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", 0x1bc) capset(&(0x7f0000000200)={0x20071026}, &(0x7f0000001fe8)) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='fd\x00') setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000280)=0x800, 0x4) syz_genetlink_get_family_id$tipc(&(0x7f00000005c0)='TIPC\x00') lsetxattr(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)=ANY=[@ANYBLOB="6f73853047504c00"], 0x0, 0x0, 0x3) ioctl$SG_IO(0xffffffffffffffff, 0x2286, 0x0) 16:49:45 executing program 2: r0 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'hsr0\x00', 0x0}) bind$packet(r0, &(0x7f0000000340)={0x11, 0x0, r1}, 0x14) sendto(r0, &(0x7f00000000c0)="e360b641b37f0040000000000066", 0xe, 0x0, 0x0, 0x0) [ 289.762957] capability: warning: `syz-executor0' uses deprecated v2 capabilities in a way that may be insecure 16:49:45 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) tkill(r0, 0x4000000000000036) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={@mcast1, @local, @local, 0x80000000, 0x0, 0x0, 0x200800000000114}) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x21, r0, 0x0, 0x0) 16:49:45 executing program 2: r0 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'hsr0\x00', 0x0}) bind$packet(r0, &(0x7f0000000340)={0x11, 0x0, r1}, 0x14) sendto(r0, &(0x7f00000000c0)="e360b641b37f0040030000000066", 0xe, 0x0, 0x0, 0x0) 16:49:45 executing program 5: r0 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'hsr0\x00', 0x0}) bind$packet(r0, &(0x7f0000000340)={0x11, 0x0, r1}, 0x14) sendto(r0, &(0x7f00000000c0)="e360b641b37f0040000000000066", 0xe, 0x0, 0x0, 0x0) 16:49:45 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) tkill(r0, 0x4000000000000036) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={@mcast1, @local, @local, 0x80000000, 0x0, 0x0, 0x200800000000114}) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x21, r0, 0x0, 0x0) 16:49:45 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$swradio(0x0, 0x1, 0x2) ioctl$IOC_PR_RESERVE(0xffffffffffffffff, 0x401070c9, 0x0) io_setup(0x0, 0x0) io_cancel(0x0, 0x0, 0x0) setsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VIDIOC_S_HW_FREQ_SEEK(0xffffffffffffffff, 0x40305652, &(0x7f0000001800)={0x96, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x0, 0x0) getsockname$packet(r1, 0x0, &(0x7f00000018c0)) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000100)={0x101ff, 0x0, &(0x7f0000ffa000/0x3000)=nil}) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x0, 0x0) write$FUSE_INIT(r0, &(0x7f0000000540)={0x50, 0xffffffffffffffda, 0x5, {0x7, 0x1c, 0x4, 0x80000, 0x2, 0x67f, 0x0, 0x80000001}}, 0x50) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000200)=0x800, 0x4) mkdir(&(0x7f00000004c0)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x0, 0x0) connect$netlink(r0, &(0x7f00000005c0)=@proc={0x10, 0x0, 0x25dfdbfe, 0x400000}, 0xc) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f0000000280)) r2 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = fcntl$getown(r2, 0x9) r4 = syz_open_procfs(r3, &(0x7f0000000140)='net/softnet_stat\x00') r5 = dup2(0xffffffffffffffff, r4) getsockopt$ARPT_SO_GET_REVISION_TARGET(r5, 0x0, 0x63, &(0x7f0000000600)={'icmp\x00'}, &(0x7f0000000640)=0x1e) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) rt_sigaction(0x2f, &(0x7f0000000380)={&(0x7f0000000040)="67f3460f2d05e54f0000470f977f7a66470f38ddc9c483b96904f300670fe8382e66400f3833f5c4c2791e72008fa93894ae0000010045cf66460fea72b3", {}, 0x1, &(0x7f0000000240)="c4617b2c4c4200670f83654f0000c4e1496204bf26662e6746f6c8d2c4c2d1291af30f4d018fc978e14f01c463790e8cef06000000d6ab46df8c8732233333"}, &(0x7f0000000480)={&(0x7f00000003c0)="36652e65daa052000000c4817d6103c4830d3898000000009dc4e2b598218f8840a67e0500c4a1577dba1750a7310f452e44e37a8f8978832500000000400f0d5700", {}, 0x0, &(0x7f0000000440)="c4022d471766460f65d8c4617d282ff3450f2d23c402791c0c5e0f5255f2c4e3fd01e6b366430f72d1c0c421cd72e40a400ff9ce"}, 0x8, &(0x7f0000000500)) 16:49:45 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) tkill(r0, 0x4000000000000036) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={@mcast1, @local, @local, 0x80000000, 0x0, 0x0, 0x200800000000114}) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x21, r0, 0x0, 0x0) 16:49:45 executing program 3: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000b00)) mount(&(0x7f00000004c0)=ANY=[], &(0x7f000000aff8)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000000)) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000000c0)='tls\x00', 0x4) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$void(r1, 0x5450) renameat2(r0, &(0x7f0000000180)='./file0/file0\x00', 0xffffffffffffffff, 0x0, 0x4) shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@dev, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@remote}}, 0x0) ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, 0x0) shmctl$IPC_SET(0x0, 0x1, 0x0) ioctl$PIO_FONT(r0, 0x4b61, &(0x7f0000000740)="9d705183203ecbbfc0d13a4e30241f7ce01b0b4d7682444a507bfc1ac414339f479986467eb40c8065891e1fbbe7263212c5c09bb47896b3d85893f1173f8a139c116f876fdcc1779bffef8c34b5958981616cbcf39f2d8b43491de452d774a74c3ae9555a45180f7d68da36975781ba3a24694ac85eea975ca104181420baf7f3b9614203b0360e7cc29a1c109e") chdir(&(0x7f0000000340)='./file0\x00') symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) umount2(&(0x7f0000000380)='./file0\x00', 0x3) openat$uinput(0xffffffffffffff9c, &(0x7f0000000440)='/dev/uinput\x00', 0x802, 0x0) r3 = syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') sendmsg$FOU_CMD_DEL(r1, &(0x7f00000002c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x28, r3, 0x200, 0x70bd25, 0x25dfdbfe, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e24}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x7f}]}, 0x28}}, 0x24048010) sendmsg$kcm(r0, &(0x7f0000000a40)={&(0x7f0000000580)=@ll={0x11, 0xfd, r2, 0x1, 0x8, 0x6, @dev={[], 0x16}}, 0x80, &(0x7f00000009c0)=[{&(0x7f00000008c0)="367a9f0d4a1564359d1e668c63869bb9bf3b7f5aa4030462889dd6407207295cea1b36e07bc2b38b11c6ca28a73515cf52d89a8199d5c019de826c756a31bac24f707efcfc0a2383216dccc08f804551f0a56d2c9ab95a113fa74dff88ccccc7f278200aa03d2349e688b69191611739bb3e2e5ff110c5858c1a7c5bd5431f9c8e73a99236728f125d5f52a2b0761872fc0fc53cda5458241b2a80fd918b21c8029039d416a6cde6aa786bdfaa21a4e5ffa5f80dec422e0051c7e98a8cff2f4afbe25ca5a154a57c10", 0xc9}], 0x1}, 0x4004000) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$VIDIOC_SUBDEV_S_SELECTION(r0, 0xc040563e, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x7) msgget(0x1, 0x318) syz_genetlink_get_family_id$team(&(0x7f0000000400)='team\x00') 16:49:45 executing program 2: r0 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'hsr0\x00', 0x0}) bind$packet(r0, &(0x7f0000000340)={0x11, 0x0, r1}, 0x14) sendto(r0, &(0x7f00000000c0)="e360b641b37f0000008100000066", 0xe, 0x0, 0x0, 0x0) 16:49:46 executing program 5: r0 = open(&(0x7f0000000000)='./file0\x00', 0x40, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x20000000, &(0x7f00000003c0)='./file0\x00', 0x0, 0x8007a00, 0x0) r1 = open$dir(&(0x7f0000000300)='./file0\x00', 0x3002, 0x0) close(r1) r2 = getegid() fstat(r0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x20, &(0x7f0000000180)={'trans=xen,', {[{@cache_loose='cache=loose'}, {@dfltgid={'dfltgid', 0x3d, r2}}, {@access_client='access=client'}, {@cache_fscache='cache=fscache'}, {@nodevmap='nodevmap'}, {@version_9p2000='version=9p2000'}, {@privport='privport'}, {@fscache='fscache'}, {@debug={'debug', 0x3d, 0x4}}], [{@uid_eq={'uid', 0x3d, r3}}]}}) 16:49:46 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x4000000000000036) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={@mcast1, @local, @local, 0x80000000, 0x0, 0x0, 0x200800000000114}) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x21, r0, 0x0, 0x0) 16:49:46 executing program 0: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000240)='/dev/dsp\x00', 0x87ffc, 0x0) ioctl$TCGETA(r0, 0x5405, &(0x7f0000000280)) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f00000000c0)=0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000100)={0x0}, &(0x7f0000000440)=0xc) setpgid(r1, r2) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_FIOGETOWN(r4, 0x8903, &(0x7f00000001c0)) fstat(r3, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x7, &(0x7f0000000340)=[0xffffffffffffffff, 0xee01, 0xffffffffffffffff, 0xee01, 0xee00, 0xffffffffffffffff, 0xffffffffffffffff]) write$FUSE_CREATE_OPEN(r0, &(0x7f0000000380)={0xa0, 0x0, 0x1, {{0x0, 0x1, 0x3, 0x200, 0x9, 0x6, {0x3, 0x3, 0x1, 0x146, 0x9, 0x6, 0x5, 0x6, 0x3, 0xfaf7, 0x9, r5, r6, 0x4d0, 0x3}}, {0x0, 0x2}}}, 0xa0) finit_module(r3, &(0x7f0000000200)='em0cgroup\x00', 0x1) r7 = syz_open_dev$dmmidi(&(0x7f0000000080)='/dev/dmmidi#\x00', 0x81, 0x4200) ioctl$UI_BEGIN_FF_UPLOAD(r7, 0xc06855c8, &(0x7f0000000140)={0x4, 0xffff, {0x56, 0xd4f1, 0x9, {0x9, 0x5}, {0x0, 0x5}, @rumble={0x80000001, 0x4}}, {0x52, 0x200000009, 0x7fffffff, {0x1, 0x2006}, {0x4, 0x4}, @ramp={0x8000, 0x7a, {0x3, 0x1, 0x800000000000000, 0x3}}}}) sendmsg$nl_xfrm(r4, &(0x7f0000000040)={&(0x7f0000000000), 0xc, &(0x7f0000001400)={&(0x7f0000000780)=ANY=[@ANYBLOB="480100001000010500000000002e102b487d07000000ff020000000000000000000000000001ff02000000000000d0888b5d67ba241a3c2d00c4a5000000000100000000000000000000000000000fd029dd0fd774c1764c404795786c120e4a97599b00350fd5801be7f12fe2e82b12e015604e2dbad9f5481af57aa09a24cc73081b61c0a57c8a55796cc96d6e147f202b28cbb5c96ce2571d366fadd9238778091d8b265f640beb5f079eee24fbf4d1bf5938179dfd8e6e00c53992a9aee0794274c8591a", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="fe800000000000000000000000000000000000006c000000ac1414000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000480003006465666c6174650000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000a00000000000000000000000000"], 0x148}}, 0x0) 16:49:46 executing program 3: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000b00)) mount(&(0x7f00000004c0)=ANY=[], &(0x7f000000aff8)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000000)) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000000c0)='tls\x00', 0x4) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$void(r1, 0x5450) renameat2(r0, &(0x7f0000000180)='./file0/file0\x00', 0xffffffffffffffff, 0x0, 0x4) shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@dev, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@remote}}, 0x0) ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, 0x0) shmctl$IPC_SET(0x0, 0x1, 0x0) ioctl$PIO_FONT(r0, 0x4b61, &(0x7f0000000740)="9d705183203ecbbfc0d13a4e30241f7ce01b0b4d7682444a507bfc1ac414339f479986467eb40c8065891e1fbbe7263212c5c09bb47896b3d85893f1173f8a139c116f876fdcc1779bffef8c34b5958981616cbcf39f2d8b43491de452d774a74c3ae9555a45180f7d68da36975781ba3a24694ac85eea975ca104181420baf7f3b9614203b0360e7cc29a1c109e") chdir(&(0x7f0000000340)='./file0\x00') symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) umount2(&(0x7f0000000380)='./file0\x00', 0x3) openat$uinput(0xffffffffffffff9c, &(0x7f0000000440)='/dev/uinput\x00', 0x802, 0x0) r3 = syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') sendmsg$FOU_CMD_DEL(r1, &(0x7f00000002c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x28, r3, 0x200, 0x70bd25, 0x25dfdbfe, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e24}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x7f}]}, 0x28}}, 0x24048010) sendmsg$kcm(r0, &(0x7f0000000a40)={&(0x7f0000000580)=@ll={0x11, 0xfd, r2, 0x1, 0x8, 0x6, @dev={[], 0x16}}, 0x80, &(0x7f00000009c0)=[{&(0x7f00000008c0)="367a9f0d4a1564359d1e668c63869bb9bf3b7f5aa4030462889dd6407207295cea1b36e07bc2b38b11c6ca28a73515cf52d89a8199d5c019de826c756a31bac24f707efcfc0a2383216dccc08f804551f0a56d2c9ab95a113fa74dff88ccccc7f278200aa03d2349e688b69191611739bb3e2e5ff110c5858c1a7c5bd5431f9c8e73a99236728f125d5f52a2b0761872fc0fc53cda5458241b2a80fd918b21c8029039d416a6cde6aa786bdfaa21a4e5ffa5f80dec422e0051c7e98a8cff2f4afbe25ca5a154a57c10", 0xc9}], 0x1}, 0x4004000) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$VIDIOC_SUBDEV_S_SELECTION(r0, 0xc040563e, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x7) msgget(0x1, 0x318) syz_genetlink_get_family_id$team(&(0x7f0000000400)='team\x00') 16:49:46 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x4000000000000036) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={@mcast1, @local, @local, 0x80000000, 0x0, 0x0, 0x200800000000114}) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x21, r0, 0x0, 0x0) [ 290.306860] tmpfs: Bad mount option trans 16:49:46 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x4, 0x0) ioctl$VIDIOC_DQEVENT(r0, 0x80885659, 0x0) r1 = gettid() r2 = socket$inet6(0xa, 0x3, 0x800000000000004) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r4, &(0x7f0000000200)={0x1a, 0x30d, 0x4, 0x6, 0x3373, 0x23f33}, 0x10) setsockopt$inet6_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000240)={@in={{0x2, 0x4e22, @rand_addr=0x7}}, 0x0, 0x3b7, 0x0, "28fa3372ae1ba0e0078e75178bff9de7f4c6a6d48739d131dab89544f41d19516fa73093f2dff40200000000000000fd0f68821eeeadb871d695f86d8d289b1ed167761d6bef100000005fc384aa6188"}, 0xd8) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x400, 0x0) ioctl$EVIOCGMTSLOTS(r5, 0x8040450a, &(0x7f0000000400)=""/181) unshare(0x2000400) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x3, 0x4, 0x4, 0x1, 0x0, 0x1}, 0x2c) ioctl$FICLONE(r0, 0x40049409, r3) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xd, 0x1, 0x4, 0x400000008004, 0x0, r6}, 0x2c) recvmmsg(r4, &(0x7f00000007c0)=[{{&(0x7f0000000500)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast1}}}, 0x80, &(0x7f0000001980)=[{&(0x7f0000000580)=""/1, 0x1}, {&(0x7f0000000980)=""/4096, 0x1000}], 0x2, &(0x7f00000019c0)=""/143, 0x8f, 0x4}, 0x81}, {{&(0x7f00000006c0)=@sco, 0xfffffffffffffe6d, &(0x7f0000000780)=[{&(0x7f0000000740)=""/9, 0x5}], 0x1, 0x0, 0x0, 0x7fff}, 0x56}], 0x2, 0x40010022, &(0x7f0000000840)={0x0, 0x989680}) setsockopt$inet_tcp_int(r7, 0x6, 0x1f, &(0x7f0000000880)=0x7f, 0x4) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r2, 0x84, 0xc, &(0x7f0000000140), 0x4) r8 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_GET(r7, &(0x7f0000000340)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x30, r8, 0x404, 0x70bd2d, 0x25dfdbfb, {}, [@TIPC_NLA_NODE={0x1c, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x5}, @TIPC_NLA_NODE_ADDR={0x8}, @TIPC_NLA_NODE_ADDR={0x8}]}]}, 0x30}, 0x1, 0x0, 0x0, 0x80}, 0x48000) connect$llc(r4, &(0x7f0000000000)={0x1a, 0x304, 0x0, 0x0, 0x0, 0x0, @broadcast}, 0x10) listen(r2, 0x0) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r2, 0x84, 0x76, &(0x7f0000000380)={0x0, 0xffffffffffffff89}, &(0x7f0000000600)=0x8) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r7, 0x84, 0x7c, &(0x7f0000000640)={r9, 0x16181d14, 0x80000000}, &(0x7f0000000680)=0x8) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r1, 0x1000000000016) 16:49:46 executing program 2: r0 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'hsr0\x00', 0x0}) bind$packet(r0, &(0x7f0000000340)={0x11, 0x0, r1}, 0x14) sendto(r0, &(0x7f00000000c0)="e360b641b37f000a000000000066", 0xe, 0x0, 0x0, 0x0) 16:49:46 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x4000000000000036) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={@mcast1, @local, @local, 0x80000000, 0x0, 0x0, 0x200800000000114}) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x21, r0, 0x0, 0x0) [ 290.433195] netlink: 88 bytes leftover after parsing attributes in process `syz-executor0'. 16:49:46 executing program 1: r0 = memfd_create(&(0x7f0000000480)='\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) io_setup(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0xd403, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x2, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00000f0000/0x4000)=nil, 0x4000, 0x0, 0x31, 0xffffffffffffffff, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) setsockopt$sock_void(r0, 0x1, 0x3f, 0x0, 0x0) name_to_handle_at(r0, &(0x7f0000000000)='\x00', &(0x7f00000000c0)={0x70, 0x0, "a7f780467fb719d6eda6efc6a8623e3cd092d566609f5e697189815dbbf14b9d5f576a857dd1e202cd3857b87d6bef7ef4348022d67052dff4006917ffb0316e81a50f4de02c39a9ef46b771a08d0a54e712bbd9cbdf220f3901677832bafebb23119fa8dd4d75de"}, 0x0, 0x1000) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x2, 0x13, r0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) rt_sigtimedwait(0x0, 0x0, 0x0, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000fe7000/0x18000)=nil, &(0x7f00000001c0)=[@text16={0x10, 0x0}], 0x1, 0x40000000, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) fcntl$getown(r1, 0x9) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0xffffffffffffffff, r0, 0x0, 0x9, &(0x7f0000000140)='/dev/kvm\x00', 0xffffffffffffffff}, 0x30) 16:49:46 executing program 3: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000b00)) mount(&(0x7f00000004c0)=ANY=[], &(0x7f000000aff8)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000000)) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000000c0)='tls\x00', 0x4) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$void(r1, 0x5450) renameat2(r0, &(0x7f0000000180)='./file0/file0\x00', 0xffffffffffffffff, 0x0, 0x4) shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@dev, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@remote}}, 0x0) ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, 0x0) shmctl$IPC_SET(0x0, 0x1, 0x0) ioctl$PIO_FONT(r0, 0x4b61, &(0x7f0000000740)="9d705183203ecbbfc0d13a4e30241f7ce01b0b4d7682444a507bfc1ac414339f479986467eb40c8065891e1fbbe7263212c5c09bb47896b3d85893f1173f8a139c116f876fdcc1779bffef8c34b5958981616cbcf39f2d8b43491de452d774a74c3ae9555a45180f7d68da36975781ba3a24694ac85eea975ca104181420baf7f3b9614203b0360e7cc29a1c109e") chdir(&(0x7f0000000340)='./file0\x00') symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) umount2(&(0x7f0000000380)='./file0\x00', 0x3) openat$uinput(0xffffffffffffff9c, &(0x7f0000000440)='/dev/uinput\x00', 0x802, 0x0) r3 = syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') sendmsg$FOU_CMD_DEL(r1, &(0x7f00000002c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x28, r3, 0x200, 0x70bd25, 0x25dfdbfe, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e24}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x7f}]}, 0x28}}, 0x24048010) sendmsg$kcm(r0, &(0x7f0000000a40)={&(0x7f0000000580)=@ll={0x11, 0xfd, r2, 0x1, 0x8, 0x6, @dev={[], 0x16}}, 0x80, &(0x7f00000009c0)=[{&(0x7f00000008c0)="367a9f0d4a1564359d1e668c63869bb9bf3b7f5aa4030462889dd6407207295cea1b36e07bc2b38b11c6ca28a73515cf52d89a8199d5c019de826c756a31bac24f707efcfc0a2383216dccc08f804551f0a56d2c9ab95a113fa74dff88ccccc7f278200aa03d2349e688b69191611739bb3e2e5ff110c5858c1a7c5bd5431f9c8e73a99236728f125d5f52a2b0761872fc0fc53cda5458241b2a80fd918b21c8029039d416a6cde6aa786bdfaa21a4e5ffa5f80dec422e0051c7e98a8cff2f4afbe25ca5a154a57c10", 0xc9}], 0x1}, 0x4004000) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000001c0)={0x0, 0x4, 0x2, 0x3, 0x1}, 0x14) ioctl$VIDIOC_SUBDEV_S_SELECTION(r0, 0xc040563e, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x7) msgget(0x1, 0x318) syz_genetlink_get_family_id$team(&(0x7f0000000400)='team\x00') 16:49:46 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x4000000000000036) ptrace$cont(0x18, 0x0, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={@mcast1, @local, @local, 0x80000000, 0x0, 0x0, 0x200800000000114}) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x21, 0x0, 0x0, 0x0) [ 290.532218] netlink: 88 bytes leftover after parsing attributes in process `syz-executor0'. 16:49:46 executing program 2: r0 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'hsr0\x00', 0x0}) bind$packet(r0, &(0x7f0000000340)={0x11, 0x0, r1}, 0x14) sendto(r0, &(0x7f00000000c0)="e360b641b37f0011000000000066", 0xe, 0x0, 0x0, 0x0) 16:49:46 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x4000000000000036) ptrace$cont(0x18, 0x0, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={@mcast1, @local, @local, 0x80000000, 0x0, 0x0, 0x200800000000114}) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x21, 0x0, 0x0, 0x0) 16:49:46 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x4000000000000036) ptrace$cont(0x18, 0x0, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={@mcast1, @local, @local, 0x80000000, 0x0, 0x0, 0x200800000000114}) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x21, 0x0, 0x0, 0x0) 16:49:46 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) r1 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = shmget$private(0x0, 0x2000, 0x80, &(0x7f000000d000/0x2000)=nil) shmctl$IPC_RMID(r2, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10003, 0x80011, r1, 0x0) rseq(0x0, 0x0, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 16:49:46 executing program 3: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000b00)) mount(&(0x7f00000004c0)=ANY=[], &(0x7f000000aff8)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000000)) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000000c0)='tls\x00', 0x4) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$void(r1, 0x5450) renameat2(r0, &(0x7f0000000180)='./file0/file0\x00', 0xffffffffffffffff, 0x0, 0x4) shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@dev, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@remote}}, 0x0) ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, 0x0) shmctl$IPC_SET(0x0, 0x1, 0x0) ioctl$PIO_FONT(r0, 0x4b61, &(0x7f0000000740)="9d705183203ecbbfc0d13a4e30241f7ce01b0b4d7682444a507bfc1ac414339f479986467eb40c8065891e1fbbe7263212c5c09bb47896b3d85893f1173f8a139c116f876fdcc1779bffef8c34b5958981616cbcf39f2d8b43491de452d774a74c3ae9555a45180f7d68da36975781ba3a24694ac85eea975ca104181420baf7f3b9614203b0360e7cc29a1c109e") chdir(&(0x7f0000000340)='./file0\x00') symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) umount2(&(0x7f0000000380)='./file0\x00', 0x3) openat$uinput(0xffffffffffffff9c, &(0x7f0000000440)='/dev/uinput\x00', 0x802, 0x0) r3 = syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') sendmsg$FOU_CMD_DEL(r1, &(0x7f00000002c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x28, r3, 0x200, 0x70bd25, 0x25dfdbfe, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e24}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x7f}]}, 0x28}}, 0x24048010) sendmsg$kcm(r0, &(0x7f0000000a40)={&(0x7f0000000580)=@ll={0x11, 0xfd, r2, 0x1, 0x8, 0x6, @dev={[], 0x16}}, 0x80, &(0x7f00000009c0)=[{&(0x7f00000008c0)="367a9f0d4a1564359d1e668c63869bb9bf3b7f5aa4030462889dd6407207295cea1b36e07bc2b38b11c6ca28a73515cf52d89a8199d5c019de826c756a31bac24f707efcfc0a2383216dccc08f804551f0a56d2c9ab95a113fa74dff88ccccc7f278200aa03d2349e688b69191611739bb3e2e5ff110c5858c1a7c5bd5431f9c8e73a99236728f125d5f52a2b0761872fc0fc53cda5458241b2a80fd918b21c8029039d416a6cde6aa786bdfaa21a4e5ffa5f80dec422e0051c7e98a8cff2f4afbe25ca5a154a57c10", 0xc9}], 0x1}, 0x4004000) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000001c0)={0x0, 0x4, 0x2, 0x3, 0x1}, 0x14) ioctl$VIDIOC_SUBDEV_S_SELECTION(r0, 0xc040563e, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x7) msgget(0x1, 0x318) syz_genetlink_get_family_id$team(&(0x7f0000000400)='team\x00') 16:49:46 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) request_key(&(0x7f0000000040)='keyring\x00', &(0x7f0000000600)={'syz'}, 0x0, 0xfffffffffffffffb) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffff9c, 0x84, 0xf, &(0x7f00000000c0)={0x0, @in6={{0xa, 0x4e23, 0x5, @mcast1, 0x5}}, 0xc6f, 0x9, 0x696, 0x2, 0x8}, &(0x7f0000000180)=0x98) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f00000001c0)={r2, @in6={{0xa, 0x4e23, 0x2, @mcast2, 0x400}}, 0x80, 0x3}, 0x90) [ 290.910269] net_ratelimit: 18 callbacks suppressed [ 290.910277] protocol 88fb is buggy, dev hsr_slave_0 [ 290.920533] protocol 88fb is buggy, dev hsr_slave_1 [ 291.230348] protocol 88fb is buggy, dev hsr_slave_0 [ 291.235533] protocol 88fb is buggy, dev hsr_slave_1 16:49:47 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) r1 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = shmget$private(0x0, 0x2000, 0x80, &(0x7f000000d000/0x2000)=nil) shmctl$IPC_RMID(r2, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10003, 0x80011, r1, 0x0) rseq(0x0, 0x0, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 16:49:47 executing program 4: r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x4000000000000036) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={@mcast1, @local, @local, 0x80000000, 0x0, 0x0, 0x200800000000114}) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x21, r0, 0x0, 0x0) 16:49:47 executing program 1: r0 = socket$inet6(0xa, 0x400000000001, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x400000, 0x0) r1 = dup(r0) getsockopt$bt_l2cap_L2CAP_LM(r1, 0x6, 0x3, 0x0, &(0x7f0000000040)) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x40000, 0x0) 16:49:47 executing program 2: r0 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'hsr0\x00', 0x0}) bind$packet(r0, &(0x7f0000000340)={0x11, 0x0, r1}, 0x14) sendto(r0, &(0x7f00000000c0)="e360b641b37ff401000000000066", 0xe, 0x0, 0x0, 0x0) 16:49:47 executing program 3: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000b00)) mount(&(0x7f00000004c0)=ANY=[], &(0x7f000000aff8)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000000)) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000000c0)='tls\x00', 0x4) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$void(r1, 0x5450) renameat2(r0, &(0x7f0000000180)='./file0/file0\x00', 0xffffffffffffffff, 0x0, 0x4) shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@dev, @in=@loopback}}, {{@in=@dev}, 0x0, @in6=@remote}}, 0x0) ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, 0x0) shmctl$IPC_SET(0x0, 0x1, 0x0) ioctl$PIO_FONT(r0, 0x4b61, &(0x7f0000000740)="9d705183203ecbbfc0d13a4e30241f7ce01b0b4d7682444a507bfc1ac414339f479986467eb40c8065891e1fbbe7263212c5c09bb47896b3d85893f1173f8a139c116f876fdcc1779bffef8c34b5958981616cbcf39f2d8b43491de452d774a74c3ae9555a45180f7d68da36975781ba3a24694ac85eea975ca104181420baf7f3b9614203b0360e7cc29a1c109e") chdir(&(0x7f0000000340)='./file0\x00') symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) umount2(&(0x7f0000000380)='./file0\x00', 0x3) openat$uinput(0xffffffffffffff9c, &(0x7f0000000440)='/dev/uinput\x00', 0x802, 0x0) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') sendmsg$FOU_CMD_DEL(r1, &(0x7f00000002c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x28, r2, 0x200, 0x70bd25, 0x25dfdbfe, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e24}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x7f}]}, 0x28}}, 0x24048010) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000001c0)={0x0, 0x4, 0x2, 0x3, 0x1}, 0x14) ioctl$VIDIOC_SUBDEV_S_SELECTION(r0, 0xc040563e, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x7) msgget(0x1, 0x318) syz_genetlink_get_family_id$team(&(0x7f0000000400)='team\x00') 16:49:47 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) r1 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = shmget$private(0x0, 0x2000, 0x80, &(0x7f000000d000/0x2000)=nil) shmctl$IPC_RMID(r2, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10003, 0x80011, r1, 0x0) rseq(0x0, 0x0, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) [ 291.310309] protocol 88fb is buggy, dev hsr_slave_0 [ 291.315494] protocol 88fb is buggy, dev hsr_slave_1 16:49:47 executing program 4: r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x4000000000000036) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={@mcast1, @local, @local, 0x80000000, 0x0, 0x0, 0x200800000000114}) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x21, r0, 0x0, 0x0) 16:49:47 executing program 2: r0 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'hsr0\x00', 0x0}) bind$packet(r0, &(0x7f0000000340)={0x11, 0x0, r1}, 0x14) sendto(r0, &(0x7f00000000c0)="e360b641b37f0000006000000066", 0xe, 0x0, 0x0, 0x0) 16:49:47 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) r1 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = shmget$private(0x0, 0x2000, 0x80, &(0x7f000000d000/0x2000)=nil) shmctl$IPC_RMID(r2, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10003, 0x80011, r1, 0x0) rseq(0x0, 0x0, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 16:49:47 executing program 1: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000b00)) mount(&(0x7f00000004c0)=ANY=[], &(0x7f000000aff8)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000000)) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000000c0)='tls\x00', 0x4) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$void(r1, 0x5450) renameat2(r0, &(0x7f0000000180)='./file0/file0\x00', 0xffffffffffffffff, 0x0, 0x4) shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@dev, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@remote}}, 0x0) ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, 0x0) shmctl$IPC_SET(0x0, 0x1, 0x0) ioctl$PIO_FONT(r0, 0x4b61, &(0x7f0000000740)="9d705183203ecbbfc0d13a4e30241f7ce01b0b4d7682444a507bfc1ac414339f479986467eb40c8065891e1fbbe7263212c5c09bb47896b3d85893f1173f8a139c116f876fdcc1779bffef8c34b5958981616cbcf39f2d8b43491de452d774a74c3ae9555a45180f7d68da36975781ba3a24694ac85eea975ca104181420baf7f3b9614203b0360e7cc29a1c109e") chdir(&(0x7f0000000340)='./file0\x00') symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) umount2(&(0x7f0000000380)='./file0\x00', 0x3) openat$uinput(0xffffffffffffff9c, &(0x7f0000000440)='/dev/uinput\x00', 0x802, 0x0) r3 = syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') sendmsg$FOU_CMD_DEL(r1, &(0x7f00000002c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x28, r3, 0x200, 0x70bd25, 0x25dfdbfe, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e24}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x7f}]}, 0x28}}, 0x24048010) sendmsg$kcm(r0, &(0x7f0000000a40)={&(0x7f0000000580)=@ll={0x11, 0xfd, r2, 0x1, 0x8, 0x6, @dev={[], 0x16}}, 0x80, &(0x7f00000009c0)=[{&(0x7f00000008c0)="367a9f0d4a1564359d1e668c63869bb9bf3b7f5aa4030462889dd6407207295cea1b36e07bc2b38b11c6ca28a73515cf52d89a8199d5c019de826c756a31bac24f707efcfc0a2383216dccc08f804551f0a56d2c9ab95a113fa74dff88ccccc7f278200aa03d2349e688b69191611739bb3e2e5ff110c5858c1a7c5bd5431f9c8e73a99236728f125d5f52a2b0761872fc0fc53cda5458241b2a80fd918b21c8029039d416a6cde6aa786bdfaa21a4e5ffa5f80dec422e0051c7e98a8cff2f4afbe25ca5a154a57c10", 0xc9}], 0x1}, 0x4004000) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000001c0)={0x0, 0x4, 0x2, 0x3, 0x1}, 0x14) ioctl$VIDIOC_SUBDEV_S_SELECTION(r0, 0xc040563e, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x7) msgget(0x1, 0x318) syz_genetlink_get_family_id$team(&(0x7f0000000400)='team\x00') 16:49:47 executing program 4: r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x4000000000000036) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={@mcast1, @local, @local, 0x80000000, 0x0, 0x0, 0x200800000000114}) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x21, r0, 0x0, 0x0) 16:49:47 executing program 2: r0 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'hsr0\x00', 0x0}) bind$packet(r0, &(0x7f0000000340)={0x11, 0x0, r1}, 0x14) sendto(r0, &(0x7f00000000c0)="e360b641b37f0000054300000066", 0xe, 0x0, 0x0, 0x0) [ 291.710318] protocol 88fb is buggy, dev hsr_slave_0 [ 291.715443] protocol 88fb is buggy, dev hsr_slave_1 16:49:47 executing program 5: r0 = epoll_create1(0x0) r1 = syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x1, 0xc0200) ioctl$TIOCSSOFTCAR(r1, 0x541a, &(0x7f00000000c0)=0x100000000) r2 = epoll_create1(0x0) close(r0) r3 = syz_open_procfs(0x0, &(0x7f0000000540)='mounts\x00') setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r3, 0x10e, 0x2, &(0x7f0000000000)=0x9eb, 0x4) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r0, &(0x7f0000000080)) 16:49:47 executing program 3: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000b00)) mount(&(0x7f00000004c0)=ANY=[], &(0x7f000000aff8)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000000)) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000000c0)='tls\x00', 0x4) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$void(r1, 0x5450) renameat2(r0, &(0x7f0000000180)='./file0/file0\x00', 0xffffffffffffffff, 0x0, 0x4) shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@dev, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@remote}}, 0x0) ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, 0x0) shmctl$IPC_SET(0x0, 0x1, 0x0) ioctl$PIO_FONT(r0, 0x4b61, &(0x7f0000000740)="9d705183203ecbbfc0d13a4e30241f7ce01b0b4d7682444a507bfc1ac414339f479986467eb40c8065891e1fbbe7263212c5c09bb47896b3d85893f1173f8a139c116f876fdcc1779bffef8c34b5958981616cbcf39f2d8b43491de452d774a74c3ae9555a45180f7d68da36975781ba3a24694ac85eea975ca104181420baf7f3b9614203b0360e7cc29a1c109e") chdir(&(0x7f0000000340)='./file0\x00') symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) umount2(&(0x7f0000000380)='./file0\x00', 0x3) openat$uinput(0xffffffffffffff9c, &(0x7f0000000440)='/dev/uinput\x00', 0x802, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') sendmsg$kcm(r0, &(0x7f0000000a40)={&(0x7f0000000580)=@ll={0x11, 0xfd, r2, 0x1, 0x8, 0x6, @dev={[], 0x16}}, 0x80, &(0x7f00000009c0)=[{&(0x7f00000008c0)="367a9f0d4a1564359d1e668c63869bb9bf3b7f5aa4030462889dd6407207295cea1b36e07bc2b38b11c6ca28a73515cf52d89a8199d5c019de826c756a31bac24f707efcfc0a2383216dccc08f804551f0a56d2c9ab95a113fa74dff88ccccc7f278200aa03d2349e688b69191611739bb3e2e5ff110c5858c1a7c5bd5431f9c8e73a99236728f125d5f52a2b0761872fc0fc53cda5458241b2a80fd918b21c8029039d416a6cde6aa786bdfaa21a4e5ffa5f80dec422e0051c7e98a8cff2f4afbe25ca5a154a57c10", 0xc9}], 0x1}, 0x4004000) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000001c0)={0x0, 0x4, 0x2, 0x3, 0x1}, 0x14) ioctl$VIDIOC_SUBDEV_S_SELECTION(r0, 0xc040563e, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x7) msgget(0x1, 0x318) syz_genetlink_get_family_id$team(&(0x7f0000000400)='team\x00') 16:49:47 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f0000000240)=@dellink={0x28, 0x11, 0x1, 0x0, 0x0, {}, [@IFLA_NET_NS_PID={0x8}]}, 0x28}}, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='oom_adj\x00') setsockopt$inet6_dccp_buf(r1, 0x21, 0xc, &(0x7f0000000140)="67642e963dfaba5d5f7bf8d7928a80f394ef58d49d09a114887ce7fd230a8035f8fe99ef550449a658f4c5b561e430ab3f48625ba235eb210ba8363bd555cedca2ee442113422f305eb46c0df4240963bc801edba6ea0468e925ec112bc302d7225a929a437addf763e0930511a152e38ef919b4ac4e2859d0ead84d39bdfb201aed2b7b156391cec2f0429f1d629da456a7c5a2570cc518531bab3610e19affca78ce7784dcd730f1b4b6c444353e631c9e134ac74bc803bf9a684740301c4452ba69127a2c9b70327533647d6bdf3b8d69270c39c45c4ab462ec58b0b33d67c791642d9603", 0xe6) 16:49:47 executing program 4: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x4000000000000036) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={@mcast1, @local, @local, 0x80000000, 0x0, 0x0, 0x200800000000114}) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x21, r0, 0x0, 0x0) 16:49:47 executing program 5: socket$inet(0x2, 0x3, 0x800000000000a) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0x0) socketpair(0x8, 0x8000a, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$bt_hci_HCI_FILTER(0xffffffffffffffff, 0x0, 0x2, 0x0, 0x0) msgget$private(0x0, 0x10) shmat(0x0, &(0x7f0000ffa000/0x4000)=nil, 0x0) syz_open_dev$video4linux(0x0, 0x8001, 0x2000800) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msgget$private(0x0, 0x800000000252) r3 = syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x0, 0x182) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, 0x0, &(0x7f00000003c0)) io_setup(0xd75, &(0x7f0000000180)) msgget$private(0x0, 0x10) ioctl$sock_inet6_tcp_SIOCOUTQNSD(r1, 0x894b, 0x0) r4 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x2) pwritev(r4, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) setsockopt$SO_RDS_TRANSPORT(r1, 0x114, 0x8, &(0x7f0000000200)=0x3, 0x4) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) r5 = add_key$keyring(&(0x7f0000000700)='keyring\x00', &(0x7f00000007c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) r6 = request_key(&(0x7f0000000740)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f0000000280)='\xa1hxB}\xf0\x98e\xc4\xd0D\xdai6\xb9[\xc7\x85\x13\xfd\xc7\xbd\xc1\xff\xfcdE\x16\"\xae\xd6\xc0|D\xf2\xed\xcc)\xe5\x8d\xe9T\a\x7f\x1a8\xb0\xf2\v\x03\'\x01bk\x16T\xd9\r\xb7\xf5\xa5`>\xe5\x92\xb5\xd9\x11{\x11`\xc5.\xdf?\x8c>\xdd&\xba\xaf\xdc\xe2>c\xc1\xdc\x98\xabS=\x8d\x1d\x851\xcc_j2u\xde\x02jT\x98[\x10\xa9G\xf7q%\x14\xfe\x86\x10\x80k3\xbb\v\x8d\xaco+\x1d@\x99\x16\x83U\xb7]W8\xba\x1e\xc1\x91\x88\xf8+\x00\xcd\xae\xbb\xb7\xc3j;m\x88\x9d\xbe\x00zB\xe1\r\xfaS\b\x0f\xa3\xf0\xfc\xe1\x9a\x04\x849\x86\xe4\xa3rk\x05>}\x1a\xc3\xb0\x93\xae\x8d\xc6\xf5;\xf9\xa1', r5) add_key$user(&(0x7f0000000c80)='user\x00', &(0x7f0000000cc0), &(0x7f0000000c00)="a1d0eac2f4da2c50811754f5142bc3553bf33194b1f04184bcc9bd51c43b38c917b6af51bdff27221de1ed528d9587cb6a87c4e9cea2b2e8ab19f9f03433039e59f23f1d1966930d7a5cc885f3547f9c30ab40b2ff572aa0316847ca33d076", 0x5f, r6) sendfile(r3, r4, &(0x7f0000000380)=0x4, 0x2000005) syz_genetlink_get_family_id$ipvs(0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer2\x00', 0x80000, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, 0x0, 0x4000) ioctl$LOOP_CLR_FD(r3, 0x4c01) socket(0x0, 0x0, 0x10001) ioctl$LOOP_SET_FD(r3, 0x4c00, r4) write$apparmor_current(r4, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x1) futimesat(r2, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)={{0x0, 0x7530}, {0x77359400}}) 16:49:47 executing program 2: r0 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'hsr0\x00', 0x0}) bind$packet(r0, &(0x7f0000000340)={0x11, 0x0, r1}, 0x14) sendto(r0, &(0x7f00000000c0)="e360b641b37f000003e800000066", 0xe, 0x0, 0x0, 0x0) 16:49:47 executing program 0: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000880)='./file0\x00', &(0x7f0000005440)='hugetlbfs\x00', 0x0, 0x0) chdir(&(0x7f0000000300)='./file0\x00') mknod$loop(&(0x7f0000000000)='./file0\x00', 0xffffc001, 0x1) [ 292.110293] protocol 88fb is buggy, dev hsr_slave_0 [ 292.115593] protocol 88fb is buggy, dev hsr_slave_1 16:49:48 executing program 1: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x0) open(0x0, 0x8000101842, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x82) r1 = add_key$keyring(&(0x7f0000000300)='keyring\x00', &(0x7f0000000280)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$get_keyring_id(0x0, r1, 0x0) r2 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r2) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) add_key$user(&(0x7f0000000080)='user\x00', &(0x7f00000000c0)={'syz', 0x0}, &(0x7f0000000140)="73602e55aea7364133d0d8681451861ce36c0085fa916dcdc60199e05bc4d391757d3146fe950865778c5f7d89ea4a5bf34f2e44f0b13875dcd625b86a0a58dfbcc6801365f10de0", 0x48, r1) sendfile(r0, r0, &(0x7f0000000000), 0x2000005) getdents(0xffffffffffffffff, &(0x7f0000000240)=""/55, 0x37) 16:49:48 executing program 0: r0 = syz_open_dev$media(&(0x7f0000000040)='/dev/media#\x00', 0x8001, 0x18a6ef8ab6243bd5) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000140)={0x8, 0x400, 0x3f, 0x5, 0x8, 0x776, 0xfffffffffffffffe, 0x6, 0x4, 0x2b, 0x27d, 0x3}) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_ABS_SETUP(r1, 0x401c5504, &(0x7f0000000000)={0x1, {0x0, 0x0, 0x0, 0x0, 0x100000001, 0x3f}}) ioctl$IMGETDEVINFO(r1, 0x80044944, &(0x7f00000000c0)={0x1}) ioctl$UI_SET_EVBIT(r1, 0x40045564, 0x3) ioctl$UI_SET_ABSBIT(r1, 0x40045567, 0x0) write$uinput_user_dev(r1, &(0x7f00000009c0)={'syz0\x00'}, 0x45c) 16:49:48 executing program 4: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x4000000000000036) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={@mcast1, @local, @local, 0x80000000, 0x0, 0x0, 0x200800000000114}) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x21, r0, 0x0, 0x0) 16:49:48 executing program 2: r0 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'hsr0\x00', 0x0}) bind$packet(r0, &(0x7f0000000340)={0x11, 0x0, r1}, 0x14) sendto(r0, &(0x7f00000000c0)="e360b641b37f0543000000000066", 0xe, 0x0, 0x0, 0x0) 16:49:48 executing program 3: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000b00)) mount(&(0x7f00000004c0)=ANY=[], &(0x7f000000aff8)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000000)) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000000c0)='tls\x00', 0x4) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$void(r1, 0x5450) renameat2(r0, &(0x7f0000000180)='./file0/file0\x00', 0xffffffffffffffff, 0x0, 0x4) shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@dev, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@remote}}, 0x0) ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, 0x0) shmctl$IPC_SET(0x0, 0x1, 0x0) ioctl$PIO_FONT(r0, 0x4b61, &(0x7f0000000740)="9d705183203ecbbfc0d13a4e30241f7ce01b0b4d7682444a507bfc1ac414339f479986467eb40c8065891e1fbbe7263212c5c09bb47896b3d85893f1173f8a139c116f876fdcc1779bffef8c34b5958981616cbcf39f2d8b43491de452d774a74c3ae9555a45180f7d68da36975781ba3a24694ac85eea975ca104181420baf7f3b9614203b0360e7cc29a1c109e") chdir(&(0x7f0000000340)='./file0\x00') symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) umount2(&(0x7f0000000380)='./file0\x00', 0x3) openat$uinput(0xffffffffffffff9c, &(0x7f0000000440)='/dev/uinput\x00', 0x802, 0x0) sendmsg$FOU_CMD_DEL(r1, &(0x7f00000002c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x28, 0x0, 0x200, 0x70bd25, 0x25dfdbfe, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e24}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x7f}]}, 0x28}}, 0x24048010) sendmsg$kcm(r0, &(0x7f0000000a40)={&(0x7f0000000580)=@ll={0x11, 0xfd, r2, 0x1, 0x8, 0x6, @dev={[], 0x16}}, 0x80, &(0x7f00000009c0)=[{&(0x7f00000008c0)="367a9f0d4a1564359d1e668c63869bb9bf3b7f5aa4030462889dd6407207295cea1b36e07bc2b38b11c6ca28a73515cf52d89a8199d5c019de826c756a31bac24f707efcfc0a2383216dccc08f804551f0a56d2c9ab95a113fa74dff88ccccc7f278200aa03d2349e688b69191611739bb3e2e5ff110c5858c1a7c5bd5431f9c8e73a99236728f125d5f52a2b0761872fc0fc53cda5458241b2a80fd918b21c8029039d416a6cde6aa786bdfaa21a4e5ffa5f80dec422e0051c7e98a8cff2f4afbe25ca5a154a57c10", 0xc9}], 0x1}, 0x4004000) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000001c0)={0x0, 0x4, 0x2, 0x3, 0x1}, 0x14) ioctl$VIDIOC_SUBDEV_S_SELECTION(r0, 0xc040563e, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x7) msgget(0x1, 0x318) syz_genetlink_get_family_id$team(&(0x7f0000000400)='team\x00') 16:49:48 executing program 0: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000b00)) mount(&(0x7f00000004c0)=ANY=[], &(0x7f000000aff8)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000000)) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000000c0)='tls\x00', 0x4) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$void(r1, 0x5450) renameat2(r0, &(0x7f0000000180)='./file0/file0\x00', 0xffffffffffffffff, 0x0, 0x4) shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@dev, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@remote}}, 0x0) ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, 0x0) shmctl$IPC_SET(0x0, 0x1, 0x0) ioctl$PIO_FONT(r0, 0x4b61, &(0x7f0000000740)="9d705183203ecbbfc0d13a4e30241f7ce01b0b4d7682444a507bfc1ac414339f479986467eb40c8065891e1fbbe7263212c5c09bb47896b3d85893f1173f8a139c116f876fdcc1779bffef8c34b5958981616cbcf39f2d8b43491de452d774a74c3ae9555a45180f7d68da36975781ba3a24694ac85eea975ca104181420baf7f3b9614203b0360e7cc29a1c109e") chdir(&(0x7f0000000340)='./file0\x00') symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) umount2(&(0x7f0000000380)='./file0\x00', 0x3) openat$uinput(0xffffffffffffff9c, &(0x7f0000000440)='/dev/uinput\x00', 0x802, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') sendmsg$kcm(r0, &(0x7f0000000a40)={&(0x7f0000000580)=@ll={0x11, 0xfd, r2, 0x1, 0x8, 0x6, @dev={[], 0x16}}, 0x80, &(0x7f00000009c0)=[{&(0x7f00000008c0)="367a9f0d4a1564359d1e668c63869bb9bf3b7f5aa4030462889dd6407207295cea1b36e07bc2b38b11c6ca28a73515cf52d89a8199d5c019de826c756a31bac24f707efcfc0a2383216dccc08f804551f0a56d2c9ab95a113fa74dff88ccccc7f278200aa03d2349e688b69191611739bb3e2e5ff110c5858c1a7c5bd5431f9c8e73a99236728f125d5f52a2b0761872fc0fc53cda5458241b2a80fd918b21c8029039d416a6cde6aa786bdfaa21a4e5ffa5f80dec422e0051c7e98a8cff2f4afbe25ca5a154a57c10", 0xc9}], 0x1}, 0x4004000) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000001c0)={0x0, 0x4, 0x2, 0x3, 0x1}, 0x14) ioctl$VIDIOC_SUBDEV_S_SELECTION(r0, 0xc040563e, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x7) msgget(0x1, 0x318) syz_genetlink_get_family_id$team(&(0x7f0000000400)='team\x00') [ 292.397625] print_req_error: I/O error, dev loop0, sector 0 flags 801 [ 292.404774] Buffer I/O error on dev loop0, logical block 0, lost async page write [ 292.412998] print_req_error: I/O error, dev loop0, sector 8 flags 801 [ 292.419608] Buffer I/O error on dev loop0, logical block 1, lost async page write [ 292.427368] print_req_error: I/O error, dev loop0, sector 16 flags 801 [ 292.434207] Buffer I/O error on dev loop0, logical block 2, lost async page write 16:49:48 executing program 3: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000b00)) mount(&(0x7f00000004c0)=ANY=[], &(0x7f000000aff8)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000000)) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000000c0)='tls\x00', 0x4) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$void(r1, 0x5450) renameat2(r0, &(0x7f0000000180)='./file0/file0\x00', 0xffffffffffffffff, 0x0, 0x4) shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@dev, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@remote}}, 0x0) ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, 0x0) shmctl$IPC_SET(0x0, 0x1, 0x0) ioctl$PIO_FONT(r0, 0x4b61, &(0x7f0000000740)="9d705183203ecbbfc0d13a4e30241f7ce01b0b4d7682444a507bfc1ac414339f479986467eb40c8065891e1fbbe7263212c5c09bb47896b3d85893f1173f8a139c116f876fdcc1779bffef8c34b5958981616cbcf39f2d8b43491de452d774a74c3ae9555a45180f7d68da36975781ba3a24694ac85eea975ca104181420baf7f3b9614203b0360e7cc29a1c109e") chdir(&(0x7f0000000340)='./file0\x00') symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) umount2(&(0x7f0000000380)='./file0\x00', 0x3) r3 = syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') sendmsg$FOU_CMD_DEL(r1, &(0x7f00000002c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x28, r3, 0x200, 0x70bd25, 0x25dfdbfe, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e24}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x7f}]}, 0x28}}, 0x24048010) sendmsg$kcm(r0, &(0x7f0000000a40)={&(0x7f0000000580)=@ll={0x11, 0xfd, r2, 0x1, 0x8, 0x6, @dev={[], 0x16}}, 0x80, &(0x7f00000009c0)=[{&(0x7f00000008c0)="367a9f0d4a1564359d1e668c63869bb9bf3b7f5aa4030462889dd6407207295cea1b36e07bc2b38b11c6ca28a73515cf52d89a8199d5c019de826c756a31bac24f707efcfc0a2383216dccc08f804551f0a56d2c9ab95a113fa74dff88ccccc7f278200aa03d2349e688b69191611739bb3e2e5ff110c5858c1a7c5bd5431f9c8e73a99236728f125d5f52a2b0761872fc0fc53cda5458241b2a80fd918b21c8029039d416a6cde6aa786bdfaa21a4e5ffa5f80dec422e0051c7e98a8cff2f4afbe25ca5a154a57c10", 0xc9}], 0x1}, 0x4004000) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000001c0)={0x0, 0x4, 0x2, 0x3, 0x1}, 0x14) ioctl$VIDIOC_SUBDEV_S_SELECTION(r0, 0xc040563e, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x7) msgget(0x1, 0x318) syz_genetlink_get_family_id$team(&(0x7f0000000400)='team\x00') [ 292.442415] print_req_error: I/O error, dev loop0, sector 24 flags 801 [ 292.449153] Buffer I/O error on dev loop0, logical block 3, lost async page write [ 292.457094] print_req_error: I/O error, dev loop0, sector 32 flags 801 [ 292.463849] Buffer I/O error on dev loop0, logical block 4, lost async page write [ 292.471653] print_req_error: I/O error, dev loop0, sector 40 flags 801 [ 292.478330] Buffer I/O error on dev loop0, logical block 5, lost async page write [ 292.486071] print_req_error: I/O error, dev loop0, sector 48 flags 801 16:49:48 executing program 4: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x4000000000000036) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={@mcast1, @local, @local, 0x80000000, 0x0, 0x0, 0x200800000000114}) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x21, r0, 0x0, 0x0) [ 292.492884] Buffer I/O error on dev loop0, logical block 6, lost async page write [ 292.500673] print_req_error: I/O error, dev loop0, sector 56 flags 801 [ 292.507351] Buffer I/O error on dev loop0, logical block 7, lost async page write [ 292.515100] print_req_error: I/O error, dev loop0, sector 64 flags 801 [ 292.521944] Buffer I/O error on dev loop0, logical block 8, lost async page write [ 292.522608] print_req_error: I/O error, dev loop0, sector 72 flags 801 [ 292.529612] Buffer I/O error on dev loop0, logical block 10, lost async page write 16:49:48 executing program 1: syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) syz_open_dev$sndpcmc(&(0x7f0000000180)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) getsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, 0x0, 0x0) syz_open_dev$radio(&(0x7f0000000580)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) openat$vhci(0xffffffffffffff9c, 0x0, 0x0) pipe(&(0x7f0000000880)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0xa000000000000, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x8000000000, 0x0, 0x0, 0x94, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb727, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xfffffffffffffffe) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100)={0x0, 0x0, 0x6}, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 16:49:48 executing program 5: socket$inet(0x2, 0x3, 0x800000000000a) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0x0) socketpair(0x8, 0x8000a, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$bt_hci_HCI_FILTER(0xffffffffffffffff, 0x0, 0x2, 0x0, 0x0) msgget$private(0x0, 0x10) shmat(0x0, &(0x7f0000ffa000/0x4000)=nil, 0x0) syz_open_dev$video4linux(0x0, 0x8001, 0x2000800) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msgget$private(0x0, 0x800000000252) r3 = syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x0, 0x182) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, 0x0, &(0x7f00000003c0)) io_setup(0xd75, &(0x7f0000000180)) msgget$private(0x0, 0x10) ioctl$sock_inet6_tcp_SIOCOUTQNSD(r1, 0x894b, 0x0) r4 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x2) pwritev(r4, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) setsockopt$SO_RDS_TRANSPORT(r1, 0x114, 0x8, &(0x7f0000000200)=0x3, 0x4) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) r5 = add_key$keyring(&(0x7f0000000700)='keyring\x00', &(0x7f00000007c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) r6 = request_key(&(0x7f0000000740)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f0000000280)='\xa1hxB}\xf0\x98e\xc4\xd0D\xdai6\xb9[\xc7\x85\x13\xfd\xc7\xbd\xc1\xff\xfcdE\x16\"\xae\xd6\xc0|D\xf2\xed\xcc)\xe5\x8d\xe9T\a\x7f\x1a8\xb0\xf2\v\x03\'\x01bk\x16T\xd9\r\xb7\xf5\xa5`>\xe5\x92\xb5\xd9\x11{\x11`\xc5.\xdf?\x8c>\xdd&\xba\xaf\xdc\xe2>c\xc1\xdc\x98\xabS=\x8d\x1d\x851\xcc_j2u\xde\x02jT\x98[\x10\xa9G\xf7q%\x14\xfe\x86\x10\x80k3\xbb\v\x8d\xaco+\x1d@\x99\x16\x83U\xb7]W8\xba\x1e\xc1\x91\x88\xf8+\x00\xcd\xae\xbb\xb7\xc3j;m\x88\x9d\xbe\x00zB\xe1\r\xfaS\b\x0f\xa3\xf0\xfc\xe1\x9a\x04\x849\x86\xe4\xa3rk\x05>}\x1a\xc3\xb0\x93\xae\x8d\xc6\xf5;\xf9\xa1', r5) add_key$user(&(0x7f0000000c80)='user\x00', &(0x7f0000000cc0), &(0x7f0000000c00)="a1d0eac2f4da2c50811754f5142bc3553bf33194b1f04184bcc9bd51c43b38c917b6af51bdff27221de1ed528d9587cb6a87c4e9cea2b2e8ab19f9f03433039e59f23f1d1966930d7a5cc885f3547f9c30ab40b2ff572aa0316847ca33d076", 0x5f, r6) sendfile(r3, r4, &(0x7f0000000380)=0x4, 0x2000005) syz_genetlink_get_family_id$ipvs(0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer2\x00', 0x80000, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, 0x0, 0x4000) ioctl$LOOP_CLR_FD(r3, 0x4c01) socket(0x0, 0x0, 0x10001) ioctl$LOOP_SET_FD(r3, 0x4c00, r4) write$apparmor_current(r4, &(0x7f0000000580)=ANY=[@ANYBLOB="7065726d68617420307830303030528bfa3fe3b43067303030335e2f6465762f76346c2d737506226762646576236f70230070707031706f73ffff5f61636c5f6163636565762f76346c2de6585244737562646576230024656d305c5e6367727575706574683076626f851e6574312500007468306629657468312a7472757374090a00091be8227a30e89813c27dfb4c58b177414dc00894420672f7c5a16e5da174d7884f82b515b69dfa0c3f55c2d0011a6654644c7a17dc3eef323fdaa5d28efdd4a64815df388f3d6ef386be29eeefbad6a45459fd023c7337f8c1c6e4d64bcef2acb42ebcca7400ef430f67b3c8afb100009d22be40a2de951e33231ff6868c14e40000000000000000000000"], 0x1) futimesat(r2, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)={{0x0, 0x7530}, {0x77359400}}) 16:49:48 executing program 2: r0 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'hsr0\x00', 0x0}) bind$packet(r0, &(0x7f0000000340)={0x11, 0x0, r1}, 0x14) sendto(r0, &(0x7f00000000c0)="e360b641b37f5865000000000066", 0xe, 0x0, 0x0, 0x0) 16:49:48 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000100)=@nat={'nat\x00', 0x19, 0x3, 0x318, [0x20000540, 0x0, 0x0, 0x20000640, 0x20000780], 0x0, 0x0, &(0x7f0000000540)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge_slave_0\x00', 'sit0\x00', 'ip6gretap0\x00', 'ipddp0\x00', @broadcast, [], @dev, [], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x0, 0xc882e99a8a6c1b2e}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'vlan0\x00', 'bpq0\x00', 'ip_vti0\x00', 'veth1\x00\x00\x00\x00\x00\x1c\x00', @link_local, [], @dev, [], 0x70, 0xd8, 0x110}, [@common=@STANDARD={'\x00', 0x8}, @common=@mark={'mark\x00', 0x10}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x0, 0x0, 'rose0\x00', 'ip6gre0\x00', 'veth0_to_bridge\x00', 'vlan0\x00', @broadcast, [], @link_local, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0x390) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) 16:49:48 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x4000000000000036) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={@mcast1, @local, @local, 0x80000000, 0x0, 0x0, 0x200800000000114}) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x21, r0, 0x0, 0x0) 16:49:48 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x4000000000000036) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={@mcast1, @local, @local, 0x80000000, 0x0, 0x0, 0x200800000000114}) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x21, r0, 0x0, 0x0) 16:49:48 executing program 3: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000b00)) mount(&(0x7f00000004c0)=ANY=[], &(0x7f000000aff8)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000000)) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000000c0)='tls\x00', 0x4) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$void(r1, 0x5450) renameat2(r0, &(0x7f0000000180)='./file0/file0\x00', 0xffffffffffffffff, 0x0, 0x4) shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@dev, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@remote}}, 0x0) ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, 0x0) shmctl$IPC_SET(0x0, 0x1, 0x0) ioctl$PIO_FONT(r0, 0x4b61, &(0x7f0000000740)="9d705183203ecbbfc0d13a4e30241f7ce01b0b4d7682444a507bfc1ac414339f479986467eb40c8065891e1fbbe7263212c5c09bb47896b3d85893f1173f8a139c116f876fdcc1779bffef8c34b5958981616cbcf39f2d8b43491de452d774a74c3ae9555a45180f7d68da36975781ba3a24694ac85eea975ca104181420baf7f3b9614203b0360e7cc29a1c109e") chdir(&(0x7f0000000340)='./file0\x00') symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) umount2(&(0x7f0000000380)='./file0\x00', 0x3) r3 = syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') sendmsg$FOU_CMD_DEL(r1, &(0x7f00000002c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x28, r3, 0x200, 0x70bd25, 0x25dfdbfe, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e24}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x7f}]}, 0x28}}, 0x24048010) sendmsg$kcm(r0, &(0x7f0000000a40)={&(0x7f0000000580)=@ll={0x11, 0xfd, r2, 0x1, 0x8, 0x6, @dev={[], 0x16}}, 0x80, &(0x7f00000009c0)=[{&(0x7f00000008c0)="367a9f0d4a1564359d1e668c63869bb9bf3b7f5aa4030462889dd6407207295cea1b36e07bc2b38b11c6ca28a73515cf52d89a8199d5c019de826c756a31bac24f707efcfc0a2383216dccc08f804551f0a56d2c9ab95a113fa74dff88ccccc7f278200aa03d2349e688b69191611739bb3e2e5ff110c5858c1a7c5bd5431f9c8e73a99236728f125d5f52a2b0761872fc0fc53cda5458241b2a80fd918b21c8029039d416a6cde6aa786bdfaa21a4e5ffa5f80dec422e0051c7e98a8cff2f4afbe25ca5a154a57c10", 0xc9}], 0x1}, 0x4004000) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000001c0)={0x0, 0x4, 0x2, 0x3, 0x1}, 0x14) ioctl$VIDIOC_SUBDEV_S_SELECTION(r0, 0xc040563e, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x7) msgget(0x1, 0x318) syz_genetlink_get_family_id$team(&(0x7f0000000400)='team\x00') 16:49:48 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x7f, 0x7, 0x5, 0x1}, 0x2c) rt_sigtimedwait(&(0x7f0000000080)={0xfffffffffffff6b1}, 0x0, 0x0, 0xffffffffffffff09) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000000)={r0, 0x0, 0x0}, 0x18) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r0, &(0x7f0000000000), 0x0}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000200)={r0, &(0x7f0000000180)}, 0x10) [ 293.015656] Unknown options in mask 1b2e [ 293.028707] Unknown options in mask 1b2e 16:49:49 executing program 2: r0 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'hsr0\x00', 0x0}) bind$packet(r0, &(0x7f0000000340)={0x11, 0x0, r1}, 0x14) sendto(r0, &(0x7f00000000c0)="e360b641b37f01f4000000000066", 0xe, 0x0, 0x0, 0x0) 16:49:49 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x4000000000000036) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={@mcast1, @local, @local, 0x80000000, 0x0, 0x0, 0x200800000000114}) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x21, r0, 0x0, 0x0) 16:49:49 executing program 3: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000b00)) mount(&(0x7f00000004c0)=ANY=[], &(0x7f000000aff8)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000000)) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000000c0)='tls\x00', 0x4) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$void(r1, 0x5450) renameat2(r0, &(0x7f0000000180)='./file0/file0\x00', 0xffffffffffffffff, 0x0, 0x4) shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@dev, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@remote}}, 0x0) ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, 0x0) shmctl$IPC_SET(0x0, 0x1, 0x0) ioctl$PIO_FONT(r0, 0x4b61, &(0x7f0000000740)="9d705183203ecbbfc0d13a4e30241f7ce01b0b4d7682444a507bfc1ac414339f479986467eb40c8065891e1fbbe7263212c5c09bb47896b3d85893f1173f8a139c116f876fdcc1779bffef8c34b5958981616cbcf39f2d8b43491de452d774a74c3ae9555a45180f7d68da36975781ba3a24694ac85eea975ca104181420baf7f3b9614203b0360e7cc29a1c109e") chdir(&(0x7f0000000340)='./file0\x00') symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) umount2(&(0x7f0000000380)='./file0\x00', 0x3) r3 = syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') sendmsg$FOU_CMD_DEL(r1, &(0x7f00000002c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x28, r3, 0x200, 0x70bd25, 0x25dfdbfe, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e24}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x7f}]}, 0x28}}, 0x24048010) sendmsg$kcm(r0, &(0x7f0000000a40)={&(0x7f0000000580)=@ll={0x11, 0xfd, r2, 0x1, 0x8, 0x6, @dev={[], 0x16}}, 0x80, &(0x7f00000009c0)=[{&(0x7f00000008c0)="367a9f0d4a1564359d1e668c63869bb9bf3b7f5aa4030462889dd6407207295cea1b36e07bc2b38b11c6ca28a73515cf52d89a8199d5c019de826c756a31bac24f707efcfc0a2383216dccc08f804551f0a56d2c9ab95a113fa74dff88ccccc7f278200aa03d2349e688b69191611739bb3e2e5ff110c5858c1a7c5bd5431f9c8e73a99236728f125d5f52a2b0761872fc0fc53cda5458241b2a80fd918b21c8029039d416a6cde6aa786bdfaa21a4e5ffa5f80dec422e0051c7e98a8cff2f4afbe25ca5a154a57c10", 0xc9}], 0x1}, 0x4004000) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000001c0)={0x0, 0x4, 0x2, 0x3, 0x1}, 0x14) ioctl$VIDIOC_SUBDEV_S_SELECTION(r0, 0xc040563e, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x7) msgget(0x1, 0x318) syz_genetlink_get_family_id$team(&(0x7f0000000400)='team\x00') 16:49:49 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0xffffffffffffffff, r0, 0x0, 0x0) tkill(r0, 0x4000000000000036) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={@mcast1, @local, @local, 0x80000000, 0x0, 0x0, 0x200800000000114}) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x21, r0, 0x0, 0x0) 16:49:49 executing program 1: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(r0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) tkill(r0, 0x1c) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={@empty, @mcast1, @ipv4, 0x20000000, 0x0, 0x0, 0x12a}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) write$tun(r1, 0xffffffffffffffff, 0xbe88bdd78880056c) ptrace$cont(0x7, r0, 0x0, 0x0) 16:49:49 executing program 5: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000b00)) mount(&(0x7f00000004c0)=ANY=[], &(0x7f000000aff8)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000000)) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000000c0)='tls\x00', 0x4) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$void(r1, 0x5450) renameat2(r0, &(0x7f0000000180)='./file0/file0\x00', 0xffffffffffffffff, 0x0, 0x4) shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@dev, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@remote}}, 0x0) ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, 0x0) shmctl$IPC_SET(0x0, 0x1, 0x0) ioctl$PIO_FONT(r0, 0x4b61, &(0x7f0000000740)="9d705183203ecbbfc0d13a4e30241f7ce01b0b4d7682444a507bfc1ac414339f479986467eb40c8065891e1fbbe7263212c5c09bb47896b3d85893f1173f8a139c116f876fdcc1779bffef8c34b5958981616cbcf39f2d8b43491de452d774a74c3ae9555a45180f7d68da36975781ba3a24694ac85eea975ca104181420baf7f3b9614203b0360e7cc29a1c109e") chdir(&(0x7f0000000340)='./file0\x00') symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) umount2(&(0x7f0000000380)='./file0\x00', 0x3) r3 = syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') sendmsg$FOU_CMD_DEL(r1, &(0x7f00000002c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x28, r3, 0x200, 0x70bd25, 0x25dfdbfe, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e24}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x7f}]}, 0x28}}, 0x24048010) sendmsg$kcm(r0, &(0x7f0000000a40)={&(0x7f0000000580)=@ll={0x11, 0xfd, r2, 0x1, 0x8, 0x6, @dev={[], 0x16}}, 0x80, &(0x7f00000009c0)=[{&(0x7f00000008c0)="367a9f0d4a1564359d1e668c63869bb9bf3b7f5aa4030462889dd6407207295cea1b36e07bc2b38b11c6ca28a73515cf52d89a8199d5c019de826c756a31bac24f707efcfc0a2383216dccc08f804551f0a56d2c9ab95a113fa74dff88ccccc7f278200aa03d2349e688b69191611739bb3e2e5ff110c5858c1a7c5bd5431f9c8e73a99236728f125d5f52a2b0761872fc0fc53cda5458241b2a80fd918b21c8029039d416a6cde6aa786bdfaa21a4e5ffa5f80dec422e0051c7e98a8cff2f4afbe25ca5a154a57c10", 0xc9}], 0x1}, 0x4004000) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000001c0)={0x0, 0x4, 0x2, 0x3, 0x1}, 0x14) ioctl$VIDIOC_SUBDEV_S_SELECTION(r0, 0xc040563e, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x7) msgget(0x1, 0x318) syz_genetlink_get_family_id$team(&(0x7f0000000400)='team\x00') 16:49:49 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usb(&(0x7f0000000100)='/dev/bus/usb/00#/00#\x00', 0xfffffffffffffffd, 0x8000) ioctl$BLKGETSIZE(r0, 0x1260, &(0x7f0000000140)) r1 = memfd_create(&(0x7f0000000080)='dev ', 0x5) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0xa}) r2 = creat(&(0x7f00000002c0)='./file0\x00', 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$VIDIOC_ENCODER_CMD(r3, 0xc028564d, &(0x7f0000000140)={0x1, 0x1, [0x0, 0x5, 0x0, 0x0, 0xb2]}) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r5 = memfd_create(0x0, 0x0) bind$vsock_stream(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) read$FUSE(0xffffffffffffffff, 0x0, 0x0) close(r4) r6 = add_key(&(0x7f0000000040)='asymmetric\x00', 0x0, &(0x7f00000001c0)="153520ae1e3b8f747ac285572a549ffe3c9f09fc8a2cc8abbab655c8953df46ff4eef00fced831ca9af9c813fd8c5e1674d6dc1d7cbdf94ca72af65e94c804c3109115070b9ca4767aeae60fe2fe3fb715dfdec6fa9afc7e3170876cbdcff42ea24eadcd8ff1e7bc3538a913dff6af14a6c65aa12a1346c9b6b7b129290552ed982d3c83a847a8fcaaf4556c19dd5847ee2f8b58a14dad8a9e50cfd4e5e4e5edb64cfc4915bdaa8bdae6f2f94d9e3a55654fe46e461b766ba0", 0xb9, 0xfffffffffffffffc) keyctl$restrict_keyring(0x1d, r6, &(0x7f0000000500)='encrypted\x00', &(0x7f0000000540)='wlan1em0\\(mime_typewlan0ppp1ppp1proc[)}cpusetvboxnet1securityppp1self\x00') ioctl$sock_bt_hidp_HIDPCONNADD(0xffffffffffffffff, 0x400448c8, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x4, 0x0, 0xf74, 0x100000000003ff, 0x0, 0xff, 0x0, 0x1f, 0x1ff}) getsockopt$inet6_mreq(r0, 0x29, 0x15, &(0x7f0000000280)={@mcast2, 0x0}, &(0x7f00000003c0)=0x14) ioctl$HCIINQUIRY(r2, 0x800448f0, &(0x7f0000000400)={r7, 0x1, 0x8, 0xffffffffffffffbd, 0x7d12, 0x7, 0xfffffffffffffffc}) ioctl$DRM_IOCTL_MARK_BUFS(r5, 0x40206417, 0x0) bind$nfc_llcp(r1, &(0x7f0000000000)={0x27, 0x0, 0x0, 0xae6f374427edb1ff, 0x7f, 0x10001, "d0db1c2aa0ac63218b1d0d06166c5db33ddb70993dcc473190caa95465b9a43e60c9f5204c31332b0c57c137b83b01827f4dd3af6f0d63a5be4638ab432182", 0x8}, 0x60) 16:49:49 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0xffffffffffffffff, r0, 0x0, 0x0) tkill(r0, 0x4000000000000036) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={@mcast1, @local, @local, 0x80000000, 0x0, 0x0, 0x200800000000114}) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x21, r0, 0x0, 0x0) 16:49:49 executing program 2: r0 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'hsr0\x00', 0x0}) bind$packet(r0, &(0x7f0000000340)={0x11, 0x0, r1}, 0x14) sendto(r0, &(0x7f00000000c0)="e360b641b37f0a00000000000066", 0xe, 0x0, 0x0, 0x0) 16:49:49 executing program 1: socketpair$unix(0x1, 0x8, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x10880, 0x0) ioctl$SIOCAX25OPTRT(r1, 0x89e7, &(0x7f0000000200)={@bcast, @bcast, 0x2, 0x56}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000180)='/dev/capi20\x00', 0x100, 0x0) r3 = syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0x8, 0x181480) ioctl$sock_FIOGETOWN(r3, 0x8903, &(0x7f0000000000)=0x0) ioprio_set$pid(0x2, r4, 0x0) ioctl$SG_SCSI_RESET(r3, 0x2284, 0x0) ioctl$CAPI_REGISTER(r2, 0x80024322, 0x0) r5 = accept$inet(0xffffffffffffff9c, 0x0, &(0x7f0000000040)) bind$inet(r5, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) syz_open_procfs$namespace(r4, &(0x7f0000000140)='ns/uts\x00') 16:49:49 executing program 3: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000b00)) mount(&(0x7f00000004c0)=ANY=[], &(0x7f000000aff8)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000000)) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000000c0)='tls\x00', 0x4) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$void(r1, 0x5450) renameat2(r0, &(0x7f0000000180)='./file0/file0\x00', 0xffffffffffffffff, 0x0, 0x4) shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@dev, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@remote}}, 0x0) ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, 0x0) shmctl$IPC_SET(0x0, 0x1, 0x0) ioctl$PIO_FONT(r0, 0x4b61, &(0x7f0000000740)="9d705183203ecbbfc0d13a4e30241f7ce01b0b4d7682444a507bfc1ac414339f479986467eb40c8065891e1fbbe7263212c5c09bb47896b3d85893f1173f8a139c116f876fdcc1779bffef8c34b5958981616cbcf39f2d8b43491de452d774a74c3ae9555a45180f7d68da36975781ba3a24694ac85eea975ca104181420baf7f3b9614203b0360e7cc29a1c109e") chdir(&(0x7f0000000340)='./file0\x00') symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') umount2(&(0x7f0000000380)='./file0\x00', 0x3) openat$uinput(0xffffffffffffff9c, &(0x7f0000000440)='/dev/uinput\x00', 0x802, 0x0) r3 = syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') sendmsg$FOU_CMD_DEL(r1, &(0x7f00000002c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x28, r3, 0x200, 0x70bd25, 0x25dfdbfe, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e24}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x7f}]}, 0x28}}, 0x24048010) sendmsg$kcm(r0, &(0x7f0000000a40)={&(0x7f0000000580)=@ll={0x11, 0xfd, r2, 0x1, 0x8, 0x6, @dev={[], 0x16}}, 0x80, &(0x7f00000009c0)=[{&(0x7f00000008c0)="367a9f0d4a1564359d1e668c63869bb9bf3b7f5aa4030462889dd6407207295cea1b36e07bc2b38b11c6ca28a73515cf52d89a8199d5c019de826c756a31bac24f707efcfc0a2383216dccc08f804551f0a56d2c9ab95a113fa74dff88ccccc7f278200aa03d2349e688b69191611739bb3e2e5ff110c5858c1a7c5bd5431f9c8e73a99236728f125d5f52a2b0761872fc0fc53cda5458241b2a80fd918b21c8029039d416a6cde6aa786bdfaa21a4e5ffa5f80dec422e0051c7e98a8cff2f4afbe25ca5a154a57c10", 0xc9}], 0x1}, 0x4004000) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000001c0)={0x0, 0x4, 0x2, 0x3, 0x1}, 0x14) ioctl$VIDIOC_SUBDEV_S_SELECTION(r0, 0xc040563e, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x7) msgget(0x1, 0x318) syz_genetlink_get_family_id$team(&(0x7f0000000400)='team\x00') 16:49:49 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0xffffffffffffffff, r0, 0x0, 0x0) tkill(r0, 0x4000000000000036) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={@mcast1, @local, @local, 0x80000000, 0x0, 0x0, 0x200800000000114}) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x21, r0, 0x0, 0x0) 16:49:49 executing program 1: socketpair$unix(0x1, 0x8, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x10880, 0x0) ioctl$SIOCAX25OPTRT(r1, 0x89e7, &(0x7f0000000200)={@bcast, @bcast, 0x2, 0x56}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000180)='/dev/capi20\x00', 0x100, 0x0) r3 = syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0x8, 0x181480) ioctl$sock_FIOGETOWN(r3, 0x8903, &(0x7f0000000000)=0x0) ioprio_set$pid(0x2, r4, 0x0) ioctl$SG_SCSI_RESET(r3, 0x2284, 0x0) ioctl$CAPI_REGISTER(r2, 0x80024322, 0x0) r5 = accept$inet(0xffffffffffffff9c, 0x0, &(0x7f0000000040)) bind$inet(r5, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) syz_open_procfs$namespace(r4, &(0x7f0000000140)='ns/uts\x00') 16:49:49 executing program 2: r0 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'hsr0\x00', 0x0}) bind$packet(r0, &(0x7f0000000340)={0x11, 0x0, r1}, 0x14) sendto(r0, &(0x7f00000000c0)="e360b641b37f0000000800000066", 0xe, 0x0, 0x0, 0x0) 16:49:49 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(r0, 0x4000000000000036) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={@mcast1, @local, @local, 0x80000000, 0x0, 0x0, 0x200800000000114}) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x21, r0, 0x0, 0x0) 16:49:49 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usb(&(0x7f0000000100)='/dev/bus/usb/00#/00#\x00', 0xfffffffffffffffd, 0x8000) ioctl$BLKGETSIZE(r0, 0x1260, &(0x7f0000000140)) r1 = memfd_create(&(0x7f0000000080)='dev ', 0x5) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0xa}) r2 = creat(&(0x7f00000002c0)='./file0\x00', 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$VIDIOC_ENCODER_CMD(r3, 0xc028564d, &(0x7f0000000140)={0x1, 0x1, [0x0, 0x5, 0x0, 0x0, 0xb2]}) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r5 = memfd_create(0x0, 0x0) bind$vsock_stream(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) read$FUSE(0xffffffffffffffff, 0x0, 0x0) close(r4) r6 = add_key(&(0x7f0000000040)='asymmetric\x00', 0x0, &(0x7f00000001c0)="153520ae1e3b8f747ac285572a549ffe3c9f09fc8a2cc8abbab655c8953df46ff4eef00fced831ca9af9c813fd8c5e1674d6dc1d7cbdf94ca72af65e94c804c3109115070b9ca4767aeae60fe2fe3fb715dfdec6fa9afc7e3170876cbdcff42ea24eadcd8ff1e7bc3538a913dff6af14a6c65aa12a1346c9b6b7b129290552ed982d3c83a847a8fcaaf4556c19dd5847ee2f8b58a14dad8a9e50cfd4e5e4e5edb64cfc4915bdaa8bdae6f2f94d9e3a55654fe46e461b766ba0", 0xb9, 0xfffffffffffffffc) keyctl$restrict_keyring(0x1d, r6, &(0x7f0000000500)='encrypted\x00', &(0x7f0000000540)='wlan1em0\\(mime_typewlan0ppp1ppp1proc[)}cpusetvboxnet1securityppp1self\x00') ioctl$sock_bt_hidp_HIDPCONNADD(0xffffffffffffffff, 0x400448c8, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x4, 0x0, 0xf74, 0x100000000003ff, 0x0, 0xff, 0x0, 0x1f, 0x1ff}) getsockopt$inet6_mreq(r0, 0x29, 0x15, &(0x7f0000000280)={@mcast2, 0x0}, &(0x7f00000003c0)=0x14) ioctl$HCIINQUIRY(r2, 0x800448f0, &(0x7f0000000400)={r7, 0x1, 0x8, 0xffffffffffffffbd, 0x7d12, 0x7, 0xfffffffffffffffc}) ioctl$DRM_IOCTL_MARK_BUFS(r5, 0x40206417, 0x0) bind$nfc_llcp(r1, &(0x7f0000000000)={0x27, 0x0, 0x0, 0xae6f374427edb1ff, 0x7f, 0x10001, "d0db1c2aa0ac63218b1d0d06166c5db33ddb70993dcc473190caa95465b9a43e60c9f5204c31332b0c57c137b83b01827f4dd3af6f0d63a5be4638ab432182", 0x8}, 0x60) 16:49:49 executing program 3: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000b00)) mount(&(0x7f00000004c0)=ANY=[], &(0x7f000000aff8)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000000)) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000000c0)='tls\x00', 0x4) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$void(r1, 0x5450) renameat2(r0, &(0x7f0000000180)='./file0/file0\x00', 0xffffffffffffffff, 0x0, 0x4) shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@dev, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@remote}}, 0x0) ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, 0x0) shmctl$IPC_SET(0x0, 0x1, 0x0) ioctl$PIO_FONT(r0, 0x4b61, &(0x7f0000000740)="9d705183203ecbbfc0d13a4e30241f7ce01b0b4d7682444a507bfc1ac414339f479986467eb40c8065891e1fbbe7263212c5c09bb47896b3d85893f1173f8a139c116f876fdcc1779bffef8c34b5958981616cbcf39f2d8b43491de452d774a74c3ae9555a45180f7d68da36975781ba3a24694ac85eea975ca104181420baf7f3b9614203b0360e7cc29a1c109e") chdir(&(0x7f0000000340)='./file0\x00') clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) umount2(&(0x7f0000000380)='./file0\x00', 0x3) openat$uinput(0xffffffffffffff9c, &(0x7f0000000440)='/dev/uinput\x00', 0x802, 0x0) r3 = syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') sendmsg$FOU_CMD_DEL(r1, &(0x7f00000002c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x28, r3, 0x200, 0x70bd25, 0x25dfdbfe, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e24}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x7f}]}, 0x28}}, 0x24048010) sendmsg$kcm(r0, &(0x7f0000000a40)={&(0x7f0000000580)=@ll={0x11, 0xfd, r2, 0x1, 0x8, 0x6, @dev={[], 0x16}}, 0x80, &(0x7f00000009c0)=[{&(0x7f00000008c0)="367a9f0d4a1564359d1e668c63869bb9bf3b7f5aa4030462889dd6407207295cea1b36e07bc2b38b11c6ca28a73515cf52d89a8199d5c019de826c756a31bac24f707efcfc0a2383216dccc08f804551f0a56d2c9ab95a113fa74dff88ccccc7f278200aa03d2349e688b69191611739bb3e2e5ff110c5858c1a7c5bd5431f9c8e73a99236728f125d5f52a2b0761872fc0fc53cda5458241b2a80fd918b21c8029039d416a6cde6aa786bdfaa21a4e5ffa5f80dec422e0051c7e98a8cff2f4afbe25ca5a154a57c10", 0xc9}], 0x1}, 0x4004000) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000001c0)={0x0, 0x4, 0x2, 0x3, 0x1}, 0x14) ioctl$VIDIOC_SUBDEV_S_SELECTION(r0, 0xc040563e, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x7) msgget(0x1, 0x318) syz_genetlink_get_family_id$team(&(0x7f0000000400)='team\x00') 16:49:50 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usb(&(0x7f0000000100)='/dev/bus/usb/00#/00#\x00', 0xfffffffffffffffd, 0x8000) ioctl$BLKGETSIZE(r0, 0x1260, &(0x7f0000000140)) r1 = memfd_create(&(0x7f0000000080)='dev ', 0x5) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0xa}) r2 = creat(&(0x7f00000002c0)='./file0\x00', 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$VIDIOC_ENCODER_CMD(r3, 0xc028564d, &(0x7f0000000140)={0x1, 0x1, [0x0, 0x5, 0x0, 0x0, 0xb2]}) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r5 = memfd_create(0x0, 0x0) bind$vsock_stream(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) read$FUSE(0xffffffffffffffff, 0x0, 0x0) close(r4) r6 = add_key(&(0x7f0000000040)='asymmetric\x00', 0x0, &(0x7f00000001c0)="153520ae1e3b8f747ac285572a549ffe3c9f09fc8a2cc8abbab655c8953df46ff4eef00fced831ca9af9c813fd8c5e1674d6dc1d7cbdf94ca72af65e94c804c3109115070b9ca4767aeae60fe2fe3fb715dfdec6fa9afc7e3170876cbdcff42ea24eadcd8ff1e7bc3538a913dff6af14a6c65aa12a1346c9b6b7b129290552ed982d3c83a847a8fcaaf4556c19dd5847ee2f8b58a14dad8a9e50cfd4e5e4e5edb64cfc4915bdaa8bdae6f2f94d9e3a55654fe46e461b766ba0", 0xb9, 0xfffffffffffffffc) keyctl$restrict_keyring(0x1d, r6, &(0x7f0000000500)='encrypted\x00', &(0x7f0000000540)='wlan1em0\\(mime_typewlan0ppp1ppp1proc[)}cpusetvboxnet1securityppp1self\x00') ioctl$sock_bt_hidp_HIDPCONNADD(0xffffffffffffffff, 0x400448c8, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x4, 0x0, 0xf74, 0x100000000003ff, 0x0, 0xff, 0x0, 0x1f, 0x1ff}) getsockopt$inet6_mreq(r0, 0x29, 0x15, &(0x7f0000000280)={@mcast2, 0x0}, &(0x7f00000003c0)=0x14) ioctl$HCIINQUIRY(r2, 0x800448f0, &(0x7f0000000400)={r7, 0x1, 0x8, 0xffffffffffffffbd, 0x7d12, 0x7, 0xfffffffffffffffc}) ioctl$DRM_IOCTL_MARK_BUFS(r5, 0x40206417, 0x0) bind$nfc_llcp(r1, &(0x7f0000000000)={0x27, 0x0, 0x0, 0xae6f374427edb1ff, 0x7f, 0x10001, "d0db1c2aa0ac63218b1d0d06166c5db33ddb70993dcc473190caa95465b9a43e60c9f5204c31332b0c57c137b83b01827f4dd3af6f0d63a5be4638ab432182", 0x8}, 0x60) 16:49:50 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(r0, 0x4000000000000036) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={@mcast1, @local, @local, 0x80000000, 0x0, 0x0, 0x200800000000114}) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x21, r0, 0x0, 0x0) 16:49:50 executing program 5: r0 = syz_open_dev$sndpcmp(&(0x7f0000001680)='/dev/snd/pcmC#D#p\x00', 0x0, 0xfffffffffffffffe) sendmsg$can_bcm(r0, &(0x7f0000000300)={&(0x7f0000000100), 0x10, &(0x7f0000000180)={&(0x7f0000000200)={0x6, 0x100, 0x9, {0x77359400}, {0x0, 0x2710}, {0x0, 0x8, 0x5e2, 0x9}, 0x1, @can={{0x4, 0x3, 0x0, 0x1}, 0x3, 0x2, 0x0, 0x0, "1e4653ccaf771016"}}, 0x48}, 0x1, 0x0, 0x0, 0x4000000}, 0x10) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000040)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000006240)='/dev/ppp\x00', 0x0, 0x0) accept4$packet(r2, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000002c0)=0x14, 0x800) sendmmsg(0xffffffffffffffff, &(0x7f00000075c0)=[{{&(0x7f0000006280)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}, 0x0, 0x3}}, 0x80, &(0x7f0000006380), 0x0, &(0x7f00000063c0), 0x0, 0x4}}], 0x1, 0x8000) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r2, 0xc0a85352, &(0x7f00000016c0)={{0x9, 0xfffffffffffffff8}, 'port1\x00', 0x4, 0x10000, 0x2, 0x3, 0x5, 0x401, 0x3b, 0x0, 0x1, 0x6}) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x1, 0x0) ioctl$TCSETS(r3, 0x40045431, &(0x7f00003b9fdc)) syz_open_pts(r3, 0x0) setresgid(0x0, 0x0, 0x0) write(r3, &(0x7f0000c34fff), 0xffffff0b) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, &(0x7f0000000340)) shmget$private(0x0, 0x1000, 0x0, &(0x7f000044a000/0x1000)=nil) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000440)={0x5d815e40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0xfffffffffffffffd}) stat(&(0x7f00000001c0)='./file0\x00', &(0x7f00000004c0)) write$UHID_INPUT(r0, &(0x7f0000000640)={0x8, "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", 0x1000}, 0x1006) shmctl$IPC_SET(0x0, 0x1, &(0x7f00000005c0)={{0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x5}) ioctl$TCSETS(r3, 0x5402, &(0x7f0000000140)={0x5, 0x5, 0x0, 0x3, 0x4, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x9}) r4 = syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(r0, &(0x7f0000000580)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x4c534afb695be692}, 0xc, &(0x7f0000000540)={&(0x7f0000000400)={0x24, r4, 0x2, 0x70bd25, 0x25dfdbff, {{}, 0x0, 0x4, 0x0, {0x8, 0x11, 0x4000000000000000}}, ["", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x4}, 0x4080) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x2000005, 0x5c831, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_MP_STATE(r2, 0x4004ae99, &(0x7f0000000080)=0x7) 16:49:50 executing program 2: r0 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'hsr0\x00', 0x0}) bind$packet(r0, &(0x7f0000000340)={0x11, 0x0, r1}, 0x14) sendto(r0, &(0x7f00000000c0)="e360b641b37f0000060800000066", 0xe, 0x0, 0x0, 0x0) 16:49:50 executing program 1: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dsp\x00', 0x103000, 0x0) ioctl$VIDIOC_SUBDEV_S_SELECTION(r0, 0xc040563e, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x7, {0x7, 0xfffffffffffffc00, 0x1000, 0x5}}) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x10000, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/autofs\x00', 0x400000, 0x0) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-monitor\x00', 0x4d0001, 0x0) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r2, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0xa8d, 0x9, 0x0, 0x2, 0x8}, &(0x7f0000000200)=0x14) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000240)={r3, 0x100, 0x9, [0xfffffffffffffffb, 0x81, 0x6, 0x0, 0x7fff, 0x8001, 0x7, 0x7, 0xe805]}, 0x1a) r4 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000100)='/dev/cachefiles\x00', 0x100, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x4) r5 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$KDGKBLED(r5, 0xc0046d00, &(0x7f0000a07fff)) 16:49:50 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(r0, 0x4000000000000036) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={@mcast1, @local, @local, 0x80000000, 0x0, 0x0, 0x200800000000114}) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x21, r0, 0x0, 0x0) 16:49:50 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(0x0, 0x4000000000000036) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={@mcast1, @local, @local, 0x80000000, 0x0, 0x0, 0x200800000000114}) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x21, r0, 0x0, 0x0) 16:49:50 executing program 2: r0 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'hsr0\x00', 0x0}) bind$packet(r0, &(0x7f0000000340)={0x11, 0x0, r1}, 0x14) sendto(r0, &(0x7f00000000c0)="e360b641b37f000e000000000066", 0xe, 0x0, 0x0, 0x0) 16:49:50 executing program 3: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000b00)) mount(&(0x7f00000004c0)=ANY=[], &(0x7f000000aff8)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000000)) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000000c0)='tls\x00', 0x4) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$void(r1, 0x5450) renameat2(r0, &(0x7f0000000180)='./file0/file0\x00', 0xffffffffffffffff, 0x0, 0x4) shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@dev, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@remote}}, 0x0) ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, 0x0) shmctl$IPC_SET(0x0, 0x1, 0x0) ioctl$PIO_FONT(r0, 0x4b61, &(0x7f0000000740)="9d705183203ecbbfc0d13a4e30241f7ce01b0b4d7682444a507bfc1ac414339f479986467eb40c8065891e1fbbe7263212c5c09bb47896b3d85893f1173f8a139c116f876fdcc1779bffef8c34b5958981616cbcf39f2d8b43491de452d774a74c3ae9555a45180f7d68da36975781ba3a24694ac85eea975ca104181420baf7f3b9614203b0360e7cc29a1c109e") chdir(&(0x7f0000000340)='./file0\x00') clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) umount2(&(0x7f0000000380)='./file0\x00', 0x3) openat$uinput(0xffffffffffffff9c, &(0x7f0000000440)='/dev/uinput\x00', 0x802, 0x0) r3 = syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') sendmsg$FOU_CMD_DEL(r1, &(0x7f00000002c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x28, r3, 0x200, 0x70bd25, 0x25dfdbfe, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e24}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x7f}]}, 0x28}}, 0x24048010) sendmsg$kcm(r0, &(0x7f0000000a40)={&(0x7f0000000580)=@ll={0x11, 0xfd, r2, 0x1, 0x8, 0x6, @dev={[], 0x16}}, 0x80, &(0x7f00000009c0)=[{&(0x7f00000008c0)="367a9f0d4a1564359d1e668c63869bb9bf3b7f5aa4030462889dd6407207295cea1b36e07bc2b38b11c6ca28a73515cf52d89a8199d5c019de826c756a31bac24f707efcfc0a2383216dccc08f804551f0a56d2c9ab95a113fa74dff88ccccc7f278200aa03d2349e688b69191611739bb3e2e5ff110c5858c1a7c5bd5431f9c8e73a99236728f125d5f52a2b0761872fc0fc53cda5458241b2a80fd918b21c8029039d416a6cde6aa786bdfaa21a4e5ffa5f80dec422e0051c7e98a8cff2f4afbe25ca5a154a57c10", 0xc9}], 0x1}, 0x4004000) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000001c0)={0x0, 0x4, 0x2, 0x3, 0x1}, 0x14) ioctl$VIDIOC_SUBDEV_S_SELECTION(r0, 0xc040563e, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x7) msgget(0x1, 0x318) syz_genetlink_get_family_id$team(&(0x7f0000000400)='team\x00') 16:49:50 executing program 0: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000b00)) mount(&(0x7f00000004c0)=ANY=[], &(0x7f000000aff8)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000000)) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000000c0)='tls\x00', 0x4) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$void(r1, 0x5450) renameat2(r0, &(0x7f0000000180)='./file0/file0\x00', 0xffffffffffffffff, 0x0, 0x4) shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@dev, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@remote}}, 0x0) ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, 0x0) shmctl$IPC_SET(0x0, 0x1, 0x0) ioctl$PIO_FONT(r0, 0x4b61, &(0x7f0000000740)="9d705183203ecbbfc0d13a4e30241f7ce01b0b4d7682444a507bfc1ac414339f479986467eb40c8065891e1fbbe7263212c5c09bb47896b3d85893f1173f8a139c116f876fdcc1779bffef8c34b5958981616cbcf39f2d8b43491de452d774a74c3ae9555a45180f7d68da36975781ba3a24694ac85eea975ca104181420baf7f3b9614203b0360e7cc29a1c109e") chdir(&(0x7f0000000340)='./file0\x00') clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) umount2(&(0x7f0000000380)='./file0\x00', 0x3) openat$uinput(0xffffffffffffff9c, &(0x7f0000000440)='/dev/uinput\x00', 0x802, 0x0) r3 = syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') sendmsg$FOU_CMD_DEL(r1, &(0x7f00000002c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x28, r3, 0x200, 0x70bd25, 0x25dfdbfe, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e24}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x7f}]}, 0x28}}, 0x24048010) sendmsg$kcm(r0, &(0x7f0000000a40)={&(0x7f0000000580)=@ll={0x11, 0xfd, r2, 0x1, 0x8, 0x6, @dev={[], 0x16}}, 0x80, &(0x7f00000009c0)=[{&(0x7f00000008c0)="367a9f0d4a1564359d1e668c63869bb9bf3b7f5aa4030462889dd6407207295cea1b36e07bc2b38b11c6ca28a73515cf52d89a8199d5c019de826c756a31bac24f707efcfc0a2383216dccc08f804551f0a56d2c9ab95a113fa74dff88ccccc7f278200aa03d2349e688b69191611739bb3e2e5ff110c5858c1a7c5bd5431f9c8e73a99236728f125d5f52a2b0761872fc0fc53cda5458241b2a80fd918b21c8029039d416a6cde6aa786bdfaa21a4e5ffa5f80dec422e0051c7e98a8cff2f4afbe25ca5a154a57c10", 0xc9}], 0x1}, 0x4004000) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000001c0)={0x0, 0x4, 0x2, 0x3, 0x1}, 0x14) ioctl$VIDIOC_SUBDEV_S_SELECTION(r0, 0xc040563e, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x7) msgget(0x1, 0x318) syz_genetlink_get_family_id$team(&(0x7f0000000400)='team\x00') 16:49:50 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000200)=ANY=[@ANYBLOB="02040609100000000000003f9e0000000200130002000000000000040000000105000600200000000a00000000000000000500e50000070000001f040000deffff020000000000000200010000000000000000020000000005000500000000000a00000000000000ff1702810000000000000000000000170000000000000000"], 0x80}}, 0x0) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x40040, 0x0) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r2, 0x84, 0x7, &(0x7f00000000c0), &(0x7f0000000100)=0x4) socket$unix(0x1, 0x5, 0x0) sendmmsg(r1, &(0x7f0000000180), 0x400000000000117, 0x0) 16:49:50 executing program 2: r0 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'hsr0\x00', 0x0}) bind$packet(r0, &(0x7f0000000340)={0x11, 0x0, r1}, 0x14) sendto(r0, &(0x7f00000000c0)="e360b641b37f0600000000000066", 0xe, 0x0, 0x0, 0x0) 16:49:50 executing program 2: r0 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'hsr0\x00', 0x0}) bind$packet(r0, &(0x7f0000000340)={0x11, 0x0, r1}, 0x14) sendto(r0, &(0x7f00000000c0)="e360b641b37f000001f400000066", 0xe, 0x0, 0x0, 0x0) 16:49:50 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000000)=0xffffffff, 0x4) r1 = socket$netlink(0x10, 0x3, 0x20008000000004) writev(r1, &(0x7f0000e11ff0)=[{&(0x7f0000000140)="580000001400add427323b470c458c5602067fffffff81004e220000000058000b4824ca945f64009400050028925aa80000000000000080000efffeffe809000000fff5dd00000010000100090a1000410400000000fcff", 0x58}], 0x1) 16:49:51 executing program 5: r0 = syz_open_dev$dmmidi(&(0x7f0000000100)='/dev/dmmidi#\x00', 0x2, 0x2002) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) r1 = socket(0x10, 0x2, 0x0) mount(&(0x7f0000000700)=ANY=[@ANYBLOB="5977d8444153c5b50d505b91d834d0a032b2a912dc113df499fb1cb94ede0d683c06e7a0b82af5a571d0e941ddbfe09e1653855eb9f83f846cfe1d545989ac55b90f5d123139d2754ebcab"], &(0x7f0000001840)='./file0\x00', &(0x7f0000000580)='ubifs\x00', 0x1003, 0x0) mount(&(0x7f0000000400)=ANY=[@ANYBLOB="c0f6e17f212924331dea70dda8c47fba237c83a36bd9248cf92babdbda0c9d8664"], &(0x7f00000016c0)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000001740)) r2 = fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_sctp6_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000440)={0x0, 