_WITH_LINKDOWN={0x8, 0x6, 0x5}, @NETCONFA_FORWARDING={0x8, 0x2, 0x8}, @NETCONFA_IFINDEX={0x8, 0x1, r2}, @NETCONFA_RP_FILTER={0x8, 0x3, 0x7fff}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x3}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0xe9}]}, 0x54}, 0x1, 0x0, 0x0, 0x3400c080}, 0x40) read(0xffffffffffffffff, &(0x7f0000000280)=""/152, 0x20000318) openat$procfs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/keys\x00', 0x0, 0x0) r3 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r3, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) write$binfmt_elf64(r3, &(0x7f00000003c0)={{0x7f, 0x45, 0x4c, 0x46, 0x6, 0x81, 0x35, 0x4, 0x1, 0x59ad6aa4a884dd63, 0x3, 0x0, 0x13d, 0x40, 0x26e, 0x8000, 0x1f, 0x38, 0x1, 0x8, 0x8, 0x3}, [{0x6, 0x3, 0xefa, 0x1, 0x81, 0x80000000, 0x0, 0x9}, {0x7, 0x2, 0x7ff, 0xfff, 0x1, 0x4, 0x0, 0x800b}], "5ad165d3d87709dd80c73c9fa8b6ef39a345e1b2327e38197c13f3be9248c0f2161632606ce45b5c7d7349c883946ca190a061f77e1020dc808b86b4e3c7b2a6128e2d3b16a4ec69ad8c276d1a038ddc59bd46a7a37061ed24ba41f62de7aaf1c073c43333bee7ed0979404acecab631d46b591f921ec0a584aeb912342ff4f104ff960a3563460c943d11952c88bd0d13a69a425793b6f7d2b09cf17c87cdc331f63c983436cef6888b1a8328e953b0b3bade3aabbfc4818a05af", [[]]}, 0x26b) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_open_procfs(0x0, &(0x7f0000000000)='timers\x00') 00:55:07 executing program 5: socket$pppoe(0x18, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x40045569, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {0xffffffff}, {0x1}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}) 00:55:07 executing program 3: r0 = socket$pppoe(0x18, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x2, @link_local, 'team0\x00'}}, 0x1e) r1 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r1, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {0x0, 0x3}, {0xffffffff}, {0x1}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x1, 0x40100) 00:55:08 executing program 5: socket$pppoe(0x18, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x40049409, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {0xffffffff}, {0x1}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}) 00:55:08 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) stat(&(0x7f0000000240)='./file0/file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(0xffffffffffffffff, &(0x7f0000001b80)) socket(0x11, 0x2, 0x5) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r4, 0x1, 0x14, &(0x7f0000000040), 0x50) getsockopt$IP6T_SO_GET_ENTRIES(r4, 0x29, 0x41, &(0x7f0000000480)=ANY=[@ANYBLOB], &(0x7f0000000340)=0x1) fsetxattr$trusted_overlay_redirect(r3, &(0x7f0000000200)='trusted.overlay.redirect\x00', &(0x7f0000000280)='./file0/file0\x00', 0xe, 0x0) getsockname$tipc(0xffffffffffffffff, 0x0, &(0x7f0000000080)) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000001400)={{0x1, 0x0, @identifier="8e0f03f7e12b88d1af81f7c5a6bb175f"}, 0x67, [], "ed760111b8363e2de90692d0bc7e0a89824d3c77730403363ce0521cdcb1973b558cbd01ebf95bd9529fe3c5a95dcf31792e3e463d875b955a13582aeaddf6af34a98934ad6944b87292af67aec51fd37bd761db93cf6623d8683956791c956c97d76a9fd8df5d"}) lstat(&(0x7f0000000000)='./file0/file0\x00', &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000100)=0x0) r7 = getegid() r8 = socket$inet_tcp(0x2, 0x1, 0x0) r9 = fcntl$dupfd(r8, 0x0, r8) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) setresuid(r10, r10, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003ec0)={0x0, 0x0, 0x0}, 0x0) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, r11) r12 = openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$DRM_IOCTL_AGP_INFO(r12, 0x80386433, &(0x7f0000000bc0)=""/4096) getsockopt$sock_cred(r12, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0x194) setresuid(r13, r13, 0x0) r14 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r15 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r15, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) waitid(0x1, r15, &(0x7f0000000100), 0x80000004, &(0x7f0000000180)) r16 = shmget$private(0x0, 0x3000, 0x20, &(0x7f0000ffa000/0x3000)=nil) shmctl$SHM_STAT_ANY(r16, 0xf, &(0x7f0000000540)=""/221) shmctl$IPC_SET(r16, 0x1, &(0x7f0000000180)={{0x3, r10, r11, r13, r7, 0x42, 0x7}, 0x803ff, 0x2, 0xfffffffffffffffd, 0x0, r14, r15, 0x5}) shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000840)={{0x0, r2, r7, 0x0, r5, 0x50}, 0xd7, 0xfffffffffffffffe, 0x1000, 0x8000, r6}) r17 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000280)='/dev/nullb0\x00', 0x4400, 0x0) preadv(r17, &(0x7f0000000040)=[{&(0x7f0000000400)=""/4096, 0x3ffc00}], 0x1, 0x0) 00:55:08 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) pipe(0x0) wait4(0x0, 0x0, 0x40000000, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000265000)=@req={0x0, 0x400}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000740)={{{@in=@multicast2, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@broadcast}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route(r1, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=@ipv4_getnetconf={0x54, 0x52, 0x10, 0x70bd25, 0x25dfdbfd, {}, [@NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x1}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x9}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x5}, @NETCONFA_FORWARDING={0x8, 0x2, 0x8}, @NETCONFA_IFINDEX={0x8, 0x1, r2}, @NETCONFA_RP_FILTER={0x8, 0x3, 0x7fff}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x3}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0xe9}]}, 0x54}, 0x1, 0x0, 0x0, 0x3400c080}, 0x40) read(0xffffffffffffffff, &(0x7f0000000280)=""/152, 0x20000318) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/keys\x00', 0x0, 0x0) r4 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r4, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) write$binfmt_elf64(r4, &(0x7f00000003c0)={{0x7f, 0x45, 0x4c, 0x46, 0x6, 0x81, 0x35, 0x4, 0x1, 0x59ad6aa4a884dd63, 0x3, 0x0, 0x13d, 0x40, 0x26e, 0x8000, 0x1f, 0x38, 0x1, 0x8, 0x0, 0x3}, [{0x6, 0x3, 0xefa, 0x1, 0x81, 0x80000000, 0x0, 0x9}, {0x7, 0x2, 0x7ff, 0xfff, 0x1, 0x4, 0x0, 0x800b}], "5ad165d3d87709dd80c73c9fa8b6ef39a345e1b2327e38197c13f3be9248c0f2161632606ce45b5c7d7349c883946ca190a061f77e1020dc808b86b4e3c7b2a6128e2d3b16a4ec69ad8c276d1a038ddc59bd46a7a37061ed24ba41f62de7aaf1c073c43333bee7ed0979404acecab631d46b591f921ec0a584aeb912342ff4f104ff960a3563460c943d11952c88bd0d13a69a425793b6f7d2b09cf17c87cdc331f63c983436cef6888b1a8328e953b0b3bade3aabbfc4818a05af", [[]]}, 0x26b) read(r3, &(0x7f0000000280)=""/152, 0x20000318) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x280800, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$DRM_IOCTL_MODE_SETCRTC(0xffffffffffffffff, 0xc06864a2, &(0x7f0000000000)={0x0, 0x0, 0x20}) 00:55:08 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) pipe(0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r1, &(0x7f0000000c40)='tasks\x00', 0x2, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x1, 0x4000010, r1, 0x10000000) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f00000002c0)='nl80211\x00') sendmsg$NL80211_CMD_SET_WIPHY(r3, &(0x7f0000000640)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x38, r4, 0x400, 0x70bd28, 0x25dfdbfc, {}, [@NL80211_ATTR_WIPHY_TXQ_PARAMS={0x1c, 0x25, 0x0, 0x1, [@NL80211_TXQ_ATTR_CWMAX={0x6, 0x4, 0xfb62}, @NL80211_TXQ_ATTR_QUEUE={0x5, 0x1, 0x8}, @NL80211_TXQ_ATTR_QUEUE={0x5, 0x1, 0x81}]}, @NL80211_ATTR_TXQ_MEMORY_LIMIT={0x8, 0x10b, 0x7}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000000}, 0x800) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=@ipv4_getnetconf={0x3c, 0x52, 0x10, 0x70bd25, 0x25dfdbfd, {}, [@NETCONFA_PROXY_NEIGH={0x8}, @NETCONFA_IFINDEX={0x8}, @NETCONFA_RP_FILTER={0x8}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x3}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0xe9}]}, 0x3c}, 0x1, 0x0, 0x0, 0x3400c080}, 0x40) r5 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) mknod(&(0x7f0000000100)='./file0\x00', 0x4224, 0x401) r6 = socket$netlink(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_TX_RING(r6, 0x10e, 0x7, &(0x7f0000000b80)={0x3, 0x80000001, 0x7ff, 0x8}, 0x10) ioctl$FBIOPUT_VSCREENINFO(r5, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) write$binfmt_elf64(r5, &(0x7f00000003c0)=ANY=[@ANYBLOB="61c3720f06813504010000000000000063dd03000040000000000000006e02000000000000008000001f00380001000800080003000600000003000000fa0e000000000000010000000008000081000000000000000000008000000000000000000000000009000000000000000700000002000000ff07000000000000ff0f00000000000035f70100000000000000040000000000000000000000000000000b800000000000005ad165d3d87709dd80c73c9fa8b6ef39a345e1b2327e38197c13f3be9248c0f2161632606ce45b5c7d7349c883946ca190a061f77e1020dc808b86b4e3c7b2a6128e2d3b16a4ec69ad8c276d1a038ddc59bd46a7a37061ed24ba41f62de7aaf1c073c43333bee7ed0979404acecab631d46b371f921ec0a584aeb912342ff4f104ff960a3563460c943d11952c88bd0d13a69a425793b6f7d2b09cf17c87cdc331f63c983436cef6888b1a8328e953b0b3bade3aabbfc4818a00af0000000000000000000000000000000000000000000000001600000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000400000000000000000000000000000000000000000000000000000000000000000000000001a00"/606], 0x26b) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_open_procfs(0x0, &(0x7f0000000000)='timers\x00') r7 = syz_open_dev$cec(&(0x7f0000000ac0)='/dev/cec#\x00', 0x2, 0x2) ioctl$VIDIOC_G_EDID(r7, 0xc0285628, &(0x7f0000000b40)={0x0, 0x710, 0x4, [], &(0x7f0000000b00)=0x40}) r8 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r9 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ENABLE(r9, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000bc0)=ANY=[@ANYBLOB='`\x00\x00\x00', @ANYRES16=r8, @ANYBLOB="6fb7401b093498fe0000000000000000030000004c0001800d0001007564703a73797a3100000000380004ef1f0001000200000000000000fe8000d20000000000000000000000bb0043d2b2f800020002000000ac1c1408001645ba5d93791bcd74456561c5b50600"], 0x60}}, 0x0) sendmsg$TIPC_NL_MEDIA_SET(r2, &(0x7f0000000a80)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000a40)={&(0x7f00000006c0)={0x37c, r8, 0x100, 0x70bd2b, 0x25dfdbff, {}, [@TIPC_NLA_BEARER={0x10c, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e22, 0xfffffffa, @mcast1, 0xeee}}, {0x14, 0x2, @in={0x2, 0x4e23, @broadcast}}}}, @TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e20, 0x8, @remote, 0x2}}, {0x14, 0x2, @in={0x2, 0x4e20, @multicast2}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e24, 0x1f, @rand_addr="39af446d3e9d60001cb95a2f598e94a5", 0xffffffff}}, {0x20, 0x2, @in6={0xa, 0x4e20, 0xa19, @local, 0x8000}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e22, @multicast1}}, {0x14, 0x2, @in={0x2, 0x4e23, @loopback}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x32eeab1b}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x2}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x8000}]}, @TIPC_NLA_BEARER={0x94, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e20, 0x2, @remote, 0x10001}}, {0x20, 0x2, @in6={0xa, 0x4e20, 0x800, @mcast2, 0x400}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e20, @multicast1}}, {0x14, 0x2, @in={0x2, 0x4e21, @multicast1}}}}, @TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz0\x00'}, @TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz2\x00'}]}, @TIPC_NLA_MEDIA={0x7c, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0xe3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}]}, @TIPC_NLA_MEDIA_PROP={0x34, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x20}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}]}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xb}]}]}, @TIPC_NLA_NODE={0x18, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x8}, @TIPC_NLA_NODE_ADDR={0x8}]}, @TIPC_NLA_NODE={0xc, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x1a}]}, @TIPC_NLA_LINK={0x64, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_PROP={0x1c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x200}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x80}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}]}, @TIPC_NLA_LINK_PROP={0x44, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfffffcc6}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3f}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x12}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1b}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xfffffffe}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1a}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}]}]}, @TIPC_NLA_PUBL={0x54, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x8001}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x6}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x1ff}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0xfffffffb}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x8}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0xb4}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x5}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0xc03}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x9}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0xfff}]}, @TIPC_NLA_BEARER={0x50, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e20, 0x2, @loopback, 0xf3}}, {0x20, 0x2, @in6={0xa, 0x4e23, 0xfffffff9, @local, 0x8}}}}]}, @TIPC_NLA_SOCK={0x14, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0xff}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x7082}]}, @TIPC_NLA_MEDIA={0xc, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}]}]}, 0x37c}, 0x1, 0x0, 0x0, 0x20000080}, 0x4000) 00:55:08 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) pipe(0x0) wait4(0x0, 0x0, 0x40000000, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000265000)=@req={0x0, 0x400, 0x2}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000740)={{{@in=@multicast2, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@broadcast}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route(r1, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=@ipv4_getnetconf={0x54, 0x52, 0x10, 0x70bd25, 0x0, {}, [@NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x1}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x9}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x5}, @NETCONFA_FORWARDING={0x8, 0x2, 0x8}, @NETCONFA_IFINDEX={0x8, 0x1, r2}, @NETCONFA_RP_FILTER={0x8, 0x3, 0x7fff}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x3}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0xe9}]}, 0x54}, 0x1, 0x0, 0x0, 0x3400c080}, 0x40) read(0xffffffffffffffff, &(0x7f0000000280)=""/152, 0x20000318) openat$procfs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/keys\x00', 0x0, 0x0) r3 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r3, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) write$binfmt_elf64(r3, &(0x7f00000003c0)={{0x7f, 0x45, 0x4c, 0x46, 0x6, 0x81, 0x35, 0x4, 0x1, 0x59ad6aa4a884dd63, 0x3, 0x0, 0x13d, 0x40, 0x26e, 0x8000, 0x1f, 0x38, 0x1, 0x8, 0x8, 0x3}, [{0x6, 0x3, 0xefa, 0x1, 0x81, 0x80000000, 0x0, 0x9}, {0x7, 0x2, 0x7ff, 0xfff, 0x1, 0x4, 0x0, 0x800b}], "5ad165d3d87709dd80c73c9fa8b6ef39a345e1b2327e38197c13f3be9248c0f2161632606ce45b5c7d7349c883946ca190a061f77e1020dc808b86b4e3c7b2a6128e2d3b16a4ec69ad8c276d1a038ddc59bd46a7a37061ed24ba41f62de7aaf1c073c43333bee7ed0979404acecab631d46b591f921ec0a584aeb912342ff4f104ff960a3563460c943d11952c88bd0d13a69a425793b6f7d2b09cf17c87cdc331f63c983436cef6888b1a8328e953b0b3bade3aabbfc4818a05af", [[]]}, 0x26b) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_open_procfs(0x0, &(0x7f0000000000)='timers\x00') 00:55:09 executing program 3: r0 = socket$pppoe(0x18, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x2, @link_local, 'team0\x00'}}, 0x1e) r1 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r1, 0x4601, &(0x7f0000000000)={0x10, 0x258, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, {0xfffffffd, 0x5}, {0xfffffffe}, {0x1, 0x4, 0x3}, {0x0, 0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffff675, 0x100000, 0x1000, 0x0, 0xfffffffe, 0x0, 0x1000}) 00:55:09 executing program 5: socket$pppoe(0x18, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x40104593, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {0xffffffff}, {0x1}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}) 00:55:09 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r1, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) r2 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r2, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) ioctl$VIDIOC_G_EXT_CTRLS(r1, 0xc0205647, &(0x7f0000000280)={0x980000, 0x306b, 0x0, r2, 0x0, &(0x7f0000000200)={0x9f0903, 0x4, [], @p_u16=&(0x7f0000000100)=0x3ed}}) write$P9_RSTAT(r3, &(0x7f00000002c0)={0x70, 0x7d, 0x1, {0x0, 0x69, 0x3, 0x7, {0x20, 0x0, 0x7}, 0x4000000, 0xffffffff, 0x0, 0x4, 0x9, '/dev/fb0\x00', 0x9, '/dev/fb0\x00', 0xa, '}security\'', 0x1a, '&--mime_type*eth0vboxnet0:'}}, 0x70) pipe(0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=@ipv4_getnetconf={0x3c, 0x52, 0x10, 0x70bd25, 0x25dfdbfd, {}, [@NETCONFA_PROXY_NEIGH={0x8}, @NETCONFA_IFINDEX={0x8}, @NETCONFA_RP_FILTER={0x8}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x3}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0xe9}]}, 0x3c}, 0x1, 0x0, 0x0, 0x3400c080}, 0x40) r4 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r4, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) write$binfmt_elf64(r4, &(0x7f00000003c0)={{0x7f, 0x45, 0x4c, 0x46, 0x6, 0x81, 0x35, 0x4, 0x1, 0x59ad6aa4a884dd63, 0x3, 0x0, 0x13d, 0x40, 0x26e, 0x8000, 0x1f, 0x38, 0x1, 0x8, 0x8, 0x3}, [{0x6, 0x3, 0xefa, 0x1, 0x81, 0x80000000, 0x0, 0x9}, {0x7, 0x2, 0x7ff, 0xfff, 0x1, 0x4, 0x0, 0x800b}], "5ad165d3d87709dd80c73c9fa8b6ef39a345e1b2327e38197c13f3be9248c0f2161632606ce45b5c7d7349c883946ca190a061f77e1020dc808b86b4e3c7b2a6128e2d3b16a4ec69ad8c276d1a038ddc59bd46a7a37061ed24ba41f62de7aaf1c073c43333bee7ed0979404acecab631d46b591f921ec0a584aeb912342ff4f104ff960a3563460c943d11952c88bd0d13a69a425793b6f7d2b09cf17c87cdc331f63c983436cef6888b1a8328e953b0b3bade3aabbfc4818a05af", [[]]}, 0x26b) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_open_procfs(0x0, &(0x7f0000000000)='timers\x00') 00:55:09 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) stat(&(0x7f0000000240)='./file0/file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(0xffffffffffffffff, &(0x7f0000001b80)) socket(0x11, 0x2, 0x5) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r4, 0x1, 0x14, &(0x7f0000000040), 0x50) getsockopt$IP6T_SO_GET_ENTRIES(r4, 0x29, 0x41, &(0x7f0000000480)=ANY=[@ANYBLOB="6e2f740000edffffffffffffff00000000000000000000000000000000000000ad0000005086f3915e59ad8184af4045c4e742fa881d66411baabaa82dda6d71f825249ec2eb0ad398766b6b870bba11fc00df87700a78319e5f5d955a5eb0f50e2dcd95623e3eba93f21d4733f6d4834e398f5ba4540b18afc3c2a92ff6e4a89dc029fdd87fc0c2ca637f5ead98feb48d1bfe6451a583e519234bd5297e8a8bf569ff90077ba1cef2ea64c8f027947915a33e26b9d8b4fb56ba4d86df286c34e0cd9715e6b39dcccf4eb9"], &(0x7f0000000340)=0x1) fsetxattr$trusted_overlay_redirect(r3, &(0x7f0000000200)='trusted.overlay.redirect\x00', &(0x7f0000000280)='./file0/file0\x00', 0xe, 0x0) getsockname$tipc(0xffffffffffffffff, 0x0, &(0x7f0000000080)) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000001400)={{0x1, 0x0, @identifier="8e0f03f7e12b88d1af81f7c5a6bb175f"}, 0x67, [], "ed760111b8363e2de90692d0bc7e0a89824d3c77730403363ce0521cdcb1973b558cbd01ebf95bd9529fe3c5a95dcf31792e3e463d875b955a13582aeaddf6af34a98934ad6944b87292af67aec51fd37bd761db93cf6623d8683956791c956c97d76a9fd8df5d"}) lstat(&(0x7f0000000000)='./file0/file0\x00', &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000100)=0x0) r7 = getegid() r8 = socket$inet_tcp(0x2, 0x1, 0x0) r9 = fcntl$dupfd(r8, 0x0, r8) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) setresuid(r10, r10, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003ec0)={0x0, 0x0, 0x0}, 0x0) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, r11) r12 = openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$DRM_IOCTL_AGP_INFO(r12, 0x80386433, &(0x7f0000000bc0)=""/4096) getsockopt$sock_cred(r12, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0x194) setresuid(r13, r13, 0x0) r14 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r15 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r15, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) waitid(0x1, r15, &(0x7f0000000100), 0x80000004, &(0x7f0000000180)) r16 = shmget$private(0x0, 0x3000, 0x20, &(0x7f0000ffa000/0x3000)=nil) shmctl$SHM_STAT_ANY(r16, 0xf, &(0x7f0000000540)=""/221) shmctl$IPC_SET(r16, 0x1, &(0x7f0000000180)={{0x3, r10, r11, r13, r7, 0x42, 0x7}, 0x803ff, 0x2, 0xfffffffffffffffd, 0x0, r14, r15, 0x5}) shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000840)={{0x0, r2, r7, 0x0, r5, 0x50}, 0xd7, 0xfffffffffffffffe, 0x1000, 0x8000, r6}) r17 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000280)='/dev/nullb0\x00', 0x4400, 0x0) preadv(r17, &(0x7f0000000040)=[{&(0x7f0000000400)=""/4096, 0x3ffc00}], 0x1, 0x0) 00:55:09 executing program 3: r0 = socket$pppoe(0x18, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x7) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x2, @link_local, 'team0\x00'}}, 0x1e) r1 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) getsockopt$IP_SET_OP_VERSION(r0, 0x1, 0x53, &(0x7f0000000100), &(0x7f0000000140)=0x8) rmdir(&(0x7f00000000c0)='./file0\x00') ioctl$FBIOPUT_VSCREENINFO(r1, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {0x0, 0x3}, {0xffffffff}, {0x1}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) 00:55:09 executing program 5: socket$pppoe(0x18, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x40186366, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {0xffffffff}, {0x1}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}) 00:55:10 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) pipe(0x0) wait4(0x0, 0x0, 0x40000000, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000265000)=@req={0x0, 0x400}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000740)={{{@in=@multicast2, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@broadcast}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route(r1, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=@ipv4_getnetconf={0x54, 0x52, 0x10, 0x70bd25, 0x25dfdbfd, {}, [@NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x1}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x9}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x5}, @NETCONFA_FORWARDING={0x8, 0x2, 0x8}, @NETCONFA_IFINDEX={0x8, 0x1, r2}, @NETCONFA_RP_FILTER={0x8, 0x3, 0x7fff}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x3}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0xe9}]}, 0x54}, 0x1, 0x0, 0x0, 0x3400c080}, 0x40) read(0xffffffffffffffff, &(0x7f0000000280)=""/152, 0x20000318) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/keys\x00', 0x0, 0x0) r4 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r4, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) write$binfmt_elf64(r4, &(0x7f00000003c0)={{0x7f, 0x45, 0x4c, 0x46, 0x6, 0x81, 0x35, 0x4, 0x1, 0x59ad6aa4a884dd63, 0x3, 0x0, 0x13d, 0x40, 0x26e, 0x8000, 0x1f, 0x38, 0x1, 0x8, 0x8}, [{0x6, 0x3, 0xefa, 0x1, 0x81, 0x80000000, 0x0, 0x9}, {0x7, 0x2, 0x7ff, 0xfff, 0x1, 0x4, 0x0, 0x800b}], "5ad165d3d87709dd80c73c9fa8b6ef39a345e1b2327e38197c13f3be9248c0f2161632606ce45b5c7d7349c883946ca190a061f77e1020dc808b86b4e3c7b2a6128e2d3b16a4ec69ad8c276d1a038ddc59bd46a7a37061ed24ba41f62de7aaf1c073c43333bee7ed0979404acecab631d46b591f921ec0a584aeb912342ff4f104ff960a3563460c943d11952c88bd0d13a69a425793b6f7d2b09cf17c87cdc331f63c983436cef6888b1a8328e953b0b3bade3aabbfc4818a05af", [[]]}, 0x26b) read(r3, &(0x7f0000000280)=""/152, 0x20000318) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x280800, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$DRM_IOCTL_MODE_SETCRTC(0xffffffffffffffff, 0xc06864a2, &(0x7f0000000000)={0x0, 0x0, 0x20}) 00:55:10 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) pipe(0x0) wait4(0x0, 0x0, 0x40000000, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000265000)=@req={0x0, 0x400, 0x2}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000740)={{{@in=@multicast2, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@broadcast}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route(r1, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=@ipv4_getnetconf={0x4c, 0x52, 0x10, 0x70bd25, 0x25dfdbfd, {}, [@NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x1}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x9}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x5}, @NETCONFA_FORWARDING={0x8, 0x2, 0x8}, @NETCONFA_IFINDEX={0x8, 0x1, r2}, @NETCONFA_RP_FILTER={0x8, 0x3, 0x7fff}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x3}]}, 0x4c}, 0x1, 0x0, 0x0, 0x3400c080}, 0x40) read(0xffffffffffffffff, &(0x7f0000000280)=""/152, 0x20000318) openat$procfs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/keys\x00', 0x0, 0x0) r3 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r3, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) write$binfmt_elf64(r3, &(0x7f00000003c0)={{0x7f, 0x45, 0x4c, 0x46, 0x6, 0x81, 0x35, 0x4, 0x1, 0x59ad6aa4a884dd63, 0x3, 0x0, 0x13d, 0x40, 0x26e, 0x8000, 0x1f, 0x38, 0x1, 0x8, 0x8, 0x3}, [{0x6, 0x3, 0xefa, 0x1, 0x81, 0x80000000, 0x0, 0x9}, {0x7, 0x2, 0x7ff, 0xfff, 0x1, 0x4, 0x0, 0x800b}], "5ad165d3d87709dd80c73c9fa8b6ef39a345e1b2327e38197c13f3be9248c0f2161632606ce45b5c7d7349c883946ca190a061f77e1020dc808b86b4e3c7b2a6128e2d3b16a4ec69ad8c276d1a038ddc59bd46a7a37061ed24ba41f62de7aaf1c073c43333bee7ed0979404acecab631d46b591f921ec0a584aeb912342ff4f104ff960a3563460c943d11952c88bd0d13a69a425793b6f7d2b09cf17c87cdc331f63c983436cef6888b1a8328e953b0b3bade3aabbfc4818a05af", [[]]}, 0x26b) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_open_procfs(0x0, &(0x7f0000000000)='timers\x00') 00:55:10 executing program 3: r0 = socket$pppoe(0x18, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x2, @link_local, 'team0\x00'}}, 0x1e) r1 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) sendmsg$IPSET_CMD_ADD(r2, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1004010}, 0xc, &(0x7f0000000140)={&(0x7f00000001c0)={0x74, 0x9, 0x6, 0x101, 0x0, 0x0, {0x5, 0x0, 0x9}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_ADT={0x38, 0x8, 0x0, 0x1, [{0x1c, 0x7, 0x0, 0x1, @IPSET_ATTR_IP_TO={0x18, 0x2, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @local}}}, {0xc, 0x7, 0x0, 0x1, @IPSET_ATTR_SKBPRIO={0x8, 0x1c, 0x1, 0x0, 0x5}}, {0xc, 0x7, 0x0, 0x1, @IPSET_ATTR_PORT={0x6, 0x4, 0x1, 0x0, 0x4e24}}]}, @IPSET_ATTR_LINENO={0x8, 0x9, 0x1, 0x0, 0x6}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}]}, 0x74}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000) ioctl$FBIOPUT_VSCREENINFO(r1, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {0x0, 0x3}, {0xffffffff}, {0x1}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) 00:55:10 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) pipe(0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=@ipv4_getnetconf={0x3c, 0x52, 0x10, 0x70bd25, 0x25dfdbfd, {}, [@NETCONFA_PROXY_NEIGH={0x8}, @NETCONFA_IFINDEX={0x8}, @NETCONFA_RP_FILTER={0x8}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x3}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0xe9}]}, 0x3c}, 0x1, 0x0, 0x0, 0x3400c080}, 0x40) r1 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r1, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) write$binfmt_elf64(r1, &(0x7f00000003c0)={{0x7f, 0x45, 0x4c, 0x46, 0x6, 0x81, 0x35, 0x4, 0x1, 0x59ad6aa4a884dd63, 0x3, 0x0, 0x13d, 0x40, 0x26e, 0x8000, 0x1f, 0x38, 0x1, 0x8, 0x8, 0x3}, [{0x6, 0x3, 0xefa, 0x1, 0x81, 0x80000000, 0x0, 0x9}, {0x7, 0x2, 0x7ff, 0xfff, 0x1, 0x4, 0x0, 0x800b}], "5ad165d3d87709dd80c73c9fa8b6ef39a345e1b2327e38197c13f3be9248c0f2161632606ce45b5c7d7349c883946ca190a061f77e1020dc808b86b4e3c7b2a6128e2d3b16a4ec69ad8c276d1a038ddc59bd46a7a37061ed24ba41f62de7aaf1c073c43333bee7ed0979404acecab631d46b591f921ec0a584aeb912342ff4f104ff960a3563460c943d11952c88bd0d13a69a425793b6f7d2b09cf17c87cdc331f63c983436cef6888b1a8328e953b0b3bade3aabbfc4818a05af", [[]]}, 0x26b) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_open_procfs(0x0, &(0x7f0000000000)='timers\x00') r2 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f0000265000)=@req={0x0, 0x0, 0x2}, 0x10) getsockopt$bt_BT_RCVMTU(r2, 0x112, 0xd, &(0x7f0000000100)=0x3ff, &(0x7f0000000200)=0x2) 00:55:10 executing program 5: socket$pppoe(0x18, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4020940d, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {0xffffffff}, {0x1}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}) 00:55:10 executing program 3: r0 = socket$pppoe(0x18, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x2, @link_local, 'team0\x00'}}, 0x1e) r1 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r1, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {0x0, 0x3}, {0xffffffff}, {0x1}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) r2 = socket$phonet(0x23, 0x2, 0x1) shutdown(r2, 0x0) 00:55:10 executing program 5: socket$pppoe(0x18, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x80044948, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {0xffffffff}, {0x1}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}) 00:55:11 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) pipe(0x0) wait4(0x0, 0x0, 0x40000000, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000265000)=@req={0x0, 0x400, 0x2}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000740)={{{@in=@multicast2, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@broadcast}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route(r1, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=@ipv4_getnetconf={0x4c, 0x52, 0x10, 0x70bd25, 0x25dfdbfd, {}, [@NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x1}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x9}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x5}, @NETCONFA_FORWARDING={0x8, 0x2, 0x8}, @NETCONFA_IFINDEX={0x8, 0x1, r2}, @NETCONFA_RP_FILTER={0x8, 0x3, 0x7fff}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x3}]}, 0x4c}, 0x1, 0x0, 0x0, 0x3400c080}, 0x40) read(0xffffffffffffffff, &(0x7f0000000280)=""/152, 0x20000318) openat$procfs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/keys\x00', 0x0, 0x0) r3 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r3, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) write$binfmt_elf64(r3, &(0x7f00000003c0)={{0x7f, 0x45, 0x4c, 0x46, 0x6, 0x81, 0x35, 0x4, 0x1, 0x59ad6aa4a884dd63, 0x3, 0x0, 0x13d, 0x40, 0x26e, 0x8000, 0x1f, 0x38, 0x1, 0x8, 0x8, 0x3}, [{0x6, 0x3, 0xefa, 0x1, 0x81, 0x80000000, 0x0, 0x9}, {0x7, 0x2, 0x7ff, 0xfff, 0x1, 0x4, 0x0, 0x800b}], "5ad165d3d87709dd80c73c9fa8b6ef39a345e1b2327e38197c13f3be9248c0f2161632606ce45b5c7d7349c883946ca190a061f77e1020dc808b86b4e3c7b2a6128e2d3b16a4ec69ad8c276d1a038ddc59bd46a7a37061ed24ba41f62de7aaf1c073c43333bee7ed0979404acecab631d46b591f921ec0a584aeb912342ff4f104ff960a3563460c943d11952c88bd0d13a69a425793b6f7d2b09cf17c87cdc331f63c983436cef6888b1a8328e953b0b3bade3aabbfc4818a05af", [[]]}, 0x26b) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_open_procfs(0x0, &(0x7f0000000000)='timers\x00') 00:55:11 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) pipe(0x0) wait4(0x0, 0x0, 0x40000000, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000265000)=@req={0x0, 0x400}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000740)={{{@in=@multicast2, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@broadcast}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route(r1, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=@ipv4_getnetconf={0x54, 0x52, 0x10, 0x70bd25, 0x25dfdbfd, {}, [@NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x1}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x9}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x5}, @NETCONFA_FORWARDING={0x8, 0x2, 0x8}, @NETCONFA_IFINDEX={0x8, 0x1, r2}, @NETCONFA_RP_FILTER={0x8, 0x3, 0x7fff}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x3}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0xe9}]}, 0x54}, 0x1, 0x0, 0x0, 0x3400c080}, 0x40) read(0xffffffffffffffff, &(0x7f0000000280)=""/152, 0x20000318) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/keys\x00', 0x0, 0x0) r4 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r4, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) write$binfmt_elf64(r4, &(0x7f00000003c0)={{0x7f, 0x45, 0x4c, 0x46, 0x6, 0x81, 0x35, 0x4, 0x1, 0x59ad6aa4a884dd63, 0x3, 0x0, 0x13d, 0x40, 0x26e, 0x8000, 0x1f, 0x38, 0x1, 0x8, 0x8}, [{0x6, 0x3, 0xefa, 0x1, 0x81, 0x80000000, 0x0, 0x9}, {0x7, 0x2, 0x7ff, 0xfff, 0x1, 0x4, 0x0, 0x800b}], "5ad165d3d87709dd80c73c9fa8b6ef39a345e1b2327e38197c13f3be9248c0f2161632606ce45b5c7d7349c883946ca190a061f77e1020dc808b86b4e3c7b2a6128e2d3b16a4ec69ad8c276d1a038ddc59bd46a7a37061ed24ba41f62de7aaf1c073c43333bee7ed0979404acecab631d46b591f921ec0a584aeb912342ff4f104ff960a3563460c943d11952c88bd0d13a69a425793b6f7d2b09cf17c87cdc331f63c983436cef6888b1a8328e953b0b3bade3aabbfc4818a05af", [[]]}, 0x26b) read(r3, &(0x7f0000000280)=""/152, 0x20000318) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x280800, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$DRM_IOCTL_MODE_SETCRTC(0xffffffffffffffff, 0xc06864a2, &(0x7f0000000000)={0x0, 0x0, 0x20}) 00:55:11 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) stat(&(0x7f0000000240)='./file0/file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(0xffffffffffffffff, &(0x7f0000001b80)) socket(0x11, 0x2, 0x5) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r4, 0x1, 0x14, &(0x7f0000000040), 0x50) getsockopt$IP6T_SO_GET_ENTRIES(r4, 0x29, 0x41, &(0x7f0000000480)=ANY=[@ANYBLOB="6e2f740000edffffffffffffff00000000000000000000000000000000000000ad0000005086f3915e59ad8184af4045c4e742fa881d66411baabaa82dda6d71f825249ec2eb0ad398766b6b870bba11fc00df87700a78319e5f5d955a5eb0f50e2dcd95623e3eba93f21d4733f6d4834e398f5ba4540b18afc3c2a92ff6e4a89dc029fdd87fc0c2ca637f5ead98feb48d1bfe6451a583e519234bd5297e8a8bf569ff90077ba1cef2ea64c8f027947915a33e26b9d8b4fb56ba4d86df286c34e0cd9715e6b39dcccf4eb9"], &(0x7f0000000340)=0x1) fsetxattr$trusted_overlay_redirect(r3, &(0x7f0000000200)='trusted.overlay.redirect\x00', &(0x7f0000000280)='./file0/file0\x00', 0xe, 0x0) getsockname$tipc(0xffffffffffffffff, 0x0, &(0x7f0000000080)) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000001400)={{0x1, 0x0, @identifier="8e0f03f7e12b88d1af81f7c5a6bb175f"}, 0x67, [], "ed760111b8363e2de90692d0bc7e0a89824d3c77730403363ce0521cdcb1973b558cbd01ebf95bd9529fe3c5a95dcf31792e3e463d875b955a13582aeaddf6af34a98934ad6944b87292af67aec51fd37bd761db93cf6623d8683956791c956c97d76a9fd8df5d"}) lstat(&(0x7f0000000000)='./file0/file0\x00', &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000100)=0x0) r7 = getegid() r8 = socket$inet_tcp(0x2, 0x1, 0x0) r9 = fcntl$dupfd(r8, 0x0, r8) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) setresuid(r10, r10, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003ec0)={0x0, 0x0, 0x0}, 0x0) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, r11) r12 = openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$DRM_IOCTL_AGP_INFO(r12, 0x80386433, &(0x7f0000000bc0)=""/4096) getsockopt$sock_cred(r12, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0x194) setresuid(r13, r13, 0x0) r14 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r15 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r15, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) waitid(0x1, r15, &(0x7f0000000100), 0x80000004, &(0x7f0000000180)) r16 = shmget$private(0x0, 0x3000, 0x20, &(0x7f0000ffa000/0x3000)=nil) shmctl$SHM_STAT_ANY(r16, 0xf, &(0x7f0000000540)=""/221) shmctl$IPC_SET(r16, 0x1, &(0x7f0000000180)={{0x3, r10, r11, r13, r7, 0x42, 0x7}, 0x803ff, 0x2, 0xfffffffffffffffd, 0x0, r14, r15, 0x5}) shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000840)={{0x0, r2, r7, 0x0, r5, 0x50}, 0xd7, 0xfffffffffffffffe, 0x1000, 0x8000, r6}) r17 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000280)='/dev/nullb0\x00', 0x4400, 0x0) preadv(r17, &(0x7f0000000040)=[{&(0x7f0000000400)=""/4096, 0x3ffc00}], 0x1, 0x0) 00:55:11 executing program 5: socket$pppoe(0x18, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x80086301, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {0xffffffff}, {0x1}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}) 00:55:11 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x88da, 0x7}, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x400}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) pipe(0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=@ipv4_getnetconf={0x3c, 0x52, 0x10, 0x70bd25, 0x25dfdbfd, {}, [@NETCONFA_PROXY_NEIGH={0x8}, @NETCONFA_IFINDEX={0x8}, @NETCONFA_RP_FILTER={0x8}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x3}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0xe9}]}, 0x3c}, 0x1, 0x0, 0x0, 0x3400c080}, 0x40) r1 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r1, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) write$binfmt_elf64(r1, &(0x7f00000003c0)={{0x7f, 0x45, 0x4c, 0x46, 0x6, 0x81, 0x35, 0x4, 0x1, 0x59ad6aa4a884dd63, 0x3, 0x0, 0x13d, 0x40, 0x26e, 0x8000, 0x1f, 0x38, 0x1, 0x8, 0x8, 0x3}, [{0x6, 0x3, 0xefa, 0x1, 0x81, 0x80000000, 0x0, 0x9}, {0x7, 0x2, 0x7ff, 0xfff, 0x1, 0x4, 0x0, 0x800b}], "5ad165d3d87709dd80c73c9fa8b6ef39a345e1b2327e38197c13f3be9248c0f2161632606ce45b5c7d7349c883946ca190a061f77e1020dc808b86b4e3c7b2a6128e2d3b16a4ec69ad8c276d1a038ddc59bd46a7a37061ed24ba41f62de7aaf1c073c43333bee7ed0979404acecab631d46b591f921ec0a584aeb912342ff4f104ff960a3563460c943d11952c88bd0d13a69a425793b6f7d2b09cf17c87cdc331f63c983436cef6888b1a8328e953b0b3bade3aabbfc4818a05af", [[]]}, 0x26b) r2 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r2, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) fsetxattr$trusted_overlay_origin(r2, &(0x7f0000000100)='trusted.overlay.origin\x00', &(0x7f0000000200)='y\x00', 0x2, 0x2) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/sys/net/ipv4/vs/drop_entry\x00', 0x2, 0x0) openat$cgroup_type(r3, &(0x7f00000002c0)='cgroup.type\x00', 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='timers\x00') 00:55:11 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) pipe(0x0) wait4(0x0, 0x0, 0x40000000, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000265000)=@req={0x0, 0x400}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000740)={{{@in=@multicast2, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@broadcast}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route(r1, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=@ipv4_getnetconf={0x54, 0x52, 0x10, 0x70bd25, 0x25dfdbfd, {}, [@NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x1}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x9}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x5}, @NETCONFA_FORWARDING={0x8, 0x2, 0x8}, @NETCONFA_IFINDEX={0x8, 0x1, r2}, @NETCONFA_RP_FILTER={0x8, 0x3, 0x7fff}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x3}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0xe9}]}, 0x54}, 0x1, 0x0, 0x0, 0x3400c080}, 0x40) read(0xffffffffffffffff, &(0x7f0000000280)=""/152, 0x20000318) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/keys\x00', 0x0, 0x0) r4 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r4, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) write$binfmt_elf64(r4, &(0x7f00000003c0)={{0x7f, 0x45, 0x4c, 0x46, 0x6, 0x81, 0x35, 0x4, 0x1, 0x59ad6aa4a884dd63, 0x3, 0x0, 0x13d, 0x40, 0x26e, 0x8000, 0x1f, 0x38, 0x1, 0x8, 0x8}, [{0x6, 0x3, 0xefa, 0x1, 0x81, 0x80000000, 0x0, 0x9}, {0x7, 0x2, 0x7ff, 0xfff, 0x1, 0x4, 0x0, 0x800b}], "5ad165d3d87709dd80c73c9fa8b6ef39a345e1b2327e38197c13f3be9248c0f2161632606ce45b5c7d7349c883946ca190a061f77e1020dc808b86b4e3c7b2a6128e2d3b16a4ec69ad8c276d1a038ddc59bd46a7a37061ed24ba41f62de7aaf1c073c43333bee7ed0979404acecab631d46b591f921ec0a584aeb912342ff4f104ff960a3563460c943d11952c88bd0d13a69a425793b6f7d2b09cf17c87cdc331f63c983436cef6888b1a8328e953b0b3bade3aabbfc4818a05af", [[]]}, 0x26b) read(r3, &(0x7f0000000280)=""/152, 0x20000318) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x280800, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$DRM_IOCTL_MODE_SETCRTC(0xffffffffffffffff, 0xc06864a2, &(0x7f0000000000)={0x0, 0x0, 0x20}) 00:55:11 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) pipe(0x0) wait4(0x0, 0x0, 0x40000000, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000265000)=@req={0x0, 0x400, 0x2}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000740)={{{@in=@multicast2, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@broadcast}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route(r1, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=@ipv4_getnetconf={0x4c, 0x52, 0x10, 0x70bd25, 0x25dfdbfd, {}, [@NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x1}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x9}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x5}, @NETCONFA_FORWARDING={0x8, 0x2, 0x8}, @NETCONFA_IFINDEX={0x8, 0x1, r2}, @NETCONFA_RP_FILTER={0x8, 0x3, 0x7fff}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x3}]}, 0x4c}, 0x1, 0x0, 0x0, 0x3400c080}, 0x40) read(0xffffffffffffffff, &(0x7f0000000280)=""/152, 0x20000318) openat$procfs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/keys\x00', 0x0, 0x0) r3 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r3, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) write$binfmt_elf64(r3, &(0x7f00000003c0)={{0x7f, 0x45, 0x4c, 0x46, 0x6, 0x81, 0x35, 0x4, 0x1, 0x59ad6aa4a884dd63, 0x3, 0x0, 0x13d, 0x40, 0x26e, 0x8000, 0x1f, 0x38, 0x1, 0x8, 0x8, 0x3}, [{0x6, 0x3, 0xefa, 0x1, 0x81, 0x80000000, 0x0, 0x9}, {0x7, 0x2, 0x7ff, 0xfff, 0x1, 0x4, 0x0, 0x800b}], "5ad165d3d87709dd80c73c9fa8b6ef39a345e1b2327e38197c13f3be9248c0f2161632606ce45b5c7d7349c883946ca190a061f77e1020dc808b86b4e3c7b2a6128e2d3b16a4ec69ad8c276d1a038ddc59bd46a7a37061ed24ba41f62de7aaf1c073c43333bee7ed0979404acecab631d46b591f921ec0a584aeb912342ff4f104ff960a3563460c943d11952c88bd0d13a69a425793b6f7d2b09cf17c87cdc331f63c983436cef6888b1a8328e953b0b3bade3aabbfc4818a05af", [[]]}, 0x26b) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_open_procfs(0x0, &(0x7f0000000000)='timers\x00') 00:55:11 executing program 3: r0 = socket$pppoe(0x18, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x2, @link_local, 'team0\x00'}}, 0x1e) r1 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x80802, 0x0) ioctl$FBIOPUT_VSCREENINFO(r1, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {0x0, 0x3}, {0xffffffff}, {0x1}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/zoneinfo\x00', 0x0, 0x0) ioctl$NS_GET_OWNER_UID(r2, 0xb704, &(0x7f0000000100)) 00:55:11 executing program 5: socket$pppoe(0x18, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0xc0045878, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {0xffffffff}, {0x1}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}) 00:55:12 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) pipe(0x0) wait4(0x0, 0x0, 0x40000000, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000265000)=@req={0x0, 0x400, 0x2}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000740)={{{@in=@multicast2, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@broadcast}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route(r1, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=@ipv4_getnetconf={0x54, 0x52, 0x10, 0x70bd25, 0x25dfdbfd, {}, [@NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x1}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x9}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x5}, @NETCONFA_FORWARDING={0x8, 0x2, 0x8}, @NETCONFA_IFINDEX={0x8, 0x1, r2}, @NETCONFA_RP_FILTER={0x8, 0x3, 0x7fff}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x3}, @NETCONFA_PROXY_NEIGH={0x8}]}, 0x54}, 0x1, 0x0, 0x0, 0x3400c080}, 0x40) read(0xffffffffffffffff, &(0x7f0000000280)=""/152, 0x20000318) openat$procfs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/keys\x00', 0x0, 0x0) r3 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r3, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) write$binfmt_elf64(r3, &(0x7f00000003c0)={{0x7f, 0x45, 0x4c, 0x46, 0x6, 0x81, 0x35, 0x4, 0x1, 0x59ad6aa4a884dd63, 0x3, 0x0, 0x13d, 0x40, 0x26e, 0x8000, 0x1f, 0x38, 0x1, 0x8, 0x8, 0x3}, [{0x6, 0x3, 0xefa, 0x1, 0x81, 0x80000000, 0x0, 0x9}, {0x7, 0x2, 0x7ff, 0xfff, 0x1, 0x4, 0x0, 0x800b}], "5ad165d3d87709dd80c73c9fa8b6ef39a345e1b2327e38197c13f3be9248c0f2161632606ce45b5c7d7349c883946ca190a061f77e1020dc808b86b4e3c7b2a6128e2d3b16a4ec69ad8c276d1a038ddc59bd46a7a37061ed24ba41f62de7aaf1c073c43333bee7ed0979404acecab631d46b591f921ec0a584aeb912342ff4f104ff960a3563460c943d11952c88bd0d13a69a425793b6f7d2b09cf17c87cdc331f63c983436cef6888b1a8328e953b0b3bade3aabbfc4818a05af", [[]]}, 0x26b) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_open_procfs(0x0, &(0x7f0000000000)='timers\x00') 00:55:12 executing program 5: socket$pppoe(0x18, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0xc0045878, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {0xffffffff}, {0x1}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}) 00:55:12 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) pipe(0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[@ANYBLOB="3c0000005200000025bd7000fddbdf24f9080005000000440008000100", @ANYRES32=0x0, @ANYBLOB="0800030000000000080006000300000008000500e9000000000000"], 0x3c}, 0x1, 0x0, 0x0, 0x3400c080}, 0x40) r1 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r1, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) write$binfmt_elf64(r1, &(0x7f00000003c0)={{0x7f, 0x45, 0x4c, 0x46, 0x6, 0x81, 0x35, 0x4, 0x1, 0x59ad6aa4a884dd63, 0x3, 0x0, 0x13d, 0x40, 0x26e, 0x8000, 0x1f, 0x38, 0x1, 0x8, 0x8, 0x3}, [{0x6, 0x3, 0xefa, 0x1, 0x81, 0x80000000, 0x0, 0x9}, {0x7, 0x2, 0x7ff, 0xfff, 0x1, 0x4, 0x0, 0x800b}], "5ad165d3d87709dd80c73c9fa8b6ef39a345e1b2327e38197c13f3be9248c0f2161632606ce45b5c7d7349c883946ca190a061f77e1020dc808b86b4e3c7b2a6128e2d3b16a4ec69ad8c276d1a038ddc59bd46a7a37061ed24ba41f62de7aaf1c073c43333bee7ed0979404acecab631d46b591f921ec0a584aeb912342ff4f104ff960a3563460c943d11952c88bd0d13a69a425793b6f7d2b09cf17c87cdc331f63c983436cef6888b1a8328e953b0b3bade3aabbfc4818a05af", [[]]}, 0x26b) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_open_procfs(0x0, &(0x7f0000000000)='timers\x00') 00:55:12 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) pipe(0x0) wait4(0x0, 0x0, 0x40000000, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000265000)=@req={0x0, 0x400}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000740)={{{@in=@multicast2, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@broadcast}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route(r1, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=@ipv4_getnetconf={0x54, 0x52, 0x10, 0x70bd25, 0x25dfdbfd, {}, [@NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x1}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x9}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x5}, @NETCONFA_FORWARDING={0x8, 0x2, 0x8}, @NETCONFA_IFINDEX={0x8, 0x1, r2}, @NETCONFA_RP_FILTER={0x8, 0x3, 0x7fff}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x3}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0xe9}]}, 0x54}, 0x1, 0x0, 0x0, 0x3400c080}, 0x40) read(0xffffffffffffffff, &(0x7f0000000280)=""/152, 0x20000318) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/keys\x00', 0x0, 0x0) r4 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r4, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) write$binfmt_elf64(r4, &(0x7f00000003c0)={{0x7f, 0x45, 0x4c, 0x46, 0x6, 0x81, 0x35, 0x4, 0x1, 0x59ad6aa4a884dd63, 0x3, 0x0, 0x13d, 0x40, 0x26e, 0x8000, 0x1f, 0x38, 0x1, 0x8, 0x8, 0x3}, [{0x6, 0x3, 0xefa, 0x1, 0x81, 0x80000000, 0x0, 0x9}], "5ad165d3d87709dd80c73c9fa8b6ef39a345e1b2327e38197c13f3be9248c0f2161632606ce45b5c7d7349c883946ca190a061f77e1020dc808b86b4e3c7b2a6128e2d3b16a4ec69ad8c276d1a038ddc59bd46a7a37061ed24ba41f62de7aaf1c073c43333bee7ed0979404acecab631d46b591f921ec0a584aeb912342ff4f104ff960a3563460c943d11952c88bd0d13a69a425793b6f7d2b09cf17c87cdc331f63c983436cef6888b1a8328e953b0b3bade3aabbfc4818a05af", [[]]}, 0x233) read(r3, &(0x7f0000000280)=""/152, 0x20000318) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x280800, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$DRM_IOCTL_MODE_SETCRTC(0xffffffffffffffff, 0xc06864a2, &(0x7f0000000000)={0x0, 0x0, 0x20}) 00:55:12 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) stat(&(0x7f0000000240)='./file0/file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(0xffffffffffffffff, &(0x7f0000001b80)) socket(0x11, 0x2, 0x5) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r4, 0x1, 0x14, &(0x7f0000000040), 0x50) getsockopt$IP6T_SO_GET_ENTRIES(r4, 0x29, 0x41, &(0x7f0000000480)=ANY=[@ANYBLOB="6e2f740000edffffffffffffff00000000000000000000000000000000000000ad0000005086f3915e59ad8184af4045c4e742fa881d66411baabaa82dda6d71f825249ec2eb0ad398766b6b870bba11fc00df87700a78319e5f5d955a5eb0f50e2dcd95623e3eba93f21d4733f6d4834e398f5ba4540b18afc3c2a92ff6e4a89dc029fdd87fc0c2ca637f5ead98feb48d1bfe6451a583e519234bd5297e8a8bf569ff90077ba1cef2ea64c8f027947915a33e26b9d8b4fb56ba4d86df286c34e0cd9715e6b39dcccf4eb9"], &(0x7f0000000340)=0x1) fsetxattr$trusted_overlay_redirect(r3, &(0x7f0000000200)='trusted.overlay.redirect\x00', &(0x7f0000000280)='./file0/file0\x00', 0xe, 0x0) getsockname$tipc(0xffffffffffffffff, 0x0, &(0x7f0000000080)) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000001400)={{0x1, 0x0, @identifier="8e0f03f7e12b88d1af81f7c5a6bb175f"}, 0x67, [], "ed760111b8363e2de90692d0bc7e0a89824d3c77730403363ce0521cdcb1973b558cbd01ebf95bd9529fe3c5a95dcf31792e3e463d875b955a13582aeaddf6af34a98934ad6944b87292af67aec51fd37bd761db93cf6623d8683956791c956c97d76a9fd8df5d"}) lstat(&(0x7f0000000000)='./file0/file0\x00', &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000100)=0x0) r7 = getegid() r8 = socket$inet_tcp(0x2, 0x1, 0x0) r9 = fcntl$dupfd(r8, 0x0, r8) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) setresuid(r10, r10, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003ec0)={0x0, 0x0, 0x0}, 0x0) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, r11) r12 = openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$DRM_IOCTL_AGP_INFO(r12, 0x80386433, &(0x7f0000000bc0)=""/4096) getsockopt$sock_cred(r12, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0x194) setresuid(r13, r13, 0x0) r14 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r15 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r15, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) waitid(0x1, r15, &(0x7f0000000100), 0x80000004, &(0x7f0000000180)) r16 = shmget$private(0x0, 0x3000, 0x20, &(0x7f0000ffa000/0x3000)=nil) shmctl$SHM_STAT_ANY(r16, 0xf, &(0x7f0000000540)=""/221) shmctl$IPC_SET(r16, 0x1, &(0x7f0000000180)={{0x3, r10, r11, r13, r7, 0x42, 0x7}, 0x803ff, 0x2, 0xfffffffffffffffd, 0x0, r14, r15, 0x5}) shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000840)={{0x0, r2, r7, 0x0, r5, 0x50}, 0xd7, 0xfffffffffffffffe, 0x1000, 0x8000, r6}) r17 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000280)='/dev/nullb0\x00', 0x4400, 0x0) preadv(r17, &(0x7f0000000040)=[{&(0x7f0000000400)=""/4096, 0x3ffc00}], 0x1, 0x0) 00:55:12 executing program 3: r0 = socket$pppoe(0x18, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x2, @link_local, 'team0\x00'}}, 0x1e) r1 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r1, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) r2 = dup3(r1, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_NODELAY(r2, 0x84, 0x3, &(0x7f00000000c0), &(0x7f0000000100)=0x4) r3 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r3, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {0x0, 0x3}, {0xffffffff}, {0x1}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) 00:55:13 executing program 5: socket$pppoe(0x18, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0xc0189436, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {0xffffffff}, {0x1}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}) 00:55:13 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) pipe(0x0) wait4(0x0, 0x0, 0x40000000, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000265000)=@req={0x0, 0x400, 0x2}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000740)={{{@in=@multicast2, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@broadcast}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route(r1, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=@ipv4_getnetconf={0x54, 0x52, 0x10, 0x70bd25, 0x25dfdbfd, {}, [@NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x1}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x9}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x5}, @NETCONFA_FORWARDING={0x8, 0x2, 0x8}, @NETCONFA_IFINDEX={0x8, 0x1, r2}, @NETCONFA_RP_FILTER={0x8, 0x3, 0x7fff}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x3}, @NETCONFA_PROXY_NEIGH={0x8}]}, 0x54}, 0x1, 0x0, 0x0, 0x3400c080}, 0x40) read(0xffffffffffffffff, &(0x7f0000000280)=""/152, 0x20000318) openat$procfs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/keys\x00', 0x0, 0x0) r3 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r3, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) write$binfmt_elf64(r3, &(0x7f00000003c0)={{0x7f, 0x45, 0x4c, 0x46, 0x6, 0x81, 0x35, 0x4, 0x1, 0x59ad6aa4a884dd63, 0x3, 0x0, 0x13d, 0x40, 0x26e, 0x8000, 0x1f, 0x38, 0x1, 0x8, 0x8, 0x3}, [{0x6, 0x3, 0xefa, 0x1, 0x81, 0x80000000, 0x0, 0x9}, {0x7, 0x2, 0x7ff, 0xfff, 0x1, 0x4, 0x0, 0x800b}], "5ad165d3d87709dd80c73c9fa8b6ef39a345e1b2327e38197c13f3be9248c0f2161632606ce45b5c7d7349c883946ca190a061f77e1020dc808b86b4e3c7b2a6128e2d3b16a4ec69ad8c276d1a038ddc59bd46a7a37061ed24ba41f62de7aaf1c073c43333bee7ed0979404acecab631d46b591f921ec0a584aeb912342ff4f104ff960a3563460c943d11952c88bd0d13a69a425793b6f7d2b09cf17c87cdc331f63c983436cef6888b1a8328e953b0b3bade3aabbfc4818a05af", [[]]}, 0x26b) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_open_procfs(0x0, &(0x7f0000000000)='timers\x00') 00:55:13 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) pipe(0x0) wait4(0x0, 0x0, 0x40000000, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000265000)=@req={0x0, 0x400}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000740)={{{@in=@multicast2, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@broadcast}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route(r1, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=@ipv4_getnetconf={0x54, 0x52, 0x10, 0x70bd25, 0x25dfdbfd, {}, [@NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x1}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x9}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x5}, @NETCONFA_FORWARDING={0x8, 0x2, 0x8}, @NETCONFA_IFINDEX={0x8, 0x1, r2}, @NETCONFA_RP_FILTER={0x8, 0x3, 0x7fff}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x3}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0xe9}]}, 0x54}, 0x1, 0x0, 0x0, 0x3400c080}, 0x40) read(0xffffffffffffffff, &(0x7f0000000280)=""/152, 0x20000318) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/keys\x00', 0x0, 0x0) r4 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r4, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) write$binfmt_elf64(r4, &(0x7f00000003c0)={{0x7f, 0x45, 0x4c, 0x46, 0x6, 0x81, 0x35, 0x4, 0x1, 0x59ad6aa4a884dd63, 0x3, 0x0, 0x13d, 0x40, 0x26e, 0x8000, 0x1f, 0x38, 0x1, 0x8, 0x8, 0x3}, [{0x6, 0x3, 0xefa, 0x1, 0x81, 0x80000000, 0x0, 0x9}], "5ad165d3d87709dd80c73c9fa8b6ef39a345e1b2327e38197c13f3be9248c0f2161632606ce45b5c7d7349c883946ca190a061f77e1020dc808b86b4e3c7b2a6128e2d3b16a4ec69ad8c276d1a038ddc59bd46a7a37061ed24ba41f62de7aaf1c073c43333bee7ed0979404acecab631d46b591f921ec0a584aeb912342ff4f104ff960a3563460c943d11952c88bd0d13a69a425793b6f7d2b09cf17c87cdc331f63c983436cef6888b1a8328e953b0b3bade3aabbfc4818a05af", [[]]}, 0x233) read(r3, &(0x7f0000000280)=""/152, 0x20000318) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x280800, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$DRM_IOCTL_MODE_SETCRTC(0xffffffffffffffff, 0xc06864a2, &(0x7f0000000000)={0x0, 0x0, 0x20}) 00:55:13 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r1, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) r2 = getegid() r3 = socket$inet_tcp(0x2, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) setresuid(r5, r5, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003ec0)={0x0, 0x0, 0x0}, 0x0) r7 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r7, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) statx(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x6000, 0x20, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r9 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r9, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) ioctl$TUNSETGROUP(r1, 0x400454ce, r8) r10 = openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$DRM_IOCTL_AGP_INFO(r10, 0x80386433, &(0x7f0000000bc0)=""/4096) getsockopt$sock_cred(r10, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0x194) setresuid(r11, r11, 0x0) r12 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r13 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r13, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) waitid(0x1, r13, &(0x7f0000000100), 0x80000004, &(0x7f0000000180)) r14 = shmget$private(0x0, 0x3000, 0x20, &(0x7f0000ffa000/0x3000)=nil) shmctl$SHM_STAT_ANY(r14, 0xf, &(0x7f0000000540)=""/221) shmctl$IPC_SET(r14, 0x1, &(0x7f0000000180)={{0x3, r5, r6, r11, r2, 0x42, 0x7}, 0x803ff, 0x2, 0xfffffffffffffffd, 0x0, r12, r13, 0x5}) r15 = getegid() socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) setresuid(r16, r16, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003ec0)={0x0, 0x0, 0x0}, 0x0) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, r17) r18 = openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$DRM_IOCTL_AGP_INFO(r18, 0x80386433, &(0x7f0000000bc0)=""/4096) getsockopt$sock_cred(r18, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0x194) setresuid(r19, r19, 0x0) r20 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r21 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r21, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) waitid(0x1, r21, &(0x7f0000000100), 0x80000004, &(0x7f0000000180)) r22 = shmget$private(0x0, 0x3000, 0x20, &(0x7f0000ffa000/0x3000)=nil) shmctl$SHM_STAT_ANY(r22, 0xf, &(0x7f0000000540)=""/221) shmctl$IPC_SET(r22, 0x1, &(0x7f0000000180)={{0x3, r16, r17, r19, r15, 0x42, 0x7}, 0x803ff, 0x2, 0xfffffffffffffffd, 0x0, r20, r21, 0x5}) fchownat(r1, &(0x7f0000000100)='./file0\x00', r5, r17, 0x100) pipe(0x0) r23 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r23, 0x10f, 0x87, &(0x7f0000265000)=@req={0x0, 0x0, 0x2}, 0x10) sendmsg$nl_route(r23, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[@ANYBLOB="3cedffff51000200086f3b874a99cd340000f57cf11ae5d39976000500", @ANYRES32=0x0, @ANYBLOB="0800030000000000080006000300000008000500e9000000000000"], 0x3c}, 0x1, 0x0, 0x0, 0x3400c080}, 0x20048041) r24 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r24, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) write$binfmt_elf64(r24, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"/619], 0x26b) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_open_procfs(0x0, &(0x7f0000000000)='timers\x00') 00:55:13 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) pipe(0x0) wait4(0x0, 0x0, 0x40000000, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000265000)=@req={0x0, 0x400}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000740)={{{@in=@multicast2, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@broadcast}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route(r1, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=@ipv4_getnetconf={0x54, 0x52, 0x10, 0x70bd25, 0x25dfdbfd, {}, [@NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x1}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x9}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x5}, @NETCONFA_FORWARDING={0x8, 0x2, 0x8}, @NETCONFA_IFINDEX={0x8, 0x1, r2}, @NETCONFA_RP_FILTER={0x8, 0x3, 0x7fff}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x3}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0xe9}]}, 0x54}, 0x1, 0x0, 0x0, 0x3400c080}, 0x40) read(0xffffffffffffffff, &(0x7f0000000280)=""/152, 0x20000318) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/keys\x00', 0x0, 0x0) r4 