180)=0x74000000, 0x5) gettid() ioctl$DRM_IOCTL_UNLOCK(0xffffffffffffffff, 0x4008642b, 0x0) 22:13:56 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) write$binfmt_elf64(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="d6ac7d3f595131008901"], 0xa) close(r3) socket(0x10, 0x3, 0x0) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000180)="580000001400192340834b80040d8c560a", 0x11}], 0x1) writev(r2, &(0x7f0000000600)=[{&(0x7f0000000380)="f98ac693ce6908", 0x7}], 0x1) accept4$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0x14, 0x0) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r1, 0x0, r3, 0x0, 0x80000001, 0x0) 22:13:56 executing program 5: getpid() r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000240)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @local, 0x3}, 0x1c) 22:13:56 executing program 0: r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000140)=0x0) ptrace$cont(0x18, r1, 0x3, 0x2) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x408c5333, &(0x7f00000002c0)={0x6, 0x5, 0x1, 'queue1\x00', 0x401}) clone3(&(0x7f0000000280)={0x20202000, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080), 0x24, 0x0, &(0x7f0000000380)=""/157, 0x9d, &(0x7f0000000180)=""/212}, 0x40) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000440)={0x0, 0x0}, &(0x7f00000000c0)) setresuid(0x0, r3, 0x0) r4 = socket$inet6_sctp(0xa, 0x4000000000000001, 0x84) bind$inet6(r4, &(0x7f00004b8fe4)={0xa, 0x3, 0x0, @loopback}, 0x1c) setsockopt$inet_mreqsrc(r0, 0x0, 0x14, &(0x7f0000000480)={@local, @remote, @multicast2}, 0xc) 22:13:56 executing program 4: creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)='\x00|\f\xbb\xd4\x1aF\x00t\x15\r\x06\xf2\x9a^\xc8\xca\xc8\x1bz\xa7\'\xa9\x8f\x7f\xe1\xb3Y\x016\x16\xf7\xabq9\xc9\x93N\"\xafG\x0e\x8c\x9e>\xba9\xf3\xc6l1\xee1<\xdd0\x99\x18\xc5\xe2<\xcc56\xa4-\xf6i\xe1\x9aNQ(\xb0ek}\xa2\xa2O6\xc5k\xa3F\xf9\xf7b\x1d\xdc\xa4*\xf7', 0x0, 0x0) r0 = gettid() tkill(r0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, &(0x7f0000000640)={0x2, 0x0, @loopback}, 0x10) sendmmsg$inet(r1, &(0x7f0000000b00)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @dev, @dev}}}], 0x20}}], 0x2, 0x0) [ 340.286924][ T8668] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 22:13:56 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="d6ac7d3f595131008901"], 0xa) close(0xffffffffffffffff) socket(0x10, 0x3, 0x0) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000180)="580000001400192340834b80040d8c560a", 0x11}], 0x1) writev(r2, &(0x7f0000000600)=[{&(0x7f0000000380)="f98ac693ce6908", 0x7}], 0x1) accept4$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0x14, 0x0) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r1, 0x0, 0xffffffffffffffff, 0x0, 0x80000001, 0x0) 22:13:56 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) write$binfmt_elf32(r2, &(0x7f00000007c0)=ANY=[@ANYBLOB="955a000004000000a423107d0b6e5fbdf500dfff"], 0x14) r4 = socket$inet(0x2, 0x3, 0x7f) bind$inet(r3, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) setsockopt$inet_int(r4, 0x0, 0x3, &(0x7f0000000140)=0x7ff, 0x4) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, &(0x7f0000000000)=0x80, 0x4) splice(r1, 0x0, r3, 0x0, 0x10005, 0x0) 22:13:56 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x18024, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000005000/0x3000)=nil, 0x3000, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @broadcast}, 0xfed8) setsockopt$inet_tcp_int(r0, 0x6, 0x19, &(0x7f0000000100)=0x6, 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) 22:13:56 executing program 0: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000500)='/dev/cuse\x00', 0x82, 0x0) io_setup(0x9, &(0x7f0000000100)=0x0) io_submit(r1, 0xc3, &(0x7f0000000440)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f00000001c0)="10000040040000000000000000000000b22025285db74192e7576d9062ec6e2fe8ffff3ff248691861d03a71091d334252afb1af5b8f0274c2ed58338226131291198f3d70dcf797ac42d0eeed042c06b56b89f02f92b12ebe4c45948a362a76def2f4955f100a13131f474b140942110257e173cea102775e1b3873ebf98dac6421f6d449544114b8ce29f4b48d1738b5be127a96f24c9d3c130e1a6c2eb5b3f12eb6a1f5051594545cbb895e65d83c08d2d6cd56694e5a6c00f54aceaf498f57b2a56634a23ae7", 0x40000010}]) socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={0x0, 0xffffffffffffff44}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="02b19744e7a77621566e5983030a0000070100000000200000008541053d82c0606806e55c178a737517d896c9ff00000000000000000000e749233999e292abb9aedf00e262c27a9aaf090289da20a1dfbf9b5e709805711520d5cf2aed9065811be5052e30ec942feb5ee2e43d75d0bb4e6f60fa158cca206b483b119705d5d30ec6312d084c8f2e9f4f463164f26b6f7b6d52090d2fcdfb12e82e4f467965ff1402dee337fe1672043fda0b309b5767dfb7da3399c601e245e92a7de7f654b6ce933885e323504a6a809e927ebc35928bbe950c2682e3cc9df7fcf4d7fe57b0db4abad1b68cb41cc3d0ed2360787cbe5c46fbe11f3f8e793cb50bfbc9a98fbc6ef4a6e974f99674e86b00cfaee0ce2aeb470e2567d8cbcad1b3fbbecb89d11164838825fc"], 0x38}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000540)=ANY=[@ANYBLOB="0e000000030000000000000405000600000000000a0000000000000400000000000200000000de2100000000000100020100400002000100010000000006f40100fd008005000500000000000a004872bb01000000000000001309e339be593f77070000000100170041000077c34df65d914e2086cbb90ffcad6ea9d370a48e54bd796ac57b7d4b3eaa23490778b3457c973ce2c69cc1b5b5a9a3a70bf1feddb53ffff17738bb6bb23b1152c1c737d400ec9a8b08087b2591ea45c7dac9413881b60121dd391b1613177f50b892de1e87c0d2a9077cdcdfc37794d65fe3f7f31901b168206b567d847829f84143d40f4a2829c375dd531fb6a8cafdd90b0b181845d44777dc29ef16d518e5f6d1fc0787a3bc158de2e8bbba015c705184cde652f27dbd3396eb5b43ca8126cce56d70eda40ffcd1d398d57a5ee90ea7eba392deb6011ff027c7b8a90fb32fe6e2b99937ab3f8fbda329611923dc6f2c628021104005cbace5c08c0272c427e9acb8772bc96fbeb3a635e44c34c3da073841de6abb087f45f33350b741cfabd795ce70e62bf4d045560c27326fa73813b80134062971021521288389c971cbd585dffdab25e83cf558badd631252a084f2a8796cabb2ce757021c3d27042c861d7372477aa986835b44c09573b768e6b3f128a656062f9c93d5a38a951bbb2f2eb15d3ac58159e57fd6ebd1d87b8cd8836d18ab17897ae9ddfc4af9d15e0eb3461a1ec30a2ff3178d4634776bb986b91ecacc0f0470390f5d0cf1a05ee93321ee254e71dc05b877764904b8218868049a0acac88e209b6282a115c21126ee2bb562816eb25f7198194c694558cea903c6e0bc00ac65867c6e63a8f546ad9f1e5e96100000000000000a9376889ccd7ec470f6a13d48dc067380a3e274c6d3c488ee2da5accdb2dfb14aff009e5f0d1ad8e6a5f8887328769a4f33556952f55fe55243a170858fadd989addf55bc634f0c7210d36374d5b7efc2aea4b63455c2d8bca2c650f71db49de9f44223ee549ba9a994fbe40412912f20526524bd16ada577ab34e5f0c08a5124b20f394716b82367ff7402ca9a00ab363e5bca5af788cc68bd0869fdd1c12488026672a369a2daaf3ffb5cb8c268328dbc46e8abb00"/844], 0x70}}, 0x0) r2 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r2, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) r3 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) sendmmsg(r3, &(0x7f0000000180), 0x0, 0x0) r4 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r4, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$sock_TIOCINQ(r4, 0x541b, &(0x7f0000000080)) 22:13:56 executing program 5: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket$inet6_sctp(0xa, 0x801, 0x84) fanotify_init(0x0, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = open(&(0x7f0000000080)='./bus\x00', 0x141142, 0x80) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f00000000c0)={0x0, 0x4, 0x10}, 0xc) ioctl$IMHOLD_L1(r2, 0x80044948, &(0x7f0000000000)=0x7ff) syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0x1, 0x2000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10040}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(r2, 0x200004) sendfile(r0, r2, 0x0, 0x80001d00c0d0) 22:13:57 executing program 4: creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)='\x00|\f\xbb\xd4\x1aF\x00t\x15\r\x06\xf2\x9a^\xc8\xca\xc8\x1bz\xa7\'\xa9\x8f\x7f\xe1\xb3Y\x016\x16\xf7\xabq9\xc9\x93N\"\xafG\x0e\x8c\x9e>\xba9\xf3\xc6l1\xee1<\xdd0\x99\x18\xc5\xe2<\xcc56\xa4-\xf6i\xe1\x9aNQ(\xb0ek}\xa2\xa2O6\xc5k\xa3F\xf9\xf7b\x1d\xdc\xa4*\xf7', 0x0, 0x0) r0 = gettid() tkill(r0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, &(0x7f0000000640)={0x2, 0x0, @loopback}, 0x10) sendmmsg$inet(r1, &(0x7f0000000b00)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @dev, @dev}}}], 0x20}}], 0x2, 0x0) 22:13:57 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) write$binfmt_elf32(r2, &(0x7f00000007c0)=ANY=[@ANYBLOB="955a000004000000a423107d0b6e5fbdf500dfff"], 0x14) r4 = socket$inet(0x2, 0x3, 0x7f) bind$inet(r3, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) setsockopt$inet_int(r4, 0x0, 0x3, &(0x7f0000000140)=0x7ff, 0x4) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, &(0x7f0000000000)=0x80, 0x4) splice(r1, 0x0, r3, 0x0, 0x10005, 0x0) 22:13:57 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="d6ac7d3f595131008901"], 0xa) close(0xffffffffffffffff) socket(0x10, 0x3, 0x0) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000180)="580000001400192340834b80040d8c560a", 0x11}], 0x1) writev(r2, &(0x7f0000000600)=[{&(0x7f0000000380)="f98ac693ce6908", 0x7}], 0x1) accept4$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0x14, 0x0) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r1, 0x0, 0xffffffffffffffff, 0x0, 0x80000001, 0x0) 22:13:57 executing program 4: creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)='\x00|\f\xbb\xd4\x1aF\x00t\x15\r\x06\xf2\x9a^\xc8\xca\xc8\x1bz\xa7\'\xa9\x8f\x7f\xe1\xb3Y\x016\x16\xf7\xabq9\xc9\x93N\"\xafG\x0e\x8c\x9e>\xba9\xf3\xc6l1\xee1<\xdd0\x99\x18\xc5\xe2<\xcc56\xa4-\xf6i\xe1\x9aNQ(\xb0ek}\xa2\xa2O6\xc5k\xa3F\xf9\xf7b\x1d\xdc\xa4*\xf7', 0x0, 0x0) r0 = gettid() tkill(r0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, &(0x7f0000000640)={0x2, 0x0, @loopback}, 0x10) 22:13:57 executing program 1: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0xc, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x53}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r1 = syz_open_dev$sg(&(0x7f0000000200)='/dev/sg#\x00', 0x0, 0x163882) ioctl$SCSI_IOCTL_START_UNIT(r1, 0x5) ioctl$VIDIOC_QUERYCAP(0xffffffffffffffff, 0x80685600, &(0x7f0000000040)) prctl$PR_GET_KEEPCAPS(0x7) r2 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_PIT2(r2, 0x4040ae77, &(0x7f0000000000)={0x3}) 22:13:57 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="d6ac7d3f595131008901"], 0xa) close(0xffffffffffffffff) socket(0x10, 0x3, 0x0) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000180)="580000001400192340834b80040d8c560a", 0x11}], 0x1) writev(r2, &(0x7f0000000600)=[{&(0x7f0000000380)="f98ac693ce6908", 0x7}], 0x1) accept4$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0x14, 0x0) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r1, 0x0, 0xffffffffffffffff, 0x0, 0x80000001, 0x0) 22:13:57 executing program 0: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000500)='/dev/cuse\x00', 0x82, 0x0) io_setup(0x9, &(0x7f0000000100)=0x0) io_submit(r1, 0xc3, &(0x7f0000000440)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f00000001c0)="10000040040000000000000000000000b22025285db74192e7576d9062ec6e2fe8ffff3ff248691861d03a71091d334252afb1af5b8f0274c2ed58338226131291198f3d70dcf797ac42d0eeed042c06b56b89f02f92b12ebe4c45948a362a76def2f4955f100a13131f474b140942110257e173cea102775e1b3873ebf98dac6421f6d449544114b8ce29f4b48d1738b5be127a96f24c9d3c130e1a6c2eb5b3f12eb6a1f5051594545cbb895e65d83c08d2d6cd56694e5a6c00f54aceaf498f57b2a56634a23ae7", 0x40000010}]) socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={0x0, 0xffffffffffffff44}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="02b19744e7a77621566e5983030a0000070100000000200000008541053d82c0606806e55c178a737517d896c9ff00000000000000000000e749233999e292abb9aedf00e262c27a9aaf090289da20a1dfbf9b5e709805711520d5cf2aed9065811be5052e30ec942feb5ee2e43d75d0bb4e6f60fa158cca206b483b119705d5d30ec6312d084c8f2e9f4f463164f26b6f7b6d52090d2fcdfb12e82e4f467965ff1402dee337fe1672043fda0b309b5767dfb7da3399c601e245e92a7de7f654b6ce933885e323504a6a809e927ebc35928bbe950c2682e3cc9df7fcf4d7fe57b0db4abad1b68cb41cc3d0ed2360787cbe5c46fbe11f3f8e793cb50bfbc9a98fbc6ef4a6e974f99674e86b00cfaee0ce2aeb470e2567d8cbcad1b3fbbecb89d11164838825fc"], 0x38}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000540)=ANY=[@ANYBLOB="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"/844], 0x70}}, 0x0) r2 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r2, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) r3 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) sendmmsg(r3, &(0x7f0000000180), 0x0, 0x0) r4 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r4, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$sock_TIOCINQ(r4, 0x541b, &(0x7f0000000080)) 22:13:57 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) close(0xffffffffffffffff) write$binfmt_elf32(r2, &(0x7f00000007c0)=ANY=[@ANYBLOB="955a000004000000a423107d0b6e5fbdf500dfff"], 0x14) r3 = socket$inet(0x2, 0x3, 0x7f) bind$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) setsockopt$inet_int(r3, 0x0, 0x3, &(0x7f0000000140)=0x7ff, 0x4) connect$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000000)=0x80, 0x4) splice(r1, 0x0, 0xffffffffffffffff, 0x0, 0x10005, 0x0) 22:13:57 executing program 4: creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)='\x00|\f\xbb\xd4\x1aF\x00t\x15\r\x06\xf2\x9a^\xc8\xca\xc8\x1bz\xa7\'\xa9\x8f\x7f\xe1\xb3Y\x016\x16\xf7\xabq9\xc9\x93N\"\xafG\x0e\x8c\x9e>\xba9\xf3\xc6l1\xee1<\xdd0\x99\x18\xc5\xe2<\xcc56\xa4-\xf6i\xe1\x9aNQ(\xb0ek}\xa2\xa2O6\xc5k\xa3F\xf9\xf7b\x1d\xdc\xa4*\xf7', 0x0, 0x0) r0 = gettid() tkill(r0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) [ 341.156154][ T8721] program syz-executor.1 is using a deprecated SCSI ioctl, please convert it to SG_IO [ 341.209056][ T8721] sd 0:0:1:0: ioctl_internal_command: ILLEGAL REQUEST asc=0x20 ascq=0x0 22:13:57 executing program 4: creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)='\x00|\f\xbb\xd4\x1aF\x00t\x15\r\x06\xf2\x9a^\xc8\xca\xc8\x1bz\xa7\'\xa9\x8f\x7f\xe1\xb3Y\x016\x16\xf7\xabq9\xc9\x93N\"\xafG\x0e\x8c\x9e>\xba9\xf3\xc6l1\xee1<\xdd0\x99\x18\xc5\xe2<\xcc56\xa4-\xf6i\xe1\x9aNQ(\xb0ek}\xa2\xa2O6\xc5k\xa3F\xf9\xf7b\x1d\xdc\xa4*\xf7', 0x0, 0x0) r0 = gettid() tkill(r0, 0x0) 22:13:57 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket$inet_udp(0x2, 0x2, 0x0) writev(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="d6ac7d3f595131008901"], 0xa) close(r1) socket(0x10, 0x3, 0x0) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000180)="580000001400192340834b80040d8c560a", 0x11}], 0x1) writev(0xffffffffffffffff, &(0x7f0000000600)=[{&(0x7f0000000380)="f98ac693ce6908", 0x7}], 0x1) accept4$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0x14, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0xfef0) splice(0xffffffffffffffff, 0x0, r1, 0x0, 0x80000001, 0x0) [ 341.351207][ T26] audit: type=1800 audit(1572905637.704:37): pid=8708 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.5" name="bus" dev="sda1" ino=16611 res=0 22:13:57 executing program 5: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket$inet6_sctp(0xa, 0x801, 0x84) fanotify_init(0x0, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = open(&(0x7f0000000080)='./bus\x00', 0x141142, 0x80) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f00000000c0)={0x0, 0x4, 0x10}, 0xc) ioctl$IMHOLD_L1(r2, 0x80044948, &(0x7f0000000000)=0x7ff) syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0x1, 0x2000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10040}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(r2, 0x200004) sendfile(r0, r2, 0x0, 0x80001d00c0d0) 22:13:57 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) close(0xffffffffffffffff) write$binfmt_elf32(r2, &(0x7f00000007c0)=ANY=[@ANYBLOB="955a000004000000a423107d0b6e5fbdf500dfff"], 0x14) r3 = socket$inet(0x2, 0x3, 0x7f) bind$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) setsockopt$inet_int(r3, 0x0, 0x3, &(0x7f0000000140)=0x7ff, 0x4) connect$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000000)=0x80, 0x4) splice(r1, 0x0, 0xffffffffffffffff, 0x0, 0x10005, 0x0) 22:13:57 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x525, &(0x7f0000000200)={&(0x7f0000000100)=ANY=[@ANYBLOB="18000000230047faffffff00000000200408000204001000b115f8b9206ac3d78578125082f4fc2e77cb57f5650731dfaf12aa77ad43cb41f04b15a9fdd6c1610c621c85fe3e348527b02a4edb1af703f0352d3d10127004cc9f5b0e611191830a72f7013ca810e5661d38070648b5feecd9de2b721d69a9"], 0x18}}, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x582c85e3ea297f96, 0x0) close(r0) 22:13:57 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0x31, 0x4) bind$inet(r0, &(0x7f0000000040)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x15}}, 0xfffffffffffffe65) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r2, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) r3 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r3) r4 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r5 = openat$cgroup_subtree(r4, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r5, &(0x7f0000000280)=ANY=[@ANYBLOB="2d63707520ff92b2f197d86ad80547edb4cd282eaa6ef7ad6224d7b3ecb7b7a2436978ac3aad2814b44d3d3a4a9f842473a457206fcb95c665a50bd1a286b2445614306acda196b025e1dfa600a8713bc838b04a459a4600db8401f170d92ee34e1f04ea91df2bacb934a272caa68cb930f14608493b756c3d164ffa1f3c97a8728bf67e946ec1000000000000000035716ed0be9fb90437e907d4ee63c572a67fb888108744339e535a893509d12bb3d06a2e00"/189], 0x5) ioctl$EXT4_IOC_GROUP_EXTEND(r5, 0x40086607, &(0x7f00000001c0)=0x81) r6 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r6, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r6, &(0x7f0000d83fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f0000000180)=0x8) setsockopt$inet_sctp6_SCTP_RTOINFO(r3, 0x84, 0x0, &(0x7f0000000000)={r7}, 0x10) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r2, 0x84, 0x1, &(0x7f0000000b80)={r7, 0x1, 0xfff, 0x2, 0x6, 0x4}, &(0x7f0000000bc0)=0x14) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f0000000c00)={r8, @in6={{0xa, 0x4e24, 0x4, @rand_addr="d82ad2b53886cd403bab157b0fedf1c0", 0x7}}, 0x366, 0xfb}, 0x90) connect$inet(r0, &(0x7f0000000400)={0x2, 0x0, @broadcast}, 0x10) r9 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r9, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) setsockopt$packet_tx_ring(r9, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x67) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) poll(&(0x7f0000000300)=[{r9}], 0x1, 0x0) r10 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r10, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$KVM_SET_FPU(r10, 0x41a0ae8d, &(0x7f0000000440)={[], 0x4, 0xdb, 0x3, 0x0, 0x20, 0x4, 0x4000, [], 0x9}) 22:13:57 executing program 4: creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)='\x00|\f\xbb\xd4\x1aF\x00t\x15\r\x06\xf2\x9a^\xc8\xca\xc8\x1bz\xa7\'\xa9\x8f\x7f\xe1\xb3Y\x016\x16\xf7\xabq9\xc9\x93N\"\xafG\x0e\x8c\x9e>\xba9\xf3\xc6l1\xee1<\xdd0\x99\x18\xc5\xe2<\xcc56\xa4-\xf6i\xe1\x9aNQ(\xb0ek}\xa2\xa2O6\xc5k\xa3F\xf9\xf7b\x1d\xdc\xa4*\xf7', 0x0, 0x0) r0 = gettid() tkill(r0, 0x0) 22:13:58 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket$inet_udp(0x2, 0x2, 0x0) writev(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="d6ac7d3f595131008901"], 0xa) close(r1) socket(0x10, 0x3, 0x0) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000180)="580000001400192340834b80040d8c560a", 0x11}], 0x1) writev(0xffffffffffffffff, &(0x7f0000000600)=[{&(0x7f0000000380)="f98ac693ce6908", 0x7}], 0x1) accept4$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0x14, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0xfef0) splice(0xffffffffffffffff, 0x0, r1, 0x0, 0x80000001, 0x0) 22:13:58 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) close(0xffffffffffffffff) write$binfmt_elf32(r2, &(0x7f00000007c0)=ANY=[@ANYBLOB="955a000004000000a423107d0b6e5fbdf500dfff"], 0x14) r3 = socket$inet(0x2, 0x3, 0x7f) bind$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) setsockopt$inet_int(r3, 0x0, 0x3, &(0x7f0000000140)=0x7ff, 0x4) connect$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000000)=0x80, 0x4) splice(r1, 0x0, 0xffffffffffffffff, 0x0, 0x10005, 0x0) 22:13:58 executing program 4: creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)='\x00|\f\xbb\xd4\x1aF\x00t\x15\r\x06\xf2\x9a^\xc8\xca\xc8\x1bz\xa7\'\xa9\x8f\x7f\xe1\xb3Y\x016\x16\xf7\xabq9\xc9\x93N\"\xafG\x0e\x8c\x9e>\xba9\xf3\xc6l1\xee1<\xdd0\x99\x18\xc5\xe2<\xcc56\xa4-\xf6i\xe1\x9aNQ(\xb0ek}\xa2\xa2O6\xc5k\xa3F\xf9\xf7b\x1d\xdc\xa4*\xf7', 0x0, 0x0) r0 = gettid() tkill(r0, 0x0) 22:13:58 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) write$binfmt_elf32(0xffffffffffffffff, &(0x7f00000007c0)=ANY=[@ANYBLOB="955a000004000000a423107d0b6e5fbdf500dfff"], 0x14) r2 = socket$inet(0x2, 0x3, 0x7f) bind$inet(r1, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) setsockopt$inet_int(r2, 0x0, 0x3, &(0x7f0000000140)=0x7ff, 0x4) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000000)=0x80, 0x4) splice(0xffffffffffffffff, 0x0, r1, 0x0, 0x10005, 0x0) 22:13:58 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket$inet_udp(0x2, 0x2, 0x0) writev(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="d6ac7d3f595131008901"], 0xa) close(r1) socket(0x10, 0x3, 0x0) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000180)="580000001400192340834b80040d8c560a", 0x11}], 0x1) writev(0xffffffffffffffff, &(0x7f0000000600)=[{&(0x7f0000000380)="f98ac693ce6908", 0x7}], 0x1) accept4$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0x14, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0xfef0) splice(0xffffffffffffffff, 0x0, r1, 0x0, 0x80000001, 0x0) [ 341.968224][ T26] audit: type=1804 audit(1572905638.324:38): pid=8774 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir303623625/syzkaller.v3YKUW/32/file0" dev="sda1" ino=16632 res=1 22:13:58 executing program 4: creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)='\x00|\f\xbb\xd4\x1aF\x00t\x15\r\x06\xf2\x9a^\xc8\xca\xc8\x1bz\xa7\'\xa9\x8f\x7f\xe1\xb3Y\x016\x16\xf7\xabq9\xc9\x93N\"\xafG\x0e\x8c\x9e>\xba9\xf3\xc6l1\xee1<\xdd0\x99\x18\xc5\xe2<\xcc56\xa4-\xf6i\xe1\x9aNQ(\xb0ek}\xa2\xa2O6\xc5k\xa3F\xf9\xf7b\x1d\xdc\xa4*\xf7', 0x0, 0x0) gettid() 22:13:58 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x525, &(0x7f0000000200)={&(0x7f0000000100)=ANY=[@ANYBLOB="18000000230047faffffff00000000200408000204001000b115f8b9206ac3d78578125082f4fc2e77cb57f5650731dfaf12aa77ad43cb41f04b15a9fdd6c1610c621c85fe3e348527b02a4edb1af703f0352d3d10127004cc9f5b0e611191830a72f7013ca810e5661d38070648b5feecd9de2b721d69a9"], 0x18}}, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x582c85e3ea297f96, 0x0) close(r0) 22:13:58 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) write$binfmt_elf32(0xffffffffffffffff, &(0x7f00000007c0)=ANY=[@ANYBLOB="955a000004000000a423107d0b6e5fbdf500dfff"], 0x14) r2 = socket$inet(0x2, 0x3, 0x7f) bind$inet(r1, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) setsockopt$inet_int(r2, 0x0, 0x3, &(0x7f0000000140)=0x7ff, 0x4) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000000)=0x80, 0x4) splice(0xffffffffffffffff, 0x0, r1, 0x0, 0x10005, 0x0) 22:13:58 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) writev(r1, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[@ANYBLOB="d6ac7d3f595131008901"], 0xa) close(r2) socket(0x10, 0x3, 0x0) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000180)="580000001400192340834b80040d8c560a", 0x11}], 0x1) writev(r1, &(0x7f0000000600)=[{&(0x7f0000000380)="f98ac693ce6908", 0x7}], 0x1) accept4$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0x14, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r0, 0x0, r2, 0x0, 0x80000001, 0x0) 22:13:58 executing program 1: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket$inet6_sctp(0xa, 0x801, 0x84) fanotify_init(0x0, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = open(&(0x7f0000000080)='./bus\x00', 0x141142, 0x80) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f00000000c0)={0x0, 0x4, 0x10}, 0xc) ioctl$IMHOLD_L1(r2, 0x80044948, &(0x7f0000000000)=0x7ff) syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0x1, 0x2000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10040}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(r2, 0x200004) sendfile(r0, r2, 0x0, 0x80001d00c0d0) 22:13:58 executing program 4: creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)='\x00|\f\xbb\xd4\x1aF\x00t\x15\r\x06\xf2\x9a^\xc8\xca\xc8\x1bz\xa7\'\xa9\x8f\x7f\xe1\xb3Y\x016\x16\xf7\xabq9\xc9\x93N\"\xafG\x0e\x8c\x9e>\xba9\xf3\xc6l1\xee1<\xdd0\x99\x18\xc5\xe2<\xcc56\xa4-\xf6i\xe1\x9aNQ(\xb0ek}\xa2\xa2O6\xc5k\xa3F\xf9\xf7b\x1d\xdc\xa4*\xf7', 0x0, 0x0) gettid() 22:13:58 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) setsockopt$inet6_opts(r3, 0x29, 0x39, &(0x7f00000001c0)=@hopopts={0x2f, 0x0, [], [@ra={0x5, 0x2, 0x80}]}, 0x10) r4 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x90000, 0x0) ioctl$KVM_S390_INTERRUPT_CPU(r4, 0x4010ae94, &(0x7f0000000040)={0xffffff31, 0x8, 0xffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x95c000)=nil, 0x95c000, 0x0, 0x44031, 0xffffffffffffffff, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffd9) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x244101, 0x0) ioctl$VIDIOC_G_FMT(r5, 0xc0d05604, &(0x7f00000000c0)={0x9, @vbi={0x8a, 0x1, 0x5, 0x0, [0x1000, 0x4], [0x786, 0xfff], 0x2}}) 22:13:59 executing program 4: creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)='\x00|\f\xbb\xd4\x1aF\x00t\x15\r\x06\xf2\x9a^\xc8\xca\xc8\x1bz\xa7\'\xa9\x8f\x7f\xe1\xb3Y\x016\x16\xf7\xabq9\xc9\x93N\"\xafG\x0e\x8c\x9e>\xba9\xf3\xc6l1\xee1<\xdd0\x99\x18\xc5\xe2<\xcc56\xa4-\xf6i\xe1\x9aNQ(\xb0ek}\xa2\xa2O6\xc5k\xa3F\xf9\xf7b\x1d\xdc\xa4*\xf7', 0x0, 0x0) gettid() 22:13:59 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) writev(r1, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[@ANYBLOB="d6ac7d3f595131008901"], 0xa) close(r2) socket(0x10, 0x3, 0x0) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000180)="580000001400192340834b80040d8c560a", 0x11}], 0x1) writev(r1, &(0x7f0000000600)=[{&(0x7f0000000380)="f98ac693ce6908", 0x7}], 0x1) accept4$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0x14, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r0, 0x0, r2, 0x0, 0x80000001, 0x0) 22:13:59 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) write$binfmt_elf32(0xffffffffffffffff, &(0x7f00000007c0)=ANY=[@ANYBLOB="955a000004000000a423107d0b6e5fbdf500dfff"], 0x14) r2 = socket$inet(0x2, 0x3, 0x7f) bind$inet(r1, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) setsockopt$inet_int(r2, 0x0, 0x3, &(0x7f0000000140)=0x7ff, 0x4) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000000)=0x80, 0x4) splice(0xffffffffffffffff, 0x0, r1, 0x0, 0x10005, 0x0) 22:13:59 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x12}}, 0x0, 0x0, 0xffffffffffffffff, 0x3) close(r1) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000480)={0x0, 0x3}, 0xc) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000040)=ANY=[], 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x0) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x800454e1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='memory.swap.current\x00', 0x0, 0x0) bind$rxrpc(r4, 0x0, 0x0) ioctl$TIOCGPGRP(r4, 0x540f, &(0x7f0000000300)) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='memory.sw.current\x00', 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x1) r6 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r6, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) bind$rxrpc(r6, 0x0, 0xfe1a) ioctl$TIOCGPGRP(r5, 0x540f, 0x0) r7 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r7) ptrace$setopts(0x4206, r7, 0x0, 0x0) r8 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r8) ptrace$setopts(0x4206, r8, 0x0, 0x0) perf_event_open(0x0, r8, 0x5, r1, 0x2) write$cgroup_pid(r3, &(0x7f0000000000), 0x10000000d) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={0x0, r2, 0x0, 0x1e, &(0x7f0000000240)='{nodev+em0ppp0trustedbdeveth0\x00'}, 0x30) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$TUNSETFILTEREBPF(r3, 0x6609, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000dc0)='eth1\'wlan0\x00') r9 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x8, 0x0) ioctl$VIDIOC_S_FMT(r9, 0xc0285628, &(0x7f0000000080)={0x3, @win={{}, 0x0, 0x0, 0x0, 0x0, 0x0}}) prctl$PR_SET_PTRACER(0x59616d61, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) fcntl$lock(r9, 0x6, &(0x7f00000002c0)={0x2, 0x1, 0x4, 0x5}) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) socket$kcm(0x10, 0x2, 0x4) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000100)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0xfeffffff, 0x0, 0x0, 0x0, 0x0, 0x3f00, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40) 22:13:59 executing program 4: creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)='\x00|\f\xbb\xd4\x1aF\x00t\x15\r\x06\xf2\x9a^\xc8\xca\xc8\x1bz\xa7\'\xa9\x8f\x7f\xe1\xb3Y\x016\x16\xf7\xabq9\xc9\x93N\"\xafG\x0e\x8c\x9e>\xba9\xf3\xc6l1\xee1<\xdd0\x99\x18\xc5\xe2<\xcc56\xa4-\xf6i\xe1\x9aNQ(\xb0ek}\xa2\xa2O6\xc5k\xa3F\xf9\xf7b\x1d\xdc\xa4*\xf7', 0x0, 0x0) 22:13:59 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) setsockopt$inet6_opts(r3, 0x29, 0x39, &(0x7f00000001c0)=@hopopts={0x2f, 0x0, [], [@ra={0x5, 0x2, 0x80}]}, 0x10) r4 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x90000, 0x0) ioctl$KVM_S390_INTERRUPT_CPU(r4, 0x4010ae94, &(0x7f0000000040)={0xffffff31, 0x8, 0xffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x95c000)=nil, 0x95c000, 0x0, 0x44031, 0xffffffffffffffff, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffd9) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x244101, 0x0) ioctl$VIDIOC_G_FMT(r5, 0xc0d05604, &(0x7f00000000c0)={0x9, @vbi={0x8a, 0x1, 0x5, 0x0, [0x1000, 0x4], [0x786, 0xfff], 0x2}}) 22:13:59 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) writev(r1, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[@ANYBLOB="d6ac7d3f595131008901"], 0xa) close(r2) socket(0x10, 0x3, 0x0) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000180)="580000001400192340834b80040d8c560a", 0x11}], 0x1) writev(r1, &(0x7f0000000600)=[{&(0x7f0000000380)="f98ac693ce6908", 0x7}], 0x1) accept4$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0x14, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r0, 0x0, r2, 0x0, 0x80000001, 0x0) 22:13:59 executing program 1: r0 = socket(0x200000000000011, 0x3, 0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r1}, 0x14) r2 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r2, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) recvmsg(r2, &(0x7f0000000000)={&(0x7f0000000100), 0x80, &(0x7f0000001700)=[{&(0x7f0000000180)=""/167, 0xa7}, {&(0x7f0000000240)=""/176, 0xb0}, {&(0x7f0000000300)=""/203, 0xcb}, {&(0x7f0000000400)=""/4096, 0x1000}, {&(0x7f0000001400)=""/101, 0x65}, {&(0x7f0000001480)=""/139, 0x8b}, {&(0x7f0000001540)=""/201, 0xc9}, {&(0x7f0000001640)=""/184, 0xb8}], 0x8, &(0x7f0000001780)=""/129, 0x81}, 0x20) sendto(0xffffffffffffffff, &(0x7f0000001840)="75da96217d5d4d08596a37001585d5cd5e6a34c535c31c04ece1a3b6c955e71a1969411d6ef7397213d4aea2dcf1199e0dc77ee9a6443c2bd7991c729b1102c3704b6298e8e9dcdc68", 0x49, 0x501, 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f00000018c0)='/proc/self/net/pfkey\x00', 0x2000, 0x0) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="7f454c4600000000032f00e1fd040000000000f8"], 0x14) pipe2(&(0x7f0000001900)={0xffffffffffffffff, 0xffffffffffffffff}, 0x6000) r4 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r4) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r5, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r5, &(0x7f0000d83fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f000095dff8)=ANY=[@ANYBLOB="01ca4069", @ANYRES32=0x0], &(0x7f0000000180)=0x8) setsockopt$inet_sctp6_SCTP_RTOINFO(r4, 0x84, 0x0, &(0x7f0000000000)={r6}, 0x10) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000001940)={r6, @in6={{0xa, 0x4e21, 0x1f, @ipv4={[], [], @multicast1}, 0x1f}}, 0x4, 0x400, 0x0, 0xff, 0x8}, 0x98) 22:13:59 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_elf32(r1, &(0x7f00000007c0)=ANY=[@ANYBLOB="955a000004000000a423107d0b6e5fbdf500dfff"], 0x14) r3 = socket$inet(0x2, 0x3, 0x7f) bind$inet(r2, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) setsockopt$inet_int(r3, 0x0, 0x3, &(0x7f0000000140)=0x7ff, 0x4) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) setsockopt$SO_TIMESTAMPING(r2, 0x1, 0x25, &(0x7f0000000000)=0x80, 0x4) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 22:13:59 executing program 4: creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)='\x00|\f\xbb\xd4\x1aF\x00t\x15\r\x06\xf2\x9a^\xc8\xca\xc8\x1bz\xa7\'\xa9\x8f\x7f\xe1\xb3Y\x016\x16\xf7\xabq9\xc9\x93N\"\xafG\x0e\x8c\x9e>\xba9\xf3\xc6l1\xee1<\xdd0\x99\x18\xc5\xe2<\xcc56\xa4-\xf6i\xe1\x9aNQ(\xb0ek}\xa2\xa2O6\xc5k\xa3F\xf9\xf7b\x1d\xdc\xa4*\xf7', 0x0, 0x0) [ 343.548530][ T26] audit: type=1804 audit(1572905639.904:39): pid=8847 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir303623625/syzkaller.v3YKUW/34/file0" dev="sda1" ino=16639 res=1 22:14:00 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) setsockopt$inet6_opts(r3, 0x29, 0x39, &(0x7f00000001c0)=@hopopts={0x2f, 0x0, [], [@ra={0x5, 0x2, 0x80}]}, 0x10) r4 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x90000, 0x0) ioctl$KVM_S390_INTERRUPT_CPU(r4, 0x4010ae94, &(0x7f0000000040)={0xffffff31, 0x8, 0xffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x95c000)=nil, 0x95c000, 0x0, 0x44031, 0xffffffffffffffff, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffd9) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x244101, 0x0) ioctl$VIDIOC_G_FMT(r5, 0xc0d05604, &(0x7f00000000c0)={0x9, @vbi={0x8a, 0x1, 0x5, 0x0, [0x1000, 0x4], [0x786, 0xfff], 0x2}}) 22:14:00 executing program 4: creat(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)='\x00|\f\xbb\xd4\x1aF\x00t\x15\r\x06\xf2\x9a^\xc8\xca\xc8\x1bz\xa7\'\xa9\x8f\x7f\xe1\xb3Y\x016\x16\xf7\xabq9\xc9\x93N\"\xafG\x0e\x8c\x9e>\xba9\xf3\xc6l1\xee1<\xdd0\x99\x18\xc5\xe2<\xcc56\xa4-\xf6i\xe1\x9aNQ(\xb0ek}\xa2\xa2O6\xc5k\xa3F\xf9\xf7b\x1d\xdc\xa4*\xf7', 0x0, 0x0) 22:14:00 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_elf32(r1, &(0x7f00000007c0)=ANY=[@ANYBLOB="955a000004000000a423107d0b6e5fbdf500dfff"], 0x14) r3 = socket$inet(0x2, 0x3, 0x7f) bind$inet(r2, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) setsockopt$inet_int(r3, 0x0, 0x3, &(0x7f0000000140)=0x7ff, 0x4) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) setsockopt$SO_TIMESTAMPING(r2, 0x1, 0x25, &(0x7f0000000000)=0x80, 0x4) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 22:14:00 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x12}}, 0x0, 0x0, 0xffffffffffffffff, 0x3) close(r1) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000480)={0x0, 0x3}, 0xc) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000040)=ANY=[], 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x0) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x800454e1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='memory.swap.current\x00', 0x0, 0x0) bind$rxrpc(r4, 0x0, 0x0) ioctl$TIOCGPGRP(r4, 0x540f, &(0x7f0000000300)) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='memory.sw.current\x00', 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x1) r6 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r6, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) bind$rxrpc(r6, 0x0, 0xfe1a) ioctl$TIOCGPGRP(r5, 0x540f, 0x0) r7 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r7) ptrace$setopts(0x4206, r7, 0x0, 0x0) r8 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r8) ptrace$setopts(0x4206, r8, 0x0, 0x0) perf_event_open(0x0, r8, 0x5, r1, 0x2) write$cgroup_pid(r3, &(0x7f0000000000), 0x10000000d) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={0x0, r2, 0x0, 0x1e, &(0x7f0000000240)='{nodev+em0ppp0trustedbdeveth0\x00'}, 0x30) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$TUNSETFILTEREBPF(r3, 0x6609, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000dc0)='eth1\'wlan0\x00') r9 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x8, 0x0) ioctl$VIDIOC_S_FMT(r9, 0xc0285628, &(0x7f0000000080)={0x3, @win={{}, 0x0, 0x0, 0x0, 0x0, 0x0}}) prctl$PR_SET_PTRACER(0x59616d61, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) fcntl$lock(r9, 0x6, &(0x7f00000002c0)={0x2, 0x1, 0x4, 0x5}) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) socket$kcm(0x10, 0x2, 0x4) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000100)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0xfeffffff, 0x0, 0x0, 0x0, 0x0, 0x3f00, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40) 22:14:00 executing program 1: r0 = socket(0x200000000000011, 0x3, 0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r1}, 0x14) r2 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r2, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) recvmsg(r2, &(0x7f0000000000)={&(0x7f0000000100), 0x80, &(0x7f0000001700)=[{&(0x7f0000000180)=""/167, 0xa7}, {&(0x7f0000000240)=""/176, 0xb0}, {&(0x7f0000000300)=""/203, 0xcb}, {&(0x7f0000000400)=""/4096, 0x1000}, {&(0x7f0000001400)=""/101, 0x65}, {&(0x7f0000001480)=""/139, 0x8b}, {&(0x7f0000001540)=""/201, 0xc9}, {&(0x7f0000001640)=""/184, 0xb8}], 0x8, &(0x7f0000001780)=""/129, 0x81}, 0x20) sendto(0xffffffffffffffff, &(0x7f0000001840)="75da96217d5d4d08596a37001585d5cd5e6a34c535c31c04ece1a3b6c955e71a1969411d6ef7397213d4aea2dcf1199e0dc77ee9a6443c2bd7991c729b1102c3704b6298e8e9dcdc68", 0x49, 0x501, 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f00000018c0)='/proc/self/net/pfkey\x00', 0x2000, 0x0) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="7f454c4600000000032f00e1fd040000000000f8"], 0x14) pipe2(&(0x7f0000001900)={0xffffffffffffffff, 0xffffffffffffffff}, 0x6000) r4 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r4) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r5, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r5, &(0x7f0000d83fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f000095dff8)=ANY=[@ANYBLOB="01ca4069", @ANYRES32=0x0], &(0x7f0000000180)=0x8) setsockopt$inet_sctp6_SCTP_RTOINFO(r4, 0x84, 0x0, &(0x7f0000000000)={r6}, 0x10) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000001940)={r6, @in6={{0xa, 0x4e21, 0x1f, @ipv4={[], [], @multicast1}, 0x1f}}, 0x4, 0x400, 0x0, 0xff, 0x8}, 0x98) 22:14:00 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_elf32(r1, &(0x7f00000007c0)=ANY=[@ANYBLOB="955a000004000000a423107d0b6e5fbdf500dfff"], 0x14) r3 = socket$inet(0x2, 0x3, 0x7f) bind$inet(r2, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) setsockopt$inet_int(r3, 0x0, 0x3, &(0x7f0000000140)=0x7ff, 0x4) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) setsockopt$SO_TIMESTAMPING(r2, 0x1, 0x25, &(0x7f0000000000)=0x80, 0x4) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 22:14:00 executing program 3: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) writev(r1, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[@ANYBLOB="d6ac7d3f595131008901"], 0xa) close(r2) socket(0x10, 0x3, 0x0) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000180)="580000001400192340834b80040d8c560a", 0x11}], 0x1) writev(r1, &(0x7f0000000600)=[{&(0x7f0000000380)="f98ac693ce6908", 0x7}], 0x1) accept4$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0x14, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r0, 0x0, r2, 0x0, 0x80000001, 0x0) 22:14:00 executing program 4: creat(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)='\x00|\f\xbb\xd4\x1aF\x00t\x15\r\x06\xf2\x9a^\xc8\xca\xc8\x1bz\xa7\'\xa9\x8f\x7f\xe1\xb3Y\x016\x16\xf7\xabq9\xc9\x93N\"\xafG\x0e\x8c\x9e>\xba9\xf3\xc6l1\xee1<\xdd0\x99\x18\xc5\xe2<\xcc56\xa4-\xf6i\xe1\x9aNQ(\xb0ek}\xa2\xa2O6\xc5k\xa3F\xf9\xf7b\x1d\xdc\xa4*\xf7', 0x0, 0x0) 22:14:00 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x12}}, 0x0, 0x0, 0xffffffffffffffff, 0x3) close(r1) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000480)={0x0, 0x3}, 0xc) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000040)=ANY=[], 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x0) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x800454e1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='memory.swap.current\x00', 0x0, 0x0) bind$rxrpc(r4, 0x0, 0x0) ioctl$TIOCGPGRP(r4, 0x540f, &(0x7f0000000300)) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='memory.sw.current\x00', 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x1) r6 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r6, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) bind$rxrpc(r6, 0x0, 0xfe1a) ioctl$TIOCGPGRP(r5, 0x540f, 0x0) r7 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r7) ptrace$setopts(0x4206, r7, 0x0, 0x0) r8 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r8) ptrace$setopts(0x4206, r8, 0x0, 0x0) perf_event_open(0x0, r8, 0x5, r1, 0x2) write$cgroup_pid(r3, &(0x7f0000000000), 0x10000000d) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={0x0, r2, 0x0, 0x1e, &(0x7f0000000240)='{nodev+em0ppp0trustedbdeveth0\x00'}, 0x30) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$TUNSETFILTEREBPF(r3, 0x6609, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000dc0)='eth1\'wlan0\x00') r9 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x8, 0x0) ioctl$VIDIOC_S_FMT(r9, 0xc0285628, &(0x7f0000000080)={0x3, @win={{}, 0x0, 0x0, 0x0, 0x0, 0x0}}) prctl$PR_SET_PTRACER(0x59616d61, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) fcntl$lock(r9, 0x6, &(0x7f00000002c0)={0x2, 0x1, 0x4, 0x5}) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) socket$kcm(0x10, 0x2, 0x4) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000100)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0xfeffffff, 0x0, 0x0, 0x0, 0x0, 0x3f00, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40) 22:14:00 executing program 3: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) writev(r1, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[@ANYBLOB="d6ac7d3f595131008901"], 0xa) close(r2) socket(0x10, 0x3, 0x0) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000180)="580000001400192340834b80040d8c560a", 0x11}], 0x1) writev(r1, &(0x7f0000000600)=[{&(0x7f0000000380)="f98ac693ce6908", 0x7}], 0x1) accept4$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0x14, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r0, 0x0, r2, 0x0, 0x80000001, 0x0) 22:14:00 executing program 2: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_elf32(r1, &(0x7f00000007c0)=ANY=[@ANYBLOB="955a000004000000a423107d0b6e5fbdf500dfff"], 0x14) r3 = socket$inet(0x2, 0x3, 0x7f) bind$inet(r2, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) setsockopt$inet_int(r3, 0x0, 0x3, &(0x7f0000000140)=0x7ff, 0x4) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) setsockopt$SO_TIMESTAMPING(r2, 0x1, 0x25, &(0x7f0000000000)=0x80, 0x4) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 22:14:00 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r0, &(0x7f0000a34fff)='H', 0x1, 0x0, &(0x7f0000030ff0)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r0, &(0x7f000026cfff)="c6", 0x1, 0x0, &(0x7f000052a000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r1, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(r1, 0x111, 0x1, 0xffff0001, 0x4) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000140), 0x8) 22:14:00 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) r2 = perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x6, 0xff, 0x3f, 0x0, 0x0, 0x9, 0xc000, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x200, 0x5a15, 0x3, 0x0, 0x0, 0x0, 0x7}, r1, 0x5, 0xffffffffffffffff, 0x8) socket$bt_bnep(0x1f, 0x3, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, 0xffffffffffffffff, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, r2) setsockopt$XDP_RX_RING(0xffffffffffffffff, 0x11b, 0x2, &(0x7f0000000140)=0x13030, 0x4) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x1, &(0x7f00000001c0), 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) r3 = dup(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) ioctl$VHOST_GET_VRING_BASE(r3, 0xc008af12, &(0x7f00000004c0)) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000400)='/dev/sequencer2\x00', 0x0, 0x0) r4 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r4, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) r5 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r5, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r5, 0x29, 0x2a, &(0x7f0000000580)={0x100, {{0xa, 0x4e22, 0x8, @empty, 0x7}}}, 0x88) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000540)) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000480)='cgroup.threads\x00', 0x2, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r3, 0x6, 0xd, &(0x7f0000000180)='lp\x00', 0x3) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) prctl$PR_GET_THP_DISABLE(0x2a) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0x2bcf) shutdown(r0, 0x1) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) recvmsg(r0, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0xf99e}], 0x1, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x100) 22:14:00 executing program 3: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) writev(r1, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[@ANYBLOB="d6ac7d3f595131008901"], 0xa) close(r2) socket(0x10, 0x3, 0x0) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000180)="580000001400192340834b80040d8c560a", 0x11}], 0x1) writev(r1, &(0x7f0000000600)=[{&(0x7f0000000380)="f98ac693ce6908", 0x7}], 0x1) accept4$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0x14, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r0, 0x0, r2, 0x0, 0x80000001, 0x0) 22:14:00 executing program 4: creat(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)='\x00|\f\xbb\xd4\x1aF\x00t\x15\r\x06\xf2\x9a^\xc8\xca\xc8\x1bz\xa7\'\xa9\x8f\x7f\xe1\xb3Y\x016\x16\xf7\xabq9\xc9\x93N\"\xafG\x0e\x8c\x9e>\xba9\xf3\xc6l1\xee1<\xdd0\x99\x18\xc5\xe2<\xcc56\xa4-\xf6i\xe1\x9aNQ(\xb0ek}\xa2\xa2O6\xc5k\xa3F\xf9\xf7b\x1d\xdc\xa4*\xf7', 0x0, 0x0) 22:14:00 executing program 2: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_elf32(r1, &(0x7f00000007c0)=ANY=[@ANYBLOB="955a000004000000a423107d0b6e5fbdf500dfff"], 0x14) r3 = socket$inet(0x2, 0x3, 0x7f) bind$inet(r2, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) setsockopt$inet_int(r3, 0x0, 0x3, &(0x7f0000000140)=0x7ff, 0x4) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) setsockopt$SO_TIMESTAMPING(r2, 0x1, 0x25, &(0x7f0000000000)=0x80, 0x4) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 22:14:01 executing program 2: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_elf32(r1, &(0x7f00000007c0)=ANY=[@ANYBLOB="955a000004000000a423107d0b6e5fbdf500dfff"], 0x14) r3 = socket$inet(0x2, 0x3, 0x7f) bind$inet(r2, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) setsockopt$inet_int(r3, 0x0, 0x3, &(0x7f0000000140)=0x7ff, 0x4) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) setsockopt$SO_TIMESTAMPING(r2, 0x1, 0x25, &(0x7f0000000000)=0x80, 0x4) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 22:14:01 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) writev(r1, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[@ANYBLOB="d6ac7d3f595131008901"], 0xa) close(r2) socket(0x10, 0x3, 0x0) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000180)="580000001400192340834b80040d8c560a", 0x11}], 0x1) writev(r1, &(0x7f0000000600)=[{&(0x7f0000000380)="f98ac693ce6908", 0x7}], 0x1) accept4$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0x14, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r0, 0x0, r2, 0x0, 0x80000001, 0x0) 22:14:01 executing program 4: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)='\x00|\f\xbb\xd4\x1aF\x00t\x15\r\x06\xf2\x9a^\xc8\xca\xc8\x1bz\xa7\'\xa9\x8f\x7f\xe1\xb3Y\x016\x16\xf7\xabq9\xc9\x93N\"\xafG\x0e\x8c\x9e>\xba9\xf3\xc6l1\xee1<\xdd0\x99\x18\xc5\xe2<\xcc56\xa4-\xf6i\xe1\x9aNQ(\xb0ek}\xa2\xa2O6\xc5k\xa3F\xf9\xf7b\x1d\xdc\xa4*\xf7', 0x0, 0x0) 22:14:01 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_elf32(r1, &(0x7f00000007c0)=ANY=[@ANYBLOB="955a000004000000a423107d0b6e5fbdf500dfff"], 0x14) r3 = socket$inet(0x2, 0x3, 0x7f) bind$inet(r2, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) setsockopt$inet_int(r3, 0x0, 0x3, &(0x7f0000000140)=0x7ff, 0x4) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) setsockopt$SO_TIMESTAMPING(r2, 0x1, 0x25, &(0x7f0000000000)=0x80, 0x4) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 22:14:01 executing program 4: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)='\x00|\f\xbb\xd4\x1aF\x00t\x15\r\x06\xf2\x9a^\xc8\xca\xc8\x1bz\xa7\'\xa9\x8f\x7f\xe1\xb3Y\x016\x16\xf7\xabq9\xc9\x93N\"\xafG\x0e\x8c\x9e>\xba9\xf3\xc6l1\xee1<\xdd0\x99\x18\xc5\xe2<\xcc56\xa4-\xf6i\xe1\x9aNQ(\xb0ek}\xa2\xa2O6\xc5k\xa3F\xf9\xf7b\x1d\xdc\xa4*\xf7', 0x0, 0x0) 22:14:01 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) writev(r1, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[@ANYBLOB="d6ac7d3f595131008901"], 0xa) close(r2) socket(0x10, 0x3, 0x0) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000180)="580000001400192340834b80040d8c560a", 0x11}], 0x1) writev(r1, &(0x7f0000000600)=[{&(0x7f0000000380)="f98ac693ce6908", 0x7}], 0x1) accept4$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0x14, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r0, 0x0, r2, 0x0, 0x80000001, 0x0) 22:14:01 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) r2 = perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x6, 0xff, 0x3f, 0x0, 0x0, 0x9, 0xc000, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x200, 0x5a15, 0x3, 0x0, 0x0, 0x0, 0x7}, r1, 0x5, 0xffffffffffffffff, 0x8) socket$bt_bnep(0x1f, 0x3, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, 0xffffffffffffffff, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, r2) setsockopt$XDP_RX_RING(0xffffffffffffffff, 0x11b, 0x2, &(0x7f0000000140)=0x13030, 0x4) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x1, &(0x7f00000001c0), 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) r3 = dup(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) ioctl$VHOST_GET_VRING_BASE(r3, 0xc008af12, &(0x7f00000004c0)) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000400)='/dev/sequencer2\x00', 0x0, 0x0) r4 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r4, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) r5 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r5, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r5, 0x29, 0x2a, &(0x7f0000000580)={0x100, {{0xa, 0x4e22, 0x8, @empty, 0x7}}}, 0x88) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000540)) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000480)='cgroup.threads\x00', 0x2, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r3, 0x6, 0xd, &(0x7f0000000180)='lp\x00', 0x3) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) prctl$PR_GET_THP_DISABLE(0x2a) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0x2bcf) shutdown(r0, 0x1) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) recvmsg(r0, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0xf99e}], 0x1, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x100) 22:14:01 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x14e24}, 0xffffff84) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x1000000000004e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) setsockopt$inet_int(r0, 0x0, 0xd, &(0x7f0000000040)=0x4, 0x4) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0xa396c12d171904f2, 0x0) r2 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r2, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) setsockopt$llc_int(r2, 0x10c, 0x7, &(0x7f0000000140)=0x3f, 0x4) ioctl$TIOCSWINSZ(r1, 0x5414, &(0x7f0000000100)={0x9, 0x7, 0x8000, 0x7}) r3 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(r3, 0x40bc5311, &(0x7f0000000180)={0xffff2e16, 0x0, 'client1\x00', 0xb, "d89a12d510b42667", "11a83adb23bff46324d94ddc0f5e538fc308940576f339addfb55f760520b27e", 0x1f, 0x8000}) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000240)) 22:14:01 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) r2 = perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x6, 0xff, 0x3f, 0x0, 0x0, 0x9, 0xc000, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x200, 0x5a15, 0x3, 0x0, 0x0, 0x0, 0x7}, r1, 0x5, 0xffffffffffffffff, 0x8) socket$bt_bnep(0x1f, 0x3, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, 0xffffffffffffffff, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, r2) setsockopt$XDP_RX_RING(0xffffffffffffffff, 0x11b, 0x2, &(0x7f0000000140)=0x13030, 0x4) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x1, &(0x7f00000001c0), 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) r3 = dup(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) ioctl$VHOST_GET_VRING_BASE(r3, 0xc008af12, &(0x7f00000004c0)) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000400)='/dev/sequencer2\x00', 0x0, 0x0) r4 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r4, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) r5 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r5, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r5, 0x29, 0x2a, &(0x7f0000000580)={0x100, {{0xa, 0x4e22, 0x8, @empty, 0x7}}}, 0x88) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000540)) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000480)='cgroup.threads\x00', 0x2, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r3, 0x6, 0xd, &(0x7f0000000180)='lp\x00', 0x3) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) prctl$PR_GET_THP_DISABLE(0x2a) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0x2bcf) shutdown(r0, 0x1) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) recvmsg(r0, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0xf99e}], 0x1, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x100) 22:14:01 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_elf32(r1, &(0x7f00000007c0)=ANY=[@ANYBLOB="955a000004000000a423107d0b6e5fbdf500dfff"], 0x14) r3 = socket$inet(0x2, 0x3, 0x7f) bind$inet(r2, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) setsockopt$inet_int(r3, 0x0, 0x3, &(0x7f0000000140)=0x7ff, 0x4) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) setsockopt$SO_TIMESTAMPING(r2, 0x1, 0x25, &(0x7f0000000000)=0x80, 0x4) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 22:14:01 executing program 4: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)='\x00|\f\xbb\xd4\x1aF\x00t\x15\r\x06\xf2\x9a^\xc8\xca\xc8\x1bz\xa7\'\xa9\x8f\x7f\xe1\xb3Y\x016\x16\xf7\xabq9\xc9\x93N\"\xafG\x0e\x8c\x9e>\xba9\xf3\xc6l1\xee1<\xdd0\x99\x18\xc5\xe2<\xcc56\xa4-\xf6i\xe1\x9aNQ(\xb0ek}\xa2\xa2O6\xc5k\xa3F\xf9\xf7b\x1d\xdc\xa4*\xf7', 0x0, 0x0) 22:14:01 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) writev(r1, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[@ANYBLOB="d6ac7d3f595131008901"], 0xa) close(r2) socket(0x10, 0x3, 0x0) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000180)="580000001400192340834b80040d8c560a", 0x11}], 0x1) writev(r1, &(0x7f0000000600)=[{&(0x7f0000000380)="f98ac693ce6908", 0x7}], 0x1) accept4$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0x14, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r0, 0x0, r2, 0x0, 0x80000001, 0x0) 22:14:02 executing program 0: mq_open(&(0x7f00000010c0)='eth0\x00\xc2\xa8\xe1\xc7%\xe3M\xa9\xa5\xdf\x9e6\xe4\xff\x06Tj\xd94\x8f\xc0\xff\t\x9er\xacVu\x11Q\xa5\xc2\xd7\xc6n\xef\x1f\x92m7S\xd1\x0fO\xb0\xf0\x15h\b\x01\xeae\xe1E\xcd\x8c\xc4\xb6\xe5b\x100\xde\x93\xd0\xcfd7\x91+\xd4i\x90\xe6\x8b\x8e7\x11P\r\x1dY\x1e\x92\xfe&\xf0\xd8t\xc2B:?