0x8f, 0x15680000000, 0x9}, &(0x7f0000000500)=0x10) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f0000000540)={r3, 0x7d9e}, 0x8) perf_event_open(&(0x7f0000000380)={0x0, 0x390, 0xffffffff, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20, 0x1, 0x100000000, 0x80000100000000, 0xfffffffffffff5ad, 0x0, 0x8, 0x0, 0x0, 0x0, 0x13d, 0x7fff, 0x0, 0x7f, 0x3, 0x0, 0x6, 0x0, 0x4, 0x74, 0x0, 0x0, 0x9, 0x7fff, 0x3c, 0x0, 0x0, 0x2, 0x3, 0x0, 0x0, 0x3, 0x4, @perf_bp={&(0x7f0000000340), 0x2}, 0x0, 0x4, 0x0, 0x8, 0x0, 0x100}, r2, 0x0, 0xffffffffffffffff, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000040)='mountinfo\x00') sendfile(r1, r4, &(0x7f0000000000), 0x80000002) perf_event_open(&(0x7f0000000040)={0x1, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = getegid() r6 = getuid() fchown(r1, r6, r5) mkdir(&(0x7f0000000480)='./file0\x00', 0x0) pivot_root(&(0x7f0000000640)='./file0\x00', &(0x7f00000006c0)='./file0\x00') bind$can_raw(r1, &(0x7f0000000780), 0x10) syz_open_procfs(0x0, &(0x7f00000004c0)='net/netstat\x00') fstatfs(0xffffffffffffffff, &(0x7f00000001c0)=""/216) shmget$private(0x0, 0x3000, 0x1800, &(0x7f0000ffa000/0x3000)=nil) shmctl$IPC_RMID(0x0, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000140)={0x0, 0x100}, &(0x7f0000000180)=0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f00000002c0)={r7, 0xecdb, 0x20}, 0xc) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4$inet6(r1, &(0x7f0000000300)={0xa, 0x0, 0x0, @mcast2}, &(0x7f0000000600)=0x3ec, 0x0) madvise(&(0x7f000079c000/0x800000)=nil, 0x800000, 0xc) mlock(&(0x7f00009c0000/0xf000)=nil, 0xf000) r8 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r8, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") madvise(&(0x7f00002f8000/0xc00000)=nil, 0xc00000, 0xd) 16:49:51 executing program 1: r0 = syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x1, 0x2) getsockname$ax25(r0, &(0x7f0000000040)={{0x3, @rose}, [@bcast, @bcast, @rose, @default, @default, @remote, @remote, @netrom]}, &(0x7f00000000c0)=0x48) accept4$ax25(r0, &(0x7f0000000180)={{0x3, @default}, [@rose, @rose, @null, @rose, @netrom, @remote, @bcast, @rose]}, &(0x7f0000000100)=0x48, 0x80000) userfaultfd(0x800) r1 = syz_open_dev$cec(&(0x7f0000000240)='/dev/cec#\x00', 0x3, 0x2) ioctl$BLKZEROOUT(r1, 0x127f, &(0x7f0000000140)={0x8, 0x7fff}) epoll_pwait(r1, 0xfffffffffffffffe, 0x0, 0x9, 0x0, 0xffffffffffffffed) 16:49:51 executing program 2: r0 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'hsr0\x00', 0x0}) bind$packet(r0, &(0x7f0000000340)={0x11, 0x0, r1}, 0x14) sendto(r0, &(0x7f00000000c0)="e360b641b37f0000000a00000066", 0xe, 0x0, 0x0, 0x0) 16:49:51 executing program 3: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000b00)) mount(&(0x7f00000004c0)=ANY=[], &(0x7f000000aff8)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000000)) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000000c0)='tls\x00', 0x4) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$void(r1, 0x5450) renameat2(r0, &(0x7f0000000180)='./file0/file0\x00', 0xffffffffffffffff, 0x0, 0x4) shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@dev, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@remote}}, 0x0) ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, 0x0) shmctl$IPC_SET(0x0, 0x1, 0x0) ioctl$PIO_FONT(r0, 0x4b61, &(0x7f0000000740)="9d705183203ecbbfc0d13a4e30241f7ce01b0b4d7682444a507bfc1ac414339f479986467eb40c8065891e1fbbe7263212c5c09bb47896b3d85893f1173f8a139c116f876fdcc1779bffef8c34b5958981616cbcf39f2d8b43491de452d774a74c3ae9555a45180f7d68da36975781ba3a24694ac85eea975ca104181420baf7f3b9614203b0360e7cc29a1c109e") symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) umount2(&(0x7f0000000380)='./file0\x00', 0x3) openat$uinput(0xffffffffffffff9c, &(0x7f0000000440)='/dev/uinput\x00', 0x802, 0x0) r3 = syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') sendmsg$FOU_CMD_DEL(r1, &(0x7f00000002c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x28, r3, 0x200, 0x70bd25, 0x25dfdbfe, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e24}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x7f}]}, 0x28}}, 0x24048010) sendmsg$kcm(r0, &(0x7f0000000a40)={&(0x7f0000000580)=@ll={0x11, 0xfd, r2, 0x1, 0x8, 0x6, @dev={[], 0x16}}, 0x80, &(0x7f00000009c0)=[{&(0x7f00000008c0)="367a9f0d4a1564359d1e668c63869bb9bf3b7f5aa4030462889dd6407207295cea1b36e07bc2b38b11c6ca28a73515cf52d89a8199d5c019de826c756a31bac24f707efcfc0a2383216dccc08f804551f0a56d2c9ab95a113fa74dff88ccccc7f278200aa03d2349e688b69191611739bb3e2e5ff110c5858c1a7c5bd5431f9c8e73a99236728f125d5f52a2b0761872fc0fc53cda5458241b2a80fd918b21c8029039d416a6cde6aa786bdfaa21a4e5ffa5f80dec422e0051c7e98a8cff2f4afbe25ca5a154a57c10", 0xc9}], 0x1}, 0x4004000) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000001c0)={0x0, 0x4, 0x2, 0x3, 0x1}, 0x14) ioctl$VIDIOC_SUBDEV_S_SELECTION(r0, 0xc040563e, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x7) msgget(0x1, 0x318) syz_genetlink_get_family_id$team(&(0x7f0000000400)='team\x00') [ 296.270287] net_ratelimit: 22 callbacks suppressed [ 296.270293] protocol 88fb is buggy, dev hsr_slave_0 [ 296.280455] protocol 88fb is buggy, dev hsr_slave_1 [ 296.350267] protocol 88fb is buggy, dev hsr_slave_0 [ 296.355459] protocol 88fb is buggy, dev hsr_slave_1 [ 297.150313] protocol 88fb is buggy, dev hsr_slave_0 [ 297.155482] protocol 88fb is buggy, dev hsr_slave_1 [ 297.470354] protocol 88fb is buggy, dev hsr_slave_0 [ 297.475628] protocol 88fb is buggy, dev hsr_slave_1 16:49:53 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(0x0, 0x4000000000000036) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={@mcast1, @local, @local, 0x80000000, 0x0, 0x0, 0x200800000000114}) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x21, r0, 0x0, 0x0) 16:49:53 executing program 0: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000b00)) mount(&(0x7f00000004c0)=ANY=[], &(0x7f000000aff8)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000000)) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000000c0)='tls\x00', 0x4) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$void(r1, 0x5450) renameat2(r0, &(0x7f0000000180)='./file0/file0\x00', 0xffffffffffffffff, 0x0, 0x4) shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@dev, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@remote}}, 0x0) ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, 0x0) shmctl$IPC_SET(0x0, 0x1, 0x0) ioctl$PIO_FONT(r0, 0x4b61, &(0x7f0000000740)="9d705183203ecbbfc0d13a4e30241f7ce01b0b4d7682444a507bfc1ac414339f479986467eb40c8065891e1fbbe7263212c5c09bb47896b3d85893f1173f8a139c116f876fdcc1779bffef8c34b5958981616cbcf39f2d8b43491de452d774a74c3ae9555a45180f7d68da36975781ba3a24694ac85eea975ca104181420baf7f3b9614203b0360e7cc29a1c109e") chdir(&(0x7f0000000340)='./file0\x00') clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) umount2(&(0x7f0000000380)='./file0\x00', 0x3) openat$uinput(0xffffffffffffff9c, &(0x7f0000000440)='/dev/uinput\x00', 0x802, 0x0) r3 = syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') sendmsg$FOU_CMD_DEL(r1, &(0x7f00000002c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x28, r3, 0x200, 0x70bd25, 0x25dfdbfe, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e24}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x7f}]}, 0x28}}, 0x24048010) sendmsg$kcm(r0, &(0x7f0000000a40)={&(0x7f0000000580)=@ll={0x11, 0xfd, r2, 0x1, 0x8, 0x6, @dev={[], 0x16}}, 0x80, &(0x7f00000009c0)=[{&(0x7f00000008c0)="367a9f0d4a1564359d1e668c63869bb9bf3b7f5aa4030462889dd6407207295cea1b36e07bc2b38b11c6ca28a73515cf52d89a8199d5c019de826c756a31bac24f707efcfc0a2383216dccc08f804551f0a56d2c9ab95a113fa74dff88ccccc7f278200aa03d2349e688b69191611739bb3e2e5ff110c5858c1a7c5bd5431f9c8e73a99236728f125d5f52a2b0761872fc0fc53cda5458241b2a80fd918b21c8029039d416a6cde6aa786bdfaa21a4e5ffa5f80dec422e0051c7e98a8cff2f4afbe25ca5a154a57c10", 0xc9}], 0x1}, 0x4004000) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000001c0)={0x0, 0x4, 0x2, 0x3, 0x1}, 0x14) ioctl$VIDIOC_SUBDEV_S_SELECTION(r0, 0xc040563e, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x7) msgget(0x1, 0x318) syz_genetlink_get_family_id$team(&(0x7f0000000400)='team\x00') 16:49:53 executing program 1: syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb64c86d6b66732e66617400020441000500077008f8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0/file0\x00', 0x3fffa, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000680)='/dev/rfkill\x00', 0x4490800, 0x0) setsockopt$packet_buf(r2, 0x107, 0x7, &(0x7f0000000400)="db1050c922", 0x5) prctl$PR_GET_THP_DISABLE(0x2a) r3 = socket(0x10, 0x2, 0x0) mount(&(0x7f0000000300), &(0x7f0000001840)='./file0\x00', &(0x7f0000000580)='ubifs\x00', 0x1003, 0x0) socket$nl_route(0x10, 0x3, 0x0) mount(&(0x7f0000000780)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x59a8a8c793e70182, 0x0) r4 = fcntl$getown(r1, 0x9) mount(&(0x7f0000000480)=ANY=[@ANYBLOB="8fbe8c79ff7fff7f0095e9f8018000f0ac86675ec6ba33c279782d0000000000000000c9904f7c60de6e2a5b0c028a666b53cdf4608d31b82df2fefd44209e43a6fbdaf348e33b23f456870f2563c3de626fbbf26e96bc1c7674a1cbd4ac3e5e84020e04393ae1671c4832a3a59df1eb7f71bd2fa551f16ebd0d0cec"], 0x0, 0x0, 0x5010, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000040)='mountinfo\x00') sendfile(r3, r5, &(0x7f0000000000), 0x80000002) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) r6 = getegid() r7 = geteuid() fchown(r0, r7, r6) mkdir(&(0x7f0000000440)='./file0\x00', 0xa4) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000640)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000140)={&(0x7f0000000c40)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x800}, 0x40004) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000015c0)={@in6={{0xa, 0x4e22, 0x2, @remote, 0x4}}, 0x6, 0x9, 0xfd, "96c1ba742ddc1c664a1929edecdd05b31b3d084e1b7074d8f7d08a56656d21866825899e97d0ce22528bc8df547ebfe78b59265ce2a784bc0be6bd632bed5d075297feee3f57ddea54db110dff56c08a"}, 0xd8) pivot_root(&(0x7f0000000280)='./file0\x00', &(0x7f0000000300)='./file0\x00') pivot_root(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000600)='./file0/file0\x00') r8 = syz_open_procfs(r4, &(0x7f0000000740)='n\t\x00\x00\x00\x00\x00\x00\x00a\x8e\x00') ioctl$BLKZEROOUT(r8, 0x127f, &(0x7f00000018c0)={0x80000000, 0xc0000}) ioctl$UI_SET_FFBIT(r0, 0x4004556b, 0x5a) sendfile(r1, r8, &(0x7f0000000100)=0xffffffd, 0x4007ffffffb) fstatfs(r0, &(0x7f00000001c0)=""/216) 16:49:53 executing program 3: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000b00)) mount(&(0x7f00000004c0)=ANY=[], &(0x7f000000aff8)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000000)) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000000c0)='tls\x00', 0x4) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$void(r1, 0x5450) renameat2(r0, &(0x7f0000000180)='./file0/file0\x00', 0xffffffffffffffff, 0x0, 0x4) shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@dev, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@remote}}, 0x0) ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, 0x0) shmctl$IPC_SET(0x0, 0x1, 0x0) ioctl$PIO_FONT(r0, 0x4b61, &(0x7f0000000740)="9d705183203ecbbfc0d13a4e30241f7ce01b0b4d7682444a507bfc1ac414339f479986467eb40c8065891e1fbbe7263212c5c09bb47896b3d85893f1173f8a139c116f876fdcc1779bffef8c34b5958981616cbcf39f2d8b43491de452d774a74c3ae9555a45180f7d68da36975781ba3a24694ac85eea975ca104181420baf7f3b9614203b0360e7cc29a1c109e") symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) umount2(&(0x7f0000000380)='./file0\x00', 0x3) openat$uinput(0xffffffffffffff9c, &(0x7f0000000440)='/dev/uinput\x00', 0x802, 0x0) r3 = syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') sendmsg$FOU_CMD_DEL(r1, &(0x7f00000002c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x28, r3, 0x200, 0x70bd25, 0x25dfdbfe, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e24}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x7f}]}, 0x28}}, 0x24048010) sendmsg$kcm(r0, &(0x7f0000000a40)={&(0x7f0000000580)=@ll={0x11, 0xfd, r2, 0x1, 0x8, 0x6, @dev={[], 0x16}}, 0x80, &(0x7f00000009c0)=[{&(0x7f00000008c0)="367a9f0d4a1564359d1e668c63869bb9bf3b7f5aa4030462889dd6407207295cea1b36e07bc2b38b11c6ca28a73515cf52d89a8199d5c019de826c756a31bac24f707efcfc0a2383216dccc08f804551f0a56d2c9ab95a113fa74dff88ccccc7f278200aa03d2349e688b69191611739bb3e2e5ff110c5858c1a7c5bd5431f9c8e73a99236728f125d5f52a2b0761872fc0fc53cda5458241b2a80fd918b21c8029039d416a6cde6aa786bdfaa21a4e5ffa5f80dec422e0051c7e98a8cff2f4afbe25ca5a154a57c10", 0xc9}], 0x1}, 0x4004000) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000001c0)={0x0, 0x4, 0x2, 0x3, 0x1}, 0x14) ioctl$VIDIOC_SUBDEV_S_SELECTION(r0, 0xc040563e, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x7) msgget(0x1, 0x318) syz_genetlink_get_family_id$team(&(0x7f0000000400)='team\x00') 16:49:53 executing program 2: r0 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'hsr0\x00', 0x0}) bind$packet(r0, &(0x7f0000000340)={0x11, 0x0, r1}, 0x14) sendto(r0, &(0x7f00000000c0)="e360b641b37f8035000000000066", 0xe, 0x0, 0x0, 0x0) 16:49:53 executing program 5: r0 = syz_open_dev$dmmidi(&(0x7f0000000100)='/dev/dmmidi#\x00', 0x2, 0x2002) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) r1 = socket(0x10, 0x2, 0x0) mount(&(0x7f0000000700)=ANY=[@ANYBLOB="5977d8444153c5b50d505b91d834d0a032b2a912dc113df499fb1cb94ede0d683c06e7a0b82af5a571d0e941ddbfe09e1653855eb9f83f846cfe1d545989ac55b90f5d123139d2754ebcab"], &(0x7f0000001840)='./file0\x00', &(0x7f0000000580)='ubifs\x00', 0x1003, 0x0) mount(&(0x7f0000000400)=ANY=[@ANYBLOB="c0f6e17f212924331dea70dda8c47fba237c83a36bd9248cf92babdbda0c9d8664"], &(0x7f00000016c0)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000001740)) r2 = fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_sctp6_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000440)={0x0, 0x8f, 0x15680000000, 0x9}, &(0x7f0000000500)=0x10) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f0000000540)={r3, 0x7d9e}, 0x8) perf_event_open(&(0x7f0000000380)={0x0, 0x390, 0xffffffff, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20, 0x1, 0x100000000, 0x80000100000000, 0xfffffffffffff5ad, 0x0, 0x8, 0x0, 0x0, 0x0, 0x13d, 0x7fff, 0x0, 0x7f, 0x3, 0x0, 0x6, 0x0, 0x4, 0x74, 0x0, 0x0, 0x9, 0x7fff, 0x3c, 0x0, 0x0, 0x2, 0x3, 0x0, 0x0, 0x3, 0x4, @perf_bp={&(0x7f0000000340), 0x2}, 0x0, 0x4, 0x0, 0x8, 0x0, 0x100}, r2, 0x0, 0xffffffffffffffff, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000040)='mountinfo\x00') sendfile(r1, r4, &(0x7f0000000000), 0x80000002) perf_event_open(&(0x7f0000000040)={0x1, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = getegid() r6 = getuid() fchown(r1, r6, r5) mkdir(&(0x7f0000000480)='./file0\x00', 0x0) pivot_root(&(0x7f0000000640)='./file0\x00', &(0x7f00000006c0)='./file0\x00') bind$can_raw(r1, &(0x7f0000000780), 0x10) syz_open_procfs(0x0, &(0x7f00000004c0)='net/netstat\x00') fstatfs(0xffffffffffffffff, &(0x7f00000001c0)=""/216) shmget$private(0x0, 0x3000, 0x1800, &(0x7f0000ffa000/0x3000)=nil) shmctl$IPC_RMID(0x0, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000140)={0x0, 0x100}, &(0x7f0000000180)=0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f00000002c0)={r7, 0xecdb, 0x20}, 0xc) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4$inet6(r1, &(0x7f0000000300)={0xa, 0x0, 0x0, @mcast2}, &(0x7f0000000600)=0x3ec, 0x0) madvise(&(0x7f000079c000/0x800000)=nil, 0x800000, 0xc) mlock(&(0x7f00009c0000/0xf000)=nil, 0xf000) r8 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r8, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") madvise(&(0x7f00002f8000/0xc00000)=nil, 0xc00000, 0xd) [ 297.550333] protocol 88fb is buggy, dev hsr_slave_0 [ 297.555486] protocol 88fb is buggy, dev hsr_slave_1 [ 297.683658] audit: type=1800 audit(1546188593.496:35): pid=9900 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor1" name="file0" dev="sda1" ino=16939 res=0 16:49:53 executing program 0: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000b00)) mount(&(0x7f00000004c0)=ANY=[], &(0x7f000000aff8)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000000)) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000000c0)='tls\x00', 0x4) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$void(r1, 0x5450) renameat2(r0, &(0x7f0000000180)='./file0/file0\x00', 0xffffffffffffffff, 0x0, 0x4) shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@dev, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@remote}}, 0x0) ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, 0x0) shmctl$IPC_SET(0x0, 0x1, 0x0) ioctl$PIO_FONT(r0, 0x4b61, &(0x7f0000000740)="9d705183203ecbbfc0d13a4e30241f7ce01b0b4d7682444a507bfc1ac414339f479986467eb40c8065891e1fbbe7263212c5c09bb47896b3d85893f1173f8a139c116f876fdcc1779bffef8c34b5958981616cbcf39f2d8b43491de452d774a74c3ae9555a45180f7d68da36975781ba3a24694ac85eea975ca104181420baf7f3b9614203b0360e7cc29a1c109e") chdir(&(0x7f0000000340)='./file0\x00') clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) umount2(&(0x7f0000000380)='./file0\x00', 0x3) openat$uinput(0xffffffffffffff9c, &(0x7f0000000440)='/dev/uinput\x00', 0x802, 0x0) r3 = syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') sendmsg$FOU_CMD_DEL(r1, &(0x7f00000002c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x28, r3, 0x200, 0x70bd25, 0x25dfdbfe, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e24}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x7f}]}, 0x28}}, 0x24048010) sendmsg$kcm(r0, &(0x7f0000000a40)={&(0x7f0000000580)=@ll={0x11, 0xfd, r2, 0x1, 0x8, 0x6, @dev={[], 0x16}}, 0x80, &(0x7f00000009c0)=[{&(0x7f00000008c0)="367a9f0d4a1564359d1e668c63869bb9bf3b7f5aa4030462889dd6407207295cea1b36e07bc2b38b11c6ca28a73515cf52d89a8199d5c019de826c756a31bac24f707efcfc0a2383216dccc08f804551f0a56d2c9ab95a113fa74dff88ccccc7f278200aa03d2349e688b69191611739bb3e2e5ff110c5858c1a7c5bd5431f9c8e73a99236728f125d5f52a2b0761872fc0fc53cda5458241b2a80fd918b21c8029039d416a6cde6aa786bdfaa21a4e5ffa5f80dec422e0051c7e98a8cff2f4afbe25ca5a154a57c10", 0xc9}], 0x1}, 0x4004000) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000001c0)={0x0, 0x4, 0x2, 0x3, 0x1}, 0x14) ioctl$VIDIOC_SUBDEV_S_SELECTION(r0, 0xc040563e, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x7) msgget(0x1, 0x318) syz_genetlink_get_family_id$team(&(0x7f0000000400)='team\x00') 16:49:53 executing program 2: r0 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'hsr0\x00', 0x0}) bind$packet(r0, &(0x7f0000000340)={0x11, 0x0, r1}, 0x14) sendto(r0, &(0x7f00000000c0)="e360b641b37f0200000000000066", 0xe, 0x0, 0x0, 0x0) 16:49:53 executing program 3: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000b00)) mount(&(0x7f00000004c0)=ANY=[], &(0x7f000000aff8)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000000)) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000000c0)='tls\x00', 0x4) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$void(r1, 0x5450) renameat2(r0, &(0x7f0000000180)='./file0/file0\x00', 0xffffffffffffffff, 0x0, 0x4) shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@dev, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@remote}}, 0x0) ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, 0x0) shmctl$IPC_SET(0x0, 0x1, 0x0) ioctl$PIO_FONT(r0, 0x4b61, &(0x7f0000000740)="9d705183203ecbbfc0d13a4e30241f7ce01b0b4d7682444a507bfc1ac414339f479986467eb40c8065891e1fbbe7263212c5c09bb47896b3d85893f1173f8a139c116f876fdcc1779bffef8c34b5958981616cbcf39f2d8b43491de452d774a74c3ae9555a45180f7d68da36975781ba3a24694ac85eea975ca104181420baf7f3b9614203b0360e7cc29a1c109e") symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) umount2(&(0x7f0000000380)='./file0\x00', 0x3) openat$uinput(0xffffffffffffff9c, &(0x7f0000000440)='/dev/uinput\x00', 0x802, 0x0) r3 = syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') sendmsg$FOU_CMD_DEL(r1, &(0x7f00000002c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x28, r3, 0x200, 0x70bd25, 0x25dfdbfe, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e24}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x7f}]}, 0x28}}, 0x24048010) sendmsg$kcm(r0, &(0x7f0000000a40)={&(0x7f0000000580)=@ll={0x11, 0xfd, r2, 0x1, 0x8, 0x6, @dev={[], 0x16}}, 0x80, &(0x7f00000009c0)=[{&(0x7f00000008c0)="367a9f0d4a1564359d1e668c63869bb9bf3b7f5aa4030462889dd6407207295cea1b36e07bc2b38b11c6ca28a73515cf52d89a8199d5c019de826c756a31bac24f707efcfc0a2383216dccc08f804551f0a56d2c9ab95a113fa74dff88ccccc7f278200aa03d2349e688b69191611739bb3e2e5ff110c5858c1a7c5bd5431f9c8e73a99236728f125d5f52a2b0761872fc0fc53cda5458241b2a80fd918b21c8029039d416a6cde6aa786bdfaa21a4e5ffa5f80dec422e0051c7e98a8cff2f4afbe25ca5a154a57c10", 0xc9}], 0x1}, 0x4004000) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000001c0)={0x0, 0x4, 0x2, 0x3, 0x1}, 0x14) ioctl$VIDIOC_SUBDEV_S_SELECTION(r0, 0xc040563e, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x7) msgget(0x1, 0x318) syz_genetlink_get_family_id$team(&(0x7f0000000400)='team\x00') 16:49:53 executing program 1: r0 = socket$inet(0x2, 0x3, 0x800000000000a) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040), 0x4) sendmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0x0) socketpair(0x8, 0x8000a, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$bt_hci_HCI_FILTER(0xffffffffffffffff, 0x0, 0x2, 0x0, 0x0) msgget$private(0x0, 0x10) shmat(0x0, &(0x7f0000ffa000/0x4000)=nil, 0x0) syz_open_dev$video4linux(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msgget$private(0x0, 0x800000000252) r3 = syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x0, 0x182) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, 0x0, &(0x7f00000003c0)) getsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000480), 0x0) io_setup(0xd75, &(0x7f0000000180)) ioctl$sock_inet6_tcp_SIOCOUTQNSD(r2, 0x894b, &(0x7f0000000140)) r4 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x2) pwritev(r4, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) r5 = request_key(&(0x7f0000000740)='syzkaller\x00', &(0x7f0000000780)={'syz', 0x3}, &(0x7f0000000940)='\x00', 0x0) add_key$user(&(0x7f0000000c80)='user\x00', &(0x7f0000000cc0), &(0x7f0000000c00)="a1d0eac2f4da2c50811754f5142bc3553bf33194b1f04184bcc9bd51c43b38c917b6af51bdff27221de1ed528d9587cb6a87c4e9cea2b2e8ab19f9f03433039e59f23f1d1966930d7a5cc885f3547f9c30ab40b2ff572aa0316847ca33d076", 0x5f, r5) sendfile(r3, r4, &(0x7f0000000380)=0x4, 0x2000005) syz_genetlink_get_family_id$ipvs(0x0) r6 = openat$dsp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dsp\x00', 0x40101, 0x0) fanotify_mark(r0, 0xc0, 0x2, r6, &(0x7f00000001c0)='./file0\x00') sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, 0x0, 0x4000) ioctl$LOOP_CLR_FD(r3, 0x4c01) ioctl$LOOP_SET_FD(r3, 0x4c00, r4) write$apparmor_current(r4, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x1) 16:49:53 executing program 3: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000b00)) mount(&(0x7f00000004c0)=ANY=[], &(0x7f000000aff8)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000000)) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000000c0)='tls\x00', 0x4) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$void(r1, 0x5450) renameat2(r0, &(0x7f0000000180)='./file0/file0\x00', 0xffffffffffffffff, 0x0, 0x4) shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@dev, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@remote}}, 0x0) ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, 0x0) shmctl$IPC_SET(0x0, 0x1, 0x0) chdir(&(0x7f0000000340)='./file0\x00') symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) umount2(&(0x7f0000000380)='./file0\x00', 0x3) openat$uinput(0xffffffffffffff9c, &(0x7f0000000440)='/dev/uinput\x00', 0x802, 0x0) r3 = syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') sendmsg$FOU_CMD_DEL(r1, &(0x7f00000002c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x28, r3, 0x200, 0x70bd25, 0x25dfdbfe, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e24}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x7f}]}, 0x28}}, 0x24048010) sendmsg$kcm(r0, &(0x7f0000000a40)={&(0x7f0000000580)=@ll={0x11, 0xfd, r2, 0x1, 0x8, 0x6, @dev={[], 0x16}}, 0x80, &(0x7f00000009c0)=[{&(0x7f00000008c0)="367a9f0d4a1564359d1e668c63869bb9bf3b7f5aa4030462889dd6407207295cea1b36e07bc2b38b11c6ca28a73515cf52d89a8199d5c019de826c756a31bac24f707efcfc0a2383216dccc08f804551f0a56d2c9ab95a113fa74dff88ccccc7f278200aa03d2349e688b69191611739bb3e2e5ff110c5858c1a7c5bd5431f9c8e73a99236728f125d5f52a2b0761872fc0fc53cda5458241b2a80fd918b21c8029039d416a6cde6aa786bdfaa21a4e5ffa5f80dec422e0051c7e98a8cff2f4afbe25ca5a154a57c10", 0xc9}], 0x1}, 0x4004000) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000001c0)={0x0, 0x4, 0x2, 0x3, 0x1}, 0x14) ioctl$VIDIOC_SUBDEV_S_SELECTION(r0, 0xc040563e, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x7) msgget(0x1, 0x318) syz_genetlink_get_family_id$team(&(0x7f0000000400)='team\x00') 16:49:53 executing program 2: r0 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'hsr0\x00', 0x0}) bind$packet(r0, &(0x7f0000000340)={0x11, 0x0, r1}, 0x14) sendto(r0, &(0x7f00000000c0)="e360b641b37f03e8000000000066", 0xe, 0x0, 0x0, 0x0) 16:49:56 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(0x0, 0x4000000000000036) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={@mcast1, @local, @local, 0x80000000, 0x0, 0x0, 0x200800000000114}) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x21, r0, 0x0, 0x0) 16:49:56 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vfio/vfio\x00', 0x404000, 0x0) ioctl$ASHMEM_GET_NAME(r1, 0x81007702, &(0x7f00000001c0)=""/192) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0a5c1f023c126285719070") bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) sendto$inet(r0, &(0x7f0000000840)="a19a8586e76178a9e2cab4597c64f44212daec3b493dee78fbdd7f26c2dcb42d0ec99d4ce821b8dce13df34dd08ec1c06ca9aeeae7eef88e3417c1db6a533ab91290db5d8083902470d36800ecd5cfa81f1aea4d5d6b6b76d1adacb4afc1f7b41291104859838339ca", 0x69, 0x8080, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) sendto(r0, &(0x7f0000000340)="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", 0x2d9, 0x0, 0x0, 0x0) sendto$inet(r0, &(0x7f0000000e80)="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", 0x166, 0x0, 0x0, 0x0) 16:49:56 executing program 2: r0 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'hsr0\x00', 0x0}) bind$packet(r0, &(0x7f0000000340)={0x11, 0x0, r1}, 0x14) sendto(r0, &(0x7f00000000c0)="e360b641b37f6558000000000066", 0xe, 0x0, 0x0, 0x0) 16:49:56 executing program 3: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000b00)) mount(&(0x7f00000004c0)=ANY=[], &(0x7f000000aff8)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000000)) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000000c0)='tls\x00', 0x4) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$void(r1, 0x5450) renameat2(r0, &(0x7f0000000180)='./file0/file0\x00', 0xffffffffffffffff, 0x0, 0x4) shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@dev, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@remote}}, 0x0) ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, 0x0) ioctl$PIO_FONT(r0, 0x4b61, &(0x7f0000000740)="9d705183203ecbbfc0d13a4e30241f7ce01b0b4d7682444a507bfc1ac414339f479986467eb40c8065891e1fbbe7263212c5c09bb47896b3d85893f1173f8a139c116f876fdcc1779bffef8c34b5958981616cbcf39f2d8b43491de452d774a74c3ae9555a45180f7d68da36975781ba3a24694ac85eea975ca104181420baf7f3b9614203b0360e7cc29a1c109e") chdir(&(0x7f0000000340)='./file0\x00') symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) umount2(&(0x7f0000000380)='./file0\x00', 0x3) openat$uinput(0xffffffffffffff9c, &(0x7f0000000440)='/dev/uinput\x00', 0x802, 0x0) r3 = syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') sendmsg$FOU_CMD_DEL(r1, &(0x7f00000002c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x28, r3, 0x200, 0x70bd25, 0x25dfdbfe, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e24}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x7f}]}, 0x28}}, 0x24048010) sendmsg$kcm(r0, &(0x7f0000000a40)={&(0x7f0000000580)=@ll={0x11, 0xfd, r2, 0x1, 0x8, 0x6, @dev={[], 0x16}}, 0x80, &(0x7f00000009c0)=[{&(0x7f00000008c0)="367a9f0d4a1564359d1e668c63869bb9bf3b7f5aa4030462889dd6407207295cea1b36e07bc2b38b11c6ca28a73515cf52d89a8199d5c019de826c756a31bac24f707efcfc0a2383216dccc08f804551f0a56d2c9ab95a113fa74dff88ccccc7f278200aa03d2349e688b69191611739bb3e2e5ff110c5858c1a7c5bd5431f9c8e73a99236728f125d5f52a2b0761872fc0fc53cda5458241b2a80fd918b21c8029039d416a6cde6aa786bdfaa21a4e5ffa5f80dec422e0051c7e98a8cff2f4afbe25ca5a154a57c10", 0xc9}], 0x1}, 0x4004000) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000001c0)={0x0, 0x4, 0x2, 0x3, 0x1}, 0x14) ioctl$VIDIOC_SUBDEV_S_SELECTION(r0, 0xc040563e, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x7) msgget(0x1, 0x318) syz_genetlink_get_family_id$team(&(0x7f0000000400)='team\x00') 16:49:56 executing program 0: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000b00)) mount(&(0x7f00000004c0)=ANY=[], &(0x7f000000aff8)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000000)) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000000c0)='tls\x00', 0x4) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$void(r1, 0x5450) renameat2(r0, &(0x7f0000000180)='./file0/file0\x00', 0xffffffffffffffff, 0x0, 0x4) shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@dev, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@remote}}, 0x0) ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, 0x0) shmctl$IPC_SET(0x0, 0x1, 0x0) chdir(&(0x7f0000000340)='./file0\x00') symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) umount2(&(0x7f0000000380)='./file0\x00', 0x3) openat$uinput(0xffffffffffffff9c, &(0x7f0000000440)='/dev/uinput\x00', 0x802, 0x0) r3 = syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') sendmsg$FOU_CMD_DEL(r1, &(0x7f00000002c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x28, r3, 0x200, 0x70bd25, 0x25dfdbfe, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e24}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x7f}]}, 0x28}}, 0x24048010) sendmsg$kcm(r0, &(0x7f0000000a40)={&(0x7f0000000580)=@ll={0x11, 0xfd, r2, 0x1, 0x8, 0x6, @dev={[], 0x16}}, 0x80, &(0x7f00000009c0)=[{&(0x7f00000008c0)="367a9f0d4a1564359d1e668c63869bb9bf3b7f5aa4030462889dd6407207295cea1b36e07bc2b38b11c6ca28a73515cf52d89a8199d5c019de826c756a31bac24f707efcfc0a2383216dccc08f804551f0a56d2c9ab95a113fa74dff88ccccc7f278200aa03d2349e688b69191611739bb3e2e5ff110c5858c1a7c5bd5431f9c8e73a99236728f125d5f52a2b0761872fc0fc53cda5458241b2a80fd918b21c8029039d416a6cde6aa786bdfaa21a4e5ffa5f80dec422e0051c7e98a8cff2f4afbe25ca5a154a57c10", 0xc9}], 0x1}, 0x4004000) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000001c0)={0x0, 0x4, 0x2, 0x3, 0x1}, 0x14) ioctl$VIDIOC_SUBDEV_S_SELECTION(r0, 0xc040563e, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x7) msgget(0x1, 0x318) syz_genetlink_get_family_id$team(&(0x7f0000000400)='team\x00') 16:49:56 executing program 1: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000b00)) mount(&(0x7f00000004c0)=ANY=[], &(0x7f000000aff8)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000000)) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000000c0)='tls\x00', 0x4) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$void(r1, 0x5450) renameat2(r0, &(0x7f0000000180)='./file0/file0\x00', 0xffffffffffffffff, 0x0, 0x4) shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@dev, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@remote}}, 0x0) ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, 0x0) shmctl$IPC_SET(0x0, 0x1, 0x0) chdir(&(0x7f0000000340)='./file0\x00') symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) umount2(&(0x7f0000000380)='./file0\x00', 0x3) openat$uinput(0xffffffffffffff9c, &(0x7f0000000440)='/dev/uinput\x00', 0x802, 0x0) r3 = syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') sendmsg$FOU_CMD_DEL(r1, &(0x7f00000002c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x28, r3, 0x200, 0x70bd25, 0x25dfdbfe, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e24}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x7f}]}, 0x28}}, 0x24048010) sendmsg$kcm(r0, &(0x7f0000000a40)={&(0x7f0000000580)=@ll={0x11, 0xfd, r2, 0x1, 0x8, 0x6, @dev={[], 0x16}}, 0x80, &(0x7f00000009c0)=[{&(0x7f00000008c0)="367a9f0d4a1564359d1e668c63869bb9bf3b7f5aa4030462889dd6407207295cea1b36e07bc2b38b11c6ca28a73515cf52d89a8199d5c019de826c756a31bac24f707efcfc0a2383216dccc08f804551f0a56d2c9ab95a113fa74dff88ccccc7f278200aa03d2349e688b69191611739bb3e2e5ff110c5858c1a7c5bd5431f9c8e73a99236728f125d5f52a2b0761872fc0fc53cda5458241b2a80fd918b21c8029039d416a6cde6aa786bdfaa21a4e5ffa5f80dec422e0051c7e98a8cff2f4afbe25ca5a154a57c10", 0xc9}], 0x1}, 0x4004000) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000001c0)={0x0, 0x4, 0x2, 0x3, 0x1}, 0x14) ioctl$VIDIOC_SUBDEV_S_SELECTION(r0, 0xc040563e, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x7) msgget(0x1, 0x318) syz_genetlink_get_family_id$team(&(0x7f0000000400)='team\x00') 16:49:56 executing program 2: r0 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'hsr0\x00', 0x0}) bind$packet(r0, &(0x7f0000000340)={0x11, 0x0, r1}, 0x14) sendto(r0, &(0x7f00000000c0)="e360b641b37fe803000000000066", 0xe, 0x0, 0x0, 0x0) 16:49:56 executing program 5: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x2, 0x32, 0xffffffffffffffff, 0x20000000000000) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000000)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) sendmsg$FOU_CMD_GET(r2, &(0x7f0000000200)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f00000002c0)={0x14}, 0x14}}, 0x0) close(r2) close(r0) 16:49:56 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={@mcast1, @local, @local, 0x80000000, 0x0, 0x0, 0x200800000000114}) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x21, r0, 0x0, 0x0) 16:49:56 executing program 0: r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x0, 0x0) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x200002, 0x0) r2 = socket(0x11, 0x2, 0x9) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r2, 0x84, 0x6c, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) recvmsg(r2, &(0x7f0000001ac0)={&(0x7f0000001600)=@can, 0x80, &(0x7f0000001940)=[{&(0x7f0000001680)=""/58, 0x3a}, {&(0x7f00000016c0)=""/37, 0x25}, {&(0x7f0000001800)=""/190, 0xbe}], 0x3, &(0x7f00000019c0)=""/225, 0xe1, 0x7}, 0x40000100) sendmmsg(0xffffffffffffffff, &(0x7f0000005640)=[{{&(0x7f0000004100)=@in={0x2, 0x4e24, @remote}, 0x80, &(0x7f0000004300), 0x0, &(0x7f0000004340), 0x18b, 0x4000885}, 0x16}], 0x1, 0x4000800) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r0, 0x12, 0x2, &(0x7f0000000480)=""/247, &(0x7f0000000580)=0xf7) ioctl$GIO_UNIMAP(0xffffffffffffffff, 0x4b66, &(0x7f0000000180)={0x9, &(0x7f0000000140)=[{}, {}, {}, {}, {}, {}, {}, {}, {}]}) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000e73000/0x2000)=nil, 0x2000, 0x0, 0x8031, r3, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000600)={0x0, 0x7}, &(0x7f0000000640)=0xc) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f0000000680)={r4, 0x1f, 0x890}, 0x8) rseq(&(0x7f0000000400)={0x0, 0x0, &(0x7f0000000340)={0x0, 0x0, 0x7, 0x4, 0x7}, 0x7}, 0x20, 0x1, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x204) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r1, 0x84, 0x10, &(0x7f0000000300)=@sack_info={0x0, 0x7, 0x11}, &(0x7f0000000440)=0xc) prctl$PR_SET_NAME(0xf, &(0x7f0000000200)='lo\x00@\x00') openat$sequencer2(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer2\x00', 0x200, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00027, 0x0, &(0x7f00000000c0), 0x1, 0x2000000000002) r5 = socket$inet_tcp(0x2, 0x1, 0x0) bind(r2, &(0x7f00005a2000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r5, 0x8914, &(0x7f0000000000)={'lo\x00'}) [ 301.015484] IPVS: ftp: loaded support on port[0] = 21 16:49:56 executing program 2: r0 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'hsr0\x00', 0x0}) bind$packet(r0, &(0x7f0000000340)={0x11, 0x0, r1}, 0x14) sendto(r0, &(0x7f00000000c0)="e360b641b37f0400000000000066", 0xe, 0x0, 0x0, 0x0) 16:49:56 executing program 3: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000b00)) mount(&(0x7f00000004c0)=ANY=[], &(0x7f000000aff8)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000000)) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000000c0)='tls\x00', 0x4) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$void(r1, 0x5450) renameat2(r0, &(0x7f0000000180)='./file0/file0\x00', 0xffffffffffffffff, 0x0, 0x4) shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@dev, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@remote}}, 0x0) shmctl$IPC_SET(0x0, 0x1, 0x0) ioctl$PIO_FONT(r0, 0x4b61, &(0x7f0000000740)="9d705183203ecbbfc0d13a4e30241f7ce01b0b4d7682444a507bfc1ac414339f479986467eb40c8065891e1fbbe7263212c5c09bb47896b3d85893f1173f8a139c116f876fdcc1779bffef8c34b5958981616cbcf39f2d8b43491de452d774a74c3ae9555a45180f7d68da36975781ba3a24694ac85eea975ca104181420baf7f3b9614203b0360e7cc29a1c109e") chdir(&(0x7f0000000340)='./file0\x00') symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) umount2(&(0x7f0000000380)='./file0\x00', 0x3) openat$uinput(0xffffffffffffff9c, &(0x7f0000000440)='/dev/uinput\x00', 0x802, 0x0) r3 = syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') sendmsg$FOU_CMD_DEL(r1, &(0x7f00000002c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x28, r3, 0x200, 0x70bd25, 0x25dfdbfe, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e24}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x7f}]}, 0x28}}, 0x24048010) sendmsg$kcm(r0, &(0x7f0000000a40)={&(0x7f0000000580)=@ll={0x11, 0xfd, r2, 0x1, 0x8, 0x6, @dev={[], 0x16}}, 0x80, &(0x7f00000009c0)=[{&(0x7f00000008c0)="367a9f0d4a1564359d1e668c63869bb9bf3b7f5aa4030462889dd6407207295cea1b36e07bc2b38b11c6ca28a73515cf52d89a8199d5c019de826c756a31bac24f707efcfc0a2383216dccc08f804551f0a56d2c9ab95a113fa74dff88ccccc7f278200aa03d2349e688b69191611739bb3e2e5ff110c5858c1a7c5bd5431f9c8e73a99236728f125d5f52a2b0761872fc0fc53cda5458241b2a80fd918b21c8029039d416a6cde6aa786bdfaa21a4e5ffa5f80dec422e0051c7e98a8cff2f4afbe25ca5a154a57c10", 0xc9}], 0x1}, 0x4004000) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000001c0)={0x0, 0x4, 0x2, 0x3, 0x1}, 0x14) ioctl$VIDIOC_SUBDEV_S_SELECTION(r0, 0xc040563e, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x7) msgget(0x1, 0x318) syz_genetlink_get_family_id$team(&(0x7f0000000400)='team\x00') [ 301.112515] mmap: syz-executor0 (9962) uses deprecated remap_file_pages() syscall. See Documentation/vm/remap_file_pages.rst. 16:49:57 executing program 2: r0 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'hsr0\x00', 0x0}) bind$packet(r0, &(0x7f0000000340)={0x11, 0x0, r1}, 0x14) sendto(r0, &(0x7f00000000c0)="e360b641b37f0000004000000066", 0xe, 0x0, 0x0, 0x0) [ 301.320926] net_ratelimit: 18 callbacks suppressed [ 301.320972] protocol 88fb is buggy, dev hsr_slave_0 [ 301.331406] protocol 88fb is buggy, dev hsr_slave_1 16:49:57 executing program 2: r0 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'hsr0\x00', 0x0}) bind$packet(r0, &(0x7f0000000340)={0x11, 0x0, r1}, 0x14) sendto(r0, &(0x7f00000000c0)="e360b641b37f0000648800000066", 0xe, 0x0, 0x0, 0x0) [ 301.471674] chnl_net:caif_netlink_parms(): no params data found 16:49:57 executing program 2: r0 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'hsr0\x00', 0x0}) bind$packet(r0, &(0x7f0000000340)={0x11, 0x0, r1}, 0x14) sendto(r0, &(0x7f00000000c0)="e360b641b37f8848000000000066", 0xe, 0x0, 0x0, 0x0) 16:49:57 executing program 3: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000b00)) mount(&(0x7f00000004c0)=ANY=[], &(0x7f000000aff8)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000000)) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000000c0)='tls\x00', 0x4) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$void(r1, 0x5450) renameat2(r0, &(0x7f0000000180)='./file0/file0\x00', 0xffffffffffffffff, 0x0, 0x4) shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, 0x0) shmctl$IPC_SET(0x0, 0x1, 0x0) ioctl$PIO_FONT(r0, 0x4b61, &(0x7f0000000740)="9d705183203ecbbfc0d13a4e30241f7ce01b0b4d7682444a507bfc1ac414339f479986467eb40c8065891e1fbbe7263212c5c09bb47896b3d85893f1173f8a139c116f876fdcc1779bffef8c34b5958981616cbcf39f2d8b43491de452d774a74c3ae9555a45180f7d68da36975781ba3a24694ac85eea975ca104181420baf7f3b9614203b0360e7cc29a1c109e") chdir(&(0x7f0000000340)='./file0\x00') symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) umount2(&(0x7f0000000380)='./file0\x00', 0x3) openat$uinput(0xffffffffffffff9c, &(0x7f0000000440)='/dev/uinput\x00', 0x802, 0x0) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') sendmsg$FOU_CMD_DEL(r1, &(0x7f00000002c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x28, r2, 0x200, 0x70bd25, 0x25dfdbfe, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e24}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x7f}]}, 0x28}}, 0x24048010) sendmsg$kcm(r0, &(0x7f0000000a40)={&(0x7f0000000580)=@ll={0x11, 0xfd, 0x0, 0x1, 0x8, 0x6, @dev={[], 0x16}}, 0x80, &(0x7f00000009c0)=[{&(0x7f00000008c0)="367a9f0d4a1564359d1e668c63869bb9bf3b7f5aa4030462889dd6407207295cea1b36e07bc2b38b11c6ca28a73515cf52d89a8199d5c019de826c756a31bac24f707efcfc0a2383216dccc08f804551f0a56d2c9ab95a113fa74dff88ccccc7f278200aa03d2349e688b69191611739bb3e2e5ff110c5858c1a7c5bd5431f9c8e73a99236728f125d5f52a2b0761872fc0fc53cda5458241b2a80fd918b21c8029039d416a6cde6aa786bdfaa21a4e5ffa5f80dec422e0051c7e98a8cff2f4afbe25ca5a154a57c10", 0xc9}], 0x1}, 0x4004000) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000001c0)={0x0, 0x4, 0x2, 0x3, 0x1}, 0x14) ioctl$VIDIOC_SUBDEV_S_SELECTION(r0, 0xc040563e, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x7) msgget(0x1, 0x318) syz_genetlink_get_family_id$team(&(0x7f0000000400)='team\x00') [ 301.630390] protocol 88fb is buggy, dev hsr_slave_0 [ 301.635612] protocol 88fb is buggy, dev hsr_slave_1 16:49:57 executing program 2: r0 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'hsr0\x00', 0x0}) bind$packet(r0, &(0x7f0000000340)={0x11, 0x0, r1}, 0x14) sendto(r0, &(0x7f00000000c0)="e360b641b37f0806000000000066", 0xe, 0x0, 0x0, 0x0) [ 301.690304] bridge0: port 1(bridge_slave_0) entered blocking state [ 301.710305] protocol 88fb is buggy, dev hsr_slave_0 [ 301.715589] protocol 88fb is buggy, dev hsr_slave_1 [ 301.728700] bridge0: port 1(bridge_slave_0) entered disabled state [ 301.756660] device bridge_slave_0 entered promiscuous mode [ 301.808949] bridge0: port 2(bridge_slave_1) entered blocking state [ 301.828833] bridge0: port 2(bridge_slave_1) entered disabled state [ 301.859392] device bridge_slave_1 entered promiscuous mode [ 301.947246] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 301.966762] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 302.000083] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 302.016463] team0: Port device team_slave_0 added [ 302.024683] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 302.037436] team0: Port device team_slave_1 added [ 302.045442] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 302.058405] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 302.110274] protocol 88fb is buggy, dev hsr_slave_0 [ 302.115437] protocol 88fb is buggy, dev hsr_slave_1 [ 302.143599] device hsr_slave_0 entered promiscuous mode [ 302.180615] device hsr_slave_1 entered promiscuous mode [ 302.250894] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 302.510337] protocol 88fb is buggy, dev hsr_slave_0 [ 302.515472] protocol 88fb is buggy, dev hsr_slave_1 [ 302.658701] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 302.716376] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 302.767440] 8021q: adding VLAN 0 to HW filter on device bond0 [ 302.776244] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 302.786405] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 302.792790] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 302.799628] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 302.809176] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 302.815412] 8021q: adding VLAN 0 to HW filter on device team0 [ 302.827945] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 302.835927] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 302.845059] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 302.853076] bridge0: port 1(bridge_slave_0) entered blocking state [ 302.859468] bridge0: port 1(bridge_slave_0) entered forwarding state [ 302.866739] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 302.876093] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 302.883231] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 302.891819] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 302.899373] bridge0: port 2(bridge_slave_1) entered blocking state [ 302.905766] bridge0: port 2(bridge_slave_1) entered forwarding state [ 302.915238] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 302.922621] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 302.933854] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 302.941922] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 302.952840] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 302.959838] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 302.968296] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 302.976553] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 302.985928] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 302.993145] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 303.001421] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 303.012763] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 303.019585] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 303.027442] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 303.037226] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 303.046313] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 303.054229] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 303.064623] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 303.071129] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 303.085599] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 303.096469] 8021q: adding VLAN 0 to HW filter on device batadv0 16:49:59 executing program 1: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000b00)) mount(&(0x7f00000004c0)=ANY=[], &(0x7f000000aff8)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000000)) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000000c0)='tls\x00', 0x4) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$void(r1, 0x5450) renameat2(r0, &(0x7f0000000180)='./file0/file0\x00', 0xffffffffffffffff, 0x0, 0x4) shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@dev, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@remote}}, 0x0) ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, 0x0) shmctl$IPC_SET(0x0, 0x1, 0x0) chdir(&(0x7f0000000340)='./file0\x00') symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) umount2(&(0x7f0000000380)='./file0\x00', 0x3) openat$uinput(0xffffffffffffff9c, &(0x7f0000000440)='/dev/uinput\x00', 0x802, 0x0) r3 = syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') sendmsg$FOU_CMD_DEL(r1, &(0x7f00000002c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x28, r3, 0x200, 0x70bd25, 0x25dfdbfe, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e24}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x7f}]}, 0x28}}, 0x24048010) sendmsg$kcm(r0, &(0x7f0000000a40)={&(0x7f0000000580)=@ll={0x11, 0xfd, r2, 0x1, 0x8, 0x6, @dev={[], 0x16}}, 0x80, &(0x7f00000009c0)=[{&(0x7f00000008c0)="367a9f0d4a1564359d1e668c63869bb9bf3b7f5aa4030462889dd6407207295cea1b36e07bc2b38b11c6ca28a73515cf52d89a8199d5c019de826c756a31bac24f707efcfc0a2383216dccc08f804551f0a56d2c9ab95a113fa74dff88ccccc7f278200aa03d2349e688b69191611739bb3e2e5ff110c5858c1a7c5bd5431f9c8e73a99236728f125d5f52a2b0761872fc0fc53cda5458241b2a80fd918b21c8029039d416a6cde6aa786bdfaa21a4e5ffa5f80dec422e0051c7e98a8cff2f4afbe25ca5a154a57c10", 0xc9}], 0x1}, 0x4004000) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000001c0)={0x0, 0x4, 0x2, 0x3, 0x1}, 0x14) ioctl$VIDIOC_SUBDEV_S_SELECTION(r0, 0xc040563e, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x7) msgget(0x1, 0x318) syz_genetlink_get_family_id$team(&(0x7f0000000400)='team\x00') 16:49:59 executing program 3: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000b00)) mount(&(0x7f00000004c0)=ANY=[], &(0x7f000000aff8)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000000)) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000000c0)='tls\x00', 0x4) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$void(r1, 0x5450) renameat2(r0, &(0x7f0000000180)='./file0/file0\x00', 0xffffffffffffffff, 0x0, 0x4) shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, 0x0) shmctl$IPC_SET(0x0, 0x1, 0x0) ioctl$PIO_FONT(r0, 0x4b61, &(0x7f0000000740)="9d705183203ecbbfc0d13a4e30241f7ce01b0b4d7682444a507bfc1ac414339f479986467eb40c8065891e1fbbe7263212c5c09bb47896b3d85893f1173f8a139c116f876fdcc1779bffef8c34b5958981616cbcf39f2d8b43491de452d774a74c3ae9555a45180f7d68da36975781ba3a24694ac85eea975ca104181420baf7f3b9614203b0360e7cc29a1c109e") chdir(&(0x7f0000000340)='./file0\x00') symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) umount2(&(0x7f0000000380)='./file0\x00', 0x3) openat$uinput(0xffffffffffffff9c, &(0x7f0000000440)='/dev/uinput\x00', 0x802, 0x0) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') sendmsg$FOU_CMD_DEL(r1, &(0x7f00000002c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x28, r2, 0x200, 0x70bd25, 0x25dfdbfe, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e24}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x7f}]}, 0x28}}, 0x24048010) sendmsg$kcm(r0, &(0x7f0000000a40)={&(0x7f0000000580)=@ll={0x11, 0xfd, 0x0, 0x1, 0x8, 0x6, @dev={[], 0x16}}, 0x80, &(0x7f00000009c0)=[{&(0x7f00000008c0)="367a9f0d4a1564359d1e668c63869bb9bf3b7f5aa4030462889dd6407207295cea1b36e07bc2b38b11c6ca28a73515cf52d89a8199d5c019de826c756a31bac24f707efcfc0a2383216dccc08f804551f0a56d2c9ab95a113fa74dff88ccccc7f278200aa03d2349e688b69191611739bb3e2e5ff110c5858c1a7c5bd5431f9c8e73a99236728f125d5f52a2b0761872fc0fc53cda5458241b2a80fd918b21c8029039d416a6cde6aa786bdfaa21a4e5ffa5f80dec422e0051c7e98a8cff2f4afbe25ca5a154a57c10", 0xc9}], 0x1}, 0x4004000) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000001c0)={0x0, 0x4, 0x2, 0x3, 0x1}, 0x14) ioctl$VIDIOC_SUBDEV_S_SELECTION(r0, 0xc040563e, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x7) msgget(0x1, 0x318) syz_genetlink_get_family_id$team(&(0x7f0000000400)='team\x00') 16:49:59 executing program 5: rmdir(&(0x7f0000000000)='./file1\x00') mkdir(&(0x7f0000000300)='./file0\x00', 0x0) socketpair$unix(0x1, 0x7, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x440, 0x0) getdents64(r1, 0x0, 0xffffffffffffffbb) symlinkat(&(0x7f0000000100)='./file1\x00', r1, &(0x7f0000000140)='./file1\x00') mknodat(r1, &(0x7f0000000040)='./file1\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000340)=""/229, 0xe5) 16:49:59 executing program 2: r0 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'hsr0\x00', 0x0}) bind$packet(r0, &(0x7f0000000340)={0x11, 0x0, r1}, 0x14) sendto(r0, &(0x7f00000000c0)="e360b641b37f0000000e00000066", 0xe, 0x0, 0x0, 0x0) 16:49:59 executing program 0: r0 = socket(0x40000000001e, 0x1, 0x0) setsockopt(r0, 0x10f, 0x1, &(0x7f0000000040)="7bea55da9096b45bef19b30dc6033fbc6b8b0545e0a5066918030052c6e9736f364a633841ad99b9aa99fcc577256ce0dfb08fcabc7e21ecda03ccab3dd35c33c21f55351935453204a328ddac3eff1a05ee11a3865fefe920e1105197cef95eb4c9dc56dfa7d47f4ef81b", 0x6b) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000140)='/dev/null\x00', 0x2000fe, 0x0) ioctl$RTC_SET_TIME(r1, 0x4024700a, &(0x7f00000000c0)={0x2, 0x7, 0x11, 0x9, 0xb, 0x0, 0xced, 0x9, 0xffffffffffffffff}) 16:49:59 executing program 3: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000b00)) mount(&(0x7f00000004c0)=ANY=[], &(0x7f000000aff8)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000000)) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000000c0)='tls\x00', 0x4) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$void(r1, 0x5450) renameat2(r0, &(0x7f0000000180)='./file0/file0\x00', 0xffffffffffffffff, 0x0, 0x4) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@dev, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@remote}}, 0x0) ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, 0x0) shmctl$IPC_SET(0x0, 0x1, 0x0) ioctl$PIO_FONT(r0, 0x4b61, &(0x7f0000000740)="9d705183203ecbbfc0d13a4e30241f7ce01b0b4d7682444a507bfc1ac414339f479986467eb40c8065891e1fbbe7263212c5c09bb47896b3d85893f1173f8a139c116f876fdcc1779bffef8c34b5958981616cbcf39f2d8b43491de452d774a74c3ae9555a45180f7d68da36975781ba3a24694ac85eea975ca104181420baf7f3b9614203b0360e7cc29a1c109e") chdir(&(0x7f0000000340)='./file0\x00') symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) umount2(&(0x7f0000000380)='./file0\x00', 0x3) openat$uinput(0xffffffffffffff9c, &(0x7f0000000440)='/dev/uinput\x00', 0x802, 0x0) r3 = syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') sendmsg$FOU_CMD_DEL(r1, &(0x7f00000002c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x28, r3, 0x200, 0x70bd25, 0x25dfdbfe, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e24}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x7f}]}, 0x28}}, 0x24048010) sendmsg$kcm(r0, &(0x7f0000000a40)={&(0x7f0000000580)=@ll={0x11, 0xfd, r2, 0x1, 0x8, 0x6, @dev={[], 0x16}}, 0x80, &(0x7f00000009c0)=[{&(0x7f00000008c0)="367a9f0d4a1564359d1e668c63869bb9bf3b7f5aa4030462889dd6407207295cea1b36e07bc2b38b11c6ca28a73515cf52d89a8199d5c019de826c756a31bac24f707efcfc0a2383216dccc08f804551f0a56d2c9ab95a113fa74dff88ccccc7f278200aa03d2349e688b69191611739bb3e2e5ff110c5858c1a7c5bd5431f9c8e73a99236728f125d5f52a2b0761872fc0fc53cda5458241b2a80fd918b21c8029039d416a6cde6aa786bdfaa21a4e5ffa5f80dec422e0051c7e98a8cff2f4afbe25ca5a154a57c10", 0xc9}], 0x1}, 0x4004000) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000001c0)={0x0, 0x4, 0x2, 0x3, 0x1}, 0x14) ioctl$VIDIOC_SUBDEV_S_SELECTION(r0, 0xc040563e, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x7) msgget(0x1, 0x318) syz_genetlink_get_family_id$team(&(0x7f0000000400)='team\x00') 16:49:59 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x400000003, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000580)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000540), 0x0, 0x80000001}, 0x28) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000e40)={&(0x7f0000000700)=@vsock={0x28, 0x0, 0x0, @reserved}, 0x80, 0x0}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) openat$vimc2(0xffffffffffffff9c, &(0x7f0000000280)='/dev/video2\x00', 0x2, 0x0) write$cgroup_pid(r0, &(0x7f0000000100), 0xda4fff08) r1 = perf_event_open$cgroup(&(0x7f0000000900)={0x0, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x800, 0x5, 0x200, 0x0, 0x8, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3, 0x0, 0x7, 0x0, 0x0, 0x0, 0x7, 0x0, 0x4, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8000}, 0x0, 0x0, 0x0, 0x4, 0x0, 0x5}, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x0) fsetxattr$system_posix_acl(r1, &(0x7f0000000040)='system.posix_acl_access\x00', 0xfffffffffffffffe, 0x0, 0x2) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r0, 0x404c534a, &(0x7f0000000200)={0x5, 0x1ff, 0x6}) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000640)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r3 = perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x1f, 0x2, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, &(0x7f0000000340), &(0x7f0000000140)=0x4) write$cgroup_int(0xffffffffffffffff, &(0x7f00000000c0), 0x12) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40042409, 0x3) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x660c, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x2}, 0x10) 16:49:59 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={@mcast1, @local, @local, 0x80000000, 0x0, 0x0, 0x200800000000114}) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x21, r0, 0x0, 0x0) 16:49:59 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={@mcast1, @local, @local, 0x80000000, 0x0, 0x0, 0x200800000000114}) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x21, r0, 0x0, 0x0) 16:49:59 executing program 2: r0 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'hsr0\x00', 0x0}) bind$packet(r0, &(0x7f0000000340)={0x11, 0x0, r1}, 0x14) sendto(r0, &(0x7f00000000c0)="e360b641b37f0689000000000066", 0xe, 0x0, 0x0, 0x0) 16:50:00 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x2, 0x0, 0x140080000001) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer2\x00', 0x141080, 0x0) ioctl$UFFDIO_COPY(r2, 0xc028aa03, &(0x7f0000000480)={&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1}) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r3, 0x8991, &(0x7f0000000000)={'bond0\x00', @ifru_names='bond_slave_1\x00'}) ioctl$VIDIOC_ENCODER_CMD(r2, 0xc028564d, &(0x7f0000000680)={0x1, 0x1, [0xfff, 0x100, 0x3ff, 0x40, 0x4000020000, 0xfffffffffffffffb, 0x8, 0x4f]}) ioctl$SNDRV_TIMER_IOCTL_PVERSION(r2, 0x80045400, &(0x7f00000004c0)) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000240)='/dev/full\x00', 0x20a000, 0x0) ioctl$KDSKBSENT(r4, 0x4b49, &(0x7f0000000380)="e2da5cdea423495c8b5663b2d9e462f4e65c25cc8b2ba5e1349cd9ae758d94c045f53f48860fd0b3d8013a69034f6ac0d6e1e98dfe38d2d9e2e2c54d473c67bfa22bbf07fadb6002cda4dd466bf8b4ac1fd7837039b702b9d0fa204a8e5df87c3de67d40844e3ddd3c120aee61b90f3b98210922d8d4271c6df39457ffa88a8a1c33837414408c58e56e3fc11ec40ec466928864d45fe30bbdca4189941c975bc6fe8fb0e6bf8e2a58131d1b5d088066c68b8a6ee0c4e1fea78983de57627ebf6f449a310f966c64391d936f99802fb9320ae1cc") r5 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000016c0)='/dev/sequencer2\x00', 0x40042, 0x0) sendto$inet(r1, &(0x7f00000000c0)="8dec431bb44aff53a310b4eabef65b9ca28574570c8753d962784ce7563c1f448215fd237bf4c9159a98e9205a38a1fef116825d2a67dccc355557378e26b4e71c9ead8245ce8f8727e4d5e348d6b048462955248e97e362bb149adcd5ad849873b82111c2ecfa383140f9d4c99f525041a886277a6592dbc6b9108911e88a440b93f5c0fae544676b44a19bf06aa255a549db9cb0a9221a90f33fec43b1d074bf", 0xa1, 0x1, 0x0, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000580)='fou\x00') sendmsg$FOU_CMD_DEL(r5, &(0x7f0000000640)={&(0x7f0000000540), 0xc, &(0x7f0000000600)={&(0x7f0000000740)=ANY=[@ANYBLOB="000028bd7000fddbdf2502000000080003003b000000080001014e230000"], 0x1}, 0x1, 0x0, 0x0, 0x20044000}, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000300)={&(0x7f00000009c0)=ANY=[@ANYBLOB="524de2d0113d35fab25162fc581bf555250b1f2077eab1ae8d50faa6040b8b376a65970ddb19cbd99e254682073d27e534438e835e8b7395daf99e41c4150d1406e7ed5a54c0d773ee0c19192a1e3662d6459477c422bc9bf3db54d9ea50705096c791e8891e39270a134d1fb8cb789b316877fc0a2aaba86385df8b7a7ee6e073069c76529b1b9ab8bf1585440e6cfd12e89f39c439650afa4d7cbf7938cdd37043d1f09233ea8f02343a456e143b260bdaf82256f2a596a831b17129bac94ab715ff11adf2938c442eb9d7e5dc8cb24227acfc350043b161467bb4509d86b0b983ba81b6a3b25707a10eb8b58482b5d823471e467e7acdd24c29996e6e57e11f7cddfe27fccebfe76a4c82da3399489ce1db4bfc2cf5c462e0cd67b38a1a686f62b7dea1b6c7fb26c34ba57b181db6177b995df422db0b41ceac6e3f11998fe37cedbd5c5a78ec1639e57d98f6bea67191f09d7f0d32421a6630a655367279dc68e779cad323d154b116126f7b0cb10d4d178d3426e9e9ab646f8700000000000000000000000000000000"], 0x1}, 0x1, 0x0, 0x0, 0x8050}, 0x40) r6 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x25d1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$session_to_parent(0x12) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x200) dup2(r6, r5) r7 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0xc81, 0x0) r8 = socket$inet_tcp(0x2, 0x1, 0x0) r9 = syz_open_dev$midi(&(0x7f0000000280)='/dev/midi#\x00', 0x1, 0x40100) getsockopt$inet_pktinfo(r7, 0x0, 0x8, &(0x7f0000000300)={0x0, @remote, @loopback}, &(0x7f00000006c0)=0x4) sendmsg$nl_route(r9, &(0x7f0000000400)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000005c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="06002f5e3f750000"], 0x1}}, 0x4008000) ioctl$sock_proto_private(r3, 0x800896a, &(0x7f0000000780)="039625617620978a4df541244054545eefb285b44d2198c37642636f3bd6084339c6e79154e7a4e1e8a3a316d5a4d756fa828508c3eaae4df2759d4d16de576413772f248c74aae160e44749d604a7af5290efc74ba837ec71ff4bfb5f9a2d51403ecc6b5a4bb2dab710e3367549b45cd0b3fed1c251372400872f340ee3b348964d022f3224519d06adad720a5650c9b04292955ae6fd364adebee641bc911bcdd907f409e8200d95b946789c69b1d8876c") r10 = syz_open_dev$usb(&(0x7f0000000200)='/dev/bus/usb/00#/00#\x00', 0xff, 0x80000) syz_open_dev$sndtimer(&(0x7f0000000900)='/dev/snd/timer\x00', 0x0, 0x200000004083) ioctl$VT_GETMODE(r10, 0x5601, &(0x7f0000000240)) setsockopt$inet_group_source_req(r8, 0x0, 0x2e, &(0x7f0000000000)={0x1, {{0x2, 0x0, @multicast2}}, {{0x2, 0x0, @dev}}}, 0x108) 16:50:00 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_FFBIT(r1, 0x4004556b, 0x0) ioctl$UI_DEV_CREATE(r1, 0x406855c9) 16:50:00 executing program 3: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000b00)) mount(&(0x7f00000004c0)=ANY=[], &(0x7f000000aff8)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000000)) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000000c0)='tls\x00', 0x4) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$void(r1, 0x5450) shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@dev, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@remote}}, 0x0) ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, 0x0) shmctl$IPC_SET(0x0, 0x1, 0x0) ioctl$PIO_FONT(r0, 0x4b61, &(0x7f0000000740)="9d705183203ecbbfc0d13a4e30241f7ce01b0b4d7682444a507bfc1ac414339f479986467eb40c8065891e1fbbe7263212c5c09bb47896b3d85893f1173f8a139c116f876fdcc1779bffef8c34b5958981616cbcf39f2d8b43491de452d774a74c3ae9555a45180f7d68da36975781ba3a24694ac85eea975ca104181420baf7f3b9614203b0360e7cc29a1c109e") chdir(&(0x7f0000000340)='./file0\x00') symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) umount2(&(0x7f0000000380)='./file0\x00', 0x3) openat$uinput(0xffffffffffffff9c, &(0x7f0000000440)='/dev/uinput\x00', 0x802, 0x0) r3 = syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') sendmsg$FOU_CMD_DEL(r1, &(0x7f00000002c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x28, r3, 0x200, 0x70bd25, 0x25dfdbfe, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e24}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x7f}]}, 0x28}}, 0x24048010) sendmsg$kcm(r0, &(0x7f0000000a40)={&(0x7f0000000580)=@ll={0x11, 0xfd, r2, 0x1, 0x8, 0x6, @dev={[], 0x16}}, 0x80, &(0x7f00000009c0)=[{&(0x7f00000008c0)="367a9f0d4a1564359d1e668c63869bb9bf3b7f5aa4030462889dd6407207295cea1b36e07bc2b38b11c6ca28a73515cf52d89a8199d5c019de826c756a31bac24f707efcfc0a2383216dccc08f804551f0a56d2c9ab95a113fa74dff88ccccc7f278200aa03d2349e688b69191611739bb3e2e5ff110c5858c1a7c5bd5431f9c8e73a99236728f125d5f52a2b0761872fc0fc53cda5458241b2a80fd918b21c8029039d416a6cde6aa786bdfaa21a4e5ffa5f80dec422e0051c7e98a8cff2f4afbe25ca5a154a57c10", 0xc9}], 0x1}, 0x4004000) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000001c0)={0x0, 0x4, 0x2, 0x3, 0x1}, 0x14) ioctl$VIDIOC_SUBDEV_S_SELECTION(r0, 0xc040563e, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x7) msgget(0x1, 0x318) syz_genetlink_get_family_id$team(&(0x7f0000000400)='team\x00') 16:50:00 executing program 2: r0 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'hsr0\x00', 0x0}) bind$packet(r0, &(0x7f0000000340)={0x11, 0x0, r1}, 0x14) sendto(r0, &(0x7f00000000c0)="e360b641b37f6488000000000066", 0xe, 0x0, 0x0, 0x0) [ 304.411469] bond0: Releasing backup interface bond_slave_1 16:50:00 executing program 2: r0 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'hsr0\x00', 0x0}) bind$packet(r0, &(0x7f0000000340)={0x11, 0x0, r1}, 0x14) sendto(r0, &(0x7f00000000c0)="e360b641b37f3580000000000066", 0xe, 0x0, 0x0, 0x0) 16:50:00 executing program 3: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000b00)) mount(&(0x7f00000004c0)=ANY=[], &(0x7f000000aff8)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000000)) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000000c0)='tls\x00', 0x4) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$void(r1, 0x5450) shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@dev, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@remote}}, 0x0) ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, 0x0) shmctl$IPC_SET(0x0, 0x1, 0x0) ioctl$PIO_FONT(r0, 0x4b61, &(0x7f0000000740)="9d705183203ecbbfc0d13a4e30241f7ce01b0b4d7682444a507bfc1ac414339f479986467eb40c8065891e1fbbe7263212c5c09bb47896b3d85893f1173f8a139c116f876fdcc1779bffef8c34b5958981616cbcf39f2d8b43491de452d774a74c3ae9555a45180f7d68da36975781ba3a24694ac85eea975ca104181420baf7f3b9614203b0360e7cc29a1c109e") chdir(&(0x7f0000000340)='./file0\x00') symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) umount2(&(0x7f0000000380)='./file0\x00', 0x3) openat$uinput(0xffffffffffffff9c, &(0x7f0000000440)='/dev/uinput\x00', 0x802, 0x0) r3 = syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') sendmsg$FOU_CMD_DEL(r1, &(0x7f00000002c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x28, r3, 0x200, 0x70bd25, 0x25dfdbfe, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e24}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x7f}]}, 0x28}}, 0x24048010) sendmsg$kcm(r0, &(0x7f0000000a40)={&(0x7f0000000580)=@ll={0x11, 0xfd, r2, 0x1, 0x8, 0x6, @dev={[], 0x16}}, 0x80, &(0x7f00000009c0)=[{&(0x7f00000008c0)="367a9f0d4a1564359d1e668c63869bb9bf3b7f5aa4030462889dd6407207295cea1b36e07bc2b38b11c6ca28a73515cf52d89a8199d5c019de826c756a31bac24f707efcfc0a2383216dccc08f804551f0a56d2c9ab95a113fa74dff88ccccc7f278200aa03d2349e688b69191611739bb3e2e5ff110c5858c1a7c5bd5431f9c8e73a99236728f125d5f52a2b0761872fc0fc53cda5458241b2a80fd918b21c8029039d416a6cde6aa786bdfaa21a4e5ffa5f80dec422e0051c7e98a8cff2f4afbe25ca5a154a57c10", 0xc9}], 0x1}, 0x4004000) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000001c0)={0x0, 0x4, 0x2, 0x3, 0x1}, 0x14) ioctl$VIDIOC_SUBDEV_S_SELECTION(r0, 0xc040563e, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x7) msgget(0x1, 0x318) syz_genetlink_get_family_id$team(&(0x7f0000000400)='team\x00') 16:50:00 executing program 2: r0 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'hsr0\x00', 0x0}) bind$packet(r0, &(0x7f0000000340)={0x11, 0x0, r1}, 0x14) sendto(r0, &(0x7f00000000c0)="e360b641b37f88caffff00000066", 0xe, 0x0, 0x0, 0x0) 16:50:00 executing program 2: r0 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'hsr0\x00', 0x0}) bind$packet(r0, &(0x7f0000000340)={0x11, 0x0, r1}, 0x14) sendto(r0, &(0x7f00000000c0)="e360b641b37fffffa88800000066", 0xe, 0x0, 0x0, 0x0) 16:50:00 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x400000003, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000580)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000540), 0x0, 0x80000001}, 0x28) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000e40)={&(0x7f0000000700)=@vsock={0x28, 0x0, 0x0, @reserved}, 0x80, 0x0}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) openat$vimc2(0xffffffffffffff9c, &(0x7f0000000280)='/dev/video2\x00', 0x2, 0x0) write$cgroup_pid(r0, &(0x7f0000000100), 0xda4fff08) r1 = perf_event_open$cgroup(&(0x7f0000000900)={0x0, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x800, 0x5, 0x200, 0x0, 0x8, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3, 0x0, 0x7, 0x0, 0x0, 0x0, 0x7, 0x0, 0x4, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8000}, 0x0, 0x0, 0x0, 0x4, 0x0, 0x5}, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x0) fsetxattr$system_posix_acl(r1, &(0x7f0000000040)='system.posix_acl_access\x00', 0xfffffffffffffffe, 0x0, 0x2) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r0, 0x404c534a, &(0x7f0000000200)={0x5, 0x1ff, 0x6}) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000640)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r3 = perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x1f, 0x2, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, &(0x7f0000000340), &(0x7f0000000140)=0x4) write$cgroup_int(0xffffffffffffffff, &(0x7f00000000c0), 0x12) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40042409, 0x3) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x660c, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x2}, 0x10) 16:50:00 executing program 3: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000b00)) mount(&(0x7f00000004c0)=ANY=[], &(0x7f000000aff8)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000000)) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000000c0)='tls\x00', 0x4) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) renameat2(r0, &(0x7f0000000180)='./file0/file0\x00', 0xffffffffffffffff, 0x0, 0x4) shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@dev, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@remote}}, 0x0) ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, 0x0) shmctl$IPC_SET(0x0, 0x1, 0x0) ioctl$PIO_FONT(r0, 0x4b61, &(0x7f0000000740)="9d705183203ecbbfc0d13a4e30241f7ce01b0b4d7682444a507bfc1ac414339f479986467eb40c8065891e1fbbe7263212c5c09bb47896b3d85893f1173f8a139c116f876fdcc1779bffef8c34b5958981616cbcf39f2d8b43491de452d774a74c3ae9555a45180f7d68da36975781ba3a24694ac85eea975ca104181420baf7f3b9614203b0360e7cc29a1c109e") chdir(&(0x7f0000000340)='./file0\x00') symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) umount2(&(0x7f0000000380)='./file0\x00', 0x3) openat$uinput(0xffffffffffffff9c, &(0x7f0000000440)='/dev/uinput\x00', 0x802, 0x0) r3 = syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') sendmsg$FOU_CMD_DEL(r1, &(0x7f00000002c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x28, r3, 0x200, 0x70bd25, 0x25dfdbfe, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e24}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x7f}]}, 0x28}}, 0x24048010) sendmsg$kcm(r0, &(0x7f0000000a40)={&(0x7f0000000580)=@ll={0x11, 0xfd, r2, 0x1, 0x8, 0x6, @dev={[], 0x16}}, 0x80, &(0x7f00000009c0)=[{&(0x7f00000008c0)="367a9f0d4a1564359d1e668c63869bb9bf3b7f5aa4030462889dd6407207295cea1b36e07bc2b38b11c6ca28a73515cf52d89a8199d5c019de826c756a31bac24f707efcfc0a2383216dccc08f804551f0a56d2c9ab95a113fa74dff88ccccc7f278200aa03d2349e688b69191611739bb3e2e5ff110c5858c1a7c5bd5431f9c8e73a99236728f125d5f52a2b0761872fc0fc53cda5458241b2a80fd918b21c8029039d416a6cde6aa786bdfaa21a4e5ffa5f80dec422e0051c7e98a8cff2f4afbe25ca5a154a57c10", 0xc9}], 0x1}, 0x4004000) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000001c0)={0x0, 0x4, 0x2, 0x3, 0x1}, 0x14) ioctl$VIDIOC_SUBDEV_S_SELECTION(r0, 0xc040563e, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x7) msgget(0x1, 0x318) syz_genetlink_get_family_id$team(&(0x7f0000000400)='team\x00') [ 306.670720] net_ratelimit: 32 callbacks suppressed [ 306.670727] protocol 88fb is buggy, dev hsr_slave_0 [ 306.680938] protocol 88fb is buggy, dev hsr_slave_1 [ 306.750316] protocol 88fb is buggy, dev hsr_slave_0 [ 306.755629] protocol 88fb is buggy, dev hsr_slave_1 16:50:03 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x4000000000000036) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={@mcast1, @local, @local, 0x80000000, 0x0, 0x0, 0x200800000000114}) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x21, r0, 0x0, 0x0) 16:50:03 executing program 2: r0 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'hsr0\x00', 0x0}) bind$packet(r0, &(0x7f0000000340)={0x11, 0x0, r1}, 0x14) sendto(r0, &(0x7f00000000c0)="e360b641b37f4888000000000066", 0xe, 0x0, 0x0, 0x0) 16:50:03 executing program 5: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000b00)) mount(&(0x7f00000004c0)=ANY=[], &(0x7f000000aff8)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000000)) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000000c0)='tls\x00', 0x4) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$void(r1, 0x5450) shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@dev, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@remote}}, 0x0) ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, 0x0) shmctl$IPC_SET(0x0, 0x1, 0x0) ioctl$PIO_FONT(r0, 0x4b61, &(0x7f0000000740)="9d705183203ecbbfc0d13a4e30241f7ce01b0b4d7682444a507bfc1ac414339f479986467eb40c8065891e1fbbe7263212c5c09bb47896b3d85893f1173f8a139c116f876fdcc1779bffef8c34b5958981616cbcf39f2d8b43491de452d774a74c3ae9555a45180f7d68da36975781ba3a24694ac85eea975ca104181420baf7f3b9614203b0360e7cc29a1c109e") chdir(&(0x7f0000000340)='./file0\x00') symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) umount2(&(0x7f0000000380)='./file0\x00', 0x3) openat$uinput(0xffffffffffffff9c, &(0x7f0000000440)='/dev/uinput\x00', 0x802, 0x0) r3 = syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') sendmsg$FOU_CMD_DEL(r1, &(0x7f00000002c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x28, r3, 0x200, 0x70bd25, 0x25dfdbfe, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e24}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x7f}]}, 0x28}}, 0x24048010) sendmsg$kcm(r0, &(0x7f0000000a40)={&(0x7f0000000580)=@ll={0x11, 0xfd, r2, 0x1, 0x8, 0x6, @dev={[], 0x16}}, 0x80, &(0x7f00000009c0)=[{&(0x7f00000008c0)="367a9f0d4a1564359d1e668c63869bb9bf3b7f5aa4030462889dd6407207295cea1b36e07bc2b38b11c6ca28a73515cf52d89a8199d5c019de826c756a31bac24f707efcfc0a2383216dccc08f804551f0a56d2c9ab95a113fa74dff88ccccc7f278200aa03d2349e688b69191611739bb3e2e5ff110c5858c1a7c5bd5431f9c8e73a99236728f125d5f52a2b0761872fc0fc53cda5458241b2a80fd918b21c8029039d416a6cde6aa786bdfaa21a4e5ffa5f80dec422e0051c7e98a8cff2f4afbe25ca5a154a57c10", 0xc9}], 0x1}, 0x4004000) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000001c0)={0x0, 0x4, 0x2, 0x3, 0x1}, 0x14) ioctl$VIDIOC_SUBDEV_S_SELECTION(r0, 0xc040563e, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x7) msgget(0x1, 0x318) syz_genetlink_get_family_id$team(&(0x7f0000000400)='team\x00') 16:50:03 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x2, 0x0, 0x140080000001) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer2\x00', 0x141080, 0x0) ioctl$UFFDIO_COPY(r2, 0xc028aa03, &(0x7f0000000480)={&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1}) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r3, 0x8991, &(0x7f0000000000)={'bond0\x00', @ifru_names='bond_slave_1\x00'}) ioctl$VIDIOC_ENCODER_CMD(r2, 0xc028564d, &(0x7f0000000680)={0x1, 0x1, [0xfff, 0x100, 0x3ff, 0x40, 0x4000020000, 0xfffffffffffffffb, 0x8, 0x4f]}) ioctl$SNDRV_TIMER_IOCTL_PVERSION(r2, 0x80045400, &(0x7f00000004c0)) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000240)='/dev/full\x00', 0x20a000, 0x0) ioctl$KDSKBSENT(r4, 0x4b49, &(0x7f0000000380)="e2da5cdea423495c8b5663b2d9e462f4e65c25cc8b2ba5e1349cd9ae758d94c045f53f48860fd0b3d8013a69034f6ac0d6e1e98dfe38d2d9e2e2c54d473c67bfa22bbf07fadb6002cda4dd466bf8b4ac1fd7837039b702b9d0fa204a8e5df87c3de67d40844e3ddd3c120aee61b90f3b98210922d8d4271c6df39457ffa88a8a1c33837414408c58e56e3fc11ec40ec466928864d45fe30bbdca4189941c975bc6fe8fb0e6bf8e2a58131d1b5d088066c68b8a6ee0c4e1fea78983de57627ebf6f449a310f966c64391d936f99802fb9320ae1cc") r5 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000016c0)='/dev/sequencer2\x00', 0x40042, 0x0) sendto$inet(r1, &(0x7f00000000c0)="8dec431bb44aff53a310b4eabef65b9ca28574570c8753d962784ce7563c1f448215fd237bf4c9159a98e9205a38a1fef116825d2a67dccc355557378e26b4e71c9ead8245ce8f8727e4d5e348d6b048462955248e97e362bb149adcd5ad849873b82111c2ecfa383140f9d4c99f525041a886277a6592dbc6b9108911e88a440b93f5c0fae544676b44a19bf06aa255a549db9cb0a9221a90f33fec43b1d074bf", 0xa1, 0x1, 0x0, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000580)='fou\x00') sendmsg$FOU_CMD_DEL(r5, &(0x7f0000000640)={&(0x7f0000000540), 0xc, &(0x7f0000000600)={&(0x7f0000000740)=ANY=[@ANYBLOB="000028bd7000fddbdf2502000000080003003b000000080001014e230000"], 0x1}, 0x1, 0x0, 0x0, 0x20044000}, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000300)={&(0x7f00000009c0)=ANY=[@ANYBLOB="524de2d0113d35fab25162fc581bf555250b1f2077eab1ae8d50faa6040b8b376a65970ddb19cbd99e254682073d27e534438e835e8b7395daf99e41c4150d1406e7ed5a54c0d773ee0c19192a1e3662d6459477c422bc9bf3db54d9ea50705096c791e8891e39270a134d1fb8cb789b316877fc0a2aaba86385df8b7a7ee6e073069c76529b1b9ab8bf1585440e6cfd12e89f39c439650afa4d7cbf7938cdd37043d1f09233ea8f02343a456e143b260bdaf82256f2a596a831b17129bac94ab715ff11adf2938c442eb9d7e5dc8cb24227acfc350043b161467bb4509d86b0b983ba81b6a3b25707a10eb8b58482b5d823471e467e7acdd24c29996e6e57e11f7cddfe27fccebfe76a4c82da3399489ce1db4bfc2cf5c462e0cd67b38a1a686f62b7dea1b6c7fb26c34ba57b181db6177b995df422db0b41ceac6e3f11998fe37cedbd5c5a78ec1639e57d98f6bea67191f09d7f0d32421a6630a655367279dc68e779cad323d154b116126f7b0cb10d4d178d3426e9e9ab646f8700000000000000000000000000000000"], 0x1}, 0x1, 0x0, 0x0, 0x8050}, 0x40) r6 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x25d1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$session_to_parent(0x12) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x200) dup2(r6, r5) r7 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0xc81, 0x0) r8 = socket$inet_tcp(0x2, 0x1, 0x0) r9 = syz_open_dev$midi(&(0x7f0000000280)='/dev/midi#\x00', 0x1, 0x40100) getsockopt$inet_pktinfo(r7, 0x0, 0x8, &(0x7f0000000300)={0x0, @remote, @loopback}, &(0x7f00000006c0)=0x4) sendmsg$nl_route(r9, &(0x7f0000000400)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000005c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="06002f5e3f750000"], 0x1}}, 0x4008000) ioctl$sock_proto_private(r3, 0x800896a, &(0x7f0000000780)="039625617620978a4df541244054545eefb285b44d2198c37642636f3bd6084339c6e79154e7a4e1e8a3a316d5a4d756fa828508c3eaae4df2759d4d16de576413772f248c74aae160e44749d604a7af5290efc74ba837ec71ff4bfb5f9a2d51403ecc6b5a4bb2dab710e3367549b45cd0b3fed1c251372400872f340ee3b348964d022f3224519d06adad720a5650c9b04292955ae6fd364adebee641bc911bcdd907f409e8200d95b946789c69b1d8876c") r10 = syz_open_dev$usb(&(0x7f0000000200)='/dev/bus/usb/00#/00#\x00', 0xff, 0x80000) syz_open_dev$sndtimer(&(0x7f0000000900)='/dev/snd/timer\x00', 0x0, 0x200000004083) ioctl$VT_GETMODE(r10, 0x5601, &(0x7f0000000240)) setsockopt$inet_group_source_req(r8, 0x0, 0x2e, &(0x7f0000000000)={0x1, {{0x2, 0x0, @multicast2}}, {{0x2, 0x0, @dev}}}, 0x108) 16:50:03 executing program 3: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000b00)) mount(&(0x7f00000004c0)=ANY=[], &(0x7f000000aff8)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000000)) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000000c0)='tls\x00', 0x4) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$void(0xffffffffffffffff, 0x5450) renameat2(0xffffffffffffffff, &(0x7f0000000180)='./file0/file0\x00', 0xffffffffffffffff, 0x0, 0x4) shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@dev, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@remote}}, 0x0) ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, 0x0) shmctl$IPC_SET(0x0, 0x1, 0x0) ioctl$PIO_FONT(0xffffffffffffffff, 0x4b61, &(0x7f0000000740)="9d705183203ecbbfc0d13a4e30241f7ce01b0b4d7682444a507bfc1ac414339f479986467eb40c8065891e1fbbe7263212c5c09bb47896b3d85893f1173f8a139c116f876fdcc1779bffef8c34b5958981616cbcf39f2d8b43491de452d774a74c3ae9555a45180f7d68da36975781ba3a24694ac85eea975ca104181420baf7f3b9614203b0360e7cc29a1c109e") chdir(&(0x7f0000000340)='./file0\x00') symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) umount2(&(0x7f0000000380)='./file0\x00', 0x3) openat$uinput(0xffffffffffffff9c, &(0x7f0000000440)='/dev/uinput\x00', 0x802, 0x0) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x28, r1, 0x200, 0x70bd25, 0x25dfdbfe, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e24}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x7f}]}, 0x28}}, 0x24048010) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000a40)={&(0x7f0000000580)=@ll={0x11, 0xfd, r0, 0x1, 0x8, 0x6, @dev={[], 0x16}}, 0x80, &(0x7f00000009c0)=[{&(0x7f00000008c0)="367a9f0d4a1564359d1e668c63869bb9bf3b7f5aa4030462889dd6407207295cea1b36e07bc2b38b11c6ca28a73515cf52d89a8199d5c019de826c756a31bac24f707efcfc0a2383216dccc08f804551f0a56d2c9ab95a113fa74dff88ccccc7f278200aa03d2349e688b69191611739bb3e2e5ff110c5858c1a7c5bd5431f9c8e73a99236728f125d5f52a2b0761872fc0fc53cda5458241b2a80fd918b21c8029039d416a6cde6aa786bdfaa21a4e5ffa5f80dec422e0051c7e98a8cff2f4afbe25ca5a154a57c10", 0xc9}], 0x1}, 0x4004000) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f00000001c0)={0x0, 0x4, 0x2, 0x3, 0x1}, 0x14) ioctl$VIDIOC_SUBDEV_S_SELECTION(0xffffffffffffffff, 0xc040563e, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x7) msgget(0x1, 0x318) syz_genetlink_get_family_id$team(&(0x7f0000000400)='team\x00') 16:50:03 executing program 1: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000b00)) mount(&(0x7f00000004c0)=ANY=[], &(0x7f000000aff8)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000000)) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000000c0)='tls\x00', 0x4) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) renameat2(r0, &(0x7f0000000180)='./file0/file0\x00', 0xffffffffffffffff, 0x0, 0x4) shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@dev, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@remote}}, 0x0) ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, 0x0) shmctl$IPC_SET(0x0, 0x1, 0x0) ioctl$PIO_FONT(r0, 0x4b61, &(0x7f0000000740)="9d705183203ecbbfc0d13a4e30241f7ce01b0b4d7682444a507bfc1ac414339f479986467eb40c8065891e1fbbe7263212c5c09bb47896b3d85893f1173f8a139c116f876fdcc1779bffef8c34b5958981616cbcf39f2d8b43491de452d774a74c3ae9555a45180f7d68da36975781ba3a24694ac85eea975ca104181420baf7f3b9614203b0360e7cc29a1c109e") chdir(&(0x7f0000000340)='./file0\x00') symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) umount2(&(0x7f0000000380)='./file0\x00', 0x3) openat$uinput(0xffffffffffffff9c, &(0x7f0000000440)='/dev/uinput\x00', 0x802, 0x0) r3 = syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') sendmsg$FOU_CMD_DEL(r1, &(0x7f00000002c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x28, r3, 0x200, 0x70bd25, 0x25dfdbfe, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e24}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x7f}]}, 0x28}}, 0x24048010) sendmsg$kcm(r0, &(0x7f0000000a40)={&(0x7f0000000580)=@ll={0x11, 0xfd, r2, 0x1, 0x8, 0x6, @dev={[], 0x16}}, 0x80, &(0x7f00000009c0)=[{&(0x7f00000008c0)="367a9f0d4a1564359d1e668c63869bb9bf3b7f5aa4030462889dd6407207295cea1b36e07bc2b38b11c6ca28a73515cf52d89a8199d5c019de826c756a31bac24f707efcfc0a2383216dccc08f804551f0a56d2c9ab95a113fa74dff88ccccc7f278200aa03d2349e688b69191611739bb3e2e5ff110c5858c1a7c5bd5431f9c8e73a99236728f125d5f52a2b0761872fc0fc53cda5458241b2a80fd918b21c8029039d416a6cde6aa786bdfaa21a4e5ffa5f80dec422e0051c7e98a8cff2f4afbe25ca5a154a57c10", 0xc9}], 0x1}, 0x4004000) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000001c0)={0x0, 0x4, 0x2, 0x3, 0x1}, 0x14) ioctl$VIDIOC_SUBDEV_S_SELECTION(r0, 0xc040563e, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x7) msgget(0x1, 0x318) syz_genetlink_get_family_id$team(&(0x7f0000000400)='team\x00') 16:50:03 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x402000, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhci\x00', 0x246) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000040)={0x4, 0x40204, "11f4020e5853caee7c747bc2fe1eb8a78be89dbe98c34d5e", {0xffffffffffff7fff, 0x6}, 0x5}) write$P9_RLERRORu(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff01"], 0x2) read$eventfd(r1, 0x0, 0x5b) 16:50:03 executing program 2: r0 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'hsr0\x00', 0x0}) bind$packet(r0, &(0x7f0000000340)={0x11, 0x0, r1}, 0x14) sendto(r0, &(0x7f00000000c0)="e360b641b37f003f000000000066", 0xe, 0x0, 0x0, 0x0) 16:50:03 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=ANY=[@ANYBLOB="020400000c00000000000000000000000200010000000000000000000000000005000600000000000a00000000000000ff0200000000000000000000000000010000100000000000030005000000000002000000e00000010000000000000000"], 0x60}}, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/autofs\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r1, 0x5387, &(0x7f00000000c0)) 16:50:03 executing program 3: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000b00)) mount(&(0x7f00000004c0)=ANY=[], &(0x7f000000aff8)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000000)) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000000c0)='tls\x00', 0x4) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$void(r1, 0x5450) renameat2(r0, &(0x7f0000000180)='./file0/file0\x00', 0xffffffffffffffff, 0x0, 0x4) shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@dev, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@remote}}, 0x0) ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, 0x0) shmctl$IPC_SET(0x0, 0x1, 0x0) ioctl$PIO_FONT(r0, 0x4b61, &(0x7f0000000740)="9d705183203ecbbfc0d13a4e30241f7ce01b0b4d7682444a507bfc1ac414339f479986467eb40c8065891e1fbbe7263212c5c09bb47896b3d85893f1173f8a139c116f876fdcc1779bffef8c34b5958981616cbcf39f2d8b43491de452d774a74c3ae9555a45180f7d68da36975781ba3a24694ac85eea975ca104181420baf7f3b9614203b0360e7cc29a1c109e") chdir(&(0x7f0000000340)='./file0\x00') symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) umount2(&(0x7f0000000380)='./file0\x00', 0x3) openat$uinput(0xffffffffffffff9c, &(0x7f0000000440)='/dev/uinput\x00', 0x802, 0x0) r3 = syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') sendmsg$FOU_CMD_DEL(r1, &(0x7f00000002c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x28, r3, 0x200, 0x70bd25, 0x25dfdbfe, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e24}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x7f}]}, 0x28}}, 0x24048010) sendmsg$kcm(r0, &(0x7f0000000a40)={&(0x7f0000000580)=@ll={0x11, 0xfd, r2, 0x1, 0x8, 0x6, @dev={[], 0x16}}, 0x80, &(0x7f00000009c0)=[{&(0x7f00000008c0)="367a9f0d4a1564359d1e668c63869bb9bf3b7f5aa4030462889dd6407207295cea1b36e07bc2b38b11c6ca28a73515cf52d89a8199d5c019de826c756a31bac24f707efcfc0a2383216dccc08f804551f0a56d2c9ab95a113fa74dff88ccccc7f278200aa03d2349e688b69191611739bb3e2e5ff110c5858c1a7c5bd5431f9c8e73a99236728f125d5f52a2b0761872fc0fc53cda5458241b2a80fd918b21c8029039d416a6cde6aa786bdfaa21a4e5ffa5f80dec422e0051c7e98a8cff2f4afbe25ca5a154a57c10", 0xc9}], 0x1}, 0x4004000) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000001c0)={0x0, 0x4, 0x2, 0x3, 0x1}, 0x14) ioctl$VIDIOC_SUBDEV_S_SELECTION(r0, 0xc040563e, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x7) msgget(0x1, 0x318) syz_genetlink_get_family_id$team(&(0x7f0000000400)='team\x00') 16:50:03 executing program 5: socketpair$tipc(0x1e, 0x4, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) fsetxattr$security_smack_transmute(r0, &(0x7f0000000140)='security.SMACK64TRANSMUTE\x00', &(0x7f00000001c0)='TRUE', 0x4, 0x3) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x200, 0x0) ioctl$KDSETLED(r1, 0x4b32, 0x3) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(r1, 0xc0a85322, &(0x7f0000000040)) ioctl$SCSI_IOCTL_GET_IDLUN(r1, 0x5382, &(0x7f0000000100)) sendmmsg(r0, &(0x7f0000000d40)=[{{0x0, 0x0, 0x0}}, {{&(0x7f00000005c0)=@tipc, 0x80, 0x0}}], 0x2, 0x0) 16:50:03 executing program 3: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000b00)) mount(&(0x7f00000004c0)=ANY=[], &(0x7f000000aff8)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000000)) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000000c0)='tls\x00', 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$void(r1, 0x5450) renameat2(r0, &(0x7f0000000180)='./file0/file0\x00', 0xffffffffffffffff, 0x0, 0x4) shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@dev, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@remote}}, 0x0) ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, 0x0) shmctl$IPC_SET(0x0, 0x1, 0x0) ioctl$PIO_FONT(r0, 0x4b61, &(0x7f0000000740)="9d705183203ecbbfc0d13a4e30241f7ce01b0b4d7682444a507bfc1ac414339f479986467eb40c8065891e1fbbe7263212c5c09bb47896b3d85893f1173f8a139c116f876fdcc1779bffef8c34b5958981616cbcf39f2d8b43491de452d774a74c3ae9555a45180f7d68da36975781ba3a24694ac85eea975ca104181420baf7f3b9614203b0360e7cc29a1c109e") chdir(&(0x7f0000000340)='./file0\x00') symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) umount2(&(0x7f0000000380)='./file0\x00', 0x3) openat$uinput(0xffffffffffffff9c, &(0x7f0000000440)='/dev/uinput\x00', 0x802, 0x0) r3 = syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') sendmsg$FOU_CMD_DEL(r1, &(0x7f00000002c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x28, r3, 0x200, 0x70bd25, 0x25dfdbfe, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e24}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x7f}]}, 0x28}}, 0x24048010) sendmsg$kcm(r0, &(0x7f0000000a40)={&(0x7f0000000580)=@ll={0x11, 0xfd, r2, 0x1, 0x8, 0x6, @dev={[], 