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r4, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) write$binfmt_elf64(r4, &(0x7f00000003c0)={{0x7f, 0x45, 0x4c, 0x46, 0x6, 0x81, 0x35, 0x4, 0x1, 0x59ad6aa4a884dd63, 0x3, 0x0, 0x13d, 0x40, 0x26e, 0x8000, 0x1f, 0x38, 0x1, 0x8, 0x8, 0x3}, [{0x6, 0x3, 0xefa, 0x1, 0x81, 0x80000000, 0x0, 0x9}], "5ad165d3d87709dd80c73c9fa8b6ef39a345e1b2327e38197c13f3be9248c0f2161632606ce45b5c7d7349c883946ca190a061f77e1020dc808b86b4e3c7b2a6128e2d3b16a4ec69ad8c276d1a038ddc59bd46a7a37061ed24ba41f62de7aaf1c073c43333bee7ed0979404acecab631d46b591f921ec0a584aeb912342ff4f104ff960a3563460c943d11952c88bd0d13a69a425793b6f7d2b09cf17c87cdc331f63c983436cef6888b1a8328e953b0b3bade3aabbfc4818a05af", [[]]}, 0x233) read(r3, &(0x7f0000000280)=""/152, 0x20000318) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x280800, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$DRM_IOCTL_MODE_SETCRTC(0xffffffffffffffff, 0xc06864a2, &(0x7f0000000000)={0x0, 0x0, 0x20}) 00:55:14 executing program 5: socket$pppoe(0x18, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0xc020660b, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {0xffffffff}, {0x1}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}) 00:55:14 executing program 3: r0 = socket$pppoe(0x18, 0x1, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x10401, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}}, 0x0, 0xfdffffffffffffff, r1, 0x0) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x2, @link_local, 'team0\x00'}}, 0x1e) r2 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r2, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {0x0, 0x3}, {0xffffffff}, {0x1}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) 00:55:14 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) pipe(0x0) wait4(0x0, 0x0, 0x40000000, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000265000)=@req={0x0, 0x400, 0x2}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000740)={{{@in=@multicast2, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@broadcast}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route(r1, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=@ipv4_getnetconf={0x54, 0x52, 0x10, 0x70bd25, 0x25dfdbfd, {}, [@NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x1}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x9}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x5}, @NETCONFA_FORWARDING={0x8, 0x2, 0x8}, @NETCONFA_IFINDEX={0x8, 0x1, r2}, @NETCONFA_RP_FILTER={0x8, 0x3, 0x7fff}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x3}, @NETCONFA_PROXY_NEIGH={0x8}]}, 0x54}, 0x1, 0x0, 0x0, 0x3400c080}, 0x40) read(0xffffffffffffffff, &(0x7f0000000280)=""/152, 0x20000318) openat$procfs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/keys\x00', 0x0, 0x0) r3 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r3, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) write$binfmt_elf64(r3, &(0x7f00000003c0)={{0x7f, 0x45, 0x4c, 0x46, 0x6, 0x81, 0x35, 0x4, 0x1, 0x59ad6aa4a884dd63, 0x3, 0x0, 0x13d, 0x40, 0x26e, 0x8000, 0x1f, 0x38, 0x1, 0x8, 0x8, 0x3}, [{0x6, 0x3, 0xefa, 0x1, 0x81, 0x80000000, 0x0, 0x9}, {0x7, 0x2, 0x7ff, 0xfff, 0x1, 0x4, 0x0, 0x800b}], "5ad165d3d87709dd80c73c9fa8b6ef39a345e1b2327e38197c13f3be9248c0f2161632606ce45b5c7d7349c883946ca190a061f77e1020dc808b86b4e3c7b2a6128e2d3b16a4ec69ad8c276d1a038ddc59bd46a7a37061ed24ba41f62de7aaf1c073c43333bee7ed0979404acecab631d46b591f921ec0a584aeb912342ff4f104ff960a3563460c943d11952c88bd0d13a69a425793b6f7d2b09cf17c87cdc331f63c983436cef6888b1a8328e953b0b3bade3aabbfc4818a05af", [[]]}, 0x26b) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_open_procfs(0x0, &(0x7f0000000000)='timers\x00') 00:55:14 executing program 5: socket$pppoe(0x18, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0xc0684608, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {0xffffffff}, {0x1}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}) 00:55:14 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) pipe(0x0) wait4(0x0, 0x0, 0x40000000, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000265000)=@req={0x0, 0x400}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000740)={{{@in=@multicast2, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@broadcast}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route(r1, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=@ipv4_getnetconf={0x54, 0x52, 0x10, 0x70bd25, 0x25dfdbfd, {}, [@NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x1}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x9}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x5}, @NETCONFA_FORWARDING={0x8, 0x2, 0x8}, @NETCONFA_IFINDEX={0x8, 0x1, r2}, @NETCONFA_RP_FILTER={0x8, 0x3, 0x7fff}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x3}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0xe9}]}, 0x54}, 0x1, 0x0, 0x0, 0x3400c080}, 0x40) read(0xffffffffffffffff, &(0x7f0000000280)=""/152, 0x20000318) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/keys\x00', 0x0, 0x0) r4 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r4, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) write$binfmt_elf64(r4, &(0x7f00000003c0)={{0x7f, 0x45, 0x4c, 0x46, 0x6, 0x81, 0x35, 0x4, 0x1, 0x59ad6aa4a884dd63, 0x3, 0x0, 0x13d, 0x40, 0x26e, 0x8000, 0x1f, 0x38, 0x1, 0x8, 0x8, 0x3}, [{0x6, 0x3, 0xefa, 0x1, 0x81, 0x80000000, 0x0, 0x9}, {0x0, 0x2, 0x7ff, 0xfff, 0x1, 0x4, 0x0, 0x800b}], "5ad165d3d87709dd80c73c9fa8b6ef39a345e1b2327e38197c13f3be9248c0f2161632606ce45b5c7d7349c883946ca190a061f77e1020dc808b86b4e3c7b2a6128e2d3b16a4ec69ad8c276d1a038ddc59bd46a7a37061ed24ba41f62de7aaf1c073c43333bee7ed0979404acecab631d46b591f921ec0a584aeb912342ff4f104ff960a3563460c943d11952c88bd0d13a69a425793b6f7d2b09cf17c87cdc331f63c983436cef6888b1a8328e953b0b3bade3aabbfc4818a05af", [[]]}, 0x26b) read(r3, &(0x7f0000000280)=""/152, 0x20000318) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x280800, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$DRM_IOCTL_MODE_SETCRTC(0xffffffffffffffff, 0xc06864a2, &(0x7f0000000000)={0x0, 0x0, 0x20}) 00:55:14 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) stat(&(0x7f0000000240)='./file0/file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(0xffffffffffffffff, &(0x7f0000001b80)) socket(0x11, 0x2, 0x5) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r4, 0x1, 0x14, &(0x7f0000000040), 0x50) getsockopt$IP6T_SO_GET_ENTRIES(r4, 0x29, 0x41, &(0x7f0000000480)=ANY=[@ANYBLOB="6e2f740000edffffffffffffff00000000000000000000000000000000000000ad0000005086f3915e59ad8184af4045c4e742fa881d66411baabaa82dda6d71f825249ec2eb0ad398766b6b870bba11fc00df87700a78319e5f5d955a5eb0f50e2dcd95623e3eba93f21d4733f6d4834e398f5ba4540b18afc3c2a92ff6e4a89dc029fdd87fc0c2ca637f5ead98feb48d1bfe6451a583e519234bd5297e8a8bf569ff90077ba1cef2ea64c8f027947915a33e26b9d8b4fb56ba4d86df286c34e0cd9715e6b39dcccf4eb92a1706ed98b4aafd220eecfac13859aaab4dc07cd467149066f2f637c1e58f02faf49d72752753fe6beceb9d14b1ab3832cab4d59f892cb6f3689b67eaf81e929525a7fe0f2ea0892194387f7d085ea12c8842b8790911042b2a48b65c40087bd66593e0cf"], &(0x7f0000000340)=0x1) fsetxattr$trusted_overlay_redirect(r3, &(0x7f0000000200)='trusted.overlay.redirect\x00', &(0x7f0000000280)='./file0/file0\x00', 0xe, 0x0) getsockname$tipc(0xffffffffffffffff, 0x0, &(0x7f0000000080)) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000001400)={{0x1, 0x0, @identifier="8e0f03f7e12b88d1af81f7c5a6bb175f"}, 0x67, [], "ed760111b8363e2de90692d0bc7e0a89824d3c77730403363ce0521cdcb1973b558cbd01ebf95bd9529fe3c5a95dcf31792e3e463d875b955a13582aeaddf6af34a98934ad6944b87292af67aec51fd37bd761db93cf6623d8683956791c956c97d76a9fd8df5d"}) lstat(&(0x7f0000000000)='./file0/file0\x00', &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000100)=0x0) r7 = getegid() r8 = socket$inet_tcp(0x2, 0x1, 0x0) r9 = fcntl$dupfd(r8, 0x0, r8) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) setresuid(r10, r10, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003ec0)={0x0, 0x0, 0x0}, 0x0) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, r11) r12 = openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$DRM_IOCTL_AGP_INFO(r12, 0x80386433, &(0x7f0000000bc0)=""/4096) getsockopt$sock_cred(r12, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0x194) setresuid(r13, r13, 0x0) r14 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r15 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r15, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) waitid(0x1, r15, &(0x7f0000000100), 0x80000004, &(0x7f0000000180)) r16 = shmget$private(0x0, 0x3000, 0x20, &(0x7f0000ffa000/0x3000)=nil) shmctl$SHM_STAT_ANY(r16, 0xf, &(0x7f0000000540)=""/221) shmctl$IPC_SET(r16, 0x1, &(0x7f0000000180)={{0x3, r10, r11, r13, r7, 0x42, 0x7}, 0x803ff, 0x2, 0xfffffffffffffffd, 0x0, r14, r15, 0x5}) shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000840)={{0x0, r2, r7, 0x0, r5, 0x50}, 0xd7, 0xfffffffffffffffe, 0x1000, 0x8000, r6}) r17 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000280)='/dev/nullb0\x00', 0x4400, 0x0) preadv(r17, &(0x7f0000000040)=[{&(0x7f0000000400)=""/4096, 0x3ffc00}], 0x1, 0x0) 00:55:14 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) r0 = getpid() r1 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000265000)=@req={0x0, 0x0, 0x2}, 0x10) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DEST(r1, &(0x7f0000000300)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x3c, r2, 0x2, 0x70bd2d, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_DAEMON={0x14, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x5, 0x8, 0xf8}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x6f23}, @IPVS_CMD_ATTR_DEST={0xc, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_ADDR_FAMILY={0x6, 0xb, 0x2}]}]}, 0x3c}, 0x1, 0x0, 0x0, 0x40010}, 0x0) sched_setscheduler(r0, 0x5, &(0x7f0000000380)) pipe(0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=@ipv4_getnetconf={0x3c, 0x52, 0x10, 0x70bd25, 0x25dfdbfd, {}, [@NETCONFA_PROXY_NEIGH={0x8}, @NETCONFA_IFINDEX={0x8}, @NETCONFA_RP_FILTER={0x8}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x3}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0xe9}]}, 0x3c}, 0x1, 0x0, 0x0, 0x3400c080}, 0x40) r3 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r3, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) write$binfmt_elf64(r3, &(0x7f00000003c0)={{0x7f, 0x45, 0x4c, 0x46, 0x6, 0x81, 0x35, 0x4, 0x1, 0x59ad6aa4a884dd63, 0x3, 0x0, 0x13d, 0x40, 0x26e, 0x8000, 0x1f, 0x38, 0x1, 0x8, 0x8, 0x3}, [{0x6, 0x3, 0xefa, 0x1, 0x81, 0x80000000, 0x0, 0x9}, {0x7, 0x2, 0x7ff, 0xfff, 0x1, 0x4, 0x0, 0x800b}], "5ad165d3d87709dd80c73c9fa8b6ef39a345e1b2327e38197c13f3be9248c0f2161632606ce45b5c7d7349c883946ca190a061f77e1020dc808b86b4e3c7b2a6128e2d3b16a4ec69ad8c276d1a038ddc59bd46a7a37061ed24ba41f62de7aaf1c073c43333bee7ed0979404acecab631d46b591f921ec0a584aeb912342ff4f104ff960a3563460c943d11952c88bd0d13a69a425793b6f7d2b09cf17c87cdc331f63c983436cef6888b1a8328e953b0b3bade3aabbfc4818a05af", [[]]}, 0x26b) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_open_procfs(0x0, &(0x7f0000000000)='timers\x00') 00:55:14 executing program 3: r0 = socket$pppoe(0x18, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x2, @link_local, 'team0\x00'}}, 0x1e) r1 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r1, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {0x0, 0x3}, {0xffffffff}, {0x1}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x24280, 0x0) pidfd_getfd(r2, r1, 0x0) 00:55:15 executing program 5: socket$pppoe(0x18, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0xc08c5332, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {0xffffffff}, {0x1}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}) 00:55:15 executing program 0: perf_event_open(&(0x7f000001d000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x8419c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) pipe(0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[@ANYBLOB="3c0000005200100100000800e5ffffff00"/29, @ANYRES32=0x0, @ANYBLOB="0800030000000000080006000300000008000500e9000000000000"], 0x3c}, 0x1, 0x0, 0x0, 0x3400c080}, 0x40) r1 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r1, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) write$binfmt_elf64(r1, &(0x7f00000003c0)={{0x7f, 0x45, 0x4c, 0x46, 0x6, 0x81, 0x35, 0x4, 0x1, 0x59ad6aa4a884dd63, 0x3, 0x0, 0x13d, 0x40, 0x26e, 0x8000, 0x1f, 0x38, 0x1, 0x8, 0x8, 0x3}, [{0x6, 0x3, 0xefa, 0x1, 0x81, 0x80000000, 0x0, 0x9}, {0x7, 0x2, 0x7ff, 0xfff, 0x1, 0x4, 0x0, 0x800b}], "5ad165d3d87709dd80c73c9fa8b6ef39a345e1b2327e38197c13f3be9248c0f2161632606ce45b5c7d7349c883946ca190a061f77e1020dc808b86b4e3c7b2a6128e2d3b16a4ec69ad8c276d1a038ddc59bd46a7a37061ed24ba41f62de7aaf1c073c43333bee7ed0979404acecab631d46b591f921ec0a584aeb912342ff4f104ff960a3563460c943d11952c88bd0d13a69a425793b6f7d2b09cf17c87cdc331f63c983436cef6888b1a8328e953b0b3bade3aabbfc4818a05af", [[]]}, 0x26b) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_open_procfs(0x0, &(0x7f0000000000)='timers\x00') 00:55:15 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) pipe(0x0) wait4(0x0, 0x0, 0x40000000, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000265000)=@req={0x0, 0x400, 0x2}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000740)={{{@in=@multicast2, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@broadcast}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route(r1, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=@ipv4_getnetconf={0x4c, 0x52, 0x10, 0x70bd25, 0x25dfdbfd, {}, [@NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x1}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x9}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x5}, @NETCONFA_FORWARDING={0x8, 0x2, 0x8}, @NETCONFA_IFINDEX={0x8, 0x1, r2}, @NETCONFA_RP_FILTER={0x8, 0x3, 0x7fff}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0xe9}]}, 0x4c}, 0x1, 0x0, 0x0, 0x3400c080}, 0x40) read(0xffffffffffffffff, &(0x7f0000000280)=""/152, 0x20000318) openat$procfs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/keys\x00', 0x0, 0x0) r3 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r3, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) write$binfmt_elf64(r3, &(0x7f00000003c0)={{0x7f, 0x45, 0x4c, 0x46, 0x6, 0x81, 0x35, 0x4, 0x1, 0x59ad6aa4a884dd63, 0x3, 0x0, 0x13d, 0x40, 0x26e, 0x8000, 0x1f, 0x38, 0x1, 0x8, 0x8, 0x3}, [{0x6, 0x3, 0xefa, 0x1, 0x81, 0x80000000, 0x0, 0x9}, {0x7, 0x2, 0x7ff, 0xfff, 0x1, 0x4, 0x0, 0x800b}], "5ad165d3d87709dd80c73c9fa8b6ef39a345e1b2327e38197c13f3be9248c0f2161632606ce45b5c7d7349c883946ca190a061f77e1020dc808b86b4e3c7b2a6128e2d3b16a4ec69ad8c276d1a038ddc59bd46a7a37061ed24ba41f62de7aaf1c073c43333bee7ed0979404acecab631d46b591f921ec0a584aeb912342ff4f104ff960a3563460c943d11952c88bd0d13a69a425793b6f7d2b09cf17c87cdc331f63c983436cef6888b1a8328e953b0b3bade3aabbfc4818a05af", [[]]}, 0x26b) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_open_procfs(0x0, &(0x7f0000000000)='timers\x00') 00:55:15 executing program 3: r0 = socket$pppoe(0x18, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x2, @link_local, 'team0\x00'}}, 0x1e) r1 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r2, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) r3 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r3, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) syz_kvm_setup_cpu$x86(r2, r3, &(0x7f0000fe6000/0x18000)=nil, &(0x7f0000000100)=[@text16={0x10, &(0x7f00000000c0)="0f3265f30fc732baa100b80010ef0f01c20f01cb0fc76d000fc79a0a008fe900013e2b930f76f3f0f61a", 0x2a}], 0x1, 0x20, &(0x7f0000000140)=[@efer={0x2, 0x3001}], 0x1) ioctl$FBIOPUT_VSCREENINFO(r1, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {0x0, 0x3}, {0xffffffff}, {0x1}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) 00:55:15 executing program 5: socket$pppoe(0x18, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {0xffffffff}, {0x1}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}) 00:55:15 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) pipe(0x0) wait4(0x0, 0x0, 0x40000000, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000265000)=@req={0x0, 0x400}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000740)={{{@in=@multicast2, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@broadcast}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route(r1, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=@ipv4_getnetconf={0x54, 0x52, 0x10, 0x70bd25, 0x25dfdbfd, {}, [@NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x1}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x9}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x5}, @NETCONFA_FORWARDING={0x8, 0x2, 0x8}, @NETCONFA_IFINDEX={0x8, 0x1, r2}, @NETCONFA_RP_FILTER={0x8, 0x3, 0x7fff}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x3}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0xe9}]}, 0x54}, 0x1, 0x0, 0x0, 0x3400c080}, 0x40) read(0xffffffffffffffff, &(0x7f0000000280)=""/152, 0x20000318) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/keys\x00', 0x0, 0x0) r4 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r4, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) write$binfmt_elf64(r4, &(0x7f00000003c0)={{0x7f, 0x45, 0x4c, 0x46, 0x6, 0x81, 0x35, 0x4, 0x1, 0x59ad6aa4a884dd63, 0x3, 0x0, 0x13d, 0x40, 0x26e, 0x8000, 0x1f, 0x38, 0x1, 0x8, 0x8, 0x3}, [{0x6, 0x3, 0xefa, 0x1, 0x81, 0x80000000, 0x0, 0x9}, {0x0, 0x2, 0x7ff, 0xfff, 0x1, 0x4, 0x0, 0x800b}], "5ad165d3d87709dd80c73c9fa8b6ef39a345e1b2327e38197c13f3be9248c0f2161632606ce45b5c7d7349c883946ca190a061f77e1020dc808b86b4e3c7b2a6128e2d3b16a4ec69ad8c276d1a038ddc59bd46a7a37061ed24ba41f62de7aaf1c073c43333bee7ed0979404acecab631d46b591f921ec0a584aeb912342ff4f104ff960a3563460c943d11952c88bd0d13a69a425793b6f7d2b09cf17c87cdc331f63c983436cef6888b1a8328e953b0b3bade3aabbfc4818a05af", [[]]}, 0x26b) read(r3, &(0x7f0000000280)=""/152, 0x20000318) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x280800, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$DRM_IOCTL_MODE_SETCRTC(0xffffffffffffffff, 0xc06864a2, &(0x7f0000000000)={0x0, 0x0, 0x20}) 00:55:16 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) pipe(0x0) wait4(0x0, 0x0, 0x40000000, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000265000)=@req={0x0, 0x400, 0x2}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000740)={{{@in=@multicast2, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@broadcast}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route(r1, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=@ipv4_getnetconf={0x4c, 0x52, 0x10, 0x70bd25, 0x25dfdbfd, {}, [@NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x1}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x9}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x5}, @NETCONFA_FORWARDING={0x8, 0x2, 0x8}, @NETCONFA_IFINDEX={0x8, 0x1, r2}, @NETCONFA_RP_FILTER={0x8, 0x3, 0x7fff}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0xe9}]}, 0x4c}, 0x1, 0x0, 0x0, 0x3400c080}, 0x40) read(0xffffffffffffffff, &(0x7f0000000280)=""/152, 0x20000318) openat$procfs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/keys\x00', 0x0, 0x0) r3 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r3, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) write$binfmt_elf64(r3, &(0x7f00000003c0)={{0x7f, 0x45, 0x4c, 0x46, 0x6, 0x81, 0x35, 0x4, 0x1, 0x59ad6aa4a884dd63, 0x3, 0x0, 0x13d, 0x40, 0x26e, 0x8000, 0x1f, 0x38, 0x1, 0x8, 0x8, 0x3}, [{0x6, 0x3, 0xefa, 0x1, 0x81, 0x80000000, 0x0, 0x9}, {0x7, 0x2, 0x7ff, 0xfff, 0x1, 0x4, 0x0, 0x800b}], "5ad165d3d87709dd80c73c9fa8b6ef39a345e1b2327e38197c13f3be9248c0f2161632606ce45b5c7d7349c883946ca190a061f77e1020dc808b86b4e3c7b2a6128e2d3b16a4ec69ad8c276d1a038ddc59bd46a7a37061ed24ba41f62de7aaf1c073c43333bee7ed0979404acecab631d46b591f921ec0a584aeb912342ff4f104ff960a3563460c943d11952c88bd0d13a69a425793b6f7d2b09cf17c87cdc331f63c983436cef6888b1a8328e953b0b3bade3aabbfc4818a05af", [[]]}, 0x26b) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_open_procfs(0x0, &(0x7f0000000000)='timers\x00') 00:55:16 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) pipe(0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[@ANYBLOB="3c0000005200100025bd7000fddbdf2502080005000000000008000100", @ANYRES32=0x0, @ANYBLOB="0800fbd044e1ccbe4e000600000000000000000000000040000000"], 0x3c}, 0x1, 0x0, 0x0, 0x3400c080}, 0x40) r1 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r1, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) r2 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f0000265000)=@req={0x0, 0x0, 0x2}, 0x10) sendmsg$nl_route(r2, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)=@ipv6_getanyicast={0x14, 0x3e, 0x400, 0x70bd2b, 0x25dfdbff, {}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x5}, 0x40000) write$binfmt_elf64(r1, &(0x7f00000003c0)={{0x7f, 0x45, 0x4c, 0x46, 0x6, 0x81, 0x35, 0x4, 0x1, 0x59ad6aa4a884dd63, 0x3, 0x0, 0x13d, 0x40, 0x26e, 0x8000, 0x1f, 0x38, 0x1, 0x8, 0x8, 0x3}, [{0x6, 0x3, 0xefa, 0x1, 0x81, 0x80000000, 0x0, 0x9}, {0x7, 0x2, 0x7ff, 0xfff, 0x1, 0x4, 0x0, 0x800b}], "5ad165d3d87709dd80c73c9fa8b6ef39a345e1b2327e38197c13f3be9248c0f2161632606ce45b5c7d7349c883946ca190a061f77e1020dc808b86b4e3c7b2a6128e2d3b16a4ec69ad8c276d1a038ddc59bd46a7a37061ed24ba41f62de7aaf1c073c43333bee7ed0979404acecab631d46b591f921ec0a584aeb912342ff4f104ff960a3563460c943d11952c88bd0d13a69a425793b6f7d2b09cf17c87cdc331f63c983436cef6888b1a8328e953b0b3bade3aabbfc4818a05af", [[]]}, 0x26b) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_open_procfs(0x0, &(0x7f0000000000)='timers\x00') 00:55:16 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) stat(&(0x7f0000000240)='./file0/file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(0xffffffffffffffff, &(0x7f0000001b80)) socket(0x11, 0x2, 0x5) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r4, 0x1, 0x14, &(0x7f0000000040), 0x50) getsockopt$IP6T_SO_GET_ENTRIES(r4, 0x29, 0x41, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)=0x1) fsetxattr$trusted_overlay_redirect(r3, &(0x7f0000000200)='trusted.overlay.redirect\x00', &(0x7f0000000280)='./file0/file0\x00', 0xe, 0x0) getsockname$tipc(0xffffffffffffffff, 0x0, &(0x7f0000000080)) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000001400)={{0x1, 0x0, @identifier="8e0f03f7e12b88d1af81f7c5a6bb175f"}, 0x67, [], "ed760111b8363e2de90692d0bc7e0a89824d3c77730403363ce0521cdcb1973b558cbd01ebf95bd9529fe3c5a95dcf31792e3e463d875b955a13582aeaddf6af34a98934ad6944b87292af67aec51fd37bd761db93cf6623d8683956791c956c97d76a9fd8df5d"}) lstat(&(0x7f0000000000)='./file0/file0\x00', &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000100)=0x0) r7 = getegid() r8 = socket$inet_tcp(0x2, 0x1, 0x0) r9 = fcntl$dupfd(r8, 0x0, r8) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) setresuid(r10, r10, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003ec0)={0x0, 0x0, 0x0}, 0x0) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, r11) r12 = openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$DRM_IOCTL_AGP_INFO(r12, 0x80386433, &(0x7f0000000bc0)=""/4096) getsockopt$sock_cred(r12, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0x194) setresuid(r13, r13, 0x0) r14 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r15 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r15, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) waitid(0x1, r15, &(0x7f0000000100), 0x80000004, &(0x7f0000000180)) r16 = shmget$private(0x0, 0x3000, 0x20, &(0x7f0000ffa000/0x3000)=nil) shmctl$SHM_STAT_ANY(r16, 0xf, &(0x7f0000000540)=""/221) shmctl$IPC_SET(r16, 0x1, &(0x7f0000000180)={{0x3, r10, r11, r13, r7, 0x42, 0x7}, 0x803ff, 0x2, 0xfffffffffffffffd, 0x0, r14, r15, 0x5}) shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000840)={{0x0, r2, r7, 0x0, r5, 0x50}, 0xd7, 0xfffffffffffffffe, 0x1000, 0x8000, r6}) r17 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000280)='/dev/nullb0\x00', 0x4400, 0x0) preadv(r17, &(0x7f0000000040)=[{&(0x7f0000000400)=""/4096, 0x3ffc00}], 0x1, 0x0) 00:55:16 executing program 5: socket$pppoe(0x18, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x2, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {0xffffffff}, {0x1}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}) 00:55:16 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) pipe(0x0) wait4(0x0, 0x0, 0x40000000, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000265000)=@req={0x0, 0x400}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000740)={{{@in=@multicast2, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@broadcast}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route(r1, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=@ipv4_getnetconf={0x54, 0x52, 0x10, 0x70bd25, 0x25dfdbfd, {}, [@NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x1}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x9}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x5}, @NETCONFA_FORWARDING={0x8, 0x2, 0x8}, @NETCONFA_IFINDEX={0x8, 0x1, r2}, @NETCONFA_RP_FILTER={0x8, 0x3, 0x7fff}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x3}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0xe9}]}, 0x54}, 0x1, 0x0, 0x0, 0x3400c080}, 0x40) read(0xffffffffffffffff, &(0x7f0000000280)=""/152, 0x20000318) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/keys\x00', 0x0, 0x0) r4 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r4, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) write$binfmt_elf64(r4, &(0x7f00000003c0)={{0x7f, 0x45, 0x4c, 0x46, 0x6, 0x81, 0x35, 0x4, 0x1, 0x59ad6aa4a884dd63, 0x3, 0x0, 0x13d, 0x40, 0x26e, 0x8000, 0x1f, 0x38, 0x1, 0x8, 0x8, 0x3}, [{0x6, 0x3, 0xefa, 0x1, 0x81, 0x80000000, 0x0, 0x9}, {0x0, 0x2, 0x7ff, 0xfff, 0x1, 0x4, 0x0, 0x800b}], "5ad165d3d87709dd80c73c9fa8b6ef39a345e1b2327e38197c13f3be9248c0f2161632606ce45b5c7d7349c883946ca190a061f77e1020dc808b86b4e3c7b2a6128e2d3b16a4ec69ad8c276d1a038ddc59bd46a7a37061ed24ba41f62de7aaf1c073c43333bee7ed0979404acecab631d46b591f921ec0a584aeb912342ff4f104ff960a3563460c943d11952c88bd0d13a69a425793b6f7d2b09cf17c87cdc331f63c983436cef6888b1a8328e953b0b3bade3aabbfc4818a05af", [[]]}, 0x26b) read(r3, &(0x7f0000000280)=""/152, 0x20000318) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x280800, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$DRM_IOCTL_MODE_SETCRTC(0xffffffffffffffff, 0xc06864a2, &(0x7f0000000000)={0x0, 0x0, 0x20}) 00:55:16 executing program 3: r0 = socket$pppoe(0x18, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x2, @link_local, 'team0\x00'}}, 0x1e) remap_file_pages(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x2000003, 0x101, 0x8000) r1 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r1, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {0x0, 0x3}, {0xffffffff}, {0x1}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) 00:55:17 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) pipe(0x0) wait4(0x0, 0x0, 0x40000000, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000265000)=@req={0x0, 0x400}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000740)={{{@in=@multicast2, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@broadcast}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route(r1, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=@ipv4_getnetconf={0x54, 0x52, 0x10, 0x70bd25, 0x25dfdbfd, {}, [@NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x1}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x9}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x5}, @NETCONFA_FORWARDING={0x8, 0x2, 0x8}, @NETCONFA_IFINDEX={0x8, 0x1, r2}, @NETCONFA_RP_FILTER={0x8, 0x3, 0x7fff}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x3}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0xe9}]}, 0x54}, 0x1, 0x0, 0x0, 0x3400c080}, 0x40) read(0xffffffffffffffff, &(0x7f0000000280)=""/152, 0x20000318) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/keys\x00', 0x0, 0x0) r4 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r4, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) write$binfmt_elf64(r4, &(0x7f00000003c0)={{0x7f, 0x45, 0x4c, 0x46, 0x6, 0x81, 0x35, 0x4, 0x1, 0x59ad6aa4a884dd63, 0x3, 0x0, 0x13d, 0x40, 0x26e, 0x8000, 0x1f, 0x38, 0x1, 0x8, 0x8, 0x3}, [{0x6, 0x3, 0xefa, 0x1, 0x81, 0x80000000, 0x0, 0x9}, {0x7, 0x0, 0x7ff, 0xfff, 0x1, 0x4, 0x0, 0x800b}], "5ad165d3d87709dd80c73c9fa8b6ef39a345e1b2327e38197c13f3be9248c0f2161632606ce45b5c7d7349c883946ca190a061f77e1020dc808b86b4e3c7b2a6128e2d3b16a4ec69ad8c276d1a038ddc59bd46a7a37061ed24ba41f62de7aaf1c073c43333bee7ed0979404acecab631d46b591f921ec0a584aeb912342ff4f104ff960a3563460c943d11952c88bd0d13a69a425793b6f7d2b09cf17c87cdc331f63c983436cef6888b1a8328e953b0b3bade3aabbfc4818a05af", [[]]}, 0x26b) read(r3, &(0x7f0000000280)=""/152, 0x20000318) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x280800, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$DRM_IOCTL_MODE_SETCRTC(0xffffffffffffffff, 0xc06864a2, &(0x7f0000000000)={0x0, 0x0, 0x20}) 00:55:17 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) pipe(0x0) wait4(0x0, 0x0, 0x40000000, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000265000)=@req={0x0, 0x400, 0x2}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000740)={{{@in=@multicast2, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@broadcast}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route(r1, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=@ipv4_getnetconf={0x4c, 0x52, 0x10, 0x70bd25, 0x25dfdbfd, {}, [@NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x1}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x9}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x5}, @NETCONFA_FORWARDING={0x8, 0x2, 0x8}, @NETCONFA_IFINDEX={0x8, 0x1, r2}, @NETCONFA_RP_FILTER={0x8, 0x3, 0x7fff}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0xe9}]}, 0x4c}, 0x1, 0x0, 0x0, 0x3400c080}, 0x40) read(0xffffffffffffffff, &(0x7f0000000280)=""/152, 0x20000318) openat$procfs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/keys\x00', 0x0, 0x0) r3 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r3, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) write$binfmt_elf64(r3, &(0x7f00000003c0)={{0x7f, 0x45, 0x4c, 0x46, 0x6, 0x81, 0x35, 0x4, 0x1, 0x59ad6aa4a884dd63, 0x3, 0x0, 0x13d, 0x40, 0x26e, 0x8000, 0x1f, 0x38, 0x1, 0x8, 0x8, 0x3}, [{0x6, 0x3, 0xefa, 0x1, 0x81, 0x80000000, 0x0, 0x9}, {0x7, 0x2, 0x7ff, 0xfff, 0x1, 0x4, 0x0, 0x800b}], "5ad165d3d87709dd80c73c9fa8b6ef39a345e1b2327e38197c13f3be9248c0f2161632606ce45b5c7d7349c883946ca190a061f77e1020dc808b86b4e3c7b2a6128e2d3b16a4ec69ad8c276d1a038ddc59bd46a7a37061ed24ba41f62de7aaf1c073c43333bee7ed0979404acecab631d46b591f921ec0a584aeb912342ff4f104ff960a3563460c943d11952c88bd0d13a69a425793b6f7d2b09cf17c87cdc331f63c983436cef6888b1a8328e953b0b3bade3aabbfc4818a05af", [[]]}, 0x26b) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_open_procfs(0x0, &(0x7f0000000000)='timers\x00') 00:55:17 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) r0 = gettid() bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={0x0, 0x2}, &(0x7f00000005c0), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000018c0)={r0, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000001880)='bond_slave_0\x00', r1}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r1}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000002380)='\x00', r1}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000007c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x17, &(0x7f0000000780)='cgroup.subtree_control\x00', r1}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r1}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r1}, 0xc) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) pipe(0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=@ipv4_getnetconf={0x3c, 0x52, 0x10, 0x70bd25, 0x25dfdbfd, {}, [@NETCONFA_PROXY_NEIGH={0x8}, @NETCONFA_IFINDEX={0x8}, @NETCONFA_RP_FILTER={0x8}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x3}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0xe9}]}, 0x3c}, 0x1, 0x0, 0x0, 0x3400c080}, 0x40) r3 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r3, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) write$binfmt_elf64(r3, &(0x7f00000003c0)={{0x7f, 0x45, 0x4c, 0x46, 0x6, 0x81, 0x35, 0x4, 0x1, 0x59ad6aa4a884dd63, 0x3, 0x0, 0x13d, 0x40, 0x26e, 0x8000, 0x1f, 0x38, 0x1, 0x8, 0x8, 0x3}, [{0x6, 0x3, 0xefa, 0x1, 0x81, 0x80000000, 0x0, 0x9}, {0x7, 0x2, 0x7ff, 0xfff, 0x1, 0x4, 0x0, 0x800b}], "5ad165d3d87709dd80c73c9fa8b6ef39a345e1b2327e38197c13f3be9248c0f2161632606ce45b5c7d7349c883946ca190a061f77e1020dc808b86b4e3c7b2a6128e2d3b16a4ec69ad8c276d1a038ddc59bd46a7a37061ed24ba41f62de7aaf1c073c43333bee7ed0979404acecab631d46b591f921ec0a584aeb912342ff4f104ff960a3563460c943d11952c88bd0d13a69a425793b6f7d2b09cf17c87cdc331f63c983436cef6888b1a8328e953b0b3bade3aabbfc4818a05af", [[]]}, 0x26b) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_open_procfs(0x0, &(0x7f0000000000)='timers\x00') 00:55:17 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) stat(&(0x7f0000000240)='./file0/file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(0xffffffffffffffff, &(0x7f0000001b80)) socket(0x11, 0x2, 0x5) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r4, 0x1, 0x14, &(0x7f0000000040), 0x50) getsockopt$IP6T_SO_GET_ENTRIES(r4, 0x29, 0x41, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)=0x1) fsetxattr$trusted_overlay_redirect(r3, &(0x7f0000000200)='trusted.overlay.redirect\x00', &(0x7f0000000280)='./file0/file0\x00', 0xe, 0x0) getsockname$tipc(0xffffffffffffffff, 0x0, &(0x7f0000000080)) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000001400)={{0x1, 0x0, @identifier="8e0f03f7e12b88d1af81f7c5a6bb175f"}, 0x67, [], "ed760111b8363e2de90692d0bc7e0a89824d3c77730403363ce0521cdcb1973b558cbd01ebf95bd9529fe3c5a95dcf31792e3e463d875b955a13582aeaddf6af34a98934ad6944b87292af67aec51fd37bd761db93cf6623d8683956791c956c97d76a9fd8df5d"}) lstat(&(0x7f0000000000)='./file0/file0\x00', &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000100)=0x0) r7 = getegid() r8 = socket$inet_tcp(0x2, 0x1, 0x0) r9 = fcntl$dupfd(r8, 0x0, r8) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) setresuid(r10, r10, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003ec0)={0x0, 0x0, 0x0}, 0x0) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, r11) r12 = openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$DRM_IOCTL_AGP_INFO(r12, 0x80386433, &(0x7f0000000bc0)=""/4096) getsockopt$sock_cred(r12, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0x194) setresuid(r13, r13, 0x0) r14 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r15 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r15, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) waitid(0x1, r15, &(0x7f0000000100), 0x80000004, &(0x7f0000000180)) r16 = shmget$private(0x0, 0x3000, 0x20, &(0x7f0000ffa000/0x3000)=nil) shmctl$SHM_STAT_ANY(r16, 0xf, &(0x7f0000000540)=""/221) shmctl$IPC_SET(r16, 0x1, &(0x7f0000000180)={{0x3, r10, r11, r13, r7, 0x42, 0x7}, 0x803ff, 0x2, 0xfffffffffffffffd, 0x0, r14, r15, 0x5}) shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000840)={{0x0, r2, r7, 0x0, r5, 0x50}, 0xd7, 0xfffffffffffffffe, 0x1000, 0x8000, r6}) r17 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000280)='/dev/nullb0\x00', 0x4400, 0x0) preadv(r17, &(0x7f0000000040)=[{&(0x7f0000000400)=""/4096, 0x3ffc00}], 0x1, 0x0) 00:55:17 executing program 3: r0 = socket$pppoe(0x18, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x2, @link_local, 'team0\x00'}}, 0x1e) r1 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r1, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {0x0, 0x3}, {0xffffffff}, {0x1}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) r2 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f0000265000)=@req={0x0, 0x0, 0x2}, 0x10) r3 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r3, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f00000000c0)={r0, r3}) 00:55:18 executing program 5: socket$pppoe(0x18, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x3, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {0xffffffff}, {0x1}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}) 00:55:18 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) pipe(0x0) wait4(0x0, 0x0, 0x40000000, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000265000)=@req={0x0, 0x400, 0x2}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000740)={{{@in=@multicast2, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@broadcast}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route(r1, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=@ipv4_getnetconf={0x54, 0x52, 0x10, 0x70bd25, 0x25dfdbfd, {}, [@NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x1}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x9}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x5}, @NETCONFA_FORWARDING={0x8, 0x2, 0x8}, @NETCONFA_IFINDEX={0x8, 0x1, r2}, @NETCONFA_RP_FILTER={0x8, 0x3, 0x7fff}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0xe9}]}, 0x54}, 0x1, 0x0, 0x0, 0x3400c080}, 0x40) read(0xffffffffffffffff, &(0x7f0000000280)=""/152, 0x20000318) openat$procfs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/keys\x00', 0x0, 0x0) r3 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r3, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) write$binfmt_elf64(r3, &(0x7f00000003c0)={{0x7f, 0x45, 0x4c, 0x46, 0x6, 0x81, 0x35, 0x4, 0x1, 0x59ad6aa4a884dd63, 0x3, 0x0, 0x13d, 0x40, 0x26e, 0x8000, 0x1f, 0x38, 0x1, 0x8, 0x8, 0x3}, [{0x6, 0x3, 0xefa, 0x1, 0x81, 0x80000000, 0x0, 0x9}, {0x7, 0x2, 0x7ff, 0xfff, 0x1, 0x4, 0x0, 0x800b}], "5ad165d3d87709dd80c73c9fa8b6ef39a345e1b2327e38197c13f3be9248c0f2161632606ce45b5c7d7349c883946ca190a061f77e1020dc808b86b4e3c7b2a6128e2d3b16a4ec69ad8c276d1a038ddc59bd46a7a37061ed24ba41f62de7aaf1c073c43333bee7ed0979404acecab631d46b591f921ec0a584aeb912342ff4f104ff960a3563460c943d11952c88bd0d13a69a425793b6f7d2b09cf17c87cdc331f63c983436cef6888b1a8328e953b0b3bade3aabbfc4818a05af", [[]]}, 0x26b) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_open_procfs(0x0, &(0x7f0000000000)='timers\x00') 00:55:18 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) pipe(0x0) wait4(0x0, 0x0, 0x40000000, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000265000)=@req={0x0, 0x400}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000740)={{{@in=@multicast2, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@broadcast}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route(r1, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=@ipv4_getnetconf={0x54, 0x52, 0x10, 0x70bd25, 0x25dfdbfd, {}, [@NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x1}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x9}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x5}, @NETCONFA_FORWARDING={0x8, 0x2, 0x8}, @NETCONFA_IFINDEX={0x8, 0x1, r2}, @NETCONFA_RP_FILTER={0x8, 0x3, 0x7fff}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x3}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0xe9}]}, 0x54}, 0x1, 0x0, 0x0, 0x3400c080}, 0x40) read(0xffffffffffffffff, &(0x7f0000000280)=""/152, 0x20000318) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/keys\x00', 0x0, 0x0) r4 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r4, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) write$binfmt_elf64(r4, &(0x7f00000003c0)={{0x7f, 0x45, 0x4c, 0x46, 0x6, 0x81, 0x35, 0x4, 0x1, 0x59ad6aa4a884dd63, 0x3, 0x0, 0x13d, 0x40, 0x26e, 0x8000, 0x1f, 0x38, 0x1, 0x8, 0x8, 0x3}, [{0x6, 0x3, 0xefa, 0x1, 0x81, 0x80000000, 0x0, 0x9}, {0x7, 0x0, 0x7ff, 0xfff, 0x1, 0x4, 0x0, 0x800b}], "5ad165d3d87709dd80c73c9fa8b6ef39a345e1b2327e38197c13f3be9248c0f2161632606ce45b5c7d7349c883946ca190a061f77e1020dc808b86b4e3c7b2a6128e2d3b16a4ec69ad8c276d1a038ddc59bd46a7a37061ed24ba41f62de7aaf1c073c43333bee7ed0979404acecab631d46b591f921ec0a584aeb912342ff4f104ff960a3563460c943d11952c88bd0d13a69a425793b6f7d2b09cf17c87cdc331f63c983436cef6888b1a8328e953b0b3bade3aabbfc4818a05af", [[]]}, 0x26b) read(r3, &(0x7f0000000280)=""/152, 0x20000318) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x280800, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$DRM_IOCTL_MODE_SETCRTC(0xffffffffffffffff, 0xc06864a2, &(0x7f0000000000)={0x0, 0x0, 0x20}) 00:55:18 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) getpid() r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) sched_setscheduler(r0, 0x0, &(0x7f0000000380)) pipe(0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[@ANYBLOB="3c00000052001000250208000500000000000800010000000000000000", @ANYRES32=0x0, @ANYBLOB="0800030000000000080006000300000008000500e9000000000000"], 0x3c}, 0x1, 0x0, 0x0, 0x3400c080}, 0x40) ioctl$FBIOPUT_VSCREENINFO(0xffffffffffffffff, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000003c0)={{0x7f, 0x45, 0x4c, 0x46, 0x6, 0x81, 0x35, 0x4, 0x1, 0x59ad6aa4a884dd63, 0x3, 0x0, 0x13d, 0x40, 0x26e, 0x8000, 0x1f, 0x38, 0x1, 0x8, 0x8, 0x3}, [{0x6, 0x3, 0xefa, 0x1, 0x81, 0x80000000, 0x0, 0x9}, {0x7, 0x2, 0x7ff, 0xfff, 0x1, 0x4, 0x0, 0x800b}], "5ad165d3d87709dd80c73c9fa8b6ef39a345e1b2327e38197c13f3be9248c0f2161632606ce45b5c7d7349c883946ca190a061f77e1020dc808b86b4e3c7b2a6128e2d3b16a4ec69ad8c276d1a038ddc59bd46a7a37061ed24ba41f62de7aaf1c073c43333bee7ed0979404acecab631d46b591f921ec0a584aeb912342ff4f104ff960a3563460c943d11952c88bd0d13a69a425793b6f7d2b09cf17c87cdc331f63c983436cef6888b1a8328e953b0b3bade3aabbfc4818a05af", [[]]}, 0x26b) clone(0x14000400, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r1, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) r2 = getegid() r3 = socket$inet_tcp(0x2, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) setresuid(r5, r5, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003ec0)={0x0, 0x0, 0x0}, 0x0) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, r6) r7 = openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$DRM_IOCTL_AGP_INFO(r7, 0x80386433, &(0x7f0000000bc0)=""/4096) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0x194) setresuid(r8, r8, 0x0) r9 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r10 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r10, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) waitid(0x1, r10, &(0x7f0000000100), 0x80000004, &(0x7f0000000180)) r11 = shmget$private(0x0, 0x3000, 0x20, &(0x7f0000ffa000/0x3000)=nil) shmctl$SHM_STAT_ANY(r11, 0xf, &(0x7f0000000540)=""/221) shmctl$IPC_SET(r11, 0x1, &(0x7f0000000180)={{0x3, r5, r6, r8, r2, 0x42, 0x7}, 0x803ff, 0x2, 0xfffffffffffffffd, 0x0, r9, r10, 0x5}) ioctl$DRM_IOCTL_GET_CLIENT(r1, 0xc0286405, &(0x7f0000000100)={0x7, 0x9, {r0}, {r5}, 0x9f, 0xfb0}) ioprio_set$uid(0x0, r12, 0x8) getpid() syz_open_procfs(0x0, &(0x7f0000000000)='timers\x00') 00:55:19 executing program 5: socket$pppoe(0x18, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x4, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {0xffffffff}, {0x1}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}) 00:55:19 executing program 3: r0 = socket$pppoe(0x18, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000265000)=@req={0x0, 0x0, 0x2}, 0x10) getsockopt$inet_mreq(r1, 0x0, 0x23, &(0x7f00000000c0)={@empty, @local}, &(0x7f0000000100)=0x8) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x2, @link_local, 'team0\x00'}}, 0x1e) r2 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) acct(&(0x7f0000000140)='./file0\x00') ioctl$FBIOPUT_VSCREENINFO(r2, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {0x0, 0x3}, {0xffffffff}, {0x1}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) 00:55:19 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcsu\x00', 0x1ce02, 0x0) ioctl$VIDIOC_S_CTRL(r1, 0xc008561c, &(0x7f0000000200)={0x3}) pipe(0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=@ipv4_getnetconf={0x3c, 0x52, 0x10, 0x70bd25, 0x25dfdbfd, {}, [@NETCONFA_PROXY_NEIGH={0x8}, @NETCONFA_IFINDEX={0x8}, @NETCONFA_RP_FILTER={0x8}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x3}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0xe9}]}, 0x3c}, 0x1, 0x0, 0x0, 0x3400c080}, 0x40) r2 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r2, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) r3 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r3, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) ioctl$NBD_SET_SIZE_BLOCKS(r3, 0xab07, 0x9) write$binfmt_elf64(r2, &(0x7f00000003c0)={{0x7f, 0x45, 0x4c, 0x46, 0x6, 0x81, 0x35, 0x4, 0x1, 0x59ad6aa4a884dd63, 0x3, 0x0, 0x13d, 0x40, 0x26e, 0x8000, 0x1f, 0x38, 0x1, 0x8, 0x8, 0x3}, [{0x6, 0x3, 0xefa, 0x1, 0x81, 0x80000000, 0x0, 0x9}, {0x7, 0x2, 0x7ff, 0xfff, 0x1, 0x4, 0x0, 0x800b}], "5ad165d3d87709dd80c73c9fa8b6ef39a345e1b2327e38197c13f3be9248c0f2161632606ce45b5c7d7349c883946ca190a061f77e1020dc808b86b4e3c7b2a6128e2d3b16a4ec69ad8c276d1a038ddc59bd46a7a37061ed24ba41f62de7aaf1c073c43333bee7ed0979404acecab631d46b591f921ec0a584aeb912342ff4f104ff960a3563460c943d11952c88bd0d13a69a425793b6f7d2b09cf17c87cdc331f63c983436cef6888b1a8328e953b0b3bade3aabbfc4818a05af", [[]]}, 0x26b) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_open_procfs(0x0, &(0x7f0000000000)='timers\x00') 00:55:19 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) pipe(0x0) wait4(0x0, 0x0, 0x40000000, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000265000)=@req={0x0, 0x400, 0x2}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000740)={{{@in=@multicast2, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@broadcast}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route(r1, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=@ipv4_getnetconf={0x54, 0x52, 0x10, 0x70bd25, 0x25dfdbfd, {}, [@NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x1}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x9}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x5}, @NETCONFA_FORWARDING={0x8, 0x2, 0x8}, @NETCONFA_IFINDEX={0x8, 0x1, r2}, @NETCONFA_RP_FILTER={0x8, 0x3, 0x7fff}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0xe9}]}, 0x54}, 0x1, 0x0, 0x0, 0x3400c080}, 0x40) read(0xffffffffffffffff, &(0x7f0000000280)=""/152, 0x20000318) openat$procfs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/keys\x00', 0x0, 0x0) r3 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r3, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) write$binfmt_elf64(r3, &(0x7f00000003c0)={{0x7f, 0x45, 0x4c, 0x46, 0x6, 0x81, 0x35, 0x4, 0x1, 0x59ad6aa4a884dd63, 0x3, 0x0, 0x13d, 0x40, 0x26e, 0x8000, 0x1f, 0x38, 0x1, 0x8, 0x8, 0x3}, [{0x6, 0x3, 0xefa, 0x1, 0x81, 0x80000000, 0x0, 0x9}, {0x7, 0x2, 0x7ff, 0xfff, 0x1, 0x4, 0x0, 0x800b}], "5ad165d3d87709dd80c73c9fa8b6ef39a345e1b2327e38197c13f3be9248c0f2161632606ce45b5c7d7349c883946ca190a061f77e1020dc808b86b4e3c7b2a6128e2d3b16a4ec69ad8c276d1a038ddc59bd46a7a37061ed24ba41f62de7aaf1c073c43333bee7ed0979404acecab631d46b591f921ec0a584aeb912342ff4f104ff960a3563460c943d11952c88bd0d13a69a425793b6f7d2b09cf17c87cdc331f63c983436cef6888b1a8328e953b0b3bade3aabbfc4818a05af", [[]]}, 0x26b) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_open_procfs(0x0, &(0x7f0000000000)='timers\x00') 00:55:19 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) pipe(0x0) wait4(0x0, 0x0, 0x40000000, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000265000)=@req={0x0, 0x400}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000740)={{{@in=@multicast2, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@broadcast}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route(r1, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=@ipv4_getnetconf={0x54, 0x52, 0x10, 0x70bd25, 0x25dfdbfd, {}, [@NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x1}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x9}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x5}, @NETCONFA_FORWARDING={0x8, 0x2, 0x8}, @NETCONFA_IFINDEX={0x8, 0x1, r2}, @NETCONFA_RP_FILTER={0x8, 0x3, 0x7fff}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x3}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0xe9}]}, 0x54}, 0x1, 0x0, 0x0, 0x3400c080}, 0x40) read(0xffffffffffffffff, &(0x7f0000000280)=""/152, 0x20000318) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/keys\x00', 0x0, 0x0) r4 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r4, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) write$binfmt_elf64(r4, &(0x7f00000003c0)={{0x7f, 0x45, 0x4c, 0x46, 0x6, 0x81, 0x35, 0x4, 0x1, 0x59ad6aa4a884dd63, 0x3, 0x0, 0x13d, 0x40, 0x26e, 0x8000, 0x1f, 0x38, 0x1, 0x8, 0x8, 0x3}, [{0x6, 0x3, 0xefa, 0x1, 0x81, 0x80000000, 0x0, 0x9}, {0x7, 0x0, 0x7ff, 0xfff, 0x1, 0x4, 0x0, 0x800b}], "5ad165d3d87709dd80c73c9fa8b6ef39a345e1b2327e38197c13f3be9248c0f2161632606ce45b5c7d7349c883946ca190a061f77e1020dc808b86b4e3c7b2a6128e2d3b16a4ec69ad8c276d1a038ddc59bd46a7a37061ed24ba41f62de7aaf1c073c43333bee7ed0979404acecab631d46b591f921ec0a584aeb912342ff4f104ff960a3563460c943d11952c88bd0d13a69a425793b6f7d2b09cf17c87cdc331f63c983436cef6888b1a8328e953b0b3bade3aabbfc4818a05af", [[]]}, 0x26b) read(r3, &(0x7f0000000280)=""/152, 0x20000318) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x280800, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$DRM_IOCTL_MODE_SETCRTC(0xffffffffffffffff, 0xc06864a2, &(0x7f0000000000)={0x0, 0x0, 0x20}) 00:55:19 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) stat(&(0x7f0000000240)='./file0/file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(0xffffffffffffffff, &(0x7f0000001b80)) socket(0x11, 0x2, 0x5) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r4, 0x1, 0x14, &(0x7f0000000040), 0x50) getsockopt$IP6T_SO_GET_ENTRIES(r4, 0x29, 0x41, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)=0x1) fsetxattr$trusted_overlay_redirect(r3, &(0x7f0000000200)='trusted.overlay.redirect\x00', &(0x7f0000000280)='./file0/file0\x00', 0xe, 0x0) getsockname$tipc(0xffffffffffffffff, 0x0, &(0x7f0000000080)) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000001400)={{0x1, 0x0, @identifier="8e0f03f7e12b88d1af81f7c5a6bb175f"}, 0x67, [], "ed760111b8363e2de90692d0bc7e0a89824d3c77730403363ce0521cdcb1973b558cbd01ebf95bd9529fe3c5a95dcf31792e3e463d875b955a13582aeaddf6af34a98934ad6944b87292af67aec51fd37bd761db93cf6623d8683956791c956c97d76a9fd8df5d"}) lstat(&(0x7f0000000000)='./file0/file0\x00', &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000100)=0x0) r7 = getegid() r8 = socket$inet_tcp(0x2, 0x1, 0x0) r9 = fcntl$dupfd(r8, 0x0, r8) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) setresuid(r10, r10, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003ec0)={0x0, 0x0, 0x0}, 0x0) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, r11) r12 = openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$DRM_IOCTL_AGP_INFO(r12, 0x80386433, &(0x7f0000000bc0)=""/4096) getsockopt$sock_cred(r12, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0x194) setresuid(r13, r13, 0x0) r14 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r15 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r15, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) waitid(0x1, r15, &(0x7f0000000100), 0x80000004, &(0x7f0000000180)) r16 = shmget$private(0x0, 0x3000, 0x20, &(0x7f0000ffa000/0x3000)=nil) shmctl$SHM_STAT_ANY(r16, 0xf, &(0x7f0000000540)=""/221) shmctl$IPC_SET(r16, 0x1, &(0x7f0000000180)={{0x3, r10, r11, r13, r7, 0x42, 0x7}, 0x803ff, 0x2, 0xfffffffffffffffd, 0x0, r14, r15, 0x5}) shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000840)={{0x0, r2, r7, 0x0, r5, 0x50}, 0xd7, 0xfffffffffffffffe, 0x1000, 0x8000, r6}) r17 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000280)='/dev/nullb0\x00', 0x4400, 0x0) preadv(r17, &(0x7f0000000040)=[{&(0x7f0000000400)=""/4096, 0x3ffc00}], 0x1, 0x0) 00:55:20 executing program 3: r0 = socket$pppoe(0x18, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x2, @link_local, 'team0\x00'}}, 0x1e) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r1, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x10000000013, &(0x7f0000000180)=0x1, 0x233) setsockopt$sock_timeval(r4, 0x1, 0x15, &(0x7f0000000040)={0x0, 0x2710}, 0x10) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000000)='vcan0\x00', 0x10) connect$inet(r4, &(0x7f00000000c0)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r4, 0x6, 0x1d, &(0x7f0000000100)={0x0, 0xdf5, 0x21f8}, 0x14) write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0xff01) ioctl$USBDEVFS_FREE_STREAMS(r3, 0x8008551d, &(0x7f00000001c0)={0x65c7, 0x1, [{0x1, 0x1}]}) sendmsg$NFT_MSG_GETTABLE(0xffffffffffffffff, 0x0, 0x0) splice(r2, 0x0, r4, 0x0, 0x1ffe0, 0x0) r5 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r5, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {0x0, 0x3}, {0xffffffff}, {0x1}, {}, 0x0, 0x40, 0x0, 0x0, 0x0, 0xffffffff}) 00:55:20 executing program 5: socket$pppoe(0x18, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x5, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {0xffffffff}, {0x1}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}) 00:55:20 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) pipe(0x0) wait4(0x0, 0x0, 0x40000000, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000265000)=@req={0x0, 0x400}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000740)={{{@in=@multicast2, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@broadcast}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route(r1, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=@ipv4_getnetconf={0x54, 0x52, 0x10, 0x70bd25, 0x25dfdbfd, {}, [@NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x1}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x9}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x5}, @NETCONFA_FORWARDING={0x8, 0x2, 0x8}, @NETCONFA_IFINDEX={0x8, 0x1, r2}, @NETCONFA_RP_FILTER={0x8, 0x3, 0x7fff}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x3}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0xe9}]}, 0x54}, 0x1, 0x0, 0x0, 0x3400c080}, 0x40) read(0xffffffffffffffff, &(0x7f0000000280)=""/152, 0x20000318) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/keys\x00', 0x0, 0x0) r4 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r4, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) write$binfmt_elf64(r4, &(0x7f00000003c0)={{0x7f, 0x45, 0x4c, 0x46, 0x6, 0x81, 0x35, 0x4, 0x1, 0x59ad6aa4a884dd63, 0x3, 0x0, 0x13d, 0x40, 0x26e, 0x8000, 0x1f, 0x38, 0x1, 0x8, 0x8, 0x3}, [{0x6, 0x3, 0xefa, 0x1, 0x81, 0x80000000, 0x0, 0x9}, {0x7, 0x2, 0x0, 0xfff, 0x1, 0x4, 0x0, 0x800b}], "5ad165d3d87709dd80c73c9fa8b6ef39a345e1b2327e38197c13f3be9248c0f2161632606ce45b5c7d7349c883946ca190a061f77e1020dc808b86b4e3c7b2a6128e2d3b16a4ec69ad8c276d1a038ddc59bd46a7a37061ed24ba41f62de7aaf1c073c43333bee7ed0979404acecab631d46b591f921ec0a584aeb912342ff4f104ff960a3563460c943d11952c88bd0d13a69a425793b6f7d2b09cf17c87cdc331f63c983436cef6888b1a8328e953b0b3bade3aabbfc4818a05af", [[]]}, 0x26b) read(r3, &(0x7f0000000280)=""/152, 0x20000318) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x280800, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$DRM_IOCTL_MODE_SETCRTC(0xffffffffffffffff, 0xc06864a2, &(0x7f0000000000)={0x0, 0x0, 0x20}) 00:55:20 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) r1 = open(&(0x7f0000000100)='./file0/file0\x00', 0x40080, 0x20) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r1, 0x54a2) pipe(0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=@ipv4_getnetconf={0x3c, 0x52, 0x10, 0x70bd25, 0x25dfdbfd, {}, [@NETCONFA_PROXY_NEIGH={0x8}, @NETCONFA_IFINDEX={0x8}, @NETCONFA_RP_FILTER={0x8}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x3}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0xe9}]}, 0x3c}, 0x1, 0x0, 0x0, 0x3400c080}, 0x40) r2 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r2, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) write$binfmt_elf64(r2, &(0x7f00000003c0)={{0x7f, 0x45, 0x4c, 0x46, 0x6, 0x81, 0x35, 0x4, 0x1, 0x59ad6aa4a884dd63, 0x3, 0x0, 0x13d, 0x40, 0x26e, 0x8000, 0x1f, 0x38, 0x1, 0x8, 0x8, 0x3}, [{0x6, 0x3, 0xefa, 0x1, 0x81, 0x80000000, 0x0, 0x9}, {0x7, 0x2, 0x7ff, 0xfff, 0x1, 0x4, 0x0, 0x800b}], "5ad165d3d87709dd80c73c9fa8b6ef39a345e1b2327e38197c13f3be9248c0f2161632606ce45b5c7d7349c883946ca190a061f77e1020dc808b86b4e3c7b2a6128e2d3b16a4ec69ad8c276d1a038ddc59bd46a7a37061ed24ba41f62de7aaf1c073c43333bee7ed0979404acecab631d46b591f921ec0a584aeb912342ff4f104ff960a3563460c943d11952c88bd0d13a69a425793b6f7d2b09cf17c87cdc331f63c983436cef6888b1a8328e953b0b3bade3aabbfc4818a05af", [[]]}, 0x26b) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_open_procfs(0x0, &(0x7f0000000000)='timers\x00') 00:55:20 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) setxattr$security_evm(&(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='security.evm\x00', &(0x7f0000000280)=@ng={0x4, 0x5, "afd9daef9a0cc21c0bac2165bf327b507c"}, 0x13, 0x3) getpid() sched_setscheduler(0x0, 0x8981a6a3f18c15df, &(0x7f0000000380)=0x4) pipe(0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=@ipv4_getnetconf={0x3c, 0x52, 0x10, 0x70bd25, 0x25dfdbfd, {}, [@NETCONFA_PROXY_NEIGH={0x8}, @NETCONFA_IFINDEX={0x8}, @NETCONFA_RP_FILTER={0x8}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x3}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0xe9}]}, 0x3c}, 0x1, 0x0, 0x0, 0x3400c080}, 0x40) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) write$binfmt_elf64(r0, &(0x7f00000003c0)={{0x7f, 0x45, 0x4c, 0x46, 0x6, 0x81, 0x35, 0x4, 0x1, 0x59ad6aa4a884dd63, 0x3, 0x0, 0x13d, 0x40, 0x26e, 0x8000, 0x1f, 0x38, 0x1, 0x8, 0x8, 0x3}, [{0x6, 0x3, 0xefa, 0x1, 0x81, 0x80000000, 0x0, 0x9}, {0x7, 0x2, 0x7ff, 0xfff, 0x1, 0x4, 0x0, 0x800b}], "5ad165d3d87709dd80c73c9fa8b6ef39a345e1b2327e38197c13f3be9248c0f2161632606ce45b5c7d7349c883946ca190a061f77e1020dc808b86b4e3c7b2a6128e2d3b16a4ec69ad8c276d1a038ddc59bd46a7a37061ed24ba41f62de7aaf1c073c43333bee7ed0979404acecab631d46b591f921ec0a584aeb912342ff4f104ff960a3563460c943d11952c88bd0d13a69a425793b6f7d2b09cf17c87cdc331f63c983436cef6888b1a8328e953b0b3bade3aabbfc4818a05af", [[]]}, 0x26b) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_open_procfs(0x0, &(0x7f0000000000)='timers\x00') 00:55:20 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) pipe(0x0) wait4(0x0, 0x0, 0x40000000, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000265000)=@req={0x0, 0x400, 0x2}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000740)={{{@in=@multicast2, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@broadcast}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route(r1, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=@ipv4_getnetconf={0x54, 0x52, 0x10, 0x70bd25, 0x25dfdbfd, {}, [@NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x1}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x9}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x5}, @NETCONFA_FORWARDING={0x8, 0x2, 0x8}, @NETCONFA_IFINDEX={0x8, 0x1, r2}, @NETCONFA_RP_FILTER={0x8, 0x3, 0x7fff}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0xe9}]}, 0x54}, 0x1, 0x0, 0x0, 0x3400c080}, 0x40) read(0xffffffffffffffff, &(0x7f0000000280)=""/152, 0x20000318) openat$procfs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/keys\x00', 0x0, 0x0) r3 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r3, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) write$binfmt_elf64(r3, &(0x7f00000003c0)={{0x7f, 0x45, 0x4c, 0x46, 0x6, 0x81, 0x35, 0x4, 0x1, 0x59ad6aa4a884dd63, 0x3, 0x0, 0x13d, 0x40, 0x26e, 0x8000, 0x1f, 0x38, 0x1, 0x8, 0x8, 0x3}, [{0x6, 0x3, 0xefa, 0x1, 0x81, 0x80000000, 0x0, 0x9}, {0x7, 0x2, 0x7ff, 0xfff, 0x1, 0x4, 0x0, 0x800b}], "5ad165d3d87709dd80c73c9fa8b6ef39a345e1b2327e38197c13f3be9248c0f2161632606ce45b5c7d7349c883946ca190a061f77e1020dc808b86b4e3c7b2a6128e2d3b16a4ec69ad8c276d1a038ddc59bd46a7a37061ed24ba41f62de7aaf1c073c43333bee7ed0979404acecab631d46b591f921ec0a584aeb912342ff4f104ff960a3563460c943d11952c88bd0d13a69a425793b6f7d2b09cf17c87cdc331f63c983436cef6888b1a8328e953b0b3bade3aabbfc4818a05af", [[]]}, 0x26b) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_open_procfs(0x0, &(0x7f0000000000)='timers\x00') 00:55:20 executing program 5: socket$pppoe(0x18, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x6, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {0xffffffff}, {0x1}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}) 00:55:21 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) stat(&(0x7f0000000240)='./file0/file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(0xffffffffffffffff, &(0x7f0000001b80)) socket(0x11, 0x2, 0x5) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r4, 0x1, 0x14, &(0x7f0000000040), 0x50) getsockopt$IP6T_SO_GET_ENTRIES(r4, 0x29, 0x41, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)=0x1) fsetxattr$trusted_overlay_redirect(r3, &(0x7f0000000200)='trusted.overlay.redirect\x00', &(0x7f0000000280)='./file0/file0\x00', 