\xa9gj\xcc\x1a\xf2y8C\xadu{\xf3jg[\xc9\x1f\xcd(\xf0\x91/\x97\xbeR\xec0\n\xb8T\x185\xa3\x9cJ\x18}\x16dIJ\xcd\xda\xad\xb3\x8bJM\xf3\xfd\tTxQ\xb5!7\xd3\xc8d\xa1:\xda^\xff\xeag\xeaT\a\xcf\xf5\xa1\x8e\xf8\xc1\x15H\xb0\xa9\xe7H\x99W=F\x8b=\x93\x926\xf6~S0\xfd\xc7M}.\x18\xc1\xe1*\x91\\\x8cVrV5\x89q\x1eA\x00\xc7%IwX\xac\xc8\xc4\x7f&$\x8e\xb3E', 0x1, 0x0, 0x0) times(0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x2000) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000340)={{{@in=@initdev, @in=@local, 0x0, 0x0, 0x0, 0x0, 0xa}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in6=@local, 0x0, 0x3}}, 0xe8) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYRES32, @ANYBLOB, @ANYRES32=0x0], 0x3}}, 0x0) socket(0xa, 0x1, 0x0) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000100)="3d72201800000000b12ac38a920ca866d9ee2c7f86d9e74ed8d9c6bba94c2aae0795e0d15336c61beec315a82344e62a2bc91b9f", 0x34}], 0x40, 0xfffffffffffffffe) creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet_udp_int(r2, 0x11, 0x0, 0x0, 0x0) 22:14:02 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_elf32(r1, &(0x7f00000007c0)=ANY=[@ANYBLOB="955a000004000000a423107d0b6e5fbdf500dfff"], 0x14) r3 = socket$inet(0x2, 0x3, 0x7f) bind$inet(r2, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) setsockopt$inet_int(r3, 0x0, 0x3, &(0x7f0000000140)=0x7ff, 0x4) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) setsockopt$SO_TIMESTAMPING(r2, 0x1, 0x25, &(0x7f0000000000)=0x80, 0x4) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 22:14:02 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="d6ac7d3f595131008901"], 0xa) close(r3) socket(0x10, 0x3, 0x0) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000180)="580000001400192340834b80040d8c560a", 0x11}], 0x1) writev(r2, &(0x7f0000000600)=[{&(0x7f0000000380)="f98ac693ce6908", 0x7}], 0x1) accept4$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0x14, 0x0) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r1, 0x0, r3, 0x0, 0x80000001, 0x0) 22:14:02 executing program 1: bpf$MAP_CREATE(0x0, 0x0, 0x0) accept4$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x0, 0x0, @mcast2}, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgid() ioctl$TIOCGSERIAL(0xffffffffffffffff, 0x541e, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) prctl$PR_SET_SPECULATION_CTRL(0x35, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) sendto$inet6(r0, &(0x7f0000000500)="ce03110075000100ff901efc67195c22cc6dc37916237d8599b512eceb92bd30961166bf00000000070000e19b40b4288ba4e852e8876e977ac94186835a03d045871d6fe30032b46ec4b52a4245f456142304a7821d1c6c8689f4ac12c50cc25534655ee7b237c7a5ba6dcc956757bf80f7146faaefba7f62928a83b54c10bd50c4ea9709367ee58afd37f6f9a0a92decda7d3e5dabe32ba34964ae3278f4c1c443f92eb36c74609cc828c5e2", 0xad, 0x0, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) keyctl$read(0xb, 0x0, &(0x7f00000004c0)=""/8, 0x8) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r1, 0x0) write$P9_RWALK(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="b0"], 0x1) perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) timerfd_create(0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) ioctl$EVIOCSKEYCODE(0xffffffffffffffff, 0x80104592, &(0x7f0000000100)=[0x6, 0x8001]) getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x23, &(0x7f0000000040), &(0x7f00000002c0)=0x4) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x2000) r3 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r3, 0x0, 0x0) r4 = socket$caif_stream(0x25, 0x1, 0x5) close(r4) 22:14:02 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) write$binfmt_elf32(r2, &(0x7f00000007c0)=ANY=[@ANYBLOB="955a000004000000a423107d0b6e5fbdf500dfff"], 0x14) r4 = socket$inet(0x2, 0x3, 0x7f) bind$inet(r3, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) setsockopt$inet_int(r4, 0x0, 0x3, &(0x7f0000000140)=0x7ff, 0x4) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, &(0x7f0000000000)=0x80, 0x4) splice(r1, 0x0, r3, 0x0, 0x10005, 0x0) 22:14:02 executing program 4: creat(0x0, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)='\x00|\f\xbb\xd4\x1aF\x00t\x15\r\x06\xf2\x9a^\xc8\xca\xc8\x1bz\xa7\'\xa9\x8f\x7f\xe1\xb3Y\x016\x16\xf7\xabq9\xc9\x93N\"\xafG\x0e\x8c\x9e>\xba9\xf3\xc6l1\xee1<\xdd0\x99\x18\xc5\xe2<\xcc56\xa4-\xf6i\xe1\x9aNQ(\xb0ek}\xa2\xa2O6\xc5k\xa3F\xf9\xf7b\x1d\xdc\xa4*\xf7', 0x0, 0x0) 22:14:02 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) write$binfmt_elf32(r2, &(0x7f00000007c0)=ANY=[@ANYBLOB="955a000004000000a423107d0b6e5fbdf500dfff"], 0x14) r4 = socket$inet(0x2, 0x3, 0x7f) bind$inet(r3, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) setsockopt$inet_int(r4, 0x0, 0x3, &(0x7f0000000140)=0x7ff, 0x4) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, &(0x7f0000000000)=0x80, 0x4) splice(r1, 0x0, r3, 0x0, 0x10005, 0x0) 22:14:02 executing program 5: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$TCSETXW(0xffffffffffffffff, 0x5435, &(0x7f00000000c0)={0x0, 0x0, [0x101]}) write$tun(0xffffffffffffffff, &(0x7f0000000400)={@val={0x0, 0xa01}, @void, @ipv4={{0x6, 0x4, 0x2, 0x0, 0xf2, 0x0, 0x0, 0x5d, 0x8e, 0x0, @dev, @remote, {[@timestamp={0x44, 0x4}]}}, @dccp={{0x0, 0x4e22, 0x4, 0x1, 0xf, 0x0, 0x0, 0x2, 0x0, "faf6ad", 0x0, "40ac8b"}, "3ca94559b2581eed3d2a5ebf5ef31e52e1db11604e2b49e0b787582e7466f04f38d8c4eac63938046b65945f91fda53bec7191c8d6483b937e78189ed652d24dfa8abeffff281ab1e190155d2db43ff0d725aebe1107be1b5472bd7e20b5a5683179b002151c0cf8a819d6caf83802ff75523bf47a12392d7f06f5ae231b0cc6c4a3e0e3bfe2283b683c63d26ee76f8c926af1aa8de97491a975b77723bb1db260844c0565908c96f97eeec5fb5fd2e3b18a9911c2f7aa703fd5b62be1ed338fb019cc134c050cde1d33"}}}, 0xf6) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) connect(0xffffffffffffffff, &(0x7f0000000100)=@ax25={{0x3, @bcast, 0x1}, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @default, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}, 0xfffffffffffffffa) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r5 = dup(r4) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r5, 0xc1105511, &(0x7f0000000700)={{0xa, 0x0, 0x8, 0x2, 'syz1\x00', 0x401}, 0x2, 0x500, 0x2, 0x0, 0x1, 0x6, 'syz1\x00', &(0x7f00000002c0)=['security[nodevsecurity\x00'], 0x17, [], [0x0, 0x7eaa, 0x1]}) socket$packet(0x11, 0x3, 0x300) r6 = socket$inet6(0xa, 0x3, 0x7) connect$inet6(r6, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r7 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x40, 0x0) setsockopt$ALG_SET_KEY(r7, 0x117, 0x1, &(0x7f0000000100)="a621789888210d675c758843d2a3a0fd2f97b0936ab0ab3883a5fe6efc43b0a222d46be45cb52d9a291f3bb158b01b16eb0564fc6e0764c4ddb31c38473e6f0af6c25f283a6a0fdc911514f056b9ae9d25afda6a298a760be8512d44c6ef4777f84153fdf7568d4ae94c20e7371139f0d71515336b60468acaaa1f34614e", 0x7e) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r7, 0xc0305302, &(0x7f0000000040)={0x0, 0x5, 0x0, 0x0, 0x0, 0x40000}) setsockopt$TIPC_DEST_DROPPABLE(r7, 0x10f, 0x81, &(0x7f0000000580)=0x1ff, 0x29f) ioctl$VIDIOC_S_PARM(r7, 0xc0cc5616, &(0x7f0000000300)={0x3, @capture={0x1000, 0x1, {0x0, 0x5}, 0x1, 0xfffffff8}}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000840)=ANY=[@ANYBLOB="02000000010000000000000002000000", @ANYRES32=0x0, @ANYBLOB="040007000000000008000000", @ANYRES32=0x0, @ANYBLOB="08000100f9a0d6bff6c343f76e3c1f899de65e0aa6eb395c8fa621fccc0c22c905000000c5f930717f7c314b20f05ec045d23c08261bdbe2bbf6bf9cf6174e6992546f2e3cfbd3835ef76d34f55f99cca1e9dcb6f4eb70678fb2b175", @ANYRES32=0x0, @ANYBLOB="0000b9d1d708953f78d372f385fbde7c2d7d75bde8672519886b10"], 0x3c, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) [ 346.512325][ T8977] fuse: Bad value for 'fd' 22:14:03 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="d6ac7d3f595131008901"], 0xa) close(r3) socket(0x10, 0x3, 0x0) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000180)="580000001400192340834b80040d8c560a", 0x11}], 0x1) writev(r2, &(0x7f0000000600)=[{&(0x7f0000000380)="f98ac693ce6908", 0x7}], 0x1) accept4$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0x14, 0x0) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r1, 0x0, r3, 0x0, 0x80000001, 0x0) 22:14:03 executing program 4: creat(0x0, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)='\x00|\f\xbb\xd4\x1aF\x00t\x15\r\x06\xf2\x9a^\xc8\xca\xc8\x1bz\xa7\'\xa9\x8f\x7f\xe1\xb3Y\x016\x16\xf7\xabq9\xc9\x93N\"\xafG\x0e\x8c\x9e>\xba9\xf3\xc6l1\xee1<\xdd0\x99\x18\xc5\xe2<\xcc56\xa4-\xf6i\xe1\x9aNQ(\xb0ek}\xa2\xa2O6\xc5k\xa3F\xf9\xf7b\x1d\xdc\xa4*\xf7', 0x0, 0x0) 22:14:03 executing program 4: creat(0x0, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)='\x00|\f\xbb\xd4\x1aF\x00t\x15\r\x06\xf2\x9a^\xc8\xca\xc8\x1bz\xa7\'\xa9\x8f\x7f\xe1\xb3Y\x016\x16\xf7\xabq9\xc9\x93N\"\xafG\x0e\x8c\x9e>\xba9\xf3\xc6l1\xee1<\xdd0\x99\x18\xc5\xe2<\xcc56\xa4-\xf6i\xe1\x9aNQ(\xb0ek}\xa2\xa2O6\xc5k\xa3F\xf9\xf7b\x1d\xdc\xa4*\xf7', 0x0, 0x0) 22:14:03 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) write$binfmt_elf32(r2, &(0x7f00000007c0)=ANY=[@ANYBLOB="955a000004000000a423107d0b6e5fbdf500dfff"], 0x14) r4 = socket$inet(0x2, 0x3, 0x7f) bind$inet(r3, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) setsockopt$inet_int(r4, 0x0, 0x3, &(0x7f0000000140)=0x7ff, 0x4) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, &(0x7f0000000000)=0x80, 0x4) splice(r1, 0x0, r3, 0x0, 0x10005, 0x0) [ 346.866587][ T8984] fuse: Bad value for 'fd' [ 347.017158][ T9004] overlayfs: workdir and upperdir must reside under the same mount 22:14:03 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="d6ac7d3f595131008901"], 0xa) close(r3) socket(0x10, 0x3, 0x0) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000180)="580000001400192340834b80040d8c560a", 0x11}], 0x1) writev(r2, &(0x7f0000000600)=[{&(0x7f0000000380)="f98ac693ce6908", 0x7}], 0x1) accept4$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0x14, 0x0) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r1, 0x0, r3, 0x0, 0x80000001, 0x0) [ 347.151350][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 347.157168][ C0] protocol 88fb is buggy, dev hsr_slave_1 22:14:03 executing program 0: r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)={0x58, r2, 0x101, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_SERVICE={0x44, 0x1, [@IPVS_SVC_ATTR_FLAGS={0xc}, @IPVS_SVC_ATTR_SCHED_NAME={0xc, 0x6, 'lblcr\x00'}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_TIMEOUT={0x8}, @IPVS_SVC_ATTR_NETMASK={0x8}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x58}}, 0x0) sendmsg$IPVS_CMD_NEW_DEST(r0, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x1040004}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x14, r2, 0x400, 0x70bd2b, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x800}, 0x6004404) r3 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/$\xcfX/vh\x8fs:\x90m\xd0t\x00', 0x2, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f00000010c0)={&(0x7f0000ffd000/0x3000)=nil, &(0x7f0000fef000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff4000/0x3000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000c00000/0x400000)=nil, &(0x7f0000fef000/0xe000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ff5000/0x2000)=nil, &(0x7f0000ff9000/0x3000)=nil, &(0x7f0000002180)="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"/4267, 0xfd5f, r3}, 0x68) r4 = open(&(0x7f0000000100)='./file0\x00', 0x2000, 0x0) acct(&(0x7f0000000200)='./file0\x00') openat$cgroup_subtree(r4, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$int_in(r4, 0x40000000af01, 0x0) r5 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x0, 0x0) close(r5) socket$netlink(0x10, 0x3, 0x0) ioctl$VHOST_SET_MEM_TABLE(r3, 0x4008af03, &(0x7f0000001400)=ANY=[]) r6 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x4000, 0x0) ioctl$VHOST_NET_SET_BACKEND(r6, 0x4008af30, &(0x7f0000d7c000)={0x2, r5}) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) r8 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r8, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) r9 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r9, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r9, 0x84, 0xa, &(0x7f0000000140)={0x0, 0x100, 0x8, 0x8, 0x2, 0xfffffffb, 0x45, 0x10000, 0x0}, &(0x7f0000000180)=0x20) setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(r8, 0x84, 0x19, &(0x7f00000001c0)={r10}, 0x8) setsockopt$inet6_tcp_TCP_ULP(r7, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x4) syz_init_net_socket$ax25(0x3, 0x0, 0xcf) 22:14:03 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) write$binfmt_elf32(r2, &(0x7f00000007c0)=ANY=[@ANYBLOB="955a000004000000a423107d0b6e5fbdf500dfff"], 0x14) r4 = socket$inet(0x2, 0x3, 0x7f) bind$inet(r3, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) setsockopt$inet_int(r4, 0x0, 0x3, &(0x7f0000000140)=0x7ff, 0x4) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, &(0x7f0000000000)=0x80, 0x4) splice(r1, 0x0, r3, 0x0, 0x10005, 0x0) [ 347.329433][ T9021] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 22:14:03 executing program 1: bpf$MAP_CREATE(0x0, 0x0, 0x0) accept4$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x0, 0x0, @mcast2}, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgid() ioctl$TIOCGSERIAL(0xffffffffffffffff, 0x541e, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) prctl$PR_SET_SPECULATION_CTRL(0x35, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) sendto$inet6(r0, &(0x7f0000000500)="ce03110075000100ff901efc67195c22cc6dc37916237d8599b512eceb92bd30961166bf00000000070000e19b40b4288ba4e852e8876e977ac94186835a03d045871d6fe30032b46ec4b52a4245f456142304a7821d1c6c8689f4ac12c50cc25534655ee7b237c7a5ba6dcc956757bf80f7146faaefba7f62928a83b54c10bd50c4ea9709367ee58afd37f6f9a0a92decda7d3e5dabe32ba34964ae3278f4c1c443f92eb36c74609cc828c5e2", 0xad, 0x0, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) keyctl$read(0xb, 0x0, &(0x7f00000004c0)=""/8, 0x8) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r1, 0x0) write$P9_RWALK(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="b0"], 0x1) perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) timerfd_create(0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) ioctl$EVIOCSKEYCODE(0xffffffffffffffff, 0x80104592, &(0x7f0000000100)=[0x6, 0x8001]) getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x23, &(0x7f0000000040), &(0x7f00000002c0)=0x4) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x2000) r3 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r3, 0x0, 0x0) r4 = socket$caif_stream(0x25, 0x1, 0x5) close(r4) 22:14:03 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="d6ac7d3f595131008901"], 0xa) close(r3) socket(0x10, 0x3, 0x0) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000180)="580000001400192340834b80040d8c560a", 0x11}], 0x1) writev(r2, &(0x7f0000000600)=[{&(0x7f0000000380)="f98ac693ce6908", 0x7}], 0x1) accept4$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0x14, 0x0) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r1, 0x0, r3, 0x0, 0x80000001, 0x0) [ 347.391356][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 347.397257][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 347.414810][ T9023] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 22:14:03 executing program 4: creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)='\x00|\f\xbb\xd4\x1aF\x00t\x15\r\x06\xf2\x9a^\xc8\xca\xc8\x1bz\xa7\'\xa9\x8f\x7f\xe1\xb3Y\x016\x16\xf7\xabq9\xc9\x93N\"\xafG\x0e\x8c\x9e>\xba9\xf3\xc6l1\xee1<\xdd0\x99\x18\xc5\xe2<\xcc56\xa4-\xf6i\xe1\x9aNQ(\xb0ek}\xa2\xa2O6\xc5k\xa3F\xf9\xf7b\x1d\xdc\xa4*\xf7', 0x0, 0x0) [ 347.612683][ T9034] overlayfs: workdir and upperdir must reside under the same mount 22:14:04 executing program 0: bpf$MAP_CREATE(0x0, 0x0, 0x0) accept4$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x0, 0x0, @mcast2}, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgid() ioctl$TIOCGSERIAL(0xffffffffffffffff, 0x541e, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) prctl$PR_SET_SPECULATION_CTRL(0x35, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) sendto$inet6(r0, &(0x7f0000000500)="ce03110075000100ff901efc67195c22cc6dc37916237d8599b512eceb92bd30961166bf00000000070000e19b40b4288ba4e852e8876e977ac94186835a03d045871d6fe30032b46ec4b52a4245f456142304a7821d1c6c8689f4ac12c50cc25534655ee7b237c7a5ba6dcc956757bf80f7146faaefba7f62928a83b54c10bd50c4ea9709367ee58afd37f6f9a0a92decda7d3e5dabe32ba34964ae3278f4c1c443f92eb36c74609cc828c5e2", 0xad, 0x0, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) keyctl$read(0xb, 0x0, &(0x7f00000004c0)=""/8, 0x8) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r1, 0x0) write$P9_RWALK(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="b0"], 0x1) perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) timerfd_create(0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) ioctl$EVIOCSKEYCODE(0xffffffffffffffff, 0x80104592, &(0x7f0000000100)=[0x6, 0x8001]) getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x23, &(0x7f0000000040), &(0x7f00000002c0)=0x4) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x2000) r3 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r3, 0x0, 0x0) r4 = socket$caif_stream(0x25, 0x1, 0x5) close(r4) 22:14:04 executing program 5: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$TCSETXW(0xffffffffffffffff, 0x5435, &(0x7f00000000c0)={0x0, 0x0, [0x101]}) write$tun(0xffffffffffffffff, &(0x7f0000000400)={@val={0x0, 0xa01}, @void, @ipv4={{0x6, 0x4, 0x2, 0x0, 0xf2, 0x0, 0x0, 0x5d, 0x8e, 0x0, @dev, @remote, {[@timestamp={0x44, 0x4}]}}, @dccp={{0x0, 0x4e22, 0x4, 0x1, 0xf, 0x0, 0x0, 0x2, 0x0, "faf6ad", 0x0, "40ac8b"}, "3ca94559b2581eed3d2a5ebf5ef31e52e1db11604e2b49e0b787582e7466f04f38d8c4eac63938046b65945f91fda53bec7191c8d6483b937e78189ed652d24dfa8abeffff281ab1e190155d2db43ff0d725aebe1107be1b5472bd7e20b5a5683179b002151c0cf8a819d6caf83802ff75523bf47a12392d7f06f5ae231b0cc6c4a3e0e3bfe2283b683c63d26ee76f8c926af1aa8de97491a975b77723bb1db260844c0565908c96f97eeec5fb5fd2e3b18a9911c2f7aa703fd5b62be1ed338fb019cc134c050cde1d33"}}}, 0xf6) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) connect(0xffffffffffffffff, &(0x7f0000000100)=@ax25={{0x3, @bcast, 0x1}, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @default, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}, 0xfffffffffffffffa) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r5 = dup(r4) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r5, 0xc1105511, &(0x7f0000000700)={{0xa, 0x0, 0x8, 0x2, 'syz1\x00', 0x401}, 0x2, 0x500, 0x2, 0x0, 0x1, 0x6, 'syz1\x00', &(0x7f00000002c0)=['security[nodevsecurity\x00'], 0x17, [], [0x0, 0x7eaa, 0x1]}) socket$packet(0x11, 0x3, 0x300) r6 = socket$inet6(0xa, 0x3, 0x7) connect$inet6(r6, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r7 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x40, 0x0) setsockopt$ALG_SET_KEY(r7, 0x117, 0x1, &(0x7f0000000100)="a621789888210d675c758843d2a3a0fd2f97b0936ab0ab3883a5fe6efc43b0a222d46be45cb52d9a291f3bb158b01b16eb0564fc6e0764c4ddb31c38473e6f0af6c25f283a6a0fdc911514f056b9ae9d25afda6a298a760be8512d44c6ef4777f84153fdf7568d4ae94c20e7371139f0d71515336b60468acaaa1f34614e", 0x7e) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r7, 0xc0305302, &(0x7f0000000040)={0x0, 0x5, 0x0, 0x0, 0x0, 0x40000}) setsockopt$TIPC_DEST_DROPPABLE(r7, 0x10f, 0x81, &(0x7f0000000580)=0x1ff, 0x29f) ioctl$VIDIOC_S_PARM(r7, 0xc0cc5616, &(0x7f0000000300)={0x3, @capture={0x1000, 0x1, {0x0, 0x5}, 0x1, 0xfffffff8}}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000840)=ANY=[@ANYBLOB="02000000010000000000000002000000", @ANYRES32=0x0, @ANYBLOB="040007000000000008000000", @ANYRES32=0x0, @ANYBLOB="08000100f9a0d6bff6c343f76e3c1f899de65e0aa6eb395c8fa621fccc0c22c905000000c5f930717f7c314b20f05ec045d23c08261bdbe2bbf6bf9cf6174e6992546f2e3cfbd3835ef76d34f55f99cca1e9dcb6f4eb70678fb2b175", @ANYRES32=0x0, @ANYBLOB="0000b9d1d708953f78d372f385fbde7c2d7d75bde8672519886b10"], 0x3c, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) 22:14:04 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) write$binfmt_elf32(r2, &(0x7f00000007c0)=ANY=[@ANYBLOB="955a000004000000a423107d0b6e5fbdf500dfff"], 0x14) r4 = socket$inet(0x2, 0x3, 0x7f) bind$inet(r3, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) setsockopt$inet_int(r4, 0x0, 0x3, &(0x7f0000000140)=0x7ff, 0x4) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, &(0x7f0000000000)=0x80, 0x4) splice(r1, 0x0, r3, 0x0, 0x10005, 0x0) 22:14:04 executing program 4: creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)='\x00|\f\xbb\xd4\x1aF\x00t\x15\r\x06\xf2\x9a^\xc8\xca\xc8\x1bz\xa7\'\xa9\x8f\x7f\xe1\xb3Y\x016\x16\xf7\xabq9\xc9\x93N\"\xafG\x0e\x8c\x9e>\xba9\xf3\xc6l1\xee1<\xdd0\x99\x18\xc5\xe2<\xcc56\xa4-\xf6i\xe1\x9aNQ(\xb0ek}\xa2\xa2O6\xc5k\xa3F\xf9\xf7b\x1d\xdc\xa4*\xf7', 0x0, 0x0) [ 347.927317][ T9042] fuse: Bad value for 'fd' 22:14:04 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) write$binfmt_elf32(r2, &(0x7f00000007c0)=ANY=[@ANYBLOB="955a000004000000a423107d0b6e5fbdf500dfff"], 0x14) r4 = socket$inet(0x2, 0x3, 0x7f) bind$inet(r3, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) setsockopt$inet_int(r4, 0x0, 0x3, &(0x7f0000000140)=0x7ff, 0x4) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, &(0x7f0000000000)=0x80, 0x4) splice(r1, 0x0, r3, 0x0, 0x10005, 0x0) 22:14:04 executing program 1: bpf$MAP_CREATE(0x0, 0x0, 0x0) accept4$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x0, 0x0, @mcast2}, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgid() ioctl$TIOCGSERIAL(0xffffffffffffffff, 0x541e, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) prctl$PR_SET_SPECULATION_CTRL(0x35, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) sendto$inet6(r0, &(0x7f0000000500)="ce03110075000100ff901efc67195c22cc6dc37916237d8599b512eceb92bd30961166bf00000000070000e19b40b4288ba4e852e8876e977ac94186835a03d045871d6fe30032b46ec4b52a4245f456142304a7821d1c6c8689f4ac12c50cc25534655ee7b237c7a5ba6dcc956757bf80f7146faaefba7f62928a83b54c10bd50c4ea9709367ee58afd37f6f9a0a92decda7d3e5dabe32ba34964ae3278f4c1c443f92eb36c74609cc828c5e2", 0xad, 0x0, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) keyctl$read(0xb, 0x0, &(0x7f00000004c0)=""/8, 0x8) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r1, 0x0) write$P9_RWALK(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="b0"], 0x1) perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) timerfd_create(0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) ioctl$EVIOCSKEYCODE(0xffffffffffffffff, 0x80104592, &(0x7f0000000100)=[0x6, 0x8001]) getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x23, &(0x7f0000000040), &(0x7f00000002c0)=0x4) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x2000) r3 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r3, 0x0, 0x0) r4 = socket$caif_stream(0x25, 0x1, 0x5) close(r4) [ 348.032333][ T28] device 0 left promiscuous mode [ 348.158919][ T9054] overlayfs: workdir and upperdir must reside under the same mount 22:14:04 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="d6ac7d3f595131008901"], 0xa) close(r3) socket(0x10, 0x3, 0x0) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000180)="580000001400192340834b80040d8c560a", 0x11}], 0x1) writev(r2, &(0x7f0000000600)=[{&(0x7f0000000380)="f98ac693ce6908", 0x7}], 0x1) accept4$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0x14, 0x0) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r1, 0x0, r3, 0x0, 0x80000001, 0x0) 22:14:04 executing program 4: creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)='\x00|\f\xbb\xd4\x1aF\x00t\x15\r\x06\xf2\x9a^\xc8\xca\xc8\x1bz\xa7\'\xa9\x8f\x7f\xe1\xb3Y\x016\x16\xf7\xabq9\xc9\x93N\"\xafG\x0e\x8c\x9e>\xba9\xf3\xc6l1\xee1<\xdd0\x99\x18\xc5\xe2<\xcc56\xa4-\xf6i\xe1\x9aNQ(\xb0ek}\xa2\xa2O6\xc5k\xa3F\xf9\xf7b\x1d\xdc\xa4*\xf7', 0x0, 0x0) 22:14:04 executing program 1: bpf$MAP_CREATE(0x0, 0x0, 0x0) accept4$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x0, 0x0, @mcast2}, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgid() ioctl$TIOCGSERIAL(0xffffffffffffffff, 0x541e, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) prctl$PR_SET_SPECULATION_CTRL(0x35, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) sendto$inet6(r0, &(0x7f0000000500)="ce03110075000100ff901efc67195c22cc6dc37916237d8599b512eceb92bd30961166bf00000000070000e19b40b4288ba4e852e8876e977ac94186835a03d045871d6fe30032b46ec4b52a4245f456142304a7821d1c6c8689f4ac12c50cc25534655ee7b237c7a5ba6dcc956757bf80f7146faaefba7f62928a83b54c10bd50c4ea9709367ee58afd37f6f9a0a92decda7d3e5dabe32ba34964ae3278f4c1c443f92eb36c74609cc828c5e2", 0xad, 0x0, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) keyctl$read(0xb, 0x0, &(0x7f00000004c0)=""/8, 0x8) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r1, 0x0) write$P9_RWALK(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="b0"], 0x1) perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) timerfd_create(0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) ioctl$EVIOCSKEYCODE(0xffffffffffffffff, 0x80104592, &(0x7f0000000100)=[0x6, 0x8001]) getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x23, &(0x7f0000000040), &(0x7f00000002c0)=0x4) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x2000) r3 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r3, 0x0, 0x0) r4 = socket$caif_stream(0x25, 0x1, 0x5) close(r4) 22:14:04 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) write$binfmt_elf32(r2, &(0x7f00000007c0)=ANY=[@ANYBLOB="955a000004000000a423107d0b6e5fbdf500dfff"], 0x14) r4 = socket$inet(0x2, 0x3, 0x7f) bind$inet(r3, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) setsockopt$inet_int(r4, 0x0, 0x3, &(0x7f0000000140)=0x7ff, 0x4) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, &(0x7f0000000000)=0x80, 0x4) splice(r1, 0x0, r3, 0x0, 0x10005, 0x0) 22:14:04 executing program 0: bpf$MAP_CREATE(0x0, 0x0, 0x0) accept4$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x0, 0x0, @mcast2}, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgid() ioctl$TIOCGSERIAL(0xffffffffffffffff, 0x541e, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) prctl$PR_SET_SPECULATION_CTRL(0x35, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) sendto$inet6(r0, &(0x7f0000000500)="ce03110075000100ff901efc67195c22cc6dc37916237d8599b512eceb92bd30961166bf00000000070000e19b40b4288ba4e852e8876e977ac94186835a03d045871d6fe30032b46ec4b52a4245f456142304a7821d1c6c8689f4ac12c50cc25534655ee7b237c7a5ba6dcc956757bf80f7146faaefba7f62928a83b54c10bd50c4ea9709367ee58afd37f6f9a0a92decda7d3e5dabe32ba34964ae3278f4c1c443f92eb36c74609cc828c5e2", 0xad, 0x0, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) keyctl$read(0xb, 0x0, &(0x7f00000004c0)=""/8, 0x8) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r1, 0x0) write$P9_RWALK(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="b0"], 0x1) perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) timerfd_create(0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) ioctl$EVIOCSKEYCODE(0xffffffffffffffff, 0x80104592, &(0x7f0000000100)=[0x6, 0x8001]) getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x23, &(0x7f0000000040), &(0x7f00000002c0)=0x4) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x2000) r3 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r3, 0x0, 0x0) r4 = socket$caif_stream(0x25, 0x1, 0x5) close(r4) 22:14:05 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="d6ac7d3f595131008901"], 0xa) close(r3) socket(0x10, 0x3, 0x0) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000180)="580000001400192340834b80040d8c560a", 0x11}], 0x1) writev(r2, &(0x7f0000000600)=[{&(0x7f0000000380)="f98ac693ce6908", 0x7}], 0x1) accept4$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0x14, 0x0) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r1, 0x0, r3, 0x0, 0x80000001, 0x0) 22:14:05 executing program 5: creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)='\x00|\f\xbb\xd4\x1aF\x00t\x15\r\x06\xf2\x9a^\xc8\xca\xc8\x1bz\xa7\'\xa9\x8f\x7f\xe1\xb3Y\x016\x16\xf7\xabq9\xc9\x93N\"\xafG\x0e\x8c\x9e>\xba9\xf3\xc6l1\xee1<\xdd0\x99\x18\xc5\xe2<\xcc56\xa4-\xf6i\xe1\x9aNQ(\xb0ek}\xa2\xa2O6\xc5k\xa3F\xf9\xf7b\x1d\xdc\xa4*\xf7', 0x0, 0x0) 22:14:05 executing program 4: creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, 0x0, &(0x7f0000000540)='\x00|\f\xbb\xd4\x1aF\x00t\x15\r\x06\xf2\x9a^\xc8\xca\xc8\x1bz\xa7\'\xa9\x8f\x7f\xe1\xb3Y\x016\x16\xf7\xabq9\xc9\x93N\"\xafG\x0e\x8c\x9e>\xba9\xf3\xc6l1\xee1<\xdd0\x99\x18\xc5\xe2<\xcc56\xa4-\xf6i\xe1\x9aNQ(\xb0ek}\xa2\xa2O6\xc5k\xa3F\xf9\xf7b\x1d\xdc\xa4*\xf7', 0x0, 0x0) 22:14:05 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) write$binfmt_elf32(r2, &(0x7f00000007c0)=ANY=[@ANYBLOB="955a000004000000a423107d0b6e5fbdf500dfff"], 0x14) r4 = socket$inet(0x2, 0x3, 0x7f) bind$inet(r3, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) setsockopt$inet_int(r4, 0x0, 0x3, &(0x7f0000000140)=0x7ff, 0x4) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, &(0x7f0000000000)=0x80, 0x4) splice(r1, 0x0, r3, 0x0, 0x10005, 0x0) 22:14:05 executing program 4: creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, 0x0, &(0x7f0000000540)='\x00|\f\xbb\xd4\x1aF\x00t\x15\r\x06\xf2\x9a^\xc8\xca\xc8\x1bz\xa7\'\xa9\x8f\x7f\xe1\xb3Y\x016\x16\xf7\xabq9\xc9\x93N\"\xafG\x0e\x8c\x9e>\xba9\xf3\xc6l1\xee1<\xdd0\x99\x18\xc5\xe2<\xcc56\xa4-\xf6i\xe1\x9aNQ(\xb0ek}\xa2\xa2O6\xc5k\xa3F\xf9\xf7b\x1d\xdc\xa4*\xf7', 0x0, 0x0) 22:14:05 executing program 4: creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, 0x0, &(0x7f0000000540)='\x00|\f\xbb\xd4\x1aF\x00t\x15\r\x06\xf2\x9a^\xc8\xca\xc8\x1bz\xa7\'\xa9\x8f\x7f\xe1\xb3Y\x016\x16\xf7\xabq9\xc9\x93N\"\xafG\x0e\x8c\x9e>\xba9\xf3\xc6l1\xee1<\xdd0\x99\x18\xc5\xe2<\xcc56\xa4-\xf6i\xe1\x9aNQ(\xb0ek}\xa2\xa2O6\xc5k\xa3F\xf9\xf7b\x1d\xdc\xa4*\xf7', 0x0, 0x0) 22:14:05 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="d6ac7d3f595131008901"], 0xa) close(r3) socket(0x10, 0x3, 0x0) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000180)="580000001400192340834b80040d8c560a", 0x11}], 0x1) writev(r2, &(0x7f0000000600)=[{&(0x7f0000000380)="f98ac693ce6908", 0x7}], 0x1) accept4$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0x14, 0x0) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r1, 0x0, r3, 0x0, 0x80000001, 0x0) 22:14:05 executing program 0: bpf$MAP_CREATE(0x0, 0x0, 0x0) accept4$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x0, 0x0, @mcast2}, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgid() ioctl$TIOCGSERIAL(0xffffffffffffffff, 0x541e, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) prctl$PR_SET_SPECULATION_CTRL(0x35, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) sendto$inet6(r0, &(0x7f0000000500)="ce03110075000100ff901efc67195c22cc6dc37916237d8599b512eceb92bd30961166bf00000000070000e19b40b4288ba4e852e8876e977ac94186835a03d045871d6fe30032b46ec4b52a4245f456142304a7821d1c6c8689f4ac12c50cc25534655ee7b237c7a5ba6dcc956757bf80f7146faaefba7f62928a83b54c10bd50c4ea9709367ee58afd37f6f9a0a92decda7d3e5dabe32ba34964ae3278f4c1c443f92eb36c74609cc828c5e2", 0xad, 0x0, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) keyctl$read(0xb, 0x0, &(0x7f00000004c0)=""/8, 0x8) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r1, 0x0) write$P9_RWALK(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="b0"], 0x1) perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) timerfd_create(0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) ioctl$EVIOCSKEYCODE(0xffffffffffffffff, 0x80104592, &(0x7f0000000100)=[0x6, 0x8001]) getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x23, &(0x7f0000000040), &(0x7f00000002c0)=0x4) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x2000) r3 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r3, 0x0, 0x0) r4 = socket$caif_stream(0x25, 0x1, 0x5) close(r4) 22:14:05 executing program 5: r0 = socket$inet_smc(0x2b, 0x1, 0x0) fcntl$setstatus(r0, 0x4, 0x41800) r1 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r1, 0x4, 0x42000) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x2, 0x5c831, 0xffffffffffffffff, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000cfc000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuset.memory_pressure\x00', 0x0, 0x0) ioctl$KVM_SET_VAPIC_ADDR(r5, 0x4008ae93, &(0x7f00000000c0)=0x1) dup(0xffffffffffffffff) ioctl$VIDIOC_DQBUF(0xffffffffffffffff, 0xc0585611, &(0x7f0000000100)={0x0, 0x1a, 0x4, 0x40, {0x0, 0x7530}, {0x0, 0xc, 0x3, 0xef, 0x0, 0x0, "b1a973d2"}, 0x7b, 0x2, @userptr=0xc3ef, 0x4}) [ 350.165865][ T28] device bridge_slave_1 left promiscuous mode [ 350.172216][ T28] bridge0: port 2(bridge_slave_1) entered disabled state [ 350.215473][ T28] device bridge_slave_0 left promiscuous mode [ 350.221796][ T28] bridge0: port 1(bridge_slave_0) entered disabled state [ 350.991948][ T28] device hsr_slave_0 left promiscuous mode [ 351.051498][ T28] device hsr_slave_1 left promiscuous mode [ 351.118940][ T28] team0 (unregistering): Port device team_slave_1 removed [ 351.129265][ T28] team0 (unregistering): Port device team_slave_0 removed [ 351.140373][ T28] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 351.176163][ T28] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 351.254509][ T28] bond0 (unregistering): Released all slaves [ 351.542673][ T9112] IPVS: ftp: loaded support on port[0] = 21 [ 351.616946][ T9112] chnl_net:caif_netlink_parms(): no params data found [ 351.647582][ T9112] bridge0: port 1(bridge_slave_0) entered blocking state [ 351.654857][ T9112] bridge0: port 1(bridge_slave_0) entered disabled state [ 351.663245][ T9112] device bridge_slave_0 entered promiscuous mode [ 351.670880][ T9112] bridge0: port 2(bridge_slave_1) entered blocking state [ 351.678431][ T9112] bridge0: port 2(bridge_slave_1) entered disabled state [ 351.686881][ T9112] device bridge_slave_1 entered promiscuous mode [ 351.706600][ T9112] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 351.717515][ T9112] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 351.739139][ T9112] team0: Port device team_slave_0 added [ 351.750236][ T9112] team0: Port device team_slave_1 added [ 351.823847][ T9112] device hsr_slave_0 entered promiscuous mode [ 351.871694][ T9112] device hsr_slave_1 entered promiscuous mode [ 351.914779][ T9112] debugfs: Directory 'hsr0' with parent '/' already present! [ 351.930853][ T9112] bridge0: port 2(bridge_slave_1) entered blocking state [ 351.938056][ T9112] bridge0: port 2(bridge_slave_1) entered forwarding state [ 351.945412][ T9112] bridge0: port 1(bridge_slave_0) entered blocking state [ 351.952451][ T9112] bridge0: port 1(bridge_slave_0) entered forwarding state [ 351.998658][ T9112] 8021q: adding VLAN 0 to HW filter on device bond0 [ 352.013656][ T8029] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 352.022755][ T8029] bridge0: port 1(bridge_slave_0) entered disabled state [ 352.031016][ T8029] bridge0: port 2(bridge_slave_1) entered disabled state [ 352.048845][ T9112] 8021q: adding VLAN 0 to HW filter on device team0 [ 352.060140][ T2405] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 352.068778][ T2405] bridge0: port 1(bridge_slave_0) entered blocking state [ 352.075845][ T2405] bridge0: port 1(bridge_slave_0) entered forwarding state [ 352.094206][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 352.102758][ T17] bridge0: port 2(bridge_slave_1) entered blocking state [ 352.109832][ T17] bridge0: port 2(bridge_slave_1) entered forwarding state [ 352.131121][ T9112] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 352.141735][ T9112] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 352.156280][ T7980] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 352.165115][ T7980] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 352.173939][ T7980] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 352.183639][ T7980] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 352.192152][ T7980] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 352.199853][ T7980] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 352.219537][ T9112] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 352.227469][ T2405] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 352.235472][ T2405] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 352.391170][ T9120] fuse: Bad value for 'fd' 22:14:09 executing program 4: creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) 22:14:09 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) write$binfmt_elf32(r2, &(0x7f00000007c0)=ANY=[@ANYBLOB="955a000004000000a423107d0b6e5fbdf500dfff"], 0x14) r4 = socket$inet(0x2, 0x3, 0x7f) bind$inet(r3, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) setsockopt$inet_int(r4, 0x0, 0x3, &(0x7f0000000140)=0x7ff, 0x4) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, &(0x7f0000000000)=0x80, 0x4) splice(r1, 0x0, r3, 0x0, 0x10005, 0x0) 22:14:09 executing program 1: bpf$MAP_CREATE(0x0, 0x0, 0x0) accept4$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x0, 0x0, @mcast2}, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgid() ioctl$TIOCGSERIAL(0xffffffffffffffff, 0x541e, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) prctl$PR_SET_SPECULATION_CTRL(0x35, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) sendto$inet6(r0, &(0x7f0000000500)="ce03110075000100ff901efc67195c22cc6dc37916237d8599b512eceb92bd30961166bf00000000070000e19b40b4288ba4e852e8876e977ac94186835a03d045871d6fe30032b46ec4b52a4245f456142304a7821d1c6c8689f4ac12c50cc25534655ee7b237c7a5ba6dcc956757bf80f7146faaefba7f62928a83b54c10bd50c4ea9709367ee58afd37f6f9a0a92decda7d3e5dabe32ba34964ae3278f4c1c443f92eb36c74609cc828c5e2", 0xad, 0x0, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) keyctl$read(0xb, 0x0, &(0x7f00000004c0)=""/8, 0x8) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r1, 0x0) write$P9_RWALK(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="b0"], 0x1) perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) timerfd_create(0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) ioctl$EVIOCSKEYCODE(0xffffffffffffffff, 0x80104592, &(0x7f0000000100)=[0x6, 0x8001]) getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x23, &(0x7f0000000040), &(0x7f00000002c0)=0x4) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x2000) r3 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r3, 0x0, 0x0) close(0xffffffffffffffff) 22:14:09 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="d6ac7d3f595131008901"], 0xa) close(r3) socket(0x10, 0x3, 0x0) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000180)="580000001400192340834b80040d8c560a", 0x11}], 0x1) writev(r2, &(0x7f0000000600)=[{&(0x7f0000000380)="f98ac693ce6908", 0x7}], 0x1) accept4$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0x14, 0x0) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r1, 0x0, r3, 0x0, 0x80000001, 0x0) 22:14:09 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0800a1695e1dcfe87b1071") sendmmsg$inet(r0, &(0x7f0000001d40)=[{{&(0x7f0000000140)={0x2, 0x4e22, @empty}, 0x10, 0x0, 0x0, &(0x7f0000000a40)=[@ip_ttl={{0x14, 0x0, 0x2, 0x1f}}], 0x18}}, {{&(0x7f0000000a80)={0x2, 0x0, @broadcast}, 0x10, 0x0}}], 0x2, 0x0) 22:14:09 executing program 0: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x20310, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61d7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$rxrpc(0x21, 0x2, 0xa) bind$rxrpc(r1, &(0x7f00000000c0)=@in6={0x21, 0x3, 0x2, 0x1c, {0xa, 0x0, 0x0, @loopback}}, 0x24) ppoll(&(0x7f0000000000)=[{r1, 0x8}, {r1, 0x20}, {r1, 0x124}, {r1, 0x140}, {r1}, {r1, 0x4000}, {r1}], 0x7, &(0x7f0000000040), &(0x7f0000000080)={0x7}, 0x8) ioctl$BLKPG(0xffffffffffffffff, 0x1269, &(0x7f00000001c0)={0x0, 0x0, 0xc00, &(0x7f0000000400)="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"}) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000000)={&(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000002000/0x3000)=nil, &(0x7f0000003000/0x2000)=nil, &(0x7f0000007000/0x3000)=nil, &(0x7f0000008000/0x4000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000000000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000009000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, 0x0}, 0x68) r2 = inotify_init1(0x0) fcntl$setown(r2, 0x8, 0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000000100)) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = getpid() ptrace$setopts(0x11, r3, 0x0, 0x200000000000030) sched_getparam(r3, &(0x7f0000000000)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, r4}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={r3, r0, 0x0, 0x9, &(0x7f0000000200)='./cgroup\x00', r4}, 0x30) process_vm_readv(r5, &(0x7f0000000380), 0x0, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x3f}], 0x1, 0x0) perf_event_open(&(0x7f0000000140)={0x4, 0x70, 0xe0, 0x7f, 0x0, 0x3, 0x0, 0x9, 0xa022, 0x7, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x8, 0x3, @perf_config_ext={0xb3d, 0x10000}, 0x12004, 0x5108, 0x5, 0x0, 0x0, 0x2, 0x9}, 0x0, 0x1, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f00000001c0)='TIPCv2\x00') 22:14:09 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="d6ac7d3f595131008901"], 0xa) close(r3) socket(0x10, 0x3, 0x0) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000180)="580000001400192340834b80040d8c560a", 0x11}], 0x1) writev(r2, &(0x7f0000000600)=[{&(0x7f0000000380)="f98ac693ce6908", 0x7}], 0x1) accept4$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0x14, 0x0) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r1, 0x0, r3, 0x0, 0x80000001, 0x0) 22:14:09 executing program 4: creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) 22:14:09 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1d") pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) write$binfmt_elf32(r2, &(0x7f00000007c0)=ANY=[@ANYBLOB="955a000004000000a423107d0b6e5fbdf500dfff"], 0x14) r4 = socket$inet(0x2, 0x3, 0x7f) bind$inet(r3, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) setsockopt$inet_int(r4, 0x0, 0x3, &(0x7f0000000140)=0x7ff, 0x4) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, &(0x7f0000000000)=0x80, 0x4) splice(r1, 0x0, r3, 0x0, 0x10005, 0x0) 22:14:09 executing program 5: r0 = socket$inet(0x2, 0x3, 0x800000800000001) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x8, 0x6}, 0x2c) getsockopt$inet_mreqsrc(r0, 0x0, 0x53, &(0x7f0000000000)={@dev, @local, @broadcast}, &(0x7f0000000040)=0x28) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) r2 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r2, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) r3 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r3) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r4, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r4, &(0x7f0000d83fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f0000000180)=0x8) setsockopt$inet_sctp6_SCTP_RTOINFO(r3, 0x84, 0x0, &(0x7f0000000000)={r5}, 0x10) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f00000000c0)={r5, 0xfff, 0x30}, &(0x7f0000000100)=0xc) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r1, 0x84, 0x79, &(0x7f0000000140)={r6, 0xf9d0, 0x5}, 0x8) 22:14:09 executing program 4: creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) [ 353.177569][ T26] audit: type=1804 audit(1572905649.534:40): pid=9147 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir549880654/syzkaller.fdLLJj/37/file0" dev="sda1" ino=16522 res=1 22:14:09 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) write$binfmt_elf32(r2, &(0x7f00000007c0)=ANY=[@ANYBLOB="955a000004000000a423107d0b6e5fbdf500dfff"], 0x14) r4 = socket$inet(0x2, 0x3, 0x7f) bind$inet(r3, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) setsockopt$inet_int(r4, 0x0, 0x3, &(0x7f0000000140)=0x7ff, 0x4) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, &(0x7f0000000000)=0x80, 0x4) splice(r1, 0x0, r3, 0x0, 0x10005, 0x0) 22:14:09 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1d") pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) write$binfmt_elf32(r2, &(0x7f00000007c0)=ANY=[@ANYBLOB="955a000004000000a423107d0b6e5fbdf500dfff"], 0x14) r4 = socket$inet(0x2, 0x3, 0x7f) bind$inet(r3, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) setsockopt$inet_int(r4, 0x0, 0x3, &(0x7f0000000140)=0x7ff, 0x4) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, &(0x7f0000000000)=0x80, 0x4) splice(r1, 0x0, r3, 0x0, 0x10005, 0x0) 22:14:09 executing program 1: bpf$MAP_CREATE(0x0, 0x0, 0x0) accept4$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x0, 0x0, @mcast2}, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgid() ioctl$TIOCGSERIAL(0xffffffffffffffff, 0x541e, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) prctl$PR_SET_SPECULATION_CTRL(0x35, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) sendto$inet6(r0, &(0x7f0000000500)="ce03110075000100ff901efc67195c22cc6dc37916237d8599b512eceb92bd30961166bf00000000070000e19b40b4288ba4e852e8876e977ac94186835a03d045871d6fe30032b46ec4b52a4245f456142304a7821d1c6c8689f4ac12c50cc25534655ee7b237c7a5ba6dcc956757bf80f7146faaefba7f62928a83b54c10bd50c4ea9709367ee58afd37f6f9a0a92decda7d3e5dabe32ba34964ae3278f4c1c443f92eb36c74609cc828c5e2", 0xad, 0x0, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) keyctl$read(0xb, 0x0, &(0x7f00000004c0)=""/8, 0x8) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r1, 0x0) write$P9_RWALK(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="b0"], 0x1) perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) timerfd_create(0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) ioctl$EVIOCSKEYCODE(0xffffffffffffffff, 0x80104592, &(0x7f0000000100)=[0x6, 0x8001]) getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x23, &(0x7f0000000040), &(0x7f00000002c0)=0x4) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x2000) r3 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r3, 0x0, 0x0) close(0xffffffffffffffff) 22:14:09 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1d") pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) write$binfmt_elf32(r2, &(0x7f00000007c0)=ANY=[@ANYBLOB="955a000004000000a423107d0b6e5fbdf500dfff"], 0x14) r4 = socket$inet(0x2, 0x3, 0x7f) bind$inet(r3, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) setsockopt$inet_int(r4, 0x0, 0x3, &(0x7f0000000140)=0x7ff, 0x4) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, &(0x7f0000000000)=0x80, 0x4) splice(r1, 0x0, r3, 0x0, 0x10005, 0x0) 22:14:09 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1d") pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="d6ac7d3f595131008901"], 0xa) close(r3) socket(0x10, 0x3, 0x0) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000180)="580000001400192340834b80040d8c560a", 0x11}], 0x1) writev(r2, &(0x7f0000000600)=[{&(0x7f0000000380)="f98ac693ce6908", 0x7}], 0x1) accept4$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0x14, 0x0) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r1, 0x0, r3, 0x0, 0x80000001, 0x0) 22:14:10 executing program 1: bpf$MAP_CREATE(0x0, 0x0, 0x0) accept4$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x0, 0x0, @mcast2}, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgid() ioctl$TIOCGSERIAL(0xffffffffffffffff, 0x541e, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) prctl$PR_SET_SPECULATION_CTRL(0x35, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) sendto$inet6(r0, &(0x7f0000000500)="ce03110075000100ff901efc67195c22cc6dc37916237d8599b512eceb92bd30961166bf00000000070000e19b40b4288ba4e852e8876e977ac94186835a03d045871d6fe30032b46ec4b52a4245f456142304a7821d1c6c8689f4ac12c50cc25534655ee7b237c7a5ba6dcc956757bf80f7146faaefba7f62928a83b54c10bd50c4ea9709367ee58afd37f6f9a0a92decda7d3e5dabe32ba34964ae3278f4c1c443f92eb36c74609cc828c5e2", 0xad, 0x0, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) keyctl$read(0xb, 0x0, &(0x7f00000004c0)=""/8, 0x8) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r1, 0x0) write$P9_RWALK(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="b0"], 0x1) perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) timerfd_create(0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) ioctl$EVIOCSKEYCODE(0xffffffffffffffff, 0x80104592, &(0x7f0000000100)=[0x6, 0x8001]) getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x23, &(0x7f0000000040), &(0x7f00000002c0)=0x4) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x2000) r3 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r3, 0x0, 0x0) close(0xffffffffffffffff) [ 354.151990][ T28] device bridge_slave_1 left promiscuous mode [ 354.158151][ T28] bridge0: port 2(bridge_slave_1) entered disabled state [ 354.206085][ T28] device bridge_slave_0 left promiscuous mode [ 354.225351][ T28] bridge0: port 1(bridge_slave_0) entered disabled state [ 355.191586][ T28] device hsr_slave_0 left promiscuous mode [ 355.241479][ T28] device hsr_slave_1 left promiscuous mode [ 355.288671][ T28] team0 (unregistering): Port device team_slave_1 removed [ 355.299025][ T28] team0 (unregistering): Port device team_slave_0 removed [ 355.309715][ T28] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 355.365876][ T28] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 355.425281][ T28] bond0 (unregistering): Released all slaves [ 355.532945][ T9174] IPVS: ftp: loaded support on port[0] = 21 [ 355.586177][ T9174] chnl_net:caif_netlink_parms(): no params data found [ 355.611067][ T9174] bridge0: port 1(bridge_slave_0) entered blocking state [ 355.618253][ T9174] bridge0: port 1(bridge_slave_0) entered disabled state [ 355.626204][ T9174] device bridge_slave_0 entered promiscuous mode [ 355.633803][ T9174] bridge0: port 2(bridge_slave_1) entered blocking state [ 355.640859][ T9174] bridge0: port 2(bridge_slave_1) entered disabled state [ 355.649591][ T9174] device bridge_slave_1 entered promiscuous mode [ 355.702507][ T9174] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 355.716773][ T9174] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 355.745928][ T9174] team0: Port device team_slave_0 added [ 355.755922][ T9174] team0: Port device team_slave_1 added [ 355.853995][ T9174] device hsr_slave_0 entered promiscuous mode [ 355.884846][ T9174] device hsr_slave_1 entered