0x16}}, 0x80, &(0x7f00000009c0)=[{&(0x7f00000008c0)="367a9f0d4a1564359d1e668c63869bb9bf3b7f5aa4030462889dd6407207295cea1b36e07bc2b38b11c6ca28a73515cf52d89a8199d5c019de826c756a31bac24f707efcfc0a2383216dccc08f804551f0a56d2c9ab95a113fa74dff88ccccc7f278200aa03d2349e688b69191611739bb3e2e5ff110c5858c1a7c5bd5431f9c8e73a99236728f125d5f52a2b0761872fc0fc53cda5458241b2a80fd918b21c8029039d416a6cde6aa786bdfaa21a4e5ffa5f80dec422e0051c7e98a8cff2f4afbe25ca5a154a57c10", 0xc9}], 0x1}, 0x4004000) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000001c0)={0x0, 0x4, 0x2, 0x3, 0x1}, 0x14) ioctl$VIDIOC_SUBDEV_S_SELECTION(r0, 0xc040563e, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x7) msgget(0x1, 0x318) syz_genetlink_get_family_id$team(&(0x7f0000000400)='team\x00') [ 307.550300] protocol 88fb is buggy, dev hsr_slave_0 [ 307.555472] protocol 88fb is buggy, dev hsr_slave_1 [ 307.630396] protocol 88fb is buggy, dev hsr_slave_0 [ 307.635523] protocol 88fb is buggy, dev hsr_slave_1 [ 307.870283] protocol 88fb is buggy, dev hsr_slave_0 [ 307.876221] protocol 88fb is buggy, dev hsr_slave_1 16:50:06 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x4000000000000036) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={@mcast1, @local, @local, 0x80000000, 0x0, 0x0, 0x200800000000114}) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x21, r0, 0x0, 0x0) 16:50:06 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'sit0\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={&(0x7f0000000000), 0xc, &(0x7f0000000180)={&(0x7f0000000200)=ANY=[@ANYBLOB="3400000005000000000000000000000000f8b618", @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000c000100636f64656c00000004000200"], 0x34}}, 0x0) 16:50:06 executing program 2: r0 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'hsr0\x00', 0x0}) bind$packet(r0, &(0x7f0000000340)={0x11, 0x0, r1}, 0x14) sendto(r0, &(0x7f00000000c0)="e360b641b37f8847000000000066", 0xe, 0x0, 0x0, 0x0) 16:50:06 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r0, 0x4058534c, &(0x7f00000000c0)={0x80, 0x0, 0xc8}) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x80000, 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DEST(r1, &(0x7f0000000280)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1000000c}, 0xc, &(0x7f0000000240)={&(0x7f0000000180)={0xa8, r2, 0xe08, 0x70bd25, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_SERVICE={0xc, 0x1, [@IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x4}]}, @IPVS_CMD_ATTR_DEST={0x50, 0x2, [@IPVS_DEST_ATTR_ADDR_FAMILY={0x8}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x100000000}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x1}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@empty}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x189f}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e20}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0xfffffffffffffffb}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0xab7c}]}, @IPVS_CMD_ATTR_DAEMON={0x38, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast1}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x8}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x6}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e23}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x3ff}]}]}, 0xa8}, 0x1, 0x0, 0x0, 0x24000090}, 0x8000) 16:50:06 executing program 3: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000b00)) mount(&(0x7f00000004c0)=ANY=[], &(0x7f000000aff8)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000000)) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$void(r1, 0x5450) renameat2(r0, &(0x7f0000000180)='./file0/file0\x00', 0xffffffffffffffff, 0x0, 0x4) shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@dev, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@remote}}, 0x0) ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, 0x0) shmctl$IPC_SET(0x0, 0x1, 0x0) ioctl$PIO_FONT(r0, 0x4b61, &(0x7f0000000740)="9d705183203ecbbfc0d13a4e30241f7ce01b0b4d7682444a507bfc1ac414339f479986467eb40c8065891e1fbbe7263212c5c09bb47896b3d85893f1173f8a139c116f876fdcc1779bffef8c34b5958981616cbcf39f2d8b43491de452d774a74c3ae9555a45180f7d68da36975781ba3a24694ac85eea975ca104181420baf7f3b9614203b0360e7cc29a1c109e") chdir(&(0x7f0000000340)='./file0\x00') symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) umount2(&(0x7f0000000380)='./file0\x00', 0x3) openat$uinput(0xffffffffffffff9c, &(0x7f0000000440)='/dev/uinput\x00', 0x802, 0x0) r3 = syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') sendmsg$FOU_CMD_DEL(r1, &(0x7f00000002c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x28, r3, 0x200, 0x70bd25, 0x25dfdbfe, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e24}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x7f}]}, 0x28}}, 0x24048010) sendmsg$kcm(r0, &(0x7f0000000a40)={&(0x7f0000000580)=@ll={0x11, 0xfd, r2, 0x1, 0x8, 0x6, @dev={[], 0x16}}, 0x80, &(0x7f00000009c0)=[{&(0x7f00000008c0)="367a9f0d4a1564359d1e668c63869bb9bf3b7f5aa4030462889dd6407207295cea1b36e07bc2b38b11c6ca28a73515cf52d89a8199d5c019de826c756a31bac24f707efcfc0a2383216dccc08f804551f0a56d2c9ab95a113fa74dff88ccccc7f278200aa03d2349e688b69191611739bb3e2e5ff110c5858c1a7c5bd5431f9c8e73a99236728f125d5f52a2b0761872fc0fc53cda5458241b2a80fd918b21c8029039d416a6cde6aa786bdfaa21a4e5ffa5f80dec422e0051c7e98a8cff2f4afbe25ca5a154a57c10", 0xc9}], 0x1}, 0x4004000) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000001c0)={0x0, 0x4, 0x2, 0x3, 0x1}, 0x14) ioctl$VIDIOC_SUBDEV_S_SELECTION(r0, 0xc040563e, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x7) msgget(0x1, 0x318) syz_genetlink_get_family_id$team(&(0x7f0000000400)='team\x00') 16:50:06 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$VIDIOC_ENUM_FREQ_BANDS(r0, 0xc0405665, &(0x7f0000000000)={0xedac, 0x5, 0x6, 0x870, 0xfffffffffffffffd, 0xb0b2e5e, 0xa}) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/4\x00') preadv(r1, &(0x7f0000000480), 0x10000000000001ed, 0x0) stat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setfsgid(r2) [ 311.710264] net_ratelimit: 22 callbacks suppressed [ 311.710270] protocol 88fb is buggy, dev hsr_slave_0 [ 311.720438] protocol 88fb is buggy, dev hsr_slave_1 [ 311.791098] protocol 88fb is buggy, dev hsr_slave_0 [ 311.796199] protocol 88fb is buggy, dev hsr_slave_1 [ 312.030274] protocol 88fb is buggy, dev hsr_slave_0 [ 312.035378] protocol 88fb is buggy, dev hsr_slave_1 [ 312.110346] protocol 88fb is buggy, dev hsr_slave_0 [ 312.115549] protocol 88fb is buggy, dev hsr_slave_1 [ 312.510270] protocol 88fb is buggy, dev hsr_slave_0 [ 312.515434] protocol 88fb is buggy, dev hsr_slave_1 [ 317.070369] net_ratelimit: 28 callbacks suppressed [ 317.075354] protocol 88fb is buggy, dev hsr_slave_0 [ 317.080445] protocol 88fb is buggy, dev hsr_slave_1 [ 317.150400] protocol 88fb is buggy, dev hsr_slave_0 [ 317.155493] protocol 88fb is buggy, dev hsr_slave_1 16:50:13 executing program 3: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000b00)) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000000c0)='tls\x00', 0x4) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$void(r1, 0x5450) renameat2(r0, &(0x7f0000000180)='./file0/file0\x00', 0xffffffffffffffff, 0x0, 0x4) shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@dev, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@remote}}, 0x0) ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, 0x0) shmctl$IPC_SET(0x0, 0x1, 0x0) ioctl$PIO_FONT(r0, 0x4b61, &(0x7f0000000740)="9d705183203ecbbfc0d13a4e30241f7ce01b0b4d7682444a507bfc1ac414339f479986467eb40c8065891e1fbbe7263212c5c09bb47896b3d85893f1173f8a139c116f876fdcc1779bffef8c34b5958981616cbcf39f2d8b43491de452d774a74c3ae9555a45180f7d68da36975781ba3a24694ac85eea975ca104181420baf7f3b9614203b0360e7cc29a1c109e") chdir(&(0x7f0000000340)='./file0\x00') symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) umount2(&(0x7f0000000380)='./file0\x00', 0x3) openat$uinput(0xffffffffffffff9c, &(0x7f0000000440)='/dev/uinput\x00', 0x802, 0x0) r3 = syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') sendmsg$FOU_CMD_DEL(r1, &(0x7f00000002c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x28, r3, 0x200, 0x70bd25, 0x25dfdbfe, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e24}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x7f}]}, 0x28}}, 0x24048010) sendmsg$kcm(r0, &(0x7f0000000a40)={&(0x7f0000000580)=@ll={0x11, 0xfd, r2, 0x1, 0x8, 0x6, @dev={[], 0x16}}, 0x80, &(0x7f00000009c0)=[{&(0x7f00000008c0)="367a9f0d4a1564359d1e668c63869bb9bf3b7f5aa4030462889dd6407207295cea1b36e07bc2b38b11c6ca28a73515cf52d89a8199d5c019de826c756a31bac24f707efcfc0a2383216dccc08f804551f0a56d2c9ab95a113fa74dff88ccccc7f278200aa03d2349e688b69191611739bb3e2e5ff110c5858c1a7c5bd5431f9c8e73a99236728f125d5f52a2b0761872fc0fc53cda5458241b2a80fd918b21c8029039d416a6cde6aa786bdfaa21a4e5ffa5f80dec422e0051c7e98a8cff2f4afbe25ca5a154a57c10", 0xc9}], 0x1}, 0x4004000) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000001c0)={0x0, 0x4, 0x2, 0x3, 0x1}, 0x14) ioctl$VIDIOC_SUBDEV_S_SELECTION(r0, 0xc040563e, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x7) msgget(0x1, 0x318) syz_genetlink_get_family_id$team(&(0x7f0000000400)='team\x00') 16:50:13 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = dup3(r1, r0, 0x0) sendmsg$nl_route(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000100)=@ipv6_getnetconf={0x14, 0x52, 0x50d}, 0x14}}, 0x0) 16:50:13 executing program 2: r0 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'hsr0\x00', 0x0}) bind$packet(r0, &(0x7f0000000340)={0x11, 0x0, r1}, 0x14) sendto(r0, &(0x7f00000000c0)="e360b641b37f0e00000000000066", 0xe, 0x0, 0x0, 0x0) 16:50:13 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_rx_ring(r1, 0x107, 0x5, &(0x7f0000000080)=@req={0x10000, 0xea5f, 0x100000000, 0x80}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) fsetxattr$security_capability(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000ad7000)={0x1, &(0x7f0000acbff8)=[{0x6, 0x0, 0x0, 0x6}]}, 0x10) bind$inet6(r0, &(0x7f0000807fe4)={0xa, 0x4e22}, 0x1c) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f00000000c0)={{{@in6=@mcast2, @in=@multicast1}}, {{@in=@multicast1}, 0x0, @in6=@local}}, &(0x7f0000000000)=0xe8) r2 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x200408d4, &(0x7f000072e000)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, 0x0, 0x0) r3 = dup2(r0, r0) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, 0x0) sendto$inet6(r0, &(0x7f0000ad6fad)='\x00', 0x1, 0x3fffffd, 0x0, 0x0) poll(&(0x7f0000000040)=[{r3}], 0x1, 0x400000000e3) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r2, 0x84, 0x18, &(0x7f00000001c0)={0x0, 0x9}, &(0x7f0000000200)=0x8) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r2, 0x84, 0x66, &(0x7f0000000240)={r4, 0x9f1}, &(0x7f0000000280)=0x8) dup2(r1, r0) 16:50:13 executing program 0: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000b00)) mount(&(0x7f00000004c0)=ANY=[], &(0x7f000000aff8)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000000)) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$void(r1, 0x5450) renameat2(r0, &(0x7f0000000180)='./file0/file0\x00', 0xffffffffffffffff, 0x0, 0x4) shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@dev, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@remote}}, 0x0) ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, 0x0) shmctl$IPC_SET(0x0, 0x1, 0x0) ioctl$PIO_FONT(r0, 0x4b61, &(0x7f0000000740)="9d705183203ecbbfc0d13a4e30241f7ce01b0b4d7682444a507bfc1ac414339f479986467eb40c8065891e1fbbe7263212c5c09bb47896b3d85893f1173f8a139c116f876fdcc1779bffef8c34b5958981616cbcf39f2d8b43491de452d774a74c3ae9555a45180f7d68da36975781ba3a24694ac85eea975ca104181420baf7f3b9614203b0360e7cc29a1c109e") chdir(&(0x7f0000000340)='./file0\x00') symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) umount2(&(0x7f0000000380)='./file0\x00', 0x3) openat$uinput(0xffffffffffffff9c, &(0x7f0000000440)='/dev/uinput\x00', 0x802, 0x0) r3 = syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') sendmsg$FOU_CMD_DEL(r1, &(0x7f00000002c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x28, r3, 0x200, 0x70bd25, 0x25dfdbfe, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e24}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x7f}]}, 0x28}}, 0x24048010) sendmsg$kcm(r0, &(0x7f0000000a40)={&(0x7f0000000580)=@ll={0x11, 0xfd, r2, 0x1, 0x8, 0x6, @dev={[], 0x16}}, 0x80, &(0x7f00000009c0)=[{&(0x7f00000008c0)="367a9f0d4a1564359d1e668c63869bb9bf3b7f5aa4030462889dd6407207295cea1b36e07bc2b38b11c6ca28a73515cf52d89a8199d5c019de826c756a31bac24f707efcfc0a2383216dccc08f804551f0a56d2c9ab95a113fa74dff88ccccc7f278200aa03d2349e688b69191611739bb3e2e5ff110c5858c1a7c5bd5431f9c8e73a99236728f125d5f52a2b0761872fc0fc53cda5458241b2a80fd918b21c8029039d416a6cde6aa786bdfaa21a4e5ffa5f80dec422e0051c7e98a8cff2f4afbe25ca5a154a57c10", 0xc9}], 0x1}, 0x4004000) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000001c0)={0x0, 0x4, 0x2, 0x3, 0x1}, 0x14) ioctl$VIDIOC_SUBDEV_S_SELECTION(r0, 0xc040563e, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x7) msgget(0x1, 0x318) syz_genetlink_get_family_id$team(&(0x7f0000000400)='team\x00') 16:50:13 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x4000000000000036) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={@mcast1, @local, @local, 0x80000000, 0x0, 0x0, 0x200800000000114}) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x21, r0, 0x0, 0x0) 16:50:13 executing program 2: r0 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'hsr0\x00', 0x0}) bind$packet(r0, &(0x7f0000000340)={0x11, 0x0, r1}, 0x14) sendto(r0, &(0x7f00000000c0)="e360b641b37f0000358000000066", 0xe, 0x0, 0x0, 0x0) 16:50:13 executing program 1: socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r0 = socket$inet6(0xa, 0x80002, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x80003, 0x6) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x19, 0x0, 0x0) r1 = creat(&(0x7f0000000440)='./file0\x00', 0x0) clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='cgroup2\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000200)={0x0, 0x0}) ioctl$VT_RESIZE(r1, 0x5609, &(0x7f00000001c0)) getsockopt$bt_hci(0xffffffffffffffff, 0x0, 0x2, 0x0, &(0x7f00000000c0)) mincore(&(0x7f00003fc000/0xc00000)=nil, 0xc00000, 0x0) read(r0, &(0x7f0000000900)=""/4096, 0x1000) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$getownex(r2, 0x10, 0x0) ioctl$sock_FIOSETOWN(r1, 0x8901, &(0x7f0000000180)) 16:50:13 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="02030609100000000000004c9e0000000200130002000000000000000000000105000600200000000a00000000000000000500e50000070000001f000000000000030000000000000200010000000000000000020000000005000500000000000a00000000000000ff1700000000000000000000000000170000000000000000"], 0x80}}, 0x0) sendmmsg(r0, &(0x7f0000000180), 0x400000000000117, 0x0) 16:50:13 executing program 3: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(&(0x7f00000004c0)=ANY=[], &(0x7f000000aff8)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000000)) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000000c0)='tls\x00', 0x4) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$void(r1, 0x5450) renameat2(r0, &(0x7f0000000180)='./file0/file0\x00', 0xffffffffffffffff, 0x0, 0x4) shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@dev, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@remote}}, 0x0) ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, 0x0) shmctl$IPC_SET(0x0, 0x1, 0x0) ioctl$PIO_FONT(r0, 0x4b61, &(0x7f0000000740)="9d705183203ecbbfc0d13a4e30241f7ce01b0b4d7682444a507bfc1ac414339f479986467eb40c8065891e1fbbe7263212c5c09bb47896b3d85893f1173f8a139c116f876fdcc1779bffef8c34b5958981616cbcf39f2d8b43491de452d774a74c3ae9555a45180f7d68da36975781ba3a24694ac85eea975ca104181420baf7f3b9614203b0360e7cc29a1c109e") chdir(&(0x7f0000000340)='./file0\x00') symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) umount2(&(0x7f0000000380)='./file0\x00', 0x3) openat$uinput(0xffffffffffffff9c, &(0x7f0000000440)='/dev/uinput\x00', 0x802, 0x0) r3 = syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') sendmsg$FOU_CMD_DEL(r1, &(0x7f00000002c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x28, r3, 0x200, 0x70bd25, 0x25dfdbfe, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e24}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x7f}]}, 0x28}}, 0x24048010) sendmsg$kcm(r0, &(0x7f0000000a40)={&(0x7f0000000580)=@ll={0x11, 0xfd, r2, 0x1, 0x8, 0x6, @dev={[], 0x16}}, 0x80, &(0x7f00000009c0)=[{&(0x7f00000008c0)="367a9f0d4a1564359d1e668c63869bb9bf3b7f5aa4030462889dd6407207295cea1b36e07bc2b38b11c6ca28a73515cf52d89a8199d5c019de826c756a31bac24f707efcfc0a2383216dccc08f804551f0a56d2c9ab95a113fa74dff88ccccc7f278200aa03d2349e688b69191611739bb3e2e5ff110c5858c1a7c5bd5431f9c8e73a99236728f125d5f52a2b0761872fc0fc53cda5458241b2a80fd918b21c8029039d416a6cde6aa786bdfaa21a4e5ffa5f80dec422e0051c7e98a8cff2f4afbe25ca5a154a57c10", 0xc9}], 0x1}, 0x4004000) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000001c0)={0x0, 0x4, 0x2, 0x3, 0x1}, 0x14) ioctl$VIDIOC_SUBDEV_S_SELECTION(r0, 0xc040563e, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x7) msgget(0x1, 0x318) syz_genetlink_get_family_id$team(&(0x7f0000000400)='team\x00') 16:50:13 executing program 2: r0 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'hsr0\x00', 0x0}) bind$packet(r0, &(0x7f0000000340)={0x11, 0x0, r1}, 0x14) sendto(r0, &(0x7f00000000c0)="e360b641b37fffffdd8600000066", 0xe, 0x0, 0x0, 0x0) 16:50:13 executing program 1: socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r0 = socket$inet6(0xa, 0x80002, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x80003, 0x6) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x19, 0x0, 0x0) r1 = creat(&(0x7f0000000440)='./file0\x00', 0x0) clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='cgroup2\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000200)={0x0, 0x0}) ioctl$VT_RESIZE(r1, 0x5609, &(0x7f00000001c0)) getsockopt$bt_hci(0xffffffffffffffff, 0x0, 0x2, 0x0, &(0x7f00000000c0)) mincore(&(0x7f00003fc000/0xc00000)=nil, 0xc00000, 0x0) read(r0, &(0x7f0000000900)=""/4096, 0x1000) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$getownex(r2, 0x10, 0x0) ioctl$sock_FIOSETOWN(r1, 0x8901, &(0x7f0000000180)) [ 317.950297] protocol 88fb is buggy, dev hsr_slave_0 [ 317.955518] protocol 88fb is buggy, dev hsr_slave_1 16:50:13 executing program 5: socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r0 = socket$inet6(0xa, 0x80002, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x80003, 0x6) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x19, 0x0, 0x0) r1 = creat(&(0x7f0000000440)='./file0\x00', 0x0) clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='cgroup2\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000200)={0x0, 0x0}) ioctl$VT_RESIZE(r1, 0x5609, &(0x7f00000001c0)) getsockopt$bt_hci(0xffffffffffffffff, 0x0, 0x2, 0x0, &(0x7f00000000c0)) mincore(&(0x7f00003fc000/0xc00000)=nil, 0xc00000, 0x0) read(r0, &(0x7f0000000900)=""/4096, 0x1000) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$getownex(r2, 0x10, 0x0) ioctl$sock_FIOSETOWN(r1, 0x8901, &(0x7f0000000180)) 16:50:13 executing program 3: ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000b00)) mount(&(0x7f00000004c0)=ANY=[], &(0x7f000000aff8)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000000)) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000000c0)='tls\x00', 0x4) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$void(r1, 0x5450) renameat2(r0, &(0x7f0000000180)='./file0/file0\x00', 0xffffffffffffffff, 0x0, 0x4) shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@dev, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@remote}}, 0x0) ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, 0x0) shmctl$IPC_SET(0x0, 0x1, 0x0) ioctl$PIO_FONT(r0, 0x4b61, &(0x7f0000000740)="9d705183203ecbbfc0d13a4e30241f7ce01b0b4d7682444a507bfc1ac414339f479986467eb40c8065891e1fbbe7263212c5c09bb47896b3d85893f1173f8a139c116f876fdcc1779bffef8c34b5958981616cbcf39f2d8b43491de452d774a74c3ae9555a45180f7d68da36975781ba3a24694ac85eea975ca104181420baf7f3b9614203b0360e7cc29a1c109e") chdir(&(0x7f0000000340)='./file0\x00') symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) umount2(&(0x7f0000000380)='./file0\x00', 0x3) openat$uinput(0xffffffffffffff9c, &(0x7f0000000440)='/dev/uinput\x00', 0x802, 0x0) r3 = syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') sendmsg$FOU_CMD_DEL(r1, &(0x7f00000002c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x28, r3, 0x200, 0x70bd25, 0x25dfdbfe, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e24}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x7f}]}, 0x28}}, 0x24048010) sendmsg$kcm(r0, &(0x7f0000000a40)={&(0x7f0000000580)=@ll={0x11, 0xfd, r2, 0x1, 0x8, 0x6, @dev={[], 0x16}}, 0x80, &(0x7f00000009c0)=[{&(0x7f00000008c0)="367a9f0d4a1564359d1e668c63869bb9bf3b7f5aa4030462889dd6407207295cea1b36e07bc2b38b11c6ca28a73515cf52d89a8199d5c019de826c756a31bac24f707efcfc0a2383216dccc08f804551f0a56d2c9ab95a113fa74dff88ccccc7f278200aa03d2349e688b69191611739bb3e2e5ff110c5858c1a7c5bd5431f9c8e73a99236728f125d5f52a2b0761872fc0fc53cda5458241b2a80fd918b21c8029039d416a6cde6aa786bdfaa21a4e5ffa5f80dec422e0051c7e98a8cff2f4afbe25ca5a154a57c10", 0xc9}], 0x1}, 0x4004000) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000001c0)={0x0, 0x4, 0x2, 0x3, 0x1}, 0x14) ioctl$VIDIOC_SUBDEV_S_SELECTION(r0, 0xc040563e, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x7) msgget(0x1, 0x318) syz_genetlink_get_family_id$team(&(0x7f0000000400)='team\x00') [ 318.030277] protocol 88fb is buggy, dev hsr_slave_0 [ 318.035366] protocol 88fb is buggy, dev hsr_slave_1 16:50:13 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000044ff8)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x4924924924922c9, 0x10000000000040) connect$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(r0, &(0x7f0000681000)=@abs, 0x8) 16:50:13 executing program 2: r0 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'hsr0\x00', 0x0}) bind$packet(r0, &(0x7f0000000340)={0x11, 0x0, r1}, 0x14) sendto(r0, &(0x7f00000000c0)="e360b641b37f0000000200000066", 0xe, 0x0, 0x0, 0x0) 16:50:13 executing program 5: socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r0 = socket$inet6(0xa, 0x80002, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x80003, 0x6) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x19, 0x0, 0x0) r1 = creat(&(0x7f0000000440)='./file0\x00', 0x0) clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='cgroup2\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000200)={0x0, 0x0}) ioctl$VT_RESIZE(r1, 0x5609, &(0x7f00000001c0)) getsockopt$bt_hci(0xffffffffffffffff, 0x0, 0x2, 0x0, &(0x7f00000000c0)) mincore(&(0x7f00003fc000/0xc00000)=nil, 0xc00000, 0x0) read(r0, &(0x7f0000000900)=""/4096, 0x1000) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$getownex(r2, 0x10, 0x0) ioctl$sock_FIOSETOWN(r1, 0x8901, &(0x7f0000000180)) [ 318.270255] protocol 88fb is buggy, dev hsr_slave_0 [ 318.275378] protocol 88fb is buggy, dev hsr_slave_1 16:50:16 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x4000000000000036) ptrace$cont(0x18, 0x0, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={@mcast1, @local, @local, 0x80000000, 0x0, 0x0, 0x200800000000114}) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x21, r0, 0x0, 0x0) 16:50:16 executing program 5: socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r0 = socket$inet6(0xa, 0x80002, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x80003, 0x6) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x19, 0x0, 0x0) r1 = creat(&(0x7f0000000440)='./file0\x00', 0x0) clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='cgroup2\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000200)={0x0, 0x0}) ioctl$VT_RESIZE(r1, 0x5609, &(0x7f00000001c0)) getsockopt$bt_hci(0xffffffffffffffff, 0x0, 0x2, 0x0, &(0x7f00000000c0)) mincore(&(0x7f00003fc000/0xc00000)=nil, 0xc00000, 0x0) read(r0, &(0x7f0000000900)=""/4096, 0x1000) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$getownex(r2, 0x10, 0x0) ioctl$sock_FIOSETOWN(r1, 0x8901, &(0x7f0000000180)) 16:50:16 executing program 3: mkdir(0x0, 0x0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000b00)) mount(&(0x7f00000004c0)=ANY=[], &(0x7f000000aff8)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000000)) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000000c0)='tls\x00', 0x4) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$void(r1, 0x5450) renameat2(r0, &(0x7f0000000180)='./file0/file0\x00', 0xffffffffffffffff, 0x0, 0x4) shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@dev, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@remote}}, 0x0) ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, 0x0) shmctl$IPC_SET(0x0, 0x1, 0x0) ioctl$PIO_FONT(r0, 0x4b61, &(0x7f0000000740)="9d705183203ecbbfc0d13a4e30241f7ce01b0b4d7682444a507bfc1ac414339f479986467eb40c8065891e1fbbe7263212c5c09bb47896b3d85893f1173f8a139c116f876fdcc1779bffef8c34b5958981616cbcf39f2d8b43491de452d774a74c3ae9555a45180f7d68da36975781ba3a24694ac85eea975ca104181420baf7f3b9614203b0360e7cc29a1c109e") chdir(&(0x7f0000000340)='./file0\x00') symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) umount2(&(0x7f0000000380)='./file0\x00', 0x3) openat$uinput(0xffffffffffffff9c, &(0x7f0000000440)='/dev/uinput\x00', 0x802, 0x0) r3 = syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') sendmsg$FOU_CMD_DEL(r1, &(0x7f00000002c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x28, r3, 0x200, 0x70bd25, 0x25dfdbfe, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e24}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x7f}]}, 0x28}}, 0x24048010) sendmsg$kcm(r0, &(0x7f0000000a40)={&(0x7f0000000580)=@ll={0x11, 0xfd, r2, 0x1, 0x8, 0x6, @dev={[], 0x16}}, 0x80, &(0x7f00000009c0)=[{&(0x7f00000008c0)="367a9f0d4a1564359d1e668c63869bb9bf3b7f5aa4030462889dd6407207295cea1b36e07bc2b38b11c6ca28a73515cf52d89a8199d5c019de826c756a31bac24f707efcfc0a2383216dccc08f804551f0a56d2c9ab95a113fa74dff88ccccc7f278200aa03d2349e688b69191611739bb3e2e5ff110c5858c1a7c5bd5431f9c8e73a99236728f125d5f52a2b0761872fc0fc53cda5458241b2a80fd918b21c8029039d416a6cde6aa786bdfaa21a4e5ffa5f80dec422e0051c7e98a8cff2f4afbe25ca5a154a57c10", 0xc9}], 0x1}, 0x4004000) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000001c0)={0x0, 0x4, 0x2, 0x3, 0x1}, 0x14) ioctl$VIDIOC_SUBDEV_S_SELECTION(r0, 0xc040563e, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x7) msgget(0x1, 0x318) syz_genetlink_get_family_id$team(&(0x7f0000000400)='team\x00') 16:50:16 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0xc, 0x31, 0xffffffffffffffff, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_DEBUGREGS(r2, 0x4080aea2, &(0x7f0000000000)) 16:50:16 executing program 1: r0 = socket$inet6(0xa, 0x80002, 0x0) connect$inet6(r0, &(0x7f0000000280)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) sendto$inet6(r0, &(0x7f0000000300), 0x0, 0x400806e, 0x0, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000640)={0xff, {{0xa, 0x4e24, 0x200, @dev={0xfe, 0x80, [], 0xe}, 0x3}}, {{0xa, 0x4e24, 0x7ff, @dev={0xfe, 0x80, [], 0x13}, 0x8001}}}, 0x108) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_extract_tcp_res$synack(&(0x7f0000000940), 0x1, 0x0) link(&(0x7f0000000500)='./file0\x00', &(0x7f0000000600)='./file0\x00') perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$EVIOCGMTSLOTS(0xffffffffffffffff, 0x8040450a, &(0x7f0000000280)=""/242) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000080), 0x0}, 0x28) connect$inet6(r0, &(0x7f0000000040)={0xa, 0xfffffffffffffffc, 0x0, @ipv4}, 0x1c) sendto$inet6(r0, &(0x7f0000000140), 0x0, 0x0, 0x0, 0x0) 16:50:16 executing program 2: r0 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'hsr0\x00', 0x0}) bind$packet(r0, &(0x7f0000000340)={0x11, 0x0, r1}, 0x14) sendto(r0, &(0x7f00000000c0)="e360b641b37f0000001100000066", 0xe, 0x0, 0x0, 0x0) 16:50:16 executing program 0: ioctl$TCGETA(0xffffffffffffffff, 0x5405, &(0x7f0000000200)) r0 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x200800) ioctl$TCSBRKP(r0, 0x5425, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() ptrace$cont(0x18, r1, 0x10000, 0x3) timer_create(0x0, &(0x7f0000000000)={0x0, 0x0, 0x3, @thr={&(0x7f0000000040), 0x0}}, 0x0) r2 = syz_open_dev$sndpcmp(&(0x7f0000000380)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) r3 = socket$inet6(0xa, 0x40000080806, 0x0) r4 = syz_genetlink_get_family_id$nbd(&(0x7f00000001c0)='nbd\x00') sendmsg$NBD_CMD_RECONFIGURE(r2, &(0x7f0000000300)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x110002}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x7c, r4, 0x200, 0x70bd25, 0x25dfdbfb, {}, [@NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x6}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x28}, @NBD_ATTR_DEAD_CONN_TIMEOUT={0xc}, @NBD_ATTR_SOCKETS={0x1c, 0x7, [{0x8, 0x1, r0}, {0x8, 0x1, r0}, {0x8, 0x1, r0}]}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x2}, @NBD_ATTR_SOCKETS={0x1c, 0x7, [{0x8, 0x1, r0}, {0x8, 0x1, r2}, {0x8, 0x1, r0}]}]}, 0x7c}, 0x1, 0x0, 0x0, 0x40}, 0x1) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(r0, 0xc2c45513, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r2, 0x40046607, &(0x7f0000000140)=0x8) ioctl$DRM_IOCTL_AGP_ACQUIRE(r2, 0x6430) eventfd(0x7) bind$inet6(r3, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r2, 0xc04c5349, &(0x7f0000000080)={0x3720, 0x6, 0x800}) listen(r3, 0x20000000) r5 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r5, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r6 = accept4(r3, &(0x7f00004d4000)=@nl=@proc, &(0x7f0000000000)=0x80, 0x0) setsockopt$inet6_int(r6, 0x29, 0x33, &(0x7f0000000040)=0x100000000001f, 0x87) sendmmsg(r6, &(0x7f0000003d40)=[{{&(0x7f0000001b00)=@l2, 0x80, &(0x7f0000001d00), 0x0, &(0x7f0000001d40)}}, {{&(0x7f0000002300)=@nl, 0x80, &(0x7f0000003740), 0x0, &(0x7f00000037c0)}}], 0x4000000000001eb, 0x0) 16:50:16 executing program 2: r0 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'hsr0\x00', 0x0}) bind$packet(r0, &(0x7f0000000340)={0x11, 0x0, r1}, 0x14) sendto(r0, &(0x7f00000000c0)="e360b641b37f0000000100000066", 0xe, 0x0, 0x0, 0x0) 16:50:16 executing program 3: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, 0x0) mount(&(0x7f00000004c0)=ANY=[], &(0x7f000000aff8)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000000)) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000000c0)='tls\x00', 0x4) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$void(r1, 0x5450) renameat2(r0, &(0x7f0000000180)='./file0/file0\x00', 0xffffffffffffffff, 0x0, 0x4) shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@dev, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@remote}}, 0x0) ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, 0x0) shmctl$IPC_SET(0x0, 0x1, 0x0) ioctl$PIO_FONT(r0, 0x4b61, &(0x7f0000000740)="9d705183203ecbbfc0d13a4e30241f7ce01b0b4d7682444a507bfc1ac414339f479986467eb40c8065891e1fbbe7263212c5c09bb47896b3d85893f1173f8a139c116f876fdcc1779bffef8c34b5958981616cbcf39f2d8b43491de452d774a74c3ae9555a45180f7d68da36975781ba3a24694ac85eea975ca104181420baf7f3b9614203b0360e7cc29a1c109e") chdir(&(0x7f0000000340)='./file0\x00') symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) umount2(&(0x7f0000000380)='./file0\x00', 0x3) openat$uinput(0xffffffffffffff9c, &(0x7f0000000440)='/dev/uinput\x00', 0x802, 0x0) r3 = syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') sendmsg$FOU_CMD_DEL(r1, &(0x7f00000002c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x28, r3, 0x200, 0x70bd25, 0x25dfdbfe, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e24}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x7f}]}, 0x28}}, 0x24048010) sendmsg$kcm(r0, &(0x7f0000000a40)={&(0x7f0000000580)=@ll={0x11, 0xfd, r2, 0x1, 0x8, 0x6, @dev={[], 0x16}}, 0x80, &(0x7f00000009c0)=[{&(0x7f00000008c0)="367a9f0d4a1564359d1e668c63869bb9bf3b7f5aa4030462889dd6407207295cea1b36e07bc2b38b11c6ca28a73515cf52d89a8199d5c019de826c756a31bac24f707efcfc0a2383216dccc08f804551f0a56d2c9ab95a113fa74dff88ccccc7f278200aa03d2349e688b69191611739bb3e2e5ff110c5858c1a7c5bd5431f9c8e73a99236728f125d5f52a2b0761872fc0fc53cda5458241b2a80fd918b21c8029039d416a6cde6aa786bdfaa21a4e5ffa5f80dec422e0051c7e98a8cff2f4afbe25ca5a154a57c10", 0xc9}], 0x1}, 0x4004000) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000001c0)={0x0, 0x4, 0x2, 0x3, 0x1}, 0x14) ioctl$VIDIOC_SUBDEV_S_SELECTION(r0, 0xc040563e, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x7) msgget(0x1, 0x318) syz_genetlink_get_family_id$team(&(0x7f0000000400)='team\x00') 16:50:16 executing program 1: r0 = socket$inet6(0xa, 0x80002, 0x0) connect$inet6(r0, &(0x7f0000000280)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) sendto$inet6(r0, &(0x7f0000000300), 0x0, 0x400806e, 0x0, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000640)={0xff, {{0xa, 0x4e24, 0x200, @dev={0xfe, 0x80, [], 0xe}, 0x3}}, {{0xa, 0x4e24, 0x7ff, @dev={0xfe, 0x80, [], 0x13}, 0x8001}}}, 0x108) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_extract_tcp_res$synack(&(0x7f0000000940), 0x1, 0x0) link(&(0x7f0000000500)='./file0\x00', &(0x7f0000000600)='./file0\x00') perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$EVIOCGMTSLOTS(0xffffffffffffffff, 0x8040450a, &(0x7f0000000280)=""/242) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000080), 0x0}, 0x28) connect$inet6(r0, &(0x7f0000000040)={0xa, 0xfffffffffffffffc, 0x0, @ipv4}, 0x1c) sendto$inet6(r0, &(0x7f0000000140), 0x0, 0x0, 0x0, 0x0) 16:50:16 executing program 2: r0 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'hsr0\x00', 0x0}) bind$packet(r0, &(0x7f0000000340)={0x11, 0x0, r1}, 0x14) sendto(r0, &(0x7f00000000c0)="e360b641b37f0608000000000066", 0xe, 0x0, 0x0, 0x0) 16:50:16 executing program 3: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000b00)) mount(0x0, &(0x7f000000aff8)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000000)) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000000c0)='tls\x00', 0x4) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$void(r1, 0x5450) renameat2(r0, &(0x7f0000000180)='./file0/file0\x00', 0xffffffffffffffff, 0x0, 0x4) shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@dev, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@remote}}, 0x0) ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, 0x0) shmctl$IPC_SET(0x0, 0x1, 0x0) ioctl$PIO_FONT(r0, 0x4b61, &(0x7f0000000740)="9d705183203ecbbfc0d13a4e30241f7ce01b0b4d7682444a507bfc1ac414339f479986467eb40c8065891e1fbbe7263212c5c09bb47896b3d85893f1173f8a139c116f876fdcc1779bffef8c34b5958981616cbcf39f2d8b43491de452d774a74c3ae9555a45180f7d68da36975781ba3a24694ac85eea975ca104181420baf7f3b9614203b0360e7cc29a1c109e") chdir(&(0x7f0000000340)='./file0\x00') symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) umount2(&(0x7f0000000380)='./file0\x00', 0x3) openat$uinput(0xffffffffffffff9c, &(0x7f0000000440)='/dev/uinput\x00', 0x802, 0x0) r3 = syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') sendmsg$FOU_CMD_DEL(r1, &(0x7f00000002c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x28, r3, 0x200, 0x70bd25, 0x25dfdbfe, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e24}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x7f}]}, 0x28}}, 0x24048010) sendmsg$kcm(r0, &(0x7f0000000a40)={&(0x7f0000000580)=@ll={0x11, 0xfd, r2, 0x1, 0x8, 0x6, @dev={[], 0x16}}, 0x80, &(0x7f00000009c0)=[{&(0x7f00000008c0)="367a9f0d4a1564359d1e668c63869bb9bf3b7f5aa4030462889dd6407207295cea1b36e07bc2b38b11c6ca28a73515cf52d89a8199d5c019de826c756a31bac24f707efcfc0a2383216dccc08f804551f0a56d2c9ab95a113fa74dff88ccccc7f278200aa03d2349e688b69191611739bb3e2e5ff110c5858c1a7c5bd5431f9c8e73a99236728f125d5f52a2b0761872fc0fc53cda5458241b2a80fd918b21c8029039d416a6cde6aa786bdfaa21a4e5ffa5f80dec422e0051c7e98a8cff2f4afbe25ca5a154a57c10", 0xc9}], 0x1}, 0x4004000) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000001c0)={0x0, 0x4, 0x2, 0x3, 0x1}, 0x14) ioctl$VIDIOC_SUBDEV_S_SELECTION(r0, 0xc040563e, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x7) msgget(0x1, 0x318) syz_genetlink_get_family_id$team(&(0x7f0000000400)='team\x00') [ 322.110318] net_ratelimit: 22 callbacks suppressed [ 322.110327] protocol 88fb is buggy, dev hsr_slave_0 [ 322.120465] protocol 88fb is buggy, dev hsr_slave_1 [ 322.190568] protocol 88fb is buggy, dev hsr_slave_0 [ 322.195681] protocol 88fb is buggy, dev hsr_slave_1 [ 322.430266] protocol 88fb is buggy, dev hsr_slave_0 [ 322.435365] protocol 88fb is buggy, dev hsr_slave_1 [ 322.510277] protocol 88fb is buggy, dev hsr_slave_0 [ 322.515375] protocol 88fb is buggy, dev hsr_slave_1 [ 322.910283] protocol 88fb is buggy, dev hsr_slave_0 [ 322.915400] protocol 88fb is buggy, dev hsr_slave_1 16:50:19 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x4000000000000036) ptrace$cont(0x18, 0x0, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={@mcast1, @local, @local, 0x80000000, 0x0, 0x0, 0x200800000000114}) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x21, r0, 0x0, 0x0) 16:50:19 executing program 1: r0 = socket$inet6(0xa, 0x80002, 0x0) connect$inet6(r0, &(0x7f0000000280)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) sendto$inet6(r0, &(0x7f0000000300), 0x0, 0x400806e, 0x0, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000640)={0xff, {{0xa, 0x4e24, 0x200, @dev={0xfe, 0x80, [], 0xe}, 0x3}}, {{0xa, 0x4e24, 0x7ff, @dev={0xfe, 0x80, [], 0x13}, 0x8001}}}, 0x108) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_extract_tcp_res$synack(&(0x7f0000000940), 0x1, 0x0) link(&(0x7f0000000500)='./file0\x00', &(0x7f0000000600)='./file0\x00') perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$EVIOCGMTSLOTS(0xffffffffffffffff, 0x8040450a, &(0x7f0000000280)=""/242) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000080), 0x0}, 0x28) connect$inet6(r0, &(0x7f0000000040)={0xa, 0xfffffffffffffffc, 0x0, @ipv4}, 0x1c) sendto$inet6(r0, &(0x7f0000000140), 0x0, 0x0, 0x0, 0x0) 16:50:19 executing program 2: r0 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'hsr0\x00', 0x0}) bind$packet(r0, &(0x7f0000000340)={0x11, 0x0, r1}, 0x14) sendto(r0, &(0x7f00000000c0)="e360b641b37f4788000000000066", 0xe, 0x0, 0x0, 0x0) 16:50:19 executing program 5: 16:50:19 executing program 3: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000b00)) mount(0x0, &(0x7f000000aff8)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000000)) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000000c0)='tls\x00', 0x4) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$void(r1, 0x5450) renameat2(r0, &(0x7f0000000180)='./file0/file0\x00', 0xffffffffffffffff, 0x0, 0x4) shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@dev, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@remote}}, 0x0) ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, 0x0) shmctl$IPC_SET(0x0, 0x1, 0x0) ioctl$PIO_FONT(r0, 0x4b61, &(0x7f0000000740)="9d705183203ecbbfc0d13a4e30241f7ce01b0b4d7682444a507bfc1ac414339f479986467eb40c8065891e1fbbe7263212c5c09bb47896b3d85893f1173f8a139c116f876fdcc1779bffef8c34b5958981616cbcf39f2d8b43491de452d774a74c3ae9555a45180f7d68da36975781ba3a24694ac85eea975ca104181420baf7f3b9614203b0360e7cc29a1c109e") chdir(&(0x7f0000000340)='./file0\x00') symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) umount2(&(0x7f0000000380)='./file0\x00', 0x3) openat$uinput(0xffffffffffffff9c, &(0x7f0000000440)='/dev/uinput\x00', 0x802, 0x0) r3 = syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') sendmsg$FOU_CMD_DEL(r1, &(0x7f00000002c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x28, r3, 0x200, 0x70bd25, 0x25dfdbfe, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e24}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x7f}]}, 0x28}}, 0x24048010) sendmsg$kcm(r0, &(0x7f0000000a40)={&(0x7f0000000580)=@ll={0x11, 0xfd, r2, 0x1, 0x8, 0x6, @dev={[], 0x16}}, 0x80, &(0x7f00000009c0)=[{&(0x7f00000008c0)="367a9f0d4a1564359d1e668c63869bb9bf3b7f5aa4030462889dd6407207295cea1b36e07bc2b38b11c6ca28a73515cf52d89a8199d5c019de826c756a31bac24f707efcfc0a2383216dccc08f804551f0a56d2c9ab95a113fa74dff88ccccc7f278200aa03d2349e688b69191611739bb3e2e5ff110c5858c1a7c5bd5431f9c8e73a99236728f125d5f52a2b0761872fc0fc53cda5458241b2a80fd918b21c8029039d416a6cde6aa786bdfaa21a4e5ffa5f80dec422e0051c7e98a8cff2f4afbe25ca5a154a57c10", 0xc9}], 0x1}, 0x4004000) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000001c0)={0x0, 0x4, 0x2, 0x3, 0x1}, 0x14) ioctl$VIDIOC_SUBDEV_S_SELECTION(r0, 0xc040563e, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x7) msgget(0x1, 0x318) syz_genetlink_get_family_id$team(&(0x7f0000000400)='team\x00') 16:50:19 executing program 0: ioctl$TCGETA(0xffffffffffffffff, 0x5405, &(0x7f0000000200)) r0 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x200800) ioctl$TCSBRKP(r0, 0x5425, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() ptrace$cont(0x18, r1, 0x10000, 0x3) timer_create(0x0, &(0x7f0000000000)={0x0, 0x0, 0x3, @thr={&(0x7f0000000040), 0x0}}, 0x0) r2 = syz_open_dev$sndpcmp(&(0x7f0000000380)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) r3 = socket$inet6(0xa, 0x40000080806, 0x0) r4 = syz_genetlink_get_family_id$nbd(&(0x7f00000001c0)='nbd\x00') sendmsg$NBD_CMD_RECONFIGURE(r2, &(0x7f0000000300)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x110002}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x7c, r4, 0x200, 0x70bd25, 0x25dfdbfb, {}, [@NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x6}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x28}, @NBD_ATTR_DEAD_CONN_TIMEOUT={0xc}, @NBD_ATTR_SOCKETS={0x1c, 0x7, [{0x8, 0x1, r0}, {0x8, 0x1, r0}, {0x8, 0x1, r0}]}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x2}, @NBD_ATTR_SOCKETS={0x1c, 0x7, [{0x8, 0x1, r0}, {0x8, 0x1, r2}, {0x8, 0x1, r0}]}]}, 0x7c}, 0x1, 0x0, 0x0, 0x40}, 0x1) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(r0, 0xc2c45513, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r2, 0x40046607, &(0x7f0000000140)=0x8) ioctl$DRM_IOCTL_AGP_ACQUIRE(r2, 0x6430) eventfd(0x7) bind$inet6(r3, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r2, 0xc04c5349, &(0x7f0000000080)={0x3720, 0x6, 0x800}) listen(r3, 0x20000000) r5 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r5, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r6 = accept4(r3, &(0x7f00004d4000)=@nl=@proc, &(0x7f0000000000)=0x80, 0x0) setsockopt$inet6_int(r6, 0x29, 0x33, &(0x7f0000000040)=0x100000000001f, 0x87) sendmmsg(r6, &(0x7f0000003d40)=[{{&(0x7f0000001b00)=@l2, 0x80, &(0x7f0000001d00), 0x0, &(0x7f0000001d40)}}, {{&(0x7f0000002300)=@nl, 0x80, &(0x7f0000003740), 0x0, &(0x7f00000037c0)}}], 0x4000000000001eb, 0x0) 16:50:19 executing program 5: 16:50:19 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x4000000000000036) ptrace$cont(0x18, 0x0, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={@mcast1, @local, @local, 0x80000000, 0x0, 0x0, 0x200800000000114}) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x21, r0, 0x0, 0x0) 16:50:19 executing program 2: r0 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'hsr0\x00', 0x0}) bind$packet(r0, &(0x7f0000000340)={0x11, 0x0, r1}, 0x14) sendto(r0, &(0x7f00000000c0)="e360b641b37f0800000000000066", 0xe, 0x0, 0x0, 0x0) 16:50:19 executing program 5: r0 = open(&(0x7f0000000280)='./file0\x00', 0x20000000141042, 0x0) setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000480)=ANY=[], 0x2e7) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) 16:50:19 executing program 1: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0xf7c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCOUTQ(r0, 0x5411, &(0x7f0000000080)) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, 0x0) 16:50:19 executing program 2: r0 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'hsr0\x00', 0x0}) bind$packet(r0, &(0x7f0000000340)={0x11, 0x0, r1}, 0x14) sendto(r0, &(0x7f00000000c0)="e360b641b37f0000586500000066", 0xe, 0x0, 0x0, 0x0) 16:50:19 executing program 3: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000b00)) mount(0x0, &(0x7f000000aff8)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000000)) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000000c0)='tls\x00', 0x4) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$void(r1, 0x5450) renameat2(r0, &(0x7f0000000180)='./file0/file0\x00', 0xffffffffffffffff, 0x0, 0x4) shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@dev, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@remote}}, 0x0) ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, 0x0) shmctl$IPC_SET(0x0, 0x1, 0x0) ioctl$PIO_FONT(r0, 0x4b61, &(0x7f0000000740)="9d705183203ecbbfc0d13a4e30241f7ce01b0b4d7682444a507bfc1ac414339f479986467eb40c8065891e1fbbe7263212c5c09bb47896b3d85893f1173f8a139c116f876fdcc1779bffef8c34b5958981616cbcf39f2d8b43491de452d774a74c3ae9555a45180f7d68da36975781ba3a24694ac85eea975ca104181420baf7f3b9614203b0360e7cc29a1c109e") chdir(&(0x7f0000000340)='./file0\x00') symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) umount2(&(0x7f0000000380)='./file0\x00', 0x3) openat$uinput(0xffffffffffffff9c, &(0x7f0000000440)='/dev/uinput\x00', 0x802, 0x0) r3 = syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') sendmsg$FOU_CMD_DEL(r1, &(0x7f00000002c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x28, r3, 0x200, 0x70bd25, 0x25dfdbfe, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e24}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x7f}]}, 0x28}}, 0x24048010) sendmsg$kcm(r0, &(0x7f0000000a40)={&(0x7f0000000580)=@ll={0x11, 0xfd, r2, 0x1, 0x8, 0x6, @dev={[], 0x16}}, 0x80, &(0x7f00000009c0)=[{&(0x7f00000008c0)="367a9f0d4a1564359d1e668c63869bb9bf3b7f5aa4030462889dd6407207295cea1b36e07bc2b38b11c6ca28a73515cf52d89a8199d5c019de826c756a31bac24f707efcfc0a2383216dccc08f804551f0a56d2c9ab95a113fa74dff88ccccc7f278200aa03d2349e688b69191611739bb3e2e5ff110c5858c1a7c5bd5431f9c8e73a99236728f125d5f52a2b0761872fc0fc53cda5458241b2a80fd918b21c8029039d416a6cde6aa786bdfaa21a4e5ffa5f80dec422e0051c7e98a8cff2f4afbe25ca5a154a57c10", 0xc9}], 0x1}, 0x4004000) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000001c0)={0x0, 0x4, 0x2, 0x3, 0x1}, 0x14) ioctl$VIDIOC_SUBDEV_S_SELECTION(r0, 0xc040563e, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x7) msgget(0x1, 0x318) syz_genetlink_get_family_id$team(&(0x7f0000000400)='team\x00') 16:50:20 executing program 1: socket$inet_udp(0x2, 0x2, 0x0) eventfd2(0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) r0 = open(&(0x7f0000000280)='./file0\x00', 0x20000000141042, 0x0) setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000480)=ANY=[], 0x2e7) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) 16:50:20 executing program 2: r0 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'hsr0\x00', 0x0}) bind$packet(r0, &(0x7f0000000340)={0x11, 0x0, r1}, 0x14) sendto(r0, &(0x7f00000000c0)="e360b641b37f0003400000000066", 0xe, 0x0, 0x0, 0x0) 16:50:20 executing program 2: r0 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'hsr0\x00', 0x0}) bind$packet(r0, &(0x7f0000000340)={0x11, 0x0, r1}, 0x14) sendto(r0, &(0x7f00000000c0)="e360b641b37f0000003f00000066", 0xe, 0x0, 0x0, 0x0) 16:50:20 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = dup2(r0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) creat(0x0, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x40087101, 0x0) eventfd2(0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) r2 = open(&(0x7f0000000280)='./file0\x00', 0x20000000141042, 0x0) setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f0000000480)=ANY=[], 0x2e7) sendfile(r2, r2, &(0x7f00000001c0), 0xa198) ioprio_set$uid(0x0, 0x0, 0x4) lsetxattr$security_capability(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0) 16:50:20 executing program 1: 16:50:20 executing program 3: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000b00)) mount(&(0x7f00000004c0)=ANY=[], 0x0, &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000000)) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000000c0)='tls\x00', 0x4) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$void(r1, 0x5450) renameat2(r0, &(0x7f0000000180)='./file0/file0\x00', 0xffffffffffffffff, 0x0, 0x4) shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@dev, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@remote}}, 0x0) ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, 0x0) shmctl$IPC_SET(0x0, 0x1, 0x0) ioctl$PIO_FONT(r0, 0x4b61, &(0x7f0000000740)="9d705183203ecbbfc0d13a4e30241f7ce01b0b4d7682444a507bfc1ac414339f479986467eb40c8065891e1fbbe7263212c5c09bb47896b3d85893f1173f8a139c116f876fdcc1779bffef8c34b5958981616cbcf39f2d8b43491de452d774a74c3ae9555a45180f7d68da36975781ba3a24694ac85eea975ca104181420baf7f3b9614203b0360e7cc29a1c109e") chdir(&(0x7f0000000340)='./file0\x00') symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) umount2(&(0x7f0000000380)='./file0\x00', 0x3) openat$uinput(0xffffffffffffff9c, &(0x7f0000000440)='/dev/uinput\x00', 0x802, 0x0) r3 = syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') sendmsg$FOU_CMD_DEL(r1, &(0x7f00000002c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x28, r3, 0x200, 0x70bd25, 0x25dfdbfe, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e24}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x7f}]}, 0x28}}, 0x24048010) sendmsg$kcm(r0, &(0x7f0000000a40)={&(0x7f0000000580)=@ll={0x11, 0xfd, r2, 0x1, 0x8, 0x6, @dev={[], 0x16}}, 0x80, &(0x7f00000009c0)=[{&(0x7f00000008c0)="367a9f0d4a1564359d1e668c63869bb9bf3b7f5aa4030462889dd6407207295cea1b36e07bc2b38b11c6ca28a73515cf52d89a8199d5c019de826c756a31bac24f707efcfc0a2383216dccc08f804551f0a56d2c9ab95a113fa74dff88ccccc7f278200aa03d2349e688b69191611739bb3e2e5ff110c5858c1a7c5bd5431f9c8e73a99236728f125d5f52a2b0761872fc0fc53cda5458241b2a80fd918b21c8029039d416a6cde6aa786bdfaa21a4e5ffa5f80dec422e0051c7e98a8cff2f4afbe25ca5a154a57c10", 0xc9}], 0x1}, 0x4004000) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000001c0)={0x0, 0x4, 0x2, 0x3, 0x1}, 0x14) ioctl$VIDIOC_SUBDEV_S_SELECTION(r0, 0xc040563e, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x7) msgget(0x1, 0x318) syz_genetlink_get_family_id$team(&(0x7f0000000400)='team\x00') [ 324.739828] syz-executor5 (10323) used greatest stack depth: 14760 bytes left 16:50:22 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x4000000000000036) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x21, r0, 0x0, 0x0) 16:50:22 executing program 1: 16:50:22 executing program 2: r0 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'hsr0\x00', 0x0}) bind$packet(r0, &(0x7f0000000340)={0x11, 0x0, r1}, 0x14) sendto(r0, &(0x7f00000000c0)="e360b641b37f0000000400000066", 0xe, 0x0, 0x0, 0x0) 16:50:22 executing program 5: 16:50:22 executing program 3: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000b00)) mount(&(0x7f00000004c0)=ANY=[], &(0x7f000000aff8)='./file0\x00', 0x0, 0x0, &(0x7f0000000000)) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000000c0)='tls\x00', 0x4) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$void(r1, 0x5450) renameat2(r0, &(0x7f0000000180)='./file0/file0\x00', 0xffffffffffffffff, 0x0, 0x4) shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@dev, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@remote}}, 0x0) ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, 0x0) shmctl$IPC_SET(0x0, 0x1, 0x0) ioctl$PIO_FONT(r0, 0x4b61, &(0x7f0000000740)="9d705183203ecbbfc0d13a4e30241f7ce01b0b4d7682444a507bfc1ac414339f479986467eb40c8065891e1fbbe7263212c5c09bb47896b3d85893f1173f8a139c116f876fdcc1779bffef8c34b5958981616cbcf39f2d8b43491de452d774a74c3ae9555a45180f7d68da36975781ba3a24694ac85eea975ca104181420baf7f3b9614203b0360e7cc29a1c109e") chdir(&(0x7f0000000340)='./file0\x00') symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) umount2(&(0x7f0000000380)='./file0\x00', 0x3) openat$uinput(0xffffffffffffff9c, &(0x7f0000000440)='/dev/uinput\x00', 0x802, 0x0) r3 = syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') sendmsg$FOU_CMD_DEL(r1, &(0x7f00000002c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x28, r3, 0x200, 0x70bd25, 0x25dfdbfe, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e24}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x7f}]}, 0x28}}, 0x24048010) sendmsg$kcm(r0, &(0x7f0000000a40)={&(0x7f0000000580)=@ll={0x11, 0xfd, r2, 0x1, 0x8, 0x6, @dev={[], 0x16}}, 0x80, &(0x7f00000009c0)=[{&(0x7f00000008c0)="367a9f0d4a1564359d1e668c63869bb9bf3b7f5aa4030462889dd6407207295cea1b36e07bc2b38b11c6ca28a73515cf52d89a8199d5c019de826c756a31bac24f707efcfc0a2383216dccc08f804551f0a56d2c9ab95a113fa74dff88ccccc7f278200aa03d2349e688b69191611739bb3e2e5ff110c5858c1a7c5bd5431f9c8e73a99236728f125d5f52a2b0761872fc0fc53cda5458241b2a80fd918b21c8029039d416a6cde6aa786bdfaa21a4e5ffa5f80dec422e0051c7e98a8cff2f4afbe25ca5a154a57c10", 0xc9}], 0x1}, 0x4004000) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000001c0)={0x0, 0x4, 0x2, 0x3, 0x1}, 0x14) ioctl$VIDIOC_SUBDEV_S_SELECTION(r0, 0xc040563e, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x7) msgget(0x1, 0x318) syz_genetlink_get_family_id$team(&(0x7f0000000400)='team\x00') 16:50:22 executing program 0: 16:50:22 executing program 5: 16:50:22 executing program 1: 16:50:22 executing program 0: r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) clock_nanosleep(0x0, 0x0, &(0x7f00000001c0)={0x0, r1+30000000}, &(0x7f0000000200)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x1c9c380}, {0x0, 0x9}}, 0x0) tkill(r0, 0x1000100000016) 16:50:22 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x4000000000000036) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x21, r0, 0x0, 0x0) 16:50:22 executing program 5: 16:50:22 executing program 2: r0 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'hsr0\x00', 0x0}) bind$packet(r0, &(0x7f0000000340)={0x11, 0x0, r1}, 0x14) sendto(r0, &(0x7f00000000c0)="e360b641b37f00f4010000000066", 0xe, 0x0, 0x0, 0x0) 16:50:22 executing program 1: 16:50:23 executing program 5: 16:50:23 executing program 1: 16:50:23 executing program 5: 16:50:23 executing program 3: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000b00)) mount(&(0x7f00000004c0)=ANY=[], &(0x7f000000aff8)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000000c0)='tls\x00', 0x4) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$void(r1, 0x5450) renameat2(r0, &(0x7f0000000180)='./file0/file0\x00', 0xffffffffffffffff, 0x0, 0x4) shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@dev, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@remote}}, 0x0) ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, 0x0) shmctl$IPC_SET(0x0, 0x1, 0x0) ioctl$PIO_FONT(r0, 0x4b61, &(0x7f0000000740)="9d705183203ecbbfc0d13a4e30241f7ce01b0b4d7682444a507bfc1ac414339f479986467eb40c8065891e1fbbe7263212c5c09bb47896b3d85893f1173f8a139c116f876fdcc1779bffef8c34b5958981616cbcf39f2d8b43491de452d774a74c3ae9555a45180f7d68da36975781ba3a24694ac85eea975ca104181420baf7f3b9614203b0360e7cc29a1c109e") chdir(&(0x7f0000000340)='./file0\x00') symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) umount2(&(0x7f0000000380)='./file0\x00', 0x3) openat$uinput(0xffffffffffffff9c, &(0x7f0000000440)='/dev/uinput\x00', 0x802, 0x0) r3 = syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') sendmsg$FOU_CMD_DEL(r1, &(0x7f00000002c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x28, r3, 0x200, 0x70bd25, 0x25dfdbfe, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e24}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x7f}]}, 0x28}}, 0x24048010) sendmsg$kcm(r0, &(0x7f0000000a40)={&(0x7f0000000580)=@ll={0x11, 0xfd, r2, 0x1, 0x8, 0x6, @dev={[], 0x16}}, 0x80, &(0x7f00000009c0)=[{&(0x7f00000008c0)="367a9f0d4a1564359d1e668c63869bb9bf3b7f5aa4030462889dd6407207295cea1b36e07bc2b38b11c6ca28a73515cf52d89a8199d5c019de826c756a31bac24f707efcfc0a2383216dccc08f804551f0a56d2c9ab95a113fa74dff88ccccc7f278200aa03d2349e688b69191611739bb3e2e5ff110c5858c1a7c5bd5431f9c8e73a99236728f125d5f52a2b0761872fc0fc53cda5458241b2a80fd918b21c8029039d416a6cde6aa786bdfaa21a4e5ffa5f80dec422e0051c7e98a8cff2f4afbe25ca5a154a57c10", 0xc9}], 0x1}, 0x4004000) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000001c0)={0x0, 0x4, 0x2, 0x3, 0x1}, 0x14) ioctl$VIDIOC_SUBDEV_S_SELECTION(r0, 0xc040563e, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x7) msgget(0x1, 0x318) syz_genetlink_get_family_id$team(&(0x7f0000000400)='team\x00') 16:50:23 executing program 2: r0 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'hsr0\x00', 0x0}) bind$packet(r0, &(0x7f0000000340)={0x11, 0x0, r1}, 0x14) sendto(r0, &(0x7f00000000c0)="e360b641b37f0002000000000066", 0xe, 0x0, 0x0, 0x0) 16:50:23 executing program 3: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000b00)) mount(&(0x7f00000004c0)=ANY=[], &(0x7f000000aff8)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000000c0)='tls\x00', 0x4) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$void(r1, 0x5450) renameat2(r0, &(0x7f0000000180)='./file0/file0\x00', 0xffffffffffffffff, 0x0, 0x4) shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@dev, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@remote}}, 0x0) ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, 0x0) shmctl$IPC_SET(0x0, 0x1, 0x0) ioctl$PIO_FONT(r0, 0x4b61, &(0x7f0000000740)="9d705183203ecbbfc0d13a4e30241f7ce01b0b4d7682444a507bfc1ac414339f479986467eb40c8065891e1fbbe7263212c5c09bb47896b3d85893f1173f8a139c116f876fdcc1779bffef8c34b5958981616cbcf39f2d8b43491de452d774a74c3ae9555a45180f7d68da36975781ba3a24694ac85eea975ca104181420baf7f3b9614203b0360e7cc29a1c109e") chdir(&(0x7f0000000340)='./file0\x00') symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) umount2(&(0x7f0000000380)='./file0\x00', 0x3) openat$uinput(0xffffffffffffff9c, &(0x7f0000000440)='/dev/uinput\x00', 0x802, 0x0) r3 = syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') sendmsg$FOU_CMD_DEL(r1, &(0x7f00000002c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x28, r3, 0x200, 0x70bd25, 0x25dfdbfe, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e24}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x7f}]}, 0x28}}, 0x24048010) sendmsg$kcm(r0, &(0x7f0000000a40)={&(0x7f0000000580)=@ll={0x11, 0xfd, r2, 0x1, 0x8, 0x6, @dev={[], 0x16}}, 0x80, &(0x7f00000009c0)=[{&(0x7f00000008c0)="367a9f0d4a1564359d1e668c63869bb9bf3b7f5aa4030462889dd6407207295cea1b36e07bc2b38b11c6ca28a73515cf52d89a8199d5c019de826c756a31bac24f707efcfc0a2383216dccc08f804551f0a56d2c9ab95a113fa74dff88ccccc7f278200aa03d2349e688b69191611739bb3e2e5ff110c5858c1a7c5bd5431f9c8e73a99236728f125d5f52a2b0761872fc0fc53cda5458241b2a80fd918b21c8029039d416a6cde6aa786bdfaa21a4e5ffa5f80dec422e0051c7e98a8cff2f4afbe25ca5a154a57c10", 0xc9}], 0x1}, 0x4004000) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000001c0)={0x0, 0x4, 0x2, 0x3, 0x1}, 0x14) ioctl$VIDIOC_SUBDEV_S_SELECTION(r0, 0xc040563e, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x7) msgget(0x1, 0x318) syz_genetlink_get_family_id$team(&(0x7f0000000400)='team\x00') 16:50:23 executing program 1: [ 327.470294] net_ratelimit: 28 callbacks suppressed [ 327.470302] protocol 88fb is buggy, dev hsr_slave_0 [ 327.480462] protocol 88fb is buggy, dev hsr_slave_1 [ 327.550285] protocol 88fb is buggy, dev hsr_slave_0 [ 327.555403] protocol 88fb is buggy, dev hsr_slave_1 16:50:23 executing program 0: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x10000014c) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) [ 328.350303] protocol 88fb is buggy, dev hsr_slave_0 [ 328.355496] protocol 88fb is buggy, dev hsr_slave_1 [ 328.430316] protocol 88fb is buggy, dev hsr_slave_0 [ 328.435590] protocol 88fb is buggy, dev hsr_slave_1 [ 328.670270] protocol 88fb is buggy, dev hsr_slave_0 [ 328.675382] protocol 88fb is buggy, dev hsr_slave_1 16:50:25 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x4000000000000036) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x21, r0, 0x0, 0x0) 16:50:25 executing program 5: r0 = syz_open_dev$sndpcmc(&(0x7f0000000240)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl(r0, 0x80044100, 0x0) 16:50:25 executing program 1: r0 = syz_open_dev$sndpcmc(&(0x7f0000000240)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl(r0, 0x40044160, 0x0) 16:50:25 executing program 2: r0 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'hsr0\x00', 0x0}) bind$packet(r0, &(0x7f0000000340)={0x11, 0x0, r1}, 0x14) sendto(r0, &(0x7f00000000c0)="e360b641b37f00003f0000000066", 0xe, 0x0, 0x0, 0x0) 16:50:25 executing program 3: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000b00)) mount(&(0x7f00000004c0)=ANY=[], &(0x7f000000aff8)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000000)) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$void(r1, 0x5450) renameat2(r0, &(0x7f0000000180)='./file0/file0\x00', 0xffffffffffffffff, 0x0, 0x4) shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@dev, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@remote}}, 0x0) ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, 0x0) shmctl$IPC_SET(0x0, 0x1, 0x0) ioctl$PIO_FONT(r0, 0x4b61, &(0x7f0000000740)="9d705183203ecbbfc0d13a4e30241f7ce01b0b4d7682444a507bfc1ac414339f479986467eb40c8065891e1fbbe7263212c5c09bb47896b3d85893f1173f8a139c116f876fdcc1779bffef8c34b5958981616cbcf39f2d8b43491de452d774a74c3ae9555a45180f7d68da36975781ba3a24694ac85eea975ca104181420baf7f3b9614203b0360e7cc29a1c109e") chdir(&(0x7f0000000340)='./file0\x00') symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) umount2(&(0x7f0000000380)='./file0\x00', 0x3) openat$uinput(0xffffffffffffff9c, &(0x7f0000000440)='/dev/uinput\x00', 0x802, 0x0) r3 = syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') sendmsg$FOU_CMD_DEL(r1, &(0x7f00000002c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x28, r3, 0x200, 0x70bd25, 0x25dfdbfe, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e24}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x7f}]}, 0x28}}, 0x24048010) sendmsg$kcm(r0, &(0x7f0000000a40)={&(0x7f0000000580)=@ll={0x11, 0xfd, r2, 0x1, 0x8, 0x6, @dev={[], 0x16}}, 0x80, &(0x7f00000009c0)=[{&(0x7f00000008c0)="367a9f0d4a1564359d1e668c63869bb9bf3b7f5aa4030462889dd6407207295cea1b36e07bc2b38b11c6ca28a73515cf52d89a8199d5c019de826c756a31bac24f707efcfc0a2383216dccc08f804551f0a56d2c9ab95a113fa74dff88ccccc7f278200aa03d2349e688b69191611739bb3e2e5ff110c5858c1a7c5bd5431f9c8e73a99236728f125d5f52a2b0761872fc0fc53cda5458241b2a80fd918b21c8029039d416a6cde6aa786bdfaa21a4e5ffa5f80dec422e0051c7e98a8cff2f4afbe25ca5a154a57c10", 0xc9}], 0x1}, 0x4004000) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000001c0)={0x0, 0x4, 0x2, 0x3, 0x1}, 0x14) ioctl$VIDIOC_SUBDEV_S_SELECTION(r0, 0xc040563e, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x7) msgget(0x1, 0x318) syz_genetlink_get_family_id$team(&(0x7f0000000400)='team\x00') 16:50:25 executing program 0: r0 = open(&(0x7f0000000280)='./file0\x00', 0x20000000141042, 0x0) write$binfmt_elf64(r0, &(0x7f0000000480)=ANY=[], 0x2e7) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) ioprio_set$uid(0x0, 0x0, 0x0) lsetxattr$security_capability(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='security.capability\x00', 0x0, 0xfffffffffffffc48, 0x1) ioctl$BLKGETSIZE(0xffffffffffffffff, 0x1260, &(0x7f0000000000)) 16:50:25 executing program 5: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000b00)) mount(&(0x7f00000004c0)=ANY=[], &(0x7f000000aff8)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000000c0)='tls\x00', 0x4) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$void(r1, 0x5450) renameat2(r0, &(0x7f0000000180)='./file0/file0\x00', 0xffffffffffffffff, 0x0, 0x4) shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@dev, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@remote}}, 0x0) ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, 0x0) shmctl$IPC_SET(0x0, 0x1, 0x0) ioctl$PIO_FONT(r0, 0x4b61, &(0x7f0000000740)="9d705183203ecbbfc0d13a4e30241f7ce01b0b4d7682444a507bfc1ac414339f479986467eb40c8065891e1fbbe7263212c5c09bb47896b3d85893f1173f8a139c116f876fdcc1779bffef8c34b5958981616cbcf39f2d8b43491de452d774a74c3ae9555a45180f7d68da36975781ba3a24694ac85eea975ca104181420baf7f3b9614203b0360e7cc29a1c109e") chdir(&(0x7f0000000340)='./file0\x00') symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) umount2(&(0x7f0000000380)='./file0\x00', 0x3) openat$uinput(0xffffffffffffff9c, &(0x7f0000000440)='/dev/uinput\x00', 0x802, 0x0) r3 = syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') sendmsg$FOU_CMD_DEL(r1, &(0x7f00000002c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x28, r3, 0x200, 0x70bd25, 0x25dfdbfe, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e24}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x7f}]}, 0x28}}, 0x24048010) sendmsg$kcm(r0, &(0x7f0000000a40)={&(0x7f0000000580)=@ll={0x11, 0xfd, r2, 0x1, 0x8, 0x6, @dev={[], 0x16}}, 0x80, &(0x7f00000009c0)=[{&(0x7f00000008c0)="367a9f0d4a1564359d1e668c63869bb9bf3b7f5aa4030462889dd6407207295cea1b36e07bc2b38b11c6ca28a73515cf52d89a8199d5c019de826c756a31bac24f707efcfc0a2383216dccc08f804551f0a56d2c9ab95a113fa74dff88ccccc7f278200aa03d2349e688b69191611739bb3e2e5ff110c5858c1a7c5bd5431f9c8e73a99236728f125d5f52a2b0761872fc0fc53cda5458241b2a80fd918b21c8029039d416a6cde6aa786bdfaa21a4e5ffa5f80dec422e0051c7e98a8cff2f4afbe25ca5a154a57c10", 0xc9}], 0x1}, 0x4004000) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000001c0)={0x0, 0x4, 0x2, 0x3, 0x1}, 0x14) ioctl$VIDIOC_SUBDEV_S_SELECTION(r0, 0xc040563e, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x7) msgget(0x1, 0x318) syz_genetlink_get_family_id$team(&(0x7f0000000400)='team\x00') 16:50:25 executing program 1: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000b00)) mount(&(0x7f00000004c0)=ANY=[], &(0x7f000000aff8)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000000c0)='tls\x00', 0x4) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$void(r1, 0x5450) renameat2(r0, &(0x7f0000000180)='./file0/file0\x00', 0xffffffffffffffff, 0x0, 0x4) shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@dev, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@remote}}, 0x0) ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, 0x0) shmctl$IPC_SET(0x0, 0x1, 0x0) ioctl$PIO_FONT(r0, 0x4b61, &(0x7f0000000740)="9d705183203ecbbfc0d13a4e30241f7ce01b0b4d7682444a507bfc1ac414339f479986467eb40c8065891e1fbbe7263212c5c09bb47896b3d85893f1173f8a139c116f876fdcc1779bffef8c34b5958981616cbcf39f2d8b43491de452d774a74c3ae9555a45180f7d68da36975781ba3a24694ac85eea975ca104181420baf7f3b9614203b0360e7cc29a1c109e") chdir(&(0x7f0000000340)='./file0\x00') symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) umount2(&(0x7f0000000380)='./file0\x00', 0x3) openat$uinput(0xffffffffffffff9c, &(0x7f0000000440)='/dev/uinput\x00', 0x802, 0x0) r3 = syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') sendmsg$FOU_CMD_DEL(r1, &(0x7f00000002c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x28, r3, 0x200, 0x70bd25, 0x25dfdbfe, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e24}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x7f}]}, 0x28}}, 0x24048010) sendmsg$kcm(r0, &(0x7f0000000a40)={&(0x7f0000000580)=@ll={0x11, 0xfd, r2, 0x1, 0x8, 0x6, @dev={[], 0x16}}, 0x80, &(0x7f00000009c0)=[{&(0x7f00000008c0)="367a9f0d4a1564359d1e668c63869bb9bf3b7f5aa4030462889dd6407207295cea1b36e07bc2b38b11c6ca28a73515cf52d89a8199d5c019de826c756a31bac24f707efcfc0a2383216dccc08f804551f0a56d2c9ab95a113fa74dff88ccccc7f278200aa03d2349e688b69191611739bb3e2e5ff110c5858c1a7c5bd5431f9c8e73a99236728f125d5f52a2b0761872fc0fc53cda5458241b2a80fd918b21c8029039d416a6cde6aa786bdfaa21a4e5ffa5f80dec422e0051c7e98a8cff2f4afbe25ca5a154a57c10", 0xc9}], 0x1}, 0x4004000) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000001c0)={0x0, 0x4, 0x2, 0x3, 0x1}, 0x14) ioctl$VIDIOC_SUBDEV_S_SELECTION(r0, 0xc040563e, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x7) msgget(0x1, 0x318) syz_genetlink_get_family_id$team(&(0x7f0000000400)='team\x00') 16:50:26 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x4000000000000036) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={@mcast1, @local, @local, 0x0, 0x0, 0x0, 0x200800000000114}) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x21, r0, 0x0, 0x0) 16:50:26 executing program 2: r0 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'hsr0\x00', 0x0}) bind$packet(r0, &(0x7f0000000340)={0x11, 0x0, r1}, 0x14) sendto(r0, &(0x7f00000000c0)="e360b641b37f0088480000000066", 0xe, 0x0, 0x0, 0x0) 16:50:26 executing program 3: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000b00)) mount(&(0x7f00000004c0)=ANY=[], &(0x7f000000aff8)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000000)) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000000c0)='tls\x00', 0x4) sched_setaffinity(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$void(r1, 0x5450) renameat2(r0, &(0x7f0000000180)='./file0/file0\x00', 0xffffffffffffffff, 0x0, 0x4) shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@dev, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@remote}}, 0x0) ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, 0x0) shmctl$IPC_SET(0x0, 0x1, 0x0) ioctl$PIO_FONT(r0, 0x4b61, &(0x7f0000000740)="9d705183203ecbbfc0d13a4e30241f7ce01b0b4d7682444a507bfc1ac414339f479986467eb40c8065891e1fbbe7263212c5c09bb47896b3d85893f1173f8a139c116f876fdcc1779bffef8c34b5958981616cbcf39f2d8b43491de452d774a74c3ae9555a45180f7d68da36975781ba3a24694ac85eea975ca104181420baf7f3b9614203b0360e7cc29a1c109e") chdir(&(0x7f0000000340)='./file0\x00') symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) umount2(&(0x7f0000000380)='./file0\x00', 0x3) openat$uinput(0xffffffffffffff9c, &(0x7f0000000440)='/dev/uinput\x00', 0x802, 0x0) r3 = syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') sendmsg$FOU_CMD_DEL(r1, &(0x7f00000002c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x28, r3, 0x200, 0x70bd25, 0x25dfdbfe, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e24}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x7f}]}, 0x28}}, 0x24048010) sendmsg$kcm(r0, &(0x7f0000000a40)={&(0x7f0000000580)=@ll={0x11, 0xfd, r2, 0x1, 0x8, 0x6, @dev={[], 0x16}}, 0x80, &(0x7f00000009c0)=[{&(0x7f00000008c0)="367a9f0d4a1564359d1e668c63869bb9bf3b7f5aa4030462889dd6407207295cea1b36e07bc2b38b11c6ca28a73515cf52d89a8199d5c019de826c756a31bac24f707efcfc0a2383216dccc08f804551f0a56d2c9ab95a113fa74dff88ccccc7f278200aa03d2349e688b69191611739bb3e2e5ff110c5858c1a7c5bd5431f9c8e73a99236728f125d5f52a2b0761872fc0fc53cda5458241b2a80fd918b21c8029039d416a6cde6aa786bdfaa21a4e5ffa5f80dec422e0051c7e98a8cff2f4afbe25ca5a154a57c10", 0xc9}], 0x1}, 0x4004000) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000001c0)={0x0, 0x4, 0x2, 0x3, 0x1}, 0x14) ioctl$VIDIOC_SUBDEV_S_SELECTION(r0, 0xc040563e, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x7) msgget(0x1, 0x318) syz_genetlink_get_family_id$team(&(0x7f0000000400)='team\x00') 16:50:26 executing program 5: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000b00)) mount(&(0x7f00000004c0)=ANY=[], &(0x7f000000aff8)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000000)) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$void(r1, 0x5450) renameat2(r0, &(0x7f0000000180)='./file0/file0\x00', 0xffffffffffffffff, 0x0, 0x4) shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@dev, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@remote}}, 0x0) ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, 0x0) shmctl$IPC_SET(0x0, 0x1, 0x0) ioctl$PIO_FONT(r0, 0x4b61, &(0x7f0000000740)="9d705183203ecbbfc0d13a4e30241f7ce01b0b4d7682444a507bfc1ac414339f479986467eb40c8065891e1fbbe7263212c5c09bb47896b3d85893f1173f8a139c116f876fdcc1779bffef8c34b5958981616cbcf39f2d8b43491de452d774a74c3ae9555a45180f7d68da36975781ba3a24694ac85eea975ca104181420baf7f3b9614203b0360e7cc29a1c109e") chdir(&(0x7f0000000340)='./file0\x00') symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) umount2(&(0x7f0000000380)='./file0\x00', 0x3) openat$uinput(0xffffffffffffff9c, &(0x7f0000000440)='/dev/uinput\x00', 0x802, 0x0) r3 = syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') sendmsg$FOU_CMD_DEL(r1, &(0x7f00000002c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x28, r3, 0x200, 0x70bd25, 0x25dfdbfe, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e24}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x7f}]}, 0x28}}, 0x24048010) sendmsg$kcm(r0, &(0x7f0000000a40)={&(0x7f0000000580)=@ll={0x11, 0xfd, r2, 0x1, 0x8, 0x6, @dev={[], 0x16}}, 0x80, &(0x7f00000009c0)=[{&(0x7f00000008c0)="367a9f0d4a1564359d1e668c63869bb9bf3b7f5aa4030462889dd6407207295cea1b36e07bc2b38b11c6ca28a73515cf52d89a8199d5c019de826c756a31bac24f707efcfc0a2383216dccc08f804551f0a56d2c9ab95a113fa74dff88ccccc7f278200aa03d2349e688b69191611739bb3e2e5ff110c5858c1a7c5bd5431f9c8e73a99236728f125d5f52a2b0761872fc0fc53cda5458241b2a80fd918b21c8029039d416a6cde6aa786bdfaa21a4e5ffa5f80dec422e0051c7e98a8cff2f4afbe25ca5a154a57c10", 0xc9}], 0x1}, 0x4004000) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000001c0)={0x0, 0x4, 0x2, 0x3, 0x1}, 0x14) ioctl$VIDIOC_SUBDEV_S_SELECTION(r0, 0xc040563e, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x7) msgget(0x1, 0x318) syz_genetlink_get_family_id$team(&(0x7f0000000400)='team\x00') 16:50:26 executing program 0: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000b00)) mount(&(0x7f00000004c0)=ANY=[], 0x0, &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000000)) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000000c0)='tls\x00', 0x4) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$void(r1, 0x5450) renameat2(r0, &(0x7f0000000180)='./file0/file0\x00', 0xffffffffffffffff, 0x0, 0x4) shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@dev, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@remote}}, 0x0) ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, 0x0) shmctl$IPC_SET(0x0, 0x1, 0x0) ioctl$PIO_FONT(r0, 0x4b61, &(0x7f0000000740)="9d705183203ecbbfc0d13a4e30241f7ce01b0b4d7682444a507bfc1ac414339f479986467eb40c8065891e1fbbe7263212c5c09bb47896b3d85893f1173f8a139c116f876fdcc1779bffef8c34b5958981616cbcf39f2d8b43491de452d774a74c3ae9555a45180f7d68da36975781ba3a24694ac85eea975ca104181420baf7f3b9614203b0360e7cc29a1c109e") chdir(&(0x7f0000000340)='./file0\x00') symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) umount2(&(0x7f0000000380)='./file0\x00', 0x3) openat$uinput(0xffffffffffffff9c, &(0x7f0000000440)='/dev/uinput\x00', 0x802, 0x0) r3 = syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') sendmsg$FOU_CMD_DEL(r1, &(0x7f00000002c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x28, r3, 0x200, 0x70bd25, 0x25dfdbfe, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e24}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x7f}]}, 0x28}}, 0x24048010) sendmsg$kcm(r0, &(0x7f0000000a40)={&(0x7f0000000580)=@ll={0x11, 0xfd, r2, 0x1, 0x8, 0x6, @dev={[], 0x16}}, 0x80, &(0x7f00000009c0)=[{&(0x7f00000008c0)="367a9f0d4a1564359d1e668c63869bb9bf3b7f5aa4030462889dd6407207295cea1b36e07bc2b38b11c6ca28a73515cf52d89a8199d5c019de826c756a31bac24f707efcfc0a2383216dccc08f804551f0a56d2c9ab95a113fa74dff88ccccc7f278200aa03d2349e688b69191611739bb3e2e5ff110c5858c1a7c5bd5431f9c8e73a99236728f125d5f52a2b0761872fc0fc53cda5458241b2a80fd918b21c8029039d416a6cde6aa786bdfaa21a4e5ffa5f80dec422e0051c7e98a8cff2f4afbe25ca5a154a57c10", 0xc9}], 0x1}, 0x4004000) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000001c0)={0x0, 0x4, 0x2, 0x3, 0x1}, 0x14) ioctl$VIDIOC_SUBDEV_S_SELECTION(r0, 0xc040563e, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x7) msgget(0x1, 0x318) syz_genetlink_get_family_id$team(&(0x7f0000000400)='team\x00') 16:50:26 executing program 1: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000b00)) mount(0x0, &(0x7f000000aff8)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000000)) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000000c0)='tls\x00', 0x4) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$void(r1, 0x5450) renameat2(r0, &(0x7f0000000180)='./file0/file0\x00', 0xffffffffffffffff, 0x0, 0x4) shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@dev, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@remote}}, 0x0) ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, 0x0) shmctl$IPC_SET(0x0, 0x1, 0x0) ioctl$PIO_FONT(r0, 0x4b61, &(0x7f0000000740)="9d705183203ecbbfc0d13a4e30241f7ce01b0b4d7682444a507bfc1ac414339f479986467eb40c8065891e1fbbe7263212c5c09bb47896b3d85893f1173f8a139c116f876fdcc1779bffef8c34b5958981616cbcf39f2d8b43491de452d774a74c3ae9555a45180f7d68da36975781ba3a24694ac85eea975ca104181420baf7f3b9614203b0360e7cc29a1c109e") chdir(&(0x7f0000000340)='./file0\x00') symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) umount2(&(0x7f0000000380)='./file0\x00', 0x3) openat$uinput(0xffffffffffffff9c, &(0x7f0000000440)='/dev/uinput\x00', 0x802, 0x0) r3 = syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') sendmsg$FOU_CMD_DEL(r1, &(0x7f00000002c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x28, r3, 0x200, 0x70bd25, 0x25dfdbfe, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e24}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x7f}]}, 0x28}}, 0x24048010) sendmsg$kcm(r0, &(0x7f0000000a40)={&(0x7f0000000580)=@ll={0x11, 0xfd, r2, 0x1, 0x8, 0x6, @dev={[], 0x16}}, 0x80, &(0x7f00000009c0)=[{&(0x7f00000008c0)="367a9f0d4a1564359d1e668c63869bb9bf3b7f5aa4030462889dd6407207295cea1b36e07bc2b38b11c6ca28a73515cf52d89a8199d5c019de826c756a31bac24f707efcfc0a2383216dccc08f804551f0a56d2c9ab95a113fa74dff88ccccc7f278200aa03d2349e688b69191611739bb3e2e5ff110c5858c1a7c5bd5431f9c8e73a99236728f125d5f52a2b0761872fc0fc53cda5458241b2a80fd918b21c8029039d416a6cde6aa786bdfaa21a4e5ffa5f80dec422e0051c7e98a8cff2f4afbe25ca5a154a57c10", 0xc9}], 0x1}, 0x4004000) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000001c0)={0x0, 0x4, 0x2, 0x3, 0x1}, 0x14) ioctl$VIDIOC_SUBDEV_S_SELECTION(r0, 0xc040563e, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x7) msgget(0x1, 0x318) syz_genetlink_get_family_id$team(&(0x7f0000000400)='team\x00') 16:50:26 executing program 2: r0 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'hsr0\x00', 0x0}) bind$packet(r0, &(0x7f0000000340)={0x11, 0x0, r1}, 0x14) sendto(r0, &(0x7f00000000c0)="e360b641b37f0088640000000066", 0xe, 0x0, 0x0, 0x0) 16:50:26 executing program 3: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000b00)) mount(&(0x7f00000004c0)=ANY=[], &(0x7f000000aff8)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000000)) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000000c0)='tls\x00', 0x4) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$void(r1, 0x5450) renameat2(r0, &(0x7f0000000180)='./file0/file0\x00', 0xffffffffffffffff, 0x0, 0x4) shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@dev, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@remote}}, 0x0) ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, 0x0) shmctl$IPC_SET(0x0, 0x1, 0x0) ioctl$PIO_FONT(r0, 0x4b61, &(0x7f0000000740)="9d705183203ecbbfc0d13a4e30241f7ce01b0b4d7682444a507bfc1ac414339f479986467eb40c8065891e1fbbe7263212c5c09bb47896b3d85893f1173f8a139c116f876fdcc1779bffef8c34b5958981616cbcf39f2d8b43491de452d774a74c3ae9555a45180f7d68da36975781ba3a24694ac85eea975ca104181420baf7f3b9614203b0360e7cc29a1c109e") chdir(&(0x7f0000000340)='./file0\x00') symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) umount2(&(0x7f0000000380)='./file0\x00', 0x3) openat$uinput(0xffffffffffffff9c, &(0x7f0000000440)='/dev/uinput\x00', 0x802, 0x0) r3 = syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') sendmsg$FOU_CMD_DEL(r1, &(0x7f00000002c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x28, r3, 0x200, 0x70bd25, 0x25dfdbfe, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e24}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x7f}]}, 0x28}}, 0x24048010) sendmsg$kcm(r0, &(0x7f0000000a40)={&(0x7f0000000580)=@ll={0x11, 0xfd, r2, 0x1, 0x8, 0x6, @dev={[], 0x16}}, 0x80, &(0x7f00000009c0)=[{&(0x7f00000008c0)="367a9f0d4a1564359d1e668c63869bb9bf3b7f5aa4030462889dd6407207295cea1b36e07bc2b38b11c6ca28a73515cf52d89a8199d5c019de826c756a31bac24f707efcfc0a2383216dccc08f804551f0a56d2c9ab95a113fa74dff88ccccc7f278200aa03d2349e688b69191611739bb3e2e5ff110c5858c1a7c5bd5431f9c8e73a99236728f125d5f52a2b0761872fc0fc53cda5458241b2a80fd918b21c8029039d416a6cde6aa786bdfaa21a4e5ffa5f80dec422e0051c7e98a8cff2f4afbe25ca5a154a57c10", 0xc9}], 0x1}, 0x4004000) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000001c0)={0x0, 0x4, 0x2, 0x3, 0x1}, 0x14) ioctl$VIDIOC_SUBDEV_S_SELECTION(r0, 0xc040563e, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x7) msgget(0x1, 0x318) syz_genetlink_get_family_id$team(&(0x7f0000000400)='team\x00') 16:50:26 executing program 2: r0 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'hsr0\x00', 0x0}) bind$packet(r0, &(0x7f0000000340)={0x11, 0x0, r1}, 0x14) sendto(r0, &(0x7f00000000c0)="e360b641b37f0000000608000066", 0xe, 0x0, 0x0, 0x0) 16:50:26 executing program 5: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000b00)) mount(&(0x7f00000004c0)=ANY=[], &(0x7f000000aff8)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000000)) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000000c0)='tls\x00', 0x4) sched_setaffinity(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$void(r1, 0x5450) renameat2(r0, &(0x7f0000000180)='./file0/file0\x00', 0xffffffffffffffff, 0x0, 0x4) shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@dev, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@remote}}, 0x0) ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, 0x0) shmctl$IPC_SET(0x0, 0x1, 0x0) ioctl$PIO_FONT(r0, 0x4b61, &(0x7f0000000740)="9d705183203ecbbfc0d13a4e30241f7ce01b0b4d7682444a507bfc1ac414339f479986467eb40c8065891e1fbbe7263212c5c09bb47896b3d85893f1173f8a139c116f876fdcc1779bffef8c34b5958981616cbcf39f2d8b43491de452d774a74c3ae9555a45180f7d68da36975781ba3a24694ac85eea975ca104181420baf7f3b9614203b0360e7cc29a1c109e") chdir(&(0x7f0000000340)='./file0\x00') symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) umount2(&(0x7f0000000380)='./file0\x00', 0x3) openat$uinput(0xffffffffffffff9c, &(0x7f0000000440)='/dev/uinput\x00', 0x802, 0x0) r3 = syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') sendmsg$FOU_CMD_DEL(r1, &(0x7f00000002c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x28, r3, 0x200, 0x70bd25, 0x25dfdbfe, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e24}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x7f}]}, 0x28}}, 0x24048010) sendmsg$kcm(r0, &(0x7f0000000a40)={&(0x7f0000000580)=@ll={0x11, 0xfd, r2, 0x1, 0x8, 0x6, @dev={[], 0x16}}, 0x80, &(0x7f00000009c0)=[{&(0x7f00000008c0)="367a9f0d4a1564359d1e668c63869bb9bf3b7f5aa4030462889dd6407207295cea1b36e07bc2b38b11c6ca28a73515cf52d89a8199d5c019de826c756a31bac24f707efcfc0a2383216dccc08f804551f0a56d2c9ab95a113fa74dff88ccccc7f278200aa03d2349e688b69191611739bb3e2e5ff110c5858c1a7c5bd5431f9c8e73a99236728f125d5f52a2b0761872fc0fc53cda5458241b2a80fd918b21c8029039d416a6cde6aa786bdfaa21a4e5ffa5f80dec422e0051c7e98a8cff2f4afbe25ca5a154a57c10", 0xc9}], 0x1}, 0x4004000) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000001c0)={0x0, 0x4, 0x2, 0x3, 0x1}, 0x14) ioctl$VIDIOC_SUBDEV_S_SELECTION(r0, 0xc040563e, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x7) msgget(0x1, 0x318) syz_genetlink_get_family_id$team(&(0x7f0000000400)='team\x00') 16:50:26 executing program 3: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000b00)) mount(&(0x7f00000004c0)=ANY=[], &(0x7f000000aff8)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000000)) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000000c0)='tls\x00', 0x4) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$void(r1, 0x5450) renameat2(r0, &(0x7f0000000180)='./file0/file0\x00', 0xffffffffffffffff, 0x0, 0x4) shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@dev, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@remote}}, 0x0) ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, 0x0) shmctl$IPC_SET(0x0, 0x1, 0x0) ioctl$PIO_FONT(r0, 0x4b61, &(0x7f0000000740)="9d705183203ecbbfc0d13a4e30241f7ce01b0b4d7682444a507bfc1ac414339f479986467eb40c8065891e1fbbe7263212c5c09bb47896b3d85893f1173f8a139c116f876fdcc1779bffef8c34b5958981616cbcf39f2d8b43491de452d774a74c3ae9555a45180f7d68da36975781ba3a24694ac85eea975ca104181420baf7f3b9614203b0360e7cc29a1c109e") chdir(&(0x7f0000000340)='./file0\x00') symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) umount2(&(0x7f0000000380)='./file0\x00', 0x3) openat$uinput(0xffffffffffffff9c, &(0x7f0000000440)='/dev/uinput\x00', 0x802, 0x0) r3 = syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') sendmsg$FOU_CMD_DEL(r1, &(0x7f00000002c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x28, r3, 0x200, 0x70bd25, 0x25dfdbfe, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e24}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x7f}]}, 0x28}}, 0x24048010) sendmsg$kcm(r0, &(0x7f0000000a40)={&(0x7f0000000580)=@ll={0x11, 0xfd, r2, 0x1, 0x8, 0x6, @dev={[], 0x16}}, 0x80, &(0x7f00000009c0)=[{&(0x7f00000008c0)="367a9f0d4a1564359d1e668c63869bb9bf3b7f5aa4030462889dd6407207295cea1b36e07bc2b38b11c6ca28a73515cf52d89a8199d5c019de826c756a31bac24f707efcfc0a2383216dccc08f804551f0a56d2c9ab95a113fa74dff88ccccc7f278200aa03d2349e688b69191611739bb3e2e5ff110c5858c1a7c5bd5431f9c8e73a99236728f125d5f52a2b0761872fc0fc53cda5458241b2a80fd918b21c8029039d416a6cde6aa786bdfaa21a4e5ffa5f80dec422e0051c7e98a8cff2f4afbe25ca5a154a57c10", 0xc9}], 0x1}, 0x4004000) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000001c0)={0x0, 0x4, 0x2, 0x3, 0x1}, 0x14) ioctl$VIDIOC_SUBDEV_S_SELECTION(r0, 0xc040563e, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x7) msgget(0x1, 0x318) syz_genetlink_get_family_id$team(&(0x7f0000000400)='team\x00') 16:50:26 executing program 1: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000b00)) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000000c0)='tls\x00', 0x4) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$void(r1, 0x5450) renameat2(r0, &(0x7f0000000180)='./file0/file0\x00', 0xffffffffffffffff, 0x0, 0x4) shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@dev, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@remote}}, 0x0) ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, 0x0) shmctl$IPC_SET(0x0, 0x1, 0x0) ioctl$PIO_FONT(r0, 0x4b61, &(0x7f0000000740)="9d705183203ecbbfc0d13a4e30241f7ce01b0b4d7682444a507bfc1ac414339f479986467eb40c8065891e1fbbe7263212c5c09bb47896b3d85893f1173f8a139c116f876fdcc1779bffef8c34b5958981616cbcf39f2d8b43491de452d774a74c3ae9555a45180f7d68da36975781ba3a24694ac85eea975ca104181420baf7f3b9614203b0360e7cc29a1c109e") chdir(&(0x7f0000000340)='./file0\x00') symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) umount2(&(0x7f0000000380)='./file0\x00', 0x3) openat$uinput(0xffffffffffffff9c, &(0x7f0000000440)='/dev/uinput\x00', 0x802, 0x0) r3 = syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') sendmsg$FOU_CMD_DEL(r1, &(0x7f00000002c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x28, r3, 0x200, 0x70bd25, 0x25dfdbfe, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e24}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x7f}]}, 0x28}}, 0x24048010) sendmsg$kcm(r0, &(0x7f0000000a40)={&(0x7f0000000580)=@ll={0x11, 0xfd, r2, 0x1, 0x8, 0x6, @dev={[], 0x16}}, 0x80, &(0x7f00000009c0)=[{&(0x7f00000008c0)="367a9f0d4a1564359d1e668c63869bb9bf3b7f5aa4030462889dd6407207295cea1b36e07bc2b38b11c6ca28a73515cf52d89a8199d5c019de826c756a31bac24f707efcfc0a2383216dccc08f804551f0a56d2c9ab95a113fa74dff88ccccc7f278200aa03d2349e688b69191611739bb3e2e5ff110c5858c1a7c5bd5431f9c8e73a99236728f125d5f52a2b0761872fc0fc53cda5458241b2a80fd918b21c8029039d416a6cde6aa786bdfaa21a4e5ffa5f80dec422e0051c7e98a8cff2f4afbe25ca5a154a57c10", 0xc9}], 0x1}, 0x4004000) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000001c0)={0x0, 0x4, 0x2, 0x3, 0x1}, 0x14) ioctl$VIDIOC_SUBDEV_S_SELECTION(r0, 0xc040563e, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x7) msgget(0x1, 0x318) syz_genetlink_get_family_id$team(&(0x7f0000000400)='team\x00') [ 332.510265] net_ratelimit: 22 callbacks suppressed [ 332.510271] protocol 88fb is buggy, dev hsr_slave_0 [ 332.520430] protocol 88fb is buggy, dev hsr_slave_1 [ 332.590313] protocol 88fb is buggy, dev hsr_slave_0 [ 332.595433] protocol 88fb is buggy, dev hsr_slave_1 [ 332.830287] protocol 88fb is buggy, dev hsr_slave_0 [ 332.835483] protocol 88fb is buggy, dev hsr_slave_1 [ 332.910467] protocol 88fb is buggy, dev hsr_slave_0 [ 332.915570] protocol 88fb is buggy, dev hsr_slave_1 16:50:29 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x4000000000000036) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={@mcast1, @local, @local, 0x0, 0x0, 0x0, 