0xe, 0x0) getsockname$tipc(0xffffffffffffffff, 0x0, &(0x7f0000000080)) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000001400)={{0x1, 0x0, @identifier="8e0f03f7e12b88d1af81f7c5a6bb175f"}, 0x67, [], "ed760111b8363e2de90692d0bc7e0a89824d3c77730403363ce0521cdcb1973b558cbd01ebf95bd9529fe3c5a95dcf31792e3e463d875b955a13582aeaddf6af34a98934ad6944b87292af67aec51fd37bd761db93cf6623d8683956791c956c97d76a9fd8df5d"}) lstat(&(0x7f0000000000)='./file0/file0\x00', &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000100)=0x0) r7 = getegid() r8 = socket$inet_tcp(0x2, 0x1, 0x0) r9 = fcntl$dupfd(r8, 0x0, r8) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) setresuid(r10, r10, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003ec0)={0x0, 0x0, 0x0}, 0x0) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, r11) r12 = openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$DRM_IOCTL_AGP_INFO(r12, 0x80386433, &(0x7f0000000bc0)=""/4096) getsockopt$sock_cred(r12, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0x194) setresuid(r13, r13, 0x0) r14 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r15 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r15, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) waitid(0x1, r15, &(0x7f0000000100), 0x80000004, &(0x7f0000000180)) r16 = shmget$private(0x0, 0x3000, 0x20, &(0x7f0000ffa000/0x3000)=nil) shmctl$SHM_STAT_ANY(r16, 0xf, &(0x7f0000000540)=""/221) shmctl$IPC_SET(r16, 0x1, &(0x7f0000000180)={{0x3, r10, r11, r13, r7, 0x42, 0x7}, 0x803ff, 0x2, 0xfffffffffffffffd, 0x0, r14, r15, 0x5}) shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000840)={{0x0, r2, r7, 0x0, r5, 0x50}, 0xd7, 0xfffffffffffffffe, 0x1000, 0x8000, r6}) r17 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000280)='/dev/nullb0\x00', 0x4400, 0x0) preadv(r17, &(0x7f0000000040)=[{&(0x7f0000000400)=""/4096, 0x3ffc00}], 0x1, 0x0) 00:55:21 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) pipe(0x0) wait4(0x0, 0x0, 0x40000000, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000265000)=@req={0x0, 0x400}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000740)={{{@in=@multicast2, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@broadcast}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route(r1, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=@ipv4_getnetconf={0x54, 0x52, 0x10, 0x70bd25, 0x25dfdbfd, {}, [@NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x1}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x9}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x5}, @NETCONFA_FORWARDING={0x8, 0x2, 0x8}, @NETCONFA_IFINDEX={0x8, 0x1, r2}, @NETCONFA_RP_FILTER={0x8, 0x3, 0x7fff}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x3}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0xe9}]}, 0x54}, 0x1, 0x0, 0x0, 0x3400c080}, 0x40) read(0xffffffffffffffff, &(0x7f0000000280)=""/152, 0x20000318) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/keys\x00', 0x0, 0x0) r4 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r4, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) write$binfmt_elf64(r4, &(0x7f00000003c0)={{0x7f, 0x45, 0x4c, 0x46, 0x6, 0x81, 0x35, 0x4, 0x1, 0x59ad6aa4a884dd63, 0x3, 0x0, 0x13d, 0x40, 0x26e, 0x8000, 0x1f, 0x38, 0x1, 0x8, 0x8, 0x3}, [{0x6, 0x3, 0xefa, 0x1, 0x81, 0x80000000, 0x0, 0x9}, {0x7, 0x2, 0x0, 0xfff, 0x1, 0x4, 0x0, 0x800b}], "5ad165d3d87709dd80c73c9fa8b6ef39a345e1b2327e38197c13f3be9248c0f2161632606ce45b5c7d7349c883946ca190a061f77e1020dc808b86b4e3c7b2a6128e2d3b16a4ec69ad8c276d1a038ddc59bd46a7a37061ed24ba41f62de7aaf1c073c43333bee7ed0979404acecab631d46b591f921ec0a584aeb912342ff4f104ff960a3563460c943d11952c88bd0d13a69a425793b6f7d2b09cf17c87cdc331f63c983436cef6888b1a8328e953b0b3bade3aabbfc4818a05af", [[]]}, 0x26b) read(r3, &(0x7f0000000280)=""/152, 0x20000318) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x280800, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$DRM_IOCTL_MODE_SETCRTC(0xffffffffffffffff, 0xc06864a2, &(0x7f0000000000)={0x0, 0x0, 0x20}) 00:55:21 executing program 3: r0 = socket$pppoe(0x18, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x2, @link_local, 'team0\x00'}}, 0x1e) prctl$PR_GET_CHILD_SUBREAPER(0x25) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x28000, 0x0) ioctl$CAPI_MANUFACTURER_CMD(r1, 0xc0104320, &(0x7f0000000140)={0x22, &(0x7f00000001c0)="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"}) open$dir(&(0x7f00000000c0)='./file0\x00', 0xc0000, 0x0) r2 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r2, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x10, 0x0, 0x0, 0x4, 0x0, {0x0, 0x10003}, {0xffffffff}, {0x1}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) fchdir(0xffffffffffffffff) 00:55:21 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) r1 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r1, 0x1000008912, &(0x7f0000000040)="080db5055e0bcfe8479071") r2 = socket$netlink(0x10, 0x3, 0x0) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x28, 0x0, 0x0, 0xfffff010}, {0x80000006}]}, 0x10) pipe(0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=@ipv4_getnetconf={0x3c, 0x52, 0x10, 0x70bd25, 0x25dfdbfd, {}, [@NETCONFA_PROXY_NEIGH={0x8}, @NETCONFA_IFINDEX={0x8}, @NETCONFA_RP_FILTER={0x8}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x3}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0xe9}]}, 0x3c}, 0x1, 0x0, 0x0, 0x3400c080}, 0x40) r3 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r3, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) write$binfmt_elf64(r3, &(0x7f0000000640)=ANY=[@ANYBLOB="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"/620], 0x26b) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='timers\x00') r5 = socket$inet6(0xa, 0x0, 0x0) ioctl$int_in(r5, 0x5452, &(0x7f0000000040)) connect$inet6(r5, &(0x7f0000419000)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_PKTINFO(r5, 0x29, 0x32, &(0x7f0000000240)={@mcast2}, 0x14) read$fb(r4, &(0x7f00000002c0)=""/190, 0xbe) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f0000000100)={0x9, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000000200)=0x28) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r5, 0x84, 0x18, &(0x7f0000000280)={r6, 0x4}, 0x8) 00:55:21 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) pipe(0x0) wait4(0x0, 0x0, 0x40000000, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000265000)=@req={0x0, 0x400, 0x2}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000740)={{{@in=@multicast2, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@broadcast}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route(r1, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=@ipv4_getnetconf={0x4c, 0x52, 0x10, 0x70bd25, 0x25dfdbfd, {}, [@NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x1}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x9}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x5}, @NETCONFA_FORWARDING={0x8, 0x2, 0x8}, @NETCONFA_IFINDEX={0x8, 0x1, r2}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x3}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0xe9}]}, 0x4c}, 0x1, 0x0, 0x0, 0x3400c080}, 0x40) read(0xffffffffffffffff, &(0x7f0000000280)=""/152, 0x20000318) openat$procfs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/keys\x00', 0x0, 0x0) r3 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r3, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) write$binfmt_elf64(r3, &(0x7f00000003c0)={{0x7f, 0x45, 0x4c, 0x46, 0x6, 0x81, 0x35, 0x4, 0x1, 0x59ad6aa4a884dd63, 0x3, 0x0, 0x13d, 0x40, 0x26e, 0x8000, 0x1f, 0x38, 0x1, 0x8, 0x8, 0x3}, [{0x6, 0x3, 0xefa, 0x1, 0x81, 0x80000000, 0x0, 0x9}, {0x7, 0x2, 0x7ff, 0xfff, 0x1, 0x4, 0x0, 0x800b}], "5ad165d3d87709dd80c73c9fa8b6ef39a345e1b2327e38197c13f3be9248c0f2161632606ce45b5c7d7349c883946ca190a061f77e1020dc808b86b4e3c7b2a6128e2d3b16a4ec69ad8c276d1a038ddc59bd46a7a37061ed24ba41f62de7aaf1c073c43333bee7ed0979404acecab631d46b591f921ec0a584aeb912342ff4f104ff960a3563460c943d11952c88bd0d13a69a425793b6f7d2b09cf17c87cdc331f63c983436cef6888b1a8328e953b0b3bade3aabbfc4818a05af", [[]]}, 0x26b) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_open_procfs(0x0, &(0x7f0000000000)='timers\x00') 00:55:21 executing program 5: socket$pppoe(0x18, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x7, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {0xffffffff}, {0x1}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}) 00:55:22 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) pipe(0x0) wait4(0x0, 0x0, 0x40000000, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000265000)=@req={0x0, 0x400}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000740)={{{@in=@multicast2, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@broadcast}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route(r1, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=@ipv4_getnetconf={0x54, 0x52, 0x10, 0x70bd25, 0x25dfdbfd, {}, [@NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x1}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x9}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x5}, @NETCONFA_FORWARDING={0x8, 0x2, 0x8}, @NETCONFA_IFINDEX={0x8, 0x1, r2}, @NETCONFA_RP_FILTER={0x8, 0x3, 0x7fff}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x3}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0xe9}]}, 0x54}, 0x1, 0x0, 0x0, 0x3400c080}, 0x40) read(0xffffffffffffffff, &(0x7f0000000280)=""/152, 0x20000318) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/keys\x00', 0x0, 0x0) r4 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r4, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) write$binfmt_elf64(r4, &(0x7f00000003c0)={{0x7f, 0x45, 0x4c, 0x46, 0x6, 0x81, 0x35, 0x4, 0x1, 0x59ad6aa4a884dd63, 0x3, 0x0, 0x13d, 0x40, 0x26e, 0x8000, 0x1f, 0x38, 0x1, 0x8, 0x8, 0x3}, [{0x6, 0x3, 0xefa, 0x1, 0x81, 0x80000000, 0x0, 0x9}, {0x7, 0x2, 0x0, 0xfff, 0x1, 0x4, 0x0, 0x800b}], "5ad165d3d87709dd80c73c9fa8b6ef39a345e1b2327e38197c13f3be9248c0f2161632606ce45b5c7d7349c883946ca190a061f77e1020dc808b86b4e3c7b2a6128e2d3b16a4ec69ad8c276d1a038ddc59bd46a7a37061ed24ba41f62de7aaf1c073c43333bee7ed0979404acecab631d46b591f921ec0a584aeb912342ff4f104ff960a3563460c943d11952c88bd0d13a69a425793b6f7d2b09cf17c87cdc331f63c983436cef6888b1a8328e953b0b3bade3aabbfc4818a05af", [[]]}, 0x26b) read(r3, &(0x7f0000000280)=""/152, 0x20000318) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x280800, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$DRM_IOCTL_MODE_SETCRTC(0xffffffffffffffff, 0xc06864a2, &(0x7f0000000000)={0x0, 0x0, 0x20}) 00:55:22 executing program 5: socket$pppoe(0x18, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x10, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {0xffffffff}, {0x1}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}) 00:55:22 executing program 3: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, &(0x7f00000000c0)) r1 = socket$pppoe(0x18, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) connect$pppoe(r1, &(0x7f0000000000)={0x18, 0x0, {0x2, @link_local, 'team0\x00'}}, 0x1e) r2 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r2, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {0x0, 0x3}, {0xffffffff}, {0x1}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) 00:55:22 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) pipe(0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f0000000280)=ANY=[@ANYBLOB="3c0000005200100025bd7000fddbdf2502080005000000000008000100380ba1b57eb088f4b829a64a607369295c1ff8d7d2beded5a967927a2aa72ca015ce07c9696dc4b059f1bb", @ANYRES32=0x0, @ANYBLOB="0800030000000000080006000300000008000500e9000000000000"], 0x3c}, 0x1, 0x0, 0x0, 0x3400c080}, 0x40) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r1, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) ioctl$SNDCTL_DSP_CHANNELS(r1, 0xc0045006, &(0x7f0000000100)=0xe7) r2 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r2, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) write$binfmt_elf64(r2, &(0x7f00000003c0)={{0x7f, 0x45, 0x4c, 0x46, 0x6, 0x81, 0x35, 0x4, 0x1, 0x59ad6aa4a884dd63, 0x3, 0x0, 0x13d, 0x40, 0x26e, 0x8000, 0x1f, 0x38, 0x1, 0x8, 0x8, 0x3}, [{0x6, 0x3, 0xefa, 0x1, 0x81, 0x80000000, 0x0, 0x8000000009}, {0x7, 0x2, 0x7ff, 0xfff, 0x1, 0x4, 0x0, 0x800b}], "5ad165d3d87709dd80c73c9fa8b6ef39a345e1b2327e38197c13f3be9248c0f2161632606ce45b5c7d7349c883946ca190a061f77e1020dc808b86b4e3c7b2a6128e2d3b16a4ec69ad8c276d1a038ddc59bd46a7a37061ed24ba41f62de7aaf1c073c43333bee7ed0979404acecab631d46b591f921ec0a584aeb912342ff4f104ff960a3563460c943d11952c88bd0d13a69a425793b6f7d2b09cf17c87cdc331f63c983436cef6888b1a8328e953b0b3bade3aabbfc4818a05af", [[]]}, 0x26b) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000680)='/dev/ttyprintk\x00', 0x141680, 0x0) r3 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r3, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(r3, 0x4020565b, &(0x7f0000000640)={0x1001, 0x10001}) clock_gettime(0x0, &(0x7f00000001c0)={0x0, 0x0}) ioctl$VIDIOC_PREPARE_BUF(r1, 0xc058565d, &(0x7f0000000300)={0x1, 0xc, 0x4, 0x40000000, 0x0, {r4, r5/1000+30000}, {0x4, 0x8, 0x8, 0x2, 0x7f, 0x7f, "69c4812b"}, 0xfffffffa, 0x1, @planes=&(0x7f0000000200)={0x7, 0x6, @userptr=0x3d6, 0x2}, 0x7}) syz_open_procfs(0x0, &(0x7f0000000000)='timers\x00') 00:55:22 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) pipe(0x0) wait4(0x0, 0x0, 0x40000000, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000265000)=@req={0x0, 0x400, 0x2}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000740)={{{@in=@multicast2, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@broadcast}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route(r1, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=@ipv4_getnetconf={0x4c, 0x52, 0x10, 0x70bd25, 0x25dfdbfd, {}, [@NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x1}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x9}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x5}, @NETCONFA_FORWARDING={0x8, 0x2, 0x8}, @NETCONFA_IFINDEX={0x8, 0x1, r2}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x3}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0xe9}]}, 0x4c}, 0x1, 0x0, 0x0, 0x3400c080}, 0x40) read(0xffffffffffffffff, &(0x7f0000000280)=""/152, 0x20000318) openat$procfs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/keys\x00', 0x0, 0x0) r3 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r3, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) write$binfmt_elf64(r3, &(0x7f00000003c0)={{0x7f, 0x45, 0x4c, 0x46, 0x6, 0x81, 0x35, 0x4, 0x1, 0x59ad6aa4a884dd63, 0x3, 0x0, 0x13d, 0x40, 0x26e, 0x8000, 0x1f, 0x38, 0x1, 0x8, 0x8, 0x3}, [{0x6, 0x3, 0xefa, 0x1, 0x81, 0x80000000, 0x0, 0x9}, {0x7, 0x2, 0x7ff, 0xfff, 0x1, 0x4, 0x0, 0x800b}], "5ad165d3d87709dd80c73c9fa8b6ef39a345e1b2327e38197c13f3be9248c0f2161632606ce45b5c7d7349c883946ca190a061f77e1020dc808b86b4e3c7b2a6128e2d3b16a4ec69ad8c276d1a038ddc59bd46a7a37061ed24ba41f62de7aaf1c073c43333bee7ed0979404acecab631d46b591f921ec0a584aeb912342ff4f104ff960a3563460c943d11952c88bd0d13a69a425793b6f7d2b09cf17c87cdc331f63c983436cef6888b1a8328e953b0b3bade3aabbfc4818a05af", [[]]}, 0x26b) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_open_procfs(0x0, &(0x7f0000000000)='timers\x00') 00:55:22 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) pipe(0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=@ipv4_getnetconf={0x3c, 0x52, 0x10, 0x70bd25, 0x25dfdbfd, {}, [@NETCONFA_PROXY_NEIGH={0x8}, @NETCONFA_IFINDEX={0x8}, @NETCONFA_RP_FILTER={0x8}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x3}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0xe9}]}, 0x3c}, 0x1, 0x0, 0x0, 0x3400c080}, 0x40) r1 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r1, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) write$binfmt_elf64(r1, &(0x7f00000003c0)={{0x7f, 0x45, 0x4c, 0x46, 0x6, 0x81, 0x35, 0x4, 0x1, 0x59ad6aa4a884dd63, 0x3, 0x0, 0x13d, 0x40, 0x26e, 0x8000, 0x1f, 0x38, 0x1, 0x8, 0x9, 0x3ff}, [], "5ad165d3d87709dd80c73c9fa8b6ef39a345e1b2327e38197c13f3be9248c0f2161632606ce45b5c7d7349c883946ca190a061f77e1020dc808b86b4e3c7b2a6128e2d3b16a4ec69ad8c276d1a038ddc59bd46a7a37061ed24ba41f62de7aaf1c073c43333bee7ed0979404acecab631d46b591f921ec0a584aeb912342ff4f104ff960a3563460c943d11952c88bd0d13a69a425793b6f7d2b09cf17c87cdc331f63c983436cef6888b1a8328e953b0b3bade3aabbfc4818a05af"}, 0xfb) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r2, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) r3 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r3, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='timers\x00') 00:55:23 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) stat(&(0x7f0000000240)='./file0/file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(0xffffffffffffffff, &(0x7f0000001b80)) socket(0x11, 0x2, 0x5) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r4, 0x1, 0x14, &(0x7f0000000040), 0x50) getsockopt$IP6T_SO_GET_ENTRIES(r4, 0x29, 0x41, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)=0x1) fsetxattr$trusted_overlay_redirect(r3, &(0x7f0000000200)='trusted.overlay.redirect\x00', &(0x7f0000000280)='./file0/file0\x00', 0xe, 0x0) getsockname$tipc(0xffffffffffffffff, 0x0, &(0x7f0000000080)) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000001400)={{0x1, 0x0, @identifier="8e0f03f7e12b88d1af81f7c5a6bb175f"}, 0x67, [], "ed760111b8363e2de90692d0bc7e0a89824d3c77730403363ce0521cdcb1973b558cbd01ebf95bd9529fe3c5a95dcf31792e3e463d875b955a13582aeaddf6af34a98934ad6944b87292af67aec51fd37bd761db93cf6623d8683956791c956c97d76a9fd8df5d"}) lstat(&(0x7f0000000000)='./file0/file0\x00', &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000100)=0x0) r7 = getegid() r8 = socket$inet_tcp(0x2, 0x1, 0x0) r9 = fcntl$dupfd(r8, 0x0, r8) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) setresuid(r10, r10, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003ec0)={0x0, 0x0, 0x0}, 0x0) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, r11) r12 = openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$DRM_IOCTL_AGP_INFO(r12, 0x80386433, &(0x7f0000000bc0)=""/4096) getsockopt$sock_cred(r12, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0x194) setresuid(r13, r13, 0x0) r14 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r15 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r15, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) waitid(0x1, r15, &(0x7f0000000100), 0x80000004, &(0x7f0000000180)) r16 = shmget$private(0x0, 0x3000, 0x20, &(0x7f0000ffa000/0x3000)=nil) shmctl$SHM_STAT_ANY(r16, 0xf, &(0x7f0000000540)=""/221) shmctl$IPC_SET(r16, 0x1, &(0x7f0000000180)={{0x3, r10, r11, r13, r7, 0x42, 0x7}, 0x803ff, 0x2, 0xfffffffffffffffd, 0x0, r14, r15, 0x5}) shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000840)={{0x0, r2, r7, 0x0, r5, 0x50}, 0xd7, 0xfffffffffffffffe, 0x1000, 0x8000, r6}) r17 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000280)='/dev/nullb0\x00', 0x4400, 0x0) preadv(r17, &(0x7f0000000040)=[{&(0x7f0000000400)=""/4096, 0x3ffc00}], 0x1, 0x0) 00:55:23 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) pipe(0x0) wait4(0x0, 0x0, 0x40000000, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000265000)=@req={0x0, 0x400}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000740)={{{@in=@multicast2, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@broadcast}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route(r1, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=@ipv4_getnetconf={0x54, 0x52, 0x10, 0x70bd25, 0x25dfdbfd, {}, [@NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x1}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x9}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x5}, @NETCONFA_FORWARDING={0x8, 0x2, 0x8}, @NETCONFA_IFINDEX={0x8, 0x1, r2}, @NETCONFA_RP_FILTER={0x8, 0x3, 0x7fff}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x3}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0xe9}]}, 0x54}, 0x1, 0x0, 0x0, 0x3400c080}, 0x40) read(0xffffffffffffffff, &(0x7f0000000280)=""/152, 0x20000318) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/keys\x00', 0x0, 0x0) r4 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r4, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) write$binfmt_elf64(r4, &(0x7f00000003c0)={{0x7f, 0x45, 0x4c, 0x46, 0x6, 0x81, 0x35, 0x4, 0x1, 0x59ad6aa4a884dd63, 0x3, 0x0, 0x13d, 0x40, 0x26e, 0x8000, 0x1f, 0x38, 0x1, 0x8, 0x8, 0x3}, [{0x6, 0x3, 0xefa, 0x1, 0x81, 0x80000000, 0x0, 0x9}, {0x7, 0x2, 0x7ff, 0x0, 0x1, 0x4, 0x0, 0x800b}], "5ad165d3d87709dd80c73c9fa8b6ef39a345e1b2327e38197c13f3be9248c0f2161632606ce45b5c7d7349c883946ca190a061f77e1020dc808b86b4e3c7b2a6128e2d3b16a4ec69ad8c276d1a038ddc59bd46a7a37061ed24ba41f62de7aaf1c073c43333bee7ed0979404acecab631d46b591f921ec0a584aeb912342ff4f104ff960a3563460c943d11952c88bd0d13a69a425793b6f7d2b09cf17c87cdc331f63c983436cef6888b1a8328e953b0b3bade3aabbfc4818a05af", [[]]}, 0x26b) read(r3, &(0x7f0000000280)=""/152, 0x20000318) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x280800, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$DRM_IOCTL_MODE_SETCRTC(0xffffffffffffffff, 0xc06864a2, &(0x7f0000000000)={0x0, 0x0, 0x20}) 00:55:23 executing program 5: socket$pppoe(0x18, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x300, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {0xffffffff}, {0x1}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}) 00:55:23 executing program 3: r0 = socket$pppoe(0x18, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000265000)=@req={0x0, 0x0, 0x2}, 0x10) r2 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f0000000100)={r3}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f00000000c0)={r3, 0x1, 0x0, 0x3}, &(0x7f0000000100)=0x10) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x2, @link_local, 'team0\x00'}}, 0x1e) r4 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r4, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {0x0, 0x3}, {0xffffffff}, {0x1}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) 00:55:23 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) getpid() pipe(0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=@ipv4_getnetconf={0x3c, 0x52, 0x10, 0x70bd25, 0x25dfdbfd, {}, [@NETCONFA_PROXY_NEIGH={0x8}, @NETCONFA_IFINDEX={0x8}, @NETCONFA_RP_FILTER={0x8}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x3}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0xe9}]}, 0x3c}, 0x1, 0x0, 0x0, 0x3400c080}, 0x40) r1 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r1, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) write$binfmt_elf64(r1, &(0x7f00000003c0)={{0x7f, 0x45, 0x4c, 0x46, 0x6, 0x81, 0x35, 0x4, 0x1, 0x59ad6aa4a884dd63, 0x3, 0x0, 0x13d, 0x40, 0x26e, 0x8000, 0x1f, 0x38, 0x1, 0x8, 0x8, 0x3}, [{0x6, 0x3, 0xefa, 0x1, 0x81, 0x80000000, 0x0, 0x9}, {0x7, 0x2, 0x7ff, 0xfff, 0x1, 0x4, 0x0, 0x800b}], "5ad165d3d87709dd80c73c9fa8b6ef39a345e1b2327e38197c13f3be9248c0f2161632606ce45b5c7d7349c883946ca190a061f77e1020dc808b86b4e3c7b2a6128e2d3b16a4ec69ad8c276d1a038ddc59bd46a7a37061ed24ba41f62de7aaf1c073c43333bee7ed0979404acecab631d46b591f921ec0a584aeb912342ff4f104ff960a3563460c943d11952c88bd0d13a69a425793b6f7d2b09cf17c87cdc331f63c983436cef6888b1a8328e953b0b3bade3aabbfc4818a05af", [[]]}, 0x26b) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_open_procfs(0x0, &(0x7f0000000000)='timers\x00') 00:55:23 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) pipe(0x0) wait4(0x0, 0x0, 0x40000000, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000265000)=@req={0x0, 0x400, 0x2}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000740)={{{@in=@multicast2, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@broadcast}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route(r1, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=@ipv4_getnetconf={0x4c, 0x52, 0x10, 0x70bd25, 0x25dfdbfd, {}, [@NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x1}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x9}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x5}, @NETCONFA_FORWARDING={0x8, 0x2, 0x8}, @NETCONFA_IFINDEX={0x8, 0x1, r2}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x3}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0xe9}]}, 0x4c}, 0x1, 0x0, 0x0, 0x3400c080}, 0x40) read(0xffffffffffffffff, &(0x7f0000000280)=""/152, 0x20000318) openat$procfs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/keys\x00', 0x0, 0x0) r3 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r3, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) write$binfmt_elf64(r3, &(0x7f00000003c0)={{0x7f, 0x45, 0x4c, 0x46, 0x6, 0x81, 0x35, 0x4, 0x1, 0x59ad6aa4a884dd63, 0x3, 0x0, 0x13d, 0x40, 0x26e, 0x8000, 0x1f, 0x38, 0x1, 0x8, 0x8, 0x3}, [{0x6, 0x3, 0xefa, 0x1, 0x81, 0x80000000, 0x0, 0x9}, {0x7, 0x2, 0x7ff, 0xfff, 0x1, 0x4, 0x0, 0x800b}], "5ad165d3d87709dd80c73c9fa8b6ef39a345e1b2327e38197c13f3be9248c0f2161632606ce45b5c7d7349c883946ca190a061f77e1020dc808b86b4e3c7b2a6128e2d3b16a4ec69ad8c276d1a038ddc59bd46a7a37061ed24ba41f62de7aaf1c073c43333bee7ed0979404acecab631d46b591f921ec0a584aeb912342ff4f104ff960a3563460c943d11952c88bd0d13a69a425793b6f7d2b09cf17c87cdc331f63c983436cef6888b1a8328e953b0b3bade3aabbfc4818a05af", [[]]}, 0x26b) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_open_procfs(0x0, &(0x7f0000000000)='timers\x00') 00:55:23 executing program 3: r0 = socket$pppoe(0x18, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffc}, 0x0, 0x0, 0x1}, 0x0, 0x1, 0xffffffffffffffff, 0xa) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vcsu\x00', 0x103000, 0x0) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0xfffe, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, 'team0\x00'}}, 0x1e) openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$DRM_IOCTL_ADD_BUFS(r1, 0xc0206416, &(0x7f0000000480)={0x8, 0xfffffffb, 0xf5, 0x1, 0x4, 0x2}) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r2, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) mlock(&(0x7f0000ffc000/0x2000)=nil, 0x2000) ioctl$VIDIOC_SUBDEV_S_CROP(r2, 0xc038563c, &(0x7f00000000c0)={0x0, 0x0, {0x81, 0x8, 0x646, 0xa45}}) r3 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r3, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) ioctl$FBIOPUT_VSCREENINFO(r3, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {0x0, 0x3}, {0xffffffff}, {0x1}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) setsockopt$inet6_MCAST_JOIN_GROUP(r2, 0x29, 0x2a, &(0x7f0000000280)={0x1, {{0xa, 0x4e20, 0x3, @loopback, 0x4}}}, 0x88) syz_genetlink_get_family_id$batadv(&(0x7f0000000140)='batadv\x00') getsockopt$PNPIPE_IFINDEX(r2, 0x113, 0x2, &(0x7f00000001c0)=0x0, &(0x7f0000000200)=0x4) sendmsg$BATADV_CMD_TP_METER(r2, &(0x7f00000003c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000380)={&(0x7f00000004c0)=ANY=[@ANYBLOB="9d195bf43148a0fac24c1928096ff301567cad39104eeb99", @ANYRES16, @ANYBLOB="040229bd7000fcdbdf25020000000a0009000180c200000e0000060028000200000008002b000004000008000300", @ANYRES32=r4, @ANYBLOB], 0x5}, 0x1, 0x0, 0x0, 0x2400400c}, 0x20008090) 00:55:24 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) pipe(0x0) wait4(0x0, 0x0, 0x40000000, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000265000)=@req={0x0, 0x400}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000740)={{{@in=@multicast2, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@broadcast}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route(r1, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=@ipv4_getnetconf={0x54, 0x52, 0x10, 0x70bd25, 0x25dfdbfd, {}, [@NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x1}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x9}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x5}, @NETCONFA_FORWARDING={0x8, 0x2, 0x8}, @NETCONFA_IFINDEX={0x8, 0x1, r2}, @NETCONFA_RP_FILTER={0x8, 0x3, 0x7fff}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x3}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0xe9}]}, 0x54}, 0x1, 0x0, 0x0, 0x3400c080}, 0x40) read(0xffffffffffffffff, &(0x7f0000000280)=""/152, 0x20000318) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/keys\x00', 0x0, 0x0) r4 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r4, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) write$binfmt_elf64(r4, &(0x7f00000003c0)={{0x7f, 0x45, 0x4c, 0x46, 0x6, 0x81, 0x35, 0x4, 0x1, 0x59ad6aa4a884dd63, 0x3, 0x0, 0x13d, 0x40, 0x26e, 0x8000, 0x1f, 0x38, 0x1, 0x8, 0x8, 0x3}, [{0x6, 0x3, 0xefa, 0x1, 0x81, 0x80000000, 0x0, 0x9}, {0x7, 0x2, 0x7ff, 0x0, 0x1, 0x4, 0x0, 0x800b}], "5ad165d3d87709dd80c73c9fa8b6ef39a345e1b2327e38197c13f3be9248c0f2161632606ce45b5c7d7349c883946ca190a061f77e1020dc808b86b4e3c7b2a6128e2d3b16a4ec69ad8c276d1a038ddc59bd46a7a37061ed24ba41f62de7aaf1c073c43333bee7ed0979404acecab631d46b591f921ec0a584aeb912342ff4f104ff960a3563460c943d11952c88bd0d13a69a425793b6f7d2b09cf17c87cdc331f63c983436cef6888b1a8328e953b0b3bade3aabbfc4818a05af", [[]]}, 0x26b) read(r3, &(0x7f0000000280)=""/152, 0x20000318) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x280800, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$DRM_IOCTL_MODE_SETCRTC(0xffffffffffffffff, 0xc06864a2, &(0x7f0000000000)={0x0, 0x0, 0x20}) 00:55:24 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) pipe(0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f0000000100)=@ipv4_getnetconf={0x3c, 0x52, 0x300, 0x70bd25, 0x25dfdc01, {}, [@NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x5}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x20}, @NETCONFA_FORWARDING={0x8, 0x2, 0x1}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x4}, @NETCONFA_RP_FILTER={0x8, 0x3, 0xe1}]}, 0x3c}, 0x1, 0x0, 0x0, 0x3400c080}, 0x10) r1 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r1, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}) write$binfmt_elf64(r1, &(0x7f00000003c0)={{0x7f, 0x45, 0x4c, 0x46, 0x6, 0x81, 0x35, 0x4, 0x1, 0x59ad6aa4a884dd63, 0x3, 0x0, 0x13d, 0x40, 0x26e, 0x8000, 0x1f, 0x38, 0x1, 0x8, 0x8, 0x3}, [{0x6, 0x3, 0xefa, 0x1, 0x81, 0x80000000, 0x0, 0x9}, {0x7, 0x2, 0x7ff, 0xfff, 0x1, 0x4, 0x0, 0x800b}], "5ad165d3d87709dd80c73c9fa8b6ef39a345e1b2327e38197c13f3be9248c0f2161632606ce45b5c7d7349c883946ca190a061f77e1020dc808b86b4e3c7b2a6128e2d3b16a4ec69ad8c276d1a038ddc59bd46a7a37061ed24ba41f62de7aaf1c073c43333bee7ed0979404acecab631d46b591f921ec0a584aeb912342ff4f104ff960a3563460c943d11952c88bd0d13a69a425793b6f7d2b09cf17c87cdc331f63c983436cef6888b1a8328e953b0b3bade3aabbfc4818a05af", [[]]}, 0x26b) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_open_procfs(0x0, &(0x7f0000000000)='timers\x00') 00:55:24 executing program 5: socket$pppoe(0x18, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x500, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {0xffffffff}, {0x1}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}) 00:55:24 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) stat(&(0x7f0000000240)='./file0/file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(0xffffffffffffffff, &(0x7f0000001b80)) socket(0x11, 0x2, 0x5) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r4, 0x1, 0x14, &(0x7f0000000040), 0x50) getsockopt$IP6T_SO_GET_ENTRIES(r4, 0x29, 0x41, &(0x7f0000000480)=ANY=[@ANYBLOB="6e2f740000edffffffffffffff00000000000000000000000000000000000000ad0000005086f3915e59ad8184af4045c4e742fa881d66411baabaa82dda6d71f825249ec2eb0ad398766b6b870bba11fc00df87700a78319e5f5d955a5eb0f50e2dcd95623e3eba93f21d4733f6d4834e398f5ba4540b18afc3c2a92ff6e4a89dc029fdd87fc0c2ca637f5ead98feb48d1bfe6451a583e519234bd5297e8a8bf569ff90077ba1cef2ea64c8f027947915a33e26b9d8b4fb56ba4d86df286c34e0cd9715e6b39dcccf4eb92a1706ed98b4aafd220eecfac13859aaab4dc07cd467149066f2f637c1e58f02faf49d72752753fe6beceb9d14b1ab3832cab4d59f892cb6f3689b67eaf81e929525a7fe0f2ea0892194387f7d085ea12c8842b8790911042b2a48b65c40087bd66593e0cfc29843b29738147ea75bb6c3d9664dc189fca97c43ed585ebb0c2a03782d916c709f6fdeca72784a8ac21d3ff8c9551290ea0000000000000049d4bb98580f9f7b7da060b127fd66ae6ad3c8"], &(0x7f0000000340)=0x1) fsetxattr$trusted_overlay_redirect(r3, &(0x7f0000000200)='trusted.overlay.redirect\x00', &(0x7f0000000280)='./file0/file0\x00', 0xe, 0x0) getsockname$tipc(0xffffffffffffffff, 0x0, &(0x7f0000000080)) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000001400)={{0x1, 0x0, @identifier="8e0f03f7e12b88d1af81f7c5a6bb175f"}, 0x67, [], "ed760111b8363e2de90692d0bc7e0a89824d3c77730403363ce0521cdcb1973b558cbd01ebf95bd9529fe3c5a95dcf31792e3e463d875b955a13582aeaddf6af34a98934ad6944b87292af67aec51fd37bd761db93cf6623d8683956791c956c97d76a9fd8df5d"}) lstat(&(0x7f0000000000)='./file0/file0\x00', &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000100)=0x0) r7 = getegid() r8 = socket$inet_tcp(0x2, 0x1, 0x0) r9 = fcntl$dupfd(r8, 0x0, r8) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) setresuid(r10, r10, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003ec0)={0x0, 0x0, 0x0}, 0x0) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, r11) r12 = openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$DRM_IOCTL_AGP_INFO(r12, 0x80386433, &(0x7f0000000bc0)=""/4096) getsockopt$sock_cred(r12, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0x194) setresuid(r13, r13, 0x0) r14 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r15 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r15, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) waitid(0x1, r15, &(0x7f0000000100), 0x80000004, &(0x7f0000000180)) r16 = shmget$private(0x0, 0x3000, 0x20, &(0x7f0000ffa000/0x3000)=nil) shmctl$SHM_STAT_ANY(r16, 0xf, &(0x7f0000000540)=""/221) shmctl$IPC_SET(r16, 0x1, &(0x7f0000000180)={{0x3, r10, r11, r13, r7, 0x42, 0x7}, 0x803ff, 0x2, 0xfffffffffffffffd, 0x0, r14, r15, 0x5}) shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000840)={{0x0, r2, r7, 0x0, r5, 0x50}, 0xd7, 0xfffffffffffffffe, 0x1000, 0x8000, r6}) r17 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000280)='/dev/nullb0\x00', 0x4400, 0x0) preadv(r17, &(0x7f0000000040)=[{&(0x7f0000000400)=""/4096, 0x3ffc00}], 0x1, 0x0) 00:55:24 executing program 3: setsockopt$pppl2tp_PPPOL2TP_SO_DEBUG(0xffffffffffffffff, 0x111, 0x1, 0x7fffffff, 0x4) r0 = socket$pppoe(0x18, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x2, @link_local, 'team0\x00'}}, 0x1e) r1 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r1, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {0x7118, 0x3}, {0xffffffff}, {0x1}, {}, 0x0, 0x0, 0x0, 0x0, 0x1, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}) r2 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_IPV6_PKTINFO(r2, 0x29, 0x32, &(0x7f0000000240)={@mcast2}, 0x14) r3 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r3, 0x10f, 0x87, &(0x7f0000265000)=@req={0x0, 0x0, 0x2}, 0x10) connect(r2, &(0x7f0000001680)=@can, 0x80) 00:55:24 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) pipe(0x0) wait4(0x0, 0x0, 0x40000000, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000265000)=@req={0x0, 0x400, 0x2}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000740)={{{@in=@multicast2, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@broadcast}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route(r1, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=@ipv4_getnetconf={0x54, 0x52, 0x10, 0x70bd25, 0x25dfdbfd, {}, [@NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x1}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x9}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x5}, @NETCONFA_FORWARDING={0x8, 0x2, 0x8}, @NETCONFA_IFINDEX={0x8, 0x1, r2}, @NETCONFA_RP_FILTER={0x8}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x3}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0xe9}]}, 0x54}, 0x1, 0x0, 0x0, 0x3400c080}, 0x40) read(0xffffffffffffffff, &(0x7f0000000280)=""/152, 0x20000318) openat$procfs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/keys\x00', 0x0, 0x0) r3 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r3, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) write$binfmt_elf64(r3, &(0x7f00000003c0)={{0x7f, 0x45, 0x4c, 0x46, 0x6, 0x81, 0x35, 0x4, 0x1, 0x59ad6aa4a884dd63, 0x3, 0x0, 0x13d, 0x40, 0x26e, 0x8000, 0x1f, 0x38, 0x1, 0x8, 0x8, 0x3}, [{0x6, 0x3, 0xefa, 0x1, 0x81, 0x80000000, 0x0, 0x9}, {0x7, 0x2, 0x7ff, 0xfff, 0x1, 0x4, 0x0, 0x800b}], "5ad165d3d87709dd80c73c9fa8b6ef39a345e1b2327e38197c13f3be9248c0f2161632606ce45b5c7d7349c883946ca190a061f77e1020dc808b86b4e3c7b2a6128e2d3b16a4ec69ad8c276d1a038ddc59bd46a7a37061ed24ba41f62de7aaf1c073c43333bee7ed0979404acecab631d46b591f921ec0a584aeb912342ff4f104ff960a3563460c943d11952c88bd0d13a69a425793b6f7d2b09cf17c87cdc331f63c983436cef6888b1a8328e953b0b3bade3aabbfc4818a05af", [[]]}, 0x26b) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_open_procfs(0x0, &(0x7f0000000000)='timers\x00') 00:55:24 executing program 5: socket$pppoe(0x18, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x600, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {0xffffffff}, {0x1}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}) 00:55:25 executing program 3: r0 = socket$pppoe(0x18, 0x1, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r1, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) ioctl$KVM_ASSIGN_SET_MSIX_NR(r1, 0x4008ae73, &(0x7f00000000c0)={0x8, 0xb802}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x2, @link_local, 'team0\x00'}}, 0x1e) r2 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) socket(0x8, 0x4, 0x0) ioctl$FBIOPUT_VSCREENINFO(r2, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {0x0, 0x3}, {0xffffffff}, {0x1}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) r3 = semget$private(0x0, 0x0, 0x10c) semctl$SETALL(r3, 0x0, 0x11, &(0x7f0000000100)=[0x40, 0x4, 0x5, 0x1ff, 0x3]) 00:55:25 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) pipe(0x0) wait4(0x0, 0x0, 0x40000000, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000265000)=@req={0x0, 0x400}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000740)={{{@in=@multicast2, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@broadcast}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route(r1, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=@ipv4_getnetconf={0x54, 0x52, 0x10, 0x70bd25, 0x25dfdbfd, {}, [@NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x1}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x9}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x5}, @NETCONFA_FORWARDING={0x8, 0x2, 0x8}, @NETCONFA_IFINDEX={0x8, 0x1, r2}, @NETCONFA_RP_FILTER={0x8, 0x3, 0x7fff}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x3}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0xe9}]}, 0x54}, 0x1, 0x0, 0x0, 0x3400c080}, 0x40) read(0xffffffffffffffff, &(0x7f0000000280)=""/152, 0x20000318) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/keys\x00', 0x0, 0x0) r4 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r4, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) write$binfmt_elf64(r4, &(0x7f00000003c0)={{0x7f, 0x45, 0x4c, 0x46, 0x6, 0x81, 0x35, 0x4, 0x1, 0x59ad6aa4a884dd63, 0x3, 0x0, 0x13d, 0x40, 0x26e, 0x8000, 0x1f, 0x38, 0x1, 0x8, 0x8, 0x3}, [{0x6, 0x3, 0xefa, 0x1, 0x81, 0x80000000, 0x0, 0x9}, {0x7, 0x2, 0x7ff, 0x0, 0x1, 0x4, 0x0, 0x800b}], "5ad165d3d87709dd80c73c9fa8b6ef39a345e1b2327e38197c13f3be9248c0f2161632606ce45b5c7d7349c883946ca190a061f77e1020dc808b86b4e3c7b2a6128e2d3b16a4ec69ad8c276d1a038ddc59bd46a7a37061ed24ba41f62de7aaf1c073c43333bee7ed0979404acecab631d46b591f921ec0a584aeb912342ff4f104ff960a3563460c943d11952c88bd0d13a69a425793b6f7d2b09cf17c87cdc331f63c983436cef6888b1a8328e953b0b3bade3aabbfc4818a05af", [[]]}, 0x26b) read(r3, &(0x7f0000000280)=""/152, 0x20000318) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x280800, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$DRM_IOCTL_MODE_SETCRTC(0xffffffffffffffff, 0xc06864a2, &(0x7f0000000000)={0x0, 0x0, 0x20}) 00:55:26 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) pipe(0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=@ipv4_getnetconf={0x3c, 0x52, 0x10, 0x70bd25, 0x25dfdbfd, {}, [@NETCONFA_PROXY_NEIGH={0x8}, @NETCONFA_IFINDEX={0x8}, @NETCONFA_RP_FILTER={0x8}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x3}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0xe9}]}, 0x3c}, 0x1, 0x0, 0x0, 0x3400c080}, 0x40) r1 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r1, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) write$binfmt_elf64(r1, &(0x7f00000003c0)={{0x7f, 0x45, 0x4c, 0x46, 0x6, 0x81, 0x35, 0x4, 0x1, 0x59ad6aa4a884dd63, 0x3, 0x0, 0x13d, 0x40, 0x26e, 0x8000, 0x1f, 0x38, 0x1, 0x8, 0x4, 0x3}, [{0x6, 0x3, 0xefa, 0x1, 0x81, 0x80000000, 0x0, 0x9}, {0x7, 0x1, 0x7ff, 0xfff, 0x3, 0x4, 0x0, 0x800b}], "5ad165d3d87709dd80c73c9fa8b6ef39a345e1b2327e38197c13f3be9248c0f2161632606ce45b5c7d7349c883946ca190a061f77e1020dc808b86b4e3c7b2a6128e2d3b16a4ec69ad8c276d1a038ddc59bd46a7a37061ed24ba41f62de7aaf1c073c43333bee7ed0979404acecab631d46b591f921ec0a584aeb912342ff4f104ff960a3563460c943d11952c88bd0d13a69a425793b6f7d2b09cf17c87cdc331f63c983436cef6888b1a8328e953b0b3bade3aabbfc4818a05af", [[]]}, 0x26b) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_open_procfs(0x0, &(0x7f0000000000)='timers\x00') 00:55:26 executing program 5: socket$pppoe(0x18, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x700, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {0xffffffff}, {0x1}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}) 00:55:26 executing program 3: r0 = socket$pppoe(0x18, 0x1, 0x0) r1 = socket(0x1e, 0x4, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r2, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) ioctl$SNDRV_PCM_IOCTL_STATUS_EXT64(r2, 0xc0984124, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000265000)=@req={0x0, 0x0, 0x2}, 0x10) getsockopt$PNPIPE_IFINDEX(r1, 0x113, 0x2, &(0x7f00000000c0), &(0x7f0000000100)=0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x2, @link_local, 'team0\x00'}}, 0x1e) r3 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r3, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {0x0, 0x3}, {0xffffffff}, {0x1}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) 00:55:26 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) pipe(0x0) wait4(0x0, 0x0, 0x40000000, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000265000)=@req={0x0, 0x400, 0x2}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000740)={{{@in=@multicast2, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@broadcast}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route(r1, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=@ipv4_getnetconf={0x54, 0x52, 0x10, 0x70bd25, 0x25dfdbfd, {}, [@NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x1}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x9}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x5}, @NETCONFA_FORWARDING={0x8, 0x2, 0x8}, @NETCONFA_IFINDEX={0x8, 0x1, r2}, @NETCONFA_RP_FILTER={0x8}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x3}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0xe9}]}, 0x54}, 0x1, 0x0, 0x0, 0x3400c080}, 0x40) read(0xffffffffffffffff, &(0x7f0000000280)=""/152, 0x20000318) openat$procfs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/keys\x00', 0x0, 0x0) r3 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r3, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) write$binfmt_elf64(r3, &(0x7f00000003c0)={{0x7f, 0x45, 0x4c, 0x46, 0x6, 0x81, 0x35, 0x4, 0x1, 0x59ad6aa4a884dd63, 0x3, 0x0, 0x13d, 0x40, 0x26e, 0x8000, 0x1f, 0x38, 0x1, 0x8, 0x8, 0x3}, [{0x6, 0x3, 0xefa, 0x1, 0x81, 0x80000000, 0x0, 0x9}, {0x7, 0x2, 0x7ff, 0xfff, 0x1, 0x4, 0x0, 0x800b}], "5ad165d3d87709dd80c73c9fa8b6ef39a345e1b2327e38197c13f3be9248c0f2161632606ce45b5c7d7349c883946ca190a061f77e1020dc808b86b4e3c7b2a6128e2d3b16a4ec69ad8c276d1a038ddc59bd46a7a37061ed24ba41f62de7aaf1c073c43333bee7ed0979404acecab631d46b591f921ec0a584aeb912342ff4f104ff960a3563460c943d11952c88bd0d13a69a425793b6f7d2b09cf17c87cdc331f63c983436cef6888b1a8328e953b0b3bade3aabbfc4818a05af", [[]]}, 0x26b) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_open_procfs(0x0, &(0x7f0000000000)='timers\x00') 00:55:26 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) stat(&(0x7f0000000240)='./file0/file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(0xffffffffffffffff, &(0x7f0000001b80)) socket(0x11, 0x2, 0x5) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r4, 0x1, 0x14, &(0x7f0000000040), 0x50) getsockopt$IP6T_SO_GET_ENTRIES(r4, 0x29, 0x41, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)=0x1) fsetxattr$trusted_overlay_redirect(r3, &(0x7f0000000200)='trusted.overlay.redirect\x00', &(0x7f0000000280)='./file0/file0\x00', 0xe, 0x0) getsockname$tipc(0xffffffffffffffff, 0x0, &(0x7f0000000080)) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000001400)={{0x1, 0x0, @identifier="8e0f03f7e12b88d1af81f7c5a6bb175f"}, 0x67, [], "ed760111b8363e2de90692d0bc7e0a89824d3c77730403363ce0521cdcb1973b558cbd01ebf95bd9529fe3c5a95dcf31792e3e463d875b955a13582aeaddf6af34a98934ad6944b87292af67aec51fd37bd761db93cf6623d8683956791c956c97d76a9fd8df5d"}) lstat(&(0x7f0000000000)='./file0/file0\x00', &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000100)=0x0) r7 = getegid() r8 = socket$inet_tcp(0x2, 0x1, 0x0) r9 = fcntl$dupfd(r8, 0x0, r8) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) setresuid(r10, r10, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003ec0)={0x0, 0x0, 0x0}, 0x0) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, r11) r12 = openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$DRM_IOCTL_AGP_INFO(r12, 0x80386433, &(0x7f0000000bc0)=""/4096) getsockopt$sock_cred(r12, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0x194) setresuid(r13, r13, 0x0) r14 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r15 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r15, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) waitid(0x1, r15, &(0x7f0000000100), 0x80000004, &(0x7f0000000180)) r16 = shmget$private(0x0, 0x3000, 0x20, &(0x7f0000ffa000/0x3000)=nil) shmctl$SHM_STAT_ANY(r16, 0xf, &(0x7f0000000540)=""/221) shmctl$IPC_SET(r16, 0x1, &(0x7f0000000180)={{0x3, r10, r11, r13, r7, 0x42, 0x7}, 0x803ff, 0x2, 0xfffffffffffffffd, 0x0, r14, r15, 0x5}) shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000840)={{0x0, r2, r7, 0x0, r5, 0x50}, 0xd7, 0xfffffffffffffffe, 0x1000, 0x8000, r6}) r17 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000280)='/dev/nullb0\x00', 0x4400, 0x0) preadv(r17, &(0x7f0000000040)=[{&(0x7f0000000400)=""/4096, 0x3ffc00}], 0x1, 0x0) 00:55:26 executing program 5: socket$pppoe(0x18, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x2000, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {0xffffffff}, {0x1}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}) 00:55:26 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) r0 = getpid() lstat(&(0x7f0000000100)='./file0\x00', &(0x7f0000000280)) sched_setscheduler(r0, 0x5, &(0x7f0000000380)) pipe(0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=@ipv4_getnetconf={0x3c, 0x52, 0x10, 0x70bd25, 0x25dfdbfd, {}, [@NETCONFA_PROXY_NEIGH={0x8}, @NETCONFA_IFINDEX={0x8}, @NETCONFA_RP_FILTER={0x8}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x3}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0xe9}]}, 0x3c}, 0x1, 0x0, 0x0, 0x3400c080}, 0x40) r1 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r1, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) write$binfmt_elf64(r1, &(0x7f00000003c0)={{0x7f, 0x45, 0x4c, 0x46, 0x6, 0x81, 0x35, 0x4, 0x1, 0x59ad6aa4a884dd63, 0x3, 0x0, 0x13d, 0x40, 0x26e, 0x8000, 0x1f, 0x38, 0x1, 0x8, 0x8, 0x3}, [{0x6, 0x3, 0xefa, 0x1, 0x81, 0x80000000, 0x0, 0x9}, {0x7, 0x2, 0x7ff, 0xfff, 0x1, 0x4, 0x0, 0x800b}], "5ad165d3d87709dd80c73c9fa8b6ef39a345e1b2327e38197c13f3be9248c0f2161632606ce45b5c7d7349c883946ca190a061f77e1020dc808b86b4e3c7b2a6128e2d3b16a4ec69ad8c276d1a038ddc59bd46a7a37061ed24ba41f62de7aaf1c073c43333bee7ed0979404acecab631d46b591f921ec0a584aeb912342ff4f104ff960a3563460c943d11952c88bd0d13a69a425793b6f7d2b09cf17c87cdc331f63c983436cef6888b1a8328e953b0b3bade3aabbfc4818a05af", [[]]}, 0x26b) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = getpid() syz_open_procfs(r2, &(0x7f0000000200)='net/igmp6\x00') 00:55:26 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) pipe(0x0) wait4(0x0, 0x0, 0x40000000, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000265000)=@req={0x0, 0x400}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000740)={{{@in=@multicast2, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@broadcast}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route(r1, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=@ipv4_getnetconf={0x54, 0x52, 0x10, 0x70bd25, 0x25dfdbfd, {}, [@NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x1}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x9}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x5}, @NETCONFA_FORWARDING={0x8, 0x2, 0x8}, @NETCONFA_IFINDEX={0x8, 0x1, r2}, @NETCONFA_RP_FILTER={0x8, 0x3, 0x7fff}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x3}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0xe9}]}, 0x54}, 0x1, 0x0, 0x0, 0x3400c080}, 0x40) read(0xffffffffffffffff, &(0x7f0000000280)=""/152, 0x20000318) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/keys\x00', 0x0, 0x0) r4 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r4, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) write$binfmt_elf64(r4, &(0x7f00000003c0)={{0x7f, 0x45, 0x4c, 0x46, 0x6, 0x81, 0x35, 0x4, 0x1, 0x59ad6aa4a884dd63, 0x3, 0x0, 0x13d, 0x40, 0x26e, 0x8000, 0x1f, 0x38, 0x1, 0x8, 0x8, 0x3}, [{0x6, 0x3, 0xefa, 0x1, 0x81, 0x80000000, 0x0, 0x9}, {0x7, 0x2, 0x7ff, 0xfff, 0x0, 0x4, 0x0, 0x800b}], "5ad165d3d87709dd80c73c9fa8b6ef39a345e1b2327e38197c13f3be9248c0f2161632606ce45b5c7d7349c883946ca190a061f77e1020dc808b86b4e3c7b2a6128e2d3b16a4ec69ad8c276d1a038ddc59bd46a7a37061ed24ba41f62de7aaf1c073c43333bee7ed0979404acecab631d46b591f921ec0a584aeb912342ff4f104ff960a3563460c943d11952c88bd0d13a69a425793b6f7d2b09cf17c87cdc331f63c983436cef6888b1a8328e953b0b3bade3aabbfc4818a05af", [[]]}, 0x26b) read(r3, &(0x7f0000000280)=""/152, 0x20000318) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x280800, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$DRM_IOCTL_MODE_SETCRTC(0xffffffffffffffff, 0xc06864a2, &(0x7f0000000000)={0x0, 0x0, 0x20}) 00:55:27 executing program 5: socket$pppoe(0x18, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x3f00, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {0xffffffff}, {0x1}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}) 00:55:27 executing program 3: r0 = socket$pppoe(0x18, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x2, @link_local, 'team0\x00'}}, 0x1e) r1 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r2, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f00000002c0)={0x0, 0x0}) ptrace(0x10, r3) ioctl$FBIOPUT_VSCREENINFO(r1, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {0x0, 0x3}, {0xffffffff}, {0x1}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) 00:55:27 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) pipe(0x0) wait4(0x0, 0x0, 0x40000000, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000265000)=@req={0x0, 0x400, 0x2}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000740)={{{@in=@multicast2, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@broadcast}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route(r1, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=@ipv4_getnetconf={0x54, 0x52, 0x10, 0x70bd25, 0x25dfdbfd, {}, [@NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x1}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x9}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x5}, @NETCONFA_FORWARDING={0x8, 0x2, 0x8}, @NETCONFA_IFINDEX={0x8, 0x1, r2}, @NETCONFA_RP_FILTER={0x8}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x3}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0xe9}]}, 0x54}, 0x1, 0x0, 0x0, 0x3400c080}, 0x40) read(0xffffffffffffffff, &(0x7f0000000280)=""/152, 0x20000318) openat$procfs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/keys\x00', 0x0, 0x0) r3 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r3, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) write$binfmt_elf64(r3, &(0x7f00000003c0)={{0x7f, 0x45, 0x4c, 0x46, 0x6, 0x81, 0x35, 0x4, 0x1, 0x59ad6aa4a884dd63, 0x3, 0x0, 0x13d, 0x40, 0x26e, 0x8000, 0x1f, 0x38, 0x1, 0x8, 0x8, 0x3}, [{0x6, 0x3, 0xefa, 0x1, 0x81, 0x80000000, 0x0, 0x9}, {0x7, 0x2, 0x7ff, 0xfff, 0x1, 0x4, 0x0, 0x800b}], "5ad165d3d87709dd80c73c9fa8b6ef39a345e1b2327e38197c13f3be9248c0f2161632606ce45b5c7d7349c883946ca190a061f77e1020dc808b86b4e3c7b2a6128e2d3b16a4ec69ad8c276d1a038ddc59bd46a7a37061ed24ba41f62de7aaf1c073c43333bee7ed0979404acecab631d46b591f921ec0a584aeb912342ff4f104ff960a3563460c943d11952c88bd0d13a69a425793b6f7d2b09cf17c87cdc331f63c983436cef6888b1a8328e953b0b3bade3aabbfc4818a05af", [[]]}, 0x26b) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_open_procfs(0x0, &(0x7f0000000000)='timers\x00') 00:55:27 executing program 5: socket$pppoe(0x18, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x4000, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {0xffffffff}, {0x1}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}) 00:55:27 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) pipe(0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[@ANYBLOB="3c0000005200100025bd7000fddbdf0600080005000000000008000100", @ANYRES32=0x0, @ANYBLOB="0800030000000000080006000300000008000500e9000000000000"], 0x3c}, 0x1, 0x0, 0x0, 0x3400c080}, 0x40) r1 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r1, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) sched_setscheduler(0xffffffffffffffff, 0x1, &(0x7f0000000100)=0xd591) write$binfmt_elf64(r1, &(0x7f00000003c0)={{0x7f, 0x45, 0x4c, 0x46, 0x6, 0x81, 0x35, 0x4, 0x1, 0x59ad6aa4a884dd63, 0x3, 0x0, 0x13d, 0x40, 0x26e, 0x8000, 0x1f, 0x38, 0x1, 0x8, 0x8, 0x3}, [{0x6, 0x3, 0xefa, 0x1, 0x81, 0x80000000, 0x0, 0x9}, {0x7, 0x2, 0x7ff, 0xfff, 0x1, 0x4, 0x0, 0x800b}], "5ad165d3d87709dd80c73c9fa8b6ef39a345e1b2327e38197c13f3be9248c0f2161632606ce45b5c7d7349c883946ca190a061f77e1020dc808b86b4e3c7b2a6128e2d3b16a4ec69ad8c276d1a038ddc59bd46a7a37061ed24ba41f62de7aaf1c073c43333bee7ed0979404acecab631d46b591f921ec0a584aeb912342ff4f104ff960a3563460c943d11952c88bd0d13a69a425793b6f7d2b09cf17c87cdc331f63c983436cef6888b1a8328e953b0b3bade3aabbfc4818a05af", [[]]}, 0x26b) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_open_procfs(0x0, &(0x7f0000000000)='timers\x00') 00:55:27 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) pipe(0x0) wait4(0x0, 0x0, 0x40000000, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000265000)=@req={0x0, 0x400}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000740)={{{@in=@multicast2, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@broadcast}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route(r1, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=@ipv4_getnetconf={0x54, 0x52, 0x10, 0x70bd25, 0x25dfdbfd, {}, [@NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x1}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x9}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x5}, @NETCONFA_FORWARDING={0x8, 0x2, 0x8}, @NETCONFA_IFINDEX={0x8, 0x1, r2}, @NETCONFA_RP_FILTER={0x8, 0x3, 0x7fff}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x3}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0xe9}]}, 0x54}, 0x1, 0x0, 0x0, 0x3400c080}, 0x40) read(0xffffffffffffffff, &(0x7f0000000280)=""/152, 0x20000318) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/keys\x00', 0x0, 0x0) r4 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r4, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) write$binfmt_elf64(r4, &(0x7f00000003c0)={{0x7f, 0x45, 0x4c, 0x46, 0x6, 0x81, 0x35, 0x4, 0x1, 0x59ad6aa4a884dd63, 0x3, 0x0, 0x13d, 0x40, 0x26e, 0x8000, 0x1f, 0x38, 0x1, 0x8, 0x8, 0x3}, [{0x6, 0x3, 0xefa, 0x1, 0x81, 0x80000000, 0x0, 0x9}, {0x7, 0x2, 0x7ff, 0xfff, 0x0, 0x4, 0x0, 0x800b}], "5ad165d3d87709dd80c73c9fa8b6ef39a345e1b2327e38197c13f3be9248c0f2161632606ce45b5c7d7349c883946ca190a061f77e1020dc808b86b4e3c7b2a6128e2d3b16a4ec69ad8c276d1a038ddc59bd46a7a37061ed24ba41f62de7aaf1c073c43333bee7ed0979404acecab631d46b591f921ec0a584aeb912342ff4f104ff960a3563460c943d11952c88bd0d13a69a425793b6f7d2b09cf17c87cdc331f63c983436cef6888b1a8328e953b0b3bade3aabbfc4818a05af", [[]]}, 0x26b) read(r3, &(0x7f0000000280)=""/152, 0x20000318) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x280800, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$DRM_IOCTL_MODE_SETCRTC(0xffffffffffffffff, 0xc06864a2, &(0x7f0000000000)={0x0, 0x0, 0x20}) 00:55:27 executing program 3: r0 = socket$pppoe(0x18, 0x1, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x80, 0x0) ioctl$IMDELTIMER(r1, 0x80044941, &(0x7f0000000200)) connect$pppoe(r0, &(0x7f00000000c0)={0x18, 0x0, {0x4, @dev={[], 0x1b}, 'batadv0\x00'}}, 0x1e) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x2, @link_local, 'team0\x00'}}, 0x1e) r2 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) r3 = openat$vimc1(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video1\x00', 0x2, 0x0) ioctl$VIDIOC_SUBDEV_S_FRAME_INTERVAL(r3, 0xc0305616, &(0x7f0000000140)={0x0, {0x2, 0xdd4}}) ioctl$FBIOPUT_VSCREENINFO(r2, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {0x0, 0x3}, {0xffffffff}, {0x1}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) 00:55:27 executing program 5: socket$pppoe(0x18, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0xff01, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {0xffffffff}, {0x1}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}) 00:55:27 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) stat(&(0x7f0000000240)='./file0/file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(0xffffffffffffffff, &(0x7f0000001b80)) socket(0x11, 0x2, 0x5) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r4, 0x1, 0x14, &(0x7f0000000040), 0x50) getsockopt$IP6T_SO_GET_ENTRIES(r4, 0x29, 0x41, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)=0x1) fsetxattr$trusted_overlay_redirect(r3, &(0x7f0000000200)='trusted.overlay.redirect\x00', &(0x7f0000000280)='./file0/file0\x00', 0xe, 0x0) getsockname$tipc(0xffffffffffffffff, 0x0, &(0x7f0000000080)) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000001400)={{0x1, 0x0, @identifier="8e0f03f7e12b88d1af81f7c5a6bb175f"}, 0x67, [], "ed760111b8363e2de90692d0bc7e0a89824d3c77730403363ce0521cdcb1973b558cbd01ebf95bd9529fe3c5a95dcf31792e3e463d875b955a13582aeaddf6af34a98934ad6944b87292af67aec51fd37bd761db93cf6623d8683956791c956c97d76a9fd8df5d"}) lstat(&(0x7f0000000000)='./file0/file0\x00', &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000100)=0x0) r7 = getegid() r8 = socket$inet_tcp(0x2, 0x1, 0x0) r9 = fcntl$dupfd(r8, 0x0, r8) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) setresuid(r10, r10, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003ec0)={0x0, 0x0, 0x0}, 0x0) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, r11) r12 = openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$DRM_IOCTL_AGP_INFO(r12, 0x80386433, &(0x7f0000000bc0)=""/4096) getsockopt$sock_cred(r12, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0x194) setresuid(r13, r13, 0x0) r14 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r15 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r15, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) waitid(0x1, r15, &(0x7f0000000100), 0x80000004, &(0x7f0000000180)) r16 = shmget$private(0x0, 0x3000, 0x20, &(0x7f0000ffa000/0x3000)=nil) shmctl$SHM_STAT_ANY(r16, 0xf, &(0x7f0000000540)=""/221) shmctl$IPC_SET(r16, 0x1, &(0x7f0000000180)={{0x3, r10, r11, r13, r7, 0x42, 0x7}, 0x803ff, 0x2, 0xfffffffffffffffd, 0x0, r14, r15, 0x5}) shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000840)={{0x0, r2, r7, 0x0, r5, 0x50}, 0xd7, 0xfffffffffffffffe, 0x1000, 0x8000, r6}) r17 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000280)='/dev/nullb0\x00', 0x4400, 0x0) preadv(r17, &(0x7f0000000040)=[{&(0x7f0000000400)=""/4096, 0x3ffc00}], 0x1, 0x0) 00:55:28 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) pipe(0x0) wait4(0x0, 0x0, 0x40000000, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000265000)=@req={0x0, 0x400, 0x2}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000740)={{{@in=@multicast2, @in6=@dev}}, {{@in6=@initdev}, 0x0, @in=@broadcast}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route(r1, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=@ipv4_getnetconf={0x4c, 0x52, 0x10, 0x70bd25, 