promiscuous mode [ 355.957717][ T9177] IPVS: ftp: loaded support on port[0] = 21 [ 355.975613][ T9174] bridge0: port 2(bridge_slave_1) entered blocking state [ 355.982719][ T9174] bridge0: port 2(bridge_slave_1) entered forwarding state [ 355.990047][ T9174] bridge0: port 1(bridge_slave_0) entered blocking state [ 355.997144][ T9174] bridge0: port 1(bridge_slave_0) entered forwarding state [ 356.077384][ T9174] 8021q: adding VLAN 0 to HW filter on device bond0 [ 356.107987][ T8029] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 356.116771][ T8029] bridge0: port 1(bridge_slave_0) entered disabled state [ 356.125764][ T8029] bridge0: port 2(bridge_slave_1) entered disabled state [ 356.150555][ T9174] 8021q: adding VLAN 0 to HW filter on device team0 [ 356.189656][ T2405] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 356.202803][ T2405] bridge0: port 1(bridge_slave_0) entered blocking state [ 356.209850][ T2405] bridge0: port 1(bridge_slave_0) entered forwarding state [ 356.220867][ T2405] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 356.230930][ T2405] bridge0: port 2(bridge_slave_1) entered blocking state [ 356.237984][ T2405] bridge0: port 2(bridge_slave_1) entered forwarding state [ 356.262742][ T2405] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 356.272118][ T2405] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 356.281043][ T2405] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 356.293999][ T2405] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 356.307403][ T9177] chnl_net:caif_netlink_parms(): no params data found [ 356.317360][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 356.326812][ T9174] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 356.351109][ T9174] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 356.364346][ T2405] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 356.372116][ T2405] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 356.406816][ T9177] bridge0: port 1(bridge_slave_0) entered blocking state [ 356.413992][ T9177] bridge0: port 1(bridge_slave_0) entered disabled state [ 356.422114][ T9177] device bridge_slave_0 entered promiscuous mode [ 356.429624][ T9177] bridge0: port 2(bridge_slave_1) entered blocking state [ 356.436915][ T9177] bridge0: port 2(bridge_slave_1) entered disabled state [ 356.445101][ T9177] device bridge_slave_1 entered promiscuous mode [ 356.464997][ T9177] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 356.476086][ T9177] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 356.507993][ T9177] team0: Port device team_slave_0 added [ 356.517815][ T9177] team0: Port device team_slave_1 added 22:14:12 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1d") pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="d6ac7d3f595131008901"], 0xa) close(r3) socket(0x10, 0x3, 0x0) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000180)="580000001400192340834b80040d8c560a", 0x11}], 0x1) writev(r2, &(0x7f0000000600)=[{&(0x7f0000000380)="f98ac693ce6908", 0x7}], 0x1) accept4$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0x14, 0x0) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r1, 0x0, r3, 0x0, 0x80000001, 0x0) 22:14:12 executing program 4 (fault-call:2 fault-nth:0): creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)='\x00|\f\xbb\xd4\x1aF\x00t\x15\r\x06\xf2\x9a^\xc8\xca\xc8\x1bz\xa7\'\xa9\x8f\x7f\xe1\xb3Y\x016\x16\xf7\xabq9\xc9\x93N\"\xafG\x0e\x8c\x9e>\xba9\xf3\xc6l1\xee1<\xdd0\x99\x18\xc5\xe2<\xcc56\xa4-\xf6i\xe1\x9aNQ(\xb0ek}\xa2\xa2O6\xc5k\xa3F\xf9\xf7b\x1d\xdc\xa4*\xf7', 0x0, 0x0) 22:14:12 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1d") pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) write$binfmt_elf32(r2, &(0x7f00000007c0)=ANY=[@ANYBLOB="955a000004000000a423107d0b6e5fbdf500dfff"], 0x14) r4 = socket$inet(0x2, 0x3, 0x7f) bind$inet(r3, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) setsockopt$inet_int(r4, 0x0, 0x3, &(0x7f0000000140)=0x7ff, 0x4) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, &(0x7f0000000000)=0x80, 0x4) splice(r1, 0x0, r3, 0x0, 0x10005, 0x0) 22:14:12 executing program 0: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x20310, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61d7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$rxrpc(0x21, 0x2, 0xa) bind$rxrpc(r1, &(0x7f00000000c0)=@in6={0x21, 0x3, 0x2, 0x1c, {0xa, 0x0, 0x0, @loopback}}, 0x24) ppoll(&(0x7f0000000000)=[{r1, 0x8}, {r1, 0x20}, {r1, 0x124}, {r1, 0x140}, {r1}, {r1, 0x4000}, {r1}], 0x7, &(0x7f0000000040), &(0x7f0000000080)={0x7}, 0x8) ioctl$BLKPG(0xffffffffffffffff, 0x1269, &(0x7f00000001c0)={0x0, 0x0, 0xc00, &(0x7f0000000400)="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"}) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000000)={&(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000002000/0x3000)=nil, &(0x7f0000003000/0x2000)=nil, &(0x7f0000007000/0x3000)=nil, &(0x7f0000008000/0x4000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000000000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000009000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, 0x0}, 0x68) r2 = inotify_init1(0x0) fcntl$setown(r2, 0x8, 0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000000100)) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = getpid() ptrace$setopts(0x11, r3, 0x0, 0x200000000000030) sched_getparam(r3, &(0x7f0000000000)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, r4}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={r3, r0, 0x0, 0x9, &(0x7f0000000200)='./cgroup\x00', r4}, 0x30) process_vm_readv(r5, &(0x7f0000000380), 0x0, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x3f}], 0x1, 0x0) perf_event_open(&(0x7f0000000140)={0x4, 0x70, 0xe0, 0x7f, 0x0, 0x3, 0x0, 0x9, 0xa022, 0x7, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x8, 0x3, @perf_config_ext={0xb3d, 0x10000}, 0x12004, 0x5108, 0x5, 0x0, 0x0, 0x2, 0x9}, 0x0, 0x1, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f00000001c0)='TIPCv2\x00') 22:14:12 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f00000004c0)={0x0, 0x17, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="04010000100001000000000000000000e000000100"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="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"], 0x104}}, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x80800, 0x0) r2 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r3 = openat$cgroup_subtree(r2, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r3, &(0x7f0000000280)=ANY=[@ANYBLOB="2d63707520ff92b2f197d86ad80547edb4cd282eaa6ef7ad6224d7b3ecb7b7a2436978ac3aad2814b44d3d3a4a9f842473a457206fcb95c665a50bd1a286b2445614306acda196b025e1dfa600a8713bc838b04a459a4600db8401f170d92ee34e1f04ea91df2bacb934a272caa68cb930f14608493b756c3d164ffa1f3c97a8728bf67e946ec1000000000000000035716ed0be9fb90437e907d4ee63c572a67fb888108744339e535a893509d12bb3d06a2e00"/189], 0x5) r4 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r4, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) r5 = fcntl$dupfd(r3, 0x406, r4) r6 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$TCSETXF(r6, 0x5434, &(0x7f0000000200)={0x9f0b, 0x7, [0x1c, 0xdf, 0xff, 0x1ff, 0xdff8], 0x8000}) r7 = pkey_alloc(0x0, 0x1) pkey_free(r7) ioctl$BLKSECDISCARD(r5, 0x127d, &(0x7f0000000000)=0x10000) getsockopt$inet_mreqsrc(r5, 0x0, 0x28, &(0x7f0000000040)={@rand_addr, @multicast1, @initdev}, &(0x7f0000000080)=0xc) [ 356.583899][ T9177] device hsr_slave_0 entered promiscuous mode [ 356.641775][ T9177] device hsr_slave_1 entered promiscuous mode [ 356.657894][ T9196] FAULT_INJECTION: forcing a failure. [ 356.657894][ T9196] name failslab, interval 1, probability 0, space 0, times 1 [ 356.689127][ T9201] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.5'. [ 356.701382][ T9177] debugfs: Directory 'hsr0' with parent '/' already present! [ 356.702647][ T9196] CPU: 0 PID: 9196 Comm: syz-executor.4 Not tainted 5.4.0-rc6+ #0 [ 356.716662][ T9196] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 356.726716][ T9196] Call Trace: [ 356.730033][ T9196] dump_stack+0xf5/0x159 [ 356.734352][ T9196] should_fail.cold+0xa/0x1a [ 356.738948][ T9196] __should_failslab+0xee/0x130 [ 356.743818][ T9196] should_failslab+0x9/0x14 [ 356.748319][ T9196] __kmalloc_track_caller+0x4f/0x690 [ 356.753601][ T9196] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 356.759542][ T9196] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 356.765797][ T9196] ? __this_cpu_preempt_check+0x4a/0x170 [ 356.771508][ T9196] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 356.777761][ T9196] ? strndup_user+0x85/0xc0 [ 356.782305][ T9196] memdup_user+0x2f/0xa0 [ 356.786540][ T9196] strndup_user+0x85/0xc0 [ 356.790879][ T9196] ksys_mount+0x45/0x160 [ 356.795118][ T9196] __x64_sys_mount+0x70/0x90 [ 356.799728][ T9196] do_syscall_64+0xcc/0x370 [ 356.804233][ T9196] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 356.810249][ T9196] RIP: 0033:0x45a219 [ 356.814150][ T9196] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 356.833746][ T9196] RSP: 002b:00007f5405f3ac78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 356.842242][ T9196] RAX: ffffffffffffffda RBX: 00007f5405f3ac90 RCX: 000000000045a219 [ 356.850204][ T9196] RDX: 0000000020000540 RSI: 0000000020000140 RDI: 0000000000000000 [ 356.858256][ T9196] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 356.866221][ T9196] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f5405f3b6d4 [ 356.874184][ T9196] R13: 00000000004c6db2 R14: 00000000004dc528 R15: 0000000000000004 22:14:13 executing program 0: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x20310, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61d7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$rxrpc(0x21, 0x2, 0xa) bind$rxrpc(r1, &(0x7f00000000c0)=@in6={0x21, 0x3, 0x2, 0x1c, {0xa, 0x0, 0x0, @loopback}}, 0x24) ppoll(&(0x7f0000000000)=[{r1, 0x8}, {r1, 0x20}, {r1, 0x124}, {r1, 0x140}, {r1}, {r1, 0x4000}, {r1}], 0x7, &(0x7f0000000040), &(0x7f0000000080)={0x7}, 0x8) ioctl$BLKPG(0xffffffffffffffff, 0x1269, &(0x7f00000001c0)={0x0, 0x0, 0xc00, &(0x7f0000000400)="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"}) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000000)={&(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000002000/0x3000)=nil, &(0x7f0000003000/0x2000)=nil, &(0x7f0000007000/0x3000)=nil, &(0x7f0000008000/0x4000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000000000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000009000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, 0x0}, 0x68) r2 = inotify_init1(0x0) fcntl$setown(r2, 0x8, 0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000000100)) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = getpid() ptrace$setopts(0x11, r3, 0x0, 0x200000000000030) sched_getparam(r3, &(0x7f0000000000)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, r4}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={r3, r0, 0x0, 0x9, &(0x7f0000000200)='./cgroup\x00', r4}, 0x30) process_vm_readv(r5, &(0x7f0000000380), 0x0, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x3f}], 0x1, 0x0) perf_event_open(&(0x7f0000000140)={0x4, 0x70, 0xe0, 0x7f, 0x0, 0x3, 0x0, 0x9, 0xa022, 0x7, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x8, 0x3, @perf_config_ext={0xb3d, 0x10000}, 0x12004, 0x5108, 0x5, 0x0, 0x0, 0x2, 0x9}, 0x0, 0x1, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f00000001c0)='TIPCv2\x00') 22:14:13 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b") pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) write$binfmt_elf32(r2, &(0x7f00000007c0)=ANY=[@ANYBLOB="955a000004000000a423107d0b6e5fbdf500dfff"], 0x14) r4 = socket$inet(0x2, 0x3, 0x7f) bind$inet(r3, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) setsockopt$inet_int(r4, 0x0, 0x3, &(0x7f0000000140)=0x7ff, 0x4) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, &(0x7f0000000000)=0x80, 0x4) splice(r1, 0x0, r3, 0x0, 0x10005, 0x0) [ 356.908916][ T9201] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.5'. 22:14:13 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1d") pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="d6ac7d3f595131008901"], 0xa) close(r3) socket(0x10, 0x3, 0x0) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000180)="580000001400192340834b80040d8c560a", 0x11}], 0x1) writev(r2, &(0x7f0000000600)=[{&(0x7f0000000380)="f98ac693ce6908", 0x7}], 0x1) accept4$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0x14, 0x0) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r1, 0x0, r3, 0x0, 0x80000001, 0x0) [ 357.001901][ T9177] 8021q: adding VLAN 0 to HW filter on device bond0 [ 357.037017][ T9177] 8021q: adding VLAN 0 to HW filter on device team0 22:14:13 executing program 5: llistxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=""/229, 0xe5) r0 = socket(0x1e, 0x4, 0x0) r1 = socket(0x1e, 0x2, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000000)=@req3={0x1, 0xfffffff9, 0x0, 0x80000000, 0x1, 0x35}, 0x18c) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x2}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20480, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f0000000a40), 0x8000000000000b0, 0x101d0) r2 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r2, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) r3 = dup2(r0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x0) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) r5 = syz_open_dev$dmmidi(&(0x7f0000000380)='/dev/dmmidi#\x00', 0x1e88, 0x40000) accept4$tipc(r5, &(0x7f00000003c0)=@name, &(0x7f0000000400)=0x10, 0x800) fstat(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f00000001c0)='./file0\x00', r4, r6) r7 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r7, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$IMSETDEVNAME(r7, 0x80184947, &(0x7f0000000180)={0x2, 'syz1\x00'}) [ 357.072452][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 357.080402][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 357.131494][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 357.140363][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 357.157524][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 357.164653][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state 22:14:13 executing program 4 (fault-call:2 fault-nth:1): creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)='\x00|\f\xbb\xd4\x1aF\x00t\x15\r\x06\xf2\x9a^\xc8\xca\xc8\x1bz\xa7\'\xa9\x8f\x7f\xe1\xb3Y\x016\x16\xf7\xabq9\xc9\x93N\"\xafG\x0e\x8c\x9e>\xba9\xf3\xc6l1\xee1<\xdd0\x99\x18\xc5\xe2<\xcc56\xa4-\xf6i\xe1\x9aNQ(\xb0ek}\xa2\xa2O6\xc5k\xa3F\xf9\xf7b\x1d\xdc\xa4*\xf7', 0x0, 0x0) [ 357.198757][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 357.223016][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready 22:14:13 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) r2 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r2, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) accept4$x25(0xffffffffffffffff, 0x0, &(0x7f0000000100), 0xc0000) listen(r0, 0xbb) accept4$inet6(r1, 0x0, 0x0, 0x80000) r3 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r3, 0x84, 0x65, &(0x7f00000000c0)=[@in={0x2, 0x4e21, @initdev={0xac, 0x1e, 0x0, 0x0}}], 0x10) connect$inet(r0, &(0x7f0000000040)={0x2, 0x400002, @loopback}, 0x10) [ 357.257345][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 357.264479][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 357.310336][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 357.324403][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 357.385932][ T7952] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 357.394753][ T7952] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 357.427602][ T7952] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 357.452123][ T9229] FAULT_INJECTION: forcing a failure. [ 357.452123][ T9229] name failslab, interval 1, probability 0, space 0, times 0 [ 357.452601][ T7952] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 357.486902][ T7952] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 357.500927][ T7952] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 357.510747][ T7952] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 357.521397][ T9229] CPU: 1 PID: 9229 Comm: syz-executor.4 Not tainted 5.4.0-rc6+ #0 [ 357.527305][ T9177] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 357.529219][ T9229] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 357.529225][ T9229] Call Trace: [ 357.529256][ T9229] dump_stack+0xf5/0x159 [ 357.529429][ T9229] should_fail.cold+0xa/0x1a [ 357.529464][ T9229] __should_failslab+0xee/0x130 [ 357.546806][ T9177] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 357.549873][ T9229] should_failslab+0x9/0x14 [ 357.572813][ T9177] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 357.574034][ T9229] kmem_cache_alloc+0x29/0x5d0 [ 357.590030][ T9229] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 357.596323][ T9229] ? should_fail+0xd4/0x45d [ 357.600837][ T9229] getname_flags+0x91/0x380 [ 357.605356][ T9229] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 357.611612][ T9229] user_path_at_empty+0x38/0x70 [ 357.616480][ T9229] do_mount+0xc8/0x1560 [ 357.620665][ T9229] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 357.627027][ T9229] ? copy_mount_options+0x200/0x2a0 [ 357.632232][ T9229] ksys_mount+0xe8/0x160 [ 357.636481][ T9229] __x64_sys_mount+0x70/0x90 [ 357.641084][ T9229] do_syscall_64+0xcc/0x370 [ 357.645645][ T9229] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 357.651550][ T9229] RIP: 0033:0x45a219 [ 357.655526][ T9229] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 357.675145][ T9229] RSP: 002b:00007f5405f3ac78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 357.683565][ T9229] RAX: ffffffffffffffda RBX: 00007f5405f3ac90 RCX: 000000000045a219 [ 357.691529][ T9229] RDX: 0000000020000540 RSI: 0000000020000140 RDI: 0000000000000000 [ 357.699524][ T9229] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 357.707490][ T9229] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f5405f3b6d4 [ 357.715466][ T9229] R13: 00000000004c6db2 R14: 00000000004dc528 R15: 0000000000000004 [ 357.725662][ T8029] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 357.742943][ T8029] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 357.752114][ T8029] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 357.760407][ T8029] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 357.768324][ T8029] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 357.972489][ T9242] fuse: Bad value for 'fd' 22:14:14 executing program 1: bpf$MAP_CREATE(0x0, 0x0, 0x0) accept4$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x0, 0x0, @mcast2}, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgid() ioctl$TIOCGSERIAL(0xffffffffffffffff, 0x541e, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) prctl$PR_SET_SPECULATION_CTRL(0x35, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) sendto$inet6(r0, &(0x7f0000000500)="ce03110075000100ff901efc67195c22cc6dc37916237d8599b512eceb92bd30961166bf00000000070000e19b40b4288ba4e852e8876e977ac94186835a03d045871d6fe30032b46ec4b52a4245f456142304a7821d1c6c8689f4ac12c50cc25534655ee7b237c7a5ba6dcc956757bf80f7146faaefba7f62928a83b54c10bd50c4ea9709367ee58afd37f6f9a0a92decda7d3e5dabe32ba34964ae3278f4c1c443f92eb36c74609cc828c5e2", 0xad, 0x0, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) keyctl$read(0xb, 0x0, &(0x7f00000004c0)=""/8, 0x8) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r1, 0x0) write$P9_RWALK(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="b0"], 0x1) perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) timerfd_create(0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) ioctl$EVIOCSKEYCODE(0xffffffffffffffff, 0x80104592, &(0x7f0000000100)=[0x6, 0x8001]) getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x23, &(0x7f0000000040), &(0x7f00000002c0)=0x4) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x2000) socket$inet6(0x10, 0x2, 0x0) r3 = socket$caif_stream(0x25, 0x1, 0x5) close(r3) 22:14:14 executing program 5: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100001c9, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='attr/current\x00') r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r1, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r1, 0x40045532, &(0x7f0000000000)=0x39) perf_event_open(&(0x7f000001d000)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4}, 0x248}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000480), 0x10000000000001e2, 0x0) 22:14:14 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b") pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) write$binfmt_elf32(r2, &(0x7f00000007c0)=ANY=[@ANYBLOB="955a000004000000a423107d0b6e5fbdf500dfff"], 0x14) r4 = socket$inet(0x2, 0x3, 0x7f) bind$inet(r3, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) setsockopt$inet_int(r4, 0x0, 0x3, &(0x7f0000000140)=0x7ff, 0x4) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, &(0x7f0000000000)=0x80, 0x4) splice(r1, 0x0, r3, 0x0, 0x10005, 0x0) 22:14:14 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b") pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="d6ac7d3f595131008901"], 0xa) close(r3) socket(0x10, 0x3, 0x0) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000180)="580000001400192340834b80040d8c560a", 0x11}], 0x1) writev(r2, &(0x7f0000000600)=[{&(0x7f0000000380)="f98ac693ce6908", 0x7}], 0x1) accept4$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0x14, 0x0) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r1, 0x0, r3, 0x0, 0x80000001, 0x0) 22:14:14 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8937, &(0x7f0000000100)={'veth0\x00\x00\x00\x00\x00\x00\x00\xfe\xff\xff\xff', @ifru_settings={0x10001, 0x0, @fr=0x0}}) r3 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x105082) r4 = memfd_create(&(0x7f0000000080)='\xfaIhFlK\x99F\x17\x16\xa5>\xd3\xc0\x93\xb5.\xda\x06_bT\x1cB\xdb\xf8y1\xe7,\x03\x98h\x86(\xa0m\x87+x\x14i\x88\xcd\x89\x81\xfb\x86', 0x0) pwritev(r4, &(0x7f0000f50f90), 0x0, 0x4081003) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) fallocate(r3, 0x11, 0x0, 0x100000001) 22:14:14 executing program 4: creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)='\x00|\f\xbb\xd4\x1aF\x00t\x15\r\x06\xf2\x9a^\xc8\xca\xc8\x1bz\xa7\'\xa9\x8f\x7f\xe1\xb3Y\x016\x16\xf7\xabq9\xc9\x93N\"\xafG\x0e\x8c\x9e>\xba9\xf3\xc6l1\xee1<\xdd0\x99\x18\xc5\xe2<\xcc56\xa4-\xf6i\xe1\x9aNQ(\xb0ek}\xa2\xa2O6\xc5k\xa3F\xf9\xf7b\x1d\xdc\xa4*\xf7', 0x0, 0x0) 22:14:14 executing program 4: creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)='\x02|\f\xbb\xd4\x1aF\x00t\x15\r\x06\xf2\x9a^\xc8\xca\xc8\x1bz\xa7\'\xa9\x8f\x7f\xe1\xb3Y\x016\x16\xf7\xabq9\xc9\x93N\"\xafG\x0e\x8c\x9e>\xba9\xf3\xc6l1\xee1<\xdd0\x99\x18\xc5\xe2<\xcc56\xa4-\xf6i\xe1\x9aNQ(\xb0ek}\xa2\xa2O6\xc5k\xa3F\xf9\xf7b\x1d\xdc\xa4*\xf7', 0x0, 0x0) 22:14:14 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1100}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, 0xffffffffffffffff) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000003c0)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) sync() getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) preadv(r1, &(0x7f0000000200)=[{&(0x7f0000000140)=""/12, 0xc}, {&(0x7f0000000180)=""/58, 0x7fffeff4}], 0x2, 0xfffbc000) readv(0xffffffffffffffff, &(0x7f0000000400), 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000380)=0xffffffffffffffff, 0x4) 22:14:14 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b") pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) write$binfmt_elf32(r2, &(0x7f00000007c0)=ANY=[@ANYBLOB="955a000004000000a423107d0b6e5fbdf500dfff"], 0x14) r4 = socket$inet(0x2, 0x3, 0x7f) bind$inet(r3, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) setsockopt$inet_int(r4, 0x0, 0x3, &(0x7f0000000140)=0x7ff, 0x4) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, &(0x7f0000000000)=0x80, 0x4) splice(r1, 0x0, r3, 0x0, 0x10005, 0x0) 22:14:14 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b") pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="d6ac7d3f595131008901"], 0xa) close(r3) socket(0x10, 0x3, 0x0) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000180)="580000001400192340834b80040d8c560a", 0x11}], 0x1) writev(r2, &(0x7f0000000600)=[{&(0x7f0000000380)="f98ac693ce6908", 0x7}], 0x1) accept4$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0x14, 0x0) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r1, 0x0, r3, 0x0, 0x80000001, 0x0) 22:14:15 executing program 4: creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)='\x03|\f\xbb\xd4\x1aF\x00t\x15\r\x06\xf2\x9a^\xc8\xca\xc8\x1bz\xa7\'\xa9\x8f\x7f\xe1\xb3Y\x016\x16\xf7\xabq9\xc9\x93N\"\xafG\x0e\x8c\x9e>\xba9\xf3\xc6l1\xee1<\xdd0\x99\x18\xc5\xe2<\xcc56\xa4-\xf6i\xe1\x9aNQ(\xb0ek}\xa2\xa2O6\xc5k\xa3F\xf9\xf7b\x1d\xdc\xa4*\xf7', 0x0, 0x0) 22:14:15 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8937, &(0x7f0000000100)={'veth0\x00\x00\x00\x00\x00\x00\x00\xfe\xff\xff\xff', @ifru_settings={0x10001, 0x0, @fr=0x0}}) r3 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x105082) r4 = memfd_create(&(0x7f0000000080)='\xfaIhFlK\x99F\x17\x16\xa5>\xd3\xc0\x93\xb5.\xda\x06_bT\x1cB\xdb\xf8y1\xe7,\x03\x98h\x86(\xa0m\x87+x\x14i\x88\xcd\x89\x81\xfb\x86', 0x0) pwritev(r4, &(0x7f0000f50f90), 0x0, 0x4081003) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) fallocate(r3, 0x11, 0x0, 0x100000001) 22:14:15 executing program 1: bpf$MAP_CREATE(0x0, 0x0, 0x0) accept4$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x0, 0x0, @mcast2}, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgid() ioctl$TIOCGSERIAL(0xffffffffffffffff, 0x541e, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) prctl$PR_SET_SPECULATION_CTRL(0x35, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) sendto$inet6(r0, &(0x7f0000000500)="ce03110075000100ff901efc67195c22cc6dc37916237d8599b512eceb92bd30961166bf00000000070000e19b40b4288ba4e852e8876e977ac94186835a03d045871d6fe30032b46ec4b52a4245f456142304a7821d1c6c8689f4ac12c50cc25534655ee7b237c7a5ba6dcc956757bf80f7146faaefba7f62928a83b54c10bd50c4ea9709367ee58afd37f6f9a0a92decda7d3e5dabe32ba34964ae3278f4c1c443f92eb36c74609cc828c5e2", 0xad, 0x0, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) keyctl$read(0xb, 0x0, &(0x7f00000004c0)=""/8, 0x8) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r1, 0x0) write$P9_RWALK(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="b0"], 0x1) perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) timerfd_create(0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) ioctl$EVIOCSKEYCODE(0xffffffffffffffff, 0x80104592, &(0x7f0000000100)=[0x6, 0x8001]) getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x23, &(0x7f0000000040), &(0x7f00000002c0)=0x4) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x2000) socket$inet6(0x10, 0x2, 0x0) r3 = socket$caif_stream(0x25, 0x1, 0x5) close(r3) 22:14:15 executing program 4: creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)='\x04|\f\xbb\xd4\x1aF\x00t\x15\r\x06\xf2\x9a^\xc8\xca\xc8\x1bz\xa7\'\xa9\x8f\x7f\xe1\xb3Y\x016\x16\xf7\xabq9\xc9\x93N\"\xafG\x0e\x8c\x9e>\xba9\xf3\xc6l1\xee1<\xdd0\x99\x18\xc5\xe2<\xcc56\xa4-\xf6i\xe1\x9aNQ(\xb0ek}\xa2\xa2O6\xc5k\xa3F\xf9\xf7b\x1d\xdc\xa4*\xf7', 0x0, 0x0) 22:14:15 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1100}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, 0xffffffffffffffff) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000003c0)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) sync() getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) preadv(r1, &(0x7f0000000200)=[{&(0x7f0000000140)=""/12, 0xc}, {&(0x7f0000000180)=""/58, 0x7fffeff4}], 0x2, 0xfffbc000) readv(0xffffffffffffffff, &(0x7f0000000400), 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000380)=0xffffffffffffffff, 0x4) 22:14:15 executing program 4: creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)='\x05|\f\xbb\xd4\x1aF\x00t\x15\r\x06\xf2\x9a^\xc8\xca\xc8\x1bz\xa7\'\xa9\x8f\x7f\xe1\xb3Y\x016\x16\xf7\xabq9\xc9\x93N\"\xafG\x0e\x8c\x9e>\xba9\xf3\xc6l1\xee1<\xdd0\x99\x18\xc5\xe2<\xcc56\xa4-\xf6i\xe1\x9aNQ(\xb0ek}\xa2\xa2O6\xc5k\xa3F\xf9\xf7b\x1d\xdc\xa4*\xf7', 0x0, 0x0) 22:14:15 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b10") pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) write$binfmt_elf32(r2, &(0x7f00000007c0)=ANY=[@ANYBLOB="955a000004000000a423107d0b6e5fbdf500dfff"], 0x14) r4 = socket$inet(0x2, 0x3, 0x7f) bind$inet(r3, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) setsockopt$inet_int(r4, 0x0, 0x3, &(0x7f0000000140)=0x7ff, 0x4) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, &(0x7f0000000000)=0x80, 0x4) splice(r1, 0x0, r3, 0x0, 0x10005, 0x0) 22:14:15 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b") pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="d6ac7d3f595131008901"], 0xa) close(r3) socket(0x10, 0x3, 0x0) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000180)="580000001400192340834b80040d8c560a", 0x11}], 0x1) writev(r2, &(0x7f0000000600)=[{&(0x7f0000000380)="f98ac693ce6908", 0x7}], 0x1) accept4$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0x14, 0x0) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r1, 0x0, r3, 0x0, 0x80000001, 0x0) 22:14:15 executing program 1: bpf$MAP_CREATE(0x0, 0x0, 0x0) accept4$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x0, 0x0, @mcast2}, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgid() ioctl$TIOCGSERIAL(0xffffffffffffffff, 0x541e, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) prctl$PR_SET_SPECULATION_CTRL(0x35, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) sendto$inet6(r0, &(0x7f0000000500)="ce03110075000100ff901efc67195c22cc6dc37916237d8599b512eceb92bd30961166bf00000000070000e19b40b4288ba4e852e8876e977ac94186835a03d045871d6fe30032b46ec4b52a4245f456142304a7821d1c6c8689f4ac12c50cc25534655ee7b237c7a5ba6dcc956757bf80f7146faaefba7f62928a83b54c10bd50c4ea9709367ee58afd37f6f9a0a92decda7d3e5dabe32ba34964ae3278f4c1c443f92eb36c74609cc828c5e2", 0xad, 0x0, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) keyctl$read(0xb, 0x0, &(0x7f00000004c0)=""/8, 0x8) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r1, 0x0) write$P9_RWALK(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="b0"], 0x1) perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) timerfd_create(0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) ioctl$EVIOCSKEYCODE(0xffffffffffffffff, 0x80104592, &(0x7f0000000100)=[0x6, 0x8001]) getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x23, &(0x7f0000000040), &(0x7f00000002c0)=0x4) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x2000) socket$inet6(0x10, 0x2, 0x0) r3 = socket$caif_stream(0x25, 0x1, 0x5) close(r3) 22:14:15 executing program 0: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1100}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, 0xffffffffffffffff) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000003c0)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) sync() getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) preadv(r1, &(0x7f0000000200)=[{&(0x7f0000000140)=""/12, 0xc}, {&(0x7f0000000180)=""/58, 0x7fffeff4}], 0x2, 0xfffbc000) readv(0xffffffffffffffff, &(0x7f0000000400), 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000380)=0xffffffffffffffff, 0x4) 22:14:15 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b10") pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) write$binfmt_elf32(r2, &(0x7f00000007c0)=ANY=[@ANYBLOB="955a000004000000a423107d0b6e5fbdf500dfff"], 0x14) r4 = socket$inet(0x2, 0x3, 0x7f) bind$inet(r3, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) setsockopt$inet_int(r4, 0x0, 0x3, &(0x7f0000000140)=0x7ff, 0x4) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, &(0x7f0000000000)=0x80, 0x4) splice(r1, 0x0, r3, 0x0, 0x10005, 0x0) 22:14:15 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1100}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, 0xffffffffffffffff) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000003c0)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) sync() getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) preadv(r1, &(0x7f0000000200)=[{&(0x7f0000000140)=""/12, 0xc}, {&(0x7f0000000180)=""/58, 0x7fffeff4}], 0x2, 0xfffbc000) readv(0xffffffffffffffff, &(0x7f0000000400), 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000380)=0xffffffffffffffff, 0x4) 22:14:16 executing program 4: creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)='\x06|\f\xbb\xd4\x1aF\x00t\x15\r\x06\xf2\x9a^\xc8\xca\xc8\x1bz\xa7\'\xa9\x8f\x7f\xe1\xb3Y\x016\x16\xf7\xabq9\xc9\x93N\"\xafG\x0e\x8c\x9e>\xba9\xf3\xc6l1\xee1<\xdd0\x99\x18\xc5\xe2<\xcc56\xa4-\xf6i\xe1\x9aNQ(\xb0ek}\xa2\xa2O6\xc5k\xa3F\xf9\xf7b\x1d\xdc\xa4*\xf7', 0x0, 0x0) 22:14:16 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b10") pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="d6ac7d3f595131008901"], 0xa) close(r3) socket(0x10, 0x3, 0x0) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000180)="580000001400192340834b80040d8c560a", 0x11}], 0x1) writev(r2, &(0x7f0000000600)=[{&(0x7f0000000380)="f98ac693ce6908", 0x7}], 0x1) accept4$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0x14, 0x0) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r1, 0x0, r3, 0x0, 0x80000001, 0x0) [ 359.801967][ T28] device bridge_slave_1 left promiscuous mode [ 359.808208][ T28] bridge0: port 2(bridge_slave_1) entered disabled state 22:14:16 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b10") pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) write$binfmt_elf32(r2, &(0x7f00000007c0)=ANY=[@ANYBLOB="955a000004000000a423107d0b6e5fbdf500dfff"], 0x14) r4 = socket$inet(0x2, 0x3, 0x7f) bind$inet(r3, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) setsockopt$inet_int(r4, 0x0, 0x3, &(0x7f0000000140)=0x7ff, 0x4) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, &(0x7f0000000000)=0x80, 0x4) splice(r1, 0x0, r3, 0x0, 0x10005, 0x0) [ 359.902165][ T28] device bridge_slave_0 left promiscuous mode [ 359.912935][ T28] bridge0: port 1(bridge_slave_0) entered disabled state 22:14:16 executing program 4: creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)='\a|\f\xbb\xd4\x1aF\x00t\x15\r\x06\xf2\x9a^\xc8\xca\xc8\x1bz\xa7\'\xa9\x8f\x7f\xe1\xb3Y\x016\x16\xf7\xabq9\xc9\x93N\"\xafG\x0e\x8c\x9e>\xba9\xf3\xc6l1\xee1<\xdd0\x99\x18\xc5\xe2<\xcc56\xa4-\xf6i\xe1\x9aNQ(\xb0ek}\xa2\xa2O6\xc5k\xa3F\xf9\xf7b\x1d\xdc\xa4*\xf7', 0x0, 0x0) 22:14:16 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x40, 0x20000) ioctl$USBDEVFS_CLAIM_PORT(r1, 0x80045518, &(0x7f0000000040)=0x2) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) mmap(&(0x7f0000001000/0x2000)=nil, 0x2000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write(r2, &(0x7f0000001200)="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", 0xe00) 22:14:16 executing program 5: openat$ion(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ion\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) openat$cuse(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/cuse\x00', 0x2, 0x0) r0 = socket(0x200000000000011, 0x3, 0x0) ioctl$UI_SET_PHYS(r0, 0x4008556c, &(0x7f0000000000)='syz0\x00') openat$fuse(0xffffffffffffff9c, &(0x7f0000000380)='/dev/fuse\x00', 0x2, 0x0) bind$isdn(r0, &(0x7f00000003c0)={0x22, 0xfffffffffffffff9, 0x1, 0x10001, 0x8}, 0x6) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge_slave_1\x00', 0x0}) sendmmsg(0xffffffffffffffff, &(0x7f0000000c00)=[{{&(0x7f0000000400)=@generic={0xa, "181728392b4407748630e897271a6e33c6100f66ba818724730e0dc42d59c676ef8d8e5c39029cb6f425f02d34d5d3d9345fbe86db7a893389115e53e68ad4fdfbe4fc8b95b4870a13816b582cfc8de739d37e77c86c2206302f0656f3dd72dbf2ed73d0bacf6c6b19d08c74b20f5c0dbf4ab0dd0e48c484ed1009aed3aa"}, 0x80, &(0x7f0000000480)=[{&(0x7f0000000900)="355510faa3cf32f1dc8a12a8701281c2a74619b3bc7c9fd7ef776b2835120f8df5636f8643115fa730d337806418c3fca951605652d34650b46feec53f1937d3a011215e0c9b8307e6c587e0b6b7411234c4e700a9410e23868e5d34b6a707c0abf05f47405d48483d54f1d4e026ea4efeba4e0d428d75d169324aa696f96747a14c5dc3fcd1cb82508101596ba221167ffbdcc0de4e4a4b2ad9b068cbf9c32ad8f3c81b9bc7c224946f42caf2fe9d935aa261bd38f7aa2d9a9cedd85decb83b6868e295e0af691fdd3b720f9a27db693df0da2fc83130971e24c929c1fba165af506bd27f06a8a855e394132de05ac354607bbc803b", 0xf6}], 0x1}}, {{&(0x7f0000000a00)=@pptp={0x18, 0x2, {0x0, @dev={0xac, 0x14, 0x14, 0x1c}}}, 0x80, &(0x7f0000000b40)=[{&(0x7f0000000a80)="6a1b8a66d094ea3529e51e7336fe38ee515e095466e76b0709c7f748604a96e361e98c31c567c6e63c7e430ef4cb143301ea552e46aceab9635065fecebf0098daac522e3de6086aea3727c6e6f05a5d531501136c8910909dd0936b25d28cfa1b08bfaf217ccf14eb80cb2dba1554ec7ddfb7cf9784409eed8e1f05fd8cfb4f8adacea25f6cc662b8f200d34ce7e89739f836aa27117570200b6753fce56d4e93a5219894c86545737ba89a7c6a16f87e2ea51bc39c2d2af6", 0xb9}, {&(0x7f0000000c80)="eb21cf4b113d0af6d8edd1df5a1494c9dcf81ac8be3993fdefd20a072030d78f458e146dd6afa90a03ba6fb7fc57fd32b0a62c462119730b3c3ac27486f6a966d35b0679bad11380cbaeb6f6b03eeedaa76ca081111b011d370c6dc92776776d179a0e60bbd5bb3c3c83d732a45b751a6e8172b030526b028b5ee4dff89ef3cb99fbc311230fc457b8d26b10026228e0b53a", 0x92}], 0x2}}], 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x800, 0x10100) ioctl$TIOCGICOUNT(r2, 0x545d, 0x0) r3 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000100)={@local={0xfe, 0x80, [0x6c, 0x2, 0xd401, 0x0, 0x7, 0x0, 0x3fc, 0x0, 0x0, 0x0, 0x0, 0x6]}, 0x3b, r1}) r4 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r3, 0x6) r5 = syz_open_procfs(0x0, &(0x7f0000000600)='\x00\x00U\x00\xa3\x9f&0?\x8f\\\x01\x00\x00\x00\x00\xbf\x06\x8a\xa9\xcb3\xe1uf\xdc\x1a\x0e\b\x7f\xc7\x05$\xfdm\xd3y\xa0\xef\xe1\xb6\xe8\xb7 \xc2\x1bnY1\xb3\x8b9\xfb*y\xbe\x0f2\x13 U\xdc\x12\xbf\v/T\xfb%\t\xc9c\x9e\x9e\xe4?\xb1\xab\"\xc8\x15:&h\tZ[\x87\xd7\xaf\xaf6\xdf\xbd#\\\x14i\x1a\xfc\xbbA~\xf1\xe7\xb5\x87y\x1a\xda\xe5f\xd0\f\xd5x;\x00\x90\xcb\x8a\xe6\xdeJ\r\t\x9b\a\xae\xac+\xbc\xd6\xe5\xed\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00j,`\x8a\xf3\x85\n\x1d\xecVJ\\t\xe5;\x84\xd2\x036\f\x84]V\x9ew[\xbfb\xbe,\xa0\xb6\x82\x9b_=\x00\x00\x00\x00\x00\x00\x7f\xff\xc7J\xde\xbe\n\b9\xb2\x9b\t0\x17_7Q\xf6\xa9\xf3\xcd\x14\xab\'\x1e.\'>\x05\xcd,\x01w\xda\x94O\xe1\xe0t\xe0;\x9e\xe3\x9f\xe7\xc8\x81d\x19/5\x9b\x80\x9ei\xa3\x83\x85\xb6|\xe6S\xc1\'t\xb3\xdd\x1b\xa3m\xa3=\x1a:\xb6\xdf\xbd\x00X\xbf\xf7[,\xdd\x1dxa\x04\xcaD0\x00}|p\f\xc2kL\x18\xc9\xf5%\xe6\xc46\x1c\xb0>\xb5\x98\x01+N\xb4\x99b\x10\xa2\x12\xea\xf6[F3\xf5\xda\xcf\x8e\x84~\xe4E\xec\x84I\x85`!~\xa1\x0e\x8d\xbd\xcc\xd7\x9f\xe2\xb8s\xd8\xfa\x01_)\xc6\x7f\f\xc7L3\xd8\x03\xe1\\\x87\x05\x00\x00;!]\xff\xc1\x1f\xb4\xde\xfb=\xdf\x1b%\xd8\xd7\f\xa4\xed<\xeb\x1a\xa3\xd7\x89\x88BE\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf4\x18\nSZ\x1f\x06\x88\x9fHGo\xfe\x8c\x93\n\x9f\x9e/\x86\xe5zS\xbe\xea\xf3\x00C\x910To\xeegtEW\xab26\x11s,\x01\x10\xc7\xf65K\'\xf1b7\xffz\x17iA\x14\x97\xa5\xdb\x9c\xaeL*\x94n\v%\xcc\xb1v\x90\xc0\xb6\'\x91q9\x1c?$|\x8bch\xed\x87\xc3\xd57\a{\xb4\x00\x00\x00') ioctl$int_out(r5, 0x5460, &(0x7f0000001900)) ioctl$DRM_IOCTL_GET_STATS(r5, 0x80f86406, 0x0) setsockopt(r4, 0x10d, 0x800000000d, &(0x7f0000000300)="02967558447400ff04301d87d48e3883ef6623800c57f568d0dd35325b60184d9bca4154b890728601130f0365e6277e82cae68f2b96d71f2a2b34b492d1c0", 0x3f) connect$inet(r4, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) syz_open_dev$sndseq(&(0x7f0000000580)='/dev/snd/seq\x00', 0x0, 0x1400) openat$uhid(0xffffffffffffff9c, &(0x7f0000000040)='\xfe\x00\x00\x00\b\x00', 0x2, 0x0) dup3(r4, 0xffffffffffffffff, 0x0) accept(r3, 0x0, &(0x7f0000000080)=0x10058) bind$bt_rfcomm(r0, &(0x7f0000000340)={0x1f, {0x8d95, 0x80000000, 0x84, 0x9, 0x6, 0x175a}, 0x1}, 0xa) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000180)={0x0, 0x8}, &(0x7f00000001c0)=0x8) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000200)={r6, 0x40}, &(0x7f0000000240)=0x8) sendmmsg(r4, &(0x7f0000005700)=[{{&(0x7f0000003900)=@hci={0x1f, r1}, 0x80, &(0x7f0000000500)=[{0x0}, {&(0x7f0000000780)="0f8de6669ba9e6ee2e83bff9d261899bb647ca4787aa105bd2e9b35c0663c7e556e25f7b584c7916398cccb30d721747816fb152b163a79d46502ffe9793c24c5ede953501adc585db87a2cc7964d446aa12b5e4a2dd783f42a6ac6a564e441b0f97b5c46c35f8cc3c3c332b9bf088cb8acfce78400eb3d139ec6d5c1d1d711b505a4287f80b4b44bc47c6ef01a1f9a91c51c5f0afb271e2ddcfe9b427dcd9d5b266795a933c29e01a1fd691e64cf41c2604125613d7118682682beb", 0xbc}, {&(0x7f0000000840)="0f2cd78559fae92f93589037ac1c4dcfd1518f629dcaf4d5e1b6ca91a07a2c1d1878b4dbd4fb3801dda1e671ff8244ff9d3df4c8e2e9cbe253b406ff7c9e40b3176625df976ac2b52546954d9167357a2ea71dbb91c1435d189170e04ff510a9c52feeb2356983f58a1fed974d3062342d98d3ce0fd6b38fe12315632dee4b9de64e529c42b98f6b8127d9966cbcecf426", 0x91}, {&(0x7f0000000280)="4e8290accf6bef9a0bfbfe1563799deddb4ad2b6c3946be8ea555e0c9831b59b4adf4c12eff86bef0d0b81d78ef529271b48963b54dbb2490fd2f29c9fc5", 0x3e}, {0x0}], 0x5}}], 0x1, 0x0) 22:14:16 executing program 4: creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)='\x00|:\xbb\xd4\x1aF\x00t\x15\r\x06\xf2\x9a^\xc8\xca\xc8\x1bz\xa7\'\xa9\x8f\x7f\xe1\xb3Y\x016\x16\xf7\xabq9\xc9\x93N\"\xafG\x0e\x8c\x9e>\xba9\xf3\xc6l1\xee1<\xdd0\x99\x18\xc5\xe2<\xcc56\xa4-\xf6i\xe1\x9aNQ(\xb0ek}\xa2\xa2O6\xc5k\xa3F\xf9\xf7b\x1d\xdc\xa4*\xf7', 0x0, 0x0) 22:14:17 executing program 4: creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)='\x00|]\xbb\xd4\x1aF\x00t\x15\r\x06\xf2\x9a^\xc8\xca\xc8\x1bz\xa7\'\xa9\x8f\x7f\xe1\xb3Y\x016\x16\xf7\xabq9\xc9\x93N\"\xafG\x0e\x8c\x9e>\xba9\xf3\xc6l1\xee1<\xdd0\x99\x18\xc5\xe2<\xcc56\xa4-\xf6i\xe1\x9aNQ(\xb0ek}\xa2\xa2O6\xc5k\xa3F\xf9\xf7b\x1d\xdc\xa4*\xf7', 0x0, 0x0) [ 361.167066][ T9370] dccp_close: ABORT with 395 bytes unread [ 361.481468][ T28] device hsr_slave_0 left promiscuous mode [ 361.521402][ T28] device hsr_slave_1 left promiscuous mode [ 361.568148][ T28] team0 (unregistering): Port device team_slave_1 removed [ 361.579096][ T28] team0 (unregistering): Port device team_slave_0 removed [ 361.589458][ T28] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 361.635416][ T28] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 361.717112][ T28] bond0 (unregistering): Released all slaves [ 362.089103][ T9400] IPVS: ftp: loaded support on port[0] = 21 [ 362.163869][ T9400] chnl_net:caif_netlink_parms(): no params data found [ 362.195313][ T9400] bridge0: port 1(bridge_slave_0) entered blocking state [ 362.202519][ T9400] bridge0: port 1(bridge_slave_0) entered disabled state [ 362.210393][ T9400] device bridge_slave_0 entered promiscuous mode [ 362.218008][ T9400] bridge0: port 2(bridge_slave_1) entered blocking state [ 362.225217][ T9400] bridge0: port 2(bridge_slave_1) entered disabled state [ 362.233692][ T9400] device bridge_slave_1 entered promiscuous mode [ 362.252542][ T9400] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 362.263336][ T9400] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 362.283751][ T9400] team0: Port device team_slave_0 added [ 362.290678][ T9400] team0: Port device team_slave_1 added [ 362.373916][ T9400] device hsr_slave_0 entered promiscuous mode [ 362.411687][ T9400] device hsr_slave_1 entered promiscuous mode [ 362.461387][ T9400] debugfs: Directory 'hsr0' with parent '/' already present! [ 362.484155][ T9400] bridge0: port 2(bridge_slave_1) entered blocking state [ 362.491228][ T9400] bridge0: port 2(bridge_slave_1) entered forwarding state [ 362.498684][ T9400] bridge0: port 1(bridge_slave_0) entered blocking state [ 362.505728][ T9400] bridge0: port 1(bridge_slave_0) entered forwarding state [ 362.562190][ T9400] 8021q: adding VLAN 0 to HW filter on device bond0 [ 362.574743][ T8070] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 362.583106][ T8070] bridge0: port 1(bridge_slave_0) entered disabled state [ 362.590898][ T8070] bridge0: port 2(bridge_slave_1) entered disabled state [ 362.604784][ T9400] 8021q: adding VLAN 0 to HW filter on device team0 [ 362.616078][ T8070] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 362.624807][ T8070] bridge0: port 1(bridge_slave_0) entered blocking state [ 362.631863][ T8070] bridge0: port 1(bridge_slave_0) entered forwarding state [ 362.647780][ T7980] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 362.657927][ T7980] bridge0: port 2(bridge_slave_1) entered blocking state [ 362.665069][ T7980] bridge0: port 2(bridge_slave_1) entered forwarding state [ 362.698889][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 362.708129][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 362.719275][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 362.730407][ T8070] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 362.741634][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 362.752163][ T9400] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 362.766627][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 362.774201][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 362.789959][ T9400] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 362.949598][ T9408] fuse: Bad value for 'fd' 22:14:19 executing program 1: bpf$MAP_CREATE(0x0, 0x0, 0x0) accept4$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x0, 0x0, @mcast2}, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgid() ioctl$TIOCGSERIAL(0xffffffffffffffff, 0x541e, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) prctl$PR_SET_SPECULATION_CTRL(0x35, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) sendto$inet6(r0, &(0x7f0000000500)="ce03110075000100ff901efc67195c22cc6dc37916237d8599b512eceb92bd30961166bf00000000070000e19b40b4288ba4e852e8876e977ac94186835a03d045871d6fe30032b46ec4b52a4245f456142304a7821d1c6c8689f4ac12c50cc25534655ee7b237c7a5ba6dcc956757bf80f7146faaefba7f62928a83b54c10bd50c4ea9709367ee58afd37f6f9a0a92decda7d3e5dabe32ba34964ae3278f4c1c443f92eb36c74609cc828c5e2", 0xad, 0x0, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) keyctl$read(0xb, 0x0, &(0x7f00000004c0)=""/8, 0x8) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r1, 0x0) write$P9_RWALK(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="b0"], 0x1) perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) timerfd_create(0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) ioctl$EVIOCSKEYCODE(0xffffffffffffffff, 0x80104592, &(0x7f0000000100)=[0x6, 0x8001]) getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x23, &(0x7f0000000040), &(0x7f00000002c0)=0x4) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x2000) sendmsg(0xffffffffffffffff, 0x0, 0x0) r3 = socket$caif_stream(0x25, 0x1, 0x5) close(r3) 22:14:19 executing program 4: creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)='\x00|\f\xbb\xd4\aF\x00t\x15\r\x06\xf2\x9a^\xc8\xca\xc8\x1bz\xa7\'\xa9\x8f\x7f\xe1\xb3Y\x016\x16\xf7\xabq9\xc9\x93N\"\xafG\x0e\x8c\x9e>\xba9\xf3\xc6l1\xee1<\xdd0\x99\x18\xc5\xe2<\xcc56\xa4-\xf6i\xe1\x9aNQ(\xb0ek}\xa2\xa2O6\xc5k\xa3F\xf9\xf7b\x1d\xdc\xa4*\xf7', 0x0, 0x0) 22:14:19 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") pipe(0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) write$binfmt_elf32(0xffffffffffffffff, &(0x7f00000007c0)=ANY=[@ANYBLOB="955a000004000000a423107d0b6e5fbdf500dfff"], 0x14) r2 = socket$inet(0x2, 0x3, 0x7f) bind$inet(r1, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) setsockopt$inet_int(r2, 0x0, 0x3, &(0x7f0000000140)=0x7ff, 0x4) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000000)=0x80, 0x4) splice(0xffffffffffffffff, 0x0, r1, 0x0, 0x10005, 0x0) 22:14:19 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b10") pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="d6ac7d3f595131008901"], 0xa) close(r3) socket(0x10, 0x3, 0x0) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000180)="580000001400192340834b80040d8c560a", 0x11}], 0x1) writev(r2, &(0x7f0000000600)=[{&(0x7f0000000380)="f98ac693ce6908", 0x7}], 0x1) accept4$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0x14, 0x0) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r1, 0x0, r3, 0x0, 0x80000001, 0x0) 22:14:19 executing program 5: openat$ion(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ion\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) openat$cuse(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/cuse\x00', 0x2, 0x0) r0 = socket(0x200000000000011, 0x3, 0x0) ioctl$UI_SET_PHYS(r0, 0x4008556c, &(0x7f0000000000)='syz0\x00') openat$fuse(0xffffffffffffff9c, &(0x7f0000000380)='/dev/fuse\x00', 0x2, 0x0) bind$isdn(r0, &(0x7f00000003c0)={0x22, 0xfffffffffffffff9, 0x1, 0x10001, 0x8}, 0x6) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge_slave_1\x00', 0x0}) sendmmsg(0xffffffffffffffff, &(0x7f0000000c00)=[{{&(0x7f0000000400)=@generic={0xa, "181728392b4407748630e897271a6e33c6100f66ba818724730e0dc42d59c676ef8d8e5c39029cb6f425f02d34d5d3d9345fbe86db7a893389115e53e68ad4fdfbe4fc8b95b4870a13816b582cfc8de739d37e77c86c2206302f0656f3dd72dbf2ed73d0bacf6c6b19d08c74b20f5c0dbf4ab0dd0e48c484ed1009aed3aa"}, 0x80, &(0x7f0000000480)=[{&(0x7f0000000900)="355510faa3cf32f1dc8a12a8701281c2a74619b3bc7c9fd7ef776b2835120f8df5636f8643115fa730d337806418c3fca951605652d34650b46feec53f1937d3a011215e0c9b8307e6c587e0b6b7411234c4e700a9410e23868e5d34b6a707c0abf05f47405d48483d54f1d4e026ea4efeba4e0d428d75d169324aa696f96747a14c5dc3fcd1cb82508101596ba221167ffbdcc0de4e4a4b2ad9b068cbf9c32ad8f3c81b9bc7c224946f42caf2fe9d935aa261bd38f7aa2d9a9cedd85decb83b6868e295e0af691fdd3b720f9a27db693df0da2fc83130971e24c929c1fba165af506bd27f06a8a855e394132de05ac354607bbc803b", 0xf6}], 0x1}}, {{&(0x7f0000000a00)=@pptp={0x18, 0x2, {0x0, @dev={0xac, 0x14, 0x14, 0x1c}}}, 0x80, &(0x7f0000000b40)=[{&(0x7f0000000a80)="6a1b8a66d094ea3529e51e7336fe38ee515e095466e76b0709c7f748604a96e361e98c31c567c6e63c7e430ef4cb143301ea552e46aceab9635065fecebf0098daac522e3de6086aea3727c6e6f05a5d531501136c8910909dd0936b25d28cfa1b08bfaf217ccf14eb80cb2dba1554ec7ddfb7cf9784409eed8e1f05fd8cfb4f8adacea25f6cc662b8f200d34ce7e89739f836aa27117570200b6753fce56d4e93a5219894c86545737ba89a7c6a16f87e2ea51bc39c2d2af6", 0xb9}, {&(0x7f0000000c80)="eb21cf4b113d0af6d8edd1df5a1494c9dcf81ac8be3993fdefd20a072030d78f458e146dd6afa90a03ba6fb7fc57fd32b0a62c462119730b3c3ac27486f6a966d35b0679bad11380cbaeb6f6b03eeedaa76ca081111b011d370c6dc92776776d179a0e60bbd5bb3c3c83d732a45b751a6e8172b030526b028b5ee4dff89ef3cb99fbc311230fc457b8d26b10026228e0b53a", 0x92}], 0x2}}], 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x800, 0x10100) ioctl$TIOCGICOUNT(r2, 0x545d, 0x0) r3 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000100)={@local={0xfe, 0x80, [0x6c, 0x2, 0xd401, 0x0, 0x7, 0x0, 0x3fc, 0x0, 0x0, 0x0, 0x0, 0x6]}, 0x3b, r1}) r4 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r3, 0x6) r5 = syz_open_procfs(0x0, &(0x7f0000000600)='\x00\x00U\x00\xa3\x9f&0?\x8f\\\x01\x00\x00\x00\x00\xbf\x06\x8a\xa9\xcb3\xe1uf\xdc\x1a\x0e\b\x7f\xc7\x05$\xfdm\xd3y\xa0\xef\xe1\xb6\xe8\xb7 \xc2\x1bnY1\xb3\x8b9\xfb*y\xbe\x0f2\x13 U\xdc\x12\xbf\v/T\xfb%\t\xc9c\x9e\x9e\xe4?\xb1\xab\"\xc8\x15:&h\tZ[\x87\xd7\xaf\xaf6\xdf\xbd#\\\x14i\x1a\xfc\xbbA~\xf1\xe7\xb5\x87y\x1a\xda\xe5f\xd0\f\xd5x;\x00\x90\xcb\x8a\xe6\xdeJ\r\t\x9b\a\xae\xac+\xbc\xd6\xe5\xed\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00j,`\x8a\xf3\x85\n\x1d\xecVJ\\t\xe5;\x84\xd2\x036\f\x84]V\x9ew[\xbfb\xbe,\xa0\xb6\x82\x9b_=\x00\x00\x00\x00\x00\x00\x7f\xff\xc7J\xde\xbe\n\b9\xb2\x9b\t0\x17_7Q\xf6\xa9\xf3\xcd\x14\xab\'\x1e.\'>\x05\xcd,\x01w\xda\x94O\xe1\xe0t\xe0;\x9e\xe3\x9f\xe7\xc8\x81d\x19/5\x9b\x80\x9ei\xa3\x83\x85\xb6|\xe6S\xc1\'t\xb3\xdd\x1b\xa3m\xa3=\x1a:\xb6\xdf\xbd\x00X\xbf\xf7[,\xdd\x1dxa\x04\xcaD0\x00}|p\f\xc2kL\x18\xc9\xf5%\xe6\xc46\x1c\xb0>\xb5\x98\x01+N\xb4\x99b\x10\xa2\x12\xea\xf6[F3\xf5\xda\xcf\x8e\x84~\xe4E\xec\x84I\x85`!~\xa1\x0e\x8d\xbd\xcc\xd7\x9f\xe2\xb8s\xd8\xfa\x01_)\xc6\x7f\f\xc7L3\xd8\x03\xe1\\\x87\x05\x00\x00;!]\xff\xc1\x1f\xb4\xde\xfb=\xdf\x1b%\xd8\xd7\f\xa4\xed<\xeb\x1a\xa3\xd7\x89\x88BE\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf4\x18\nSZ\x1f\x06\x88\x9fHGo\xfe\x8c\x93\n\x9f\x9e/\x86\xe5zS\xbe\xea\xf3\x00C\x910To\xeegtEW\xab26\x11s,\x01\x10\xc7\xf65K\'\xf1b7\xffz\x17iA\x14\x97\xa5\xdb\x9c\xaeL*\x94n\v%\xcc\xb1v\x90\xc0\xb6\'\x91q9\x1c?