0x200800000000114}) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x21, r0, 0x0, 0x0) 16:50:29 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000004fc8)={&(0x7f0000016000), 0xc, &(0x7f000000b000)={&(0x7f000002c000)=ANY=[@ANYBLOB="240000001800210000000000000000001c140000fe000001002c41000800123c32000000"], 0x24}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x0) ioctl$DRM_IOCTL_ADD_MAP(r0, 0xc0286415, &(0x7f0000000000)={&(0x7f0000ffb000/0x2000)=nil, 0x2, 0x5, 0xae, &(0x7f0000ffb000/0x1000)=nil, 0x3}) 16:50:29 executing program 2: r0 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'hsr0\x00', 0x0}) bind$packet(r0, &(0x7f0000000340)={0x11, 0x0, r1}, 0x14) sendto(r0, &(0x7f00000000c0)="e360b641b37f0000400000000066", 0xe, 0x0, 0x0, 0x0) 16:50:29 executing program 3: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000b00)) mount(&(0x7f00000004c0)=ANY=[], &(0x7f000000aff8)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000000)) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000000c0)='tls\x00', 0x4) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$void(r1, 0x5450) renameat2(r0, &(0x7f0000000180)='./file0/file0\x00', 0xffffffffffffffff, 0x0, 0x4) shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@dev, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@remote}}, 0x0) ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, 0x0) shmctl$IPC_SET(0x0, 0x1, 0x0) ioctl$PIO_FONT(r0, 0x4b61, &(0x7f0000000740)="9d705183203ecbbfc0d13a4e30241f7ce01b0b4d7682444a507bfc1ac414339f479986467eb40c8065891e1fbbe7263212c5c09bb47896b3d85893f1173f8a139c116f876fdcc1779bffef8c34b5958981616cbcf39f2d8b43491de452d774a74c3ae9555a45180f7d68da36975781ba3a24694ac85eea975ca104181420baf7f3b9614203b0360e7cc29a1c109e") chdir(&(0x7f0000000340)='./file0\x00') symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) umount2(&(0x7f0000000380)='./file0\x00', 0x3) openat$uinput(0xffffffffffffff9c, &(0x7f0000000440)='/dev/uinput\x00', 0x802, 0x0) r3 = syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') sendmsg$FOU_CMD_DEL(r1, &(0x7f00000002c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x28, r3, 0x200, 0x70bd25, 0x25dfdbfe, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e24}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x7f}]}, 0x28}}, 0x24048010) sendmsg$kcm(r0, &(0x7f0000000a40)={&(0x7f0000000580)=@ll={0x11, 0xfd, r2, 0x1, 0x8, 0x6, @dev={[], 0x16}}, 0x80, &(0x7f00000009c0)=[{&(0x7f00000008c0)="367a9f0d4a1564359d1e668c63869bb9bf3b7f5aa4030462889dd6407207295cea1b36e07bc2b38b11c6ca28a73515cf52d89a8199d5c019de826c756a31bac24f707efcfc0a2383216dccc08f804551f0a56d2c9ab95a113fa74dff88ccccc7f278200aa03d2349e688b69191611739bb3e2e5ff110c5858c1a7c5bd5431f9c8e73a99236728f125d5f52a2b0761872fc0fc53cda5458241b2a80fd918b21c8029039d416a6cde6aa786bdfaa21a4e5ffa5f80dec422e0051c7e98a8cff2f4afbe25ca5a154a57c10", 0xc9}], 0x1}, 0x4004000) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000001c0)={0x0, 0x4, 0x2, 0x3, 0x1}, 0x14) ioctl$VIDIOC_SUBDEV_S_SELECTION(r0, 0xc040563e, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x7) msgget(0x1, 0x318) syz_genetlink_get_family_id$team(&(0x7f0000000400)='team\x00') 16:50:29 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$EXT4_IOC_MIGRATE(r0, 0x6609) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r3, 0x84, 0x21, &(0x7f0000013e95), 0x4) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_INITMSG(r3, 0x84, 0x75, &(0x7f0000000040), 0x8) close(r3) r4 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x0, 0x0) getsockname$netrom(r4, &(0x7f00000001c0)={{0x3, @rose}, [@remote, @rose, @bcast, @netrom, @remote, @remote, @default, @null]}, &(0x7f0000000240)=0x48) r5 = syz_open_dev$audion(&(0x7f00000002c0)='/dev/audio#\x00', 0x7, 0x801) ioctl$PERF_EVENT_IOC_REFRESH(r5, 0x2402, 0xfffffffffffeffff) close(r2) 16:50:29 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') getsockopt$inet_mtu(r1, 0x0, 0xa, &(0x7f0000000180), &(0x7f00000001c0)=0x4) sendmsg$TIPC_NL_PUBL_GET(r1, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x208000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x20, r2, 0x904, 0x70bd2d, 0x25dfdbfc, {}, [@TIPC_NLA_MEDIA={0xc, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}]}]}, 0x20}, 0x1, 0x0, 0x0, 0x4048000}, 0x20000000) ioctl$PPPOEIOCDFWD(r1, 0xb101, 0x0) getsockopt$packet_int(r0, 0x107, 0xb, &(0x7f0000000000), &(0x7f00000003c0)=0x67) 16:50:29 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x0, 0x0) ioctl$DRM_IOCTL_SET_VERSION(r2, 0xc0106407, &(0x7f00000000c0)={0x5, 0x1, 0x4, 0x3}) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID2(r3, 0x4008ae90, &(0x7f0000000100)=ANY=[@ANYBLOB="0100000000000000010098a600000000060000cd6b709af0b3db4a2fcb1ccec50a0000e7ffffff0000000000000000000000000000000000000000000000"]) [ 333.310278] protocol 88fb is buggy, dev hsr_slave_0 [ 333.315529] protocol 88fb is buggy, dev hsr_slave_1 16:50:29 executing program 3: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000b00)) mount(&(0x7f00000004c0)=ANY=[], &(0x7f000000aff8)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000000)) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000000c0)='tls\x00', 0x4) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$void(r1, 0x5450) renameat2(r0, &(0x7f0000000180)='./file0/file0\x00', 0xffffffffffffffff, 0x0, 0x4) shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@dev, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@remote}}, 0x0) ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, 0x0) shmctl$IPC_SET(0x0, 0x1, 0x0) ioctl$PIO_FONT(r0, 0x4b61, &(0x7f0000000740)="9d705183203ecbbfc0d13a4e30241f7ce01b0b4d7682444a507bfc1ac414339f479986467eb40c8065891e1fbbe7263212c5c09bb47896b3d85893f1173f8a139c116f876fdcc1779bffef8c34b5958981616cbcf39f2d8b43491de452d774a74c3ae9555a45180f7d68da36975781ba3a24694ac85eea975ca104181420baf7f3b9614203b0360e7cc29a1c109e") chdir(&(0x7f0000000340)='./file0\x00') symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) umount2(&(0x7f0000000380)='./file0\x00', 0x3) openat$uinput(0xffffffffffffff9c, &(0x7f0000000440)='/dev/uinput\x00', 0x802, 0x0) r3 = syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') sendmsg$FOU_CMD_DEL(r1, &(0x7f00000002c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x28, r3, 0x200, 0x70bd25, 0x25dfdbfe, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e24}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x7f}]}, 0x28}}, 0x24048010) sendmsg$kcm(r0, &(0x7f0000000a40)={&(0x7f0000000580)=@ll={0x11, 0xfd, r2, 0x1, 0x8, 0x6, @dev={[], 0x16}}, 0x80, &(0x7f00000009c0)=[{&(0x7f00000008c0)="367a9f0d4a1564359d1e668c63869bb9bf3b7f5aa4030462889dd6407207295cea1b36e07bc2b38b11c6ca28a73515cf52d89a8199d5c019de826c756a31bac24f707efcfc0a2383216dccc08f804551f0a56d2c9ab95a113fa74dff88ccccc7f278200aa03d2349e688b69191611739bb3e2e5ff110c5858c1a7c5bd5431f9c8e73a99236728f125d5f52a2b0761872fc0fc53cda5458241b2a80fd918b21c8029039d416a6cde6aa786bdfaa21a4e5ffa5f80dec422e0051c7e98a8cff2f4afbe25ca5a154a57c10", 0xc9}], 0x1}, 0x4004000) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000001c0)={0x0, 0x4, 0x2, 0x3, 0x1}, 0x14) ioctl$VIDIOC_SUBDEV_S_SELECTION(r0, 0xc040563e, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x7) msgget(0x1, 0x318) syz_genetlink_get_family_id$team(&(0x7f0000000400)='team\x00') 16:50:29 executing program 2: r0 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'hsr0\x00', 0x0}) bind$packet(r0, &(0x7f0000000340)={0x11, 0x0, r1}, 0x14) sendto(r0, &(0x7f00000000c0)="e360b641b37f0058650000000066", 0xe, 0x0, 0x0, 0x0) 16:50:29 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000000)=0xffffffff, 0x4) bind$inet6(r0, &(0x7f0000f61fe4)={0xa, 0x4e20, 0x0, @ipv4={[], [], @broadcast}}, 0x1c) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000d1c000)=0x2c, 0x4) bind$inet6(r1, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @ipv4}, 0x1c) r2 = syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0x2, 0x2) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_SOCK_GET(r2, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8000600}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x64, r3, 0x20, 0x70bd25, 0x25dfdbff, {}, [@TIPC_NLA_NET={0x50, 0x7, [@TIPC_NLA_NET_NODEID={0xc}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x3c50}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x28a}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x1}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x3}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x9}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0xde}, @TIPC_NLA_NET_ID={0x8, 0x1, 0xfc}]}]}, 0x64}, 0x1, 0x0, 0x0, 0x20000000}, 0x800) syz_emit_ethernet(0x2a, &(0x7f000070aef1)={@local, @empty=[0x0, 0x0, 0x14], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x11, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @broadcast}, @udp={0x0, 0x4e20, 0x8}}}}}, 0x0) 16:50:29 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000588ff8)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$lock(r0, 0x7, &(0x7f0000002000)={0x1}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x80000, 0x0) keyctl$set_reqkey_keyring(0xe, 0x3) ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) recvfrom$rose(r3, &(0x7f00000001c0)=""/4096, 0x1000, 0x40010003, &(0x7f0000000040)=@short={0xb, @dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, 0x1, @null}, 0x1c) fcntl$lock(r0, 0x26, &(0x7f0000000080)) fcntl$lock(r1, 0x6, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x80}) 16:50:29 executing program 0: r0 = syz_open_dev$cec(&(0x7f0000000040)='/dev/cec#\x00', 0x3, 0x2) ioctl$RTC_EPOCH_SET(r0, 0x4008700e, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0xd, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000061129fbb4399e195911b5ee36b7f4c5c00000000009500000000000000"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251, 0x4}, 0x48) [ 333.558657] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 16:50:32 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x4000000000000036) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={@mcast1, @local, @local, 0x0, 0x0, 0x0, 0x200800000000114}) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x21, r0, 0x0, 0x0) 16:50:32 executing program 3: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000b00)) mount(&(0x7f00000004c0)=ANY=[], &(0x7f000000aff8)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000000)) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000000c0)='tls\x00', 0x4) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$void(r1, 0x5450) renameat2(r0, &(0x7f0000000180)='./file0/file0\x00', 0xffffffffffffffff, 0x0, 0x4) shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@dev, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@remote}}, 0x0) ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, 0x0) shmctl$IPC_SET(0x0, 0x1, 0x0) ioctl$PIO_FONT(r0, 0x4b61, &(0x7f0000000740)="9d705183203ecbbfc0d13a4e30241f7ce01b0b4d7682444a507bfc1ac414339f479986467eb40c8065891e1fbbe7263212c5c09bb47896b3d85893f1173f8a139c116f876fdcc1779bffef8c34b5958981616cbcf39f2d8b43491de452d774a74c3ae9555a45180f7d68da36975781ba3a24694ac85eea975ca104181420baf7f3b9614203b0360e7cc29a1c109e") chdir(&(0x7f0000000340)='./file0\x00') symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) umount2(&(0x7f0000000380)='./file0\x00', 0x3) openat$uinput(0xffffffffffffff9c, &(0x7f0000000440)='/dev/uinput\x00', 0x802, 0x0) r3 = syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') sendmsg$FOU_CMD_DEL(r1, &(0x7f00000002c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x28, r3, 0x200, 0x70bd25, 0x25dfdbfe, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e24}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x7f}]}, 0x28}}, 0x24048010) sendmsg$kcm(r0, &(0x7f0000000a40)={&(0x7f0000000580)=@ll={0x11, 0xfd, r2, 0x1, 0x8, 0x6, @dev={[], 0x16}}, 0x80, &(0x7f00000009c0)=[{&(0x7f00000008c0)="367a9f0d4a1564359d1e668c63869bb9bf3b7f5aa4030462889dd6407207295cea1b36e07bc2b38b11c6ca28a73515cf52d89a8199d5c019de826c756a31bac24f707efcfc0a2383216dccc08f804551f0a56d2c9ab95a113fa74dff88ccccc7f278200aa03d2349e688b69191611739bb3e2e5ff110c5858c1a7c5bd5431f9c8e73a99236728f125d5f52a2b0761872fc0fc53cda5458241b2a80fd918b21c8029039d416a6cde6aa786bdfaa21a4e5ffa5f80dec422e0051c7e98a8cff2f4afbe25ca5a154a57c10", 0xc9}], 0x1}, 0x4004000) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000001c0)={0x0, 0x4, 0x2, 0x3, 0x1}, 0x14) ioctl$VIDIOC_SUBDEV_S_SELECTION(r0, 0xc040563e, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x7) msgget(0x1, 0x318) syz_genetlink_get_family_id$team(&(0x7f0000000400)='team\x00') 16:50:32 executing program 1: sched_setattr(0x0, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f0000000040)) r1 = creat(&(0x7f0000000180)='./bus\x00', 0x0) io_setup(0x3, &(0x7f0000000080)=0x0) io_submit(r2, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r1, &(0x7f0000000000), 0x377140be6b5ef4c7}]) fchmod(r1, 0x0) utimes(&(0x7f0000000000)='./bus\x00', 0x0) 16:50:32 executing program 2: r0 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'hsr0\x00', 0x0}) bind$packet(r0, &(0x7f0000000340)={0x11, 0x0, r1}, 0x14) sendto(r0, &(0x7f00000000c0)="e360b641b37f00e8030000000066", 0xe, 0x0, 0x0, 0x0) 16:50:32 executing program 0: r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="230000005e0081aee4050c00000f0000709110ecab372942b44ee4a0008bc609f6d8ff", 0x23}], 0x1}, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1132}) recvmsg(r1, &(0x7f00000006c0)={&(0x7f0000000040)=@xdp, 0x80, &(0x7f0000000640)=[{&(0x7f00000000c0)=""/118, 0x76}, {&(0x7f0000000240)=""/46, 0x2e}, {&(0x7f0000000340)=""/233, 0xe9}, {&(0x7f0000000280)}, {&(0x7f00000002c0)=""/26, 0x1a}, {&(0x7f0000000440)=""/170, 0xaa}, {&(0x7f0000000500)=""/202, 0xca}, {&(0x7f0000000600)=""/2, 0x2}], 0x8}, 0x2) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) socket$isdn(0x22, 0x3, 0x1) 16:50:32 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r2 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x6) setsockopt(r2, 0x10d, 0x800000000a, &(0x7f0000000300)="03", 0x1) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r3 = accept(r1, 0x0, &(0x7f0000000080)) getsockopt$IP_VS_SO_GET_DAEMON(r3, 0x0, 0x487, &(0x7f0000000040), &(0x7f0000000180)=0xfffffffffffffeb2) sendmsg$key(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="00ffffceecefce8fada72d0e8bdc24ffd103749d1bb5547004000f8887c6477f281db961a02b66e500000000000000000000002acae8c3f9ce26a630e4e32ca98ae392"], 0x43}}, 0x0) ioctl$PPPOEIOCDFWD(0xffffffffffffffff, 0xb101, 0x0) socket$inet6(0xa, 0x1000000000003, 0x100000003) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="025c090000000000000070") r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x13, &(0x7f0000000200)=0x100000001, 0x4) connect$inet6(r4, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f0000000340)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r4, &(0x7f00000002c0), 0x0, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) setsockopt$sock_timeval(r4, 0x1, 0x15, &(0x7f0000000040)={0x0, 0x2710}, 0x10) write(r4, &(0x7f0000000900)="1102ea373406b21d9bc444ba83f952d57b52f57f53bbf7bdedb5d362ddbb8481de598149d6a8d515d6baa6a4f2fe29511d6f0c4a0d4977f4aa1b9a1488d387afb5c54099f65395e38ca84b3c1fe8896530ab7f6d1ac6415e9dffea1e2db57fac4a61ddf40a739ada2c12a7fdaf14d340039c61", 0x73) ppoll(&(0x7f00000001c0)=[{r0, 0x2008}, {r3, 0x801d}, {r4, 0x80}, {r1, 0x28}, {r2, 0x2}, {0xffffffffffffffff, 0x80d4}, {r3}], 0x7, &(0x7f0000003740)={0x0, 0x989680}, &(0x7f0000003780), 0x8) sendmmsg(r2, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x3a6, 0x0) r5 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$GIO_UNIMAP(r5, 0x4b66, &(0x7f00000000c0)={0x3, &(0x7f0000000040)=[{}, {}, {}]}) r6 = socket$inet6(0xa, 0x1000000200002, 0xfffffffffffffffe) ioctl(r5, 0x0, &(0x7f0000000240)="025cc85c20000000000000") syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) dup3(r0, r6, 0x80000) setsockopt$IP6T_SO_SET_REPLACE(r6, 0x29, 0x40, &(0x7f0000000980)=ANY=[@ANYBLOB="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"], 0x1) 16:50:32 executing program 2: r0 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'hsr0\x00', 0x0}) bind$packet(r0, &(0x7f0000000340)={0x11, 0x0, r1}, 0x14) sendto(r0, &(0x7f00000000c0)="e360b641b37f0000000060000066", 0xe, 0x0, 0x0, 0x0) 16:50:32 executing program 3: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000b00)) mount(&(0x7f00000004c0)=ANY=[], &(0x7f000000aff8)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000000)) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000000c0)='tls\x00', 0x4) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$void(r1, 0x5450) renameat2(r0, &(0x7f0000000180)='./file0/file0\x00', 0xffffffffffffffff, 0x0, 0x4) shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@dev, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@remote}}, 0x0) ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, 0x0) shmctl$IPC_SET(0x0, 0x1, 0x0) ioctl$PIO_FONT(r0, 0x4b61, &(0x7f0000000740)="9d705183203ecbbfc0d13a4e30241f7ce01b0b4d7682444a507bfc1ac414339f479986467eb40c8065891e1fbbe7263212c5c09bb47896b3d85893f1173f8a139c116f876fdcc1779bffef8c34b5958981616cbcf39f2d8b43491de452d774a74c3ae9555a45180f7d68da36975781ba3a24694ac85eea975ca104181420baf7f3b9614203b0360e7cc29a1c109e") chdir(&(0x7f0000000340)='./file0\x00') symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) umount2(&(0x7f0000000380)='./file0\x00', 0x3) openat$uinput(0xffffffffffffff9c, &(0x7f0000000440)='/dev/uinput\x00', 0x802, 0x0) r3 = syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') sendmsg$FOU_CMD_DEL(r1, &(0x7f00000002c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x28, r3, 0x200, 0x70bd25, 0x25dfdbfe, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e24}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x7f}]}, 0x28}}, 0x24048010) sendmsg$kcm(r0, &(0x7f0000000a40)={&(0x7f0000000580)=@ll={0x11, 0xfd, r2, 0x1, 0x8, 0x6, @dev={[], 0x16}}, 0x80, &(0x7f00000009c0)=[{&(0x7f00000008c0)="367a9f0d4a1564359d1e668c63869bb9bf3b7f5aa4030462889dd6407207295cea1b36e07bc2b38b11c6ca28a73515cf52d89a8199d5c019de826c756a31bac24f707efcfc0a2383216dccc08f804551f0a56d2c9ab95a113fa74dff88ccccc7f278200aa03d2349e688b69191611739bb3e2e5ff110c5858c1a7c5bd5431f9c8e73a99236728f125d5f52a2b0761872fc0fc53cda5458241b2a80fd918b21c8029039d416a6cde6aa786bdfaa21a4e5ffa5f80dec422e0051c7e98a8cff2f4afbe25ca5a154a57c10", 0xc9}], 0x1}, 0x4004000) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000001c0)={0x0, 0x4, 0x2, 0x3, 0x1}, 0x14) ioctl$VIDIOC_SUBDEV_S_SELECTION(r0, 0xc040563e, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x7) msgget(0x1, 0x318) syz_genetlink_get_family_id$team(&(0x7f0000000400)='team\x00') 16:50:32 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x4000000000000036) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={@mcast1, @local, @local, 0x0, 0x0, 0x0, 0x200800000000114}) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x21, r0, 0x0, 0x0) 16:50:32 executing program 2: r0 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'hsr0\x00', 0x0}) bind$packet(r0, &(0x7f0000000340)={0x11, 0x0, r1}, 0x14) sendto(r0, &(0x7f00000000c0)="e360b641b37f0000000543000066", 0xe, 0x0, 0x0, 0x0) 16:50:32 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r2 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x6) setsockopt(r2, 0x10d, 0x800000000a, &(0x7f0000000300)="03", 0x1) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r3 = accept(r1, 0x0, &(0x7f0000000080)) getsockopt$IP_VS_SO_GET_DAEMON(r3, 0x0, 0x487, &(0x7f0000000040), &(0x7f0000000180)=0xfffffffffffffeb2) sendmsg$key(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="00ffffceecefce8fada72d0e8bdc24ffd103749d1bb5547004000f8887c6477f281db961a02b66e500000000000000000000002acae8c3f9ce26a630e4e32ca98ae392"], 0x43}}, 0x0) ioctl$PPPOEIOCDFWD(0xffffffffffffffff, 0xb101, 0x0) socket$inet6(0xa, 0x1000000000003, 0x100000003) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="025c090000000000000070") r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x13, &(0x7f0000000200)=0x100000001, 0x4) connect$inet6(r4, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f0000000340)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r4, &(0x7f00000002c0), 0x0, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) setsockopt$sock_timeval(r4, 0x1, 0x15, &(0x7f0000000040)={0x0, 0x2710}, 0x10) write(r4, &(0x7f0000000900)="1102ea373406b21d9bc444ba83f952d57b52f57f53bbf7bdedb5d362ddbb8481de598149d6a8d515d6baa6a4f2fe29511d6f0c4a0d4977f4aa1b9a1488d387afb5c54099f65395e38ca84b3c1fe8896530ab7f6d1ac6415e9dffea1e2db57fac4a61ddf40a739ada2c12a7fdaf14d340039c61", 0x73) ppoll(&(0x7f00000001c0)=[{r0, 0x2008}, {r3, 0x801d}, {r4, 0x80}, {r1, 0x28}, {r2, 0x2}, {0xffffffffffffffff, 0x80d4}, {r3}], 0x7, &(0x7f0000003740)={0x0, 0x989680}, &(0x7f0000003780), 0x8) sendmmsg(r2, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x3a6, 0x0) r5 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$GIO_UNIMAP(r5, 0x4b66, &(0x7f00000000c0)={0x3, &(0x7f0000000040)=[{}, {}, {}]}) r6 = socket$inet6(0xa, 0x1000000200002, 0xfffffffffffffffe) ioctl(r5, 0x0, &(0x7f0000000240)="025cc85c20000000000000") syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) dup3(r0, r6, 0x80000) setsockopt$IP6T_SO_SET_REPLACE(r6, 0x29, 0x40, &(0x7f0000000980)=ANY=[@ANYBLOB="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"], 0x1) 16:50:32 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x4000000000000036) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={@mcast1, @local, @local, 0x0, 0x0, 0x0, 0x200800000000114}) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x21, r0, 0x0, 0x0) [ 337.870273] net_ratelimit: 30 callbacks suppressed [ 337.870279] protocol 88fb is buggy, dev hsr_slave_0 [ 337.880493] protocol 88fb is buggy, dev hsr_slave_1 [ 337.950299] protocol 88fb is buggy, dev hsr_slave_0 [ 337.955437] protocol 88fb is buggy, dev hsr_slave_1 [ 338.750279] protocol 88fb is buggy, dev hsr_slave_0 [ 338.755432] protocol 88fb is buggy, dev hsr_slave_1 [ 338.830277] protocol 88fb is buggy, dev hsr_slave_0 [ 338.835413] protocol 88fb is buggy, dev hsr_slave_1 [ 339.070298] protocol 88fb is buggy, dev hsr_slave_0 [ 339.075487] protocol 88fb is buggy, dev hsr_slave_1 16:50:35 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x4000000000000036) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={@mcast1, @local, @local, 0x80000000}) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x21, r0, 0x0, 0x0) 16:50:35 executing program 2: r0 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'hsr0\x00', 0x0}) bind$packet(r0, &(0x7f0000000340)={0x11, 0x0, r1}, 0x14) sendto(r0, &(0x7f00000000c0)="e360b641b37f0088470000000066", 0xe, 0x0, 0x0, 0x0) 16:50:35 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r2 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x6) setsockopt(r2, 0x10d, 0x800000000a, &(0x7f0000000300)="03", 0x1) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r3 = accept(r1, 0x0, &(0x7f0000000080)) getsockopt$IP_VS_SO_GET_DAEMON(r3, 0x0, 0x487, &(0x7f0000000040), &(0x7f0000000180)=0xfffffffffffffeb2) sendmsg$key(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="00ffffceecefce8fada72d0e8bdc24ffd103749d1bb5547004000f8887c6477f281db961a02b66e500000000000000000000002acae8c3f9ce26a630e4e32ca98ae392"], 0x43}}, 0x0) ioctl$PPPOEIOCDFWD(0xffffffffffffffff, 0xb101, 0x0) socket$inet6(0xa, 0x1000000000003, 0x100000003) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="025c090000000000000070") r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x13, &(0x7f0000000200)=0x100000001, 0x4) connect$inet6(r4, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f0000000340)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r4, &(0x7f00000002c0), 0x0, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) setsockopt$sock_timeval(r4, 0x1, 0x15, &(0x7f0000000040)={0x0, 0x2710}, 0x10) write(r4, &(0x7f0000000900)="1102ea373406b21d9bc444ba83f952d57b52f57f53bbf7bdedb5d362ddbb8481de598149d6a8d515d6baa6a4f2fe29511d6f0c4a0d4977f4aa1b9a1488d387afb5c54099f65395e38ca84b3c1fe8896530ab7f6d1ac6415e9dffea1e2db57fac4a61ddf40a739ada2c12a7fdaf14d340039c61", 0x73) ppoll(&(0x7f00000001c0)=[{r0, 0x2008}, {r3, 0x801d}, {r4, 0x80}, {r1, 0x28}, {r2, 0x2}, {0xffffffffffffffff, 0x80d4}, {r3}], 0x7, &(0x7f0000003740)={0x0, 0x989680}, &(0x7f0000003780), 0x8) sendmmsg(r2, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x3a6, 0x0) r5 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$GIO_UNIMAP(r5, 0x4b66, &(0x7f00000000c0)={0x3, &(0x7f0000000040)=[{}, {}, {}]}) r6 = socket$inet6(0xa, 0x1000000200002, 0xfffffffffffffffe) ioctl(r5, 0x0, &(0x7f0000000240)="025cc85c20000000000000") syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) dup3(r0, r6, 0x80000) setsockopt$IP6T_SO_SET_REPLACE(r6, 0x29, 0x40, &(0x7f0000000980)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000005fc10000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000f00018010000000000000000000000000000000000000000000000002800727066696c74657200000000000000000000000000000000000000000000010000000000000028005345540000000000000000000000000000000000000000000000000000010900010255ea9f04000000ade0fa943c7dd98f880000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000fe3fd213cc2620e000000000000000000000020ad88010000000000000000000000000000000000000000000000003000616800000000000000000000000000000000000000000000000000000000000004d2000004d414f9ffff030300002800727066696c74657200000000000000000000000000000000000000000000040000000000000068004354000000000000000000000000000000000000000041000000000000736e6d705f747261700000000000000073797a310000000000000020000000000000000000000000000000000000000000000000ab0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000500000000000000000000000000000000000000000000002800000012000000000000000000000000000000000000000000000000000000feffffff000000003f27f77c0be0c56641d087eb585bb2201486ac84472f7e8a314559961e236168960e6fe60b28e19abb0f6dd98ed370bcba06a3e39cc55941b5d112f31c65754f9d81557fe481a9bd78e8881e0908a3dcf0205e11036b1aac9cf388d94f0488491b5f300f098f39fe9793475dbfb99d521f7f1764677fa887de00c67240c681b6943fa77700437dab84cf5c100448d35320775a4ed1554edcf3480d1f30414ef9f2c003252f4679700fc8961089cb5901b04124fa781b20c62d20938da3d035cdf9480516d5d619030bde8030f40bd39fb7a9cca066c5f907042e042b07c310101330770c7b47ff5fc0949a1d2b73983a7af43a41644ee0d5603895deeb232accdeae7320409d4e6b2a22fb3da20354ac9a7f61dd08522118570c70fe6604db75cd4b5c"], 0x1) 16:50:35 executing program 3: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000b00)) mount(&(0x7f00000004c0)=ANY=[], &(0x7f000000aff8)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000000)) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000000c0)='tls\x00', 0x4) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$void(r1, 0x5450) renameat2(r0, &(0x7f0000000180)='./file0/file0\x00', 0xffffffffffffffff, 0x0, 0x4) shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@dev, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@remote}}, 0x0) ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, 0x0) shmctl$IPC_SET(0x0, 0x1, 0x0) ioctl$PIO_FONT(r0, 0x4b61, &(0x7f0000000740)="9d705183203ecbbfc0d13a4e30241f7ce01b0b4d7682444a507bfc1ac414339f479986467eb40c8065891e1fbbe7263212c5c09bb47896b3d85893f1173f8a139c116f876fdcc1779bffef8c34b5958981616cbcf39f2d8b43491de452d774a74c3ae9555a45180f7d68da36975781ba3a24694ac85eea975ca104181420baf7f3b9614203b0360e7cc29a1c109e") chdir(&(0x7f0000000340)='./file0\x00') symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) umount2(&(0x7f0000000380)='./file0\x00', 0x3) openat$uinput(0xffffffffffffff9c, &(0x7f0000000440)='/dev/uinput\x00', 0x802, 0x0) r3 = syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') sendmsg$FOU_CMD_DEL(r1, &(0x7f00000002c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x28, r3, 0x200, 0x70bd25, 0x25dfdbfe, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e24}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x7f}]}, 0x28}}, 0x24048010) sendmsg$kcm(r0, &(0x7f0000000a40)={&(0x7f0000000580)=@ll={0x11, 0xfd, r2, 0x1, 0x8, 0x6, @dev={[], 0x16}}, 0x80, &(0x7f00000009c0)=[{&(0x7f00000008c0)="367a9f0d4a1564359d1e668c63869bb9bf3b7f5aa4030462889dd6407207295cea1b36e07bc2b38b11c6ca28a73515cf52d89a8199d5c019de826c756a31bac24f707efcfc0a2383216dccc08f804551f0a56d2c9ab95a113fa74dff88ccccc7f278200aa03d2349e688b69191611739bb3e2e5ff110c5858c1a7c5bd5431f9c8e73a99236728f125d5f52a2b0761872fc0fc53cda5458241b2a80fd918b21c8029039d416a6cde6aa786bdfaa21a4e5ffa5f80dec422e0051c7e98a8cff2f4afbe25ca5a154a57c10", 0xc9}], 0x1}, 0x4004000) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000001c0)={0x0, 0x4, 0x2, 0x3, 0x1}, 0x14) ioctl$VIDIOC_SUBDEV_S_SELECTION(r0, 0xc040563e, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x7) msgget(0x1, 0x318) syz_genetlink_get_family_id$team(&(0x7f0000000400)='team\x00') 16:50:35 executing program 1: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000b00)) mount(&(0x7f00000004c0)=ANY=[], &(0x7f000000aff8)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000000)) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000000c0)='tls\x00', 0x4) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$void(r1, 0x5450) renameat2(r0, &(0x7f0000000180)='./file0/file0\x00', 0xffffffffffffffff, 0x0, 0x4) shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@dev, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@remote}}, 0x0) ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, 0x0) shmctl$IPC_SET(0x0, 0x1, 0x0) ioctl$PIO_FONT(r0, 0x4b61, &(0x7f0000000740)="9d705183203ecbbfc0d13a4e30241f7ce01b0b4d7682444a507bfc1ac414339f479986467eb40c8065891e1fbbe7263212c5c09bb47896b3d85893f1173f8a139c116f876fdcc1779bffef8c34b5958981616cbcf39f2d8b43491de452d774a74c3ae9555a45180f7d68da36975781ba3a24694ac85eea975ca104181420baf7f3b9614203b0360e7cc29a1c109e") chdir(&(0x7f0000000340)='./file0\x00') symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) umount2(&(0x7f0000000380)='./file0\x00', 0x3) openat$uinput(0xffffffffffffff9c, &(0x7f0000000440)='/dev/uinput\x00', 0x802, 0x0) r3 = syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') sendmsg$FOU_CMD_DEL(r1, &(0x7f00000002c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x28, r3, 0x200, 0x70bd25, 0x25dfdbfe, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e24}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x7f}]}, 0x28}}, 0x24048010) sendmsg$kcm(r0, &(0x7f0000000a40)={&(0x7f0000000580)=@ll={0x11, 0xfd, r2, 0x1, 0x8, 0x6, @dev={[], 0x16}}, 0x80, &(0x7f00000009c0)=[{&(0x7f00000008c0)="367a9f0d4a1564359d1e668c63869bb9bf3b7f5aa4030462889dd6407207295cea1b36e07bc2b38b11c6ca28a73515cf52d89a8199d5c019de826c756a31bac24f707efcfc0a2383216dccc08f804551f0a56d2c9ab95a113fa74dff88ccccc7f278200aa03d2349e688b69191611739bb3e2e5ff110c5858c1a7c5bd5431f9c8e73a99236728f125d5f52a2b0761872fc0fc53cda5458241b2a80fd918b21c8029039d416a6cde6aa786bdfaa21a4e5ffa5f80dec422e0051c7e98a8cff2f4afbe25ca5a154a57c10", 0xc9}], 0x1}, 0x4004000) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000001c0)={0x0, 0x4, 0x2, 0x3, 0x1}, 0x14) ioctl$VIDIOC_SUBDEV_S_SELECTION(r0, 0xc040563e, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x7) msgget(0x1, 0x318) syz_genetlink_get_family_id$team(&(0x7f0000000400)='team\x00') 16:50:35 executing program 3: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000b00)) mount(&(0x7f00000004c0)=ANY=[], &(0x7f000000aff8)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000000)) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000000c0)='tls\x00', 0x4) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(0x0) ioctl$void(0xffffffffffffffff, 0x5450) renameat2(0xffffffffffffffff, &(0x7f0000000180)='./file0/file0\x00', 0xffffffffffffffff, 0x0, 0x4) shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@dev, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@remote}}, 0x0) ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, 0x0) shmctl$IPC_SET(0x0, 0x1, 0x0) ioctl$PIO_FONT(0xffffffffffffffff, 0x4b61, &(0x7f0000000740)="9d705183203ecbbfc0d13a4e30241f7ce01b0b4d7682444a507bfc1ac414339f479986467eb40c8065891e1fbbe7263212c5c09bb47896b3d85893f1173f8a139c116f876fdcc1779bffef8c34b5958981616cbcf39f2d8b43491de452d774a74c3ae9555a45180f7d68da36975781ba3a24694ac85eea975ca104181420baf7f3b9614203b0360e7cc29a1c109e") chdir(&(0x7f0000000340)='./file0\x00') symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) umount2(&(0x7f0000000380)='./file0\x00', 0x3) openat$uinput(0xffffffffffffff9c, &(0x7f0000000440)='/dev/uinput\x00', 0x802, 0x0) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x28, r1, 0x200, 0x70bd25, 0x25dfdbfe, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e24}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x7f}]}, 0x28}}, 0x24048010) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000a40)={&(0x7f0000000580)=@ll={0x11, 0xfd, r0, 0x1, 0x8, 0x6, @dev={[], 0x16}}, 0x80, &(0x7f00000009c0)=[{&(0x7f00000008c0)="367a9f0d4a1564359d1e668c63869bb9bf3b7f5aa4030462889dd6407207295cea1b36e07bc2b38b11c6ca28a73515cf52d89a8199d5c019de826c756a31bac24f707efcfc0a2383216dccc08f804551f0a56d2c9ab95a113fa74dff88ccccc7f278200aa03d2349e688b69191611739bb3e2e5ff110c5858c1a7c5bd5431f9c8e73a99236728f125d5f52a2b0761872fc0fc53cda5458241b2a80fd918b21c8029039d416a6cde6aa786bdfaa21a4e5ffa5f80dec422e0051c7e98a8cff2f4afbe25ca5a154a57c10", 0xc9}], 0x1}, 0x4004000) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f00000001c0)={0x0, 0x4, 0x2, 0x3, 0x1}, 0x14) ioctl$VIDIOC_SUBDEV_S_SELECTION(0xffffffffffffffff, 0xc040563e, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x7) msgget(0x1, 0x318) syz_genetlink_get_family_id$team(&(0x7f0000000400)='team\x00') 16:50:35 executing program 1: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000b00)) mount(&(0x7f00000004c0)=ANY=[], &(0x7f000000aff8)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000000)) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000000c0)='tls\x00', 0x4) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$void(r1, 0x5450) renameat2(r0, &(0x7f0000000180)='./file0/file0\x00', 0xffffffffffffffff, 0x0, 0x4) shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@dev, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@remote}}, 0x0) ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, 0x0) shmctl$IPC_SET(0x0, 0x1, 0x0) ioctl$PIO_FONT(r0, 0x4b61, &(0x7f0000000740)="9d705183203ecbbfc0d13a4e30241f7ce01b0b4d7682444a507bfc1ac414339f479986467eb40c8065891e1fbbe7263212c5c09bb47896b3d85893f1173f8a139c116f876fdcc1779bffef8c34b5958981616cbcf39f2d8b43491de452d774a74c3ae9555a45180f7d68da36975781ba3a24694ac85eea975ca104181420baf7f3b9614203b0360e7cc29a1c109e") chdir(&(0x7f0000000340)='./file0\x00') symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) umount2(&(0x7f0000000380)='./file0\x00', 0x3) openat$uinput(0xffffffffffffff9c, &(0x7f0000000440)='/dev/uinput\x00', 0x802, 0x0) r3 = syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') sendmsg$FOU_CMD_DEL(r1, &(0x7f00000002c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x28, r3, 0x200, 0x70bd25, 0x25dfdbfe, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e24}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x7f}]}, 0x28}}, 0x24048010) sendmsg$kcm(r0, &(0x7f0000000a40)={&(0x7f0000000580)=@ll={0x11, 0xfd, r2, 0x1, 0x8, 0x6, @dev={[], 0x16}}, 0x80, &(0x7f00000009c0)=[{&(0x7f00000008c0)="367a9f0d4a1564359d1e668c63869bb9bf3b7f5aa4030462889dd6407207295cea1b36e07bc2b38b11c6ca28a73515cf52d89a8199d5c019de826c756a31bac24f707efcfc0a2383216dccc08f804551f0a56d2c9ab95a113fa74dff88ccccc7f278200aa03d2349e688b69191611739bb3e2e5ff110c5858c1a7c5bd5431f9c8e73a99236728f125d5f52a2b0761872fc0fc53cda5458241b2a80fd918b21c8029039d416a6cde6aa786bdfaa21a4e5ffa5f80dec422e0051c7e98a8cff2f4afbe25ca5a154a57c10", 0xc9}], 0x1}, 0x4004000) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000001c0)={0x0, 0x4, 0x2, 0x3, 0x1}, 0x14) ioctl$VIDIOC_SUBDEV_S_SELECTION(r0, 0xc040563e, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x7) msgget(0x1, 0x318) syz_genetlink_get_family_id$team(&(0x7f0000000400)='team\x00') 16:50:35 executing program 2: r0 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'hsr0\x00', 0x0}) bind$packet(r0, &(0x7f0000000340)={0x11, 0x0, r1}, 0x14) sendto(r0, &(0x7f00000000c0)="e360b641b37f0000000004000066", 0xe, 0x0, 0x0, 0x0) 16:50:35 executing program 2: r0 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'hsr0\x00', 0x0}) bind$packet(r0, &(0x7f0000000340)={0x11, 0x0, r1}, 0x14) sendto(r0, &(0x7f00000000c0)="e360b641b37f00ffffdd86000066", 0xe, 0x0, 0x0, 0x0) 16:50:35 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x4000000000000036) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={@mcast1, @local, @local, 0x0, 0x0, 0x0, 0x200800000000114}) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x21, r0, 0x0, 0x0) 16:50:35 executing program 2: r0 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'hsr0\x00', 0x0}) bind$packet(r0, &(0x7f0000000340)={0x11, 0x0, r1}, 0x14) sendto(r0, &(0x7f00000000c0)="e360b641b37f0000000008000066", 0xe, 0x0, 0x0, 0x0) 16:50:35 executing program 1: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000b00)) mount(&(0x7f00000004c0)=ANY=[], &(0x7f000000aff8)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000000)) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000000c0)='tls\x00', 0x4) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$void(r1, 0x5450) renameat2(r0, &(0x7f0000000180)='./file0/file0\x00', 0xffffffffffffffff, 0x0, 0x4) shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@dev, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@remote}}, 0x0) ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, 0x0) shmctl$IPC_SET(0x0, 0x1, 0x0) ioctl$PIO_FONT(r0, 0x4b61, &(0x7f0000000740)="9d705183203ecbbfc0d13a4e30241f7ce01b0b4d7682444a507bfc1ac414339f479986467eb40c8065891e1fbbe7263212c5c09bb47896b3d85893f1173f8a139c116f876fdcc1779bffef8c34b5958981616cbcf39f2d8b43491de452d774a74c3ae9555a45180f7d68da36975781ba3a24694ac85eea975ca104181420baf7f3b9614203b0360e7cc29a1c109e") chdir(&(0x7f0000000340)='./file0\x00') symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) umount2(&(0x7f0000000380)='./file0\x00', 0x3) openat$uinput(0xffffffffffffff9c, &(0x7f0000000440)='/dev/uinput\x00', 0x802, 0x0) r3 = syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') sendmsg$FOU_CMD_DEL(r1, &(0x7f00000002c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x28, r3, 0x200, 0x70bd25, 0x25dfdbfe, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e24}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x7f}]}, 0x28}}, 0x24048010) sendmsg$kcm(r0, &(0x7f0000000a40)={&(0x7f0000000580)=@ll={0x11, 0xfd, r2, 0x1, 0x8, 0x6, @dev={[], 0x16}}, 0x80, &(0x7f00000009c0)=[{&(0x7f00000008c0)="367a9f0d4a1564359d1e668c63869bb9bf3b7f5aa4030462889dd6407207295cea1b36e07bc2b38b11c6ca28a73515cf52d89a8199d5c019de826c756a31bac24f707efcfc0a2383216dccc08f804551f0a56d2c9ab95a113fa74dff88ccccc7f278200aa03d2349e688b69191611739bb3e2e5ff110c5858c1a7c5bd5431f9c8e73a99236728f125d5f52a2b0761872fc0fc53cda5458241b2a80fd918b21c8029039d416a6cde6aa786bdfaa21a4e5ffa5f80dec422e0051c7e98a8cff2f4afbe25ca5a154a57c10", 0xc9}], 0x1}, 0x4004000) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000001c0)={0x0, 0x4, 0x2, 0x3, 0x1}, 0x14) ioctl$VIDIOC_SUBDEV_S_SELECTION(r0, 0xc040563e, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x7) msgget(0x1, 0x318) syz_genetlink_get_family_id$team(&(0x7f0000000400)='team\x00') 16:50:38 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x4000000000000036) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={@mcast1, @local, @local, 0x80000000}) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x21, r0, 0x0, 0x0) 16:50:38 executing program 2: r0 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'hsr0\x00', 0x0}) bind$packet(r0, &(0x7f0000000340)={0x11, 0x0, r1}, 0x14) sendto(r0, &(0x7f00000000c0)="e360b641b37f0047880000000066", 0xe, 0x0, 0x0, 0x0) 16:50:38 executing program 3: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000b00)) mount(&(0x7f00000004c0)=ANY=[], &(0x7f000000aff8)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000000)) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000000c0)='tls\x00', 0x4) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$void(0xffffffffffffffff, 0x5450) renameat2(r0, &(0x7f0000000180)='./file0/file0\x00', 0xffffffffffffffff, 0x0, 0x4) shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@dev, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@remote}}, 0x0) ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, 0x0) shmctl$IPC_SET(0x0, 0x1, 0x0) ioctl$PIO_FONT(r0, 0x4b61, &(0x7f0000000740)="9d705183203ecbbfc0d13a4e30241f7ce01b0b4d7682444a507bfc1ac414339f479986467eb40c8065891e1fbbe7263212c5c09bb47896b3d85893f1173f8a139c116f876fdcc1779bffef8c34b5958981616cbcf39f2d8b43491de452d774a74c3ae9555a45180f7d68da36975781ba3a24694ac85eea975ca104181420baf7f3b9614203b0360e7cc29a1c109e") chdir(&(0x7f0000000340)='./file0\x00') symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) umount2(&(0x7f0000000380)='./file0\x00', 0x3) openat$uinput(0xffffffffffffff9c, &(0x7f0000000440)='/dev/uinput\x00', 0x802, 0x0) r3 = syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') sendmsg$FOU_CMD_DEL(r1, &(0x7f00000002c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x28, r3, 0x200, 0x70bd25, 0x25dfdbfe, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e24}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x7f}]}, 0x28}}, 0x24048010) sendmsg$kcm(r0, &(0x7f0000000a40)={&(0x7f0000000580)=@ll={0x11, 0xfd, r2, 0x1, 0x8, 0x6, @dev={[], 0x16}}, 0x80, &(0x7f00000009c0)=[{&(0x7f00000008c0)="367a9f0d4a1564359d1e668c63869bb9bf3b7f5aa4030462889dd6407207295cea1b36e07bc2b38b11c6ca28a73515cf52d89a8199d5c019de826c756a31bac24f707efcfc0a2383216dccc08f804551f0a56d2c9ab95a113fa74dff88ccccc7f278200aa03d2349e688b69191611739bb3e2e5ff110c5858c1a7c5bd5431f9c8e73a99236728f125d5f52a2b0761872fc0fc53cda5458241b2a80fd918b21c8029039d416a6cde6aa786bdfaa21a4e5ffa5f80dec422e0051c7e98a8cff2f4afbe25ca5a154a57c10", 0xc9}], 0x1}, 0x4004000) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000001c0)={0x0, 0x4, 0x2, 0x3, 0x1}, 0x14) ioctl$VIDIOC_SUBDEV_S_SELECTION(r0, 0xc040563e, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x7) msgget(0x1, 0x318) syz_genetlink_get_family_id$team(&(0x7f0000000400)='team\x00') 16:50:38 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff}) r2 = accept$inet6(r1, 0x0, &(0x7f0000000640)) r3 = accept4(r0, &(0x7f0000000000)=@ax25, &(0x7f0000000080)=0x80, 0x800) bind$bt_sco(r3, &(0x7f0000000100)={0x1f, {0x3, 0xcd6f, 0x3b, 0x7fd, 0x6, 0x7fffffff}}, 0x8) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e20}, 0x10) getsockopt$SO_COOKIE(r3, 0x1, 0x39, &(0x7f0000000140), &(0x7f00000001c0)=0x8) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000880)={{0xa, 0x4}, {0xa, 0x0, 0xc4, @empty, 0x1}, 0x0, [0x0, 0x40000000000, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff]}, 0x5c) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000002000)={0x40000000000000, 0x896, 0x1, 0x4}, 0x14) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r2, 0x84, 0x7c, &(0x7f0000000900)={0x0, 0x1ff, 0xff}, &(0x7f0000000740)=0x8) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r3, 0x84, 0x6, &(0x7f0000000780)={r4, @in6={{0xa, 0x4e23, 0x1, @loopback, 0x3}}}, &(0x7f0000000840)=0x84) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r5, 0x29, 0x40, &(0x7f0000001fde), 0x4) sendto$inet(r0, &(0x7f0000000200), 0xfffffffffffffeb4, 0x2000800e, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000180)='lp\x00', 0x3) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r6, 0x1, 0x1a, &(0x7f0000000000)={0x2, &(0x7f000039a000)=[{0x3c}, {0x6, 0x3, 0x0, 0x7}]}, 0x10) ioctl(r5, 0x100008912, &(0x7f0000000a40)="025cc40700145f8f7640707d2a484eb1bc49bdb4c4ad8f1b322f2f320213bbacf81c114f4edb7cb901b2dcff9da129f816c09cd85f7645f03a91bff941333a9ea82c97c706235b5f5783de002313b5936db255e432e700a1a006bcc7a2ab4a6643f97cdc91515ef8fc1a2077d3475795b9769a53244c3a1529b0742bf17c45b98596314db199ef604589fffc681f317380e88f1313c8274fed56407645d009dac2fc05a563e5cc47d3f8654352828df856392d469d0f28a728d947873b63781133") r7 = socket$inet6(0xa, 0x0, 0xfffffffffffffffd) getpeername(r3, &(0x7f0000000540), &(0x7f00000004c0)=0x80) connect$inet6(r0, &(0x7f0000000500)={0xa, 0x0, 0xfdf, @local, 0x1f}, 0xcff570dace8820d2) setsockopt$inet_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f0000000480), 0x4) r8 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockname$unix(r3, &(0x7f00000005c0), &(0x7f0000000700)=0x6e) sendmsg$nl_xfrm(r8, &(0x7f000014f000)={&(0x7f00003c7ff4), 0xc, &(0x7f00000bfff0)={&(0x7f0000001440)=ANY=[@ANYBLOB="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"], 0x1}}, 0x0) setsockopt$inet6_group_source_req(r7, 0x29, 0x20000000048, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0xfffffffffffffffd}}}, 0x108) getsockopt$inet6_mtu(r3, 0x29, 0x17, &(0x7f0000000680), &(0x7f00000006c0)=0x4) recvfrom(r0, &(0x7f0000f9cf9b)=""/101, 0x6478c8501c739e53, 0x120, 0x0, 0x4f) getsockopt$inet6_dccp_buf(r3, 0x21, 0xe, &(0x7f0000000200)=""/51, &(0x7f00000002c0)=0x33) shutdown(r0, 0x0) 16:50:38 executing program 5: socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = syz_open_dev$mice(0x0, 0x0, 0x105000) r1 = syz_open_dev$usbmon(0x0, 0x8, 0x220000) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffff9c, 0xc0184900, &(0x7f00000006c0)={0xfff, 0x0, 0x0, 0xffffffffffffff9c}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000740)={0x0, 0x0}) r4 = openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmmsg$nfc_llcp(r1, &(0x7f0000003300)=[{&(0x7f0000000380)={0x27, 0x1, 0x1, 0x7, 0x2000, 0xfffffffffffffffd, "e9d54ee2289badf6e4c6d6d46c91d4a5bfbe2c13d12d4b6aa2846a31618be62803f9704cb6a224dece5c417907cb0f1257497b712c41da762a069a9f9c3515", 0x13}, 0x60, &(0x7f0000001f80)=[{&(0x7f0000000c00)="2db15d2471e7dbd483edfb3a6286f79ac4729dc0baf5ff317cf12a1af6101527edf18f49a54a35bbfc216080b6e8d9a413fef88fbabbdaf6205c628eb322d6f150eda09d3f0971caf03a73379ff07f9108af4026d1f12b80b156f313ff418a6d4ec9b6a17a24ca79aa01272e55d575364f14c7f3987badbb77d601ea7fd9cfccb58c55b13a3a192e6cb95bd93059320237c9dec2dd7bee6820c03958ab09bc5c76b54717a53ffccb5d2f5752d998f3cdb9b68c892557918725857f9ef3376e131c7de640c7aa4f4238ecc184", 0xcc}, {&(0x7f0000000ac0)="726bd2fae7c23e4ad1c92cef2dffd0b1f1e96d3054e97f0f6e5b0b9ad44e4722531c098d04e900db8ad4cf08959479d3741a7a3c042ae05747bf44f1bdbebd801665fa33e172846b9699ea3b87ee7b0d90bb3ed79270ecf0a4c1a4959e5833522428c95770ab58457ec396db59227abc5a50fe1c3b50bbf7c3212a73ab0f3c3b1527397d3e90c575cee5ddec7ea0a28660ec82faad3ef02aa2207c92eabf69f69d8c5bdd2e27094afde225", 0xab}, {&(0x7f0000000200)="84d9a13e1224d707c9f2b936bfd660ab1473edf829248f2b2e755a93ba99313a68ef10ee5bf4aba08bee0ea8bd0fa582cd05fa", 0x33}, {&(0x7f0000000400)="f3b125a0dad3b05070", 0x9}, {&(0x7f0000000500)="f233be92025671b3", 0x8}, {&(0x7f0000000d00)="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", 0xfa}, {&(0x7f0000000e00)="4adcfbdfa6451f1c5706fab22a7e042c2b442de5ec8eac6938384cff014e06897f9f7c040712292720616a5553b978a4f08ac5c627b4729658741fab12a9783dc609ecad2f83c66042d0946a523c442fb2ee3223943f45e8b40cf19becd029bcfa6da5f0a8d42f06fdbfa2206230ea706169b31253aebd4996dc4df6515a9a5094b2e2bad0ab1deec9637d3cc5af95b19d42c832a17f333234d4cc69849f", 0x9e}, {&(0x7f0000000ec0)="4622c4a26e4c9a6d64fa66d072920333e3f76806c91228f88aa91bb2a193e2e44b29e9f0bc4cf9b9ade68c50dbbfdb88defa9cc9afd46879ebbb72f39b8aa5e03e89455cc5bf972dfd58d7572a0e6bdd43818592dca819e67abaddbfb7c86f2c1cf7869178ddaac7afa1e4428d627a81705c2b132b1ec05a6a2bd2baf471bd63ea1b8e9000019a61615ddc2b2fc3611c3939ae3e6f013a16", 0x98}, {&(0x7f0000000f80)="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", 0x1000}], 0x9, &(0x7f0000002040)={0x1010, 0x10e, 0x1, "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"}, 0x1010, 0x1}, {&(0x7f0000003080)={0x27, 0x1, 0x0, 0x7, 0x8, 0x1d63d6de, "2e7d239e97b9a9773c46b088ea64dafd697937531e26e612436edcb8a61b6aa56e4da9411bf5f998d97a71b2f3f4fb021a05f606e21ea2b3060f4927da3e34", 0xe}, 0x60, &(0x7f0000000880)=[{&(0x7f0000000700)="a4217eae1fb9874d6089664c7764a1b1bfbb1b63ac31f63b9399b284a19cc70a5ed1455fa2a99203eb775142ff3d9aef8fe7b3cd67c6c7ef", 0x38}, {&(0x7f0000003100)="1ff8b3afbd10f4e54adae617854d4fd43c4cf85331bea40c81ebb1ffc279a99c2cd3ad4e9fe9be4eeb4ac514b70da094db0d77d10e6f60aaeefe2cf37dc82d82107a88c0a127e7379f7f0f1a0778b1852c005ccfe67d8125eaae117bb519e9beb25a9ec77c096e8af7ce37925e1ab5ce518c7e4658464212ef961f6244b6bad7b6ae4d43b6594597d5e1bdf9b9d5bd7f", 0x90}], 0x2, &(0x7f00000033c0)=ANY=[@ANYBLOB="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"], 0x110, 0x881}], 0x2, 0x20004000) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000008c0)={r3, r4, 0x0, 0xd, &(0x7f00000004c0)='/dev/urandom\x00'}, 0x30) getsockopt$SO_COOKIE(r2, 0x1, 0x39, &(0x7f0000000440), &(0x7f0000000480)=0x8) r6 = openat$random(0xffffffffffffff9c, &(0x7f0000000300)='/dev/urandom\x00', 0x0, 0x0) r7 = openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getrandom(&(0x7f0000000180)=""/40, 0xffffffffffffff56, 0x2) write$UHID_SET_REPORT_REPLY(r7, &(0x7f0000000b80)=ANY=[@ANYPTR=&(0x7f0000003580)=ANY=[@ANYBLOB="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", @ANYRES32=0x0, @ANYRESHEX=r2], @ANYRESHEX=r4, @ANYRESOCT=r7, @ANYRES16, @ANYRES64=r5, @ANYRESDEC], 0x6) getsockopt$inet_IP_IPSEC_POLICY(r7, 0x0, 0x10, &(0x7f0000000780)={{{@in6=@dev, @in6=@remote}}}, &(0x7f0000000540)=0xe8) ioctl$RNDADDTOENTCNT(r6, 0x40045201, &(0x7f0000000280)=0x1f) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f00000002c0)={r2}) ioctl$VIDIOC_G_FBUF(r4, 0x8030560a, &(0x7f0000000240)={0x4, 0x8, 0x0, {0x58, 0xffffffffb9329a73, 0x32315559, 0x6, 0x1ff, 0x3, 0x8, 0x6}}) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f0000000900)={0x0, 0x0, 0x4, 0x0, [], [{0xa98d, 0x7, 0x6, 0x0, 0x6}, {0x80000000, 0x2, 0x6306, 0x9, 0xffffffffffffffff, 0x3}], [[], [], [], []]}) ioctl$sock_inet6_tcp_SIOCOUTQ(r7, 0x5411, &(0x7f0000000340)) preadv(0xffffffffffffffff, &(0x7f0000000580)=[{&(0x7f0000000100)=""/254, 0xfe}], 0x1000000000000125, 0x0) ioctl$KDGKBENT(r0, 0x4b46, &(0x7f00000031c0)={0x1f, 0x8, 0x1f}) ioctl$UI_SET_FFBIT(r4, 0x4004556b, 0x5) syz_open_dev$ndb(&(0x7f0000003380)='/dev/nbd#\x00', 0x0, 0x8000) ioctl$sock_inet_SIOCSIFNETMASK(r2, 0x891c, &(0x7f0000000080)={'lo\x00\n\xcc\x00\x00\x00\x00\x00\x00\x00\x00\x00&\x00', {0x2, 0x0, @rand_addr=0xfffffffffffffffe}}) 16:50:38 executing program 2: r0 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'hsr0\x00', 0x0}) bind$packet(r0, &(0x7f0000000340)={0x11, 0x0, r1}, 0x14) sendto(r0, &(0x7f00000000c0)="e360b641b37f0000000000fffffb", 0xe, 0x0, 0x0, 0x0) 16:50:38 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x4000000000000036) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={@mcast1, @local, @local, 0x80000000}) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x21, r0, 0x0, 0x0) 16:50:38 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x4000000000000036) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={@mcast1, @local, @local, 0x0, 0x0, 0x0, 0x200800000000114}) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, 0x0) ptrace$cont(0x21, r0, 0x0, 0x0) 16:50:38 executing program 2: r0 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'hsr0\x00', 0x0}) bind$packet(r0, &(0x7f0000000340)={0x11, 0x0, r1}, 0x14) sendto(r0, &(0x7f00000000c0)="e360b641b37f000a000000000066", 0xe, 0x0, 0x0, 0x0) 16:50:38 executing program 3: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000b00)) mount(&(0x7f00000004c0)=ANY=[], &(0x7f000000aff8)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000000)) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000000c0)='tls\x00', 0x4) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$void(r1, 0x0) renameat2(r0, &(0x7f0000000180)='./file0/file0\x00', 0xffffffffffffffff, 0x0, 0x4) shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@dev, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@remote}}, 0x0) ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, 0x0) shmctl$IPC_SET(0x0, 0x1, 0x0) ioctl$PIO_FONT(r0, 0x4b61, &(0x7f0000000740)="9d705183203ecbbfc0d13a4e30241f7ce01b0b4d7682444a507bfc1ac414339f479986467eb40c8065891e1fbbe7263212c5c09bb47896b3d85893f1173f8a139c116f876fdcc1779bffef8c34b5958981616cbcf39f2d8b43491de452d774a74c3ae9555a45180f7d68da36975781ba3a24694ac85eea975ca104181420baf7f3b9614203b0360e7cc29a1c109e") chdir(&(0x7f0000000340)='./file0\x00') symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) umount2(&(0x7f0000000380)='./file0\x00', 0x3) openat$uinput(0xffffffffffffff9c, &(0x7f0000000440)='/dev/uinput\x00', 0x802, 0x0) r3 = syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') sendmsg$FOU_CMD_DEL(r1, &(0x7f00000002c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x28, r3, 0x200, 0x70bd25, 0x25dfdbfe, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e24}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x7f}]}, 0x28}}, 0x24048010) sendmsg$kcm(r0, &(0x7f0000000a40)={&(0x7f0000000580)=@ll={0x11, 0xfd, r2, 0x1, 0x8, 0x6, @dev={[], 0x16}}, 0x80, &(0x7f00000009c0)=[{&(0x7f00000008c0)="367a9f0d4a1564359d1e668c63869bb9bf3b7f5aa4030462889dd6407207295cea1b36e07bc2b38b11c6ca28a73515cf52d89a8199d5c019de826c756a31bac24f707efcfc0a2383216dccc08f804551f0a56d2c9ab95a113fa74dff88ccccc7f278200aa03d2349e688b69191611739bb3e2e5ff110c5858c1a7c5bd5431f9c8e73a99236728f125d5f52a2b0761872fc0fc53cda5458241b2a80fd918b21c8029039d416a6cde6aa786bdfaa21a4e5ffa5f80dec422e0051c7e98a8cff2f4afbe25ca5a154a57c10", 0xc9}], 0x1}, 0x4004000) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000001c0)={0x0, 0x4, 0x2, 0x3, 0x1}, 0x14) ioctl$VIDIOC_SUBDEV_S_SELECTION(r0, 0xc040563e, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x7) msgget(0x1, 0x318) syz_genetlink_get_family_id$team(&(0x7f0000000400)='team\x00') 16:50:38 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x4000000000000036) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={@mcast1, @local, @local, 0x80000000, 0x0, 0x0, 0x200800000000114}) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, 0x0) ptrace$setregs(0xffffffffffffffff, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x21, r0, 0x0, 0x0) [ 342.920282] net_ratelimit: 22 callbacks suppressed [ 342.920290] protocol 88fb is buggy, dev hsr_slave_0 [ 342.930411] protocol 88fb is buggy, dev hsr_slave_1 16:50:38 executing program 2: r0 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'hsr0\x00', 0x0}) bind$packet(r0, &(0x7f0000000340)={0x11, 0x0, r1}, 0x14) sendto(r0, &(0x7f00000000c0)="e360b641b37f0006000000000066", 0xe, 0x0, 0x0, 0x0) 16:50:38 executing program 2: r0 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'hsr0\x00', 0x0}) bind$packet(r0, &(0x7f0000000340)={0x11, 0x0, r1}, 0x14) sendto(r0, &(0x7f00000000c0)="e360b641b37f0005430000000066", 0xe, 0x0, 0x0, 0x0) [ 342.990287] protocol 88fb is buggy, dev hsr_slave_0 [ 342.995409] protocol 88fb is buggy, dev hsr_slave_1 16:50:38 executing program 2: r0 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'hsr0\x00', 0x0}) bind$packet(r0, &(0x7f0000000340)={0x11, 0x0, r1}, 0x14) sendto(r0, &(0x7f00000000c0)="e360b641b37f0008060000000066", 0xe, 0x0, 0x0, 0x0) 16:50:38 executing program 2: r0 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'hsr0\x00', 0x0}) bind$packet(r0, &(0x7f0000000340)={0x11, 0x0, r1}, 0x14) sendto(r0, &(0x7f00000000c0)="e360b641b37f0048880000000066", 0xe, 0x0, 0x0, 0x0) [ 343.230307] protocol 88fb is buggy, dev hsr_slave_0 [ 343.235650] protocol 88fb is buggy, dev hsr_slave_1 [ 343.310427] protocol 88fb is buggy, dev hsr_slave_0 [ 343.315808] protocol 88fb is buggy, dev hsr_slave_1 16:50:39 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000)}, 0x0) r2 = getegid() r3 = getuid() mount$9p_rdma(&(0x7f00000008c0)='127.0.0.1\x00', &(0x7f0000000900)='./file0\x00', &(0x7f0000000940)='9p\x00', 0x2f05d67990810d4e, &(0x7f00000009c0)={'trans=rdma,', {'port', 0x3d, 0x4e22}, 0x2c, {[{@common=@dfltgid={'dfltgid', 0x3d, r2}}, {@rq={'rq', 0x3d, 0x80000000}}, {@common=@cache_mmap='cache=mmap'}, {@common=@cachetag={'cachetag', 0x3d, '&\\'}}, {@common=@afid={'afid', 0x3d, 0x4}}, {@rq={'rq', 0x3d, 0x300000000000}}, {@common=@access_client='access=client'}], [{@hash='hash'}, {@fowner_eq={'fowner', 0x3d, r3}}, {@seclabel='seclabel'}]}}) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) sendmsg$kcm(r1, &(0x7f0000000880)={&(0x7f0000000240)=@x25={0x9, @remote={[], 0x0}}, 0x80, &(0x7f0000000680)=[{&(0x7f00000004c0)="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", 0xfd}, {&(0x7f0000000340)="c43675f8a66e2bbf8145b4bd0f116976f86b", 0x12}, {&(0x7f00000003c0)="873c75dbc3d0bf433ce7297b2deea511f230dc92a82bdba35903143b18f6c5b8f40b61f84fe0dc7def196b019cd6bf0885779712f8a0f58e7a5335f7d7c5cbd0", 0x40}, {&(0x7f0000000400)="0d979b13fd842004fb3ecc85893ef627d063ce24523c0eeadf7082878620a13eef91338cbac8f915362243aaeaac9d6b0bb6077bbddd99e6db1e29d104d79ee58ee5700fb7a1de8a20", 0x49}, {&(0x7f00000005c0)="345f65e38c3635cfa1ede7a596761014c50980b79bf79fdf01b619b595cd31b2932a661871034fb46a2a7d0aa2af091622d78589e99f143a7657649ce174c0fa00460d6593fde300e104dfd346def15d142d557bb19af2b0cdef913865e060356d57ec49b2dffde59dce251893acc5890c6f957badd8852b03e01b4438f471272826548448d3", 0x86}], 0x5, &(0x7f0000000700)=[{0xe8, 0x104, 0x0, "056cefb21707d215472aa213d57772eb64d6fbfdc847acfccd65798117e0e6ae9ba268d0439678d2c926a2ba71b5305cf6d80fbc4a218bc4c1a0bc22ea0f63211d487b381afb39f0fac03d16de0ee82a576a17c1438139f22271a86b47a5d329902737742de11bfdb0ffec4c4771f3863408393158d40355394aa9a28870bff29090f66a22087d8c1227faac0bdd2650907347f69c90481ad16245bb82a41406746f96e4ff9f495276bfee3425ed333ccac655a15d557f877b185a44e329d291bf63012fbe8e84964782458598db8ebb5b975a758fe4db"}, {0x80, 0x113, 0x1, "b9672614ad130322ccc59cb60ef4b82fd220ac3145387d9687566366d696be3747d1e1e59b505332378aa43c4fa8aa05558a4861fe96e61c442fe66010bee5c8ea4d0aaaf16e597033425e20ef439f67f3505f78e2ad0c703e4bebe242ae2a0c1fc69752f8324b07f2b045cd"}], 0x168}, 0x1) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, 0x0, 0x0) 16:50:39 executing program 3: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000b00)) mount(&(0x7f00000004c0)=ANY=[], &(0x7f000000aff8)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000000)) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000000c0)='tls\x00', 0x4) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$void(r1, 0x5450) renameat2(0xffffffffffffffff, &(0x7f0000000180)='./file0/file0\x00', 0xffffffffffffffff, 0x0, 0x4) shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@dev, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@remote}}, 0x0) ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, 0x0) shmctl$IPC_SET(0x0, 0x1, 0x0) ioctl$PIO_FONT(r0, 0x4b61, &(0x7f0000000740)="9d705183203ecbbfc0d13a4e30241f7ce01b0b4d7682444a507bfc1ac414339f479986467eb40c8065891e1fbbe7263212c5c09bb47896b3d85893f1173f8a139c116f876fdcc1779bffef8c34b5958981616cbcf39f2d8b43491de452d774a74c3ae9555a45180f7d68da36975781ba3a24694ac85eea975ca104181420baf7f3b9614203b0360e7cc29a1c109e") chdir(&(0x7f0000000340)='./file0\x00') symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) umount2(&(0x7f0000000380)='./file0\x00', 0x3) openat$uinput(0xffffffffffffff9c, &(0x7f0000000440)='/dev/uinput\x00', 0x802, 0x0) r3 = syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') sendmsg$FOU_CMD_DEL(r1, &(0x7f00000002c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x28, r3, 0x200, 0x70bd25, 0x25dfdbfe, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e24}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x7f}]}, 0x28}}, 0x24048010) sendmsg$kcm(r0, &(0x7f0000000a40)={&(0x7f0000000580)=@ll={0x11, 0xfd, r2, 0x1, 0x8, 0x6, @dev={[], 0x16}}, 0x80, &(0x7f00000009c0)=[{&(0x7f00000008c0)="367a9f0d4a1564359d1e668c63869bb9bf3b7f5aa4030462889dd6407207295cea1b36e07bc2b38b11c6ca28a73515cf52d89a8199d5c019de826c756a31bac24f707efcfc0a2383216dccc08f804551f0a56d2c9ab95a113fa74dff88ccccc7f278200aa03d2349e688b69191611739bb3e2e5ff110c5858c1a7c5bd5431f9c8e73a99236728f125d5f52a2b0761872fc0fc53cda5458241b2a80fd918b21c8029039d416a6cde6aa786bdfaa21a4e5ffa5f80dec422e0051c7e98a8cff2f4afbe25ca5a154a57c10", 0xc9}], 0x1}, 0x4004000) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000001c0)={0x0, 0x4, 0x2, 0x3, 0x1}, 0x14) ioctl$VIDIOC_SUBDEV_S_SELECTION(r0, 0xc040563e, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x7) msgget(0x1, 0x318) syz_genetlink_get_family_id$team(&(0x7f0000000400)='team\x00') 16:50:39 executing program 2: r0 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'hsr0\x00', 0x0}) bind$packet(r0, &(0x7f0000000340)={0x11, 0x0, r1}, 0x14) sendto(r0, &(0x7f00000000c0)="e360b641b37f0006080000000066", 0xe, 0x0, 0x0, 0x0) 16:50:39 executing program 5: socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = syz_open_dev$mice(0x0, 0x0, 0x105000) r1 = syz_open_dev$usbmon(0x0, 0x8, 0x220000) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffff9c, 0xc0184900, &(0x7f00000006c0)={0xfff, 0x0, 0x0, 0xffffffffffffff9c}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000740)={0x0, 0x0}) r4 = openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmmsg$nfc_llcp(r1, &(0x7f0000003300)=[{&(0x7f0000000380)={0x27, 0x1, 0x1, 0x7, 0x2000, 0xfffffffffffffffd, "e9d54ee2289badf6e4c6d6d46c91d4a5bfbe2c13d12d4b6aa2846a31618be62803f9704cb6a224dece5c417907cb0f1257497b712c41da762a069a9f9c3515", 0x13}, 0x60, &(0x7f0000001f80)=[{&(0x7f0000000c00)="2db15d2471e7dbd483edfb3a6286f79ac4729dc0baf5ff317cf12a1af6101527edf18f49a54a35bbfc216080b6e8d9a413fef88fbabbdaf6205c628eb322d6f150eda09d3f0971caf03a73379ff07f9108af4026d1f12b80b156f313ff418a6d4ec9b6a17a24ca79aa01272e55d575364f14c7f3987badbb77d601ea7fd9cfccb58c55b13a3a192e6cb95bd93059320237c9dec2dd7bee6820c03958ab09bc5c76b54717a53ffccb5d2f5752d998f3cdb9b68c892557918725857f9ef3376e131c7de640c7aa4f4238ecc184", 0xcc}, {&(0x7f0000000ac0)="726bd2fae7c23e4ad1c92cef2dffd0b1f1e96d3054e97f0f6e5b0b9ad44e4722531c098d04e900db8ad4cf08959479d3741a7a3c042ae05747bf44f1bdbebd801665fa33e172846b9699ea3b87ee7b0d90bb3ed79270ecf0a4c1a4959e5833522428c95770ab58457ec396db59227abc5a50fe1c3b50bbf7c3212a73ab0f3c3b1527397d3e90c575cee5ddec7ea0a28660ec82faad3ef02aa2207c92eabf69f69d8c5bdd2e27094afde225", 0xab}, {&(0x7f0000000200)="84d9a13e1224d707c9f2b936bfd660ab1473edf829248f2b2e755a93ba99313a68ef10ee5bf4aba08bee0ea8bd0fa582cd05fa", 0x33}, {&(0x7f0000000400)="f3b125a0dad3b05070", 0x9}, {&(0x7f0000000500)="f233be92025671b3", 0x8}, {&(0x7f0000000d00)="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", 0xfa}, {&(0x7f0000000e00)="4adcfbdfa6451f1c5706fab22a7e042c2b442de5ec8eac6938384cff014e06897f9f7c040712292720616a5553b978a4f08ac5c627b4729658741fab12a9783dc609ecad2f83c66042d0946a523c442fb2ee3223943f45e8b40cf19becd029bcfa6da5f0a8d42f06fdbfa2206230ea706169b31253aebd4996dc4df6515a9a5094b2e2bad0ab1deec9637d3cc5af95b19d42c832a17f333234d4cc69849f", 0x9e}, {&(0x7f0000000ec0)="4622c4a26e4c9a6d64fa66d072920333e3f76806c91228f88aa91bb2a193e2e44b29e9f0bc4cf9b9ade68c50dbbfdb88defa9cc9afd46879ebbb72f39b8aa5e03e89455cc5bf972dfd58d7572a0e6bdd43818592dca819e67abaddbfb7c86f2c1cf7869178ddaac7afa1e4428d627a81705c2b132b1ec05a6a2bd2baf471bd63ea1b8e9000019a61615ddc2b2fc3611c3939ae3e6f013a16", 0x98}, {&(0x7f0000000f80)="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", 0x1000}], 0x9, &(0x7f0000002040)={0x1010, 0x10e, 0x1, "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"}, 0x1010, 0x1}, {&(0x7f0000003080)={0x27, 0x1, 0x0, 0x7, 0x8, 0x1d63d6de, "2e7d239e97b9a9773c46b088ea64dafd697937531e26e612436edcb8a61b6aa56e4da9411bf5f998d97a71b2f3f4fb021a05f606e21ea2b3060f4927da3e34", 0xe}, 0x60, &(0x7f0000000880)=[{&(0x7f0000000700)="a4217eae1fb9874d6089664c7764a1b1bfbb1b63ac31f63b9399b284a19cc70a5ed1455fa2a99203eb775142ff3d9aef8fe7b3cd67c6c7ef", 0x38}, {&(0x7f0000003100)="1ff8b3afbd10f4e54adae617854d4fd43c4cf85331bea40c81ebb1ffc279a99c2cd3ad4e9fe9be4eeb4ac514b70da094db0d77d10e6f60aaeefe2cf37dc82d82107a88c0a127e7379f7f0f1a0778b1852c005ccfe67d8125eaae117bb519e9beb25a9ec77c096e8af7ce37925e1ab5ce518c7e4658464212ef961f6244b6bad7b6ae4d43b6594597d5e1bdf9b9d5bd7f", 0x90}], 0x2, &(0x7f00000033c0)=ANY=[@ANYBLOB="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"], 0x110, 0x881}], 0x2, 0x20004000) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000008c0)={r3, r4, 0x0, 0xd, &(0x7f00000004c0)='/dev/urandom\x00'}, 0x30) getsockopt$SO_COOKIE(r2, 0x1, 0x39, &(0x7f0000000440), &(0x7f0000000480)=0x8) r6 = openat$random(0xffffffffffffff9c, &(0x7f0000000300)='/dev/urandom\x00', 0x0, 0x0) r7 = openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getrandom(&(0x7f0000000180)=""/40, 0xffffffffffffff56, 0x2) write$UHID_SET_REPORT_REPLY(r7, &(0x7f0000000b80)=ANY=[@ANYPTR=&(0x7f0000003580)=ANY=[@ANYBLOB="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", @ANYRES32=0x0, @ANYRESHEX=r2], @ANYRESHEX=r4, @ANYRESOCT=r7, @ANYRES16, @ANYRES64=r5, @ANYRESDEC], 0x6) getsockopt$inet_IP_IPSEC_POLICY(r7, 0x0, 0x10, &(0x7f0000000780)={{{@in6=@dev, @in6=@remote}}}, &(0x7f0000000540)=0xe8) ioctl$RNDADDTOENTCNT(r6, 0x40045201, &(0x7f0000000280)=0x1f) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f00000002c0)={r2}) ioctl$VIDIOC_G_FBUF(r4, 0x8030560a, &(0x7f0000000240)={0x4, 0x8, 0x0, {0x58, 0xffffffffb9329a73, 0x32315559, 0x6, 0x1ff, 0x3, 0x8, 0x6}}) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f0000000900)={0x0, 0x0, 0x4, 0x0, [], [{0xa98d, 0x7, 0x6, 0x0, 0x6}, {0x80000000, 0x2, 0x6306, 0x9, 0xffffffffffffffff, 0x3}], [[], [], [], []]}) ioctl$sock_inet6_tcp_SIOCOUTQ(r7, 0x5411, &(0x7f0000000340)) preadv(0xffffffffffffffff, &(0x7f0000000580)=[{&(0x7f0000000100)=""/254, 0xfe}], 0x1000000000000125, 0x0) ioctl$KDGKBENT(r0, 0x4b46, &(0x7f00000031c0)={0x1f, 0x8, 0x1f}) ioctl$UI_SET_FFBIT(r4, 0x4004556b, 0x5) syz_open_dev$ndb(&(0x7f0000003380)='/dev/nbd#\x00', 0x0, 0x8000) ioctl$sock_inet_SIOCSIFNETMASK(r2, 0x891c, &(0x7f0000000080)={'lo\x00\n\xcc\x00\x00\x00\x00\x00\x00\x00\x00\x00&\x00', {0x2, 0x0, @rand_addr=0xfffffffffffffffe}}) [ 343.710328] protocol 88fb is buggy, dev hsr_slave_0 [ 343.715541] protocol 88fb is buggy, dev hsr_slave_1 16:50:41 executing program 2: r0 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'hsr0\x00', 0x0}) bind$packet(r0, &(0x7f0000000340)={0x11, 0x0, r1}, 0x14) sendto(r0, &(0x7f00000000c0)="e360b641b37f0000400300000066", 0xe, 0x0, 0x0, 0x0) 16:50:41 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x4000000000000036) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={@mcast1, @local, @local, 0x0, 0x0, 0x0, 0x200800000000114}) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, 0x0) ptrace$cont(0x21, r0, 0x0, 0x0) 16:50:41 executing program 5: socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = syz_open_dev$mice(0x0, 0x0, 0x105000) r1 = syz_open_dev$usbmon(0x0, 0x8, 0x220000) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffff9c, 0xc0184900, &(0x7f00000006c0)={0xfff, 0x0, 0x0, 0xffffffffffffff9c}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000740)={0x0, 0x0}) r4 = openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmmsg$nfc_llcp(r1, &(0x7f0000003300)=[{&(0x7f0000000380)={0x27, 0x1, 0x1, 0x7, 0x2000, 0xfffffffffffffffd, "e9d54ee2289badf6e4c6d6d46c91d4a5bfbe2c13d12d4b6aa2846a31618be62803f9704cb6a224dece5c417907cb0f1257497b712c41da762a069a9f9c3515", 0x13}, 0x60, &(0x7f0000001f80)=[{&(0x7f0000000c00)="2db15d2471e7dbd483edfb3a6286f79ac4729dc0baf5ff317cf12a1af6101527edf18f49a54a35bbfc216080b6e8d9a413fef88fbabbdaf6205c628eb322d6f150eda09d3f0971caf03a73379ff07f9108af4026d1f12b80b156f313ff418a6d4ec9b6a17a24ca79aa01272e55d575364f14c7f3987badbb77d601ea7fd9cfccb58c55b13a3a192e6cb95bd93059320237c9dec2dd7bee6820c03958ab09bc5c76b54717a53ffccb5d2f5752d998f3cdb9b68c892557918725857f9ef3376e131c7de640c7aa4f4238ecc184", 0xcc}, {&(0x7f0000000ac0)="726bd2fae7c23e4ad1c92cef2dffd0b1f1e96d3054e97f0f6e5b0b9ad44e4722531c098d04e900db8ad4cf08959479d3741a7a3c042ae05747bf44f1bdbebd801665fa33e172846b9699ea3b87ee7b0d90bb3ed79270ecf0a4c1a4959e5833522428c95770ab58457ec396db59227abc5a50fe1c3b50bbf7c3212a73ab0f3c3b1527397d3e90c575cee5ddec7ea0a28660ec82faad3ef02aa2207c92eabf69f69d8c5bdd2e27094afde225", 0xab}, {&(0x7f0000000200)="84d9a13e1224d707c9f2b936bfd660ab1473edf829248f2b2e755a93ba99313a68ef10ee5bf4aba08bee0ea8bd0fa582cd05fa", 0x33}, {&(0x7f0000000400)="f3b125a0dad3b05070", 0x9}, {&(0x7f0000000500)="f233be92025671b3", 0x8}, {&(0x7f0000000d00)="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", 0xfa}, {&(0x7f0000000e00)="4adcfbdfa6451f1c5706fab22a7e042c2b442de5ec8eac6938384cff014e06897f9f7c040712292720616a5553b978a4f08ac5c627b4729658741fab12a9783dc609ecad2f83c66042d0946a523c442fb2ee3223943f45e8b40cf19becd029bcfa6da5f0a8d42f06fdbfa2206230ea706169b31253aebd4996dc4df6515a9a5094b2e2bad0ab1deec9637d3cc5af95b19d42c832a17f333234d4cc69849f", 0x9e}, {&(0x7f0000000ec0)="4622c4a26e4c9a6d64fa66d072920333e3f76806c91228f88aa91bb2a193e2e44b29e9f0bc4cf9b9ade68c50dbbfdb88defa9cc9afd46879ebbb72f39b8aa5e03e89455cc5bf972dfd58d7572a0e6bdd43818592dca819e67abaddbfb7c86f2c1cf7869178ddaac7afa1e4428d627a81705c2b132b1ec05a6a2bd2baf471bd63ea1b8e9000019a61615ddc2b2fc3611c3939ae3e6f013a16", 0x98}, {&(0x7f0000000f80)="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", 0x1000}], 0x9, &(0x7f0000002040)={0x1010, 0x10e, 0x1, "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"}, 0x1010, 0x1}, {&(0x7f0000003080)={0x27, 0x1, 0x0, 0x7, 0x8, 0x1d63d6de, "2e7d239e97b9a9773c46b088ea64dafd697937531e26e612436edcb8a61b6aa56e4da9411bf5f998d97a71b2f3f4fb021a05f606e21ea2b3060f4927da3e34", 0xe}, 0x60, &(0x7f0000000880)=[{&(0x7f0000000700)="a4217eae1fb9874d6089664c7764a1b1bfbb1b63ac31f63b9399b284a19cc70a5ed1455fa2a99203eb775142ff3d9aef8fe7b3cd67c6c7ef", 0x38}, {&(0x7f0000003100)="1ff8b3afbd10f4e54adae617854d4fd43c4cf85331bea40c81ebb1ffc279a99c2cd3ad4e9fe9be4eeb4ac514b70da094db0d77d10e6f60aaeefe2cf37dc82d82107a88c0a127e7379f7f0f1a0778b1852c005ccfe67d8125eaae117bb519e9beb25a9ec77c096e8af7ce37925e1ab5ce518c7e4658464212ef961f6244b6bad7b6ae4d43b6594597d5e1bdf9b9d5bd7f", 0x90}], 0x2, &(0x7f00000033c0)=ANY=[@ANYBLOB="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"], 0x110, 0x881}], 0x2, 0x20004000) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000008c0)={r3, r4, 0x0, 0xd, &(0x7f00000004c0)='/dev/urandom\x00'}, 0x30) getsockopt$SO_COOKIE(r2, 0x1, 0x39, &(0x7f0000000440), &(0x7f0000000480)=0x8) r6 = openat$random(0xffffffffffffff9c, &(0x7f0000000300)='/dev/urandom\x00', 0x0, 0x0) r7 = openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getrandom(&(0x7f0000000180)=""/40, 0xffffffffffffff56, 0x2) write$UHID_SET_REPORT_REPLY(r7, &(0x7f0000000b80)=ANY=[@ANYPTR=&(0x7f0000003580)=ANY=[@ANYBLOB="7519b21b940368f1a779b348acf2a6c732cd16b3caaa975f1de55c51ca0be1479bad2b82a4070052329283e5871f96798fd2eec6d2f6843137743ed48e0e04adea6bfb7ddf5b8d4fd8be77cf7f08604174fe4284e689b45b0ce9cca7b7f3be939441761c2e46b9322cd271bc9aa21b3eb63f6edb7dc260c2191693c0b8dd7ce5ad958fb444bca1ac89914ab0499231c114a9dcc098ad4c80dab70f246c13f535aadc70d9fcb27a2be02d0a8f2bbb46d30170eb6d09658118a99a6806d77b2d0daef91301773bbbd5846d73056b2b85aba82bd2cb4605b1c5200ad529b4194d8f0783a45fb722e0b29a2ec489e7ef1657f774e7c5771cbe3c232eae95bf460f78c3c0d9cea2278de9e827627ca4757870e76176e19ce65e001bd32dcfb05209792a12c42758e95d", @ANYRES32=0x0, @ANYRESHEX=r2], @ANYRESHEX=r4, @ANYRESOCT=r7, @ANYRES16, @ANYRES64=r5, @ANYRESDEC], 0x6) getsockopt$inet_IP_IPSEC_POLICY(r7, 0x0, 0x10, &(0x7f0000000780)={{{@in6=@dev, @in6=@remote}}}, &(0x7f0000000540)=0xe8) ioctl$RNDADDTOENTCNT(r6, 0x40045201, &(0x7f0000000280)=0x1f) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f00000002c0)={r2}) ioctl$VIDIOC_G_FBUF(r4, 0x8030560a, &(0x7f0000000240)={0x4, 0x8, 0x0, {0x58, 0xffffffffb9329a73, 0x32315559, 0x6, 0x1ff, 0x3, 0x8, 0x6}}) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f0000000900)={0x0, 0x0, 0x4, 0x0, [], [{0xa98d, 0x7, 0x6, 0x0, 0x6}, {0x80000000, 0x2, 0x6306, 0x9, 0xffffffffffffffff, 0x3}], [[], [], [], []]}) ioctl$sock_inet6_tcp_SIOCOUTQ(r7, 0x5411, &(0x7f0000000340)) preadv(0xffffffffffffffff, &(0x7f0000000580)=[{&(0x7f0000000100)=""/254, 0xfe}], 0x1000000000000125, 0x0) ioctl$KDGKBENT(r0, 0x4b46, &(0x7f00000031c0)={0x1f, 0x8, 0x1f}) ioctl$UI_SET_FFBIT(r4, 0x4004556b, 0x5) syz_open_dev$ndb(&(0x7f0000003380)='/dev/nbd#\x00', 0x0, 0x8000) ioctl$sock_inet_SIOCSIFNETMASK(r2, 0x891c, &(0x7f0000000080)={'lo\x00\n\xcc\x00\x00\x00\x00\x00\x00\x00\x00\x00&\x00', {0x2, 0x0, @rand_addr=0xfffffffffffffffe}}) 16:50:41 executing program 3: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000b00)) mount(&(0x7f00000004c0)=ANY=[], &(0x7f000000aff8)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000000)) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000000c0)='tls\x00', 0x4) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$void(r1, 0x5450) renameat2(r0, 0x0, 0xffffffffffffffff, 0x0, 0x4) shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@dev, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@remote}}, 0x0) ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, 0x0) shmctl$IPC_SET(0x0, 0x1, 0x0) ioctl$PIO_FONT(r0, 0x4b61, &(0x7f0000000740)="9d705183203ecbbfc0d13a4e30241f7ce01b0b4d7682444a507bfc1ac414339f479986467eb40c8065891e1fbbe7263212c5c09bb47896b3d85893f1173f8a139c116f876fdcc1779bffef8c34b5958981616cbcf39f2d8b43491de452d774a74c3ae9555a45180f7d68da36975781ba3a24694ac85eea975ca104181420baf7f3b9614203b0360e7cc29a1c109e") chdir(&(0x7f0000000340)='./file0\x00') symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) umount2(&(0x7f0000000380)='./file0\x00', 0x3) openat$uinput(0xffffffffffffff9c, &(0x7f0000000440)='/dev/uinput\x00', 0x802, 0x0) r3 = syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') sendmsg$FOU_CMD_DEL(r1, &(0x7f00000002c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x28, r3, 0x200, 0x70bd25, 0x25dfdbfe, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e24}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x7f}]}, 0x28}}, 0x24048010) sendmsg$kcm(r0, &(0x7f0000000a40)={&(0x7f0000000580)=@ll={0x11, 0xfd, r2, 0x1, 0x8, 0x6, @dev={[], 0x16}}, 0x80, &(0x7f00000009c0)=[{&(0x7f00000008c0)="367a9f0d4a1564359d1e668c63869bb9bf3b7f5aa4030462889dd6407207295cea1b36e07bc2b38b11c6ca28a73515cf52d89a8199d5c019de826c756a31bac24f707efcfc0a2383216dccc08f804551f0a56d2c9ab95a113fa74dff88ccccc7f278200aa03d2349e688b69191611739bb3e2e5ff110c5858c1a7c5bd5431f9c8e73a99236728f125d5f52a2b0761872fc0fc53cda5458241b2a80fd918b21c8029039d416a6cde6aa786bdfaa21a4e5ffa5f80dec422e0051c7e98a8cff2f4afbe25ca5a154a57c10", 0xc9}], 0x1}, 0x4004000) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000001c0)={0x0, 0x4, 0x2, 0x3, 0x1}, 0x14) ioctl$VIDIOC_SUBDEV_S_SELECTION(r0, 0xc040563e, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x7) msgget(0x1, 0x318) syz_genetlink_get_family_id$team(&(0x7f0000000400)='team\x00') 16:50:41 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uhid\x00', 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write$UHID_CREATE(r1, &(0x7f0000001080)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f00000000c0)=""/11, 0xb}, 0x120) read(r1, &(0x7f00000002c0)=""/169, 0xa9) dup2(r0, r2) 16:50:41 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x4000000000000036) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={@mcast1, @local, @local, 0x80000000, 0x0, 0x0, 0x200800000000114}) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, 0x0) ptrace$setregs(0xffffffffffffffff, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x21, r0, 0x0, 0x0) 16:50:41 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x4000000000000036) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={@mcast1, @local, @local, 0x0, 0x0, 0x0, 0x200800000000114}) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, 0x0) ptrace$cont(0x21, r0, 0x0, 0x0) [ 346.046938] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 16:50:41 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x4000000000000036) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={@mcast1, @local, @local, 0x80000000, 0x0, 0x0, 0x200800000000114}) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, 0x0) ptrace$setregs(0xffffffffffffffff, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x21, r0, 0x0, 0x0) [ 346.087673] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 346.120245] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 346.127089] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 16:50:41 executing program 2: r0 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'hsr0\x00', 0x0}) bind$packet(r0, &(0x7f0000000340)={0x11, 0x0, r1}, 0x14) sendto(r0, &(0x7f00000000c0)="e360b641b37f0088a8ffff000066", 0xe, 0x0, 0x0, 0x0) 16:50:41 executing program 3: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000b00)) mount(&(0x7f00000004c0)=ANY=[], &(0x7f000000aff8)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000000)) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000000c0)='tls\x00', 0x4) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$void(r1, 0x5450) renameat2(r0, &(0x7f0000000180)='./file0/file0\x00', 0xffffffffffffffff, 0x0, 0x0) shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@dev, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@remote}}, 0x0) ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, 0x0) shmctl$IPC_SET(0x0, 0x1, 0x0) ioctl$PIO_FONT(r0, 0x4b61, &(0x7f0000000740)="9d705183203ecbbfc0d13a4e30241f7ce01b0b4d7682444a507bfc1ac414339f479986467eb40c8065891e1fbbe7263212c5c09bb47896b3d85893f1173f8a139c116f876fdcc1779bffef8c34b5958981616cbcf39f2d8b43491de452d774a74c3ae9555a45180f7d68da36975781ba3a24694ac85eea975ca104181420baf7f3b9614203b0360e7cc29a1c109e") chdir(&(0x7f0000000340)='./file0\x00') symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) umount2(&(0x7f0000000380)='./file0\x00', 0x3) openat$uinput(0xffffffffffffff9c, &(0x7f0000000440)='/dev/uinput\x00', 0x802, 0x0) r3 = syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') sendmsg$FOU_CMD_DEL(r1, &(0x7f00000002c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x28, r3, 0x200, 0x70bd25, 0x25dfdbfe, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e24}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x7f}]}, 0x28}}, 0x24048010) sendmsg$kcm(r0, &(0x7f0000000a40)={&(0x7f0000000580)=@ll={0x11, 0xfd, r2, 0x1, 0x8, 0x6, @dev={[], 0x16}}, 0x80, &(0x7f00000009c0)=[{&(0x7f00000008c0)="367a9f0d4a1564359d1e668c63869bb9bf3b7f5aa4030462889dd6407207295cea1b36e07bc2b38b11c6ca28a73515cf52d89a8199d5c019de826c756a31bac24f707efcfc0a2383216dccc08f804551f0a56d2c9ab95a113fa74dff88ccccc7f278200aa03d2349e688b69191611739bb3e2e5ff110c5858c1a7c5bd5431f9c8e73a99236728f125d5f52a2b0761872fc0fc53cda5458241b2a80fd918b21c8029039d416a6cde6aa786bdfaa21a4e5ffa5f80dec422e0051c7e98a8cff2f4afbe25ca5a154a57c10", 0xc9}], 0x1}, 0x4004000) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000001c0)={0x0, 0x4, 0x2, 0x3, 0x1}, 0x14) ioctl$VIDIOC_SUBDEV_S_SELECTION(r0, 0xc040563e, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x7) msgget(0x1, 0x318) syz_genetlink_get_family_id$team(&(0x7f0000000400)='team\x00') [ 346.127115] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 346.127132] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 346.163908] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 346.171370] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 346.178159] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 346.178178] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 346.178197] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 346.211852] hid-generic 0000:0000:0000.0001: hidraw0: HID v0.00 Device [syz1] on syz1 16:50:42 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uhid\x00', 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write$UHID_CREATE(r1, &(0x7f0000001080)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f00000000c0)=""/11, 0xb}, 0x120) read(r1, &(0x7f00000002c0)=""/169, 0xa9) dup2(r0, r2) 16:50:42 executing program 2: r0 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'hsr0\x00', 0x0}) bind$packet(r0, &(0x7f0000000340)={0x11, 0x0, r1}, 0x14) sendto(r0, &(0x7f00000000c0)="e360b641b37f00000003e8000066", 0xe, 0x0, 0x0, 0x0) [ 346.356857] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 346.373449] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 346.397524] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 346.424015] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 346.431546] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 346.438575] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 346.445903] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 346.453288] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 346.461358] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 346.468356] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 346.476065] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 16:50:42 executing program 2: r0 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'hsr0\x00', 0x0}) bind$packet(r0, &(0x7f0000000340)={0x11, 0x0, r1}, 0x14) sendto(r0, &(0x7f00000000c0)="e360b641b37f0000810000000066", 0xe, 0x0, 0x0, 0x0) [ 346.494797] hid-generic 0000:0000:0000.0002: hidraw0: HID v0.00 Device [syz1] on syz1 16:50:42 executing program 3: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000b00)) mount(&(0x7f00000004c0)=ANY=[], &(0x7f000000aff8)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000000)) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000000c0)='tls\x00', 0x4) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$void(r1, 0x5450) renameat2(r0, &(0x7f0000000180)='./file0/file0\x00', 0xffffffffffffffff, 0x0, 0x0) shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@dev, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@remote}}, 0x0) ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, 0x0) shmctl$IPC_SET(0x0, 0x1, 0x0) ioctl$PIO_FONT(r0, 0x4b61, &(0x7f0000000740)="9d705183203ecbbfc0d13a4e30241f7ce01b0b4d7682444a507bfc1ac414339f479986467eb40c8065891e1fbbe7263212c5c09bb47896b3d85893f1173f8a139c116f876fdcc1779bffef8c34b5958981616cbcf39f2d8b43491de452d774a74c3ae9555a45180f7d68da36975781ba3a24694ac85eea975ca104181420baf7f3b9614203b0360e7cc29a1c109e") chdir(&(0x7f0000000340)='./file0\x00') symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) umount2(&(0x7f0000000380)='./file0\x00', 0x3) openat$uinput(0xffffffffffffff9c, &(0x7f0000000440)='/dev/uinput\x00', 0x802, 0x0) r3 = syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') sendmsg$FOU_CMD_DEL(r1, &(0x7f00000002c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x28, r3, 0x200, 0x70bd25, 0x25dfdbfe, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e24}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x7f}]}, 0x28}}, 0x24048010) sendmsg$kcm(r0, &(0x7f0000000a40)={&(0x7f0000000580)=@ll={0x11, 0xfd, r2, 0x1, 0x8, 0x6, @dev={[], 0x16}}, 0x80, &(0x7f00000009c0)=[{&(0x7f00000008c0)="367a9f0d4a1564359d1e668c63869bb9bf3b7f5aa4030462889dd6407207295cea1b36e07bc2b38b11c6ca28a73515cf52d89a8199d5c019de826c756a31bac24f707efcfc0a2383216dccc08f804551f0a56d2c9ab95a113fa74dff88ccccc7f278200aa03d2349e688b69191611739bb3e2e5ff110c5858c1a7c5bd5431f9c8e73a99236728f125d5f52a2b0761872fc0fc53cda5458241b2a80fd918b21c8029039d416a6cde6aa786bdfaa21a4e5ffa5f80dec422e0051c7e98a8cff2f4afbe25ca5a154a57c10", 0xc9}], 0x1}, 0x4004000) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000001c0)={0x0, 0x4, 0x2, 0x3, 0x1}, 0x14) ioctl$VIDIOC_SUBDEV_S_SELECTION(r0, 0xc040563e, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x7) msgget(0x1, 0x318) syz_genetlink_get_family_id$team(&(0x7f0000000400)='team\x00') 16:50:42 executing program 5: socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = syz_open_dev$mice(0x0, 0x0, 0x105000) r1 = syz_open_dev$usbmon(0x0, 0x8, 0x220000) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffff9c, 0xc0184900, &(0x7f00000006c0)={0xfff, 0x0, 0x0, 0xffffffffffffff9c}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000740)={0x0, 0x0}) r4 = openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmmsg$nfc_llcp(r1, &(0x7f0000003300)=[{&(0x7f0000000380)={0x27, 0x1, 0x1, 0x7, 0x2000, 0xfffffffffffffffd, "e9d54ee2289badf6e4c6d6d46c91d4a5bfbe2c13d12d4b6aa2846a31618be62803f9704cb6a224dece5c417907cb0f1257497b712c41da762a069a9f9c3515", 0x13}, 0x60, &(0x7f0000001f80)=[{&(0x7f0000000c00)="2db15d2471e7dbd483edfb3a6286f79ac4729dc0baf5ff317cf12a1af6101527edf18f49a54a35bbfc216080b6e8d9a413fef88fbabbdaf6205c628eb322d6f150eda09d3f0971caf03a73379ff07f9108af4026d1f12b80b156f313ff418a6d4ec9b6a17a24ca79aa01272e55d575364f14c7f3987badbb77d601ea7fd9cfccb58c55b13a3a192e6cb95bd93059320237c9dec2dd7bee6820c03958ab09bc5c76b54717a53ffccb5d2f5752d998f3cdb9b68c892557918725857f9ef3376e131c7de640c7aa4f4238ecc184", 0xcc}, {&(0x7f0000000ac0)="726bd2fae7c23e4ad1c92cef2dffd0b1f1e96d3054e97f0f6e5b0b9ad44e4722531c098d04e900db8ad4cf08959479d3741a7a3c042ae05747bf44f1bdbebd801665fa33e172846b9699ea3b87ee7b0d90bb3ed79270ecf0a4c1a4959e5833522428c95770ab58457ec396db59227abc5a50fe1c3b50bbf7c3212a73ab0f3c3b1527397d3e90c575cee5ddec7ea0a28660ec82faad3ef02aa2207c92eabf69f69d8c5bdd2e27094afde225", 0xab}, {&(0x7f0000000200)="84d9a13e1224d707c9f2b936bfd660ab1473edf829248f2b2e755a93ba99313a68ef10ee5bf4aba08bee0ea8bd0fa582cd05fa", 0x33}, {&(0x7f0000000400)="f3b125a0dad3b05070", 0x9}, {&(0x7f0000000500)="f233be92025671b3", 0x8}, {&(0x7f0000000d00)="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", 0xfa}, {&(0x7f0000000e00)="4adcfbdfa6451f1c5706fab22a7e042c2b442de5ec8eac6938384cff014e06897f9f7c040712292720616a5553b978a4f08ac5c627b4729658741fab12a9783dc609ecad2f83c66042d0946a523c442fb2ee3223943f45e8b40cf19becd029bcfa6da5f0a8d42f06fdbfa2206230ea706169b31253aebd4996dc4df6515a9a5094b2e2bad0ab1deec9637d3cc5af95b19d42c832a17f333234d4cc69849f", 0x9e}, {&(0x7f0000000ec0)="4622c4a26e4c9a6d64fa66d072920333e3f76806c91228f88aa91bb2a193e2e44b29e9f0bc4cf9b9ade68c50dbbfdb88defa9cc9afd46879ebbb72f39b8aa5e03e89455cc5bf972dfd58d7572a0e6bdd43818592dca819e67abaddbfb7c86f2c1cf7869178ddaac7afa1e4428d627a81705c2b132b1ec05a6a2bd2baf471bd63ea1b8e9000019a61615ddc2b2fc3611c3939ae3e6f013a16", 0x98}, {&(0x7f0000000f80)="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", 0x1000}], 0x9, &(0x7f0000002040)={0x1010, 0x10e, 0x1, "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"}, 0x1010, 0x1}, {&(0x7f0000003080)={0x27, 0x1, 0x0, 0x7, 0x8, 0x1d63d6de, "2e7d239e97b9a9773c46b088ea64dafd697937531e26e612436edcb8a61b6aa56e4da9411bf5f998d97a71b2f3f4fb021a05f606e21ea2b3060f4927da3e34", 0xe}, 0x60, &(0x7f0000000880)=[{&(0x7f0000000700)="a4217eae1fb9874d6089664c7764a1b1bfbb1b63ac31f63b9399b284a19cc70a5ed1455fa2a99203eb775142ff3d9aef8fe7b3cd67c6c7ef", 0x38}, {&(0x7f0000003100)="1ff8b3afbd10f4e54adae617854d4fd43c4cf85331bea40c81ebb1ffc279a99c2cd3ad4e9fe9be4eeb4ac514b70da094db0d77d10e6f60aaeefe2cf37dc82d82107a88c0a127e7379f7f0f1a0778b1852c005ccfe67d8125eaae117bb519e9beb25a9ec77c096e8af7ce37925e1ab5ce518c7e4658464212ef961f6244b6bad7b6ae4d43b6594597d5e1bdf9b9d5bd7f", 0x90}], 0x2, &(0x7f00000033c0)=ANY=[@ANYBLOB="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"], 0x110, 0x881}], 0x2, 0x20004000) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000008c0)={r3, r4, 0x0, 0xd, &(0x7f00000004c0)='/dev/urandom\x00'}, 0x30) getsockopt$SO_COOKIE(r2, 0x1, 0x39, &(0x7f0000000440), &(0x7f0000000480)=0x8) r6 = openat$random(0xffffffffffffff9c, &(0x7f0000000300)='/dev/urandom\x00', 0x0, 0x0) r7 = openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getrandom(&(0x7f0000000180)=""/40, 0xffffffffffffff56, 0x2) write$UHID_SET_REPORT_REPLY(r7, &(0x7f0000000b80)=ANY=[@ANYPTR=&(0x7f0000003580)=ANY=[@ANYBLOB="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", @ANYRES32=0x0, @ANYRESHEX=r2], @ANYRESHEX=r4, @ANYRESOCT=r7, @ANYRES16, @ANYRES64=r5, @ANYRESDEC], 0x6) getsockopt$inet_IP_IPSEC_POLICY(r7, 0x0, 0x10, &(0x7f0000000780)={{{@in6=@dev, @in6=@remote}}}, &(0x7f0000000540)=0xe8) ioctl$RNDADDTOENTCNT(r6, 0x40045201, &(0x7f0000000280)=0x1f) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f00000002c0)={r2}) ioctl$VIDIOC_G_FBUF(r4, 0x8030560a, &(0x7f0000000240)={0x4, 0x8, 0x0, {0x58, 0xffffffffb9329a73, 0x32315559, 0x6, 0x1ff, 0x3, 0x8, 0x6}}) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f0000000900)={0x0, 0x0, 0x4, 0x0, [], [{0xa98d, 0x7, 0x6, 0x0, 0x6}, {0x80000000, 0x2, 0x6306, 0x9, 0xffffffffffffffff, 0x3}], [[], [], [], []]}) ioctl$sock_inet6_tcp_SIOCOUTQ(r7, 