0x25dfdbfd, {}, [@NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x1}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x9}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x5}, @NETCONFA_FORWARDING={0x8, 0x2, 0x8}, @NETCONFA_RP_FILTER={0x8, 0x3, 0x7fff}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x3}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0xe9}]}, 0x4c}, 0x1, 0x0, 0x0, 0x3400c080}, 0x40) read(0xffffffffffffffff, &(0x7f0000000280)=""/152, 0x20000318) openat$procfs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/keys\x00', 0x0, 0x0) r2 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r2, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) write$binfmt_elf64(r2, &(0x7f00000003c0)={{0x7f, 0x45, 0x4c, 0x46, 0x6, 0x81, 0x35, 0x4, 0x1, 0x59ad6aa4a884dd63, 0x3, 0x0, 0x13d, 0x40, 0x26e, 0x8000, 0x1f, 0x38, 0x1, 0x8, 0x8, 0x3}, [{0x6, 0x3, 0xefa, 0x1, 0x81, 0x80000000, 0x0, 0x9}, {0x7, 0x2, 0x7ff, 0xfff, 0x1, 0x4, 0x0, 0x800b}], "5ad165d3d87709dd80c73c9fa8b6ef39a345e1b2327e38197c13f3be9248c0f2161632606ce45b5c7d7349c883946ca190a061f77e1020dc808b86b4e3c7b2a6128e2d3b16a4ec69ad8c276d1a038ddc59bd46a7a37061ed24ba41f62de7aaf1c073c43333bee7ed0979404acecab631d46b591f921ec0a584aeb912342ff4f104ff960a3563460c943d11952c88bd0d13a69a425793b6f7d2b09cf17c87cdc331f63c983436cef6888b1a8328e953b0b3bade3aabbfc4818a05af", [[]]}, 0x26b) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_open_procfs(0x0, &(0x7f0000000000)='timers\x00') 00:55:28 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) pipe(0x0) wait4(0x0, 0x0, 0x40000000, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000265000)=@req={0x0, 0x400}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000740)={{{@in=@multicast2, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@broadcast}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route(r1, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=@ipv4_getnetconf={0x54, 0x52, 0x10, 0x70bd25, 0x25dfdbfd, {}, [@NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x1}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x9}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x5}, @NETCONFA_FORWARDING={0x8, 0x2, 0x8}, @NETCONFA_IFINDEX={0x8, 0x1, r2}, @NETCONFA_RP_FILTER={0x8, 0x3, 0x7fff}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x3}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0xe9}]}, 0x54}, 0x1, 0x0, 0x0, 0x3400c080}, 0x40) read(0xffffffffffffffff, &(0x7f0000000280)=""/152, 0x20000318) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/keys\x00', 0x0, 0x0) r4 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r4, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) write$binfmt_elf64(r4, &(0x7f00000003c0)={{0x7f, 0x45, 0x4c, 0x46, 0x6, 0x81, 0x35, 0x4, 0x1, 0x59ad6aa4a884dd63, 0x3, 0x0, 0x13d, 0x40, 0x26e, 0x8000, 0x1f, 0x38, 0x1, 0x8, 0x8, 0x3}, [{0x6, 0x3, 0xefa, 0x1, 0x81, 0x80000000, 0x0, 0x9}, {0x7, 0x2, 0x7ff, 0xfff, 0x0, 0x4, 0x0, 0x800b}], "5ad165d3d87709dd80c73c9fa8b6ef39a345e1b2327e38197c13f3be9248c0f2161632606ce45b5c7d7349c883946ca190a061f77e1020dc808b86b4e3c7b2a6128e2d3b16a4ec69ad8c276d1a038ddc59bd46a7a37061ed24ba41f62de7aaf1c073c43333bee7ed0979404acecab631d46b591f921ec0a584aeb912342ff4f104ff960a3563460c943d11952c88bd0d13a69a425793b6f7d2b09cf17c87cdc331f63c983436cef6888b1a8328e953b0b3bade3aabbfc4818a05af", [[]]}, 0x26b) read(r3, &(0x7f0000000280)=""/152, 0x20000318) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x280800, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$DRM_IOCTL_MODE_SETCRTC(0xffffffffffffffff, 0xc06864a2, &(0x7f0000000000)={0x0, 0x0, 0x20}) 00:55:28 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) pipe(0x0) wait4(0x0, 0x0, 0x40000000, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000265000)=@req={0x0, 0x400}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000740)={{{@in=@multicast2, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@broadcast}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route(r1, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=@ipv4_getnetconf={0x54, 0x52, 0x10, 0x70bd25, 0x25dfdbfd, {}, [@NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x1}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x9}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x5}, @NETCONFA_FORWARDING={0x8, 0x2, 0x8}, @NETCONFA_IFINDEX={0x8, 0x1, r2}, @NETCONFA_RP_FILTER={0x8, 0x3, 0x7fff}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x3}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0xe9}]}, 0x54}, 0x1, 0x0, 0x0, 0x3400c080}, 0x40) read(0xffffffffffffffff, &(0x7f0000000280)=""/152, 0x20000318) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/keys\x00', 0x0, 0x0) r4 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r4, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) write$binfmt_elf64(r4, &(0x7f00000003c0)={{0x7f, 0x45, 0x4c, 0x46, 0x6, 0x81, 0x35, 0x4, 0x1, 0x59ad6aa4a884dd63, 0x3, 0x0, 0x13d, 0x40, 0x26e, 0x8000, 0x1f, 0x38, 0x1, 0x8, 0x8, 0x3}, [{0x6, 0x3, 0xefa, 0x1, 0x81, 0x80000000, 0x0, 0x9}, {0x7, 0x2, 0x7ff, 0xfff, 0x1, 0x0, 0x0, 0x800b}], "5ad165d3d87709dd80c73c9fa8b6ef39a345e1b2327e38197c13f3be9248c0f2161632606ce45b5c7d7349c883946ca190a061f77e1020dc808b86b4e3c7b2a6128e2d3b16a4ec69ad8c276d1a038ddc59bd46a7a37061ed24ba41f62de7aaf1c073c43333bee7ed0979404acecab631d46b591f921ec0a584aeb912342ff4f104ff960a3563460c943d11952c88bd0d13a69a425793b6f7d2b09cf17c87cdc331f63c983436cef6888b1a8328e953b0b3bade3aabbfc4818a05af", [[]]}, 0x26b) read(r3, &(0x7f0000000280)=""/152, 0x20000318) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x280800, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$DRM_IOCTL_MODE_SETCRTC(0xffffffffffffffff, 0xc06864a2, &(0x7f0000000000)={0x0, 0x0, 0x20}) 00:55:28 executing program 5: socket$pppoe(0x18, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x1000000, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {0xffffffff}, {0x1}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}) 00:55:28 executing program 3: r0 = socket$pppoe(0x18, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x2, @link_local, 'team0\x00'}}, 0x1e) r1 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) r2 = syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x6, 0x109041) ioctl$SNDRV_PCM_IOCTL_STATUS64(r2, 0x80984120, &(0x7f00000001c0)) ioctl$FBIOPUT_VSCREENINFO(r1, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {0x0, 0x3}, {0xffffffff}, {0x1}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) 00:55:28 executing program 0: r0 = getuid() r1 = getegid() r2 = socket$inet_tcp(0x2, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) setresuid(r4, r4, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003ec0)={0x0, 0x0, 0x0}, 0x0) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, r5) r6 = openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$DRM_IOCTL_AGP_INFO(r6, 0x80386433, &(0x7f0000000bc0)=""/4096) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0x194) setresuid(r7, r7, 0x0) r8 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r9 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r9, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) waitid(0x1, r9, &(0x7f0000000100), 0x80000004, &(0x7f0000000180)) r10 = shmget$private(0x0, 0x3000, 0x20, &(0x7f0000ffa000/0x3000)=nil) shmctl$SHM_STAT_ANY(r10, 0xf, &(0x7f0000000540)=""/221) shmctl$IPC_SET(r10, 0x1, &(0x7f0000000180)={{0x3, r4, r5, r7, r1, 0x42, 0x7}, 0x803ff, 0x2, 0xfffffffffffffffd, 0x0, r8, r9, 0x5}) lchown(&(0x7f0000000100)='./file0\x00', r0, r5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) r11 = getpid() sched_setscheduler(r11, 0x5, &(0x7f0000000380)) pipe(0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=@ipv4_getnetconf={0x3c, 0x52, 0x10, 0x70bd25, 0x25dfdbfd, {}, [@NETCONFA_PROXY_NEIGH={0x8}, @NETCONFA_IFINDEX={0x8}, @NETCONFA_RP_FILTER={0x8}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x3}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0xe9}]}, 0x3c}, 0x1, 0x0, 0x0, 0x3400c080}, 0x40) r12 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r12, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) write$binfmt_elf64(r12, &(0x7f00000003c0)={{0x7f, 0x45, 0x4c, 0x46, 0x6, 0x81, 0x35, 0x4, 0x1, 0x59ad6aa4a884dd63, 0x3, 0x0, 0x13d, 0x40, 0x26e, 0x8000, 0x1f, 0x38, 0x1, 0x8, 0x8, 0x3}, [{0x6, 0x3, 0xefa, 0x1, 0x81, 0x80000000, 0x0, 0x9}, {0x7, 0x2, 0x7ff, 0xfff, 0x1, 0x4, 0x0, 0x800b}], "5ad165d3d87709dd80c73c9fa8b6ef39a345e1b2327e38197c13f3be9248c0f2161632606ce45b5c7d7349c883946ca190a061f77e1020dc808b86b4e3c7b2a6128e2d3b16a4ec69ad8c276d1a038ddc59bd46a7a37061ed24ba41f62de7aaf1c073c43333bee7ed0979404acecab631d46b591f921ec0a584aeb912342ff4f104ff960a3563460c943d11952c88bd0d13a69a425793b6f7d2b09cf17c87cdc331f63c983436cef6888b1a8328e953b0b3bade3aabbfc4818a05af", [[]]}, 0x26b) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_open_procfs(0x0, &(0x7f0000000000)='timers\x00') 00:55:29 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) pipe(0x0) wait4(0x0, 0x0, 0x40000000, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000265000)=@req={0x0, 0x400, 0x2}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000740)={{{@in=@multicast2, @in6=@dev}}, {{@in6=@initdev}, 0x0, @in=@broadcast}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route(r1, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=@ipv4_getnetconf={0x4c, 0x52, 0x10, 0x70bd25, 0x25dfdbfd, {}, [@NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x1}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x9}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x5}, @NETCONFA_FORWARDING={0x8, 0x2, 0x8}, @NETCONFA_RP_FILTER={0x8, 0x3, 0x7fff}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x3}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0xe9}]}, 0x4c}, 0x1, 0x0, 0x0, 0x3400c080}, 0x40) read(0xffffffffffffffff, &(0x7f0000000280)=""/152, 0x20000318) openat$procfs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/keys\x00', 0x0, 0x0) r2 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r2, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) write$binfmt_elf64(r2, &(0x7f00000003c0)={{0x7f, 0x45, 0x4c, 0x46, 0x6, 0x81, 0x35, 0x4, 0x1, 0x59ad6aa4a884dd63, 0x3, 0x0, 0x13d, 0x40, 0x26e, 0x8000, 0x1f, 0x38, 0x1, 0x8, 0x8, 0x3}, [{0x6, 0x3, 0xefa, 0x1, 0x81, 0x80000000, 0x0, 0x9}, {0x7, 0x2, 0x7ff, 0xfff, 0x1, 0x4, 0x0, 0x800b}], "5ad165d3d87709dd80c73c9fa8b6ef39a345e1b2327e38197c13f3be9248c0f2161632606ce45b5c7d7349c883946ca190a061f77e1020dc808b86b4e3c7b2a6128e2d3b16a4ec69ad8c276d1a038ddc59bd46a7a37061ed24ba41f62de7aaf1c073c43333bee7ed0979404acecab631d46b591f921ec0a584aeb912342ff4f104ff960a3563460c943d11952c88bd0d13a69a425793b6f7d2b09cf17c87cdc331f63c983436cef6888b1a8328e953b0b3bade3aabbfc4818a05af", [[]]}, 0x26b) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_open_procfs(0x0, &(0x7f0000000000)='timers\x00') 00:55:29 executing program 5: socket$pppoe(0x18, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x2000000, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {0xffffffff}, {0x1}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}) 00:55:29 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) stat(&(0x7f0000000240)='./file0/file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(0xffffffffffffffff, &(0x7f0000001b80)) socket(0x11, 0x2, 0x5) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r4, 0x1, 0x14, &(0x7f0000000040), 0x50) getsockopt$IP6T_SO_GET_ENTRIES(r4, 0x29, 0x41, &(0x7f0000000480)=ANY=[@ANYBLOB="6e2f740000edffffffffffffff00000000000000000000000000000000000000ad0000005086f3915e59ad8184af4045c4e742fa881d66411baabaa82dda6d71f825249ec2eb0ad398766b6b870bba11fc00df87700a78319e5f5d955a5eb0f50e2dcd95623e3eba93f21d4733f6d4834e398f5ba4540b18afc3c2a92ff6e4a89dc029fdd87fc0c2ca637f5ead98feb48d1bfe6451a583e519234bd5297e8a8bf569ff90077ba1cef2ea64c8f027947915a33e26b9d8b4fb56ba4d86df286c34e0cd9715e6b39dcccf4eb92a1706ed98b4aafd220eecfac13859aaab4dc07cd467149066f2f637c1e58f02faf49d72752753fe6beceb9d14b1ab3832cab4d59f892cb6f3689b67eaf81e929525a7fe0f2ea0892194387f7d085ea12c8842b8790911042b2a48b65c40087bd66593e0cfc29843b29738147ea75bb6c3d9664dc189fca97c43ed585ebb0c2a03782d916c709f6fdeca72784a8ac21d3ff8c9551290ea0000000000000049d4bb98580f9f7b7da060b127fd66ae6ad3c8753701b37ed619b2ed3efe8621"], &(0x7f0000000340)=0x1) fsetxattr$trusted_overlay_redirect(r3, &(0x7f0000000200)='trusted.overlay.redirect\x00', &(0x7f0000000280)='./file0/file0\x00', 0xe, 0x0) getsockname$tipc(0xffffffffffffffff, 0x0, &(0x7f0000000080)) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000001400)={{0x1, 0x0, @identifier="8e0f03f7e12b88d1af81f7c5a6bb175f"}, 0x67, [], "ed760111b8363e2de90692d0bc7e0a89824d3c77730403363ce0521cdcb1973b558cbd01ebf95bd9529fe3c5a95dcf31792e3e463d875b955a13582aeaddf6af34a98934ad6944b87292af67aec51fd37bd761db93cf6623d8683956791c956c97d76a9fd8df5d"}) lstat(&(0x7f0000000000)='./file0/file0\x00', &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000100)=0x0) r7 = getegid() r8 = socket$inet_tcp(0x2, 0x1, 0x0) r9 = fcntl$dupfd(r8, 0x0, r8) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) setresuid(r10, r10, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003ec0)={0x0, 0x0, 0x0}, 0x0) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, r11) r12 = openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$DRM_IOCTL_AGP_INFO(r12, 0x80386433, &(0x7f0000000bc0)=""/4096) getsockopt$sock_cred(r12, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0x194) setresuid(r13, r13, 0x0) r14 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r15 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r15, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) waitid(0x1, r15, &(0x7f0000000100), 0x80000004, &(0x7f0000000180)) r16 = shmget$private(0x0, 0x3000, 0x20, &(0x7f0000ffa000/0x3000)=nil) shmctl$SHM_STAT_ANY(r16, 0xf, &(0x7f0000000540)=""/221) shmctl$IPC_SET(r16, 0x1, &(0x7f0000000180)={{0x3, r10, r11, r13, r7, 0x42, 0x7}, 0x803ff, 0x2, 0xfffffffffffffffd, 0x0, r14, r15, 0x5}) shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000840)={{0x0, r2, r7, 0x0, r5, 0x50}, 0xd7, 0xfffffffffffffffe, 0x1000, 0x8000, r6}) r17 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000280)='/dev/nullb0\x00', 0x4400, 0x0) preadv(r17, &(0x7f0000000040)=[{&(0x7f0000000400)=""/4096, 0x3ffc00}], 0x1, 0x0) 00:55:29 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) pipe(0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[@ANYBLOB="3c0000005200100025bd7000fddbdf2502080005000000000008000100", @ANYRES32=0x0, @ANYBLOB="080003b6c1ebfc1908fdd35afc69ad78370f00000500000000060003000008000500e900000000bc683e853c43d3deaccd07266e6ce6000000"], 0x3c}, 0x1, 0x0, 0x0, 0x3400c080}, 0x40) r1 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r1, 0x4601, &(0x7f0000000000)={0x1e0, 0x280, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {0x0, 0xffffffff}, {}, {}, {0x7fff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x4}) write$binfmt_elf64(r1, &(0x7f00000003c0)={{0x7f, 0x45, 0x4c, 0x46, 0x6, 0x81, 0x35, 0x4, 0x1, 0x59ad6aa4a884dd65, 0x3, 0x0, 0x13d, 0x40, 0x26e, 0x8000, 0x1f, 0x38, 0x1, 0x8, 0x8, 0x3}, [{0x6, 0x3, 0xefa, 0x1, 0x81, 0x80000000, 0x0, 0x9}, {0x7, 0x2, 0x7ff, 0xfff, 0x1, 0x4, 0x0, 0x800b}], "5ad165d3d87709dd80c73c9fa8b6ef39a345e1b2327e38197c13f3be9248c0f2161632606ce45b5c7d7349c883946ca190a061f77e1020dc808b86b4e3c7b2a6128e2d3b16a4ec69ad8c276d1a038ddc59bd46a7a37061ed24ba41f62de7aaf1c073c43333bee7ed0979404acecab631d46b591f921ec0a584aeb912342ff4f104ff960a3563460c943d11952c88bd0d13a69a425793b6f7d2b09cf17c87cdc331f63c983436cef6888b1a8328e953b0b3bade3aabbfc4818a05af", [[]]}, 0x26b) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_open_procfs(0x0, &(0x7f0000000000)='timers\x00') 00:55:29 executing program 3: r0 = socket$pppoe(0x18, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x2, @link_local, 'team0\x00'}}, 0x1e) r1 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000265000)=@req={0x0, 0x0, 0x2}, 0x10) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r1, 0x84, 0x23, &(0x7f00000000c0)={0x0, 0x4}, 0x8) r2 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r2, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {0x0, 0x3}, {0xffffffff}, {0x1}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) 00:55:30 executing program 5: socket$pppoe(0x18, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x3000000, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {0xffffffff}, {0x1}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}) 00:55:30 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) pipe(0x0) wait4(0x0, 0x0, 0x40000000, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000265000)=@req={0x0, 0x400, 0x2}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000740)={{{@in=@multicast2, @in6=@dev}}, {{@in6=@initdev}, 0x0, @in=@broadcast}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route(r1, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=@ipv4_getnetconf={0x4c, 0x52, 0x10, 0x70bd25, 0x25dfdbfd, {}, [@NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x1}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x9}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x5}, @NETCONFA_FORWARDING={0x8, 0x2, 0x8}, @NETCONFA_RP_FILTER={0x8, 0x3, 0x7fff}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x3}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0xe9}]}, 0x4c}, 0x1, 0x0, 0x0, 0x3400c080}, 0x40) read(0xffffffffffffffff, &(0x7f0000000280)=""/152, 0x20000318) openat$procfs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/keys\x00', 0x0, 0x0) r2 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r2, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) write$binfmt_elf64(r2, &(0x7f00000003c0)={{0x7f, 0x45, 0x4c, 0x46, 0x6, 0x81, 0x35, 0x4, 0x1, 0x59ad6aa4a884dd63, 0x3, 0x0, 0x13d, 0x40, 0x26e, 0x8000, 0x1f, 0x38, 0x1, 0x8, 0x8, 0x3}, [{0x6, 0x3, 0xefa, 0x1, 0x81, 0x80000000, 0x0, 0x9}, {0x7, 0x2, 0x7ff, 0xfff, 0x1, 0x4, 0x0, 0x800b}], "5ad165d3d87709dd80c73c9fa8b6ef39a345e1b2327e38197c13f3be9248c0f2161632606ce45b5c7d7349c883946ca190a061f77e1020dc808b86b4e3c7b2a6128e2d3b16a4ec69ad8c276d1a038ddc59bd46a7a37061ed24ba41f62de7aaf1c073c43333bee7ed0979404acecab631d46b591f921ec0a584aeb912342ff4f104ff960a3563460c943d11952c88bd0d13a69a425793b6f7d2b09cf17c87cdc331f63c983436cef6888b1a8328e953b0b3bade3aabbfc4818a05af", [[]]}, 0x26b) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_open_procfs(0x0, &(0x7f0000000000)='timers\x00') 00:55:30 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) pipe(0x0) wait4(0x0, 0x0, 0x40000000, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000265000)=@req={0x0, 0x400}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000740)={{{@in=@multicast2, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@broadcast}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route(r1, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=@ipv4_getnetconf={0x54, 0x52, 0x10, 0x70bd25, 0x25dfdbfd, {}, [@NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x1}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x9}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x5}, @NETCONFA_FORWARDING={0x8, 0x2, 0x8}, @NETCONFA_IFINDEX={0x8, 0x1, r2}, @NETCONFA_RP_FILTER={0x8, 0x3, 0x7fff}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x3}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0xe9}]}, 0x54}, 0x1, 0x0, 0x0, 0x3400c080}, 0x40) read(0xffffffffffffffff, &(0x7f0000000280)=""/152, 0x20000318) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/keys\x00', 0x0, 0x0) r4 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r4, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) write$binfmt_elf64(r4, &(0x7f00000003c0)={{0x7f, 0x45, 0x4c, 0x46, 0x6, 0x81, 0x35, 0x4, 0x1, 0x59ad6aa4a884dd63, 0x3, 0x0, 0x13d, 0x40, 0x26e, 0x8000, 0x1f, 0x38, 0x1, 0x8, 0x8, 0x3}, [{0x6, 0x3, 0xefa, 0x1, 0x81, 0x80000000, 0x0, 0x9}, {0x7, 0x2, 0x7ff, 0xfff, 0x1, 0x0, 0x0, 0x800b}], "5ad165d3d87709dd80c73c9fa8b6ef39a345e1b2327e38197c13f3be9248c0f2161632606ce45b5c7d7349c883946ca190a061f77e1020dc808b86b4e3c7b2a6128e2d3b16a4ec69ad8c276d1a038ddc59bd46a7a37061ed24ba41f62de7aaf1c073c43333bee7ed0979404acecab631d46b591f921ec0a584aeb912342ff4f104ff960a3563460c943d11952c88bd0d13a69a425793b6f7d2b09cf17c87cdc331f63c983436cef6888b1a8328e953b0b3bade3aabbfc4818a05af", [[]]}, 0x26b) read(r3, &(0x7f0000000280)=""/152, 0x20000318) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x280800, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$DRM_IOCTL_MODE_SETCRTC(0xffffffffffffffff, 0xc06864a2, &(0x7f0000000000)={0x0, 0x0, 0x20}) 00:55:30 executing program 5: socket$pppoe(0x18, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x4000000, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {0xffffffff}, {0x1}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}) 00:55:30 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) pipe(0x0) wait4(0x0, 0x0, 0x40000000, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000265000)=@req={0x0, 0x400, 0x2}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000740)={{{@in=@multicast2, @in6=@dev}}, {{@in6=@initdev}, 0x0, @in=@broadcast}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route(r1, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=@ipv4_getnetconf={0x54, 0x52, 0x10, 0x70bd25, 0x25dfdbfd, {}, [@NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x1}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x9}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x5}, @NETCONFA_FORWARDING={0x8, 0x2, 0x8}, @NETCONFA_IFINDEX={0x8}, @NETCONFA_RP_FILTER={0x8, 0x3, 0x7fff}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x3}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0xe9}]}, 0x54}, 0x1, 0x0, 0x0, 0x3400c080}, 0x40) read(0xffffffffffffffff, &(0x7f0000000280)=""/152, 0x20000318) openat$procfs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/keys\x00', 0x0, 0x0) r2 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r2, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) write$binfmt_elf64(r2, &(0x7f00000003c0)={{0x7f, 0x45, 0x4c, 0x46, 0x6, 0x81, 0x35, 0x4, 0x1, 0x59ad6aa4a884dd63, 0x3, 0x0, 0x13d, 0x40, 0x26e, 0x8000, 0x1f, 0x38, 0x1, 0x8, 0x8, 0x3}, [{0x6, 0x3, 0xefa, 0x1, 0x81, 0x80000000, 0x0, 0x9}, {0x7, 0x2, 0x7ff, 0xfff, 0x1, 0x4, 0x0, 0x800b}], "5ad165d3d87709dd80c73c9fa8b6ef39a345e1b2327e38197c13f3be9248c0f2161632606ce45b5c7d7349c883946ca190a061f77e1020dc808b86b4e3c7b2a6128e2d3b16a4ec69ad8c276d1a038ddc59bd46a7a37061ed24ba41f62de7aaf1c073c43333bee7ed0979404acecab631d46b591f921ec0a584aeb912342ff4f104ff960a3563460c943d11952c88bd0d13a69a425793b6f7d2b09cf17c87cdc331f63c983436cef6888b1a8328e953b0b3bade3aabbfc4818a05af", [[]]}, 0x26b) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_open_procfs(0x0, &(0x7f0000000000)='timers\x00') 00:55:30 executing program 3: r0 = socket$pppoe(0x18, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000265000)=@req={0x0, 0x0, 0x2}, 0x10) connect$pppoe(r1, &(0x7f00000000c0)={0x18, 0x0, {0x0, @random="b181c7b4da9a", 'bridge0\x00'}}, 0x1e) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x2, @link_local, 'team0\x00'}}, 0x1e) r2 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDDELIO(r3, 0x4b35, 0x9) ioctl$FBIOPUT_VSCREENINFO(r2, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {0x0, 0x3}, {0xffffffff}, {0x1}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) chroot(&(0x7f0000000100)='./file0\x00') 00:55:30 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) pipe(0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f0000000640)=ANY=[@ANYBLOB="3c00f4c6697f00000000000000dbdf250208000500000000000800010045e71f15b11a5ed1b5b7b652961ee4dcbf3fba0e9769371a222f48085117d5daf54d5cf53e971e7d1e259c6991c39b3b9d0c7510edbb7c9691e94e7ec351bcf951d33e632f2daabdaaebc5e311ffc39a6f3b1e058b2a56b93ca6a2f399952b985ad789b46301bfdbd8336ee004623bfc220f10e6087ea9bb6709805914967d7bfe164a657ffec0b4585d355aed8364c3ba8b39f73221339b0ee90d073d58824c30b1244ae3d089", @ANYRES32=0x0, @ANYBLOB="0800030000000000080006000300000008000500e9000000000000"], 0x3c}, 0x1, 0x0, 0x0, 0x3400c080}, 0x40) r1 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r1, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) write$binfmt_elf64(r1, &(0x7f00000003c0)={{0x7f, 0x45, 0x4c, 0x46, 0x6, 0x81, 0x35, 0x4, 0x1, 0x59ad6aa4a884dd63, 0x3, 0x0, 0x13d, 0x40, 0x26e, 0x8000, 0x1f, 0x38, 0x1, 0x8, 0x8, 0x3}, [{0x6, 0x3, 0xefa, 0x1, 0x81, 0x80000000, 0x0, 0x9}, {0x7, 0x2, 0x7ff, 0xfff, 0x1, 0x4, 0x0, 0x800b}], "5ad165d3d87709dd80c73c9fa8b6ef39a345e1b2327e38197c13f3be9248c0f2161632606ce45b5c7d7349c883946ca190a061f77e1020dc808b86b4e3c7b2a6128e2d3b16a4ec69ad8c276d1a038ddc59bd46a7a37061ed24ba41f62de7aaf1c073c43333bee7ed0979404acecab631d46b591f921ec0a584aeb912342ff4f104ff960a3563460c943d11952c88bd0d13a69a425793b6f7d2b09cf17c87cdc331f63c983436cef6888b1a8328e953b0b3bade3aabbfc4818a05af", [[]]}, 0x26b) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_open_procfs(0x0, &(0x7f0000000000)='timers\x00') 00:55:30 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) stat(&(0x7f0000000240)='./file0/file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(0xffffffffffffffff, &(0x7f0000001b80)) socket(0x11, 0x2, 0x5) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r4, 0x1, 0x14, &(0x7f0000000040), 0x50) getsockopt$IP6T_SO_GET_ENTRIES(r4, 0x29, 0x41, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)=0x1) fsetxattr$trusted_overlay_redirect(r3, &(0x7f0000000200)='trusted.overlay.redirect\x00', &(0x7f0000000280)='./file0/file0\x00', 0xe, 0x0) getsockname$tipc(0xffffffffffffffff, 0x0, &(0x7f0000000080)) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000001400)={{0x1, 0x0, @identifier="8e0f03f7e12b88d1af81f7c5a6bb175f"}, 0x67, [], "ed760111b8363e2de90692d0bc7e0a89824d3c77730403363ce0521cdcb1973b558cbd01ebf95bd9529fe3c5a95dcf31792e3e463d875b955a13582aeaddf6af34a98934ad6944b87292af67aec51fd37bd761db93cf6623d8683956791c956c97d76a9fd8df5d"}) lstat(&(0x7f0000000000)='./file0/file0\x00', &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000100)=0x0) r7 = getegid() r8 = socket$inet_tcp(0x2, 0x1, 0x0) r9 = fcntl$dupfd(r8, 0x0, r8) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) setresuid(r10, r10, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003ec0)={0x0, 0x0, 0x0}, 0x0) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, r11) r12 = openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$DRM_IOCTL_AGP_INFO(r12, 0x80386433, &(0x7f0000000bc0)=""/4096) getsockopt$sock_cred(r12, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0x194) setresuid(r13, r13, 0x0) r14 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r15 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r15, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) waitid(0x1, r15, &(0x7f0000000100), 0x80000004, &(0x7f0000000180)) r16 = shmget$private(0x0, 0x3000, 0x20, &(0x7f0000ffa000/0x3000)=nil) shmctl$SHM_STAT_ANY(r16, 0xf, &(0x7f0000000540)=""/221) shmctl$IPC_SET(r16, 0x1, &(0x7f0000000180)={{0x3, r10, r11, r13, r7, 0x42, 0x7}, 0x803ff, 0x2, 0xfffffffffffffffd, 0x0, r14, r15, 0x5}) shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000840)={{0x0, r2, r7, 0x0, r5, 0x50}, 0xd7, 0xfffffffffffffffe, 0x1000, 0x8000, r6}) r17 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000280)='/dev/nullb0\x00', 0x4400, 0x0) preadv(r17, &(0x7f0000000040)=[{&(0x7f0000000400)=""/4096, 0x3ffc00}], 0x1, 0x0) 00:55:31 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) pipe(0x0) wait4(0x0, 0x0, 0x40000000, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000265000)=@req={0x0, 0x400}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000740)={{{@in=@multicast2, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@broadcast}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route(r1, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=@ipv4_getnetconf={0x54, 0x52, 0x10, 0x70bd25, 0x25dfdbfd, {}, [@NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x1}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x9}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x5}, @NETCONFA_FORWARDING={0x8, 0x2, 0x8}, @NETCONFA_IFINDEX={0x8, 0x1, r2}, @NETCONFA_RP_FILTER={0x8, 0x3, 0x7fff}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x3}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0xe9}]}, 0x54}, 0x1, 0x0, 0x0, 0x3400c080}, 0x40) read(0xffffffffffffffff, &(0x7f0000000280)=""/152, 0x20000318) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/keys\x00', 0x0, 0x0) r4 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r4, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) write$binfmt_elf64(r4, &(0x7f00000003c0)={{0x7f, 0x45, 0x4c, 0x46, 0x6, 0x81, 0x35, 0x4, 0x1, 0x59ad6aa4a884dd63, 0x3, 0x0, 0x13d, 0x40, 0x26e, 0x8000, 0x1f, 0x38, 0x1, 0x8, 0x8, 0x3}, [{0x6, 0x3, 0xefa, 0x1, 0x81, 0x80000000, 0x0, 0x9}, {0x7, 0x2, 0x7ff, 0xfff, 0x1, 0x0, 0x0, 0x800b}], "5ad165d3d87709dd80c73c9fa8b6ef39a345e1b2327e38197c13f3be9248c0f2161632606ce45b5c7d7349c883946ca190a061f77e1020dc808b86b4e3c7b2a6128e2d3b16a4ec69ad8c276d1a038ddc59bd46a7a37061ed24ba41f62de7aaf1c073c43333bee7ed0979404acecab631d46b591f921ec0a584aeb912342ff4f104ff960a3563460c943d11952c88bd0d13a69a425793b6f7d2b09cf17c87cdc331f63c983436cef6888b1a8328e953b0b3bade3aabbfc4818a05af", [[]]}, 0x26b) read(r3, &(0x7f0000000280)=""/152, 0x20000318) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x280800, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$DRM_IOCTL_MODE_SETCRTC(0xffffffffffffffff, 0xc06864a2, &(0x7f0000000000)={0x0, 0x0, 0x20}) 00:55:31 executing program 5: socket$pppoe(0x18, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x5000000, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {0xffffffff}, {0x1}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}) 00:55:31 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) r1 = dup3(0xffffffffffffffff, r0, 0x80000) setsockopt$TIPC_MCAST_REPLICAST(r1, 0x10f, 0x86) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) pipe(0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=@ipv4_getnetconf={0x3c, 0x52, 0x10, 0x70bd25, 0x25dfdbfd, {}, [@NETCONFA_PROXY_NEIGH={0x8}, @NETCONFA_IFINDEX={0x8}, @NETCONFA_RP_FILTER={0x8}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x3}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0xe9}]}, 0x3c}, 0x1, 0x0, 0x0, 0x3400c080}, 0x40) r3 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r3, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) write$binfmt_elf64(r3, &(0x7f00000003c0)={{0x7f, 0x45, 0x4c, 0x46, 0x6, 0x81, 0x35, 0x4, 0x1, 0x59ad6aa4a884dd63, 0x3, 0x0, 0x13d, 0x40, 0x26e, 0x8000, 0x1f, 0x38, 0x1, 0x8, 0x8, 0x3}, [{0x6, 0x3, 0xefa, 0x1, 0x81, 0x80000000, 0x0, 0x9}, {0x7, 0x2, 0x7ff, 0xfff, 0x1, 0x4, 0x0, 0x800b}], "5ad165d3d87709dd80c73c9fa8b6ef39a345e1b2327e38197c13f3be9248c0f2161632606ce45b5c7d7349c883946ca190a061f77e1020dc808b86b4e3c7b2a6128e2d3b16a4ec69ad8c276d1a038ddc59bd46a7a37061ed24ba41f62de7aaf1c073c43333bee7ed0979404acecab631d46b591f921ec0a584aeb912342ff4f104ff960a3563460c943d11952c88bd0d13a69a425793b6f7d2b09cf17c87cdc331f63c983436cef6888b1a8328e953b0b3bade3aabbfc4818a05af", [[]]}, 0x26b) r4 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r4, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) ioctl$TUNSETTXFILTER(r4, 0x400454d1, &(0x7f0000000100)={0x1, 0x4, [@dev={[], 0x27}, @multicast, @empty, @empty]}) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_open_procfs(0x0, &(0x7f0000000000)='timers\x00') 00:55:31 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) stat(&(0x7f0000000240)='./file0/file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(0xffffffffffffffff, &(0x7f0000001b80)) socket(0x11, 0x2, 0x5) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r4, 0x1, 0x14, &(0x7f0000000040), 0x50) getsockopt$IP6T_SO_GET_ENTRIES(r4, 0x29, 0x41, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)=0x1) fsetxattr$trusted_overlay_redirect(r3, &(0x7f0000000200)='trusted.overlay.redirect\x00', &(0x7f0000000280)='./file0/file0\x00', 0xe, 0x0) getsockname$tipc(0xffffffffffffffff, 0x0, &(0x7f0000000080)) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000001400)={{0x1, 0x0, @identifier="8e0f03f7e12b88d1af81f7c5a6bb175f"}, 0x67, [], "ed760111b8363e2de90692d0bc7e0a89824d3c77730403363ce0521cdcb1973b558cbd01ebf95bd9529fe3c5a95dcf31792e3e463d875b955a13582aeaddf6af34a98934ad6944b87292af67aec51fd37bd761db93cf6623d8683956791c956c97d76a9fd8df5d"}) lstat(&(0x7f0000000000)='./file0/file0\x00', &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000100)=0x0) r7 = getegid() r8 = socket$inet_tcp(0x2, 0x1, 0x0) r9 = fcntl$dupfd(r8, 0x0, r8) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) setresuid(r10, r10, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003ec0)={0x0, 0x0, 0x0}, 0x0) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, r11) r12 = openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$DRM_IOCTL_AGP_INFO(r12, 0x80386433, &(0x7f0000000bc0)=""/4096) getsockopt$sock_cred(r12, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0x194) setresuid(r13, r13, 0x0) r14 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r15 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r15, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) waitid(0x1, r15, &(0x7f0000000100), 0x80000004, &(0x7f0000000180)) r16 = shmget$private(0x0, 0x3000, 0x20, &(0x7f0000ffa000/0x3000)=nil) shmctl$SHM_STAT_ANY(r16, 0xf, &(0x7f0000000540)=""/221) shmctl$IPC_SET(r16, 0x1, &(0x7f0000000180)={{0x3, r10, r11, r13, r7, 0x42, 0x7}, 0x803ff, 0x2, 0xfffffffffffffffd, 0x0, r14, r15, 0x5}) shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000840)={{0x0, r2, r7, 0x0, r5, 0x50}, 0xd7, 0xfffffffffffffffe, 0x1000, 0x8000, r6}) r17 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000280)='/dev/nullb0\x00', 0x4400, 0x0) preadv(r17, &(0x7f0000000040)=[{&(0x7f0000000400)=""/4096, 0x3ffc00}], 0x1, 0x0) 00:55:31 executing program 5: socket$pppoe(0x18, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x6000000, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {0xffffffff}, {0x1}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}) 00:55:32 executing program 3: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) r1 = dup3(r0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_POWER_STATE(r1, 0x800455d1, &(0x7f0000000100)) r2 = socket$pppoe(0x18, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000007f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xfffffffffffffffd, 0x40}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r3, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) ioctl$KVM_GET_TSC_KHZ(r3, 0xaea3) connect$pppoe(r2, &(0x7f0000000000)={0x18, 0x0, {0x2, @link_local, 'team0\x00'}}, 0x1e) r4 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) r5 = eventfd(0x10000) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r5) setsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(0xffffffffffffffff, 0x84, 0x7, &(0x7f00000000c0)={0x400}, 0x4) ioctl$FBIOPUT_VSCREENINFO(r4, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x20, 0x0, 0x0, 0x4, 0x0, {0x0, 0x3, 0x2}, {0xffffffff}, {0x1, 0x6}, {0x0, 0x4}, 0x2, 0x0, 0x2, 0x0, 0x1, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x22615c67}) 00:55:32 executing program 5: socket$pppoe(0x18, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x7000000, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {0xffffffff}, {0x1}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}) 00:55:32 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) pipe(0x0) wait4(0x0, 0x0, 0x40000000, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000265000)=@req={0x0, 0x400, 0x2}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000740)={{{@in=@multicast2, @in6=@dev}}, {{@in6=@initdev}, 0x0, @in=@broadcast}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route(r1, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=@ipv4_getnetconf={0x54, 0x52, 0x10, 0x70bd25, 0x25dfdbfd, {}, [@NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x1}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x9}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x5}, @NETCONFA_FORWARDING={0x8, 0x2, 0x8}, @NETCONFA_IFINDEX={0x8}, @NETCONFA_RP_FILTER={0x8, 0x3, 0x7fff}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x3}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0xe9}]}, 0x54}, 0x1, 0x0, 0x0, 0x3400c080}, 0x40) read(0xffffffffffffffff, &(0x7f0000000280)=""/152, 0x20000318) openat$procfs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/keys\x00', 0x0, 0x0) r2 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r2, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) write$binfmt_elf64(r2, &(0x7f00000003c0)={{0x7f, 0x45, 0x4c, 0x46, 0x6, 0x81, 0x35, 0x4, 0x1, 0x59ad6aa4a884dd63, 0x3, 0x0, 0x13d, 0x40, 0x26e, 0x8000, 0x1f, 0x38, 0x1, 0x8, 0x8, 0x3}, [{0x6, 0x3, 0xefa, 0x1, 0x81, 0x80000000, 0x0, 0x9}, {0x7, 0x2, 0x7ff, 0xfff, 0x1, 0x4, 0x0, 0x800b}], "5ad165d3d87709dd80c73c9fa8b6ef39a345e1b2327e38197c13f3be9248c0f2161632606ce45b5c7d7349c883946ca190a061f77e1020dc808b86b4e3c7b2a6128e2d3b16a4ec69ad8c276d1a038ddc59bd46a7a37061ed24ba41f62de7aaf1c073c43333bee7ed0979404acecab631d46b591f921ec0a584aeb912342ff4f104ff960a3563460c943d11952c88bd0d13a69a425793b6f7d2b09cf17c87cdc331f63c983436cef6888b1a8328e953b0b3bade3aabbfc4818a05af", [[]]}, 0x26b) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_open_procfs(0x0, &(0x7f0000000000)='timers\x00') 00:55:32 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000001900)={&(0x7f0000ffc000/0x2000)=nil, 0x2000}, &(0x7f0000001940)=0x10) r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nvram\x00', 0x0, 0x0) sendmsg$tipc(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000001800)=[{&(0x7f0000000640)="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", 0x1000}, {&(0x7f0000000280)="d44d35e0df46ef7c1f8c741691da12b52816aa2e67d8a05e6a2b4d63e5af44111d5bfa921063e5a8e5f9272d203fff1b60a3d17b29da203cad015c4822dbd12257d4eeca9177", 0x46}, {&(0x7f0000000200)="1094c8519522caee68523c26f59bc1465f336f08768315ea3aba97ed93b348a411832d80c884037708368c09ea263371a06dbbec711969add13a4411", 0x3c}, {&(0x7f0000000300)="71f5c4", 0x3}, {&(0x7f0000001640)="e24f41f01503cfb5e1ecc96b8804a6448fec967b8d91a49e17b67a1ba1c41a6f2c12a4e11bd8192af591d9e8f56e5080bb66be0a3200873297169e933335e4160d6156f2cc8a4792f9c10be350f943f63008d41484db270471a53d1cdab95c93b159f7b8632feaebc27f7a381f07679ca28117efdd0d19f9a99286b3f019867f4c227389e993f52308d35f931f4137d2434646c91cba1a8c6c096f26fc0523cb35ed46fe5aa9b7522a0a6e3438ef41854545c7d26f62", 0xb6}, {&(0x7f0000001700)="3d2cc77fa9e5328719274e9b01e3e30e28c3a17ec4d905281fe053894828fef9ad10dfd3397b912be652ce773e039911f6e8f494eb304433fdd9ce859207c7828233302b74c83ac955d907fa14662378dd8e3b3c9d5aff73b2c40230c28e493d9322226c27e27ee67d12ea50310d01c592f841b6c6b874cdb4882218c3b451415b60960ea02f71c7e2b9888c39dfe113806d14c02cc67aa6b2c5323718f910366a51b93ffc6a94825b4f6cb7138402810fb24af0d7b172d37d17824269d3c3b7776a", 0xc2}], 0x6, &(0x7f0000001880)="08ee6dd8928206410af7fe00c92dd4eb260249052f4b392e841ad9acb81bd8e21d3f5bf00d2dbb19b83e6795f5d28111373fcc439fbf9fd23734dc7a660f19aa1cf66d7c8d0571243a7a98797c2e47a160795b675d", 0x55, 0x40004}, 0x16) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) pipe(0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=@ipv4_getnetconf={0x3c, 0x52, 0x10, 0x70bd25, 0x25dfdbfd, {}, [@NETCONFA_PROXY_NEIGH={0x8}, @NETCONFA_IFINDEX={0x8}, @NETCONFA_RP_FILTER={0x8}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x3}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0xe9}]}, 0x3c}, 0x1, 0x0, 0x0, 0x3400c080}, 0x40) r2 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r2, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) write$binfmt_elf64(r2, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"/606], 0x26b) r3 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r3, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000019c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000001980)={0xffffffffffffffff}, 0x2, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r3, &(0x7f0000001a00)={0xf, 0x8, 0xfa00, {r4, 0x9}}, 0x10) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_open_procfs(0x0, &(0x7f0000000000)='timers\x00') 00:55:32 executing program 3: r0 = socket$pppoe(0x18, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x2, @link_local, 'team0\x00'}}, 0x1e) r1 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/bsg\x00', 0x40000, 0x0) mq_notify(r2, &(0x7f0000000100)={0x0, 0x38, 0x2}) ioctl$FBIOPUT_VSCREENINFO(r1, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {0x0, 0x3}, {0xffffffff}, {0x1}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) 00:55:32 executing program 5: socket$pppoe(0x18, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x10000000, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {0xffffffff}, {0x1}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}) 00:55:33 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) stat(&(0x7f0000000240)='./file0/file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(0xffffffffffffffff, &(0x7f0000001b80)) socket(0x11, 0x2, 0x5) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r4, 0x1, 0x14, &(0x7f0000000040), 0x50) getsockopt$IP6T_SO_GET_ENTRIES(r4, 0x29, 0x41, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)=0x1) fsetxattr$trusted_overlay_redirect(r3, &(0x7f0000000200)='trusted.overlay.redirect\x00', &(0x7f0000000280)='./file0/file0\x00', 0xe, 0x0) getsockname$tipc(0xffffffffffffffff, 0x0, &(0x7f0000000080)) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000001400)={{0x1, 0x0, @identifier="8e0f03f7e12b88d1af81f7c5a6bb175f"}, 0x67, [], "ed760111b8363e2de90692d0bc7e0a89824d3c77730403363ce0521cdcb1973b558cbd01ebf95bd9529fe3c5a95dcf31792e3e463d875b955a13582aeaddf6af34a98934ad6944b87292af67aec51fd37bd761db93cf6623d8683956791c956c97d76a9fd8df5d"}) lstat(&(0x7f0000000000)='./file0/file0\x00', &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000100)=0x0) r7 = getegid() r8 = socket$inet_tcp(0x2, 0x1, 0x0) r9 = fcntl$dupfd(r8, 0x0, r8) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) setresuid(r10, r10, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003ec0)={0x0, 0x0, 0x0}, 0x0) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, r11) r12 = openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$DRM_IOCTL_AGP_INFO(r12, 0x80386433, &(0x7f0000000bc0)=""/4096) getsockopt$sock_cred(r12, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0x194) setresuid(r13, r13, 0x0) r14 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r15 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r15, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) waitid(0x1, r15, &(0x7f0000000100), 0x80000004, &(0x7f0000000180)) r16 = shmget$private(0x0, 0x3000, 0x20, &(0x7f0000ffa000/0x3000)=nil) shmctl$SHM_STAT_ANY(r16, 0xf, &(0x7f0000000540)=""/221) shmctl$IPC_SET(r16, 0x1, &(0x7f0000000180)={{0x3, r10, r11, r13, r7, 0x42, 0x7}, 0x803ff, 0x2, 0xfffffffffffffffd, 0x0, r14, r15, 0x5}) shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000840)={{0x0, r2, r7, 0x0, r5, 0x50}, 0xd7, 0xfffffffffffffffe, 0x1000, 0x8000, r6}) r17 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000280)='/dev/nullb0\x00', 0x4400, 0x0) preadv(r17, &(0x7f0000000040)=[{&(0x7f0000000400)=""/4096, 0x3ffc00}], 0x1, 0x0) 00:55:33 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) pipe(0x0) wait4(0x0, 0x0, 0x40000000, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000265000)=@req={0x0, 0x400}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000740)={{{@in=@multicast2, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@broadcast}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route(r1, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=@ipv4_getnetconf={0x54, 0x52, 0x10, 0x70bd25, 0x25dfdbfd, {}, [@NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x1}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x9}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x5}, @NETCONFA_FORWARDING={0x8, 0x2, 0x8}, @NETCONFA_IFINDEX={0x8, 0x1, r2}, @NETCONFA_RP_FILTER={0x8, 0x3, 0x7fff}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x3}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0xe9}]}, 0x54}, 0x1, 0x0, 0x0, 0x3400c080}, 0x40) read(0xffffffffffffffff, &(0x7f0000000280)=""/152, 0x20000318) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/keys\x00', 0x0, 0x0) r4 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r4, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) write$binfmt_elf64(r4, &(0x7f00000003c0)={{0x7f, 0x45, 0x4c, 0x46, 0x6, 0x81, 0x35, 0x4, 0x1, 0x59ad6aa4a884dd63, 0x3, 0x0, 0x13d, 0x40, 0x26e, 0x8000, 0x1f, 0x38, 0x1, 0x8, 0x8, 0x3}, [{0x6, 0x3, 0xefa, 0x1, 0x81, 0x80000000, 0x0, 0x9}, {0x7, 0x2, 0x7ff, 0xfff, 0x1, 0x4}], "5ad165d3d87709dd80c73c9fa8b6ef39a345e1b2327e38197c13f3be9248c0f2161632606ce45b5c7d7349c883946ca190a061f77e1020dc808b86b4e3c7b2a6128e2d3b16a4ec69ad8c276d1a038ddc59bd46a7a37061ed24ba41f62de7aaf1c073c43333bee7ed0979404acecab631d46b591f921ec0a584aeb912342ff4f104ff960a3563460c943d11952c88bd0d13a69a425793b6f7d2b09cf17c87cdc331f63c983436cef6888b1a8328e953b0b3bade3aabbfc4818a05af", [[]]}, 0x26b) read(r3, &(0x7f0000000280)=""/152, 0x20000318) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x280800, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$DRM_IOCTL_MODE_SETCRTC(0xffffffffffffffff, 0xc06864a2, &(0x7f0000000000)={0x0, 0x0, 0x20}) 00:55:33 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$get_keyring_id(0x0, 0x0, 0x5) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) pipe(0x0) r1 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r1, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r1, 0x6612) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=@ipv4_getnetconf={0x3c, 0x52, 0x10, 0x70bd25, 0x25dfdbfd, {}, [@NETCONFA_PROXY_NEIGH={0x8}, @NETCONFA_IFINDEX={0x8}, @NETCONFA_RP_FILTER={0x8}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x3}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0xe9}]}, 0x3c}, 0x1, 0x0, 0x0, 0x3400c080}, 0x40) r2 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r2, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) write$binfmt_elf64(r2, &(0x7f00000003c0)={{0x7f, 0x45, 0x4c, 0x46, 0x6, 0x81, 0x35, 0x4, 0x1, 0x59ad6aa4a884dd63, 0x3, 0x0, 0x13d, 0x40, 0x26e, 0x8000, 0x1f, 0x38, 0x1, 0x8, 0x8, 0x3}, [{0x6, 0x3, 0xefa, 0x1, 0x81, 0x80000000, 0x0, 0x9}, {0x7, 0x2, 0x7ff, 0xfff, 0x1, 0x4, 0x0, 0x800b}], "5ad165d3d87709dd80c73c9fa8b6ef39a345e1b2327e38197c13f3be9248c0f2161632606ce45b5c7d7349c883946ca190a061f77e1020dc808b86b4e3c7b2a6128e2d3b16a4ec69ad8c276d1a038ddc59bd46a7a37061ed24ba41f62de7aaf1c073c43333bee7ed0979404acecab631d46b591f921ec0a584aeb912342ff4f104ff960a3563460c943d11952c88bd0d13a69a425793b6f7d2b09cf17c87cdc331f63c983436cef6888b1a8328e953b0b3bade3aabbfc4818a05af", [[]]}, 0x26b) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_open_procfs(0x0, &(0x7f0000000000)='timers\x00') 00:55:33 executing program 5: socket$pppoe(0x18, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x20000000, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {0xffffffff}, {0x1}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}) 00:55:33 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) pipe(0x0) wait4(0x0, 0x0, 0x40000000, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000265000)=@req={0x0, 0x400, 0x2}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000740)={{{@in=@multicast2, @in6=@dev}}, {{@in6=@initdev}, 0x0, @in=@broadcast}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route(r1, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=@ipv4_getnetconf={0x54, 0x52, 0x10, 0x70bd25, 0x25dfdbfd, {}, [@NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x1}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x9}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x5}, @NETCONFA_FORWARDING={0x8, 0x2, 0x8}, @NETCONFA_IFINDEX={0x8}, @NETCONFA_RP_FILTER={0x8, 0x3, 0x7fff}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x3}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0xe9}]}, 0x54}, 0x1, 0x0, 0x0, 0x3400c080}, 0x40) read(0xffffffffffffffff, &(0x7f0000000280)=""/152, 0x20000318) openat$procfs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/keys\x00', 0x0, 0x0) r2 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r2, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) write$binfmt_elf64(r2, &(0x7f00000003c0)={{0x7f, 0x45, 0x4c, 0x46, 0x6, 0x81, 0x35, 0x4, 0x1, 0x59ad6aa4a884dd63, 0x3, 0x0, 0x13d, 0x40, 0x26e, 0x8000, 0x1f, 0x38, 0x1, 0x8, 0x8, 0x3}, [{0x6, 0x3, 0xefa, 0x1, 0x81, 0x80000000, 0x0, 0x9}, {0x7, 0x2, 0x7ff, 0xfff, 0x1, 0x4, 0x0, 0x800b}], "5ad165d3d87709dd80c73c9fa8b6ef39a345e1b2327e38197c13f3be9248c0f2161632606ce45b5c7d7349c883946ca190a061f77e1020dc808b86b4e3c7b2a6128e2d3b16a4ec69ad8c276d1a038ddc59bd46a7a37061ed24ba41f62de7aaf1c073c43333bee7ed0979404acecab631d46b591f921ec0a584aeb912342ff4f104ff960a3563460c943d11952c88bd0d13a69a425793b6f7d2b09cf17c87cdc331f63c983436cef6888b1a8328e953b0b3bade3aabbfc4818a05af", [[]]}, 0x26b) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_open_procfs(0x0, &(0x7f0000000000)='timers\x00') 00:55:33 executing program 3: r0 = socket$pppoe(0x18, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x2, @link_local, 'team0\x00'}}, 0x1e) r1 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r1, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {0x0, 0x3}, {0xffffffff}, {0x1}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) r2 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r2, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) vmsplice(r2, &(0x7f0000000140)=[{&(0x7f00000001c0)="e5e9173974fd2c4801e1b0461cc7f8a8ba6e3b6ccedb5a113d6403152aa4f6c65cd86f42713af5ef167b86c16e00821bd8a3bdd15b092d181018d6f225e6d392299583ebaa7e53b9b1c9abd8e2ca181051534e07b8dea4cc3677e917bf9cebb259e5fdd16d442311a9b50d49228209c435c48e297856a06de73564d5041337239f51f8e5c7a15369585557d84ed54458edb5487b216e032eb227af55dc59a8d69bc62dec2d8158cb7a0ff6de7ef93669501fa0d22031297ad7ea289b281eecdd945f24002576024a57478131", 0xcc}, {&(0x7f00000000c0)="fd8136f1e41943e25cf3875c2d36b35756f63c49b827940595b2b17c301f776b83ccc7449fefd5e6538a2d56ebd75438714487e084cf922299481e0dd963dcef9927767ad4fa8c1fa3d535a1a0184e2e1964b75fff9fa2830b14f6a6d8a199539d9f2b0b", 0x64}, {&(0x7f00000002c0)="6e8ea831e6d1c57d48f367337ef05c2d98db4da2cb751d2aec0d7fe4d93eaf8b92a6f8da265c6a71e3072bfd5a53d2d75c9d5d56f59b9b965a459aa017aacb7872cbeaec0fbe02249c3e46602c94f84d775daf99aeff829321", 0x59}], 0x3, 0x8) 00:55:33 executing program 5: socket$pppoe(0x18, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x3f000000, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {0xffffffff}, {0x1}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}) 00:55:34 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) pipe(0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=@ipv4_getnetconf={0x3c, 0x52, 0x10, 0x70bd25, 0x25dfdbfd, {}, [@NETCONFA_PROXY_NEIGH={0x8}, @NETCONFA_IFINDEX={0x8}, @NETCONFA_RP_FILTER={0x8}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x3}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0xe9}]}, 0x3c}, 0x1, 0x0, 0x0, 0x3400c080}, 0x40) r1 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r1, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) write$binfmt_elf64(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"/619], 0x26b) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dlm_plock\x00', 0x101000, 0x0) ioctl$KVM_GET_API_VERSION(r2, 0xae00, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='timers\x00') 00:55:34 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) pipe(0x0) wait4(0x0, 0x0, 0x40000000, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000265000)=@req={0x0, 0x400, 0x2}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000740)={{{@in=@multicast2, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@broadcast}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route(r1, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=@ipv4_getnetconf={0x4c, 0x52, 0x10, 0x70bd25, 0x25dfdbfd, {}, [@NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x1}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x9}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x5}, @NETCONFA_IFINDEX={0x8, 0x1, r2}, @NETCONFA_RP_FILTER={0x8, 0x3, 0x7fff}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x3}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0xe9}]}, 0x4c}, 0x1, 0x0, 0x0, 0x3400c080}, 0x40) read(0xffffffffffffffff, &(0x7f0000000280)=""/152, 0x20000318) openat$procfs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/keys\x00', 0x0, 0x0) r3 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r3, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) write$binfmt_elf64(r3, &(0x7f00000003c0)={{0x7f, 0x45, 0x4c, 0x46, 0x6, 0x81, 0x35, 0x4, 0x1, 0x59ad6aa4a884dd63, 0x3, 0x0, 0x13d, 0x40, 0x26e, 0x8000, 0x1f, 0x38, 0x1, 0x8, 0x8, 0x3}, [{0x6, 0x3, 0xefa, 0x1, 0x81, 0x80000000, 0x0, 0x9}, {0x7, 0x2, 0x7ff, 0xfff, 0x1, 0x4, 0x0, 0x800b}], "5ad165d3d87709dd80c73c9fa8b6ef39a345e1b2327e38197c13f3be9248c0f2161632606ce45b5c7d7349c883946ca190a061f77e1020dc808b86b4e3c7b2a6128e2d3b16a4ec69ad8c276d1a038ddc59bd46a7a37061ed24ba41f62de7aaf1c073c43333bee7ed0979404acecab631d46b591f921ec0a584aeb912342ff4f104ff960a3563460c943d11952c88bd0d13a69a425793b6f7d2b09cf17c87cdc331f63c983436cef6888b1a8328e953b0b3bade3aabbfc4818a05af", [[]]}, 0x26b) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_open_procfs(0x0, &(0x7f0000000000)='timers\x00') 00:55:34 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) pipe(0x0) wait4(0x0, 0x0, 0x40000000, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000265000)=@req={0x0, 0x400}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000740)={{{@in=@multicast2, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@broadcast}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route(r1, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=@ipv4_getnetconf={0x54, 0x52, 0x10, 0x70bd25, 0x25dfdbfd, {}, [@NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x1}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x9}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x5}, @NETCONFA_FORWARDING={0x8, 0x2, 0x8}, @NETCONFA_IFINDEX={0x8, 0x1, r2}, @NETCONFA_RP_FILTER={0x8, 0x3, 0x7fff}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x3}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0xe9}]}, 0x54}, 0x1, 0x0, 0x0, 0x3400c080}, 0x40) read(0xffffffffffffffff, &(0x7f0000000280)=""/152, 0x20000318) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/keys\x00', 0x0, 0x0) r4 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r4, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) write$binfmt_elf64(r4, &(0x7f00000003c0)={{0x7f, 0x45, 0x4c, 0x46, 0x6, 0x81, 0x35, 0x4, 0x1, 0x59ad6aa4a884dd63, 0x3, 0x0, 0x13d, 0x40, 0x26e, 0x8000, 0x1f, 0x38, 0x1, 0x8, 0x8, 0x3}, [{0x6, 0x3, 0xefa, 0x1, 0x81, 0x80000000, 0x0, 0x9}, {0x7, 0x2, 0x7ff, 0xfff, 0x1, 0x4}], "5ad165d3d87709dd80c73c9fa8b6ef39a345e1b2327e38197c13f3be9248c0f2161632606ce45b5c7d7349c883946ca190a061f77e1020dc808b86b4e3c7b2a6128e2d3b16a4ec69ad8c276d1a038ddc59bd46a7a37061ed24ba41f62de7aaf1c073c43333bee7ed0979404acecab631d46b591f921ec0a584aeb912342ff4f104ff960a3563460c943d11952c88bd0d13a69a425793b6f7d2b09cf17c87cdc331f63c983436cef6888b1a8328e953b0b3bade3aabbfc4818a05af", [[]]}, 0x26b) read(r3, &(0x7f0000000280)=""/152, 0x20000318) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x280800, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$DRM_IOCTL_MODE_SETCRTC(0xffffffffffffffff, 0xc06864a2, &(0x7f0000000000)={0x0, 0x0, 0x20}) 00:55:34 executing program 5: socket$pppoe(0x18, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x40000000, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {0xffffffff}, {0x1}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}) 00:55:34 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) stat(&(0x7f0000000240)='./file0/file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(0xffffffffffffffff, &(0x7f0000001b80)) socket(0x11, 0x2, 0x5) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r4, 0x1, 0x14, &(0x7f0000000040), 0x50) getsockopt$IP6T_SO_GET_ENTRIES(r4, 0x29, 0x41, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)=0x1) fsetxattr$trusted_overlay_redirect(r3, &(0x7f0000000200)='trusted.overlay.redirect\x00', &(0x7f0000000280)='./file0/file0\x00', 0xe, 0x0) getsockname$tipc(0xffffffffffffffff, 0x0, &(0x7f0000000080)) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000001400)={{0x1, 0x0, @identifier="8e0f03f7e12b88d1af81f7c5a6bb175f"}, 0x67, [], "ed760111b8363e2de90692d0bc7e0a89824d3c77730403363ce0521cdcb1973b558cbd01ebf95bd9529fe3c5a95dcf31792e3e463d875b955a13582aeaddf6af34a98934ad6944b87292af67aec51fd37bd761db93cf6623d8683956791c956c97d76a9fd8df5d"}) lstat(&(0x7f0000000000)='./file0/file0\x00', &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000100)=0x0) r7 = getegid() r8 = socket$inet_tcp(0x2, 0x1, 0x0) r9 = fcntl$dupfd(r8, 0x0, r8) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) setresuid(r10, r10, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003ec0)={0x0, 0x0, 0x0}, 0x0) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, r11) r12 = openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$DRM_IOCTL_AGP_INFO(r12, 0x80386433, &(0x7f0000000bc0)=""/4096) getsockopt$sock_cred(r12, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0x194) setresuid(r13, r13, 0x0) r14 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r15 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r15, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) waitid(0x1, r15, &(0x7f0000000100), 0x80000004, &(0x7f0000000180)) r16 = shmget$private(0x0, 0x3000, 0x20, &(0x7f0000ffa000/0x3000)=nil) shmctl$SHM_STAT_ANY(r16, 0xf, &(0x7f0000000540)=""/221) shmctl$IPC_SET(r16, 0x1, &(0x7f0000000180)={{0x3, r10, r11, r13, r7, 0x42, 0x7}, 0x803ff, 0x2, 0xfffffffffffffffd, 0x0, r14, r15, 0x5}) shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000840)={{0x0, r2, r7, 0x0, r5, 0x50}, 0xd7, 0xfffffffffffffffe, 0x1000, 0x8000, r6}) r17 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000280)='/dev/nullb0\x00', 0x4400, 0x0) preadv(r17, &(0x7f0000000040)=[{&(0x7f0000000400)=""/4096, 0x3ffc00}], 0x1, 0x0) 00:55:34 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x776d1f1b, 0x551}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) pipe(0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f0000000640)=ANY=[@ANYBLOB="3c0000005200100025bd7000fddbdf2502080005000000000008000100", @ANYRES32=0x0, @ANYBLOB="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"], 0x3c}, 0x1, 0x0, 0x0, 0x3400c080}, 0x40) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='pids.events\x00', 0x0, 0x0) ioctl$KDGETLED(r2, 0x4b31, &(0x7f0000000200)) migrate_pages(r1, 0x101787f7, &(0x7f0000000100)=0x52, &(0x7f00000001c0)=0x7) r3 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r3, 0x4601, &(0x7f0000000280)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, {}, {0xfffffffd}, {}, {0x20000000, 0xffffffff}, 0x0, 0x0, 0x0, 0x0, 0x1, 0xc0000000, 0x0, 0x0, 0x0, 0x0, 0xfc000000, 0x0, 0x0, 0x0, 0x2}) write$binfmt_elf64(r3, &(0x7f00000003c0)={{0x7f, 0x45, 0x4c, 0x46, 0x6, 0x81, 0x35, 0x4, 0x1, 0x59ad6aa4a884dd63, 0x3, 0x0, 0x13d, 0x40, 0x26e, 0x8000, 0x1f, 0x38, 0x1, 0x8, 0x8, 0x3}, [{0x6, 0x3, 0xefa, 0x1, 0x81, 0x80000000, 0x0, 0x9}, {0x7, 0x2, 0x7ff, 0xfff, 0x1, 0x4, 0x0, 0x800b}], "5ad165d3d87709dd80c73c9fa8b6ef39a345e1b2327e38197c13f3be9248c0f2161632606ce45b5c7d7349c883946ca190a061f77e1020dc808b86b4e3c7b2a6128e2d3b16a4ec69ad8c276d1a038ddc59bd46a7a37061ed24ba41f62de7aaf1c073c43333bee7ed0979404acecab631d46b591f921ec0a584aeb912342ff4f104ff960a3563460c943d11952c88bd0d13a69a425793b6f7d2b09cf17c87cdc331f63c983436cef6888b1a8328e953b0b3bade3aabbfc4818a05af", [[]]}, 0x26b) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r4, 0x10f, 0x87, &(0x7f0000265000)=@req={0x0, 0x0, 0x2}, 0x10) getsockopt$packet_int(r4, 0x107, 0xf, &(0x7f0000000340), &(0x7f0000000780)=0x4) syz_open_procfs(0x0, &(0x7f0000000000)='timers\x00') 00:55:34 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) pipe(0x0) wait4(0x0, 0x0, 0x40000000, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000265000)=@req={0x0, 0x400, 