$|\x8bch\xed\x87\xc3\xd57\a{\xb4\x00\x00\x00') ioctl$int_out(r5, 0x5460, &(0x7f0000001900)) ioctl$DRM_IOCTL_GET_STATS(r5, 0x80f86406, 0x0) setsockopt(r4, 0x10d, 0x800000000d, &(0x7f0000000300)="02967558447400ff04301d87d48e3883ef6623800c57f568d0dd35325b60184d9bca4154b890728601130f0365e6277e82cae68f2b96d71f2a2b34b492d1c0", 0x3f) connect$inet(r4, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) syz_open_dev$sndseq(&(0x7f0000000580)='/dev/snd/seq\x00', 0x0, 0x1400) openat$uhid(0xffffffffffffff9c, &(0x7f0000000040)='\xfe\x00\x00\x00\b\x00', 0x2, 0x0) dup3(r4, 0xffffffffffffffff, 0x0) accept(r3, 0x0, &(0x7f0000000080)=0x10058) bind$bt_rfcomm(r0, &(0x7f0000000340)={0x1f, {0x8d95, 0x80000000, 0x84, 0x9, 0x6, 0x175a}, 0x1}, 0xa) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000180)={0x0, 0x8}, &(0x7f00000001c0)=0x8) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000200)={r6, 0x40}, &(0x7f0000000240)=0x8) sendmmsg(r4, &(0x7f0000005700)=[{{&(0x7f0000003900)=@hci={0x1f, r1}, 0x80, &(0x7f0000000500)=[{0x0}, {&(0x7f0000000780)="0f8de6669ba9e6ee2e83bff9d261899bb647ca4787aa105bd2e9b35c0663c7e556e25f7b584c7916398cccb30d721747816fb152b163a79d46502ffe9793c24c5ede953501adc585db87a2cc7964d446aa12b5e4a2dd783f42a6ac6a564e441b0f97b5c46c35f8cc3c3c332b9bf088cb8acfce78400eb3d139ec6d5c1d1d711b505a4287f80b4b44bc47c6ef01a1f9a91c51c5f0afb271e2ddcfe9b427dcd9d5b266795a933c29e01a1fd691e64cf41c2604125613d7118682682beb", 0xbc}, {&(0x7f0000000840)="0f2cd78559fae92f93589037ac1c4dcfd1518f629dcaf4d5e1b6ca91a07a2c1d1878b4dbd4fb3801dda1e671ff8244ff9d3df4c8e2e9cbe253b406ff7c9e40b3176625df976ac2b52546954d9167357a2ea71dbb91c1435d189170e04ff510a9c52feeb2356983f58a1fed974d3062342d98d3ce0fd6b38fe12315632dee4b9de64e529c42b98f6b8127d9966cbcecf426", 0x91}, {&(0x7f0000000280)="4e8290accf6bef9a0bfbfe1563799deddb4ad2b6c3946be8ea555e0c9831b59b4adf4c12eff86bef0d0b81d78ef529271b48963b54dbb2490fd2f29c9fc5", 0x3e}, {0x0}], 0x5}}], 0x1, 0x0) 22:14:19 executing program 0: accept4$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x0, 0x0, @empty}, &(0x7f0000000300)=0x1c, 0x0) prlimit64(0x0, 0xe, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x4000}, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x8937, 0x0) rmdir(&(0x7f0000000140)='./bus\x00') r5 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x1}, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r5, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x13000000, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) ioctl$sock_inet6_SIOCADDRT(r5, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @remote, @remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x42}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x3, 0x0) r6 = dup(0xffffffffffffffff) flock(0xffffffffffffffff, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0xd200, 0x521841) ioctl$EVIOCSREP(r7, 0x40084504, &(0x7f0000000000)=[0x0, 0x8000000]) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084504, &(0x7f0000000000)) syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0xc, 0x0) r8 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r8, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x10000, 0x0) r9 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/ubi_ctrl\x00', 0x181200, 0x0) ioctl$EVIOCSREP(r9, 0x40084504, &(0x7f0000000240)=[0x1, 0x33]) syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0xc, 0x0) r10 = syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0xc, 0x0) ioctl$EVIOCSREP(r10, 0x40084504, &(0x7f0000000000)) r11 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r11, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) syz_emit_ethernet(0x7, &(0x7f0000000640)=ANY=[@ANYPTR64=&(0x7f0000000a80)=ANY=[@ANYRES32=0x0, @ANYRES64=r7, @ANYRES16=r4, @ANYBLOB="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", @ANYRESHEX=r11, @ANYRESHEX, @ANYRES16=0x0], @ANYRESOCT=r2, @ANYBLOB="43f00e5fb882250c87507d7d023df352b7d2eb0f895a18395fa4021d7117db8ba019672f7c6a4c9b2d685e724265adf39b718a6d0996c6605b3a9a5511bdc8377a8cc0c9f28c22b42b0500000000000000037fe4f01724f47f2b251fe27b3c74400df69d24db1db299c9d6dfec18", @ANYRES16=r10, @ANYBLOB="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", @ANYBLOB="67911396bf1891d36f662252838bec0684a4a721021803589be33b1de671f87d63485938f56cc0849af5e6dddc145ba524debc0207c2963ef7b12702d582de5f04a8298574c81006fb9bf433ae8399d2d1c1aec0d73394aac813f3fa4699ad5e1d4fd783050bbe7c44d78cf778b1aafc2d4d64", @ANYRESDEC], 0x0) 22:14:19 executing program 4: creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)='\x00|\f\xbb\xd4:F\x00t\x15\r\x06\xf2\x9a^\xc8\xca\xc8\x1bz\xa7\'\xa9\x8f\x7f\xe1\xb3Y\x016\x16\xf7\xabq9\xc9\x93N\"\xafG\x0e\x8c\x9e>\xba9\xf3\xc6l1\xee1<\xdd0\x99\x18\xc5\xe2<\xcc56\xa4-\xf6i\xe1\x9aNQ(\xb0ek}\xa2\xa2O6\xc5k\xa3F\xf9\xf7b\x1d\xdc\xa4*\xf7', 0x0, 0x0) 22:14:19 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") pipe(0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) write$binfmt_elf32(0xffffffffffffffff, &(0x7f00000007c0)=ANY=[@ANYBLOB="955a000004000000a423107d0b6e5fbdf500dfff"], 0x14) r2 = socket$inet(0x2, 0x3, 0x7f) bind$inet(r1, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) setsockopt$inet_int(r2, 0x0, 0x3, &(0x7f0000000140)=0x7ff, 0x4) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000000)=0x80, 0x4) splice(0xffffffffffffffff, 0x0, r1, 0x0, 0x10005, 0x0) 22:14:19 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b10") pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="d6ac7d3f595131008901"], 0xa) close(r3) socket(0x10, 0x3, 0x0) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000180)="580000001400192340834b80040d8c560a", 0x11}], 0x1) writev(r2, &(0x7f0000000600)=[{&(0x7f0000000380)="f98ac693ce6908", 0x7}], 0x1) accept4$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0x14, 0x0) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r1, 0x0, r3, 0x0, 0x80000001, 0x0) [ 363.496252][ T9412] dccp_close: ABORT with 395 bytes unread 22:14:20 executing program 5: bpf$MAP_CREATE(0x0, 0x0, 0x0) accept4$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x0, 0x0, @mcast2}, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgid() ioctl$TIOCGSERIAL(0xffffffffffffffff, 0x541e, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) prctl$PR_SET_SPECULATION_CTRL(0x35, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) sendto$inet6(r0, &(0x7f0000000500)="ce03110075000100ff901efc67195c22cc6dc37916237d8599b512eceb92bd30961166bf00000000070000e19b40b4288ba4e852e8876e977ac94186835a03d045871d6fe30032b46ec4b52a4245f456142304a7821d1c6c8689f4ac12c50cc25534655ee7b237c7a5ba6dcc956757bf80f7146faaefba7f62928a83b54c10bd50c4ea9709367ee58afd37f6f9a0a92decda7d3e5dabe32ba34964ae3278f4c1c443f92eb36c74609cc828c5e2", 0xad, 0x0, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) keyctl$read(0xb, 0x0, &(0x7f00000004c0)=""/8, 0x8) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r1, 0x0) write$P9_RWALK(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="b0"], 0x1) perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) timerfd_create(0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) ioctl$EVIOCSKEYCODE(0xffffffffffffffff, 0x80104592, &(0x7f0000000100)=[0x6, 0x8001]) getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x23, &(0x7f0000000040), &(0x7f00000002c0)=0x4) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x2000) socket$inet6(0x10, 0x2, 0x0) r3 = socket$caif_stream(0x25, 0x1, 0x5) close(r3) 22:14:20 executing program 4: creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)='\x00|\f\xbb\xd4\x1aF\x00\\\x15\r\x06\xf2\x9a^\xc8\xca\xc8\x1bz\xa7\'\xa9\x8f\x7f\xe1\xb3Y\x016\x16\xf7\xabq9\xc9\x93N\"\xafG\x0e\x8c\x9e>\xba9\xf3\xc6l1\xee1<\xdd0\x99\x18\xc5\xe2<\xcc56\xa4-\xf6i\xe1\x9aNQ(\xb0ek}\xa2\xa2O6\xc5k\xa3F\xf9\xf7b\x1d\xdc\xa4*\xf7', 0x0, 0x0) 22:14:20 executing program 1: bpf$MAP_CREATE(0x0, 0x0, 0x0) accept4$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x0, 0x0, @mcast2}, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgid() ioctl$TIOCGSERIAL(0xffffffffffffffff, 0x541e, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) prctl$PR_SET_SPECULATION_CTRL(0x35, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) sendto$inet6(r0, &(0x7f0000000500)="ce03110075000100ff901efc67195c22cc6dc37916237d8599b512eceb92bd30961166bf00000000070000e19b40b4288ba4e852e8876e977ac94186835a03d045871d6fe30032b46ec4b52a4245f456142304a7821d1c6c8689f4ac12c50cc25534655ee7b237c7a5ba6dcc956757bf80f7146faaefba7f62928a83b54c10bd50c4ea9709367ee58afd37f6f9a0a92decda7d3e5dabe32ba34964ae3278f4c1c443f92eb36c74609cc828c5e2", 0xad, 0x0, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) keyctl$read(0xb, 0x0, &(0x7f00000004c0)=""/8, 0x8) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r1, 0x0) write$P9_RWALK(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="b0"], 0x1) perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) timerfd_create(0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) ioctl$EVIOCSKEYCODE(0xffffffffffffffff, 0x80104592, &(0x7f0000000100)=[0x6, 0x8001]) getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x23, &(0x7f0000000040), &(0x7f00000002c0)=0x4) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x2000) sendmsg(0xffffffffffffffff, 0x0, 0x0) r3 = socket$caif_stream(0x25, 0x1, 0x5) close(r3) [ 363.829487][ T9453] fuse: Bad value for 'fd' 22:14:20 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") pipe(0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) write$binfmt_elf32(0xffffffffffffffff, &(0x7f00000007c0)=ANY=[@ANYBLOB="955a000004000000a423107d0b6e5fbdf500dfff"], 0x14) r2 = socket$inet(0x2, 0x3, 0x7f) bind$inet(r1, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) setsockopt$inet_int(r2, 0x0, 0x3, &(0x7f0000000140)=0x7ff, 0x4) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000000)=0x80, 0x4) splice(0xffffffffffffffff, 0x0, r1, 0x0, 0x10005, 0x0) 22:14:20 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") pipe(0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) writev(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="d6ac7d3f595131008901"], 0xa) close(r1) socket(0x10, 0x3, 0x0) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000180)="580000001400192340834b80040d8c560a", 0x11}], 0x1) writev(0xffffffffffffffff, &(0x7f0000000600)=[{&(0x7f0000000380)="f98ac693ce6908", 0x7}], 0x1) accept4$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0x14, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0xfef0) splice(0xffffffffffffffff, 0x0, r1, 0x0, 0x80000001, 0x0) 22:14:20 executing program 1: bpf$MAP_CREATE(0x0, 0x0, 0x0) accept4$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x0, 0x0, @mcast2}, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgid() ioctl$TIOCGSERIAL(0xffffffffffffffff, 0x541e, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) prctl$PR_SET_SPECULATION_CTRL(0x35, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) sendto$inet6(r0, &(0x7f0000000500)="ce03110075000100ff901efc67195c22cc6dc37916237d8599b512eceb92bd30961166bf00000000070000e19b40b4288ba4e852e8876e977ac94186835a03d045871d6fe30032b46ec4b52a4245f456142304a7821d1c6c8689f4ac12c50cc25534655ee7b237c7a5ba6dcc956757bf80f7146faaefba7f62928a83b54c10bd50c4ea9709367ee58afd37f6f9a0a92decda7d3e5dabe32ba34964ae3278f4c1c443f92eb36c74609cc828c5e2", 0xad, 0x0, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) keyctl$read(0xb, 0x0, &(0x7f00000004c0)=""/8, 0x8) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r1, 0x0) write$P9_RWALK(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="b0"], 0x1) perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) timerfd_create(0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) ioctl$EVIOCSKEYCODE(0xffffffffffffffff, 0x80104592, &(0x7f0000000100)=[0x6, 0x8001]) getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x23, &(0x7f0000000040), &(0x7f00000002c0)=0x4) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x2000) sendmsg(0xffffffffffffffff, 0x0, 0x0) r3 = socket$caif_stream(0x25, 0x1, 0x5) close(r3) 22:14:20 executing program 4: creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)='\x00|\f\xbb\xd4\x1aF\x02t\x15\r\x06\xf2\x9a^\xc8\xca\xc8\x1bz\xa7\'\xa9\x8f\x7f\xe1\xb3Y\x016\x16\xf7\xabq9\xc9\x93N\"\xafG\x0e\x8c\x9e>\xba9\xf3\xc6l1\xee1<\xdd0\x99\x18\xc5\xe2<\xcc56\xa4-\xf6i\xe1\x9aNQ(\xb0ek}\xa2\xa2O6\xc5k\xa3F\xf9\xf7b\x1d\xdc\xa4*\xf7', 0x0, 0x0) 22:14:20 executing program 0: write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000380)=0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x2}, 0x2c097}, r1, 0xc000000000000000, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r2, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x9, 0x8, 0xc0, 0x1f, 0x0, 0x3, 0x2000, 0x7, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0xfffffffc, 0x6, @perf_bp={&(0x7f0000000000), 0x4}, 0x8033, 0x0, 0x401, 0x9, 0x80000001, 0x6, 0x8}, 0xffffffffffffffff, 0x10, r2, 0x9) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc77a4e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507d0419c09fc1fe6c"}, 0xa) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x320c1945ef1b2d44, 0x0) ioctl$PPPIOCSCOMPRESS(r3, 0x4010744d) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r5 = socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNSETVNETHDRSZ(r4, 0x400454d8, &(0x7f0000000440)=0xa7) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') write$cgroup_subtree(r4, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x90ad) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) close(0xffffffffffffffff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x1f0}, 0x0) 22:14:20 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(0xffffffffffffffff) write$binfmt_elf32(r2, &(0x7f00000007c0)=ANY=[@ANYBLOB="955a000004000000a423107d0b6e5fbdf500dfff"], 0x14) r4 = socket$inet(0x2, 0x3, 0x7f) bind$inet(r3, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) setsockopt$inet_int(r4, 0x0, 0x3, &(0x7f0000000140)=0x7ff, 0x4) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, &(0x7f0000000000)=0x80, 0x4) splice(r1, 0x0, r3, 0x0, 0x10005, 0x0) 22:14:20 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") pipe(0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) writev(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="d6ac7d3f595131008901"], 0xa) close(r1) socket(0x10, 0x3, 0x0) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000180)="580000001400192340834b80040d8c560a", 0x11}], 0x1) writev(0xffffffffffffffff, &(0x7f0000000600)=[{&(0x7f0000000380)="f98ac693ce6908", 0x7}], 0x1) accept4$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0x14, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0xfef0) splice(0xffffffffffffffff, 0x0, r1, 0x0, 0x80000001, 0x0) 22:14:20 executing program 5: r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f0000000080)=@ccm_128={{}, "b9821c79e7e112f5", "aa183fd7d073f33982f44c76fe0b0948", "149adfd2", "da09dc1392d90ff9"}, 0x28) openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0xd93cb94a01fc10ae, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f00000001c0)=0x0) perf_event_open(&(0x7f0000000100)={0x4, 0x70, 0x0, 0x20, 0x0, 0x6, 0x0, 0x69f, 0x0, 0x4, 0x20, 0xfffffffffffff264, 0xe87, 0x3ff, 0x8, 0xffff, 0xff, 0x8, 0x3, 0x2, 0x9, 0x1, 0xffffffffffffff71, 0x9, 0x641, 0x3f, 0xa, 0xffffffffffff6276, 0x0, 0xfffffffffffffff7, 0x0, 0xb89, 0x0, 0x56e, 0x9, 0x0, 0x0, 0x450, 0x0, 0x6, 0x62bead59d4d92efb, @perf_config_ext={0x400000000004, 0x7}, 0xd800, 0xd91, 0x1, 0xf, 0xffff, 0x23, 0x3}, r1, 0x9, r0, 0x2) ioctl$KVM_GET_FPU(0xffffffffffffffff, 0x81a0ae8c, &(0x7f0000000480)) r2 = syz_open_procfs(0x0, 0x0) setxattr$security_ima(0x0, 0x0, 0x0, 0x0, 0x0) close(0xffffffffffffffff) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r3, 0x4, 0x42000) fstatfs(r3, &(0x7f0000000080)=""/179) r4 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r4, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000380)={0x3, 0x70, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x4157, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x81, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_config_ext={0x4, 0x4000000000}, 0x10820, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, r4, 0x0) r5 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r5, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r6 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r5, 0x6) r7 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$IP6T_SO_GET_ENTRIES(r7, 0x29, 0x41, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)=0x120) time(0x0) ioctl$TIOCGSOFTCAR(0xffffffffffffffff, 0x5419, &(0x7f0000000040)) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x80000162) listxattr(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000640)=""/233, 0xe9) ioctl$KVM_XEN_HVM_CONFIG(0xffffffffffffffff, 0x4038ae7a, 0x0) ioctl$SNDRV_TIMER_IOCTL_PARAMS(0xffffffffffffffff, 0x40505412, 0x0) fgetxattr(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="74720051b77f0810403700"/26], &(0x7f0000000340)=""/36, 0x24) setsockopt(r6, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r6, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r8 = accept(r5, 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(r8, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000005700), 0x0, 0x0) 22:14:20 executing program 4: creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)='\x00|\f\xbb\xd4\x1aF\x03t\x15\r\x06\xf2\x9a^\xc8\xca\xc8\x1bz\xa7\'\xa9\x8f\x7f\xe1\xb3Y\x016\x16\xf7\xabq9\xc9\x93N\"\xafG\x0e\x8c\x9e>\xba9\xf3\xc6l1\xee1<\xdd0\x99\x18\xc5\xe2<\xcc56\xa4-\xf6i\xe1\x9aNQ(\xb0ek}\xa2\xa2O6\xc5k\xa3F\xf9\xf7b\x1d\xdc\xa4*\xf7', 0x0, 0x0) [ 364.666232][ T9488] device nr0 entered promiscuous mode 22:14:21 executing program 4: creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)='\x00|\f\xbb\xd4\x1aF\x04t\x15\r\x06\xf2\x9a^\xc8\xca\xc8\x1bz\xa7\'\xa9\x8f\x7f\xe1\xb3Y\x016\x16\xf7\xabq9\xc9\x93N\"\xafG\x0e\x8c\x9e>\xba9\xf3\xc6l1\xee1<\xdd0\x99\x18\xc5\xe2<\xcc56\xa4-\xf6i\xe1\x9aNQ(\xb0ek}\xa2\xa2O6\xc5k\xa3F\xf9\xf7b\x1d\xdc\xa4*\xf7', 0x0, 0x0) 22:14:21 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") pipe(0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) writev(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="d6ac7d3f595131008901"], 0xa) close(r1) socket(0x10, 0x3, 0x0) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000180)="580000001400192340834b80040d8c560a", 0x11}], 0x1) writev(0xffffffffffffffff, &(0x7f0000000600)=[{&(0x7f0000000380)="f98ac693ce6908", 0x7}], 0x1) accept4$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0x14, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0xfef0) splice(0xffffffffffffffff, 0x0, r1, 0x0, 0x80000001, 0x0) 22:14:21 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(0xffffffffffffffff) write$binfmt_elf32(r2, &(0x7f00000007c0)=ANY=[@ANYBLOB="955a000004000000a423107d0b6e5fbdf500dfff"], 0x14) r4 = socket$inet(0x2, 0x3, 0x7f) bind$inet(r3, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) setsockopt$inet_int(r4, 0x0, 0x3, &(0x7f0000000140)=0x7ff, 0x4) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, &(0x7f0000000000)=0x80, 0x4) splice(r1, 0x0, r3, 0x0, 0x10005, 0x0) [ 365.006276][ T9505] cgroup: fork rejected by pids controller in /syz4 22:14:21 executing program 4: creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)='\x00|\f\xbb\xd4\x1aF\x05t\x15\r\x06\xf2\x9a^\xc8\xca\xc8\x1bz\xa7\'\xa9\x8f\x7f\xe1\xb3Y\x016\x16\xf7\xabq9\xc9\x93N\"\xafG\x0e\x8c\x9e>\xba9\xf3\xc6l1\xee1<\xdd0\x99\x18\xc5\xe2<\xcc56\xa4-\xf6i\xe1\x9aNQ(\xb0ek}\xa2\xa2O6\xc5k\xa3F\xf9\xf7b\x1d\xdc\xa4*\xf7', 0x0, 0x0) 22:14:21 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) writev(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="d6ac7d3f595131008901"], 0xa) close(r3) socket(0x10, 0x3, 0x0) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000180)="580000001400192340834b80040d8c560a", 0x11}], 0x1) writev(r2, &(0x7f0000000600)=[{&(0x7f0000000380)="f98ac693ce6908", 0x7}], 0x1) accept4$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0x14, 0x0) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r1, 0x0, r3, 0x0, 0x80000001, 0x0) [ 365.335949][ T9482] device nr0 entered promiscuous mode [ 365.364678][ T28] device bridge_slave_1 left promiscuous mode [ 365.370944][ T28] bridge0: port 2(bridge_slave_1) entered disabled state [ 365.452066][ T28] device bridge_slave_0 left promiscuous mode [ 365.466463][ T28] bridge0: port 1(bridge_slave_0) entered disabled state [ 366.362049][ T28] device hsr_slave_0 left promiscuous mode [ 366.411449][ T28] device hsr_slave_1 left promiscuous mode [ 366.459753][ T28] team0 (unregistering): Port device team_slave_1 removed [ 366.470639][ T28] team0 (unregistering): Port device team_slave_0 removed [ 366.481625][ T28] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 366.525797][ T28] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 366.595277][ T28] bond0 (unregistering): Released all slaves [ 366.737866][ T9532] IPVS: ftp: loaded support on port[0] = 21 [ 366.896682][ T9532] chnl_net:caif_netlink_parms(): no params data found [ 366.937614][ T9532] bridge0: port 1(bridge_slave_0) entered blocking state [ 366.949663][ T9532] bridge0: port 1(bridge_slave_0) entered disabled state [ 366.958068][ T9532] device bridge_slave_0 entered promiscuous mode [ 366.970776][ T9532] bridge0: port 2(bridge_slave_1) entered blocking state [ 366.978154][ T9532] bridge0: port 2(bridge_slave_1) entered disabled state [ 366.990629][ T9532] device bridge_slave_1 entered promiscuous mode [ 367.015427][ T9532] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 367.030638][ T9532] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 367.052131][ T9532] team0: Port device team_slave_0 added [ 367.059118][ T9532] team0: Port device team_slave_1 added [ 367.139112][ T9532] device hsr_slave_0 entered promiscuous mode [ 367.201670][ T9532] device hsr_slave_1 entered promiscuous mode [ 367.271384][ T9532] debugfs: Directory 'hsr0' with parent '/' already present! [ 367.292694][ T9532] bridge0: port 2(bridge_slave_1) entered blocking state [ 367.299817][ T9532] bridge0: port 2(bridge_slave_1) entered forwarding state [ 367.307176][ T9532] bridge0: port 1(bridge_slave_0) entered blocking state [ 367.314257][ T9532] bridge0: port 1(bridge_slave_0) entered forwarding state [ 367.357221][ T9532] 8021q: adding VLAN 0 to HW filter on device bond0 [ 367.370116][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 367.378376][ T17] bridge0: port 1(bridge_slave_0) entered disabled state [ 367.386466][ T17] bridge0: port 2(bridge_slave_1) entered disabled state [ 367.399703][ T9532] 8021q: adding VLAN 0 to HW filter on device team0 [ 367.413780][ T7980] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 367.427234][ T7980] bridge0: port 1(bridge_slave_0) entered blocking state [ 367.434316][ T7980] bridge0: port 1(bridge_slave_0) entered forwarding state [ 367.452916][ T2405] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 367.462064][ T2405] bridge0: port 2(bridge_slave_1) entered blocking state [ 367.469098][ T2405] bridge0: port 2(bridge_slave_1) entered forwarding state [ 367.490491][ T9532] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 367.501186][ T9532] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 367.514413][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 367.523660][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 367.532877][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 367.542805][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 367.551597][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 367.559500][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 367.575929][ T8070] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 367.583541][ T8070] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 367.595457][ T9532] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 367.742346][ T9542] fuse: Bad value for 'fd' 22:14:24 executing program 1: bpf$MAP_CREATE(0x0, 0x0, 0x0) accept4$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x0, 0x0, @mcast2}, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgid() ioctl$TIOCGSERIAL(0xffffffffffffffff, 0x541e, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) prctl$PR_SET_SPECULATION_CTRL(0x35, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) sendto$inet6(r0, &(0x7f0000000500)="ce03110075000100ff901efc67195c22cc6dc37916237d8599b512eceb92bd30961166bf00000000070000e19b40b4288ba4e852e8876e977ac94186835a03d045871d6fe30032b46ec4b52a4245f456142304a7821d1c6c8689f4ac12c50cc25534655ee7b237c7a5ba6dcc956757bf80f7146faaefba7f62928a83b54c10bd50c4ea9709367ee58afd37f6f9a0a92decda7d3e5dabe32ba34964ae3278f4c1c443f92eb36c74609cc828c5e2", 0xad, 0x0, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) keyctl$read(0xb, 0x0, &(0x7f00000004c0)=""/8, 0x8) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r1, 0x0) write$P9_RWALK(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="b0"], 0x1) perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) timerfd_create(0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) ioctl$EVIOCSKEYCODE(0xffffffffffffffff, 0x80104592, &(0x7f0000000100)=[0x6, 0x8001]) getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x23, &(0x7f0000000040), &(0x7f00000002c0)=0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r2, 0x0, 0x0) r3 = socket$caif_stream(0x25, 0x1, 0x5) close(r3) 22:14:24 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(0xffffffffffffffff) write$binfmt_elf32(r2, &(0x7f00000007c0)=ANY=[@ANYBLOB="955a000004000000a423107d0b6e5fbdf500dfff"], 0x14) r4 = socket$inet(0x2, 0x3, 0x7f) bind$inet(r3, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) setsockopt$inet_int(r4, 0x0, 0x3, &(0x7f0000000140)=0x7ff, 0x4) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, &(0x7f0000000000)=0x80, 0x4) splice(r1, 0x0, r3, 0x0, 0x10005, 0x0) 22:14:24 executing program 4: creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)='\x00|\f\xbb\xd4\x1aF\x06t\x15\r\x06\xf2\x9a^\xc8\xca\xc8\x1bz\xa7\'\xa9\x8f\x7f\xe1\xb3Y\x016\x16\xf7\xabq9\xc9\x93N\"\xafG\x0e\x8c\x9e>\xba9\xf3\xc6l1\xee1<\xdd0\x99\x18\xc5\xe2<\xcc56\xa4-\xf6i\xe1\x9aNQ(\xb0ek}\xa2\xa2O6\xc5k\xa3F\xf9\xf7b\x1d\xdc\xa4*\xf7', 0x0, 0x0) 22:14:24 executing program 5: socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f00000000c0)={r3}) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=@getnetconf={0x0, 0x52, 0x20, 0x70bd2a, 0x25dfdbfe, {}, [""]}, 0x2a5}, 0x1, 0x0, 0x0, 0x4000000}, 0x24000081) 22:14:24 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) writev(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="d6ac7d3f595131008901"], 0xa) close(r3) socket(0x10, 0x3, 0x0) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000180)="580000001400192340834b80040d8c560a", 0x11}], 0x1) writev(r2, &(0x7f0000000600)=[{&(0x7f0000000380)="f98ac693ce6908", 0x7}], 0x1) accept4$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0x14, 0x0) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r1, 0x0, r3, 0x0, 0x80000001, 0x0) 22:14:24 executing program 0: getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f00000000c0)) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000003c0)='./file0\x00', 0x0, 0x0) fcntl$getflags(r1, 0x401) getresgid(0x0, 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, &(0x7f0000001880)) getgid() bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001c40)=[{&(0x7f0000000ec0)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001080)=[{0x0}], 0x1, &(0x7f00000010c0)}, {&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001580)}, {0x0, 0x0, &(0x7f0000001b00), 0x0, &(0x7f0000002840)=ANY=[@ANYRES32, @ANYRES32, @ANYRES32=r1, @ANYRES32=r0, @ANYRES32, @ANYRES32, @ANYRES32=0x0, @ANYRES32, @ANYBLOB], 0x20, 0x4048850}], 0x3, 0x0) r2 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x4, 0x2) getsockopt$inet_sctp_SCTP_INITMSG(r2, 0x84, 0x2, &(0x7f0000000080), &(0x7f0000000100)=0x8) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000480)={{{@in=@multicast1, @in6=@dev={0xfe, 0x80, [], 0xa}, 0x0, 0x7fff, 0x4e20, 0x7278, 0xf, 0x20, 0xb0}, {0x0, 0x2, 0x2, 0x0, 0xff, 0x7ff, 0x0, 0x6}, {0x0, 0x0, 0x6}, 0x0, 0x0, 0x5, 0x1, 0x2, 0x1}, {{@in6=@loopback, 0x0, 0x7a}, 0xa, @in=@loopback, 0x3500, 0x1, 0x0, 0x1, 0x0, 0x7, 0x9}}, 0xe8) r3 = syz_open_dev$usbfs(&(0x7f0000001280)='/dev/bus/usb/00#/00#\x00', 0x1a9e, 0x0) ioctl$USBDEVFS_RELEASEINTERFACE(r3, 0x80045510, &(0x7f0000000040)) sendmsg(0xffffffffffffffff, &(0x7f00000001c0), 0x0) 22:14:24 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") pipe(&(0x7f0000000240)={0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_elf32(0xffffffffffffffff, &(0x7f00000007c0)=ANY=[@ANYBLOB="955a000004000000a423107d0b6e5fbdf500dfff"], 0x14) r3 = socket$inet(0x2, 0x3, 0x7f) bind$inet(r2, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) setsockopt$inet_int(r3, 0x0, 0x3, &(0x7f0000000140)=0x7ff, 0x4) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) setsockopt$SO_TIMESTAMPING(r2, 0x1, 0x25, &(0x7f0000000000)=0x80, 0x4) splice(r1, 0x0, r2, 0x0, 0x10005, 0x0) 22:14:24 executing program 4: creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)='\x00|\f\xbb\xd4\x1aF\at\x15\r\x06\xf2\x9a^\xc8\xca\xc8\x1bz\xa7\'\xa9\x8f\x7f\xe1\xb3Y\x016\x16\xf7\xabq9\xc9\x93N\"\xafG\x0e\x8c\x9e>\xba9\xf3\xc6l1\xee1<\xdd0\x99\x18\xc5\xe2<\xcc56\xa4-\xf6i\xe1\x9aNQ(\xb0ek}\xa2\xa2O6\xc5k\xa3F\xf9\xf7b\x1d\xdc\xa4*\xf7', 0x0, 0x0) 22:14:24 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) writev(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="d6ac7d3f595131008901"], 0xa) close(r3) socket(0x10, 0x3, 0x0) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000180)="580000001400192340834b80040d8c560a", 0x11}], 0x1) writev(r2, &(0x7f0000000600)=[{&(0x7f0000000380)="f98ac693ce6908", 0x7}], 0x1) accept4$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0x14, 0x0) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r1, 0x0, r3, 0x0, 0x80000001, 0x0) 22:14:24 executing program 0: getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f00000000c0)) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000003c0)='./file0\x00', 0x0, 0x0) fcntl$getflags(r1, 0x401) getresgid(0x0, 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, &(0x7f0000001880)) getgid() bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001c40)=[{&(0x7f0000000ec0)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001080)=[{0x0}], 0x1, &(0x7f00000010c0)}, {&(0x7f0000001100)=@abs, 0x6e, &(0x7f0000001580)}, {0x0, 0x0, &(0x7f0000001b00), 0x0, &(0x7f0000002840)=ANY=[@ANYRES32, @ANYRES32, @ANYRES32=r1, @ANYRES32=r0, @ANYRES32, @ANYRES32, @ANYRES32=0x0, @ANYRES32, @ANYBLOB], 0x20, 0x4048850}], 0x3, 0x0) r2 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x4, 0x2) getsockopt$inet_sctp_SCTP_INITMSG(r2, 0x84, 0x2, &(0x7f0000000080), &(0x7f0000000100)=0x8) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000480)={{{@in=@multicast1, @in6=@dev={0xfe, 0x80, [], 0xa}, 0x0, 0x7fff, 0x4e20, 0x7278, 0xf, 0x20, 0xb0}, {0x0, 0x2, 0x2, 0x0, 0xff, 0x7ff, 0x0, 0x6}, {0x0, 0x0, 0x6}, 0x0, 0x0, 0x5, 0x1, 0x2, 0x1}, {{@in6=@loopback, 0x0, 0x7a}, 0xa, @in=@loopback, 0x3500, 0x1, 0x0, 0x1, 0x0, 0x7, 0x9}}, 0xe8) r3 = syz_open_dev$usbfs(&(0x7f0000001280)='/dev/bus/usb/00#/00#\x00', 0x1a9e, 0x0) ioctl$USBDEVFS_RELEASEINTERFACE(r3, 0x80045510, &(0x7f0000000040)) sendmsg(0xffffffffffffffff, &(0x7f00000001c0), 0x0) 22:14:24 executing program 4: creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)='\x00|\f\xbb\xd4\x1aF\x00\\\x15\r\x06\xf2\x9a^\xc8\xca\xc8\x1bz\xa7\'\xa9\x8f\x7f\xe1\xb3Y\x016\x16\xf7\xabq9\xc9\x93N\"\xafG\x0e\x8c\x9e>\xba9\xf3\xc6l1\xee1<\xdd0\x99\x18\xc5\xe2<\xcc56\xa4-\xf6i\xe1\x9aNQ(\xb0ek}\xa2\xa2O6\xc5k\xa3F\xf9\xf7b\x1d\xdc\xa4*\xf7', 0x0, 0x0) 22:14:24 executing program 4: creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)='\x00|\f\xbb\xd4\x1aF\x00t:\r\x06\xf2\x9a^\xc8\xca\xc8\x1bz\xa7\'\xa9\x8f\x7f\xe1\xb3Y\x016\x16\xf7\xabq9\xc9\x93N\"\xafG\x0e\x8c\x9e>\xba9\xf3\xc6l1\xee1<\xdd0\x99\x18\xc5\xe2<\xcc56\xa4-\xf6i\xe1\x9aNQ(\xb0ek}\xa2\xa2O6\xc5k\xa3F\xf9\xf7b\x1d\xdc\xa4*\xf7', 0x0, 0x0) 22:14:25 executing program 1: bpf$MAP_CREATE(0x0, 0x0, 0x0) accept4$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x0, 0x0, @mcast2}, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgid() ioctl$TIOCGSERIAL(0xffffffffffffffff, 0x541e, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) prctl$PR_SET_SPECULATION_CTRL(0x35, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) sendto$inet6(r0, &(0x7f0000000500)="ce03110075000100ff901efc67195c22cc6dc37916237d8599b512eceb92bd30961166bf00000000070000e19b40b4288ba4e852e8876e977ac94186835a03d045871d6fe30032b46ec4b52a4245f456142304a7821d1c6c8689f4ac12c50cc25534655ee7b237c7a5ba6dcc956757bf80f7146faaefba7f62928a83b54c10bd50c4ea9709367ee58afd37f6f9a0a92decda7d3e5dabe32ba34964ae3278f4c1c443f92eb36c74609cc828c5e2", 0xad, 0x0, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) keyctl$read(0xb, 0x0, &(0x7f00000004c0)=""/8, 0x8) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r1, 0x0) write$P9_RWALK(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="b0"], 0x1) perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) timerfd_create(0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) ioctl$EVIOCSKEYCODE(0xffffffffffffffff, 0x80104592, &(0x7f0000000100)=[0x6, 0x8001]) getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x23, &(0x7f0000000040), &(0x7f00000002c0)=0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r2, 0x0, 0x0) r3 = socket$caif_stream(0x25, 0x1, 0x5) close(r3) 22:14:25 executing program 0: getpid() syz_genetlink_get_family_id$ipvs(&(0x7f00000003c0)='IPVS\x00') r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = fcntl$dupfd(r0, 0x0, r0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r3 = fcntl$dupfd(r2, 0x0, r2) write$P9_RXATTRWALK(r3, 0x0, 0x0) ioctl$RTC_EPOCH_SET(r3, 0x4008700e, 0x3) getsockopt$bt_l2cap_L2CAP_CONNINFO(r3, 0x6, 0x2, &(0x7f0000000a80), &(0x7f0000000b80)=0x6) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(r1, 0xc4c85513, &(0x7f0000000500)={{0x1, 0x5, 0x4, 0xffff, 'syz1\x00', 0x7f}, 0x0, [0x8, 0x6, 0x4, 0x0, 0x5, 0x3f, 0x80000001, 0x0, 0x7fffffff, 0x6d48, 0x6, 0x0, 0x0, 0x6, 0x2000000000006, 0x5, 0x3, 0xb1, 0x8a, 0x4, 0x3, 0xffff, 0x5, 0x0, 0x9, 0x2, 0x7, 0xd7, 0xffffffffffff6474, 0x40000000000000, 0x7, 0xffffffffffff5c2a, 0x2400000000000000, 0x6, 0xffffffffffffffe0, 0x80000001, 0x81, 0x6424, 0x7, 0x4, 0x100, 0x5, 0x4, 0x0, 0x9, 0x0, 0x0, 0xfffffffffffffffb, 0x5, 0x8001, 0x7, 0x4, 0x9, 0x977, 0x31dc, 0xfffffffffffff001, 0x0, 0x9, 0x9, 0xfffffffffffffffa, 0x3, 0x8001, 0x3, 0x6, 0x1, 0x6, 0x0, 0x8, 0x400, 0xbf, 0x2, 0x800, 0x6, 0x0, 0x5, 0x9f05, 0x8, 0x8, 0x4, 0x4, 0x7, 0x4, 0x1000000005, 0xb, 0x0, 0x6, 0x0, 0xfffffffffffffff8, 0xeb, 0x8, 0x7, 0x27a0, 0xffffffffffff85d9, 0x1, 0x0, 0x7, 0x4a99, 0xfffffffffffffffa, 0x0, 0x40, 0x7ff, 0x8, 0x0, 0x0, 0x10000, 0xdb16, 0x1, 0x128f, 0x2, 0x4, 0x4, 0x55, 0x854, 0x1, 0x1, 0x6, 0x0, 0x9, 0x9, 0x0, 0x7, 0x2, 0x5ef7, 0x98e9, 0x100, 0x3, 0xfffffffffffff800, 0x6]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) userfaultfd(0x80000) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000200)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r5 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r5, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r5, 0x29, 0x20, &(0x7f0000000000)={@ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x1, 0x0, 0x2, 0x4, 0x200, 0x7f}, 0x20) 22:14:25 executing program 4: creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)='\x00|\f\xbb\xd4\x1aF\x00t]\r\x06\xf2\x9a^\xc8\xca\xc8\x1bz\xa7\'\xa9\x8f\x7f\xe1\xb3Y\x016\x16\xf7\xabq9\xc9\x93N\"\xafG\x0e\x8c\x9e>\xba9\xf3\xc6l1\xee1<\xdd0\x99\x18\xc5\xe2<\xcc56\xa4-\xf6i\xe1\x9aNQ(\xb0ek}\xa2\xa2O6\xc5k\xa3F\xf9\xf7b\x1d\xdc\xa4*\xf7', 0x0, 0x0) [ 370.122461][ T28] device bridge_slave_1 left promiscuous mode [ 370.128658][ T28] bridge0: port 2(bridge_slave_1) entered disabled state [ 370.182122][ T28] device bridge_slave_0 left promiscuous mode [ 370.188494][ T28] bridge0: port 1(bridge_slave_0) entered disabled state [ 370.232355][ T28] device bridge_slave_1 left promiscuous mode [ 370.238495][ T28] bridge0: port 2(bridge_slave_1) entered disabled state [ 370.292266][ T28] device bridge_slave_0 left promiscuous mode [ 370.299491][ T28] bridge0: port 1(bridge_slave_0) entered disabled state [ 371.671515][ T28] device hsr_slave_0 left promiscuous mode [ 371.721464][ T28] device hsr_slave_1 left promiscuous mode [ 371.768908][ T28] team0 (unregistering): Port device team_slave_1 removed [ 371.778716][ T28] team0 (unregistering): Port device team_slave_0 removed [ 371.789037][ T28] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 371.836114][ T28] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 371.915849][ T28] bond0 (unregistering): Released all slaves [ 372.041754][ T28] device hsr_slave_0 left promiscuous mode [ 372.111504][ T28] device hsr_slave_1 left promiscuous mode [ 372.158931][ T28] team0 (unregistering): Port device team_slave_1 removed [ 372.169510][ T28] team0 (unregistering): Port device team_slave_0 removed [ 372.179772][ T28] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 372.235756][ T28] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 372.303894][ T28] bond0 (unregistering): Released all slaves [ 372.418639][ T9832] IPVS: ftp: loaded support on port[0] = 21 [ 372.470071][ T9832] chnl_net:caif_netlink_parms(): no params data found [ 372.500065][ T9832] bridge0: port 1(bridge_slave_0) entered blocking state [ 372.507203][ T9832] bridge0: port 1(bridge_slave_0) entered disabled state [ 372.515548][ T9832] device bridge_slave_0 entered promiscuous mode [ 372.522909][ T9832] bridge0: port 2(bridge_slave_1) entered blocking state [ 372.530004][ T9832] bridge0: port 2(bridge_slave_1) entered disabled state [ 372.537750][ T9832] device bridge_slave_1 entered promiscuous mode [ 372.560933][ T9832] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 372.571565][ T9832] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 372.590235][ T9832] team0: Port device team_slave_0 added [ 372.596869][ T9832] team0: Port device team_slave_1 added [ 372.663719][ T9832] device hsr_slave_0 entered promiscuous mode [ 372.711694][ T9832] device hsr_slave_1 entered promiscuous mode [ 372.751933][ T9832] debugfs: Directory 'hsr0' with parent '/' already present! [ 372.846609][ T9832] bridge0: port 2(bridge_slave_1) entered blocking state [ 372.853750][ T9832] bridge0: port 2(bridge_slave_1) entered forwarding state [ 372.861068][ T9832] bridge0: port 1(bridge_slave_0) entered blocking state [ 372.868173][ T9832] bridge0: port 1(bridge_slave_0) entered forwarding state [ 372.908042][ T9832] 8021q: adding VLAN 0 to HW filter on device bond0 [ 372.921566][ T8029] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 372.930315][ T8029] bridge0: port 1(bridge_slave_0) entered disabled state [ 372.938827][ T8029] bridge0: port 2(bridge_slave_1) entered disabled state [ 372.953658][ T9832] 8021q: adding VLAN 0 to HW filter on device team0 [ 372.965094][ T8029] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 372.974037][ T8029] bridge0: port 1(bridge_slave_0) entered blocking state [ 372.981059][ T8029] bridge0: port 1(bridge_slave_0) entered forwarding state [ 373.005298][ T8070] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 373.014652][ T8070] bridge0: port 2(bridge_slave_1) entered blocking state [ 373.021819][ T8070] bridge0: port 2(bridge_slave_1) entered forwarding state [ 373.032795][ T8070] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 373.042564][ T8070] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 373.058294][ T9832] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 373.072779][ T9832] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 373.088357][ T8029] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 373.098672][ T8029] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 373.110478][ T8029] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 373.130801][ T9832] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 373.143708][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 373.151153][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 373.164129][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 22:14:29 executing program 5: r0 = memfd_create(0x0, 0x0) pwritev(r0, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) r1 = dup(r0) lseek(r1, 0x0, 0x3) ioctl$VIDIOC_DBG_S_REGISTER(r1, 0x4038564f, &(0x7f0000000b80)={{0x1, @addr=0x1}, 0x8, 0x1, 0x3}) mkdirat(0xffffffffffffff9c, 0x0, 0x0) r2 = creat(&(0x7f00000001c0)='./bus\x00', 0xffffffffffdffffe) r3 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) write$apparmor_current(r3, &(0x7f0000000380)=ANY=[@ANYRES64], 0x1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x40, 0x0, 0x50d, 0x224a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000, 0x0, @perf_config_ext={0x40, 0xffffffffffffecf5}, 0x6218}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$audion(&(0x7f0000000280)='/dev/audio#\x00', 0x81, 0x8501) setsockopt$TIPC_MCAST_BROADCAST(r3, 0x10f, 0x85) write$USERIO_CMD_SET_PORT_TYPE(r4, &(0x7f0000000300)={0x1, 0xa1}, 0x2) lsetxattr$trusted_overlay_upper(&(0x7f0000000d40)='./bus/file0\x00', &(0x7f0000000200)='truQ\x19ed.overlayr\x00', 0x0, 0x0, 0x0) syz_mount_image$nfs4(&(0x7f00000003c0)='nfs4\x00', &(0x7f0000000400)='./bus/file0\x00', 0x5db0, 0xaaaaaaaaaaaaabb, &(0x7f0000000a80)=[{&(0x7f0000000440)="7b94a2629fabf521701a7a313ee300f8f60bf008db24369f41553078ceff8a0a807f0024c757a73affa6fe006fcacc89c1e1f6d1aa6351b554baec54189ce49e35715d0684b563a42450319d8e6aebf4e24422a4e5e2d71525fbf0787e21c24ad9a1041be35a6ad01eaa59757d3a43130f841e85110342ee40b4639cd59575a8ca45b0551f4e80ccd5a574ff22ede64e8beaae289190951d75233e3a725b62b4d3a452e108d8b84bf2b317ecc28cc880b8271e22c20f5f194c3f4b5e525b", 0xbe, 0x8}, {&(0x7f0000000500)="2399d073b444bc2699c7a86d64e95562a0617a36c5631e0b8e072b1528bf3563f8108e1f3c64a8214b0400fc518cf1d947edf9", 0x33, 0xb9b}, {&(0x7f0000000540)="53ab4b996541499f682e8aae8e57bf96a2fc81bbc1dbe723da345f068d89b871f9869ef476ecb18f66b9ab8547ae39f33a6bf3c18b43534d8dd3820139054fa1bb1221c47865f6592c22641c103685e2ddfc214bc864f953de7e76e01f82e44668eb8c531985325e4b1fd304e772c6a871109a6d8ae10e56d1107e3ae08ef0db5b108083addcebcd4cc70cf13c70b061f2b35cadf7ce43f35e7c", 0xfffffffffffffee4, 0x8}, {&(0x7f0000000600)="42e0b889d9e6beac9dcf10cef523f1f05cb1304097f1c0bdabd694ed1bbb8f01f47a4234f68ba66bc825df53308e3fa10a38099c4b2a529135568828de265dc0211feaf7904862c47db4ba7e157e53fcfd747cbca9b5e15b747d25765301fb29e11eb5e6af58244cfa218de95a8a042c896a00b31032b120087093b3b5be71264a1d9fd6d62962239b878053c306e5092764cc9cf1470f4cf87db1139842a1f3fcc3d89a85f40e2f8d099ea9d92b7b4cff23749317a5dabf4bc7d2db8bca28457da7166d387f74841d6176d8168ed54f4310c2f35bdb", 0xd6, 0x80}, {&(0x7f0000000700)="cc396741a78a870d5741da4ac4a270e6ac0574d1390196d7226464f08f71e10e677668bf511c1f7491ece70d22b1b9494bbc24b7ceafd5d7362abe915aa897270cd4b61c015f424a353be619a8fda0d91412f7bd3074abee42415e9a871d763e95c059b8d672f19e51b4223dd6b4c9d58552b2b5076cb3869d36d8166f52b9d13504d52cc8af5dcccd1d0146a52f7b201decf17dcf33eea3839e560656898f386760ad03d026c5776d46a1383b20", 0xae, 0x8e}, {&(0x7f0000000800)="ce93cd43b0d192e958f81a4a03b6be747f26989989b6dcb60d0949fa56299a226d24c73869f2555c5aa9e323eeff9087875bed3887aea5eb411c829f660b485c2c32c0faf384fbd815e1da42145014432bf9cdcaec372f5bc3f9868175271554bf0a89c231244b6ffdf207cc069007f72135d80f3e3d010d20f70a2fa60321510938a64241fd10b5145bb475c6a898d8fbea9596a4991b42f7b54e329a0a387e68f1f16e508719664f1b74e2f2b1fe5ca017650b3c8eed2b60246c47a70c9343aa2de63515c4b96f1a78a4b1ef6261bf7c14982e25745ad95a6ca87da937e4c931439f6a494ffb7956ac", 0xea, 0x7}, {&(0x7f0000000d80)="c8e673e10e626f600935e9a8a42bbbe8c38fe9dd1f0f9d89213593bbd5b30a14b0b1832a5f29b636521aa7345d41c3a00990984d99e98ed71679dcad0ce80c48b741660e401cb87ff5316476b1067690afc0b9d478f6b4373a9a33b3ff4ee95029f5989478790a08a3ea78eced7c8f902b1d425e04dc0a1a0fc1595c00f13d993db29f306aa4bff31b547da51d1fdc4765469b02991864e43a16673f0ff5e71e429fe8e9cb851d0d5536fe3968187f85015e67cfa630f2645b1a3fc20bec46e5df5ab1c06ca68ef73c028205a36a47a75c3c1dd9eb63c4", 0xd7, 0x4}, {&(0x7f0000000a00)="e40236740704a5565fbd5aec023ad48f0b555e9a1f481b9bcb4304c6ad235ff29c5740bb409aca0acf00a67fe037032d7a9c7a4ec2e90c96e24b59fa5dfdf1ed98bcb28c7cdc6ba7237b38ea50d32800a22e525d4dcd39d5a921fdbeed792a01b69469735f60fb1eb7b118cd258fd2d1", 0x70, 0x2}], 0x40, &(0x7f0000000b40)='system_u:object_r:inetd_var_run_t:s0\x00') ioprio_set$uid(0x3, 0x0, 0x0) r5 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r5, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) r6 = dup(r5) lseek(r6, 0x0, 0x3) setsockopt$sock_attach_bpf(r4, 0x1, 0x32, &(0x7f0000000d00)=r6, 0x4) quotactl(0x0, &(0x7f0000000000)='./file0\x00', 0x0, &(0x7f0000000280)) r7 = open(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) lsetxattr$security_selinux(&(0x7f0000000240)='./bus\x00', &(0x7f00000002c0)='security.selinux\x00', &(0x7f0000000340)='system_u:object_r:inetd_var_run_t:s0\x00', 0x25, 0x0) sendfile(r3, r7, 0x0, 0x8000fffffffe) setsockopt$netrom_NETROM_T4(r7, 0x103, 0x6, &(0x7f0000000bc0)=0x1ff, 0x4) r8 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r8, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_type(r8, &(0x7f00000007c0)='threaded\x00', 0x9) getsockopt$IPT_SO_GET_INFO(r2, 0x0, 0x40, &(0x7f0000000c40)={'security\x00'}, &(0x7f0000000cc0)=0x54) read(r4, &(0x7f0000000c00)=""/29, 0x1d) creat(&(0x7f0000000140)='./bus\x00', 0x100000010) 22:14:29 executing program 1: bpf$MAP_CREATE(0x0, 0x0, 0x0) accept4$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x0, 0x0, @mcast2}, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgid() ioctl$TIOCGSERIAL(0xffffffffffffffff, 0x541e, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) prctl$PR_SET_SPECULATION_CTRL(0x35, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) sendto$inet6(r0, &(0x7f0000000500)="ce03110075000100ff901efc67195c22cc6dc37916237d8599b512eceb92bd30961166bf00000000070000e19b40b4288ba4e852e8876e977ac94186835a03d045871d6fe30032b46ec4b52a4245f456142304a7821d1c6c8689f4ac12c50cc25534655ee7b237c7a5ba6dcc956757bf80f7146faaefba7f62928a83b54c10bd50c4ea9709367ee58afd37f6f9a0a92decda7d3e5dabe32ba34964ae3278f4c1c443f92eb36c74609cc828c5e2", 0xad, 0x0, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) keyctl$read(0xb, 0x0, &(0x7f00000004c0)=""/8, 0x8) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r1, 0x0) write$P9_RWALK(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="b0"], 0x1) perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) timerfd_create(0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) ioctl$EVIOCSKEYCODE(0xffffffffffffffff, 0x80104592, &(0x7f0000000100)=[0x6, 0x8001]) getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x23, &(0x7f0000000040), &(0x7f00000002c0)=0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r2, 0x0, 0x0) r3 = socket$caif_stream(0x25, 0x1, 0x5) close(r3) 22:14:29 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) writev(r2, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="d6ac7d3f595131008901"], 0xa) close(r3) socket(0x10, 0x3, 0x0) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000180)="580000001400192340834b80040d8c560a", 0x11}], 0x1) writev(r2, &(0x7f0000000600)=[{&(0x7f0000000380)="f98ac693ce6908", 0x7}], 0x1) accept4$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0x14, 0x0) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r1, 0x0, r3, 0x0, 0x80000001, 0x0) 22:14:29 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") pipe(&(0x7f0000000240)={0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_elf32(0xffffffffffffffff, &(0x7f00000007c0)=ANY=[@ANYBLOB="955a000004000000a423107d0b6e5fbdf500dfff"], 0x14) r3 = socket$inet(0x2, 0x3, 0x7f) bind$inet(r2, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) setsockopt$inet_int(r3, 0x0, 0x3, &(0x7f0000000140)=0x7ff, 0x4) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) setsockopt$SO_TIMESTAMPING(r2, 0x1, 0x25, &(0x7f0000000000)=0x80, 0x4) splice(r1, 0x0, r2, 0x0, 0x10005, 0x0) 22:14:29 executing program 4: creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)='\x00|\f\xbb\xd4\x1aF\x00t\x15:\x06\xf2\x9a^\xc8\xca\xc8\x1bz\xa7\'\xa9\x8f\x7f\xe1\xb3Y\x016\x16\xf7\xabq9\xc9\x93N\"\xafG\x0e\x8c\x9e>\xba9\xf3\xc6l1\xee1<\xdd0\x99\x18\xc5\xe2<\xcc56\xa4-\xf6i\xe1\x9aNQ(\xb0ek}\xa2\xa2O6\xc5k\xa3F\xf9\xf7b\x1d\xdc\xa4*\xf7', 0x0, 0x0) 22:14:29 executing program 0: getpid() syz_genetlink_get_family_id$ipvs(&(0x7f00000003c0)='IPVS\x00') r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = fcntl$dupfd(r0, 0x0, r0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r3 = fcntl$dupfd(r2, 0x0, r2) write$P9_RXATTRWALK(r3, 0x0, 0x0) ioctl$RTC_EPOCH_SET(r3, 0x4008700e, 0x3) getsockopt$bt_l2cap_L2CAP_CONNINFO(r3, 0x6, 0x2, &(0x7f0000000a80), &(0x7f0000000b80)=0x6) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(r1, 0xc4c85513, &(0x7f0000000500)={{0x1, 0x5, 0x4, 0xffff, 'syz1\x00', 0x7f}, 0x0, [0x8, 0x6, 0x4, 0x0, 0x5, 0x3f, 0x80000001, 0x0, 0x7fffffff, 0x6d48, 0x6, 0x0, 0x0, 0x6, 0x2000000000006, 0x5, 0x3, 0xb1, 0x8a, 0x4, 0x3, 0xffff, 0x5, 0x0, 0x9, 0x2, 0x7, 0xd7, 0xffffffffffff6474, 0x40000000000000, 0x7, 0xffffffffffff5c2a, 0x2400000000000000, 0x6, 0xffffffffffffffe0, 0x80000001, 0x81, 0x6424, 0x7, 0x4, 0x100, 0x5, 0x4, 0x0, 0x9, 0x0, 0x0, 0xfffffffffffffffb, 0x5, 0x8001, 0x7, 0x4, 0x9, 0x977, 0x31dc, 0xfffffffffffff001, 0x0, 0x9, 0x9, 0xfffffffffffffffa, 0x3, 0x8001, 0x3, 0x6, 0x1, 0x6, 0x0, 0x8, 0x400, 0xbf, 0x2, 0x800, 0x6, 0x0, 0x5, 0x9f05, 0x8, 0x8, 0x4, 0x4, 0x7, 0x4, 0x1000000005, 0xb, 0x0, 0x6, 0x0, 0xfffffffffffffff8, 0xeb, 0x8, 0x7, 0x27a0, 0xffffffffffff85d9, 0x1, 0x0, 0x7, 0x4a99, 0xfffffffffffffffa, 0x0, 0x40, 0x7ff, 0x8, 0x0, 0x0, 0x10000, 0xdb16, 0x1, 0x128f, 0x2, 0x4, 0x4, 0x55, 0x854, 0x1, 0x1, 0x6, 0x0, 0x9, 0x9, 0x0, 0x7, 0x2, 0x5ef7, 0x98e9, 0x100, 0x3, 0xfffffffffffff800, 0x6]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) userfaultfd(0x80000) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000200)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r5 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r5, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r5, 0x29, 0x20, &(0x7f0000000000)={@ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x1, 0x0, 0x2, 0x4, 0x200, 0x7f}, 0x20) 22:14:29 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) writev(r2, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="d6ac7d3f595131008901"], 0xa) close(r3) socket(0x10, 0x3, 0x0) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000180)="580000001400192340834b80040d8c560a", 0x11}], 0x1) writev(r2, &(0x7f0000000600)=[{&(0x7f0000000380)="f98ac693ce6908", 0x7}], 0x1) accept4$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0x14, 0x0) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r1, 0x0, r3, 0x0, 0x80000001, 0x0) [ 373.641358][ T26] audit: type=1804 audit(1572905669.994:41): pid=9925 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir679542756/syzkaller.fohfCf/1/bus" dev="sda1" ino=16794 res=1 [ 373.746757][ T26] audit: type=1804 audit(1572905670.104:42): pid=9961 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir679542756/syzkaller.fohfCf/1/bus" dev="sda1" ino=16794 res=1 22:14:30 executing program 0: getpid() syz_genetlink_get_family_id$ipvs(&(0x7f00000003c0)='IPVS\x00') r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = fcntl$dupfd(r0, 0x0, r0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r3 = fcntl$dupfd(r2, 0x0, r2) write$P9_RXATTRWALK(r3, 0x0, 0x0) ioctl$RTC_EPOCH_SET(r3, 0x4008700e, 0x3) getsockopt$bt_l2cap_L2CAP_CONNINFO(r3, 0x6, 0x2, &(0x7f0000000a80), &(0x7f0000000b80)=0x6) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(r1, 0xc4c85513, &(0x7f0000000500)={{0x1, 0x5, 0x4, 0xffff, 'syz1\x00', 0x7f}, 0x0, [0x8, 0x6, 0x4, 0x0, 0x5, 0x3f, 0x80000001, 0x0, 0x7fffffff, 0x6d48, 0x6, 0x0, 0x0, 0x6, 0x2000000000006, 0x5, 0x3, 0xb1, 0x8a, 0x4, 0x3, 0xffff, 0x5, 0x0, 0x9, 0x2, 0x7, 0xd7, 0xffffffffffff6474, 0x40000000000000, 0x7, 0xffffffffffff5c2a, 0x2400000000000000, 0x6, 0xffffffffffffffe0, 0x80000001, 0x81, 0x6424, 0x7, 0x4, 0x100, 0x5, 0x4, 0x0, 0x9, 0x0, 0x0, 0xfffffffffffffffb, 0x5, 0x8001, 0x7, 0x4, 0x9, 0x977, 0x31dc, 0xfffffffffffff001, 0x0, 0x9, 0x9, 0xfffffffffffffffa, 0x3, 0x8001, 0x3, 0x6, 0x1, 0x6, 0x0, 0x8, 0x400, 0xbf, 0x2, 0x800, 0x6, 0x0, 0x5, 0x9f05, 0x8, 0x8, 0x4, 0x4, 0x7, 0x4, 0x1000000005, 0xb, 0x0, 0x6, 0x0, 0xfffffffffffffff8, 0xeb, 0x8, 0x7, 0x27a0, 0xffffffffffff85d9, 0x1, 0x0, 0x7, 0x4a99, 0xfffffffffffffffa, 0x0, 0x40, 0x7ff, 0x8, 0x0, 0x0, 0x10000, 0xdb16, 0x1, 0x128f, 0x2, 0x4, 0x4, 0x55, 0x854, 0x1, 0x1, 0x6, 0x0, 0x9, 0x9, 0x0, 0x7, 0x2, 0x5ef7, 0x98e9, 0x100, 0x3, 0xfffffffffffff800, 0x6]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) userfaultfd(0x80000) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000200)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r5 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r5, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r5, 0x29, 0x20, &(0x7f0000000000)={@ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x1, 0x0, 0x2, 0x4, 0x200, 0x7f}, 0x20) 22:14:30 executing program 4: creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)='\x00|\f\xbb\xd4\x1aF\x00t\x15]\x06\xf2\x9a^\xc8\xca\xc8\x1bz\xa7\'\xa9\x8f\x7f\xe1\xb3Y\x016\x16\xf7\xabq9\xc9\x93N\"\xafG\x0e\x8c\x9e>\xba9\xf3\xc6l1\xee1<\xdd0\x99\x18\xc5\xe2<\xcc56\xa4-\xf6i\xe1\x9aNQ(\xb0ek}\xa2\xa2O6\xc5k\xa3F\xf9\xf7b\x1d\xdc\xa4*\xf7', 