0x5411, &(0x7f0000000340)) preadv(0xffffffffffffffff, &(0x7f0000000580)=[{&(0x7f0000000100)=""/254, 0xfe}], 0x1000000000000125, 0x0) ioctl$KDGKBENT(r0, 0x4b46, &(0x7f00000031c0)={0x1f, 0x8, 0x1f}) ioctl$UI_SET_FFBIT(r4, 0x4004556b, 0x5) syz_open_dev$ndb(&(0x7f0000003380)='/dev/nbd#\x00', 0x0, 0x8000) ioctl$sock_inet_SIOCSIFNETMASK(r2, 0x891c, &(0x7f0000000080)={'lo\x00\n\xcc\x00\x00\x00\x00\x00\x00\x00\x00\x00&\x00', {0x2, 0x0, @rand_addr=0xfffffffffffffffe}}) 16:50:42 executing program 1: clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getresuid(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x8000) write$P9_RLERRORu(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r1) close(r1) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0086426, 0x0) write$P9_RATTACH(r0, &(0x7f0000000040)={0x14, 0x69, 0x1, {0xc0, 0x1, 0x4}}, 0x14) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r1, 0xc0145401, &(0x7f0000000080)={0x1, 0x3, 0x0, 0x3, 0x7f}) ioctl$TCGETA(r1, 0x5405, 0x0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) 16:50:42 executing program 2: r0 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'hsr0\x00', 0x0}) bind$packet(r0, &(0x7f0000000340)={0x11, 0x0, r1}, 0x14) sendto(r0, &(0x7f00000000c0)="e360b641b37f0000110000000066", 0xe, 0x0, 0x0, 0x0) 16:50:42 executing program 3: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000b00)) mount(&(0x7f00000004c0)=ANY=[], &(0x7f000000aff8)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000000)) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000000c0)='tls\x00', 0x4) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$void(r1, 0x5450) renameat2(r0, &(0x7f0000000180)='./file0/file0\x00', 0xffffffffffffffff, 0x0, 0x4) shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, 0x0, 0x0) ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, 0x0) shmctl$IPC_SET(0x0, 0x1, 0x0) ioctl$PIO_FONT(r0, 0x4b61, &(0x7f0000000740)="9d705183203ecbbfc0d13a4e30241f7ce01b0b4d7682444a507bfc1ac414339f479986467eb40c8065891e1fbbe7263212c5c09bb47896b3d85893f1173f8a139c116f876fdcc1779bffef8c34b5958981616cbcf39f2d8b43491de452d774a74c3ae9555a45180f7d68da36975781ba3a24694ac85eea975ca104181420baf7f3b9614203b0360e7cc29a1c109e") chdir(&(0x7f0000000340)='./file0\x00') symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) umount2(&(0x7f0000000380)='./file0\x00', 0x3) openat$uinput(0xffffffffffffff9c, &(0x7f0000000440)='/dev/uinput\x00', 0x802, 0x0) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') sendmsg$FOU_CMD_DEL(r1, &(0x7f00000002c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x28, r2, 0x200, 0x70bd25, 0x25dfdbfe, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e24}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x7f}]}, 0x28}}, 0x24048010) sendmsg$kcm(r0, &(0x7f0000000a40)={&(0x7f0000000580)=@ll={0x11, 0xfd, 0x0, 0x1, 0x8, 0x6, @dev={[], 0x16}}, 0x80, &(0x7f00000009c0)=[{&(0x7f00000008c0)="367a9f0d4a1564359d1e668c63869bb9bf3b7f5aa4030462889dd6407207295cea1b36e07bc2b38b11c6ca28a73515cf52d89a8199d5c019de826c756a31bac24f707efcfc0a2383216dccc08f804551f0a56d2c9ab95a113fa74dff88ccccc7f278200aa03d2349e688b69191611739bb3e2e5ff110c5858c1a7c5bd5431f9c8e73a99236728f125d5f52a2b0761872fc0fc53cda5458241b2a80fd918b21c8029039d416a6cde6aa786bdfaa21a4e5ffa5f80dec422e0051c7e98a8cff2f4afbe25ca5a154a57c10", 0xc9}], 0x1}, 0x4004000) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000001c0)={0x0, 0x4, 0x2, 0x3, 0x1}, 0x14) ioctl$VIDIOC_SUBDEV_S_SELECTION(r0, 0xc040563e, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x7) msgget(0x1, 0x318) syz_genetlink_get_family_id$team(&(0x7f0000000400)='team\x00') [ 348.270350] net_ratelimit: 28 callbacks suppressed [ 348.270358] protocol 88fb is buggy, dev hsr_slave_0 [ 348.280447] protocol 88fb is buggy, dev hsr_slave_1 [ 348.350277] protocol 88fb is buggy, dev hsr_slave_0 [ 348.355494] protocol 88fb is buggy, dev hsr_slave_1 16:50:44 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x4000000000000036) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={@mcast1, @local, @local, 0x0, 0x0, 0x0, 0x200800000000114}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x21, r0, 0x0, 0x0) 16:50:45 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x4000000000000036) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={@mcast1, @local, @local, 0x80000000, 0x0, 0x0, 0x200800000000114}) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x21, r0, 0x0, 0x0) 16:50:45 executing program 2: r0 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'hsr0\x00', 0x0}) bind$packet(r0, &(0x7f0000000340)={0x11, 0x0, r1}, 0x14) sendto(r0, &(0x7f00000000c0)="e360b641b37f0008000000000066", 0xe, 0x0, 0x0, 0x0) 16:50:45 executing program 3: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000b00)) mount(&(0x7f00000004c0)=ANY=[], &(0x7f000000aff8)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000000)) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000000c0)='tls\x00', 0x4) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$void(r1, 0x5450) renameat2(r0, &(0x7f0000000180)='./file0/file0\x00', 0xffffffffffffffff, 0x0, 0x4) shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@dev, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@remote}}, 0x0) ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, 0x0) shmctl$IPC_SET(0x0, 0x1, 0x0) ioctl$PIO_FONT(0xffffffffffffffff, 0x4b61, &(0x7f0000000740)="9d705183203ecbbfc0d13a4e30241f7ce01b0b4d7682444a507bfc1ac414339f479986467eb40c8065891e1fbbe7263212c5c09bb47896b3d85893f1173f8a139c116f876fdcc1779bffef8c34b5958981616cbcf39f2d8b43491de452d774a74c3ae9555a45180f7d68da36975781ba3a24694ac85eea975ca104181420baf7f3b9614203b0360e7cc29a1c109e") chdir(&(0x7f0000000340)='./file0\x00') symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) umount2(&(0x7f0000000380)='./file0\x00', 0x3) openat$uinput(0xffffffffffffff9c, &(0x7f0000000440)='/dev/uinput\x00', 0x802, 0x0) r3 = syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') sendmsg$FOU_CMD_DEL(r1, &(0x7f00000002c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x28, r3, 0x200, 0x70bd25, 0x25dfdbfe, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e24}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x7f}]}, 0x28}}, 0x24048010) sendmsg$kcm(r0, &(0x7f0000000a40)={&(0x7f0000000580)=@ll={0x11, 0xfd, r2, 0x1, 0x8, 0x6, @dev={[], 0x16}}, 0x80, &(0x7f00000009c0)=[{&(0x7f00000008c0)="367a9f0d4a1564359d1e668c63869bb9bf3b7f5aa4030462889dd6407207295cea1b36e07bc2b38b11c6ca28a73515cf52d89a8199d5c019de826c756a31bac24f707efcfc0a2383216dccc08f804551f0a56d2c9ab95a113fa74dff88ccccc7f278200aa03d2349e688b69191611739bb3e2e5ff110c5858c1a7c5bd5431f9c8e73a99236728f125d5f52a2b0761872fc0fc53cda5458241b2a80fd918b21c8029039d416a6cde6aa786bdfaa21a4e5ffa5f80dec422e0051c7e98a8cff2f4afbe25ca5a154a57c10", 0xc9}], 0x1}, 0x4004000) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000001c0)={0x0, 0x4, 0x2, 0x3, 0x1}, 0x14) ioctl$VIDIOC_SUBDEV_S_SELECTION(r0, 0xc040563e, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x7) msgget(0x1, 0x318) syz_genetlink_get_family_id$team(&(0x7f0000000400)='team\x00') 16:50:45 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x17a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x6674}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000240)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$restrict_keyring(0x1d, r1, &(0x7f0000000280)='asymmetric\x00', &(0x7f0000000340)='!selinuxselinux\x00') r2 = fcntl$getown(r0, 0x9) r3 = syz_open_dev$admmidi(&(0x7f0000000100)='/dev/admmidi#\x00', 0x800, 0x80000) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r3, 0x84, 0x6d, &(0x7f0000000380)=ANY=[@ANYRES32=0x0, @ANYBLOB="e8000000074e6fe6119eebbf6548e5cc1967117da47c7982ff6159a0138495f2b93f2fa167cfba052d3ff6aab6845ef1815c1b4fe69fc5263fe953776b5f00c5dbdcb75975ceb9902cbc2c281e52c90cfd8dd8abcf154f219eab1bc3758966249927038eac3c2e9b438a8cbf0ad7437e84cd0863f956a63fe349f05ab83f98bc42e6df6d7eb3da9010ec420a686ed39af3ee59ced30d75c5338c631df8a81c2cb33dd73f8290080b94858701bfda4a70ec4e1631af29cc4d33703ec747ce3939b7b7a42a3a0492cc44cdb1526fae722e93ce9536d4604c86d680a208a756f4ce6d119a31ca26e411e6426c27"], &(0x7f00000001c0)=0xf0) setsockopt$inet_sctp_SCTP_MAX_BURST(r3, 0x84, 0x14, &(0x7f0000000200)=@assoc_value={r4}, 0x8) ioctl$SG_SET_FORCE_PACK_ID(r3, 0x227b, &(0x7f0000000140)) capset(&(0x7f0000000000)={0x200f1526, r2}, &(0x7f00000000c0)={0x2, 0x4, 0x7, 0x3b940000, 0x2541, 0x7}) 16:50:45 executing program 1: clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getresuid(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x8000) write$P9_RLERRORu(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r1) close(r1) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0086426, 0x0) write$P9_RATTACH(r0, &(0x7f0000000040)={0x14, 0x69, 0x1, {0xc0, 0x1, 0x4}}, 0x14) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r1, 0xc0145401, &(0x7f0000000080)={0x1, 0x3, 0x0, 0x3, 0x7f}) ioctl$TCGETA(r1, 0x5405, 0x0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) [ 349.160313] protocol 88fb is buggy, dev hsr_slave_0 [ 349.165480] protocol 88fb is buggy, dev hsr_slave_1 [ 349.230267] protocol 88fb is buggy, dev hsr_slave_0 [ 349.235493] protocol 88fb is buggy, dev hsr_slave_1 16:50:45 executing program 1: r0 = accept4(0xffffffffffffffff, &(0x7f0000000000)=@caif=@dbg, &(0x7f0000000080)=0x80, 0x80000) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x27, &(0x7f0000000100)={@loopback, @multicast1, 0x0}, &(0x7f0000000140)=0xc) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x830080}, 0xc, &(0x7f0000000380)={&(0x7f0000000180)=@newqdisc={0x1ec, 0x24, 0x104, 0x70bd2b, 0x25dfdbfd, {0x0, r1, {0x2, 0xffef}, {0xa, 0xfff3}, {0xfff2, 0xffff}}, [@TCA_RATE={0x8, 0x5, {0x8, 0x8000}}, @TCA_STAB={0x94, 0x8, [@TCA_STAB_BASE={0x1c, 0x1, {0x7fffffff, 0xa7ee, 0xffffffc000000000, 0x5, 0x2, 0x9, 0x5ca6bd72, 0x4}}, @TCA_STAB_BASE={0x1c, 0x1, {0x9, 0x200, 0x5, 0x9, 0x0, 0x1, 0x3f, 0x1}}, @TCA_STAB_DATA={0x18, 0x2, [0xff4, 0x101, 0x7, 0x0, 0x6, 0x0, 0x8, 0x1, 0xffffffffffff8000]}, @TCA_STAB_DATA={0x18, 0x2, [0xb27200000000, 0x7, 0x4, 0x10001, 0x7, 0x40, 0xfffffffffffffffc, 0xfff, 0x2, 0x2]}, @TCA_STAB_DATA={0xc, 0x2, [0xffffffff7fffffff, 0x53ba, 0xfffffffffffffffe, 0x5]}, @TCA_STAB_BASE={0x1c, 0x1, {0x8, 0x9, 0xffffffffffff743d, 0x9, 0x1, 0x4, 0x3f, 0x5}}]}, @TCA_INGRESS_BLOCK={0x8}, @TCA_RATE={0x8, 0x5, {0x1ff, 0xfffffffffffffffc}}, @TCA_STAB={0x80, 0x8, [@TCA_STAB_BASE={0x1c, 0x1, {0x4, 0xfffffffffffffffb, 0x8, 0x10001, 0x1, 0x1, 0x8, 0x2}}, @TCA_STAB_DATA={0x18, 0x2, [0x8000, 0x4, 0xbaa, 0x4, 0x400, 0xff, 0x8ac9, 0x6246, 0x9]}, @TCA_STAB_BASE={0x1c, 0x1, {0x2, 0x1480000000000000, 0x9, 0x8, 0x3, 0x401, 0x80, 0x2}}, @TCA_STAB_DATA={0x4}, @TCA_STAB_DATA={0x10, 0x2, [0x3, 0x1000, 0x8001, 0x7, 0x5, 0x7f]}, @TCA_STAB_DATA={0x18, 0x2, [0xa33, 0x2, 0x80, 0x8, 0x4, 0x9, 0x7, 0x1, 0x200]}]}, @TCA_STAB={0x9c, 0x8, [@TCA_STAB_BASE={0x1c, 0x1, {0x80000001, 0x2, 0x3f, 0x2, 0x3, 0x4, 0x3, 0x3}}, @TCA_STAB_BASE={0x1c, 0x1, {0x100, 0x3a, 0x9, 0x2, 0x2, 0x3, 0x6, 0x9}}, @TCA_STAB_BASE={0x1c, 0x1, {0xfffffffffffff619, 0x2, 0x401, 0xfffffffffffffffc, 0x0, 0x3, 0x5, 0x3}}, @TCA_STAB_BASE={0x1c, 0x1, {0x2, 0x9, 0x721, 0x5, 0x2, 0x0, 0x100000000, 0x7}}, @TCA_STAB_DATA={0xc, 0x2, [0x5, 0x1, 0x401, 0x6]}, @TCA_STAB_BASE={0x1c, 0x1, {0x1, 0x4, 0x9, 0x3, 0x2, 0x61, 0x80000000, 0xa}}]}]}, 0x1ec}, 0x1, 0x0, 0x0, 0x4000800}, 0x800) ioctl$BINDER_SET_MAX_THREADS(r0, 0x40046205, 0x1ff) prctl$PR_SET_SPECULATION_CTRL(0x35, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(r0, 0xc02c564a, &(0x7f0000000400)={0x4, 0x7b777d5f, 0x3, @discrete={0x4, 0xda}}) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000440)='/dev/sequencer\x00', 0x8080, 0x0) ioctl$BLKPG(r2, 0x1269, &(0x7f0000000500)={0x1ff, 0x200, 0x55, &(0x7f0000000480)="9e618528d349a5f8578be21291fbb7d4811e7f594e3b5018294629494817e8e88bae13a0ca94834d156eb04ccb52bc61a23bd46ab79b3ef6141b762515d2a381f3dd4b1b057a74495b815c297319fef2dd80b59bc2"}) ioctl$KVM_GET_REGS(r2, 0x8090ae81, &(0x7f0000000540)) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000640)='IPVS\x00') sendmsg$IPVS_CMD_ZERO(r2, &(0x7f0000000780)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x402100}, 0xc, &(0x7f0000000740)={&(0x7f0000000680)={0xb8, r3, 0x201, 0x70bd2b, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_SERVICE={0x24, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x4e}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x4d}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x3}]}, @IPVS_CMD_ATTR_SERVICE={0x34, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x4}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@dev={0xfe, 0x80, [], 0x20}}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x12, 0xa}}]}, @IPVS_CMD_ATTR_SERVICE={0x4c, 0x1, [@IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'dh\x00'}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e20}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e23}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'sh\x00'}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'sed\x00'}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x2}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'sh\x00'}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0x2}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x75}]}]}, 0xb8}, 0x1, 0x0, 0x0, 0x40000}, 0x4004000) sendmsg$IPVS_CMD_GET_DEST(r2, &(0x7f0000000880)={&(0x7f00000007c0)={0x10, 0x0, 0x0, 0x440000}, 0xc, &(0x7f0000000840)={&(0x7f0000000800)={0x1c, r3, 0x620, 0x70bd28, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x9}]}, 0x1c}, 0x1, 0x0, 0x0, 0x80}, 0x885) stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r0, &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r0, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000ac0)={{{@in=@empty, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000000bc0)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000c00)={{{@in6=@dev, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@multicast1}}, &(0x7f0000000d00)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000d40)={{{@in=@dev, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000e40)=0xe8) getresgid(&(0x7f0000000e80)=0x0, &(0x7f0000000ec0), &(0x7f0000000f00)) r11 = getgid() stat(&(0x7f0000000f40)='./file0\x00', &(0x7f0000000f80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fsetxattr$system_posix_acl(r2, &(0x7f00000008c0)='system.posix_acl_access\x00', &(0x7f0000001000)={{}, {0x1, 0x2}, [{0x2, 0x2, r4}, {0x2, 0x7, r5}, {0x2, 0x4, r6}, {0x2, 0x4, r7}, {0x2, 0x7, r8}, {0x2, 0x6, r9}], {0x4, 0x1}, [{0x8, 0x4, r10}, {0x8, 0x4, r11}, {0x8, 0x5, r12}], {}, {0x20, 0x1}}, 0x6c, 0x1) ioctl$UI_SET_FFBIT(r2, 0x4004556b, 0x2) ioctl$sock_SIOCOUTQ(r2, 0x5411, &(0x7f0000001080)) ioctl$IMGETVERSION(r0, 0x80044942, &(0x7f00000010c0)) ioctl$sock_SIOCINQ(r2, 0x541b, &(0x7f0000001100)) r13 = syz_genetlink_get_family_id$tipc2(&(0x7f0000001180)='TIPCv2\x00') sendmsg$TIPC_NL_PUBL_GET(r2, &(0x7f0000001480)={&(0x7f0000001140)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000001440)={&(0x7f00000011c0)={0x268, r13, 0x210, 0x70bd28, 0x25dfdbfb, {}, [@TIPC_NLA_NET={0x28, 0x7, [@TIPC_NLA_NET_ID={0x8, 0x1, 0x9}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x9}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x7fffffff}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0xa93}]}, @TIPC_NLA_NODE={0xc, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_NODE={0x4c, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xc6}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x7f}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x100000000}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x7fc00000000000}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x3}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x9}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x3f}]}, @TIPC_NLA_BEARER={0x58, 0x1, [@TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'eth', 0x3a, 'ip6gre0\x00'}}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e24, @rand_addr=0x5}}, {0x14, 0x2, @in={0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x10001}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'ib', 0x3a, 'teql0\x00'}}]}, @TIPC_NLA_SOCK={0x18, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x2}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x7fff}]}, @TIPC_NLA_MEDIA={0x58, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x44, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x401}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xe}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7ff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x14}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xff}]}]}, @TIPC_NLA_BEARER={0x10c, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e24, 0x5, @loopback, 0x9}}, {0x14, 0x2, @in={0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0xd}}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x1ff}, @TIPC_NLA_BEARER_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x100000000}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8001}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e21, 0x7ff, @local, 0x3}}, {0x20, 0x2, @in6={0xa, 0x4e21, 0xff, @dev={0xfe, 0x80, [], 0x1f}, 0x8}}}}, @TIPC_NLA_BEARER_PROP={0x4c, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x13}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8a6}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1f}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x4}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7ff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x3}]}, @TIPC_NLA_BEARER_PROP={0xc, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}]}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz2\x00'}]}]}, 0x268}, 0x1, 0x0, 0x0, 0x4}, 0x8000) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) r14 = syz_open_dev$media(&(0x7f0000001580)='/dev/media#\x00', 0x4, 0x2a6400) connect$bt_l2cap(r14, &(0x7f00000015c0)={0x1f, 0x1, {0x8, 0x0, 0x7fc, 0x8001, 0x1f, 0x6cc}, 0xc13, 0x9}, 0xe) 16:50:45 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x17a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x6674}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000240)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$restrict_keyring(0x1d, r1, &(0x7f0000000280)='asymmetric\x00', &(0x7f0000000340)='!selinuxselinux\x00') r2 = fcntl$getown(r0, 0x9) r3 = syz_open_dev$admmidi(&(0x7f0000000100)='/dev/admmidi#\x00', 0x800, 0x80000) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r3, 0x84, 0x6d, &(0x7f0000000380)=ANY=[@ANYRES32=0x0, @ANYBLOB="e8000000074e6fe6119eebbf6548e5cc1967117da47c7982ff6159a0138495f2b93f2fa167cfba052d3ff6aab6845ef1815c1b4fe69fc5263fe953776b5f00c5dbdcb75975ceb9902cbc2c281e52c90cfd8dd8abcf154f219eab1bc3758966249927038eac3c2e9b438a8cbf0ad7437e84cd0863f956a63fe349f05ab83f98bc42e6df6d7eb3da9010ec420a686ed39af3ee59ced30d75c5338c631df8a81c2cb33dd73f8290080b94858701bfda4a70ec4e1631af29cc4d33703ec747ce3939b7b7a42a3a0492cc44cdb1526fae722e93ce9536d4604c86d680a208a756f4ce6d119a31ca26e411e6426c27"], &(0x7f00000001c0)=0xf0) setsockopt$inet_sctp_SCTP_MAX_BURST(r3, 0x84, 0x14, &(0x7f0000000200)=@assoc_value={r4}, 0x8) ioctl$SG_SET_FORCE_PACK_ID(r3, 0x227b, &(0x7f0000000140)) capset(&(0x7f0000000000)={0x200f1526, r2}, &(0x7f00000000c0)={0x2, 0x4, 0x7, 0x3b940000, 0x2541, 0x7}) 16:50:45 executing program 2: r0 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'hsr0\x00', 0x0}) bind$packet(r0, &(0x7f0000000340)={0x11, 0x0, r1}, 0x14) sendto(r0, &(0x7f00000000c0)="e360b641b37f0060000000000066", 0xe, 0x0, 0x0, 0x0) 16:50:45 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x17a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x6674}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000240)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$restrict_keyring(0x1d, r1, &(0x7f0000000280)='asymmetric\x00', &(0x7f0000000340)='!selinuxselinux\x00') r2 = fcntl$getown(r0, 0x9) r3 = syz_open_dev$admmidi(&(0x7f0000000100)='/dev/admmidi#\x00', 0x800, 0x80000) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r3, 0x84, 0x6d, &(0x7f0000000380)=ANY=[@ANYRES32=0x0, @ANYBLOB="e8000000074e6fe6119eebbf6548e5cc1967117da47c7982ff6159a0138495f2b93f2fa167cfba052d3ff6aab6845ef1815c1b4fe69fc5263fe953776b5f00c5dbdcb75975ceb9902cbc2c281e52c90cfd8dd8abcf154f219eab1bc3758966249927038eac3c2e9b438a8cbf0ad7437e84cd0863f956a63fe349f05ab83f98bc42e6df6d7eb3da9010ec420a686ed39af3ee59ced30d75c5338c631df8a81c2cb33dd73f8290080b94858701bfda4a70ec4e1631af29cc4d33703ec747ce3939b7b7a42a3a0492cc44cdb1526fae722e93ce9536d4604c86d680a208a756f4ce6d119a31ca26e411e6426c27"], &(0x7f00000001c0)=0xf0) setsockopt$inet_sctp_SCTP_MAX_BURST(r3, 0x84, 0x14, &(0x7f0000000200)=@assoc_value={r4}, 0x8) ioctl$SG_SET_FORCE_PACK_ID(r3, 0x227b, &(0x7f0000000140)) capset(&(0x7f0000000000)={0x200f1526, r2}, &(0x7f00000000c0)={0x2, 0x4, 0x7, 0x3b940000, 0x2541, 0x7}) 16:50:45 executing program 3: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000b00)) mount(&(0x7f00000004c0)=ANY=[], &(0x7f000000aff8)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000000)) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000000c0)='tls\x00', 0x4) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$void(r1, 0x5450) renameat2(r0, &(0x7f0000000180)='./file0/file0\x00', 0xffffffffffffffff, 0x0, 0x4) shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@dev, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@remote}}, 0x0) ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, 0x0) shmctl$IPC_SET(0x0, 0x1, 0x0) ioctl$PIO_FONT(r0, 0x4b61, 0x0) chdir(&(0x7f0000000340)='./file0\x00') symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) umount2(&(0x7f0000000380)='./file0\x00', 0x3) openat$uinput(0xffffffffffffff9c, &(0x7f0000000440)='/dev/uinput\x00', 0x802, 0x0) r3 = syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') sendmsg$FOU_CMD_DEL(r1, &(0x7f00000002c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x28, r3, 0x200, 0x70bd25, 0x25dfdbfe, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e24}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x7f}]}, 0x28}}, 0x24048010) sendmsg$kcm(r0, &(0x7f0000000a40)={&(0x7f0000000580)=@ll={0x11, 0xfd, r2, 0x1, 0x8, 0x6, @dev={[], 0x16}}, 0x80, &(0x7f00000009c0)=[{&(0x7f00000008c0)="367a9f0d4a1564359d1e668c63869bb9bf3b7f5aa4030462889dd6407207295cea1b36e07bc2b38b11c6ca28a73515cf52d89a8199d5c019de826c756a31bac24f707efcfc0a2383216dccc08f804551f0a56d2c9ab95a113fa74dff88ccccc7f278200aa03d2349e688b69191611739bb3e2e5ff110c5858c1a7c5bd5431f9c8e73a99236728f125d5f52a2b0761872fc0fc53cda5458241b2a80fd918b21c8029039d416a6cde6aa786bdfaa21a4e5ffa5f80dec422e0051c7e98a8cff2f4afbe25ca5a154a57c10", 0xc9}], 0x1}, 0x4004000) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000001c0)={0x0, 0x4, 0x2, 0x3, 0x1}, 0x14) ioctl$VIDIOC_SUBDEV_S_SELECTION(r0, 0xc040563e, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x7) msgget(0x1, 0x318) syz_genetlink_get_family_id$team(&(0x7f0000000400)='team\x00') 16:50:45 executing program 1: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000b00)) mount(&(0x7f00000004c0)=ANY=[], &(0x7f000000aff8)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000000)) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000000c0)='tls\x00', 0x4) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$void(r1, 0x5450) renameat2(r0, &(0x7f0000000180)='./file0/file0\x00', 0xffffffffffffffff, 0x0, 0x4) shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@dev, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@remote}}, 0x0) ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, 0x0) shmctl$IPC_SET(0x0, 0x1, 0x0) ioctl$PIO_FONT(0xffffffffffffffff, 0x4b61, &(0x7f0000000740)="9d705183203ecbbfc0d13a4e30241f7ce01b0b4d7682444a507bfc1ac414339f479986467eb40c8065891e1fbbe7263212c5c09bb47896b3d85893f1173f8a139c116f876fdcc1779bffef8c34b5958981616cbcf39f2d8b43491de452d774a74c3ae9555a45180f7d68da36975781ba3a24694ac85eea975ca104181420baf7f3b9614203b0360e7cc29a1c109e") chdir(&(0x7f0000000340)='./file0\x00') symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) umount2(&(0x7f0000000380)='./file0\x00', 0x3) openat$uinput(0xffffffffffffff9c, &(0x7f0000000440)='/dev/uinput\x00', 0x802, 0x0) r3 = syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') sendmsg$FOU_CMD_DEL(r1, &(0x7f00000002c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x28, r3, 0x200, 0x70bd25, 0x25dfdbfe, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e24}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x7f}]}, 0x28}}, 0x24048010) sendmsg$kcm(r0, &(0x7f0000000a40)={&(0x7f0000000580)=@ll={0x11, 0xfd, r2, 0x1, 0x8, 0x6, @dev={[], 0x16}}, 0x80, &(0x7f00000009c0)=[{&(0x7f00000008c0)="367a9f0d4a1564359d1e668c63869bb9bf3b7f5aa4030462889dd6407207295cea1b36e07bc2b38b11c6ca28a73515cf52d89a8199d5c019de826c756a31bac24f707efcfc0a2383216dccc08f804551f0a56d2c9ab95a113fa74dff88ccccc7f278200aa03d2349e688b69191611739bb3e2e5ff110c5858c1a7c5bd5431f9c8e73a99236728f125d5f52a2b0761872fc0fc53cda5458241b2a80fd918b21c8029039d416a6cde6aa786bdfaa21a4e5ffa5f80dec422e0051c7e98a8cff2f4afbe25ca5a154a57c10", 0xc9}], 0x1}, 0x4004000) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000001c0)={0x0, 0x4, 0x2, 0x3, 0x1}, 0x14) ioctl$VIDIOC_SUBDEV_S_SELECTION(r0, 0xc040563e, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x7) msgget(0x1, 0x318) syz_genetlink_get_family_id$team(&(0x7f0000000400)='team\x00') [ 349.470306] protocol 88fb is buggy, dev hsr_slave_0 [ 349.475492] protocol 88fb is buggy, dev hsr_slave_1 16:50:47 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x4000000000000036) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={@mcast1, @local, @local, 0x0, 0x0, 0x0, 0x200800000000114}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x21, r0, 0x0, 0x0) 16:50:48 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x4000000000000036) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={@mcast1, @local, @local, 0x80000000, 0x0, 0x0, 0x200800000000114}) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x21, r0, 0x0, 0x0) 16:50:48 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x17a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x6674}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000240)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$restrict_keyring(0x1d, r1, &(0x7f0000000280)='asymmetric\x00', &(0x7f0000000340)='!selinuxselinux\x00') r2 = fcntl$getown(r0, 0x9) r3 = syz_open_dev$admmidi(&(0x7f0000000100)='/dev/admmidi#\x00', 0x800, 0x80000) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r3, 0x84, 0x6d, &(0x7f0000000380)=ANY=[@ANYRES32=0x0, @ANYBLOB="e8000000074e6fe6119eebbf6548e5cc1967117da47c7982ff6159a0138495f2b93f2fa167cfba052d3ff6aab6845ef1815c1b4fe69fc5263fe953776b5f00c5dbdcb75975ceb9902cbc2c281e52c90cfd8dd8abcf154f219eab1bc3758966249927038eac3c2e9b438a8cbf0ad7437e84cd0863f956a63fe349f05ab83f98bc42e6df6d7eb3da9010ec420a686ed39af3ee59ced30d75c5338c631df8a81c2cb33dd73f8290080b94858701bfda4a70ec4e1631af29cc4d33703ec747ce3939b7b7a42a3a0492cc44cdb1526fae722e93ce9536d4604c86d680a208a756f4ce6d119a31ca26e411e6426c27"], &(0x7f00000001c0)=0xf0) setsockopt$inet_sctp_SCTP_MAX_BURST(r3, 0x84, 0x14, &(0x7f0000000200)=@assoc_value={r4}, 0x8) ioctl$SG_SET_FORCE_PACK_ID(r3, 0x227b, &(0x7f0000000140)) capset(&(0x7f0000000000)={0x200f1526, r2}, &(0x7f00000000c0)={0x2, 0x4, 0x7, 0x3b940000, 0x2541, 0x7}) 16:50:48 executing program 2: r0 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'hsr0\x00', 0x0}) bind$packet(r0, &(0x7f0000000340)={0x11, 0x0, r1}, 0x14) sendto(r0, &(0x7f00000000c0)="e360b641b37f0000000011000066", 0xe, 0x0, 0x0, 0x0) 16:50:48 executing program 3: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000b00)) mount(&(0x7f00000004c0)=ANY=[], &(0x7f000000aff8)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000000)) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000000c0)='tls\x00', 0x4) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$void(r1, 0x5450) renameat2(r0, &(0x7f0000000180)='./file0/file0\x00', 0xffffffffffffffff, 0x0, 0x4) shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@dev, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@remote}}, 0x0) ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, 0x0) shmctl$IPC_SET(0x0, 0x1, 0x0) ioctl$PIO_FONT(r0, 0x4b61, 0x0) chdir(&(0x7f0000000340)='./file0\x00') symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) umount2(&(0x7f0000000380)='./file0\x00', 0x3) openat$uinput(0xffffffffffffff9c, &(0x7f0000000440)='/dev/uinput\x00', 0x802, 0x0) r3 = syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') sendmsg$FOU_CMD_DEL(r1, &(0x7f00000002c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x28, r3, 0x200, 0x70bd25, 0x25dfdbfe, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e24}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x7f}]}, 0x28}}, 0x24048010) sendmsg$kcm(r0, &(0x7f0000000a40)={&(0x7f0000000580)=@ll={0x11, 0xfd, r2, 0x1, 0x8, 0x6, @dev={[], 0x16}}, 0x80, &(0x7f00000009c0)=[{&(0x7f00000008c0)="367a9f0d4a1564359d1e668c63869bb9bf3b7f5aa4030462889dd6407207295cea1b36e07bc2b38b11c6ca28a73515cf52d89a8199d5c019de826c756a31bac24f707efcfc0a2383216dccc08f804551f0a56d2c9ab95a113fa74dff88ccccc7f278200aa03d2349e688b69191611739bb3e2e5ff110c5858c1a7c5bd5431f9c8e73a99236728f125d5f52a2b0761872fc0fc53cda5458241b2a80fd918b21c8029039d416a6cde6aa786bdfaa21a4e5ffa5f80dec422e0051c7e98a8cff2f4afbe25ca5a154a57c10", 0xc9}], 0x1}, 0x4004000) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000001c0)={0x0, 0x4, 0x2, 0x3, 0x1}, 0x14) ioctl$VIDIOC_SUBDEV_S_SELECTION(r0, 0xc040563e, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x7) msgget(0x1, 0x318) syz_genetlink_get_family_id$team(&(0x7f0000000400)='team\x00') 16:50:48 executing program 1: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000b00)) mount(&(0x7f00000004c0)=ANY=[], &(0x7f000000aff8)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000000)) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000000c0)='tls\x00', 0x4) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$void(r1, 0x5450) renameat2(r0, &(0x7f0000000180)='./file0/file0\x00', 0xffffffffffffffff, 0x0, 0x4) shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@dev, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@remote}}, 0x0) ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, 0x0) shmctl$IPC_SET(0x0, 0x1, 0x0) ioctl$PIO_FONT(r0, 0x4b61, 0x0) chdir(&(0x7f0000000340)='./file0\x00') symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) umount2(&(0x7f0000000380)='./file0\x00', 0x3) openat$uinput(0xffffffffffffff9c, &(0x7f0000000440)='/dev/uinput\x00', 0x802, 0x0) r3 = syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') sendmsg$FOU_CMD_DEL(r1, &(0x7f00000002c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x28, r3, 0x200, 0x70bd25, 0x25dfdbfe, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e24}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x7f}]}, 0x28}}, 0x24048010) sendmsg$kcm(r0, &(0x7f0000000a40)={&(0x7f0000000580)=@ll={0x11, 0xfd, r2, 0x1, 0x8, 0x6, @dev={[], 0x16}}, 0x80, &(0x7f00000009c0)=[{&(0x7f00000008c0)="367a9f0d4a1564359d1e668c63869bb9bf3b7f5aa4030462889dd6407207295cea1b36e07bc2b38b11c6ca28a73515cf52d89a8199d5c019de826c756a31bac24f707efcfc0a2383216dccc08f804551f0a56d2c9ab95a113fa74dff88ccccc7f278200aa03d2349e688b69191611739bb3e2e5ff110c5858c1a7c5bd5431f9c8e73a99236728f125d5f52a2b0761872fc0fc53cda5458241b2a80fd918b21c8029039d416a6cde6aa786bdfaa21a4e5ffa5f80dec422e0051c7e98a8cff2f4afbe25ca5a154a57c10", 0xc9}], 0x1}, 0x4004000) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000001c0)={0x0, 0x4, 0x2, 0x3, 0x1}, 0x14) ioctl$VIDIOC_SUBDEV_S_SELECTION(r0, 0xc040563e, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x7) msgget(0x1, 0x318) syz_genetlink_get_family_id$team(&(0x7f0000000400)='team\x00') 16:50:48 executing program 3: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000b00)) mount(&(0x7f00000004c0)=ANY=[], &(0x7f000000aff8)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000000)) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000000c0)='tls\x00', 0x4) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$void(r1, 0x5450) renameat2(r0, &(0x7f0000000180)='./file0/file0\x00', 0xffffffffffffffff, 0x0, 0x4) shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@dev, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@remote}}, 0x0) ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, 0x0) shmctl$IPC_SET(0x0, 0x1, 0x0) ioctl$PIO_FONT(r0, 0x4b61, 0x0) chdir(&(0x7f0000000340)='./file0\x00') symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) umount2(&(0x7f0000000380)='./file0\x00', 0x3) openat$uinput(0xffffffffffffff9c, &(0x7f0000000440)='/dev/uinput\x00', 0x802, 0x0) r3 = syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') sendmsg$FOU_CMD_DEL(r1, &(0x7f00000002c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x28, r3, 0x200, 0x70bd25, 0x25dfdbfe, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e24}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x7f}]}, 0x28}}, 0x24048010) sendmsg$kcm(r0, &(0x7f0000000a40)={&(0x7f0000000580)=@ll={0x11, 0xfd, r2, 0x1, 0x8, 0x6, @dev={[], 0x16}}, 0x80, &(0x7f00000009c0)=[{&(0x7f00000008c0)="367a9f0d4a1564359d1e668c63869bb9bf3b7f5aa4030462889dd6407207295cea1b36e07bc2b38b11c6ca28a73515cf52d89a8199d5c019de826c756a31bac24f707efcfc0a2383216dccc08f804551f0a56d2c9ab95a113fa74dff88ccccc7f278200aa03d2349e688b69191611739bb3e2e5ff110c5858c1a7c5bd5431f9c8e73a99236728f125d5f52a2b0761872fc0fc53cda5458241b2a80fd918b21c8029039d416a6cde6aa786bdfaa21a4e5ffa5f80dec422e0051c7e98a8cff2f4afbe25ca5a154a57c10", 0xc9}], 0x1}, 0x4004000) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000001c0)={0x0, 0x4, 0x2, 0x3, 0x1}, 0x14) ioctl$VIDIOC_SUBDEV_S_SELECTION(r0, 0xc040563e, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x7) msgget(0x1, 0x318) syz_genetlink_get_family_id$team(&(0x7f0000000400)='team\x00') 16:50:48 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x17a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x6674}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000240)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$restrict_keyring(0x1d, r1, &(0x7f0000000280)='asymmetric\x00', &(0x7f0000000340)='!selinuxselinux\x00') fcntl$getown(r0, 0x9) r2 = syz_open_dev$admmidi(&(0x7f0000000100)='/dev/admmidi#\x00', 0x800, 0x80000) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x6d, &(0x7f0000000380)=ANY=[@ANYRES32=0x0, @ANYBLOB="e8000000074e6fe6119eebbf6548e5cc1967117da47c7982ff6159a0138495f2b93f2fa167cfba052d3ff6aab6845ef1815c1b4fe69fc5263fe953776b5f00c5dbdcb75975ceb9902cbc2c281e52c90cfd8dd8abcf154f219eab1bc3758966249927038eac3c2e9b438a8cbf0ad7437e84cd0863f956a63fe349f05ab83f98bc42e6df6d7eb3da9010ec420a686ed39af3ee59ced30d75c5338c631df8a81c2cb33dd73f8290080b94858701bfda4a70ec4e1631af29cc4d33703ec747ce3939b7b7a42a3a0492cc44cdb1526fae722e93ce9536d4604c86d680a208a756f4ce6d119a31ca26e411e6426c27"], &(0x7f00000001c0)=0xf0) setsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000200)=@assoc_value={r3}, 0x8) ioctl$SG_SET_FORCE_PACK_ID(r2, 0x227b, &(0x7f0000000140)) 16:50:48 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x4000000000000036) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={@mcast1, @local, @local, 0x80000000, 0x0, 0x0, 0x200800000000114}) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x21, r0, 0x0, 0x0) 16:50:48 executing program 2: r0 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'hsr0\x00', 0x0}) bind$packet(r0, &(0x7f0000000340)={0x11, 0x0, r1}, 0x14) sendto(r0, &(0x7f00000000c0)="e360b641b37f0004000000000066", 0xe, 0x0, 0x0, 0x0) 16:50:48 executing program 1: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000b00)) mount(&(0x7f00000004c0)=ANY=[], &(0x7f000000aff8)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000000)) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000000c0)='tls\x00', 0x4) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$void(r1, 0x5450) renameat2(r0, &(0x7f0000000180)='./file0/file0\x00', 0xffffffffffffffff, 0x0, 0x4) shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@dev, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@remote}}, 0x0) ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, 0x0) shmctl$IPC_SET(0x0, 0x1, 0x0) ioctl$PIO_FONT(r0, 0x4b61, 0x0) chdir(&(0x7f0000000340)='./file0\x00') symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) umount2(&(0x7f0000000380)='./file0\x00', 0x3) openat$uinput(0xffffffffffffff9c, &(0x7f0000000440)='/dev/uinput\x00', 0x802, 0x0) r3 = syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') sendmsg$FOU_CMD_DEL(r1, &(0x7f00000002c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x28, r3, 0x200, 0x70bd25, 0x25dfdbfe, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e24}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x7f}]}, 0x28}}, 0x24048010) sendmsg$kcm(r0, &(0x7f0000000a40)={&(0x7f0000000580)=@ll={0x11, 0xfd, r2, 0x1, 0x8, 0x6, @dev={[], 0x16}}, 0x80, &(0x7f00000009c0)=[{&(0x7f00000008c0)="367a9f0d4a1564359d1e668c63869bb9bf3b7f5aa4030462889dd6407207295cea1b36e07bc2b38b11c6ca28a73515cf52d89a8199d5c019de826c756a31bac24f707efcfc0a2383216dccc08f804551f0a56d2c9ab95a113fa74dff88ccccc7f278200aa03d2349e688b69191611739bb3e2e5ff110c5858c1a7c5bd5431f9c8e73a99236728f125d5f52a2b0761872fc0fc53cda5458241b2a80fd918b21c8029039d416a6cde6aa786bdfaa21a4e5ffa5f80dec422e0051c7e98a8cff2f4afbe25ca5a154a57c10", 0xc9}], 0x1}, 0x4004000) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000001c0)={0x0, 0x4, 0x2, 0x3, 0x1}, 0x14) ioctl$VIDIOC_SUBDEV_S_SELECTION(r0, 0xc040563e, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x7) msgget(0x1, 0x318) syz_genetlink_get_family_id$team(&(0x7f0000000400)='team\x00') 16:50:48 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x17a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x6674}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000240)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$restrict_keyring(0x1d, r1, &(0x7f0000000280)='asymmetric\x00', &(0x7f0000000340)='!selinuxselinux\x00') fcntl$getown(r0, 0x9) r2 = syz_open_dev$admmidi(&(0x7f0000000100)='/dev/admmidi#\x00', 0x800, 0x80000) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x6d, &(0x7f0000000380)=ANY=[@ANYRES32=0x0, @ANYBLOB="e8000000074e6fe6119eebbf6548e5cc1967117da47c7982ff6159a0138495f2b93f2fa167cfba052d3ff6aab6845ef1815c1b4fe69fc5263fe953776b5f00c5dbdcb75975ceb9902cbc2c281e52c90cfd8dd8abcf154f219eab1bc3758966249927038eac3c2e9b438a8cbf0ad7437e84cd0863f956a63fe349f05ab83f98bc42e6df6d7eb3da9010ec420a686ed39af3ee59ced30d75c5338c631df8a81c2cb33dd73f8290080b94858701bfda4a70ec4e1631af29cc4d33703ec747ce3939b7b7a42a3a0492cc44cdb1526fae722e93ce9536d4604c86d680a208a756f4ce6d119a31ca26e411e6426c27"], &(0x7f00000001c0)=0xf0) setsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000200)=@assoc_value={r3}, 0x8) [ 353.310281] net_ratelimit: 22 callbacks suppressed [ 353.310287] protocol 88fb is buggy, dev hsr_slave_0 [ 353.320457] protocol 88fb is buggy, dev hsr_slave_1 [ 353.390303] protocol 88fb is buggy, dev hsr_slave_0 [ 353.395565] protocol 88fb is buggy, dev hsr_slave_1 [ 353.630299] protocol 88fb is buggy, dev hsr_slave_0 [ 353.635548] protocol 88fb is buggy, dev hsr_slave_1 [ 353.710263] protocol 88fb is buggy, dev hsr_slave_0 [ 353.715489] protocol 88fb is buggy, dev hsr_slave_1 [ 354.110376] protocol 88fb is buggy, dev hsr_slave_0 [ 354.115485] protocol 88fb is buggy, dev hsr_slave_1 16:50:50 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x4000000000000036) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x21, r0, 0x0, 0x0) 16:50:50 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x17a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x6674}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000240)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$restrict_keyring(0x1d, r1, &(0x7f0000000280)='asymmetric\x00', &(0x7f0000000340)='!selinuxselinux\x00') fcntl$getown(r0, 0x9) r2 = syz_open_dev$admmidi(&(0x7f0000000100)='/dev/admmidi#\x00', 0x800, 0x80000) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x6d, &(0x7f0000000380)=ANY=[@ANYRES32=0x0, @ANYBLOB="e8000000074e6fe6119eebbf6548e5cc1967117da47c7982ff6159a0138495f2b93f2fa167cfba052d3ff6aab6845ef1815c1b4fe69fc5263fe953776b5f00c5dbdcb75975ceb9902cbc2c281e52c90cfd8dd8abcf154f219eab1bc3758966249927038eac3c2e9b438a8cbf0ad7437e84cd0863f956a63fe349f05ab83f98bc42e6df6d7eb3da9010ec420a686ed39af3ee59ced30d75c5338c631df8a81c2cb33dd73f8290080b94858701bfda4a70ec4e1631af29cc4d33703ec747ce3939b7b7a42a3a0492cc44cdb1526fae722e93ce9536d4604c86d680a208a756f4ce6d119a31ca26e411e6426c27"], &(0x7f00000001c0)=0xf0) setsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000200)=@assoc_value={r3}, 0x8) 16:50:50 executing program 3: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000b00)) mount(&(0x7f00000004c0)=ANY=[], &(0x7f000000aff8)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000000)) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000000c0)='tls\x00', 0x4) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$void(r1, 0x5450) renameat2(r0, &(0x7f0000000180)='./file0/file0\x00', 0xffffffffffffffff, 0x0, 0x4) shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@dev, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@remote}}, 0x0) ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, 0x0) shmctl$IPC_SET(0x0, 0x1, 0x0) ioctl$PIO_FONT(r0, 0x4b61, &(0x7f0000000740)) chdir(&(0x7f0000000340)='./file0\x00') symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) umount2(&(0x7f0000000380)='./file0\x00', 0x3) openat$uinput(0xffffffffffffff9c, &(0x7f0000000440)='/dev/uinput\x00', 0x802, 0x0) r3 = syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') sendmsg$FOU_CMD_DEL(r1, &(0x7f00000002c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x28, r3, 0x200, 0x70bd25, 0x25dfdbfe, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e24}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x7f}]}, 0x28}}, 0x24048010) sendmsg$kcm(r0, &(0x7f0000000a40)={&(0x7f0000000580)=@ll={0x11, 0xfd, r2, 0x1, 0x8, 0x6, @dev={[], 0x16}}, 0x80, &(0x7f00000009c0)=[{&(0x7f00000008c0)="367a9f0d4a1564359d1e668c63869bb9bf3b7f5aa4030462889dd6407207295cea1b36e07bc2b38b11c6ca28a73515cf52d89a8199d5c019de826c756a31bac24f707efcfc0a2383216dccc08f804551f0a56d2c9ab95a113fa74dff88ccccc7f278200aa03d2349e688b69191611739bb3e2e5ff110c5858c1a7c5bd5431f9c8e73a99236728f125d5f52a2b0761872fc0fc53cda5458241b2a80fd918b21c8029039d416a6cde6aa786bdfaa21a4e5ffa5f80dec422e0051c7e98a8cff2f4afbe25ca5a154a57c10", 0xc9}], 0x1}, 0x4004000) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000001c0)={0x0, 0x4, 0x2, 0x3, 0x1}, 0x14) ioctl$VIDIOC_SUBDEV_S_SELECTION(r0, 0xc040563e, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x7) msgget(0x1, 0x318) syz_genetlink_get_family_id$team(&(0x7f0000000400)='team\x00') 16:50:50 executing program 2: r0 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'hsr0\x00', 0x0}) bind$packet(r0, &(0x7f0000000340)={0x11, 0x0, r1}, 0x14) sendto(r0, &(0x7f00000000c0)="e360b641b37f0000600000000066", 0xe, 0x0, 0x0, 0x0) 16:50:50 executing program 1: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000b00)) mount(&(0x7f00000004c0)=ANY=[], &(0x7f000000aff8)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000000)) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000000c0)='tls\x00', 0x4) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$void(r1, 0x5450) renameat2(r0, &(0x7f0000000180)='./file0/file0\x00', 0xffffffffffffffff, 0x0, 0x4) shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@dev, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@remote}}, 0x0) ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, 0x0) shmctl$IPC_SET(0x0, 0x1, 0x0) ioctl$PIO_FONT(r0, 0x4b61, 0x0) chdir(&(0x7f0000000340)='./file0\x00') symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) umount2(&(0x7f0000000380)='./file0\x00', 0x3) openat$uinput(0xffffffffffffff9c, &(0x7f0000000440)='/dev/uinput\x00', 0x802, 0x0) r3 = syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') sendmsg$FOU_CMD_DEL(r1, &(0x7f00000002c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x28, r3, 0x200, 0x70bd25, 0x25dfdbfe, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e24}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x7f}]}, 0x28}}, 0x24048010) sendmsg$kcm(r0, &(0x7f0000000a40)={&(0x7f0000000580)=@ll={0x11, 0xfd, r2, 0x1, 0x8, 0x6, @dev={[], 0x16}}, 0x80, &(0x7f00000009c0)=[{&(0x7f00000008c0)="367a9f0d4a1564359d1e668c63869bb9bf3b7f5aa4030462889dd6407207295cea1b36e07bc2b38b11c6ca28a73515cf52d89a8199d5c019de826c756a31bac24f707efcfc0a2383216dccc08f804551f0a56d2c9ab95a113fa74dff88ccccc7f278200aa03d2349e688b69191611739bb3e2e5ff110c5858c1a7c5bd5431f9c8e73a99236728f125d5f52a2b0761872fc0fc53cda5458241b2a80fd918b21c8029039d416a6cde6aa786bdfaa21a4e5ffa5f80dec422e0051c7e98a8cff2f4afbe25ca5a154a57c10", 0xc9}], 0x1}, 0x4004000) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000001c0)={0x0, 0x4, 0x2, 0x3, 0x1}, 0x14) ioctl$VIDIOC_SUBDEV_S_SELECTION(r0, 0xc040563e, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x7) msgget(0x1, 0x318) syz_genetlink_get_family_id$team(&(0x7f0000000400)='team\x00') 16:50:51 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x17a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x6674}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000240)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$restrict_keyring(0x1d, r1, &(0x7f0000000280)='asymmetric\x00', &(0x7f0000000340)='!selinuxselinux\x00') fcntl$getown(r0, 0x9) r2 = syz_open_dev$admmidi(&(0x7f0000000100)='/dev/admmidi#\x00', 0x800, 0x80000) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x6d, &(0x7f0000000380)=ANY=[@ANYRES32=0x0, @ANYBLOB="e8000000074e6fe6119eebbf6548e5cc1967117da47c7982ff6159a0138495f2b93f2fa167cfba052d3ff6aab6845ef1815c1b4fe69fc5263fe953776b5f00c5dbdcb75975ceb9902cbc2c281e52c90cfd8dd8abcf154f219eab1bc3758966249927038eac3c2e9b438a8cbf0ad7437e84cd0863f956a63fe349f05ab83f98bc42e6df6d7eb3da9010ec420a686ed39af3ee59ced30d75c5338c631df8a81c2cb33dd73f8290080b94858701bfda4a70ec4e1631af29cc4d33703ec747ce3939b7b7a42a3a0492cc44cdb1526fae722e93ce9536d4604c86d680a208a756f4ce6d119a31ca26e411e6426c27"], &(0x7f00000001c0)=0xf0) 16:50:51 executing program 2: r0 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'hsr0\x00', 0x0}) bind$packet(r0, &(0x7f0000000340)={0x11, 0x0, r1}, 0x14) sendto(r0, &(0x7f00000000c0)="e360b641b37f00ffffca88000066", 0xe, 0x0, 0x0, 0x0) 16:50:51 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x17a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x6674}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000240)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$restrict_keyring(0x1d, r1, &(0x7f0000000280)='asymmetric\x00', &(0x7f0000000340)='!selinuxselinux\x00') fcntl$getown(r0, 0x9) syz_open_dev$admmidi(&(0x7f0000000100)='/dev/admmidi#\x00', 0x800, 0x80000) 16:50:51 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x4000000000000036) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={@mcast1, @local, @local, 0x80000000, 0x0, 0x0, 0x200800000000114}) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, 0x0) ptrace$setregs(0xd, r0, 0x0, 0x0) ptrace$cont(0x21, r0, 0x0, 0x0) 16:50:51 executing program 3: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000b00)) mount(&(0x7f00000004c0)=ANY=[], &(0x7f000000aff8)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000000)) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000000c0)='tls\x00', 0x4) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$void(r1, 0x5450) renameat2(r0, &(0x7f0000000180)='./file0/file0\x00', 0xffffffffffffffff, 0x0, 0x4) shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@dev, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@remote}}, 0x0) ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, 0x0) shmctl$IPC_SET(0x0, 0x1, 0x0) ioctl$PIO_FONT(r0, 0x4b61, &(0x7f0000000740)="9d705183203ecbbfc0d13a4e30241f7ce01b0b4d7682444a507bfc1ac414339f479986467eb40c8065891e1fbbe7263212c5c09bb47896b3d85893f1173f8a139c116f876fdcc1") chdir(&(0x7f0000000340)='./file0\x00') symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) umount2(&(0x7f0000000380)='./file0\x00', 0x3) openat$uinput(0xffffffffffffff9c, &(0x7f0000000440)='/dev/uinput\x00', 0x802, 0x0) r3 = syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') sendmsg$FOU_CMD_DEL(r1, &(0x7f00000002c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x28, r3, 0x200, 0x70bd25, 0x25dfdbfe, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e24}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x7f}]}, 0x28}}, 0x24048010) sendmsg$kcm(r0, &(0x7f0000000a40)={&(0x7f0000000580)=@ll={0x11, 0xfd, r2, 0x1, 0x8, 0x6, @dev={[], 0x16}}, 0x80, &(0x7f00000009c0)=[{&(0x7f00000008c0)="367a9f0d4a1564359d1e668c63869bb9bf3b7f5aa4030462889dd6407207295cea1b36e07bc2b38b11c6ca28a73515cf52d89a8199d5c019de826c756a31bac24f707efcfc0a2383216dccc08f804551f0a56d2c9ab95a113fa74dff88ccccc7f278200aa03d2349e688b69191611739bb3e2e5ff110c5858c1a7c5bd5431f9c8e73a99236728f125d5f52a2b0761872fc0fc53cda5458241b2a80fd918b21c8029039d416a6cde6aa786bdfaa21a4e5ffa5f80dec422e0051c7e98a8cff2f4afbe25ca5a154a57c10", 0xc9}], 0x1}, 0x4004000) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000001c0)={0x0, 0x4, 0x2, 0x3, 0x1}, 0x14) ioctl$VIDIOC_SUBDEV_S_SELECTION(r0, 0xc040563e, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x7) msgget(0x1, 0x318) syz_genetlink_get_family_id$team(&(0x7f0000000400)='team\x00') 16:50:51 executing program 1: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000b00)) mount(&(0x7f00000004c0)=ANY=[], &(0x7f000000aff8)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000000)) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000000c0)='tls\x00', 0x4) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$void(r1, 0x5450) renameat2(r0, &(0x7f0000000180)='./file0/file0\x00', 0xffffffffffffffff, 0x0, 0x4) shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@dev, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@remote}}, 0x0) ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, 0x0) shmctl$IPC_SET(0x0, 0x1, 0x0) ioctl$PIO_FONT(r0, 0x4b61, 0x0) chdir(&(0x7f0000000340)='./file0\x00') symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) umount2(&(0x7f0000000380)='./file0\x00', 0x3) openat$uinput(0xffffffffffffff9c, &(0x7f0000000440)='/dev/uinput\x00', 0x802, 0x0) r3 = syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') sendmsg$FOU_CMD_DEL(r1, &(0x7f00000002c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x28, r3, 0x200, 0x70bd25, 0x25dfdbfe, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e24}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x7f}]}, 0x28}}, 0x24048010) sendmsg$kcm(r0, &(0x7f0000000a40)={&(0x7f0000000580)=@ll={0x11, 0xfd, r2, 0x1, 0x8, 0x6, @dev={[], 0x16}}, 0x80, &(0x7f00000009c0)=[{&(0x7f00000008c0)="367a9f0d4a1564359d1e668c63869bb9bf3b7f5aa4030462889dd6407207295cea1b36e07bc2b38b11c6ca28a73515cf52d89a8199d5c019de826c756a31bac24f707efcfc0a2383216dccc08f804551f0a56d2c9ab95a113fa74dff88ccccc7f278200aa03d2349e688b69191611739bb3e2e5ff110c5858c1a7c5bd5431f9c8e73a99236728f125d5f52a2b0761872fc0fc53cda5458241b2a80fd918b21c8029039d416a6cde6aa786bdfaa21a4e5ffa5f80dec422e0051c7e98a8cff2f4afbe25ca5a154a57c10", 0xc9}], 0x1}, 0x4004000) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000001c0)={0x0, 0x4, 0x2, 0x3, 0x1}, 0x14) ioctl$VIDIOC_SUBDEV_S_SELECTION(r0, 0xc040563e, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x7) msgget(0x1, 0x318) syz_genetlink_get_family_id$team(&(0x7f0000000400)='team\x00') 16:50:51 executing program 2: r0 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'hsr0\x00', 0x0}) bind$packet(r0, &(0x7f0000000340)={0x11, 0x0, r1}, 0x14) sendto(r0, &(0x7f00000000c0)="e360b641b37f0000000040000066", 0xe, 0x0, 0x0, 0x0) 16:50:54 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x4000000000000036) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x21, r0, 0x0, 0x0) 16:50:54 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x17a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x6674}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000240)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$restrict_keyring(0x1d, r1, &(0x7f0000000280)='asymmetric\x00', &(0x7f0000000340)='!selinuxselinux\x00') fcntl$getown(r0, 0x9) 16:50:54 executing program 2: r0 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'hsr0\x00', 0x0}) bind$packet(r0, &(0x7f0000000340)={0x11, 0x0, r1}, 0x14) sendto(r0, &(0x7f00000000c0)="e360b641b37f0001f40000000066", 0xe, 0x0, 0x0, 0x0) 16:50:54 executing program 3: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000b00)) mount(&(0x7f00000004c0)=ANY=[], &(0x7f000000aff8)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000000)) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000000c0)='tls\x00', 0x4) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$void(r1, 0x5450) renameat2(r0, &(0x7f0000000180)='./file0/file0\x00', 0xffffffffffffffff, 0x0, 0x4) shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@dev, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@remote}}, 0x0) ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, 0x0) shmctl$IPC_SET(0x0, 0x1, 0x0) ioctl$PIO_FONT(r0, 0x4b61, &(0x7f0000000740)="9d705183203ecbbfc0d13a4e30241f7ce01b0b4d7682444a507bfc1ac414339f479986467eb40c8065891e1fbbe7263212c5c09bb47896b3d85893f1173f8a139c116f876fdcc1779bffef8c34b5958981616cbcf39f2d8b43491de452d774a74c3ae9555a45180f7d68da") chdir(&(0x7f0000000340)='./file0\x00') symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) umount2(&(0x7f0000000380)='./file0\x00', 0x3) openat$uinput(0xffffffffffffff9c, &(0x7f0000000440)='/dev/uinput\x00', 0x802, 0x0) r3 = syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') sendmsg$FOU_CMD_DEL(r1, &(0x7f00000002c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x28, r3, 0x200, 0x70bd25, 0x25dfdbfe, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e24}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x7f}]}, 0x28}}, 0x24048010) sendmsg$kcm(r0, &(0x7f0000000a40)={&(0x7f0000000580)=@ll={0x11, 0xfd, r2, 0x1, 0x8, 0x6, @dev={[], 0x16}}, 0x80, &(0x7f00000009c0)=[{&(0x7f00000008c0)="367a9f0d4a1564359d1e668c63869bb9bf3b7f5aa4030462889dd6407207295cea1b36e07bc2b38b11c6ca28a73515cf52d89a8199d5c019de826c756a31bac24f707efcfc0a2383216dccc08f804551f0a56d2c9ab95a113fa74dff88ccccc7f278200aa03d2349e688b69191611739bb3e2e5ff110c5858c1a7c5bd5431f9c8e73a99236728f125d5f52a2b0761872fc0fc53cda5458241b2a80fd918b21c8029039d416a6cde6aa786bdfaa21a4e5ffa5f80dec422e0051c7e98a8cff2f4afbe25ca5a154a57c10", 0xc9}], 0x1}, 0x4004000) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000001c0)={0x0, 0x4, 0x2, 0x3, 0x1}, 0x14) ioctl$VIDIOC_SUBDEV_S_SELECTION(r0, 0xc040563e, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x7) msgget(0x1, 0x318) syz_genetlink_get_family_id$team(&(0x7f0000000400)='team\x00') 16:50:54 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x17a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x6674}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000240)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$restrict_keyring(0x1d, r1, &(0x7f0000000280)='asymmetric\x00', &(0x7f0000000340)='!selinuxselinux\x00') fcntl$getown(r0, 0x9) syz_open_dev$admmidi(&(0x7f0000000100)='/dev/admmidi#\x00', 0x800, 0x80000) 16:50:54 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x17a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x6674}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000240)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$restrict_keyring(0x1d, r0, &(0x7f0000000280)='asymmetric\x00', &(0x7f0000000340)='!selinuxselinux\x00') 16:50:54 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x17a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x6674}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000240)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$restrict_keyring(0x1d, r1, &(0x7f0000000280)='asymmetric\x00', &(0x7f0000000340)='!selinuxselinux\x00') fcntl$getown(r0, 0x9) syz_open_dev$admmidi(&(0x7f0000000100)='/dev/admmidi#\x00', 0x800, 0x80000) 16:50:54 executing program 3: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000b00)) mount(&(0x7f00000004c0)=ANY=[], &(0x7f000000aff8)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000000)) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000000c0)='tls\x00', 0x4) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$void(r1, 0x5450) renameat2(r0, &(0x7f0000000180)='./file0/file0\x00', 0xffffffffffffffff, 0x0, 0x4) shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@dev, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@remote}}, 0x0) ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, 0x0) shmctl$IPC_SET(0x0, 0x1, 0x0) ioctl$PIO_FONT(r0, 0x4b61, &(0x7f0000000740)="9d705183203ecbbfc0d13a4e30241f7ce01b0b4d7682444a507bfc1ac414339f479986467eb40c8065891e1fbbe7263212c5c09bb47896b3d85893f1173f8a139c116f876fdcc1779bffef8c34b5958981616cbcf39f2d8b43491de452d774a74c3ae9555a45180f7d68da36975781ba3a24694ac85eea975ca1041814") chdir(&(0x7f0000000340)='./file0\x00') symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) umount2(&(0x7f0000000380)='./file0\x00', 0x3) openat$uinput(0xffffffffffffff9c, &(0x7f0000000440)='/dev/uinput\x00', 0x802, 0x0) r3 = syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') sendmsg$FOU_CMD_DEL(r1, &(0x7f00000002c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x28, r3, 0x200, 0x70bd25, 0x25dfdbfe, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e24}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x7f}]}, 0x28}}, 0x24048010) sendmsg$kcm(r0, &(0x7f0000000a40)={&(0x7f0000000580)=@ll={0x11, 0xfd, r2, 0x1, 0x8, 0x6, @dev={[], 0x16}}, 0x80, &(0x7f00000009c0)=[{&(0x7f00000008c0)="367a9f0d4a1564359d1e668c63869bb9bf3b7f5aa4030462889dd6407207295cea1b36e07bc2b38b11c6ca28a73515cf52d89a8199d5c019de826c756a31bac24f707efcfc0a2383216dccc08f804551f0a56d2c9ab95a113fa74dff88ccccc7f278200aa03d2349e688b69191611739bb3e2e5ff110c5858c1a7c5bd5431f9c8e73a99236728f125d5f52a2b0761872fc0fc53cda5458241b2a80fd918b21c8029039d416a6cde6aa786bdfaa21a4e5ffa5f80dec422e0051c7e98a8cff2f4afbe25ca5a154a57c10", 0xc9}], 0x1}, 0x4004000) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000001c0)={0x0, 0x4, 0x2, 0x3, 0x1}, 0x14) ioctl$VIDIOC_SUBDEV_S_SELECTION(r0, 0xc040563e, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x7) msgget(0x1, 0x318) syz_genetlink_get_family_id$team(&(0x7f0000000400)='team\x00') 16:50:54 executing program 2: r0 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'hsr0\x00', 0x0}) bind$packet(r0, &(0x7f0000000340)={0x11, 0x0, r1}, 0x14) sendto(r0, &(0x7f00000000c0)="e360b641b37f0043050000000066", 0xe, 0x0, 0x0, 0x0) 16:50:54 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x4000000000000036) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={@mcast1, @local, @local, 0x80000000, 0x0, 0x0, 0x200800000000114}) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, 0x0) ptrace$setregs(0xd, r0, 0x0, 0x0) ptrace$cont(0x21, r0, 0x0, 0x0) 16:50:54 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x17a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x6674}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000240)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$restrict_keyring(0x1d, r1, &(0x7f0000000280)='asymmetric\x00', &(0x7f0000000340)='!selinuxselinux\x00') fcntl$getown(r0, 0x9) r2 = syz_open_dev$admmidi(&(0x7f0000000100)='/dev/admmidi#\x00', 0x800, 0x80000) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x6d, &(0x7f0000000380)=ANY=[@ANYRES32=0x0, @ANYBLOB="e8000000074e6fe6119eebbf6548e5cc1967117da47c7982ff6159a0138495f2b93f2fa167cfba052d3ff6aab6845ef1815c1b4fe69fc5263fe953776b5f00c5dbdcb75975ceb9902cbc2c281e52c90cfd8dd8abcf154f219eab1bc3758966249927038eac3c2e9b438a8cbf0ad7437e84cd0863f956a63fe349f05ab83f98bc42e6df6d7eb3da9010ec420a686ed39af3ee59ced30d75c5338c631df8a81c2cb33dd73f8290080b94858701bfda4a70ec4e1631af29cc4d33703ec747ce3939b7b7a42a3a0492cc44cdb1526fae722e93ce9536d4604c86d680a208a756f4ce6d119a31ca26e411e6426c27"], &(0x7f00000001c0)=0xf0) setsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000200)=@assoc_value={r3}, 0x8) 16:50:54 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x17a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x6674}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, 0x0, &(0x7f0000000280)='asymmetric\x00', &(0x7f0000000340)='!selinuxselinux\x00') [ 358.670289] net_ratelimit: 28 callbacks suppressed [ 358.670297] protocol 88fb is buggy, dev hsr_slave_0 [ 358.680506] protocol 88fb is buggy, dev hsr_slave_1 [ 358.750758] protocol 88fb is buggy, dev hsr_slave_0 [ 358.756408] protocol 88fb is buggy, dev hsr_slave_1 [ 359.550318] protocol 88fb is buggy, dev hsr_slave_0 [ 359.555490] protocol 88fb is buggy, dev hsr_slave_1 [ 359.630358] protocol 88fb is buggy, dev hsr_slave_0 [ 359.635518] protocol 88fb is buggy, dev hsr_slave_1 [ 359.870297] protocol 88fb is buggy, dev hsr_slave_0 [ 359.875455] protocol 88fb is buggy, dev hsr_slave_1 16:50:57 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x4000000000000036) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x21, r0, 0x0, 0x0) 16:50:57 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x17a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x6674}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000240)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$restrict_keyring(0x1d, r1, &(0x7f0000000280)='asymmetric\x00', &(0x7f0000000340)='!selinuxselinux\x00') fcntl$getown(r0, 0x9) r2 = syz_open_dev$admmidi(&(0x7f0000000100)='/dev/admmidi#\x00', 0x800, 0x80000) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x6d, &(0x7f0000000380)=ANY=[@ANYRES32=0x0, @ANYBLOB="e8000000074e6fe6119eebbf6548e5cc1967117da47c7982ff6159a0138495f2b93f2fa167cfba052d3ff6aab6845ef1815c1b4fe69fc5263fe953776b5f00c5dbdcb75975ceb9902cbc2c281e52c90cfd8dd8abcf154f219eab1bc3758966249927038eac3c2e9b438a8cbf0ad7437e84cd0863f956a63fe349f05ab83f98bc42e6df6d7eb3da9010ec420a686ed39af3ee59ced30d75c5338c631df8a81c2cb33dd73f8290080b94858701bfda4a70ec4e1631af29cc4d33703ec747ce3939b7b7a42a3a0492cc44cdb1526fae722e93ce9536d4604c86d680a208a756f4ce6d119a31ca26e411e6426c27"], &(0x7f00000001c0)=0xf0) setsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000200)=@assoc_value={r3}, 0x8) 16:50:57 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x17a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x6674}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, 0x0, &(0x7f0000000280)='asymmetric\x00', &(0x7f0000000340)='!selinuxselinux\x00') 16:50:57 executing program 2: r0 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'hsr0\x00', 0x0}) bind$packet(r0, &(0x7f0000000340)={0x11, 0x0, r1}, 0x14) sendto(r0, &(0x7f00000000c0)="e360b641b37f0080350000000066", 0xe, 0x0, 0x0, 0x0) 16:50:57 executing program 3: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000b00)) mount(&(0x7f00000004c0)=ANY=[], &(0x7f000000aff8)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000000)) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000000c0)='tls\x00', 0x4) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$void(r1, 0x5450) renameat2(r0, &(0x7f0000000180)='./file0/file0\x00', 0xffffffffffffffff, 0x0, 0x4) shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@dev, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@remote}}, 0x0) ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, 0x0) shmctl$IPC_SET(0x0, 0x1, 0x0) ioctl$PIO_FONT(r0, 0x4b61, &(0x7f0000000740)="9d705183203ecbbfc0d13a4e30241f7ce01b0b4d7682444a507bfc1ac414339f479986467eb40c8065891e1fbbe7263212c5c09bb47896b3d85893f1173f8a139c116f876fdcc1779bffef8c34b5958981616cbcf39f2d8b43491de452d774a74c3ae9555a45180f7d68da36975781ba3a24694ac85eea975ca1041814") chdir(&(0x7f0000000340)='./file0\x00') symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) umount2(&(0x7f0000000380)='./file0\x00', 0x3) openat$uinput(0xffffffffffffff9c, &(0x7f0000000440)='/dev/uinput\x00', 0x802, 0x0) r3 = syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') sendmsg$FOU_CMD_DEL(r1, &(0x7f00000002c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x28, r3, 0x200, 0x70bd25, 0x25dfdbfe, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e24}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x7f}]}, 0x28}}, 0x24048010) sendmsg$kcm(r0, &(0x7f0000000a40)={&(0x7f0000000580)=@ll={0x11, 0xfd, r2, 0x1, 0x8, 0x6, @dev={[], 0x16}}, 0x80, &(0x7f00000009c0)=[{&(0x7f00000008c0)="367a9f0d4a1564359d1e668c63869bb9bf3b7f5aa4030462889dd6407207295cea1b36e07bc2b38b11c6ca28a73515cf52d89a8199d5c019de826c756a31bac24f707efcfc0a2383216dccc08f804551f0a56d2c9ab95a113fa74dff88ccccc7f278200aa03d2349e688b69191611739bb3e2e5ff110c5858c1a7c5bd5431f9c8e73a99236728f125d5f52a2b0761872fc0fc53cda5458241b2a80fd918b21c8029039d416a6cde6aa786bdfaa21a4e5ffa5f80dec422e0051c7e98a8cff2f4afbe25ca5a154a57c10", 0xc9}], 0x1}, 0x4004000) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000001c0)={0x0, 0x4, 0x2, 0x3, 0x1}, 0x14) ioctl$VIDIOC_SUBDEV_S_SELECTION(r0, 0xc040563e, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x7) msgget(0x1, 0x318) syz_genetlink_get_family_id$team(&(0x7f0000000400)='team\x00') 16:50:57 executing program 3: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000b00)) mount(&(0x7f00000004c0)=ANY=[], &(0x7f000000aff8)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000000)) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000000c0)='tls\x00', 0x4) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$void(r1, 0x5450) renameat2(r0, &(0x7f0000000180)='./file0/file0\x00', 0xffffffffffffffff, 0x0, 0x4) shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@dev, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@remote}}, 0x0) ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, 0x0) shmctl$IPC_SET(0x0, 0x1, 0x0) ioctl$PIO_FONT(r0, 0x4b61, &(0x7f0000000740)="9d705183203ecbbfc0d13a4e30241f7ce01b0b4d7682444a507bfc1ac414339f479986467eb40c8065891e1fbbe7263212c5c09bb47896b3d85893f1173f8a139c116f876fdcc1779bffef8c34b5958981616cbcf39f2d8b43491de452d774a74c3ae9555a45180f7d68da36975781ba3a24694ac85eea975ca1041814") chdir(&(0x7f0000000340)='./file0\x00') symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) umount2(&(0x7f0000000380)='./file0\x00', 0x3) openat$uinput(0xffffffffffffff9c, &(0x7f0000000440)='/dev/uinput\x00', 0x802, 0x0) r3 = syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') sendmsg$FOU_CMD_DEL(r1, &(0x7f00000002c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x28, r3, 0x200, 0x70bd25, 0x25dfdbfe, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e24}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x7f}]}, 0x28}}, 0x24048010) sendmsg$kcm(r0, &(0x7f0000000a40)={&(0x7f0000000580)=@ll={0x11, 0xfd, r2, 0x1, 0x8, 0x6, @dev={[], 0x16}}, 0x80, &(0x7f00000009c0)=[{&(0x7f00000008c0)="367a9f0d4a1564359d1e668c63869bb9bf3b7f5aa4030462889dd6407207295cea1b36e07bc2b38b11c6ca28a73515cf52d89a8199d5c019de826c756a31bac24f707efcfc0a2383216dccc08f804551f0a56d2c9ab95a113fa74dff88ccccc7f278200aa03d2349e688b69191611739bb3e2e5ff110c5858c1a7c5bd5431f9c8e73a99236728f125d5f52a2b0761872fc0fc53cda5458241b2a80fd918b21c8029039d416a6cde6aa786bdfaa21a4e5ffa5f80dec422e0051c7e98a8cff2f4afbe25ca5a154a57c10", 0xc9}], 0x1}, 0x4004000) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000001c0)={0x0, 0x4, 0x2, 0x3, 0x1}, 0x14) ioctl$VIDIOC_SUBDEV_S_SELECTION(r0, 0xc040563e, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x7) msgget(0x1, 0x318) syz_genetlink_get_family_id$team(&(0x7f0000000400)='team\x00') 16:50:57 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x17a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x6674}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, 0x0, &(0x7f0000000280)='asymmetric\x00', &(0x7f0000000340)='!selinuxselinux\x00') 16:50:57 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x4000000000000036) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={@mcast1, @local, @local, 0x0, 0x0, 0x0, 0x200800000000114}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x21, r0, 0x0, 0x0) 16:50:57 executing program 1: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000b00)) mount(&(0x7f00000004c0)=ANY=[], &(0x7f000000aff8)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000000)) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000000c0)='tls\x00', 0x4) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$void(r1, 0x5450) renameat2(r0, &(0x7f0000000180)='./file0/file0\x00', 0xffffffffffffffff, 0x0, 0x4) shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@dev, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@remote}}, 0x0) ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, 0x0) shmctl$IPC_SET(0x0, 0x1, 0x0) ioctl$PIO_FONT(r0, 0x4b61, &(0x7f0000000740)="9d705183203ecbbfc0d13a4e30241f7ce01b0b4d7682444a507bfc1ac414339f479986467eb40c8065891e1fbbe7263212c5c09bb47896b3d85893f1173f8a139c116f876fdcc1779bffef8c34b5958981616cbcf39f2d8b43491de452d774a74c3ae9555a45180f7d68da36975781ba3a24694ac85eea975ca1041814") chdir(&(0x7f0000000340)='./file0\x00') symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) umount2(&(0x7f0000000380)='./file0\x00', 0x3) openat$uinput(0xffffffffffffff9c, &(0x7f0000000440)='/dev/uinput\x00', 0x802, 0x0) r3 = syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') sendmsg$FOU_CMD_DEL(r1, &(0x7f00000002c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x28, r3, 0x200, 0x70bd25, 0x25dfdbfe, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e24}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x7f}]}, 0x28}}, 0x24048010) sendmsg$kcm(r0, &(0x7f0000000a40)={&(0x7f0000000580)=@ll={0x11, 0xfd, r2, 0x1, 0x8, 0x6, @dev={[], 0x16}}, 0x80, &(0x7f00000009c0)=[{&(0x7f00000008c0)="367a9f0d4a1564359d1e668c63869bb9bf3b7f5aa4030462889dd6407207295cea1b36e07bc2b38b11c6ca28a73515cf52d89a8199d5c019de826c756a31bac24f707efcfc0a2383216dccc08f804551f0a56d2c9ab95a113fa74dff88ccccc7f278200aa03d2349e688b69191611739bb3e2e5ff110c5858c1a7c5bd5431f9c8e73a99236728f125d5f52a2b0761872fc0fc53cda5458241b2a80fd918b21c8029039d416a6cde6aa786bdfaa21a4e5ffa5f80dec422e0051c7e98a8cff2f4afbe25ca5a154a57c10", 0xc9}], 0x1}, 0x4004000) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000001c0)={0x0, 0x4, 0x2, 0x3, 0x1}, 0x14) ioctl$VIDIOC_SUBDEV_S_SELECTION(r0, 0xc040563e, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x7) msgget(0x1, 0x318) syz_genetlink_get_family_id$team(&(0x7f0000000400)='team\x00') 16:50:57 executing program 2: r0 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'hsr0\x00', 0x0}) bind$packet(r0, &(0x7f0000000340)={0x11, 0x0, r1}, 0x14) sendto(r0, &(0x7f00000000c0)="e360b641b37f0000000001000066", 0xe, 0x0, 0x0, 0x0) 16:50:57 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x4000000000000036) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={@mcast1, @local, @local, 0x80000000, 0x0, 0x0, 0x200800000000114}) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, 0x0) ptrace$setregs(0xd, r0, 0x0, 0x0) ptrace$cont(0x21, r0, 0x0, 0x0) 16:50:57 executing program 5: r0 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000240)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$restrict_keyring(0x1d, r0, &(0x7f0000000280)='asymmetric\x00', &(0x7f0000000340)='!selinuxselinux\x00') 16:50:57 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x4000000000000036) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={@mcast1, @local, @local, 0x0, 0x0, 0x0, 0x200800000000114}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x21, r0, 0x0, 0x0) 16:50:57 executing program 5: r0 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000240)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$restrict_keyring(0x1d, r0, &(0x7f0000000280)='asymmetric\x00', &(0x7f0000000340)='!selinuxselinux\x00') 16:50:57 executing program 2: r0 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'hsr0\x00', 0x0}) bind$packet(r0, &(0x7f0000000340)={0x11, 0x0, r1}, 0x14) sendto(r0, &(0x7f00000000c0)="e360b641b37f00ffffa888000066", 0xe, 0x0, 0x0, 0x0) 16:50:57 executing program 5: r0 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000240)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$restrict_keyring(0x1d, r0, &(0x7f0000000280)='asymmetric\x00', &(0x7f0000000340)='!selinuxselinux\x00') 16:50:57 executing program 3: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000b00)) mount(&(0x7f00000004c0)=ANY=[], &(0x7f000000aff8)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000000)) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000000c0)='tls\x00', 0x4) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$void(r1, 0x5450) renameat2(r0, &(0x7f0000000180)='./file0/file0\x00', 0xffffffffffffffff, 0x0, 0x4) shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@dev, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@remote}}, 0x0) ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, 0x0) shmctl$IPC_SET(0x0, 0x1, 0x0) ioctl$PIO_FONT(r0, 0x4b61, &(0x7f0000000740)="9d705183203ecbbfc0d13a4e30241f7ce01b0b4d7682444a507bfc1ac414339f479986467eb40c8065891e1fbbe7263212c5c09bb47896b3d85893f1173f8a139c116f876fdcc1779bffef8c34b5958981616cbcf39f2d8b43491de452d774a74c3ae9555a45180f7d68da36975781ba3a24694ac85eea975ca104181420baf7f3b9614203b0") chdir(&(0x7f0000000340)='./file0\x00') symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) umount2(&(0x7f0000000380)='./file0\x00', 0x3) openat$uinput(0xffffffffffffff9c, &(0x7f0000000440)='/dev/uinput\x00', 0x802, 0x0) r3 = syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') sendmsg$FOU_CMD_DEL(r1, &(0x7f00000002c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x28, r3, 0x200, 0x70bd25, 0x25dfdbfe, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e24}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x7f}]}, 0x28}}, 0x24048010) sendmsg$kcm(r0, &(0x7f0000000a40)={&(0x7f0000000580)=@ll={0x11, 0xfd, r2, 0x1, 0x8, 0x6, @dev={[], 0x16}}, 0x80, &(0x7f00000009c0)=[{&(0x7f00000008c0)="367a9f0d4a1564359d1e668c63869bb9bf3b7f5aa4030462889dd6407207295cea1b36e07bc2b38b11c6ca28a73515cf52d89a8199d5c019de826c756a31bac24f707efcfc0a2383216dccc08f804551f0a56d2c9ab95a113fa74dff88ccccc7f278200aa03d2349e688b69191611739bb3e2e5ff110c5858c1a7c5bd5431f9c8e73a99236728f125d5f52a2b0761872fc0fc53cda5458241b2a80fd918b21c8029039d416a6cde6aa786bdfaa21a4e5ffa5f80dec422e0051c7e98a8cff2f4afbe25ca5a154a57c10", 0xc9}], 0x1}, 0x4004000) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000001c0)={0x0, 0x4, 0x2, 0x3, 0x1}, 0x14) ioctl$VIDIOC_SUBDEV_S_SELECTION(r0, 0xc040563e, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x7) msgget(0x1, 0x318) syz_genetlink_get_family_id$team(&(0x7f0000000400)='team\x00') 16:50:57 executing program 1: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000b00)) mount(&(0x7f00000004c0)=ANY=[], &(0x7f000000aff8)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000000)) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000000c0)='tls\x00', 0x4) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$void(r1, 0x5450) renameat2(r0, &(0x7f0000000180)='./file0/file0\x00', 0xffffffffffffffff, 0x0, 0x4) shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@dev, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@remote}}, 0x0) ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, 0x0) shmctl$IPC_SET(0x0, 0x1, 0x0) ioctl$PIO_FONT(r0, 0x4b61, &(0x7f0000000740)="9d705183203ecbbfc0d13a4e30241f7ce01b0b4d7682444a507bfc1ac414339f479986467eb40c8065891e1fbbe7263212c5c09bb47896b3d85893f1173f8a139c116f876fdcc1779bffef8c34b5958981616cbcf39f2d8b43491de452d774a74c3ae9555a45180f7d68da36975781ba3a24694ac85eea975ca1041814") chdir(&(0x7f0000000340)='./file0\x00') symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) umount2(&(0x7f0000000380)='./file0\x00', 0x3) openat$uinput(0xffffffffffffff9c, &(0x7f0000000440)='/dev/uinput\x00', 0x802, 0x0) r3 = syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') sendmsg$FOU_CMD_DEL(r1, &(0x7f00000002c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x28, r3, 0x200, 0x70bd25, 0x25dfdbfe, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e24}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x7f}]}, 0x28}}, 0x24048010) sendmsg$kcm(r0, &(0x7f0000000a40)={&(0x7f0000000580)=@ll={0x11, 0xfd, r2, 0x1, 0x8, 0x6, @dev={[], 0x16}}, 0x80, &(0x7f00000009c0)=[{&(0x7f00000008c0)="367a9f0d4a1564359d1e668c63869bb9bf3b7f5aa4030462889dd6407207295cea1b36e07bc2b38b11c6ca28a73515cf52d89a8199d5c019de826c756a31bac24f707efcfc0a2383216dccc08f804551f0a56d2c9ab95a113fa74dff88ccccc7f278200aa03d2349e688b69191611739bb3e2e5ff110c5858c1a7c5bd5431f9c8e73a99236728f125d5f52a2b0761872fc0fc53cda5458241b2a80fd918b21c8029039d416a6cde6aa786bdfaa21a4e5ffa5f80dec422e0051c7e98a8cff2f4afbe25ca5a154a57c10", 0xc9}], 0x1}, 0x4004000) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000001c0)={0x0, 0x4, 0x2, 0x3, 0x1}, 0x14) ioctl$VIDIOC_SUBDEV_S_SELECTION(r0, 0xc040563e, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x7) msgget(0x1, 0x318) syz_genetlink_get_family_id$team(&(0x7f0000000400)='team\x00') 16:50:57 executing program 5: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000240)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$restrict_keyring(0x1d, r0, &(0x7f0000000280)='asymmetric\x00', &(0x7f0000000340)='!selinuxselinux\x00') 16:50:57 executing program 5: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000240)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$restrict_keyring(0x1d, r0, &(0x7f0000000280)='asymmetric\x00', &(0x7f0000000340)='!selinuxselinux\x00') 16:50:57 executing program 2: r0 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'hsr0\x00', 0x0}) bind$packet(r0, &(0x7f0000000340)={0x11, 0x0, r1}, 0x14) sendto(r0, &(0x7f00000000c0)="e360b641b37f0000003580000066", 0xe, 0x0, 0x0, 0x0) 16:50:58 executing program 5: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000240)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$restrict_keyring(0x1d, r0, &(0x7f0000000280)='asymmetric\x00', &(0x7f0000000340)='!selinuxselinux\x00') [ 363.710311] net_ratelimit: 22 callbacks suppressed [ 363.710320] protocol 88fb is buggy, dev hsr_slave_0 [ 363.720451] protocol 88fb is buggy, dev hsr_slave_1 [ 363.790262] protocol 88fb is buggy, dev hsr_slave_0 [ 363.795415] protocol 88fb is buggy, dev hsr_slave_1 [ 364.030289] protocol 88fb is buggy, dev hsr_slave_0 [ 364.035465] protocol 88fb is buggy, dev hsr_slave_1 [ 364.110274] protocol 88fb is buggy, dev hsr_slave_0 [ 364.115406] protocol 88fb is buggy, dev hsr_slave_1 [ 364.510246] protocol 88fb is buggy, dev hsr_slave_0 [ 364.515430] protocol 88fb is buggy, dev hsr_slave_1 16:51:00 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x4000000000000036) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={@mcast1, @local, @local, 0x80000000, 0x0, 0x0, 0x200800000000114}) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) 16:51:00 executing program 5: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x17a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x6674}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000240)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$restrict_keyring(0x1d, r0, &(0x7f0000000280)='asymmetric\x00', &(0x7f0000000340)='!selinuxselinux\x00') 16:51:00 executing program 3: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000b00)) mount(&(0x7f00000004c0)=ANY=[], &(0x7f000000aff8)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000000)) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000000c0)='tls\x00', 0x4) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$void(r1, 0x5450) renameat2(r0, &(0x7f0000000180)='./file0/file0\x00', 0xffffffffffffffff, 0x0, 0x4) shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@dev, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@remote}}, 0x0) ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, 0x0) shmctl$IPC_SET(0x0, 0x1, 0x0) ioctl$PIO_FONT(r0, 0x4b61, &(0x7f0000000740)="9d705183203ecbbfc0d13a4e30241f7ce01b0b4d7682444a507bfc1ac414339f479986467eb40c8065891e1fbbe7263212c5c09bb47896b3d85893f1173f8a139c116f876fdcc1779bffef8c34b5958981616cbcf39f2d8b43491de452d774a74c3ae9555a45180f7d68da36975781ba3a24694ac85eea975ca104181420baf7f3b9614203b0") chdir(&(0x7f0000000340)='./file0\x00') symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) umount2(&(0x7f0000000380)='./file0\x00', 0x3) openat$uinput(0xffffffffffffff9c, &(0x7f0000000440)='/dev/uinput\x00', 0x802, 0x0) r3 = syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') sendmsg$FOU_CMD_DEL(r1, &(0x7f00000002c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x28, r3, 0x200, 0x70bd25, 0x25dfdbfe, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e24}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x7f}]}, 0x28}}, 0x24048010) sendmsg$kcm(r0, &(0x7f0000000a40)={&(0x7f0000000580)=@ll={0x11, 0xfd, r2, 0x1, 0x8, 0x6, @dev={[], 0x16}}, 0x80, &(0x7f00000009c0)=[{&(0x7f00000008c0)="367a9f0d4a1564359d1e668c63869bb9bf3b7f5aa4030462889dd6407207295cea1b36e07bc2b38b11c6ca28a73515cf52d89a8199d5c019de826c756a31bac24f707efcfc0a2383216dccc08f804551f0a56d2c9ab95a113fa74dff88ccccc7f278200aa03d2349e688b69191611739bb3e2e5ff110c5858c1a7c5bd5431f9c8e73a99236728f125d5f52a2b0761872fc0fc53cda5458241b2a80fd918b21c8029039d416a6cde6aa786bdfaa21a4e5ffa5f80dec422e0051c7e98a8cff2f4afbe25ca5a154a57c10", 0xc9}], 0x1}, 0x4004000) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000001c0)={0x0, 0x4, 0x2, 0x3, 0x1}, 0x14) ioctl$VIDIOC_SUBDEV_S_SELECTION(r0, 0xc040563e, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x7) msgget(0x1, 0x318) syz_genetlink_get_family_id$team(&(0x7f0000000400)='team\x00') 16:51:00 executing program 2: r0 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'hsr0\x00', 0x0}) bind$packet(r0, &(0x7f0000000340)={0x11, 0x0, r1}, 0x14) sendto(r0, &(0x7f00000000c0)="e360b641b37f0006890000000066", 0xe, 0x0, 0x0, 0x0) 16:51:00 executing program 1: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000b00)) mount(&(0x7f00000004c0)=ANY=[], &(0x7f000000aff8)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000000)) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000000c0)='tls\x00', 0x4) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$void(r1, 0x5450) renameat2(r0, &(0x7f0000000180)='./file0/file0\x00', 0xffffffffffffffff, 0x0, 0x4) shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@dev, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@remote}}, 0x0) ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, 0x0) shmctl$IPC_SET(0x0, 0x1, 0x0) ioctl$PIO_FONT(r0, 0x4b61, &(0x7f0000000740)="9d705183203ecbbfc0d13a4e30241f7ce01b0b4d7682444a507bfc1ac414339f479986467eb40c8065891e1fbbe7263212c5c09bb47896b3d85893f1173f8a139c116f876fdcc1779bffef8c34b5958981616cbcf39f2d8b43491de452d774a74c3ae9555a45180f7d68da36975781ba3a24694ac85eea975ca1041814") chdir(&(0x7f0000000340)='./file0\x00') symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) umount2(&(0x7f0000000380)='./file0\x00', 0x3) openat$uinput(0xffffffffffffff9c, &(0x7f0000000440)='/dev/uinput\x00', 0x802, 0x0) r3 = syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') sendmsg$FOU_CMD_DEL(r1, &(0x7f00000002c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x28, r3, 0x200, 0x70bd25, 0x25dfdbfe, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e24}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x7f}]}, 0x28}}, 0x24048010) sendmsg$kcm(r0, &(0x7f0000000a40)={&(0x7f0000000580)=@ll={0x11, 0xfd, r2, 0x1, 0x8, 0x6, @dev={[], 0x16}}, 0x80, &(0x7f00000009c0)=[{&(0x7f00000008c0)="367a9f0d4a1564359d1e668c63869bb9bf3b7f5aa4030462889dd6407207295cea1b36e07bc2b38b11c6ca28a73515cf52d89a8199d5c019de826c756a31bac24f707efcfc0a2383216dccc08f804551f0a56d2c9ab95a113fa74dff88ccccc7f278200aa03d2349e688b69191611739bb3e2e5ff110c5858c1a7c5bd5431f9c8e73a99236728f125d5f52a2b0761872fc0fc53cda5458241b2a80fd918b21c8029039d416a6cde6aa786bdfaa21a4e5ffa5f80dec422e0051c7e98a8cff2f4afbe25ca5a154a57c10", 0xc9}], 0x1}, 0x4004000) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000001c0)={0x0, 0x4, 0x2, 0x3, 0x1}, 0x14) ioctl$VIDIOC_SUBDEV_S_SELECTION(r0, 0xc040563e, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x7) msgget(0x1, 0x318) syz_genetlink_get_family_id$team(&(0x7f0000000400)='team\x00') 16:51:00 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x4000000000000036) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={@mcast1, @local, @local, 0x0, 0x0, 0x0, 0x200800000000114}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x21, r0, 0x0, 0x0) 16:51:00 executing program 5: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x17a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x6674}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000240)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$restrict_keyring(0x1d, r0, &(0x7f0000000280)='asymmetric\x00', &(0x7f0000000340)='!selinuxselinux\x00') 16:51:00 executing program 3: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000b00)) mount(&(0x7f00000004c0)=ANY=[], &(0x7f000000aff8)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000000)) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000000c0)='tls\x00', 0x4) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$void(r1, 0x5450) renameat2(r0, &(0x7f0000000180)='./file0/file0\x00', 0xffffffffffffffff, 0x0, 0x4) shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@dev, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@remote}}, 0x0) ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, 0x0) shmctl$IPC_SET(0x0, 0x1, 0x0) ioctl$PIO_FONT(r0, 0x4b61, &(0x7f0000000740)="9d705183203ecbbfc0d13a4e30241f7ce01b0b4d7682444a507bfc1ac414339f479986467eb40c8065891e1fbbe7263212c5c09bb47896b3d85893f1173f8a139c116f876fdcc1779bffef8c34b5958981616cbcf39f2d8b43491de452d774a74c3ae9555a45180f7d68da36975781ba3a24694ac85eea975ca104181420baf7f3b9614203b0") chdir(&(0x7f0000000340)='./file0\x00') symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) umount2(&(0x7f0000000380)='./file0\x00', 0x3) openat$uinput(0xffffffffffffff9c, &(0x7f0000000440)='/dev/uinput\x00', 0x802, 0x0) r3 = syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') sendmsg$FOU_CMD_DEL(r1, &(0x7f00000002c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x28, r3, 0x200, 0x70bd25, 0x25dfdbfe, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e24}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x7f}]}, 0x28}}, 0x24048010) sendmsg$kcm(r0, &(0x7f0000000a40)={&(0x7f0000000580)=@ll={0x11, 0xfd, r2, 0x1, 0x8, 0x6, @dev={[], 0x16}}, 0x80, &(0x7f00000009c0)=[{&(0x7f00000008c0)="367a9f0d4a1564359d1e668c63869bb9bf3b7f5aa4030462889dd6407207295cea1b36e07bc2b38b11c6ca28a73515cf52d89a8199d5c019de826c756a31bac24f707efcfc0a2383216dccc08f804551f0a56d2c9ab95a113fa74dff88ccccc7f278200aa03d2349e688b69191611739bb3e2e5ff110c5858c1a7c5bd5431f9c8e73a99236728f125d5f52a2b0761872fc0fc53cda5458241b2a80fd918b21c8029039d416a6cde6aa786bdfaa21a4e5ffa5f80dec422e0051c7e98a8cff2f4afbe25ca5a154a57c10", 0xc9}], 0x1}, 0x4004000) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000001c0)={0x0, 0x4, 0x2, 0x3, 0x1}, 0x14) ioctl$VIDIOC_SUBDEV_S_SELECTION(r0, 0xc040563e, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x7) msgget(0x1, 0x318) syz_genetlink_get_family_id$team(&(0x7f0000000400)='team\x00') 16:51:00 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={@mcast1, @local, @local, 0x0, 0x0, 0x0, 0x200800000000114}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x21, r0, 0x0, 0x0) 16:51:00 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x17a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x6674}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000240)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$restrict_keyring(0x1d, r0, &(0x7f0000000280)='asymmetric\x00', &(0x7f0000000340)='!selinuxselinux\x00') 16:51:00 executing program 2: r0 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'hsr0\x00', 0x0}) bind$packet(r0, &(0x7f0000000340)={0x11, 0x0, r1}, 0x14) sendto(r0, &(0x7f00000000c0)="e360b641b37f0000060000000066", 0xe, 0x0, 0x0, 0x0) 16:51:00 executing program 5: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x17a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x6674}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000240)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$restrict_keyring(0x1d, r0, &(0x7f0000000280)='asymmetric\x00', &(0x7f0000000340)='!selinuxselinux\x00') 