0x2}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000740)={{{@in=@multicast2, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@broadcast}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route(r1, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=@ipv4_getnetconf={0x4c, 0x52, 0x10, 0x70bd25, 0x25dfdbfd, {}, [@NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x1}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x9}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x5}, @NETCONFA_IFINDEX={0x8, 0x1, r2}, @NETCONFA_RP_FILTER={0x8, 0x3, 0x7fff}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x3}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0xe9}]}, 0x4c}, 0x1, 0x0, 0x0, 0x3400c080}, 0x40) read(0xffffffffffffffff, &(0x7f0000000280)=""/152, 0x20000318) openat$procfs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/keys\x00', 0x0, 0x0) r3 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r3, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) write$binfmt_elf64(r3, &(0x7f00000003c0)={{0x7f, 0x45, 0x4c, 0x46, 0x6, 0x81, 0x35, 0x4, 0x1, 0x59ad6aa4a884dd63, 0x3, 0x0, 0x13d, 0x40, 0x26e, 0x8000, 0x1f, 0x38, 0x1, 0x8, 0x8, 0x3}, [{0x6, 0x3, 0xefa, 0x1, 0x81, 0x80000000, 0x0, 0x9}, {0x7, 0x2, 0x7ff, 0xfff, 0x1, 0x4, 0x0, 0x800b}], "5ad165d3d87709dd80c73c9fa8b6ef39a345e1b2327e38197c13f3be9248c0f2161632606ce45b5c7d7349c883946ca190a061f77e1020dc808b86b4e3c7b2a6128e2d3b16a4ec69ad8c276d1a038ddc59bd46a7a37061ed24ba41f62de7aaf1c073c43333bee7ed0979404acecab631d46b591f921ec0a584aeb912342ff4f104ff960a3563460c943d11952c88bd0d13a69a425793b6f7d2b09cf17c87cdc331f63c983436cef6888b1a8328e953b0b3bade3aabbfc4818a05af", [[]]}, 0x26b) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_open_procfs(0x0, &(0x7f0000000000)='timers\x00') 00:55:34 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) pipe(0x0) wait4(0x0, 0x0, 0x40000000, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000265000)=@req={0x0, 0x400}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000740)={{{@in=@multicast2, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@broadcast}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route(r1, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=@ipv4_getnetconf={0x54, 0x52, 0x10, 0x70bd25, 0x25dfdbfd, {}, [@NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x1}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x9}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x5}, @NETCONFA_FORWARDING={0x8, 0x2, 0x8}, @NETCONFA_IFINDEX={0x8, 0x1, r2}, @NETCONFA_RP_FILTER={0x8, 0x3, 0x7fff}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x3}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0xe9}]}, 0x54}, 0x1, 0x0, 0x0, 0x3400c080}, 0x40) read(0xffffffffffffffff, &(0x7f0000000280)=""/152, 0x20000318) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/keys\x00', 0x0, 0x0) r4 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r4, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) write$binfmt_elf64(r4, &(0x7f00000003c0)={{0x7f, 0x45, 0x4c, 0x46, 0x6, 0x81, 0x35, 0x4, 0x1, 0x59ad6aa4a884dd63, 0x3, 0x0, 0x13d, 0x40, 0x26e, 0x8000, 0x1f, 0x38, 0x1, 0x8, 0x8, 0x3}, [{0x6, 0x3, 0xefa, 0x1, 0x81, 0x80000000, 0x0, 0x9}, {0x7, 0x2, 0x7ff, 0xfff, 0x1, 0x4}], "5ad165d3d87709dd80c73c9fa8b6ef39a345e1b2327e38197c13f3be9248c0f2161632606ce45b5c7d7349c883946ca190a061f77e1020dc808b86b4e3c7b2a6128e2d3b16a4ec69ad8c276d1a038ddc59bd46a7a37061ed24ba41f62de7aaf1c073c43333bee7ed0979404acecab631d46b591f921ec0a584aeb912342ff4f104ff960a3563460c943d11952c88bd0d13a69a425793b6f7d2b09cf17c87cdc331f63c983436cef6888b1a8328e953b0b3bade3aabbfc4818a05af", [[]]}, 0x26b) read(r3, &(0x7f0000000280)=""/152, 0x20000318) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x280800, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$DRM_IOCTL_MODE_SETCRTC(0xffffffffffffffff, 0xc06864a2, &(0x7f0000000000)={0x0, 0x0, 0x20}) 00:55:35 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) connect$pppoe(0xffffffffffffffff, &(0x7f0000000000)={0x18, 0x0, {0x2, @link_local, 'team0\x00'}}, 0x1e) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) r1 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000265000)=@req={0x0, 0x0, 0x2}, 0x10) r2 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f0000265000)=@req={0x0, 0x0, 0x2}, 0x10) connect$pppoe(r2, &(0x7f0000000280)={0x18, 0x0, {0x2, @dev={[], 0x2a}, 'team_slave_0\x00'}}, 0x1e) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r1, &(0x7f0000000140)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000100)={&(0x7f00000001c0)={0x9c, 0x3, 0x1, 0x101, 0x0, 0x0, {0xa, 0x0, 0x4}, [@CTA_TIMEOUT={0x8, 0x7, 0x1, 0x0, 0x3}, @CTA_PROTOINFO={0x18, 0x4, 0x0, 0x1, @CTA_PROTOINFO_TCP={0x14, 0x1, 0x0, 0x1, [@CTA_PROTOINFO_TCP_STATE={0x5, 0x1, 0x1}, @CTA_PROTOINFO_TCP_WSCALE_REPLY={0x5}]}}, @CTA_ID={0x8, 0xc, 0x1, 0x0, 0x2}, @CTA_TUPLE_MASTER={0x60, 0xe, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @empty}}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @empty}, {0x14, 0x4, @mcast1}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x2f}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_ZONE={0x6}]}]}, 0x9c}, 0x1, 0x0, 0x0, 0x94}, 0x4000081) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {0x0, 0x3}, {0xffffffff}, {0x1}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) 00:55:35 executing program 5: socket$pppoe(0x18, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0xff010000, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {0xffffffff}, {0x1}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}) 00:55:35 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) pipe(0x0) clock_gettime(0x0, &(0x7f0000000300)={0x0, 0x0}) ioctl$VIDIOC_DQBUF(0xffffffffffffffff, 0xc0585611, &(0x7f00000004c0)={0x2, 0x6, 0x4, 0x1000000, 0x453d, {r1, r2/1000+10000}, {0x5, 0xc, 0xe9, 0x8, 0x1, 0x9, "3cb24566"}, 0x2, 0x1, @userptr=0x8000, 0x706a, 0x0, 0xffffffffffffffff}) ioctl$SNDRV_PCM_IOCTL_DELAY(r3, 0x80084121, &(0x7f0000000340)) syz_open_dev$mice(&(0x7f0000000200)='/dev/input/mice\x00', 0x0, 0x20084) r4 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_IPV6_PKTINFO(r4, 0x29, 0x32, &(0x7f0000000240)={@mcast2}, 0x14) getsockopt$inet6_dccp_int(r4, 0x21, 0x6, &(0x7f0000000540), &(0x7f0000000580)=0x4) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=@ipv4_getnetconf={0x3c, 0x52, 0x10, 0x70bd25, 0x25dfdbfd, {}, [@NETCONFA_PROXY_NEIGH={0x8}, @NETCONFA_IFINDEX={0x8}, @NETCONFA_RP_FILTER={0x8}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x3}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0xe9}]}, 0x3c}, 0x1, 0x0, 0x0, 0x3400c080}, 0x40) r5 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) r6 = socket$inet_udp(0x2, 0x2, 0x0) r7 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r7, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) ioctl$KVM_SET_PIT2(r7, 0x4070aea0, &(0x7f0000000280)={[{0x0, 0x7, 0x7f, 0xb2, 0x5, 0x35, 0x8, 0x34, 0x9, 0x7, 0x3f, 0x81, 0x7ff}, {0x8000, 0x0, 0x1f, 0x9, 0x2, 0x1, 0x20, 0xff, 0x3, 0x9, 0x1, 0x40}, {0x8, 0x3, 0x1, 0x21, 0x3f, 0xfa, 0xff, 0x0, 0x2, 0x3, 0xfe, 0x2, 0x8}], 0x4000000}) setsockopt$inet_msfilter(r6, 0x0, 0x29, &(0x7f0000000100)={@multicast2, @dev={0xac, 0x14, 0x14, 0x29}, 0x1, 0x8, [@remote, @dev={0xac, 0x14, 0x14, 0x18}, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast2, @remote, @remote, @initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x9]}, 0x30) ioctl$FBIOPUT_VSCREENINFO(r5, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) write$binfmt_elf64(r5, &(0x7f00000003c0)={{0x7f, 0x45, 0x4c, 0x46, 0x6, 0x0, 0x35, 0x4, 0x1, 0x59ad6aa4a884dd63, 0x3, 0x0, 0x13d, 0x40, 0x80026e, 0x8004, 0x1c, 0x38, 0x1, 0x5, 0x8, 0x3}, [], "5ad165d3d87709dd80c73c9fa8b6ef39a345e1b2327e38197c13f3be9248c0f2161632606ce45b5c7d7349c883946ca190a061f77e1020dc808b86b4e3c7b2a6128e2d3b16a4ec69ad8c276d1a038ddc59bd46a7a37061ed24ba41f62de7aaf1c073c43333bee7ed0979404acecab631d46b591f921ec0a584aeb912342ff4f104ff960a3563460c943d11952c88bd0d13a69a425793b6f7d2b09cf17c87cdc331f63c983436cef6888b1a8328e953b0b3bade3aabbfc4818a05af"}, 0xfb) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_open_procfs(0x0, &(0x7f0000000000)='timers\x00') 00:55:35 executing program 5: socket$pppoe(0x18, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x0, 0x325, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {0xffffffff}, {0x1}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}) 00:55:35 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) pipe(0x0) wait4(0x0, 0x0, 0x40000000, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000265000)=@req={0x0, 0x400}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000740)={{{@in=@multicast2, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@broadcast}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route(r1, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=@ipv4_getnetconf={0x54, 0x52, 0x10, 0x70bd25, 0x25dfdbfd, {}, [@NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x1}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x9}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x5}, @NETCONFA_FORWARDING={0x8, 0x2, 0x8}, @NETCONFA_IFINDEX={0x8, 0x1, r2}, @NETCONFA_RP_FILTER={0x8, 0x3, 0x7fff}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x3}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0xe9}]}, 0x54}, 0x1, 0x0, 0x0, 0x3400c080}, 0x40) read(0xffffffffffffffff, &(0x7f0000000280)=""/152, 0x20000318) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/keys\x00', 0x0, 0x0) r4 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r4, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) write$binfmt_elf64(r4, &(0x7f00000003c0)={{0x7f, 0x45, 0x4c, 0x46, 0x6, 0x81, 0x35, 0x4, 0x1, 0x59ad6aa4a884dd63, 0x3, 0x0, 0x13d, 0x40, 0x26e, 0x8000, 0x1f, 0x38, 0x1, 0x8, 0x8, 0x3}, [{0x7, 0x2, 0x7ff, 0xfff, 0x1, 0x4, 0x0, 0x800b}], "5ad165d3d87709dd80c73c9fa8b6ef39a345e1b2327e38197c13f3be9248c0f2161632606ce45b5c7d7349c883946ca190a061f77e1020dc808b86b4e3c7b2a6128e2d3b16a4ec69ad8c276d1a038ddc59bd46a7a37061ed24ba41f62de7aaf1c073c43333bee7ed0979404acecab631d46b591f921ec0a584aeb912342ff4f104ff960a3563460c943d11952c88bd0d13a69a425793b6f7d2b09cf17c87cdc331f63c983436cef6888b1a8328e953b0b3bade3aabbfc4818a05af", [[]]}, 0x233) read(r3, &(0x7f0000000280)=""/152, 0x20000318) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x280800, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$DRM_IOCTL_MODE_SETCRTC(0xffffffffffffffff, 0xc06864a2, &(0x7f0000000000)={0x0, 0x0, 0x20}) 00:55:35 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) pipe(0x0) wait4(0x0, 0x0, 0x40000000, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000265000)=@req={0x0, 0x400, 0x2}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000740)={{{@in=@multicast2, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@broadcast}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route(r1, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=@ipv4_getnetconf={0x4c, 0x52, 0x10, 0x70bd25, 0x25dfdbfd, {}, [@NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x1}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x9}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x5}, @NETCONFA_IFINDEX={0x8, 0x1, r2}, @NETCONFA_RP_FILTER={0x8, 0x3, 0x7fff}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x3}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0xe9}]}, 0x4c}, 0x1, 0x0, 0x0, 0x3400c080}, 0x40) read(0xffffffffffffffff, &(0x7f0000000280)=""/152, 0x20000318) openat$procfs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/keys\x00', 0x0, 0x0) r3 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r3, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) write$binfmt_elf64(r3, &(0x7f00000003c0)={{0x7f, 0x45, 0x4c, 0x46, 0x6, 0x81, 0x35, 0x4, 0x1, 0x59ad6aa4a884dd63, 0x3, 0x0, 0x13d, 0x40, 0x26e, 0x8000, 0x1f, 0x38, 0x1, 0x8, 0x8, 0x3}, [{0x6, 0x3, 0xefa, 0x1, 0x81, 0x80000000, 0x0, 0x9}, {0x7, 0x2, 0x7ff, 0xfff, 0x1, 0x4, 0x0, 0x800b}], "5ad165d3d87709dd80c73c9fa8b6ef39a345e1b2327e38197c13f3be9248c0f2161632606ce45b5c7d7349c883946ca190a061f77e1020dc808b86b4e3c7b2a6128e2d3b16a4ec69ad8c276d1a038ddc59bd46a7a37061ed24ba41f62de7aaf1c073c43333bee7ed0979404acecab631d46b591f921ec0a584aeb912342ff4f104ff960a3563460c943d11952c88bd0d13a69a425793b6f7d2b09cf17c87cdc331f63c983436cef6888b1a8328e953b0b3bade3aabbfc4818a05af", [[]]}, 0x26b) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_open_procfs(0x0, &(0x7f0000000000)='timers\x00') 00:55:36 executing program 3: r0 = socket$pppoe(0x18, 0x1, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x2, @link_local, 'team0\x00'}}, 0x1e) r2 = syz_open_dev$media(&(0x7f00000001c0)='/dev/media#\x00', 0x6, 0x800) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00') sendmsg$NL80211_CMD_GET_MPATH(r3, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000000140)={0x58, r4, 0x2468825185d9173d, 0x0, 0x0, {}, [@NL80211_ATTR_MPATH_NEXT_HOP={0xa, 0x1a, @random="dd6071e90625"}, @NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MPATH_NEXT_HOP={0xa, 0x1a, @random="45763816233e"}, @NL80211_ATTR_MAC={0x4, 0x6, @link_local}, @NL80211_ATTR_WDEV={0xc}]}, 0x58}}, 0x0) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000280)=0x14) sendmsg$NL80211_CMD_NEW_STATION(r2, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000380)={&(0x7f00000002c0)={0x24, r4, 0x100, 0x70bd26, 0x25dfdbfb, {}, [@NL80211_ATTR_IFINDEX={0x8, 0x3, r5}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x4}]}, 0x24}, 0x1, 0x0, 0x0, 0x8000}, 0x10) syz_open_dev$admmidi(&(0x7f00000000c0)='/dev/admmidi#\x00', 0x6, 0x22000) r6 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r6, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {0x0, 0x3}, {0xffffffff}, {0x1}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS64(r7, 0xc0385720, &(0x7f0000000140)) [ 571.461977][T24476] netlink: 'syz-executor.3': attribute type 6 has an invalid length. 00:55:36 executing program 5: socket$pppoe(0x18, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x0, 0x32f, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {0xffffffff}, {0x1}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}) 00:55:36 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) stat(&(0x7f0000000240)='./file0/file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(0xffffffffffffffff, &(0x7f0000001b80)) socket(0x11, 0x2, 0x5) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r4, 0x1, 0x14, &(0x7f0000000040), 0x50) getsockopt$IP6T_SO_GET_ENTRIES(r4, 0x29, 0x41, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)=0x1) fsetxattr$trusted_overlay_redirect(r3, &(0x7f0000000200)='trusted.overlay.redirect\x00', &(0x7f0000000280)='./file0/file0\x00', 0xe, 0x0) getsockname$tipc(0xffffffffffffffff, 0x0, &(0x7f0000000080)) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000001400)={{0x1, 0x0, @identifier="8e0f03f7e12b88d1af81f7c5a6bb175f"}, 0x67, [], "ed760111b8363e2de90692d0bc7e0a89824d3c77730403363ce0521cdcb1973b558cbd01ebf95bd9529fe3c5a95dcf31792e3e463d875b955a13582aeaddf6af34a98934ad6944b87292af67aec51fd37bd761db93cf6623d8683956791c956c97d76a9fd8df5d"}) lstat(&(0x7f0000000000)='./file0/file0\x00', &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000100)=0x0) r7 = getegid() r8 = socket$inet_tcp(0x2, 0x1, 0x0) r9 = fcntl$dupfd(r8, 0x0, r8) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) setresuid(r10, r10, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003ec0)={0x0, 0x0, 0x0}, 0x0) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, r11) r12 = openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$DRM_IOCTL_AGP_INFO(r12, 0x80386433, &(0x7f0000000bc0)=""/4096) getsockopt$sock_cred(r12, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0x194) setresuid(r13, r13, 0x0) r14 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r15 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r15, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) waitid(0x1, r15, &(0x7f0000000100), 0x80000004, &(0x7f0000000180)) r16 = shmget$private(0x0, 0x3000, 0x20, &(0x7f0000ffa000/0x3000)=nil) shmctl$SHM_STAT_ANY(r16, 0xf, &(0x7f0000000540)=""/221) shmctl$IPC_SET(r16, 0x1, &(0x7f0000000180)={{0x3, r10, r11, r13, r7, 0x42, 0x7}, 0x803ff, 0x2, 0xfffffffffffffffd, 0x0, r14, r15, 0x5}) shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000840)={{0x0, r2, r7, 0x0, r5, 0x50}, 0xd7, 0xfffffffffffffffe, 0x1000, 0x8000, r6}) r17 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000280)='/dev/nullb0\x00', 0x4400, 0x0) preadv(r17, &(0x7f0000000040)=[{&(0x7f0000000400)=""/4096, 0x3ffc00}], 0x1, 0x0) 00:55:36 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) pipe(0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=@ipv4_getnetconf={0x3c, 0x52, 0x10, 0x70bd25, 0x25dfdbfd, {}, [@NETCONFA_PROXY_NEIGH={0x8}, @NETCONFA_IFINDEX={0x8}, @NETCONFA_RP_FILTER={0x8}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x3}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0xe9}]}, 0x3c}, 0x1, 0x0, 0x0, 0x3400c080}, 0x40) r1 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r1, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000100)) write$binfmt_elf64(r1, &(0x7f00000003c0)={{0x7f, 0x45, 0x4c, 0x46, 0x6, 0x81, 0x35, 0x4, 0x1, 0x59ad6aa4a884dd63, 0x3, 0x0, 0x13d, 0x40, 0x26e, 0x8000, 0x1f, 0x38, 0x1, 0x8, 0x8, 0x3}, [{0x6, 0x3, 0xefa, 0x1, 0x81, 0x80000000, 0x0, 0x9}, {0x7, 0x2, 0x7ff, 0xfff, 0x1, 0x4, 0x0, 0x800b}], "5ad165d3d87709dd80c73c9fa8b6ef39a345e1b2327e38197c13f3be9248c0f2161632606ce45b5c7d7349c883946ca190a061f77e1020dc808b86b4e3c7b2a6128e2d3b16a4ec69ad8c276d1a038ddc59bd46a7a37061ed24ba41f62de7aaf1c073c43333bee7ed0979404acecab631d46b591f921ec0a584aeb912342ff4f104ff960a3563460c943d11952c88bd0d13a69a425793b6f7d2b09cf17c87cdc331f63c983436cef6888b1a8328e953b0b3bade3aabbfc4818a05af", [[]]}, 0x26b) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_open_procfs(0x0, &(0x7f0000000000)='timers\x00') 00:55:37 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) pipe(0x0) wait4(0x0, 0x0, 0x40000000, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000265000)=@req={0x0, 0x400}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000740)={{{@in=@multicast2, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@broadcast}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route(r1, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=@ipv4_getnetconf={0x54, 0x52, 0x10, 0x70bd25, 0x25dfdbfd, {}, [@NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x1}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x9}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x5}, @NETCONFA_FORWARDING={0x8, 0x2, 0x8}, @NETCONFA_IFINDEX={0x8, 0x1, r2}, @NETCONFA_RP_FILTER={0x8, 0x3, 0x7fff}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x3}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0xe9}]}, 0x54}, 0x1, 0x0, 0x0, 0x3400c080}, 0x40) read(0xffffffffffffffff, &(0x7f0000000280)=""/152, 0x20000318) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/keys\x00', 0x0, 0x0) r4 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r4, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) write$binfmt_elf64(r4, &(0x7f00000003c0)={{0x7f, 0x45, 0x4c, 0x46, 0x6, 0x81, 0x35, 0x4, 0x1, 0x59ad6aa4a884dd63, 0x3, 0x0, 0x13d, 0x40, 0x26e, 0x8000, 0x1f, 0x38, 0x1, 0x8, 0x8, 0x3}, [{0x7, 0x2, 0x7ff, 0xfff, 0x1, 0x4, 0x0, 0x800b}], "5ad165d3d87709dd80c73c9fa8b6ef39a345e1b2327e38197c13f3be9248c0f2161632606ce45b5c7d7349c883946ca190a061f77e1020dc808b86b4e3c7b2a6128e2d3b16a4ec69ad8c276d1a038ddc59bd46a7a37061ed24ba41f62de7aaf1c073c43333bee7ed0979404acecab631d46b591f921ec0a584aeb912342ff4f104ff960a3563460c943d11952c88bd0d13a69a425793b6f7d2b09cf17c87cdc331f63c983436cef6888b1a8328e953b0b3bade3aabbfc4818a05af", [[]]}, 0x233) read(r3, &(0x7f0000000280)=""/152, 0x20000318) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x280800, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$DRM_IOCTL_MODE_SETCRTC(0xffffffffffffffff, 0xc06864a2, &(0x7f0000000000)={0x0, 0x0, 0x20}) 00:55:37 executing program 3: r0 = socket$pppoe(0x18, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r1, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) r2 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r2, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) fsetxattr$trusted_overlay_redirect(r2, &(0x7f0000000100)='trusted.overlay.redirect\x00', &(0x7f0000000140)='./file0\x00', 0x8, 0x0) write$UHID_CREATE(r1, &(0x7f00000001c0)={0x0, {'syz0\x00', 'syz0\x00', 'syz0\x00', &(0x7f00000000c0)=""/53, 0x35, 0x1, 0x48e, 0x4, 0x6c, 0x8}}, 0x120) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x2, @link_local, 'team0\x00'}}, 0x1e) r3 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r3, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x280, 0x0, 0x0, 0x0, 0x4, 0x3, {0x0, 0x3}, {0x6}, {0x1}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc71, 0x0, 0x4}) 00:55:37 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) pipe(0x0) wait4(0x0, 0x0, 0x40000000, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000265000)=@req={0x0, 0x400, 0x2}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000740)={{{@in=@multicast2, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@broadcast}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route(r1, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=@ipv4_getnetconf={0x54, 0x52, 0x10, 0x70bd25, 0x25dfdbfd, {}, [@NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x1}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x9}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x5}, @NETCONFA_FORWARDING={0x8}, @NETCONFA_IFINDEX={0x8, 0x1, r2}, @NETCONFA_RP_FILTER={0x8, 0x3, 0x7fff}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x3}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0xe9}]}, 0x54}, 0x1, 0x0, 0x0, 0x3400c080}, 0x40) read(0xffffffffffffffff, &(0x7f0000000280)=""/152, 0x20000318) openat$procfs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/keys\x00', 0x0, 0x0) r3 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r3, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) write$binfmt_elf64(r3, &(0x7f00000003c0)={{0x7f, 0x45, 0x4c, 0x46, 0x6, 0x81, 0x35, 0x4, 0x1, 0x59ad6aa4a884dd63, 0x3, 0x0, 0x13d, 0x40, 0x26e, 0x8000, 0x1f, 0x38, 0x1, 0x8, 0x8, 0x3}, [{0x6, 0x3, 0xefa, 0x1, 0x81, 0x80000000, 0x0, 0x9}, {0x7, 0x2, 0x7ff, 0xfff, 0x1, 0x4, 0x0, 0x800b}], "5ad165d3d87709dd80c73c9fa8b6ef39a345e1b2327e38197c13f3be9248c0f2161632606ce45b5c7d7349c883946ca190a061f77e1020dc808b86b4e3c7b2a6128e2d3b16a4ec69ad8c276d1a038ddc59bd46a7a37061ed24ba41f62de7aaf1c073c43333bee7ed0979404acecab631d46b591f921ec0a584aeb912342ff4f104ff960a3563460c943d11952c88bd0d13a69a425793b6f7d2b09cf17c87cdc331f63c983436cef6888b1a8328e953b0b3bade3aabbfc4818a05af", [[]]}, 0x26b) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_open_procfs(0x0, &(0x7f0000000000)='timers\x00') 00:55:37 executing program 5: socket$pppoe(0x18, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {0xffffffff}, {0x1}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}) 00:55:37 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) pipe(0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[@ANYBLOB="3c0000005200100025bd7000fddbdf2502080005000000000008000100", @ANYRES32=0x0, @ANYBLOB="08000300080006000300000008000500e900"/27], 0x3c}, 0x1, 0x0, 0x0, 0x3400c080}, 0x40) r1 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r1, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) write$binfmt_elf64(r1, &(0x7f00000003c0)={{0x7f, 0x45, 0x4c, 0x46, 0x6, 0x81, 0x35, 0x4, 0x1, 0x59ad6aa4a884dd63, 0x3, 0x0, 0x13d, 0x40, 0x26e, 0x8000, 0x1f, 0x38, 0x1, 0x8, 0x8, 0x3}, [{0x6, 0x3, 0xefa, 0x1, 0x81, 0x80000000, 0x0, 0x9}, {0x7, 0x2, 0x7ff, 0xfff, 0x1, 0x4, 0x0, 0x800b}], "5ad165d3d87709dd80c73c9fa8b6ef39a345e1b2327e38197c13f3be9248c0f2161632606ce45b5c7d7349c883946ca190a061f77e1020dc808b86b4e3c7b2a6128e2d3b16a4ec69ad8c276d1a038ddc59bd46a7a37061ed24ba41f62de7aaf1c073c43333bee7ed0979404acecab631d46b591f921ec0a584aeb912342ff4f104ff960a3563460c943d11952c88bd0d13a69a425793b6f7d2b09cf17c87cdc331f63c983436cef6888b1a8328e953b0b3bade3aabbfc4818a05af", [[]]}, 0x26b) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_open_procfs(0x0, &(0x7f0000000000)='timers\x00') 00:55:37 executing program 5: socket$pppoe(0x18, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x2, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {0xffffffff}, {0x1}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}) 00:55:38 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) pipe(0x0) wait4(0x0, 0x0, 0x40000000, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000265000)=@req={0x0, 0x400}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000740)={{{@in=@multicast2, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@broadcast}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route(r1, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=@ipv4_getnetconf={0x54, 0x52, 0x10, 0x70bd25, 0x25dfdbfd, {}, [@NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x1}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x9}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x5}, @NETCONFA_FORWARDING={0x8, 0x2, 0x8}, @NETCONFA_IFINDEX={0x8, 0x1, r2}, @NETCONFA_RP_FILTER={0x8, 0x3, 0x7fff}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x3}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0xe9}]}, 0x54}, 0x1, 0x0, 0x0, 0x3400c080}, 0x40) read(0xffffffffffffffff, &(0x7f0000000280)=""/152, 0x20000318) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/keys\x00', 0x0, 0x0) r4 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r4, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) write$binfmt_elf64(r4, &(0x7f00000003c0)={{0x7f, 0x45, 0x4c, 0x46, 0x6, 0x81, 0x35, 0x4, 0x1, 0x59ad6aa4a884dd63, 0x3, 0x0, 0x13d, 0x40, 0x26e, 0x8000, 0x1f, 0x38, 0x1, 0x8, 0x8, 0x3}, [{0x7, 0x2, 0x7ff, 0xfff, 0x1, 0x4, 0x0, 0x800b}], "5ad165d3d87709dd80c73c9fa8b6ef39a345e1b2327e38197c13f3be9248c0f2161632606ce45b5c7d7349c883946ca190a061f77e1020dc808b86b4e3c7b2a6128e2d3b16a4ec69ad8c276d1a038ddc59bd46a7a37061ed24ba41f62de7aaf1c073c43333bee7ed0979404acecab631d46b591f921ec0a584aeb912342ff4f104ff960a3563460c943d11952c88bd0d13a69a425793b6f7d2b09cf17c87cdc331f63c983436cef6888b1a8328e953b0b3bade3aabbfc4818a05af", [[]]}, 0x233) read(r3, &(0x7f0000000280)=""/152, 0x20000318) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x280800, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$DRM_IOCTL_MODE_SETCRTC(0xffffffffffffffff, 0xc06864a2, &(0x7f0000000000)={0x0, 0x0, 0x20}) 00:55:38 executing program 3: r0 = socket$pppoe(0x18, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x2, @link_local, 'team0\x00'}}, 0x1e) r1 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r1, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0xfffffffd, 0x0, 0x4, 0x0, {0x0, 0x3}, {0xffffffff}, {0x1, 0x4}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) r2 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f0000265000)=@req={0x0, 0x0, 0x2}, 0x10) setsockopt$inet_mreq(r2, 0x0, 0x7, &(0x7f00000000c0)={@multicast2, @dev={0xac, 0x14, 0x14, 0xc}}, 0x8) r3 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r3, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) dup(r3) 00:55:38 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) pipe(0x0) wait4(0x0, 0x0, 0x40000000, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000265000)=@req={0x0, 0x400, 0x2}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000740)={{{@in=@multicast2, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@broadcast}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route(r1, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=@ipv4_getnetconf={0x54, 0x52, 0x10, 0x70bd25, 0x25dfdbfd, {}, [@NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x1}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x9}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x5}, @NETCONFA_FORWARDING={0x8}, @NETCONFA_IFINDEX={0x8, 0x1, r2}, @NETCONFA_RP_FILTER={0x8, 0x3, 0x7fff}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x3}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0xe9}]}, 0x54}, 0x1, 0x0, 0x0, 0x3400c080}, 0x40) read(0xffffffffffffffff, &(0x7f0000000280)=""/152, 0x20000318) openat$procfs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/keys\x00', 0x0, 0x0) r3 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r3, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) write$binfmt_elf64(r3, &(0x7f00000003c0)={{0x7f, 0x45, 0x4c, 0x46, 0x6, 0x81, 0x35, 0x4, 0x1, 0x59ad6aa4a884dd63, 0x3, 0x0, 0x13d, 0x40, 0x26e, 0x8000, 0x1f, 0x38, 0x1, 0x8, 0x8, 0x3}, [{0x6, 0x3, 0xefa, 0x1, 0x81, 0x80000000, 0x0, 0x9}, {0x7, 0x2, 0x7ff, 0xfff, 0x1, 0x4, 0x0, 0x800b}], "5ad165d3d87709dd80c73c9fa8b6ef39a345e1b2327e38197c13f3be9248c0f2161632606ce45b5c7d7349c883946ca190a061f77e1020dc808b86b4e3c7b2a6128e2d3b16a4ec69ad8c276d1a038ddc59bd46a7a37061ed24ba41f62de7aaf1c073c43333bee7ed0979404acecab631d46b591f921ec0a584aeb912342ff4f104ff960a3563460c943d11952c88bd0d13a69a425793b6f7d2b09cf17c87cdc331f63c983436cef6888b1a8328e953b0b3bade3aabbfc4818a05af", [[]]}, 0x26b) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_open_procfs(0x0, &(0x7f0000000000)='timers\x00') 00:55:38 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) pipe(0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=@ipv4_getnetconf={0x3c, 0x52, 0x10, 0x70bd25, 0x25dfdbfd, {}, [@NETCONFA_PROXY_NEIGH={0x8}, @NETCONFA_IFINDEX={0x8}, @NETCONFA_RP_FILTER={0x8}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x3}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0xe9}]}, 0x3c}, 0x1, 0x0, 0x0, 0x3400c080}, 0x40) r1 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r1, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) write$binfmt_elf64(r1, &(0x7f00000003c0)={{0x7f, 0x45, 0x4c, 0x46, 0x6, 0x81, 0x35, 0x4, 0x1, 0x59ad6aa4a884dd63, 0x3, 0x0, 0x13d, 0x40, 0x26e, 0x8000, 0x1f, 0x38, 0x1, 0x8, 0x8, 0x3}, [{0x6, 0x3, 0xefa, 0x1, 0x81, 0x80000000, 0x0, 0x9}, {0x7, 0x2, 0x7ff, 0xfff, 0x1, 0x4, 0x0, 0x800b}], "5ad165d3d87709dd80c73c9fa8b6ef39a345e1b2327e38197c13f3be9248c0f2161632606ce45b5c7d7349c883946ca190a061f77e1020dc808b86b4e3c7b2a6128e2d3b16a4ec69ad8c276d1a038ddc59bd46a7a37061ed24ba41f62de7aaf1c073c43333bee7ed0979404acecab631d46b591f921ec0a584aeb912342ff4f104ff960a3563460c943d11952c88bd0d13a69a425793b6f7d2b09cf17c87cdc331f63c983436cef6888b1a8328e953b0b3bade3aabbfc4818a05af", [[]]}, 0x26b) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_open_procfs(0x0, &(0x7f0000000000)='timers\x00') getegid() 00:55:38 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) stat(&(0x7f0000000240)='./file0/file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(0xffffffffffffffff, &(0x7f0000001b80)) socket(0x11, 0x2, 0x5) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r4, 0x1, 0x14, &(0x7f0000000040), 0x50) getsockopt$IP6T_SO_GET_ENTRIES(r4, 0x29, 0x41, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)=0x1) fsetxattr$trusted_overlay_redirect(r3, &(0x7f0000000200)='trusted.overlay.redirect\x00', &(0x7f0000000280)='./file0/file0\x00', 0xe, 0x0) getsockname$tipc(0xffffffffffffffff, 0x0, &(0x7f0000000080)) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000001400)={{0x1, 0x0, @identifier="8e0f03f7e12b88d1af81f7c5a6bb175f"}, 0x67, [], "ed760111b8363e2de90692d0bc7e0a89824d3c77730403363ce0521cdcb1973b558cbd01ebf95bd9529fe3c5a95dcf31792e3e463d875b955a13582aeaddf6af34a98934ad6944b87292af67aec51fd37bd761db93cf6623d8683956791c956c97d76a9fd8df5d"}) lstat(&(0x7f0000000000)='./file0/file0\x00', &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000100)=0x0) r7 = getegid() r8 = socket$inet_tcp(0x2, 0x1, 0x0) r9 = fcntl$dupfd(r8, 0x0, r8) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) setresuid(r10, r10, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003ec0)={0x0, 0x0, 0x0}, 0x0) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, r11) r12 = openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$DRM_IOCTL_AGP_INFO(r12, 0x80386433, &(0x7f0000000bc0)=""/4096) getsockopt$sock_cred(r12, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0x194) setresuid(r13, r13, 0x0) r14 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r15 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r15, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) waitid(0x1, r15, &(0x7f0000000100), 0x80000004, &(0x7f0000000180)) r16 = shmget$private(0x0, 0x3000, 0x20, &(0x7f0000ffa000/0x3000)=nil) shmctl$SHM_STAT_ANY(r16, 0xf, &(0x7f0000000540)=""/221) shmctl$IPC_SET(r16, 0x1, &(0x7f0000000180)={{0x3, r10, r11, r13, r7, 0x42, 0x7}, 0x803ff, 0x2, 0xfffffffffffffffd, 0x0, r14, r15, 0x5}) shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000840)={{0x0, r2, r7, 0x0, r5, 0x50}, 0xd7, 0xfffffffffffffffe, 0x1000, 0x8000, r6}) r17 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000280)='/dev/nullb0\x00', 0x4400, 0x0) preadv(r17, &(0x7f0000000040)=[{&(0x7f0000000400)=""/4096, 0x3ffc00}], 0x1, 0x0) 00:55:38 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) pipe(0x0) wait4(0x0, 0x0, 0x40000000, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000265000)=@req={0x0, 0x400}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000740)={{{@in=@multicast2, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@broadcast}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route(r1, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=@ipv4_getnetconf={0x54, 0x52, 0x10, 0x70bd25, 0x25dfdbfd, {}, [@NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x1}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x9}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x5}, @NETCONFA_FORWARDING={0x8, 0x2, 0x8}, @NETCONFA_IFINDEX={0x8, 0x1, r2}, @NETCONFA_RP_FILTER={0x8, 0x3, 0x7fff}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x3}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0xe9}]}, 0x54}, 0x1, 0x0, 0x0, 0x3400c080}, 0x40) read(0xffffffffffffffff, &(0x7f0000000280)=""/152, 0x20000318) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/keys\x00', 0x0, 0x0) r4 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r4, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) write$binfmt_elf64(r4, &(0x7f00000003c0)={{0x7f, 0x45, 0x4c, 0x46, 0x6, 0x81, 0x35, 0x4, 0x1, 0x59ad6aa4a884dd63, 0x3, 0x0, 0x13d, 0x40, 0x26e, 0x8000, 0x1f, 0x38, 0x1, 0x8, 0x8, 0x3}, [{0x0, 0x3, 0xefa, 0x1, 0x81, 0x80000000, 0x0, 0x9}, {0x7, 0x2, 0x7ff, 0xfff, 0x1, 0x4, 0x0, 0x800b}], "5ad165d3d87709dd80c73c9fa8b6ef39a345e1b2327e38197c13f3be9248c0f2161632606ce45b5c7d7349c883946ca190a061f77e1020dc808b86b4e3c7b2a6128e2d3b16a4ec69ad8c276d1a038ddc59bd46a7a37061ed24ba41f62de7aaf1c073c43333bee7ed0979404acecab631d46b591f921ec0a584aeb912342ff4f104ff960a3563460c943d11952c88bd0d13a69a425793b6f7d2b09cf17c87cdc331f63c983436cef6888b1a8328e953b0b3bade3aabbfc4818a05af", [[]]}, 0x26b) read(r3, &(0x7f0000000280)=""/152, 0x20000318) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x280800, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$DRM_IOCTL_MODE_SETCRTC(0xffffffffffffffff, 0xc06864a2, &(0x7f0000000000)={0x0, 0x0, 0x20}) 00:55:38 executing program 5: socket$pppoe(0x18, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x3, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {0xffffffff}, {0x1}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}) 00:55:39 executing program 3: r0 = socket$pppoe(0x18, 0x1, 0x0) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x1c, 0x0, 0x100, 0x70bd2b, 0x25dfdbfe, {}, [@NLBL_MGMT_A_CV4DOI={0x8, 0x4, 0xffffffffffffffff}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000004}, 0x4000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000265000)=@req={0x0, 0x0, 0x2}, 0x10) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000200)={0xffffffffffffffff}) r3 = socket(0x10, 0x0, 0x0) sendmmsg$alg(r3, &(0x7f0000000140), 0x0, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$batadv(&(0x7f0000000300)='batadv\x00') r6 = socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r6, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_GET_MESH(r4, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000880)={&(0x7f00000001c0)={0x1c, r5, 0x27, 0x0, 0x0, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r7}]}, 0x1c}}, 0x0) sendmsg$BATADV_CMD_SET_MESH(r3, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x44, r5, 0x100, 0x70bd2a, 0x0, {}, [@BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x3}, @BATADV_ATTR_BONDING_ENABLED={0x5, 0x2d, 0x1}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x4}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5, 0x2f, 0x1}]}, 0x44}, 0x1, 0x0, 0x0, 0x8000}, 0x0) sendmsg$BATADV_CMD_GET_ORIGINATORS(r2, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x14, r5, 0x800, 0x70bd25, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x58000}, 0x4) r8 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r8, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {0x0, 0x3}, {0xffffffff}, {0x1}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) 00:55:39 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) r0 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) r1 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_IPV6_PKTINFO(r1, 0x29, 0x32, &(0x7f0000000240)={@mcast2}, 0x14) getsockopt$inet6_dccp_buf(r1, 0x21, 0x80, &(0x7f0000000680)=""/219, &(0x7f0000000780)=0xdb) ioctl$VIDIOC_SUBDEV_S_DV_TIMINGS(r0, 0xc0845657, &(0x7f0000000280)={0x0, @bt={0x7f, 0x1, 0x0, 0x0, 0x1, 0x7, 0x8001, 0x8, 0x3118, 0x7f, 0x4, 0x9, 0xffff, 0x43, 0x2, 0x1, {0x7, 0xffffffff}, 0x3, 0xb9}}) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) r3 = socket$inet6(0xa, 0x6, 0x0) ioctl$int_in(r3, 0x5452, &(0x7f0000000040)=0xffff) r4 = syz_open_dev$mouse(&(0x7f0000000340)='/dev/input/mouse#\x00', 0x3, 0x410000) ioctl$DRM_IOCTL_CONTROL(r4, 0x40086414, &(0x7f0000000640)={0x0, 0xac9}) connect$inet6(r3, &(0x7f0000419000)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_PKTINFO(r3, 0x29, 0x32, 0x0, 0x0) getsockopt$IP_SET_OP_VERSION(r3, 0x1, 0x53, &(0x7f0000000100), &(0x7f0000000200)=0x8) pipe(0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[@ANYBLOB="3c0000005200100025bd7000fddbdf2502080005000000000008000100", @ANYRES32=0x0, @ANYBLOB="52681dd7b6aaa1b13c4bdb52cafc641908000300000000000a0006"], 0x3c}, 0x1, 0x0, 0x0, 0x3400c080}, 0x40) r5 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r5, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) write$binfmt_elf64(r5, &(0x7f00000003c0)={{0x7f, 0x45, 0x4c, 0x46, 0x6, 0x81, 0x35, 0x4, 0x1, 0x59ad6aa4a884dd63, 0x3, 0x0, 0x13d, 0x40, 0x26e, 0x8000, 0x1f, 0x38, 0x1, 0x8, 0x8, 0x3}, [{0x6, 0x3, 0xefa, 0x1, 0x81, 0x80000000, 0x0, 0x9}, {0x7, 0x2, 0x7ff, 0xfff, 0x1, 0x4, 0x0, 0x800b}], "5ad165d3d87709dd80c73c9fa8b6ef39a345e1b2327e38197c13f3be9248c0f2161632606ce45b5c7d7349c883946ca190a061f77e1020dc808b86b4e3c7b2a6128e2d3b16a4ec69ad8c276d1a038ddc59bd46a7a37061ed24ba41f62de7aaf1c073c43333bee7ed0979404acecab631d46b591f921ec0a584aeb912342ff4f104ff960a3563460c943d11952c88bd0d13a69a425793b6f7d2b09cf17c87cdc331f63c983436cef6888b1a8328e953b0b3bade3aabbfc4818a05af", [[]]}, 0x26b) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_open_procfs(0x0, &(0x7f0000000000)='timers\x00') 00:55:39 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) pipe(0x0) wait4(0x0, 0x0, 0x40000000, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000265000)=@req={0x0, 0x400, 0x2}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000740)={{{@in=@multicast2, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@broadcast}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route(r1, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=@ipv4_getnetconf={0x54, 0x52, 0x10, 0x70bd25, 0x25dfdbfd, {}, [@NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x1}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x9}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x5}, @NETCONFA_FORWARDING={0x8}, @NETCONFA_IFINDEX={0x8, 0x1, r2}, @NETCONFA_RP_FILTER={0x8, 0x3, 0x7fff}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x3}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0xe9}]}, 0x54}, 0x1, 0x0, 0x0, 0x3400c080}, 0x40) read(0xffffffffffffffff, &(0x7f0000000280)=""/152, 0x20000318) openat$procfs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/keys\x00', 0x0, 0x0) r3 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r3, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) write$binfmt_elf64(r3, &(0x7f00000003c0)={{0x7f, 0x45, 0x4c, 0x46, 0x6, 0x81, 0x35, 0x4, 0x1, 0x59ad6aa4a884dd63, 0x3, 0x0, 0x13d, 0x40, 0x26e, 0x8000, 0x1f, 0x38, 0x1, 0x8, 0x8, 0x3}, [{0x6, 0x3, 0xefa, 0x1, 0x81, 0x80000000, 0x0, 0x9}, {0x7, 0x2, 0x7ff, 0xfff, 0x1, 0x4, 0x0, 0x800b}], "5ad165d3d87709dd80c73c9fa8b6ef39a345e1b2327e38197c13f3be9248c0f2161632606ce45b5c7d7349c883946ca190a061f77e1020dc808b86b4e3c7b2a6128e2d3b16a4ec69ad8c276d1a038ddc59bd46a7a37061ed24ba41f62de7aaf1c073c43333bee7ed0979404acecab631d46b591f921ec0a584aeb912342ff4f104ff960a3563460c943d11952c88bd0d13a69a425793b6f7d2b09cf17c87cdc331f63c983436cef6888b1a8328e953b0b3bade3aabbfc4818a05af", [[]]}, 0x26b) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_open_procfs(0x0, &(0x7f0000000000)='timers\x00') 00:55:39 executing program 5: socket$pppoe(0x18, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x4, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {0xffffffff}, {0x1}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}) 00:55:39 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) stat(&(0x7f0000000240)='./file0/file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(0xffffffffffffffff, &(0x7f0000001b80)) socket(0x11, 0x2, 0x5) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r4, 0x1, 0x14, &(0x7f0000000040), 0x50) getsockopt$IP6T_SO_GET_ENTRIES(r4, 0x29, 0x41, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)=0x1) fsetxattr$trusted_overlay_redirect(r3, &(0x7f0000000200)='trusted.overlay.redirect\x00', &(0x7f0000000280)='./file0/file0\x00', 0xe, 0x0) getsockname$tipc(0xffffffffffffffff, 0x0, &(0x7f0000000080)) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000001400)={{0x1, 0x0, @identifier="8e0f03f7e12b88d1af81f7c5a6bb175f"}, 0x67, [], "ed760111b8363e2de90692d0bc7e0a89824d3c77730403363ce0521cdcb1973b558cbd01ebf95bd9529fe3c5a95dcf31792e3e463d875b955a13582aeaddf6af34a98934ad6944b87292af67aec51fd37bd761db93cf6623d8683956791c956c97d76a9fd8df5d"}) lstat(&(0x7f0000000000)='./file0/file0\x00', &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000100)=0x0) r7 = getegid() r8 = socket$inet_tcp(0x2, 0x1, 0x0) r9 = fcntl$dupfd(r8, 0x0, r8) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) setresuid(r10, r10, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003ec0)={0x0, 0x0, 0x0}, 0x0) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, r11) r12 = openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$DRM_IOCTL_AGP_INFO(r12, 0x80386433, &(0x7f0000000bc0)=""/4096) getsockopt$sock_cred(r12, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0x194) setresuid(r13, r13, 0x0) r14 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r15 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r15, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) waitid(0x1, r15, &(0x7f0000000100), 0x80000004, &(0x7f0000000180)) r16 = shmget$private(0x0, 0x3000, 0x20, &(0x7f0000ffa000/0x3000)=nil) shmctl$SHM_STAT_ANY(r16, 0xf, &(0x7f0000000540)=""/221) shmctl$IPC_SET(r16, 0x1, &(0x7f0000000180)={{0x3, r10, r11, r13, r7, 0x42, 0x7}, 0x803ff, 0x2, 0xfffffffffffffffd, 0x0, r14, r15, 0x5}) shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000840)={{0x0, r2, r7, 0x0, r5, 0x50}, 0xd7, 0xfffffffffffffffe, 0x1000, 0x8000, r6}) r17 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000280)='/dev/nullb0\x00', 0x4400, 0x0) preadv(r17, &(0x7f0000000040)=[{&(0x7f0000000400)=""/4096, 0x3ffc00}], 0x1, 0x0) 00:55:39 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) pipe(0x0) wait4(0x0, 0x0, 0x40000000, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000265000)=@req={0x0, 0x400}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000740)={{{@in=@multicast2, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@broadcast}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route(r1, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=@ipv4_getnetconf={0x54, 0x52, 0x10, 0x70bd25, 0x25dfdbfd, {}, [@NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x1}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x9}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x5}, @NETCONFA_FORWARDING={0x8, 0x2, 0x8}, @NETCONFA_IFINDEX={0x8, 0x1, r2}, @NETCONFA_RP_FILTER={0x8, 0x3, 0x7fff}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x3}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0xe9}]}, 0x54}, 0x1, 0x0, 0x0, 0x3400c080}, 0x40) read(0xffffffffffffffff, &(0x7f0000000280)=""/152, 0x20000318) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/keys\x00', 0x0, 0x0) r4 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r4, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) write$binfmt_elf64(r4, &(0x7f00000003c0)={{0x7f, 0x45, 0x4c, 0x46, 0x6, 0x81, 0x35, 0x4, 0x1, 0x59ad6aa4a884dd63, 0x3, 0x0, 0x13d, 0x40, 0x26e, 0x8000, 0x1f, 0x38, 0x1, 0x8, 0x8, 0x3}, [{0x0, 0x3, 0xefa, 0x1, 0x81, 0x80000000, 0x0, 0x9}, {0x7, 0x2, 0x7ff, 0xfff, 0x1, 0x4, 0x0, 0x800b}], "5ad165d3d87709dd80c73c9fa8b6ef39a345e1b2327e38197c13f3be9248c0f2161632606ce45b5c7d7349c883946ca190a061f77e1020dc808b86b4e3c7b2a6128e2d3b16a4ec69ad8c276d1a038ddc59bd46a7a37061ed24ba41f62de7aaf1c073c43333bee7ed0979404acecab631d46b591f921ec0a584aeb912342ff4f104ff960a3563460c943d11952c88bd0d13a69a425793b6f7d2b09cf17c87cdc331f63c983436cef6888b1a8328e953b0b3bade3aabbfc4818a05af", [[]]}, 0x26b) read(r3, &(0x7f0000000280)=""/152, 0x20000318) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x280800, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$DRM_IOCTL_MODE_SETCRTC(0xffffffffffffffff, 0xc06864a2, &(0x7f0000000000)={0x0, 0x0, 0x20}) 00:55:39 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) pipe(0x0) wait4(0x0, 0x0, 0x40000000, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000265000)=@req={0x0, 0x400, 0x2}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000740)={{{@in=@multicast2, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@broadcast}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route(r1, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=@ipv4_getnetconf={0x4c, 0x52, 0x10, 0x70bd25, 0x25dfdbfd, {}, [@NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x1}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x9}, @NETCONFA_FORWARDING={0x8, 0x2, 0x8}, @NETCONFA_IFINDEX={0x8, 0x1, r2}, @NETCONFA_RP_FILTER={0x8, 0x3, 0x7fff}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x3}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0xe9}]}, 0x4c}, 0x1, 0x0, 0x0, 0x3400c080}, 0x40) read(0xffffffffffffffff, &(0x7f0000000280)=""/152, 0x20000318) openat$procfs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/keys\x00', 0x0, 0x0) r3 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r3, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) write$binfmt_elf64(r3, &(0x7f00000003c0)={{0x7f, 0x45, 0x4c, 0x46, 0x6, 0x81, 0x35, 0x4, 0x1, 0x59ad6aa4a884dd63, 0x3, 0x0, 0x13d, 0x40, 0x26e, 0x8000, 0x1f, 0x38, 0x1, 0x8, 0x8, 0x3}, [{0x6, 0x3, 0xefa, 0x1, 0x81, 0x80000000, 0x0, 0x9}, {0x7, 0x2, 0x7ff, 0xfff, 0x1, 0x4, 0x0, 0x800b}], "5ad165d3d87709dd80c73c9fa8b6ef39a345e1b2327e38197c13f3be9248c0f2161632606ce45b5c7d7349c883946ca190a061f77e1020dc808b86b4e3c7b2a6128e2d3b16a4ec69ad8c276d1a038ddc59bd46a7a37061ed24ba41f62de7aaf1c073c43333bee7ed0979404acecab631d46b591f921ec0a584aeb912342ff4f104ff960a3563460c943d11952c88bd0d13a69a425793b6f7d2b09cf17c87cdc331f63c983436cef6888b1a8328e953b0b3bade3aabbfc4818a05af", [[]]}, 0x26b) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_open_procfs(0x0, &(0x7f0000000000)='timers\x00') 00:55:40 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) pipe(0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000400)=0x14) ioctl$sock_inet6_SIOCADDRT(r1, 0x89a0, &(0x7f0000000440)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @remote, @remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x42, r2}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=@ipv4_getnetconf={0x3c, 0x52, 0x10, 0x70bd25, 0x25dfdbfd, {}, [@NETCONFA_PROXY_NEIGH={0x8}, @NETCONFA_IFINDEX={0x8}, @NETCONFA_RP_FILTER={0x8}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x3}, @NETCONFA_IFINDEX={0x8, 0x1, r2}]}, 0x3c}, 0x1, 0x0, 0x0, 0x3400c080}, 0x40) r3 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r3, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) r4 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x444442, 0x0) write$USERIO_CMD_SEND_INTERRUPT(r4, &(0x7f0000000200), 0x2) write$binfmt_elf64(r3, &(0x7f0000000640)=ANY=[@ANYBLOB="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"/625], 0x26b) r5 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000280)='/dev/hwrng\x00', 0x40000, 0x0) ioctl$MON_IOCH_MFLUSH(r5, 0x9208, 0x6ac8) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_open_procfs(0x0, &(0x7f0000000000)='timers\x00') 00:55:40 executing program 3: r0 = socket$pppoe(0x18, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x2, @link_local, 'team0\x00'}}, 0x1e) r1 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r1, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, {0x0, 0x3}, {0xffffffff}, {0x1}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) 00:55:40 executing program 5: socket$pppoe(0x18, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x5, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {0xffffffff}, {0x1}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}) 00:55:40 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0xff, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) pipe(0x0) r1 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000265000)=@req={0x0, 0x0, 0x2}, 0x10) getsockopt$PNPIPE_IFINDEX(r1, 0x113, 0x2, &(0x7f0000000100)=0x0, &(0x7f0000000200)=0x4) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x280}, 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=@ipv4_getnetconf={0x3c, 0x52, 0x10, 0x70bd25, 0x25dfdbfd, {}, [@NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x7}, @NETCONFA_IFINDEX={0x8}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x20}, @NETCONFA_IFINDEX={0x8, 0x1, r2}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0xe9}]}, 0x3c}, 0x1, 0x0, 0x0, 0x3400c080}, 0x40) r3 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r3, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_open_procfs(0x0, &(0x7f0000000000)='timers\x00') 00:55:40 executing program 3: r0 = socket$pppoe(0x18, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x2, @link_local, 'team0\x00'}}, 0x1e) ioctl$FBIOPUT_VSCREENINFO(0xffffffffffffffff, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {0x0, 0x3}, {0xffffffff}, {0x1}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) 00:55:40 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) pipe(0x0) wait4(0x0, 0x0, 0x40000000, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000265000)=@req={0x0, 0x400, 0x2}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000740)={{{@in=@multicast2, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@broadcast}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route(r1, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=@ipv4_getnetconf={0x4c, 0x52, 0x10, 0x70bd25, 0x25dfdbfd, {}, [@NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x1}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x9}, @NETCONFA_FORWARDING={0x8, 0x2, 0x8}, @NETCONFA_IFINDEX={0x8, 0x1, r2}, @NETCONFA_RP_FILTER={0x8, 0x3, 0x7fff}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x3}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0xe9}]}, 0x4c}, 0x1, 0x0, 0x0, 0x3400c080}, 0x40) read(0xffffffffffffffff, &(0x7f0000000280)=""/152, 0x20000318) openat$procfs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/keys\x00', 0x0, 0x0) r3 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r3, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) write$binfmt_elf64(r3, &(0x7f00000003c0)={{0x7f, 0x45, 0x4c, 0x46, 0x6, 0x81, 0x35, 0x4, 0x1, 0x59ad6aa4a884dd63, 0x3, 0x0, 0x13d, 0x40, 0x26e, 0x8000, 0x1f, 0x38, 0x1, 0x8, 0x8, 0x3}, [{0x6, 0x3, 0xefa, 0x1, 0x81, 0x80000000, 0x0, 0x9}, {0x7, 0x2, 0x7ff, 0xfff, 0x1, 0x4, 0x0, 0x800b}], "5ad165d3d87709dd80c73c9fa8b6ef39a345e1b2327e38197c13f3be9248c0f2161632606ce45b5c7d7349c883946ca190a061f77e1020dc808b86b4e3c7b2a6128e2d3b16a4ec69ad8c276d1a038ddc59bd46a7a37061ed24ba41f62de7aaf1c073c43333bee7ed0979404acecab631d46b591f921ec0a584aeb912342ff4f104ff960a3563460c943d11952c88bd0d13a69a425793b6f7d2b09cf17c87cdc331f63c983436cef6888b1a8328e953b0b3bade3aabbfc4818a05af", [[]]}, 0x26b) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_open_procfs(0x0, &(0x7f0000000000)='timers\x00') 00:55:40 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) pipe(0x0) wait4(0x0, 0x0, 0x40000000, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000265000)=@req={0x0, 0x400}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000740)={{{@in=@multicast2, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@broadcast}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route(r1, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=@ipv4_getnetconf={0x54, 0x52, 0x10, 0x70bd25, 0x25dfdbfd, {}, [@NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x1}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x9}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x5}, @NETCONFA_FORWARDING={0x8, 0x2, 0x8}, @NETCONFA_IFINDEX={0x8, 0x1, r2}, @NETCONFA_RP_FILTER={0x8, 0x3, 0x7fff}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x3}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0xe9}]}, 0x54}, 0x1, 0x0, 0x0, 0x3400c080}, 0x40) read(0xffffffffffffffff, &(0x7f0000000280)=""/152, 0x20000318) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/keys\x00', 0x0, 0x0) r4 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r4, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) write$binfmt_elf64(r4, &(0x7f00000003c0)={{0x7f, 0x45, 0x4c, 0x46, 0x6, 0x81, 0x35, 0x4, 0x1, 0x59ad6aa4a884dd63, 0x3, 0x0, 0x13d, 0x40, 0x26e, 0x8000, 0x1f, 0x38, 0x1, 0x8, 0x8, 0x3}, [{0x0, 0x3, 0xefa, 0x1, 0x81, 0x80000000, 0x0, 0x9}, {0x7, 0x2, 0x7ff, 0xfff, 0x1, 0x4, 0x0, 0x800b}], "5ad165d3d87709dd80c73c9fa8b6ef39a345e1b2327e38197c13f3be9248c0f2161632606ce45b5c7d7349c883946ca190a061f77e1020dc808b86b4e3c7b2a6128e2d3b16a4ec69ad8c276d1a038ddc59bd46a7a37061ed24ba41f62de7aaf1c073c43333bee7ed0979404acecab631d46b591f921ec0a584aeb912342ff4f104ff960a3563460c943d11952c88bd0d13a69a425793b6f7d2b09cf17c87cdc331f63c983436cef6888b1a8328e953b0b3bade3aabbfc4818a05af", [[]]}, 0x26b) read(r3, &(0x7f0000000280)=""/152, 0x20000318) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x280800, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$DRM_IOCTL_MODE_SETCRTC(0xffffffffffffffff, 0xc06864a2, &(0x7f0000000000)={0x0, 0x0, 0x20}) 00:55:41 executing program 3: r0 = socket$pppoe(0x18, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000265000)=@req={0x0, 0x0, 0x2}, 0x10) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00') sendmsg$NL80211_CMD_GET_MPATH(r2, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000000140)={0x58, r3, 0x2468825185d9173d, 0x0, 0x0, {}, [@NL80211_ATTR_MPATH_NEXT_HOP={0xa, 0x1a, @random="dd6071e90625"}, @NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MPATH_NEXT_HOP={0xa, 0x1a, @random="45763816233e"}, @NL80211_ATTR_MAC={0x4, 0x6, @link_local}, @NL80211_ATTR_WDEV={0xc}]}, 0x58}}, 0x0) sendmsg$NL80211_CMD_STOP_SCHED_SCAN(r1, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x28, r3, 0x8, 0x70bd29, 0x25dfdbff, {}, [@NL80211_ATTR_SCHED_SCAN_DELAY={0x8, 0xdc, 0x10000}, @NL80211_ATTR_MAC={0xa, 0x6, @remote}]}, 0x28}, 0x1, 0x0, 0x0, 0x1}, 0x40) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x2, @link_local, 'team0\x00'}}, 0x1e) r4 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) r5 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r5, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) dup(r5) r6 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x111402, 0x0) ioctl$VIDIOC_SUBDEV_G_SELECTION(r6, 0xc040563d, &(0x7f0000000100)={0x0, 0x0, 0x2, 0x7, {0x6, 0x6, 0x101, 0x8}}) ioctl$FBIOPUT_VSCREENINFO(r4, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x6c, 0x0, 0x4, 0x0, {0x0, 0x3}, {0xffffffff}, {0x1}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) 00:55:41 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nvme-fabrics\x00', 0x400000, 0x0) openat$cgroup_procs(r0, &(0x7f0000000200)='cgroup.threads\x00', 0x2, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) pipe(0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=@ipv4_getnetconf={0x3c, 0x52, 0x10, 0x70bd25, 0x25dfdbfd, {}, [@NETCONFA_PROXY_NEIGH={0x8}, @NETCONFA_IFINDEX={0x8}, @NETCONFA_RP_FILTER={0x8}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x3}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0xe9}]}, 0x3c}, 0x1, 0x0, 0x0, 0x3400c080}, 0x40) r2 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r2, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) write$binfmt_elf64(r2, &(0x7f00000003c0)={{0x7f, 0x45, 0x4c, 0x46, 0x6, 0x81, 0x35, 0x4, 0x1, 0x59ad6aa4a884dd63, 0x3, 0x0, 0x13d, 0x40, 0x26e, 0x8000, 0x1f, 0x38, 0x1, 0x8, 0x8, 0x3}, [{0x6, 0x3, 0xefa, 0x1, 0x81, 0x80000000, 0x0, 0x9}, {0x7, 0x2, 0x7ff, 0xfff, 0x1, 0x4, 0x0, 0x800b}], "5ad165d3d87709dd80c73c9fa8b6ef39a345e1b2327e38197c13f3be9248c0f2161632606ce45b5c7d7349c883946ca190a061f77e1020dc808b86b4e3c7b2a6128e2d3b16a4ec69ad8c276d1a038ddc59bd46a7a37061ed24ba41f62de7aaf1c073c43333bee7ed0979404acecab631d46b591f921ec0a584aeb912342ff4f104ff960a3563460c943d11952c88bd0d13a69a425793b6f7d2b09cf17c87cdc331f63c983436cef6888b1a8328e953b0b3bade3aabbfc4818a05af", [[]]}, 0x26b) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_open_procfs(0x0, &(0x7f0000000000)='timers\x00') [ 576.452071][T27677] netlink: 'syz-executor.3': attribute type 6 has an invalid length. 