0x0, 0x0) 22:14:30 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) writev(r2, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="d6ac7d3f595131008901"], 0xa) close(r3) socket(0x10, 0x3, 0x0) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000180)="580000001400192340834b80040d8c560a", 0x11}], 0x1) writev(r2, &(0x7f0000000600)=[{&(0x7f0000000380)="f98ac693ce6908", 0x7}], 0x1) accept4$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0x14, 0x0) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r1, 0x0, r3, 0x0, 0x80000001, 0x0) 22:14:30 executing program 4: creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)='\x00|\f\xbb\xd4\x1aF\x00t\x15\r:\xf2\x9a^\xc8\xca\xc8\x1bz\xa7\'\xa9\x8f\x7f\xe1\xb3Y\x016\x16\xf7\xabq9\xc9\x93N\"\xafG\x0e\x8c\x9e>\xba9\xf3\xc6l1\xee1<\xdd0\x99\x18\xc5\xe2<\xcc56\xa4-\xf6i\xe1\x9aNQ(\xb0ek}\xa2\xa2O6\xc5k\xa3F\xf9\xf7b\x1d\xdc\xa4*\xf7', 0x0, 0x0) 22:14:30 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) writev(r2, &(0x7f0000000200), 0x0) write$binfmt_elf64(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="d6ac7d3f595131008901"], 0xa) close(r3) socket(0x10, 0x3, 0x0) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000180)="580000001400192340834b80040d8c560a", 0x11}], 0x1) writev(r2, &(0x7f0000000600)=[{&(0x7f0000000380)="f98ac693ce6908", 0x7}], 0x1) accept4$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0x14, 0x0) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r1, 0x0, r3, 0x0, 0x80000001, 0x0) [ 374.424348][ T26] audit: type=1804 audit(1572905670.784:43): pid=10082 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir679542756/syzkaller.fohfCf/1/bus" dev="sda1" ino=16794 res=1 [ 374.526753][ T26] audit: type=1804 audit(1572905670.884:44): pid=9925 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir679542756/syzkaller.fohfCf/1/bus" dev="sda1" ino=16794 res=1 22:14:31 executing program 5: socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ubi_ctrl\x00', 0x240002, 0x0) getsockopt$TIPC_SOCK_RECVQ_DEPTH(r0, 0x10f, 0x84, &(0x7f0000000100), &(0x7f0000000180)=0x4) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) truncate(&(0x7f0000000140)='./bus\x00', 0x800) r2 = open(&(0x7f0000000280)='./bus\x00', 0x0, 0x0) r3 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) lseek(r3, 0x0, 0x2) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000080)={&(0x7f0000000000)='./bus\x00'}, 0x10) ftruncate(r1, 0x200) sendfile(r1, r2, 0x0, 0x10000) [ 374.985104][ T26] audit: type=1804 audit(1572905671.344:45): pid=10194 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir679542756/syzkaller.fohfCf/2/bus" dev="sda1" ino=16785 res=1 [ 375.020307][ T26] audit: type=1804 audit(1572905671.374:46): pid=10195 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir679542756/syzkaller.fohfCf/2/bus" dev="sda1" ino=16785 res=1 [ 375.632186][ T7996] device bridge_slave_1 left promiscuous mode [ 375.638453][ T7996] bridge0: port 2(bridge_slave_1) entered disabled state [ 375.692651][ T7996] device bridge_slave_0 left promiscuous mode [ 375.698810][ T7996] bridge0: port 1(bridge_slave_0) entered disabled state [ 376.511650][ T7996] device hsr_slave_0 left promiscuous mode [ 376.601889][ T7996] device hsr_slave_1 left promiscuous mode [ 376.648496][ T7996] team0 (unregistering): Port device team_slave_1 removed [ 376.659031][ T7996] team0 (unregistering): Port device team_slave_0 removed [ 376.668771][ T7996] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 376.725721][ T7996] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 376.804117][ T7996] bond0 (unregistering): Released all slaves [ 376.889723][T10198] IPVS: ftp: loaded support on port[0] = 21 [ 376.945022][T10198] chnl_net:caif_netlink_parms(): no params data found [ 376.969894][T10198] bridge0: port 1(bridge_slave_0) entered blocking state [ 376.977014][T10198] bridge0: port 1(bridge_slave_0) entered disabled state [ 376.984779][T10198] device bridge_slave_0 entered promiscuous mode [ 376.992529][T10198] bridge0: port 2(bridge_slave_1) entered blocking state [ 376.999622][T10198] bridge0: port 2(bridge_slave_1) entered disabled state [ 377.007913][T10198] device bridge_slave_1 entered promiscuous mode [ 377.026146][T10198] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 377.083149][T10198] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 377.107947][T10198] team0: Port device team_slave_0 added [ 377.118267][T10198] team0: Port device team_slave_1 added [ 377.173715][T10198] device hsr_slave_0 entered promiscuous mode [ 377.215502][T10198] device hsr_slave_1 entered promiscuous mode [ 377.311524][T10198] debugfs: Directory 'hsr0' with parent '/' already present! [ 377.332336][T10198] bridge0: port 2(bridge_slave_1) entered blocking state [ 377.339394][T10198] bridge0: port 2(bridge_slave_1) entered forwarding state [ 377.346761][T10198] bridge0: port 1(bridge_slave_0) entered blocking state [ 377.353828][T10198] bridge0: port 1(bridge_slave_0) entered forwarding state [ 377.405792][T10198] 8021q: adding VLAN 0 to HW filter on device bond0 [ 377.419519][ T8070] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 377.433300][ T8070] bridge0: port 1(bridge_slave_0) entered disabled state [ 377.441684][ T8070] bridge0: port 2(bridge_slave_1) entered disabled state [ 377.460213][T10198] 8021q: adding VLAN 0 to HW filter on device team0 [ 377.476858][ T8070] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 377.485631][ T8070] bridge0: port 1(bridge_slave_0) entered blocking state [ 377.492757][ T8070] bridge0: port 1(bridge_slave_0) entered forwarding state [ 377.513708][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 377.522954][ T17] bridge0: port 2(bridge_slave_1) entered blocking state [ 377.529983][ T17] bridge0: port 2(bridge_slave_1) entered forwarding state [ 377.557547][ T8070] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 377.566985][ T8070] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 377.576202][ T8070] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 377.585065][ T8070] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 377.595293][T10198] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 377.603920][ T8070] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 377.620601][T10198] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 377.629266][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 377.645629][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 377.810578][T10206] fuse: Bad value for 'fd' 22:14:34 executing program 1: bpf$MAP_CREATE(0x0, 0x0, 0x0) accept4$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x0, 0x0, @mcast2}, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgid() ioctl$TIOCGSERIAL(0xffffffffffffffff, 0x541e, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) prctl$PR_SET_SPECULATION_CTRL(0x35, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) sendto$inet6(r0, &(0x7f0000000500)="ce03110075000100ff901efc67195c22cc6dc37916237d8599b512eceb92bd30961166bf00000000070000e19b40b4288ba4e852e8876e977ac94186835a03d045871d6fe30032b46ec4b52a4245f456142304a7821d1c6c8689f4ac12c50cc25534655ee7b237c7a5ba6dcc956757bf80f7146faaefba7f62928a83b54c10bd50c4ea9709367ee58afd37f6f9a0a92decda7d3e5dabe32ba34964ae3278f4c1c443f92eb36c74609cc828c5e2", 0xad, 0x0, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) keyctl$read(0xb, 0x0, &(0x7f00000004c0)=""/8, 0x8) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r1, 0x0) write$P9_RWALK(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="b0"], 0x1) perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) timerfd_create(0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) ioctl$EVIOCSKEYCODE(0xffffffffffffffff, 0x80104592, &(0x7f0000000100)=[0x6, 0x8001]) getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x23, &(0x7f0000000040), &(0x7f00000002c0)=0x4) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) r2 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r2, 0x0, 0x0) r3 = socket$caif_stream(0x25, 0x1, 0x5) close(r3) 22:14:34 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") pipe(&(0x7f0000000240)={0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_elf32(0xffffffffffffffff, &(0x7f00000007c0)=ANY=[@ANYBLOB="955a000004000000a423107d0b6e5fbdf500dfff"], 0x14) r3 = socket$inet(0x2, 0x3, 0x7f) bind$inet(r2, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) setsockopt$inet_int(r3, 0x0, 0x3, &(0x7f0000000140)=0x7ff, 0x4) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) setsockopt$SO_TIMESTAMPING(r2, 0x1, 0x25, &(0x7f0000000000)=0x80, 0x4) splice(r1, 0x0, r2, 0x0, 0x10005, 0x0) 22:14:34 executing program 0: getpid() syz_genetlink_get_family_id$ipvs(&(0x7f00000003c0)='IPVS\x00') r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = fcntl$dupfd(r0, 0x0, r0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r3 = fcntl$dupfd(r2, 0x0, r2) write$P9_RXATTRWALK(r3, 0x0, 0x0) ioctl$RTC_EPOCH_SET(r3, 0x4008700e, 0x3) getsockopt$bt_l2cap_L2CAP_CONNINFO(r3, 0x6, 0x2, &(0x7f0000000a80), &(0x7f0000000b80)=0x6) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(r1, 0xc4c85513, &(0x7f0000000500)={{0x1, 0x5, 0x4, 0xffff, 'syz1\x00', 0x7f}, 0x0, [0x8, 0x6, 0x4, 0x0, 0x5, 0x3f, 0x80000001, 0x0, 0x7fffffff, 0x6d48, 0x6, 0x0, 0x0, 0x6, 0x2000000000006, 0x5, 0x3, 0xb1, 0x8a, 0x4, 0x3, 0xffff, 0x5, 0x0, 0x9, 0x2, 0x7, 0xd7, 0xffffffffffff6474, 0x40000000000000, 0x7, 0xffffffffffff5c2a, 0x2400000000000000, 0x6, 0xffffffffffffffe0, 0x80000001, 0x81, 0x6424, 0x7, 0x4, 0x100, 0x5, 0x4, 0x0, 0x9, 0x0, 0x0, 0xfffffffffffffffb, 0x5, 0x8001, 0x7, 0x4, 0x9, 0x977, 0x31dc, 0xfffffffffffff001, 0x0, 0x9, 0x9, 0xfffffffffffffffa, 0x3, 0x8001, 0x3, 0x6, 0x1, 0x6, 0x0, 0x8, 0x400, 0xbf, 0x2, 0x800, 0x6, 0x0, 0x5, 0x9f05, 0x8, 0x8, 0x4, 0x4, 0x7, 0x4, 0x1000000005, 0xb, 0x0, 0x6, 0x0, 0xfffffffffffffff8, 0xeb, 0x8, 0x7, 0x27a0, 0xffffffffffff85d9, 0x1, 0x0, 0x7, 0x4a99, 0xfffffffffffffffa, 0x0, 0x40, 0x7ff, 0x8, 0x0, 0x0, 0x10000, 0xdb16, 0x1, 0x128f, 0x2, 0x4, 0x4, 0x55, 0x854, 0x1, 0x1, 0x6, 0x0, 0x9, 0x9, 0x0, 0x7, 0x2, 0x5ef7, 0x98e9, 0x100, 0x3, 0xfffffffffffff800, 0x6]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) userfaultfd(0x80000) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000200)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r5 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r5, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r5, 0x29, 0x20, &(0x7f0000000000)={@ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x1, 0x0, 0x2, 0x4, 0x200, 0x7f}, 0x20) 22:14:34 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) writev(r2, &(0x7f0000000200), 0x0) write$binfmt_elf64(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="d6ac7d3f595131008901"], 0xa) close(r3) socket(0x10, 0x3, 0x0) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000180)="580000001400192340834b80040d8c560a", 0x11}], 0x1) writev(r2, &(0x7f0000000600)=[{&(0x7f0000000380)="f98ac693ce6908", 0x7}], 0x1) accept4$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0x14, 0x0) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r1, 0x0, r3, 0x0, 0x80000001, 0x0) 22:14:34 executing program 4: creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)='\x00|\f\xbb\xd4\x1aF\x00t\x15\r\x06\xf2\x9a^\xc8\xca\xc8:z\xa7\'\xa9\x8f\x7f\xe1\xb3Y\x016\x16\xf7\xabq9\xc9\x93N\"\xafG\x0e\x8c\x9e>\xba9\xf3\xc6l1\xee1<\xdd0\x99\x18\xc5\xe2<\xcc56\xa4-\xf6i\xe1\x9aNQ(\xb0ek}\xa2\xa2O6\xc5k\xa3F\xf9\xf7b\x1d\xdc\xa4*\xf7', 0x0, 0x0) 22:14:34 executing program 5: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) r0 = syz_open_dev$dmmidi(&(0x7f0000001a80)='/dev/dmmidi#\x00', 0x9, 0x800000) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f0000001b40)={@in={0x2, 0x4e21, @loopback}, {&(0x7f0000001ac0)=""/40, 0x28}, &(0x7f0000001b00), 0x2}, 0xa0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x26000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = getpid() r2 = getpid() ptrace$setopts(0x11, r2, 0x0, 0x200000000000030) sched_getparam(r2, &(0x7f0000000000)) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(0xffffffffffffffff, 0xc1105517, &(0x7f0000000240)={{0x8, 0x2, 0x9, 0x1000, 'syz0\x00', 0x2}, 0x6, 0x10000000, 0x1f, r2, 0x9, 0x8, 'syz0\x00', &(0x7f0000000440)=['team_slave_1\x00', 'eth0)cgroupwlan0wlan0\x98\x00', '', '\x00', 'cgroupkeyring+-^em0:\\securitybdevcgroup#*{securityem0\x00', '\xe3$[^\x00', '(.cpusetppp0wlan1\x00', 'security*:eth0\xba]#*{proc\x00', 'keyring$]\x00'], 0x94, [], [0x0, 0x4, 0x5, 0x9]}) r3 = syz_open_procfs(r1, &(0x7f0000000180)='net/unix\x00') setsockopt$inet_msfilter(r3, 0x0, 0x29, &(0x7f0000000380)=ANY=[@ANYBLOB="ffffbfff7f0000010100000001000000ac14142be2a66110dc9efda008a9fc4534f3fedaf2ec84c4f541c412fa18d788362267d76cd1662586810e5a4a905947f27f75d5338c6f3bd5b2900608dff9202dc4e2fe7d8bac05000000000000005f7211fa133dae2a9891b033f144d160bd03ed0be5d51d27a3eb96c6c4c69f911b0b"], 0x14) socket$inet6(0xa, 0x803, 0x3) r4 = socket$inet(0x2, 0x3, 0x800000800000001) bpf$MAP_CREATE(0x0, &(0x7f0000474fec)={0x1, 0x800000000000003b, 0x7, 0x4}, 0x1c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f000077cfe0)={0xffffffffffffffff, &(0x7f0000ab2000), &(0x7f0000da1000)}, 0x20) getsockopt$inet_mreqsrc(r4, 0x0, 0x53, &(0x7f0000000000)={@dev, @local, @broadcast}, &(0x7f0000000040)=0x28) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000080)={'team_slave_1\x00', 0x2000}) 22:14:34 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) writev(r2, &(0x7f0000000200), 0x0) write$binfmt_elf64(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="d6ac7d3f595131008901"], 0xa) close(r3) socket(0x10, 0x3, 0x0) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000180)="580000001400192340834b80040d8c560a", 0x11}], 0x1) writev(r2, &(0x7f0000000600)=[{&(0x7f0000000380)="f98ac693ce6908", 0x7}], 0x1) accept4$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0x14, 0x0) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r1, 0x0, r3, 0x0, 0x80000001, 0x0) 22:14:34 executing program 4: creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)='\x00|\f\xbb\xd4\x1aF\x00t\x15\r\x06\xf2\x9a^\xc8\xca\xc8\x1b\\\xa7\'\xa9\x8f\x7f\xe1\xb3Y\x016\x16\xf7\xabq9\xc9\x93N\"\xafG\x0e\x8c\x9e>\xba9\xf3\xc6l1\xee1<\xdd0\x99\x18\xc5\xe2<\xcc56\xa4-\xf6i\xe1\x9aNQ(\xb0ek}\xa2\xa2O6\xc5k\xa3F\xf9\xf7b\x1d\xdc\xa4*\xf7', 0x0, 0x0) 22:14:34 executing program 4: creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)='\x00|\f\xbb\xd4\x1aF\x00t\x15\r\x06\xf2\x9a^\xc8\xca\xc8\x1bz\xa7:\xa9\x8f\x7f\xe1\xb3Y\x016\x16\xf7\xabq9\xc9\x93N\"\xafG\x0e\x8c\x9e>\xba9\xf3\xc6l1\xee1<\xdd0\x99\x18\xc5\xe2<\xcc56\xa4-\xf6i\xe1\x9aNQ(\xb0ek}\xa2\xa2O6\xc5k\xa3F\xf9\xf7b\x1d\xdc\xa4*\xf7', 0x0, 0x0) 22:14:35 executing program 4: creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)='\x00|\f\xbb\xd4\x1aF\x00t\x15\r\x06\xf2\x9a^\xc8\xca\xc8\x1bz\xa7\'\xa9\x8f\x7f\xe1\xb3]\x016\x16\xf7\xabq9\xc9\x93N\"\xafG\x0e\x8c\x9e>\xba9\xf3\xc6l1\xee1<\xdd0\x99\x18\xc5\xe2<\xcc56\xa4-\xf6i\xe1\x9aNQ(\xb0ek}\xa2\xa2O6\xc5k\xa3F\xf9\xf7b\x1d\xdc\xa4*\xf7', 0x0, 0x0) 22:14:35 executing program 1: bpf$MAP_CREATE(0x0, 0x0, 0x0) accept4$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x0, 0x0, @mcast2}, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgid() ioctl$TIOCGSERIAL(0xffffffffffffffff, 0x541e, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) prctl$PR_SET_SPECULATION_CTRL(0x35, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) sendto$inet6(r0, &(0x7f0000000500)="ce03110075000100ff901efc67195c22cc6dc37916237d8599b512eceb92bd30961166bf00000000070000e19b40b4288ba4e852e8876e977ac94186835a03d045871d6fe30032b46ec4b52a4245f456142304a7821d1c6c8689f4ac12c50cc25534655ee7b237c7a5ba6dcc956757bf80f7146faaefba7f62928a83b54c10bd50c4ea9709367ee58afd37f6f9a0a92decda7d3e5dabe32ba34964ae3278f4c1c443f92eb36c74609cc828c5e2", 0xad, 0x0, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) keyctl$read(0xb, 0x0, &(0x7f00000004c0)=""/8, 0x8) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r1, 0x0) write$P9_RWALK(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="b0"], 0x1) perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) timerfd_create(0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) ioctl$EVIOCSKEYCODE(0xffffffffffffffff, 0x80104592, &(0x7f0000000100)=[0x6, 0x8001]) getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x23, &(0x7f0000000040), &(0x7f00000002c0)=0x4) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) r2 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r2, 0x0, 0x0) r3 = socket$caif_stream(0x25, 0x1, 0x5) close(r3) 22:14:35 executing program 5: epoll_create1(0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000002c0)) socketpair$unix(0x1, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x361) write(0xffffffffffffffff, &(0x7f0000000000), 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) write(0xffffffffffffffff, &(0x7f00000001c0), 0xfffffef3) msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x4) 22:14:35 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) writev(r2, &(0x7f0000000200)=[{0x0}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="d6ac7d3f595131008901"], 0xa) close(r3) socket(0x10, 0x3, 0x0) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000180)="580000001400192340834b80040d8c560a", 0x11}], 0x1) writev(r2, &(0x7f0000000600)=[{&(0x7f0000000380)="f98ac693ce6908", 0x7}], 0x1) accept4$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0x14, 0x0) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r1, 0x0, r3, 0x0, 0x80000001, 0x0) 22:14:35 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) write$binfmt_elf32(r2, 0x0, 0x0) r4 = socket$inet(0x2, 0x3, 0x7f) bind$inet(r3, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) setsockopt$inet_int(r4, 0x0, 0x3, &(0x7f0000000140)=0x7ff, 0x4) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, &(0x7f0000000000)=0x80, 0x4) splice(r1, 0x0, r3, 0x0, 0x10005, 0x0) 22:14:35 executing program 1: bpf$MAP_CREATE(0x0, 0x0, 0x0) accept4$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x0, 0x0, @mcast2}, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgid() ioctl$TIOCGSERIAL(0xffffffffffffffff, 0x541e, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) prctl$PR_SET_SPECULATION_CTRL(0x35, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) sendto$inet6(r0, &(0x7f0000000500)="ce03110075000100ff901efc67195c22cc6dc37916237d8599b512eceb92bd30961166bf00000000070000e19b40b4288ba4e852e8876e977ac94186835a03d045871d6fe30032b46ec4b52a4245f456142304a7821d1c6c8689f4ac12c50cc25534655ee7b237c7a5ba6dcc956757bf80f7146faaefba7f62928a83b54c10bd50c4ea9709367ee58afd37f6f9a0a92decda7d3e5dabe32ba34964ae3278f4c1c443f92eb36c74609cc828c5e2", 0xad, 0x0, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) keyctl$read(0xb, 0x0, &(0x7f00000004c0)=""/8, 0x8) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r1, 0x0) write$P9_RWALK(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="b0"], 0x1) perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) timerfd_create(0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) ioctl$EVIOCSKEYCODE(0xffffffffffffffff, 0x80104592, &(0x7f0000000100)=[0x6, 0x8001]) getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x23, &(0x7f0000000040), &(0x7f00000002c0)=0x4) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) r2 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r2, 0x0, 0x0) r3 = socket$caif_stream(0x25, 0x1, 0x5) close(r3) 22:14:35 executing program 4: creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)='\x00|\f\xbb\xd4\x1aF\x00t\x15\r\x06\xf2\x9a^\xc8\xca\xc8\x1bz\xa7\'\xa9\x8f\x7f\xe1\xb3Y\x026\x16\xf7\xabq9\xc9\x93N\"\xafG\x0e\x8c\x9e>\xba9\xf3\xc6l1\xee1<\xdd0\x99\x18\xc5\xe2<\xcc56\xa4-\xf6i\xe1\x9aNQ(\xb0ek}\xa2\xa2O6\xc5k\xa3F\xf9\xf7b\x1d\xdc\xa4*\xf7', 0x0, 0x0) 22:14:35 executing program 0: 22:14:35 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) writev(r2, &(0x7f0000000200)=[{0x0}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="d6ac7d3f595131008901"], 0xa) close(r3) socket(0x10, 0x3, 0x0) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000180)="580000001400192340834b80040d8c560a", 0x11}], 0x1) writev(r2, &(0x7f0000000600)=[{&(0x7f0000000380)="f98ac693ce6908", 0x7}], 0x1) accept4$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0x14, 0x0) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r1, 0x0, r3, 0x0, 0x80000001, 0x0) 22:14:35 executing program 5: 22:14:35 executing program 0: 22:14:35 executing program 4: creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)='\x00|\f\xbb\xd4\x1aF\x00t\x15\r\x06\xf2\x9a^\xc8\xca\xc8\x1bz\xa7\'\xa9\x8f\x7f\xe1\xb3Y:6\x16\xf7\xabq9\xc9\x93N\"\xafG\x0e\x8c\x9e>\xba9\xf3\xc6l1\xee1<\xdd0\x99\x18\xc5\xe2<\xcc56\xa4-\xf6i\xe1\x9aNQ(\xb0ek}\xa2\xa2O6\xc5k\xa3F\xf9\xf7b\x1d\xdc\xa4*\xf7', 0x0, 0x0) 22:14:35 executing program 5: 22:14:35 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) writev(r2, &(0x7f0000000200)=[{0x0}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="d6ac7d3f595131008901"], 0xa) close(r3) socket(0x10, 0x3, 0x0) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000180)="580000001400192340834b80040d8c560a", 0x11}], 0x1) writev(r2, &(0x7f0000000600)=[{&(0x7f0000000380)="f98ac693ce6908", 0x7}], 0x1) accept4$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0x14, 0x0) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r1, 0x0, r3, 0x0, 0x80000001, 0x0) 22:14:36 executing program 0: 22:14:36 executing program 4: creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)='\x00|\f\xbb\xd4\x1aF\x00t\x15\r\x06\xf2\x9a^\xc8\xca\xc8\x1bz\xa7\'\xa9\x8f\x7f\xe1\xb3Y\x01:\x16\xf7\xabq9\xc9\x93N\"\xafG\x0e\x8c\x9e>\xba9\xf3\xc6l1\xee1<\xdd0\x99\x18\xc5\xe2<\xcc56\xa4-\xf6i\xe1\x9aNQ(\xb0ek}\xa2\xa2O6\xc5k\xa3F\xf9\xf7b\x1d\xdc\xa4*\xf7', 0x0, 0x0) 22:14:36 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) write$binfmt_elf32(r2, 0x0, 0x0) r4 = socket$inet(0x2, 0x3, 0x7f) bind$inet(r3, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) setsockopt$inet_int(r4, 0x0, 0x3, &(0x7f0000000140)=0x7ff, 0x4) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, &(0x7f0000000000)=0x80, 0x4) splice(r1, 0x0, r3, 0x0, 0x10005, 0x0) [ 380.611925][ T7996] device bridge_slave_1 left promiscuous mode [ 380.618227][ T7996] bridge0: port 2(bridge_slave_1) entered disabled state [ 380.673561][ T7996] device bridge_slave_0 left promiscuous mode [ 380.679872][ T7996] bridge0: port 1(bridge_slave_0) entered disabled state [ 381.477374][ T7996] device hsr_slave_0 left promiscuous mode [ 381.521488][ T7996] device hsr_slave_1 left promiscuous mode [ 381.577559][ T7996] team0 (unregistering): Port device team_slave_1 removed [ 381.588708][ T7996] team0 (unregistering): Port device team_slave_0 removed [ 381.598861][ T7996] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 381.655608][ T7996] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 381.734064][ T7996] bond0 (unregistering): Released all slaves [ 381.858606][T11004] IPVS: ftp: loaded support on port[0] = 21 [ 381.913075][T11004] chnl_net:caif_netlink_parms(): no params data found [ 381.939344][T11004] bridge0: port 1(bridge_slave_0) entered blocking state [ 381.946579][T11004] bridge0: port 1(bridge_slave_0) entered disabled state [ 381.954450][T11004] device bridge_slave_0 entered promiscuous mode [ 381.962303][T11004] bridge0: port 2(bridge_slave_1) entered blocking state [ 381.969387][T11004] bridge0: port 2(bridge_slave_1) entered disabled state [ 381.977247][T11004] device bridge_slave_1 entered promiscuous mode [ 382.037626][T11004] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 382.049432][T11004] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 382.075533][T11004] team0: Port device team_slave_0 added [ 382.083759][T11004] team0: Port device team_slave_1 added [ 382.153738][T11004] device hsr_slave_0 entered promiscuous mode [ 382.191659][T11004] device hsr_slave_1 entered promiscuous mode [ 382.271339][T11004] debugfs: Directory 'hsr0' with parent '/' already present! [ 382.291883][T11004] bridge0: port 2(bridge_slave_1) entered blocking state [ 382.298956][T11004] bridge0: port 2(bridge_slave_1) entered forwarding state [ 382.306290][T11004] bridge0: port 1(bridge_slave_0) entered blocking state [ 382.313333][T11004] bridge0: port 1(bridge_slave_0) entered forwarding state [ 382.361181][T11004] 8021q: adding VLAN 0 to HW filter on device bond0 [ 382.378874][ T2405] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 382.390884][ T2405] bridge0: port 1(bridge_slave_0) entered disabled state [ 382.401092][ T2405] bridge0: port 2(bridge_slave_1) entered disabled state [ 382.419446][T11004] 8021q: adding VLAN 0 to HW filter on device team0 [ 382.431533][ T2405] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 382.440075][ T2405] bridge0: port 1(bridge_slave_0) entered blocking state [ 382.447198][ T2405] bridge0: port 1(bridge_slave_0) entered forwarding state [ 382.466210][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 382.475239][ T17] bridge0: port 2(bridge_slave_1) entered blocking state [ 382.482279][ T17] bridge0: port 2(bridge_slave_1) entered forwarding state [ 382.504765][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 382.516541][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 382.527682][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 382.537633][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 382.549893][ T8070] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 382.561198][T11004] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 382.575816][ T2405] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 382.583592][ T2405] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 382.594395][T11004] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 382.790369][T11012] fuse: Bad value for 'fd' 22:14:39 executing program 1: bpf$MAP_CREATE(0x0, 0x0, 0x0) accept4$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x0, 0x0, @mcast2}, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgid() ioctl$TIOCGSERIAL(0xffffffffffffffff, 0x541e, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) prctl$PR_SET_SPECULATION_CTRL(0x35, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) sendto$inet6(r0, &(0x7f0000000500)="ce03110075000100ff901efc67195c22cc6dc37916237d8599b512eceb92bd30961166bf00000000070000e19b40b4288ba4e852e8876e977ac94186835a03d045871d6fe30032b46ec4b52a4245f456142304a7821d1c6c8689f4ac12c50cc25534655ee7b237c7a5ba6dcc956757bf80f7146faaefba7f62928a83b54c10bd50c4ea9709367ee58afd37f6f9a0a92decda7d3e5dabe32ba34964ae3278f4c1c443f92eb36c74609cc828c5e2", 0xad, 0x0, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) keyctl$read(0xb, 0x0, &(0x7f00000004c0)=""/8, 0x8) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r1, 0x0) write$P9_RWALK(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="b0"], 0x1) perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) timerfd_create(0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) ioctl$EVIOCSKEYCODE(0xffffffffffffffff, 0x80104592, &(0x7f0000000100)=[0x6, 0x8001]) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) r2 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r2, 0x0, 0x0) r3 = socket$caif_stream(0x25, 0x1, 0x5) close(r3) 22:14:39 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="d6ac7d3f595131008901"], 0xa) close(r3) socket(0x10, 0x3, 0x0) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000180)="580000001400192340834b80040d8c560a", 0x11}], 0x1) writev(r2, &(0x7f0000000600)=[{&(0x7f0000000380)="f98ac693ce6908", 0x7}], 0x1) accept4$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0x14, 0x0) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r1, 0x0, r3, 0x0, 0x80000001, 0x0) 22:14:39 executing program 5: r0 = socket$inet6(0xa, 0x400000000001, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) 22:14:39 executing program 0: 22:14:39 executing program 4: creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)='\x00|\f\xbb\xd4\x1aF\x00t\x15\r\x06\xf2\x9a^\xc8\xca\xc8\x1bz\xa7\'\xa9\x8f\x7f\xe1\xb3Y\x01\\\x16\xf7\xabq9\xc9\x93N\"\xafG\x0e\x8c\x9e>\xba9\xf3\xc6l1\xee1<\xdd0\x99\x18\xc5\xe2<\xcc56\xa4-\xf6i\xe1\x9aNQ(\xb0ek}\xa2\xa2O6\xc5k\xa3F\xf9\xf7b\x1d\xdc\xa4*\xf7', 0x0, 0x0) 22:14:39 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) write$binfmt_elf32(r2, 0x0, 0x0) r4 = socket$inet(0x2, 0x3, 0x7f) bind$inet(r3, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) setsockopt$inet_int(r4, 0x0, 0x3, &(0x7f0000000140)=0x7ff, 0x4) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, &(0x7f0000000000)=0x80, 0x4) splice(r1, 0x0, r3, 0x0, 0x10005, 0x0) 22:14:39 executing program 0: 22:14:39 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="d6ac7d3f595131008901"], 0xa) close(r3) socket(0x10, 0x3, 0x0) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000180)="580000001400192340834b80040d8c560a", 0x11}], 0x1) writev(r2, &(0x7f0000000600)=[{&(0x7f0000000380)="f98ac693ce6908", 0x7}], 0x1) accept4$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0x14, 0x0) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r1, 0x0, r3, 0x0, 0x80000001, 0x0) 22:14:39 executing program 5: 22:14:39 executing program 4: creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)='\x00|\f\xbb\xd4\x1aF\x00t\x15\r\x06\xf2\x9a^\xc8\xca\xc8\x1bz\xa7\'\xa9\x8f\x7f\xe1\xb3Y\x016:\xf7\xabq9\xc9\x93N\"\xafG\x0e\x8c\x9e>\xba9\xf3\xc6l1\xee1<\xdd0\x99\x18\xc5\xe2<\xcc56\xa4-\xf6i\xe1\x9aNQ(\xb0ek}\xa2\xa2O6\xc5k\xa3F\xf9\xf7b\x1d\xdc\xa4*\xf7', 0x0, 0x0) 22:14:39 executing program 0: 22:14:39 executing program 1: bpf$MAP_CREATE(0x0, 0x0, 0x0) accept4$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x0, 0x0, @mcast2}, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgid() ioctl$TIOCGSERIAL(0xffffffffffffffff, 0x541e, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) prctl$PR_SET_SPECULATION_CTRL(0x35, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) sendto$inet6(r0, &(0x7f0000000500)="ce03110075000100ff901efc67195c22cc6dc37916237d8599b512eceb92bd30961166bf00000000070000e19b40b4288ba4e852e8876e977ac94186835a03d045871d6fe30032b46ec4b52a4245f456142304a7821d1c6c8689f4ac12c50cc25534655ee7b237c7a5ba6dcc956757bf80f7146faaefba7f62928a83b54c10bd50c4ea9709367ee58afd37f6f9a0a92decda7d3e5dabe32ba34964ae3278f4c1c443f92eb36c74609cc828c5e2", 0xad, 0x0, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) keyctl$read(0xb, 0x0, &(0x7f00000004c0)=""/8, 0x8) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r1, 0x0) write$P9_RWALK(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="b0"], 0x1) perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) timerfd_create(0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) ioctl$EVIOCSKEYCODE(0xffffffffffffffff, 0x80104592, &(0x7f0000000100)=[0x6, 0x8001]) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) r2 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r2, 0x0, 0x0) r3 = socket$caif_stream(0x25, 0x1, 0x5) close(r3) 22:14:39 executing program 5: 22:14:39 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="d6ac7d3f595131008901"], 0xa) close(r3) socket(0x10, 0x3, 0x0) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000180)="580000001400192340834b80040d8c560a", 0x11}], 0x1) writev(r2, &(0x7f0000000600)=[{&(0x7f0000000380)="f98ac693ce6908", 0x7}], 0x1) accept4$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0x14, 0x0) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r1, 0x0, r3, 0x0, 0x80000001, 0x0) 22:14:39 executing program 4: creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)='\x00|\f\xbb\xd4\x1aF\x00t\x15\r\x06\xf2\x9a^\xc8\xca\xc8\x1bz\xa7\'\xa9\x8f\x7f\xe1\xb3Y\x016]\xf7\xabq9\xc9\x93N\"\xafG\x0e\x8c\x9e>\xba9\xf3\xc6l1\xee1<\xdd0\x99\x18\xc5\xe2<\xcc56\xa4-\xf6i\xe1\x9aNQ(\xb0ek}\xa2\xa2O6\xc5k\xa3F\xf9\xf7b\x1d\xdc\xa4*\xf7', 0x0, 0x0) 22:14:39 executing program 0: 22:14:40 executing program 1: bpf$MAP_CREATE(0x0, 0x0, 0x0) accept4$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x0, 0x0, @mcast2}, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgid() ioctl$TIOCGSERIAL(0xffffffffffffffff, 0x541e, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) prctl$PR_SET_SPECULATION_CTRL(0x35, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) sendto$inet6(r0, &(0x7f0000000500)="ce03110075000100ff901efc67195c22cc6dc37916237d8599b512eceb92bd30961166bf00000000070000e19b40b4288ba4e852e8876e977ac94186835a03d045871d6fe30032b46ec4b52a4245f456142304a7821d1c6c8689f4ac12c50cc25534655ee7b237c7a5ba6dcc956757bf80f7146faaefba7f62928a83b54c10bd50c4ea9709367ee58afd37f6f9a0a92decda7d3e5dabe32ba34964ae3278f4c1c443f92eb36c74609cc828c5e2", 0xad, 0x0, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) keyctl$read(0xb, 0x0, &(0x7f00000004c0)=""/8, 0x8) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r1, 0x0) write$P9_RWALK(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="b0"], 0x1) perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) timerfd_create(0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) ioctl$EVIOCSKEYCODE(0xffffffffffffffff, 0x80104592, &(0x7f0000000100)=[0x6, 0x8001]) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) r2 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r2, 0x0, 0x0) r3 = socket$caif_stream(0x25, 0x1, 0x5) close(r3) 22:14:40 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) write$binfmt_elf32(r2, &(0x7f00000007c0)=ANY=[], 0x0) r4 = socket$inet(0x2, 0x3, 0x7f) bind$inet(r3, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) setsockopt$inet_int(r4, 0x0, 0x3, &(0x7f0000000140)=0x7ff, 0x4) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, &(0x7f0000000000)=0x80, 0x4) splice(r1, 0x0, r3, 0x0, 0x10005, 0x0) 22:14:40 executing program 5: 22:14:40 executing program 0: 22:14:40 executing program 4: creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)='\x00|\f\xbb\xd4\x1aF\x00t\x15\r\x06\xf2\x9a^\xc8\xca\xc8\x1bz\xa7\'\xa9\x8f\x7f\xe1\xb3Y\x016\x16\xf7\xabq:\xc9\x93N\"\xafG\x0e\x8c\x9e>\xba9\xf3\xc6l1\xee1<\xdd0\x99\x18\xc5\xe2<\xcc56\xa4-\xf6i\xe1\x9aNQ(\xb0ek}\xa2\xa2O6\xc5k\xa3F\xf9\xf7b\x1d\xdc\xa4*\xf7', 0x0, 0x0) 22:14:40 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)='X\x00\x00\x00', 0x4}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="d6ac7d3f595131008901"], 0xa) close(r3) socket(0x10, 0x3, 0x0) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000180)="580000001400192340834b80040d8c560a", 0x11}], 0x1) writev(r2, &(0x7f0000000600)=[{&(0x7f0000000380)="f98ac693ce6908", 0x7}], 0x1) accept4$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0x14, 0x0) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r1, 0x0, r3, 0x0, 0x80000001, 0x0) 22:14:40 executing program 5: 22:14:40 executing program 0: 22:14:40 executing program 4: creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)='\x00|\f\xbb\xd4\x1aF\x00t\x15\r\x06\xf2\x9a^\xc8\xca\xc8\x1bz\xa7\'\xa9\x8f\x7f\xe1\xb3Y\x016\x16\xf7\xabq\\\xc9\x93N\"\xafG\x0e\x8c\x9e>\xba9\xf3\xc6l1\xee1<\xdd0\x99\x18\xc5\xe2<\xcc56\xa4-\xf6i\xe1\x9aNQ(\xb0ek}\xa2\xa2O6\xc5k\xa3F\xf9\xf7b\x1d\xdc\xa4*\xf7', 0x0, 0x0) 22:14:40 executing program 5: 22:14:40 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)='X\x00\x00\x00', 0x4}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="d6ac7d3f595131008901"], 0xa) close(r3) socket(0x10, 0x3, 0x0) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000180)="580000001400192340834b80040d8c560a", 0x11}], 0x1) writev(r2, &(0x7f0000000600)=[{&(0x7f0000000380)="f98ac693ce6908", 0x7}], 0x1) accept4$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0x14, 0x0) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r1, 0x0, r3, 0x0, 0x80000001, 0x0) 22:14:41 executing program 0: [ 385.401924][ T28] device bridge_slave_1 left promiscuous mode [ 385.408156][ T28] bridge0: port 2(bridge_slave_1) entered disabled state [ 385.472100][ T28] device bridge_slave_0 left promiscuous mode [ 385.478248][ T28] bridge0: port 1(bridge_slave_0) entered disabled state [ 386.221597][ T28] device hsr_slave_0 left promiscuous mode [ 386.311479][ T28] device hsr_slave_1 left promiscuous mode [ 386.378210][ T28] team0 (unregistering): Port device team_slave_1 removed [ 386.388809][ T28] team0 (unregistering): Port device team_slave_0 removed [ 386.399170][ T28] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 386.424554][ T28] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 386.514107][ T28] bond0 (unregistering): Released all slaves [ 386.639252][T11596] IPVS: ftp: loaded support on port[0] = 21 [ 386.694499][T11596] chnl_net:caif_netlink_parms(): no params data found [ 386.721371][T11596] bridge0: port 1(bridge_slave_0) entered blocking state [ 386.728449][T11596] bridge0: port 1(bridge_slave_0) entered disabled state [ 386.736294][T11596] device bridge_slave_0 entered promiscuous mode [ 386.743600][T11596] bridge0: port 2(bridge_slave_1) entered blocking state [ 386.750648][T11596] bridge0: port 2(bridge_slave_1) entered disabled state [ 386.758405][T11596] device bridge_slave_1 entered promiscuous mode [ 386.833266][T11596] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 386.848269][T11596] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 386.872693][T11596] team0: Port device team_slave_0 added [ 386.879853][T11596] team0: Port device team_slave_1 added [ 386.968342][T11596] device hsr_slave_0 entered promiscuous mode [ 387.011694][T11596] device hsr_slave_1 entered promiscuous mode [ 387.085862][T11596] debugfs: Directory 'hsr0' with parent '/' already present! [ 387.106074][T11596] bridge0: port 2(bridge_slave_1) entered blocking state [ 387.113200][T11596] bridge0: port 2(bridge_slave_1) entered forwarding state [ 387.120459][T11596] bridge0: port 1(bridge_slave_0) entered blocking state [ 387.127575][T11596] bridge0: port 1(bridge_slave_0) entered forwarding state [ 387.178171][T11596] 8021q: adding VLAN 0 to HW filter on device bond0 [ 387.191908][ T2405] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 387.205100][ T2405] bridge0: port 1(bridge_slave_0) entered disabled state [ 387.214598][ T2405] bridge0: port 2(bridge_slave_1) entered disabled state [ 387.232923][T11596] 8021q: adding VLAN 0 to HW filter on device team0 [ 387.248852][ T7980] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 387.257857][ T7980] bridge0: port 1(bridge_slave_0) entered blocking state [ 387.264922][ T7980] bridge0: port 1(bridge_slave_0) entered forwarding state [ 387.281685][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 387.290260][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 387.297322][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 387.331335][ T8029] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 387.340395][ T8029] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 387.352201][ T8029] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 387.360867][ T8029] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 387.375591][T11596] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 387.386791][T11596] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 387.395032][ T8029] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 387.413559][T11596] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 387.421998][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 387.429433][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 387.581909][T11605] fuse: Bad value for 'fd' 22:14:44 executing program 4: creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)='\x00|\f\xbb\xd4\x1aF\x00t\x15\r\x06\xf2\x9a^\xc8\xca\xc8\x1bz\xa7\'\xa9\x8f\x7f\xe1\xb3Y\x016\x16\xf7\xabq9\xc9\x93]\"\xafG\x0e\x8c\x9e>\xba9\xf3\xc6l1\xee1<\xdd0\x99\x18\xc5\xe2<\xcc56\xa4-\xf6i\xe1\x9aNQ(\xb0ek}\xa2\xa2O6\xc5k\xa3F\xf9\xf7b\x1d\xdc\xa4*\xf7', 0x0, 0x0) 22:14:44 executing program 5: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = open(&(0x7f0000000440)='./file0\x00', 0x110000141042, 0x0) ftruncate(r4, 0x10099b7) sendfile(r0, r4, 0x0, 0x3) 22:14:44 executing program 0: r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f00000001c0)) ioctl$EXT4_IOC_MIGRATE(r0, 0x6609) 22:14:44 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)='X\x00\x00\x00', 0x4}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="d6ac7d3f595131008901"], 0xa) close(r3) socket(0x10, 0x3, 0x0) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000180)="580000001400192340834b80040d8c560a", 0x11}], 0x1) writev(r2, &(0x7f0000000600)=[{&(0x7f0000000380)="f98ac693ce6908", 0x7}], 0x1) accept4$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0x14, 0x0) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r1, 0x0, r3, 0x0, 0x80000001, 0x0) 22:14:44 executing program 1: bpf$MAP_CREATE(0x0, 0x0, 0x0) accept4$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x0, 0x0, @mcast2}, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgid() ioctl$TIOCGSERIAL(0xffffffffffffffff, 0x541e, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) prctl$PR_SET_SPECULATION_CTRL(0x35, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) sendto$inet6(r0, &(0x7f0000000500)="ce03110075000100ff901efc67195c22cc6dc37916237d8599b512eceb92bd30961166bf00000000070000e19b40b4288ba4e852e8876e977ac94186835a03d045871d6fe30032b46ec4b52a4245f456142304a7821d1c6c8689f4ac12c50cc25534655ee7b237c7a5ba6dcc956757bf80f7146faaefba7f62928a83b54c10bd50c4ea9709367ee58afd37f6f9a0a92decda7d3e5dabe32ba34964ae3278f4c1c443f92eb36c74609cc828c5e2", 0xad, 0x0, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) keyctl$read(0xb, 0x0, &(0x7f00000004c0)=""/8, 0x8) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r1, 0x0) write$P9_RWALK(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="b0"], 0x1) perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) timerfd_create(0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x23, &(0x7f0000000040), &(0x7f00000002c0)=0x4) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) r2 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r2, 0x0, 0x0) r3 = socket$caif_stream(0x25, 0x1, 0x5) close(r3) 22:14:44 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) write$binfmt_elf32(r2, &(0x7f00000007c0)=ANY=[], 0x0) r4 = socket$inet(0x2, 0x3, 0x7f) bind$inet(r3, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) setsockopt$inet_int(r4, 0x0, 0x3, &(0x7f0000000140)=0x7ff, 0x4) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, &(0x7f0000000000)=0x80, 0x4) splice(r1, 0x0, r3, 0x0, 0x10005, 0x0) [ 387.827838][T11607] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 22:14:44 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400", 0x6}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="d6ac7d3f595131008901"], 0xa) close(r3) socket(0x10, 0x3, 0x0) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000180)="580000001400192340834b80040d8c560a", 0x11}], 0x1) writev(r2, &(0x7f0000000600)=[{&(0x7f0000000380)="f98ac693ce6908", 0x7}], 0x1) accept4$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0x14, 0x0) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r1, 0x0, r3, 0x0, 0x80000001, 0x0) [ 387.890092][ T26] audit: type=1800 audit(1572905684.244:47): pid=11607 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.5" name="file0" dev="sda1" ino=16886 res=0 22:14:44 executing program 0: r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f00000001c0)) ioctl$EXT4_IOC_MIGRATE(r0, 0x6609) 22:14:44 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x10000, 0x0) ioctl$KVM_GET_VCPU_EVENTS(0xffffffffffffffff, 0x8040ae9f, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='oom_score\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcs\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x1a0, 0x0) 22:14:44 executing program 4: creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)='\x00|\f\xbb\xd4\x1aF\x00t\x15\r\x06\xf2\x9a^\xc8\xca\xc8\x1bz\xa7\'\xa9\x8f\x7f\xe1\xb3Y\x016\x16\xf7\xabq9\xc9\x93N\a\xafG\x0e\x8c\x9e>\xba9\xf3\xc6l1\xee1<\xdd0\x99\x18\xc5\xe2<\xcc56\xa4-\xf6i\xe1\x9aNQ(\xb0ek}\xa2\xa2O6\xc5k\xa3F\xf9\xf7b\x1d\xdc\xa4*\xf7', 0x0, 0x0) 22:14:44 executing program 1: bpf$MAP_CREATE(0x0, 0x0, 0x0) accept4$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x0, 0x0, @mcast2}, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgid() ioctl$TIOCGSERIAL(0xffffffffffffffff, 0x541e, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) prctl$PR_SET_SPECULATION_CTRL(0x35, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) sendto$inet6(r0, &(0x7f0000000500)="ce03110075000100ff901efc67195c22cc6dc37916237d8599b512eceb92bd30961166bf00000000070000e19b40b4288ba4e852e8876e977ac94186835a03d045871d6fe30032b46ec4b52a4245f456142304a7821d1c6c8689f4ac12c50cc25534655ee7b237c7a5ba6dcc956757bf80f7146faaefba7f62928a83b54c10bd50c4ea9709367ee58afd37f6f9a0a92decda7d3e5dabe32ba34964ae3278f4c1c443f92eb36c74609cc828c5e2", 0xad, 0x0, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) keyctl$read(0xb, 0x0, &(0x7f00000004c0)=""/8, 0x8) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r1, 0x0) write$P9_RWALK(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="b0"], 0x1) perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) timerfd_create(0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x23, &(0x7f0000000040), &(0x7f00000002c0)=0x4) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) r2 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r2, 0x0, 0x0) r3 = socket$caif_stream(0x25, 0x1, 0x5) close(r3) 22:14:44 executing program 0: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) utimensat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x0) 22:14:44 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400", 0x6}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="d6ac7d3f595131008901"], 0xa) close(r3) socket(0x10, 0x3, 0x0) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000180)="580000001400192340834b80040d8c560a", 0x11}], 0x1) writev(r2, &(0x7f0000000600)=[{&(0x7f0000000380)="f98ac693ce6908", 0x7}], 0x1) accept4$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0x14, 0x0) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r1, 0x0, r3, 0x0, 0x80000001, 0x0) 22:14:44 executing program 0: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) utimensat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x0) 22:14:44 executing program 1: bpf$MAP_CREATE(0x0, 0x0, 0x0) accept4$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x0, 0x0, @mcast2}, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgid() ioctl$TIOCGSERIAL(0xffffffffffffffff, 0x541e, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) prctl$PR_SET_SPECULATION_CTRL(0x35, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) sendto$inet6(r0, &(0x7f0000000500)="ce03110075000100ff901efc67195c22cc6dc37916237d8599b512eceb92bd30961166bf00000000070000e19b40b4288ba4e852e8876e977ac94186835a03d045871d6fe30032b46ec4b52a4245f456142304a7821d1c6c8689f4ac12c50cc25534655ee7b237c7a5ba6dcc956757bf80f7146faaefba7f62928a83b54c10bd50c4ea9709367ee58afd37f6f9a0a92decda7d3e5dabe32ba34964ae3278f4c1c443f92eb36c74609cc828c5e2", 0xad, 0x0, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) keyctl$read(0xb, 0x0, &(0x7f00000004c0)=""/8, 0x8) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r1, 0x0) write$P9_RWALK(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="b0"], 0x1) perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) timerfd_create(0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x23, &(0x7f0000000040), &(0x7f00000002c0)=0x4) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) r2 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r2, 0x0, 0x0) r3 = socket$caif_stream(0x25, 0x1, 0x5) close(r3) 22:14:44 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x10000, 0x0) ioctl$KVM_GET_VCPU_EVENTS(0xffffffffffffffff, 0x8040ae9f, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='oom_score\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcs\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x1a0, 0x0) 22:14:44 executing program 4: creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)='\x00|\f\xbb\xd4\x1aF\x00t\x15\r\x06\xf2\x9a^\xc8\xca\xc8\x1bz\xa7\'\xa9\x8f\x7f\xe1\xb3Y\x016\x16\xf7\xabq9\xc9\x93N:\xafG\x0e\x8c\x9e>\xba9\xf3\xc6l1\xee1<\xdd0\x99\x18\xc5\xe2<\xcc56\xa4-\xf6i\xe1\x9aNQ(\xb0ek}\xa2\xa2O6\xc5k\xa3F\xf9\xf7b\x1d\xdc\xa4*\xf7', 0x0, 0x0) 22:14:45 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) write$binfmt_elf32(r2, &(0x7f00000007c0)=ANY=[], 0x0) r4 = socket$inet(0x2, 0x3, 0x7f) bind$inet(r3, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) setsockopt$inet_int(r4, 0x0, 0x3, &(0x7f0000000140)=0x7ff, 0x4) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, &(0x7f0000000000)=0x80, 0x4) splice(r1, 0x0, r3, 0x0, 0x10005, 0x0) 22:14:45 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400", 0x6}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="d6ac7d3f595131008901"], 0xa) close(r3) socket(0x10, 0x3, 0x0) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000180)="580000001400192340834b80040d8c560a", 0x11}], 0x1) writev(r2, &(0x7f0000000600)=[{&(0x7f0000000380)="f98ac693ce6908", 0x7}], 0x1) accept4$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0x14, 0x0) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r1, 0x0, r3, 0x0, 0x80000001, 0x0) 22:14:45 executing program 0: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@index_on='index=on'}], [], 0xf603000000000000}) 22:14:45 executing program 4: creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)='\x00|\f\xbb\xd4\x1aF\x00t\x15\r\x06\xf2\x9a^\xc8\xca\xc8\x1bz\xa7\'\xa9\x8f\x7f\xe1\xb3Y\x016\x16\xf7\xabq9\xc9\x93N\"\xafG:\x8c\x9e>\xba9\xf3\xc6l1\xee1<\xdd0\x99\x18\xc5\xe2<\xcc56\xa4-\xf6i\xe1\x9aNQ(\xb0ek}\xa2\xa2O6\xc5k\xa3F\xf9\xf7b\x1d\xdc\xa4*\xf7', 0x0, 0x0) [ 389.016296][T11966] overlayfs: missing 'lowerdir' 22:14:45 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000640)={0x2, 0x0, @loopback}, 0x10) sendmmsg$inet(r0, &(0x7f0000000b00)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0) 22:14:45 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="d6ac7d3f595131008901"], 0xa) close(r3) socket(0x10, 0x3, 0x0) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000180)="580000001400192340834b80040d8c560a", 0x11}], 0x1) writev(r2, &(0x7f0000000600)=[{&(0x7f0000000380)="f98ac693ce6908", 0x7}], 0x1) accept4$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0x14, 0x0) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r1, 0x0, r3, 0x0, 0x80000001, 0x0) 22:14:45 executing program 0: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@index_on='index=on'}], [], 0xf603000000000000}) 22:14:45 executing program 5: clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) ioctl$KVM_SIGNAL_MSI(0xffffffffffffffff, 0x4020aea5, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getegid() getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x3, r2}]]}}}]}, 0x38}}, 0x0) 22:14:45 executing program 4: creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)='\x00|\f\xbb\xd4\x1aF\x00t\x15\r\x06\xf2\x9a^\xc8\xca\xc8\x1bz\xa7\'\xa9\x8f\x7f\xe1\xb3Y\x016\x16\xf7\xabq9\xc9\x93N\"\xafG]\x8c\x9e>\xba9\xf3\xc6l1\xee1<\xdd0\x99\x18\xc5\xe2<\xcc56\xa4-\xf6i\xe1\x9aNQ(\xb0ek}\xa2\xa2O6\xc5k\xa3F\xf9\xf7b\x1d\xdc\xa4*\xf7', 0x0, 0x0) [ 389.578935][T12092] overlayfs: missing 'lowerdir' [ 390.182081][ T9297] device bridge_slave_1 left promiscuous mode [ 390.188347][ T9297] bridge0: port 2(bridge_slave_1) entered disabled state [ 390.242202][ T9297] device bridge_slave_0 left promiscuous mode [ 390.248428][ T9297] bridge0: port 1(bridge_slave_0) entered disabled state [ 390.991603][ T9297] device hsr_slave_0 left promiscuous mode [ 391.041492][ T9297] device hsr_slave_1 left promiscuous mode [ 391.093512][ T9297] team0 (unregistering): Port device team_slave_1 removed [ 391.109704][ T9297] team0 (unregistering): Port device team_slave_0 removed [ 391.120157][ T9297] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 391.165493][ T9297] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 391.264287][ T9297] bond0 (unregistering): Released all slaves [ 391.358483][T12202] IPVS: ftp: loaded support on port[0] = 21 [ 391.412725][T12202] chnl_net:caif_netlink_parms(): no params data found [ 391.440810][T12202] bridge0: port 1(bridge_slave_0) entered blocking state [ 391.448161][T12202] bridge0: port 1(bridge_slave_0) entered disabled state [ 391.456104][T12202] device bridge_slave_0 entered promiscuous mode [ 391.511487][T12202] bridge0: port 2(bridge_slave_1) entered blocking state [ 391.518591][T12202] bridge0: port 2(bridge_slave_1) entered disabled state [ 391.530420][T12202] device bridge_slave_1 entered promiscuous mode [ 391.554020][T12202] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 391.568622][T12202] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 391.593127][T12202] team0: Port device team_slave_0 added [ 391.599874][T12202] team0: Port device team_slave_1 added [ 391.673795][T12202] device hsr_slave_0 entered promiscuous mode [ 391.731654][T12202] device hsr_slave_1 entered promiscuous mode [ 391.791358][T12202] debugfs: Directory 'hsr0' with parent '/' already present! [ 391.811978][T12202] bridge0: port 2(bridge_slave_1) entered blocking state [ 391.819062][T12202] bridge0: port 2(bridge_slave_1) entered forwarding state [ 391.826355][T12202] bridge0: port 1(bridge_slave_0) entered blocking state [ 391.833432][T12202] bridge0: port 1(bridge_slave_0) entered forwarding state [ 391.881084][T12202] 8021q: adding VLAN 0 to HW filter on device bond0 [ 391.899087][ T7980] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 391.913382][ T7980] bridge0: port 1(bridge_slave_0) entered disabled state [ 391.925180][ T7980] bridge0: port 2(bridge_slave_1) entered disabled state [ 391.940082][T12202] 8021q: adding VLAN 0 to HW filter on device team0 [ 391.956222][ T7980] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 391.967130][ T7980] bridge0: port 1(bridge_slave_0) entered blocking state [ 391.974255][ T7980] bridge0: port 1(bridge_slave_0) entered forwarding state [ 391.989216][ T8029] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 391.998670][ T8029] bridge0: port 2(bridge_slave_1) entered blocking state [ 392.005719][ T8029] bridge0: port 2(bridge_slave_1) entered forwarding state [ 392.030698][T12202] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 392.041472][T12202] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 392.055294][T12204] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 392.064729][T12204] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 392.073806][T12204] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 392.082725][T12204] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 392.101669][T12202] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 392.110534][T12204] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 392.118420][T12204] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 392.126218][T12204] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 392.134726][T12204] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 392.276725][T12210] fuse: Bad value for 'fd' 22:14:48 executing program 1: bpf$MAP_CREATE(0x0, 0x0, 0x0) accept4$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x0, 0x0, @mcast2}, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgid() ioctl$TIOCGSERIAL(0xffffffffffffffff, 0x541e, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) prctl$PR_SET_SPECULATION_CTRL(0x35, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) sendto$inet6(r0, &(0x7f0000000500)="ce03110075000100ff901efc67195c22cc6dc37916237d8599b512eceb92bd30961166bf00000000070000e19b40b4288ba4e852e8876e977ac94186835a03d045871d6fe30032b46ec4b52a4245f456142304a7821d1c6c8689f4ac12c50cc25534655ee7b237c7a5ba6dcc956757bf80f7146faaefba7f62928a83b54c10bd50c4ea9709367ee58afd37f6f9a0a92decda7d3e5dabe32ba34964ae3278f4c1c443f92eb36c74609cc828c5e2", 0xad, 0x0, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) keyctl$read(0xb, 0x0, &(0x7f00000004c0)=""/8, 0x8) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r1, 0x0) write$P9_RWALK(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="b0"], 0x1) perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) timerfd_create(0x0, 0x0) getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x23, &(0x7f0000000040), &(0x7f00000002c0)=0x4) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) r2 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r2, 0x0, 0x0) r3 = socket$caif_stream(0x25, 0x1, 0x5) close(r3) 22:14:48 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0xa, r2}]]}}}]}, 0x38}}, 0x0) 22:14:48 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="d6ac7d3f595131008901"], 0xa) close(r3) socket(0x10, 0x3, 0x0) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000180)="580000001400192340834b80040d8c560a", 0x11}], 0x1) writev(r2, &(0x7f0000000600)=[{&(0x7f0000000380)="f98ac693ce6908", 0x7}], 0x1) accept4$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0x14, 0x0) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r1, 0x0, r3, 0x0, 0x80000001, 0x0) 22:14:48 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) write$binfmt_elf32(r2, &(0x7f00000007c0)=ANY=[@ANYBLOB], 0x0) r4 = socket$inet(0x2, 0x3, 0x7f) bind$inet(r3, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) setsockopt$inet_int(r4, 0x0, 0x3, &(0x7f0000000140)=0x7ff, 0x4) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, &(0x7f0000000000)=0x80, 0x4) splice(r1, 0x0, r3, 0x0, 0x10005, 0x0) 22:14:48 executing program 0: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) utimensat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) 22:14:48 executing program 4: creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)='\x00|\f\xbb\xd4\x1aF\x00t\x15\r\x06\xf2\x9a^\xc8\xca\xc8\x1bz\xa7\'\xa9\x8f\x7f\xe1\xb3Y\x016\x16\xf7\xabq9\xc9\x93N\"\xafG\x0e\x8c\x9e>\xba:\xf3\xc6l1\xee1<\xdd0\x99\x18\xc5\xe2<\xcc56\xa4-\xf6i\xe1\x9aNQ(\xb0ek}\xa2\xa2O6\xc5k\xa3F\xf9\xf7b\x1d\xdc\xa4*\xf7', 0x0, 0x0) [ 392.528635][T12216] netlink: 'syz-executor.5': attribute type 10 has an invalid length. [ 392.563282][T12222] netlink: 'syz-executor.5': attribute type 10 has an invalid length. 