16:51:03 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x4000000000000036) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={@mcast1, @local, @local, 0x80000000, 0x0, 0x0, 0x200800000000114}) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) 16:51:03 executing program 1: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000b00)) mount(&(0x7f00000004c0)=ANY=[], &(0x7f000000aff8)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000000)) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000000c0)='tls\x00', 0x4) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$void(r1, 0x5450) renameat2(r0, &(0x7f0000000180)='./file0/file0\x00', 0xffffffffffffffff, 0x0, 0x4) shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@dev, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@remote}}, 0x0) ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, 0x0) shmctl$IPC_SET(0x0, 0x1, 0x0) ioctl$PIO_FONT(r0, 0x4b61, 0x0) chdir(&(0x7f0000000340)='./file0\x00') symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) umount2(&(0x7f0000000380)='./file0\x00', 0x3) openat$uinput(0xffffffffffffff9c, &(0x7f0000000440)='/dev/uinput\x00', 0x802, 0x0) r3 = syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') sendmsg$FOU_CMD_DEL(r1, &(0x7f00000002c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x28, r3, 0x200, 0x70bd25, 0x25dfdbfe, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e24}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x7f}]}, 0x28}}, 0x24048010) sendmsg$kcm(r0, &(0x7f0000000a40)={&(0x7f0000000580)=@ll={0x11, 0xfd, r2, 0x1, 0x8, 0x6, @dev={[], 0x16}}, 0x80, &(0x7f00000009c0)=[{&(0x7f00000008c0)="367a9f0d4a1564359d1e668c63869bb9bf3b7f5aa4030462889dd6407207295cea1b36e07bc2b38b11c6ca28a73515cf52d89a8199d5c019de826c756a31bac24f707efcfc0a2383216dccc08f804551f0a56d2c9ab95a113fa74dff88ccccc7f278200aa03d2349e688b69191611739bb3e2e5ff110c5858c1a7c5bd5431f9c8e73a99236728f125d5f52a2b0761872fc0fc53cda5458241b2a80fd918b21c8029039d416a6cde6aa786bdfaa21a4e5ffa5f80dec422e0051c7e98a8cff2f4afbe25ca5a154a57c10", 0xc9}], 0x1}, 0x4004000) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000001c0)={0x0, 0x4, 0x2, 0x3, 0x1}, 0x14) ioctl$VIDIOC_SUBDEV_S_SELECTION(r0, 0xc040563e, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x7) msgget(0x1, 0x318) syz_genetlink_get_family_id$team(&(0x7f0000000400)='team\x00') 16:51:03 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x17a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x6674}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000240)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$restrict_keyring(0x1d, r0, &(0x7f0000000280)='asymmetric\x00', &(0x7f0000000340)='!selinuxselinux\x00') 16:51:03 executing program 2: r0 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'hsr0\x00', 0x0}) bind$packet(r0, &(0x7f0000000340)={0x11, 0x0, r1}, 0x14) sendto(r0, &(0x7f00000000c0)="e360b641b37f0086ddffff000066", 0xe, 0x0, 0x0, 0x0) 16:51:03 executing program 3: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000b00)) mount(&(0x7f00000004c0)=ANY=[], &(0x7f000000aff8)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000000)) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000000c0)='tls\x00', 0x4) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$void(r1, 0x5450) renameat2(r0, &(0x7f0000000180)='./file0/file0\x00', 0xffffffffffffffff, 0x0, 0x4) shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@dev, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@remote}}, 0x0) ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, 0x0) shmctl$IPC_SET(0x0, 0x1, 0x0) ioctl$PIO_FONT(r0, 0x4b61, &(0x7f0000000740)="9d705183203ecbbfc0d13a4e30241f7ce01b0b4d7682444a507bfc1ac414339f479986467eb40c8065891e1fbbe7263212c5c09bb47896b3d85893f1173f8a139c116f876fdcc1779bffef8c34b5958981616cbcf39f2d8b43491de452d774a74c3ae9555a45180f7d68da36975781ba3a24694ac85eea975ca104181420baf7f3b9614203b0360e7cc2") chdir(&(0x7f0000000340)='./file0\x00') symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) umount2(&(0x7f0000000380)='./file0\x00', 0x3) openat$uinput(0xffffffffffffff9c, &(0x7f0000000440)='/dev/uinput\x00', 0x802, 0x0) r3 = syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') sendmsg$FOU_CMD_DEL(r1, &(0x7f00000002c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x28, r3, 0x200, 0x70bd25, 0x25dfdbfe, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e24}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x7f}]}, 0x28}}, 0x24048010) sendmsg$kcm(r0, &(0x7f0000000a40)={&(0x7f0000000580)=@ll={0x11, 0xfd, r2, 0x1, 0x8, 0x6, @dev={[], 0x16}}, 0x80, &(0x7f00000009c0)=[{&(0x7f00000008c0)="367a9f0d4a1564359d1e668c63869bb9bf3b7f5aa4030462889dd6407207295cea1b36e07bc2b38b11c6ca28a73515cf52d89a8199d5c019de826c756a31bac24f707efcfc0a2383216dccc08f804551f0a56d2c9ab95a113fa74dff88ccccc7f278200aa03d2349e688b69191611739bb3e2e5ff110c5858c1a7c5bd5431f9c8e73a99236728f125d5f52a2b0761872fc0fc53cda5458241b2a80fd918b21c8029039d416a6cde6aa786bdfaa21a4e5ffa5f80dec422e0051c7e98a8cff2f4afbe25ca5a154a57c10", 0xc9}], 0x1}, 0x4004000) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000001c0)={0x0, 0x4, 0x2, 0x3, 0x1}, 0x14) ioctl$VIDIOC_SUBDEV_S_SELECTION(r0, 0xc040563e, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x7) msgget(0x1, 0x318) syz_genetlink_get_family_id$team(&(0x7f0000000400)='team\x00') 16:51:03 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x17a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x6674}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000240)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$restrict_keyring(0x1d, r0, &(0x7f0000000280)='asymmetric\x00', &(0x7f0000000340)='!selinuxselinux\x00') 16:51:03 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x17a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x6674}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000240)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$restrict_keyring(0x1d, r0, &(0x7f0000000280)='asymmetric\x00', &(0x7f0000000340)='!selinuxselinux\x00') 16:51:03 executing program 2: r0 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'hsr0\x00', 0x0}) bind$packet(r0, &(0x7f0000000340)={0x11, 0x0, r1}, 0x14) sendto(r0, &(0x7f00000000c0)="e360b641b37f0000004888000066", 0xe, 0x0, 0x0, 0x0) 16:51:03 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={@mcast1, @local, @local, 0x0, 0x0, 0x0, 0x200800000000114}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x21, r0, 0x0, 0x0) 16:51:03 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x4000000000000036) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={@mcast1, @local, @local, 0x80000000, 0x0, 0x0, 0x200800000000114}) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) 16:51:03 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x17a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x6674}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000240)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$restrict_keyring(0x1d, r0, &(0x7f0000000280)='asymmetric\x00', &(0x7f0000000340)='!selinuxselinux\x00') 16:51:04 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={@mcast1, @local, @local, 0x0, 0x0, 0x0, 0x200800000000114}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x21, r0, 0x0, 0x0) 16:51:04 executing program 2: r0 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'hsr0\x00', 0x0}) bind$packet(r0, &(0x7f0000000340)={0x11, 0x0, r1}, 0x14) sendto(r0, &(0x7f00000000c0)="e360b641b37f0064880000000066", 0xe, 0x0, 0x0, 0x0) 16:51:04 executing program 1: r0 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'hsr0\x00', 0x0}) bind$packet(r0, &(0x7f0000000340)={0x11, 0x0, r1}, 0x14) sendto(r0, &(0x7f00000000c0)="e360b641b37f0000060000000066", 0xe, 0x0, 0x0, 0x0) 16:51:04 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x17a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x6674}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000240)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$restrict_keyring(0x1d, r0, &(0x7f0000000280)='asymmetric\x00', &(0x7f0000000340)='!selinuxselinux\x00') 16:51:04 executing program 3: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000b00)) mount(&(0x7f00000004c0)=ANY=[], &(0x7f000000aff8)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000000)) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000000c0)='tls\x00', 0x4) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$void(r1, 0x5450) renameat2(r0, &(0x7f0000000180)='./file0/file0\x00', 0xffffffffffffffff, 0x0, 0x4) shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@dev, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@remote}}, 0x0) ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, 0x0) shmctl$IPC_SET(0x0, 0x1, 0x0) ioctl$PIO_FONT(r0, 0x4b61, &(0x7f0000000740)="9d705183203ecbbfc0d13a4e30241f7ce01b0b4d7682444a507bfc1ac414339f479986467eb40c8065891e1fbbe7263212c5c09bb47896b3d85893f1173f8a139c116f876fdcc1779bffef8c34b5958981616cbcf39f2d8b43491de452d774a74c3ae9555a45180f7d68da36975781ba3a24694ac85eea975ca104181420baf7f3b9614203b0360e7cc2") chdir(&(0x7f0000000340)='./file0\x00') symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) umount2(&(0x7f0000000380)='./file0\x00', 0x3) openat$uinput(0xffffffffffffff9c, &(0x7f0000000440)='/dev/uinput\x00', 0x802, 0x0) r3 = syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') sendmsg$FOU_CMD_DEL(r1, &(0x7f00000002c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x28, r3, 0x200, 0x70bd25, 0x25dfdbfe, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e24}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x7f}]}, 0x28}}, 0x24048010) sendmsg$kcm(r0, &(0x7f0000000a40)={&(0x7f0000000580)=@ll={0x11, 0xfd, r2, 0x1, 0x8, 0x6, @dev={[], 0x16}}, 0x80, &(0x7f00000009c0)=[{&(0x7f00000008c0)="367a9f0d4a1564359d1e668c63869bb9bf3b7f5aa4030462889dd6407207295cea1b36e07bc2b38b11c6ca28a73515cf52d89a8199d5c019de826c756a31bac24f707efcfc0a2383216dccc08f804551f0a56d2c9ab95a113fa74dff88ccccc7f278200aa03d2349e688b69191611739bb3e2e5ff110c5858c1a7c5bd5431f9c8e73a99236728f125d5f52a2b0761872fc0fc53cda5458241b2a80fd918b21c8029039d416a6cde6aa786bdfaa21a4e5ffa5f80dec422e0051c7e98a8cff2f4afbe25ca5a154a57c10", 0xc9}], 0x1}, 0x4004000) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000001c0)={0x0, 0x4, 0x2, 0x3, 0x1}, 0x14) ioctl$VIDIOC_SUBDEV_S_SELECTION(r0, 0xc040563e, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x7) msgget(0x1, 0x318) syz_genetlink_get_family_id$team(&(0x7f0000000400)='team\x00') 16:51:04 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x17a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x6674}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000240)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$restrict_keyring(0x1d, r1, &(0x7f0000000280)='asymmetric\x00', &(0x7f0000000340)='!selinuxselinux\x00') fcntl$getown(r0, 0x9) r2 = syz_open_dev$admmidi(&(0x7f0000000100)='/dev/admmidi#\x00', 0x800, 0x80000) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x6d, &(0x7f0000000380)=ANY=[@ANYRES32=0x0, @ANYBLOB="e8000000074e6fe6119eebbf6548e5cc1967117da47c7982ff6159a0138495f2b93f2fa167cfba052d3ff6aab6845ef1815c1b4fe69fc5263fe953776b5f00c5dbdcb75975ceb9902cbc2c281e52c90cfd8dd8abcf154f219eab1bc3758966249927038eac3c2e9b438a8cbf0ad7437e84cd0863f956a63fe349f05ab83f98bc42e6df6d7eb3da9010ec420a686ed39af3ee59ced30d75c5338c631df8a81c2cb33dd73f8290080b94858701bfda4a70ec4e1631af29cc4d33703ec747ce3939b7b7a42a3a0492cc44cdb1526fae722e93ce9536d4604c86d680a208a756f4ce6d119a31ca26e411e6426c27"], &(0x7f00000001c0)=0xf0) setsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000200)=@assoc_value={r3}, 0x8) ioctl$SG_SET_FORCE_PACK_ID(r2, 0x227b, &(0x7f0000000140)) 16:51:04 executing program 2: r0 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'hsr0\x00', 0x0}) bind$packet(r0, &(0x7f0000000340)={0x11, 0x0, r1}, 0x14) sendto(r0, &(0x7f00000000c0)="e360b641b37f0000000002000066", 0xe, 0x0, 0x0, 0x0) 16:51:04 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x17a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x6674}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000240)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$restrict_keyring(0x1d, r0, &(0x7f0000000280)='asymmetric\x00', &(0x7f0000000340)='!selinuxselinux\x00') 16:51:04 executing program 3: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000b00)) mount(&(0x7f00000004c0)=ANY=[], &(0x7f000000aff8)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000000)) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000000c0)='tls\x00', 0x4) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$void(r1, 0x5450) renameat2(r0, &(0x7f0000000180)='./file0/file0\x00', 0xffffffffffffffff, 0x0, 0x4) shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@dev, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@remote}}, 0x0) ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, 0x0) shmctl$IPC_SET(0x0, 0x1, 0x0) ioctl$PIO_FONT(r0, 0x4b61, &(0x7f0000000740)="9d705183203ecbbfc0d13a4e30241f7ce01b0b4d7682444a507bfc1ac414339f479986467eb40c8065891e1fbbe7263212c5c09bb47896b3d85893f1173f8a139c116f876fdcc1779bffef8c34b5958981616cbcf39f2d8b43491de452d774a74c3ae9555a45180f7d68da36975781ba3a24694ac85eea975ca104181420baf7f3b9614203b0360e7cc29a1c") chdir(&(0x7f0000000340)='./file0\x00') symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) umount2(&(0x7f0000000380)='./file0\x00', 0x3) openat$uinput(0xffffffffffffff9c, &(0x7f0000000440)='/dev/uinput\x00', 0x802, 0x0) r3 = syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') sendmsg$FOU_CMD_DEL(r1, &(0x7f00000002c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x28, r3, 0x200, 0x70bd25, 0x25dfdbfe, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e24}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x7f}]}, 0x28}}, 0x24048010) sendmsg$kcm(r0, &(0x7f0000000a40)={&(0x7f0000000580)=@ll={0x11, 0xfd, r2, 0x1, 0x8, 0x6, @dev={[], 0x16}}, 0x80, &(0x7f00000009c0)=[{&(0x7f00000008c0)="367a9f0d4a1564359d1e668c63869bb9bf3b7f5aa4030462889dd6407207295cea1b36e07bc2b38b11c6ca28a73515cf52d89a8199d5c019de826c756a31bac24f707efcfc0a2383216dccc08f804551f0a56d2c9ab95a113fa74dff88ccccc7f278200aa03d2349e688b69191611739bb3e2e5ff110c5858c1a7c5bd5431f9c8e73a99236728f125d5f52a2b0761872fc0fc53cda5458241b2a80fd918b21c8029039d416a6cde6aa786bdfaa21a4e5ffa5f80dec422e0051c7e98a8cff2f4afbe25ca5a154a57c10", 0xc9}], 0x1}, 0x4004000) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000001c0)={0x0, 0x4, 0x2, 0x3, 0x1}, 0x14) ioctl$VIDIOC_SUBDEV_S_SELECTION(r0, 0xc040563e, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x7) msgget(0x1, 0x318) syz_genetlink_get_family_id$team(&(0x7f0000000400)='team\x00') 16:51:04 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x6674}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000240)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$restrict_keyring(0x1d, r0, &(0x7f0000000280)='asymmetric\x00', &(0x7f0000000340)='!selinuxselinux\x00') [ 369.070325] net_ratelimit: 28 callbacks suppressed [ 369.070334] protocol 88fb is buggy, dev hsr_slave_0 [ 369.080489] protocol 88fb is buggy, dev hsr_slave_1 [ 369.150280] protocol 88fb is buggy, dev hsr_slave_0 [ 369.155385] protocol 88fb is buggy, dev hsr_slave_1 [ 369.950282] protocol 88fb is buggy, dev hsr_slave_0 [ 369.955400] protocol 88fb is buggy, dev hsr_slave_1 [ 370.030490] protocol 88fb is buggy, dev hsr_slave_0 [ 370.035668] protocol 88fb is buggy, dev hsr_slave_1 [ 370.270295] protocol 88fb is buggy, dev hsr_slave_0 [ 370.275439] protocol 88fb is buggy, dev hsr_slave_1 16:51:06 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x4000000000000036) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={@mcast1, @local, @local, 0x80000000, 0x0, 0x0, 0x200800000000114}) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x21, 0x0, 0x0, 0x0) 16:51:06 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x17a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x6674}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000240)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$restrict_keyring(0x1d, r1, &(0x7f0000000280)='asymmetric\x00', &(0x7f0000000340)='!selinuxselinux\x00') fcntl$getown(r0, 0x9) r2 = syz_open_dev$admmidi(&(0x7f0000000100)='/dev/admmidi#\x00', 0x800, 0x80000) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x6d, &(0x7f0000000380)=ANY=[@ANYRES32=0x0, @ANYBLOB="e8000000074e6fe6119eebbf6548e5cc1967117da47c7982ff6159a0138495f2b93f2fa167cfba052d3ff6aab6845ef1815c1b4fe69fc5263fe953776b5f00c5dbdcb75975ceb9902cbc2c281e52c90cfd8dd8abcf154f219eab1bc3758966249927038eac3c2e9b438a8cbf0ad7437e84cd0863f956a63fe349f05ab83f98bc42e6df6d7eb3da9010ec420a686ed39af3ee59ced30d75c5338c631df8a81c2cb33dd73f8290080b94858701bfda4a70ec4e1631af29cc4d33703ec747ce3939b7b7a42a3a0492cc44cdb1526fae722e93ce9536d4604c86d680a208a756f4ce6d119a31ca26e411e6426c27"], &(0x7f00000001c0)=0xf0) setsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000200)=@assoc_value={r3}, 0x8) ioctl$SG_SET_FORCE_PACK_ID(r2, 0x227b, &(0x7f0000000140)) 16:51:07 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) tkill(r0, 0x4000000000000036) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={@mcast1, @local, @local, 0x0, 0x0, 0x0, 0x200800000000114}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x21, r0, 0x0, 0x0) 16:51:07 executing program 2: r0 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'hsr0\x00', 0x0}) bind$packet(r0, &(0x7f0000000340)={0x11, 0x0, r1}, 0x14) sendto(r0, &(0x7f00000000c0)="e360b641b37f000000000a000066", 0xe, 0x0, 0x0, 0x0) 16:51:07 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x6674}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000240)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$restrict_keyring(0x1d, r0, &(0x7f0000000280)='asymmetric\x00', &(0x7f0000000340)='!selinuxselinux\x00') 16:51:07 executing program 3: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000b00)) mount(&(0x7f00000004c0)=ANY=[], &(0x7f000000aff8)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000000)) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000000c0)='tls\x00', 0x4) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$void(r1, 0x5450) renameat2(r0, &(0x7f0000000180)='./file0/file0\x00', 0xffffffffffffffff, 0x0, 0x4) shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@dev, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@remote}}, 0x0) ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, 0x0) shmctl$IPC_SET(0x0, 0x1, 0x0) ioctl$PIO_FONT(r0, 0x4b61, &(0x7f0000000740)="9d705183203ecbbfc0d13a4e30241f7ce01b0b4d7682444a507bfc1ac414339f479986467eb40c8065891e1fbbe7263212c5c09bb47896b3d85893f1173f8a139c116f876fdcc1779bffef8c34b5958981616cbcf39f2d8b43491de452d774a74c3ae9555a45180f7d68da36975781ba3a24694ac85eea975ca104181420baf7f3b9614203b0360e7cc29a1c10") chdir(&(0x7f0000000340)='./file0\x00') symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) umount2(&(0x7f0000000380)='./file0\x00', 0x3) openat$uinput(0xffffffffffffff9c, &(0x7f0000000440)='/dev/uinput\x00', 0x802, 0x0) r3 = syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') sendmsg$FOU_CMD_DEL(r1, &(0x7f00000002c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x28, r3, 0x200, 0x70bd25, 0x25dfdbfe, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e24}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x7f}]}, 0x28}}, 0x24048010) sendmsg$kcm(r0, &(0x7f0000000a40)={&(0x7f0000000580)=@ll={0x11, 0xfd, r2, 0x1, 0x8, 0x6, @dev={[], 0x16}}, 0x80, &(0x7f00000009c0)=[{&(0x7f00000008c0)="367a9f0d4a1564359d1e668c63869bb9bf3b7f5aa4030462889dd6407207295cea1b36e07bc2b38b11c6ca28a73515cf52d89a8199d5c019de826c756a31bac24f707efcfc0a2383216dccc08f804551f0a56d2c9ab95a113fa74dff88ccccc7f278200aa03d2349e688b69191611739bb3e2e5ff110c5858c1a7c5bd5431f9c8e73a99236728f125d5f52a2b0761872fc0fc53cda5458241b2a80fd918b21c8029039d416a6cde6aa786bdfaa21a4e5ffa5f80dec422e0051c7e98a8cff2f4afbe25ca5a154a57c10", 0xc9}], 0x1}, 0x4004000) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000001c0)={0x0, 0x4, 0x2, 0x3, 0x1}, 0x14) ioctl$VIDIOC_SUBDEV_S_SELECTION(r0, 0xc040563e, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x7) msgget(0x1, 0x318) syz_genetlink_get_family_id$team(&(0x7f0000000400)='team\x00') 16:51:07 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x17a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x6674}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000240)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$restrict_keyring(0x1d, r1, &(0x7f0000000280)='asymmetric\x00', &(0x7f0000000340)='!selinuxselinux\x00') fcntl$getown(r0, 0x9) r2 = syz_open_dev$admmidi(&(0x7f0000000100)='/dev/admmidi#\x00', 0x800, 0x80000) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x6d, &(0x7f0000000380)=ANY=[@ANYRES32=0x0, @ANYBLOB="e8000000074e6fe6119eebbf6548e5cc1967117da47c7982ff6159a0138495f2b93f2fa167cfba052d3ff6aab6845ef1815c1b4fe69fc5263fe953776b5f00c5dbdcb75975ceb9902cbc2c281e52c90cfd8dd8abcf154f219eab1bc3758966249927038eac3c2e9b438a8cbf0ad7437e84cd0863f956a63fe349f05ab83f98bc42e6df6d7eb3da9010ec420a686ed39af3ee59ced30d75c5338c631df8a81c2cb33dd73f8290080b94858701bfda4a70ec4e1631af29cc4d33703ec747ce3939b7b7a42a3a0492cc44cdb1526fae722e93ce9536d4604c86d680a208a756f4ce6d119a31ca26e411e6426c27"], &(0x7f00000001c0)=0xf0) setsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000200)=@assoc_value={r3}, 0x8) ioctl$SG_SET_FORCE_PACK_ID(r2, 0x227b, &(0x7f0000000140)) 16:51:07 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x4000000000000036) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={@mcast1, @local, @local, 0x80000000, 0x0, 0x0, 0x200800000000114}) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x21, 0x0, 0x0, 0x0) 16:51:07 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000240)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$restrict_keyring(0x1d, r0, &(0x7f0000000280)='asymmetric\x00', &(0x7f0000000340)='!selinuxselinux\x00') 16:51:07 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x17a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x6674}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000240)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$restrict_keyring(0x1d, r1, &(0x7f0000000280)='asymmetric\x00', &(0x7f0000000340)='!selinuxselinux\x00') fcntl$getown(r0, 0x9) r2 = syz_open_dev$admmidi(&(0x7f0000000100)='/dev/admmidi#\x00', 0x800, 0x80000) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x6d, &(0x7f0000000380)=ANY=[@ANYRES32=0x0, @ANYBLOB="e8000000074e6fe6119eebbf6548e5cc1967117da47c7982ff6159a0138495f2b93f2fa167cfba052d3ff6aab6845ef1815c1b4fe69fc5263fe953776b5f00c5dbdcb75975ceb9902cbc2c281e52c90cfd8dd8abcf154f219eab1bc3758966249927038eac3c2e9b438a8cbf0ad7437e84cd0863f956a63fe349f05ab83f98bc42e6df6d7eb3da9010ec420a686ed39af3ee59ced30d75c5338c631df8a81c2cb33dd73f8290080b94858701bfda4a70ec4e1631af29cc4d33703ec747ce3939b7b7a42a3a0492cc44cdb1526fae722e93ce9536d4604c86d680a208a756f4ce6d119a31ca26e411e6426c27"], &(0x7f00000001c0)=0xf0) setsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000200)=@assoc_value={r3}, 0x8) 16:51:07 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x4000000000000036) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={@mcast1, @local, @local, 0x80000000, 0x0, 0x0, 0x200800000000114}) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x21, 0x0, 0x0, 0x0) 16:51:07 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) tkill(r0, 0x4000000000000036) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={@mcast1, @local, @local, 0x0, 0x0, 0x0, 0x200800000000114}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x21, r0, 0x0, 0x0) 16:51:07 executing program 2: r0 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'hsr0\x00', 0x0}) bind$packet(r0, &(0x7f0000000340)={0x11, 0x0, r1}, 0x14) sendto(r0, &(0x7f00000000c0)="e360b641b37f0003e80000000066", 0xe, 0x0, 0x0, 0x0) 16:51:07 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) tkill(r0, 0x4000000000000036) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={@mcast1, @local, @local, 0x0, 0x0, 0x0, 0x200800000000114}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x21, r0, 0x0, 0x0) 16:51:07 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x6674}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000240)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$restrict_keyring(0x1d, r0, &(0x7f0000000280)='asymmetric\x00', &(0x7f0000000340)='!selinuxselinux\x00') 16:51:07 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x17a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x6674}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000240)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$restrict_keyring(0x1d, r1, &(0x7f0000000280)='asymmetric\x00', &(0x7f0000000340)='!selinuxselinux\x00') fcntl$getown(r0, 0x9) r2 = syz_open_dev$admmidi(&(0x7f0000000100)='/dev/admmidi#\x00', 0x800, 0x80000) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x6d, &(0x7f0000000380)=ANY=[@ANYRES32=0x0, @ANYBLOB="e8000000074e6fe6119eebbf6548e5cc1967117da47c7982ff6159a0138495f2b93f2fa167cfba052d3ff6aab6845ef1815c1b4fe69fc5263fe953776b5f00c5dbdcb75975ceb9902cbc2c281e52c90cfd8dd8abcf154f219eab1bc3758966249927038eac3c2e9b438a8cbf0ad7437e84cd0863f956a63fe349f05ab83f98bc42e6df6d7eb3da9010ec420a686ed39af3ee59ced30d75c5338c631df8a81c2cb33dd73f8290080b94858701bfda4a70ec4e1631af29cc4d33703ec747ce3939b7b7a42a3a0492cc44cdb1526fae722e93ce9536d4604c86d680a208a756f4ce6d119a31ca26e411e6426c27"], &(0x7f00000001c0)=0xf0) setsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000200)=@assoc_value={r3}, 0x8) 16:51:07 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000240)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$restrict_keyring(0x1d, r0, &(0x7f0000000280)='asymmetric\x00', &(0x7f0000000340)='!selinuxselinux\x00') 16:51:07 executing program 3: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000b00)) mount(&(0x7f00000004c0)=ANY=[], &(0x7f000000aff8)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000000)) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000000c0)='tls\x00', 0x4) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$void(r1, 0x5450) renameat2(r0, &(0x7f0000000180)='./file0/file0\x00', 0xffffffffffffffff, 0x0, 0x4) shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@dev, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@remote}}, 0x0) ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, 0x0) shmctl$IPC_SET(0x0, 0x1, 0x0) ioctl$PIO_FONT(r0, 0x4b61, &(0x7f0000000740)="9d705183203ecbbfc0d13a4e30241f7ce01b0b4d7682444a507bfc1ac414339f479986467eb40c8065891e1fbbe7263212c5c09bb47896b3d85893f1173f8a139c116f876fdcc1779bffef8c34b5958981616cbcf39f2d8b43491de452d774a74c3ae9555a45180f7d68da36975781ba3a24694ac85eea975ca104181420baf7f3b9614203b0360e7cc29a1c109e") chdir(0x0) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) umount2(&(0x7f0000000380)='./file0\x00', 0x3) openat$uinput(0xffffffffffffff9c, &(0x7f0000000440)='/dev/uinput\x00', 0x802, 0x0) r3 = syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') sendmsg$FOU_CMD_DEL(r1, &(0x7f00000002c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x28, r3, 0x200, 0x70bd25, 0x25dfdbfe, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e24}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x7f}]}, 0x28}}, 0x24048010) sendmsg$kcm(r0, &(0x7f0000000a40)={&(0x7f0000000580)=@ll={0x11, 0xfd, r2, 0x1, 0x8, 0x6, @dev={[], 0x16}}, 0x80, &(0x7f00000009c0)=[{&(0x7f00000008c0)="367a9f0d4a1564359d1e668c63869bb9bf3b7f5aa4030462889dd6407207295cea1b36e07bc2b38b11c6ca28a73515cf52d89a8199d5c019de826c756a31bac24f707efcfc0a2383216dccc08f804551f0a56d2c9ab95a113fa74dff88ccccc7f278200aa03d2349e688b69191611739bb3e2e5ff110c5858c1a7c5bd5431f9c8e73a99236728f125d5f52a2b0761872fc0fc53cda5458241b2a80fd918b21c8029039d416a6cde6aa786bdfaa21a4e5ffa5f80dec422e0051c7e98a8cff2f4afbe25ca5a154a57c10", 0xc9}], 0x1}, 0x4004000) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000001c0)={0x0, 0x4, 0x2, 0x3, 0x1}, 0x14) ioctl$VIDIOC_SUBDEV_S_SELECTION(r0, 0xc040563e, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x7) msgget(0x1, 0x318) syz_genetlink_get_family_id$team(&(0x7f0000000400)='team\x00') 16:51:07 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x4000000000000036) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={@mcast1, @local, @local, 0x0, 0x0, 0x0, 0x200800000000114}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x21, r0, 0x0, 0x0) 16:51:07 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x17a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x6674}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000240)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$restrict_keyring(0x1d, r1, &(0x7f0000000280)='asymmetric\x00', &(0x7f0000000340)='!selinuxselinux\x00') fcntl$getown(r0, 0x9) r2 = syz_open_dev$admmidi(&(0x7f0000000100)='/dev/admmidi#\x00', 0x800, 0x80000) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x6d, &(0x7f0000000380)=ANY=[@ANYRES32=0x0, @ANYBLOB="e8000000074e6fe6119eebbf6548e5cc1967117da47c7982ff6159a0138495f2b93f2fa167cfba052d3ff6aab6845ef1815c1b4fe69fc5263fe953776b5f00c5dbdcb75975ceb9902cbc2c281e52c90cfd8dd8abcf154f219eab1bc3758966249927038eac3c2e9b438a8cbf0ad7437e84cd0863f956a63fe349f05ab83f98bc42e6df6d7eb3da9010ec420a686ed39af3ee59ced30d75c5338c631df8a81c2cb33dd73f8290080b94858701bfda4a70ec4e1631af29cc4d33703ec747ce3939b7b7a42a3a0492cc44cdb1526fae722e93ce9536d4604c86d680a208a756f4ce6d119a31ca26e411e6426c27"], &(0x7f00000001c0)=0xf0) 16:51:07 executing program 2: r0 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'hsr0\x00', 0x0}) bind$packet(r0, &(0x7f0000000340)={0x11, 0x0, r1}, 0x14) sendto(r0, &(0x7f00000000c0)="e360b641b37f000000000000002f", 0xe, 0x0, 0x0, 0x0) 16:51:07 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x6674}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000240)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$restrict_keyring(0x1d, r0, &(0x7f0000000280)='asymmetric\x00', &(0x7f0000000340)='!selinuxselinux\x00') 16:51:07 executing program 3: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000b00)) mount(&(0x7f00000004c0)=ANY=[], &(0x7f000000aff8)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000000)) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000000c0)='tls\x00', 0x4) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$void(r1, 0x5450) renameat2(r0, &(0x7f0000000180)='./file0/file0\x00', 0xffffffffffffffff, 0x0, 0x4) shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@dev, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@remote}}, 0x0) ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, 0x0) shmctl$IPC_SET(0x0, 0x1, 0x0) ioctl$PIO_FONT(r0, 0x4b61, &(0x7f0000000740)="9d705183203ecbbfc0d13a4e30241f7ce01b0b4d7682444a507bfc1ac414339f479986467eb40c8065891e1fbbe7263212c5c09bb47896b3d85893f1173f8a139c116f876fdcc1779bffef8c34b5958981616cbcf39f2d8b43491de452d774a74c3ae9555a45180f7d68da36975781ba3a24694ac85eea975ca104181420baf7f3b9614203b0360e7cc29a1c109e") chdir(0x0) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) umount2(&(0x7f0000000380)='./file0\x00', 0x3) openat$uinput(0xffffffffffffff9c, &(0x7f0000000440)='/dev/uinput\x00', 0x802, 0x0) r3 = syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') sendmsg$FOU_CMD_DEL(r1, &(0x7f00000002c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x28, r3, 0x200, 0x70bd25, 0x25dfdbfe, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e24}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x7f}]}, 0x28}}, 0x24048010) sendmsg$kcm(r0, &(0x7f0000000a40)={&(0x7f0000000580)=@ll={0x11, 0xfd, r2, 0x1, 0x8, 0x6, @dev={[], 0x16}}, 0x80, &(0x7f00000009c0)=[{&(0x7f00000008c0)="367a9f0d4a1564359d1e668c63869bb9bf3b7f5aa4030462889dd6407207295cea1b36e07bc2b38b11c6ca28a73515cf52d89a8199d5c019de826c756a31bac24f707efcfc0a2383216dccc08f804551f0a56d2c9ab95a113fa74dff88ccccc7f278200aa03d2349e688b69191611739bb3e2e5ff110c5858c1a7c5bd5431f9c8e73a99236728f125d5f52a2b0761872fc0fc53cda5458241b2a80fd918b21c8029039d416a6cde6aa786bdfaa21a4e5ffa5f80dec422e0051c7e98a8cff2f4afbe25ca5a154a57c10", 0xc9}], 0x1}, 0x4004000) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000001c0)={0x0, 0x4, 0x2, 0x3, 0x1}, 0x14) ioctl$VIDIOC_SUBDEV_S_SELECTION(r0, 0xc040563e, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x7) msgget(0x1, 0x318) syz_genetlink_get_family_id$team(&(0x7f0000000400)='team\x00') 16:51:07 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x4000000000000036) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={@mcast1, @local, @local, 0x0, 0x0, 0x0, 0x200800000000114}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x21, r0, 0x0, 0x0) 16:51:07 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(0x0, &(0x7f0000000240)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$restrict_keyring(0x1d, r0, &(0x7f0000000280)='asymmetric\x00', &(0x7f0000000340)='!selinuxselinux\x00') 16:51:07 executing program 3: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000b00)) mount(&(0x7f00000004c0)=ANY=[], &(0x7f000000aff8)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000000)) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000000c0)='tls\x00', 0x4) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$void(r1, 0x5450) renameat2(r0, &(0x7f0000000180)='./file0/file0\x00', 0xffffffffffffffff, 0x0, 0x4) shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@dev, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@remote}}, 0x0) ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, 0x0) shmctl$IPC_SET(0x0, 0x1, 0x0) ioctl$PIO_FONT(r0, 0x4b61, &(0x7f0000000740)="9d705183203ecbbfc0d13a4e30241f7ce01b0b4d7682444a507bfc1ac414339f479986467eb40c8065891e1fbbe7263212c5c09bb47896b3d85893f1173f8a139c116f876fdcc1779bffef8c34b5958981616cbcf39f2d8b43491de452d774a74c3ae9555a45180f7d68da36975781ba3a24694ac85eea975ca104181420baf7f3b9614203b0360e7cc29a1c109e") chdir(0x0) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) umount2(&(0x7f0000000380)='./file0\x00', 0x3) openat$uinput(0xffffffffffffff9c, &(0x7f0000000440)='/dev/uinput\x00', 0x802, 0x0) r3 = syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') sendmsg$FOU_CMD_DEL(r1, &(0x7f00000002c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x28, r3, 0x200, 0x70bd25, 0x25dfdbfe, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e24}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x7f}]}, 0x28}}, 0x24048010) sendmsg$kcm(r0, &(0x7f0000000a40)={&(0x7f0000000580)=@ll={0x11, 0xfd, r2, 0x1, 0x8, 0x6, @dev={[], 0x16}}, 0x80, &(0x7f00000009c0)=[{&(0x7f00000008c0)="367a9f0d4a1564359d1e668c63869bb9bf3b7f5aa4030462889dd6407207295cea1b36e07bc2b38b11c6ca28a73515cf52d89a8199d5c019de826c756a31bac24f707efcfc0a2383216dccc08f804551f0a56d2c9ab95a113fa74dff88ccccc7f278200aa03d2349e688b69191611739bb3e2e5ff110c5858c1a7c5bd5431f9c8e73a99236728f125d5f52a2b0761872fc0fc53cda5458241b2a80fd918b21c8029039d416a6cde6aa786bdfaa21a4e5ffa5f80dec422e0051c7e98a8cff2f4afbe25ca5a154a57c10", 0xc9}], 0x1}, 0x4004000) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000001c0)={0x0, 0x4, 0x2, 0x3, 0x1}, 0x14) ioctl$VIDIOC_SUBDEV_S_SELECTION(r0, 0xc040563e, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x7) msgget(0x1, 0x318) syz_genetlink_get_family_id$team(&(0x7f0000000400)='team\x00') 16:51:07 executing program 2: r0 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'hsr0\x00', 0x0}) bind$packet(r0, &(0x7f0000000340)={0x11, 0x0, r1}, 0x14) sendto(r0, &(0x7f00000000c0)="e360b641b37f0065580000000066", 0xe, 0x0, 0x0, 0x0) 16:51:07 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x4000000000000036) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={@mcast1, @local, @local, 0x0, 0x0, 0x0, 0x200800000000114}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x21, r0, 0x0, 0x0) 16:51:07 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x17a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x6674}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000240)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$restrict_keyring(0x1d, r1, &(0x7f0000000280)='asymmetric\x00', &(0x7f0000000340)='!selinuxselinux\x00') fcntl$getown(r0, 0x9) syz_open_dev$admmidi(&(0x7f0000000100)='/dev/admmidi#\x00', 0x800, 0x80000) 16:51:07 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(0x0, &(0x7f0000000240)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$restrict_keyring(0x1d, r0, &(0x7f0000000280)='asymmetric\x00', &(0x7f0000000340)='!selinuxselinux\x00') 16:51:07 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x6674}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000240)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$restrict_keyring(0x1d, r0, &(0x7f0000000280)='asymmetric\x00', &(0x7f0000000340)='!selinuxselinux\x00') 16:51:07 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x4000000000000036) ptrace$cont(0x18, 0x0, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={@mcast1, @local, @local, 0x0, 0x0, 0x0, 0x200800000000114}) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x21, 0x0, 0x0, 0x0) 16:51:07 executing program 3: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000b00)) mount(&(0x7f00000004c0)=ANY=[], &(0x7f000000aff8)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000000)) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000000c0)='tls\x00', 0x4) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$void(r1, 0x5450) renameat2(r0, &(0x7f0000000180)='./file0/file0\x00', 0xffffffffffffffff, 0x0, 0x4) shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@dev, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@remote}}, 0x0) ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, 0x0) shmctl$IPC_SET(0x0, 0x1, 0x0) ioctl$PIO_FONT(r0, 0x4b61, &(0x7f0000000740)="9d705183203ecbbfc0d13a4e30241f7ce01b0b4d7682444a507bfc1ac414339f479986467eb40c8065891e1fbbe7263212c5c09bb47896b3d85893f1173f8a139c116f876fdcc1779bffef8c34b5958981616cbcf39f2d8b43491de452d774a74c3ae9555a45180f7d68da36975781ba3a24694ac85eea975ca104181420baf7f3b9614203b0360e7cc29a1c109e") chdir(&(0x7f0000000340)='./file0\x00') symlink(0x0, &(0x7f0000000080)='./file0\x00') clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) umount2(&(0x7f0000000380)='./file0\x00', 0x3) openat$uinput(0xffffffffffffff9c, &(0x7f0000000440)='/dev/uinput\x00', 0x802, 0x0) r3 = syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') sendmsg$FOU_CMD_DEL(r1, &(0x7f00000002c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x28, r3, 0x200, 0x70bd25, 0x25dfdbfe, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e24}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x7f}]}, 0x28}}, 0x24048010) sendmsg$kcm(r0, &(0x7f0000000a40)={&(0x7f0000000580)=@ll={0x11, 0xfd, r2, 0x1, 0x8, 0x6, @dev={[], 0x16}}, 0x80, &(0x7f00000009c0)=[{&(0x7f00000008c0)="367a9f0d4a1564359d1e668c63869bb9bf3b7f5aa4030462889dd6407207295cea1b36e07bc2b38b11c6ca28a73515cf52d89a8199d5c019de826c756a31bac24f707efcfc0a2383216dccc08f804551f0a56d2c9ab95a113fa74dff88ccccc7f278200aa03d2349e688b69191611739bb3e2e5ff110c5858c1a7c5bd5431f9c8e73a99236728f125d5f52a2b0761872fc0fc53cda5458241b2a80fd918b21c8029039d416a6cde6aa786bdfaa21a4e5ffa5f80dec422e0051c7e98a8cff2f4afbe25ca5a154a57c10", 0xc9}], 0x1}, 0x4004000) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000001c0)={0x0, 0x4, 0x2, 0x3, 0x1}, 0x14) ioctl$VIDIOC_SUBDEV_S_SELECTION(r0, 0xc040563e, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x7) msgget(0x1, 0x318) syz_genetlink_get_family_id$team(&(0x7f0000000400)='team\x00') 16:51:07 executing program 2: r0 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'hsr0\x00', 0x0}) bind$packet(r0, &(0x7f0000000340)={0x11, 0x0, r1}, 0x14) sendto(r0, &(0x7f00000000c0)="e360b641b37f000000000e000066", 0xe, 0x0, 0x0, 0x0) 16:51:08 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x17a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x6674}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000240)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$restrict_keyring(0x1d, r1, &(0x7f0000000280)='asymmetric\x00', &(0x7f0000000340)='!selinuxselinux\x00') fcntl$getown(r0, 0x9) 16:51:08 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(0x0, &(0x7f0000000240)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$restrict_keyring(0x1d, r0, &(0x7f0000000280)='asymmetric\x00', &(0x7f0000000340)='!selinuxselinux\x00') 16:51:08 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x6674}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, 0x0, &(0x7f0000000280)='asymmetric\x00', &(0x7f0000000340)='!selinuxselinux\x00') 16:51:08 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x4000000000000036) ptrace$cont(0x18, 0x0, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={@mcast1, @local, @local, 0x0, 0x0, 0x0, 0x200800000000114}) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x21, 0x0, 0x0, 0x0) 16:51:08 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x17a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x6674}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000240)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$restrict_keyring(0x1d, r0, &(0x7f0000000280)='asymmetric\x00', &(0x7f0000000340)='!selinuxselinux\x00') 16:51:08 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) keyctl$restrict_keyring(0x1d, r0, &(0x7f0000000280)='asymmetric\x00', &(0x7f0000000340)='!selinuxselinux\x00') 16:51:08 executing program 2: r0 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'hsr0\x00', 0x0}) bind$packet(r0, &(0x7f0000000340)={0x11, 0x0, r1}, 0x14) sendto(r0, &(0x7f00000000c0)="e360b641b37f0000000000000000", 0xe, 0x0, 0x0, 0x0) 16:51:08 executing program 3: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000b00)) mount(&(0x7f00000004c0)=ANY=[], &(0x7f000000aff8)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000000)) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000000c0)='tls\x00', 0x4) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$void(r1, 0x5450) renameat2(r0, &(0x7f0000000180)='./file0/file0\x00', 0xffffffffffffffff, 0x0, 0x4) shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@dev, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@remote}}, 0x0) ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, 0x0) shmctl$IPC_SET(0x0, 0x1, 0x0) ioctl$PIO_FONT(r0, 0x4b61, &(0x7f0000000740)="9d705183203ecbbfc0d13a4e30241f7ce01b0b4d7682444a507bfc1ac414339f479986467eb40c8065891e1fbbe7263212c5c09bb47896b3d85893f1173f8a139c116f876fdcc1779bffef8c34b5958981616cbcf39f2d8b43491de452d774a74c3ae9555a45180f7d68da36975781ba3a24694ac85eea975ca104181420baf7f3b9614203b0360e7cc29a1c109e") chdir(&(0x7f0000000340)='./file0\x00') symlink(&(0x7f0000001000)='./file0\x00', 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) umount2(&(0x7f0000000380)='./file0\x00', 0x3) openat$uinput(0xffffffffffffff9c, &(0x7f0000000440)='/dev/uinput\x00', 0x802, 0x0) r3 = syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') sendmsg$FOU_CMD_DEL(r1, &(0x7f00000002c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x28, r3, 0x200, 0x70bd25, 0x25dfdbfe, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e24}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x7f}]}, 0x28}}, 0x24048010) sendmsg$kcm(r0, &(0x7f0000000a40)={&(0x7f0000000580)=@ll={0x11, 0xfd, r2, 0x1, 0x8, 0x6, @dev={[], 0x16}}, 0x80, &(0x7f00000009c0)=[{&(0x7f00000008c0)="367a9f0d4a1564359d1e668c63869bb9bf3b7f5aa4030462889dd6407207295cea1b36e07bc2b38b11c6ca28a73515cf52d89a8199d5c019de826c756a31bac24f707efcfc0a2383216dccc08f804551f0a56d2c9ab95a113fa74dff88ccccc7f278200aa03d2349e688b69191611739bb3e2e5ff110c5858c1a7c5bd5431f9c8e73a99236728f125d5f52a2b0761872fc0fc53cda5458241b2a80fd918b21c8029039d416a6cde6aa786bdfaa21a4e5ffa5f80dec422e0051c7e98a8cff2f4afbe25ca5a154a57c10", 0xc9}], 0x1}, 0x4004000) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000001c0)={0x0, 0x4, 0x2, 0x3, 0x1}, 0x14) ioctl$VIDIOC_SUBDEV_S_SELECTION(r0, 0xc040563e, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x7) msgget(0x1, 0x318) syz_genetlink_get_family_id$team(&(0x7f0000000400)='team\x00') 16:51:08 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) keyctl$restrict_keyring(0x1d, r0, &(0x7f0000000280)='asymmetric\x00', &(0x7f0000000340)='!selinuxselinux\x00') 16:51:08 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x4000000000000036) ptrace$cont(0x18, 0x0, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={@mcast1, @local, @local, 0x0, 0x0, 0x0, 0x200800000000114}) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x21, 0x0, 0x0, 0x0) 16:51:08 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x6674}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, 0x0, &(0x7f0000000280)='asymmetric\x00', &(0x7f0000000340)='!selinuxselinux\x00') 16:51:08 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x17a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x6674}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, 0x0, &(0x7f0000000280)='asymmetric\x00', &(0x7f0000000340)='!selinuxselinux\x00') 16:51:08 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x6674}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, 0x0, &(0x7f0000000280)='asymmetric\x00', &(0x7f0000000340)='!selinuxselinux\x00') 16:51:08 executing program 2: r0 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'hsr0\x00', 0x0}) bind$packet(r0, &(0x7f0000000340)={0x11, 0x0, r1}, 0x14) sendto(r0, &(0x7f00000000c0)="e360b641b37f0000006488000066", 0xe, 0x0, 0x0, 0x0) 16:51:08 executing program 0: r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x4000000000000036) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={@mcast1, @local, @local, 0x0, 0x0, 0x0, 0x200800000000114}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x21, r0, 0x0, 0x0) 16:51:08 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x17a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x6674}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, 0x0, &(0x7f0000000280)='asymmetric\x00', &(0x7f0000000340)='!selinuxselinux\x00') 16:51:08 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) keyctl$restrict_keyring(0x1d, r0, &(0x7f0000000280)='asymmetric\x00', &(0x7f0000000340)='!selinuxselinux\x00') 16:51:08 executing program 4: r0 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000240)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$restrict_keyring(0x1d, r0, &(0x7f0000000280)='asymmetric\x00', &(0x7f0000000340)='!selinuxselinux\x00') 16:51:08 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000240)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$restrict_keyring(0x1d, 0x0, &(0x7f0000000280)='asymmetric\x00', &(0x7f0000000340)='!selinuxselinux\x00') 16:51:08 executing program 3: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000b00)) mount(&(0x7f00000004c0)=ANY=[], &(0x7f000000aff8)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000000)) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000000c0)='tls\x00', 0x4) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$void(r1, 0x5450) renameat2(r0, &(0x7f0000000180)='./file0/file0\x00', 0xffffffffffffffff, 0x0, 0x4) shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@dev, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@remote}}, 0x0) ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, 0x0) shmctl$IPC_SET(0x0, 0x1, 0x0) ioctl$PIO_FONT(r0, 0x4b61, &(0x7f0000000740)="9d705183203ecbbfc0d13a4e30241f7ce01b0b4d7682444a507bfc1ac414339f479986467eb40c8065891e1fbbe7263212c5c09bb47896b3d85893f1173f8a139c116f876fdcc1779bffef8c34b5958981616cbcf39f2d8b43491de452d774a74c3ae9555a45180f7d68da36975781ba3a24694ac85eea975ca104181420baf7f3b9614203b0360e7cc29a1c109e") chdir(&(0x7f0000000340)='./file0\x00') symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) umount2(&(0x7f0000000380)='./file0\x00', 0x3) openat$uinput(0xffffffffffffff9c, &(0x7f0000000440)='/dev/uinput\x00', 0x802, 0x0) r3 = syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') sendmsg$FOU_CMD_DEL(r1, &(0x7f00000002c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x28, r3, 0x200, 0x70bd25, 0x25dfdbfe, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e24}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x7f}]}, 0x28}}, 0x24048010) sendmsg$kcm(r0, &(0x7f0000000a40)={&(0x7f0000000580)=@ll={0x11, 0xfd, r2, 0x1, 0x8, 0x6, @dev={[], 0x16}}, 0x80, &(0x7f00000009c0)=[{&(0x7f00000008c0)="367a9f0d4a1564359d1e668c63869bb9bf3b7f5aa4030462889dd6407207295cea1b36e07bc2b38b11c6ca28a73515cf52d89a8199d5c019de826c756a31bac24f707efcfc0a2383216dccc08f804551f0a56d2c9ab95a113fa74dff88ccccc7f278200aa03d2349e688b69191611739bb3e2e5ff110c5858c1a7c5bd5431f9c8e73a99236728f125d5f52a2b0761872fc0fc53cda5458241b2a80fd918b21c8029039d416a6cde6aa786bdfaa21a4e5ffa5f80dec422e0051c7e98a8cff2f4afbe25ca5a154a57c10", 0xc9}], 0x1}, 0x4004000) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000001c0)={0x0, 0x4, 0x2, 0x3, 0x1}, 0x14) ioctl$VIDIOC_SUBDEV_S_SELECTION(r0, 0xc040563e, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x7) msgget(0x1, 0x318) syz_genetlink_get_family_id$team(&(0x7f0000000400)='team\x00') 16:51:08 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x17a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x6674}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, 0x0, &(0x7f0000000280)='asymmetric\x00', &(0x7f0000000340)='!selinuxselinux\x00') 16:51:08 executing program 2: r0 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'hsr0\x00', 0x0}) bind$packet(r0, &(0x7f0000000340)={0x11, 0x0, r1}, 0x14) sendto(r0, &(0x7f00000000c0)="e360b641b37f00000e0000000066", 0xe, 0x0, 0x0, 0x0) 16:51:08 executing program 0: r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x4000000000000036) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={@mcast1, @local, @local, 0x0, 0x0, 0x0, 0x200800000000114}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x21, r0, 0x0, 0x0) 16:51:08 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000240)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$restrict_keyring(0x1d, 0x0, &(0x7f0000000280)='asymmetric\x00', &(0x7f0000000340)='!selinuxselinux\x00') 16:51:08 executing program 4: r0 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000240)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$restrict_keyring(0x1d, r0, &(0x7f0000000280)='asymmetric\x00', &(0x7f0000000340)='!selinuxselinux\x00') 16:51:08 executing program 1: r0 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000240)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$restrict_keyring(0x1d, r0, &(0x7f0000000280)='asymmetric\x00', &(0x7f0000000340)='!selinuxselinux\x00') 16:51:08 executing program 0: r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x4000000000000036) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={@mcast1, @local, @local, 0x0, 0x0, 0x0, 0x200800000000114}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x21, r0, 0x0, 0x0) 16:51:09 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000240)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$restrict_keyring(0x1d, 0x0, &(0x7f0000000280)='asymmetric\x00', &(0x7f0000000340)='!selinuxselinux\x00') 16:51:09 executing program 2: r0 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'hsr0\x00', 0x0}) bind$packet(r0, &(0x7f0000000340)={0x11, 0x0, r1}, 0x14) sendto(r0, &(0x7f00000000c0)="e360b641b37f0000034000000066", 0xe, 0x0, 0x0, 0x0) 16:51:09 executing program 1: r0 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000240)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$restrict_keyring(0x1d, r0, &(0x7f0000000280)='asymmetric\x00', &(0x7f0000000340)='!selinuxselinux\x00') 16:51:09 executing program 4: r0 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000240)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$restrict_keyring(0x1d, r0, &(0x7f0000000280)='asymmetric\x00', &(0x7f0000000340)='!selinuxselinux\x00') [ 373.370825] cgroup: fork rejected by pids controller in /syz3 16:51:09 executing program 3: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000b00)) mount(&(0x7f00000004c0)=ANY=[], &(0x7f000000aff8)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000000)) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000000c0)='tls\x00', 0x4) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$void(r1, 0x5450) renameat2(r0, &(0x7f0000000180)='./file0/file0\x00', 0xffffffffffffffff, 0x0, 0x4) shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@dev, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@remote}}, 0x0) ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, 0x0) shmctl$IPC_SET(0x0, 0x1, 0x0) ioctl$PIO_FONT(r0, 0x4b61, &(0x7f0000000740)="9d705183203ecbbfc0d13a4e30241f7ce01b0b4d7682444a507bfc1ac414339f479986467eb40c8065891e1fbbe7263212c5c09bb47896b3d85893f1173f8a139c116f876fdcc1779bffef8c34b5958981616cbcf39f2d8b43491de452d774a74c3ae9555a45180f7d68da36975781ba3a24694ac85eea975ca104181420baf7f3b9614203b0360e7cc29a1c109e") chdir(&(0x7f0000000340)='./file0\x00') symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) umount2(&(0x7f0000000380)='./file0\x00', 0x3) openat$uinput(0xffffffffffffff9c, &(0x7f0000000440)='/dev/uinput\x00', 0x802, 0x0) r3 = syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') sendmsg$FOU_CMD_DEL(r1, &(0x7f00000002c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x28, r3, 0x200, 0x70bd25, 0x25dfdbfe, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e24}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x7f}]}, 0x28}}, 0x24048010) sendmsg$kcm(r0, &(0x7f0000000a40)={&(0x7f0000000580)=@ll={0x11, 0xfd, r2, 0x1, 0x8, 0x6, @dev={[], 0x16}}, 0x80, &(0x7f00000009c0)=[{&(0x7f00000008c0)="367a9f0d4a1564359d1e668c63869bb9bf3b7f5aa4030462889dd6407207295cea1b36e07bc2b38b11c6ca28a73515cf52d89a8199d5c019de826c756a31bac24f707efcfc0a2383216dccc08f804551f0a56d2c9ab95a113fa74dff88ccccc7f278200aa03d2349e688b69191611739bb3e2e5ff110c5858c1a7c5bd5431f9c8e73a99236728f125d5f52a2b0761872fc0fc53cda5458241b2a80fd918b21c8029039d416a6cde6aa786bdfaa21a4e5ffa5f80dec422e0051c7e98a8cff2f4afbe25ca5a154a57c10", 0xc9}], 0x1}, 0x4004000) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000001c0)={0x0, 0x4, 0x2, 0x3, 0x1}, 0x14) ioctl$VIDIOC_SUBDEV_S_SELECTION(r0, 0xc040563e, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x7) msgget(0x1, 0x318) syz_genetlink_get_family_id$team(&(0x7f0000000400)='team\x00') 16:51:09 executing program 0: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x4000000000000036) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={@mcast1, @local, @local, 0x0, 0x0, 0x0, 0x200800000000114}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x21, r0, 0x0, 0x0) 16:51:09 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000240)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$restrict_keyring(0x1d, r0, 0x0, &(0x7f0000000340)='!selinuxselinux\x00') 16:51:09 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000240)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$restrict_keyring(0x1d, r0, &(0x7f0000000280)='asymmetric\x00', &(0x7f0000000340)='!selinuxselinux\x00') 16:51:09 executing program 1: r0 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000240)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$restrict_keyring(0x1d, r0, &(0x7f0000000280)='asymmetric\x00', &(0x7f0000000340)='!selinuxselinux\x00') 16:51:09 executing program 2: r0 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'hsr0\x00', 0x0}) bind$packet(r0, &(0x7f0000000340)={0x11, 0x0, r1}, 0x14) sendto(r0, &(0x7f00000000c0)="e360b641b37f00000a0000000066", 0xe, 0x0, 0x0, 0x0) 16:51:09 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000240)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$restrict_keyring(0x1d, r0, 0x0, &(0x7f0000000340)='!selinuxselinux\x00') 16:51:09 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000240)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$restrict_keyring(0x1d, r0, &(0x7f0000000280)='asymmetric\x00', &(0x7f0000000340)='!selinuxselinux\x00') 16:51:09 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000240)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$restrict_keyring(0x1d, r0, &(0x7f0000000280)='asymmetric\x00', &(0x7f0000000340)='!selinuxselinux\x00') 16:51:09 executing program 0: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x4000000000000036) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={@mcast1, @local, @local, 0x0, 0x0, 0x0, 0x200800000000114}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x21, r0, 0x0, 0x0) 16:51:09 executing program 2: r0 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'hsr0\x00', 0x0}) bind$packet(r0, &(0x7f0000000340)={0x11, 0x0, r1}, 0x14) sendto(r0, &(0x7f00000000c0)="e360b641b37f0088caffff000066", 0xe, 0x0, 0x0, 0x0) 16:51:09 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000240)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$restrict_keyring(0x1d, r0, 0x0, &(0x7f0000000340)='!selinuxselinux\x00') 16:51:09 executing program 3: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000b00)) mount(&(0x7f00000004c0)=ANY=[], &(0x7f000000aff8)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000000)) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000000c0)='tls\x00', 0x4) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$void(r1, 0x5450) renameat2(r0, &(0x7f0000000180)='./file0/file0\x00', 0xffffffffffffffff, 0x0, 0x4) shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@dev, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@remote}}, 0x0) ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, 0x0) shmctl$IPC_SET(0x0, 0x1, 0x0) ioctl$PIO_FONT(r0, 0x4b61, &(0x7f0000000740)="9d705183203ecbbfc0d13a4e30241f7ce01b0b4d7682444a507bfc1ac414339f479986467eb40c8065891e1fbbe7263212c5c09bb47896b3d85893f1173f8a139c116f876fdcc1779bffef8c34b5958981616cbcf39f2d8b43491de452d774a74c3ae9555a45180f7d68da36975781ba3a24694ac85eea975ca104181420baf7f3b9614203b0360e7cc29a1c109e") chdir(&(0x7f0000000340)='./file0\x00') symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) umount2(0x0, 0x3) openat$uinput(0xffffffffffffff9c, &(0x7f0000000440)='/dev/uinput\x00', 0x802, 0x0) r3 = syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') sendmsg$FOU_CMD_DEL(r1, &(0x7f00000002c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x28, r3, 0x200, 0x70bd25, 0x25dfdbfe, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e24}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x7f}]}, 0x28}}, 0x24048010) sendmsg$kcm(r0, &(0x7f0000000a40)={&(0x7f0000000580)=@ll={0x11, 0xfd, r2, 0x1, 0x8, 0x6, @dev={[], 0x16}}, 0x80, &(0x7f00000009c0)=[{&(0x7f00000008c0)="367a9f0d4a1564359d1e668c63869bb9bf3b7f5aa4030462889dd6407207295cea1b36e07bc2b38b11c6ca28a73515cf52d89a8199d5c019de826c756a31bac24f707efcfc0a2383216dccc08f804551f0a56d2c9ab95a113fa74dff88ccccc7f278200aa03d2349e688b69191611739bb3e2e5ff110c5858c1a7c5bd5431f9c8e73a99236728f125d5f52a2b0761872fc0fc53cda5458241b2a80fd918b21c8029039d416a6cde6aa786bdfaa21a4e5ffa5f80dec422e0051c7e98a8cff2f4afbe25ca5a154a57c10", 0xc9}], 0x1}, 0x4004000) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000001c0)={0x0, 0x4, 0x2, 0x3, 0x1}, 0x14) ioctl$VIDIOC_SUBDEV_S_SELECTION(r0, 0xc040563e, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x7) msgget(0x1, 0x318) syz_genetlink_get_family_id$team(&(0x7f0000000400)='team\x00') 16:51:09 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000240)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$restrict_keyring(0x1d, r0, &(0x7f0000000280)='asymmetric\x00', &(0x7f0000000340)='!selinuxselinux\x00') 16:51:09 executing program 2: r0 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'hsr0\x00', 0x0}) bind$packet(r0, &(0x7f0000000340)={0x11, 0x0, r1}, 0x14) sendto(r0, &(0x7f00000000c0)="e360b641b37f0000000689000066", 0xe, 0x0, 0x0, 0x0) 16:51:09 executing program 0: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x4000000000000036) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={@mcast1, @local, @local, 0x0, 0x0, 0x0, 0x200800000000114}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x21, r0, 0x0, 0x0) 16:51:09 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000240)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$restrict_keyring(0x1d, r0, &(0x7f0000000280)='asymmetric\x00', &(0x7f0000000340)='!selinuxselinux\x00') 16:51:09 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000240)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$restrict_keyring(0x1d, r0, &(0x7f0000000280)='asymmetric\x00', 0x0) [ 374.110297] net_ratelimit: 22 callbacks suppressed [ 374.110305] protocol 88fb is buggy, dev hsr_slave_0 [ 374.120548] protocol 88fb is buggy, dev hsr_slave_1 16:51:10 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000240)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$restrict_keyring(0x1d, r0, &(0x7f0000000280)='asymmetric\x00', &(0x7f0000000340)='!selinuxselinux\x00') 16:51:10 executing program 4: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x6674}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000240)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$restrict_keyring(0x1d, r0, &(0x7f0000000280)='asymmetric\x00', &(0x7f0000000340)='!selinuxselinux\x00') [ 374.190277] protocol 88fb is buggy, dev hsr_slave_0 [ 374.195409] protocol 88fb is buggy, dev hsr_slave_1 16:51:10 executing program 1: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x17a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x6674}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000240)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$restrict_keyring(0x1d, r0, &(0x7f0000000280)='asymmetric\x00', &(0x7f0000000340)='!selinuxselinux\x00') 16:51:10 executing program 2: r0 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'hsr0\x00', 0x0}) bind$packet(r0, &(0x7f0000000340)={0x11, 0x0, r1}, 0x14) sendto(r0, &(0x7f00000000c0)="e360b641b37f0000005865000066", 0xe, 0x0, 0x0, 0x0) 16:51:10 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000240)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$restrict_keyring(0x1d, r0, &(0x7f0000000280)='asymmetric\x00', 0x0) 16:51:10 executing program 4: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x6674}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000240)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$restrict_keyring(0x1d, r0, &(0x7f0000000280)='asymmetric\x00', &(0x7f0000000340)='!selinuxselinux\x00') [ 374.430295] protocol 88fb is buggy, dev hsr_slave_0 [ 374.435434] protocol 88fb is buggy, dev hsr_slave_1 [ 374.510432] protocol 88fb is buggy, dev hsr_slave_0 [ 374.515610] protocol 88fb is buggy, dev hsr_slave_1 16:51:10 executing program 3: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000b00)) mount(&(0x7f00000004c0)=ANY=[], &(0x7f000000aff8)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000000)) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000000c0)='tls\x00', 0x4) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$void(r1, 0x5450) renameat2(r0, &(0x7f0000000180)='./file0/file0\x00', 0xffffffffffffffff, 0x0, 0x4) shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@dev, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@remote}}, 0x0) ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, 0x0) shmctl$IPC_SET(0x0, 0x1, 0x0) ioctl$PIO_FONT(r0, 0x4b61, &(0x7f0000000740)="9d705183203ecbbfc0d13a4e30241f7ce01b0b4d7682444a507bfc1ac414339f479986467eb40c8065891e1fbbe7263212c5c09bb47896b3d85893f1173f8a139c116f876fdcc1779bffef8c34b5958981616cbcf39f2d8b43491de452d774a74c3ae9555a45180f7d68da36975781ba3a24694ac85eea975ca104181420baf7f3b9614203b0360e7cc29a1c109e") chdir(&(0x7f0000000340)='./file0\x00') symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) umount2(&(0x7f0000000380)='./file0\x00', 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000440)='/dev/uinput\x00', 0x802, 0x0) r3 = syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') sendmsg$FOU_CMD_DEL(r1, &(0x7f00000002c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x28, r3, 0x200, 0x70bd25, 0x25dfdbfe, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e24}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x7f}]}, 0x28}}, 0x24048010) sendmsg$kcm(r0, &(0x7f0000000a40)={&(0x7f0000000580)=@ll={0x11, 0xfd, r2, 0x1, 0x8, 0x6, @dev={[], 0x16}}, 0x80, &(0x7f00000009c0)=[{&(0x7f00000008c0)="367a9f0d4a1564359d1e668c63869bb9bf3b7f5aa4030462889dd6407207295cea1b36e07bc2b38b11c6ca28a73515cf52d89a8199d5c019de826c756a31bac24f707efcfc0a2383216dccc08f804551f0a56d2c9ab95a113fa74dff88ccccc7f278200aa03d2349e688b69191611739bb3e2e5ff110c5858c1a7c5bd5431f9c8e73a99236728f125d5f52a2b0761872fc0fc53cda5458241b2a80fd918b21c8029039d416a6cde6aa786bdfaa21a4e5ffa5f80dec422e0051c7e98a8cff2f4afbe25ca5a154a57c10", 0xc9}], 0x1}, 0x4004000) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000001c0)={0x0, 0x4, 0x2, 0x3, 0x1}, 0x14) ioctl$VIDIOC_SUBDEV_S_SELECTION(r0, 0xc040563e, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x7) msgget(0x1, 0x318) syz_genetlink_get_family_id$team(&(0x7f0000000400)='team\x00') 16:51:10 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x4000000000000036) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={@mcast1, @local, @local, 0x0, 0x0, 0x0, 0x200800000000114}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x21, r0, 0x0, 0x0) 16:51:10 executing program 1: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x17a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x6674}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000240)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$restrict_keyring(0x1d, r0, &(0x7f0000000280)='asymmetric\x00', &(0x7f0000000340)='!selinuxselinux\x00') 16:51:10 executing program 2: r0 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'hsr0\x00', 0x0}) bind$packet(r0, &(0x7f0000000340)={0x11, 0x0, r1}, 0x14) sendto(r0, &(0x7f00000000c0)="e360b641b37f00000001f4000066", 0xe, 0x0, 0x0, 0x0) 16:51:10 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000240)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$restrict_keyring(0x1d, r0, &(0x7f0000000280)='asymmetric\x00', 0x0) 16:51:10 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x4000000000000036) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={@mcast1, @local, @local, 0x0, 0x0, 0x0, 0x200800000000114}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x21, r0, 0x0, 0x0) 16:51:10 executing program 4: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x6674}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000240)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$restrict_keyring(0x1d, r0, &(0x7f0000000280)='asymmetric\x00', &(0x7f0000000340)='!selinuxselinux\x00') 16:51:10 executing program 1: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x17a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x6674}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000240)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$restrict_keyring(0x1d, r0, &(0x7f0000000280)='asymmetric\x00', &(0x7f0000000340)='!selinuxselinux\x00') 16:51:10 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000240)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$restrict_keyring(0x1d, r0, 0x0, &(0x7f0000000340)='!selinuxselinux\x00') 16:51:10 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x4000000000000036) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={@mcast1, @local, @local, 0x0, 0x0, 0x0, 0x200800000000114}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x21, r0, 0x0, 0x0) 16:51:10 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x6674}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000240)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$restrict_keyring(0x1d, r0, &(0x7f0000000280)='asymmetric\x00', &(0x7f0000000340)='!selinuxselinux\x00') 16:51:10 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0xffffffffffffffff, r0, 0x0, 0x0) tkill(r0, 0x4000000000000036) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={@mcast1, @local, @local, 0x0, 0x0, 0x0, 0x200800000000114}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x21, r0, 0x0, 0x0) 16:51:10 executing program 2: r0 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'hsr0\x00', 0x0}) bind$packet(r0, &(0x7f0000000340)={0x11, 0x0, r1}, 0x14) sendto(r0, &(0x7f00000000c0)="e360b641b37f000e000000000066", 0xe, 0x0, 0x0, 0x0) 16:51:10 executing program 3: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000b00)) mount(&(0x7f00000004c0)=ANY=[], &(0x7f000000aff8)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000000)) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000000c0)='tls\x00', 0x4) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$void(r1, 0x5450) renameat2(r0, &(0x7f0000000180)='./file0/file0\x00', 0xffffffffffffffff, 0x0, 0x4) shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@dev, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@remote}}, 0x0) ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, 0x0) shmctl$IPC_SET(0x0, 0x1, 0x0) ioctl$PIO_FONT(r0, 0x4b61, &(0x7f0000000740)="9d705183203ecbbfc0d13a4e30241f7ce01b0b4d7682444a507bfc1ac414339f479986467eb40c8065891e1fbbe7263212c5c09bb47896b3d85893f1173f8a139c116f876fdcc1779bffef8c34b5958981616cbcf39f2d8b43491de452d774a74c3ae9555a45180f7d68da36975781ba3a24694ac85eea975ca104181420baf7f3b9614203b0360e7cc29a1c109e") chdir(&(0x7f0000000340)='./file0\x00') symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) umount2(&(0x7f0000000380)='./file0\x00', 0x3) openat$uinput(0xffffffffffffff9c, 0x0, 0x802, 0x0) r3 = syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') sendmsg$FOU_CMD_DEL(r1, &(0x7f00000002c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x28, r3, 0x200, 0x70bd25, 0x25dfdbfe, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e24}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x7f}]}, 0x28}}, 0x24048010) sendmsg$kcm(r0, &(0x7f0000000a40)={&(0x7f0000000580)=@ll={0x11, 0xfd, r2, 0x1, 0x8, 0x6, @dev={[], 0x16}}, 0x80, &(0x7f00000009c0)=[{&(0x7f00000008c0)="367a9f0d4a1564359d1e668c63869bb9bf3b7f5aa4030462889dd6407207295cea1b36e07bc2b38b11c6ca28a73515cf52d89a8199d5c019de826c756a31bac24f707efcfc0a2383216dccc08f804551f0a56d2c9ab95a113fa74dff88ccccc7f278200aa03d2349e688b69191611739bb3e2e5ff110c5858c1a7c5bd5431f9c8e73a99236728f125d5f52a2b0761872fc0fc53cda5458241b2a80fd918b21c8029039d416a6cde6aa786bdfaa21a4e5ffa5f80dec422e0051c7e98a8cff2f4afbe25ca5a154a57c10", 0xc9}], 0x1}, 0x4004000) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000001c0)={0x0, 0x4, 0x2, 0x3, 0x1}, 0x14) ioctl$VIDIOC_SUBDEV_S_SELECTION(r0, 0xc040563e, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x7) msgget(0x1, 0x318) syz_genetlink_get_family_id$team(&(0x7f0000000400)='team\x00') 16:51:10 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x17a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x6674}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000240)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$restrict_keyring(0x1d, r0, &(0x7f0000000280)='asymmetric\x00', &(0x7f0000000340)='!selinuxselinux\x00') [ 374.910271] protocol 88fb is buggy, dev hsr_slave_0 [ 374.915409] protocol 88fb is buggy, dev hsr_slave_1 16:51:10 executing program 5: munmap(&(0x7f0000551000/0x2000)=nil, 0x2000) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, 0x0) ioctl$EVIOCGPROP(r0, 0x40047438, &(0x7f0000000100)=""/246) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) 16:51:10 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0xffffffffffffffff, r0, 0x0, 0x0) tkill(r0, 0x4000000000000036) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={@mcast1, @local, @local, 0x0, 0x0, 0x0, 0x200800000000114}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x21, r0, 0x0, 0x0) 16:51:10 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x17a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x6674}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000240)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$restrict_keyring(0x1d, r0, &(0x7f0000000280)='asymmetric\x00', &(0x7f0000000340)='!selinuxselinux\x00') 16:51:10 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0xffffffffffffffff, r0, 0x0, 0x0) tkill(r0, 0x4000000000000036) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={@mcast1, @local, @local, 0x0, 0x0, 0x0, 0x200800000000114}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x21, r0, 0x0, 0x0) 16:51:10 executing program 2: r0 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'hsr0\x00', 0x0}) bind$packet(r0, &(0x7f0000000340)={0x11, 0x0, r1}, 0x14) sendto(r0, &(0x7f00000000c0)="e360b641b37f0000000006000066", 0xe, 0x0, 0x0, 0x0) 16:51:10 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x6674}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000240)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$restrict_keyring(0x1d, r0, &(0x7f0000000280)='asymmetric\x00', &(0x7f0000000340)='!selinuxselinux\x00') 16:51:10 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffff9c, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000140)=""/66, 0x42}], 0x1, &(0x7f0000000540)=""/79, 0x4f}}], 0x1, 0x0, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) writev(r1, &(0x7f00000000c0), 0x200000000000014c) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000140)={{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x2, @remote}, 0x608, [0x0, 0x0, 0x10001, 0x0, 0x2]}, 0x5c) bind$inet6(0xffffffffffffffff, &(0x7f0000ef8cfd)={0xa, 0x0, 0x0, @loopback}, 0x1c) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000380)=0x1e) syz_open_dev$ndb(&(0x7f0000000100)='/dev/nbd#\x00', 0x0, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, 0x0) read$eventfd(0xffffffffffffffff, &(0x7f0000000200), 0x8) 16:51:11 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x17a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x6674}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000240)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$restrict_keyring(0x1d, r0, &(0x7f0000000280)='asymmetric\x00', &(0x7f0000000340)='!selinuxselinux\x00') 16:51:11 executing program 3: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000b00)) mount(&(0x7f00000004c0)=ANY=[], &(0x7f000000aff8)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000000)) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000000c0)='tls\x00', 0x4) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$void(r1, 0x5450) renameat2(r0, &(0x7f0000000180)='./file0/file0\x00', 0xffffffffffffffff, 0x0, 0x4) shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@dev, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@remote}}, 0x0) ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, 0x0) shmctl$IPC_SET(0x0, 0x1, 0x0) ioctl$PIO_FONT(r0, 0x4b61, &(0x7f0000000740)="9d705183203ecbbfc0d13a4e30241f7ce01b0b4d7682444a507bfc1ac414339f479986467eb40c8065891e1fbbe7263212c5c09bb47896b3d85893f1173f8a139c116f876fdcc1779bffef8c34b5958981616cbcf39f2d8b43491de452d774a74c3ae9555a45180f7d68da36975781ba3a24694ac85eea975ca104181420baf7f3b9614203b0360e7cc29a1c109e") chdir(&(0x7f0000000340)='./file0\x00') symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) umount2(&(0x7f0000000380)='./file0\x00', 0x3) openat$uinput(0xffffffffffffff9c, &(0x7f0000000440)='/dev/uinput\x00', 0x0, 0x0) r3 = syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') sendmsg$FOU_CMD_DEL(r1, &(0x7f00000002c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x28, r3, 0x200, 0x70bd25, 0x25dfdbfe, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e24}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x7f}]}, 0x28}}, 0x24048010) sendmsg$kcm(r0, &(0x7f0000000a40)={&(0x7f0000000580)=@ll={0x11, 0xfd, r2, 0x1, 0x8, 0x6, @dev={[], 0x16}}, 0x80, &(0x7f00000009c0)=[{&(0x7f00000008c0)="367a9f0d4a1564359d1e668c63869bb9bf3b7f5aa4030462889dd6407207295cea1b36e07bc2b38b11c6ca28a73515cf52d89a8199d5c019de826c756a31bac24f707efcfc0a2383216dccc08f804551f0a56d2c9ab95a113fa74dff88ccccc7f278200aa03d2349e688b69191611739bb3e2e5ff110c5858c1a7c5bd5431f9c8e73a99236728f125d5f52a2b0761872fc0fc53cda5458241b2a80fd918b21c8029039d416a6cde6aa786bdfaa21a4e5ffa5f80dec422e0051c7e98a8cff2f4afbe25ca5a154a57c10", 0xc9}], 0x1}, 0x4004000) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000001c0)={0x0, 0x4, 0x2, 0x3, 0x1}, 0x14) ioctl$VIDIOC_SUBDEV_S_SELECTION(r0, 0xc040563e, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x7) msgget(0x1, 0x318) syz_genetlink_get_family_id$team(&(0x7f0000000400)='team\x00') 16:51:11 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(r0, 0x4000000000000036) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={@mcast1, @local, @local, 0x0, 0x0, 0x0, 0x200800000000114}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x21, r0, 0x0, 0x0) 16:51:11 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x6674}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000240)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$restrict_keyring(0x1d, r0, &(0x7f0000000280)='asymmetric\x00', &(0x7f0000000340)='!selinuxselinux\x00') 16:51:11 executing program 2: r0 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'hsr0\x00', 0x0}) bind$packet(r0, &(0x7f0000000340)={0x11, 0x0, r1}, 0x14) sendto(r0, &(0x7f00000000c0)="e360b641b37f0000000081000066", 0xe, 0x0, 0x0, 0x0) 16:51:11 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(r0, 0x4000000000000036) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={@mcast1, @local, @local, 0x0, 0x0, 0x0, 0x200800000000114}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x21, r0, 0x0, 0x0) 16:51:11 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x17a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x6674}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000240)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$restrict_keyring(0x1d, r0, &(0x7f0000000280)='asymmetric\x00', &(0x7f0000000340)='!selinuxselinux\x00') 16:51:11 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x6674}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000240)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$restrict_keyring(0x1d, r0, &(0x7f0000000280)='asymmetric\x00', &(0x7f0000000340)='!selinuxselinux\x00') 16:51:11 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(r0, 0x4000000000000036) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={@mcast1, @local, @local, 0x0, 0x0, 0x0, 0x200800000000114}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x21, r0, 0x0, 0x0) 16:51:11 executing program 2: r0 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'hsr0\x00', 0x0}) bind$packet(r0, &(0x7f0000000340)={0x11, 0x0, r1}, 0x14) sendto(r0, &(0x7f00000000c0)="e360b641b37f0000004788000066", 0xe, 0x0, 0x0, 0x0) 16:51:11 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(0x0, 0x4000000000000036) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={@mcast1, @local, @local, 0x0, 0x0, 0x0, 0x200800000000114}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x21, r0, 0x0, 0x0) 16:51:11 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffff9c, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000140)=""/66, 0x42}], 0x1, &(0x7f0000000540)=""/79, 0x4f}}], 0x1, 0x0, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) writev(r1, &(0x7f00000000c0), 0x200000000000014c) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000140)={{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x2, @remote}, 0x608, [0x0, 0x0, 0x10001, 0x0, 0x2]}, 0x5c) bind$inet6(0xffffffffffffffff, &(0x7f0000ef8cfd)={0xa, 0x0, 0x0, @loopback}, 0x1c) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000380)=0x1e) syz_open_dev$ndb(&(0x7f0000000100)='/dev/nbd#\x00', 0x0, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, 0x0) read$eventfd(0xffffffffffffffff, &(0x7f0000000200), 0x8) 16:51:11 executing program 3: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000b00)) mount(&(0x7f00000004c0)=ANY=[], &(0x7f000000aff8)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000000)) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000000c0)='tls\x00', 0x4) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$void(r1, 0x5450) renameat2(r0, &(0x7f0000000180)='./file0/file0\x00', 0xffffffffffffffff, 0x0, 0x4) shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@dev, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@remote}}, 0x0) ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, 0x0) shmctl$IPC_SET(0x0, 0x1, 0x0) ioctl$PIO_FONT(r0, 0x4b61, &(0x7f0000000740)="9d705183203ecbbfc0d13a4e30241f7ce01b0b4d7682444a507bfc1ac414339f479986467eb40c8065891e1fbbe7263212c5c09bb47896b3d85893f1173f8a139c116f876fdcc1779bffef8c34b5958981616cbcf39f2d8b43491de452d774a74c3ae9555a45180f7d68da36975781ba3a24694ac85eea975ca104181420baf7f3b9614203b0360e7cc29a1c109e") chdir(&(0x7f0000000340)='./file0\x00') symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) umount2(&(0x7f0000000380)='./file0\x00', 0x3) openat$uinput(0xffffffffffffff9c, &(0x7f0000000440)='/dev/uinput\x00', 0x802, 0x0) r3 = syz_genetlink_get_family_id$fou(0x0) sendmsg$FOU_CMD_DEL(r1, &(0x7f00000002c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x28, r3, 0x200, 0x70bd25, 0x25dfdbfe, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e24}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x7f}]}, 0x28}}, 0x24048010) sendmsg$kcm(r0, &(0x7f0000000a40)={&(0x7f0000000580)=@ll={0x11, 0xfd, r2, 0x1, 0x8, 0x6, @dev={[], 0x16}}, 0x80, &(0x7f00000009c0)=[{&(0x7f00000008c0)="367a9f0d4a1564359d1e668c63869bb9bf3b7f5aa4030462889dd6407207295cea1b36e07bc2b38b11c6ca28a73515cf52d89a8199d5c019de826c756a31bac24f707efcfc0a2383216dccc08f804551f0a56d2c9ab95a113fa74dff88ccccc7f278200aa03d2349e688b69191611739bb3e2e5ff110c5858c1a7c5bd5431f9c8e73a99236728f125d5f52a2b0761872fc0fc53cda5458241b2a80fd918b21c8029039d416a6cde6aa786bdfaa21a4e5ffa5f80dec422e0051c7e98a8cff2f4afbe25ca5a154a57c10", 0xc9}], 0x1}, 0x4004000) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000001c0)={0x0, 0x4, 0x2, 0x3, 0x1}, 0x14) ioctl$VIDIOC_SUBDEV_S_SELECTION(r0, 0xc040563e, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x7) msgget(0x1, 0x318) syz_genetlink_get_family_id$team(&(0x7f0000000400)='team\x00') 16:51:11 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x6674}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000240)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$restrict_keyring(0x1d, r0, &(0x7f0000000280)='asymmetric\x00', &(0x7f0000000340)='!selinuxselinux\x00') 16:51:11 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x17a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x6674}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000240)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$restrict_keyring(0x1d, r0, &(0x7f0000000280)='asymmetric\x00', &(0x7f0000000340)='!selinuxselinux\x00') 16:51:11 executing program 2: r0 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'hsr0\x00', 0x0}) bind$packet(r0, &(0x7f0000000340)={0x11, 0x0, r1}, 0x14) sendto(r0, &(0x7f00000000c0)="e360b641b37f0035800000000066", 0xe, 0x0, 0x0, 0x0) 16:51:11 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x6674}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000240)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$restrict_keyring(0x1d, r0, &(0x7f0000000280)='asymmetric\x00', &(0x7f0000000340)='!selinuxselinux\x00') 16:51:11 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000240)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$restrict_keyring(0x1d, r0, &(0x7f0000000280)='asymmetric\x00', &(0x7f0000000340)='!selinuxselinux\x00') 16:51:11 executing program 2: r0 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'hsr0\x00', 0x0}) bind$packet(r0, &(0x7f0000000340)={0x11, 0x0, r1}, 0x14) sendto(r0, &(0x7f00000000c0)="e360b641b37f0011000000000066", 0xe, 0x0, 0x0, 0x0) 16:51:11 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000240)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$restrict_keyring(0x1d, r0, &(0x7f0000000280)='asymmetric\x00', &(0x7f0000000340)='!selinuxselinux\x00') 16:51:11 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x6674}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000240)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$restrict_keyring(0x1d, r0, &(0x7f0000000280)='asymmetric\x00', &(0x7f0000000340)='!selinuxselinux\x00') 16:51:12 executing program 3: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000b00)) mount(&(0x7f00000004c0)=ANY=[], &(0x7f000000aff8)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000000)) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000000c0)='tls\x00', 0x4) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$void(r1, 0x5450) renameat2(r0, &(0x7f0000000180)='./file0/file0\x00', 0xffffffffffffffff, 0x0, 0x4) shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@dev, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@remote}}, 0x0) ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, 0x0) shmctl$IPC_SET(0x0, 0x1, 0x0) ioctl$PIO_FONT(r0, 0x4b61, &(0x7f0000000740)="9d705183203ecbbfc0d13a4e30241f7ce01b0b4d7682444a507bfc1ac414339f479986467eb40c8065891e1fbbe7263212c5c09bb47896b3d85893f1173f8a139c116f876fdcc1779bffef8c34b5958981616cbcf39f2d8b43491de452d774a74c3ae9555a45180f7d68da36975781ba3a24694ac85eea975ca104181420baf7f3b9614203b0360e7cc29a1c109e") chdir(&(0x7f0000000340)='./file0\x00') symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) umount2(&(0x7f0000000380)='./file0\x00', 0x3) openat$uinput(0xffffffffffffff9c, &(0x7f0000000440)='/dev/uinput\x00', 0x802, 0x0) r3 = syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x28, r3, 0x200, 0x70bd25, 0x25dfdbfe, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e24}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x7f}]}, 0x28}}, 0x24048010) sendmsg$kcm(r0, &(0x7f0000000a40)={&(0x7f0000000580)=@ll={0x11, 0xfd, r2, 0x1, 0x8, 0x6, @dev={[], 0x16}}, 0x80, &(0x7f00000009c0)=[{&(0x7f00000008c0)="367a9f0d4a1564359d1e668c63869bb9bf3b7f5aa4030462889dd6407207295cea1b36e07bc2b38b11c6ca28a73515cf52d89a8199d5c019de826c756a31bac24f707efcfc0a2383216dccc08f804551f0a56d2c9ab95a113fa74dff88ccccc7f278200aa03d2349e688b69191611739bb3e2e5ff110c5858c1a7c5bd5431f9c8e73a99236728f125d5f52a2b0761872fc0fc53cda5458241b2a80fd918b21c8029039d416a6cde6aa786bdfaa21a4e5ffa5f80dec422e0051c7e98a8cff2f4afbe25ca5a154a57c10", 0xc9}], 0x1}, 0x4004000) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000001c0)={0x0, 0x4, 0x2, 0x3, 0x1}, 0x14) ioctl$VIDIOC_SUBDEV_S_SELECTION(r0, 0xc040563e, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x7) msgget(0x1, 0x318) syz_genetlink_get_family_id$team(&(0x7f0000000400)='team\x00') 16:51:14 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(0x0, 0x4000000000000036) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={@mcast1, @local, @local, 0x0, 0x0, 0x0, 0x200800000000114}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x21, r0, 0x0, 0x0) 16:51:14 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(0x0, &(0x7f0000000240)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$restrict_keyring(0x1d, r0, &(0x7f0000000280)='asymmetric\x00', &(0x7f0000000340)='!selinuxselinux\x00') 16:51:14 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000240)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$restrict_keyring(0x1d, r0, &(0x7f0000000280)='asymmetric\x00', &(0x7f0000000340)='!selinuxselinux\x00') 16:51:14 executing program 2: r0 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'hsr0\x00', 0x0}) bind$packet(r0, &(0x7f0000000340)={0x11, 0x0, r1}, 0x14) sendto(r0, &(0x7f00000000c0)="e360b641b37f0089060000000066", 0xe, 0x0, 0x0, 0x0) 16:51:14 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffff9c, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000140)=""/66, 0x42}], 0x1, &(0x7f0000000540)=""/79, 0x4f}}], 0x1, 0x0, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) writev(r1, &(0x7f00000000c0), 0x200000000000014c) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000140)={{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x2, @remote}, 0x608, [0x0, 0x0, 0x10001, 0x0, 0x2]}, 0x5c) bind$inet6(0xffffffffffffffff, &(0x7f0000ef8cfd)={0xa, 0x0, 0x0, @loopback}, 0x1c) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000380)=0x1e) syz_open_dev$ndb(&(0x7f0000000100)='/dev/nbd#\x00', 0x0, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, 0x0) read$eventfd(0xffffffffffffffff, &(0x7f0000000200), 0x8) 16:51:14 executing program 