00:55:41 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) stat(&(0x7f0000000240)='./file0/file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(0xffffffffffffffff, &(0x7f0000001b80)) socket(0x11, 0x2, 0x5) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r4, 0x1, 0x14, &(0x7f0000000040), 0x50) getsockopt$IP6T_SO_GET_ENTRIES(r4, 0x29, 0x41, &(0x7f0000000480)=ANY=[@ANYBLOB="6e2f740000edffffffffffffff00000000000000000000000000000000000000ad0000005086f3915e59ad8184af4045c4e742fa881d66411baabaa82dda6d71f825249ec2eb0ad398766b6b870bba11fc00df87700a78319e5f5d955a5eb0f50e2dcd95623e3eba93f21d4733f6d4834e398f5ba4540b18afc3c2a92ff6e4a89dc029fdd87fc0c2ca637f5ead98feb48d1bfe6451a583e519234bd5297e8a8bf569ff90077ba1cef2ea64c8f027947915a33e26b9d8b4fb56ba4d86df286c34e0cd9715e6b39dcccf4eb92a1706ed98b4aafd220eecfac13859aaab4dc07cd467149066f2f637c1e58f02faf49d72752753fe6beceb9d14b1ab3832cab4d59f892cb6f3689b67eaf81e929525a7fe0f2ea0892194387f7d085ea12c8842b8790911042b2a48b65c40087bd66593e0cfc29843b29738147ea75bb6c3d9664dc189fca97c43ed585ebb0c2a03782d916c709f6fdeca72784a8ac21d3ff8c9551290ea0000000000000049d4bb98580f9f7b7da060b127fd66ae6ad3c8753701b37ed619b2ed3efe8621000000000000000000"], &(0x7f0000000340)=0x1) fsetxattr$trusted_overlay_redirect(r3, &(0x7f0000000200)='trusted.overlay.redirect\x00', &(0x7f0000000280)='./file0/file0\x00', 0xe, 0x0) getsockname$tipc(0xffffffffffffffff, 0x0, &(0x7f0000000080)) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000001400)={{0x1, 0x0, @identifier="8e0f03f7e12b88d1af81f7c5a6bb175f"}, 0x67, [], "ed760111b8363e2de90692d0bc7e0a89824d3c77730403363ce0521cdcb1973b558cbd01ebf95bd9529fe3c5a95dcf31792e3e463d875b955a13582aeaddf6af34a98934ad6944b87292af67aec51fd37bd761db93cf6623d8683956791c956c97d76a9fd8df5d"}) lstat(&(0x7f0000000000)='./file0/file0\x00', &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000100)=0x0) r7 = getegid() r8 = socket$inet_tcp(0x2, 0x1, 0x0) r9 = fcntl$dupfd(r8, 0x0, r8) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) setresuid(r10, r10, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003ec0)={0x0, 0x0, 0x0}, 0x0) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, r11) r12 = openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$DRM_IOCTL_AGP_INFO(r12, 0x80386433, &(0x7f0000000bc0)=""/4096) getsockopt$sock_cred(r12, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0x194) setresuid(r13, r13, 0x0) r14 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r15 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r15, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) waitid(0x1, r15, &(0x7f0000000100), 0x80000004, &(0x7f0000000180)) r16 = shmget$private(0x0, 0x3000, 0x20, &(0x7f0000ffa000/0x3000)=nil) shmctl$SHM_STAT_ANY(r16, 0xf, &(0x7f0000000540)=""/221) shmctl$IPC_SET(r16, 0x1, &(0x7f0000000180)={{0x3, r10, r11, r13, r7, 0x42, 0x7}, 0x803ff, 0x2, 0xfffffffffffffffd, 0x0, r14, r15, 0x5}) shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000840)={{0x0, r2, r7, 0x0, r5, 0x50}, 0xd7, 0xfffffffffffffffe, 0x1000, 0x8000, r6}) r17 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000280)='/dev/nullb0\x00', 0x4400, 0x0) preadv(r17, &(0x7f0000000040)=[{&(0x7f0000000400)=""/4096, 0x3ffc00}], 0x1, 0x0) 00:55:41 executing program 5: socket$pppoe(0x18, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x6, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {0xffffffff}, {0x1}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}) 00:55:41 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) pipe(0x0) wait4(0x0, 0x0, 0x40000000, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000265000)=@req={0x0, 0x400}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000740)={{{@in=@multicast2, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@broadcast}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route(r1, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=@ipv4_getnetconf={0x54, 0x52, 0x10, 0x70bd25, 0x25dfdbfd, {}, [@NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x1}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x9}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x5}, @NETCONFA_FORWARDING={0x8, 0x2, 0x8}, @NETCONFA_IFINDEX={0x8, 0x1, r2}, @NETCONFA_RP_FILTER={0x8, 0x3, 0x7fff}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x3}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0xe9}]}, 0x54}, 0x1, 0x0, 0x0, 0x3400c080}, 0x40) read(0xffffffffffffffff, &(0x7f0000000280)=""/152, 0x20000318) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/keys\x00', 0x0, 0x0) r4 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r4, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) write$binfmt_elf64(r4, &(0x7f00000003c0)={{0x7f, 0x45, 0x4c, 0x46, 0x6, 0x81, 0x35, 0x4, 0x1, 0x59ad6aa4a884dd63, 0x3, 0x0, 0x13d, 0x40, 0x26e, 0x8000, 0x1f, 0x38, 0x1, 0x8, 0x8, 0x3}, [{0x6, 0x0, 0xefa, 0x1, 0x81, 0x80000000, 0x0, 0x9}, {0x7, 0x2, 0x7ff, 0xfff, 0x1, 0x4, 0x0, 0x800b}], "5ad165d3d87709dd80c73c9fa8b6ef39a345e1b2327e38197c13f3be9248c0f2161632606ce45b5c7d7349c883946ca190a061f77e1020dc808b86b4e3c7b2a6128e2d3b16a4ec69ad8c276d1a038ddc59bd46a7a37061ed24ba41f62de7aaf1c073c43333bee7ed0979404acecab631d46b591f921ec0a584aeb912342ff4f104ff960a3563460c943d11952c88bd0d13a69a425793b6f7d2b09cf17c87cdc331f63c983436cef6888b1a8328e953b0b3bade3aabbfc4818a05af", [[]]}, 0x26b) read(r3, &(0x7f0000000280)=""/152, 0x20000318) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x280800, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$DRM_IOCTL_MODE_SETCRTC(0xffffffffffffffff, 0xc06864a2, &(0x7f0000000000)={0x0, 0x0, 0x20}) 00:55:42 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) pipe(0x0) wait4(0x0, 0x0, 0x40000000, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000265000)=@req={0x0, 0x400, 0x2}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000740)={{{@in=@multicast2, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@broadcast}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route(r1, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=@ipv4_getnetconf={0x4c, 0x52, 0x10, 0x70bd25, 0x25dfdbfd, {}, [@NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x1}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x9}, @NETCONFA_FORWARDING={0x8, 0x2, 0x8}, @NETCONFA_IFINDEX={0x8, 0x1, r2}, @NETCONFA_RP_FILTER={0x8, 0x3, 0x7fff}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x3}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0xe9}]}, 0x4c}, 0x1, 0x0, 0x0, 0x3400c080}, 0x40) read(0xffffffffffffffff, &(0x7f0000000280)=""/152, 0x20000318) openat$procfs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/keys\x00', 0x0, 0x0) r3 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r3, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) write$binfmt_elf64(r3, &(0x7f00000003c0)={{0x7f, 0x45, 0x4c, 0x46, 0x6, 0x81, 0x35, 0x4, 0x1, 0x59ad6aa4a884dd63, 0x3, 0x0, 0x13d, 0x40, 0x26e, 0x8000, 0x1f, 0x38, 0x1, 0x8, 0x8, 0x3}, [{0x6, 0x3, 0xefa, 0x1, 0x81, 0x80000000, 0x0, 0x9}, {0x7, 0x2, 0x7ff, 0xfff, 0x1, 0x4, 0x0, 0x800b}], "5ad165d3d87709dd80c73c9fa8b6ef39a345e1b2327e38197c13f3be9248c0f2161632606ce45b5c7d7349c883946ca190a061f77e1020dc808b86b4e3c7b2a6128e2d3b16a4ec69ad8c276d1a038ddc59bd46a7a37061ed24ba41f62de7aaf1c073c43333bee7ed0979404acecab631d46b591f921ec0a584aeb912342ff4f104ff960a3563460c943d11952c88bd0d13a69a425793b6f7d2b09cf17c87cdc331f63c983436cef6888b1a8328e953b0b3bade3aabbfc4818a05af", [[]]}, 0x26b) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_open_procfs(0x0, &(0x7f0000000000)='timers\x00') 00:55:42 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) pipe(0x0) wait4(0x0, 0x0, 0x40000000, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000265000)=@req={0x0, 0x400}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000740)={{{@in=@multicast2, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@broadcast}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route(r1, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=@ipv4_getnetconf={0x54, 0x52, 0x10, 0x70bd25, 0x25dfdbfd, {}, [@NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x1}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x9}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x5}, @NETCONFA_FORWARDING={0x8, 0x2, 0x8}, @NETCONFA_IFINDEX={0x8, 0x1, r2}, @NETCONFA_RP_FILTER={0x8, 0x3, 0x7fff}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x3}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0xe9}]}, 0x54}, 0x1, 0x0, 0x0, 0x3400c080}, 0x40) read(0xffffffffffffffff, &(0x7f0000000280)=""/152, 0x20000318) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/keys\x00', 0x0, 0x0) r4 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r4, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) write$binfmt_elf64(r4, &(0x7f00000003c0)={{0x7f, 0x45, 0x4c, 0x46, 0x6, 0x81, 0x35, 0x4, 0x1, 0x59ad6aa4a884dd63, 0x3, 0x0, 0x13d, 0x40, 0x26e, 0x8000, 0x1f, 0x38, 0x1, 0x8, 0x8, 0x3}, [{0x6, 0x0, 0xefa, 0x1, 0x81, 0x80000000, 0x0, 0x9}, {0x7, 0x2, 0x7ff, 0xfff, 0x1, 0x4, 0x0, 0x800b}], "5ad165d3d87709dd80c73c9fa8b6ef39a345e1b2327e38197c13f3be9248c0f2161632606ce45b5c7d7349c883946ca190a061f77e1020dc808b86b4e3c7b2a6128e2d3b16a4ec69ad8c276d1a038ddc59bd46a7a37061ed24ba41f62de7aaf1c073c43333bee7ed0979404acecab631d46b591f921ec0a584aeb912342ff4f104ff960a3563460c943d11952c88bd0d13a69a425793b6f7d2b09cf17c87cdc331f63c983436cef6888b1a8328e953b0b3bade3aabbfc4818a05af", [[]]}, 0x26b) read(r3, &(0x7f0000000280)=""/152, 0x20000318) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x280800, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$DRM_IOCTL_MODE_SETCRTC(0xffffffffffffffff, 0xc06864a2, &(0x7f0000000000)={0x0, 0x0, 0x20}) 00:55:42 executing program 3: r0 = socket$pppoe(0x18, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r1, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) ioctl$VIDIOC_SUBDEV_S_SELECTION(r1, 0xc040563e, &(0x7f0000000280)={0x1, 0x0, 0x0, 0x2, {0x8, 0x400, 0x80000000, 0x3d6}}) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x2, @link_local, 'team0\x00'}}, 0x1e) r2 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r2, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {0x0, 0x3}, {0xffffffff}, {0x1}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000400)='/dev/dlm-monitor\x00', 0x100, 0x0) r4 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={0x0, r3, 0x0, 0x9, &(0x7f0000000140)='/dev/fb0\x00', 0xffffffffffffffff}, 0x30) r6 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r6, 0x10e, 0xc, &(0x7f0000000040)={0x1}, 0x10) sendmsg$nl_generic(r6, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000300)=ANY=[@ANYBLOB="2c0000001600010a0000ba95235c9421d2a9ce12c0fb907100000000000a00000018000080d4c6fcb929d9ba00927b124cc244390777a2ebef93ad350bc7c1ecb3e15a8e64fa5782c8c5c6cc36"], 0x2c}}, 0x0) ptrace$setsig(0x4203, r5, 0x7, &(0x7f0000000200)={0x26, 0x0, 0x20}) ioctl$FBIOPUT_VSCREENINFO(r4, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) fcntl$F_GET_RW_HINT(r4, 0x40b, &(0x7f00000000c0)) syz_open_dev$midi(&(0x7f0000000100)='/dev/midi#\x00', 0x8, 0x228000) 00:55:42 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x4, 0x800}, 0x0, 0x0, 0xffffffffffffffff, 0x1) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) readlink(&(0x7f0000000280)='./file0\x00', &(0x7f0000000300)=""/78, 0x4e) pipe(0x0) r1 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000265000)=@req={0x0, 0x0, 0x2}, 0x10) r2 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f0000000100)={r3}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r1, 0x84, 0x10, &(0x7f0000000100)=@assoc_value={r3, 0xfffffffe}, &(0x7f0000000200)=0x8) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=@ipv4_getnetconf={0x3c, 0x52, 0x10, 0x70bd25, 0x25dfdbfd, {}, [@NETCONFA_PROXY_NEIGH={0x8}, @NETCONFA_IFINDEX={0x8}, @NETCONFA_RP_FILTER={0x8}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x3}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0xe9}]}, 0x3c}, 0x1, 0x0, 0x0, 0x3400c080}, 0x40) r4 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r4, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) write$binfmt_elf64(r4, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"/612], 0x26b) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = getpid() sched_setscheduler(r5, 0x5, &(0x7f0000000380)) syz_open_procfs(r0, &(0x7f00000002c0)='loginuid\x00') 00:55:42 executing program 5: socket$pppoe(0x18, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x7, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {0xffffffff}, {0x1}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}) 00:55:43 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) pipe(0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=@ipv4_getnetconf={0x3c, 0x52, 0x10, 0x70bd25, 0x25dfdbfd, {}, [@NETCONFA_PROXY_NEIGH={0x8}, @NETCONFA_IFINDEX={0x8}, @NETCONFA_RP_FILTER={0x8}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x3}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0xe9}]}, 0x3c}, 0x1, 0x0, 0x0, 0x3400c080}, 0x40) r1 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r1, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) r2 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x10000) socket$key(0xf, 0x3, 0x2) getsockopt$inet_sctp_SCTP_HMAC_IDENT(r2, 0x84, 0x16, &(0x7f00000006c0)=ANY=[@ANYBLOB="f29d99330c691af430c2685f11b58e1719049f38f5267b1b73fd3e99056b3444e642b102e59f4c59532a03644f769a7a288d296ad97a8d4cb4444a9010ba0c9a95aff55e651630697c1d929f0468311cab3301325b06b8a3f724bfc8e69836e4d96f4faabe1f39e38689ac851755526fb8d80965c4fb8c95e2da79caf399eb729b6ccfc7ea4454051d62bdd9642b4751c97bfe20ee"], &(0x7f0000000280)=0xa) write$binfmt_elf64(r1, &(0x7f00000003c0)={{0x7f, 0x45, 0x4c, 0x46, 0x6, 0x81, 0x35, 0x4, 0x1, 0x59ad6aa4a884dd63, 0x3, 0x0, 0x13d, 0x40, 0x26e, 0x8000, 0x1f, 0x38, 0x1, 0x8, 0x8, 0x3}, [{0x6, 0x3, 0xefa, 0x1, 0x81, 0x80000000, 0x0, 0x9}, {0x7, 0x2, 0x7ff, 0xfff, 0x1, 0x4, 0x0, 0x800b}], "5ad165d3d87709dd80c73c9fa8b6ef39a345e1b2327e38197c13f3be9248c0f2161632606ce45b5c7d7349c883946ca190a061f77e1020dc808b86b4e3c7b2a6128e2d3b16a4ec69ad8c276d1a038ddc59bd46a7a37061ed24ba41f62de7aaf1c073c43333bee7ed0979404acecab631d46b591f921ec0a584aeb912342ff4f104ff960a3563460c943d11952c88bd0d13a69a425793b6f7d2b09cf17c87cdc331f63c983436cef6888b1a8328e953b0b3bade3aabbfc4818a05af", [[]]}, 0x26b) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$TIPC_SOCK_RECVQ_DEPTH(r2, 0x10f, 0x84, &(0x7f00000002c0), &(0x7f0000000300)=0x4) syz_open_procfs(0x0, &(0x7f0000000000)='timers\x00') setsockopt$IP6T_SO_SET_ADD_COUNTERS(r2, 0x29, 0x41, &(0x7f0000000640)={'security\x00', 0x5, [{}, {}, {}, {}, {}]}, 0x78) 00:55:43 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) stat(&(0x7f0000000240)='./file0/file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(0xffffffffffffffff, &(0x7f0000001b80)) socket(0x11, 0x2, 0x5) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r4, 0x1, 0x14, &(0x7f0000000040), 0x50) getsockopt$IP6T_SO_GET_ENTRIES(r4, 0x29, 0x41, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/404], &(0x7f0000000340)=0x1) fsetxattr$trusted_overlay_redirect(r3, &(0x7f0000000200)='trusted.overlay.redirect\x00', &(0x7f0000000280)='./file0/file0\x00', 0xe, 0x0) getsockname$tipc(0xffffffffffffffff, 0x0, &(0x7f0000000080)) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000001400)={{0x1, 0x0, @identifier="8e0f03f7e12b88d1af81f7c5a6bb175f"}, 0x67, [], "ed760111b8363e2de90692d0bc7e0a89824d3c77730403363ce0521cdcb1973b558cbd01ebf95bd9529fe3c5a95dcf31792e3e463d875b955a13582aeaddf6af34a98934ad6944b87292af67aec51fd37bd761db93cf6623d8683956791c956c97d76a9fd8df5d"}) lstat(&(0x7f0000000000)='./file0/file0\x00', &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000100)=0x0) r7 = getegid() r8 = socket$inet_tcp(0x2, 0x1, 0x0) r9 = fcntl$dupfd(r8, 0x0, r8) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) setresuid(r10, r10, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003ec0)={0x0, 0x0, 0x0}, 0x0) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, r11) r12 = openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$DRM_IOCTL_AGP_INFO(r12, 0x80386433, &(0x7f0000000bc0)=""/4096) getsockopt$sock_cred(r12, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0x194) setresuid(r13, r13, 0x0) r14 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r15 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r15, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) waitid(0x1, r15, &(0x7f0000000100), 0x80000004, &(0x7f0000000180)) r16 = shmget$private(0x0, 0x3000, 0x20, &(0x7f0000ffa000/0x3000)=nil) shmctl$SHM_STAT_ANY(r16, 0xf, &(0x7f0000000540)=""/221) shmctl$IPC_SET(r16, 0x1, &(0x7f0000000180)={{0x3, r10, r11, r13, r7, 0x42, 0x7}, 0x803ff, 0x2, 0xfffffffffffffffd, 0x0, r14, r15, 0x5}) shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000840)={{0x0, r2, r7, 0x0, r5, 0x50}, 0xd7, 0xfffffffffffffffe, 0x1000, 0x8000, r6}) r17 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000280)='/dev/nullb0\x00', 0x4400, 0x0) preadv(r17, &(0x7f0000000040)=[{&(0x7f0000000400)=""/4096, 0x3ffc00}], 0x1, 0x0) 00:55:43 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) pipe(0x0) wait4(0x0, 0x0, 0x40000000, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000265000)=@req={0x0, 0x400}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000740)={{{@in=@multicast2, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@broadcast}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route(r1, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=@ipv4_getnetconf={0x54, 0x52, 0x10, 0x70bd25, 0x25dfdbfd, {}, [@NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x1}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x9}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x5}, @NETCONFA_FORWARDING={0x8, 0x2, 0x8}, @NETCONFA_IFINDEX={0x8, 0x1, r2}, @NETCONFA_RP_FILTER={0x8, 0x3, 0x7fff}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x3}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0xe9}]}, 0x54}, 0x1, 0x0, 0x0, 0x3400c080}, 0x40) read(0xffffffffffffffff, &(0x7f0000000280)=""/152, 0x20000318) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/keys\x00', 0x0, 0x0) r4 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r4, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) write$binfmt_elf64(r4, &(0x7f00000003c0)={{0x7f, 0x45, 0x4c, 0x46, 0x6, 0x81, 0x35, 0x4, 0x1, 0x59ad6aa4a884dd63, 0x3, 0x0, 0x13d, 0x40, 0x26e, 0x8000, 0x1f, 0x38, 0x1, 0x8, 0x8, 0x3}, [{0x6, 0x0, 0xefa, 0x1, 0x81, 0x80000000, 0x0, 0x9}, {0x7, 0x2, 0x7ff, 0xfff, 0x1, 0x4, 0x0, 0x800b}], "5ad165d3d87709dd80c73c9fa8b6ef39a345e1b2327e38197c13f3be9248c0f2161632606ce45b5c7d7349c883946ca190a061f77e1020dc808b86b4e3c7b2a6128e2d3b16a4ec69ad8c276d1a038ddc59bd46a7a37061ed24ba41f62de7aaf1c073c43333bee7ed0979404acecab631d46b591f921ec0a584aeb912342ff4f104ff960a3563460c943d11952c88bd0d13a69a425793b6f7d2b09cf17c87cdc331f63c983436cef6888b1a8328e953b0b3bade3aabbfc4818a05af", [[]]}, 0x26b) read(r3, &(0x7f0000000280)=""/152, 0x20000318) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x280800, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$DRM_IOCTL_MODE_SETCRTC(0xffffffffffffffff, 0xc06864a2, &(0x7f0000000000)={0x0, 0x0, 0x20}) 00:55:43 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) pipe(0x0) wait4(0x0, 0x0, 0x40000000, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000265000)=@req={0x0, 0x400, 0x2}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000740)={{{@in=@multicast2, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@broadcast}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route(r1, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=@ipv4_getnetconf={0x54, 0x52, 0x10, 0x70bd25, 0x25dfdbfd, {}, [@NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x1}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x9}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8}, @NETCONFA_FORWARDING={0x8, 0x2, 0x8}, @NETCONFA_IFINDEX={0x8, 0x1, r2}, @NETCONFA_RP_FILTER={0x8, 0x3, 0x7fff}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x3}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0xe9}]}, 0x54}, 0x1, 0x0, 0x0, 0x3400c080}, 0x40) read(0xffffffffffffffff, &(0x7f0000000280)=""/152, 0x20000318) openat$procfs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/keys\x00', 0x0, 0x0) r3 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r3, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) write$binfmt_elf64(r3, &(0x7f00000003c0)={{0x7f, 0x45, 0x4c, 0x46, 0x6, 0x81, 0x35, 0x4, 0x1, 0x59ad6aa4a884dd63, 0x3, 0x0, 0x13d, 0x40, 0x26e, 0x8000, 0x1f, 0x38, 0x1, 0x8, 0x8, 0x3}, [{0x6, 0x3, 0xefa, 0x1, 0x81, 0x80000000, 0x0, 0x9}, {0x7, 0x2, 0x7ff, 0xfff, 0x1, 0x4, 0x0, 0x800b}], "5ad165d3d87709dd80c73c9fa8b6ef39a345e1b2327e38197c13f3be9248c0f2161632606ce45b5c7d7349c883946ca190a061f77e1020dc808b86b4e3c7b2a6128e2d3b16a4ec69ad8c276d1a038ddc59bd46a7a37061ed24ba41f62de7aaf1c073c43333bee7ed0979404acecab631d46b591f921ec0a584aeb912342ff4f104ff960a3563460c943d11952c88bd0d13a69a425793b6f7d2b09cf17c87cdc331f63c983436cef6888b1a8328e953b0b3bade3aabbfc4818a05af", [[]]}, 0x26b) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_open_procfs(0x0, &(0x7f0000000000)='timers\x00') 00:55:43 executing program 3: r0 = syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x8, 0x4000) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000001c0)={{{@in6=@remote, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@initdev}}, &(0x7f0000000100)=0xe8) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000002c0)={@mcast1, @rand_addr="4ffb556976b8b5db2e14dcb20013b2ee", @dev={0xfe, 0x80, [], 0x3a}, 0x5, 0x3, 0x1, 0x100, 0x6, 0x2000000, r1}) ioctl$SG_SCSI_RESET(r0, 0x2284, 0x0) r2 = socket$pppoe(0x18, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) connect$pppoe(r2, &(0x7f0000000000)={0x18, 0x0, {0x2, @random='\x00\x00\x00@\x00', 'vxcan1\x00'}}, 0x1e) r3 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r3, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {0x0, 0x3}, {0xffffffff}, {0x1}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) 00:55:43 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) syz_open_dev$ndb(&(0x7f0000000100)='/dev/nbd#\x00', 0x0, 0x80) r0 = getpid() r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, 0x0, 0x0) setsockopt$sock_void(r1, 0x1, 0x0, 0x0, 0x0) sched_setscheduler(r0, 0x5, &(0x7f0000000380)) pipe(0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=@ipv4_getnetconf={0x3c, 0x52, 0x10, 0x70bd25, 0x25dfdbfd, {}, [@NETCONFA_PROXY_NEIGH={0x8}, @NETCONFA_IFINDEX={0x8}, @NETCONFA_RP_FILTER={0x8}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x3}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0xe9}]}, 0x3c}, 0x1, 0x0, 0x0, 0x3400c080}, 0x40) r2 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r2, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) write$binfmt_elf64(r2, &(0x7f00000003c0)={{0x7f, 0x45, 0x4c, 0x46, 0x6, 0x81, 0x35, 0x4, 0x1, 0x59ad6aa4a884dd63, 0x3, 0x0, 0x13d, 0x40, 0x26e, 0x8000, 0x1f, 0x38, 0x1, 0x8, 0x8, 0x3}, [{0x6, 0x3, 0xefa, 0x1, 0x81, 0x80000000, 0x0, 0x9}, {0x7, 0x2, 0x7ff, 0xfff, 0x1, 0x4, 0x0, 0x800b}], "5ad165d3d87709dd80c73c9fa8b6ef39a345e1b2327e38197c13f3be9248c0f2161632606ce45b5c7d7349c883946ca190a061f77e1020dc808b86b4e3c7b2a6128e2d3b16a4ec69ad8c276d1a038ddc59bd46a7a37061ed24ba41f62de7aaf1c073c43333bee7ed0979404acecab631d46b591f921ec0a584aeb912342ff4f104ff960a3563460c943d11952c88bd0d13a69a425793b6f7d2b09cf17c87cdc331f63c983436cef6888b1a8328e953b0b3bade3aabbfc4818a05af", [[]]}, 0x26b) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000200)='/dev/bsg\x00', 0x20280, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r3, 0x4058534c, &(0x7f0000000280)={0x6936, 0x3, 0x7fffffff, 0x8, 0xffb, 0x2}) syz_open_procfs(0x0, &(0x7f0000000000)='timers\x00') 00:55:43 executing program 5: socket$pppoe(0x18, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x10, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {0xffffffff}, {0x1}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}) 00:55:43 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) pipe(0x0) wait4(0x0, 0x0, 0x40000000, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000265000)=@req={0x0, 0x400}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000740)={{{@in=@multicast2, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@broadcast}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route(r1, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=@ipv4_getnetconf={0x54, 0x52, 0x10, 0x70bd25, 0x25dfdbfd, {}, [@NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x1}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x9}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x5}, @NETCONFA_FORWARDING={0x8, 0x2, 0x8}, @NETCONFA_IFINDEX={0x8, 0x1, r2}, @NETCONFA_RP_FILTER={0x8, 0x3, 0x7fff}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x3}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0xe9}]}, 0x54}, 0x1, 0x0, 0x0, 0x3400c080}, 0x40) read(0xffffffffffffffff, &(0x7f0000000280)=""/152, 0x20000318) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/keys\x00', 0x0, 0x0) r4 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r4, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) write$binfmt_elf64(r4, &(0x7f00000003c0)={{0x7f, 0x45, 0x4c, 0x46, 0x6, 0x81, 0x35, 0x4, 0x1, 0x59ad6aa4a884dd63, 0x3, 0x0, 0x13d, 0x40, 0x26e, 0x8000, 0x1f, 0x38, 0x1, 0x8, 0x8, 0x3}, [{0x6, 0x3, 0x0, 0x1, 0x81, 0x80000000, 0x0, 0x9}, {0x7, 0x2, 0x7ff, 0xfff, 0x1, 0x4, 0x0, 0x800b}], "5ad165d3d87709dd80c73c9fa8b6ef39a345e1b2327e38197c13f3be9248c0f2161632606ce45b5c7d7349c883946ca190a061f77e1020dc808b86b4e3c7b2a6128e2d3b16a4ec69ad8c276d1a038ddc59bd46a7a37061ed24ba41f62de7aaf1c073c43333bee7ed0979404acecab631d46b591f921ec0a584aeb912342ff4f104ff960a3563460c943d11952c88bd0d13a69a425793b6f7d2b09cf17c87cdc331f63c983436cef6888b1a8328e953b0b3bade3aabbfc4818a05af", [[]]}, 0x26b) read(r3, &(0x7f0000000280)=""/152, 0x20000318) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x280800, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$DRM_IOCTL_MODE_SETCRTC(0xffffffffffffffff, 0xc06864a2, &(0x7f0000000000)={0x0, 0x0, 0x20}) 00:55:44 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) r0 = getpid() setxattr$trusted_overlay_upper(&(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='trusted.overlay.upper\x00', &(0x7f00000009c0)={0x0, 0xfb, 0x1015, 0x2, 0x8, "ee0cdaf7f58aab0ecfedc6883d830fe4", "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"}, 0x1015, 0x2) sched_setscheduler(r0, 0x5, &(0x7f0000000380)) pipe(0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f0000000280)=ANY=[@ANYBLOB="3c0000005200100025bd70faffffff25020800050000000000080001003a4d3b9efdd3a9d9fce0af4c1d6482f35fbe96cd99d7ac2b65466633993ac8fe5eac3aba3ee43b279b04f0314d757f23e4b09a9e6f04152a27", @ANYRES32=0x0, @ANYBLOB="0800030000000000080006000300000008000500e9000000000000"], 0x3c}, 0x1, 0x0, 0x0, 0x3400c080}, 0x40) r1 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r1, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) write$binfmt_elf64(r1, &(0x7f00000006c0)=ANY=[@ANYBLOB="7f454c4606813504020000000000000063dd0300000000003d0100000000000040000000000000002502000000000000008000001f00380001000800080003000600000003000000fa0e000000000000010000000000000081000000000000000000008000000000000000000000000009000000000000000700000002000000ff07000000000000ff0f0000000000000100000000000000040000000000000000000000000000000b800000000000005ad165d3d87709dd80c73c9fa8b6ef39a345e1b2327e38197c13f3be9248c0f2161632606ce45b5c7d7349c883946ca190a061f77e1020dc808b86b4e3c7b2a6128e2d3b16a4ec69ad8c276d1a038ddc59bd46a7a37061ed24ba41f62de7aaf1c073c43333bee7ed0979404acecab631d46b591f921ec0a584aeb912342ff4f104ff960a3563460c943d11952c88bd0d13a69a425793b6f7d2b09cf17c87cdc331f63c983436cef6888b1a8334e953b0b3bade3aabbfc4818a05af000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e4ffffffffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e1ff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001a3cbec424ffb8d8b7ad7176f2ac8be29f496f5c6d0dc9c23830192db36c8307d588dd21a40fedc92bbafacb7669cc36b4a02e0a6b3ab32254289a90c7c6c6c098d2c28dd7f03a2c4b58b0e925419c8128d7c9b4a98564ebd3e9a8269ddfb03ca7f787"], 0x26b) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_open_procfs(0x0, &(0x7f0000000000)='timers\x00') 00:55:44 executing program 3: r0 = socket$pppoe(0x18, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x2, @link_local, 'team0\x00'}}, 0x1e) r1 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r1, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {0x0, 0x3}, {0xffffffff}, {0x1}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x80080, 0x0) ioctl$VIDIOC_G_MODULATOR(r2, 0xc0445636, &(0x7f0000000100)={0x10001, "fa85466230f9a2d3f8c341346ea9f2517bb92e96f390aff439ae26bc804749c2", 0x80, 0x2f80000, 0x54f, 0x4, 0x5}) 00:55:44 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) pipe(0x0) wait4(0x0, 0x0, 0x40000000, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000265000)=@req={0x0, 0x400}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000740)={{{@in=@multicast2, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@broadcast}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route(r1, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=@ipv4_getnetconf={0x54, 0x52, 0x10, 0x70bd25, 0x25dfdbfd, {}, [@NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x1}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x9}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x5}, @NETCONFA_FORWARDING={0x8, 0x2, 0x8}, @NETCONFA_IFINDEX={0x8, 0x1, r2}, @NETCONFA_RP_FILTER={0x8, 0x3, 0x7fff}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x3}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0xe9}]}, 0x54}, 0x1, 0x0, 0x0, 0x3400c080}, 0x40) read(0xffffffffffffffff, &(0x7f0000000280)=""/152, 0x20000318) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/keys\x00', 0x0, 0x0) r4 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r4, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) write$binfmt_elf64(r4, &(0x7f00000003c0)={{0x7f, 0x45, 0x4c, 0x46, 0x6, 0x81, 0x35, 0x4, 0x1, 0x59ad6aa4a884dd63, 0x3, 0x0, 0x13d, 0x40, 0x26e, 0x8000, 0x1f, 0x38, 0x1, 0x8, 0x8, 0x3}, [{0x6, 0x3, 0x0, 0x1, 0x81, 0x80000000, 0x0, 0x9}, {0x7, 0x2, 0x7ff, 0xfff, 0x1, 0x4, 0x0, 0x800b}], "5ad165d3d87709dd80c73c9fa8b6ef39a345e1b2327e38197c13f3be9248c0f2161632606ce45b5c7d7349c883946ca190a061f77e1020dc808b86b4e3c7b2a6128e2d3b16a4ec69ad8c276d1a038ddc59bd46a7a37061ed24ba41f62de7aaf1c073c43333bee7ed0979404acecab631d46b591f921ec0a584aeb912342ff4f104ff960a3563460c943d11952c88bd0d13a69a425793b6f7d2b09cf17c87cdc331f63c983436cef6888b1a8328e953b0b3bade3aabbfc4818a05af", [[]]}, 0x26b) read(r3, &(0x7f0000000280)=""/152, 0x20000318) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x280800, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$DRM_IOCTL_MODE_SETCRTC(0xffffffffffffffff, 0xc06864a2, &(0x7f0000000000)={0x0, 0x0, 0x20}) 00:55:44 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) pipe(0x0) wait4(0x0, 0x0, 0x40000000, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000265000)=@req={0x0, 0x400, 0x2}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000740)={{{@in=@multicast2, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@broadcast}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route(r1, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=@ipv4_getnetconf={0x54, 0x52, 0x10, 0x70bd25, 0x25dfdbfd, {}, [@NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x1}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x9}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8}, @NETCONFA_FORWARDING={0x8, 0x2, 0x8}, @NETCONFA_IFINDEX={0x8, 0x1, r2}, @NETCONFA_RP_FILTER={0x8, 0x3, 0x7fff}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x3}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0xe9}]}, 0x54}, 0x1, 0x0, 0x0, 0x3400c080}, 0x40) read(0xffffffffffffffff, &(0x7f0000000280)=""/152, 0x20000318) openat$procfs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/keys\x00', 0x0, 0x0) r3 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r3, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) write$binfmt_elf64(r3, &(0x7f00000003c0)={{0x7f, 0x45, 0x4c, 0x46, 0x6, 0x81, 0x35, 0x4, 0x1, 0x59ad6aa4a884dd63, 0x3, 0x0, 0x13d, 0x40, 0x26e, 0x8000, 0x1f, 0x38, 0x1, 0x8, 0x8, 0x3}, [{0x6, 0x3, 0xefa, 0x1, 0x81, 0x80000000, 0x0, 0x9}, {0x7, 0x2, 0x7ff, 0xfff, 0x1, 0x4, 0x0, 0x800b}], "5ad165d3d87709dd80c73c9fa8b6ef39a345e1b2327e38197c13f3be9248c0f2161632606ce45b5c7d7349c883946ca190a061f77e1020dc808b86b4e3c7b2a6128e2d3b16a4ec69ad8c276d1a038ddc59bd46a7a37061ed24ba41f62de7aaf1c073c43333bee7ed0979404acecab631d46b591f921ec0a584aeb912342ff4f104ff960a3563460c943d11952c88bd0d13a69a425793b6f7d2b09cf17c87cdc331f63c983436cef6888b1a8328e953b0b3bade3aabbfc4818a05af", [[]]}, 0x26b) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_open_procfs(0x0, &(0x7f0000000000)='timers\x00') 00:55:44 executing program 5: socket$pppoe(0x18, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x300, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {0xffffffff}, {0x1}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}) 00:55:44 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) stat(&(0x7f0000000240)='./file0/file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(0xffffffffffffffff, &(0x7f0000001b80)) socket(0x11, 0x2, 0x5) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r4, 0x1, 0x14, &(0x7f0000000040), 0x50) getsockopt$IP6T_SO_GET_ENTRIES(r4, 0x29, 0x41, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/404], &(0x7f0000000340)=0x1) fsetxattr$trusted_overlay_redirect(r3, &(0x7f0000000200)='trusted.overlay.redirect\x00', &(0x7f0000000280)='./file0/file0\x00', 0xe, 0x0) getsockname$tipc(0xffffffffffffffff, 0x0, &(0x7f0000000080)) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000001400)={{0x1, 0x0, @identifier="8e0f03f7e12b88d1af81f7c5a6bb175f"}, 0x67, [], "ed760111b8363e2de90692d0bc7e0a89824d3c77730403363ce0521cdcb1973b558cbd01ebf95bd9529fe3c5a95dcf31792e3e463d875b955a13582aeaddf6af34a98934ad6944b87292af67aec51fd37bd761db93cf6623d8683956791c956c97d76a9fd8df5d"}) lstat(&(0x7f0000000000)='./file0/file0\x00', &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000100)=0x0) r7 = getegid() r8 = socket$inet_tcp(0x2, 0x1, 0x0) r9 = fcntl$dupfd(r8, 0x0, r8) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) setresuid(r10, r10, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003ec0)={0x0, 0x0, 0x0}, 0x0) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, r11) r12 = openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$DRM_IOCTL_AGP_INFO(r12, 0x80386433, &(0x7f0000000bc0)=""/4096) getsockopt$sock_cred(r12, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0x194) setresuid(r13, r13, 0x0) r14 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r15 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r15, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) waitid(0x1, r15, &(0x7f0000000100), 0x80000004, &(0x7f0000000180)) r16 = shmget$private(0x0, 0x3000, 0x20, &(0x7f0000ffa000/0x3000)=nil) shmctl$SHM_STAT_ANY(r16, 0xf, &(0x7f0000000540)=""/221) shmctl$IPC_SET(r16, 0x1, &(0x7f0000000180)={{0x3, r10, r11, r13, r7, 0x42, 0x7}, 0x803ff, 0x2, 0xfffffffffffffffd, 0x0, r14, r15, 0x5}) shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000840)={{0x0, r2, r7, 0x0, r5, 0x50}, 0xd7, 0xfffffffffffffffe, 0x1000, 0x8000, r6}) r17 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000280)='/dev/nullb0\x00', 0x4400, 0x0) preadv(r17, &(0x7f0000000040)=[{&(0x7f0000000400)=""/4096, 0x3ffc00}], 0x1, 0x0) 00:55:44 executing program 3: r0 = socket$pppoe(0x18, 0x1, 0x0) ioctl$NS_GET_USERNS(0xffffffffffffffff, 0xb701, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x2, @link_local, 'team0\x00'}}, 0x1e) r1 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r1, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {0x0, 0x3}, {0xffffffff}, {0x1}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ubi_ctrl\x00', 0x0, 0x0) setsockopt$TIPC_DEST_DROPPABLE(r2, 0x10f, 0x81, &(0x7f0000000100)=0x7, 0x4) 00:55:45 executing program 5: socket$pppoe(0x18, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x500, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {0xffffffff}, {0x1}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}) 00:55:45 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) pipe(0x0) wait4(0x0, 0x0, 0x40000000, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000265000)=@req={0x0, 0x400}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000740)={{{@in=@multicast2, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@broadcast}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route(r1, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=@ipv4_getnetconf={0x54, 0x52, 0x10, 0x70bd25, 0x25dfdbfd, {}, [@NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x1}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x9}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x5}, @NETCONFA_FORWARDING={0x8, 0x2, 0x8}, @NETCONFA_IFINDEX={0x8, 0x1, r2}, @NETCONFA_RP_FILTER={0x8, 0x3, 0x7fff}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x3}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0xe9}]}, 0x54}, 0x1, 0x0, 0x0, 0x3400c080}, 0x40) read(0xffffffffffffffff, &(0x7f0000000280)=""/152, 0x20000318) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/keys\x00', 0x0, 0x0) r4 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r4, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) write$binfmt_elf64(r4, &(0x7f00000003c0)={{0x7f, 0x45, 0x4c, 0x46, 0x6, 0x81, 0x35, 0x4, 0x1, 0x59ad6aa4a884dd63, 0x3, 0x0, 0x13d, 0x40, 0x26e, 0x8000, 0x1f, 0x38, 0x1, 0x8, 0x8, 0x3}, [{0x6, 0x3, 0x0, 0x1, 0x81, 0x80000000, 0x0, 0x9}, {0x7, 0x2, 0x7ff, 0xfff, 0x1, 0x4, 0x0, 0x800b}], "5ad165d3d87709dd80c73c9fa8b6ef39a345e1b2327e38197c13f3be9248c0f2161632606ce45b5c7d7349c883946ca190a061f77e1020dc808b86b4e3c7b2a6128e2d3b16a4ec69ad8c276d1a038ddc59bd46a7a37061ed24ba41f62de7aaf1c073c43333bee7ed0979404acecab631d46b591f921ec0a584aeb912342ff4f104ff960a3563460c943d11952c88bd0d13a69a425793b6f7d2b09cf17c87cdc331f63c983436cef6888b1a8328e953b0b3bade3aabbfc4818a05af", [[]]}, 0x26b) read(r3, &(0x7f0000000280)=""/152, 0x20000318) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x280800, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$DRM_IOCTL_MODE_SETCRTC(0xffffffffffffffff, 0xc06864a2, &(0x7f0000000000)={0x0, 0x0, 0x20}) 00:55:45 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) pipe(0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=@ipv4_getnetconf={0x3c, 0x52, 0x10, 0x70bd25, 0x25dfdbfd, {}, [@NETCONFA_PROXY_NEIGH={0x8}, @NETCONFA_IFINDEX={0x8}, @NETCONFA_RP_FILTER={0x8}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x3}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0xe9}]}, 0x3c}, 0x1, 0x0, 0x0, 0x3400c080}, 0x40) r1 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x14, 0x39, 0x100, 0x70bd2d, 0x25dfdbfe, {0xe}}, 0x14}}, 0x8000) ioctl$FBIOPUT_VSCREENINFO(r1, 0x4601, &(0x7f0000000640)={0x0, 0x320, 0x0, 0x240, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) write$binfmt_elf64(r1, &(0x7f00000003c0)={{0x7f, 0x45, 0x4c, 0x46, 0x6, 0x81, 0x35, 0x4, 0x1, 0x59ad6aa4a884dd63, 0x3, 0x0, 0x13d, 0x40, 0x26e, 0x8000, 0x1f, 0x38, 0x1, 0x8, 0x8, 0x3}, [{0x6, 0x3, 0xefa, 0x1, 0x81, 0x80000000, 0x0, 0x9}, {0x7, 0x2, 0x7ff, 0xfff, 0x1, 0x4, 0x0, 0x800b}], "5ad165d3d87709dd80c73c9fa8b6ef39a345e1b2327e38197c13f3be9248c0f2161632606ce45b5c7d7349c883946ca190a061f77e1020dc808b86b4e3c7b2a6128e2d3b16a4ec69ad8c276d1a038ddc59bd46a7a37061ed24ba41f62de7aaf1c073c43333bee7ed0979404acecab631d46b591f921ec0a584aeb912342ff4f104ff960a3563460c943d11952c88bd0d13a69a425793b6f7d2b09cf17c87cdc331f63c983436cef6888b1a8328e953b0b3bade3aabbfc4818a05af", [[]]}, 0x26b) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/autofs\x00', 0x0, 0x0) ioctl$TIOCL_SETVESABLANK(r2, 0x541c, &(0x7f0000000300)) syz_open_procfs(0x0, &(0x7f0000000000)='timers\x00') 00:55:45 executing program 3: r0 = socket$pppoe(0x18, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x6, 0x0) ioctl$int_in(r1, 0x5452, &(0x7f0000000040)=0xffff) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_PKTINFO(r1, 0x29, 0x32, 0x0, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000400)=0x14) ioctl$sock_inet6_SIOCADDRT(r2, 0x89a0, &(0x7f0000000440)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @remote, @remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x42, r3}) r4 = getuid() setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000001c0)={{{@in6=@local, @in=@multicast1, 0x4e21, 0x0, 0x4e23, 0x6, 0xa, 0x80, 0x90, 0xc, r3, r4}, {0x8, 0x2, 0x6, 0x8, 0xcb4, 0x10000, 0x9, 0x20000}, {0x7f, 0x9, 0x9, 0x5}, 0x2, 0x6e6bbd, 0x1, 0x1, 0x2, 0x1}, {{@in=@loopback, 0x4d2, 0xff}, 0x2, @in=@local, 0x0, 0x1, 0x0, 0x6, 0xffffff84, 0x74e, 0x800}}, 0xe8) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x2, @link_local, 'team0\x00'}}, 0x1e) r5 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r5, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {0x0, 0x3}, {0xffffffff}, {0x1}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) 00:55:45 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) pipe(0x0) wait4(0x0, 0x0, 0x40000000, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000265000)=@req={0x0, 0x400, 0x2}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000740)={{{@in=@multicast2, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@broadcast}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route(r1, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=@ipv4_getnetconf={0x54, 0x52, 0x10, 0x70bd25, 0x25dfdbfd, {}, [@NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x1}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x9}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8}, @NETCONFA_FORWARDING={0x8, 0x2, 0x8}, @NETCONFA_IFINDEX={0x8, 0x1, r2}, @NETCONFA_RP_FILTER={0x8, 0x3, 0x7fff}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x3}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0xe9}]}, 0x54}, 0x1, 0x0, 0x0, 0x3400c080}, 0x40) read(0xffffffffffffffff, &(0x7f0000000280)=""/152, 0x20000318) openat$procfs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/keys\x00', 0x0, 0x0) r3 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r3, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) write$binfmt_elf64(r3, &(0x7f00000003c0)={{0x7f, 0x45, 0x4c, 0x46, 0x6, 0x81, 0x35, 0x4, 0x1, 0x59ad6aa4a884dd63, 0x3, 0x0, 0x13d, 0x40, 0x26e, 0x8000, 0x1f, 0x38, 0x1, 0x8, 0x8, 0x3}, [{0x6, 0x3, 0xefa, 0x1, 0x81, 0x80000000, 0x0, 0x9}, {0x7, 0x2, 0x7ff, 0xfff, 0x1, 0x4, 0x0, 0x800b}], "5ad165d3d87709dd80c73c9fa8b6ef39a345e1b2327e38197c13f3be9248c0f2161632606ce45b5c7d7349c883946ca190a061f77e1020dc808b86b4e3c7b2a6128e2d3b16a4ec69ad8c276d1a038ddc59bd46a7a37061ed24ba41f62de7aaf1c073c43333bee7ed0979404acecab631d46b591f921ec0a584aeb912342ff4f104ff960a3563460c943d11952c88bd0d13a69a425793b6f7d2b09cf17c87cdc331f63c983436cef6888b1a8328e953b0b3bade3aabbfc4818a05af", [[]]}, 0x26b) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_open_procfs(0x0, &(0x7f0000000000)='timers\x00') 00:55:45 executing program 5: socket$pppoe(0x18, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x600, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {0xffffffff}, {0x1}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}) 00:55:46 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) pipe(0x0) wait4(0x0, 0x0, 0x40000000, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000265000)=@req={0x0, 0x400}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000740)={{{@in=@multicast2, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@broadcast}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route(r1, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=@ipv4_getnetconf={0x54, 0x52, 0x10, 0x70bd25, 0x25dfdbfd, {}, [@NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x1}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x9}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x5}, @NETCONFA_FORWARDING={0x8, 0x2, 0x8}, @NETCONFA_IFINDEX={0x8, 0x1, r2}, @NETCONFA_RP_FILTER={0x8, 0x3, 0x7fff}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x3}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0xe9}]}, 0x54}, 0x1, 0x0, 0x0, 0x3400c080}, 0x40) read(0xffffffffffffffff, &(0x7f0000000280)=""/152, 0x20000318) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/keys\x00', 0x0, 0x0) r4 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r4, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) write$binfmt_elf64(r4, &(0x7f00000003c0)={{0x7f, 0x45, 0x4c, 0x46, 0x6, 0x81, 0x35, 0x4, 0x1, 0x59ad6aa4a884dd63, 0x3, 0x0, 0x13d, 0x40, 0x26e, 0x8000, 0x1f, 0x38, 0x1, 0x8, 0x8, 0x3}, [{0x6, 0x3, 0xefa, 0x0, 0x81, 0x80000000, 0x0, 0x9}, {0x7, 0x2, 0x7ff, 0xfff, 0x1, 0x4, 0x0, 0x800b}], "5ad165d3d87709dd80c73c9fa8b6ef39a345e1b2327e38197c13f3be9248c0f2161632606ce45b5c7d7349c883946ca190a061f77e1020dc808b86b4e3c7b2a6128e2d3b16a4ec69ad8c276d1a038ddc59bd46a7a37061ed24ba41f62de7aaf1c073c43333bee7ed0979404acecab631d46b591f921ec0a584aeb912342ff4f104ff960a3563460c943d11952c88bd0d13a69a425793b6f7d2b09cf17c87cdc331f63c983436cef6888b1a8328e953b0b3bade3aabbfc4818a05af", [[]]}, 0x26b) read(r3, &(0x7f0000000280)=""/152, 0x20000318) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x280800, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$DRM_IOCTL_MODE_SETCRTC(0xffffffffffffffff, 0xc06864a2, &(0x7f0000000000)={0x0, 0x0, 0x20}) 00:55:46 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) pipe(0x0) wait4(0x0, 0x0, 0x40000000, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000265000)=@req={0x0, 0x400, 0x2}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000740)={{{@in=@multicast2, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@broadcast}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route(r1, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=@ipv4_getnetconf={0x4c, 0x52, 0x10, 0x70bd25, 0x25dfdbfd, {}, [@NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x1}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x5}, @NETCONFA_FORWARDING={0x8, 0x2, 0x8}, @NETCONFA_IFINDEX={0x8, 0x1, r2}, @NETCONFA_RP_FILTER={0x8, 0x3, 0x7fff}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x3}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0xe9}]}, 0x4c}, 0x1, 0x0, 0x0, 0x3400c080}, 0x40) read(0xffffffffffffffff, &(0x7f0000000280)=""/152, 0x20000318) openat$procfs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/keys\x00', 0x0, 0x0) r3 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r3, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) write$binfmt_elf64(r3, &(0x7f00000003c0)={{0x7f, 0x45, 0x4c, 0x46, 0x6, 0x81, 0x35, 0x4, 0x1, 0x59ad6aa4a884dd63, 0x3, 0x0, 0x13d, 0x40, 0x26e, 0x8000, 0x1f, 0x38, 0x1, 0x8, 0x8, 0x3}, [{0x6, 0x3, 0xefa, 0x1, 0x81, 0x80000000, 0x0, 0x9}, {0x7, 0x2, 0x7ff, 0xfff, 0x1, 0x4, 0x0, 0x800b}], "5ad165d3d87709dd80c73c9fa8b6ef39a345e1b2327e38197c13f3be9248c0f2161632606ce45b5c7d7349c883946ca190a061f77e1020dc808b86b4e3c7b2a6128e2d3b16a4ec69ad8c276d1a038ddc59bd46a7a37061ed24ba41f62de7aaf1c073c43333bee7ed0979404acecab631d46b591f921ec0a584aeb912342ff4f104ff960a3563460c943d11952c88bd0d13a69a425793b6f7d2b09cf17c87cdc331f63c983436cef6888b1a8328e953b0b3bade3aabbfc4818a05af", [[]]}, 0x26b) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_open_procfs(0x0, &(0x7f0000000000)='timers\x00') 00:55:46 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) stat(&(0x7f0000000240)='./file0/file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(0xffffffffffffffff, &(0x7f0000001b80)) socket(0x11, 0x2, 0x5) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r4, 0x1, 0x14, &(0x7f0000000040), 0x50) getsockopt$IP6T_SO_GET_ENTRIES(r4, 0x29, 0x41, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/404], &(0x7f0000000340)=0x1) fsetxattr$trusted_overlay_redirect(r3, &(0x7f0000000200)='trusted.overlay.redirect\x00', &(0x7f0000000280)='./file0/file0\x00', 0xe, 0x0) getsockname$tipc(0xffffffffffffffff, 0x0, &(0x7f0000000080)) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000001400)={{0x1, 0x0, @identifier="8e0f03f7e12b88d1af81f7c5a6bb175f"}, 0x67, [], "ed760111b8363e2de90692d0bc7e0a89824d3c77730403363ce0521cdcb1973b558cbd01ebf95bd9529fe3c5a95dcf31792e3e463d875b955a13582aeaddf6af34a98934ad6944b87292af67aec51fd37bd761db93cf6623d8683956791c956c97d76a9fd8df5d"}) lstat(&(0x7f0000000000)='./file0/file0\x00', &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000100)=0x0) r7 = getegid() r8 = socket$inet_tcp(0x2, 0x1, 0x0) r9 = fcntl$dupfd(r8, 0x0, r8) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) setresuid(r10, r10, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003ec0)={0x0, 0x0, 0x0}, 0x0) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, r11) r12 = openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$DRM_IOCTL_AGP_INFO(r12, 0x80386433, &(0x7f0000000bc0)=""/4096) getsockopt$sock_cred(r12, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0x194) setresuid(r13, r13, 0x0) r14 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r15 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r15, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) waitid(0x1, r15, &(0x7f0000000100), 0x80000004, &(0x7f0000000180)) r16 = shmget$private(0x0, 0x3000, 0x20, &(0x7f0000ffa000/0x3000)=nil) shmctl$SHM_STAT_ANY(r16, 0xf, &(0x7f0000000540)=""/221) shmctl$IPC_SET(r16, 0x1, &(0x7f0000000180)={{0x3, r10, r11, r13, r7, 0x42, 0x7}, 0x803ff, 0x2, 0xfffffffffffffffd, 0x0, r14, r15, 0x5}) shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000840)={{0x0, r2, r7, 0x0, r5, 0x50}, 0xd7, 0xfffffffffffffffe, 0x1000, 0x8000, r6}) r17 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000280)='/dev/nullb0\x00', 0x4400, 0x0) preadv(r17, &(0x7f0000000040)=[{&(0x7f0000000400)=""/4096, 0x3ffc00}], 0x1, 0x0) 00:55:46 executing program 5: socket$pppoe(0x18, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x700, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {0xffffffff}, {0x1}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}) 00:55:46 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) pipe(0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=@ipv4_getnetconf={0x3c, 0x52, 0x10, 0x70bd25, 0x25dfdbfd, {}, [@NETCONFA_PROXY_NEIGH={0x8}, @NETCONFA_IFINDEX={0x8}, @NETCONFA_RP_FILTER={0x8}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x3}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0xe9}]}, 0x3c}, 0x1, 0x0, 0x0, 0x3400c080}, 0x40) r1 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r1, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) write$binfmt_elf64(r1, &(0x7f00000003c0)={{0x7f, 0x45, 0x4c, 0x46, 0x6, 0x81, 0x35, 0x4, 0x1, 0x59ad6aa4a884dd63, 0x3, 0x0, 0x13d, 0x40, 0x26e, 0x8000, 0x1f, 0x38, 0x1, 0x8, 0x8, 0x3}, [{0x6, 0x3, 0xefa, 0x1, 0x81, 0x80000000, 0x0, 0x9}, {0x7, 0x2, 0x7ff, 0xfff, 0x1, 0x4, 0x0, 0x800b}], "5ad165d3d87709dd80c73c9fa8b6ef39a345e1b2327e38197c13f3be9248c0f2161632606ce45b5c7d7349c883946ca190a061f77e1020dc808b86b4e3c7b2a6128e2d3b16a4ec69ad8c276d1a038ddc59bd46a7a37061ed24ba41f62de7aaf1c073c43333bee7ed0979404acecab631d46b591f921ec0a584aeb912342ff4f104ff960a3563460c943d11952c88bd0d13a69a425793b6f7d2b09cf17c87cdc331f63c983436cef6888b1a8328e953b0b3bade3aabbfc4818a05af", [[]]}, 0x26b) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x82140, 0x0) ioctl$KDFONTOP_SET(r2, 0x4b72, &(0x7f0000000200)={0x0, 0x1, 0x17, 0xa, 0x95, &(0x7f0000000640)="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"}) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_open_procfs(0x0, &(0x7f0000000000)='timers\x00') 00:55:46 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) stat(&(0x7f0000000240)='./file0/file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(0xffffffffffffffff, &(0x7f0000001b80)) socket(0x11, 0x2, 0x5) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r4, 0x1, 0x14, &(0x7f0000000040), 0x50) getsockopt$IP6T_SO_GET_ENTRIES(r4, 0x29, 0x41, &(0x7f0000000480)=ANY=[@ANYBLOB="6e2f740000edffffffffffffff00000000000000000000000000000000000000ad0000005086f3915e59ad8184af4045c4e742fa881d66411baabaa82dda6d71f825249ec2eb0ad398766b6b870bba11fc00df87700a78319e5f5d955a5eb0f50e2dcd95623e3eba93f21d4733f6d4834e398f5ba4540b18afc3c2a92ff6e4a89dc029fdd87fc0c2ca637f5ead98feb48d1bfe6451a583e519234bd5297e8a8bf569ff90077ba1cef2ea64c8f027947915a33e26b9d8b4fb56ba4d86df286c34e0cd9715e6b39dcccf4eb92a1706ed98b4aafd220eecfac13859aaab4dc07cd467149066f2f637c1e58f02faf49d72752753fe6beceb9d14b1ab3832cab4d59f892cb6f3689b67eaf81e929525a7fe0f2ea0892194387f7d085ea12c8842b8790911042b2a48b65c40087bd66593e0cfc29843b29738147ea75bb6c3d9664dc189fca97c43ed585ebb0c2a03782d916c709f6fdeca72784a8ac21d3ff8c9551290ea0000000000000049d4bb98580f9f7b7da060b127fd66ae6ad3c8753701b37ed619b2ed3efe862100"/405], 0x0) fsetxattr$trusted_overlay_redirect(r3, &(0x7f0000000200)='trusted.overlay.redirect\x00', &(0x7f0000000280)='./file0/file0\x00', 0xe, 0x0) getsockname$tipc(0xffffffffffffffff, 0x0, &(0x7f0000000080)) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000001400)={{0x1, 0x0, @identifier="8e0f03f7e12b88d1af81f7c5a6bb175f"}, 0x67, [], "ed760111b8363e2de90692d0bc7e0a89824d3c77730403363ce0521cdcb1973b558cbd01ebf95bd9529fe3c5a95dcf31792e3e463d875b955a13582aeaddf6af34a98934ad6944b87292af67aec51fd37bd761db93cf6623d8683956791c956c97d76a9fd8df5d"}) lstat(&(0x7f0000000000)='./file0/file0\x00', &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000100)=0x0) r7 = getegid() r8 = socket$inet_tcp(0x2, 0x1, 0x0) r9 = fcntl$dupfd(r8, 0x0, r8) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) setresuid(r10, r10, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003ec0)={0x0, 0x0, 0x0}, 0x0) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, r11) r12 = openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$DRM_IOCTL_AGP_INFO(r12, 0x80386433, &(0x7f0000000bc0)=""/4096) getsockopt$sock_cred(r12, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0x194) setresuid(r13, r13, 0x0) r14 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r15 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r15, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) waitid(0x1, r15, &(0x7f0000000100), 0x80000004, &(0x7f0000000180)) r16 = shmget$private(0x0, 0x3000, 0x20, &(0x7f0000ffa000/0x3000)=nil) shmctl$SHM_STAT_ANY(r16, 0xf, &(0x7f0000000540)=""/221) shmctl$IPC_SET(r16, 0x1, &(0x7f0000000180)={{0x3, r10, r11, r13, r7, 0x42, 0x7}, 0x803ff, 0x2, 0xfffffffffffffffd, 0x0, r14, r15, 0x5}) shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000840)={{0x0, r2, r7, 0x0, r5, 0x50}, 0xd7, 0xfffffffffffffffe, 0x1000, 0x8000, r6}) r17 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000280)='/dev/nullb0\x00', 0x4400, 0x0) preadv(r17, &(0x7f0000000040)=[{&(0x7f0000000400)=""/4096, 0x3ffc00}], 0x1, 0x0) 00:55:47 executing program 3: r0 = socket$pppoe(0x18, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x4}, 0x0, 0xfffffffffffffffb, 0xf0}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x2) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x2, @link_local, 'team0\x00'}}, 0x1e) r1 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r1, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, {0x0, 0x3}, {0xffffffff}, {0x1, 0x0, 0x1}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc}) 00:55:47 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) pipe(0x0) wait4(0x0, 0x0, 0x40000000, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000265000)=@req={0x0, 0x400}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000740)={{{@in=@multicast2, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@broadcast}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route(r1, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=@ipv4_getnetconf={0x54, 0x52, 0x10, 0x70bd25, 0x25dfdbfd, {}, [@NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x1}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x9}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x5}, @NETCONFA_FORWARDING={0x8, 0x2, 0x8}, @NETCONFA_IFINDEX={0x8, 0x1, r2}, @NETCONFA_RP_FILTER={0x8, 0x3, 0x7fff}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x3}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0xe9}]}, 0x54}, 0x1, 0x0, 0x0, 0x3400c080}, 0x40) read(0xffffffffffffffff, &(0x7f0000000280)=""/152, 0x20000318) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/keys\x00', 0x0, 0x0) r4 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r4, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) write$binfmt_elf64(r4, &(0x7f00000003c0)={{0x7f, 0x45, 0x4c, 0x46, 0x6, 0x81, 0x35, 0x4, 0x1, 0x59ad6aa4a884dd63, 0x3, 0x0, 0x13d, 0x40, 0x26e, 0x8000, 0x1f, 0x38, 0x1, 0x8, 0x8, 0x3}, [{0x6, 0x3, 0xefa, 0x0, 0x81, 0x80000000, 0x0, 0x9}, {0x7, 0x2, 0x7ff, 0xfff, 0x1, 0x4, 0x0, 0x800b}], "5ad165d3d87709dd80c73c9fa8b6ef39a345e1b2327e38197c13f3be9248c0f2161632606ce45b5c7d7349c883946ca190a061f77e1020dc808b86b4e3c7b2a6128e2d3b16a4ec69ad8c276d1a038ddc59bd46a7a37061ed24ba41f62de7aaf1c073c43333bee7ed0979404acecab631d46b591f921ec0a584aeb912342ff4f104ff960a3563460c943d11952c88bd0d13a69a425793b6f7d2b09cf17c87cdc331f63c983436cef6888b1a8328e953b0b3bade3aabbfc4818a05af", [[]]}, 0x26b) read(r3, &(0x7f0000000280)=""/152, 0x20000318) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x280800, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$DRM_IOCTL_MODE_SETCRTC(0xffffffffffffffff, 0xc06864a2, &(0x7f0000000000)={0x0, 0x0, 0x20}) 00:55:47 executing program 5: socket$pppoe(0x18, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x2000, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {0xffffffff}, {0x1}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}) 00:55:47 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) pipe(0x0) wait4(0x0, 0x0, 0x40000000, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000265000)=@req={0x0, 0x400, 0x2}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000740)={{{@in=@multicast2, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@broadcast}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route(r1, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=@ipv4_getnetconf={0x4c, 0x52, 0x10, 0x70bd25, 0x25dfdbfd, {}, [@NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x1}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x5}, @NETCONFA_FORWARDING={0x8, 0x2, 0x8}, @NETCONFA_IFINDEX={0x8, 0x1, r2}, @NETCONFA_RP_FILTER={0x8, 0x3, 0x7fff}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x3}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0xe9}]}, 0x4c}, 0x1, 0x0, 0x0, 0x3400c080}, 0x40) read(0xffffffffffffffff, &(0x7f0000000280)=""/152, 0x20000318) openat$procfs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/keys\x00', 0x0, 0x0) r3 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r3, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) write$binfmt_elf64(r3, &(0x7f00000003c0)={{0x7f, 0x45, 0x4c, 0x46, 0x6, 0x81, 0x35, 0x4, 0x1, 0x59ad6aa4a884dd63, 0x3, 0x0, 0x13d, 0x40, 0x26e, 0x8000, 0x1f, 0x38, 0x1, 0x8, 0x8, 0x3}, [{0x6, 0x3, 0xefa, 0x1, 0x81, 0x80000000, 0x0, 0x9}, {0x7, 0x2, 0x7ff, 0xfff, 0x1, 0x4, 0x0, 0x800b}], "5ad165d3d87709dd80c73c9fa8b6ef39a345e1b2327e38197c13f3be9248c0f2161632606ce45b5c7d7349c883946ca190a061f77e1020dc808b86b4e3c7b2a6128e2d3b16a4ec69ad8c276d1a038ddc59bd46a7a37061ed24ba41f62de7aaf1c073c43333bee7ed0979404acecab631d46b591f921ec0a584aeb912342ff4f104ff960a3563460c943d11952c88bd0d13a69a425793b6f7d2b09cf17c87cdc331f63c983436cef6888b1a8328e953b0b3bade3aabbfc4818a05af", [[]]}, 0x26b) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_open_procfs(0x0, &(0x7f0000000000)='timers\x00') 00:55:47 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) stat(&(0x7f0000000240)='./file0/file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(0xffffffffffffffff, &(0x7f0000001b80)) socket(0x11, 0x2, 0x5) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r4, 0x1, 0x14, &(0x7f0000000040), 0x50) getsockopt$IP6T_SO_GET_ENTRIES(r4, 0x29, 0x41, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/405], 0x0) fsetxattr$trusted_overlay_redirect(r3, &(0x7f0000000200)='trusted.overlay.redirect\x00', &(0x7f0000000280)='./file0/file0\x00', 0xe, 0x0) getsockname$tipc(0xffffffffffffffff, 0x0, &(0x7f0000000080)) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000001400)={{0x1, 0x0, @identifier="8e0f03f7e12b88d1af81f7c5a6bb175f"}, 0x67, [], "ed760111b8363e2de90692d0bc7e0a89824d3c77730403363ce0521cdcb1973b558cbd01ebf95bd9529fe3c5a95dcf31792e3e463d875b955a13582aeaddf6af34a98934ad6944b87292af67aec51fd37bd761db93cf6623d8683956791c956c97d76a9fd8df5d"}) lstat(&(0x7f0000000000)='./file0/file0\x00', &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000100)=0x0) r7 = getegid() r8 = socket$inet_tcp(0x2, 0x1, 0x0) r9 = fcntl$dupfd(r8, 0x0, r8) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) setresuid(r10, r10, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003ec0)={0x0, 0x0, 0x0}, 0x0) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, r11) r12 = openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$DRM_IOCTL_AGP_INFO(r12, 0x80386433, &(0x7f0000000bc0)=""/4096) getsockopt$sock_cred(r12, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0x194) setresuid(r13, r13, 0x0) r14 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r15 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r15, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) waitid(0x1, r15, &(0x7f0000000100), 0x80000004, &(0x7f0000000180)) r16 = shmget$private(0x0, 0x3000, 0x20, &(0x7f0000ffa000/0x3000)=nil) shmctl$SHM_STAT_ANY(r16, 0xf, &(0x7f0000000540)=""/221) shmctl$IPC_SET(r16, 0x1, &(0x7f0000000180)={{0x3, r10, r11, r13, r7, 0x42, 0x7}, 0x803ff, 0x2, 0xfffffffffffffffd, 0x0, r14, r15, 0x5}) shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000840)={{0x0, r2, r7, 0x0, r5, 0x50}, 0xd7, 0xfffffffffffffffe, 0x1000, 0x8000, r6}) r17 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000280)='/dev/nullb0\x00', 0x4400, 0x0) preadv(r17, &(0x7f0000000040)=[{&(0x7f0000000400)=""/4096, 0x3ffc00}], 0x1, 0x0) 00:55:47 executing program 3: openat$userio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/userio\x00', 0x0, 0x0) r0 = socket$pppoe(0x18, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x2, @link_local, 'team0\x00'}}, 0x1e) r1 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r1, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {0x0, 0x3}, {0xffffffff}, {0x1}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) r2 = open(&(0x7f0000000100)='./file0\x00', 0x200200, 0x24) r3 = syz_genetlink_get_family_id$devlink(&(0x7f00000001c0)='devlink\x00') sendmsg$DEVLINK_CMD_PORT_SET(r2, &(0x7f0000000340)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000300)={&(0x7f0000000200)={0xc8, r3, 0x10, 0x70bd26, 