22:14:48 executing program 0: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x7ffffffffffd, 0x11c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x8, 0x10, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f00000000c0)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r1, 0x0, 0xfffffffffffffff8, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendto$inet(r1, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0x9000000) 22:14:49 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="d6ac7d3f595131008901"], 0xa) close(r3) socket(0x10, 0x3, 0x0) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000180)="580000001400192340834b80040d8c560a", 0x11}], 0x1) writev(r2, &(0x7f0000000600)=[{&(0x7f0000000380)="f98ac693ce6908", 0x7}], 0x1) accept4$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0x14, 0x0) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r1, 0x0, r3, 0x0, 0x80000001, 0x0) 22:14:49 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_VAPIC_ADDR(r2, 0x4008ae93, &(0x7f0000000000)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 22:14:49 executing program 4: creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)='\x00|\f\xbb\xd4\x1aF\x00t\x15\r\x06\xf2\x9a^\xc8\xca\xc8\x1bz\xa7\'\xa9\x8f\x7f\xe1\xb3Y\x016\x16\xf7\xabq9\xc9\x93N\"\xafG\x0e\x8c\x9e>\xba\\\xf3\xc6l1\xee1<\xdd0\x99\x18\xc5\xe2<\xcc56\xa4-\xf6i\xe1\x9aNQ(\xb0ek}\xa2\xa2O6\xc5k\xa3F\xf9\xf7b\x1d\xdc\xa4*\xf7', 0x0, 0x0) 22:14:49 executing program 1: bpf$MAP_CREATE(0x0, 0x0, 0x0) accept4$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x0, 0x0, @mcast2}, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgid() ioctl$TIOCGSERIAL(0xffffffffffffffff, 0x541e, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) prctl$PR_SET_SPECULATION_CTRL(0x35, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) sendto$inet6(r0, &(0x7f0000000500)="ce03110075000100ff901efc67195c22cc6dc37916237d8599b512eceb92bd30961166bf00000000070000e19b40b4288ba4e852e8876e977ac94186835a03d045871d6fe30032b46ec4b52a4245f456142304a7821d1c6c8689f4ac12c50cc25534655ee7b237c7a5ba6dcc956757bf80f7146faaefba7f62928a83b54c10bd50c4ea9709367ee58afd37f6f9a0a92decda7d3e5dabe32ba34964ae3278f4c1c443f92eb36c74609cc828c5e2", 0xad, 0x0, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) keyctl$read(0xb, 0x0, &(0x7f00000004c0)=""/8, 0x8) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r1, 0x0) write$P9_RWALK(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="b0"], 0x1) perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) timerfd_create(0x0, 0x0) getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x23, &(0x7f0000000040), &(0x7f00000002c0)=0x4) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) r2 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r2, 0x0, 0x0) r3 = socket$caif_stream(0x25, 0x1, 0x5) close(r3) 22:14:49 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, 0x0, 0x0) close(r3) socket(0x10, 0x3, 0x0) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000180)="580000001400192340834b80040d8c560a", 0x11}], 0x1) writev(r2, &(0x7f0000000600)=[{&(0x7f0000000380)="f98ac693ce6908", 0x7}], 0x1) accept4$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0x14, 0x0) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r1, 0x0, r3, 0x0, 0x80000001, 0x0) 22:14:49 executing program 5: clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) pipe(0x0) ioctl$KVM_SIGNAL_MSI(0xffffffffffffffff, 0x4020aea5, &(0x7f00000000c0)={0x100000, 0x0, 0x3}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_bp={0x0}, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x200000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) epoll_create1(0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x880) getegid() getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x3, r2}]]}}}]}, 0x38}}, 0x0) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000000), 0x0) 22:14:49 executing program 1: bpf$MAP_CREATE(0x0, 0x0, 0x0) accept4$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x0, 0x0, @mcast2}, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgid() ioctl$TIOCGSERIAL(0xffffffffffffffff, 0x541e, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) prctl$PR_SET_SPECULATION_CTRL(0x35, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) sendto$inet6(r0, &(0x7f0000000500)="ce03110075000100ff901efc67195c22cc6dc37916237d8599b512eceb92bd30961166bf00000000070000e19b40b4288ba4e852e8876e977ac94186835a03d045871d6fe30032b46ec4b52a4245f456142304a7821d1c6c8689f4ac12c50cc25534655ee7b237c7a5ba6dcc956757bf80f7146faaefba7f62928a83b54c10bd50c4ea9709367ee58afd37f6f9a0a92decda7d3e5dabe32ba34964ae3278f4c1c443f92eb36c74609cc828c5e2", 0xad, 0x0, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) keyctl$read(0xb, 0x0, &(0x7f00000004c0)=""/8, 0x8) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r1, 0x0) write$P9_RWALK(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="b0"], 0x1) perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) timerfd_create(0x0, 0x0) getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x23, &(0x7f0000000040), &(0x7f00000002c0)=0x4) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) r2 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r2, 0x0, 0x0) r3 = socket$caif_stream(0x25, 0x1, 0x5) close(r3) 22:14:49 executing program 4: creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)='\x00|\f\xbb\xd4\x1aF\x00t\x15\r\x06\xf2\x9a^\xc8\xca\xc8\x1bz\xa7\'\xa9\x8f\x7f\xe1\xb3Y\x016\x16\xf7\xabq9\xc9\x93N\"\xafG\x0e\x8c\x9e>\xba9\xf3\xc6\\1\xee1<\xdd0\x99\x18\xc5\xe2<\xcc56\xa4-\xf6i\xe1\x9aNQ(\xb0ek}\xa2\xa2O6\xc5k\xa3F\xf9\xf7b\x1d\xdc\xa4*\xf7', 0x0, 0x0) 22:14:49 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) write$binfmt_elf32(r2, &(0x7f00000007c0)=ANY=[@ANYBLOB], 0x0) r4 = socket$inet(0x2, 0x3, 0x7f) bind$inet(r3, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) setsockopt$inet_int(r4, 0x0, 0x3, &(0x7f0000000140)=0x7ff, 0x4) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, &(0x7f0000000000)=0x80, 0x4) splice(r1, 0x0, r3, 0x0, 0x10005, 0x0) 22:14:49 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, 0x0, 0x0) close(r3) socket(0x10, 0x3, 0x0) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000180)="580000001400192340834b80040d8c560a", 0x11}], 0x1) writev(r2, &(0x7f0000000600)=[{&(0x7f0000000380)="f98ac693ce6908", 0x7}], 0x1) accept4$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0x14, 0x0) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r1, 0x0, r3, 0x0, 0x80000001, 0x0) 22:14:49 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x8}]]}}}]}, 0x38}}, 0x0) [ 393.629176][T12562] netlink: 'syz-executor.5': attribute type 8 has an invalid length. 22:14:50 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f00000000c0)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x64}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r1, 0x1800000000000060, 0xcc0, 0x0, &(0x7f0000000000)="b90703e6680d698cb89e15f02cea", 0x0, 0x100}, 0x28) 22:14:50 executing program 4: creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)='\x00|\f\xbb\xd4\x1aF\x00t\x15\r\x06\xf2\x9a^\xc8\xca\xc8\x1bz\xa7\'\xa9\x8f\x7f\xe1\xb3Y\x016\x16\xf7\xabq9\xc9\x93N\"\xafG\x0e\x8c\x9e>\xba9\xf3\xc6l:\xee1<\xdd0\x99\x18\xc5\xe2<\xcc56\xa4-\xf6i\xe1\x9aNQ(\xb0ek}\xa2\xa2O6\xc5k\xa3F\xf9\xf7b\x1d\xdc\xa4*\xf7', 0x0, 0x0) 22:14:50 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, 0x0, 0x0) close(r3) socket(0x10, 0x3, 0x0) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000180)="580000001400192340834b80040d8c560a", 0x11}], 0x1) writev(r2, &(0x7f0000000600)=[{&(0x7f0000000380)="f98ac693ce6908", 0x7}], 0x1) accept4$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0x14, 0x0) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r1, 0x0, r3, 0x0, 0x80000001, 0x0) 22:14:50 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000640)={0x2, 0x0, @loopback}, 0x10) sendmmsg$inet(r0, &(0x7f0000000b00)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @dev, @dev}}}], 0x20}}], 0x2, 0x0) 22:14:50 executing program 5: clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) ioctl$KVM_SIGNAL_MSI(0xffffffffffffffff, 0x4020aea5, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x20008001}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x3, r2}]]}}}]}, 0x38}}, 0x0) write(0xffffffffffffffff, 0x0, 0x0) 22:14:50 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000040)=ANY=[], 0x0) close(r3) socket(0x10, 0x3, 0x0) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000180)="580000001400192340834b80040d8c560a", 0x11}], 0x1) writev(r2, &(0x7f0000000600)=[{&(0x7f0000000380)="f98ac693ce6908", 0x7}], 0x1) accept4$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0x14, 0x0) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r1, 0x0, r3, 0x0, 0x80000001, 0x0) 22:14:50 executing program 4: creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)='\x00|\f\xbb\xd4\x1aF\x00t\x15\r\x06\xf2\x9a^\xc8\xca\xc8\x1bz\xa7\'\xa9\x8f\x7f\xe1\xb3Y\x016\x16\xf7\xabq9\xc9\x93N\"\xafG\x0e\x8c\x9e>\xba9\xf3\xc6l\\\xee1<\xdd0\x99\x18\xc5\xe2<\xcc56\xa4-\xf6i\xe1\x9aNQ(\xb0ek}\xa2\xa2O6\xc5k\xa3F\xf9\xf7b\x1d\xdc\xa4*\xf7', 0x0, 0x0) [ 394.801719][ T9056] device bridge_slave_1 left promiscuous mode [ 394.808004][ T9056] bridge0: port 2(bridge_slave_1) entered disabled state [ 394.852227][ T9056] device bridge_slave_0 left promiscuous mode [ 394.858455][ T9056] bridge0: port 1(bridge_slave_0) entered disabled state [ 395.601590][ T9056] device hsr_slave_0 left promiscuous mode [ 395.651513][ T9056] device hsr_slave_1 left promiscuous mode [ 395.698440][ T9056] team0 (unregistering): Port device team_slave_1 removed [ 395.709836][ T9056] team0 (unregistering): Port device team_slave_0 removed [ 395.721754][ T9056] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 395.765770][ T9056] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 395.864089][ T9056] bond0 (unregistering): Released all slaves [ 395.978048][T12807] IPVS: ftp: loaded support on port[0] = 21 [ 396.030528][T12807] chnl_net:caif_netlink_parms(): no params data found [ 396.059406][T12807] bridge0: port 1(bridge_slave_0) entered blocking state [ 396.066630][T12807] bridge0: port 1(bridge_slave_0) entered disabled state [ 396.074483][T12807] device bridge_slave_0 entered promiscuous mode [ 396.082008][T12807] bridge0: port 2(bridge_slave_1) entered blocking state [ 396.089142][T12807] bridge0: port 2(bridge_slave_1) entered disabled state [ 396.097053][T12807] device bridge_slave_1 entered promiscuous mode [ 396.114110][T12807] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 396.124731][T12807] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 396.144266][T12807] team0: Port device team_slave_0 added [ 396.151036][T12807] team0: Port device team_slave_1 added [ 396.284497][T12807] device hsr_slave_0 entered promiscuous mode [ 396.341787][T12807] device hsr_slave_1 entered promiscuous mode [ 396.391708][T12807] debugfs: Directory 'hsr0' with parent '/' already present! [ 396.412830][T12807] bridge0: port 2(bridge_slave_1) entered blocking state [ 396.419955][T12807] bridge0: port 2(bridge_slave_1) entered forwarding state [ 396.427276][T12807] bridge0: port 1(bridge_slave_0) entered blocking state [ 396.434378][T12807] bridge0: port 1(bridge_slave_0) entered forwarding state [ 396.487247][T12807] 8021q: adding VLAN 0 to HW filter on device bond0 [ 396.501615][ T8029] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 396.514282][ T8029] bridge0: port 1(bridge_slave_0) entered disabled state [ 396.525313][ T8029] bridge0: port 2(bridge_slave_1) entered disabled state [ 396.541198][T12807] 8021q: adding VLAN 0 to HW filter on device team0 [ 396.557943][ T8029] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 396.569059][ T8029] bridge0: port 1(bridge_slave_0) entered blocking state [ 396.576121][ T8029] bridge0: port 1(bridge_slave_0) entered forwarding state [ 396.598688][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 396.610993][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 396.618056][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 396.648675][ T8070] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 396.658188][ T8070] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 396.669825][ T8070] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 396.679071][ T8070] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 396.689298][T12807] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 396.697723][ T8070] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 396.717123][T12807] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 396.724601][ T8070] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 396.732638][ T8070] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 396.899327][T12816] fuse: Bad value for 'fd' 22:14:53 executing program 1: bpf$MAP_CREATE(0x0, 0x0, 0x0) accept4$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x0, 0x0, @mcast2}, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgid() ioctl$TIOCGSERIAL(0xffffffffffffffff, 0x541e, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) prctl$PR_SET_SPECULATION_CTRL(0x35, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) sendto$inet6(r0, &(0x7f0000000500)="ce03110075000100ff901efc67195c22cc6dc37916237d8599b512eceb92bd30961166bf00000000070000e19b40b4288ba4e852e8876e977ac94186835a03d045871d6fe30032b46ec4b52a4245f456142304a7821d1c6c8689f4ac12c50cc25534655ee7b237c7a5ba6dcc956757bf80f7146faaefba7f62928a83b54c10bd50c4ea9709367ee58afd37f6f9a0a92decda7d3e5dabe32ba34964ae3278f4c1c443f92eb36c74609cc828c5e2", 0xad, 0x0, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) keyctl$read(0xb, 0x0, &(0x7f00000004c0)=""/8, 0x8) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r1, 0x0) write$P9_RWALK(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="b0"], 0x1) perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x0) getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x23, &(0x7f0000000040), &(0x7f00000002c0)=0x4) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) r2 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r2, 0x0, 0x0) r3 = socket$caif_stream(0x25, 0x1, 0x5) close(r3) 22:14:53 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000040)=ANY=[], 0x0) close(r3) socket(0x10, 0x3, 0x0) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000180)="580000001400192340834b80040d8c560a", 0x11}], 0x1) writev(r2, &(0x7f0000000600)=[{&(0x7f0000000380)="f98ac693ce6908", 0x7}], 0x1) accept4$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0x14, 0x0) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r1, 0x0, r3, 0x0, 0x80000001, 0x0) 22:14:53 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f00000000c0)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x64}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r1, 0x1800000000000060, 0xcc0, 0x0, &(0x7f0000000000)="b90703e6680d698cb89e15f02cea", 0x0, 0x100}, 0x28) 22:14:53 executing program 5: clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) ioctl$KVM_SIGNAL_MSI(0xffffffffffffffff, 0x4020aea5, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x20008001}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x3, r2}]]}}}]}, 0x38}}, 0x0) 22:14:53 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) write$binfmt_elf32(r2, &(0x7f00000007c0)=ANY=[@ANYBLOB], 0x0) r4 = socket$inet(0x2, 0x3, 0x7f) bind$inet(r3, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) setsockopt$inet_int(r4, 0x0, 0x3, &(0x7f0000000140)=0x7ff, 0x4) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, &(0x7f0000000000)=0x80, 0x4) splice(r1, 0x0, r3, 0x0, 0x10005, 0x0) 22:14:53 executing program 4: creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)='\x00|\f\xbb\xd4\x1aF\x00t\x15\r\x06\xf2\x9a^\xc8\xca\xc8\x1bz\xa7\'\xa9\x8f\x7f\xe1\xb3Y\x016\x16\xf7\xabq9\xc9\x93N\"\xafG\x0e\x8c\x9e>\xba9\xf3\xc6l1\xee:<\xdd0\x99\x18\xc5\xe2<\xcc56\xa4-\xf6i\xe1\x9aNQ(\xb0ek}\xa2\xa2O6\xc5k\xa3F\xf9\xf7b\x1d\xdc\xa4*\xf7', 0x0, 0x0) 22:14:53 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000040)=ANY=[], 0x0) close(r3) socket(0x10, 0x3, 0x0) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000180)="580000001400192340834b80040d8c560a", 0x11}], 0x1) writev(r2, &(0x7f0000000600)=[{&(0x7f0000000380)="f98ac693ce6908", 0x7}], 0x1) accept4$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0x14, 0x0) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r1, 0x0, r3, 0x0, 0x80000001, 0x0) 22:14:53 executing program 5: r0 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0815b5055e0bcfe87b3071") r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'n\x00\x00\x00\x00\x00\xe6\xff\x00', 0x7132}) close(r1) 22:14:53 executing program 4: creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)='\x00|\f\xbb\xd4\x1aF\x00t\x15\r\x06\xf2\x9a^\xc8\xca\xc8\x1bz\xa7\'\xa9\x8f\x7f\xe1\xb3Y\x016\x16\xf7\xabq9\xc9\x93N\"\xafG\x0e\x8c\x9e>\xba9\xf3\xc6l1\xee\\<\xdd0\x99\x18\xc5\xe2<\xcc56\xa4-\xf6i\xe1\x9aNQ(\xb0ek}\xa2\xa2O6\xc5k\xa3F\xf9\xf7b\x1d\xdc\xa4*\xf7', 0x0, 0x0) 22:14:53 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000040)=ANY=[@ANYBLOB], 0x0) close(r3) socket(0x10, 0x3, 0x0) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000180)="580000001400192340834b80040d8c560a", 0x11}], 0x1) writev(r2, &(0x7f0000000600)=[{&(0x7f0000000380)="f98ac693ce6908", 0x7}], 0x1) accept4$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0x14, 0x0) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r1, 0x0, r3, 0x0, 0x80000001, 0x0) 22:14:53 executing program 1: bpf$MAP_CREATE(0x0, 0x0, 0x0) accept4$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x0, 0x0, @mcast2}, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgid() ioctl$TIOCGSERIAL(0xffffffffffffffff, 0x541e, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) prctl$PR_SET_SPECULATION_CTRL(0x35, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) sendto$inet6(r0, &(0x7f0000000500)="ce03110075000100ff901efc67195c22cc6dc37916237d8599b512eceb92bd30961166bf00000000070000e19b40b4288ba4e852e8876e977ac94186835a03d045871d6fe30032b46ec4b52a4245f456142304a7821d1c6c8689f4ac12c50cc25534655ee7b237c7a5ba6dcc956757bf80f7146faaefba7f62928a83b54c10bd50c4ea9709367ee58afd37f6f9a0a92decda7d3e5dabe32ba34964ae3278f4c1c443f92eb36c74609cc828c5e2", 0xad, 0x0, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) keyctl$read(0xb, 0x0, &(0x7f00000004c0)=""/8, 0x8) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r1, 0x0) write$P9_RWALK(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="b0"], 0x1) perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x0) getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x23, &(0x7f0000000040), &(0x7f00000002c0)=0x4) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) r2 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r2, 0x0, 0x0) r3 = socket$caif_stream(0x25, 0x1, 0x5) close(r3) 22:14:54 executing program 0: pipe(&(0x7f0000000080)={0xffffffffffffffff}) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) fcntl$addseals(r0, 0x409, 0x0) 22:14:54 executing program 4: creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)='\x00|\f\xbb\xd4\x1aF\x00t\x15\r\x06\xf2\x9a^\xc8\xca\xc8\x1bz\xa7\'\xa9\x8f\x7f\xe1\xb3Y\x016\x16\xf7\xabq9\xc9\x93N\"\xafG\x0e\x8c\x9e>\xba9\xf3\xc6l1\xee1<\xdd/\x99\x18\xc5\xe2<\xcc56\xa4-\xf6i\xe1\x9aNQ(\xb0ek}\xa2\xa2O6\xc5k\xa3F\xf9\xf7b\x1d\xdc\xa4*\xf7', 0x0, 0x0) 22:14:54 executing program 1: bpf$MAP_CREATE(0x0, 0x0, 0x0) accept4$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x0, 0x0, @mcast2}, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgid() ioctl$TIOCGSERIAL(0xffffffffffffffff, 0x541e, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) prctl$PR_SET_SPECULATION_CTRL(0x35, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) sendto$inet6(r0, &(0x7f0000000500)="ce03110075000100ff901efc67195c22cc6dc37916237d8599b512eceb92bd30961166bf00000000070000e19b40b4288ba4e852e8876e977ac94186835a03d045871d6fe30032b46ec4b52a4245f456142304a7821d1c6c8689f4ac12c50cc25534655ee7b237c7a5ba6dcc956757bf80f7146faaefba7f62928a83b54c10bd50c4ea9709367ee58afd37f6f9a0a92decda7d3e5dabe32ba34964ae3278f4c1c443f92eb36c74609cc828c5e2", 0xad, 0x0, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) keyctl$read(0xb, 0x0, &(0x7f00000004c0)=""/8, 0x8) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r1, 0x0) write$P9_RWALK(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="b0"], 0x1) perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x0) getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x23, &(0x7f0000000040), &(0x7f00000002c0)=0x4) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) r2 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r2, 0x0, 0x0) r3 = socket$caif_stream(0x25, 0x1, 0x5) close(r3) 22:14:54 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000040)=ANY=[@ANYBLOB], 0x0) close(r3) socket(0x10, 0x3, 0x0) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000180)="580000001400192340834b80040d8c560a", 0x11}], 0x1) writev(r2, &(0x7f0000000600)=[{&(0x7f0000000380)="f98ac693ce6908", 0x7}], 0x1) accept4$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0x14, 0x0) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r1, 0x0, r3, 0x0, 0x80000001, 0x0) 22:14:54 executing program 5: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TIOCGRS485(0xffffffffffffffff, 0x542e, 0x0) accept$inet(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) rename(0x0, 0x0) creat(0x0, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) prctl$PR_SET_DUMPABLE(0x4, 0x0) fsetxattr$security_smack_entry(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, 0x0) ioctl$TIOCOUTQ(r0, 0x5411, 0x0) 22:14:54 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) write$binfmt_elf32(r2, &(0x7f00000007c0)=ANY=[@ANYBLOB="955a000004000000a423"], 0xa) r4 = socket$inet(0x2, 0x3, 0x7f) bind$inet(r3, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) setsockopt$inet_int(r4, 0x0, 0x3, &(0x7f0000000140)=0x7ff, 0x4) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, &(0x7f0000000000)=0x80, 0x4) splice(r1, 0x0, r3, 0x0, 0x10005, 0x0) 22:14:54 executing program 0: pipe(0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff}) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r0, 0xc0182101, 0x0) 22:14:54 executing program 4: creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)='\x00|\f\xbb\xd4\x1aF\x00t\x15\r\x06\xf2\x9a^\xc8\xca\xc8\x1bz\xa7\'\xa9\x8f\x7f\xe1\xb3Y\x016\x16\xf7\xabq9\xc9\x93N\"\xafG\x0e\x8c\x9e>\xba9\xf3\xc6l1\xee1<\xdd:\x99\x18\xc5\xe2<\xcc56\xa4-\xf6i\xe1\x9aNQ(\xb0ek}\xa2\xa2O6\xc5k\xa3F\xf9\xf7b\x1d\xdc\xa4*\xf7', 0x0, 0x0) 22:14:54 executing program 5: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) setsockopt$inet_pktinfo(r0, 0x0, 0x8, 0x0, 0x0) 22:14:54 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000040)=ANY=[@ANYBLOB], 0x0) close(r3) socket(0x10, 0x3, 0x0) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000180)="580000001400192340834b80040d8c560a", 0x11}], 0x1) writev(r2, &(0x7f0000000600)=[{&(0x7f0000000380)="f98ac693ce6908", 0x7}], 0x1) accept4$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0x14, 0x0) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r1, 0x0, r3, 0x0, 0x80000001, 0x0) 22:14:54 executing program 0: pipe(&(0x7f00000000c0)={0xffffffffffffffff}) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) setsockopt$inet_mreqsrc(r0, 0x0, 0x0, 0x0, 0x0) 22:14:54 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) write$binfmt_elf32(r2, &(0x7f00000007c0)=ANY=[@ANYBLOB="955a000004000000a423"], 0xa) r4 = socket$inet(0x2, 0x3, 0x7f) bind$inet(r3, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) setsockopt$inet_int(r4, 0x0, 0x3, &(0x7f0000000140)=0x7ff, 0x4) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, &(0x7f0000000000)=0x80, 0x4) splice(r1, 0x0, r3, 0x0, 0x10005, 0x0) 22:14:54 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) ioctl$TIOCSSOFTCAR(0xffffffffffffffff, 0x541a, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) sendfile(r0, r1, 0x0, 0x7fffffff) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r2, r0, 0x0, 0xffffffff) 22:14:55 executing program 4: creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)='\x00|\f\xbb\xd4\x1aF\x00t\x15\r\x06\xf2\x9a^\xc8\xca\xc8\x1bz\xa7\'\xa9\x8f\x7f\xe1\xb3Y\x016\x16\xf7\xabq9\xc9\x93N\"\xafG\x0e\x8c\x9e>\xba9\xf3\xc6l1\xee1<\xdd\\\x99\x18\xc5\xe2<\xcc56\xa4-\xf6i\xe1\x9aNQ(\xb0ek}\xa2\xa2O6\xc5k\xa3F\xf9\xf7b\x1d\xdc\xa4*\xf7', 0x0, 0x0) [ 398.789254][ T26] audit: type=1800 audit(1572905695.144:48): pid=13298 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.5" name="file0" dev="sda1" ino=16938 res=0 [ 398.868395][ T26] audit: type=1804 audit(1572905695.174:49): pid=13298 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir679542756/syzkaller.fohfCf/28/file0" dev="sda1" ino=16938 res=1 [ 398.997253][ T26] audit: type=1804 audit(1572905695.224:50): pid=13302 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir679542756/syzkaller.fohfCf/28/file0" dev="sda1" ino=16938 res=1 [ 399.542011][ T9568] device bridge_slave_1 left promiscuous mode [ 399.548342][ T9568] bridge0: port 2(bridge_slave_1) entered disabled state [ 399.589813][ T26] audit: type=1804 audit(1572905695.944:51): pid=13411 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir679542756/syzkaller.fohfCf/28/file0" dev="sda1" ino=16938 res=1 [ 399.614659][ T26] audit: type=1804 audit(1572905695.964:52): pid=13302 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir679542756/syzkaller.fohfCf/28/file0" dev="sda1" ino=16938 res=1 [ 399.644003][ T9568] device bridge_slave_0 left promiscuous mode [ 399.650323][ T9568] bridge0: port 1(bridge_slave_0) entered disabled state [ 400.371707][ T9568] device hsr_slave_0 left promiscuous mode [ 400.411499][ T9568] device hsr_slave_1 left promiscuous mode [ 400.459573][ T9568] team0 (unregistering): Port device team_slave_1 removed [ 400.475096][ T9568] team0 (unregistering): Port device team_slave_0 removed [ 400.490390][ T9568] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 400.535018][ T9568] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 400.614195][ T9568] bond0 (unregistering): Released all slaves [ 400.708837][T13414] IPVS: ftp: loaded support on port[0] = 21 [ 400.761136][T13414] chnl_net:caif_netlink_parms(): no params data found [ 400.789011][T13414] bridge0: port 1(bridge_slave_0) entered blocking state [ 400.796101][T13414] bridge0: port 1(bridge_slave_0) entered disabled state [ 400.803927][T13414] device bridge_slave_0 entered promiscuous mode [ 400.811204][T13414] bridge0: port 2(bridge_slave_1) entered blocking state [ 400.818316][T13414] bridge0: port 2(bridge_slave_1) entered disabled state [ 400.826059][T13414] device bridge_slave_1 entered promiscuous mode [ 400.886248][T13414] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 400.897465][T13414] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 400.925386][T13414] team0: Port device team_slave_0 added [ 400.932620][T13414] team0: Port device team_slave_1 added [ 401.013948][T13414] device hsr_slave_0 entered promiscuous mode [ 401.051662][T13414] device hsr_slave_1 entered promiscuous mode [ 401.101345][T13414] debugfs: Directory 'hsr0' with parent '/' already present! [ 401.117320][T13414] bridge0: port 2(bridge_slave_1) entered blocking state [ 401.124421][T13414] bridge0: port 2(bridge_slave_1) entered forwarding state [ 401.131750][T13414] bridge0: port 1(bridge_slave_0) entered blocking state [ 401.138793][T13414] bridge0: port 1(bridge_slave_0) entered forwarding state [ 401.178746][T13414] 8021q: adding VLAN 0 to HW filter on device bond0 [ 401.193404][T12204] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 401.202719][T12204] bridge0: port 1(bridge_slave_0) entered disabled state [ 401.210837][T12204] bridge0: port 2(bridge_slave_1) entered disabled state [ 401.225615][T13414] 8021q: adding VLAN 0 to HW filter on device team0 [ 401.237630][T12204] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 401.246799][T12204] bridge0: port 1(bridge_slave_0) entered blocking state [ 401.253942][T12204] bridge0: port 1(bridge_slave_0) entered forwarding state [ 401.273812][ T7984] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 401.282778][ T7984] bridge0: port 2(bridge_slave_1) entered blocking state [ 401.289805][ T7984] bridge0: port 2(bridge_slave_1) entered forwarding state [ 401.317333][ T7980] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 401.326765][ T7980] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 401.339988][ T7980] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 401.352871][T13414] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 401.364454][T13414] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 401.373121][ T7980] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 401.381779][ T7980] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 401.400484][ T7980] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 401.408228][ T7980] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 401.425910][T13414] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 401.648637][T13422] fuse: Bad value for 'fd' 22:14:58 executing program 0: r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_RX_RING(r0, 0x11b, 0x2, &(0x7f0000000000)=0x8000, 0x4) r1 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) utimensat(r1, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000640)={{0x0, 0x2710}}, 0x0) mmap$xdp(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x4000010, r1, 0x0) socket$xdp(0x2c, 0x3, 0x0) close(0xffffffffffffffff) pipe(&(0x7f00000000c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x3bc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffff8}, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) kexec_load(0x0, 0x0, &(0x7f0000000080), 0x0) r3 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RWALK(r3, &(0x7f00000003c0)=ANY=[@ANYRES64], 0x8) r4 = getpid() ioctl$KVM_SMI(0xffffffffffffffff, 0xaeb7) rt_tgsigqueueinfo(r4, r4, 0x17, 0x0) dup(r2) truncate(&(0x7f0000000180)='./bus\x00', 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000fe6000/0x18000)=nil, &(0x7f0000000080)=[@text32={0x20, &(0x7f0000000300)="66bad004ec66baf80cb842e83189ef0066bafd0c0c60ee66b85d008ed8660fc7300f0134e1660f388239b9ef090000b858000000ba000000000f3066b81b018ed8b9800000c00f3235010000000f30c4e212f74300", 0x55}], 0x1, 0x0, &(0x7f0000000100), 0x3e7) ptrace$pokeuser(0x6, r4, 0x388, 0xffffffffffffffff) r5 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r5, 0xae60) 22:14:58 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="d6ac7d3f59"], 0x5) close(r3) socket(0x10, 0x3, 0x0) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000180)="580000001400192340834b80040d8c560a", 0x11}], 0x1) writev(r2, &(0x7f0000000600)=[{&(0x7f0000000380)="f98ac693ce6908", 0x7}], 0x1) accept4$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0x14, 0x0) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r1, 0x0, r3, 0x0, 0x80000001, 0x0) 22:14:58 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) write$binfmt_elf32(r2, &(0x7f00000007c0)=ANY=[@ANYBLOB="955a000004000000a423"], 0xa) r4 = socket$inet(0x2, 0x3, 0x7f) bind$inet(r3, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) setsockopt$inet_int(r4, 0x0, 0x3, &(0x7f0000000140)=0x7ff, 0x4) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, &(0x7f0000000000)=0x80, 0x4) splice(r1, 0x0, r3, 0x0, 0x10005, 0x0) 22:14:58 executing program 4: creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)='\x00|\f\xbb\xd4\x1aF\x00t\x15\r\x06\xf2\x9a^\xc8\xca\xc8\x1bz\xa7\'\xa9\x8f\x7f\xe1\xb3Y\x016\x16\xf7\xabq9\xc9\x93N\"\xafG\x0e\x8c\x9e>\xba9\xf3\xc6l1\xee1<\xdd0\x99/\xc5\xe2<\xcc56\xa4-\xf6i\xe1\x9aNQ(\xb0ek}\xa2\xa2O6\xc5k\xa3F\xf9\xf7b\x1d\xdc\xa4*\xf7', 0x0, 0x0) 22:14:58 executing program 1: bpf$MAP_CREATE(0x0, 0x0, 0x0) accept4$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x0, 0x0, @mcast2}, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgid() ioctl$TIOCGSERIAL(0xffffffffffffffff, 0x541e, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) prctl$PR_SET_SPECULATION_CTRL(0x35, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) sendto$inet6(r0, &(0x7f0000000500)="ce03110075000100ff901efc67195c22cc6dc37916237d8599b512eceb92bd30961166bf00000000070000e19b40b4288ba4e852e8876e977ac94186835a03d045871d6fe30032b46ec4b52a4245f456142304a7821d1c6c8689f4ac12c50cc25534655ee7b237c7a5ba6dcc956757bf80f7146faaefba7f62928a83b54c10bd50c4ea9709367ee58afd37f6f9a0a92decda7d3e5dabe32ba34964ae3278f4c1c443f92eb36c74609cc828c5e2", 0xad, 0x0, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) keyctl$read(0xb, 0x0, &(0x7f00000004c0)=""/8, 0x8) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r1, 0x0) write$P9_RWALK(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="b0"], 0x1) timerfd_create(0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x23, &(0x7f0000000040), &(0x7f00000002c0)=0x4) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) r2 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r2, 0x0, 0x0) r3 = socket$caif_stream(0x25, 0x1, 0x5) close(r3) 22:14:58 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0x6}, 0x1c) sendmmsg$inet(r0, &(0x7f00000010c0)=[{{&(0x7f00000000c0)={0x2, 0x4e21, @initdev}, 0x10, 0x0, 0x0, &(0x7f0000000000)=[@ip_retopts={{0x10}}], 0x10}}], 0x1, 0x50) 22:14:58 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) write$binfmt_elf32(r2, &(0x7f00000007c0)=ANY=[@ANYBLOB="955a000004000000a423107d0b6e5f"], 0xf) r4 = socket$inet(0x2, 0x3, 0x7f) bind$inet(r3, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) setsockopt$inet_int(r4, 0x0, 0x3, &(0x7f0000000140)=0x7ff, 0x4) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, &(0x7f0000000000)=0x80, 0x4) splice(r1, 0x0, r3, 0x0, 0x10005, 0x0) 22:14:58 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="d6ac7d3f59"], 0x5) close(r3) socket(0x10, 0x3, 0x0) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000180)="580000001400192340834b80040d8c560a", 0x11}], 0x1) writev(r2, &(0x7f0000000600)=[{&(0x7f0000000380)="f98ac693ce6908", 0x7}], 0x1) accept4$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0x14, 0x0) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r1, 0x0, r3, 0x0, 0x80000001, 0x0) 22:14:58 executing program 4: creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)='\x00|\f\xbb\xd4\x1aF\x00t\x15\r\x06\xf2\x9a^\xc8\xca\xc8\x1bz\xa7\'\xa9\x8f\x7f\xe1\xb3Y\x016\x16\xf7\xabq9\xc9\x93N\"\xafG\x0e\x8c\x9e>\xba9\xf3\xc6l1\xee1<\xdd0\x99:\xc5\xe2<\xcc56\xa4-\xf6i\xe1\x9aNQ(\xb0ek}\xa2\xa2O6\xc5k\xa3F\xf9\xf7b\x1d\xdc\xa4*\xf7', 0x0, 0x0) 22:14:58 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket$inet6(0xa, 0x3, 0x8000000003c) connect$inet6(r1, &(0x7f0000000240)={0xa, 0x0, 0x0, @dev, 0x9}, 0x1c) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001480)="d09a0e63c9476288b671afdbd53a5994e137381f62021d1951b627b8dda57a5d17d744648c81c5703ed8146ab1b0171f89091b1dd3238d03dbb686df460963245dedf2973ee555af99499e44ad420dbf65fd46fbc99a1274429e2d5783751815828ec8cb3553110cca66460215353d19f6d8bbd8fb264e", 0x301}], 0x1}, 0x0) 22:14:58 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) write$binfmt_elf32(r2, &(0x7f00000007c0)=ANY=[@ANYBLOB="955a000004000000a423107d0b6e5f"], 0xf) r4 = socket$inet(0x2, 0x3, 0x7f) bind$inet(r3, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) setsockopt$inet_int(r4, 0x0, 0x3, &(0x7f0000000140)=0x7ff, 0x4) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, &(0x7f0000000000)=0x80, 0x4) splice(r1, 0x0, r3, 0x0, 0x10005, 0x0) 22:14:58 executing program 4: creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)='\x00|\f\xbb\xd4\x1aF\x00t\x15\r\x06\xf2\x9a^\xc8\xca\xc8\x1bz\xa7\'\xa9\x8f\x7f\xe1\xb3Y\x016\x16\xf7\xabq9\xc9\x93N\"\xafG\x0e\x8c\x9e>\xba9\xf3\xc6l1\xee1<\xdd0\x99]\xc5\xe2<\xcc56\xa4-\xf6i\xe1\x9aNQ(\xb0ek}\xa2\xa2O6\xc5k\xa3F\xf9\xf7b\x1d\xdc\xa4*\xf7', 0x0, 0x0) 22:14:59 executing program 0: r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_RX_RING(r0, 0x11b, 0x2, &(0x7f0000000000)=0x8000, 0x4) r1 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) utimensat(r1, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000640)={{0x0, 0x2710}}, 0x0) mmap$xdp(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x4000010, r1, 0x0) socket$xdp(0x2c, 0x3, 0x0) close(0xffffffffffffffff) pipe(&(0x7f00000000c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x3bc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffff8}, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) kexec_load(0x0, 0x0, &(0x7f0000000080), 0x0) r3 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RWALK(r3, &(0x7f00000003c0)=ANY=[@ANYRES64], 0x8) r4 = getpid() ioctl$KVM_SMI(0xffffffffffffffff, 0xaeb7) rt_tgsigqueueinfo(r4, r4, 0x17, 0x0) dup(r2) truncate(&(0x7f0000000180)='./bus\x00', 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000fe6000/0x18000)=nil, &(0x7f0000000080)=[@text32={0x20, &(0x7f0000000300)="66bad004ec66baf80cb842e83189ef0066bafd0c0c60ee66b85d008ed8660fc7300f0134e1660f388239b9ef090000b858000000ba000000000f3066b81b018ed8b9800000c00f3235010000000f30c4e212f74300", 0x55}], 0x1, 0x0, &(0x7f0000000100), 0x3e7) ptrace$pokeuser(0x6, r4, 0x388, 0xffffffffffffffff) r5 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r5, 0xae60) 22:14:59 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="d6ac7d3f59"], 0x5) close(r3) socket(0x10, 0x3, 0x0) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000180)="580000001400192340834b80040d8c560a", 0x11}], 0x1) writev(r2, &(0x7f0000000600)=[{&(0x7f0000000380)="f98ac693ce6908", 0x7}], 0x1) accept4$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0x14, 0x0) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r1, 0x0, r3, 0x0, 0x80000001, 0x0) 22:14:59 executing program 1: bpf$MAP_CREATE(0x0, 0x0, 0x0) accept4$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x0, 0x0, @mcast2}, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgid() ioctl$TIOCGSERIAL(0xffffffffffffffff, 0x541e, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) prctl$PR_SET_SPECULATION_CTRL(0x35, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) sendto$inet6(r0, &(0x7f0000000500)="ce03110075000100ff901efc67195c22cc6dc37916237d8599b512eceb92bd30961166bf00000000070000e19b40b4288ba4e852e8876e977ac94186835a03d045871d6fe30032b46ec4b52a4245f456142304a7821d1c6c8689f4ac12c50cc25534655ee7b237c7a5ba6dcc956757bf80f7146faaefba7f62928a83b54c10bd50c4ea9709367ee58afd37f6f9a0a92decda7d3e5dabe32ba34964ae3278f4c1c443f92eb36c74609cc828c5e2", 0xad, 0x0, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) keyctl$read(0xb, 0x0, &(0x7f00000004c0)=""/8, 0x8) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r1, 0x0) write$P9_RWALK(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="b0"], 0x1) timerfd_create(0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x23, &(0x7f0000000040), &(0x7f00000002c0)=0x4) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) r2 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r2, 0x0, 0x0) r3 = socket$caif_stream(0x25, 0x1, 0x5) close(r3) 22:14:59 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) write$binfmt_elf32(r2, &(0x7f00000007c0)=ANY=[@ANYBLOB="955a000004000000a423107d0b6e5f"], 0xf) r4 = socket$inet(0x2, 0x3, 0x7f) bind$inet(r3, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) setsockopt$inet_int(r4, 0x0, 0x3, &(0x7f0000000140)=0x7ff, 0x4) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, &(0x7f0000000000)=0x80, 0x4) splice(r1, 0x0, r3, 0x0, 0x10005, 0x0) 22:14:59 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) bind$llc(r1, &(0x7f0000000040), 0x10) getsockname(r1, &(0x7f0000000080)=@xdp, &(0x7f0000000100)=0x80) 22:14:59 executing program 1: bpf$MAP_CREATE(0x0, 0x0, 0x0) accept4$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x0, 0x0, @mcast2}, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgid() ioctl$TIOCGSERIAL(0xffffffffffffffff, 0x541e, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) prctl$PR_SET_SPECULATION_CTRL(0x35, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) sendto$inet6(r0, &(0x7f0000000500)="ce03110075000100ff901efc67195c22cc6dc37916237d8599b512eceb92bd30961166bf00000000070000e19b40b4288ba4e852e8876e977ac94186835a03d045871d6fe30032b46ec4b52a4245f456142304a7821d1c6c8689f4ac12c50cc25534655ee7b237c7a5ba6dcc956757bf80f7146faaefba7f62928a83b54c10bd50c4ea9709367ee58afd37f6f9a0a92decda7d3e5dabe32ba34964ae3278f4c1c443f92eb36c74609cc828c5e2", 0xad, 0x0, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) keyctl$read(0xb, 0x0, &(0x7f00000004c0)=""/8, 0x8) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r1, 0x0) write$P9_RWALK(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="b0"], 0x1) timerfd_create(0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x23, &(0x7f0000000040), &(0x7f00000002c0)=0x4) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) r2 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r2, 0x0, 0x0) r3 = socket$caif_stream(0x25, 0x1, 0x5) close(r3) 22:14:59 executing program 4: creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)='\x00|\f\xbb\xd4\x1aF\x00t\x15\r\x06\xf2\x9a^\xc8\xca\xc8\x1bz\xa7\'\xa9\x8f\x7f\xe1\xb3Y\x016\x16\xf7\xabq9\xc9\x93N\"\xafG\x0e\x8c\x9e>\xba9\xf3\xc6l1\xee1<\xdd0\x99\x18\xc5\xe2<\xcc:6\xa4-\xf6i\xe1\x9aNQ(\xb0ek}\xa2\xa2O6\xc5k\xa3F\xf9\xf7b\x1d\xdc\xa4*\xf7', 0x0, 0x0) 22:14:59 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) write$binfmt_elf32(r2, &(0x7f00000007c0)=ANY=[@ANYBLOB="955a000004000000a423107d0b6e5fbdf500"], 0x12) r4 = socket$inet(0x2, 0x3, 0x7f) bind$inet(r3, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) setsockopt$inet_int(r4, 0x0, 0x3, &(0x7f0000000140)=0x7ff, 0x4) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, &(0x7f0000000000)=0x80, 0x4) splice(r1, 0x0, r3, 0x0, 0x10005, 0x0) 22:14:59 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="d6ac7d3f59513100"], 0x8) close(r3) socket(0x10, 0x3, 0x0) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000180)="580000001400192340834b80040d8c560a", 0x11}], 0x1) writev(r2, &(0x7f0000000600)=[{&(0x7f0000000380)="f98ac693ce6908", 0x7}], 0x1) accept4$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0x14, 0x0) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r1, 0x0, r3, 0x0, 0x80000001, 0x0) 22:14:59 executing program 5: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = getpid() sched_setscheduler(r0, 0x0, 0x0) r1 = socket(0x10, 0x80002, 0x0) bind$netlink(r1, &(0x7f0000177ff4)={0x10, 0x0, 0x1, 0x10}, 0xc) write(r1, &(0x7f0000000140)="2600000022004701050000000000000005006d20002b1f000a4a51f1ee839cd53400b017ca5b", 0x26) connect$netlink(r1, &(0x7f0000000480)=@proc={0x10, 0x0, 0x1}, 0xc) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000b4bffc), 0x4) sendto(r1, &(0x7f0000000340), 0xac, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000000780), 0x3ffffffffffff81, 0x2, 0x0) 22:14:59 executing program 4: creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)='\x00|\f\xbb\xd4\x1aF\x00t\x15\r\x06\xf2\x9a^\xc8\xca\xc8\x1bz\xa7\'\xa9\x8f\x7f\xe1\xb3Y\x016\x16\xf7\xabq9\xc9\x93N\"\xafG\x0e\x8c\x9e>\xba9\xf3\xc6l1\xee1<\xdd0\x99\x18\xc5\xe2<\xcc\\6\xa4-\xf6i\xe1\x9aNQ(\xb0ek}\xa2\xa2O6\xc5k\xa3F\xf9\xf7b\x1d\xdc\xa4*\xf7', 0x0, 0x0) 22:14:59 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) write$binfmt_elf32(r2, &(0x7f00000007c0)=ANY=[@ANYBLOB="955a000004000000a423107d0b6e5fbdf500"], 0x12) r4 = socket$inet(0x2, 0x3, 0x7f) bind$inet(r3, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) setsockopt$inet_int(r4, 0x0, 0x3, &(0x7f0000000140)=0x7ff, 0x4) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, &(0x7f0000000000)=0x80, 0x4) splice(r1, 0x0, r3, 0x0, 0x10005, 0x0) 22:14:59 executing program 0: r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_RX_RING(r0, 0x11b, 0x2, &(0x7f0000000000)=0x8000, 0x4) r1 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) utimensat(r1, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000640)={{0x0, 0x2710}}, 0x0) mmap$xdp(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x4000010, r1, 0x0) socket$xdp(0x2c, 0x3, 0x0) close(0xffffffffffffffff) pipe(&(0x7f00000000c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x3bc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffff8}, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) kexec_load(0x0, 0x0, &(0x7f0000000080), 0x0) r3 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RWALK(r3, &(0x7f00000003c0)=ANY=[@ANYRES64], 0x8) r4 = getpid() ioctl$KVM_SMI(0xffffffffffffffff, 0xaeb7) rt_tgsigqueueinfo(r4, r4, 0x17, 0x0) dup(r2) truncate(&(0x7f0000000180)='./bus\x00', 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000fe6000/0x18000)=nil, &(0x7f0000000080)=[@text32={0x20, &(0x7f0000000300)="66bad004ec66baf80cb842e83189ef0066bafd0c0c60ee66b85d008ed8660fc7300f0134e1660f388239b9ef090000b858000000ba000000000f3066b81b018ed8b9800000c00f3235010000000f30c4e212f74300", 0x55}], 0x1, 0x0, &(0x7f0000000100), 0x3e7) ptrace$pokeuser(0x6, r4, 0x388, 0xffffffffffffffff) r5 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r5, 0xae60) 22:15:00 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="d6ac7d3f59513100"], 0x8) close(r3) socket(0x10, 0x3, 0x0) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000180)="580000001400192340834b80040d8c560a", 0x11}], 0x1) writev(r2, &(0x7f0000000600)=[{&(0x7f0000000380)="f98ac693ce6908", 0x7}], 0x1) accept4$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0x14, 0x0) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r1, 0x0, r3, 0x0, 0x80000001, 0x0) 22:15:00 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) write$binfmt_elf32(r2, &(0x7f00000007c0)=ANY=[@ANYBLOB="955a000004000000a423107d0b6e5fbdf500"], 0x12) r4 = socket$inet(0x2, 0x3, 0x7f) bind$inet(r3, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) setsockopt$inet_int(r4, 0x0, 0x3, &(0x7f0000000140)=0x7ff, 0x4) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, &(0x7f0000000000)=0x80, 0x4) splice(r1, 0x0, r3, 0x0, 0x10005, 0x0) 22:15:00 executing program 4: creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)='\x00|\f\xbb\xd4\x1aF\x00t\x15\r\x06\xf2\x9a^\xc8\xca\xc8\x1bz\xa7\'\xa9\x8f\x7f\xe1\xb3Y\x016\x16\xf7\xabq9\xc9\x93N\"\xafG\x0e\x8c\x9e>\xba9\xf3\xc6l1\xee1<\xdd0\x99\x18\xc5\xe2<\xcc5:\xa4-\xf6i\xe1\x9aNQ(\xb0ek}\xa2\xa2O6\xc5k\xa3F\xf9\xf7b\x1d\xdc\xa4*\xf7', 0x0, 0x0) 22:15:00 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="d6ac7d3f59513100"], 0x8) close(r3) socket(0x10, 0x3, 0x0) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000180)="580000001400192340834b80040d8c560a", 0x11}], 0x1) writev(r2, &(0x7f0000000600)=[{&(0x7f0000000380)="f98ac693ce6908", 0x7}], 0x1) accept4$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0x14, 0x0) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r1, 0x0, r3, 0x0, 0x80000001, 0x0) [ 404.492733][ T9568] device bridge_slave_1 left promiscuous mode [ 404.499001][ T9568] bridge0: port 2(bridge_slave_1) entered disabled state [ 404.552172][ T9568] device bridge_slave_0 left promiscuous mode [ 404.578685][ T9568] bridge0: port 1(bridge_slave_0) entered disabled state [ 405.721667][ T9568] device hsr_slave_0 left promiscuous mode [ 405.771775][ T9568] device hsr_slave_1 left promiscuous mode [ 405.828283][ T9568] team0 (unregistering): Port