3: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000b00)) mount(&(0x7f00000004c0)=ANY=[], &(0x7f000000aff8)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000000)) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000000c0)='tls\x00', 0x4) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$void(r1, 0x5450) renameat2(r0, &(0x7f0000000180)='./file0/file0\x00', 0xffffffffffffffff, 0x0, 0x4) shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@dev, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@remote}}, 0x0) ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, 0x0) shmctl$IPC_SET(0x0, 0x1, 0x0) ioctl$PIO_FONT(r0, 0x4b61, &(0x7f0000000740)="9d705183203ecbbfc0d13a4e30241f7ce01b0b4d7682444a507bfc1ac414339f479986467eb40c8065891e1fbbe7263212c5c09bb47896b3d85893f1173f8a139c116f876fdcc1779bffef8c34b5958981616cbcf39f2d8b43491de452d774a74c3ae9555a45180f7d68da36975781ba3a24694ac85eea975ca104181420baf7f3b9614203b0360e7cc29a1c109e") chdir(&(0x7f0000000340)='./file0\x00') symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) umount2(&(0x7f0000000380)='./file0\x00', 0x3) openat$uinput(0xffffffffffffff9c, &(0x7f0000000440)='/dev/uinput\x00', 0x802, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') sendmsg$FOU_CMD_DEL(r1, 0x0, 0x24048010) sendmsg$kcm(r0, &(0x7f0000000a40)={&(0x7f0000000580)=@ll={0x11, 0xfd, r2, 0x1, 0x8, 0x6, @dev={[], 0x16}}, 0x80, &(0x7f00000009c0)=[{&(0x7f00000008c0)="367a9f0d4a1564359d1e668c63869bb9bf3b7f5aa4030462889dd6407207295cea1b36e07bc2b38b11c6ca28a73515cf52d89a8199d5c019de826c756a31bac24f707efcfc0a2383216dccc08f804551f0a56d2c9ab95a113fa74dff88ccccc7f278200aa03d2349e688b69191611739bb3e2e5ff110c5858c1a7c5bd5431f9c8e73a99236728f125d5f52a2b0761872fc0fc53cda5458241b2a80fd918b21c8029039d416a6cde6aa786bdfaa21a4e5ffa5f80dec422e0051c7e98a8cff2f4afbe25ca5a154a57c10", 0xc9}], 0x1}, 0x4004000) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000001c0)={0x0, 0x4, 0x2, 0x3, 0x1}, 0x14) ioctl$VIDIOC_SUBDEV_S_SELECTION(r0, 0xc040563e, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x7) msgget(0x1, 0x318) syz_genetlink_get_family_id$team(&(0x7f0000000400)='team\x00') 16:51:14 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(0x0, &(0x7f0000000240)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$restrict_keyring(0x1d, r0, &(0x7f0000000280)='asymmetric\x00', &(0x7f0000000340)='!selinuxselinux\x00') 16:51:14 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000240)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$restrict_keyring(0x1d, r0, &(0x7f0000000280)='asymmetric\x00', &(0x7f0000000340)='!selinuxselinux\x00') 16:51:14 executing program 2: r0 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'hsr0\x00', 0x0}) bind$packet(r0, &(0x7f0000000340)={0x11, 0x0, r1}, 0x14) sendto(r0, &(0x7f00000000c0)="e360b641b37f000000003f000066", 0xe, 0x0, 0x0, 0x0) 16:51:14 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(0x0, &(0x7f0000000240)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$restrict_keyring(0x1d, r0, &(0x7f0000000280)='asymmetric\x00', &(0x7f0000000340)='!selinuxselinux\x00') 16:51:14 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(0x0, 0x4000000000000036) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={@mcast1, @local, @local, 0x0, 0x0, 0x0, 0x200800000000114}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x21, r0, 0x0, 0x0) 16:51:14 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000240)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$restrict_keyring(0x1d, r0, &(0x7f0000000280)='asymmetric\x00', &(0x7f0000000340)='!selinuxselinux\x00') 16:51:14 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) keyctl$restrict_keyring(0x1d, r0, &(0x7f0000000280)='asymmetric\x00', &(0x7f0000000340)='!selinuxselinux\x00') 16:51:15 executing program 2: r0 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'hsr0\x00', 0x0}) bind$packet(r0, &(0x7f0000000340)={0x11, 0x0, r1}, 0x14) sendto(r0, &(0x7f00000000c0)="e360b641b37f000088a8ffff0066", 0xe, 0x0, 0x0, 0x0) 16:51:15 executing program 3: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000b00)) mount(&(0x7f00000004c0)=ANY=[], &(0x7f000000aff8)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000000)) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000000c0)='tls\x00', 0x4) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$void(r1, 0x5450) renameat2(r0, &(0x7f0000000180)='./file0/file0\x00', 0xffffffffffffffff, 0x0, 0x4) shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@dev, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@remote}}, 0x0) ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, 0x0) shmctl$IPC_SET(0x0, 0x1, 0x0) ioctl$PIO_FONT(r0, 0x4b61, &(0x7f0000000740)="9d705183203ecbbfc0d13a4e30241f7ce01b0b4d7682444a507bfc1ac414339f479986467eb40c8065891e1fbbe7263212c5c09bb47896b3d85893f1173f8a139c116f876fdcc1779bffef8c34b5958981616cbcf39f2d8b43491de452d774a74c3ae9555a45180f7d68da36975781ba3a24694ac85eea975ca104181420baf7f3b9614203b0360e7cc29a1c109e") chdir(&(0x7f0000000340)='./file0\x00') symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) umount2(&(0x7f0000000380)='./file0\x00', 0x3) openat$uinput(0xffffffffffffff9c, &(0x7f0000000440)='/dev/uinput\x00', 0x802, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') sendmsg$FOU_CMD_DEL(r1, 0x0, 0x24048010) sendmsg$kcm(r0, &(0x7f0000000a40)={&(0x7f0000000580)=@ll={0x11, 0xfd, r2, 0x1, 0x8, 0x6, @dev={[], 0x16}}, 0x80, &(0x7f00000009c0)=[{&(0x7f00000008c0)="367a9f0d4a1564359d1e668c63869bb9bf3b7f5aa4030462889dd6407207295cea1b36e07bc2b38b11c6ca28a73515cf52d89a8199d5c019de826c756a31bac24f707efcfc0a2383216dccc08f804551f0a56d2c9ab95a113fa74dff88ccccc7f278200aa03d2349e688b69191611739bb3e2e5ff110c5858c1a7c5bd5431f9c8e73a99236728f125d5f52a2b0761872fc0fc53cda5458241b2a80fd918b21c8029039d416a6cde6aa786bdfaa21a4e5ffa5f80dec422e0051c7e98a8cff2f4afbe25ca5a154a57c10", 0xc9}], 0x1}, 0x4004000) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000001c0)={0x0, 0x4, 0x2, 0x3, 0x1}, 0x14) ioctl$VIDIOC_SUBDEV_S_SELECTION(r0, 0xc040563e, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x7) msgget(0x1, 0x318) syz_genetlink_get_family_id$team(&(0x7f0000000400)='team\x00') 16:51:15 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={@mcast1, @local, @local, 0x0, 0x0, 0x0, 0x200800000000114}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x21, r0, 0x0, 0x0) 16:51:15 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffff9c, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000140)=""/66, 0x42}], 0x1, &(0x7f0000000540)=""/79, 0x4f}}], 0x1, 0x0, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) writev(r1, &(0x7f00000000c0), 0x200000000000014c) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000140)={{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x2, @remote}, 0x608, [0x0, 0x0, 0x10001, 0x0, 0x2]}, 0x5c) bind$inet6(0xffffffffffffffff, &(0x7f0000ef8cfd)={0xa, 0x0, 0x0, @loopback}, 0x1c) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000380)=0x1e) syz_open_dev$ndb(&(0x7f0000000100)='/dev/nbd#\x00', 0x0, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, 0x0) read$eventfd(0xffffffffffffffff, &(0x7f0000000200), 0x8) 16:51:15 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000240)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$restrict_keyring(0x1d, r0, &(0x7f0000000280)='asymmetric\x00', &(0x7f0000000340)='!selinuxselinux\x00') 16:51:15 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) keyctl$restrict_keyring(0x1d, r0, &(0x7f0000000280)='asymmetric\x00', &(0x7f0000000340)='!selinuxselinux\x00') 16:51:15 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={@mcast1, @local, @local, 0x0, 0x0, 0x0, 0x200800000000114}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x21, r0, 0x0, 0x0) 16:51:15 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(0x0, &(0x7f0000000240)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$restrict_keyring(0x1d, r0, &(0x7f0000000280)='asymmetric\x00', &(0x7f0000000340)='!selinuxselinux\x00') [ 379.470271] net_ratelimit: 28 callbacks suppressed [ 379.470290] protocol 88fb is buggy, dev hsr_slave_0 [ 379.480425] protocol 88fb is buggy, dev hsr_slave_1 16:51:15 executing program 2: r0 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'hsr0\x00', 0x0}) bind$packet(r0, &(0x7f0000000340)={0x11, 0x0, r1}, 0x14) sendto(r0, &(0x7f00000000c0)="e360b641b37f0000080600000066", 0xe, 0x0, 0x0, 0x0) [ 379.550292] protocol 88fb is buggy, dev hsr_slave_0 [ 379.555475] protocol 88fb is buggy, dev hsr_slave_1 16:51:15 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) keyctl$restrict_keyring(0x1d, r0, &(0x7f0000000280)='asymmetric\x00', &(0x7f0000000340)='!selinuxselinux\x00') 16:51:15 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(0x0, &(0x7f0000000240)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$restrict_keyring(0x1d, r0, &(0x7f0000000280)='asymmetric\x00', &(0x7f0000000340)='!selinuxselinux\x00') 16:51:15 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000240)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$restrict_keyring(0x1d, 0x0, &(0x7f0000000280)='asymmetric\x00', &(0x7f0000000340)='!selinuxselinux\x00') 16:51:15 executing program 2: r0 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'hsr0\x00', 0x0}) bind$packet(r0, &(0x7f0000000340)={0x11, 0x0, r1}, 0x14) sendto(r0, &(0x7f00000000c0)="e360b641b37f0000000000040066", 0xe, 0x0, 0x0, 0x0) 16:51:15 executing program 3: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000b00)) mount(&(0x7f00000004c0)=ANY=[], &(0x7f000000aff8)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000000)) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000000c0)='tls\x00', 0x4) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$void(r1, 0x5450) renameat2(r0, &(0x7f0000000180)='./file0/file0\x00', 0xffffffffffffffff, 0x0, 0x4) shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@dev, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@remote}}, 0x0) ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, 0x0) shmctl$IPC_SET(0x0, 0x1, 0x0) ioctl$PIO_FONT(r0, 0x4b61, &(0x7f0000000740)="9d705183203ecbbfc0d13a4e30241f7ce01b0b4d7682444a507bfc1ac414339f479986467eb40c8065891e1fbbe7263212c5c09bb47896b3d85893f1173f8a139c116f876fdcc1779bffef8c34b5958981616cbcf39f2d8b43491de452d774a74c3ae9555a45180f7d68da36975781ba3a24694ac85eea975ca104181420baf7f3b9614203b0360e7cc29a1c109e") chdir(&(0x7f0000000340)='./file0\x00') symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) umount2(&(0x7f0000000380)='./file0\x00', 0x3) openat$uinput(0xffffffffffffff9c, &(0x7f0000000440)='/dev/uinput\x00', 0x802, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') sendmsg$FOU_CMD_DEL(r1, 0x0, 0x24048010) sendmsg$kcm(r0, &(0x7f0000000a40)={&(0x7f0000000580)=@ll={0x11, 0xfd, r2, 0x1, 0x8, 0x6, @dev={[], 0x16}}, 0x80, &(0x7f00000009c0)=[{&(0x7f00000008c0)="367a9f0d4a1564359d1e668c63869bb9bf3b7f5aa4030462889dd6407207295cea1b36e07bc2b38b11c6ca28a73515cf52d89a8199d5c019de826c756a31bac24f707efcfc0a2383216dccc08f804551f0a56d2c9ab95a113fa74dff88ccccc7f278200aa03d2349e688b69191611739bb3e2e5ff110c5858c1a7c5bd5431f9c8e73a99236728f125d5f52a2b0761872fc0fc53cda5458241b2a80fd918b21c8029039d416a6cde6aa786bdfaa21a4e5ffa5f80dec422e0051c7e98a8cff2f4afbe25ca5a154a57c10", 0xc9}], 0x1}, 0x4004000) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000001c0)={0x0, 0x4, 0x2, 0x3, 0x1}, 0x14) ioctl$VIDIOC_SUBDEV_S_SELECTION(r0, 0xc040563e, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x7) msgget(0x1, 0x318) syz_genetlink_get_family_id$team(&(0x7f0000000400)='team\x00') 16:51:15 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(0x0, &(0x7f0000000240)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$restrict_keyring(0x1d, r0, &(0x7f0000000280)='asymmetric\x00', &(0x7f0000000340)='!selinuxselinux\x00') 16:51:15 executing program 5: r0 = gettid() mount$9p_rdma(0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, 0x0, 0x0) timer_create(0x0, &(0x7f0000001280)={0x0, 0x4000000000000012, 0x0, @tid=r0}, &(0x7f0000001240)) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000340)={@in6={{0xa, 0x4e24, 0x400, @dev={0xfe, 0x80, [], 0x19}, 0x6e1}}, 0x0, 0x101, 0x0, "f846871bd0817f5764296306114309ea050d65a040f0f26a5954074ae8fc44290f158f0069597089cb4eb1798b5b5f201856abf48a6c0f9e4beb539415823f7c602668db618bc13e70746aad4999b2c8"}, 0xd8) fsetxattr(r1, &(0x7f0000000280)=@known='trusted.overlay.origin\x00', 0x0, 0x0, 0x2) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000080)={{0x0, 0x1c9c380}, {0x0, 0x9}}, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000040)) gettid() ptrace$peekuser(0x3, r0, 0x0) tkill(r0, 0x1000000000016) 16:51:15 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000240)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$restrict_keyring(0x1d, 0x0, &(0x7f0000000280)='asymmetric\x00', &(0x7f0000000340)='!selinuxselinux\x00') 16:51:15 executing program 2: r0 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'hsr0\x00', 0x0}) bind$packet(r0, &(0x7f0000000340)={0x11, 0x0, r1}, 0x14) sendto(r0, &(0x7f00000000c0)="e360b641b37f0000000e00000066", 0xe, 0x0, 0x0, 0x0) [ 380.360313] protocol 88fb is buggy, dev hsr_slave_0 [ 380.365474] protocol 88fb is buggy, dev hsr_slave_1 [ 380.440310] protocol 88fb is buggy, dev hsr_slave_0 [ 380.445464] protocol 88fb is buggy, dev hsr_slave_1 [ 380.670287] protocol 88fb is buggy, dev hsr_slave_0 [ 380.675387] protocol 88fb is buggy, dev hsr_slave_1 16:51:18 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000240)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$restrict_keyring(0x1d, 0x0, &(0x7f0000000280)='asymmetric\x00', &(0x7f0000000340)='!selinuxselinux\x00') 16:51:18 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={@mcast1, @local, @local, 0x0, 0x0, 0x0, 0x200800000000114}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x21, r0, 0x0, 0x0) 16:51:18 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) keyctl$restrict_keyring(0x1d, r0, &(0x7f0000000280)='asymmetric\x00', &(0x7f0000000340)='!selinuxselinux\x00') 16:51:18 executing program 2: r0 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'hsr0\x00', 0x0}) bind$packet(r0, &(0x7f0000000340)={0x11, 0x0, r1}, 0x14) sendto(r0, &(0x7f00000000c0)="e360b641b37f0000000064880066", 0xe, 0x0, 0x0, 0x0) 16:51:18 executing program 5: r0 = open(&(0x7f0000000140)='.\x00', 0x143042, 0x0) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xfffffffffffffe5b) r1 = gettid() ptrace$peekuser(0x3, 0x0, 0x0) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) write$P9_RMKDIR(0xffffffffffffffff, 0x0, 0xfffffffffffffe64) timer_settime(0x0, 0x0, &(0x7f0000000080)={{0x0, 0x1c9c380}, {0x0, 0x9}}, 0x0) write$P9_RREADDIR(r0, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) ioctl$TCGETA(0xffffffffffffffff, 0x5405, 0x0) fsetxattr$security_capability(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) tkill(r1, 0x1000000000016) 16:51:18 executing program 3: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000b00)) mount(&(0x7f00000004c0)=ANY=[], &(0x7f000000aff8)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000000)) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000000c0)='tls\x00', 0x4) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$void(r1, 0x5450) renameat2(r0, &(0x7f0000000180)='./file0/file0\x00', 0xffffffffffffffff, 0x0, 0x4) shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@dev, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@remote}}, 0x0) ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, 0x0) shmctl$IPC_SET(0x0, 0x1, 0x0) ioctl$PIO_FONT(r0, 0x4b61, &(0x7f0000000740)="9d705183203ecbbfc0d13a4e30241f7ce01b0b4d7682444a507bfc1ac414339f479986467eb40c8065891e1fbbe7263212c5c09bb47896b3d85893f1173f8a139c116f876fdcc1779bffef8c34b5958981616cbcf39f2d8b43491de452d774a74c3ae9555a45180f7d68da36975781ba3a24694ac85eea975ca104181420baf7f3b9614203b0360e7cc29a1c109e") chdir(&(0x7f0000000340)='./file0\x00') symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) umount2(&(0x7f0000000380)='./file0\x00', 0x3) openat$uinput(0xffffffffffffff9c, &(0x7f0000000440)='/dev/uinput\x00', 0x802, 0x0) r3 = syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') sendmsg$FOU_CMD_DEL(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x28, r3, 0x200, 0x70bd25, 0x25dfdbfe, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e24}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x7f}]}, 0x28}}, 0x24048010) sendmsg$kcm(r0, &(0x7f0000000a40)={&(0x7f0000000580)=@ll={0x11, 0xfd, r2, 0x1, 0x8, 0x6, @dev={[], 0x16}}, 0x80, &(0x7f00000009c0)=[{&(0x7f00000008c0)="367a9f0d4a1564359d1e668c63869bb9bf3b7f5aa4030462889dd6407207295cea1b36e07bc2b38b11c6ca28a73515cf52d89a8199d5c019de826c756a31bac24f707efcfc0a2383216dccc08f804551f0a56d2c9ab95a113fa74dff88ccccc7f278200aa03d2349e688b69191611739bb3e2e5ff110c5858c1a7c5bd5431f9c8e73a99236728f125d5f52a2b0761872fc0fc53cda5458241b2a80fd918b21c8029039d416a6cde6aa786bdfaa21a4e5ffa5f80dec422e0051c7e98a8cff2f4afbe25ca5a154a57c10", 0xc9}], 0x1}, 0x4004000) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000001c0)={0x0, 0x4, 0x2, 0x3, 0x1}, 0x14) ioctl$VIDIOC_SUBDEV_S_SELECTION(r0, 0xc040563e, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x7) msgget(0x1, 0x318) syz_genetlink_get_family_id$team(&(0x7f0000000400)='team\x00') 16:51:18 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) keyctl$restrict_keyring(0x1d, r0, &(0x7f0000000280)='asymmetric\x00', &(0x7f0000000340)='!selinuxselinux\x00') 16:51:18 executing program 3: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000b00)) mount(&(0x7f00000004c0)=ANY=[], &(0x7f000000aff8)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000000)) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000000c0)='tls\x00', 0x4) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$void(r1, 0x5450) renameat2(r0, &(0x7f0000000180)='./file0/file0\x00', 0xffffffffffffffff, 0x0, 0x4) shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@dev, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@remote}}, 0x0) ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, 0x0) shmctl$IPC_SET(0x0, 0x1, 0x0) ioctl$PIO_FONT(r0, 0x4b61, &(0x7f0000000740)="9d705183203ecbbfc0d13a4e30241f7ce01b0b4d7682444a507bfc1ac414339f479986467eb40c8065891e1fbbe7263212c5c09bb47896b3d85893f1173f8a139c116f876fdcc1779bffef8c34b5958981616cbcf39f2d8b43491de452d774a74c3ae9555a45180f7d68da36975781ba3a24694ac85eea975ca104181420baf7f3b9614203b0360e7cc29a1c109e") chdir(&(0x7f0000000340)='./file0\x00') symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) umount2(&(0x7f0000000380)='./file0\x00', 0x3) openat$uinput(0xffffffffffffff9c, &(0x7f0000000440)='/dev/uinput\x00', 0x802, 0x0) r3 = syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') sendmsg$FOU_CMD_DEL(r1, &(0x7f00000002c0)={&(0x7f0000000000), 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x28, r3, 0x200, 0x70bd25, 0x25dfdbfe, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e24}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x7f}]}, 0x28}}, 0x24048010) sendmsg$kcm(r0, &(0x7f0000000a40)={&(0x7f0000000580)=@ll={0x11, 0xfd, r2, 0x1, 0x8, 0x6, @dev={[], 0x16}}, 0x80, &(0x7f00000009c0)=[{&(0x7f00000008c0)="367a9f0d4a1564359d1e668c63869bb9bf3b7f5aa4030462889dd6407207295cea1b36e07bc2b38b11c6ca28a73515cf52d89a8199d5c019de826c756a31bac24f707efcfc0a2383216dccc08f804551f0a56d2c9ab95a113fa74dff88ccccc7f278200aa03d2349e688b69191611739bb3e2e5ff110c5858c1a7c5bd5431f9c8e73a99236728f125d5f52a2b0761872fc0fc53cda5458241b2a80fd918b21c8029039d416a6cde6aa786bdfaa21a4e5ffa5f80dec422e0051c7e98a8cff2f4afbe25ca5a154a57c10", 0xc9}], 0x1}, 0x4004000) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000001c0)={0x0, 0x4, 0x2, 0x3, 0x1}, 0x14) ioctl$VIDIOC_SUBDEV_S_SELECTION(r0, 0xc040563e, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x7) msgget(0x1, 0x318) syz_genetlink_get_family_id$team(&(0x7f0000000400)='team\x00') 16:51:18 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000240)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$restrict_keyring(0x1d, r0, 0x0, &(0x7f0000000340)='!selinuxselinux\x00') 16:51:18 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x4000000000000036) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={@mcast1, @local, @local, 0x0, 0x0, 0x0, 0x200800000000114}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x21, r0, 0x0, 0x0) 16:51:18 executing program 5: syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f023c123f3188a070") bind$bt_sco(0xffffffffffffffff, 0x0, 0x0) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xe, 0x8031, 0xffffffffffffffff, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8923, &(0x7f00000001c0)={'ip6_vti0\x00', 0x3001}) 16:51:18 executing program 2: r0 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'hsr0\x00', 0x0}) bind$packet(r0, &(0x7f0000000340)={0x11, 0x0, r1}, 0x14) sendto(r0, &(0x7f00000000c0)="e360b641b37f000001f400000066", 0xe, 0x0, 0x0, 0x0) 16:51:18 executing program 3: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000b00)) mount(&(0x7f00000004c0)=ANY=[], &(0x7f000000aff8)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000000)) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000000c0)='tls\x00', 0x4) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$void(r1, 0x5450) renameat2(r0, &(0x7f0000000180)='./file0/file0\x00', 0xffffffffffffffff, 0x0, 0x4) shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@dev, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@remote}}, 0x0) ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, 0x0) shmctl$IPC_SET(0x0, 0x1, 0x0) ioctl$PIO_FONT(r0, 0x4b61, &(0x7f0000000740)="9d705183203ecbbfc0d13a4e30241f7ce01b0b4d7682444a507bfc1ac414339f479986467eb40c8065891e1fbbe7263212c5c09bb47896b3d85893f1173f8a139c116f876fdcc1779bffef8c34b5958981616cbcf39f2d8b43491de452d774a74c3ae9555a45180f7d68da36975781ba3a24694ac85eea975ca104181420baf7f3b9614203b0360e7cc29a1c109e") chdir(&(0x7f0000000340)='./file0\x00') symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) umount2(&(0x7f0000000380)='./file0\x00', 0x3) openat$uinput(0xffffffffffffff9c, &(0x7f0000000440)='/dev/uinput\x00', 0x802, 0x0) r3 = syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') sendmsg$FOU_CMD_DEL(r1, &(0x7f00000002c0)={&(0x7f0000000000), 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x28, r3, 0x200, 0x70bd25, 0x25dfdbfe, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e24}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x7f}]}, 0x28}}, 0x24048010) sendmsg$kcm(r0, &(0x7f0000000a40)={&(0x7f0000000580)=@ll={0x11, 0xfd, r2, 0x1, 0x8, 0x6, @dev={[], 0x16}}, 0x80, &(0x7f00000009c0)=[{&(0x7f00000008c0)="367a9f0d4a1564359d1e668c63869bb9bf3b7f5aa4030462889dd6407207295cea1b36e07bc2b38b11c6ca28a73515cf52d89a8199d5c019de826c756a31bac24f707efcfc0a2383216dccc08f804551f0a56d2c9ab95a113fa74dff88ccccc7f278200aa03d2349e688b69191611739bb3e2e5ff110c5858c1a7c5bd5431f9c8e73a99236728f125d5f52a2b0761872fc0fc53cda5458241b2a80fd918b21c8029039d416a6cde6aa786bdfaa21a4e5ffa5f80dec422e0051c7e98a8cff2f4afbe25ca5a154a57c10", 0xc9}], 0x1}, 0x4004000) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000001c0)={0x0, 0x4, 0x2, 0x3, 0x1}, 0x14) ioctl$VIDIOC_SUBDEV_S_SELECTION(r0, 0xc040563e, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x7) msgget(0x1, 0x318) syz_genetlink_get_family_id$team(&(0x7f0000000400)='team\x00') [ 382.814455] IPVS: ftp: loaded support on port[0] = 21 16:51:18 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) keyctl$restrict_keyring(0x1d, r0, &(0x7f0000000280)='asymmetric\x00', &(0x7f0000000340)='!selinuxselinux\x00') 16:51:18 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x4000000000000036) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={@mcast1, @local, @local, 0x0, 0x0, 0x0, 0x200800000000114}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x21, r0, 0x0, 0x0) 16:51:18 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000240)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$restrict_keyring(0x1d, r0, 0x0, &(0x7f0000000340)='!selinuxselinux\x00') 16:51:18 executing program 2: r0 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'hsr0\x00', 0x0}) bind$packet(r0, &(0x7f0000000340)={0x11, 0x0, r1}, 0x14) sendto(r0, &(0x7f00000000c0)="e360b641b37f00000a0000000066", 0xe, 0x0, 0x0, 0x0) 16:51:18 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000240)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$restrict_keyring(0x1d, 0x0, &(0x7f0000000280)='asymmetric\x00', &(0x7f0000000340)='!selinuxselinux\x00') 16:51:18 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000240)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$restrict_keyring(0x1d, r0, 0x0, &(0x7f0000000340)='!selinuxselinux\x00') 16:51:19 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000240)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$restrict_keyring(0x1d, 0x0, &(0x7f0000000280)='asymmetric\x00', &(0x7f0000000340)='!selinuxselinux\x00') 16:51:19 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000240)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$restrict_keyring(0x1d, r0, &(0x7f0000000280)='asymmetric\x00', 0x0) 16:51:19 executing program 2: r0 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'hsr0\x00', 0x0}) bind$packet(r0, &(0x7f0000000340)={0x11, 0x0, r1}, 0x14) sendto(r0, &(0x7f00000000c0)="e360b641b37f0000000000020066", 0xe, 0x0, 0x0, 0x0) [ 383.440991] : renamed from ip6_vti0 [ 383.510421] IPVS: ftp: loaded support on port[0] = 21 [ 384.520301] net_ratelimit: 22 callbacks suppressed [ 384.520309] protocol 88fb is buggy, dev hsr_slave_0 [ 384.530400] protocol 88fb is buggy, dev hsr_slave_1 [ 384.590296] protocol 88fb is buggy, dev hsr_slave_0 [ 384.595494] protocol 88fb is buggy, dev hsr_slave_1 [ 384.830292] protocol 88fb is buggy, dev hsr_slave_0 [ 384.835539] protocol 88fb is buggy, dev hsr_slave_1 [ 384.910307] protocol 88fb is buggy, dev hsr_slave_0 [ 384.915552] protocol 88fb is buggy, dev hsr_slave_1 [ 385.310283] protocol 88fb is buggy, dev hsr_slave_0 [ 385.315515] protocol 88fb is buggy, dev hsr_slave_1 [ 385.938943] device bridge_slave_1 left promiscuous mode [ 385.951113] bridge0: port 2(bridge_slave_1) entered disabled state [ 386.005493] device bridge_slave_0 left promiscuous mode [ 386.019168] bridge0: port 1(bridge_slave_0) entered disabled state [ 389.843625] device hsr_slave_1 left promiscuous mode [ 389.880707] net_ratelimit: 26 callbacks suppressed [ 389.880716] protocol 88fb is buggy, dev hsr_slave_0 [ 389.890875] protocol 88fb is buggy, dev hsr_slave_1 [ 389.902479] device hsr_slave_0 left promiscuous mode [ 389.967473] team0 (unregistering): Port device team_slave_1 removed [ 389.979392] team0 (unregistering): Port device team_slave_0 removed [ 389.990091] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 390.047567] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 390.119319] bond0 (unregistering): Released all slaves 16:51:26 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000240)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$restrict_keyring(0x1d, r0, &(0x7f0000000280)='asymmetric\x00', 0x0) 16:51:26 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000240)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$restrict_keyring(0x1d, 0x0, &(0x7f0000000280)='asymmetric\x00', &(0x7f0000000340)='!selinuxselinux\x00') 16:51:26 executing program 2: r0 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'hsr0\x00', 0x0}) bind$packet(r0, &(0x7f0000000340)={0x11, 0x0, r1}, 0x14) sendto(r0, &(0x7f00000000c0)="e360b641b37f0000000005430066", 0xe, 0x0, 0x0, 0x0) 16:51:26 executing program 3: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000b00)) mount(&(0x7f00000004c0)=ANY=[], &(0x7f000000aff8)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000000)) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000000c0)='tls\x00', 0x4) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$void(r1, 0x5450) renameat2(r0, &(0x7f0000000180)='./file0/file0\x00', 0xffffffffffffffff, 0x0, 0x4) shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@dev, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@remote}}, 0x0) ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, 0x0) shmctl$IPC_SET(0x0, 0x1, 0x0) ioctl$PIO_FONT(r0, 0x4b61, &(0x7f0000000740)="9d705183203ecbbfc0d13a4e30241f7ce01b0b4d7682444a507bfc1ac414339f479986467eb40c8065891e1fbbe7263212c5c09bb47896b3d85893f1173f8a139c116f876fdcc1779bffef8c34b5958981616cbcf39f2d8b43491de452d774a74c3ae9555a45180f7d68da36975781ba3a24694ac85eea975ca104181420baf7f3b9614203b0360e7cc29a1c109e") chdir(&(0x7f0000000340)='./file0\x00') symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) umount2(&(0x7f0000000380)='./file0\x00', 0x3) openat$uinput(0xffffffffffffff9c, &(0x7f0000000440)='/dev/uinput\x00', 0x802, 0x0) r3 = syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') sendmsg$FOU_CMD_DEL(r1, &(0x7f00000002c0)={&(0x7f0000000000), 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x28, r3, 0x200, 0x70bd25, 0x25dfdbfe, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e24}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x7f}]}, 0x28}}, 0x24048010) sendmsg$kcm(r0, &(0x7f0000000a40)={&(0x7f0000000580)=@ll={0x11, 0xfd, r2, 0x1, 0x8, 0x6, @dev={[], 0x16}}, 0x80, &(0x7f00000009c0)=[{&(0x7f00000008c0)="367a9f0d4a1564359d1e668c63869bb9bf3b7f5aa4030462889dd6407207295cea1b36e07bc2b38b11c6ca28a73515cf52d89a8199d5c019de826c756a31bac24f707efcfc0a2383216dccc08f804551f0a56d2c9ab95a113fa74dff88ccccc7f278200aa03d2349e688b69191611739bb3e2e5ff110c5858c1a7c5bd5431f9c8e73a99236728f125d5f52a2b0761872fc0fc53cda5458241b2a80fd918b21c8029039d416a6cde6aa786bdfaa21a4e5ffa5f80dec422e0051c7e98a8cff2f4afbe25ca5a154a57c10", 0xc9}], 0x1}, 0x4004000) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000001c0)={0x0, 0x4, 0x2, 0x3, 0x1}, 0x14) ioctl$VIDIOC_SUBDEV_S_SELECTION(r0, 0xc040563e, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x7) msgget(0x1, 0x318) syz_genetlink_get_family_id$team(&(0x7f0000000400)='team\x00') 16:51:26 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-twofish-3way\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xff5c) recvmsg(r1, &(0x7f0000000500)={&(0x7f00000000c0)=@nl=@proc, 0x8b, &(0x7f0000000440)=[{&(0x7f0000000540)=""/4096, 0xfb80}], 0x1, &(0x7f0000003480)=""/4096, 0x1000}, 0x0) 16:51:26 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x4000000000000036) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={@mcast1, @local, @local, 0x0, 0x0, 0x0, 0x200800000000114}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x21, r0, 0x0, 0x0) 16:51:26 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000240)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$restrict_keyring(0x1d, r0, 0x0, &(0x7f0000000340)='!selinuxselinux\x00') 16:51:26 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000240)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$restrict_keyring(0x1d, r0, &(0x7f0000000280)='asymmetric\x00', 0x0) [ 390.751537] protocol 88fb is buggy, dev hsr_slave_0 [ 390.757316] protocol 88fb is buggy, dev hsr_slave_1 16:51:26 executing program 2: r0 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'hsr0\x00', 0x0}) bind$packet(r0, &(0x7f0000000340)={0x11, 0x0, r1}, 0x14) sendto(r0, &(0x7f00000000c0)="e360b641b37f0000000003e80066", 0xe, 0x0, 0x0, 0x0) [ 390.830299] protocol 88fb is buggy, dev hsr_slave_0 [ 390.835567] protocol 88fb is buggy, dev hsr_slave_1 16:51:26 executing program 4: mlockall(0x1) clone(0x800040000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x0, 0x0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000200)=0x7ff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) signalfd(r0, &(0x7f00000001c0)={0x3}, 0x8) sysfs$2(0x2, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, 0xffffffffffffffff, 0x0) ioctl$EVIOCSKEYCODE(r0, 0x40084504, &(0x7f0000000100)=[0x5, 0x4]) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000000)) write$P9_RUNLINKAT(r0, &(0x7f0000000180)={0x7, 0x4d, 0x2}, 0x7) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x0, 0x6031, 0xffffffffffffffff, 0x0) 16:51:26 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000240)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$restrict_keyring(0x1d, r0, 0x0, &(0x7f0000000340)='!selinuxselinux\x00') 16:51:26 executing program 5: ioctl$TCGETA(0xffffffffffffffff, 0x5405, &(0x7f0000000200)) r0 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x200800) ioctl$TCSBRKP(r0, 0x5425, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() ptrace$cont(0x18, r1, 0x10000, 0x3) timer_create(0x0, 0x0, 0x0) r2 = syz_open_dev$sndpcmp(&(0x7f0000000380)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) r3 = socket$inet6(0xa, 0x40000080806, 0x0) r4 = syz_genetlink_get_family_id$nbd(&(0x7f00000001c0)='nbd\x00') sendmsg$NBD_CMD_RECONFIGURE(r2, &(0x7f0000000300)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x110002}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x7c, r4, 0x200, 0x70bd25, 0x25dfdbfb, {}, [@NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x6}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x28}, @NBD_ATTR_DEAD_CONN_TIMEOUT={0xc}, @NBD_ATTR_SOCKETS={0x1c, 0x7, [{0x8, 0x1, r0}, {0x8, 0x1, r0}, {0x8}]}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x2}, @NBD_ATTR_SOCKETS={0x1c, 0x7, [{0x8, 0x1, r0}, {0x8, 0x1, r2}, {0x8, 0x1, r0}]}]}, 0x7c}, 0x1, 0x0, 0x0, 0x40}, 0x1) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(r0, 0xc2c45513, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r2, 0x40046607, &(0x7f0000000140)=0x8) ioctl$DRM_IOCTL_AGP_ACQUIRE(r2, 0x6430) eventfd(0x7) bind$inet6(r3, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r2, 0xc04c5349, &(0x7f0000000080)={0x3720, 0x6, 0x800}) listen(r3, 0x20000000) r5 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r5, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r6 = accept4(r3, &(0x7f00004d4000)=@nl=@proc, &(0x7f0000000000)=0x80, 0x0) setsockopt$inet6_int(r6, 0x29, 0x33, &(0x7f0000000040)=0x100000000001f, 0x87) sendmmsg(r6, &(0x7f0000003d40)=[{{&(0x7f0000001b00)=@l2, 0x80, &(0x7f0000001d00), 0x0, &(0x7f0000001d40)}}, {{&(0x7f0000002300)=@nl, 0x80, &(0x7f0000003740), 0x0, &(0x7f00000037c0)}}], 0x4000000000001eb, 0x0) 16:51:26 executing program 2: r0 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'hsr0\x00', 0x0}) bind$packet(r0, &(0x7f0000000340)={0x11, 0x0, r1}, 0x14) sendto(r0, &(0x7f00000000c0)="e360b641b37f0000003f00000066", 0xe, 0x0, 0x0, 0x0) [ 391.070271] protocol 88fb is buggy, dev hsr_slave_0 [ 391.075498] protocol 88fb is buggy, dev hsr_slave_1 16:51:26 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000240)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$restrict_keyring(0x1d, r0, 0x0, &(0x7f0000000340)='!selinuxselinux\x00') [ 391.124743] IPVS: ftp: loaded support on port[0] = 21 16:51:27 executing program 5: r0 = open(&(0x7f0000000140)='.\x00', 0x143042, 0x0) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xfffffffffffffe5b) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) write$P9_RMKDIR(0xffffffffffffffff, 0x0, 0xfffffffffffffe64) timer_settime(0x0, 0x0, &(0x7f0000000080)={{0x0, 0x1c9c380}, {0x0, 0x9}}, 0x0) ioctl$sock_SIOCGIFBR(r0, 0x8940, &(0x7f0000000040)=@add_del={0x2, &(0x7f0000000000)='team_slave_1\x00'}) write$P9_RLOPEN(0xffffffffffffffff, 0x0, 0x0) write$P9_RREADDIR(r0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) time(&(0x7f0000000100)) fsync(r0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) ioctl$TCGETA(0xffffffffffffffff, 0x5405, 0x0) listen(r0, 0x7) fsetxattr$security_capability(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) openat$cgroup_type(r0, &(0x7f00000000c0)='cgroup.type\x00', 0x2, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) tkill(r1, 0x1000000000016) [ 391.150338] protocol 88fb is buggy, dev hsr_slave_0 [ 391.155528] protocol 88fb is buggy, dev hsr_slave_1 [ 391.468861] chnl_net:caif_netlink_parms(): no params data found [ 391.494685] IPVS: ftp: loaded support on port[0] = 21 [ 391.534542] bridge0: port 1(bridge_slave_0) entered blocking state [ 391.543910] bridge0: port 1(bridge_slave_0) entered disabled state [ 391.551854] device bridge_slave_0 entered promiscuous mode [ 391.574261] bridge0: port 2(bridge_slave_1) entered blocking state [ 391.581299] bridge0: port 2(bridge_slave_1) entered disabled state [ 391.588879] device bridge_slave_1 entered promiscuous mode [ 391.649368] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 391.678398] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 391.727378] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 391.739965] team0: Port device team_slave_0 added [ 391.749252] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 391.764656] team0: Port device team_slave_1 added [ 391.774572] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 391.785817] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 391.897327] device hsr_slave_0 entered promiscuous mode [ 392.054506] device hsr_slave_1 entered promiscuous mode [ 392.174785] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 392.187422] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 392.247999] bridge0: port 2(bridge_slave_1) entered blocking state [ 392.254424] bridge0: port 2(bridge_slave_1) entered forwarding state [ 392.261114] bridge0: port 1(bridge_slave_0) entered blocking state [ 392.267585] bridge0: port 1(bridge_slave_0) entered forwarding state [ 392.442279] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 392.463189] 8021q: adding VLAN 0 to HW filter on device bond0 [ 392.493157] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 392.515510] bridge0: port 1(bridge_slave_0) entered disabled state [ 392.527109] bridge0: port 2(bridge_slave_1) entered disabled state [ 392.561489] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 392.570344] IPVS: ftp: loaded support on port[0] = 21 [ 392.597767] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 392.640482] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 392.648827] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 392.658918] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 392.665395] 8021q: adding VLAN 0 to HW filter on device team0 [ 392.675895] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 392.683160] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 392.691545] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 392.699197] bridge0: port 1(bridge_slave_0) entered blocking state [ 392.705628] bridge0: port 1(bridge_slave_0) entered forwarding state [ 392.715742] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 392.724478] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 392.733236] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 392.751301] bridge0: port 2(bridge_slave_1) entered blocking state [ 392.757662] bridge0: port 2(bridge_slave_1) entered forwarding state [ 392.772961] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 392.797984] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 392.809117] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 392.831599] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 392.843409] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 392.850471] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 392.859390] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 392.870509] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 392.877945] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 392.886145] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 392.894432] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 392.904981] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 392.914055] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 392.923482] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 392.939964] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 392.967967] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 392.976421] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 393.002942] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 393.009059] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 393.035069] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 393.049851] 8021q: adding VLAN 0 to HW filter on device batadv0 16:51:29 executing program 3: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000b00)) mount(&(0x7f00000004c0)=ANY=[], &(0x7f000000aff8)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000000)) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000000c0)='tls\x00', 0x4) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$void(r1, 0x5450) renameat2(r0, &(0x7f0000000180)='./file0/file0\x00', 0xffffffffffffffff, 0x0, 0x4) shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@dev, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@remote}}, 0x0) ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, 0x0) shmctl$IPC_SET(0x0, 0x1, 0x0) ioctl$PIO_FONT(r0, 0x4b61, &(0x7f0000000740)="9d705183203ecbbfc0d13a4e30241f7ce01b0b4d7682444a507bfc1ac414339f479986467eb40c8065891e1fbbe7263212c5c09bb47896b3d85893f1173f8a139c116f876fdcc1779bffef8c34b5958981616cbcf39f2d8b43491de452d774a74c3ae9555a45180f7d68da36975781ba3a24694ac85eea975ca104181420baf7f3b9614203b0360e7cc29a1c109e") chdir(&(0x7f0000000340)='./file0\x00') symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) umount2(&(0x7f0000000380)='./file0\x00', 0x3) openat$uinput(0xffffffffffffff9c, &(0x7f0000000440)='/dev/uinput\x00', 0x802, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') sendmsg$FOU_CMD_DEL(r1, &(0x7f00000002c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, 0x0}, 0x24048010) sendmsg$kcm(r0, &(0x7f0000000a40)={&(0x7f0000000580)=@ll={0x11, 0xfd, r2, 0x1, 0x8, 0x6, @dev={[], 0x16}}, 0x80, &(0x7f00000009c0)=[{&(0x7f00000008c0)="367a9f0d4a1564359d1e668c63869bb9bf3b7f5aa4030462889dd6407207295cea1b36e07bc2b38b11c6ca28a73515cf52d89a8199d5c019de826c756a31bac24f707efcfc0a2383216dccc08f804551f0a56d2c9ab95a113fa74dff88ccccc7f278200aa03d2349e688b69191611739bb3e2e5ff110c5858c1a7c5bd5431f9c8e73a99236728f125d5f52a2b0761872fc0fc53cda5458241b2a80fd918b21c8029039d416a6cde6aa786bdfaa21a4e5ffa5f80dec422e0051c7e98a8cff2f4afbe25ca5a154a57c10", 0xc9}], 0x1}, 0x4004000) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000001c0)={0x0, 0x4, 0x2, 0x3, 0x1}, 0x14) ioctl$VIDIOC_SUBDEV_S_SELECTION(r0, 0xc040563e, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x7) msgget(0x1, 0x318) syz_genetlink_get_family_id$team(&(0x7f0000000400)='team\x00') 16:51:29 executing program 2: r0 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'hsr0\x00', 0x0}) bind$packet(r0, &(0x7f0000000340)={0x11, 0x0, r1}, 0x14) sendto(r0, &(0x7f00000000c0)="e360b641b37f0000f40100000066", 0xe, 0x0, 0x0, 0x0) 16:51:29 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x4000000000000036) ptrace$cont(0x18, 0x0, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={@mcast1, @local, @local, 0x0, 0x0, 0x0, 0x200800000000114}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x21, r0, 0x0, 0x0) 16:51:29 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000240)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$restrict_keyring(0x1d, r0, &(0x7f0000000280)='asymmetric\x00', 0x0) 16:51:29 executing program 5: r0 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'hsr0\x00', 0x0}) bind$packet(r0, &(0x7f0000000340)={0x11, 0x0, r1}, 0x14) sendto(r0, &(0x7f00000000c0)="e360b641b37f0003400000000066", 0xe, 0x0, 0x0, 0x0) 16:51:29 executing program 2: r0 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'hsr0\x00', 0x0}) bind$packet(r0, &(0x7f0000000340)={0x11, 0x0, r1}, 0x14) sendto(r0, &(0x7f00000000c0)="e360b641b37f00000e0000000066", 0xe, 0x0, 0x0, 0x0) 16:51:30 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000240)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$restrict_keyring(0x1d, r0, &(0x7f0000000280)='asymmetric\x00', 0x0) 16:51:30 executing program 3: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000b00)) mount(&(0x7f00000004c0)=ANY=[], &(0x7f000000aff8)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000000)) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000000c0)='tls\x00', 0x4) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$void(r1, 0x5450) renameat2(r0, &(0x7f0000000180)='./file0/file0\x00', 0xffffffffffffffff, 0x0, 0x4) shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@dev, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@remote}}, 0x0) ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, 0x0) shmctl$IPC_SET(0x0, 0x1, 0x0) ioctl$PIO_FONT(r0, 0x4b61, &(0x7f0000000740)="9d705183203ecbbfc0d13a4e30241f7ce01b0b4d7682444a507bfc1ac414339f479986467eb40c8065891e1fbbe7263212c5c09bb47896b3d85893f1173f8a139c116f876fdcc1779bffef8c34b5958981616cbcf39f2d8b43491de452d774a74c3ae9555a45180f7d68da36975781ba3a24694ac85eea975ca104181420baf7f3b9614203b0360e7cc29a1c109e") chdir(&(0x7f0000000340)='./file0\x00') symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) umount2(&(0x7f0000000380)='./file0\x00', 0x3) openat$uinput(0xffffffffffffff9c, &(0x7f0000000440)='/dev/uinput\x00', 0x802, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') sendmsg$FOU_CMD_DEL(r1, &(0x7f00000002c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={0x0}}, 0x24048010) sendmsg$kcm(r0, &(0x7f0000000a40)={&(0x7f0000000580)=@ll={0x11, 0xfd, r2, 0x1, 0x8, 0x6, @dev={[], 0x16}}, 0x80, &(0x7f00000009c0)=[{&(0x7f00000008c0)="367a9f0d4a1564359d1e668c63869bb9bf3b7f5aa4030462889dd6407207295cea1b36e07bc2b38b11c6ca28a73515cf52d89a8199d5c019de826c756a31bac24f707efcfc0a2383216dccc08f804551f0a56d2c9ab95a113fa74dff88ccccc7f278200aa03d2349e688b69191611739bb3e2e5ff110c5858c1a7c5bd5431f9c8e73a99236728f125d5f52a2b0761872fc0fc53cda5458241b2a80fd918b21c8029039d416a6cde6aa786bdfaa21a4e5ffa5f80dec422e0051c7e98a8cff2f4afbe25ca5a154a57c10", 0xc9}], 0x1}, 0x4004000) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000001c0)={0x0, 0x4, 0x2, 0x3, 0x1}, 0x14) ioctl$VIDIOC_SUBDEV_S_SELECTION(r0, 0xc040563e, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x7) msgget(0x1, 0x318) syz_genetlink_get_family_id$team(&(0x7f0000000400)='team\x00') 16:51:30 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x4000000000000036) ptrace$cont(0x18, 0x0, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={@mcast1, @local, @local, 0x0, 0x0, 0x0, 0x200800000000114}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x21, r0, 0x0, 0x0) 16:51:30 executing program 2: r0 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'hsr0\x00', 0x0}) bind$packet(r0, &(0x7f0000000340)={0x11, 0x0, r1}, 0x14) sendto(r0, &(0x7f00000000c0)="e360b641b37f0000000000600066", 0xe, 0x0, 0x0, 0x0) 16:51:30 executing program 4: mlockall(0x1) clone(0x800040000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x0, 0x0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000200)=0x7ff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) signalfd(r0, &(0x7f00000001c0)={0x3}, 0x8) sysfs$2(0x2, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, 0xffffffffffffffff, 0x0) ioctl$EVIOCSKEYCODE(r0, 0x40084504, &(0x7f0000000100)=[0x5, 0x4]) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000000)) write$P9_RUNLINKAT(r0, &(0x7f0000000180)={0x7, 0x4d, 0x2}, 0x7) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x0, 0x6031, 0xffffffffffffffff, 0x0) 16:51:30 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x4000000000014, &(0x7f0000000000)=0x2, 0x4) sendmmsg(r0, &(0x7f0000002580)=[{{&(0x7f0000000140)=@hci, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000880)}}, {{&(0x7f0000000400)=@sco, 0x359, &(0x7f0000000a80), 0x26c, &(0x7f0000000c40)}}], 0x4000000000002f0, 0x0) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x1000) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000700)='/dev/zero\x00', 0x90300, 0x0) renameat2(0xffffffffffffffff, &(0x7f00000005c0)='./bus\x00', r1, &(0x7f00000007c0)='\x00', 0x1) memfd_create(&(0x7f0000000840)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f00000000c0)={'NETMAP\x00'}, &(0x7f0000000100)=0x1e) add_key$keyring(&(0x7f0000000500)='keyring\x00', &(0x7f0000000540)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 394.910300] net_ratelimit: 24 callbacks suppressed [ 394.910309] protocol 88fb is buggy, dev hsr_slave_0 [ 394.920433] protocol 88fb is buggy, dev hsr_slave_1 [ 394.990272] protocol 88fb is buggy, dev hsr_slave_0 [ 394.995391] protocol 88fb is buggy, dev hsr_slave_1 16:51:30 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000240)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$restrict_keyring(0x1d, r0, &(0x7f0000000280)='asymmetric\x00', 0x0) 16:51:30 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x4000000000000036) ptrace$cont(0x18, 0x0, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={@mcast1, @local, @local, 0x0, 0x0, 0x0, 0x200800000000114}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x21, r0, 0x0, 0x0) 16:51:30 executing program 2: r0 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'hsr0\x00', 0x0}) bind$packet(r0, &(0x7f0000000340)={0x11, 0x0, r1}, 0x14) sendto(r0, &(0x7f00000000c0)="e360b641b37f0000000000060066", 0xe, 0x0, 0x0, 0x0) 16:51:31 executing program 3: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000b00)) mount(&(0x7f00000004c0)=ANY=[], &(0x7f000000aff8)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000000)) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000000c0)='tls\x00', 0x4) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$void(r1, 0x5450) renameat2(r0, &(0x7f0000000180)='./file0/file0\x00', 0xffffffffffffffff, 0x0, 0x4) shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@dev, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@remote}}, 0x0) ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, 0x0) shmctl$IPC_SET(0x0, 0x1, 0x0) ioctl$PIO_FONT(r0, 0x4b61, &(0x7f0000000740)="9d705183203ecbbfc0d13a4e30241f7ce01b0b4d7682444a507bfc1ac414339f479986467eb40c8065891e1fbbe7263212c5c09bb47896b3d85893f1173f8a139c116f876fdcc1779bffef8c34b5958981616cbcf39f2d8b43491de452d774a74c3ae9555a45180f7d68da36975781ba3a24694ac85eea975ca104181420baf7f3b9614203b0360e7cc29a1c109e") chdir(&(0x7f0000000340)='./file0\x00') symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) umount2(&(0x7f0000000380)='./file0\x00', 0x3) openat$uinput(0xffffffffffffff9c, &(0x7f0000000440)='/dev/uinput\x00', 0x802, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') sendmsg$FOU_CMD_DEL(r1, &(0x7f00000002c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x28, 0x0, 0x200, 0x70bd25, 0x25dfdbfe, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e24}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x7f}]}, 0x28}}, 0x24048010) sendmsg$kcm(r0, &(0x7f0000000a40)={&(0x7f0000000580)=@ll={0x11, 0xfd, r2, 0x1, 0x8, 0x6, @dev={[], 0x16}}, 0x80, &(0x7f00000009c0)=[{&(0x7f00000008c0)="367a9f0d4a1564359d1e668c63869bb9bf3b7f5aa4030462889dd6407207295cea1b36e07bc2b38b11c6ca28a73515cf52d89a8199d5c019de826c756a31bac24f707efcfc0a2383216dccc08f804551f0a56d2c9ab95a113fa74dff88ccccc7f278200aa03d2349e688b69191611739bb3e2e5ff110c5858c1a7c5bd5431f9c8e73a99236728f125d5f52a2b0761872fc0fc53cda5458241b2a80fd918b21c8029039d416a6cde6aa786bdfaa21a4e5ffa5f80dec422e0051c7e98a8cff2f4afbe25ca5a154a57c10", 0xc9}], 0x1}, 0x4004000) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000001c0)={0x0, 0x4, 0x2, 0x3, 0x1}, 0x14) ioctl$VIDIOC_SUBDEV_S_SELECTION(r0, 0xc040563e, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x7) msgget(0x1, 0x318) syz_genetlink_get_family_id$team(&(0x7f0000000400)='team\x00') 16:51:31 executing program 5: syz_open_dev$loop(0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0xa, &(0x7f0000000000)='{[\'md5sum\x00', 0xffffffffffffffff}, 0x30) r0 = gettid() getpgid(r0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x105082) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r3 = memfd_create(&(0x7f0000000280)='IPVS\x00', 0x0) prctl$PR_SET_MM_AUXV(0x23, 0xc, &(0x7f0000000600)="6d138c359d7b46129a98792991ef2348a0b06b3877eff74f2383bd501a7a436ab31f7f89fa1cdc76e95c0db3aed6b48a21b974805bbcc0313fe54556978259c702e4b0114d8135b072ae7633c24bb3a4f8cccc8d619486b88a8af0d95f3511591006edc46aa5d521b397b3a6080ae6230c33511ea746a38799e45b184c5d5d10c459d71529ce5f8253d8d8deef405a83c8aeafc1f02120facad9db76212cff2cbaf81c4027f818ad3e248e3042885a837eefccd77630e823cd9705cbb12414ceee24", 0xc2) pwritev(r3, &(0x7f0000f50f90)=[{&(0x7f00000000c0)='S', 0x1}], 0x1, 0x4081003) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r3) fallocate(r2, 0x11, 0x0, 0x100000001) futimesat(r1, &(0x7f0000000240)='./file1\x00', &(0x7f00000002c0)={{0x0, 0x7530}, {0x0, 0x7530}}) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, 0x0, 0x2, 0x0) accept$unix(0xffffffffffffff9c, &(0x7f0000000140)=@abs, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='task\x00') 16:51:31 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000240)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$restrict_keyring(0x1d, r0, &(0x7f0000000280)='asymmetric\x00', 0x0) 16:51:31 executing program 2: r0 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'hsr0\x00', 0x0}) bind$packet(r0, &(0x7f0000000340)={0x11, 0x0, r1}, 0x14) sendto(r0, &(0x7f00000000c0)="e360b641b37f00000000000e0066", 0xe, 0x0, 0x0, 0x0) [ 395.230293] protocol 88fb is buggy, dev hsr_slave_0 [ 395.235491] protocol 88fb is buggy, dev hsr_slave_1 [ 395.310303] protocol 88fb is buggy, dev hsr_slave_0 [ 395.315442] protocol 88fb is buggy, dev hsr_slave_1 [ 395.480296] protocol 88fb is buggy, dev hsr_slave_0 [ 395.485420] protocol 88fb is buggy, dev hsr_slave_1 16:51:31 executing program 2: r0 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'hsr0\x00', 0x0}) bind$packet(r0, &(0x7f0000000340)={0x11, 0x0, r1}, 0x14) sendto(r0, &(0x7f00000000c0)="e360b641b37f0000008100000066", 0xe, 0x0, 0x0, 0x0) 16:51:31 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) keyctl$restrict_keyring(0x1d, r0, &(0x7f0000000280)='asymmetric\x00', &(0x7f0000000340)='!selinuxselinux\x00') 16:51:31 executing program 3: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000b00)) mount(&(0x7f00000004c0)=ANY=[], &(0x7f000000aff8)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000000)) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000000c0)='tls\x00', 0x4) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$void(r1, 0x5450) renameat2(r0, &(0x7f0000000180)='./file0/file0\x00', 0xffffffffffffffff, 0x0, 0x4) shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@dev, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@remote}}, 0x0) ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, 0x0) shmctl$IPC_SET(0x0, 0x1, 0x0) ioctl$PIO_FONT(r0, 0x4b61, &(0x7f0000000740)="9d705183203ecbbfc0d13a4e30241f7ce01b0b4d7682444a507bfc1ac414339f479986467eb40c8065891e1fbbe7263212c5c09bb47896b3d85893f1173f8a139c116f876fdcc1779bffef8c34b5958981616cbcf39f2d8b43491de452d774a74c3ae9555a45180f7d68da36975781ba3a24694ac85eea975ca104181420baf7f3b9614203b0360e7cc29a1c109e") chdir(&(0x7f0000000340)='./file0\x00') symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) umount2(&(0x7f0000000380)='./file0\x00', 0x3) openat$uinput(0xffffffffffffff9c, &(0x7f0000000440)='/dev/uinput\x00', 0x802, 0x0) r3 = syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') sendmsg$FOU_CMD_DEL(r1, &(0x7f00000002c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x28, r3, 0x0, 0x70bd25, 0x25dfdbfe, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e24}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x7f}]}, 0x28}}, 0x24048010) sendmsg$kcm(r0, &(0x7f0000000a40)={&(0x7f0000000580)=@ll={0x11, 0xfd, r2, 0x1, 0x8, 0x6, @dev={[], 0x16}}, 0x80, &(0x7f00000009c0)=[{&(0x7f00000008c0)="367a9f0d4a1564359d1e668c63869bb9bf3b7f5aa4030462889dd6407207295cea1b36e07bc2b38b11c6ca28a73515cf52d89a8199d5c019de826c756a31bac24f707efcfc0a2383216dccc08f804551f0a56d2c9ab95a113fa74dff88ccccc7f278200aa03d2349e688b69191611739bb3e2e5ff110c5858c1a7c5bd5431f9c8e73a99236728f125d5f52a2b0761872fc0fc53cda5458241b2a80fd918b21c8029039d416a6cde6aa786bdfaa21a4e5ffa5f80dec422e0051c7e98a8cff2f4afbe25ca5a154a57c10", 0xc9}], 0x1}, 0x4004000) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000001c0)={0x0, 0x4, 0x2, 0x3, 0x1}, 0x14) ioctl$VIDIOC_SUBDEV_S_SELECTION(r0, 0xc040563e, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x7) msgget(0x1, 0x318) syz_genetlink_get_family_id$team(&(0x7f0000000400)='team\x00') [ 395.635611] IPVS: ftp: loaded support on port[0] = 21 [ 397.758657] device bridge_slave_1 left promiscuous mode [ 397.765276] bridge0: port 2(bridge_slave_1) entered disabled state [ 397.812546] device bridge_slave_0 left promiscuous mode [ 397.818206] bridge0: port 1(bridge_slave_0) entered disabled state [ 400.270296] net_ratelimit: 28 callbacks suppressed [ 400.270304] protocol 88fb is buggy, dev hsr_slave_0 [ 400.280478] protocol 88fb is buggy, dev hsr_slave_1 [ 401.150301] protocol 88fb is buggy, dev hsr_slave_0 [ 401.155424] protocol 88fb is buggy, dev hsr_slave_1 [ 401.230313] protocol 88fb is buggy, dev hsr_slave_0 [ 401.235699] protocol 88fb is buggy, dev hsr_slave_1 [ 401.550313] protocol 88fb is buggy, dev hsr_slave_0 [ 401.555435] protocol 88fb is buggy, dev hsr_slave_1 [ 401.710333] protocol 88fb is buggy, dev hsr_slave_0 [ 401.715474] protocol 88fb is buggy, dev hsr_slave_1 [ 401.813511] device hsr_slave_1 left promiscuous mode [ 401.857441] device hsr_slave_0 left promiscuous mode [ 401.916885] team0 (unregistering): Port device team_slave_1 removed [ 401.928138] team0 (unregistering): Port device team_slave_0 removed [ 401.939372] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 402.004628] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 402.080534] bond0 (unregistering): Released all slaves 16:51:38 executing program 4: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000b00)) mount(&(0x7f00000004c0)=ANY=[], &(0x7f000000aff8)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000000)) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000000c0)='tls\x00', 0x4) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$void(r1, 0x5450) renameat2(r0, &(0x7f0000000180)='./file0/file0\x00', 0xffffffffffffffff, 0x0, 0x4) shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@dev, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@remote}}, 0x0) ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, 0x0) shmctl$IPC_SET(0x0, 0x1, 0x0) ioctl$PIO_FONT(r0, 0x4b61, &(0x7f0000000740)="9d705183203ecbbfc0d13a4e30241f7ce01b0b4d7682444a507bfc1ac414339f479986467eb40c8065891e1fbbe7263212c5c09bb47896b3d85893f1173f8a139c116f876fdcc1779bffef8c34b5958981616cbcf39f2d8b43491de452d774a74c3ae9555a45180f7d68da36975781ba3a24694ac85eea975ca104181420baf7f3b9614203b0360e7cc29a1c109e") chdir(&(0x7f0000000340)='./file0\x00') symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) umount2(&(0x7f0000000380)='./file0\x00', 0x3) openat$uinput(0xffffffffffffff9c, &(0x7f0000000440)='/dev/uinput\x00', 0x802, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') sendmsg$FOU_CMD_DEL(r1, 0x0, 0x24048010) sendmsg$kcm(r0, &(0x7f0000000a40)={&(0x7f0000000580)=@ll={0x11, 0xfd, r2, 0x1, 0x8, 0x6, @dev={[], 0x16}}, 0x80, &(0x7f00000009c0)=[{&(0x7f00000008c0)="367a9f0d4a1564359d1e668c63869bb9bf3b7f5aa4030462889dd6407207295cea1b36e07bc2b38b11c6ca28a73515cf52d89a8199d5c019de826c756a31bac24f707efcfc0a2383216dccc08f804551f0a56d2c9ab95a113fa74dff88ccccc7f278200aa03d2349e688b69191611739bb3e2e5ff110c5858c1a7c5bd5431f9c8e73a99236728f125d5f52a2b0761872fc0fc53cda5458241b2a80fd918b21c8029039d416a6cde6aa786bdfaa21a4e5ffa5f80dec422e0051c7e98a8cff2f4afbe25ca5a154a57c10", 0xc9}], 0x1}, 0x4004000) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000001c0)={0x0, 0x4, 0x2, 0x3, 0x1}, 0x14) ioctl$VIDIOC_SUBDEV_S_SELECTION(r0, 0xc040563e, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x7) msgget(0x1, 0x318) syz_genetlink_get_family_id$team(&(0x7f0000000400)='team\x00') 16:51:38 executing program 2: r0 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'hsr0\x00', 0x0}) bind$packet(r0, &(0x7f0000000340)={0x11, 0x0, r1}, 0x14) sendto(r0, &(0x7f00000000c0)="e360b641b37f0000000048880066", 0xe, 0x0, 0x0, 0x0) 16:51:38 executing program 1: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000b00)) mount(&(0x7f00000004c0)=ANY=[], &(0x7f000000aff8)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000000)) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000000c0)='tls\x00', 0x4) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$void(r1, 0x5450) renameat2(r0, &(0x7f0000000180)='./file0/file0\x00', 0xffffffffffffffff, 0x0, 0x4) shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@dev, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@remote}}, 0x0) ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, 0x0) shmctl$IPC_SET(0x0, 0x1, 0x0) ioctl$PIO_FONT(r0, 0x4b61, &(0x7f0000000740)="9d705183203ecbbfc0d13a4e30241f7ce01b0b4d7682444a507bfc1ac414339f479986467eb40c8065891e1fbbe7263212c5c09bb47896b3d85893f1173f8a139c116f876fdcc1779bffef8c34b5958981616cbcf39f2d8b43491de452d774a74c3ae9555a45180f7d68da36975781ba3a24694ac85eea975ca104181420baf7f3b9614203b0360e7cc29a1c109e") chdir(&(0x7f0000000340)='./file0\x00') symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) umount2(&(0x7f0000000380)='./file0\x00', 0x3) openat$uinput(0xffffffffffffff9c, &(0x7f0000000440)='/dev/uinput\x00', 0x802, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') sendmsg$FOU_CMD_DEL(r1, 0x0, 0x24048010) sendmsg$kcm(r0, &(0x7f0000000a40)={&(0x7f0000000580)=@ll={0x11, 0xfd, r2, 0x1, 0x8, 0x6, @dev={[], 0x16}}, 0x80, &(0x7f00000009c0)=[{&(0x7f00000008c0)="367a9f0d4a1564359d1e668c63869bb9bf3b7f5aa4030462889dd6407207295cea1b36e07bc2b38b11c6ca28a73515cf52d89a8199d5c019de826c756a31bac24f707efcfc0a2383216dccc08f804551f0a56d2c9ab95a113fa74dff88ccccc7f278200aa03d2349e688b69191611739bb3e2e5ff110c5858c1a7c5bd5431f9c8e73a99236728f125d5f52a2b0761872fc0fc53cda5458241b2a80fd918b21c8029039d416a6cde6aa786bdfaa21a4e5ffa5f80dec422e0051c7e98a8cff2f4afbe25ca5a154a57c10", 0xc9}], 0x1}, 0x4004000) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000001c0)={0x0, 0x4, 0x2, 0x3, 0x1}, 0x14) ioctl$VIDIOC_SUBDEV_S_SELECTION(r0, 0xc040563e, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x7) msgget(0x1, 0x318) syz_genetlink_get_family_id$team(&(0x7f0000000400)='team\x00') 16:51:38 executing program 3: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000b00)) mount(&(0x7f00000004c0)=ANY=[], &(0x7f000000aff8)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000000)) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000000c0)='tls\x00', 0x4) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$void(r1, 0x5450) renameat2(r0, &(0x7f0000000180)='./file0/file0\x00', 0xffffffffffffffff, 0x0, 0x4) shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@dev, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@remote}}, 0x0) ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, 0x0) shmctl$IPC_SET(0x0, 0x1, 0x0) ioctl$PIO_FONT(r0, 0x4b61, &(0x7f0000000740)="9d705183203ecbbfc0d13a4e30241f7ce01b0b4d7682444a507bfc1ac414339f479986467eb40c8065891e1fbbe7263212c5c09bb47896b3d85893f1173f8a139c116f876fdcc1779bffef8c34b5958981616cbcf39f2d8b43491de452d774a74c3ae9555a45180f7d68da36975781ba3a24694ac85eea975ca104181420baf7f3b9614203b0360e7cc29a1c109e") chdir(&(0x7f0000000340)='./file0\x00') symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) umount2(&(0x7f0000000380)='./file0\x00', 0x3) openat$uinput(0xffffffffffffff9c, &(0x7f0000000440)='/dev/uinput\x00', 0x802, 0x0) r3 = syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') sendmsg$FOU_CMD_DEL(r1, &(0x7f00000002c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x28, r3, 0x200, 0x0, 0x25dfdbfe, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e24}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x7f}]}, 0x28}}, 0x24048010) sendmsg$kcm(r0, &(0x7f0000000a40)={&(0x7f0000000580)=@ll={0x11, 0xfd, r2, 0x1, 0x8, 0x6, @dev={[], 0x16}}, 0x80, &(0x7f00000009c0)=[{&(0x7f00000008c0)="367a9f0d4a1564359d1e668c63869bb9bf3b7f5aa4030462889dd6407207295cea1b36e07bc2b38b11c6ca28a73515cf52d89a8199d5c019de826c756a31bac24f707efcfc0a2383216dccc08f804551f0a56d2c9ab95a113fa74dff88ccccc7f278200aa03d2349e688b69191611739bb3e2e5ff110c5858c1a7c5bd5431f9c8e73a99236728f125d5f52a2b0761872fc0fc53cda5458241b2a80fd918b21c8029039d416a6cde6aa786bdfaa21a4e5ffa5f80dec422e0051c7e98a8cff2f4afbe25ca5a154a57c10", 0xc9}], 0x1}, 0x4004000) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000001c0)={0x0, 0x4, 0x2, 0x3, 0x1}, 0x14) ioctl$VIDIOC_SUBDEV_S_SELECTION(r0, 0xc040563e, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x7) msgget(0x1, 0x318) syz_genetlink_get_family_id$team(&(0x7f0000000400)='team\x00') 16:51:38 executing program 5: syz_open_dev$loop(0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0xa, &(0x7f0000000000)='{[\'md5sum\x00', 0xffffffffffffffff}, 0x30) r0 = gettid() getpgid(r0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x105082) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r3 = memfd_create(&(0x7f0000000280)='IPVS\x00', 0x0) prctl$PR_SET_MM_AUXV(0x23, 0xc, &(0x7f0000000600)="6d138c359d7b46129a98792991ef2348a0b06b3877eff74f2383bd501a7a436ab31f7f89fa1cdc76e95c0db3aed6b48a21b974805bbcc0313fe54556978259c702e4b0114d8135b072ae7633c24bb3a4f8cccc8d619486b88a8af0d95f3511591006edc46aa5d521b397b3a6080ae6230c33511ea746a38799e45b184c5d5d10c459d71529ce5f8253d8d8deef405a83c8aeafc1f02120facad9db76212cff2cbaf81c4027f818ad3e248e3042885a837eefccd77630e823cd9705cbb12414ceee24", 0xc2) pwritev(r3, &(0x7f0000f50f90)=[{&(0x7f00000000c0)='S', 0x1}], 0x1, 0x4081003) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r3) fallocate(r2, 0x11, 0x0, 0x100000001) futimesat(r1, &(0x7f0000000240)='./file1\x00', &(0x7f00000002c0)={{0x0, 0x7530}, {0x0, 0x7530}}) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, 0x0, 0x2, 0x0) accept$unix(0xffffffffffffff9c, &(0x7f0000000140)=@abs, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='task\x00') 16:51:38 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x4000000000000036) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x21, r0, 0x0, 0x0) 16:51:38 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x4000000000000036) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x21, r0, 0x0, 0x0) 16:51:38 executing program 2: r0 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'hsr0\x00', 0x0}) bind$packet(r0, &(0x7f0000000340)={0x11, 0x0, r1}, 0x14) sendto(r0, &(0x7f00000000c0)="e360b641b37f0000000000010066", 0xe, 0x0, 0x0, 0x0) 16:51:38 executing program 3: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000b00)) mount(&(0x7f00000004c0)=ANY=[], &(0x7f000000aff8)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000000)) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000000c0)='tls\x00', 0x4) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$void(r1, 0x5450) renameat2(r0, &(0x7f0000000180)='./file0/file0\x00', 0xffffffffffffffff, 0x0, 0x4) shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@dev, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@remote}}, 0x0) ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, 0x0) shmctl$IPC_SET(0x0, 0x1, 0x0) ioctl$PIO_FONT(r0, 0x4b61, &(0x7f0000000740)="9d705183203ecbbfc0d13a4e30241f7ce01b0b4d7682444a507bfc1ac414339f479986467eb40c8065891e1fbbe7263212c5c09bb47896b3d85893f1173f8a139c116f876fdcc1779bffef8c34b5958981616cbcf39f2d8b43491de452d774a74c3ae9555a45180f7d68da36975781ba3a24694ac85eea975ca104181420baf7f3b9614203b0360e7cc29a1c109e") chdir(&(0x7f0000000340)='./file0\x00') symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) umount2(&(0x7f0000000380)='./file0\x00', 0x3) openat$uinput(0xffffffffffffff9c, &(0x7f0000000440)='/dev/uinput\x00', 0x802, 0x0) r3 = syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') sendmsg$FOU_CMD_DEL(r1, &(0x7f00000002c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x28, r3, 0x200, 0x70bd25, 0x0, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e24}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x7f}]}, 0x28}}, 0x24048010) sendmsg$kcm(r0, &(0x7f0000000a40)={&(0x7f0000000580)=@ll={0x11, 0xfd, r2, 0x1, 0x8, 0x6, @dev={[], 0x16}}, 0x80, &(0x7f00000009c0)=[{&(0x7f00000008c0)="367a9f0d4a1564359d1e668c63869bb9bf3b7f5aa4030462889dd6407207295cea1b36e07bc2b38b11c6ca28a73515cf52d89a8199d5c019de826c756a31bac24f707efcfc0a2383216dccc08f804551f0a56d2c9ab95a113fa74dff88ccccc7f278200aa03d2349e688b69191611739bb3e2e5ff110c5858c1a7c5bd5431f9c8e73a99236728f125d5f52a2b0761872fc0fc53cda5458241b2a80fd918b21c8029039d416a6cde6aa786bdfaa21a4e5ffa5f80dec422e0051c7e98a8cff2f4afbe25ca5a154a57c10", 0xc9}], 0x1}, 0x4004000) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000001c0)={0x0, 0x4, 0x2, 0x3, 0x1}, 0x14) ioctl$VIDIOC_SUBDEV_S_SELECTION(r0, 0xc040563e, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x7) msgget(0x1, 0x318) syz_genetlink_get_family_id$team(&(0x7f0000000400)='team\x00') 16:51:38 executing program 1: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000b00)) mount(&(0x7f00000004c0)=ANY=[], &(0x7f000000aff8)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000000)) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000000c0)='tls\x00', 0x4) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$void(r1, 0x5450) renameat2(r0, &(0x7f0000000180)='./file0/file0\x00', 0xffffffffffffffff, 0x0, 0x4) shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@dev, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@remote}}, 0x0) ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, 0x0) shmctl$IPC_SET(0x0, 0x1, 0x0) ioctl$PIO_FONT(r0, 0x4b61, &(0x7f0000000740)="9d705183203ecbbfc0d13a4e30241f7ce01b0b4d7682444a507bfc1ac414339f479986467eb40c8065891e1fbbe7263212c5c09bb47896b3d85893f1173f8a139c116f876fdcc1779bffef8c34b5958981616cbcf39f2d8b43491de452d774a74c3ae9555a45180f7d68da36975781ba3a24694ac85eea975ca104181420baf7f3b9614203b0360e7cc29a1c109e") chdir(&(0x7f0000000340)='./file0\x00') symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) umount2(&(0x7f0000000380)='./file0\x00', 0x3) openat$uinput(0xffffffffffffff9c, &(0x7f0000000440)='/dev/uinput\x00', 0x802, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') sendmsg$FOU_CMD_DEL(r1, 0x0, 0x24048010) sendmsg$kcm(r0, &(0x7f0000000a40)={&(0x7f0000000580)=@ll={0x11, 0xfd, r2, 0x1, 0x8, 0x6, @dev={[], 0x16}}, 0x80, &(0x7f00000009c0)=[{&(0x7f00000008c0)="367a9f0d4a1564359d1e668c63869bb9bf3b7f5aa4030462889dd6407207295cea1b36e07bc2b38b11c6ca28a73515cf52d89a8199d5c019de826c756a31bac24f707efcfc0a2383216dccc08f804551f0a56d2c9ab95a113fa74dff88ccccc7f278200aa03d2349e688b69191611739bb3e2e5ff110c5858c1a7c5bd5431f9c8e73a99236728f125d5f52a2b0761872fc0fc53cda5458241b2a80fd918b21c8029039d416a6cde6aa786bdfaa21a4e5ffa5f80dec422e0051c7e98a8cff2f4afbe25ca5a154a57c10", 0xc9}], 0x1}, 0x4004000) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000001c0)={0x0, 0x4, 0x2, 0x3, 0x1}, 0x14) ioctl$VIDIOC_SUBDEV_S_SELECTION(r0, 0xc040563e, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x7) msgget(0x1, 0x318) syz_genetlink_get_family_id$team(&(0x7f0000000400)='team\x00') 16:51:38 executing program 4: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000b00)) mount(&(0x7f00000004c0)=ANY=[], &(0x7f000000aff8)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000000)) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000000c0)='tls\x00', 0x4) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$void(r1, 0x5450) renameat2(r0, &(0x7f0000000180)='./file0/file0\x00', 0xffffffffffffffff, 0x0, 0x4) shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@dev, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@remote}}, 0x0) ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, 0x0) shmctl$IPC_SET(0x0, 0x1, 0x0) ioctl$PIO_FONT(r0, 0x4b61, &(0x7f0000000740)="9d705183203ecbbfc0d13a4e30241f7ce01b0b4d7682444a507bfc1ac414339f479986467eb40c8065891e1fbbe7263212c5c09bb47896b3d85893f1173f8a139c116f876fdcc1779bffef8c34b5958981616cbcf39f2d8b43491de452d774a74c3ae9555a45180f7d68da36975781ba3a24694ac85eea975ca104181420baf7f3b9614203b0360e7cc29a1c109e") chdir(&(0x7f0000000340)='./file0\x00') symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) umount2(&(0x7f0000000380)='./file0\x00', 0x3) openat$uinput(0xffffffffffffff9c, &(0x7f0000000440)='/dev/uinput\x00', 0x802, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') sendmsg$FOU_CMD_DEL(r1, 0x0, 0x24048010) sendmsg$kcm(r0, &(0x7f0000000a40)={&(0x7f0000000580)=@ll={0x11, 0xfd, r2, 0x1, 0x8, 0x6, @dev={[], 0x16}}, 0x80, &(0x7f00000009c0)=[{&(0x7f00000008c0)="367a9f0d4a1564359d1e668c63869bb9bf3b7f5aa4030462889dd6407207295cea1b36e07bc2b38b11c6ca28a73515cf52d89a8199d5c019de826c756a31bac24f707efcfc0a2383216dccc08f804551f0a56d2c9ab95a113fa74dff88ccccc7f278200aa03d2349e688b69191611739bb3e2e5ff110c5858c1a7c5bd5431f9c8e73a99236728f125d5f52a2b0761872fc0fc53cda5458241b2a80fd918b21c8029039d416a6cde6aa786bdfaa21a4e5ffa5f80dec422e0051c7e98a8cff2f4afbe25ca5a154a57c10", 0xc9}], 0x1}, 0x4004000) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000001c0)={0x0, 0x4, 0x2, 0x3, 0x1}, 0x14) ioctl$VIDIOC_SUBDEV_S_SELECTION(r0, 0xc040563e, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x7) msgget(0x1, 0x318) syz_genetlink_get_family_id$team(&(0x7f0000000400)='team\x00') 16:51:38 executing program 2: r0 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'hsr0\x00', 0x0}) bind$packet(r0, &(0x7f0000000340)={0x11, 0x0, r1}, 0x14) sendto(r0, &(0x7f00000000c0)="e360b641b37f000003e800000066", 0xe, 0x0, 0x0, 0x0) 16:51:39 executing program 4: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000b00)) mount(&(0x7f00000004c0)=ANY=[], &(0x7f000000aff8)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000000)) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000000c0)='tls\x00', 0x4) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$void(r1, 0x5450) renameat2(r0, &(0x7f0000000180)='./file0/file0\x00', 0xffffffffffffffff, 0x0, 0x4) shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@dev, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@remote}}, 0x0) ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, 0x0) shmctl$IPC_SET(0x0, 0x1, 0x0) ioctl$PIO_FONT(r0, 0x4b61, &(0x7f0000000740)="9d705183203ecbbfc0d13a4e30241f7ce01b0b4d7682444a507bfc1ac414339f479986467eb40c8065891e1fbbe7263212c5c09bb47896b3d85893f1173f8a139c116f876fdcc1779bffef8c34b5958981616cbcf39f2d8b43491de452d774a74c3ae9555a45180f7d68da36975781ba3a24694ac85eea975ca104181420baf7f3b9614203b0360e7cc29a1c109e") chdir(&(0x7f0000000340)='./file0\x00') symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) umount2(&(0x7f0000000380)='./file0\x00', 0x3) openat$uinput(0xffffffffffffff9c, &(0x7f0000000440)='/dev/uinput\x00', 0x802, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') sendmsg$FOU_CMD_DEL(r1, 0x0, 0x24048010) sendmsg$kcm(r0, &(0x7f0000000a40)={&(0x7f0000000580)=@ll={0x11, 0xfd, r2, 0x1, 0x8, 0x6, @dev={[], 0x16}}, 0x80, &(0x7f00000009c0)=[{&(0x7f00000008c0)="367a9f0d4a1564359d1e668c63869bb9bf3b7f5aa4030462889dd6407207295cea1b36e07bc2b38b11c6ca28a73515cf52d89a8199d5c019de826c756a31bac24f707efcfc0a2383216dccc08f804551f0a56d2c9ab95a113fa74dff88ccccc7f278200aa03d2349e688b69191611739bb3e2e5ff110c5858c1a7c5bd5431f9c8e73a99236728f125d5f52a2b0761872fc0fc53cda5458241b2a80fd918b21c8029039d416a6cde6aa786bdfaa21a4e5ffa5f80dec422e0051c7e98a8cff2f4afbe25ca5a154a57c10", 0xc9}], 0x1}, 0x4004000) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000001c0)={0x0, 0x4, 0x2, 0x3, 0x1}, 0x14) ioctl$VIDIOC_SUBDEV_S_SELECTION(r0, 0xc040563e, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x7) msgget(0x1, 0x318) syz_genetlink_get_family_id$team(&(0x7f0000000400)='team\x00') 16:51:39 executing program 2: r0 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'hsr0\x00', 0x0}) bind$packet(r0, &(0x7f0000000340)={0x11, 0x0, r1}, 0x14) sendto(r0, &(0x7f00000000c0)="e360b641b37f0000004000000066", 0xe, 0x0, 0x0, 0x0) 16:51:39 executing program 3: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000b00)) mount(&(0x7f00000004c0)=ANY=[], &(0x7f000000aff8)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000000)) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000000c0)='tls\x00', 0x4) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$void(r1, 0x5450) renameat2(r0, &(0x7f0000000180)='./file0/file0\x00', 0xffffffffffffffff, 0x0, 0x4) shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@dev, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@remote}}, 0x0) ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, 0x0) shmctl$IPC_SET(0x0, 0x1, 0x0) ioctl$PIO_FONT(r0, 0x4b61, &(0x7f0000000740)="9d705183203ecbbfc0d13a4e30241f7ce01b0b4d7682444a507bfc1ac414339f479986467eb40c8065891e1fbbe7263212c5c09bb47896b3d85893f1173f8a139c116f876fdcc1779bffef8c34b5958981616cbcf39f2d8b43491de452d774a74c3ae9555a45180f7d68da36975781ba3a24694ac85eea975ca104181420baf7f3b9614203b0360e7cc29a1c109e") chdir(&(0x7f0000000340)='./file0\x00') symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) umount2(&(0x7f0000000380)='./file0\x00', 0x3) openat$uinput(0xffffffffffffff9c, &(0x7f0000000440)='/dev/uinput\x00', 0x802, 0x0) r3 = syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') sendmsg$FOU_CMD_DEL(r1, &(0x7f00000002c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x20, r3, 0x200, 0x70bd25, 0x25dfdbfe, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e24}]}, 0x20}}, 0x24048010) sendmsg$kcm(r0, &(0x7f0000000a40)={&(0x7f0000000580)=@ll={0x11, 0xfd, r2, 0x1, 0x8, 0x6, @dev={[], 0x16}}, 0x80, &(0x7f00000009c0)=[{&(0x7f00000008c0)="367a9f0d4a1564359d1e668c63869bb9bf3b7f5aa4030462889dd6407207295cea1b36e07bc2b38b11c6ca28a73515cf52d89a8199d5c019de826c756a31bac24f707efcfc0a2383216dccc08f804551f0a56d2c9ab95a113fa74dff88ccccc7f278200aa03d2349e688b69191611739bb3e2e5ff110c5858c1a7c5bd5431f9c8e73a99236728f125d5f52a2b0761872fc0fc53cda5458241b2a80fd918b21c8029039d416a6cde6aa786bdfaa21a4e5ffa5f80dec422e0051c7e98a8cff2f4afbe25ca5a154a57c10", 0xc9}], 0x1}, 0x4004000) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000001c0)={0x0, 0x4, 0x2, 0x3, 0x1}, 0x14) ioctl$VIDIOC_SUBDEV_S_SELECTION(r0, 0xc040563e, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x7) msgget(0x1, 0x318) syz_genetlink_get_family_id$team(&(0x7f0000000400)='team\x00') 16:51:39 executing program 1: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000b00)) mount(&(0x7f00000004c0)=ANY=[], &(0x7f000000aff8)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000000)) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000000c0)='tls\x00', 0x4) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$void(r1, 0x5450) renameat2(r0, &(0x7f0000000180)='./file0/file0\x00', 0xffffffffffffffff, 0x0, 0x4) shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@dev, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@remote}}, 0x0) ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, 0x0) shmctl$IPC_SET(0x0, 0x1, 0x0) ioctl$PIO_FONT(r0, 0x4b61, &(0x7f0000000740)="9d705183203ecbbfc0d13a4e30241f7ce01b0b4d7682444a507bfc1ac414339f479986467eb40c8065891e1fbbe7263212c5c09bb47896b3d85893f1173f8a139c116f876fdcc1779bffef8c34b5958981616cbcf39f2d8b43491de452d774a74c3ae9555a45180f7d68da36975781ba3a24694ac85eea975ca104181420baf7f3b9614203b0360e7cc29a1c109e") chdir(&(0x7f0000000340)='./file0\x00') symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) umount2(&(0x7f0000000380)='./file0\x00', 0x3) openat$uinput(0xffffffffffffff9c, &(0x7f0000000440)='/dev/uinput\x00', 0x802, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') sendmsg$FOU_CMD_DEL(r1, 0x0, 0x24048010) sendmsg$kcm(r0, &(0x7f0000000a40)={&(0x7f0000000580)=@ll={0x11, 0xfd, r2, 0x1, 0x8, 0x6, @dev={[], 0x16}}, 0x80, &(0x7f00000009c0)=[{&(0x7f00000008c0)="367a9f0d4a1564359d1e668c63869bb9bf3b7f5aa4030462889dd6407207295cea1b36e07bc2b38b11c6ca28a73515cf52d89a8199d5c019de826c756a31bac24f707efcfc0a2383216dccc08f804551f0a56d2c9ab95a113fa74dff88ccccc7f278200aa03d2349e688b69191611739bb3e2e5ff110c5858c1a7c5bd5431f9c8e73a99236728f125d5f52a2b0761872fc0fc53cda5458241b2a80fd918b21c8029039d416a6cde6aa786bdfaa21a4e5ffa5f80dec422e0051c7e98a8cff2f4afbe25ca5a154a57c10", 0xc9}], 0x1}, 0x4004000) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000001c0)={0x0, 0x4, 0x2, 0x3, 0x1}, 0x14) ioctl$VIDIOC_SUBDEV_S_SELECTION(r0, 0xc040563e, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x7) msgget(0x1, 0x318) syz_genetlink_get_family_id$team(&(0x7f0000000400)='team\x00') 16:51:39 executing program 5: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000b00)) mount(&(0x7f00000004c0)=ANY=[], &(0x7f000000aff8)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000000)) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000000c0)='tls\x00', 0x4) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$void(r1, 0x5450) renameat2(r0, &(0x7f0000000180)='./file0/file0\x00', 0xffffffffffffffff, 0x0, 0x4) shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@dev, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@remote}}, 0x0) ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, 0x0) shmctl$IPC_SET(0x0, 0x1, 0x0) ioctl$PIO_FONT(r0, 0x4b61, &(0x7f0000000740)="9d705183203ecbbfc0d13a4e30241f7ce01b0b4d7682444a507bfc1ac414339f479986467eb40c8065891e1fbbe7263212c5c09bb47896b3d85893f1173f8a139c116f876fdcc1779bffef8c34b5958981616cbcf39f2d8b43491de452d774a74c3ae9555a45180f7d68da36975781ba3a24694ac85eea975ca104181420baf7f3b9614203b0360e7cc29a1c109e") chdir(&(0x7f0000000340)='./file0\x00') symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) umount2(&(0x7f0000000380)='./file0\x00', 0x3) openat$uinput(0xffffffffffffff9c, &(0x7f0000000440)='/dev/uinput\x00', 0x802, 0x0) r3 = syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x28, r3, 0x200, 0x70bd25, 0x25dfdbfe, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e24}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x7f}]}, 0x28}}, 0x24048010) sendmsg$kcm(r0, &(0x7f0000000a40)={&(0x7f0000000580)=@ll={0x11, 0xfd, r2, 0x1, 0x8, 0x6, @dev={[], 0x16}}, 0x80, &(0x7f00000009c0)=[{&(0x7f00000008c0)="367a9f0d4a1564359d1e668c63869bb9bf3b7f5aa4030462889dd6407207295cea1b36e07bc2b38b11c6ca28a73515cf52d89a8199d5c019de826c756a31bac24f707efcfc0a2383216dccc08f804551f0a56d2c9ab95a113fa74dff88ccccc7f278200aa03d2349e688b69191611739bb3e2e5ff110c5858c1a7c5bd5431f9c8e73a99236728f125d5f52a2b0761872fc0fc53cda5458241b2a80fd918b21c8029039d416a6cde6aa786bdfaa21a4e5ffa5f80dec422e0051c7e98a8cff2f4afbe25ca5a154a57c10", 0xc9}], 0x1}, 0x4004000) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000001c0)={0x0, 0x4, 0x2, 0x3, 0x1}, 0x14) ioctl$VIDIOC_SUBDEV_S_SELECTION(r0, 0xc040563e, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x7) msgget(0x1, 0x318) syz_genetlink_get_family_id$team(&(0x7f0000000400)='team\x00') 16:51:39 executing program 2: r0 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'hsr0\x00', 0x0}) bind$packet(r0, &(0x7f0000000340)={0x11, 0x0, r1}, 0x14) sendto(r0, &(0x7f00000000c0)="e360b641b37f0000488800000066", 0xe, 0x0, 0x0, 0x0) [ 405.310391] net_ratelimit: 16 callbacks suppressed [ 405.310401] protocol 88fb is buggy, dev hsr_slave_0 [ 405.320463] protocol 88fb is buggy, dev hsr_slave_1 [ 405.400306] protocol 88fb is buggy, dev hsr_slave_0 [ 405.405457] protocol 88fb is buggy, dev hsr_slave_1 [ 405.710314] protocol 88fb is buggy, dev hsr_slave_0 [ 405.715561] protocol 88fb is buggy, dev hsr_slave_1 16:51:41 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x4000000000000036) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x21, r0, 0x0, 0x0) 16:51:41 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(0x0, 0x4000000000000036) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={@mcast1, @local, @local, 0x0, 0x0, 0x0, 0x200800000000114}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x21, r0, 0x0, 0x0) 16:51:41 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x6674}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000240)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$restrict_keyring(0x1d, r0, &(0x7f0000000280)='asymmetric\x00', &(0x7f0000000340)='!selinuxselinux\x00') 16:51:41 executing program 3: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000b00)) mount(&(0x7f00000004c0)=ANY=[], &(0x7f000000aff8)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000000)) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000000c0)='tls\x00', 0x4) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$void(r1, 0x5450) renameat2(r0, &(0x7f0000000180)='./file0/file0\x00', 0xffffffffffffffff, 0x0, 0x4) shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@dev, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@remote}}, 0x0) ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, 0x0) shmctl$IPC_SET(0x0, 0x1, 0x0) ioctl$PIO_FONT(r0, 0x4b61, &(0x7f0000000740)="9d705183203ecbbfc0d13a4e30241f7ce01b0b4d7682444a507bfc1ac414339f479986467eb40c8065891e1fbbe7263212c5c09bb47896b3d85893f1173f8a139c116f876fdcc1779bffef8c34b5958981616cbcf39f2d8b43491de452d774a74c3ae9555a45180f7d68da36975781ba3a24694ac85eea975ca104181420baf7f3b9614203b0360e7cc29a1c109e") chdir(&(0x7f0000000340)='./file0\x00') symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) umount2(&(0x7f0000000380)='./file0\x00', 0x3) openat$uinput(0xffffffffffffff9c, &(0x7f0000000440)='/dev/uinput\x00', 0x802, 0x0) r3 = syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') sendmsg$FOU_CMD_DEL(r1, &(0x7f00000002c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x20, r3, 0x200, 0x70bd25, 0x25dfdbfe, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e24}]}, 0x20}}, 0x24048010) sendmsg$kcm(r0, &(0x7f0000000a40)={&(0x7f0000000580)=@ll={0x11, 0xfd, r2, 0x1, 0x8, 0x6, @dev={[], 0x16}}, 0x80, &(0x7f00000009c0)=[{&(0x7f00000008c0)="367a9f0d4a1564359d1e668c63869bb9bf3b7f5aa4030462889dd6407207295cea1b36e07bc2b38b11c6ca28a73515cf52d89a8199d5c019de826c756a31bac24f707efcfc0a2383216dccc08f804551f0a56d2c9ab95a113fa74dff88ccccc7f278200aa03d2349e688b69191611739bb3e2e5ff110c5858c1a7c5bd5431f9c8e73a99236728f125d5f52a2b0761872fc0fc53cda5458241b2a80fd918b21c8029039d416a6cde6aa786bdfaa21a4e5ffa5f80dec422e0051c7e98a8cff2f4afbe25ca5a154a57c10", 0xc9}], 0x1}, 0x4004000) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000001c0)={0x0, 0x4, 0x2, 0x3, 0x1}, 0x14) ioctl$VIDIOC_SUBDEV_S_SELECTION(r0, 0xc040563e, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x7) msgget(0x1, 0x318) syz_genetlink_get_family_id$team(&(0x7f0000000400)='team\x00') 16:51:41 executing program 2: r0 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'hsr0\x00', 0x0}) bind$packet(r0, &(0x7f0000000340)={0x11, 0x0, r1}, 0x14) sendto(r0, &(0x7f00000000c0)="e360b641b37f0000020000000066", 0xe, 0x0, 0x0, 0x0) 16:51:41 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x6674}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000240)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$restrict_keyring(0x1d, r0, &(0x7f0000000280)='asymmetric\x00', &(0x7f0000000340)='!selinuxselinux\x00') 16:51:41 executing program 2: r0 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'hsr0\x00', 0x0}) bind$packet(r0, &(0x7f0000000340)={0x11, 0x0, r1}, 0x14) sendto(r0, &(0x7f00000000c0)="e360b641b37f0000890600000066", 0xe, 0x0, 0x0, 0x0) [ 405.870568] protocol 88fb is buggy, dev hsr_slave_0 [ 405.875782] protocol 88fb is buggy, dev hsr_slave_1 16:51:41 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x6674}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000240)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$restrict_keyring(0x1d, r0, &(0x7f0000000280)='asymmetric\x00', &(0x7f0000000340)='!selinuxselinux\x00') 16:51:41 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x17a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x6674}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000240)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$restrict_keyring(0x1d, r0, &(0x7f0000000280)='asymmetric\x00', &(0x7f0000000340)='!selinuxselinux\x00') 16:51:41 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x6674}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000240)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$restrict_keyring(0x1d, r0, &(0x7f0000000280)='asymmetric\x00', &(0x7f0000000340)='!selinuxselinux\x00') 16:51:41 executing program 3: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000b00)) mount(&(0x7f00000004c0)=ANY=[], &(0x7f000000aff8)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000000)) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000000c0)='tls\x00', 0x4) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$void(r1, 