0x25dfdbfd, {}, [{{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}, {0x6, 0x4, 0x3}}, {{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8, 0x3, 0x3}}, {0x6, 0x4, 0x2}}, {{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8, 0x3, 0x1}}, {0x6, 0x4, 0x2}}, {{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8, 0x3, 0x1}}, {0x6, 0x4, 0x2}}]}, 0xc8}, 0x1, 0x0, 0x0, 0x4000800}, 0x80) 00:55:48 executing program 5: socket$pppoe(0x18, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x3f00, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {0xffffffff}, {0x1}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}) 00:55:48 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) pipe(0x0) wait4(0x0, 0x0, 0x40000000, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000265000)=@req={0x0, 0x400}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000740)={{{@in=@multicast2, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@broadcast}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route(r1, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=@ipv4_getnetconf={0x54, 0x52, 0x10, 0x70bd25, 0x25dfdbfd, {}, [@NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x1}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x9}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x5}, @NETCONFA_FORWARDING={0x8, 0x2, 0x8}, @NETCONFA_IFINDEX={0x8, 0x1, r2}, @NETCONFA_RP_FILTER={0x8, 0x3, 0x7fff}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x3}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0xe9}]}, 0x54}, 0x1, 0x0, 0x0, 0x3400c080}, 0x40) read(0xffffffffffffffff, &(0x7f0000000280)=""/152, 0x20000318) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/keys\x00', 0x0, 0x0) r4 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r4, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) write$binfmt_elf64(r4, &(0x7f00000003c0)={{0x7f, 0x45, 0x4c, 0x46, 0x6, 0x81, 0x35, 0x4, 0x1, 0x59ad6aa4a884dd63, 0x3, 0x0, 0x13d, 0x40, 0x26e, 0x8000, 0x1f, 0x38, 0x1, 0x8, 0x8, 0x3}, [{0x6, 0x3, 0xefa, 0x0, 0x81, 0x80000000, 0x0, 0x9}, {0x7, 0x2, 0x7ff, 0xfff, 0x1, 0x4, 0x0, 0x800b}], "5ad165d3d87709dd80c73c9fa8b6ef39a345e1b2327e38197c13f3be9248c0f2161632606ce45b5c7d7349c883946ca190a061f77e1020dc808b86b4e3c7b2a6128e2d3b16a4ec69ad8c276d1a038ddc59bd46a7a37061ed24ba41f62de7aaf1c073c43333bee7ed0979404acecab631d46b591f921ec0a584aeb912342ff4f104ff960a3563460c943d11952c88bd0d13a69a425793b6f7d2b09cf17c87cdc331f63c983436cef6888b1a8328e953b0b3bade3aabbfc4818a05af", [[]]}, 0x26b) read(r3, &(0x7f0000000280)=""/152, 0x20000318) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x280800, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$DRM_IOCTL_MODE_SETCRTC(0xffffffffffffffff, 0xc06864a2, &(0x7f0000000000)={0x0, 0x0, 0x20}) 00:55:48 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) pipe(0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=@ipv4_getnetconf={0x3c, 0x52, 0x10, 0x70bd25, 0x25dfdbfd, {}, [@NETCONFA_FORWARDING={0x8, 0x2, 0x2}, @NETCONFA_IFINDEX={0x8}, @NETCONFA_RP_FILTER={0x8}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x3}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x10000e9}]}, 0x3c}, 0x1, 0x0, 0x0, 0x3400c080}, 0xd0) r1 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r1, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) write$binfmt_elf64(r1, &(0x7f00000003c0)={{0x7f, 0x45, 0x4c, 0x46, 0x6, 0x81, 0x35, 0x4, 0x1, 0x59ad6aa4a884dd63, 0x3, 0x0, 0x13d, 0x40, 0x26e, 0x8000, 0x1f, 0x38, 0x1, 0x8, 0x8, 0x3}, [{0x6, 0x3, 0xefa, 0x1, 0x81, 0x80000000, 0x0, 0x9}, {0x7, 0x2, 0x7ff, 0xfff, 0x1, 0x4, 0x0, 0x800b}], "5ad165d3d87709dd80c73c9fa8b6ef39a345e1b2327e38197c13f3be9248c0f2161632606ce45b5c7d7349c883946ca190a061f77e1020dc808b86b4e3c7b2a6128e2d3b16a4ec69ad8c276d1a038ddc59bd46a7a37061ed24ba41f62de7aaf1c073c43333bee7ed0979404acecab631d46b591f921ec0a584aeb912342ff4f104ff960a3563460c943d11952c88bd0d13a69a425793b6f7d2b09cf17c87cdc331f63c983436cef6888b1a8328e953b0b3bade3aabbfc4818a05af", [[]]}, 0x26b) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_open_procfs(0x0, &(0x7f0000000000)='timers\x00') 00:55:48 executing program 5: socket$pppoe(0x18, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x4000, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {0xffffffff}, {0x1}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}) 00:55:48 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) pipe(0x0) wait4(0x0, 0x0, 0x40000000, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000265000)=@req={0x0, 0x400, 0x2}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000740)={{{@in=@multicast2, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@broadcast}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route(r1, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=@ipv4_getnetconf={0x4c, 0x52, 0x10, 0x70bd25, 0x25dfdbfd, {}, [@NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x1}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x5}, @NETCONFA_FORWARDING={0x8, 0x2, 0x8}, @NETCONFA_IFINDEX={0x8, 0x1, r2}, @NETCONFA_RP_FILTER={0x8, 0x3, 0x7fff}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x3}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0xe9}]}, 0x4c}, 0x1, 0x0, 0x0, 0x3400c080}, 0x40) read(0xffffffffffffffff, &(0x7f0000000280)=""/152, 0x20000318) openat$procfs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/keys\x00', 0x0, 0x0) r3 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r3, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) write$binfmt_elf64(r3, &(0x7f00000003c0)={{0x7f, 0x45, 0x4c, 0x46, 0x6, 0x81, 0x35, 0x4, 0x1, 0x59ad6aa4a884dd63, 0x3, 0x0, 0x13d, 0x40, 0x26e, 0x8000, 0x1f, 0x38, 0x1, 0x8, 0x8, 0x3}, [{0x6, 0x3, 0xefa, 0x1, 0x81, 0x80000000, 0x0, 0x9}, {0x7, 0x2, 0x7ff, 0xfff, 0x1, 0x4, 0x0, 0x800b}], "5ad165d3d87709dd80c73c9fa8b6ef39a345e1b2327e38197c13f3be9248c0f2161632606ce45b5c7d7349c883946ca190a061f77e1020dc808b86b4e3c7b2a6128e2d3b16a4ec69ad8c276d1a038ddc59bd46a7a37061ed24ba41f62de7aaf1c073c43333bee7ed0979404acecab631d46b591f921ec0a584aeb912342ff4f104ff960a3563460c943d11952c88bd0d13a69a425793b6f7d2b09cf17c87cdc331f63c983436cef6888b1a8328e953b0b3bade3aabbfc4818a05af", [[]]}, 0x26b) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_open_procfs(0x0, &(0x7f0000000000)='timers\x00') 00:55:49 executing program 3: r0 = socket$pppoe(0x18, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0)}}, 0x0, 0xfdfffffffffffffc, 0xffffffffffffffff, 0x0) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x2, @link_local, 'team0\x00'}}, 0x1e) r1 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r1, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {0x0, 0x3}, {0xffffffff}, {0x1}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) setsockopt$XDP_RX_RING(0xffffffffffffffff, 0x11b, 0x2, &(0x7f0000000100)=0x8100, 0x4) ioctl$sock_SIOCSIFVLAN_SET_VLAN_EGRESS_PRIORITY_CMD(r0, 0x8983, &(0x7f0000000140)={0x3, 'veth1_to_batadv\x00', {0x7fffffff}, 0xfff}) 00:55:49 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) pipe(0x0) wait4(0x0, 0x0, 0x40000000, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000265000)=@req={0x0, 0x400}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000740)={{{@in=@multicast2, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@broadcast}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route(r1, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=@ipv4_getnetconf={0x54, 0x52, 0x10, 0x70bd25, 0x25dfdbfd, {}, [@NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x1}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x9}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x5}, @NETCONFA_FORWARDING={0x8, 0x2, 0x8}, @NETCONFA_IFINDEX={0x8, 0x1, r2}, @NETCONFA_RP_FILTER={0x8, 0x3, 0x7fff}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x3}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0xe9}]}, 0x54}, 0x1, 0x0, 0x0, 0x3400c080}, 0x40) read(0xffffffffffffffff, &(0x7f0000000280)=""/152, 0x20000318) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/keys\x00', 0x0, 0x0) r4 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r4, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) write$binfmt_elf64(r4, &(0x7f00000003c0)={{0x7f, 0x45, 0x4c, 0x46, 0x6, 0x81, 0x35, 0x4, 0x1, 0x59ad6aa4a884dd63, 0x3, 0x0, 0x13d, 0x40, 0x26e, 0x8000, 0x1f, 0x38, 0x1, 0x8, 0x8, 0x3}, [{0x6, 0x3, 0xefa, 0x1, 0x0, 0x80000000, 0x0, 0x9}, {0x7, 0x2, 0x7ff, 0xfff, 0x1, 0x4, 0x0, 0x800b}], "5ad165d3d87709dd80c73c9fa8b6ef39a345e1b2327e38197c13f3be9248c0f2161632606ce45b5c7d7349c883946ca190a061f77e1020dc808b86b4e3c7b2a6128e2d3b16a4ec69ad8c276d1a038ddc59bd46a7a37061ed24ba41f62de7aaf1c073c43333bee7ed0979404acecab631d46b591f921ec0a584aeb912342ff4f104ff960a3563460c943d11952c88bd0d13a69a425793b6f7d2b09cf17c87cdc331f63c983436cef6888b1a8328e953b0b3bade3aabbfc4818a05af", [[]]}, 0x26b) read(r3, &(0x7f0000000280)=""/152, 0x20000318) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x280800, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$DRM_IOCTL_MODE_SETCRTC(0xffffffffffffffff, 0xc06864a2, &(0x7f0000000000)={0x0, 0x0, 0x20}) 00:55:49 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) pipe(0x0) wait4(0x0, 0x0, 0x40000000, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000265000)=@req={0x0, 0x400, 0x2}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000740)={{{@in=@multicast2, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@broadcast}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route(r1, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=@ipv4_getnetconf={0x54, 0x52, 0x10, 0x70bd25, 0x25dfdbfd, {}, [@NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x1}, @NETCONFA_PROXY_NEIGH={0x8}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x5}, @NETCONFA_FORWARDING={0x8, 0x2, 0x8}, @NETCONFA_IFINDEX={0x8, 0x1, r2}, @NETCONFA_RP_FILTER={0x8, 0x3, 0x7fff}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x3}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0xe9}]}, 0x54}, 0x1, 0x0, 0x0, 0x3400c080}, 0x40) read(0xffffffffffffffff, &(0x7f0000000280)=""/152, 0x20000318) openat$procfs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/keys\x00', 0x0, 0x0) r3 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r3, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) write$binfmt_elf64(r3, &(0x7f00000003c0)={{0x7f, 0x45, 0x4c, 0x46, 0x6, 0x81, 0x35, 0x4, 0x1, 0x59ad6aa4a884dd63, 0x3, 0x0, 0x13d, 0x40, 0x26e, 0x8000, 0x1f, 0x38, 0x1, 0x8, 0x8, 0x3}, [{0x6, 0x3, 0xefa, 0x1, 0x81, 0x80000000, 0x0, 0x9}, {0x7, 0x2, 0x7ff, 0xfff, 0x1, 0x4, 0x0, 0x800b}], "5ad165d3d87709dd80c73c9fa8b6ef39a345e1b2327e38197c13f3be9248c0f2161632606ce45b5c7d7349c883946ca190a061f77e1020dc808b86b4e3c7b2a6128e2d3b16a4ec69ad8c276d1a038ddc59bd46a7a37061ed24ba41f62de7aaf1c073c43333bee7ed0979404acecab631d46b591f921ec0a584aeb912342ff4f104ff960a3563460c943d11952c88bd0d13a69a425793b6f7d2b09cf17c87cdc331f63c983436cef6888b1a8328e953b0b3bade3aabbfc4818a05af", [[]]}, 0x26b) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_open_procfs(0x0, &(0x7f0000000000)='timers\x00') 00:55:49 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) stat(&(0x7f0000000240)='./file0/file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(0xffffffffffffffff, &(0x7f0000001b80)) socket(0x11, 0x2, 0x5) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r4, 0x1, 0x14, &(0x7f0000000040), 0x50) getsockopt$IP6T_SO_GET_ENTRIES(r4, 0x29, 0x41, &(0x7f0000000480)=ANY=[@ANYBLOB="6e2f740000edffffffffffffff00000000000000000000000000000000000000ad0000005086f3915e59ad8184af4045c4e742fa881d66411baabaa82dda6d71f825249ec2eb0ad398766b6b870bba11fc00df87700a78319e5f5d955a5eb0f50e2dcd95623e3eba93f21d4733f6d4834e398f5ba4540b18afc3c2a92ff6e4a89dc029fdd87fc0c2ca637f5ead98feb48d1bfe6451a583e519234bd5297e8a8bf569ff90077ba1cef2ea64c8f027947915a33e26b9d8b4fb56ba4d86df286c34e0cd9715e6b39dcccf4eb92a1706ed98b4aafd220eecfac13859aaab4dc07cd467149066f2f637c1e58f02faf49d72752753fe6beceb9d14b1ab3832cab4d59f892cb6f3689b67eaf81e929525a7fe0f2ea0892194387f7d085ea12c8842b8790911042b2a48b65c40087bd66593e0cfc29843b29738147ea75bb6c3d9664dc189fca97c43ed585ebb0c2a03782d916c709f6fdeca72784a8ac21d3ff8c9551290ea0000000000000049d4bb98580f9f7b7da060b127fd66ae6ad3c8753701b37ed619b2ed3efe862100"/405], 0x0) fsetxattr$trusted_overlay_redirect(r3, &(0x7f0000000200)='trusted.overlay.redirect\x00', &(0x7f0000000280)='./file0/file0\x00', 0xe, 0x0) getsockname$tipc(0xffffffffffffffff, 0x0, &(0x7f0000000080)) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000001400)={{0x1, 0x0, @identifier="8e0f03f7e12b88d1af81f7c5a6bb175f"}, 0x67, [], "ed760111b8363e2de90692d0bc7e0a89824d3c77730403363ce0521cdcb1973b558cbd01ebf95bd9529fe3c5a95dcf31792e3e463d875b955a13582aeaddf6af34a98934ad6944b87292af67aec51fd37bd761db93cf6623d8683956791c956c97d76a9fd8df5d"}) lstat(&(0x7f0000000000)='./file0/file0\x00', &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000100)=0x0) r7 = getegid() r8 = socket$inet_tcp(0x2, 0x1, 0x0) r9 = fcntl$dupfd(r8, 0x0, r8) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) setresuid(r10, r10, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003ec0)={0x0, 0x0, 0x0}, 0x0) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, r11) r12 = openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$DRM_IOCTL_AGP_INFO(r12, 0x80386433, &(0x7f0000000bc0)=""/4096) getsockopt$sock_cred(r12, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0x194) setresuid(r13, r13, 0x0) r14 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r15 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r15, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) waitid(0x1, r15, &(0x7f0000000100), 0x80000004, &(0x7f0000000180)) r16 = shmget$private(0x0, 0x3000, 0x20, &(0x7f0000ffa000/0x3000)=nil) shmctl$SHM_STAT_ANY(r16, 0xf, &(0x7f0000000540)=""/221) shmctl$IPC_SET(r16, 0x1, &(0x7f0000000180)={{0x3, r10, r11, r13, r7, 0x42, 0x7}, 0x803ff, 0x2, 0xfffffffffffffffd, 0x0, r14, r15, 0x5}) shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000840)={{0x0, r2, r7, 0x0, r5, 0x50}, 0xd7, 0xfffffffffffffffe, 0x1000, 0x8000, r6}) r17 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000280)='/dev/nullb0\x00', 0x4400, 0x0) preadv(r17, &(0x7f0000000040)=[{&(0x7f0000000400)=""/4096, 0x3ffc00}], 0x1, 0x0) 00:55:49 executing program 3: r0 = socket$pppoe(0x18, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x6, 0x8}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x2, @link_local, 'team0\x00'}}, 0x1e) r1 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x40000, 0x0) openat(r1, &(0x7f0000000100)='./file0\x00', 0x23203, 0x4) r2 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r2, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {0x0, 0x3}, {0xffffffff}, {0x1}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) 00:55:49 executing program 5: socket$pppoe(0x18, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0xff01, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {0xffffffff}, {0x1}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}) 00:55:49 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) pipe(0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=@ipv4_getnetconf={0x3c, 0x52, 0x10, 0x70bd25, 0x25dfdbfd, {}, [@NETCONFA_PROXY_NEIGH={0x8}, @NETCONFA_IFINDEX={0x8}, @NETCONFA_RP_FILTER={0x8}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x3}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0xe9}]}, 0x3c}, 0x1, 0x0, 0x0, 0x3400c080}, 0x40) r1 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r1, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) write$binfmt_elf64(r1, &(0x7f00000003c0)={{0x7f, 0x45, 0x4c, 0x46, 0x6, 0x81, 0x35, 0x4, 0x1, 0x59ad6aa4a884dd63, 0x3, 0x0, 0x13d, 0x40, 0x26e, 0x8000, 0x1f, 0x38, 0x1, 0x8, 0x8, 0x3}, [{0x6, 0x3, 0xefa, 0x1, 0x81, 0x80000000, 0x0, 0x9}, {0x7, 0x2, 0x7ff, 0xfff, 0x1, 0x4, 0x0, 0x800b}], "5ad165d3d87709dd80c73c9fa8b6ef39a345e1b2327e38197c13f3be9248c0f2161632606ce45b5c7d7349c883946ca190a061f77e1020dc808b86b4e3c7b2a6128e2d3b16a4ec69ad8c276d1a038ddc59bd46a7a37061ed24ba41f62de7aaf1c073c43333bee7ed0979404acecab631d46b591f921ec0a584aeb912342ff4f104ff960a3563460c943d11952c88bd0d13a69a425793b6f7d2b09cf17c87cdc331f63c983436cef6888b1a8328e953b0b3bade3aabbfc4818a05af", [[]]}, 0x26b) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_open_procfs(0x0, &(0x7f0000000000)='timers\x00') r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r2, &(0x7f0000000400)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @local, 0x4}, {0xa, 0x0, 0x0, @mcast1, 0xffffffff}, r3}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r2, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0x2, 0x0, 0x0, @loopback, 0x111a}, {0x2, 0x0, 0xffffffc1, @dev={0xfe, 0x80, [], 0x16}}, r3}}, 0x48) write$RDMA_USER_CM_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f0000000100)={0xa, 0x4, 0xfa00, {r3}}, 0xc) ioctl$KVM_SET_XCRS(0xffffffffffffffff, 0x4188aea7, &(0x7f00000002c0)={0x3, 0x4, [{0x2, 0x0, 0x7b30}, {0x7, 0x0, 0x5}, {0xff, 0x0, 0xeeb0}]}) 00:55:50 executing program 5: socket$pppoe(0x18, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x1000000, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {0xffffffff}, {0x1}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}) 00:55:50 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) pipe(0x0) wait4(0x0, 0x0, 0x40000000, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000265000)=@req={0x0, 0x400, 0x2}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000740)={{{@in=@multicast2, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@broadcast}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route(r1, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=@ipv4_getnetconf={0x54, 0x52, 0x10, 0x70bd25, 0x25dfdbfd, {}, [@NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x1}, @NETCONFA_PROXY_NEIGH={0x8}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x5}, @NETCONFA_FORWARDING={0x8, 0x2, 0x8}, @NETCONFA_IFINDEX={0x8, 0x1, r2}, @NETCONFA_RP_FILTER={0x8, 0x3, 0x7fff}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x3}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0xe9}]}, 0x54}, 0x1, 0x0, 0x0, 0x3400c080}, 0x40) read(0xffffffffffffffff, &(0x7f0000000280)=""/152, 0x20000318) openat$procfs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/keys\x00', 0x0, 0x0) r3 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r3, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) write$binfmt_elf64(r3, &(0x7f00000003c0)={{0x7f, 0x45, 0x4c, 0x46, 0x6, 0x81, 0x35, 0x4, 0x1, 0x59ad6aa4a884dd63, 0x3, 0x0, 0x13d, 0x40, 0x26e, 0x8000, 0x1f, 0x38, 0x1, 0x8, 0x8, 0x3}, [{0x6, 0x3, 0xefa, 0x1, 0x81, 0x80000000, 0x0, 0x9}, {0x7, 0x2, 0x7ff, 0xfff, 0x1, 0x4, 0x0, 0x800b}], "5ad165d3d87709dd80c73c9fa8b6ef39a345e1b2327e38197c13f3be9248c0f2161632606ce45b5c7d7349c883946ca190a061f77e1020dc808b86b4e3c7b2a6128e2d3b16a4ec69ad8c276d1a038ddc59bd46a7a37061ed24ba41f62de7aaf1c073c43333bee7ed0979404acecab631d46b591f921ec0a584aeb912342ff4f104ff960a3563460c943d11952c88bd0d13a69a425793b6f7d2b09cf17c87cdc331f63c983436cef6888b1a8328e953b0b3bade3aabbfc4818a05af", [[]]}, 0x26b) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_open_procfs(0x0, &(0x7f0000000000)='timers\x00') 00:55:50 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) pipe(0x0) wait4(0x0, 0x0, 0x40000000, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000265000)=@req={0x0, 0x400}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000740)={{{@in=@multicast2, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@broadcast}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route(r1, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=@ipv4_getnetconf={0x54, 0x52, 0x10, 0x70bd25, 0x25dfdbfd, {}, [@NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x1}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x9}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x5}, @NETCONFA_FORWARDING={0x8, 0x2, 0x8}, @NETCONFA_IFINDEX={0x8, 0x1, r2}, @NETCONFA_RP_FILTER={0x8, 0x3, 0x7fff}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x3}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0xe9}]}, 0x54}, 0x1, 0x0, 0x0, 0x3400c080}, 0x40) read(0xffffffffffffffff, &(0x7f0000000280)=""/152, 0x20000318) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/keys\x00', 0x0, 0x0) r4 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r4, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) write$binfmt_elf64(r4, &(0x7f00000003c0)={{0x7f, 0x45, 0x4c, 0x46, 0x6, 0x81, 0x35, 0x4, 0x1, 0x59ad6aa4a884dd63, 0x3, 0x0, 0x13d, 0x40, 0x26e, 0x8000, 0x1f, 0x38, 0x1, 0x8, 0x8, 0x3}, [{0x6, 0x3, 0xefa, 0x1, 0x0, 0x80000000, 0x0, 0x9}, {0x7, 0x2, 0x7ff, 0xfff, 0x1, 0x4, 0x0, 0x800b}], "5ad165d3d87709dd80c73c9fa8b6ef39a345e1b2327e38197c13f3be9248c0f2161632606ce45b5c7d7349c883946ca190a061f77e1020dc808b86b4e3c7b2a6128e2d3b16a4ec69ad8c276d1a038ddc59bd46a7a37061ed24ba41f62de7aaf1c073c43333bee7ed0979404acecab631d46b591f921ec0a584aeb912342ff4f104ff960a3563460c943d11952c88bd0d13a69a425793b6f7d2b09cf17c87cdc331f63c983436cef6888b1a8328e953b0b3bade3aabbfc4818a05af", [[]]}, 0x26b) read(r3, &(0x7f0000000280)=""/152, 0x20000318) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x280800, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$DRM_IOCTL_MODE_SETCRTC(0xffffffffffffffff, 0xc06864a2, &(0x7f0000000000)={0x0, 0x0, 0x20}) 00:55:50 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) pipe(0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=@ipv4_getnetconf={0x3c, 0x52, 0x10, 0x70bd25, 0x25dfdbfd, {}, [@NETCONFA_PROXY_NEIGH={0x8}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x401}, @NETCONFA_RP_FILTER={0x8}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x3}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0xe9}]}, 0x3c}, 0x1, 0x0, 0x0, 0x3400c080}, 0x40) r1 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r1, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) write$binfmt_elf64(r1, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x26b) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r2, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) ioctl$SOUND_PCM_READ_BITS(r2, 0x80045005, &(0x7f0000000100)) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_open_procfs(0x0, &(0x7f0000000000)='timers\x00') 00:55:50 executing program 3: r0 = socket$pppoe(0x18, 0x1, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x2, @link_local, 'team0\x00'}}, 0x1e) symlink(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='./file0\x00') r2 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) r3 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r3, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0205647, &(0x7f0000000100)={0x990000, 0x40005, 0xffffffff, r1, 0x0, &(0x7f0000000300)={0x9a091a, 0x7fff, [], @value=0x7}}) r5 = openat$zero(0xffffffffffffff9c, &(0x7f0000001540)='/dev/zero\x00', 0x80, 0x0) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000001580)={&(0x7f0000000340)="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", &(0x7f0000001340)=""/75, &(0x7f00000013c0)="d73cd07c0a5459dc94aab6b2e6ac73cce84db8dba515838d871a14cc6f2a872db7eb05eacc9071eabf9202f47324a2d6f61a8396f7877b3bcb120d1f68a42f399d772c88b03973b451aef575e74fa448fb9bc3590ee29c0c25910f0ff16f3eef5ccaddb22de4a29a90e33d138b1c73b7c0c00184dffc032460c3b7c86054678e6ce82212ea277e953fbbf76aee33595e43c1cbf7350db12df86075a91ed7855a03d68a6a696ea574a3c5cb", &(0x7f0000001480)="365f73617f8dd8b213791bbbea5a0955e560461f1ffa8774f0fbd7fc530c7247012169b46ce7e56e70aa19855336c00df03f64d55b027e1e485ef9eedea4349f3bf0eb7721027854ea38a1d058ec81f6b829bf01a8b055306f374c5d8d9fa875f966b28f1bb3a8ab50be630987c06616a602ea85d64ab0ef179b1d439e51781ee9547545e7acf4a9f6b3af96ce407bc0bb177abdaf66d656e60a83853107c64b7cb1", 0x52, r5}, 0x38) ioctl$sock_bt_hidp_HIDPCONNDEL(r3, 0x400448c9, &(0x7f0000000140)={@any, 0xb663}) write$dsp(r4, &(0x7f00000001c0)="49fae6f267ccc1a7f9fb36cf05c7ecdc971d3c63dfffe456c9c74cb5f321941c9ee053d20313448b6bab83efb257d5bbc3f6b3393db174568565a1ff126a19214ea22f7e3248e561850c7c79f49d367955ee92d958a04d308881a30efc4edd881c851302ab6c393183129751e93b5335e3ee706afddf9ec875d99877fc621dd7d6612c6d5e9bb372ecfd", 0x8a) ioctl$FBIOPUT_VSCREENINFO(r2, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {0x0, 0x3}, {0xffffffff}, {0x1}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) 00:55:51 executing program 5: socket$pppoe(0x18, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x2000000, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {0xffffffff}, {0x1}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}) 00:55:51 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) stat(&(0x7f0000000240)='./file0/file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(0xffffffffffffffff, &(0x7f0000001b80)) socket(0x11, 0x2, 0x5) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r3, 0x1, 0x14, &(0x7f0000000040), 0x50) getsockopt$IP6T_SO_GET_ENTRIES(r3, 0x29, 0x41, &(0x7f0000000480)=ANY=[@ANYBLOB="6e2f740000edffffffffffffff00000000000000000000000000000000000000ad0000005086f3915e59ad8184af4045c4e742fa881d66411baabaa82dda6d71f825249ec2eb0ad398766b6b870bba11fc00df87700a78319e5f5d955a5eb0f50e2dcd95623e3eba93f21d4733f6d4834e398f5ba4540b18afc3c2a92ff6e4a89dc029fdd87fc0c2ca637f5ead98feb48d1bfe6451a583e519234bd5297e8a8bf569ff90077ba1cef2ea64c8f027947915a33e26b9d8b4fb56ba4d86df286c34e0cd9715e6b39dcccf4eb92a1706ed98b4aafd220eecfac13859aaab4dc07cd467149066f2f637c1e58f02faf49d72752753fe6beceb9d14b1ab3832cab4d59f892cb6f3689b67eaf81e929525a7fe0f2ea0892194387f7d085ea12c8842b8790911042b2a48b65c40087bd66593e0cfc29843b29738147ea75bb6c3d9664dc189fca97c43ed585ebb0c2a03782d916c709f6fdeca72784a8ac21d3ff8c9551290ea0000000000000049d4bb98580f9f7b7da060b127fd66ae6ad3c8753701b37ed619b2ed3efe862100"/405], &(0x7f0000000340)=0x1) fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, &(0x7f0000000200)='trusted.overlay.redirect\x00', &(0x7f0000000280)='./file0/file0\x00', 0xe, 0x0) getsockname$tipc(0xffffffffffffffff, 0x0, &(0x7f0000000080)) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000001400)={{0x1, 0x0, @identifier="8e0f03f7e12b88d1af81f7c5a6bb175f"}, 0x67, [], "ed760111b8363e2de90692d0bc7e0a89824d3c77730403363ce0521cdcb1973b558cbd01ebf95bd9529fe3c5a95dcf31792e3e463d875b955a13582aeaddf6af34a98934ad6944b87292af67aec51fd37bd761db93cf6623d8683956791c956c97d76a9fd8df5d"}) lstat(&(0x7f0000000000)='./file0/file0\x00', &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000100)=0x0) r6 = getegid() r7 = socket$inet_tcp(0x2, 0x1, 0x0) r8 = fcntl$dupfd(r7, 0x0, r7) getsockopt$sock_cred(r8, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) setresuid(r9, r9, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003ec0)={0x0, 0x0, 0x0}, 0x0) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, r10) r11 = openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$DRM_IOCTL_AGP_INFO(r11, 0x80386433, &(0x7f0000000bc0)=""/4096) getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0x194) setresuid(r12, r12, 0x0) r13 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r14 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r14, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) waitid(0x1, r14, &(0x7f0000000100), 0x80000004, &(0x7f0000000180)) r15 = shmget$private(0x0, 0x3000, 0x20, &(0x7f0000ffa000/0x3000)=nil) shmctl$SHM_STAT_ANY(r15, 0xf, &(0x7f0000000540)=""/221) shmctl$IPC_SET(r15, 0x1, &(0x7f0000000180)={{0x3, r9, r10, r12, r6, 0x42, 0x7}, 0x803ff, 0x2, 0xfffffffffffffffd, 0x0, r13, r14, 0x5}) shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000840)={{0x0, r2, r6, 0x0, r4, 0x50}, 0xd7, 0xfffffffffffffffe, 0x1000, 0x8000, r5}) r16 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000280)='/dev/nullb0\x00', 0x4400, 0x0) preadv(r16, &(0x7f0000000040)=[{&(0x7f0000000400)=""/4096, 0x3ffc00}], 0x1, 0x0) 00:55:51 executing program 3: r0 = socket$pppoe(0x18, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x2, @link_local, 'team0\x00'}}, 0x1e) ioctl$FBIOPUT_VSCREENINFO(0xffffffffffffffff, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {0x0, 0x3}, {0xffffffff}, {0x1}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) 00:55:51 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x2, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) pipe(0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=@ipv4_getnetconf={0x3c, 0x52, 0x10, 0x70bd25, 0x25dfdbfd, {}, [@NETCONFA_PROXY_NEIGH={0x8}, @NETCONFA_IFINDEX={0x8}, @NETCONFA_RP_FILTER={0x8}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x3}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0xe9}]}, 0x3c}, 0x1, 0x0, 0x0, 0x3400c080}, 0x40) r1 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r1, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) write$binfmt_elf64(r1, &(0x7f00000003c0)={{0x7f, 0x45, 0x4c, 0x46, 0x6, 0x81, 0x35, 0x4, 0x1, 0x59ad6aa4a884dd63, 0x3, 0x0, 0x13d, 0x40, 0x26e, 0x8000, 0x1f, 0x38, 0x1, 0x8, 0x8, 0x3}, [{0x6, 0x3, 0xefa, 0x1, 0x81, 0x80000000, 0x0, 0x9}, {0x7, 0x2, 0x7ff, 0xfff, 0x1, 0x4, 0x0, 0x800b}], "5ad165d3d87709dd80c73c9fa8b6ef39a345e1b2327e38197c13f3be9248c0f2161632606ce45b5c7d7349c883946ca190a061f77e1020dc808b86b4e3c7b2a6128e2d3b16a4ec69ad8c276d1a038ddc59bd46a7a37061ed24ba41f62de7aaf1c073c43333bee7ed0979404acecab631d46b591f921ec0a584aeb912342ff4f104ff960a3563460c943d11952c88bd0d13a69a425793b6f7d2b09cf17c87cdc331f63c983436cef6888b1a8328e953b0b3bade3aabbfc4818a05af", [[]]}, 0x26b) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_open_procfs(0x0, &(0x7f0000000000)='timers\x00') 00:55:51 executing program 5: socket$pppoe(0x18, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x3000000, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {0xffffffff}, {0x1}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}) 00:55:51 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) pipe(0x0) wait4(0x0, 0x0, 0x40000000, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000265000)=@req={0x0, 0x400, 0x2}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000740)={{{@in=@multicast2, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@broadcast}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route(r1, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=@ipv4_getnetconf={0x54, 0x52, 0x10, 0x70bd25, 0x25dfdbfd, {}, [@NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x1}, @NETCONFA_PROXY_NEIGH={0x8}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x5}, @NETCONFA_FORWARDING={0x8, 0x2, 0x8}, @NETCONFA_IFINDEX={0x8, 0x1, r2}, @NETCONFA_RP_FILTER={0x8, 0x3, 0x7fff}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x3}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0xe9}]}, 0x54}, 0x1, 0x0, 0x0, 0x3400c080}, 0x40) read(0xffffffffffffffff, &(0x7f0000000280)=""/152, 0x20000318) openat$procfs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/keys\x00', 0x0, 0x0) r3 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r3, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) write$binfmt_elf64(r3, &(0x7f00000003c0)={{0x7f, 0x45, 0x4c, 0x46, 0x6, 0x81, 0x35, 0x4, 0x1, 0x59ad6aa4a884dd63, 0x3, 0x0, 0x13d, 0x40, 0x26e, 0x8000, 0x1f, 0x38, 0x1, 0x8, 0x8, 0x3}, [{0x6, 0x3, 0xefa, 0x1, 0x81, 0x80000000, 0x0, 0x9}, {0x7, 0x2, 0x7ff, 0xfff, 0x1, 0x4, 0x0, 0x800b}], "5ad165d3d87709dd80c73c9fa8b6ef39a345e1b2327e38197c13f3be9248c0f2161632606ce45b5c7d7349c883946ca190a061f77e1020dc808b86b4e3c7b2a6128e2d3b16a4ec69ad8c276d1a038ddc59bd46a7a37061ed24ba41f62de7aaf1c073c43333bee7ed0979404acecab631d46b591f921ec0a584aeb912342ff4f104ff960a3563460c943d11952c88bd0d13a69a425793b6f7d2b09cf17c87cdc331f63c983436cef6888b1a8328e953b0b3bade3aabbfc4818a05af", [[]]}, 0x26b) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_open_procfs(0x0, &(0x7f0000000000)='timers\x00') 00:55:51 executing program 3: r0 = socket$pppoe(0x18, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x2, @link_local, 'team0\x00'}}, 0x1e) r1 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x8345, 0x200) ioctl$FBIOPUT_VSCREENINFO(r1, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {0x0, 0x3}, {0xffffffff}, {0x1}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}) 00:55:51 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) pipe(0x0) wait4(0x0, 0x0, 0x40000000, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000265000)=@req={0x0, 0x400}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000740)={{{@in=@multicast2, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@broadcast}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route(r1, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=@ipv4_getnetconf={0x54, 0x52, 0x10, 0x70bd25, 0x25dfdbfd, {}, [@NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x1}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x9}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x5}, @NETCONFA_FORWARDING={0x8, 0x2, 0x8}, @NETCONFA_IFINDEX={0x8, 0x1, r2}, @NETCONFA_RP_FILTER={0x8, 0x3, 0x7fff}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x3}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0xe9}]}, 0x54}, 0x1, 0x0, 0x0, 0x3400c080}, 0x40) read(0xffffffffffffffff, &(0x7f0000000280)=""/152, 0x20000318) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/keys\x00', 0x0, 0x0) r4 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r4, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) write$binfmt_elf64(r4, &(0x7f00000003c0)={{0x7f, 0x45, 0x4c, 0x46, 0x6, 0x81, 0x35, 0x4, 0x1, 0x59ad6aa4a884dd63, 0x3, 0x0, 0x13d, 0x40, 0x26e, 0x8000, 0x1f, 0x38, 0x1, 0x8, 0x8, 0x3}, [{0x6, 0x3, 0xefa, 0x1, 0x0, 0x80000000, 0x0, 0x9}, {0x7, 0x2, 0x7ff, 0xfff, 0x1, 0x4, 0x0, 0x800b}], "5ad165d3d87709dd80c73c9fa8b6ef39a345e1b2327e38197c13f3be9248c0f2161632606ce45b5c7d7349c883946ca190a061f77e1020dc808b86b4e3c7b2a6128e2d3b16a4ec69ad8c276d1a038ddc59bd46a7a37061ed24ba41f62de7aaf1c073c43333bee7ed0979404acecab631d46b591f921ec0a584aeb912342ff4f104ff960a3563460c943d11952c88bd0d13a69a425793b6f7d2b09cf17c87cdc331f63c983436cef6888b1a8328e953b0b3bade3aabbfc4818a05af", [[]]}, 0x26b) read(r3, &(0x7f0000000280)=""/152, 0x20000318) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x280800, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$DRM_IOCTL_MODE_SETCRTC(0xffffffffffffffff, 0xc06864a2, &(0x7f0000000000)={0x0, 0x0, 0x20}) 00:55:51 executing program 5: socket$pppoe(0x18, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x4000000, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {0xffffffff}, {0x1}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}) 00:55:52 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) pipe(0x0) wait4(0x0, 0x0, 0x40000000, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000265000)=@req={0x0, 0x400}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000740)={{{@in=@multicast2, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@broadcast}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route(r1, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=@ipv4_getnetconf={0x54, 0x52, 0x10, 0x70bd25, 0x25dfdbfd, {}, [@NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x1}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x9}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x5}, @NETCONFA_FORWARDING={0x8, 0x2, 0x8}, @NETCONFA_IFINDEX={0x8, 0x1, r2}, @NETCONFA_RP_FILTER={0x8, 0x3, 0x7fff}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x3}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0xe9}]}, 0x54}, 0x1, 0x0, 0x0, 0x3400c080}, 0x40) read(0xffffffffffffffff, &(0x7f0000000280)=""/152, 0x20000318) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/keys\x00', 0x0, 0x0) r4 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r4, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) write$binfmt_elf64(r4, &(0x7f00000003c0)={{0x7f, 0x45, 0x4c, 0x46, 0x6, 0x81, 0x35, 0x4, 0x1, 0x59ad6aa4a884dd63, 0x3, 0x0, 0x13d, 0x40, 0x26e, 0x8000, 0x1f, 0x38, 0x1, 0x8, 0x8, 0x3}, [{0x6, 0x3, 0xefa, 0x1, 0x81, 0x0, 0x0, 0x9}, {0x7, 0x2, 0x7ff, 0xfff, 0x1, 0x4, 0x0, 0x800b}], "5ad165d3d87709dd80c73c9fa8b6ef39a345e1b2327e38197c13f3be9248c0f2161632606ce45b5c7d7349c883946ca190a061f77e1020dc808b86b4e3c7b2a6128e2d3b16a4ec69ad8c276d1a038ddc59bd46a7a37061ed24ba41f62de7aaf1c073c43333bee7ed0979404acecab631d46b591f921ec0a584aeb912342ff4f104ff960a3563460c943d11952c88bd0d13a69a425793b6f7d2b09cf17c87cdc331f63c983436cef6888b1a8328e953b0b3bade3aabbfc4818a05af", [[]]}, 0x26b) read(r3, &(0x7f0000000280)=""/152, 0x20000318) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x280800, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$DRM_IOCTL_MODE_SETCRTC(0xffffffffffffffff, 0xc06864a2, &(0x7f0000000000)={0x0, 0x0, 0x20}) 00:55:52 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) pipe(0x0) wait4(0x0, 0x0, 0x40000000, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000265000)=@req={0x0, 0x400, 0x2}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000740)={{{@in=@multicast2, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@broadcast}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route(r1, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=@ipv4_getnetconf={0x4c, 0x52, 0x10, 0x70bd25, 0x25dfdbfd, {}, [@NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x9}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x5}, @NETCONFA_FORWARDING={0x8, 0x2, 0x8}, @NETCONFA_IFINDEX={0x8, 0x1, r2}, @NETCONFA_RP_FILTER={0x8, 0x3, 0x7fff}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x3}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0xe9}]}, 0x4c}, 0x1, 0x0, 0x0, 0x3400c080}, 0x40) read(0xffffffffffffffff, &(0x7f0000000280)=""/152, 0x20000318) openat$procfs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/keys\x00', 0x0, 0x0) r3 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r3, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) write$binfmt_elf64(r3, &(0x7f00000003c0)={{0x7f, 0x45, 0x4c, 0x46, 0x6, 0x81, 0x35, 0x4, 0x1, 0x59ad6aa4a884dd63, 0x3, 0x0, 0x13d, 0x40, 0x26e, 0x8000, 0x1f, 0x38, 0x1, 0x8, 0x8, 0x3}, [{0x6, 0x3, 0xefa, 0x1, 0x81, 0x80000000, 0x0, 0x9}, {0x7, 0x2, 0x7ff, 0xfff, 0x1, 0x4, 0x0, 0x800b}], "5ad165d3d87709dd80c73c9fa8b6ef39a345e1b2327e38197c13f3be9248c0f2161632606ce45b5c7d7349c883946ca190a061f77e1020dc808b86b4e3c7b2a6128e2d3b16a4ec69ad8c276d1a038ddc59bd46a7a37061ed24ba41f62de7aaf1c073c43333bee7ed0979404acecab631d46b591f921ec0a584aeb912342ff4f104ff960a3563460c943d11952c88bd0d13a69a425793b6f7d2b09cf17c87cdc331f63c983436cef6888b1a8328e953b0b3bade3aabbfc4818a05af", [[]]}, 0x26b) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_open_procfs(0x0, &(0x7f0000000000)='timers\x00') 00:55:52 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) stat(&(0x7f0000000240)='./file0/file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(0xffffffffffffffff, &(0x7f0000001b80)) socket(0x11, 0x2, 0x5) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r3, 0x1, 0x14, &(0x7f0000000040), 0x50) getsockopt$IP6T_SO_GET_ENTRIES(r3, 0x29, 0x41, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/405], &(0x7f0000000340)=0x1) fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, &(0x7f0000000200)='trusted.overlay.redirect\x00', &(0x7f0000000280)='./file0/file0\x00', 0xe, 0x0) getsockname$tipc(0xffffffffffffffff, 0x0, &(0x7f0000000080)) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000001400)={{0x1, 0x0, @identifier="8e0f03f7e12b88d1af81f7c5a6bb175f"}, 0x67, [], "ed760111b8363e2de90692d0bc7e0a89824d3c77730403363ce0521cdcb1973b558cbd01ebf95bd9529fe3c5a95dcf31792e3e463d875b955a13582aeaddf6af34a98934ad6944b87292af67aec51fd37bd761db93cf6623d8683956791c956c97d76a9fd8df5d"}) lstat(&(0x7f0000000000)='./file0/file0\x00', &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000100)=0x0) r6 = getegid() r7 = socket$inet_tcp(0x2, 0x1, 0x0) r8 = fcntl$dupfd(r7, 0x0, r7) getsockopt$sock_cred(r8, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) setresuid(r9, r9, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003ec0)={0x0, 0x0, 0x0}, 0x0) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, r10) r11 = openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$DRM_IOCTL_AGP_INFO(r11, 0x80386433, &(0x7f0000000bc0)=""/4096) getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0x194) setresuid(r12, r12, 0x0) r13 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r14 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r14, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) waitid(0x1, r14, &(0x7f0000000100), 0x80000004, &(0x7f0000000180)) r15 = shmget$private(0x0, 0x3000, 0x20, &(0x7f0000ffa000/0x3000)=nil) shmctl$SHM_STAT_ANY(r15, 0xf, &(0x7f0000000540)=""/221) shmctl$IPC_SET(r15, 0x1, &(0x7f0000000180)={{0x3, r9, r10, r12, r6, 0x42, 0x7}, 0x803ff, 0x2, 0xfffffffffffffffd, 0x0, r13, r14, 0x5}) shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000840)={{0x0, r2, r6, 0x0, r4, 0x50}, 0xd7, 0xfffffffffffffffe, 0x1000, 0x8000, r5}) r16 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000280)='/dev/nullb0\x00', 0x4400, 0x0) preadv(r16, &(0x7f0000000040)=[{&(0x7f0000000400)=""/4096, 0x3ffc00}], 0x1, 0x0) 00:55:52 executing program 3: r0 = socket$pppoe(0x18, 0x1, 0x0) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x6) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') sendmsg$TIPC_NL_NET_GET(r1, &(0x7f00000003c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000580)=ANY=[@ANYBLOB="2d0200b4", @ANYRES16=r2, @ANYBLOB="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"], 0x1c0}, 0x1, 0x0, 0x0, 0x4000000}, 0x2404c054) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x2, @link_local, 'team0\x00'}}, 0x1e) r3 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) r4 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r4, 0x10f, 0x87, &(0x7f0000265000)=@req={0x0, 0x0, 0x2}, 0x10) sendmsg$IPSET_CMD_TYPE(r4, &(0x7f0000000900)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, 0xd, 0x6, 0x3, 0x0, 0x0, {0x1, 0x0, 0x3}, [@IPSET_ATTR_FAMILY={0x5, 0x5, 0x7}]}, 0x1c}}, 0x20000810) r5 = syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x400) write$P9_RATTACH(r5, &(0x7f0000000200)={0x14, 0x69, 0x2, {0x0, 0x3, 0x3}}, 0x14) ioctl$FBIOPUT_VSCREENINFO(r3, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {0x0, 0x3}, {0xffffffff}, {0x1}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) ioctl$PIO_FONT(0xffffffffffffffff, 0x4b61, &(0x7f0000000480)="f20a2325fbfb1f3b536b3d15c0ac54c29883b627cc02c0f30a28d9b4") r6 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000400)='/dev/bsg\x00', 0x4400, 0x0) getsockopt$IP_SET_OP_GET_BYINDEX(r0, 0x1, 0x53, &(0x7f0000000240)={0x7, 0x7, 0x2}, &(0x7f0000000280)=0x28) ioctl$TIOCGRS485(r6, 0x542e, &(0x7f0000000440)) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000004c0)={'filter\x00'}, &(0x7f0000000540)=0x54) 00:55:52 executing program 5: socket$pppoe(0x18, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x5000000, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {0xffffffff}, {0x1}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}) 00:55:53 executing program 3: r0 = socket$pppoe(0x18, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) pipe2(&(0x7f00000000c0), 0x2000) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x2, @link_local, 'team0\x00'}}, 0x1e) r1 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r1, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {0x0, 0x3}, {0xffffffff}, {0x1}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) 00:55:53 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) pipe(0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=@ipv4_getnetconf={0x3c, 0x52, 0x10, 0x70bd25, 0x25dfdbfd, {}, [@NETCONFA_PROXY_NEIGH={0x8}, @NETCONFA_IFINDEX={0x8}, @NETCONFA_RP_FILTER={0x8}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x3}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0xe9}]}, 0x3c}, 0x1, 0x0, 0x0, 0x3400c080}, 0x40) r1 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r1, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) write$binfmt_elf64(r1, &(0x7f00000003c0)={{0x7f, 0x45, 0x4c, 0x46, 0x6, 0x81, 0x35, 0x4, 0x1, 0x59ad6aa4a884dd63, 0x3, 0x0, 0x13d, 0x40, 0x26e, 0x8000, 0x1f, 0x38, 0x1, 0x8, 0x8, 0x3}, [{0x6, 0x3, 0xefa, 0x1, 0x81, 0x80000000, 0x0, 0x9}, {0x7, 0x2, 0x7ff, 0xfff, 0x1, 0x4, 0x0, 0x800b}], "5ad165d3d87709dd80c73c9fa8b6ef39a345e1b2327e38197c13f3be9248c0f2161632606ce45b5c7d7349c883946ca190a061f77e1020dc808b86b4e3c7b2a6128e2d3b16a4ec69ad8c276d1a038ddc59bd46a7a37061ed24ba41f62de7aaf1c073c43333bee7ed0979404acecab631d46b591f921ec0a584aeb912342ff4f104ff960a3563460c943d11952c88bd0d13a69a425793b6f7d2b09cf17c87cdc331f63c983436cef6888b1a8328e953b0b3bade3aabbfc4818a05af", [[]]}, 0x26b) r2 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f0000265000)=@req={0x0, 0x0, 0x2}, 0x10) sendmsg$NFQNL_MSG_VERDICT(r2, &(0x7f0000000680)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000640)={&(0x7f0000000300)={0x6c, 0x1, 0x3, 0x401, 0x0, 0x0, {0x7, 0x0, 0x6}, [@NFQA_PAYLOAD={0x56, 0xa, "a017984259f1f2c49aa585b5e41b574b1cdfdf8dc16b858dc52680b0141c632a80620f3dc815e90af4ace6babaa60b8200eff1c0ada0ec28db0b14c261d46458fbbb6ede737a7b032f7fe367ef395168ab99"}]}, 0x6c}, 0x1, 0x0, 0x0, 0x10040}, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_open_procfs(0x0, &(0x7f0000000000)='timers\x00') r3 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r3, 0x10f, 0x87, &(0x7f0000265000)=@req={0x0, 0x0, 0x2}, 0x10) accept4$unix(r3, &(0x7f0000000280), &(0x7f0000000100)=0x6e, 0x80800) 00:55:53 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) pipe(0x0) wait4(0x0, 0x0, 0x40000000, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000265000)=@req={0x0, 0x400}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000740)={{{@in=@multicast2, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@broadcast}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route(r1, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=@ipv4_getnetconf={0x54, 0x52, 0x10, 0x70bd25, 0x25dfdbfd, {}, [@NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x1}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x9}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x5}, @NETCONFA_FORWARDING={0x8, 0x2, 0x8}, @NETCONFA_IFINDEX={0x8, 0x1, r2}, @NETCONFA_RP_FILTER={0x8, 0x3, 0x7fff}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x3}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0xe9}]}, 0x54}, 0x1, 0x0, 0x0, 0x3400c080}, 0x40) read(0xffffffffffffffff, &(0x7f0000000280)=""/152, 0x20000318) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/keys\x00', 0x0, 0x0) r4 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r4, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) write$binfmt_elf64(r4, &(0x7f00000003c0)={{0x7f, 0x45, 0x4c, 0x46, 0x6, 0x81, 0x35, 0x4, 0x1, 0x59ad6aa4a884dd63, 0x3, 0x0, 0x13d, 0x40, 0x26e, 0x8000, 0x1f, 0x38, 0x1, 0x8, 0x8, 0x3}, [{0x6, 0x3, 0xefa, 0x1, 0x81, 0x0, 0x0, 0x9}, {0x7, 0x2, 0x7ff, 0xfff, 0x1, 0x4, 0x0, 0x800b}], "5ad165d3d87709dd80c73c9fa8b6ef39a345e1b2327e38197c13f3be9248c0f2161632606ce45b5c7d7349c883946ca190a061f77e1020dc808b86b4e3c7b2a6128e2d3b16a4ec69ad8c276d1a038ddc59bd46a7a37061ed24ba41f62de7aaf1c073c43333bee7ed0979404acecab631d46b591f921ec0a584aeb912342ff4f104ff960a3563460c943d11952c88bd0d13a69a425793b6f7d2b09cf17c87cdc331f63c983436cef6888b1a8328e953b0b3bade3aabbfc4818a05af", [[]]}, 0x26b) read(r3, &(0x7f0000000280)=""/152, 0x20000318) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x280800, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$DRM_IOCTL_MODE_SETCRTC(0xffffffffffffffff, 0xc06864a2, &(0x7f0000000000)={0x0, 0x0, 0x20}) 00:55:53 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) pipe(0x0) wait4(0x0, 0x0, 0x40000000, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000265000)=@req={0x0, 0x400}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000740)={{{@in=@multicast2, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@broadcast}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route(r1, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=@ipv4_getnetconf={0x54, 0x52, 0x10, 0x70bd25, 0x25dfdbfd, {}, [@NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x1}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x9}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x5}, @NETCONFA_FORWARDING={0x8, 0x2, 0x8}, @NETCONFA_IFINDEX={0x8, 0x1, r2}, @NETCONFA_RP_FILTER={0x8, 0x3, 0x7fff}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x3}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0xe9}]}, 0x54}, 0x1, 0x0, 0x0, 0x3400c080}, 0x40) read(0xffffffffffffffff, &(0x7f0000000280)=""/152, 0x20000318) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/keys\x00', 0x0, 0x0) r4 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r4, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) write$binfmt_elf64(r4, &(0x7f00000003c0)={{0x7f, 0x45, 0x4c, 0x46, 0x6, 0x81, 0x35, 0x4, 0x1, 0x59ad6aa4a884dd63, 0x3, 0x0, 0x13d, 0x40, 0x26e, 0x8000, 0x1f, 0x38, 0x1, 0x8, 0x8, 0x3}, [{0x6, 0x3, 0xefa, 0x1, 0x81, 0x0, 0x0, 0x9}, {0x7, 0x2, 0x7ff, 0xfff, 0x1, 0x4, 0x0, 0x800b}], "5ad165d3d87709dd80c73c9fa8b6ef39a345e1b2327e38197c13f3be9248c0f2161632606ce45b5c7d7349c883946ca190a061f77e1020dc808b86b4e3c7b2a6128e2d3b16a4ec69ad8c276d1a038ddc59bd46a7a37061ed24ba41f62de7aaf1c073c43333bee7ed0979404acecab631d46b591f921ec0a584aeb912342ff4f104ff960a3563460c943d11952c88bd0d13a69a425793b6f7d2b09cf17c87cdc331f63c983436cef6888b1a8328e953b0b3bade3aabbfc4818a05af", [[]]}, 0x26b) read(r3, &(0x7f0000000280)=""/152, 0x20000318) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x280800, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$DRM_IOCTL_MODE_SETCRTC(0xffffffffffffffff, 0xc06864a2, &(0x7f0000000000)={0x0, 0x0, 0x20}) 00:55:53 executing program 5: socket$pppoe(0x18, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x6000000, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {0xffffffff}, {0x1}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}) 00:55:53 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) pipe(0x0) wait4(0x0, 0x0, 0x40000000, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000265000)=@req={0x0, 0x400, 0x2}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000740)={{{@in=@multicast2, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@broadcast}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route(r1, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=@ipv4_getnetconf={0x4c, 0x52, 0x10, 0x70bd25, 0x25dfdbfd, {}, [@NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x9}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x5}, @NETCONFA_FORWARDING={0x8, 0x2, 0x8}, @NETCONFA_IFINDEX={0x8, 0x1, r2}, @NETCONFA_RP_FILTER={0x8, 0x3, 0x7fff}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x3}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0xe9}]}, 0x4c}, 0x1, 0x0, 0x0, 0x3400c080}, 0x40) read(0xffffffffffffffff, &(0x7f0000000280)=""/152, 0x20000318) openat$procfs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/keys\x00', 0x0, 0x0) r3 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r3, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) write$binfmt_elf64(r3, &(0x7f00000003c0)={{0x7f, 0x45, 0x4c, 0x46, 0x6, 0x81, 0x35, 0x4, 0x1, 0x59ad6aa4a884dd63, 0x3, 0x0, 0x13d, 0x40, 0x26e, 0x8000, 0x1f, 0x38, 0x1, 0x8, 0x8, 0x3}, [{0x6, 0x3, 0xefa, 0x1, 0x81, 0x80000000, 0x0, 0x9}, {0x7, 0x2, 0x7ff, 0xfff, 0x1, 0x4, 0x0, 0x800b}], "5ad165d3d87709dd80c73c9fa8b6ef39a345e1b2327e38197c13f3be9248c0f2161632606ce45b5c7d7349c883946ca190a061f77e1020dc808b86b4e3c7b2a6128e2d3b16a4ec69ad8c276d1a038ddc59bd46a7a37061ed24ba41f62de7aaf1c073c43333bee7ed0979404acecab631d46b591f921ec0a584aeb912342ff4f104ff960a3563460c943d11952c88bd0d13a69a425793b6f7d2b09cf17c87cdc331f63c983436cef6888b1a8328e953b0b3bade3aabbfc4818a05af", [[]]}, 0x26b) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_open_procfs(0x0, &(0x7f0000000000)='timers\x00') 00:55:54 executing program 3: r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x2, @link_local, 'team0\x00'}}, 0x1e) r1 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r1, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x20, 0x0, 0x0, 0x4, 0x0, {0x0, 0x3}, {0xffffffff}, {0x1}, {}, 0x0, 0x0, 0xfffffffc, 0x0, 0x0, 0xffffffff}) 00:55:54 executing program 5: socket$pppoe(0x18, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x7000000, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {0xffffffff}, {0x1}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}) 00:55:54 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) stat(&(0x7f0000000240)='./file0/file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(0xffffffffffffffff, &(0x7f0000001b80)) socket(0x11, 0x2, 0x5) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r3, 0x1, 0x14, &(0x7f0000000040), 0x50) getsockopt$IP6T_SO_GET_ENTRIES(r3, 0x29, 0x41, &(0x7f0000000480)=ANY=[@ANYBLOB="6e2f740000edffffffffffffff00000000000000000000000000000000000000ad0000005086f3915e59ad8184af4045c4e742fa881d66411baabaa82dda6d71f825249ec2eb0ad398766b6b870bba11fc00df87700a78319e5f5d955a5eb0f50e2dcd95623e3eba93f21d4733f6d4834e398f5ba4540b18afc3c2a92ff6e4a89dc029fdd87fc0c2ca637f5ead98feb48d1bfe6451a583e519234bd5297e8a8bf569ff90077ba1cef2ea64c8f027947915a33e26b9d8b4fb56ba4d86df286c34e0cd9715e6b39dcccf4eb92a1706ed98b4aafd220eecfac13859aaab4dc07cd467149066f2f637c1e58f02faf49d72752753fe6beceb9d14b1ab3832cab4d59f892cb6f3689b67eaf81e929525a7fe0f2ea0892194387f7d085ea12c8842b8790911042b2a48b65c40087bd66593e0cfc29843b29738147ea75bb6c3d9664dc189fca97c43ed585ebb0c2a03782d916c709f6fdeca72784a8ac21d3ff8c9551290ea0000000000000049d4bb98580f9f7b7da060b127fd66ae6ad3c8753701b37ed619b2ed3efe862100"/405], &(0x7f0000000340)=0x1) fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, &(0x7f0000000200)='trusted.overlay.redirect\x00', &(0x7f0000000280)='./file0/file0\x00', 0xe, 0x0) getsockname$tipc(0xffffffffffffffff, 0x0, &(0x7f0000000080)) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000001400)={{0x1, 0x0, @identifier="8e0f03f7e12b88d1af81f7c5a6bb175f"}, 0x67, [], "ed760111b8363e2de90692d0bc7e0a89824d3c77730403363ce0521cdcb1973b558cbd01ebf95bd9529fe3c5a95dcf31792e3e463d875b955a13582aeaddf6af34a98934ad6944b87292af67aec51fd37bd761db93cf6623d8683956791c956c97d76a9fd8df5d"}) lstat(&(0x7f0000000000)='./file0/file0\x00', &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000100)=0x0) r6 = getegid() r7 = socket$inet_tcp(0x2, 0x1, 0x0) r8 = fcntl$dupfd(r7, 0x0, r7) getsockopt$sock_cred(r8, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) setresuid(r9, r9, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003ec0)={0x0, 0x0, 0x0}, 0x0) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, r10) r11 = openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$DRM_IOCTL_AGP_INFO(r11, 0x80386433, &(0x7f0000000bc0)=""/4096) getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0x194) setresuid(r12, r12, 0x0) r13 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r14 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r14, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) waitid(0x1, r14, &(0x7f0000000100), 0x80000004, &(0x7f0000000180)) r15 = shmget$private(0x0, 0x3000, 0x20, &(0x7f0000ffa000/0x3000)=nil) shmctl$SHM_STAT_ANY(r15, 0xf, &(0x7f0000000540)=""/221) shmctl$IPC_SET(r15, 0x1, &(0x7f0000000180)={{0x3, r9, r10, r12, r6, 0x42, 0x7}, 0x803ff, 0x2, 0xfffffffffffffffd, 0x0, r13, r14, 0x5}) shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000840)={{0x0, r2, r6, 0x0, r4, 0x50}, 0xd7, 0xfffffffffffffffe, 0x1000, 0x8000, r5}) r16 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000280)='/dev/nullb0\x00', 0x4400, 0x0) preadv(r16, &(0x7f0000000040)=[{&(0x7f0000000400)=""/4096, 0x3ffc00}], 0x1, 0x0) 00:55:54 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) pipe(0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[@ANYBLOB="3c000000520e100025bd7000fddbdf2502080005000000000008010100", @ANYRES32=0x0, @ANYBLOB="0800030000000000080006000300000008000500e9000000000000"], 0x3c}, 0x1, 0x0, 0x0, 0x3400c080}, 0x40) r1 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r1, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x80800) r3 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r3, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) ioctl$VIDIOC_TRY_EXT_CTRLS(r3, 0xc0205649, &(0x7f00000002c0)={0x990000, 0x8, 0x7, r1, 0x0, &(0x7f0000000280)={0x980910, 0x0, [], @p_u32=&(0x7f0000000200)=0x7d7}}) ioctl$VIDIOC_TRY_EXT_CTRLS(r2, 0xc0205649, &(0x7f0000000640)={0xa30000, 0x7f, 0x1, r4, 0x0, &(0x7f0000000340)={0x990af6, 0xa9f, [], @p_u8=&(0x7f0000000300)=0x3f}}) write$binfmt_elf64(r1, &(0x7f00000003c0)={{0x7f, 0x45, 0x4c, 0x46, 0x6, 0x81, 0x35, 0x4, 0x1, 0x59ad6aa4a884dd63, 0x3, 0x0, 0x13d, 0x40, 0x26e, 0x8000, 0x1f, 0x38, 0x1, 0x8, 0x8, 0x3}, [{0x6, 0x3, 0xefa, 0x1, 0x81, 0x80000000, 0x0, 0x9}, {0x7, 0x2, 0x7ff, 0xfff, 0x1, 0x4, 0x0, 0x800b}], "5ad165d3d87709dd80c73c9fa8b6ef39a345e1b2327e38197c13f3be9248c0f2161632606ce45b5c7d7349c883946ca190a061f77e1020dc808b86b4e3c7b2a6128e2d3b16a4ec69ad8c276d1a038ddc59bd46a7a37061ed24ba41f62de7aaf1c073c43333bee7ed0979404acecab631d46b591f921ec0a584aeb912342ff4f104ff960a3563460c943d11952c88bd0d13a69a425793b6f7d2b09cf17c87cdc331f63c983436cef6888b1a8328e953b0b3bade3aabbfc4818a05af", [[]]}, 0x26b) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_open_procfs(0x0, &(0x7f0000000000)='timers\x00') 00:55:54 executing program 5: socket$pppoe(0x18, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x10000000, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {0xffffffff}, {0x1}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}) 00:55:54 executing program 3: r0 = socket$pppoe(0x18, 0x1, 0x0) r1 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000265000)=@req={0x0, 0x0, 0x2}, 0x10) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r1, 0x12, 0x2, &(0x7f00000000c0)=""/25, &(0x7f0000000100)=0x19) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x2, @link_local, 'team0\x00'}}, 0x1e) r2 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r2, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {0x0, 0x3}, {0xffffffff, 0x0, 0xfffffffe}, {0x1}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) accept$inet6(r1, &(0x7f0000000140)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000280)=0x1c) r3 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r3, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) ioctl$FBIOGET_VSCREENINFO(r3, 0x4600, &(0x7f00000001c0)) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f00000002c0)={0xaa, 0x55}) 00:55:54 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) pipe(0x0) wait4(0x0, 0x0, 0x40000000, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000265000)=@req={0x0, 0x400, 0x2}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000740)={{{@in=@multicast2, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@broadcast}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route(r1, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=@ipv4_getnetconf={0x4c, 0x52, 0x10, 0x70bd25, 0x25dfdbfd, {}, [@NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x9}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x5}, @NETCONFA_FORWARDING={0x8, 0x2, 0x8}, @NETCONFA_IFINDEX={0x8, 0x1, r2}, @NETCONFA_RP_FILTER={0x8, 0x3, 0x7fff}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x3}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0xe9}]}, 0x4c}, 0x1, 0x0, 0x0, 0x3400c080}, 0x40) read(0xffffffffffffffff, &(0x7f0000000280)=""/152, 0x20000318) openat$procfs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/keys\x00', 0x0, 0x0) r3 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r3, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) write$binfmt_elf64(r3, &(0x7f00000003c0)={{0x7f, 0x45, 0x4c, 0x46, 0x6, 0x81, 0x35, 0x4, 0x1, 0x59ad6aa4a884dd63, 0x3, 0x0, 0x13d, 0x40, 0x26e, 0x8000, 0x1f, 0x38, 0x1, 0x8, 0x8, 0x3}, [{0x6, 0x3, 0xefa, 0x1, 0x81, 0x80000000, 0x0, 0x9}, {0x7, 0x2, 0x7ff, 0xfff, 0x1, 0x4, 0x0, 0x800b}], "5ad165d3d87709dd80c73c9fa8b6ef39a345e1b2327e38197c13f3be9248c0f2161632606ce45b5c7d7349c883946ca190a061f77e1020dc808b86b4e3c7b2a6128e2d3b16a4ec69ad8c276d1a038ddc59bd46a7a37061ed24ba41f62de7aaf1c073c43333bee7ed0979404acecab631d46b591f921ec0a584aeb912342ff4f104ff960a3563460c943d11952c88bd0d13a69a425793b6f7d2b09cf17c87cdc331f63c983436cef6888b1a8328e953b0b3bade3aabbfc4818a05af", [[]]}, 0x26b) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_open_procfs(0x0, &(0x7f0000000000)='timers\x00') 00:55:55 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) pipe(0x0) wait4(0x0, 0x0, 0x40000000, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000265000)=@req={0x0, 