device team_slave_1 removed [ 405.857018][ T9568] team0 (unregistering): Port device team_slave_0 removed [ 405.874494][ T9568] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 405.935715][ T9568] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 406.040434][ T9568] bond0 (unregistering): Released all slaves [ 406.149600][T14140] IPVS: ftp: loaded support on port[0] = 21 [ 406.312035][T14140] chnl_net:caif_netlink_parms(): no params data found [ 406.346742][T14140] bridge0: port 1(bridge_slave_0) entered blocking state [ 406.354672][T14140] bridge0: port 1(bridge_slave_0) entered disabled state [ 406.363013][T14140] device bridge_slave_0 entered promiscuous mode [ 406.370597][T14140] bridge0: port 2(bridge_slave_1) entered blocking state [ 406.378082][T14140] bridge0: port 2(bridge_slave_1) entered disabled state [ 406.386118][T14140] device bridge_slave_1 entered promiscuous mode [ 406.405066][T14140] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 406.415782][T14140] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 406.436351][T14140] team0: Port device team_slave_0 added [ 406.443405][T14140] team0: Port device team_slave_1 added [ 406.503755][T14140] device hsr_slave_0 entered promiscuous mode [ 406.551612][T14140] device hsr_slave_1 entered promiscuous mode [ 406.601398][T14140] debugfs: Directory 'hsr0' with parent '/' already present! [ 406.621464][T14140] bridge0: port 2(bridge_slave_1) entered blocking state [ 406.628776][T14140] bridge0: port 2(bridge_slave_1) entered forwarding state [ 406.636084][T14140] bridge0: port 1(bridge_slave_0) entered blocking state [ 406.643122][T14140] bridge0: port 1(bridge_slave_0) entered forwarding state [ 406.691024][T14140] 8021q: adding VLAN 0 to HW filter on device bond0 [ 406.708925][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 406.721029][ T12] bridge0: port 1(bridge_slave_0) entered disabled state [ 406.730358][ T12] bridge0: port 2(bridge_slave_1) entered disabled state [ 406.749092][T14140] 8021q: adding VLAN 0 to HW filter on device team0 [ 406.764895][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 406.778162][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 406.785219][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 406.803692][ T8070] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 406.812561][ T8070] bridge0: port 2(bridge_slave_1) entered blocking state [ 406.819814][ T8070] bridge0: port 2(bridge_slave_1) entered forwarding state [ 406.839680][ T8029] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 406.848675][ T8029] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 406.857586][ T8029] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 406.866168][ T8029] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 406.878298][T12204] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 406.888107][T14140] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 406.904057][T12204] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 406.911801][T12204] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 406.923327][T14140] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 407.066312][T14148] fuse: Bad value for 'fd' 22:15:03 executing program 1: bpf$MAP_CREATE(0x0, 0x0, 0x0) accept4$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x0, 0x0, @mcast2}, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgid() ioctl$TIOCGSERIAL(0xffffffffffffffff, 0x541e, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) prctl$PR_SET_SPECULATION_CTRL(0x35, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) sendto$inet6(r0, &(0x7f0000000500)="ce03110075000100ff901efc67195c22cc6dc37916237d8599b512eceb92bd30961166bf00000000070000e19b40b4288ba4e852e8876e977ac94186835a03d045871d6fe30032b46ec4b52a4245f456142304a7821d1c6c8689f4ac12c50cc25534655ee7b237c7a5ba6dcc956757bf80f7146faaefba7f62928a83b54c10bd50c4ea9709367ee58afd37f6f9a0a92decda7d3e5dabe32ba34964ae3278f4c1c443f92eb36c74609cc828c5e2", 0xad, 0x0, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) keyctl$read(0xb, 0x0, &(0x7f00000004c0)=""/8, 0x8) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r1, 0x0) timerfd_create(0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x23, &(0x7f0000000040), &(0x7f00000002c0)=0x4) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) r2 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r2, 0x0, 0x0) r3 = socket$caif_stream(0x25, 0x1, 0x5) close(r3) 22:15:03 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) write$binfmt_elf32(r2, &(0x7f00000007c0)=ANY=[@ANYBLOB="955a000004000000a423107d0b6e5fbdf500df"], 0x13) r4 = socket$inet(0x2, 0x3, 0x7f) bind$inet(r3, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) setsockopt$inet_int(r4, 0x0, 0x3, &(0x7f0000000140)=0x7ff, 0x4) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, &(0x7f0000000000)=0x80, 0x4) splice(r1, 0x0, r3, 0x0, 0x10005, 0x0) 22:15:03 executing program 4: creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)='\x00|\f\xbb\xd4\x1aF\x00t\x15\r\x06\xf2\x9a^\xc8\xca\xc8\x1bz\xa7\'\xa9\x8f\x7f\xe1\xb3Y\x016\x16\xf7\xabq9\xc9\x93N\"\xafG\x0e\x8c\x9e>\xba9\xf3\xc6l1\xee1<\xdd0\x99\x18\xc5\xe2<\xcc5\\\xa4-\xf6i\xe1\x9aNQ(\xb0ek}\xa2\xa2O6\xc5k\xa3F\xf9\xf7b\x1d\xdc\xa4*\xf7', 0x0, 0x0) 22:15:03 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="d6ac7d3f5951310089"], 0x9) close(r3) socket(0x10, 0x3, 0x0) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000180)="580000001400192340834b80040d8c560a", 0x11}], 0x1) writev(r2, &(0x7f0000000600)=[{&(0x7f0000000380)="f98ac693ce6908", 0x7}], 0x1) accept4$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0x14, 0x0) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r1, 0x0, r3, 0x0, 0x80000001, 0x0) 22:15:03 executing program 0: r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_RX_RING(r0, 0x11b, 0x2, &(0x7f0000000000)=0x8000, 0x4) r1 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) utimensat(r1, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000640)={{0x0, 0x2710}}, 0x0) mmap$xdp(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x4000010, r1, 0x0) socket$xdp(0x2c, 0x3, 0x0) close(0xffffffffffffffff) pipe(&(0x7f00000000c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x3bc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffff8}, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) kexec_load(0x0, 0x0, &(0x7f0000000080), 0x0) r3 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RWALK(r3, &(0x7f00000003c0)=ANY=[@ANYRES64], 0x8) r4 = getpid() ioctl$KVM_SMI(0xffffffffffffffff, 0xaeb7) rt_tgsigqueueinfo(r4, r4, 0x17, 0x0) dup(r2) truncate(&(0x7f0000000180)='./bus\x00', 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000fe6000/0x18000)=nil, &(0x7f0000000080)=[@text32={0x20, &(0x7f0000000300)="66bad004ec66baf80cb842e83189ef0066bafd0c0c60ee66b85d008ed8660fc7300f0134e1660f388239b9ef090000b858000000ba000000000f3066b81b018ed8b9800000c00f3235010000000f30c4e212f74300", 0x55}], 0x1, 0x0, &(0x7f0000000100), 0x3e7) ptrace$pokeuser(0x6, r4, 0x388, 0xffffffffffffffff) r5 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r5, 0xae60) 22:15:03 executing program 5: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = getpid() sched_setscheduler(r0, 0x0, 0x0) r1 = socket(0x10, 0x80002, 0x0) bind$netlink(r1, &(0x7f0000177ff4)={0x10, 0x0, 0x1, 0x10}, 0xc) write(r1, &(0x7f0000000140)="2600000022004701050000000000000005006d20002b1f000a4a51f1ee839cd53400b017ca5b", 0x26) connect$netlink(r1, &(0x7f0000000480)=@proc={0x10, 0x0, 0x1}, 0xc) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000b4bffc), 0x4) sendto(r1, &(0x7f0000000340), 0xac, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000000780), 0x3ffffffffffff81, 0x2, 0x0) 22:15:03 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="d6ac7d3f5951310089"], 0x9) close(r3) socket(0x10, 0x3, 0x0) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000180)="580000001400192340834b80040d8c560a", 0x11}], 0x1) writev(r2, &(0x7f0000000600)=[{&(0x7f0000000380)="f98ac693ce6908", 0x7}], 0x1) accept4$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0x14, 0x0) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r1, 0x0, r3, 0x0, 0x80000001, 0x0) 22:15:03 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) write$binfmt_elf32(r2, &(0x7f00000007c0)=ANY=[@ANYBLOB="955a000004000000a423107d0b6e5fbdf500df"], 0x13) r4 = socket$inet(0x2, 0x3, 0x7f) bind$inet(r3, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) setsockopt$inet_int(r4, 0x0, 0x3, &(0x7f0000000140)=0x7ff, 0x4) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, &(0x7f0000000000)=0x80, 0x4) splice(r1, 0x0, r3, 0x0, 0x10005, 0x0) 22:15:03 executing program 4: creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)='\x00|\f\xbb\xd4\x1aF\x00t\x15\r\x06\xf2\x9a^\xc8\xca\xc8\x1bz\xa7\'\xa9\x8f\x7f\xe1\xb3Y\x016\x16\xf7\xabq9\xc9\x93N\"\xafG\x0e\x8c\x9e>\xba9\xf3\xc6l1\xee1<\xdd0\x99\x18\xc5\xe2<\xcc56\xa4%\xf6i\xe1\x9aNQ(\xb0ek}\xa2\xa2O6\xc5k\xa3F\xf9\xf7b\x1d\xdc\xa4*\xf7', 0x0, 0x0) 22:15:04 executing program 1: bpf$MAP_CREATE(0x0, 0x0, 0x0) accept4$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x0, 0x0, @mcast2}, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgid() ioctl$TIOCGSERIAL(0xffffffffffffffff, 0x541e, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) prctl$PR_SET_SPECULATION_CTRL(0x35, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) sendto$inet6(r0, &(0x7f0000000500)="ce03110075000100ff901efc67195c22cc6dc37916237d8599b512eceb92bd30961166bf00000000070000e19b40b4288ba4e852e8876e977ac94186835a03d045871d6fe30032b46ec4b52a4245f456142304a7821d1c6c8689f4ac12c50cc25534655ee7b237c7a5ba6dcc956757bf80f7146faaefba7f62928a83b54c10bd50c4ea9709367ee58afd37f6f9a0a92decda7d3e5dabe32ba34964ae3278f4c1c443f92eb36c74609cc828c5e2", 0xad, 0x0, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) keyctl$read(0xb, 0x0, &(0x7f00000004c0)=""/8, 0x8) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r1, 0x0) timerfd_create(0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x23, &(0x7f0000000040), &(0x7f00000002c0)=0x4) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) r2 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r2, 0x0, 0x0) r3 = socket$caif_stream(0x25, 0x1, 0x5) close(r3) 22:15:04 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) write$binfmt_elf32(r2, &(0x7f00000007c0)=ANY=[@ANYBLOB="955a000004000000a423107d0b6e5fbdf500df"], 0x13) r4 = socket$inet(0x2, 0x3, 0x7f) bind$inet(r3, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) setsockopt$inet_int(r4, 0x0, 0x3, &(0x7f0000000140)=0x7ff, 0x4) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, &(0x7f0000000000)=0x80, 0x4) splice(r1, 0x0, r3, 0x0, 0x10005, 0x0) 22:15:04 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="d6ac7d3f5951310089"], 0x9) close(r3) socket(0x10, 0x3, 0x0) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000180)="580000001400192340834b80040d8c560a", 0x11}], 0x1) writev(r2, &(0x7f0000000600)=[{&(0x7f0000000380)="f98ac693ce6908", 0x7}], 0x1) accept4$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0x14, 0x0) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r1, 0x0, r3, 0x0, 0x80000001, 0x0) 22:15:04 executing program 0: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = getpid() sched_setscheduler(r0, 0x0, 0x0) r1 = socket(0x10, 0x80002, 0x0) bind$netlink(r1, &(0x7f0000177ff4)={0x10, 0x0, 0x1, 0x10}, 0xc) write(r1, &(0x7f0000000140)="2600000022004701050000000000000005006d20002b1f000a4a51f1ee839cd53400b017ca5b", 0x26) connect$netlink(r1, &(0x7f0000000480)=@proc={0x10, 0x0, 0x1}, 0xc) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000b4bffc), 0x4) sendto(r1, &(0x7f0000000340), 0xac, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000000780), 0x3ffffffffffff81, 0x2, 0x0) 22:15:04 executing program 1: bpf$MAP_CREATE(0x0, 0x0, 0x0) accept4$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x0, 0x0, @mcast2}, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgid() ioctl$TIOCGSERIAL(0xffffffffffffffff, 0x541e, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) prctl$PR_SET_SPECULATION_CTRL(0x35, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) sendto$inet6(r0, &(0x7f0000000500)="ce03110075000100ff901efc67195c22cc6dc37916237d8599b512eceb92bd30961166bf00000000070000e19b40b4288ba4e852e8876e977ac94186835a03d045871d6fe30032b46ec4b52a4245f456142304a7821d1c6c8689f4ac12c50cc25534655ee7b237c7a5ba6dcc956757bf80f7146faaefba7f62928a83b54c10bd50c4ea9709367ee58afd37f6f9a0a92decda7d3e5dabe32ba34964ae3278f4c1c443f92eb36c74609cc828c5e2", 0xad, 0x0, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) keyctl$read(0xb, 0x0, &(0x7f00000004c0)=""/8, 0x8) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r1, 0x0) timerfd_create(0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x23, &(0x7f0000000040), &(0x7f00000002c0)=0x4) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) r2 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r2, 0x0, 0x0) r3 = socket$caif_stream(0x25, 0x1, 0x5) close(r3) 22:15:04 executing program 4: creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)='\x00|\f\xbb\xd4\x1aF\x00t\x15\r\x06\xf2\x9a^\xc8\xca\xc8\x1bz\xa7\'\xa9\x8f\x7f\xe1\xb3Y\x016\x16\xf7\xabq9\xc9\x93N\"\xafG\x0e\x8c\x9e>\xba9\xf3\xc6l1\xee1<\xdd0\x99\x18\xc5\xe2<\xcc56\xa4:\xf6i\xe1\x9aNQ(\xb0ek}\xa2\xa2O6\xc5k\xa3F\xf9\xf7b\x1d\xdc\xa4*\xf7', 0x0, 0x0) 22:15:04 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) write$binfmt_elf32(r2, &(0x7f00000007c0)=ANY=[@ANYBLOB="955a000004000000a423107d0b6e5fbdf500dfff"], 0x14) r4 = socket$inet(0x2, 0x0, 0x7f) bind$inet(r3, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) setsockopt$inet_int(r4, 0x0, 0x3, &(0x7f0000000140)=0x7ff, 0x4) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, &(0x7f0000000000)=0x80, 0x4) splice(r1, 0x0, r3, 0x0, 0x10005, 0x0) 22:15:04 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="d6ac7d3f595131008901"], 0xa) close(0xffffffffffffffff) socket(0x10, 0x3, 0x0) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000180)="580000001400192340834b80040d8c560a", 0x11}], 0x1) writev(r2, &(0x7f0000000600)=[{&(0x7f0000000380)="f98ac693ce6908", 0x7}], 0x1) accept4$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0x14, 0x0) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r1, 0x0, r3, 0x0, 0x80000001, 0x0) [ 409.501822][ T9568] device bridge_slave_1 left promiscuous mode [ 409.508050][ T9568] bridge0: port 2(bridge_slave_1) entered disabled state [ 409.582033][ T9568] device bridge_slave_0 left promiscuous mode [ 409.588318][ T9568] bridge0: port 1(bridge_slave_0) entered disabled state 22:15:07 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f00000001c0)=""/11, 0xb) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)) r1 = epoll_create1(0x0) r2 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000440)) r3 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000000)) timer_settime(0x0, 0x0, &(0x7f0000000300)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) tkill(r3, 0x16) 22:15:07 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="d6ac7d3f595131008901"], 0xa) close(0xffffffffffffffff) socket(0x10, 0x3, 0x0) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000180)="580000001400192340834b80040d8c560a", 0x11}], 0x1) writev(r2, &(0x7f0000000600)=[{&(0x7f0000000380)="f98ac693ce6908", 0x7}], 0x1) accept4$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0x14, 0x0) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r1, 0x0, r3, 0x0, 0x80000001, 0x0) 22:15:07 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) write$binfmt_elf32(r2, &(0x7f00000007c0)=ANY=[@ANYBLOB="955a000004000000a423107d0b6e5fbdf500dfff"], 0x14) r4 = socket$inet(0x2, 0x0, 0x7f) bind$inet(r3, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) setsockopt$inet_int(r4, 0x0, 0x3, &(0x7f0000000140)=0x7ff, 0x4) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, &(0x7f0000000000)=0x80, 0x4) splice(r1, 0x0, r3, 0x0, 0x10005, 0x0) 22:15:07 executing program 4: creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)='\x00|\f\xbb\xd4\x1aF\x00t\x15\r\x06\xf2\x9a^\xc8\xca\xc8\x1bz\xa7\'\xa9\x8f\x7f\xe1\xb3Y\x016\x16\xf7\xabq9\xc9\x93N\"\xafG\x0e\x8c\x9e>\xba9\xf3\xc6l1\xee1<\xdd0\x99\x18\xc5\xe2<\xcc56\xa4\\\xf6i\xe1\x9aNQ(\xb0ek}\xa2\xa2O6\xc5k\xa3F\xf9\xf7b\x1d\xdc\xa4*\xf7', 0x0, 0x0) 22:15:07 executing program 0: open(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), 0x0) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) epoll_create1(0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, 0x0, 0xa808) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000980)=ANY=[]}}], 0x1, 0x0) [ 411.421506][ T9568] device hsr_slave_0 left promiscuous mode [ 411.475965][ T9568] device hsr_slave_1 left promiscuous mode 22:15:07 executing program 0: open(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), 0x0) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) epoll_create1(0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, 0x0, 0xa808) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000980)=ANY=[]}}], 0x1, 0x0) [ 411.548627][ T9568] team0 (unregistering): Port device team_slave_1 removed 22:15:08 executing program 4: creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)='\x00|\f\xbb\xd4\x1aF\x00t\x15\r\x06\xf2\x9a^\xc8\xca\xc8\x1bz\xa7\'\xa9\x8f\x7f\xe1\xb3Y\x016\x16\xf7\xabq9\xc9\x93N\"\xafG\x0e\x8c\x9e>\xba9\xf3\xc6l1\xee1<\xdd0\x99\x18\xc5\xe2<\xcc56\xa4-\xf6\\\xe1\x9aNQ(\xb0ek}\xa2\xa2O6\xc5k\xa3F\xf9\xf7b\x1d\xdc\xa4*\xf7', 0x0, 0x0) [ 411.591545][ T9568] team0 (unregistering): Port device team_slave_0 removed [ 411.603627][ T9568] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface 22:15:08 executing program 0: open(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), 0x0) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) epoll_create1(0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, 0x0, 0xa808) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000980)=ANY=[]}}], 0x1, 0x0) [ 411.670533][ T9568] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 411.848415][ T9568] bond0 (unregistering): Released all slaves [ 411.970292][T14509] IPVS: ftp: loaded support on port[0] = 21 [ 412.168127][T14509] chnl_net:caif_netlink_parms(): no params data found [ 412.205901][T14509] bridge0: port 1(bridge_slave_0) entered blocking state [ 412.216308][T14509] bridge0: port 1(bridge_slave_0) entered disabled state [ 412.225009][T14509] device bridge_slave_0 entered promiscuous mode [ 412.236204][T14509] bridge0: port 2(bridge_slave_1) entered blocking state [ 412.243890][T14509] bridge0: port 2(bridge_slave_1) entered disabled state [ 412.254738][T14509] device bridge_slave_1 entered promiscuous mode [ 412.279033][T14509] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 412.290531][T14509] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 412.315647][T14509] team0: Port device team_slave_0 added [ 412.325306][T14509] team0: Port device team_slave_1 added [ 412.406180][T14509] device hsr_slave_0 entered promiscuous mode [ 412.461635][T14509] device hsr_slave_1 entered promiscuous mode [ 412.501393][T14509] debugfs: Directory 'hsr0' with parent '/' already present! [ 412.523288][T14509] bridge0: port 2(bridge_slave_1) entered blocking state [ 412.530330][T14509] bridge0: port 2(bridge_slave_1) entered forwarding state [ 412.537717][T14509] bridge0: port 1(bridge_slave_0) entered blocking state [ 412.544873][T14509] bridge0: port 1(bridge_slave_0) entered forwarding state [ 412.597335][T14509] 8021q: adding VLAN 0 to HW filter on device bond0 [ 412.611031][ T7980] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 412.622307][ T7980] bridge0: port 1(bridge_slave_0) entered disabled state [ 412.630238][ T7980] bridge0: port 2(bridge_slave_1) entered disabled state [ 412.645862][T14509] 8021q: adding VLAN 0 to HW filter on device team0 [ 412.657239][ T7984] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 412.665817][ T7984] bridge0: port 1(bridge_slave_0) entered blocking state [ 412.672982][ T7984] bridge0: port 1(bridge_slave_0) entered forwarding state [ 412.691963][ T7984] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 412.700534][ T7984] bridge0: port 2(bridge_slave_1) entered blocking state [ 412.707596][ T7984] bridge0: port 2(bridge_slave_1) entered forwarding state [ 412.728642][ T7984] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 412.750663][T14509] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 412.761513][T14509] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 412.773893][ T7984] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 412.782839][ T7984] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 412.791820][ T7984] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 412.800318][ T7984] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 412.809274][ T7984] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 412.824979][ T8070] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 412.832734][ T8070] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 412.843660][T14509] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 412.970421][T14761] fuse: Bad value for 'fd' 22:15:09 executing program 1: bpf$MAP_CREATE(0x0, 0x0, 0x0) accept4$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x0, 0x0, @mcast2}, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgid() ioctl$TIOCGSERIAL(0xffffffffffffffff, 0x541e, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) prctl$PR_SET_SPECULATION_CTRL(0x35, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) sendto$inet6(r0, &(0x7f0000000500)="ce03110075000100ff901efc67195c22cc6dc37916237d8599b512eceb92bd30961166bf00000000070000e19b40b4288ba4e852e8876e977ac94186835a03d045871d6fe30032b46ec4b52a4245f456142304a7821d1c6c8689f4ac12c50cc25534655ee7b237c7a5ba6dcc956757bf80f7146faaefba7f62928a83b54c10bd50c4ea9709367ee58afd37f6f9a0a92decda7d3e5dabe32ba34964ae3278f4c1c443f92eb36c74609cc828c5e2", 0xad, 0x0, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) keyctl$read(0xb, 0x0, &(0x7f00000004c0)=""/8, 0x8) write$P9_RWALK(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="b0"], 0x1) timerfd_create(0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x23, &(0x7f0000000040), &(0x7f00000002c0)=0x4) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) r2 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r2, 0x0, 0x0) r3 = socket$caif_stream(0x25, 0x1, 0x5) close(r3) 22:15:09 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f00000001c0)=""/11, 0xb) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)) r1 = epoll_create1(0x0) r2 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000440)) r3 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000000)) timer_settime(0x0, 0x0, &(0x7f0000000300)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) tkill(r3, 0x16) 22:15:09 executing program 0: open(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), 0x0) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) epoll_create1(0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, 0x0, 0xa808) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000980)=ANY=[]}}], 0x1, 0x0) 22:15:09 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="d6ac7d3f595131008901"], 0xa) close(0xffffffffffffffff) socket(0x10, 0x3, 0x0) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000180)="580000001400192340834b80040d8c560a", 0x11}], 0x1) writev(r2, &(0x7f0000000600)=[{&(0x7f0000000380)="f98ac693ce6908", 0x7}], 0x1) accept4$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0x14, 0x0) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r1, 0x0, r3, 0x0, 0x80000001, 0x0) 22:15:09 executing program 4: creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)='\x00|\f\xbb\xd4\x1aF\x00t\x15\r\x06\xf2\x9a^\xc8\xca\xc8\x1bz\xa7\'\xa9\x8f\x7f\xe1\xb3Y\x016\x16\xf7\xabq9\xc9\x93N\"\xafG\x0e\x8c\x9e>\xba9\xf3\xc6l1\xee1<\xdd0\x99\x18\xc5\xe2<\xcc56\xa4-\xf6i\xe1\x9a]Q(\xb0ek}\xa2\xa2O6\xc5k\xa3F\xf9\xf7b\x1d\xdc\xa4*\xf7', 0x0, 0x0) 22:15:09 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) write$binfmt_elf32(r2, &(0x7f00000007c0)=ANY=[@ANYBLOB="955a000004000000a423107d0b6e5fbdf500dfff"], 0x14) r4 = socket$inet(0x2, 0x0, 0x7f) bind$inet(r3, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) setsockopt$inet_int(r4, 0x0, 0x3, &(0x7f0000000140)=0x7ff, 0x4) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, &(0x7f0000000000)=0x80, 0x4) splice(r1, 0x0, r3, 0x0, 0x10005, 0x0) 22:15:09 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="d6ac7d3f595131008901"], 0xa) close(r3) socket(0x0, 0x3, 0x0) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000180)="580000001400192340834b80040d8c560a", 0x11}], 0x1) writev(r2, &(0x7f0000000600)=[{&(0x7f0000000380)="f98ac693ce6908", 0x7}], 0x1) accept4$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0x14, 0x0) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r1, 0x0, r3, 0x0, 0x80000001, 0x0) 22:15:09 executing program 4: creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)='\x00|\f\xbb\xd4\x1aF\x00t\x15\r\x06\xf2\x9a^\xc8\xca\xc8\x1bz\xa7\'\xa9\x8f\x7f\xe1\xb3Y\x016\x16\xf7\xabq9\xc9\x93N\"\xafG\x0e\x8c\x9e>\xba9\xf3\xc6l1\xee1<\xdd0\x99\x18\xc5\xe2<\xcc56\xa4-\xf6i\xe1\x9aN](\xb0ek}\xa2\xa2O6\xc5k\xa3F\xf9\xf7b\x1d\xdc\xa4*\xf7', 0x0, 0x0) 22:15:09 executing program 0: open(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), 0x0) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) epoll_create1(0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, 0x0, 0xa808) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000980)=ANY=[]}}], 0x1, 0x0) 22:15:09 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) write$binfmt_elf32(r2, &(0x7f00000007c0)=ANY=[@ANYBLOB="955a000004000000a423107d0b6e5fbdf500dfff"], 0x14) r4 = socket$inet(0x2, 0x3, 0x0) bind$inet(r3, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) setsockopt$inet_int(r4, 0x0, 0x3, &(0x7f0000000140)=0x7ff, 0x4) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, &(0x7f0000000000)=0x80, 0x4) splice(r1, 0x0, r3, 0x0, 0x10005, 0x0) 22:15:09 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140), 0xffffffaa}], 0x3}, 0x0) clone(0x800007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000021c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000280)=ANY=[@ANYBLOB="13d50f34"], 0x4}}, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="f7ca1bf892a0a3c7a4b78ef5e5cf04270f05cabf11cdbf5f02e6167ffb5acca376549d8c3b5474e7d63b75b7d85c4ce3a28e6b8897cd3e79ac76bccfc91e8705e1fe2a0a0e05f470ca9c279cfc9927acc7e5e945462f7719dfb87c553a688f9da801891bb3e336624a0a51c1169ab50284810381fdf180daa75aadc0004ffc6e1d9c45bb262480ae58ab2d", @ANYBLOB="0cda366f0001aeac44b8055fadbfac2a7dfe5d4965c1dcbe2544be6077bf0925f49126b4bd2dcbf0c45ceecc872b56070000000000000036bc9e", @ANYBLOB="79ffc5573dd88a7cfcb8bd543acd5c6a0ef51a2887b63407372504167b455ddfd0640764ef0405000000e8137f38a3729f9f9aa545"], 0x0, 0xfa}, 0x20) tkill(r2, 0x3b) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r2, 0x0, 0x0) 22:15:10 executing program 4: creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)='\x00|\f\xbb\xd4\x1aF\x00t\x15\r\x06\xf2\x9a^\xc8\xca\xc8\x1bz\xa7\'\xa9\x8f\x7f\xe1\xb3Y\x016\x16\xf7\xabq9\xc9\x93N\"\xafG\x0e\x8c\x9e>\xba9\xf3\xc6l1\xee1<\xdd0\x99\x18\xc5\xe2<\xcc56\xa4-\xf6i\xe1\x9aNQ:\xb0ek}\xa2\xa2O6\xc5k\xa3F\xf9\xf7b\x1d\xdc\xa4*\xf7', 0x0, 0x0) 22:15:10 executing program 1: bpf$MAP_CREATE(0x0, 0x0, 0x0) accept4$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x0, 0x0, @mcast2}, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgid() ioctl$TIOCGSERIAL(0xffffffffffffffff, 0x541e, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) prctl$PR_SET_SPECULATION_CTRL(0x35, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) sendto$inet6(r0, &(0x7f0000000500)="ce03110075000100ff901efc67195c22cc6dc37916237d8599b512eceb92bd30961166bf00000000070000e19b40b4288ba4e852e8876e977ac94186835a03d045871d6fe30032b46ec4b52a4245f456142304a7821d1c6c8689f4ac12c50cc25534655ee7b237c7a5ba6dcc956757bf80f7146faaefba7f62928a83b54c10bd50c4ea9709367ee58afd37f6f9a0a92decda7d3e5dabe32ba34964ae3278f4c1c443f92eb36c74609cc828c5e2", 0xad, 0x0, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) keyctl$read(0xb, 0x0, &(0x7f00000004c0)=""/8, 0x8) write$P9_RWALK(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="b0"], 0x1) timerfd_create(0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x23, &(0x7f0000000040), &(0x7f00000002c0)=0x4) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) r2 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r2, 0x0, 0x0) r3 = socket$caif_stream(0x25, 0x1, 0x5) close(r3) 22:15:10 executing program 5: creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, 0x0, &(0x7f0000000540)='\x00|\f\xbb\xd4\x1aF\x00t\x15\r\x06\xf2\x9a^\xc8\xca\xc8\x1bz\xa7\'\xa9\x8f\x7f\xe1\xb3Y\x016\x16\xf7\xabq9\xc9\x93N\"\xafG\x0e\x8c\x9e>\xba9\xf3\xc6l1\xee1<\xdd0\x99\x18\xc5\xe2<\xcc56\xa4-\xf6i\xe1\x9aNQ(\xb0ek}\xa2\xa2O6\xc5k\xa3F\xf9\xf7b\x1d\xdc\xa4*\xf7', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') gettid() tkill(0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000640)={0x2, 0x0, @loopback}, 0x10) sendmmsg$inet(r0, &(0x7f0000000b00)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @dev, @dev}}}], 0x20}}], 0x2, 0x0) 22:15:10 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) write$binfmt_elf32(r2, &(0x7f00000007c0)=ANY=[@ANYBLOB="955a000004000000a423107d0b6e5fbdf500dfff"], 0x14) r4 = socket$inet(0x2, 0x3, 0x0) bind$inet(r3, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) setsockopt$inet_int(r4, 0x0, 0x3, &(0x7f0000000140)=0x7ff, 0x4) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, &(0x7f0000000000)=0x80, 0x4) splice(r1, 0x0, r3, 0x0, 0x10005, 0x0) 22:15:10 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="d6ac7d3f595131008901"], 0xa) close(r3) socket(0x0, 0x3, 0x0) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000180)="580000001400192340834b80040d8c560a", 0x11}], 0x1) writev(r2, &(0x7f0000000600)=[{&(0x7f0000000380)="f98ac693ce6908", 0x7}], 0x1) accept4$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0x14, 0x0) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r1, 0x0, r3, 0x0, 0x80000001, 0x0) 22:15:10 executing program 0: socket$inet6(0xa, 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) close(0xffffffffffffffff) r0 = syz_open_procfs(0x0, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) ioprio_set$uid(0x3, 0x0, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) 22:15:10 executing program 1: bpf$MAP_CREATE(0x0, 0x0, 0x0) accept4$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x0, 0x0, @mcast2}, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgid() ioctl$TIOCGSERIAL(0xffffffffffffffff, 0x541e, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) prctl$PR_SET_SPECULATION_CTRL(0x35, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) sendto$inet6(r0, &(0x7f0000000500)="ce03110075000100ff901efc67195c22cc6dc37916237d8599b512eceb92bd30961166bf00000000070000e19b40b4288ba4e852e8876e977ac94186835a03d045871d6fe30032b46ec4b52a4245f456142304a7821d1c6c8689f4ac12c50cc25534655ee7b237c7a5ba6dcc956757bf80f7146faaefba7f62928a83b54c10bd50c4ea9709367ee58afd37f6f9a0a92decda7d3e5dabe32ba34964ae3278f4c1c443f92eb36c74609cc828c5e2", 0xad, 0x0, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) keyctl$read(0xb, 0x0, &(0x7f00000004c0)=""/8, 0x8) write$P9_RWALK(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="b0"], 0x1) timerfd_create(0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x23, &(0x7f0000000040), &(0x7f00000002c0)=0x4) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) r2 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r2, 0x0, 0x0) r3 = socket$caif_stream(0x25, 0x1, 0x5) close(r3) 22:15:10 executing program 4: creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)='\x00|\f\xbb\xd4\x1aF\x00t\x15\r\x06\xf2\x9a^\xc8\xca\xc8\x1bz\xa7\'\xa9\x8f\x7f\xe1\xb3Y\x016\x16\xf7\xabq9\xc9\x93N\"\xafG\x0e\x8c\x9e>\xba9\xf3\xc6l1\xee1<\xdd0\x99\x18\xc5\xe2<\xcc56\xa4-\xf6i\xe1\x9aNQ(\xb0\\k}\xa2\xa2O6\xc5k\xa3F\xf9\xf7b\x1d\xdc\xa4*\xf7', 0x0, 0x0) 22:15:10 executing program 5: getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x1, 0x0, 0x0, 0xa}, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r0, &(0x7f0000004dc0), 0x4, 0x0, 0x0) accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x80000) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x4000000000008d}, 0x0) r1 = shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) shmctl$IPC_STAT(r1, 0x2, 0x0) pipe2(&(0x7f0000000540), 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r3, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r5, 0x407, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)=ANY=[@ANYBLOB="1100000042000501f80000366ab1001000ed623c087d41ee190705623fff526676c7517f97b2d2add33be3693e6acc651514fd9a9c7c4b9d5f8e1656e057a8cbb9cd3712f03929ed5379672fd3930e550ac195d46fc2aff589686624174c474c486369942660f24a01db522f312fcd01fb1406948e6726091927d526e390790601318ff2157656319d9c20c885828e90dec4cdbf0b6ee89e22af6edd19a0de01de22859215d8c0a5937736a9553018ad970990e40eb1b1d86c05143f8b9415f4b3d3fbee5ca991a04cdadf254be7a8554ca449e9ed4dc937ab826e72ed0abc9a19df0000000000a1643319e2887ef99398"], 0x14}}, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f00000000c0)) write(r5, &(0x7f0000000340), 0x413957bc) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) r6 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r6, &(0x7f0000000480)={0xa, 0x4e20}, 0x1c) sendto$inet6(r6, 0x0, 0x0, 0x8000, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) write$binfmt_elf64(r6, &(0x7f0000000b40)=ANY=[@ANYBLOB="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"], 0x195) recvmmsg(r6, &(0x7f0000008880), 0x45b, 0x44000102, 0x0) 22:15:10 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) write$binfmt_elf32(r2, &(0x7f00000007c0)=ANY=[@ANYBLOB="955a000004000000a423107d0b6e5fbdf500dfff"], 0x14) r4 = socket$inet(0x2, 0x3, 0x0) bind$inet(r3, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) setsockopt$inet_int(r4, 0x0, 0x3, &(0x7f0000000140)=0x7ff, 0x4) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, &(0x7f0000000000)=0x80, 0x4) splice(r1, 0x0, r3, 0x0, 0x10005, 0x0) 22:15:10 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="d6ac7d3f595131008901"], 0xa) close(r3) socket(0x0, 0x3, 0x0) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000180)="580000001400192340834b80040d8c560a", 0x11}], 0x1) writev(r2, &(0x7f0000000600)=[{&(0x7f0000000380)="f98ac693ce6908", 0x7}], 0x1) accept4$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0x14, 0x0) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r1, 0x0, r3, 0x0, 0x80000001, 0x0) 22:15:10 executing program 4: creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)='\x00|\f\xbb\xd4\x1aF\x00t\x15\r\x06\xf2\x9a^\xc8\xca\xc8\x1bz\xa7\'\xa9\x8f\x7f\xe1\xb3Y\x016\x16\xf7\xabq9\xc9\x93N\"\xafG\x0e\x8c\x9e>\xba9\xf3\xc6l1\xee1<\xdd0\x99\x18\xc5\xe2<\xcc56\xa4-\xf6i\xe1\x9aNQ(\xb0e\\}\xa2\xa2O6\xc5k\xa3F\xf9\xf7b\x1d\xdc\xa4*\xf7', 0x0, 0x0) 22:15:10 executing program 0: openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioprio_set$uid(0x3, 0x0, 0x0) 22:15:11 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) write$binfmt_elf32(r2, &(0x7f00000007c0)=ANY=[@ANYBLOB="955a000004000000a423107d0b6e5fbdf500dfff"], 0x14) r4 = socket$inet(0x2, 0x3, 0x7f) bind$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) setsockopt$inet_int(r4, 0x0, 0x3, &(0x7f0000000140)=0x7ff, 0x4) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, &(0x7f0000000000)=0x80, 0x4) splice(r1, 0x0, r3, 0x0, 0x10005, 0x0) 22:15:11 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="d6ac7d3f595131008901"], 0xa) close(r3) socket(0x10, 0x0, 0x0) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000180)="580000001400192340834b80040d8c560a", 0x11}], 0x1) writev(r2, &(0x7f0000000600)=[{&(0x7f0000000380)="f98ac693ce6908", 0x7}], 0x1) accept4$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0x14, 0x0) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r1, 0x0, r3, 0x0, 0x80000001, 0x0) 22:15:11 executing program 0: 22:15:11 executing program 4: creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)='\x00|\f\xbb\xd4\x1aF\x00t\x15\r\x06\xf2\x9a^\xc8\xca\xc8\x1bz\xa7\'\xa9\x8f\x7f\xe1\xb3Y\x016\x16\xf7\xabq9\xc9\x93N\"\xafG\x0e\x8c\x9e>\xba9\xf3\xc6l1\xee1<\xdd0\x99\x18\xc5\xe2<\xcc56\xa4-\xf6i\xe1\x9aNQ(\xb0ek}\xa2\xa2O:\xc5k\xa3F\xf9\xf7b\x1d\xdc\xa4*\xf7', 0x0, 0x0) 22:15:11 executing program 0: [ 415.881913][ T28] device bridge_slave_1 left promiscuous mode [ 415.888099][ T28] bridge0: port 2(bridge_slave_1) entered disabled state [ 415.952132][ T28] device bridge_slave_0 left promiscuous mode [ 415.958379][ T28] bridge0: port 1(bridge_slave_0) entered disabled state [ 416.681790][ T28] device hsr_slave_0 left promiscuous mode [ 416.752118][ T28] device hsr_slave_1 left promiscuous mode [ 416.811965][ T28] team0 (unregistering): Port device team_slave_1 removed [ 416.827702][ T28] team0 (unregistering): Port device team_slave_0 removed [ 416.839602][ T28] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 416.905676][ T28] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 416.982771][ T28] bond0 (unregistering): Released all slaves [ 417.138848][T15509] IPVS: ftp: loaded support on port[0] = 21 [ 417.194063][T15509] chnl_net:caif_netlink_parms(): no params data found [ 417.221461][T15509] bridge0: port 1(bridge_slave_0) entered blocking state [ 417.228598][T15509] bridge0: port 1(bridge_slave_0) entered disabled state [ 417.236478][T15509] device bridge_slave_0 entered promiscuous mode [ 417.243836][T15509] bridge0: port 2(bridge_slave_1) entered blocking state [ 417.250890][T15509] bridge0: port 2(bridge_slave_1) entered disabled state [ 417.258705][T15509] device bridge_slave_1 entered promiscuous mode [ 417.337257][T15509] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 417.348184][T15509] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 417.376632][T15509] team0: Port device team_slave_0 added [ 417.384358][T15509] team0: Port device team_slave_1 added [ 417.453599][T15509] device hsr_slave_0 entered promiscuous mode [ 417.495657][T15509] device hsr_slave_1 entered promiscuous mode [ 417.551388][T15509] debugfs: Directory 'hsr0' with parent '/' already present! [ 417.571522][T15509] bridge0: port 2(bridge_slave_1) entered blocking state [ 417.578585][T15509] bridge0: port 2(bridge_slave_1) entered forwarding state [ 417.585881][T15509] bridge0: port 1(bridge_slave_0) entered blocking state [ 417.592985][T15509] bridge0: port 1(bridge_slave_0) entered forwarding state [ 417.641054][T15509] 8021q: adding VLAN 0 to HW filter on device bond0 [ 417.658915][ T8029] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 417.671150][ T8029] bridge0: port 1(bridge_slave_0) entered disabled state [ 417.680469][ T8029] bridge0: port 2(bridge_slave_1) entered disabled state [ 417.698667][T15509] 8021q: adding VLAN 0 to HW filter on device team0 [ 417.715054][ T8029] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 417.727112][ T8029] bridge0: port 1(bridge_slave_0) entered blocking state [ 417.734279][ T8029] bridge0: port 1(bridge_slave_0) entered forwarding state [ 417.763200][ T8029] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 417.776498][ T8029] bridge0: port 2(bridge_slave_1) entered blocking state [ 417.783579][ T8029] bridge0: port 2(bridge_slave_1) entered forwarding state [ 417.795294][ T8029] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 417.803930][ T8029] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 417.819357][T15509] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 417.830449][T15509] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 417.848168][ T8070] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 417.856582][ T8070] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 417.867595][ T8070] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 417.877340][ T8070] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 417.893100][ T7984] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 417.900531][ T7984] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 417.911554][T15509] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 418.053958][T15517] fuse: Bad value for 'fd' 22:15:14 executing program 1: bpf$MAP_CREATE(0x0, 0x0, 0x0) accept4$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x0, 0x0, @mcast2}, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgid() ioctl$TIOCGSERIAL(0xffffffffffffffff, 0x541e, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) prctl$PR_SET_SPECULATION_CTRL(0x35, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) sendto$inet6(r0, &(0x7f0000000500)="ce03110075000100ff901efc67195c22cc6dc37916237d8599b512eceb92bd30961166bf00000000070000e19b40b4288ba4e852e8876e977ac94186835a03d045871d6fe30032b46ec4b52a4245f456142304a7821d1c6c8689f4ac12c50cc25534655ee7b237c7a5ba6dcc956757bf80f7146faaefba7f62928a83b54c10bd50c4ea9709367ee58afd37f6f9a0a92decda7d3e5dabe32ba34964ae3278f4c1c443f92eb36c74609cc828c5e2", 0xad, 0x0, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r1, 0x0) write$P9_RWALK(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="b0"], 0x1) timerfd_create(0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x23, &(0x7f0000000040), &(0x7f00000002c0)=0x4) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) r2 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r2, 0x0, 0x0) r3 = socket$caif_stream(0x25, 0x1, 0x5) close(r3) 22:15:14 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="d6ac7d3f595131008901"], 0xa) close(r3) socket(0x10, 0x0, 0x0) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000180)="580000001400192340834b80040d8c560a", 0x11}], 0x1) writev(r2, &(0x7f0000000600)=[{&(0x7f0000000380)="f98ac693ce6908", 0x7}], 0x1) accept4$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0x14, 0x0) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r1, 0x0, r3, 0x0, 0x80000001, 0x0) 22:15:14 executing program 5: 22:15:14 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) write$binfmt_elf32(r2, &(0x7f00000007c0)=ANY=[@ANYBLOB="955a000004000000a423107d0b6e5fbdf500dfff"], 0x14) r4 = socket$inet(0x2, 0x3, 0x7f) bind$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) setsockopt$inet_int(r4, 0x0, 0x3, &(0x7f0000000140)=0x7ff, 0x4) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, &(0x7f0000000000)=0x80, 0x4) splice(r1, 0x0, r3, 0x0, 0x10005, 0x0) 22:15:14 executing program 4: creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)='\x00|\f\xbb\xd4\x1aF\x00t\x15\r\x06\xf2\x9a^\xc8\xca\xc8\x1bz\xa7\'\xa9\x8f\x7f\xe1\xb3Y\x016\x16\xf7\xabq9\xc9\x93N\"\xafG\x0e\x8c\x9e>\xba9\xf3\xc6l1\xee1<\xdd0\x99\x18\xc5\xe2<\xcc56\xa4-\xf6i\xe1\x9aNQ(\xb0ek}\xa2\xa2O\\\xc5k\xa3F\xf9\xf7b\x1d\xdc\xa4*\xf7', 0x0, 0x0) 22:15:14 executing program 0: 22:15:14 executing program 5: 22:15:14 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) write$binfmt_elf32(r2, &(0x7f00000007c0)=ANY=[@ANYBLOB="955a000004000000a423107d0b6e5fbdf500dfff"], 0x14) r4 = socket$inet(0x2, 0x3, 0x7f) bind$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) setsockopt$inet_int(r4, 0x0, 0x3, &(0x7f0000000140)=0x7ff, 0x4) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, &(0x7f0000000000)=0x80, 0x4) splice(r1, 0x0, r3, 0x0, 0x10005, 0x0) 22:15:14 executing program 0: 22:15:14 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="d6ac7d3f595131008901"], 0xa) close(r3) socket(0x10, 0x0, 0x0) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000180)="580000001400192340834b80040d8c560a", 0x11}], 0x1) writev(r2, &(0x7f0000000600)=[{&(0x7f0000000380)="f98ac693ce6908", 0x7}], 0x1) accept4$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0x14, 0x0) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r1, 0x0, r3, 0x0, 0x80000001, 0x0) 22:15:14 executing program 4: creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)='\x00|\f\xbb\xd4\x1aF\x00t\x15\r\x06\xf2\x9a^\xc8\xca\xc8\x1bz\xa7\'\xa9\x8f\x7f\xe1\xb3Y\x016\x16\xf7\xabq9\xc9\x93N\"\xafG\x0e\x8c\x9e>\xba9\xf3\xc6l1\xee1<\xdd0\x99\x18\xc5\xe2<\xcc56\xa4-\xf6i\xe1\x9aNQ(\xb0ek}\xa2\xa2O6\xc5\\\xa3F\xf9\xf7b\x1d\xdc\xa4*\xf7', 0x0, 0x0) 22:15:15 executing program 0: 22:15:15 executing program 1: bpf$MAP_CREATE(0x0, 0x0, 0x0) accept4$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x0, 0x0, @mcast2}, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgid() ioctl$TIOCGSERIAL(0xffffffffffffffff, 0x541e, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) prctl$PR_SET_SPECULATION_CTRL(0x35, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) sendto$inet6(r0, &(0x7f0000000500)="ce03110075000100ff901efc67195c22cc6dc37916237d8599b512eceb92bd30961166bf00000000070000e19b40b4288ba4e852e8876e977ac94186835a03d045871d6fe30032b46ec4b52a4245f456142304a7821d1c6c8689f4ac12c50cc25534655ee7b237c7a5ba6dcc956757bf80f7146faaefba7f62928a83b54c10bd50c4ea9709367ee58afd37f6f9a0a92decda7d3e5dabe32ba34964ae3278f4c1c443f92eb36c74609cc828c5e2", 0xad, 0x0, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r1, 0x0) write$P9_RWALK(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="b0"], 0x1) timerfd_create(0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x23, &(0x7f0000000040), &(0x7f00000002c0)=0x4) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) r2 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r2, 0x0, 0x0) r3 = socket$caif_stream(0x25, 0x1, 0x5) close(r3) 22:15:15 executing program 5: 22:15:15 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="d6ac7d3f595131008901"], 0xa) close(r3) socket(0x10, 0x3, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) writev(r2, &(0x7f0000000600)=[{&(0x7f0000000380)="f98ac693ce6908", 0x7}], 0x1) accept4$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0x14, 0x0) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r1, 0x0, r3, 0x0, 0x80000001, 0x0) 22:15:15 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) write$binfmt_elf32(r2, &(0x7f00000007c0)=ANY=[@ANYBLOB="955a000004000000a423107d0b6e5fbdf500dfff"], 0x14) r4 = socket$inet(0x2, 0x3, 0x7f) bind$inet(r3, 0x0, 0x0) setsockopt$inet_int(r4, 0x0, 0x3, &(0x7f0000000140)=0x7ff, 0x4) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, &(0x7f0000000000)=0x80, 0x4) splice(r1, 0x0, r3, 0x0, 0x10005, 0x0) 22:15:15 executing program 0: 22:15:15 executing program 1: bpf$MAP_CREATE(0x0, 0x0, 0x0) accept4$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x0, 0x0, @mcast2}, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgid() ioctl$TIOCGSERIAL(0xffffffffffffffff, 0x541e, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) prctl$PR_SET_SPECULATION_CTRL(0x35, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) sendto$inet6(r0, &(0x7f0000000500)="ce03110075000100ff901efc67195c22cc6dc37916237d8599b512eceb92bd30961166bf00000000070000e19b40b4288ba4e852e8876e977ac94186835a03d045871d6fe30032b46ec4b52a4245f456142304a7821d1c6c8689f4ac12c50cc25534655ee7b237c7a5ba6dcc956757bf80f7146faaefba7f62928a83b54c10bd50c4ea9709367ee58afd37f6f9a0a92decda7d3e5dabe32ba34964ae3278f4c1c443f92eb36c74609cc828c5e2", 0xad, 0x0, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r1, 0x0) write$P9_RWALK(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="b0"], 0x1) timerfd_create(0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x23, &(0x7f0000000040), &(0x7f00000002c0)=0x4) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) r2 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r2, 0x0, 0x0) r3 = socket$caif_stream(0x25, 0x1, 0x5) close(r3) 22:15:15 executing program 4: creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)='\x00|\f\xbb\xd4\x1aF\x00t\x15\r\x06\xf2\x9a^\xc8\xca\xc8\x1bz\xa7\'\xa9\x8f\x7f\xe1\xb3Y\x016\x16\xf7\xabq9\xc9\x93N\"\xafG\x0e\x8c\x9e>\xba9\xf3\xc6l1\xee1<\xdd0\x99\x18\xc5\xe2<\xcc56\xa4-\xf6i\xe1\x9aNQ(\xb0ek}\xa2\xa2O6\xc5k\xa3F\xf9\xf7b:\xdc\xa4*\xf7', 0x0, 0x0) 22:15:15 executing program 5: 22:15:15 executing program 0: 22:15:15 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) write$binfmt_elf32(r2, &(0x7f00000007c0)=ANY=[@ANYBLOB="955a000004000000a423107d0b6e5fbdf500dfff"], 0x14) r4 = socket$inet(0x2, 0x3, 0x7f) bind$inet(r3, 0x0, 0x0) setsockopt$inet_int(r4, 0x0, 0x3, &(0x7f0000000140)=0x7ff, 0x4) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, &(0x7f0000000000)=0x80, 0x4) splice(r1, 0x0, r3, 0x0, 0x10005, 0x0) 22:15:15 executing program 5: 22:15:15 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="d6ac7d3f595131008901"], 0xa) close(r3) socket(0x10, 0x3, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) writev(r2, &(0x7f0000000600)=[{&(0x7f0000000380)="f98ac693ce6908", 0x7}], 0x1) accept4$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0x14, 0x0) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r1, 0x0, r3, 0x0, 0x80000001, 0x0) 22:15:15 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f00000000c0), 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x64}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r1, 0x1800000000000060, 0xcc0, 0x0, &(0x7f0000000000)="b90703e6680d698cb89e15f02cea", 0x0, 0x100}, 0x28) 22:15:15 executing program 4: creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)='\x00|\f\xbb\xd4\x1aF\x00t\x15\r\x06\xf2\x9a^\xc8\xca\xc8\x1bz\xa7\'\xa9\x8f\x7f\xe1\xb3Y\x016\x16\xf7\xabq9\xc9\x93N\"\xafG\x0e\x8c\x9e>\xba9\xf3\xc6l1\xee1<\xdd0\x99\x18\xc5\xe2<\xcc56\xa4-\xf6i\xe1\x9aNQ(\xb0ek}\xa2\xa2O6\xc5k\xa3F\xf9\xf7b\x1d\xdc\xa4\a\xf7', 0x0, 0x0) 22:15:16 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) write$binfmt_elf32(r2, &(0x7f00000007c0)=ANY=[@ANYBLOB="955a000004000000a423107d0b6e5fbdf500dfff"], 0x14) r4 = socket$inet(0x2, 0x3, 0x7f) bind$inet(r3, 0x0, 0x0) setsockopt$inet_int(r4, 0x0, 0x3, &(0x7f0000000140)=0x7ff, 0x4) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, &(0x7f0000000000)=0x80, 0x4) splice(r1, 0x0, r3, 0x0, 0x10005, 0x0) 22:15:16 executing program 5: 22:15:16 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="d6ac7d3f595131008901"], 0xa) close(r3) socket(0x10, 0x3, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) writev(r2, &(0x7f0000000600)=[{&(0x7f0000000380)="f98ac693ce6908", 0x7}], 0x1) accept4$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0x14, 0x0) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r1, 0x0, r3, 0x0, 0x80000001, 0x0) [ 420.621865][ T28] device bridge_slave_1 left promiscuous mode [ 420.628121][ T28] bridge0: port 2(bridge_slave_1) entered disabled state [ 420.682270][ T28] device bridge_slave_0 left promiscuous mode [ 420.688443][ T28] bridge0: port 1(bridge_slave_0) entered disabled state [ 421.391869][ T28] device hsr_slave_0 left promiscuous mode [ 421.461433][ T28] device hsr_slave_1 left promiscuous mode [ 421.519965][ T28] team0 (unregistering): Port device team_slave_1 removed [ 421.535666][ T28] team0 (unregistering): Port device team_slave_0 removed [ 421.550933][ T28] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 421.614893][ T28] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 421.693895][ T28] bond0 (unregistering): Released all slaves [ 421.847909][T16006] IPVS: ftp: loaded support on port[0] = 21 [ 421.903671][T16006] chnl_net:caif_netlink_parms(): no params data found [ 421.932611][T16006] bridge0: port 1(bridge_slave_0) entered blocking state [ 421.939736][T16006] bridge0: port 1(bridge_slave_0) entered disabled state [ 421.949796][T16006] device bridge_slave_0 entered promiscuous mode [ 421.957681][T16006] bridge0: port 2(bridge_slave_1) entered blocking state [ 421.964833][T16006] bridge0: port 2(bridge_slave_1) entered disabled state [ 421.972680][T16006] device bridge_slave_1 entered promiscuous mode [ 422.046966][T16006] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 422.058962][T16006] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 422.086368][T16006] team0: Port device team_slave_0 added [ 422.094489][T16006] team0: Port device team_slave_1 added [ 422.154992][T16006] device hsr_slave_0 entered promiscuous mode [ 422.193139][T16006] device hsr_slave_1 entered promiscuous mode [ 422.232819][T16006] debugfs: Directory 'hsr0' with parent '/' already present! [ 422.250880][T16006] bridge0: port 2(bridge_slave_1) entered blocking state [ 422.257960][T16006] bridge0: port 2(bridge_slave_1) entered forwarding state [ 422.265315][T16006] bridge0: port 1(bridge_slave_0) entered blocking state [ 422.272363][T16006] bridge0: port 1(bridge_slave_0) entered forwarding state [ 422.324320][T16006] 8021q: adding VLAN 0 to HW filter on device bond0 [ 422.339427][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 422.351202][ T12] bridge0: port 1(bridge_slave_0) entered disabled state [ 422.365386][ T12] bridge0: port 2(bridge_slave_1) entered disabled