0x5450) renameat2(r0, &(0x7f0000000180)='./file0/file0\x00', 0xffffffffffffffff, 0x0, 0x4) shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@dev, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@remote}}, 0x0) ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, 0x0) shmctl$IPC_SET(0x0, 0x1, 0x0) ioctl$PIO_FONT(r0, 0x4b61, &(0x7f0000000740)="9d705183203ecbbfc0d13a4e30241f7ce01b0b4d7682444a507bfc1ac414339f479986467eb40c8065891e1fbbe7263212c5c09bb47896b3d85893f1173f8a139c116f876fdcc1779bffef8c34b5958981616cbcf39f2d8b43491de452d774a74c3ae9555a45180f7d68da36975781ba3a24694ac85eea975ca104181420baf7f3b9614203b0360e7cc29a1c109e") chdir(&(0x7f0000000340)='./file0\x00') symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) umount2(&(0x7f0000000380)='./file0\x00', 0x3) openat$uinput(0xffffffffffffff9c, &(0x7f0000000440)='/dev/uinput\x00', 0x802, 0x0) r3 = syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') sendmsg$FOU_CMD_DEL(r1, &(0x7f00000002c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x28, r3, 0x200, 0x70bd25, 0x25dfdbfe, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e24}, @FOU_ATTR_IPPROTO={0x8}]}, 0x28}}, 0x24048010) sendmsg$kcm(r0, &(0x7f0000000a40)={&(0x7f0000000580)=@ll={0x11, 0xfd, r2, 0x1, 0x8, 0x6, @dev={[], 0x16}}, 0x80, &(0x7f00000009c0)=[{&(0x7f00000008c0)="367a9f0d4a1564359d1e668c63869bb9bf3b7f5aa4030462889dd6407207295cea1b36e07bc2b38b11c6ca28a73515cf52d89a8199d5c019de826c756a31bac24f707efcfc0a2383216dccc08f804551f0a56d2c9ab95a113fa74dff88ccccc7f278200aa03d2349e688b69191611739bb3e2e5ff110c5858c1a7c5bd5431f9c8e73a99236728f125d5f52a2b0761872fc0fc53cda5458241b2a80fd918b21c8029039d416a6cde6aa786bdfaa21a4e5ffa5f80dec422e0051c7e98a8cff2f4afbe25ca5a154a57c10", 0xc9}], 0x1}, 0x4004000) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000001c0)={0x0, 0x4, 0x2, 0x3, 0x1}, 0x14) ioctl$VIDIOC_SUBDEV_S_SELECTION(r0, 0xc040563e, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x7) msgget(0x1, 0x318) syz_genetlink_get_family_id$team(&(0x7f0000000400)='team\x00') 16:51:41 executing program 2: r0 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'hsr0\x00', 0x0}) bind$packet(r0, &(0x7f0000000340)={0x11, 0x0, r1}, 0x14) sendto(r0, &(0x7f00000000c0)="e360b641b37f0000e80300000066", 0xe, 0x0, 0x0, 0x0) [ 406.110292] protocol 88fb is buggy, dev hsr_slave_0 [ 406.115537] protocol 88fb is buggy, dev hsr_slave_1 16:51:42 executing program 4: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000b00)) mount(&(0x7f00000004c0)=ANY=[], &(0x7f000000aff8)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000000)) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000000c0)='tls\x00', 0x4) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$void(r1, 0x5450) renameat2(r0, &(0x7f0000000180)='./file0/file0\x00', 0xffffffffffffffff, 0x0, 0x4) shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@dev, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@remote}}, 0x0) ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, 0x0) shmctl$IPC_SET(0x0, 0x1, 0x0) ioctl$PIO_FONT(r0, 0x4b61, &(0x7f0000000740)="9d705183203ecbbfc0d13a4e30241f7ce01b0b4d7682444a507bfc1ac414339f479986467eb40c8065891e1fbbe7263212c5c09bb47896b3d85893f1173f8a139c116f876fdcc1779bffef8c34b5958981616cbcf39f2d8b43491de452d774a74c3ae9555a45180f7d68da36975781ba3a24694ac85eea975ca104181420baf7f3b9614203b0360e7cc29a1c109e") chdir(&(0x7f0000000340)='./file0\x00') symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) umount2(&(0x7f0000000380)='./file0\x00', 0x3) openat$uinput(0xffffffffffffff9c, 0x0, 0x802, 0x0) r3 = syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') sendmsg$FOU_CMD_DEL(r1, &(0x7f00000002c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x28, r3, 0x200, 0x70bd25, 0x25dfdbfe, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e24}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x7f}]}, 0x28}}, 0x24048010) sendmsg$kcm(r0, &(0x7f0000000a40)={&(0x7f0000000580)=@ll={0x11, 0xfd, r2, 0x1, 0x8, 0x6, @dev={[], 0x16}}, 0x80, &(0x7f00000009c0)=[{&(0x7f00000008c0)="367a9f0d4a1564359d1e668c63869bb9bf3b7f5aa4030462889dd6407207295cea1b36e07bc2b38b11c6ca28a73515cf52d89a8199d5c019de826c756a31bac24f707efcfc0a2383216dccc08f804551f0a56d2c9ab95a113fa74dff88ccccc7f278200aa03d2349e688b69191611739bb3e2e5ff110c5858c1a7c5bd5431f9c8e73a99236728f125d5f52a2b0761872fc0fc53cda5458241b2a80fd918b21c8029039d416a6cde6aa786bdfaa21a4e5ffa5f80dec422e0051c7e98a8cff2f4afbe25ca5a154a57c10", 0xc9}], 0x1}, 0x4004000) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000001c0)={0x0, 0x4, 0x2, 0x3, 0x1}, 0x14) ioctl$VIDIOC_SUBDEV_S_SELECTION(r0, 0xc040563e, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x7) msgget(0x1, 0x318) syz_genetlink_get_family_id$team(&(0x7f0000000400)='team\x00') 16:51:42 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x4000000000000036) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={@mcast1, @local, @local}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x21, r0, 0x0, 0x0) 16:51:42 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x17a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x6674}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, 0x0, &(0x7f0000000280)='asymmetric\x00', &(0x7f0000000340)='!selinuxselinux\x00') 16:51:42 executing program 2: r0 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'hsr0\x00', 0x0}) bind$packet(r0, &(0x7f0000000340)={0x11, 0x0, r1}, 0x14) sendto(r0, &(0x7f00000000c0)="e360b641b37f0000000001f40066", 0xe, 0x0, 0x0, 0x0) 16:51:42 executing program 1: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000b00)) mount(&(0x7f00000004c0)=ANY=[], &(0x7f000000aff8)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000000)) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000000c0)='tls\x00', 0x4) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$void(r1, 0x5450) renameat2(r0, &(0x7f0000000180)='./file0/file0\x00', 0xffffffffffffffff, 0x0, 0x4) shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@dev, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@remote}}, 0x0) ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, 0x0) shmctl$IPC_SET(0x0, 0x1, 0x0) ioctl$PIO_FONT(r0, 0x4b61, &(0x7f0000000740)="9d705183203ecbbfc0d13a4e30241f7ce01b0b4d7682444a507bfc1ac414339f479986467eb40c8065891e1fbbe7263212c5c09bb47896b3d85893f1173f8a139c116f876fdcc1779bffef8c34b5958981616cbcf39f2d8b43491de452d774a74c3ae9555a45180f7d68da36975781ba3a24694ac85eea975ca104181420baf7f3b9614203b0360e7cc29a1c109e") chdir(&(0x7f0000000340)='./file0\x00') symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) umount2(&(0x7f0000000380)='./file0\x00', 0x3) openat$uinput(0xffffffffffffff9c, 0x0, 0x802, 0x0) r3 = syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') sendmsg$FOU_CMD_DEL(r1, &(0x7f00000002c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x28, r3, 0x200, 0x70bd25, 0x25dfdbfe, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e24}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x7f}]}, 0x28}}, 0x24048010) sendmsg$kcm(r0, &(0x7f0000000a40)={&(0x7f0000000580)=@ll={0x11, 0xfd, r2, 0x1, 0x8, 0x6, @dev={[], 0x16}}, 0x80, &(0x7f00000009c0)=[{&(0x7f00000008c0)="367a9f0d4a1564359d1e668c63869bb9bf3b7f5aa4030462889dd6407207295cea1b36e07bc2b38b11c6ca28a73515cf52d89a8199d5c019de826c756a31bac24f707efcfc0a2383216dccc08f804551f0a56d2c9ab95a113fa74dff88ccccc7f278200aa03d2349e688b69191611739bb3e2e5ff110c5858c1a7c5bd5431f9c8e73a99236728f125d5f52a2b0761872fc0fc53cda5458241b2a80fd918b21c8029039d416a6cde6aa786bdfaa21a4e5ffa5f80dec422e0051c7e98a8cff2f4afbe25ca5a154a57c10", 0xc9}], 0x1}, 0x4004000) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000001c0)={0x0, 0x4, 0x2, 0x3, 0x1}, 0x14) ioctl$VIDIOC_SUBDEV_S_SELECTION(r0, 0xc040563e, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x7) msgget(0x1, 0x318) syz_genetlink_get_family_id$team(&(0x7f0000000400)='team\x00') 16:51:42 executing program 3: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000b00)) mount(&(0x7f00000004c0)=ANY=[], &(0x7f000000aff8)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000000)) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000000c0)='tls\x00', 0x4) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$void(r1, 0x5450) renameat2(r0, &(0x7f0000000180)='./file0/file0\x00', 0xffffffffffffffff, 0x0, 0x4) shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@dev, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@remote}}, 0x0) ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, 0x0) shmctl$IPC_SET(0x0, 0x1, 0x0) ioctl$PIO_FONT(r0, 0x4b61, &(0x7f0000000740)="9d705183203ecbbfc0d13a4e30241f7ce01b0b4d7682444a507bfc1ac414339f479986467eb40c8065891e1fbbe7263212c5c09bb47896b3d85893f1173f8a139c116f876fdcc1779bffef8c34b5958981616cbcf39f2d8b43491de452d774a74c3ae9555a45180f7d68da36975781ba3a24694ac85eea975ca104181420baf7f3b9614203b0360e7cc29a1c109e") chdir(&(0x7f0000000340)='./file0\x00') symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) umount2(&(0x7f0000000380)='./file0\x00', 0x3) openat$uinput(0xffffffffffffff9c, &(0x7f0000000440)='/dev/uinput\x00', 0x802, 0x0) r3 = syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') sendmsg$FOU_CMD_DEL(r1, &(0x7f00000002c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x20, r3, 0x200, 0x70bd25, 0x25dfdbfe, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x7f}]}, 0x20}}, 0x24048010) sendmsg$kcm(r0, &(0x7f0000000a40)={&(0x7f0000000580)=@ll={0x11, 0xfd, r2, 0x1, 0x8, 0x6, @dev={[], 0x16}}, 0x80, &(0x7f00000009c0)=[{&(0x7f00000008c0)="367a9f0d4a1564359d1e668c63869bb9bf3b7f5aa4030462889dd6407207295cea1b36e07bc2b38b11c6ca28a73515cf52d89a8199d5c019de826c756a31bac24f707efcfc0a2383216dccc08f804551f0a56d2c9ab95a113fa74dff88ccccc7f278200aa03d2349e688b69191611739bb3e2e5ff110c5858c1a7c5bd5431f9c8e73a99236728f125d5f52a2b0761872fc0fc53cda5458241b2a80fd918b21c8029039d416a6cde6aa786bdfaa21a4e5ffa5f80dec422e0051c7e98a8cff2f4afbe25ca5a154a57c10", 0xc9}], 0x1}, 0x4004000) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000001c0)={0x0, 0x4, 0x2, 0x3, 0x1}, 0x14) ioctl$VIDIOC_SUBDEV_S_SELECTION(r0, 0xc040563e, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x7) msgget(0x1, 0x318) syz_genetlink_get_family_id$team(&(0x7f0000000400)='team\x00') 16:51:42 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000240)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$restrict_keyring(0x1d, r0, &(0x7f0000000280)='asymmetric\x00', &(0x7f0000000340)='!selinuxselinux\x00') 16:51:42 executing program 2: r0 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'hsr0\x00', 0x0}) bind$packet(r0, &(0x7f0000000340)={0x11, 0x0, r1}, 0x14) sendto(r0, &(0x7f00000000c0)="e360b641b37f00000000000a0066", 0xe, 0x0, 0x0, 0x0) 16:51:42 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x4000000000000036) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={@mcast1, @local, @local}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x21, r0, 0x0, 0x0) 16:51:42 executing program 3: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000b00)) mount(&(0x7f00000004c0)=ANY=[], &(0x7f000000aff8)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000000)) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000000c0)='tls\x00', 0x4) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$void(r1, 0x5450) renameat2(r0, &(0x7f0000000180)='./file0/file0\x00', 0xffffffffffffffff, 0x0, 0x4) shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@dev, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@remote}}, 0x0) ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, 0x0) shmctl$IPC_SET(0x0, 0x1, 0x0) ioctl$PIO_FONT(r0, 0x4b61, &(0x7f0000000740)="9d705183203ecbbfc0d13a4e30241f7ce01b0b4d7682444a507bfc1ac414339f479986467eb40c8065891e1fbbe7263212c5c09bb47896b3d85893f1173f8a139c116f876fdcc1779bffef8c34b5958981616cbcf39f2d8b43491de452d774a74c3ae9555a45180f7d68da36975781ba3a24694ac85eea975ca104181420baf7f3b9614203b0360e7cc29a1c109e") chdir(&(0x7f0000000340)='./file0\x00') symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) umount2(&(0x7f0000000380)='./file0\x00', 0x3) openat$uinput(0xffffffffffffff9c, &(0x7f0000000440)='/dev/uinput\x00', 0x802, 0x0) r3 = syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') sendmsg$FOU_CMD_DEL(r1, &(0x7f00000002c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x20, r3, 0x200, 0x70bd25, 0x25dfdbfe, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x7f}]}, 0x20}}, 0x24048010) sendmsg$kcm(r0, &(0x7f0000000a40)={&(0x7f0000000580)=@ll={0x11, 0xfd, r2, 0x1, 0x8, 0x6, @dev={[], 0x16}}, 0x80, &(0x7f00000009c0)=[{&(0x7f00000008c0)="367a9f0d4a1564359d1e668c63869bb9bf3b7f5aa4030462889dd6407207295cea1b36e07bc2b38b11c6ca28a73515cf52d89a8199d5c019de826c756a31bac24f707efcfc0a2383216dccc08f804551f0a56d2c9ab95a113fa74dff88ccccc7f278200aa03d2349e688b69191611739bb3e2e5ff110c5858c1a7c5bd5431f9c8e73a99236728f125d5f52a2b0761872fc0fc53cda5458241b2a80fd918b21c8029039d416a6cde6aa786bdfaa21a4e5ffa5f80dec422e0051c7e98a8cff2f4afbe25ca5a154a57c10", 0xc9}], 0x1}, 0x4004000) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000001c0)={0x0, 0x4, 0x2, 0x3, 0x1}, 0x14) ioctl$VIDIOC_SUBDEV_S_SELECTION(r0, 0xc040563e, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x7) msgget(0x1, 0x318) syz_genetlink_get_family_id$team(&(0x7f0000000400)='team\x00') 16:51:42 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000240)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$restrict_keyring(0x1d, r0, &(0x7f0000000280)='asymmetric\x00', &(0x7f0000000340)='!selinuxselinux\x00') 16:51:42 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000240)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$restrict_keyring(0x1d, r0, &(0x7f0000000280)='asymmetric\x00', &(0x7f0000000340)='!selinuxselinux\x00') 16:51:42 executing program 5: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000b00)) mount(&(0x7f00000004c0)=ANY=[], &(0x7f000000aff8)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000000)) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000000c0)='tls\x00', 0x4) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$void(r1, 0x5450) renameat2(r0, &(0x7f0000000180)='./file0/file0\x00', 0xffffffffffffffff, 0x0, 0x4) shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@dev, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@remote}}, 0x0) ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, 0x0) shmctl$IPC_SET(0x0, 0x1, 0x0) ioctl$PIO_FONT(r0, 0x4b61, 0x0) chdir(&(0x7f0000000340)='./file0\x00') symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) umount2(&(0x7f0000000380)='./file0\x00', 0x3) openat$uinput(0xffffffffffffff9c, &(0x7f0000000440)='/dev/uinput\x00', 0x802, 0x0) r3 = syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') sendmsg$FOU_CMD_DEL(r1, &(0x7f00000002c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x28, r3, 0x200, 0x70bd25, 0x25dfdbfe, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e24}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x7f}]}, 0x28}}, 0x24048010) sendmsg$kcm(r0, &(0x7f0000000a40)={&(0x7f0000000580)=@ll={0x11, 0xfd, r2, 0x1, 0x8, 0x6, @dev={[], 0x16}}, 0x80, &(0x7f00000009c0)=[{&(0x7f00000008c0)="367a9f0d4a1564359d1e668c63869bb9bf3b7f5aa4030462889dd6407207295cea1b36e07bc2b38b11c6ca28a73515cf52d89a8199d5c019de826c756a31bac24f707efcfc0a2383216dccc08f804551f0a56d2c9ab95a113fa74dff88ccccc7f278200aa03d2349e688b69191611739bb3e2e5ff110c5858c1a7c5bd5431f9c8e73a99236728f125d5f52a2b0761872fc0fc53cda5458241b2a80fd918b21c8029039d416a6cde6aa786bdfaa21a4e5ffa5f80dec422e0051c7e98a8cff2f4afbe25ca5a154a57c10", 0xc9}], 0x1}, 0x4004000) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000001c0)={0x0, 0x4, 0x2, 0x3, 0x1}, 0x14) ioctl$VIDIOC_SUBDEV_S_SELECTION(r0, 0xc040563e, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x7) msgget(0x1, 0x318) syz_genetlink_get_family_id$team(&(0x7f0000000400)='team\x00') 16:51:42 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x4000000000000036) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={@mcast1, @local, @local}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x21, r0, 0x0, 0x0) 16:51:42 executing program 2: r0 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'hsr0\x00', 0x0}) bind$packet(r0, &(0x7f0000000340)={0x11, 0x0, r1}, 0x14) sendto(r0, &(0x7f00000000c0)="e360b641b37f0000ffffca880066", 0xe, 0x0, 0x0, 0x0) 16:51:42 executing program 3: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000b00)) mount(&(0x7f00000004c0)=ANY=[], &(0x7f000000aff8)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000000)) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000000c0)='tls\x00', 0x4) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$void(r1, 0x5450) renameat2(r0, &(0x7f0000000180)='./file0/file0\x00', 0xffffffffffffffff, 0x0, 0x4) shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@dev, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@remote}}, 0x0) ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, 0x0) shmctl$IPC_SET(0x0, 0x1, 0x0) ioctl$PIO_FONT(r0, 0x4b61, &(0x7f0000000740)="9d705183203ecbbfc0d13a4e30241f7ce01b0b4d7682444a507bfc1ac414339f479986467eb40c8065891e1fbbe7263212c5c09bb47896b3d85893f1173f8a139c116f876fdcc1779bffef8c34b5958981616cbcf39f2d8b43491de452d774a74c3ae9555a45180f7d68da36975781ba3a24694ac85eea975ca104181420baf7f3b9614203b0360e7cc29a1c109e") chdir(&(0x7f0000000340)='./file0\x00') symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) umount2(&(0x7f0000000380)='./file0\x00', 0x3) openat$uinput(0xffffffffffffff9c, &(0x7f0000000440)='/dev/uinput\x00', 0x802, 0x0) r3 = syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') sendmsg$FOU_CMD_DEL(r1, &(0x7f00000002c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x20, r3, 0x200, 0x70bd25, 0x25dfdbfe, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x7f}]}, 0x20}}, 0x24048010) sendmsg$kcm(r0, &(0x7f0000000a40)={&(0x7f0000000580)=@ll={0x11, 0xfd, r2, 0x1, 0x8, 0x6, @dev={[], 0x16}}, 0x80, &(0x7f00000009c0)=[{&(0x7f00000008c0)="367a9f0d4a1564359d1e668c63869bb9bf3b7f5aa4030462889dd6407207295cea1b36e07bc2b38b11c6ca28a73515cf52d89a8199d5c019de826c756a31bac24f707efcfc0a2383216dccc08f804551f0a56d2c9ab95a113fa74dff88ccccc7f278200aa03d2349e688b69191611739bb3e2e5ff110c5858c1a7c5bd5431f9c8e73a99236728f125d5f52a2b0761872fc0fc53cda5458241b2a80fd918b21c8029039d416a6cde6aa786bdfaa21a4e5ffa5f80dec422e0051c7e98a8cff2f4afbe25ca5a154a57c10", 0xc9}], 0x1}, 0x4004000) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000001c0)={0x0, 0x4, 0x2, 0x3, 0x1}, 0x14) ioctl$VIDIOC_SUBDEV_S_SELECTION(r0, 0xc040563e, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x7) msgget(0x1, 0x318) syz_genetlink_get_family_id$team(&(0x7f0000000400)='team\x00') 16:51:42 executing program 4 (fault-call:2 fault-nth:0): perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000240)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$restrict_keyring(0x1d, r0, &(0x7f0000000280)='asymmetric\x00', &(0x7f0000000340)='!selinuxselinux\x00') 16:51:42 executing program 1 (fault-call:2 fault-nth:0): perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000240)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$restrict_keyring(0x1d, r0, &(0x7f0000000280)='asymmetric\x00', &(0x7f0000000340)='!selinuxselinux\x00') 16:51:43 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x4000000000000036) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={@mcast1, @local, @local, 0x0, 0x0, 0x0, 0x200800000000114}) ptrace$setregs(0xffffffffffffffff, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x21, r0, 0x0, 0x0) 16:51:43 executing program 2: r0 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'hsr0\x00', 0x0}) bind$packet(r0, &(0x7f0000000340)={0x11, 0x0, r1}, 0x14) sendto(r0, &(0x7f00000000c0)="e360b641b37f0000430500000066", 0xe, 0x0, 0x0, 0x0) [ 407.237734] FAULT_INJECTION: forcing a failure. [ 407.237734] name failslab, interval 1, probability 0, space 0, times 0 16:51:43 executing program 3: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000b00)) mount(&(0x7f00000004c0)=ANY=[], &(0x7f000000aff8)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000000)) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000000c0)='tls\x00', 0x4) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$void(r1, 0x5450) renameat2(r0, &(0x7f0000000180)='./file0/file0\x00', 0xffffffffffffffff, 0x0, 0x4) shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@dev, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@remote}}, 0x0) ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, 0x0) shmctl$IPC_SET(0x0, 0x1, 0x0) ioctl$PIO_FONT(r0, 0x4b61, &(0x7f0000000740)="9d705183203ecbbfc0d13a4e30241f7ce01b0b4d7682444a507bfc1ac414339f479986467eb40c8065891e1fbbe7263212c5c09bb47896b3d85893f1173f8a139c116f876fdcc1779bffef8c34b5958981616cbcf39f2d8b43491de452d774a74c3ae9555a45180f7d68da36975781ba3a24694ac85eea975ca104181420baf7f3b9614203b0360e7cc29a1c109e") chdir(&(0x7f0000000340)='./file0\x00') symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) umount2(&(0x7f0000000380)='./file0\x00', 0x3) openat$uinput(0xffffffffffffff9c, &(0x7f0000000440)='/dev/uinput\x00', 0x802, 0x0) r3 = syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') sendmsg$FOU_CMD_DEL(r1, &(0x7f00000002c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x28, r3, 0x200, 0x70bd25, 0x25dfdbfe, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PORT={0x8}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x7f}]}, 0x28}}, 0x24048010) sendmsg$kcm(r0, &(0x7f0000000a40)={&(0x7f0000000580)=@ll={0x11, 0xfd, r2, 0x1, 0x8, 0x6, @dev={[], 0x16}}, 0x80, &(0x7f00000009c0)=[{&(0x7f00000008c0)="367a9f0d4a1564359d1e668c63869bb9bf3b7f5aa4030462889dd6407207295cea1b36e07bc2b38b11c6ca28a73515cf52d89a8199d5c019de826c756a31bac24f707efcfc0a2383216dccc08f804551f0a56d2c9ab95a113fa74dff88ccccc7f278200aa03d2349e688b69191611739bb3e2e5ff110c5858c1a7c5bd5431f9c8e73a99236728f125d5f52a2b0761872fc0fc53cda5458241b2a80fd918b21c8029039d416a6cde6aa786bdfaa21a4e5ffa5f80dec422e0051c7e98a8cff2f4afbe25ca5a154a57c10", 0xc9}], 0x1}, 0x4004000) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000001c0)={0x0, 0x4, 0x2, 0x3, 0x1}, 0x14) ioctl$VIDIOC_SUBDEV_S_SELECTION(r0, 0xc040563e, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x7) msgget(0x1, 0x318) syz_genetlink_get_family_id$team(&(0x7f0000000400)='team\x00') [ 407.306119] FAULT_INJECTION: forcing a failure. [ 407.306119] name failslab, interval 1, probability 0, space 0, times 0 16:51:43 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x4000000000000036) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={@mcast1, @local, @local, 0x0, 0x0, 0x0, 0x200800000000114}) ptrace$setregs(0xffffffffffffffff, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x21, r0, 0x0, 0x0) [ 407.360481] CPU: 0 PID: 12196 Comm: syz-executor4 Not tainted 4.20.0+ #396 [ 407.367647] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 407.377004] Call Trace: [ 407.379607] dump_stack+0x1d3/0x2c6 [ 407.383250] ? dump_stack_print_info.cold.1+0x20/0x20 [ 407.388481] ? mark_held_locks+0xc7/0x130 [ 407.392651] should_fail.cold.4+0xa/0x17 [ 407.396730] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 407.401873] ? trace_hardirqs_off+0x310/0x310 [ 407.406470] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 407.411272] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 407.411299] ? find_held_lock+0x36/0x1c0 [ 407.411332] ? ___might_sleep+0x1ed/0x300 [ 407.411346] ? arch_local_save_flags+0x40/0x40 [ 407.411439] ? join_session_keyring+0x340/0x340 [ 407.420300] __should_failslab+0x124/0x180 [ 407.420318] should_failslab+0x9/0x14 [ 407.420333] __kmalloc_track_caller+0x2d5/0x750 [ 407.420349] ? strncpy_from_user+0x510/0x510 [ 407.420361] ? digsig_verify+0x1530/0x1530 [ 407.420410] ? strndup_user+0x77/0xd0 [ 407.420426] memdup_user+0x2c/0xa0 [ 407.420441] strndup_user+0x77/0xd0 [ 407.466472] keyctl_restrict_keyring+0xf6/0x1c0 [ 407.471160] ? keyctl_session_to_parent+0xc90/0xc90 [ 407.476198] ? lockdep_hardirqs_on+0x421/0x5c0 [ 407.480795] ? __ia32_sys_read+0xb0/0xb0 [ 407.484872] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 407.490350] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 407.495812] __x64_sys_keyctl+0x3d1/0x430 [ 407.499965] do_syscall_64+0x1b9/0x820 [ 407.503854] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 407.509227] ? syscall_return_slowpath+0x5e0/0x5e0 [ 407.514165] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 407.519019] ? trace_hardirqs_on_caller+0x310/0x310 [ 407.524158] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 407.529277] ? prepare_exit_to_usermode+0x291/0x3b0 [ 407.534309] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 407.539168] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 407.544358] RIP: 0033:0x457ec9 [ 407.547554] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 407.566459] RSP: 002b:00007f16384b4c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000fa [ 407.574180] RAX: ffffffffffffffda RBX: 00007f16384b4c90 RCX: 0000000000457ec9 [ 407.581458] RDX: 0000000020000280 RSI: 000000003a1fcc20 RDI: 000000000000001d [ 407.588818] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 407.596179] R10: 0000000020000340 R11: 0000000000000246 R12: 00007f16384b56d4 [ 407.603451] R13: 00000000004c37ba R14: 00000000004d6000 R15: 0000000000000004 [ 407.615008] CPU: 0 PID: 12199 Comm: syz-executor1 Not tainted 4.20.0+ #396 [ 407.622076] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 407.631434] Call Trace: [ 407.634045] dump_stack+0x1d3/0x2c6 [ 407.637688] ? dump_stack_print_info.cold.1+0x20/0x20 [ 407.642889] ? lockdep_hardirqs_on+0x421/0x5c0 [ 407.647489] should_fail.cold.4+0xa/0x17 [ 407.651665] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 407.656783] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 407.661562] ? find_held_lock+0x36/0x1c0 [ 407.665701] ? ttm_dma_unpopulate+0x658/0x1470 [ 407.670299] ? ___might_sleep+0x1ed/0x300 [ 407.674463] ? arch_local_save_flags+0x40/0x40 [ 407.679065] ? join_session_keyring+0x340/0x340 [ 407.683745] __should_failslab+0x124/0x180 [ 407.687999] should_failslab+0x9/0x14 [ 407.691808] __kmalloc_track_caller+0x2d5/0x750 [ 407.696495] ? strncpy_from_user+0x510/0x510 [ 407.700904] ? digsig_verify+0x1530/0x1530 [ 407.705141] ? strndup_user+0x77/0xd0 [ 407.708968] memdup_user+0x2c/0xa0 16:51:43 executing program 4 (fault-call:2 fault-nth:1): perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000240)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$restrict_keyring(0x1d, r0, &(0x7f0000000280)='asymmetric\x00', &(0x7f0000000340)='!selinuxselinux\x00') [ 407.712513] strndup_user+0x77/0xd0 [ 407.716151] keyctl_restrict_keyring+0xf6/0x1c0 [ 407.720827] ? keyctl_session_to_parent+0xc90/0xc90 [ 407.725858] ? lockdep_hardirqs_on+0x421/0x5c0 [ 407.730551] ? __ia32_sys_read+0xb0/0xb0 [ 407.734625] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 407.740009] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 407.745499] __x64_sys_keyctl+0x3d1/0x430 [ 407.749660] do_syscall_64+0x1b9/0x820 [ 407.753553] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 407.758929] ? syscall_return_slowpath+0x5e0/0x5e0 [ 407.763873] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 407.768724] ? trace_hardirqs_on_caller+0x310/0x310 [ 407.773740] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 407.773760] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 407.773776] ? prepare_exit_to_usermode+0x291/0x3b0 [ 407.773795] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 407.773819] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 407.773831] RIP: 0033:0x457ec9 [ 407.773846] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 407.773854] RSP: 002b:00007ff7c84a2c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000fa [ 407.773868] RAX: ffffffffffffffda RBX: 00007ff7c84a2c90 RCX: 0000000000457ec9 [ 407.773877] RDX: 0000000020000280 RSI: 00000000342ef833 RDI: 000000000000001d [ 407.773885] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 407.773894] R10: 0000000020000340 R11: 0000000000000246 R12: 00007ff7c84a36d4 [ 407.773904] R13: 00000000004c37ba R14: 00000000004d6000 R15: 0000000000000004 16:51:43 executing program 5: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000b00)) mount(&(0x7f00000004c0)=ANY=[], &(0x7f000000aff8)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000000)) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000000c0)='tls\x00', 0x4) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$void(r1, 0x5450) renameat2(r0, &(0x7f0000000180)='./file0/file0\x00', 0xffffffffffffffff, 0x0, 0x4) shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@dev, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@remote}}, 0x0) ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, 0x0) shmctl$IPC_SET(0x0, 0x1, 0x0) ioctl$PIO_FONT(r0, 0x4b61, &(0x7f0000000740)="9d705183203ecbbfc0d13a4e30241f7ce01b0b4d7682444a507bfc1ac414339f479986467eb40c8065891e1fbbe7263212c5c09bb47896b3d85893f1173f8a139c116f876fdcc1779bffef8c34b5958981616cbcf39f2d8b43491de452d774a74c3ae9555a45180f7d68da36975781ba3a24694ac85eea975ca104181420baf7f3b9614203b0360e7cc29a1c109e") chdir(&(0x7f0000000340)='./file0\x00') symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) umount2(&(0x7f0000000380)='./file0\x00', 0x3) openat$uinput(0xffffffffffffff9c, &(0x7f0000000440)='/dev/uinput\x00', 0x802, 0x0) r3 = syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') sendmsg$FOU_CMD_DEL(r1, &(0x7f00000002c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x20, r3, 0x200, 0x70bd25, 0x25dfdbfe, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x7f}]}, 0x20}}, 0x24048010) sendmsg$kcm(r0, &(0x7f0000000a40)={&(0x7f0000000580)=@ll={0x11, 0xfd, r2, 0x1, 0x8, 0x6, @dev={[], 0x16}}, 0x80, &(0x7f00000009c0)=[{&(0x7f00000008c0)="367a9f0d4a1564359d1e668c63869bb9bf3b7f5aa4030462889dd6407207295cea1b36e07bc2b38b11c6ca28a73515cf52d89a8199d5c019de826c756a31bac24f707efcfc0a2383216dccc08f804551f0a56d2c9ab95a113fa74dff88ccccc7f278200aa03d2349e688b69191611739bb3e2e5ff110c5858c1a7c5bd5431f9c8e73a99236728f125d5f52a2b0761872fc0fc53cda5458241b2a80fd918b21c8029039d416a6cde6aa786bdfaa21a4e5ffa5f80dec422e0051c7e98a8cff2f4afbe25ca5a154a57c10", 0xc9}], 0x1}, 0x4004000) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000001c0)={0x0, 0x4, 0x2, 0x3, 0x1}, 0x14) ioctl$VIDIOC_SUBDEV_S_SELECTION(r0, 0xc040563e, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x7) msgget(0x1, 0x318) syz_genetlink_get_family_id$team(&(0x7f0000000400)='team\x00') [ 407.848824] cgroup: fork rejected by pids controller in /syz4 16:51:43 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000240)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$restrict_keyring(0x1d, r0, &(0x7f0000000280)='asymmetric\x00', &(0x7f0000000340)='!selinuxselinux\x00') 16:51:43 executing program 1 (fault-call:2 fault-nth:1): perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000240)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$restrict_keyring(0x1d, r0, &(0x7f0000000280)='asymmetric\x00', &(0x7f0000000340)='!selinuxselinux\x00') 16:51:43 executing program 2: r0 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'hsr0\x00', 0x0}) bind$packet(r0, &(0x7f0000000340)={0x11, 0x0, r1}, 0x14) sendto(r0, &(0x7f00000000c0)="e360b641b37f0000886400000066", 0xe, 0x0, 0x0, 0x0) 16:51:43 executing program 3: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000b00)) mount(&(0x7f00000004c0)=ANY=[], &(0x7f000000aff8)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000000)) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000000c0)='tls\x00', 0x4) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$void(r1, 0x5450) renameat2(r0, &(0x7f0000000180)='./file0/file0\x00', 0xffffffffffffffff, 0x0, 0x4) shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@dev, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@remote}}, 0x0) ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, 0x0) shmctl$IPC_SET(0x0, 0x1, 0x0) ioctl$PIO_FONT(r0, 0x4b61, &(0x7f0000000740)="9d705183203ecbbfc0d13a4e30241f7ce01b0b4d7682444a507bfc1ac414339f479986467eb40c8065891e1fbbe7263212c5c09bb47896b3d85893f1173f8a139c116f876fdcc1779bffef8c34b5958981616cbcf39f2d8b43491de452d774a74c3ae9555a45180f7d68da36975781ba3a24694ac85eea975ca104181420baf7f3b9614203b0360e7cc29a1c109e") chdir(&(0x7f0000000340)='./file0\x00') symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) umount2(&(0x7f0000000380)='./file0\x00', 0x3) openat$uinput(0xffffffffffffff9c, &(0x7f0000000440)='/dev/uinput\x00', 0x802, 0x0) r3 = syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') sendmsg$FOU_CMD_DEL(r1, &(0x7f00000002c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x28, r3, 0x200, 0x70bd25, 0x25dfdbfe, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PORT={0x8}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x7f}]}, 0x28}}, 0x24048010) sendmsg$kcm(r0, &(0x7f0000000a40)={&(0x7f0000000580)=@ll={0x11, 0xfd, r2, 0x1, 0x8, 0x6, @dev={[], 0x16}}, 0x80, &(0x7f00000009c0)=[{&(0x7f00000008c0)="367a9f0d4a1564359d1e668c63869bb9bf3b7f5aa4030462889dd6407207295cea1b36e07bc2b38b11c6ca28a73515cf52d89a8199d5c019de826c756a31bac24f707efcfc0a2383216dccc08f804551f0a56d2c9ab95a113fa74dff88ccccc7f278200aa03d2349e688b69191611739bb3e2e5ff110c5858c1a7c5bd5431f9c8e73a99236728f125d5f52a2b0761872fc0fc53cda5458241b2a80fd918b21c8029039d416a6cde6aa786bdfaa21a4e5ffa5f80dec422e0051c7e98a8cff2f4afbe25ca5a154a57c10", 0xc9}], 0x1}, 0x4004000) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000001c0)={0x0, 0x4, 0x2, 0x3, 0x1}, 0x14) ioctl$VIDIOC_SUBDEV_S_SELECTION(r0, 0xc040563e, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x7) msgget(0x1, 0x318) syz_genetlink_get_family_id$team(&(0x7f0000000400)='team\x00') 16:51:43 executing program 5: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000b00)) mount(&(0x7f00000004c0)=ANY=[], &(0x7f000000aff8)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000000)) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000000c0)='tls\x00', 0x4) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$void(r1, 0x5450) renameat2(r0, &(0x7f0000000180)='./file0/file0\x00', 0xffffffffffffffff, 0x0, 0x4) shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@dev, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@remote}}, 0x0) ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, 0x0) shmctl$IPC_SET(0x0, 0x1, 0x0) ioctl$PIO_FONT(r0, 0x4b61, &(0x7f0000000740)="9d705183203ecbbfc0d13a4e30241f7ce01b0b4d7682444a507bfc1ac414339f479986467eb40c8065891e1fbbe7263212c5c09bb47896b3d85893f1173f8a139c116f876fdcc1779bffef8c34b5958981616cbcf39f2d8b43491de452d774a74c3ae9555a45180f7d68da36975781ba3a24694ac85eea975ca104181420baf7f3b9614203b0360e7cc29a1c109e") chdir(&(0x7f0000000340)='./file0\x00') symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) umount2(&(0x7f0000000380)='./file0\x00', 0x3) openat$uinput(0xffffffffffffff9c, &(0x7f0000000440)='/dev/uinput\x00', 0x802, 0x0) r3 = syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') sendmsg$FOU_CMD_DEL(r1, &(0x7f00000002c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x20, r3, 0x200, 0x70bd25, 0x25dfdbfe, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x7f}]}, 0x20}}, 0x24048010) sendmsg$kcm(r0, &(0x7f0000000a40)={&(0x7f0000000580)=@ll={0x11, 0xfd, r2, 0x1, 0x8, 0x6, @dev={[], 0x16}}, 0x80, &(0x7f00000009c0)=[{&(0x7f00000008c0)="367a9f0d4a1564359d1e668c63869bb9bf3b7f5aa4030462889dd6407207295cea1b36e07bc2b38b11c6ca28a73515cf52d89a8199d5c019de826c756a31bac24f707efcfc0a2383216dccc08f804551f0a56d2c9ab95a113fa74dff88ccccc7f278200aa03d2349e688b69191611739bb3e2e5ff110c5858c1a7c5bd5431f9c8e73a99236728f125d5f52a2b0761872fc0fc53cda5458241b2a80fd918b21c8029039d416a6cde6aa786bdfaa21a4e5ffa5f80dec422e0051c7e98a8cff2f4afbe25ca5a154a57c10", 0xc9}], 0x1}, 0x4004000) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000001c0)={0x0, 0x4, 0x2, 0x3, 0x1}, 0x14) ioctl$VIDIOC_SUBDEV_S_SELECTION(r0, 0xc040563e, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x7) msgget(0x1, 0x318) syz_genetlink_get_family_id$team(&(0x7f0000000400)='team\x00') [ 408.078686] FAULT_INJECTION: forcing a failure. [ 408.078686] name failslab, interval 1, probability 0, space 0, times 0 [ 408.099286] CPU: 0 PID: 12230 Comm: syz-executor1 Not tainted 4.20.0+ #396 [ 408.106345] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 408.115698] Call Trace: [ 408.115727] dump_stack+0x1d3/0x2c6 [ 408.115746] ? dump_stack_print_info.cold.1+0x20/0x20 [ 408.115766] ? mark_held_locks+0xc7/0x130 [ 408.115791] should_fail.cold.4+0xa/0x17 [ 408.115856] ? retint_kernel+0x2d/0x2d [ 408.115877] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 408.115893] ? trace_hardirqs_off+0x310/0x310 [ 408.148937] ? graph_lock+0x270/0x270 [ 408.152755] ? find_held_lock+0x36/0x1c0 [ 408.156829] ? __lock_is_held+0xb5/0x140 [ 408.160911] ? ___might_sleep+0x1ed/0x300 [ 408.165070] ? arch_local_save_flags+0x40/0x40 [ 408.169675] __should_failslab+0x124/0x180 [ 408.173921] should_failslab+0x9/0x14 [ 408.177733] __kmalloc_track_caller+0x2d5/0x750 [ 408.182498] ? lock_release+0xa00/0xa00 [ 408.186605] ? arch_local_save_flags+0x40/0x40 [ 408.191193] ? lock_downgrade+0x900/0x900 [ 408.195451] ? asymmetric_lookup_restriction+0xe4/0x6a0 [ 408.200842] kstrndup+0x5f/0xe0 [ 408.204134] asymmetric_lookup_restriction+0xe4/0x6a0 [ 408.209342] ? asymmetric_key_cmp+0x130/0x130 [ 408.213845] ? __down_interruptible+0x700/0x700 [ 408.218525] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 408.224070] ? asymmetric_key_cmp+0x130/0x130 [ 408.228568] keyring_restrict+0xcc/0x510 [ 408.232634] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 408.238269] keyctl_restrict_keyring+0x1a4/0x1c0 [ 408.243041] ? keyctl_session_to_parent+0xc90/0xc90 [ 408.248067] ? retint_kernel+0x2d/0x2d [ 408.251967] __x64_sys_keyctl+0x3d1/0x430 [ 408.256144] do_syscall_64+0x1b9/0x820 [ 408.260059] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 408.265434] ? syscall_return_slowpath+0x5e0/0x5e0 [ 408.270395] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 408.275249] ? trace_hardirqs_on_caller+0x310/0x310 [ 408.280272] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 408.285294] ? prepare_exit_to_usermode+0x291/0x3b0 [ 408.290321] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 408.295180] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 408.300371] RIP: 0033:0x457ec9 [ 408.303572] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 16:51:44 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000240)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$restrict_keyring(0x13, r0, &(0x7f0000000280)='asymmetric\x00', &(0x7f0000000340)='!selinuxselinux\x00') [ 408.322475] RSP: 002b:00007ff7c84a2c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000fa [ 408.330188] RAX: ffffffffffffffda RBX: 00007ff7c84a2c90 RCX: 0000000000457ec9 [ 408.337461] RDX: 0000000020000280 RSI: 0000000022d4198d RDI: 000000000000001d [ 408.344766] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 408.352038] R10: 0000000020000340 R11: 0000000000000246 R12: 00007ff7c84a36d4 [ 408.359309] R13: 00000000004c37ba R14: 00000000004d6000 R15: 0000000000000004 16:51:44 executing program 5: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000b00)) mount(&(0x7f00000004c0)=ANY=[], &(0x7f000000aff8)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000000)) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000000c0)='tls\x00', 0x4) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$void(r1, 0x5450) renameat2(r0, &(0x7f0000000180)='./file0/file0\x00', 0xffffffffffffffff, 0x0, 0x4) shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@dev, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@remote}}, 0x0) ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, 0x0) shmctl$IPC_SET(0x0, 0x1, 0x0) ioctl$PIO_FONT(r0, 0x4b61, &(0x7f0000000740)="9d705183203ecbbfc0d13a4e30241f7ce01b0b4d7682444a507bfc1ac414339f479986467eb40c8065891e1fbbe7263212c5c09bb47896b3d85893f1173f8a139c116f876fdcc1779bffef8c34b5958981616cbcf39f2d8b43491de452d774a74c3ae9555a45180f7d68da36975781ba3a24694ac85eea975ca104181420baf7f3b9614203b0360e7cc29a1c109e") chdir(&(0x7f0000000340)='./file0\x00') symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) umount2(&(0x7f0000000380)='./file0\x00', 0x3) openat$uinput(0xffffffffffffff9c, &(0x7f0000000440)='/dev/uinput\x00', 0x802, 0x0) r3 = syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') sendmsg$FOU_CMD_DEL(r1, &(0x7f00000002c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x20, r3, 0x200, 0x70bd25, 0x25dfdbfe, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x7f}]}, 0x20}}, 0x24048010) sendmsg$kcm(r0, &(0x7f0000000a40)={&(0x7f0000000580)=@ll={0x11, 0xfd, r2, 0x1, 0x8, 0x6, @dev={[], 0x16}}, 0x80, &(0x7f00000009c0)=[{&(0x7f00000008c0)="367a9f0d4a1564359d1e668c63869bb9bf3b7f5aa4030462889dd6407207295cea1b36e07bc2b38b11c6ca28a73515cf52d89a8199d5c019de826c756a31bac24f707efcfc0a2383216dccc08f804551f0a56d2c9ab95a113fa74dff88ccccc7f278200aa03d2349e688b69191611739bb3e2e5ff110c5858c1a7c5bd5431f9c8e73a99236728f125d5f52a2b0761872fc0fc53cda5458241b2a80fd918b21c8029039d416a6cde6aa786bdfaa21a4e5ffa5f80dec422e0051c7e98a8cff2f4afbe25ca5a154a57c10", 0xc9}], 0x1}, 0x4004000) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000001c0)={0x0, 0x4, 0x2, 0x3, 0x1}, 0x14) ioctl$VIDIOC_SUBDEV_S_SELECTION(r0, 0xc040563e, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x7) msgget(0x1, 0x318) syz_genetlink_get_family_id$team(&(0x7f0000000400)='team\x00') 16:51:44 executing program 2: r0 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'hsr0\x00', 0x0}) bind$packet(r0, &(0x7f0000000340)={0x11, 0x0, r1}, 0x14) sendto(r0, &(0x7f00000000c0)="e360b641b37f0000001100000066", 0xe, 0x0, 0x0, 0x0) 16:51:44 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000240)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$restrict_keyring(0x17, r0, &(0x7f0000000280)='asymmetric\x00', &(0x7f0000000340)='!selinuxselinux\x00') 16:51:46 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x4000000000000036) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={@mcast1, @local, @local, 0x0, 0x0, 0x0, 0x200800000000114}) ptrace$setregs(0xffffffffffffffff, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x21, r0, 0x0, 0x0) 16:51:46 executing program 3: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000b00)) mount(&(0x7f00000004c0)=ANY=[], &(0x7f000000aff8)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000000)) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000000c0)='tls\x00', 0x4) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$void(r1, 0x5450) renameat2(r0, &(0x7f0000000180)='./file0/file0\x00', 0xffffffffffffffff, 0x0, 0x4) shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@dev, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@remote}}, 0x0) ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, 0x0) shmctl$IPC_SET(0x0, 0x1, 0x0) ioctl$PIO_FONT(r0, 0x4b61, &(0x7f0000000740)="9d705183203ecbbfc0d13a4e30241f7ce01b0b4d7682444a507bfc1ac414339f479986467eb40c8065891e1fbbe7263212c5c09bb47896b3d85893f1173f8a139c116f876fdcc1779bffef8c34b5958981616cbcf39f2d8b43491de452d774a74c3ae9555a45180f7d68da36975781ba3a24694ac85eea975ca104181420baf7f3b9614203b0360e7cc29a1c109e") chdir(&(0x7f0000000340)='./file0\x00') symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) umount2(&(0x7f0000000380)='./file0\x00', 0x3) openat$uinput(0xffffffffffffff9c, &(0x7f0000000440)='/dev/uinput\x00', 0x802, 0x0) r3 = syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') sendmsg$FOU_CMD_DEL(r1, &(0x7f00000002c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x24, r3, 0x200, 0x70bd25, 0x25dfdbfe, {}, [@FOU_ATTR_PORT={0x8, 0x1, 0x4e24}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x7f}]}, 0x24}}, 0x24048010) sendmsg$kcm(r0, &(0x7f0000000a40)={&(0x7f0000000580)=@ll={0x11, 0xfd, r2, 0x1, 0x8, 0x6, @dev={[], 0x16}}, 0x80, &(0x7f00000009c0)=[{&(0x7f00000008c0)="367a9f0d4a1564359d1e668c63869bb9bf3b7f5aa4030462889dd6407207295cea1b36e07bc2b38b11c6ca28a73515cf52d89a8199d5c019de826c756a31bac24f707efcfc0a2383216dccc08f804551f0a56d2c9ab95a113fa74dff88ccccc7f278200aa03d2349e688b69191611739bb3e2e5ff110c5858c1a7c5bd5431f9c8e73a99236728f125d5f52a2b0761872fc0fc53cda5458241b2a80fd918b21c8029039d416a6cde6aa786bdfaa21a4e5ffa5f80dec422e0051c7e98a8cff2f4afbe25ca5a154a57c10", 0xc9}], 0x1}, 0x4004000) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000001c0)={0x0, 0x4, 0x2, 0x3, 0x1}, 0x14) ioctl$VIDIOC_SUBDEV_S_SELECTION(r0, 0xc040563e, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x7) msgget(0x1, 0x318) syz_genetlink_get_family_id$team(&(0x7f0000000400)='team\x00') 16:51:46 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000240)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$restrict_keyring(0x3, r0, &(0x7f0000000280)='asymmetric\x00', &(0x7f0000000340)='!selinuxselinux\x00') 16:51:46 executing program 5: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000b00)) mount(&(0x7f00000004c0)=ANY=[], &(0x7f000000aff8)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000000)) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000000c0)='tls\x00', 0x4) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$void(r1, 0x5450) renameat2(r0, &(0x7f0000000180)='./file0/file0\x00', 0xffffffffffffffff, 0x0, 0x4) shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@dev, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@remote}}, 0x0) ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, 0x0) shmctl$IPC_SET(0x0, 0x1, 0x0) ioctl$PIO_FONT(r0, 0x4b61, &(0x7f0000000740)="9d705183203ecbbfc0d13a4e30241f7ce01b0b4d7682444a507bfc1ac414339f479986467eb40c8065891e1fbbe7263212c5c09bb47896b3d85893f1173f8a139c116f876fdcc1779bffef8c34b5958981616cbcf39f2d8b43491de452d774a74c3ae9555a45180f7d68da36975781ba3a24694ac85eea975ca104181420baf7f3b9614203b0360e7cc29a1c109e") chdir(&(0x7f0000000340)='./file0\x00') symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) umount2(&(0x7f0000000380)='./file0\x00', 0x3) openat$uinput(0xffffffffffffff9c, &(0x7f0000000440)='/dev/uinput\x00', 0x802, 0x0) r3 = syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') sendmsg$FOU_CMD_DEL(r1, &(0x7f00000002c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x20, r3, 0x200, 0x70bd25, 0x25dfdbfe, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x7f}]}, 0x20}}, 0x24048010) sendmsg$kcm(r0, &(0x7f0000000a40)={&(0x7f0000000580)=@ll={0x11, 0xfd, r2, 0x1, 0x8, 0x6, @dev={[], 0x16}}, 0x80, &(0x7f00000009c0)=[{&(0x7f00000008c0)="367a9f0d4a1564359d1e668c63869bb9bf3b7f5aa4030462889dd6407207295cea1b36e07bc2b38b11c6ca28a73515cf52d89a8199d5c019de826c756a31bac24f707efcfc0a2383216dccc08f804551f0a56d2c9ab95a113fa74dff88ccccc7f278200aa03d2349e688b69191611739bb3e2e5ff110c5858c1a7c5bd5431f9c8e73a99236728f125d5f52a2b0761872fc0fc53cda5458241b2a80fd918b21c8029039d416a6cde6aa786bdfaa21a4e5ffa5f80dec422e0051c7e98a8cff2f4afbe25ca5a154a57c10", 0xc9}], 0x1}, 0x4004000) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000001c0)={0x0, 0x4, 0x2, 0x3, 0x1}, 0x14) ioctl$VIDIOC_SUBDEV_S_SELECTION(r0, 0xc040563e, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x7) msgget(0x1, 0x318) syz_genetlink_get_family_id$team(&(0x7f0000000400)='team\x00') 16:51:46 executing program 2: r0 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'hsr0\x00', 0x0}) bind$packet(r0, &(0x7f0000000340)={0x11, 0x0, r1}, 0x14) sendto(r0, &(0x7f00000000c0)="e360b641b37f0000004003000066", 0xe, 0x0, 0x0, 0x0) 16:51:46 executing program 1 (fault-call:2 fault-nth:2): perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000240)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$restrict_keyring(0x1d, r0, &(0x7f0000000280)='asymmetric\x00', &(0x7f0000000340)='!selinuxselinux\x00') 16:51:46 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x4000000000000036) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={@mcast1, @local, @local, 0x0, 0x0, 0x0, 0x200800000000114}) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x21, r0, 0x0, 0x0) 16:51:46 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000240)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$restrict_keyring(0x8, r0, &(0x7f0000000280)='asymmetric\x00', &(0x7f0000000340)='!selinuxselinux\x00') 16:51:46 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000240)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$restrict_keyring(0x1d, r0, &(0x7f0000000280)='asymmetric\x00', &(0x7f0000000340)='!selinuxselinux\x00') 16:51:46 executing program 2: r0 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'hsr0\x00', 0x0}) bind$packet(r0, &(0x7f0000000340)={0x11, 0x0, r1}, 0x14) sendto(r0, &(0x7f00000000c0)="e360b641b37f000086ddffff0066", 0xe, 0x0, 0x0, 0x0) [ 410.670274] net_ratelimit: 24 callbacks suppressed [ 410.670282] protocol 88fb is buggy, dev hsr_slave_0 [ 410.675326] protocol 88fb is buggy, dev hsr_slave_1 16:51:46 executing program 3: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000b00)) mount(&(0x7f00000004c0)=ANY=[], &(0x7f000000aff8)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000000)) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000000c0)='tls\x00', 0x4) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$void(r1, 0x5450) renameat2(r0, &(0x7f0000000180)='./file0/file0\x00', 0xffffffffffffffff, 0x0, 0x4) shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@dev, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@remote}}, 0x0) ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, 0x0) shmctl$IPC_SET(0x0, 0x1, 0x0) ioctl$PIO_FONT(r0, 0x4b61, &(0x7f0000000740)="9d705183203ecbbfc0d13a4e30241f7ce01b0b4d7682444a507bfc1ac414339f479986467eb40c8065891e1fbbe7263212c5c09bb47896b3d85893f1173f8a139c116f876fdcc1779bffef8c34b5958981616cbcf39f2d8b43491de452d774a74c3ae9555a45180f7d68da36975781ba3a24694ac85eea975ca104181420baf7f3b9614203b0360e7cc29a1c109e") chdir(&(0x7f0000000340)='./file0\x00') symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) umount2(&(0x7f0000000380)='./file0\x00', 0x3) openat$uinput(0xffffffffffffff9c, &(0x7f0000000440)='/dev/uinput\x00', 0x802, 0x0) r3 = syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') sendmsg$FOU_CMD_DEL(r1, &(0x7f00000002c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x28, r3, 0x200, 0x70bd25, 0x25dfdbfe, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e24}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x7f}]}, 0x28}}, 0x0) sendmsg$kcm(r0, &(0x7f0000000a40)={&(0x7f0000000580)=@ll={0x11, 0xfd, r2, 0x1, 0x8, 0x6, @dev={[], 0x16}}, 0x80, &(0x7f00000009c0)=[{&(0x7f00000008c0)="367a9f0d4a1564359d1e668c63869bb9bf3b7f5aa4030462889dd6407207295cea1b36e07bc2b38b11c6ca28a73515cf52d89a8199d5c019de826c756a31bac24f707efcfc0a2383216dccc08f804551f0a56d2c9ab95a113fa74dff88ccccc7f278200aa03d2349e688b69191611739bb3e2e5ff110c5858c1a7c5bd5431f9c8e73a99236728f125d5f52a2b0761872fc0fc53cda5458241b2a80fd918b21c8029039d416a6cde6aa786bdfaa21a4e5ffa5f80dec422e0051c7e98a8cff2f4afbe25ca5a154a57c10", 0xc9}], 0x1}, 0x4004000) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000001c0)={0x0, 0x4, 0x2, 0x3, 0x1}, 0x14) ioctl$VIDIOC_SUBDEV_S_SELECTION(r0, 0xc040563e, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x7) msgget(0x1, 0x318) syz_genetlink_get_family_id$team(&(0x7f0000000400)='team\x00') 16:51:46 executing program 5: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000b00)) mount(&(0x7f00000004c0)=ANY=[], &(0x7f000000aff8)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000000)) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000000c0)='tls\x00', 0x4) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$void(r1, 0x5450) renameat2(r0, &(0x7f0000000180)='./file0/file0\x00', 0xffffffffffffffff, 0x0, 0x4) shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@dev, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@remote}}, 0x0) ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, 0x0) shmctl$IPC_SET(0x0, 0x1, 0x0) ioctl$PIO_FONT(r0, 0x4b61, &(0x7f0000000740)="9d705183203ecbbfc0d13a4e30241f7ce01b0b4d7682444a507bfc1ac414339f479986467eb40c8065891e1fbbe7263212c5c09bb47896b3d85893f1173f8a139c116f876fdcc1779bffef8c34b5958981616cbcf39f2d8b43491de452d774a74c3ae9555a45180f7d68da36975781ba3a24694ac85eea975ca104181420baf7f3b9614203b0360e7cc29a1c109e") chdir(&(0x7f0000000340)='./file0\x00') symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) umount2(&(0x7f0000000380)='./file0\x00', 0x3) openat$uinput(0xffffffffffffff9c, &(0x7f0000000440)='/dev/uinput\x00', 0x802, 0x0) r3 = syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') sendmsg$FOU_CMD_DEL(r1, &(0x7f00000002c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x20, r3, 0x200, 0x70bd25, 0x25dfdbfe, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x7f}]}, 0x20}}, 0x24048010) sendmsg$kcm(r0, &(0x7f0000000a40)={&(0x7f0000000580)=@ll={0x11, 0xfd, r2, 0x1, 0x8, 0x6, @dev={[], 0x16}}, 0x80, &(0x7f00000009c0)=[{&(0x7f00000008c0)="367a9f0d4a1564359d1e668c63869bb9bf3b7f5aa4030462889dd6407207295cea1b36e07bc2b38b11c6ca28a73515cf52d89a8199d5c019de826c756a31bac24f707efcfc0a2383216dccc08f804551f0a56d2c9ab95a113fa74dff88ccccc7f278200aa03d2349e688b69191611739bb3e2e5ff110c5858c1a7c5bd5431f9c8e73a99236728f125d5f52a2b0761872fc0fc53cda5458241b2a80fd918b21c8029039d416a6cde6aa786bdfaa21a4e5ffa5f80dec422e0051c7e98a8cff2f4afbe25ca5a154a57c10", 0xc9}], 0x1}, 0x4004000) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000001c0)={0x0, 0x4, 0x2, 0x3, 0x1}, 0x14) ioctl$VIDIOC_SUBDEV_S_SELECTION(r0, 0xc040563e, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x7) msgget(0x1, 0x318) syz_genetlink_get_family_id$team(&(0x7f0000000400)='team\x00') 16:51:46 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000240)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$restrict_keyring(0x16, r0, &(0x7f0000000280)='asymmetric\x00', &(0x7f0000000340)='!selinuxselinux\x00') 16:51:46 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000240)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$restrict_keyring(0x7, r0, &(0x7f0000000280)='asymmetric\x00', &(0x7f0000000340)='!selinuxselinux\x00') 16:51:46 executing program 2: r0 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'hsr0\x00', 0x0}) bind$packet(r0, &(0x7f0000000340)={0x11, 0x0, r1}, 0x14) sendto(r0, &(0x7f00000000c0)="e360b641b37f0000803500000066", 0xe, 0x0, 0x0, 0x0) 16:51:46 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000240)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$restrict_keyring(0xb, r0, &(0x7f0000000280)='asymmetric\x00', &(0x7f0000000340)='!selinuxselinux\x00') 16:51:46 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000240)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$restrict_keyring(0x12, r0, &(0x7f0000000280)='asymmetric\x00', &(0x7f0000000340)='!selinuxselinux\x00') 16:51:46 executing program 2: r0 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'hsr0\x00', 0x0}) bind$packet(r0, &(0x7f0000000340)={0x11, 0x0, r1}, 0x14) sendto(r0, &(0x7f00000000c0)="e360b641b37f0000000000110066", 0xe, 0x0, 0x0, 0x0) [ 411.710301] protocol 88fb is buggy, dev hsr_slave_0 [ 411.715417] protocol 88fb is buggy, dev hsr_slave_1 [ 411.720534] protocol 88fb is buggy, dev hsr_slave_0 [ 411.725571] protocol 88fb is buggy, dev hsr_slave_1 [ 411.950262] protocol 88fb is buggy, dev hsr_slave_0 [ 411.955343] protocol 88fb is buggy, dev hsr_slave_1 [ 412.110378] protocol 88fb is buggy, dev hsr_slave_0 [ 412.115594] protocol 88fb is buggy, dev hsr_slave_1 16:51:49 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000240)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$restrict_keyring(0xa, r0, &(0x7f0000000280)='asymmetric\x00', &(0x7f0000000340)='!selinuxselinux\x00') 16:51:49 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x4000000000000036) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={@mcast1, @local, @local, 0x0, 0x0, 0x0, 0x200800000000114}) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x21, r0, 0x0, 0x0) 16:51:49 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000240)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$restrict_keyring(0xa, r0, &(0x7f0000000280)='asymmetric\x00', &(0x7f0000000340)='!selinuxselinux\x00') 16:51:49 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000240)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$restrict_keyring(0x3, r0, &(0x7f0000000280)='asymmetric\x00', &(0x7f0000000340)='!selinuxselinux\x00') 16:51:49 executing program 2: r0 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'hsr0\x00', 0x0}) bind$packet(r0, &(0x7f0000000340)={0x11, 0x0, r1}, 0x14) sendto(r0, &(0x7f00000000c0)="e360b641b37f0000110000000066", 0xe, 0x0, 0x0, 0x0) 16:51:49 executing program 3: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000b00)) mount(&(0x7f00000004c0)=ANY=[], &(0x7f000000aff8)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000000)) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000000c0)='tls\x00', 0x4) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$void(r1, 0x5450) renameat2(r0, &(0x7f0000000180)='./file0/file0\x00', 0xffffffffffffffff, 0x0, 0x4) shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@dev, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@remote}}, 0x0) ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, 0x0) shmctl$IPC_SET(0x0, 0x1, 0x0) ioctl$PIO_FONT(r0, 0x4b61, &(0x7f0000000740)="9d705183203ecbbfc0d13a4e30241f7ce01b0b4d7682444a507bfc1ac414339f479986467eb40c8065891e1fbbe7263212c5c09bb47896b3d85893f1173f8a139c116f876fdcc1779bffef8c34b5958981616cbcf39f2d8b43491de452d774a74c3ae9555a45180f7d68da36975781ba3a24694ac85eea975ca104181420baf7f3b9614203b0360e7cc29a1c109e") chdir(&(0x7f0000000340)='./file0\x00') symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) umount2(&(0x7f0000000380)='./file0\x00', 0x3) openat$uinput(0xffffffffffffff9c, &(0x7f0000000440)='/dev/uinput\x00', 0x802, 0x0) r3 = syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') sendmsg$FOU_CMD_DEL(r1, &(0x7f00000002c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x28, r3, 0x200, 0x70bd25, 0x25dfdbfe, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e24}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x7f}]}, 0x28}}, 0x0) sendmsg$kcm(r0, &(0x7f0000000a40)={&(0x7f0000000580)=@ll={0x11, 0xfd, r2, 0x1, 0x8, 0x6, @dev={[], 0x16}}, 0x80, &(0x7f00000009c0)=[{&(0x7f00000008c0)="367a9f0d4a1564359d1e668c63869bb9bf3b7f5aa4030462889dd6407207295cea1b36e07bc2b38b11c6ca28a73515cf52d89a8199d5c019de826c756a31bac24f707efcfc0a2383216dccc08f804551f0a56d2c9ab95a113fa74dff88ccccc7f278200aa03d2349e688b69191611739bb3e2e5ff110c5858c1a7c5bd5431f9c8e73a99236728f125d5f52a2b0761872fc0fc53cda5458241b2a80fd918b21c8029039d416a6cde6aa786bdfaa21a4e5ffa5f80dec422e0051c7e98a8cff2f4afbe25ca5a154a57c10", 0xc9}], 0x1}, 0x4004000) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000001c0)={0x0, 0x4, 0x2, 0x3, 0x1}, 0x14) ioctl$VIDIOC_SUBDEV_S_SELECTION(r0, 0xc040563e, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x7) msgget(0x1, 0x318) syz_genetlink_get_family_id$team(&(0x7f0000000400)='team\x00') 16:51:49 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000240)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$restrict_keyring(0x18, r0, &(0x7f0000000280)='asymmetric\x00', &(0x7f0000000340)='!selinuxselinux\x00') 16:51:49 executing program 3: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000b00)) mount(&(0x7f00000004c0)=ANY=[], &(0x7f000000aff8)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000000)) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000000c0)='tls\x00', 0x4) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$void(r1, 0x5450) renameat2(r0, &(0x7f0000000180)='./file0/file0\x00', 0xffffffffffffffff, 0x0, 0x4) shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@dev, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@remote}}, 0x0) ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, 0x0) shmctl$IPC_SET(0x0, 0x1, 0x0) ioctl$PIO_FONT(r0, 0x4b61, &(0x7f0000000740)="9d705183203ecbbfc0d13a4e30241f7ce01b0b4d7682444a507bfc1ac414339f479986467eb40c8065891e1fbbe7263212c5c09bb47896b3d85893f1173f8a139c116f876fdcc1779bffef8c34b5958981616cbcf39f2d8b43491de452d774a74c3ae9555a45180f7d68da36975781ba3a24694ac85eea975ca104181420baf7f3b9614203b0360e7cc29a1c109e") chdir(&(0x7f0000000340)='./file0\x00') symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) umount2(&(0x7f0000000380)='./file0\x00', 0x3) openat$uinput(0xffffffffffffff9c, &(0x7f0000000440)='/dev/uinput\x00', 0x802, 0x0) r3 = syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') sendmsg$FOU_CMD_DEL(r1, &(0x7f00000002c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x28, r3, 0x200, 0x70bd25, 0x25dfdbfe, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e24}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x7f}]}, 0x28}}, 0x0) sendmsg$kcm(r0, &(0x7f0000000a40)={&(0x7f0000000580)=@ll={0x11, 0xfd, r2, 0x1, 0x8, 0x6, @dev={[], 0x16}}, 0x80, &(0x7f00000009c0)=[{&(0x7f00000008c0)="367a9f0d4a1564359d1e668c63869bb9bf3b7f5aa4030462889dd6407207295cea1b36e07bc2b38b11c6ca28a73515cf52d89a8199d5c019de826c756a31bac24f707efcfc0a2383216dccc08f804551f0a56d2c9ab95a113fa74dff88ccccc7f278200aa03d2349e688b69191611739bb3e2e5ff110c5858c1a7c5bd5431f9c8e73a99236728f125d5f52a2b0761872fc0fc53cda5458241b2a80fd918b21c8029039d416a6cde6aa786bdfaa21a4e5ffa5f80dec422e0051c7e98a8cff2f4afbe25ca5a154a57c10", 0xc9}], 0x1}, 0x4004000) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000001c0)={0x0, 0x4, 0x2, 0x3, 0x1}, 0x14) ioctl$VIDIOC_SUBDEV_S_SELECTION(r0, 0xc040563e, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x7) msgget(0x1, 0x318) syz_genetlink_get_family_id$team(&(0x7f0000000400)='team\x00') 16:51:49 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000240)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$restrict_keyring(0x5, r0, &(0x7f0000000280)='asymmetric\x00', &(0x7f0000000340)='!selinuxselinux\x00') 16:51:49 executing program 5: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000b00)) mount(&(0x7f00000004c0)=ANY=[], &(0x7f000000aff8)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000000)) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000000c0)='tls\x00', 0x4) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$void(r1, 0x5450) renameat2(r0, &(0x7f0000000180)='./file0/file0\x00', 0xffffffffffffffff, 0x0, 0x4) shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@dev, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@remote}}, 0x0) ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, 0x0) shmctl$IPC_SET(0x0, 0x1, 0x0) ioctl$PIO_FONT(r0, 0x4b61, &(0x7f0000000740)="9d705183203ecbbfc0d13a4e30241f7ce01b0b4d7682444a507bfc1ac414339f479986467eb40c8065891e1fbbe7263212c5c09bb47896b3d85893f1173f8a139c116f876fdcc1779bffef8c34b5958981616cbcf39f2d8b43491de452d774a74c3ae9555a45180f7d68da36975781ba3a24694ac85eea975ca104181420baf7f3b9614203b0360e7cc29a1c109e") chdir(&(0x7f0000000340)='./file0\x00') symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) umount2(&(0x7f0000000380)='./file0\x00', 0x3) openat$uinput(0xffffffffffffff9c, &(0x7f0000000440)='/dev/uinput\x00', 0x802, 0x0) r3 = syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') sendmsg$FOU_CMD_DEL(r1, &(0x7f00000002c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x28, r3, 0x200, 0x70bd25, 0x25dfdbfe, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PORT={0x8}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x7f}]}, 0x28}}, 0x24048010) sendmsg$kcm(r0, &(0x7f0000000a40)={&(0x7f0000000580)=@ll={0x11, 0xfd, r2, 0x1, 0x8, 0x6, @dev={[], 0x16}}, 0x80, &(0x7f00000009c0)=[{&(0x7f00000008c0)="367a9f0d4a1564359d1e668c63869bb9bf3b7f5aa4030462889dd6407207295cea1b36e07bc2b38b11c6ca28a73515cf52d89a8199d5c019de826c756a31bac24f707efcfc0a2383216dccc08f804551f0a56d2c9ab95a113fa74dff88ccccc7f278200aa03d2349e688b69191611739bb3e2e5ff110c5858c1a7c5bd5431f9c8e73a99236728f125d5f52a2b0761872fc0fc53cda5458241b2a80fd918b21c8029039d416a6cde6aa786bdfaa21a4e5ffa5f80dec422e0051c7e98a8cff2f4afbe25ca5a154a57c10", 0xc9}], 0x1}, 0x4004000) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000001c0)={0x0, 0x4, 0x2, 0x3, 0x1}, 0x14) ioctl$VIDIOC_SUBDEV_S_SELECTION(r0, 0xc040563e, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x7) msgget(0x1, 0x318) syz_genetlink_get_family_id$team(&(0x7f0000000400)='team\x00') 16:51:49 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x4000000000000036) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={@mcast1, @local, @local, 0x0, 0x0, 0x0, 0x200800000000114}) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x21, r0, 0x0, 0x0) 16:51:49 executing program 2: r0 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'hsr0\x00', 0x0}) bind$packet(r0, &(0x7f0000000340)={0x11, 0x0, r1}, 0x14) sendto(r0, &(0x7f00000000c0)="e360b641b37f0000000340000066", 0xe, 0x0, 0x0, 0x0) 16:51:49 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000240)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$restrict_keyring(0x1c, r0, &(0x7f0000000280)='asymmetric\x00', &(0x7f0000000340)='!selinuxselinux\x00') 16:51:49 executing program 3: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000b00)) mount(&(0x7f00000004c0)=ANY=[], &(0x7f000000aff8)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000000)) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000000c0)='tls\x00', 0x4) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$void(r1, 0x5450) renameat2(r0, &(0x7f0000000180)='./file0/file0\x00', 0xffffffffffffffff, 0x0, 0x4) shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@dev, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@remote}}, 0x0) ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, 0x0) shmctl$IPC_SET(0x0, 0x1, 0x0) ioctl$PIO_FONT(r0, 0x4b61, &(0x7f0000000740)="9d705183203ecbbfc0d13a4e30241f7ce01b0b4d7682444a507bfc1ac414339f479986467eb40c8065891e1fbbe7263212c5c09bb47896b3d85893f1173f8a139c116f876fdcc1779bffef8c34b5958981616cbcf39f2d8b43491de452d774a74c3ae9555a45180f7d68da36975781ba3a24694ac85eea975ca104181420baf7f3b9614203b0360e7cc29a1c109e") chdir(&(0x7f0000000340)='./file0\x00') symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) umount2(&(0x7f0000000380)='./file0\x00', 0x3) openat$uinput(0xffffffffffffff9c, &(0x7f0000000440)='/dev/uinput\x00', 0x802, 0x0) r3 = syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') sendmsg$FOU_CMD_DEL(r1, &(0x7f00000002c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x28, r3, 0x200, 0x70bd25, 0x25dfdbfe, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e24}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x7f}]}, 0x28}}, 0x24048010) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000a40)={&(0x7f0000000580)=@ll={0x11, 0xfd, r2, 0x1, 0x8, 0x6, @dev={[], 0x16}}, 0x80, &(0x7f00000009c0)=[{&(0x7f00000008c0)="367a9f0d4a1564359d1e668c63869bb9bf3b7f5aa4030462889dd6407207295cea1b36e07bc2b38b11c6ca28a73515cf52d89a8199d5c019de826c756a31bac24f707efcfc0a2383216dccc08f804551f0a56d2c9ab95a113fa74dff88ccccc7f278200aa03d2349e688b69191611739bb3e2e5ff110c5858c1a7c5bd5431f9c8e73a99236728f125d5f52a2b0761872fc0fc53cda5458241b2a80fd918b21c8029039d416a6cde6aa786bdfaa21a4e5ffa5f80dec422e0051c7e98a8cff2f4afbe25ca5a154a57c10", 0xc9}], 0x1}, 0x4004000) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000001c0)={0x0, 0x4, 0x2, 0x3, 0x1}, 0x14) ioctl$VIDIOC_SUBDEV_S_SELECTION(r0, 0xc040563e, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x7) msgget(0x1, 0x318) syz_genetlink_get_family_id$team(&(0x7f0000000400)='team\x00') 16:51:49 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000240)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$restrict_keyring(0x6, r0, &(0x7f0000000280)='asymmetric\x00', &(0x7f0000000340)='!selinuxselinux\x00') 16:51:49 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000240)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$restrict_keyring(0x19, r0, &(0x7f0000000280)='asymmetric\x00', &(0x7f0000000340)='!selinuxselinux\x00') 16:51:49 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000240)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$restrict_keyring(0x19, r0, &(0x7f0000000280)='asymmetric\x00', &(0x7f0000000340)='!selinuxselinux\x00') 16:51:49 executing program 2: r0 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'hsr0\x00', 0x0}) bind$packet(r0, &(0x7f0000000340)={0x11, 0x0, r1}, 0x14) sendto(r0, &(0x7f00000000c0)="e360b641b37f0000000006080066", 0xe, 0x0, 0x0, 0x0) 16:51:50 executing program 5: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000b00)) mount(&(0x7f00000004c0)=ANY=[], &(0x7f000000aff8)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000000)) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000000c0)='tls\x00', 0x4) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$void(r1, 0x5450) renameat2(r0, &(0x7f0000000180)='./file0/file0\x00', 0xffffffffffffffff, 0x0, 0x4) shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@dev, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@remote}}, 0x0) ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, 0x0) shmctl$IPC_SET(0x0, 0x1, 0x0) ioctl$PIO_FONT(r0, 0x4b61, &(0x7f0000000740)="9d705183203ecbbfc0d13a4e30241f7ce01b0b4d7682444a507bfc1ac414339f479986467eb40c8065891e1fbbe7263212c5c09bb47896b3d85893f1173f8a139c116f876fdcc1779bffef8c34b5958981616cbcf39f2d8b43491de452d774a74c3ae9555a45180f7d68da36975781ba3a24694ac85eea975ca104181420baf7f3b9614203b0360e7cc29a1c109e") chdir(&(0x7f0000000340)='./file0\x00') symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) umount2(&(0x7f0000000380)='./file0\x00', 0x3) openat$uinput(0xffffffffffffff9c, &(0x7f0000000440)='/dev/uinput\x00', 0x802, 0x0) r3 = syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') sendmsg$FOU_CMD_DEL(r1, &(0x7f00000002c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x28, r3, 0x200, 0x70bd25, 0x25dfdbfe, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e24}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x7f}]}, 0x28}}, 0x0) sendmsg$kcm(r0, &(0x7f0000000a40)={&(0x7f0000000580)=@ll={0x11, 0xfd, r2, 0x1, 0x8, 0x6, @dev={[], 0x16}}, 0x80, &(0x7f00000009c0)=[{&(0x7f00000008c0)="367a9f0d4a1564359d1e668c63869bb9bf3b7f5aa4030462889dd6407207295cea1b36e07bc2b38b11c6ca28a73515cf52d89a8199d5c019de826c756a31bac24f707efcfc0a2383216dccc08f804551f0a56d2c9ab95a113fa74dff88ccccc7f278200aa03d2349e688b69191611739bb3e2e5ff110c5858c1a7c5bd5431f9c8e73a99236728f125d5f52a2b0761872fc0fc53cda5458241b2a80fd918b21c8029039d416a6cde6aa786bdfaa21a4e5ffa5f80dec422e0051c7e98a8cff2f4afbe25ca5a154a57c10", 0xc9}], 0x1}, 0x4004000) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000001c0)={0x0, 0x4, 0x2, 0x3, 0x1}, 0x14) ioctl$VIDIOC_SUBDEV_S_SELECTION(r0, 0xc040563e, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x7) msgget(0x1, 0x318) syz_genetlink_get_family_id$team(&(0x7f0000000400)='team\x00') 16:51:50 executing program 3: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000b00)) mount(&(0x7f00000004c0)=ANY=[], &(0x7f000000aff8)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000000)) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000000c0)='tls\x00', 0x4) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$void(r1, 0x5450) renameat2(r0, &(0x7f0000000180)='./file0/file0\x00', 0xffffffffffffffff, 0x0, 0x4) shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@dev, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@remote}}, 0x0) ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, 0x0) shmctl$IPC_SET(0x0, 0x1, 0x0) ioctl$PIO_FONT(r0, 0x4b61, &(0x7f0000000740)="9d705183203ecbbfc0d13a4e30241f7ce01b0b4d7682444a507bfc1ac414339f479986467eb40c8065891e1fbbe7263212c5c09bb47896b3d85893f1173f8a139c116f876fdcc1779bffef8c34b5958981616cbcf39f2d8b43491de452d774a74c3ae9555a45180f7d68da36975781ba3a24694ac85eea975ca104181420baf7f3b9614203b0360e7cc29a1c109e") chdir(&(0x7f0000000340)='./file0\x00') symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) umount2(&(0x7f0000000380)='./file0\x00', 0x3) openat$uinput(0xffffffffffffff9c, &(0x7f0000000440)='/dev/uinput\x00', 0x802, 0x0) r3 = syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') sendmsg$FOU_CMD_DEL(r1, &(0x7f00000002c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x28, r3, 0x200, 0x70bd25, 0x25dfdbfe, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e24}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x7f}]}, 0x28}}, 0x24048010) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000a40)={&(0x7f0000000580)=@ll={0x11, 0xfd, r2, 0x1, 0x8, 0x6, @dev={[], 0x16}}, 0x80, &(0x7f00000009c0)=[{&(0x7f00000008c0)="367a9f0d4a1564359d1e668c63869bb9bf3b7f5aa4030462889dd6407207295cea1b36e07bc2b38b11c6ca28a73515cf52d89a8199d5c019de826c756a31bac24f707efcfc0a2383216dccc08f804551f0a56d2c9ab95a113fa74dff88ccccc7f278200aa03d2349e688b69191611739bb3e2e5ff110c5858c1a7c5bd5431f9c8e73a99236728f125d5f52a2b0761872fc0fc53cda5458241b2a80fd918b21c8029039d416a6cde6aa786bdfaa21a4e5ffa5f80dec422e0051c7e98a8cff2f4afbe25ca5a154a57c10", 0xc9}], 0x1}, 0x4004000) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000001c0)={0x0, 0x4, 0x2, 0x3, 0x1}, 0x14) ioctl$VIDIOC_SUBDEV_S_SELECTION(r0, 0xc040563e, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x7) msgget(0x1, 0x318) syz_genetlink_get_family_id$team(&(0x7f0000000400)='team\x00') 16:51:50 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000240)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$restrict_keyring(0x3, r0, &(0x7f0000000280)='asymmetric\x00', &(0x7f0000000340)='!selinuxselinux\x00') 16:51:50 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000240)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$restrict_keyring(0x18, r0, &(0x7f0000000280)='asymmetric\x00', &(0x7f0000000340)='!selinuxselinux\x00') [ 415.870272] net_ratelimit: 16 callbacks suppressed [ 415.870277] protocol 88fb is buggy, dev hsr_slave_0 [ 415.880419] protocol 88fb is buggy, dev hsr_slave_1 [ 415.885552] protocol 88fb is buggy, dev hsr_slave_0 [ 415.890657] protocol 88fb is buggy, dev hsr_slave_1 [ 416.110297] protocol 88fb is buggy, dev hsr_slave_0 [ 416.115398] protocol 88fb is buggy, dev hsr_slave_1 [ 416.270332] protocol 88fb is buggy, dev hsr_slave_0 [ 416.275487] protocol 88fb is buggy, dev hsr_slave_1 [ 416.510280] protocol 88fb is buggy, dev hsr_slave_0 [ 416.515449] protocol 88fb is buggy, dev hsr_slave_1 16:51:52 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x4000000000000036) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={@mcast1, @local, @local, 0x0, 0x0, 0x0, 0x200800000000114}) ptrace$setregs(0xd, r0, 0x0, 0x0) ptrace$cont(0x21, r0, 0x0, 0x0) 16:51:52 executing program 2: r0 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'hsr0\x00', 0x0}) bind$packet(r0, &(0x7f0000000340)={0x11, 0x0, r1}, 0x14) sendto(r0, &(0x7f00000000c0)="e360b641b37f0000358000000066", 0xe, 0x0, 0x0, 0x0) 16:51:52 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000240)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$restrict_keyring(0xd, r0, &(0x7f0000000280)='asymmetric\x00', &(0x7f0000000340)='!selinuxselinux\x00') 16:51:52 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000240)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$restrict_keyring(0x14, r0, &(0x7f0000000280)='asymmetric\x00', &(0x7f0000000340)='!selinuxselinux\x00') 16:51:52 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000240)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$restrict_keyring(0x18, r0, &(0x7f0000000280)='asymmetric\x00', &(0x7f0000000340)='!selinuxselinux\x00') 16:51:52 executing program 3: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000b00)) mount(&(0x7f00000004c0)=ANY=[], &(0x7f000000aff8)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000000)) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000000c0)='tls\x00', 0x4) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$void(r1, 0x5450) renameat2(r0, &(0x7f0000000180)='./file0/file0\x00', 0xffffffffffffffff, 0x0, 0x4) shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@dev, @in=@loopback}}, {{@in=@dev}, 0x0, @in6=@remote}}, 0x0) ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, 0x0) shmctl$IPC_SET(0x0, 0x1, 0x0) ioctl$PIO_FONT(r0, 0x4b61, &(0x7f0000000740)="9d705183203ecbbfc0d13a4e30241f7ce01b0b4d7682444a507bfc1ac414339f479986467eb40c8065891e1fbbe7263212c5c09bb47896b3d85893f1173f8a139c116f876fdcc1779bffef8c34b5958981616cbcf39f2d8b43491de452d774a74c3ae9555a45180f7d68da36975781ba3a24694ac85eea975ca104181420baf7f3b9614203b0360e7cc29a1c109e") chdir(&(0x7f0000000340)='./file0\x00') symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) umount2(&(0x7f0000000380)='./file0\x00', 0x3) openat$uinput(0xffffffffffffff9c, &(0x7f0000000440)='/dev/uinput\x00', 0x802, 0x0) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') sendmsg$FOU_CMD_DEL(r1, &(0x7f00000002c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x28, r2, 0x200, 0x70bd25, 0x25dfdbfe, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e24}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x7f}]}, 0x28}}, 0x24048010) sendmsg$kcm(r0, 0x0, 0x4004000) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000001c0)={0x0, 0x4, 0x2, 0x3, 0x1}, 0x14) ioctl$VIDIOC_SUBDEV_S_SELECTION(r0, 0xc040563e, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x7) msgget(0x1, 0x318) syz_genetlink_get_family_id$team(&(0x7f0000000400)='team\x00') 16:51:52 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000240)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$restrict_keyring(0x19, r0, &(0x7f0000000280)='asymmetric\x00', &(0x7f0000000340)='!selinuxselinux\x00') 16:51:52 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x4000000000000036) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={@mcast1, @local, @local, 0x0, 0x0, 0x0, 0x200800000000114}) ptrace$setregs(0xd, r0, 0x0, 0x0) ptrace$cont(0x21, r0, 0x0, 0x0) 16:51:52 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000240)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$restrict_keyring(0x12, r0, &(0x7f0000000280)='asymmetric\x00', &(0x7f0000000340)='!selinuxselinux\x00') 16:51:52 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000240)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$restrict_keyring(0x10, r0, &(0x7f0000000280)='asymmetric\x00', &(0x7f0000000340)='!selinuxselinux\x00') [ 417.059904] kasan: CONFIG_KASAN_INLINE enabled 16:51:52 executing program 3: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000b00)) mount(&(0x7f00000004c0)=ANY=[], &(0x7f000000aff8)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000000)) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000000c0)='tls\x00', 0x4) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$void(r1, 0x5450) renameat2(r0, &(0x7f0000000180)='./file0/file0\x00', 0xffffffffffffffff, 0x0, 0x4) shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@dev, @in=@loopback}}, {{@in=@dev}, 0x0, @in6=@remote}}, 0x0) ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, 0x0) shmctl$IPC_SET(0x0, 0x1, 0x0) ioctl$PIO_FONT(r0, 0x4b61, &(0x7f0000000740)="9d705183203ecbbfc0d13a4e30241f7ce01b0b4d7682444a507bfc1ac414339f479986467eb40c8065891e1fbbe7263212c5c09bb47896b3d85893f1173f8a139c116f876fdcc1779bffef8c34b5958981616cbcf39f2d8b43491de452d774a74c3ae9555a45180f7d68da36975781ba3a24694ac85eea975ca104181420baf7f3b9614203b0360e7cc29a1c109e") chdir(&(0x7f0000000340)='./file0\x00') symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) umount2(&(0x7f0000000380)='./file0\x00', 0x3) openat$uinput(0xffffffffffffff9c, &(0x7f0000000440)='/dev/uinput\x00', 0x802, 0x0) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') sendmsg$FOU_CMD_DEL(r1, &(0x7f00000002c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x28, r2, 0x200, 0x70bd25, 0x25dfdbfe, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e24}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x7f}]}, 0x28}}, 0x24048010) sendmsg$kcm(r0, &(0x7f0000000a40)={0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f00000008c0)="367a9f0d4a1564359d1e668c63869bb9bf3b7f5aa4030462889dd6407207295cea1b36e07bc2b38b11c6ca28a73515cf52d89a8199d5c019de826c756a31bac24f707efcfc0a2383216dccc08f804551f0a56d2c9ab95a113fa74dff88ccccc7f278200aa03d2349e688b69191611739bb3e2e5ff110c5858c1a7c5bd5431f9c8e73a99236728f125d5f52a2b0761872fc0fc53cda5458241b2a80fd918b21c8029039d416a6cde6aa786bdfaa21a4e5ffa5f80dec422e0051c7e98a8cff2f4afbe25ca5a154a57c10", 0xc9}], 0x1}, 0x4004000) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000001c0)={0x0, 0x4, 0x2, 0x3, 0x1}, 0x14) ioctl$VIDIOC_SUBDEV_S_SELECTION(r0, 0xc040563e, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x7) msgget(0x1, 0x318) syz_genetlink_get_family_id$team(&(0x7f0000000400)='team\x00') 16:51:52 executing program 2: r0 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'hsr0\x00', 0x0}) bind$packet(r0, &(0x7f0000000340)={0x11, 0x0, r1}, 0x14) sendto(r0, &(0x7f00000000c0)="e360b641b37f0000478800000066", 0xe, 0x0, 0x0, 0x0) [ 417.090123] kasan: GPF could be caused by NULL-ptr deref or user memory access [ 417.123740] general protection fault: 0000 [#1] PREEMPT SMP KASAN [ 417.130018] CPU: 0 PID: 12441 Comm: syz-executor5 Not tainted 4.20.0+ #396 [ 417.137032] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 16:51:52 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000240)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$restrict_keyring(0xd, r0, &(0x7f0000000280)='asymmetric\x00', &(0x7f0000000340)='!selinuxselinux\x00') [ 417.146405] RIP: 0010:keyctl_pkey_params_get+0x2e7/0x560 [ 417.151867] Code: fe 48 8b 44 24 38 48 c1 e8 03 42 80 3c 28 00 0f 85 f8 01 00 00 4c 8b a4 24 e0 00 00 00 4c 89 e0 4c 89 e2 48 c1 e8 03 83 e2 07 <42> 0f b6 04 28 38 d0 7f 08 84 c0 0f 85 e1 01 00 00 41 0f b6 04 24 [ 417.171065] RSP: 0018:ffff88804d11fa90 EFLAGS: 00010206 [ 417.176432] RAX: 0000000000000000 RBX: ffff88804d11fd60 RCX: ffffc9000fe55000 [ 417.176563] kobject: 'loop4' (00000000ecd52914): kobject_uevent_env [ 417.183711] RDX: 0000000000000005 RSI: ffffffff8344323e RDI: 0000000000000001 [ 417.183720] RBP: ffff88804d11fc00 R08: ffff888093fec580 R09: ffffed1015273ac8 [ 417.183728] R10: ffffed1015273ac9 R11: 0000000000000002 R12: 0000000000000005 [ 417.183735] R13: dffffc0000000000 R14: 0000000000000000 R15: 0000000000000000 [ 417.183746] FS: 00007fc5b5cd3700(0000) GS:ffff8880ae600000(0000) knlGS:0000000000000000 [ 417.183754] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 417.183760] CR2: 0000000000940004 CR3: 00000000a0911000 CR4: 00000000001426f0 [ 417.183771] DR0: 0000000020000000 DR1: 0000000020000000 DR2: 0000000000000000 [ 417.199565] kobject: 'loop4' (00000000ecd52914): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 417.204801] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600 [ 417.204806] Call Trace: [ 417.204831] ? __keyctl_dh_compute.cold.5+0x71/0x71 [ 417.204924] ? __do_page_fault+0x402/0xd70 [ 417.204941] ? retint_kernel+0x2d/0x2d [ 417.280850] ? copy_user_generic_unrolled+0x86/0xc0 [ 417.285873] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 417.291420] keyctl_pkey_params_get_2+0x12f/0x580 [ 417.296282] ? keyctl_pkey_params_get+0x560/0x560 [ 417.301141] ? lockdep_hardirqs_on+0x421/0x5c0 [ 417.305728] ? retint_kernel+0x2d/0x2d [ 417.309637] ? trace_hardirqs_on_caller+0xc0/0x310 [ 417.314576] ? _copy_to_user+0xc8/0x110 [ 417.318558] keyctl_pkey_e_d_s+0xb0/0x4f0 [ 417.322710] ? keyctl_pkey_query+0x2b0/0x2b0 [ 417.327132] __x64_sys_keyctl+0x12f/0x430 [ 417.331301] do_syscall_64+0x1b9/0x820 [ 417.335190] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 417.340561] ? syscall_return_slowpath+0x5e0/0x5e0 [ 417.345493] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 417.350295] kobject: 'kvm' (00000000d3cbe03d): kobject_uevent_env [ 417.350351] ? trace_hardirqs_on_caller+0x310/0x310 [ 417.356683] kobject: 'kvm' (00000000d3cbe03d): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 417.361574] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 417.361590] ? prepare_exit_to_usermode+0x291/0x3b0 [ 417.361606] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 417.361626] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 417.390594] RIP: 0033:0x457ec9 [ 417.393775] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 417.412662] RSP: 002b:00007fc5b5cd2c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000fa [ 417.420357] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 0000000000457ec9 [ 417.427609] RDX: 0000000020000280 RSI: 0000000020884a6c RDI: 0000000000000019 [ 417.434891] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 16:51:53 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000240)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$restrict_keyring(0xb, r0, &(0x7f0000000280)='asymmetric\x00', &(0x7f0000000340)='!selinuxselinux\x00') [ 417.442144] R10: 0000000020000340 R11: 0000000000000246 R12: 00007fc5b5cd36d4 [ 417.449404] R13: 00000000004c37ba R14: 00000000004d6000 R15: 00000000ffffffff [ 417.456662] Modules linked in: [ 417.469536] kobject: 'loop1' (00000000c9584412): kobject_uevent_env [ 417.482401] ---[ end trace c6407df191e75968 ]--- [ 417.487316] RIP: 0010:keyctl_pkey_params_get+0x2e7/0x560 [ 417.493326] Code: fe 48 8b 44 24 38 48 c1 e8 03 42 80 3c 28 00 0f 85 f8 01 00 00 4c 8b a4 24 e0 00 00 00 4c 89 e0 4c 89 e2 48 c1 e8 03 83 e2 07 <42> 0f b6 04 28 38 d0 7f 08 84 c0 0f 85 e1 01 00 00 41 0f b6 04 24 [ 417.495212] kobject: 'loop1' (00000000c9584412): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 417.512664] RSP: 0018:ffff88804d11fa90 EFLAGS: 00010206 [ 417.530968] kobject: 'loop3' (00000000890e3e0f): kobject_uevent_env [ 417.538398] kobject: 'loop3' (00000000890e3e0f): fill_kobj_path: path = '/devices/virtual/block/loop3' 16:51:53 executing program 2: r0 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'hsr0\x00', 0x0}) bind$packet(r0, &(0x7f0000000340)={0x11, 0x0, r1}, 0x14) sendto(r0, &(0x7f00000000c0)="e360b641b37f000088caffff0066", 0xe, 0x0, 0x0, 0x0) 16:51:53 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000240)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$restrict_keyring(0x17, r0, &(0x7f0000000280)='asymmetric\x00', &(0x7f0000000340)='!selinuxselinux\x00') [ 417.542741] RAX: 0000000000000000 RBX: ffff88804d11fd60 RCX: ffffc9000fe55000 [ 417.558006] RDX: 0000000000000005 RSI: ffffffff8344323e RDI: 0000000000000001 [ 417.584206] kobject: 'loop2' (00000000889967f2): kobject_uevent_env [ 417.607546] kobject: 'loop2' (00000000889967f2): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 417.633513] kobject: 'loop1' (00000000c9584412): kobject_uevent_env 16:51:53 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000240)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$restrict_keyring(0xf, r0, &(0x7f0000000280)='asymmetric\x00', &(0x7f0000000340)='!selinuxselinux\x00') 16:51:53 executing program 2: r0 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'hsr0\x00', 0x0}) bind$packet(r0, &(0x7f0000000340)={0x11, 0x0, r1}, 0x14) sendto(r0, &(0x7f00000000c0)="e360b641b37f0000000058650066", 0xe, 0x0, 0x0, 0x0) [ 417.648918] kobject: 'loop1' (00000000c9584412): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 417.660461] RBP: ffff88804d11fc00 R08: ffff888093fec580 R09: ffffed1015273ac8 [ 417.668928] R10: ffffed1015273ac9 R11: 0000000000000002 R12: 0000000000000005 [ 417.690294] kobject: 'loop1' (00000000c9584412): kobject_uevent_env [ 417.699101] R13: dffffc0000000000 R14: 0000000000000000 R15: 0000000000000000 [ 417.727076] kobject: 'loop1' (00000000c9584412): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 417.744837] FS: 00007fc5b5cd3700(0000) GS:ffff8880ae700000(0000) knlGS:0000000000000000 [ 417.773535] kobject: 'loop2' (00000000889967f2): kobject_uevent_env [ 417.783452] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 417.789662] kobject: 'loop2' (00000000889967f2): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 417.799659] CR2: 00007f1617711848 CR3: 00000000a0911000 CR4: 00000000001426e0 [ 417.811273] DR0: 0000000020000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 417.819344] kobject: 'loop1' (00000000c9584412): kobject_uevent_env [ 417.831593] kobject: 'loop1' (00000000c9584412): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 417.854945] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600 [ 417.865740] kobject: 'loop3' (00000000890e3e0f): kobject_uevent_env [ 417.879804] kobject: 'loop3' (00000000890e3e0f): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 417.891561] Kernel panic - not syncing: Fatal exception [ 417.898516] Kernel Offset: disabled [ 417.902142] Rebooting in 86400 seconds..