state [ 422.380533][T16006] 8021q: adding VLAN 0 to HW filter on device team0 [ 422.392766][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 422.401239][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 422.408326][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 422.426775][ T8070] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 422.435674][ T8070] bridge0: port 2(bridge_slave_1) entered blocking state [ 422.442822][ T8070] bridge0: port 2(bridge_slave_1) entered forwarding state [ 422.467000][ T8029] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 422.480620][ T8029] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 422.489878][ T8029] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 422.506130][T16006] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 422.518325][T16006] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 422.529672][ T8029] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 422.538268][ T8029] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 422.554806][T16006] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 422.564601][ T8070] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 422.573658][ T8070] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 422.706019][T16013] fuse: Bad value for 'fd' 22:15:19 executing program 1: bpf$MAP_CREATE(0x0, 0x0, 0x0) accept4$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x0, 0x0, @mcast2}, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgid() ioctl$TIOCGSERIAL(0xffffffffffffffff, 0x541e, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) prctl$PR_SET_SPECULATION_CTRL(0x35, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) sendto$inet6(r0, &(0x7f0000000500)="ce03110075000100ff901efc67195c22cc6dc37916237d8599b512eceb92bd30961166bf00000000070000e19b40b4288ba4e852e8876e977ac94186835a03d045871d6fe30032b46ec4b52a4245f456142304a7821d1c6c8689f4ac12c50cc25534655ee7b237c7a5ba6dcc956757bf80f7146faaefba7f62928a83b54c10bd50c4ea9709367ee58afd37f6f9a0a92decda7d3e5dabe32ba34964ae3278f4c1c443f92eb36c74609cc828c5e2", 0xad, 0x0, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) keyctl$read(0xb, 0x0, &(0x7f00000004c0)=""/8, 0x8) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, 0xffffffffffffffff, 0x0) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="b0"], 0x1) timerfd_create(0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x23, &(0x7f0000000040), &(0x7f00000002c0)=0x4) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) r1 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r1, 0x0, 0x0) r2 = socket$caif_stream(0x25, 0x1, 0x5) close(r2) 22:15:19 executing program 4: creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)='\x00|\f\xbb\xd4\x1aF\x00t\x15\r\x06\xf2\x9a^\xc8\xca\xc8\x1bz\xa7\'\xa9\x8f\x7f\xe1\xb3Y\x016\x16\xf7\xabq9\xc9\x93N\"\xafG\x0e\x8c\x9e>\xba9\xf3\xc6l1\xee1<\xdd0\x99\x18\xc5\xe2<\xcc56\xa4-\xf6i\xe1\x9aNQ(\xb0ek}\xa2\xa2O6\xc5k\xa3F\xf9\xf7b\x1d\xdc\xa4:\xf7', 0x0, 0x0) 22:15:19 executing program 0: 22:15:19 executing program 5: 22:15:19 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="d6ac7d3f595131008901"], 0xa) close(r3) socket(0x10, 0x3, 0x0) writev(0xffffffffffffffff, &(0x7f0000000080), 0x0) writev(r2, &(0x7f0000000600)=[{&(0x7f0000000380)="f98ac693ce6908", 0x7}], 0x1) accept4$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0x14, 0x0) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r1, 0x0, r3, 0x0, 0x80000001, 0x0) 22:15:19 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) write$binfmt_elf32(r2, &(0x7f00000007c0)=ANY=[@ANYBLOB="955a000004000000a423107d0b6e5fbdf500dfff"], 0x14) socket$inet(0x2, 0x3, 0x7f) bind$inet(r3, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x3, &(0x7f0000000140)=0x7ff, 0x4) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, &(0x7f0000000000)=0x80, 0x4) splice(r1, 0x0, r3, 0x0, 0x10005, 0x0) 22:15:19 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) write$binfmt_elf32(r2, &(0x7f00000007c0)=ANY=[@ANYBLOB="955a000004000000a423107d0b6e5fbdf500dfff"], 0x14) socket$inet(0x2, 0x3, 0x7f) bind$inet(r3, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x3, &(0x7f0000000140)=0x7ff, 0x4) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, &(0x7f0000000000)=0x80, 0x4) splice(r1, 0x0, r3, 0x0, 0x10005, 0x0) 22:15:19 executing program 5: 22:15:19 executing program 0: 22:15:19 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="d6ac7d3f595131008901"], 0xa) close(r3) socket(0x10, 0x3, 0x0) writev(0xffffffffffffffff, &(0x7f0000000080), 0x0) writev(r2, &(0x7f0000000600)=[{&(0x7f0000000380)="f98ac693ce6908", 0x7}], 0x1) accept4$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0x14, 0x0) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r1, 0x0, r3, 0x0, 0x80000001, 0x0) 22:15:19 executing program 4: creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)='\x00|\f\xbb\xd4\x1aF\x00t\x15\r\x06\xf2\x9a^\xc8\xca\xc8\x1bz\xa7\'\xa9\x8f\x7f\xe1\xb3Y\x016\x16\xf7\xabq9\xc9\x93N\"\xafG\x0e\x8c\x9e>\xba9\xf3\xc6l1\xee1<\xdd0\x99\x18\xc5\xe2<\xcc56\xa4-\xf6i\xe1\x9aNQ(\xb0ek}\xa2\xa2O6\xc5k\xa3F\xf9\xf7b\x1d\xdc\xa4*\xf7', 0x2, 0x0) 22:15:19 executing program 5: 22:15:19 executing program 1: bpf$MAP_CREATE(0x0, 0x0, 0x0) accept4$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x0, 0x0, @mcast2}, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgid() ioctl$TIOCGSERIAL(0xffffffffffffffff, 0x541e, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) prctl$PR_SET_SPECULATION_CTRL(0x35, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) sendto$inet6(r0, &(0x7f0000000500)="ce03110075000100ff901efc67195c22cc6dc37916237d8599b512eceb92bd30961166bf00000000070000e19b40b4288ba4e852e8876e977ac94186835a03d045871d6fe30032b46ec4b52a4245f456142304a7821d1c6c8689f4ac12c50cc25534655ee7b237c7a5ba6dcc956757bf80f7146faaefba7f62928a83b54c10bd50c4ea9709367ee58afd37f6f9a0a92decda7d3e5dabe32ba34964ae3278f4c1c443f92eb36c74609cc828c5e2", 0xad, 0x0, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) keyctl$read(0xb, 0x0, &(0x7f00000004c0)=""/8, 0x8) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, 0xffffffffffffffff, 0x0) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="b0"], 0x1) timerfd_create(0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x23, &(0x7f0000000040), &(0x7f00000002c0)=0x4) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) r1 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r1, 0x0, 0x0) r2 = socket$caif_stream(0x25, 0x1, 0x5) close(r2) 22:15:19 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_CHILD_SUBREAPER(0x24, 0x0) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, &(0x7f0000000280)) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) dup(0xffffffffffffffff) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8912, &(0x7f0000000340)=@buf={0x19, &(0x7f0000000400)="059327c362f4fc82b8e49f1b0d54702f6f5ce8160bd6ce2122"}) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000700)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000009700000002fbe52097be7d28bfb75b74fce5f9219a2a25d7f38fc7c67fef4b7571428c22bc794ce05588cfece741fe2e3b35e068624512fb0acc1bad25e28d2df4884d8580ce351c386bd87b2526ebc77febd47ed72c439f65607b06ab513f579f4e5656c0d38165bc50901a5a9737ccd7586030dc246e966aa666c4cd849496b7ccd12f860c3a658c23b5c21639ebc8b79cb8cc8d6e14222cd977cec2349c6322a330a1ec7df864d000"/223], &(0x7f0000000480)=0xbb) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, r1, 0x0, 0x1) write$P9_RCREATE(r1, &(0x7f0000000140)={0x18, 0x73, 0x1, {{0x85, 0x0, 0x1}, 0x10000}}, 0xfffffd8c) eventfd2(0x8, 0x80801) r2 = socket(0x0, 0x3, 0x0) r3 = socket(0x10, 0x3, 0x0) getpeername$packet(r3, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) setsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@local, @in=@loopback, 0x0, 0x0, 0x4e20, 0x52, 0x0, 0x60, 0x1e0, 0x3c}, {0x0, 0x7f, 0x1f, 0x5, 0x1, 0x8, 0x5, 0x5}, {0xff, 0x81, 0x9f, 0x1}, 0xffffb8f4, 0x6e6bbb, 0x1, 0x1}, {{@in=@multicast2, 0x4d4, 0x3c}, 0x0, @in=@remote, 0x3507, 0x66ec9d1f38a7d4, 0x0, 0x9d, 0x9, 0x8, 0x3}}, 0xe8) openat$cgroup_ro(r0, &(0x7f00000000c0)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) 22:15:19 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="d6ac7d3f595131008901"], 0xa) close(r3) socket(0x10, 0x3, 0x0) writev(0xffffffffffffffff, &(0x7f0000000080), 0x0) writev(r2, &(0x7f0000000600)=[{&(0x7f0000000380)="f98ac693ce6908", 0x7}], 0x1) accept4$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0x14, 0x0) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r1, 0x0, r3, 0x0, 0x80000001, 0x0) 22:15:19 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) write$binfmt_elf32(r2, &(0x7f00000007c0)=ANY=[@ANYBLOB="955a000004000000a423107d0b6e5fbdf500dfff"], 0x14) socket$inet(0x2, 0x3, 0x7f) bind$inet(r3, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x3, &(0x7f0000000140)=0x7ff, 0x4) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, &(0x7f0000000000)=0x80, 0x4) splice(r1, 0x0, r3, 0x0, 0x10005, 0x0) 22:15:19 executing program 4: creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)='\x00|\f\xbb\xd4\x1aF\x00t\x15\r\x06\xf2\x9a^\xc8\xca\xc8\x1bz\xa7\'\xa9\x8f\x7f\xe1\xb3Y\x016\x16\xf7\xabq9\xc9\x93N\"\xafG\x0e\x8c\x9e>\xba9\xf3\xc6l1\xee1<\xdd0\x99\x18\xc5\xe2<\xcc56\xa4-\xf6i\xe1\x9aNQ(\xb0ek}\xa2\xa2O6\xc5k\xa3F\xf9\xf7b\x1d\xdc\xa4*\xf7', 0x3, 0x0) 22:15:19 executing program 1: bpf$MAP_CREATE(0x0, 0x0, 0x0) accept4$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x0, 0x0, @mcast2}, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgid() ioctl$TIOCGSERIAL(0xffffffffffffffff, 0x541e, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) prctl$PR_SET_SPECULATION_CTRL(0x35, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) sendto$inet6(r0, &(0x7f0000000500)="ce03110075000100ff901efc67195c22cc6dc37916237d8599b512eceb92bd30961166bf00000000070000e19b40b4288ba4e852e8876e977ac94186835a03d045871d6fe30032b46ec4b52a4245f456142304a7821d1c6c8689f4ac12c50cc25534655ee7b237c7a5ba6dcc956757bf80f7146faaefba7f62928a83b54c10bd50c4ea9709367ee58afd37f6f9a0a92decda7d3e5dabe32ba34964ae3278f4c1c443f92eb36c74609cc828c5e2", 0xad, 0x0, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) keyctl$read(0xb, 0x0, &(0x7f00000004c0)=""/8, 0x8) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, 0xffffffffffffffff, 0x0) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="b0"], 0x1) timerfd_create(0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x23, &(0x7f0000000040), &(0x7f00000002c0)=0x4) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) r1 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r1, 0x0, 0x0) r2 = socket$caif_stream(0x25, 0x1, 0x5) close(r2) 22:15:20 executing program 5: r0 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) poll(&(0x7f00000000c0)=[{r0}], 0x1, 0x0) 22:15:20 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="d6ac7d3f595131008901"], 0xa) close(r3) socket(0x10, 0x3, 0x0) writev(0xffffffffffffffff, &(0x7f0000000080)=[{0x0}], 0x1) writev(r2, &(0x7f0000000600)=[{&(0x7f0000000380)="f98ac693ce6908", 0x7}], 0x1) accept4$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0x14, 0x0) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r1, 0x0, r3, 0x0, 0x80000001, 0x0) 22:15:20 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) write$binfmt_elf32(r2, &(0x7f00000007c0)=ANY=[@ANYBLOB="955a000004000000a423107d0b6e5fbdf500dfff"], 0x14) r4 = socket$inet(0x2, 0x3, 0x7f) bind$inet(r3, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) setsockopt$inet_int(r4, 0x0, 0x0, &(0x7f0000000140)=0x7ff, 0x4) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, &(0x7f0000000000)=0x80, 0x4) splice(r1, 0x0, r3, 0x0, 0x10005, 0x0) 22:15:20 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='loginuid\x00') write$FUSE_BMAP(r0, 0x0, 0x0) 22:15:20 executing program 4: creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)='\x00|\f\xbb\xd4\x1aF\x00t\x15\r\x06\xf2\x9a^\xc8\xca\xc8\x1bz\xa7\'\xa9\x8f\x7f\xe1\xb3Y\x016\x16\xf7\xabq9\xc9\x93N\"\xafG\x0e\x8c\x9e>\xba9\xf3\xc6l1\xee1<\xdd0\x99\x18\xc5\xe2<\xcc56\xa4-\xf6i\xe1\x9aNQ(\xb0ek}\xa2\xa2O6\xc5k\xa3F\xf9\xf7b\x1d\xdc\xa4*\xf7', 0x4, 0x0) 22:15:20 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'ifb0\x00', 0x2}) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) 22:15:20 executing program 0: bpf$MAP_CREATE(0x0, 0x0, 0x0) accept4$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x0, 0x0, @mcast2}, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgid() ioctl$TIOCGSERIAL(0xffffffffffffffff, 0x541e, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) prctl$PR_SET_SPECULATION_CTRL(0x35, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) sendto$inet6(r0, &(0x7f0000000500)="ce03110075000100ff901efc67195c22cc6dc37916237d8599b512eceb92bd30961166bf00000000070000e19b40b4288ba4e852e8876e977ac94186835a03d045871d6fe30032b46ec4b52a4245f456142304a7821d1c6c8689f4ac12c50cc25534655ee7b237c7a5ba6dcc956757bf80f7146faaefba7f62928a83b54c10bd50c4ea9709367ee58afd37f6f9a0a92decda7d3e5dabe32ba34964ae3278f4c1c443f92eb36c74609cc828c5e2", 0xad, 0x0, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r1, 0x0) write$P9_RWALK(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="b0"], 0x1) timerfd_create(0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x23, &(0x7f0000000040), &(0x7f00000002c0)=0x4) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) r2 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r2, 0x0, 0x0) r3 = socket$caif_stream(0x25, 0x1, 0x5) close(r3) 22:15:20 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) write$binfmt_elf32(r2, &(0x7f00000007c0)=ANY=[@ANYBLOB="955a000004000000a423107d0b6e5fbdf500dfff"], 0x14) r4 = socket$inet(0x2, 0x3, 0x7f) bind$inet(r3, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) setsockopt$inet_int(r4, 0x0, 0x0, &(0x7f0000000140)=0x7ff, 0x4) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, &(0x7f0000000000)=0x80, 0x4) splice(r1, 0x0, r3, 0x0, 0x10005, 0x0) 22:15:20 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="d6ac7d3f595131008901"], 0xa) close(r3) socket(0x10, 0x3, 0x0) writev(0xffffffffffffffff, &(0x7f0000000080)=[{0x0}], 0x1) writev(r2, &(0x7f0000000600)=[{&(0x7f0000000380)="f98ac693ce6908", 0x7}], 0x1) accept4$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0x14, 0x0) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r1, 0x0, r3, 0x0, 0x80000001, 0x0) [ 424.403203][T16471] fuse: Bad value for 'fd' 22:15:20 executing program 4: creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)='\x00|\f\xbb\xd4\x1aF\x00t\x15\r\x06\xf2\x9a^\xc8\xca\xc8\x1bz\xa7\'\xa9\x8f\x7f\xe1\xb3Y\x016\x16\xf7\xabq9\xc9\x93N\"\xafG\x0e\x8c\x9e>\xba9\xf3\xc6l1\xee1<\xdd0\x99\x18\xc5\xe2<\xcc56\xa4-\xf6i\xe1\x9aNQ(\xb0ek}\xa2\xa2O6\xc5k\xa3F\xf9\xf7b\x1d\xdc\xa4*\xf7', 0x5, 0x0) 22:15:21 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) write$binfmt_elf32(r2, &(0x7f00000007c0)=ANY=[@ANYBLOB="955a000004000000a423107d0b6e5fbdf500dfff"], 0x14) r4 = socket$inet(0x2, 0x3, 0x7f) bind$inet(r3, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) setsockopt$inet_int(r4, 0x0, 0x0, &(0x7f0000000140)=0x7ff, 0x4) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, &(0x7f0000000000)=0x80, 0x4) splice(r1, 0x0, r3, 0x0, 0x10005, 0x0) [ 425.512067][ T28] device bridge_slave_1 left promiscuous mode [ 425.518305][ T28] bridge0: port 2(bridge_slave_1) entered disabled state [ 425.552231][ T28] device bridge_slave_0 left promiscuous mode [ 425.558446][ T28] bridge0: port 1(bridge_slave_0) entered disabled state [ 426.291778][ T28] device hsr_slave_0 left promiscuous mode [ 426.361387][ T28] device hsr_slave_1 left promiscuous mode [ 426.407489][ T28] team0 (unregistering): Port device team_slave_1 removed [ 426.418911][ T28] team0 (unregistering): Port device team_slave_0 removed [ 426.429062][ T28] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 426.496014][ T28] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 426.572709][ T28] bond0 (unregistering): Released all slaves [ 426.688457][T16615] IPVS: ftp: loaded support on port[0] = 21 [ 426.741037][T16615] chnl_net:caif_netlink_parms(): no params data found [ 426.814646][T16615] bridge0: port 1(bridge_slave_0) entered blocking state [ 426.822414][T16615] bridge0: port 1(bridge_slave_0) entered disabled state [ 426.830182][T16615] device bridge_slave_0 entered promiscuous mode [ 426.842740][T16615] bridge0: port 2(bridge_slave_1) entered blocking state [ 426.849866][T16615] bridge0: port 2(bridge_slave_1) entered disabled state [ 426.860807][T16615] device bridge_slave_1 entered promiscuous mode [ 426.884424][T16615] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 426.898601][T16615] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 426.923950][T16615] team0: Port device team_slave_0 added [ 426.930677][T16615] team0: Port device team_slave_1 added [ 426.997296][T16615] device hsr_slave_0 entered promiscuous mode [ 427.051794][T16615] device hsr_slave_1 entered promiscuous mode [ 427.091367][T16615] debugfs: Directory 'hsr0' with parent '/' already present! [ 427.110628][T16615] bridge0: port 2(bridge_slave_1) entered blocking state [ 427.117702][T16615] bridge0: port 2(bridge_slave_1) entered forwarding state [ 427.125115][T16615] bridge0: port 1(bridge_slave_0) entered blocking state [ 427.132168][T16615] bridge0: port 1(bridge_slave_0) entered forwarding state [ 427.181022][T16615] 8021q: adding VLAN 0 to HW filter on device bond0 [ 427.198279][ T8029] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 427.209455][ T8029] bridge0: port 1(bridge_slave_0) entered disabled state [ 427.219859][ T8029] bridge0: port 2(bridge_slave_1) entered disabled state [ 427.238140][T16615] 8021q: adding VLAN 0 to HW filter on device team0 [ 427.254467][ T8029] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 427.266041][ T8029] bridge0: port 1(bridge_slave_0) entered blocking state [ 427.273124][ T8029] bridge0: port 1(bridge_slave_0) entered forwarding state [ 427.295122][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 427.304258][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 427.311336][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 427.321262][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 427.331097][ T8070] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 427.343107][T12204] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 427.357464][T16615] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 427.368521][T16615] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 427.381300][ T8070] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 427.390150][ T8070] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 427.410011][T16615] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 427.418994][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 427.427033][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 427.435015][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 427.616457][T16623] fuse: Bad value for 'fd' 22:15:24 executing program 1: bpf$MAP_CREATE(0x0, 0x0, 0x0) accept4$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x0, 0x0, @mcast2}, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgid() ioctl$TIOCGSERIAL(0xffffffffffffffff, 0x541e, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) prctl$PR_SET_SPECULATION_CTRL(0x35, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) sendto$inet6(r0, &(0x7f0000000500)="ce03110075000100ff901efc67195c22cc6dc37916237d8599b512eceb92bd30961166bf00000000070000e19b40b4288ba4e852e8876e977ac94186835a03d045871d6fe30032b46ec4b52a4245f456142304a7821d1c6c8689f4ac12c50cc25534655ee7b237c7a5ba6dcc956757bf80f7146faaefba7f62928a83b54c10bd50c4ea9709367ee58afd37f6f9a0a92decda7d3e5dabe32ba34964ae3278f4c1c443f92eb36c74609cc828c5e2", 0xad, 0x0, 0x0, 0x0) keyctl$read(0xb, 0x0, &(0x7f00000004c0)=""/8, 0x8) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, 0xffffffffffffffff, 0x0) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="b0"], 0x1) timerfd_create(0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x23, &(0x7f0000000040), &(0x7f00000002c0)=0x4) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) r1 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r1, 0x0, 0x0) r2 = socket$caif_stream(0x25, 0x1, 0x5) close(r2) 22:15:24 executing program 5: bpf$MAP_CREATE(0x0, 0x0, 0x0) accept4$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x0, 0x0, @mcast2}, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgid() ioctl$TIOCGSERIAL(0xffffffffffffffff, 0x541e, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) prctl$PR_SET_SPECULATION_CTRL(0x35, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) sendto$inet6(r0, &(0x7f0000000500)="ce03110075000100ff901efc67195c22cc6dc37916237d8599b512eceb92bd30961166bf00000000070000e19b40b4288ba4e852e8876e977ac94186835a03d045871d6fe30032b46ec4b52a4245f456142304a7821d1c6c8689f4ac12c50cc25534655ee7b237c7a5ba6dcc956757bf80f7146faaefba7f62928a83b54c10bd50c4ea9709367ee58afd37f6f9a0a92decda7d3e5dabe32ba34964ae3278f4c1c443f92eb36c74609cc828c5e2", 0xad, 0x0, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r1, 0x0) write$P9_RWALK(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="b0"], 0x1) timerfd_create(0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x23, &(0x7f0000000040), &(0x7f00000002c0)=0x4) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) r2 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r2, 0x0, 0x0) r3 = socket$caif_stream(0x25, 0x1, 0x5) close(r3) 22:15:24 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="d6ac7d3f595131008901"], 0xa) close(r3) socket(0x10, 0x3, 0x0) writev(0xffffffffffffffff, &(0x7f0000000080)=[{0x0}], 0x1) writev(r2, &(0x7f0000000600)=[{&(0x7f0000000380)="f98ac693ce6908", 0x7}], 0x1) accept4$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0x14, 0x0) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r1, 0x0, r3, 0x0, 0x80000001, 0x0) 22:15:24 executing program 0: bpf$MAP_CREATE(0x0, 0x0, 0x0) accept4$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x0, 0x0, @mcast2}, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgid() ioctl$TIOCGSERIAL(0xffffffffffffffff, 0x541e, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) prctl$PR_SET_SPECULATION_CTRL(0x35, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) sendto$inet6(r0, &(0x7f0000000500)="ce03110075000100ff901efc67195c22cc6dc37916237d8599b512eceb92bd30961166bf00000000070000e19b40b4288ba4e852e8876e977ac94186835a03d045871d6fe30032b46ec4b52a4245f456142304a7821d1c6c8689f4ac12c50cc25534655ee7b237c7a5ba6dcc956757bf80f7146faaefba7f62928a83b54c10bd50c4ea9709367ee58afd37f6f9a0a92decda7d3e5dabe32ba34964ae3278f4c1c443f92eb36c74609cc828c5e2", 0xad, 0x0, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r1, 0x0) write$P9_RWALK(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="b0"], 0x1) timerfd_create(0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x23, &(0x7f0000000040), &(0x7f00000002c0)=0x4) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) r2 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r2, 0x0, 0x0) r3 = socket$caif_stream(0x25, 0x1, 0x5) close(r3) 22:15:24 executing program 4: creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)='\x00|\f\xbb\xd4\x1aF\x00t\x15\r\x06\xf2\x9a^\xc8\xca\xc8\x1bz\xa7\'\xa9\x8f\x7f\xe1\xb3Y\x016\x16\xf7\xabq9\xc9\x93N\"\xafG\x0e\x8c\x9e>\xba9\xf3\xc6l1\xee1<\xdd0\x99\x18\xc5\xe2<\xcc56\xa4-\xf6i\xe1\x9aNQ(\xb0ek}\xa2\xa2O6\xc5k\xa3F\xf9\xf7b\x1d\xdc\xa4*\xf7', 0x6, 0x0) 22:15:24 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) write$binfmt_elf32(r2, &(0x7f00000007c0)=ANY=[@ANYBLOB="955a000004000000a423107d0b6e5fbdf500dfff"], 0x14) r4 = socket$inet(0x2, 0x3, 0x7f) bind$inet(r3, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) setsockopt$inet_int(r4, 0x0, 0x3, 0x0, 0x0) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, &(0x7f0000000000)=0x80, 0x4) splice(r1, 0x0, r3, 0x0, 0x10005, 0x0) 22:15:24 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="d6ac7d3f595131008901"], 0xa) close(r3) socket(0x10, 0x3, 0x0) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000180)}], 0x1) writev(r2, &(0x7f0000000600)=[{&(0x7f0000000380)="f98ac693ce6908", 0x7}], 0x1) accept4$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0x14, 0x0) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r1, 0x0, r3, 0x0, 0x80000001, 0x0) [ 427.857752][T16631] fuse: Bad value for 'fd' 22:15:24 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) write$binfmt_elf32(r2, &(0x7f00000007c0)=ANY=[@ANYBLOB="955a000004000000a423107d0b6e5fbdf500dfff"], 0x14) r4 = socket$inet(0x2, 0x3, 0x7f) bind$inet(r3, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) setsockopt$inet_int(r4, 0x0, 0x3, 0x0, 0x0) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, &(0x7f0000000000)=0x80, 0x4) splice(r1, 0x0, r3, 0x0, 0x10005, 0x0) 22:15:24 executing program 4: creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)='\x00|\f\xbb\xd4\x1aF\x00t\x15\r\x06\xf2\x9a^\xc8\xca\xc8\x1bz\xa7\'\xa9\x8f\x7f\xe1\xb3Y\x016\x16\xf7\xabq9\xc9\x93N\"\xafG\x0e\x8c\x9e>\xba9\xf3\xc6l1\xee1<\xdd0\x99\x18\xc5\xe2<\xcc56\xa4-\xf6i\xe1\x9aNQ(\xb0ek}\xa2\xa2O6\xc5k\xa3F\xf9\xf7b\x1d\xdc\xa4*\xf7', 0x7, 0x0) 22:15:24 executing program 5: bpf$MAP_CREATE(0x0, 0x0, 0x0) accept4$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x0, 0x0, @mcast2}, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgid() ioctl$TIOCGSERIAL(0xffffffffffffffff, 0x541e, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) prctl$PR_SET_SPECULATION_CTRL(0x35, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) sendto$inet6(r0, &(0x7f0000000500)="ce03110075000100ff901efc67195c22cc6dc37916237d8599b512eceb92bd30961166bf00000000070000e19b40b4288ba4e852e8876e977ac94186835a03d045871d6fe30032b46ec4b52a4245f456142304a7821d1c6c8689f4ac12c50cc25534655ee7b237c7a5ba6dcc956757bf80f7146faaefba7f62928a83b54c10bd50c4ea9709367ee58afd37f6f9a0a92decda7d3e5dabe32ba34964ae3278f4c1c443f92eb36c74609cc828c5e2", 0xad, 0x0, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) keyctl$read(0xb, 0x0, &(0x7f00000004c0)=""/8, 0x8) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, 0xffffffffffffffff, 0x0) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="b0"], 0x1) timerfd_create(0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x23, &(0x7f0000000040), &(0x7f00000002c0)=0x4) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) r1 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r1, 0x0, 0x0) r2 = socket$caif_stream(0x25, 0x1, 0x5) close(r2) 22:15:24 executing program 4: creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)='\x00|\f\xbb\xd4\x1aF\x00t\x15\r\x06\xf2\x9a^\xc8\xca\xc8\x1bz\xa7\'\xa9\x8f\x7f\xe1\xb3Y\x016\x16\xf7\xabq9\xc9\x93N\"\xafG\x0e\x8c\x9e>\xba9\xf3\xc6l1\xee1<\xdd0\x99\x18\xc5\xe2<\xcc56\xa4-\xf6i\xe1\x9aNQ(\xb0ek}\xa2\xa2O6\xc5k\xa3F\xf9\xf7b\x1d\xdc\xa4*\xf7', 0xf0, 0x0) 22:15:24 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) write$binfmt_elf32(r2, &(0x7f00000007c0)=ANY=[@ANYBLOB="955a000004000000a423107d0b6e5fbdf500dfff"], 0x14) r4 = socket$inet(0x2, 0x3, 0x7f) bind$inet(r3, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) setsockopt$inet_int(r4, 0x0, 0x3, 0x0, 0x0) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, &(0x7f0000000000)=0x80, 0x4) splice(r1, 0x0, r3, 0x0, 0x10005, 0x0) 22:15:25 executing program 1: bpf$MAP_CREATE(0x0, 0x0, 0x0) accept4$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x0, 0x0, @mcast2}, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgid() ioctl$TIOCGSERIAL(0xffffffffffffffff, 0x541e, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) prctl$PR_SET_SPECULATION_CTRL(0x35, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) sendto$inet6(r0, &(0x7f0000000500)="ce03110075000100ff901efc67195c22cc6dc37916237d8599b512eceb92bd30961166bf00000000070000e19b40b4288ba4e852e8876e977ac94186835a03d045871d6fe30032b46ec4b52a4245f456142304a7821d1c6c8689f4ac12c50cc25534655ee7b237c7a5ba6dcc956757bf80f7146faaefba7f62928a83b54c10bd50c4ea9709367ee58afd37f6f9a0a92decda7d3e5dabe32ba34964ae3278f4c1c443f92eb36c74609cc828c5e2", 0xad, 0x0, 0x0, 0x0) keyctl$read(0xb, 0x0, &(0x7f00000004c0)=""/8, 0x8) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, 0xffffffffffffffff, 0x0) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="b0"], 0x1) timerfd_create(0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x23, &(0x7f0000000040), &(0x7f00000002c0)=0x4) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) r1 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r1, 0x0, 0x0) r2 = socket$caif_stream(0x25, 0x1, 0x5) close(r2) 22:15:25 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="d6ac7d3f595131008901"], 0xa) close(r3) socket(0x10, 0x3, 0x0) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000180)}], 0x1) writev(r2, &(0x7f0000000600)=[{&(0x7f0000000380)="f98ac693ce6908", 0x7}], 0x1) accept4$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0x14, 0x0) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r1, 0x0, r3, 0x0, 0x80000001, 0x0) 22:15:25 executing program 4: creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)='\x00|\f\xbb\xd4\x1aF\x00t\x15\r\x06\xf2\x9a^\xc8\xca\xc8\x1bz\xa7\'\xa9\x8f\x7f\xe1\xb3Y\x016\x16\xf7\xabq9\xc9\x93N\"\xafG\x0e\x8c\x9e>\xba9\xf3\xc6l1\xee1<\xdd0\x99\x18\xc5\xe2<\xcc56\xa4-\xf6i\xe1\x9aNQ(\xb0ek}\xa2\xa2O6\xc5k\xa3F\xf9\xf7b\x1d\xdc\xa4*\xf7', 0x300, 0x0) [ 429.491816][ T28] device bridge_slave_1 left promiscuous mode [ 429.498030][ T28] bridge0: port 2(bridge_slave_1) entered disabled state [ 429.571855][ T28] device bridge_slave_0 left promiscuous mode [ 429.578006][ T28] bridge0: port 1(bridge_slave_0) entered disabled state [ 430.361756][ T28] device hsr_slave_0 left promiscuous mode [ 430.411474][ T28] device hsr_slave_1 left promiscuous mode [ 430.457893][ T28] team0 (unregistering): Port device team_slave_1 removed [ 430.468504][ T28] team0 (unregistering): Port device team_slave_0 removed [ 430.478504][ T28] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 430.535502][ T28] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 430.613387][ T28] bond0 (unregistering): Released all slaves [ 430.711729][T17072] IPVS: ftp: loaded support on port[0] = 21 [ 430.765277][T17072] chnl_net:caif_netlink_parms(): no params data found [ 430.792848][T17072] bridge0: port 1(bridge_slave_0) entered blocking state [ 430.799969][T17072] bridge0: port 1(bridge_slave_0) entered disabled state [ 430.807936][T17072] device bridge_slave_0 entered promiscuous mode [ 430.815302][T17072] bridge0: port 2(bridge_slave_1) entered blocking state [ 430.822403][T17072] bridge0: port 2(bridge_slave_1) entered disabled state [ 430.829984][T17072] device bridge_slave_1 entered promiscuous mode [ 430.886730][T17072] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 430.897773][T17072] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 430.926669][T17072] team0: Port device team_slave_0 added [ 430.933782][T17072] team0: Port device team_slave_1 added [ 430.998163][T17072] device hsr_slave_0 entered promiscuous mode [ 431.041668][T17072] device hsr_slave_1 entered promiscuous mode [ 431.102356][T17072] bridge0: port 2(bridge_slave_1) entered blocking state [ 431.109413][T17072] bridge0: port 2(bridge_slave_1) entered forwarding state [ 431.116757][T17072] bridge0: port 1(bridge_slave_0) entered blocking state [ 431.123807][T17072] bridge0: port 1(bridge_slave_0) entered forwarding state [ 431.168197][T17072] 8021q: adding VLAN 0 to HW filter on device bond0 [ 431.185949][ T7980] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 431.198202][ T7980] bridge0: port 1(bridge_slave_0) entered disabled state [ 431.207279][ T7980] bridge0: port 2(bridge_slave_1) entered disabled state [ 431.225806][T17072] 8021q: adding VLAN 0 to HW filter on device team0 [ 431.241207][ T7980] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 431.250392][ T7980] bridge0: port 1(bridge_slave_0) entered blocking state [ 431.257449][ T7980] bridge0: port 1(bridge_slave_0) entered forwarding state [ 431.284868][T12204] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 431.293646][T12204] bridge0: port 2(bridge_slave_1) entered blocking state [ 431.300679][T12204] bridge0: port 2(bridge_slave_1) entered forwarding state [ 431.310540][T12204] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 431.320443][T12204] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 431.335968][T17072] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 431.350165][T17072] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 431.363223][ T7980] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 431.376043][ T7980] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 431.384801][ T7980] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 431.397971][ T7980] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 431.412419][ T7952] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 431.419795][ T7952] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 431.430382][T17072] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 431.649420][T17080] fuse: Bad value for 'fd' 22:15:28 executing program 5: bpf$MAP_CREATE(0x0, 0x0, 0x0) accept4$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x0, 0x0, @mcast2}, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgid() ioctl$TIOCGSERIAL(0xffffffffffffffff, 0x541e, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) prctl$PR_SET_SPECULATION_CTRL(0x35, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) sendto$inet6(r0, &(0x7f0000000500)="ce03110075000100ff901efc67195c22cc6dc37916237d8599b512eceb92bd30961166bf00000000070000e19b40b4288ba4e852e8876e977ac94186835a03d045871d6fe30032b46ec4b52a4245f456142304a7821d1c6c8689f4ac12c50cc25534655ee7b237c7a5ba6dcc956757bf80f7146faaefba7f62928a83b54c10bd50c4ea9709367ee58afd37f6f9a0a92decda7d3e5dabe32ba34964ae3278f4c1c443f92eb36c74609cc828c5e2", 0xad, 0x0, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) keyctl$read(0xb, 0x0, &(0x7f00000004c0)=""/8, 0x8) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, 0xffffffffffffffff, 0x0) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="b0"], 0x1) timerfd_create(0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x23, &(0x7f0000000040), &(0x7f00000002c0)=0x4) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) r1 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r1, 0x0, 0x0) r2 = socket$caif_stream(0x25, 0x1, 0x5) close(r2) 22:15:28 executing program 0: bpf$MAP_CREATE(0x0, 0x0, 0x0) accept4$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x0, 0x0, @mcast2}, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgid() ioctl$TIOCGSERIAL(0xffffffffffffffff, 0x541e, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) prctl$PR_SET_SPECULATION_CTRL(0x35, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) sendto$inet6(r0, &(0x7f0000000500)="ce03110075000100ff901efc67195c22cc6dc37916237d8599b512eceb92bd30961166bf00000000070000e19b40b4288ba4e852e8876e977ac94186835a03d045871d6fe30032b46ec4b52a4245f456142304a7821d1c6c8689f4ac12c50cc25534655ee7b237c7a5ba6dcc956757bf80f7146faaefba7f62928a83b54c10bd50c4ea9709367ee58afd37f6f9a0a92decda7d3e5dabe32ba34964ae3278f4c1c443f92eb36c74609cc828c5e2", 0xad, 0x0, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) keyctl$read(0xb, 0x0, &(0x7f00000004c0)=""/8, 0x8) write$P9_RWALK(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="b0"], 0x1) timerfd_create(0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x23, &(0x7f0000000040), &(0x7f00000002c0)=0x4) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) r2 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r2, 0x0, 0x0) r3 = socket$caif_stream(0x25, 0x1, 0x5) close(r3) 22:15:28 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="d6ac7d3f595131008901"], 0xa) close(r3) socket(0x10, 0x3, 0x0) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000180)}], 0x1) writev(r2, &(0x7f0000000600)=[{&(0x7f0000000380)="f98ac693ce6908", 0x7}], 0x1) accept4$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0x14, 0x0) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r1, 0x0, r3, 0x0, 0x80000001, 0x0) 22:15:28 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) write$binfmt_elf32(r2, &(0x7f00000007c0)=ANY=[@ANYBLOB="955a000004000000a423107d0b6e5fbdf500dfff"], 0x14) r4 = socket$inet(0x2, 0x3, 0x7f) bind$inet(r3, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) setsockopt$inet_int(r4, 0x0, 0x3, &(0x7f0000000140), 0x4) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, &(0x7f0000000000)=0x80, 0x4) splice(r1, 0x0, r3, 0x0, 0x10005, 0x0) 22:15:28 executing program 4: creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)='\x00|\f\xbb\xd4\x1aF\x00t\x15\r\x06\xf2\x9a^\xc8\xca\xc8\x1bz\xa7\'\xa9\x8f\x7f\xe1\xb3Y\x016\x16\xf7\xabq9\xc9\x93N\"\xafG\x0e\x8c\x9e>\xba9\xf3\xc6l1\xee1<\xdd0\x99\x18\xc5\xe2<\xcc56\xa4-\xf6i\xe1\x9aNQ(\xb0ek}\xa2\xa2O6\xc5k\xa3F\xf9\xf7b\x1d\xdc\xa4*\xf7', 0x500, 0x0) 22:15:28 executing program 1: bpf$MAP_CREATE(0x0, 0x0, 0x0) accept4$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x0, 0x0, @mcast2}, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgid() ioctl$TIOCGSERIAL(0xffffffffffffffff, 0x541e, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) prctl$PR_SET_SPECULATION_CTRL(0x35, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) sendto$inet6(r0, &(0x7f0000000500)="ce03110075000100ff901efc67195c22cc6dc37916237d8599b512eceb92bd30961166bf00000000070000e19b40b4288ba4e852e8876e977ac94186835a03d045871d6fe30032b46ec4b52a4245f456142304a7821d1c6c8689f4ac12c50cc25534655ee7b237c7a5ba6dcc956757bf80f7146faaefba7f62928a83b54c10bd50c4ea9709367ee58afd37f6f9a0a92decda7d3e5dabe32ba34964ae3278f4c1c443f92eb36c74609cc828c5e2", 0xad, 0x0, 0x0, 0x0) keyctl$read(0xb, 0x0, &(0x7f00000004c0)=""/8, 0x8) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, 0xffffffffffffffff, 0x0) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="b0"], 0x1) timerfd_create(0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x23, &(0x7f0000000040), &(0x7f00000002c0)=0x4) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) r1 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r1, 0x0, 0x0) r2 = socket$caif_stream(0x25, 0x1, 0x5) close(r2) 22:15:28 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) write$binfmt_elf32(r2, &(0x7f00000007c0)=ANY=[@ANYBLOB="955a000004000000a423107d0b6e5fbdf500dfff"], 0x14) r4 = socket$inet(0x2, 0x3, 0x7f) bind$inet(r3, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) setsockopt$inet_int(r4, 0x0, 0x3, &(0x7f0000000140), 0x4) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, &(0x7f0000000000)=0x80, 0x4) splice(r1, 0x0, r3, 0x0, 0x10005, 0x0) 22:15:28 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="d6ac7d3f595131008901"], 0xa) close(r3) socket(0x10, 0x3, 0x0) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000180)="580000001400192340", 0x9}], 0x1) writev(r2, &(0x7f0000000600)=[{&(0x7f0000000380)="f98ac693ce6908", 0x7}], 0x1) accept4$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0x14, 0x0) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r1, 0x0, r3, 0x0, 0x80000001, 0x0) 22:15:28 executing program 4: creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)='\x00|\f\xbb\xd4\x1aF\x00t\x15\r\x06\xf2\x9a^\xc8\xca\xc8\x1bz\xa7\'\xa9\x8f\x7f\xe1\xb3Y\x016\x16\xf7\xabq9\xc9\x93N\"\xafG\x0e\x8c\x9e>\xba9\xf3\xc6l1\xee1<\xdd0\x99\x18\xc5\xe2<\xcc56\xa4-\xf6i\xe1\x9aNQ(\xb0ek}\xa2\xa2O6\xc5k\xa3F\xf9\xf7b\x1d\xdc\xa4*\xf7', 0x600, 0x0) 22:15:28 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) write$binfmt_elf32(r2, &(0x7f00000007c0)=ANY=[@ANYBLOB="955a000004000000a423107d0b6e5fbdf500dfff"], 0x14) r4 = socket$inet(0x2, 0x3, 0x7f) bind$inet(r3, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) setsockopt$inet_int(r4, 0x0, 0x3, &(0x7f0000000140), 0x4) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, &(0x7f0000000000)=0x80, 0x4) splice(r1, 0x0, r3, 0x0, 0x10005, 0x0) 22:15:28 executing program 4: creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000540)='\x00|\f\xbb\xd4\x1aF\x00t\x15\r\x06\xf2\x9a^\xc8\xca\xc8\x1bz\xa7\'\xa9\x8f\x7f\xe1\xb3Y\x016\x16\xf7\xabq9\xc9\x93N\"\xafG\x0e\x8c\x9e>\xba9\xf3\xc6l1\xee1<\xdd0\x99\x18\xc5\xe2<\xcc56\xa4-\xf6i\xe1\x9aNQ(\xb0ek}\xa2\xa2O6\xc5k\xa3F\xf9\xf7b\x1d\xdc\xa4*\xf7', 0x700, 0x0) 22:15:28 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="d6ac7d3f595131008901"], 0xa) close(r3) socket(0x10, 0x3, 0x0) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000180)="580000001400192340", 0x9}], 0x1) writev(r2, &(0x7f0000000600)=[{&(0x7f0000000380)="f98ac693ce6908", 0x7}], 0x1) accept4$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0x14, 0x0) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r1, 0x0, r3, 0x0, 0x80000001, 0x0) [ 433.873691][ T28] device bridge_slave_1 left promiscuous mode [ 433.880050][ T28] bridge0: port 2(bridge_slave_1) entered disabled state [ 433.932364][ T28] device bridge_slave_0 left promiscuous mode [ 433.938586][ T28] bridge0: port 1(bridge_slave_0) entered disabled state [ 433.992818][ T28] device bridge_slave_1 left promiscuous mode [ 433.998995][ T28] bridge0: port 2(bridge_slave_1) entered disabled state [ 434.051899][ T28] device bridge_slave_0 left promiscuous mode [ 434.058182][ T28] bridge0: port 1(bridge_slave_0) entered disabled state [ 435.441625][ T28] device hsr_slave_0 left promiscuous mode [ 435.491442][ T28] device hsr_slave_1 left promiscuous mode [ 435.538297][ T28] team0 (unregistering): Port device team_slave_1 removed [ 435.548475][ T28] team0 (unregistering): Port device team_slave_0 removed [ 435.558895][ T28] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 435.624820][ T28] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 435.682758][ T28] bond0 (unregistering): Released all slaves [ 435.841714][ T28] device hsr_slave_0 left promiscuous mode [ 435.881394][ T28] device hsr_slave_1 left promiscuous mode [ 435.957794][ T28] team0 (unregistering): Port device team_slave_1 removed [ 435.968385][ T28] team0 (unregistering): Port device team_slave_0 removed [ 435.978304][ T28] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 436.025093][ T28] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 436.097406][ T28] bond0 (unregistering): Released all slaves [ 436.178929][T17422] IPVS: ftp: loaded support on port[0] = 21 [ 436.189312][T17424] IPVS: ftp: loaded support on port[0] = 21 [ 436.279231][T17422] chnl_net:caif_netlink_parms(): no params data found [ 436.311674][T17424] chnl_net:caif_netlink_parms(): no params data found [ 436.355131][T17424] bridge0: port 1(bridge_slave_0) entered blocking state [ 436.362398][T17424] bridge0: port 1(bridge_slave_0) entered disabled state [ 436.370033][T17424] device bridge_slave_0 entered promiscuous mode [ 436.377366][T17422] bridge0: port 1(bridge_slave_0) entered blocking state [ 436.384607][T17422] bridge0: port 1(bridge_slave_0) entered disabled state [ 436.392602][T17422] device bridge_slave_0 entered promiscuous mode [ 436.399765][T17422] bridge0: port 2(bridge_slave_1) entered blocking state [ 436.406999][T17422] bridge0: port 2(bridge_slave_1) entered disabled state [ 436.415077][T17422] device bridge_slave_1 entered promiscuous mode [ 436.424772][T17424] bridge0: port 2(bridge_slave_1) entered blocking state [ 436.431905][T17424] bridge0: port 2(bridge_slave_1) entered disabled state [ 436.439452][T17424] device bridge_slave_1 entered promiscuous mode [ 436.458196][T17422] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 436.478757][T17422] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 436.495486][T17424] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 436.506205][T17424] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 436.521238][T17422] team0: Port device team_slave_0 added [ 436.532406][T17422] team0: Port device team_slave_1 added [ 436.544221][T17424] team0: Port device team_slave_0 added [ 436.551200][T17424] team0: Port device team_slave_1 added [ 436.633981][T17424] device hsr_slave_0 entered promiscuous mode [ 436.671714][T17424] device hsr_slave_1 entered promiscuous mode [ 436.731385][T17424] debugfs: Directory 'hsr0' with parent '/' already present! [ 436.773505][T17422] device hsr_slave_0 entered promiscuous mode [ 436.841801][T17422] device hsr_slave_1 entered promiscuous mode [ 436.881400][T17422] debugfs: Directory 'hsr0' with parent '/' already present! [ 436.997412][T17424] bridge0: port 2(bridge_slave_1) entered blocking state [ 437.004523][T17424] bridge0: port 2(bridge_slave_1) entered forwarding state [ 437.011846][T17424] bridge0: port 1(bridge_slave_0) entered blocking state [ 437.018883][T17424] bridge0: port 1(bridge_slave_0) entered forwarding state [ 437.028559][T17422] bridge0: port 2(bridge_slave_1) entered blocking state [ 437.035652][T17422] bridge0: port 2(bridge_slave_1) entered forwarding state [ 437.042984][T17422] bridge0: port 1(bridge_slave_0) entered blocking state [ 437.050110][T17422] bridge0: port 1(bridge_slave_0) entered forwarding state [ 437.098685][T17424] 8021q: adding VLAN 0 to HW filter on device bond0 [ 437.136331][T17422] 8021q: adding VLAN 0 to HW filter on device bond0 [ 437.148641][ T7984] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 437.158954][ T7984] bridge0: port 1(bridge_slave_0) entered disabled state [ 437.169585][ T7984] bridge0: port 2(bridge_slave_1) entered disabled state [ 437.179605][ T7984] bridge0: port 1(bridge_slave_0) entered disabled state [ 437.189899][ T7984] bridge0: port 2(bridge_slave_1) entered disabled state [ 437.212180][T17424] 8021q: adding VLAN 0 to HW filter on device team0 [ 437.230703][ T7984] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 437.239870][ T7984] bridge0: port 1(bridge_slave_0) entered blocking state [ 437.246929][ T7984] bridge0: port 1(bridge_slave_0) entered forwarding state [ 437.265660][T17422] 8021q: adding VLAN 0 to HW filter on device team0 [ 437.282380][T12204] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 437.295232][T12204] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 437.303539][T12204] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 437.317750][T12204] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 437.326797][T12204] bridge0: port 2(bridge_slave_1) entered blocking state [ 437.333919][T12204] bridge0: port 2(bridge_slave_1) entered forwarding state [ 437.354588][ T7984] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 437.367477][ T7984] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 437.376863][ T7984] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 437.389724][ T7984] bridge0: port 1(bridge_slave_0) entered blocking state [ 437.396778][ T7984] bridge0: port 1(bridge_slave_0) entered forwarding state [ 437.410096][ T7984] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 437.419706][ T7984] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 437.432358][ T7984] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 437.441066][ T7984] bridge0: port 2(bridge_slave_1) entered blocking state [ 437.448131][ T7984] bridge0: port 2(bridge_slave_1) entered forwarding state [ 437.469321][T17424] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 437.483867][T17424] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 437.500465][ T7984] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 437.513912][ T7984] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 437.527215][ T7984] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 437.538302][ T7984] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 437.550100][ T7984] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 437.560916][ T7984] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 437.574108][ T7984] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 437.585176][ T7984] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 437.595158][ T7984] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 437.604688][ T7984] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 437.613123][ T7984] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 437.632950][T17424] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 437.658956][T12204] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 437.666971][T12204] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 437.676533][T12204] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 437.685996][T12204] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 437.694943][T12204] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 437.704119][T12204] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 437.712998][T12204] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 437.721479][ T12] ================================================================== [ 437.722381][T12204] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 437.729618][ T12] BUG: KCSAN: data-race in getboottime64 / timekeeping_advance [ 437.738254][T12204] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 437.744883][ T12] [ 437.744903][ T12] write to 0xffffffff86041b08 of 280 bytes by interrupt on cpu 1: [ 437.744924][ T12] timekeeping_advance+0x88e/0xd80 [ 437.744942][ T12] update_wall_time+0x19/0x20 [ 437.744967][ T12] tick_do_update_jiffies64+0x1a4/0x250 [ 437.744989][ T12] tick_sched_do_timer+0xd4/0xe0 [ 437.745010][ T12] tick_sched_timer+0x43/0xe0 [ 437.745029][ T12] __hrtimer_run_queues+0x274/0x5f0 [ 437.745044][ T12] hrtimer_interrupt+0x22a/0x480 [ 437.745080][ T12] smp_apic_timer_interrupt+0xdc/0x280 [ 437.753607][T12204] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 437.755098][ T12] apic_timer_interrupt+0xf/0x20 [ 437.763798][T12204] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 437.768050][ T12] kcsan_setup_watchpoint+0x205/0x410 [ 437.768066][ T12] __tsan_unaligned_write8+0x143/0x1f0 [ 437.768096][ T12] fib6_clean_node+0x2c6/0x310 [ 437.774779][T17422] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 437.778277][ T12] fib6_walk_continue+0x2e3/0x440 [ 437.778290][ T12] fib6_walk+0x10d/0x160 [ 437.778366][ T12] fib6_clean_tree+0xef/0x120 [ 437.797048][T17422] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 437.798064][ T12] __fib6_clean_all+0xbd/0x150 [ 437.871948][ T12] fib6_clean_all+0x34/0x50 [ 437.876442][ T12] rt6_sync_up+0x9f/0x110 [ 437.880784][ T12] addrconf_notify+0x254/0x1480 [ 437.885644][ T12] notifier_call_chain+0xd7/0x160 [ 437.890668][ T12] raw_notifier_call_chain+0x37/0x50 [ 437.895974][ T12] call_netdevice_notifiers_info+0x48/0xc0 [ 437.901782][ T12] netdev_state_change+0xb2/0xd0 [ 437.906719][ T12] linkwatch_do_dev+0xd8/0xf0 [ 437.911392][ T12] __linkwatch_run_queue+0x1a9/0x510 [ 437.916672][ T12] linkwatch_event+0x54/0x70 [ 437.921259][ T12] process_one_work+0x3d4/0x890 [ 437.926127][ T12] worker_thread+0xa0/0x800 [ 437.930622][ T12] kthread+0x1d4/0x200 [ 437.934685][ T12] ret_from_fork+0x1f/0x30 [ 437.939081][ T12] [ 437.941411][ T12] read to 0xffffffff86041ba0 of 8 bytes by task 12 on cpu 0: [ 437.948773][ T12] getboottime64+0x37/0x60 [ 437.953189][ T12] cache_clean+0xf8/0x730 [ 437.957514][ T12] do_cache_clean+0x2d/0x130 [ 437.962105][ T12] process_one_work+0x3d4/0x890 [ 437.966951][ T12] worker_thread+0xa0/0x800 [ 437.971448][ T12] kthread+0x1d4/0x200 [ 437.975508][ T12] ret_from_fork+0x1f/0x30 [ 437.979907][ T12] [ 437.982237][ T12] Reported by Kernel Concurrency Sanitizer on: [ 437.988386][ T12] CPU: 0 PID: 12 Comm: kworker/0:1 Not tainted 5.4.0-rc6+ #0 [ 437.995742][ T12] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 438.005802][ T12] Workqueue: events_power_efficient do_cache_clean [ 438.012298][ T12] ================================================================== [ 438.020362][ T12] Kernel panic - not syncing: panic_on_warn set ... [ 438.026959][ T12] CPU: 0 PID: 12 Comm: kworker/0:1 Not tainted 5.4.0-rc6+ #0 [ 438.034337][ T12] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 438.044399][ T12] Workqueue: events_power_efficient do_cache_clean [ 438.051004][ T12] Call Trace: [ 438.054296][ T12] dump_stack+0xf5/0x159 [ 438.058534][ T12] panic+0x210/0x640 [ 438.062428][ T12] ? vprintk_func+0x8d/0x140 [ 438.067017][ T12] kcsan_report.cold+0xc/0xe [ 438.071624][ T12] kcsan_setup_watchpoint+0x3fe/0x410 [ 438.076992][ T12] __tsan_read8+0x145/0x1f0 [ 438.081491][ T12] getboottime64+0x37/0x60 [ 438.085904][ T12] cache_clean+0xf8/0x730 [ 438.090234][ T12] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 438.096140][ T12] do_cache_clean+0x2d/0x130 [ 438.100729][ T12] process_one_work+0x3d4/0x890 [ 438.105589][ T12] worker_thread+0xa0/0x800 [ 438.110099][ T12] kthread+0x1d4/0x200 [ 438.114166][ T12] ? rescuer_thread+0x6a0/0x6a0 [ 438.119013][ T12] ? kthread_stop+0x2d0/0x2d0 [ 438.123687][ T12] ret_from_fork+0x1f/0x30 [ 438.129449][ T12] Kernel Offset: disabled [ 438.133774][ T12] Rebooting in 86400 seconds..