0x400}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000740)={{{@in=@multicast2, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@broadcast}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route(r1, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=@ipv4_getnetconf={0x54, 0x52, 0x10, 0x70bd25, 0x25dfdbfd, {}, [@NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x1}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x9}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x5}, @NETCONFA_FORWARDING={0x8, 0x2, 0x8}, @NETCONFA_IFINDEX={0x8, 0x1, r2}, @NETCONFA_RP_FILTER={0x8, 0x3, 0x7fff}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x3}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0xe9}]}, 0x54}, 0x1, 0x0, 0x0, 0x3400c080}, 0x40) read(0xffffffffffffffff, &(0x7f0000000280)=""/152, 0x20000318) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/keys\x00', 0x0, 0x0) r4 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r4, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) write$binfmt_elf64(r4, &(0x7f00000003c0)={{0x7f, 0x45, 0x4c, 0x46, 0x6, 0x81, 0x35, 0x4, 0x1, 0x59ad6aa4a884dd63, 0x3, 0x0, 0x13d, 0x40, 0x26e, 0x8000, 0x1f, 0x38, 0x1, 0x8, 0x8, 0x3}, [{0x6, 0x3, 0xefa, 0x1, 0x81, 0x80000000}, {0x7, 0x2, 0x7ff, 0xfff, 0x1, 0x4, 0x0, 0x800b}], "5ad165d3d87709dd80c73c9fa8b6ef39a345e1b2327e38197c13f3be9248c0f2161632606ce45b5c7d7349c883946ca190a061f77e1020dc808b86b4e3c7b2a6128e2d3b16a4ec69ad8c276d1a038ddc59bd46a7a37061ed24ba41f62de7aaf1c073c43333bee7ed0979404acecab631d46b591f921ec0a584aeb912342ff4f104ff960a3563460c943d11952c88bd0d13a69a425793b6f7d2b09cf17c87cdc331f63c983436cef6888b1a8328e953b0b3bade3aabbfc4818a05af", [[]]}, 0x26b) read(r3, &(0x7f0000000280)=""/152, 0x20000318) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x280800, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$DRM_IOCTL_MODE_SETCRTC(0xffffffffffffffff, 0xc06864a2, &(0x7f0000000000)={0x0, 0x0, 0x20}) 00:55:55 executing program 3: r0 = socket$pppoe(0x18, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r1, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) fsetxattr$security_evm(r1, &(0x7f0000000280)='security.evm\x00', &(0x7f00000002c0)=@md5={0x1, "811cee943f96bce28d998bff1ab29dc1"}, 0x11, 0x1) clone(0xa0000000, &(0x7f00000000c0)="a0a7bd07674300f0293030d727a1963dedbb30b53f25801f254af601213bc21080a97894732acbcb6ba26aa455bf74a0cf3f9840c6a9c6f1abf45e2b4a2cc5cb979ebffb574c873fcf1a3c916f0d74f110ec51bab53e00ca90b2829345b014e0eb061a0c7009c438ab4696465bb3d3165e419fd997ebb0666e3af5f6e9fa5ad6d88f219de050bf808438be3804b61111528301851be3c708c6e2ecd852b8ef503d6d7b9cb7322ef78e7241e6a6b454", &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="e765475a65c871132201203b") connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x2, @link_local, 'team0\x00'}}, 0x1e) r2 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r2, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {0x0, 0x3}, {0xffffffff}, {0x1}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) 00:55:55 executing program 5: socket$pppoe(0x18, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x20000000, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {0xffffffff}, {0x1}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}) 00:55:55 executing program 0: clock_nanosleep(0x7, 0x0, &(0x7f00000004c0)={0x0, 0x1c9c380}, &(0x7f0000000500)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) pipe(0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000400)=0x14) ioctl$sock_inet6_SIOCADDRT(r1, 0x89a0, &(0x7f0000000440)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @remote, @remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x42, r2}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=@ipv4_getnetconf={0x3c, 0x52, 0x10, 0x70bd25, 0x25dfdbfd, {}, [@NETCONFA_PROXY_NEIGH={0x8}, @NETCONFA_IFINDEX={0x8, 0x1, r2}, @NETCONFA_RP_FILTER={0x8}, @NETCONFA_RP_FILTER={0x8, 0x3, 0x948}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0xe9}]}, 0x3c}, 0x1, 0x0, 0x0, 0x3400c080}, 0x40) r3 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r3, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) setxattr$trusted_overlay_nlink(&(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='trusted.overlay.nlink\x00', &(0x7f0000000280)={'U-', 0x3f}, 0x16, 0x1) write$binfmt_elf64(r3, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x26b) r4 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/capi/capi20ncci\x00', 0x10000, 0x0) ioctl$VIDIOC_QBUF(r4, 0xc058560f, &(0x7f0000000300)={0x0, 0x5, 0x4, 0x0, 0x0, {0x0, 0x7530}, {0x1, 0x1, 0x2, 0x1, 0x1f, 0xd5, "422e9bb8"}, 0x32, 0x1, @userptr, 0x62b5}) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_open_procfs(0x0, &(0x7f0000000000)='timers\x00') 00:55:55 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) stat(&(0x7f0000000240)='./file0/file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(0xffffffffffffffff, &(0x7f0000001b80)) socket(0x11, 0x2, 0x5) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r4, 0x1, 0x14, &(0x7f0000000040), 0x50) getsockopt$IP6T_SO_GET_ENTRIES(r4, 0x29, 0x41, &(0x7f0000000480)=ANY=[@ANYBLOB="6e2f740000edffffffffffffff00000000000000000000000000000000000000ad0000005086f3915e59ad8184af4045c4e742fa881d66411baabaa82dda6d71f825249ec2eb0ad398766b6b870bba11fc00df87700a78319e5f5d955a5eb0f50e2dcd95623e3eba93f21d4733f6d4834e398f5ba4540b18afc3c2a92ff6e4a89dc029fdd87fc0c2ca637f5ead98feb48d1bfe6451a583e519234bd5297e8a8bf569ff90077ba1cef2ea64c8f027947915a33e26b9d8b4fb56ba4d86df286c34e0cd9715e6b39dcccf4eb92a1706ed98b4aafd220eecfac13859aaab4dc07cd467149066f2f637c1e58f02faf49d72752753fe6beceb9d14b1ab3832cab4d59f892cb6f3689b67eaf81e929525a7fe0f2ea0892194387f7d085ea12c8842b8790911042b2a48b65c40087bd66593e0cfc29843b29738147ea75bb6c3d9664dc189fca97c43ed585ebb0c2a03782d916c709f6fdeca72784a8ac21d3ff8c9551290ea0000000000000049d4bb98580f9f7b7da060b127fd66ae6ad3c8753701b37ed619b2ed3efe862100"/405], &(0x7f0000000340)=0x1) fsetxattr$trusted_overlay_redirect(r3, 0x0, &(0x7f0000000280)='./file0/file0\x00', 0xe, 0x0) getsockname$tipc(0xffffffffffffffff, 0x0, &(0x7f0000000080)) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000001400)={{0x1, 0x0, @identifier="8e0f03f7e12b88d1af81f7c5a6bb175f"}, 0x67, [], "ed760111b8363e2de90692d0bc7e0a89824d3c77730403363ce0521cdcb1973b558cbd01ebf95bd9529fe3c5a95dcf31792e3e463d875b955a13582aeaddf6af34a98934ad6944b87292af67aec51fd37bd761db93cf6623d8683956791c956c97d76a9fd8df5d"}) lstat(&(0x7f0000000000)='./file0/file0\x00', &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000100)=0x0) r7 = getegid() r8 = socket$inet_tcp(0x2, 0x1, 0x0) r9 = fcntl$dupfd(r8, 0x0, r8) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) setresuid(r10, r10, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003ec0)={0x0, 0x0, 0x0}, 0x0) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, r11) r12 = openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$DRM_IOCTL_AGP_INFO(r12, 0x80386433, &(0x7f0000000bc0)=""/4096) getsockopt$sock_cred(r12, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0x194) setresuid(r13, r13, 0x0) r14 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r15 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r15, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) waitid(0x1, r15, &(0x7f0000000100), 0x80000004, &(0x7f0000000180)) r16 = shmget$private(0x0, 0x3000, 0x20, &(0x7f0000ffa000/0x3000)=nil) shmctl$SHM_STAT_ANY(r16, 0xf, &(0x7f0000000540)=""/221) shmctl$IPC_SET(r16, 0x1, &(0x7f0000000180)={{0x3, r10, r11, r13, r7, 0x42, 0x7}, 0x803ff, 0x2, 0xfffffffffffffffd, 0x0, r14, r15, 0x5}) shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000840)={{0x0, r2, r7, 0x0, r5, 0x50}, 0xd7, 0xfffffffffffffffe, 0x1000, 0x8000, r6}) r17 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000280)='/dev/nullb0\x00', 0x4400, 0x0) preadv(r17, &(0x7f0000000040)=[{&(0x7f0000000400)=""/4096, 0x3ffc00}], 0x1, 0x0) 00:55:56 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) pipe(0x0) wait4(0x0, 0x0, 0x40000000, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000265000)=@req={0x0, 0x400}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000740)={{{@in=@multicast2, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@broadcast}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route(r1, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=@ipv4_getnetconf={0x54, 0x52, 0x10, 0x70bd25, 0x25dfdbfd, {}, [@NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x1}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x9}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x5}, @NETCONFA_FORWARDING={0x8, 0x2, 0x8}, @NETCONFA_IFINDEX={0x8, 0x1, r2}, @NETCONFA_RP_FILTER={0x8, 0x3, 0x7fff}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x3}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0xe9}]}, 0x54}, 0x1, 0x0, 0x0, 0x3400c080}, 0x40) read(0xffffffffffffffff, &(0x7f0000000280)=""/152, 0x20000318) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/keys\x00', 0x0, 0x0) r4 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r4, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) write$binfmt_elf64(r4, &(0x7f00000003c0)={{0x7f, 0x45, 0x4c, 0x46, 0x6, 0x81, 0x35, 0x4, 0x1, 0x59ad6aa4a884dd63, 0x3, 0x0, 0x13d, 0x40, 0x26e, 0x8000, 0x1f, 0x38, 0x1, 0x8, 0x8, 0x3}, [{0x6, 0x3, 0xefa, 0x1, 0x81, 0x80000000}, {0x7, 0x2, 0x7ff, 0xfff, 0x1, 0x4, 0x0, 0x800b}], "5ad165d3d87709dd80c73c9fa8b6ef39a345e1b2327e38197c13f3be9248c0f2161632606ce45b5c7d7349c883946ca190a061f77e1020dc808b86b4e3c7b2a6128e2d3b16a4ec69ad8c276d1a038ddc59bd46a7a37061ed24ba41f62de7aaf1c073c43333bee7ed0979404acecab631d46b591f921ec0a584aeb912342ff4f104ff960a3563460c943d11952c88bd0d13a69a425793b6f7d2b09cf17c87cdc331f63c983436cef6888b1a8328e953b0b3bade3aabbfc4818a05af", [[]]}, 0x26b) read(r3, &(0x7f0000000280)=""/152, 0x20000318) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x280800, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$DRM_IOCTL_MODE_SETCRTC(0xffffffffffffffff, 0xc06864a2, &(0x7f0000000000)={0x0, 0x0, 0x20}) 00:55:56 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) pipe(0x0) wait4(0x0, 0x0, 0x40000000, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000265000)=@req={0x0, 0x400, 0x2}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000740)={{{@in=@multicast2, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@broadcast}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route(r1, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=@ipv4_getnetconf={0x54, 0x52, 0x10, 0x70bd25, 0x25dfdbfd, {}, [@NETCONFA_PROXY_NEIGH={0x8}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x9}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x5}, @NETCONFA_FORWARDING={0x8, 0x2, 0x8}, @NETCONFA_IFINDEX={0x8, 0x1, r2}, @NETCONFA_RP_FILTER={0x8, 0x3, 0x7fff}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x3}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0xe9}]}, 0x54}, 0x1, 0x0, 0x0, 0x3400c080}, 0x40) read(0xffffffffffffffff, &(0x7f0000000280)=""/152, 0x20000318) openat$procfs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/keys\x00', 0x0, 0x0) r3 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r3, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) write$binfmt_elf64(r3, &(0x7f00000003c0)={{0x7f, 0x45, 0x4c, 0x46, 0x6, 0x81, 0x35, 0x4, 0x1, 0x59ad6aa4a884dd63, 0x3, 0x0, 0x13d, 0x40, 0x26e, 0x8000, 0x1f, 0x38, 0x1, 0x8, 0x8, 0x3}, [{0x6, 0x3, 0xefa, 0x1, 0x81, 0x80000000, 0x0, 0x9}, {0x7, 0x2, 0x7ff, 0xfff, 0x1, 0x4, 0x0, 0x800b}], "5ad165d3d87709dd80c73c9fa8b6ef39a345e1b2327e38197c13f3be9248c0f2161632606ce45b5c7d7349c883946ca190a061f77e1020dc808b86b4e3c7b2a6128e2d3b16a4ec69ad8c276d1a038ddc59bd46a7a37061ed24ba41f62de7aaf1c073c43333bee7ed0979404acecab631d46b591f921ec0a584aeb912342ff4f104ff960a3563460c943d11952c88bd0d13a69a425793b6f7d2b09cf17c87cdc331f63c983436cef6888b1a8328e953b0b3bade3aabbfc4818a05af", [[]]}, 0x26b) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_open_procfs(0x0, &(0x7f0000000000)='timers\x00') 00:55:56 executing program 5: socket$pppoe(0x18, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x3f000000, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {0xffffffff}, {0x1}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}) 00:55:56 executing program 3: r0 = socket$pppoe(0x18, 0x1, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x2, @link_local, 'team0\x00'}}, 0x1e) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000100)='TIPC\x00') sendmsg$TIPC_CMD_RESET_LINK_STATS(r1, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x28, r2, 0x9e0f3802633f5a0f, 0x70bd2a, 0x25dfdbfd, {{}, {}, {0xc, 0x14, 'syz0\x00'}}, ["", "", "", "", "", "", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x40010}, 0x8000) r3 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r3, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {0x0, 0x3}, {0xffffffff}, {0x1}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) 00:55:57 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) pipe(0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=@ipv4_getnetconf={0x3c, 0x52, 0x10, 0x70bd25, 0x25dfdbfd, {}, [@NETCONFA_PROXY_NEIGH={0x8}, @NETCONFA_IFINDEX={0x8}, @NETCONFA_RP_FILTER={0x8}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x3}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0xe9}]}, 0x3c}, 0x1, 0x0, 0x0, 0x3400c080}, 0x40) r1 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r1, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) write$binfmt_elf64(r1, &(0x7f00000003c0)={{0x7f, 0x45, 0x4c, 0x46, 0x6, 0x81, 0x35, 0x4, 0x1, 0x59ad6aa4a884dd63, 0x3, 0x0, 0x13d, 0x40, 0x26e, 0x8000, 0x1f, 0x38, 0x1, 0x8, 0x8, 0x3}, [{0x6, 0x3, 0xefa, 0x1, 0x81, 0x80000000, 0x0, 0x9}, {0x7, 0x2, 0x7ff, 0xfff, 0x1, 0x4, 0x0, 0x800b}], "5ad165d3d87709dd80c73c9fa8b6ef39a345e1b2327e38197c13f3be9248c0f2161632606ce45b5c7d7349c883946ca190a061f77e1020dc808b86b4e3c7b2a6128e2d3b16a4ec69ad8c276d1a038ddc59bd46a7a37061ed24ba41f62de7aaf1c073c43333bee7ed0979404acecab631d46b591f921ec0a584aeb912342ff4f104ff960a3563460c943d11952c88bd0d13a69a425793b6f7d2b09cf17c87cdc331f63c983436cef6888b1a8328e953b0b3bade3aabbfc4818a05af", [[]]}, 0x26b) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) process_vm_readv(r2, &(0x7f0000000c40)=[{&(0x7f0000000280)=""/196, 0xc4}, {&(0x7f0000000640)=""/185, 0xb9}, {&(0x7f0000000700)=""/177, 0xb1}, {&(0x7f00000007c0)=""/198, 0xc6}, {&(0x7f00000008c0)=""/155, 0x9b}, {&(0x7f0000000100)=""/34, 0x22}, {&(0x7f0000000980)=""/159, 0x9f}, {&(0x7f0000000a40)=""/89, 0x59}, {&(0x7f0000000ac0)=""/228, 0xe4}, {&(0x7f0000000bc0)=""/127, 0x7f}], 0xa, &(0x7f0000000200)=[{&(0x7f0000000d00)=""/133, 0x85}, {&(0x7f0000000dc0)=""/83, 0x53}, {&(0x7f0000000e40)=""/67, 0x43}], 0x3, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='timers\x00') 00:55:57 executing program 5: socket$pppoe(0x18, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x40000000, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {0xffffffff}, {0x1}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}) 00:55:57 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) pipe(0x0) wait4(0x0, 0x0, 0x40000000, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000265000)=@req={0x0, 0x400}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000740)={{{@in=@multicast2, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@broadcast}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route(r1, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=@ipv4_getnetconf={0x54, 0x52, 0x10, 0x70bd25, 0x25dfdbfd, {}, [@NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x1}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x9}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x5}, @NETCONFA_FORWARDING={0x8, 0x2, 0x8}, @NETCONFA_IFINDEX={0x8, 0x1, r2}, @NETCONFA_RP_FILTER={0x8, 0x3, 0x7fff}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x3}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0xe9}]}, 0x54}, 0x1, 0x0, 0x0, 0x3400c080}, 0x40) read(0xffffffffffffffff, &(0x7f0000000280)=""/152, 0x20000318) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/keys\x00', 0x0, 0x0) r4 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r4, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) write$binfmt_elf64(r4, &(0x7f00000003c0)={{0x7f, 0x45, 0x4c, 0x46, 0x6, 0x81, 0x35, 0x4, 0x1, 0x59ad6aa4a884dd63, 0x3, 0x0, 0x13d, 0x40, 0x26e, 0x8000, 0x1f, 0x38, 0x1, 0x8, 0x8, 0x3}, [{0x6, 0x3, 0xefa, 0x1, 0x81, 0x80000000}, {0x7, 0x2, 0x7ff, 0xfff, 0x1, 0x4, 0x0, 0x800b}], "5ad165d3d87709dd80c73c9fa8b6ef39a345e1b2327e38197c13f3be9248c0f2161632606ce45b5c7d7349c883946ca190a061f77e1020dc808b86b4e3c7b2a6128e2d3b16a4ec69ad8c276d1a038ddc59bd46a7a37061ed24ba41f62de7aaf1c073c43333bee7ed0979404acecab631d46b591f921ec0a584aeb912342ff4f104ff960a3563460c943d11952c88bd0d13a69a425793b6f7d2b09cf17c87cdc331f63c983436cef6888b1a8328e953b0b3bade3aabbfc4818a05af", [[]]}, 0x26b) read(r3, &(0x7f0000000280)=""/152, 0x20000318) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x280800, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$DRM_IOCTL_MODE_SETCRTC(0xffffffffffffffff, 0xc06864a2, &(0x7f0000000000)={0x0, 0x0, 0x20}) 00:55:57 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) pipe(0x0) wait4(0x0, 0x0, 0x40000000, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000265000)=@req={0x0, 0x400, 0x2}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000740)={{{@in=@multicast2, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@broadcast}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route(r1, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=@ipv4_getnetconf={0x54, 0x52, 0x10, 0x70bd25, 0x25dfdbfd, {}, [@NETCONFA_PROXY_NEIGH={0x8}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x9}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x5}, @NETCONFA_FORWARDING={0x8, 0x2, 0x8}, @NETCONFA_IFINDEX={0x8, 0x1, r2}, @NETCONFA_RP_FILTER={0x8, 0x3, 0x7fff}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x3}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0xe9}]}, 0x54}, 0x1, 0x0, 0x0, 0x3400c080}, 0x40) read(0xffffffffffffffff, &(0x7f0000000280)=""/152, 0x20000318) openat$procfs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/keys\x00', 0x0, 0x0) r3 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r3, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) write$binfmt_elf64(r3, &(0x7f00000003c0)={{0x7f, 0x45, 0x4c, 0x46, 0x6, 0x81, 0x35, 0x4, 0x1, 0x59ad6aa4a884dd63, 0x3, 0x0, 0x13d, 0x40, 0x26e, 0x8000, 0x1f, 0x38, 0x1, 0x8, 0x8, 0x3}, [{0x6, 0x3, 0xefa, 0x1, 0x81, 0x80000000, 0x0, 0x9}, {0x7, 0x2, 0x7ff, 0xfff, 0x1, 0x4, 0x0, 0x800b}], "5ad165d3d87709dd80c73c9fa8b6ef39a345e1b2327e38197c13f3be9248c0f2161632606ce45b5c7d7349c883946ca190a061f77e1020dc808b86b4e3c7b2a6128e2d3b16a4ec69ad8c276d1a038ddc59bd46a7a37061ed24ba41f62de7aaf1c073c43333bee7ed0979404acecab631d46b591f921ec0a584aeb912342ff4f104ff960a3563460c943d11952c88bd0d13a69a425793b6f7d2b09cf17c87cdc331f63c983436cef6888b1a8328e953b0b3bade3aabbfc4818a05af", [[]]}, 0x26b) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_open_procfs(0x0, &(0x7f0000000000)='timers\x00') 00:55:57 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) stat(&(0x7f0000000240)='./file0/file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(0xffffffffffffffff, &(0x7f0000001b80)) socket(0x11, 0x2, 0x5) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r4, 0x1, 0x14, &(0x7f0000000040), 0x50) getsockopt$IP6T_SO_GET_ENTRIES(r4, 0x29, 0x41, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/405], &(0x7f0000000340)=0x1) fsetxattr$trusted_overlay_redirect(r3, 0x0, &(0x7f0000000280)='./file0/file0\x00', 0xe, 0x0) getsockname$tipc(0xffffffffffffffff, 0x0, &(0x7f0000000080)) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000001400)={{0x1, 0x0, @identifier="8e0f03f7e12b88d1af81f7c5a6bb175f"}, 0x67, [], "ed760111b8363e2de90692d0bc7e0a89824d3c77730403363ce0521cdcb1973b558cbd01ebf95bd9529fe3c5a95dcf31792e3e463d875b955a13582aeaddf6af34a98934ad6944b87292af67aec51fd37bd761db93cf6623d8683956791c956c97d76a9fd8df5d"}) lstat(&(0x7f0000000000)='./file0/file0\x00', &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000100)=0x0) r7 = getegid() r8 = socket$inet_tcp(0x2, 0x1, 0x0) r9 = fcntl$dupfd(r8, 0x0, r8) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) setresuid(r10, r10, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003ec0)={0x0, 0x0, 0x0}, 0x0) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, r11) r12 = openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$DRM_IOCTL_AGP_INFO(r12, 0x80386433, &(0x7f0000000bc0)=""/4096) getsockopt$sock_cred(r12, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0x194) setresuid(r13, r13, 0x0) r14 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r15 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r15, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) waitid(0x1, r15, &(0x7f0000000100), 0x80000004, &(0x7f0000000180)) r16 = shmget$private(0x0, 0x3000, 0x20, &(0x7f0000ffa000/0x3000)=nil) shmctl$SHM_STAT_ANY(r16, 0xf, &(0x7f0000000540)=""/221) shmctl$IPC_SET(r16, 0x1, &(0x7f0000000180)={{0x3, r10, r11, r13, r7, 0x42, 0x7}, 0x803ff, 0x2, 0xfffffffffffffffd, 0x0, r14, r15, 0x5}) shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000840)={{0x0, r2, r7, 0x0, r5, 0x50}, 0xd7, 0xfffffffffffffffe, 0x1000, 0x8000, r6}) r17 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000280)='/dev/nullb0\x00', 0x4400, 0x0) preadv(r17, &(0x7f0000000040)=[{&(0x7f0000000400)=""/4096, 0x3ffc00}], 0x1, 0x0) 00:55:57 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) pipe(0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=@ipv4_getnetconf={0x3c, 0x52, 0x10, 0x70bd25, 0x25dfdbfd, {}, [@NETCONFA_PROXY_NEIGH={0x8}, @NETCONFA_IFINDEX={0x8}, @NETCONFA_RP_FILTER={0x8}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x3}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0xe9}]}, 0x3c}, 0x1, 0x0, 0x0, 0x3400c080}, 0x40) r1 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r1, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {0x0, 0x7ff}, {}, {0x0, 0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x185}) write$binfmt_elf64(r1, &(0x7f00000003c0)={{0x7f, 0x45, 0x4c, 0x46, 0x6, 0x81, 0x35, 0x4, 0x1, 0x59ad6aa4a884dd63, 0x3, 0x0, 0x13d, 0x40, 0x26e, 0x8000, 0x1f, 0x38, 0x1, 0x8, 0x8, 0x3}, [{0x6, 0x3, 0xefa, 0x1, 0x81, 0x80000000, 0x0, 0x9}, {0x7, 0x2, 0x7ff, 0xfff, 0x1, 0x4, 0x0, 0x800b}], "5ad165d3d87709dd80c73c9fa8b6ef39a345e1b2327e38197c13f3be9248c0f2161632606ce45b5c7d7349c883946ca190a061f77e1020dc808b86b4e3c7b2a6128e2d3b16a4ec69ad8c276d1a038ddc59bd46a7a37061ed24ba41f62de7aaf1c073c43333bee7ed0979404acecab631d46b591f921ec0a584aeb912342ff4f104ff960a3563460c943d11952c88bd0d13a69a425793b6f7d2b09cf17c87cdc331f63c983436cef6888b1a8328e953b0b3bade3aabbfc4818a05af", [[]]}, 0x26b) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r2, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) r3 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r3, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) ioctl$VIDIOC_S_EXT_CTRLS(r2, 0xc0205648, &(0x7f0000000280)={0xa30000, 0x4426, 0x67beb45, r3, 0x0, &(0x7f0000000200)={0x990af7, 0x2f5, [], @p_u32=&(0x7f0000000100)=0xc9}}) ioctl$DRM_IOCTL_SET_VERSION(r4, 0xc0106407, &(0x7f00000002c0)={0x1d, 0xcef7, 0x101, 0x1}) syz_open_procfs(0x0, &(0x7f0000000000)='timers\x00') 00:55:57 executing program 5: socket$pppoe(0x18, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0xff010000, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {0xffffffff}, {0x1}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}) 00:55:58 executing program 3: r0 = socket$pppoe(0x18, 0x1, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r1, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r2, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) ioctl$VIDIOC_EXPBUF(r1, 0xc0405610, &(0x7f00000000c0)={0x5, 0x9, 0x4, 0x80000, r2}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x2, @link_local, 'team0\x00'}}, 0x1e) r3 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) r4 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x276f00, 0x0) openat$cgroup_procs(r4, &(0x7f0000000140)='tasks\x00', 0x2, 0x0) ioctl$FBIOPUT_VSCREENINFO(r3, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {0x0, 0x3}, {0xffffffff}, {0x1}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) 00:55:58 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) pipe(0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=@ipv4_getnetconf={0x3c, 0x52, 0x10, 0x70bd25, 0x25dfdbfd, {}, [@NETCONFA_PROXY_NEIGH={0x8}, @NETCONFA_IFINDEX={0x8}, @NETCONFA_RP_FILTER={0x8}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x3}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0xe9}]}, 0x3c}, 0x1, 0x0, 0x0, 0x3400c080}, 0x40) r1 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r1, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) write$binfmt_elf64(r1, &(0x7f00000003c0)={{0x7f, 0x45, 0x4c, 0x46, 0x6, 0x81, 0x35, 0x4, 0x1, 0x59ad6aa4a884dd63, 0x3, 0x0, 0x13d, 0x40, 0x26e, 0x8000, 0x1f, 0x38, 0x1, 0x8, 0x8, 0x3}, [{0x6, 0x3, 0xefa, 0x1, 0x81, 0x80000000, 0x0, 0x9}, {0x7, 0x2, 0x7ff, 0xfff, 0x1, 0x4, 0x0, 0x800b}], "5ad165d3d87709dd80c73c9fa8b6ef39a345e1b2327e38197c13f3be9248c0f2161632606ce45b5c7d7349c883946ca190a061f77e1020dc808b86b4e3c7b2a6128e2d3b16a4ec69ad8c276d1a038ddc59bd46a7a37061ed24ba41f62de7aaf1c073c43333bee7ed0979404acecab631d46b591f921ec0a584aeb912342ff4f104ff960a3563460c943d11952c88bd0d13a69a425793b6f7d2b09cf17c87cdc331f63c983436cef6888b1a8328e953b0b3bade3aabbfc4818a05af", [[]]}, 0x26b) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r2, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) r3 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r3, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) ftruncate(r3, 0x71) ioctl$KVM_GET_XCRS(r2, 0x8188aea6, &(0x7f0000000280)={0x7, 0x8, [{0x3, 0x0, 0xb37}, {0x5, 0x0, 0x81}, {0x7, 0x0, 0x9}, {0x20004000, 0x0, 0x40}, {0x1f, 0x0, 0x7}, {0x800, 0x0, 0x9a69}, {0x0, 0x0, 0x400}]}) syz_open_procfs(0x0, &(0x7f0000000000)='timers\x00') 00:55:58 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) pipe(0x0) wait4(0x0, 0x0, 0x40000000, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000265000)=@req={0x0, 0x400}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000740)={{{@in=@multicast2, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@broadcast}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route(r1, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=@ipv4_getnetconf={0x54, 0x52, 0x10, 0x70bd25, 0x25dfdbfd, {}, [@NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x1}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x9}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x5}, @NETCONFA_FORWARDING={0x8, 0x2, 0x8}, @NETCONFA_IFINDEX={0x8, 0x1, r2}, @NETCONFA_RP_FILTER={0x8, 0x3, 0x7fff}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x3}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0xe9}]}, 0x54}, 0x1, 0x0, 0x0, 0x3400c080}, 0x40) read(0xffffffffffffffff, &(0x7f0000000280)=""/152, 0x20000318) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/keys\x00', 0x0, 0x0) r4 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r4, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) write$binfmt_elf64(r4, &(0x7f00000003c0)={{0x7f, 0x45, 0x4c, 0x46, 0x6, 0x81, 0x35, 0x4, 0x1, 0x59ad6aa4a884dd63, 0x3, 0x0, 0x13d, 0x40, 0x26e, 0x8000, 0x1f, 0x38, 0x1, 0x8, 0x8, 0x3}, [{0x6, 0x3, 0xefa, 0x1, 0x81, 0x80000000, 0x0, 0x9}, {0x7, 0x2, 0x7ff, 0xfff, 0x1, 0x4, 0x0, 0x800b}], "", [[]]}, 0x1b0) read(r3, &(0x7f0000000280)=""/152, 0x20000318) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x280800, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$DRM_IOCTL_MODE_SETCRTC(0xffffffffffffffff, 0xc06864a2, &(0x7f0000000000)={0x0, 0x0, 0x20}) 00:55:58 executing program 5: socket$pppoe(0x18, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {0xffffffff}, {0x1}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}) 00:55:58 executing program 3: r0 = socket$pppoe(0x18, 0x1, 0x0) getsockopt$SO_TIMESTAMPING(r0, 0x1, 0x41, &(0x7f00000000c0), &(0x7f0000000100)=0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000265000)=@req={0x0, 0x0, 0x2}, 0x10) getsockopt$TIPC_CONN_TIMEOUT(r1, 0x10f, 0x82, &(0x7f0000000140), &(0x7f00000001c0)=0x4) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x2, @link_local, 'team0\x00'}}, 0x1e) r2 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r2, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {0x0, 0x3}, {0xffffffff}, {0x1}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) 00:55:58 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) pipe(0x0) wait4(0x0, 0x0, 0x40000000, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000265000)=@req={0x0, 0x400, 0x2}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000740)={{{@in=@multicast2, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@broadcast}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route(r1, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=@ipv4_getnetconf={0x54, 0x52, 0x10, 0x70bd25, 0x25dfdbfd, {}, [@NETCONFA_PROXY_NEIGH={0x8}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x9}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x5}, @NETCONFA_FORWARDING={0x8, 0x2, 0x8}, @NETCONFA_IFINDEX={0x8, 0x1, r2}, @NETCONFA_RP_FILTER={0x8, 0x3, 0x7fff}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x3}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0xe9}]}, 0x54}, 0x1, 0x0, 0x0, 0x3400c080}, 0x40) read(0xffffffffffffffff, &(0x7f0000000280)=""/152, 0x20000318) openat$procfs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/keys\x00', 0x0, 0x0) r3 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r3, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) write$binfmt_elf64(r3, &(0x7f00000003c0)={{0x7f, 0x45, 0x4c, 0x46, 0x6, 0x81, 0x35, 0x4, 0x1, 0x59ad6aa4a884dd63, 0x3, 0x0, 0x13d, 0x40, 0x26e, 0x8000, 0x1f, 0x38, 0x1, 0x8, 0x8, 0x3}, [{0x6, 0x3, 0xefa, 0x1, 0x81, 0x80000000, 0x0, 0x9}, {0x7, 0x2, 0x7ff, 0xfff, 0x1, 0x4, 0x0, 0x800b}], "5ad165d3d87709dd80c73c9fa8b6ef39a345e1b2327e38197c13f3be9248c0f2161632606ce45b5c7d7349c883946ca190a061f77e1020dc808b86b4e3c7b2a6128e2d3b16a4ec69ad8c276d1a038ddc59bd46a7a37061ed24ba41f62de7aaf1c073c43333bee7ed0979404acecab631d46b591f921ec0a584aeb912342ff4f104ff960a3563460c943d11952c88bd0d13a69a425793b6f7d2b09cf17c87cdc331f63c983436cef6888b1a8328e953b0b3bade3aabbfc4818a05af", [[]]}, 0x26b) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_open_procfs(0x0, &(0x7f0000000000)='timers\x00') 00:55:59 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) stat(&(0x7f0000000240)='./file0/file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(0xffffffffffffffff, &(0x7f0000001b80)) socket(0x11, 0x2, 0x5) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r4, 0x1, 0x14, &(0x7f0000000040), 0x50) getsockopt$IP6T_SO_GET_ENTRIES(r4, 0x29, 0x41, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/405], &(0x7f0000000340)=0x1) fsetxattr$trusted_overlay_redirect(r3, 0x0, &(0x7f0000000280)='./file0/file0\x00', 0xe, 0x0) getsockname$tipc(0xffffffffffffffff, 0x0, &(0x7f0000000080)) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000001400)={{0x1, 0x0, @identifier="8e0f03f7e12b88d1af81f7c5a6bb175f"}, 0x67, [], "ed760111b8363e2de90692d0bc7e0a89824d3c77730403363ce0521cdcb1973b558cbd01ebf95bd9529fe3c5a95dcf31792e3e463d875b955a13582aeaddf6af34a98934ad6944b87292af67aec51fd37bd761db93cf6623d8683956791c956c97d76a9fd8df5d"}) lstat(&(0x7f0000000000)='./file0/file0\x00', &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000100)=0x0) r7 = getegid() r8 = socket$inet_tcp(0x2, 0x1, 0x0) r9 = fcntl$dupfd(r8, 0x0, r8) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) setresuid(r10, r10, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003ec0)={0x0, 0x0, 0x0}, 0x0) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, r11) r12 = openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$DRM_IOCTL_AGP_INFO(r12, 0x80386433, &(0x7f0000000bc0)=""/4096) getsockopt$sock_cred(r12, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0x194) setresuid(r13, r13, 0x0) r14 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r15 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r15, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) waitid(0x1, r15, &(0x7f0000000100), 0x80000004, &(0x7f0000000180)) r16 = shmget$private(0x0, 0x3000, 0x20, &(0x7f0000ffa000/0x3000)=nil) shmctl$SHM_STAT_ANY(r16, 0xf, &(0x7f0000000540)=""/221) shmctl$IPC_SET(r16, 0x1, &(0x7f0000000180)={{0x3, r10, r11, r13, r7, 0x42, 0x7}, 0x803ff, 0x2, 0xfffffffffffffffd, 0x0, r14, r15, 0x5}) shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000840)={{0x0, r2, r7, 0x0, r5, 0x50}, 0xd7, 0xfffffffffffffffe, 0x1000, 0x8000, r6}) r17 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000280)='/dev/nullb0\x00', 0x4400, 0x0) preadv(r17, &(0x7f0000000040)=[{&(0x7f0000000400)=""/4096, 0x3ffc00}], 0x1, 0x0) 00:55:59 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) pipe(0x0) wait4(0x0, 0x0, 0x40000000, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000265000)=@req={0x0, 0x400, 0x2}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000740)={{{@in=@multicast2, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@broadcast}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route(r1, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=@ipv4_getnetconf={0x54, 0x52, 0x10, 0x70bd25, 0x25dfdbfd, {}, [@NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x1}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x9}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x5}, @NETCONFA_FORWARDING={0x8, 0x2, 0x8}, @NETCONFA_IFINDEX={0x8, 0x1, r2}, @NETCONFA_RP_FILTER={0x8, 0x3, 0x7fff}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x3}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0xe9}]}, 0x54}}, 0x40) read(0xffffffffffffffff, &(0x7f0000000280)=""/152, 0x20000318) openat$procfs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/keys\x00', 0x0, 0x0) r3 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r3, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) write$binfmt_elf64(r3, &(0x7f00000003c0)={{0x7f, 0x45, 0x4c, 0x46, 0x6, 0x81, 0x35, 0x4, 0x1, 0x59ad6aa4a884dd63, 0x3, 0x0, 0x13d, 0x40, 0x26e, 0x8000, 0x1f, 0x38, 0x1, 0x8, 0x8, 0x3}, [{0x6, 0x3, 0xefa, 0x1, 0x81, 0x80000000, 0x0, 0x9}, {0x7, 0x2, 0x7ff, 0xfff, 0x1, 0x4, 0x0, 0x800b}], "5ad165d3d87709dd80c73c9fa8b6ef39a345e1b2327e38197c13f3be9248c0f2161632606ce45b5c7d7349c883946ca190a061f77e1020dc808b86b4e3c7b2a6128e2d3b16a4ec69ad8c276d1a038ddc59bd46a7a37061ed24ba41f62de7aaf1c073c43333bee7ed0979404acecab631d46b591f921ec0a584aeb912342ff4f104ff960a3563460c943d11952c88bd0d13a69a425793b6f7d2b09cf17c87cdc331f63c983436cef6888b1a8328e953b0b3bade3aabbfc4818a05af", [[]]}, 0x26b) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_open_procfs(0x0, &(0x7f0000000000)='timers\x00') 00:55:59 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) pipe(0x0) wait4(0x0, 0x0, 0x40000000, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000265000)=@req={0x0, 0x400}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000740)={{{@in=@multicast2, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@broadcast}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route(r1, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=@ipv4_getnetconf={0x54, 0x52, 0x10, 0x70bd25, 0x25dfdbfd, {}, [@NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x1}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x9}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x5}, @NETCONFA_FORWARDING={0x8, 0x2, 0x8}, @NETCONFA_IFINDEX={0x8, 0x1, r2}, @NETCONFA_RP_FILTER={0x8, 0x3, 0x7fff}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x3}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0xe9}]}, 0x54}, 0x1, 0x0, 0x0, 0x3400c080}, 0x40) read(0xffffffffffffffff, &(0x7f0000000280)=""/152, 0x20000318) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/keys\x00', 0x0, 0x0) r4 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r4, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) write$binfmt_elf64(r4, &(0x7f00000003c0)={{0x7f, 0x45, 0x4c, 0x46, 0x6, 0x81, 0x35, 0x4, 0x1, 0x59ad6aa4a884dd63, 0x3, 0x0, 0x13d, 0x40, 0x26e, 0x8000, 0x1f, 0x38, 0x1, 0x8, 0x8, 0x3}, [{0x6, 0x3, 0xefa, 0x1, 0x81, 0x80000000, 0x0, 0x9}, {0x7, 0x2, 0x7ff, 0xfff, 0x1, 0x4, 0x0, 0x800b}], "", [[]]}, 0x1b0) read(r3, &(0x7f0000000280)=""/152, 0x20000318) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x280800, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$DRM_IOCTL_MODE_SETCRTC(0xffffffffffffffff, 0xc06864a2, &(0x7f0000000000)={0x0, 0x0, 0x20}) 00:55:59 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) r0 = getpid() socketpair(0x18, 0x80000, 0x5, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r1, 0x29, 0x41, &(0x7f0000000280)={'security\x00', 0x2, [{}, {}]}, 0x48) sched_setscheduler(r0, 0x5, &(0x7f0000000380)) pipe(0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=@ipv4_getnetconf={0x3c, 0x52, 0x10, 0x70bd25, 0x25dfdbfd, {}, [@NETCONFA_PROXY_NEIGH={0x8}, @NETCONFA_IFINDEX={0x8}, @NETCONFA_RP_FILTER={0x8}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x3}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0xe9}]}, 0x3c}, 0x1, 0x0, 0x0, 0x3400c080}, 0x40) r2 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r2, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) write$binfmt_elf64(r2, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x26b) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_open_procfs(0x0, &(0x7f0000000000)='timers\x00') 00:55:59 executing program 3: bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000000380)={&(0x7f00000000c0)="806f41eef66bbed1e7283ddf6ad5afb38a3a7cedb1f1d80463c461f25ac2ef5a69aacde4a46cb2cdceb8ada983732bb8ce05c0", &(0x7f00000001c0)=""/237, &(0x7f00000002c0)="4b0be5c18a0c6da8c96807e9c02c6f56613f64cd02610ff9155989544faeb1164c87934b83cd56b0abd5d0258fd681aaa1a4dc822da784c1b309cebae0a87d25c3dd268d0064f398f30ae92abf9e22fc5471f8049a42260a0f6063c270645908cc842346d54b99112d97e8bd67067d0eb07a148acbf095cc37432ccacc176f135cc1f6c1e4c6ac23b63b3474677feff365f060856f491b5014d2940b6a6b35887743c57c5303d581e4d23565", &(0x7f0000000100)="01136d2e358529b6d17b1231846869ce10f707dd1d95c283541a8d71c0733a926973530ca17f66a2eb0e39e878702e54e933dfe485e4bd986d090c23eaecf7bae2558ff8a73d7c0fe78091df821ddfadb8833d5f013ff572937305660f4a48cb21ab84837a9f189d49d9b2135a056d1a82246410664c", 0x9, 0x1}, 0x38) r0 = socket$pppoe(0x18, 0x1, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x694f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x2, @link_local, 'team0\x00'}}, 0x1e) r1 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r1, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {0x0, 0x3}, {0xffffffff}, {0x1}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) 00:55:59 executing program 5: socket$pppoe(0x18, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x2, 0x0, 0x0, 0x4, 0x0, {}, {0xffffffff}, {0x1}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}) 00:56:00 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) pipe(0x0) wait4(0x0, 0x0, 0x40000000, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000265000)=@req={0x0, 0x400, 0x2}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000740)={{{@in=@multicast2, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@broadcast}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route(r1, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=@ipv4_getnetconf={0x54, 0x52, 0x10, 0x70bd25, 0x25dfdbfd, {}, [@NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x1}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x9}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x5}, @NETCONFA_FORWARDING={0x8, 0x2, 0x8}, @NETCONFA_IFINDEX={0x8, 0x1, r2}, @NETCONFA_RP_FILTER={0x8, 0x3, 0x7fff}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x3}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0xe9}]}, 0x54}}, 0x40) read(0xffffffffffffffff, &(0x7f0000000280)=""/152, 0x20000318) openat$procfs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/keys\x00', 0x0, 0x0) r3 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r3, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) write$binfmt_elf64(r3, &(0x7f00000003c0)={{0x7f, 0x45, 0x4c, 0x46, 0x6, 0x81, 0x35, 0x4, 0x1, 0x59ad6aa4a884dd63, 0x3, 0x0, 0x13d, 0x40, 0x26e, 0x8000, 0x1f, 0x38, 0x1, 0x8, 0x8, 0x3}, [{0x6, 0x3, 0xefa, 0x1, 0x81, 0x80000000, 0x0, 0x9}, {0x7, 0x2, 0x7ff, 0xfff, 0x1, 0x4, 0x0, 0x800b}], "5ad165d3d87709dd80c73c9fa8b6ef39a345e1b2327e38197c13f3be9248c0f2161632606ce45b5c7d7349c883946ca190a061f77e1020dc808b86b4e3c7b2a6128e2d3b16a4ec69ad8c276d1a038ddc59bd46a7a37061ed24ba41f62de7aaf1c073c43333bee7ed0979404acecab631d46b591f921ec0a584aeb912342ff4f104ff960a3563460c943d11952c88bd0d13a69a425793b6f7d2b09cf17c87cdc331f63c983436cef6888b1a8328e953b0b3bade3aabbfc4818a05af", [[]]}, 0x26b) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_open_procfs(0x0, &(0x7f0000000000)='timers\x00') 00:56:00 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) pipe(0x0) wait4(0x0, 0x0, 0x40000000, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000265000)=@req={0x0, 0x400}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000740)={{{@in=@multicast2, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@broadcast}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route(r1, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=@ipv4_getnetconf={0x54, 0x52, 0x10, 0x70bd25, 0x25dfdbfd, {}, [@NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x1}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x9}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x5}, @NETCONFA_FORWARDING={0x8, 0x2, 0x8}, @NETCONFA_IFINDEX={0x8, 0x1, r2}, @NETCONFA_RP_FILTER={0x8, 0x3, 0x7fff}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x3}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0xe9}]}, 0x54}, 0x1, 0x0, 0x0, 0x3400c080}, 0x40) read(0xffffffffffffffff, &(0x7f0000000280)=""/152, 0x20000318) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/keys\x00', 0x0, 0x0) r4 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r4, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) write$binfmt_elf64(r4, &(0x7f00000003c0)={{0x7f, 0x45, 0x4c, 0x46, 0x6, 0x81, 0x35, 0x4, 0x1, 0x59ad6aa4a884dd63, 0x3, 0x0, 0x13d, 0x40, 0x26e, 0x8000, 0x1f, 0x38, 0x1, 0x8, 0x8, 0x3}, [{0x6, 0x3, 0xefa, 0x1, 0x81, 0x80000000, 0x0, 0x9}, {0x7, 0x2, 0x7ff, 0xfff, 0x1, 0x4, 0x0, 0x800b}], "", [[]]}, 0x1b0) read(r3, &(0x7f0000000280)=""/152, 0x20000318) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x280800, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$DRM_IOCTL_MODE_SETCRTC(0xffffffffffffffff, 0xc06864a2, &(0x7f0000000000)={0x0, 0x0, 0x20}) 00:56:00 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) pipe(0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=@ipv4_getnetconf={0x3c, 0x52, 0x10, 0x70bd25, 0x25dfdbfd, {}, [@NETCONFA_PROXY_NEIGH={0x8}, @NETCONFA_IFINDEX={0x8}, @NETCONFA_RP_FILTER={0x8}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x3}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0xe9}]}, 0x3c}, 0x1, 0x0, 0x0, 0x3400c080}, 0x40) r1 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r1, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) write$binfmt_elf64(r1, &(0x7f00000003c0)={{0x7f, 0x45, 0x4c, 0x46, 0x6, 0x81, 0x35, 0x4, 0x1, 0x59ad6aa4a884dd63, 0x3, 0x0, 0x13d, 0x40, 0x26e, 0x8000, 0x1f, 0x38, 0x1, 0x8, 0x8, 0x3}, [{0x6, 0x3, 0xefa, 0x1, 0x81, 0x80000000, 0x0, 0x9}, {0x7, 0x2, 0x7ff, 0xfff, 0x1, 0x4, 0x0, 0x800b}], "5ad165d3d87709dd80c73c9fa8b6ef39a345e1b2327e38197c13f3be9248c0f2161632606ce45b5c7d7349c883946ca190a061f77e1020dc808b86b4e3c7b2a6128e2d3b16a4ec69ad8c276d1a038ddc59bd46a7a37061ed24ba41f62de7aaf1c073c43333bee7ed0979404acecab631d46b591f921ec0a584aeb912342ff4f104ff960a3563460c943d11952c88bd0d13a69a425793b6f7d2b09cf17c87cdc331f63c983436cef6888b1a8328e953b0b3bade3aabbfc4818a05af", [[]]}, 0x26b) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_open_procfs(0x0, &(0x7f0000000000)='timers\x00') recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000bc0)={&(0x7f0000000300)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, 0x80, &(0x7f0000000b00)=[{&(0x7f00000007c0)=""/155, 0x9b}, {&(0x7f0000000880)=""/121, 0x79}, {&(0x7f0000000900)=""/249, 0xf9}, {&(0x7f0000000a00)=""/11, 0xb}, {&(0x7f0000000a40)=""/191, 0xbf}], 0x5, &(0x7f0000000b80)=""/12, 0xc}, 0x40002000) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00') sendmsg$NL80211_CMD_GET_MPATH(r3, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000000140)={0x58, r4, 0x2468825185d9173d, 0x0, 0x0, {}, [@NL80211_ATTR_MPATH_NEXT_HOP={0xa, 0x1a, @random="dd6071e90625"}, @NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MPATH_NEXT_HOP={0xa, 0x1a, @random="45763816233e"}, @NL80211_ATTR_MAC={0x4, 0x6, @link_local}, @NL80211_ATTR_WDEV={0xc}]}, 0x58}}, 0x0) seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000200)={0x7, &(0x7f0000000100)=[{0x0, 0x6, 0x81, 0x401}, {0x4, 0x3e, 0x7c, 0x7}, {0x2, 0x9, 0x0, 0x5}, {0x9, 0xc0, 0xec, 0xfffffffb}, {0x0, 0x9, 0x7f, 0x8e9}, {0xf5, 0x7d, 0x0, 0x51}, {0x2, 0x1, 0xfc, 0x8}]}) r5 = socket$inet6_udp(0xa, 0x2, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000400)=0x14) ioctl$sock_inet6_SIOCADDRT(r5, 0x89a0, &(0x7f0000000440)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @remote, @remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x42, r6}) sendmsg$NL80211_CMD_GET_WIPHY(r2, &(0x7f0000000cc0)={&(0x7f0000000c00)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000c80)={&(0x7f0000000c40)={0x2c, r4, 0x100, 0x70bd2d, 0x25dfdbfd, {}, [@NL80211_ATTR_WIPHY={0x8, 0x1, 0x4}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x1}, @NL80211_ATTR_IFINDEX={0x8, 0x3, r6}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4008001}, 0x80) 00:56:00 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) stat(&(0x7f0000000240)='./file0/file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(0xffffffffffffffff, &(0x7f0000001b80)) socket(0x11, 0x2, 0x5) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r4, 0x1, 0x14, &(0x7f0000000040), 0x50) getsockopt$IP6T_SO_GET_ENTRIES(r4, 0x29, 0x41, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/405], &(0x7f0000000340)=0x1) fsetxattr$trusted_overlay_redirect(r3, &(0x7f0000000200)='trusted.overlay.redirect\x00', 0x0, 0x0, 0x0) getsockname$tipc(0xffffffffffffffff, 0x0, &(0x7f0000000080)) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000001400)={{0x1, 0x0, @identifier="8e0f03f7e12b88d1af81f7c5a6bb175f"}, 0x67, [], "ed760111b8363e2de90692d0bc7e0a89824d3c77730403363ce0521cdcb1973b558cbd01ebf95bd9529fe3c5a95dcf31792e3e463d875b955a13582aeaddf6af34a98934ad6944b87292af67aec51fd37bd761db93cf6623d8683956791c956c97d76a9fd8df5d"}) lstat(&(0x7f0000000000)='./file0/file0\x00', &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000100)=0x0) r7 = getegid() r8 = socket$inet_tcp(0x2, 0x1, 0x0) r9 = fcntl$dupfd(r8, 0x0, r8) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) setresuid(r10, r10, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003ec0)={0x0, 0x0, 0x0}, 0x0) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, r11) r12 = openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$DRM_IOCTL_AGP_INFO(r12, 0x80386433, &(0x7f0000000bc0)=""/4096) getsockopt$sock_cred(r12, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0x194) setresuid(r13, r13, 0x0) r14 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r15 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r15, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) waitid(0x1, r15, &(0x7f0000000100), 0x80000004, &(0x7f0000000180)) r16 = shmget$private(0x0, 0x3000, 0x20, &(0x7f0000ffa000/0x3000)=nil) shmctl$SHM_STAT_ANY(r16, 0xf, &(0x7f0000000540)=""/221) shmctl$IPC_SET(r16, 0x1, &(0x7f0000000180)={{0x3, r10, r11, r13, r7, 0x42, 0x7}, 0x803ff, 0x2, 0xfffffffffffffffd, 0x0, r14, r15, 0x5}) shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000840)={{0x0, r2, r7, 0x0, r5, 0x50}, 0xd7, 0xfffffffffffffffe, 0x1000, 0x8000, r6}) r17 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000280)='/dev/nullb0\x00', 0x4400, 0x0) preadv(r17, &(0x7f0000000040)=[{&(0x7f0000000400)=""/4096, 0x3ffc00}], 0x1, 0x0) 00:56:00 executing program 3: r0 = socket$pppoe(0x18, 0x1, 0x0) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, 0x0, 0x0) getsockopt$inet6_mtu(r1, 0x29, 0x17, &(0x7f0000000100), &(0x7f0000000140)=0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x2, @link_local, 'team0\x00'}}, 0x1e) r2 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r2, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0xc80, 0x0, 0x0, 0x0, 0x8, 0x0, {0x0, 0x3}, {0xffffffff, 0x80000000}, {0x1}, {}, 0x1, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) r3 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r4 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r4, 0x0, 0x0) r5 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r5, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp_SCTP_CONTEXT(r5, 0x84, 0x11, &(0x7f0000000100)={r6}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, &(0x7f0000000280)={r6, @in={{0x2, 0x4e24, @multicast1}}, 0xdbdf, 0x1f, 0x5, 0x9, 0x4, 0x1ff, 0x4}, &(0x7f00000001c0)=0x9c) openat$cgroup_procs(r3, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) mmap$usbfs(&(0x7f0000ffa000/0x5000)=nil, 0x5000, 0x2000005, 0x10, r3, 0x9) 00:56:00 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) pipe(0x0) wait4(0x0, 0x0, 0x40000000, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000265000)=@req={0x0, 0x400, 0x2}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000740)={{{@in=@multicast2, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@broadcast}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route(r1, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=@ipv4_getnetconf={0x54, 0x52, 0x10, 0x70bd25, 0x25dfdbfd, {}, [@NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x1}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x9}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x5}, @NETCONFA_FORWARDING={0x8, 0x2, 0x8}, @NETCONFA_IFINDEX={0x8, 0x1, r2}, @NETCONFA_RP_FILTER={0x8, 0x3, 0x7fff}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x3}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0xe9}]}, 0x54}}, 0x40) read(0xffffffffffffffff, &(0x7f0000000280)=""/152, 0x20000318) openat$procfs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/keys\x00', 0x0, 0x0) r3 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r3, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) write$binfmt_elf64(r3, &(0x7f00000003c0)={{0x7f, 0x45, 0x4c, 0x46, 0x6, 0x81, 0x35, 0x4, 0x1, 0x59ad6aa4a884dd63, 0x3, 0x0, 0x13d, 0x40, 0x26e, 0x8000, 0x1f, 0x38, 0x1, 0x8, 0x8, 0x3}, [{0x6, 0x3, 0xefa, 0x1, 0x81, 0x80000000, 0x0, 0x9}, {0x7, 0x2, 0x7ff, 0xfff, 0x1, 0x4, 0x0, 0x800b}], "5ad165d3d87709dd80c73c9fa8b6ef39a345e1b2327e38197c13f3be9248c0f2161632606ce45b5c7d7349c883946ca190a061f77e1020dc808b86b4e3c7b2a6128e2d3b16a4ec69ad8c276d1a038ddc59bd46a7a37061ed24ba41f62de7aaf1c073c43333bee7ed0979404acecab631d46b591f921ec0a584aeb912342ff4f104ff960a3563460c943d11952c88bd0d13a69a425793b6f7d2b09cf17c87cdc331f63c983436cef6888b1a8328e953b0b3bade3aabbfc4818a05af", [[]]}, 0x26b) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_open_procfs(0x0, &(0x7f0000000000)='timers\x00') 00:56:00 executing program 5: socket$pppoe(0x18, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x3, 0x0, 0x0, 0x4, 0x0, {}, {0xffffffff}, {0x1}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}) 00:56:01 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) stat(&(0x7f0000000240)='./file0/file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(0xffffffffffffffff, &(0x7f0000001b80)) socket(0x11, 0x2, 0x5) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r4, 0x1, 0x14, &(0x7f0000000040), 0x50) getsockopt$IP6T_SO_GET_ENTRIES(r4, 0x29, 0x41, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/405], &(0x7f0000000340)=0x1) fsetxattr$trusted_overlay_redirect(r3, &(0x7f0000000200)='trusted.overlay.redirect\x00', 0x0, 0x0, 0x0) getsockname$tipc(0xffffffffffffffff, 0x0, &(0x7f0000000080)) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000001400)={{0x1, 0x0, @identifier="8e0f03f7e12b88d1af81f7c5a6bb175f"}, 0x67, [], "ed760111b8363e2de90692d0bc7e0a89824d3c77730403363ce0521cdcb1973b558cbd01ebf95bd9529fe3c5a95dcf31792e3e463d875b955a13582aeaddf6af34a98934ad6944b87292af67aec51fd37bd761db93cf6623d8683956791c956c97d76a9fd8df5d"}) lstat(&(0x7f0000000000)='./file0/file0\x00', &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000100)=0x0) r7 = getegid() r8 = socket$inet_tcp(0x2, 0x1, 0x0) r9 = fcntl$dupfd(r8, 0x0, r8) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) setresuid(r10, r10, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003ec0)={0x0, 0x0, 0x0}, 0x0) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, r11) r12 = openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$DRM_IOCTL_AGP_INFO(r12, 0x80386433, &(0x7f0000000bc0)=""/4096) getsockopt$sock_cred(r12, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0x194) setresuid(r13, r13, 0x0) r14 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r15 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r15, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) waitid(0x1, r15, &(0x7f0000000100), 0x80000004, &(0x7f0000000180)) r16 = shmget$private(0x0, 0x3000, 0x20, &(0x7f0000ffa000/0x3000)=nil) shmctl$SHM_STAT_ANY(r16, 0xf, &(0x7f0000000540)=""/221) shmctl$IPC_SET(r16, 0x1, &(0x7f0000000180)={{0x3, r10, r11, r13, r7, 0x42, 0x7}, 0x803ff, 0x2, 0xfffffffffffffffd, 0x0, r14, r15, 0x5}) shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000840)={{0x0, r2, r7, 0x0, r5, 0x50}, 0xd7, 0xfffffffffffffffe, 0x1000, 0x8000, r6}) r17 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000280)='/dev/nullb0\x00', 0x4400, 0x0) preadv(r17, &(0x7f0000000040)=[{&(0x7f0000000400)=""/4096, 0x3ffc00}], 0x1, 0x0) 00:56:01 executing program 3: r0 = socket$pppoe(0x18, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_config_ext}, 0x0, 0x3, 0xffffffffffffffff, 0x3) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x2, @link_local, 'team0\x00'}}, 0x1e) r1 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r1, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {0x0, 0x3}, {0xffffffff}, {0x1}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) 00:56:01 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) pipe(0x0) wait4(0x0, 0x0, 0x40000000, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000265000)=@req={0x0, 0x400}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000740)={{{@in=@multicast2, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@broadcast}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route(r1, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=@ipv4_getnetconf={0x54, 0x52, 0x10, 0x70bd25, 0x25dfdbfd, {}, [@NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x1}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x9}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x5}, @NETCONFA_FORWARDING={0x8, 0x2, 0x8}, @NETCONFA_IFINDEX={0x8, 0x1, r2}, @NETCONFA_RP_FILTER={0x8, 0x3, 0x7fff}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x3}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0xe9}]}, 0x54}, 0x1, 0x0, 0x0, 0x3400c080}, 0x40) read(0xffffffffffffffff, &(0x7f0000000280)=""/152, 0x20000318) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/keys\x00', 0x0, 0x0) r4 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r4, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) write$binfmt_elf64(r4, &(0x7f00000003c0)={{0x7f, 0x45, 0x4c, 0x46, 0x6, 0x81, 0x35, 0x4, 0x1, 0x59ad6aa4a884dd63, 0x3, 0x0, 0x13d, 0x40, 0x26e, 0x8000, 0x1f, 0x38, 0x1, 0x8, 0x8, 0x3}, [{0x6, 0x3, 0xefa, 0x1, 0x81, 0x80000000, 0x0, 0x9}, {0x7, 0x2, 0x7ff, 0xfff, 0x1, 0x4, 0x0, 0x800b}], "5ad165d3d87709dd80c73c9fa8b6ef39a345e1b2327e38197c13f3be9248c0f2161632606ce45b5c7d7349c883946ca190a061f77e1020dc808b86b4e3c7b2a6128e2d3b16a4ec69ad8c276d1a038ddc59bd46a7a37061ed24ba41f62de7", [[]]}, 0x20e) read(r3, &(0x7f0000000280)=""/152, 0x20000318) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x280800, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$DRM_IOCTL_MODE_SETCRTC(0xffffffffffffffff, 0xc06864a2, &(0x7f0000000000)={0x0, 0x0, 0x20}) 00:56:01 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) pipe(0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f0000000640)=ANY=[@ANYBLOB="3c0000005200100025bd7000fddbdf2502080005000000000008000100", @ANYRES32=0x0, @ANYBLOB="080003000000000600030100000000000000000000180000be42f75fd3a302b1a603dd0b55f3a5fa1c00b86aed252acfb75b12f957e504b7c41623b69162100431f0e48969cf3f275d924a58d65ccdd6f462a452f3cc23e2628a0c3c6a3c17aeefff964ec63ac07ee9b3899a05945f897f2aa3e449c06b9912272a4efdd6372ff0ce2540f551ad398e768ce8881013813b58aba49fed84c1862235387605227efa082c9eaae60f7ab38b915ff2549bf1902307a3aba9ecb01eb7"], 0x3c}, 0x1, 0x0, 0x0, 0x3400c080}, 0x40) r1 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r1, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) write$binfmt_elf64(r1, &(0x7f00000003c0)={{0x7f, 0x45, 0x4c, 0x46, 0x6, 0x81, 0x35, 0x4, 0x1, 0x59ad6aa4a884dd63, 0x3, 0x0, 0x13d, 0x40, 0x26e, 0x8000, 0x1f, 0x38, 0x1, 0x8, 0x8, 0x3}, [{0x6, 0x3, 0xefa, 0x1, 0x81, 0x80000000, 0x0, 0x9}, {0x7, 0x2, 0x7ff, 0xfff, 0x1, 0x4, 0x0, 0x800b}], "5ad165d3d87709dd80c73c9fa8b6ef39a345e1b2327e38197c13f3be9248c0f2161632606ce45b5c7d7349c883946ca190a061f77e1020dc808b86b4e3c7b2a6128e2d3b16a4ec69ad8c276d1a038ddc59bd46a7a37061ed24ba41f62de7aaf1c073c43333bee7ed0979404acecab631d46b591f921ec0a584aeb912342ff4f104ff960a3563460c943d11952c88bd0d13a69a425793b6f7d2b09cf17c87cdc331f63c983436cef6888b1a8328e953b0b3bade3aabbfc4818a05af", [[]]}, 0x26b) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='timers\x00') r3 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r3, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) ioctl$VIDIOC_PREPARE_BUF(r3, 0xc058565d, &(0x7f00000001c0)={0x6, 0x8, 0x4, 0x20000, 0x280, {0x77359400}, {0x3, 0x8, 0x0, 0x33, 0x3, 0x37, "cd903320"}, 0x4, 0x0, @planes=&(0x7f0000000100)={0x772, 0xfffffffb, @userptr=0x8, 0x40}, 0x4, 0x0, r2}) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r4, 0x84, 0x72, &(0x7f0000000280)={0x0, 0x40, 0x30}, &(0x7f00000002c0)=0xc) r5 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r5, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) open_by_handle_at(r5, &(0x7f0000000300)={0x60, 0x80000, "5fe4eede01a694160be26d7380a943f757e2b53c6f0f58cd459c63ba1a4323ec427b7f62dfc6628171558530882b00225fa2dda964ce3c2e4be0437c1b211f194066d25e8294ee603ea4b6209bf6b4fca0dc71fa852dd463"}, 0x4040) 00:56:01 executing program 5: socket$pppoe(0x18, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x4, 0x0, 0x0, 0x4, 0x0, {}, {0xffffffff}, {0x1}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}) 00:56:01 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) pipe(0x0) wait4(0x0, 0x0, 0x40000000, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000265000)=@req={0x0, 0x400, 0x2}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000740)={{{@in=@multicast2, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@broadcast}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route(r1, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=@ipv4_getnetconf={0x54, 0x52, 0x10, 0x70bd25, 0x25dfdbfd, {}, [@NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x1}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x9}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x5}, @NETCONFA_FORWARDING={0x8, 0x2, 0x8}, @NETCONFA_IFINDEX={0x8, 0x1, r2}, @NETCONFA_RP_FILTER={0x8, 0x3, 0x7fff}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x3}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0xe9}]}, 0x54}, 0x1, 0x0, 0x0, 0x3400c080}, 0x0) read(0xffffffffffffffff, &(0x7f0000000280)=""/152, 0x20000318) openat$procfs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/keys\x00', 0x0, 0x0) r3 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r3, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) write$binfmt_elf64(r3, &(0x7f00000003c0)={{0x7f, 0x45, 0x4c, 0x46, 0x6, 0x81, 0x35, 0x4, 0x1, 0x59ad6aa4a884dd63, 0x3, 0x0, 0x13d, 0x40, 0x26e, 0x8000, 0x1f, 0x38, 0x1, 0x8, 0x8, 0x3}, [{0x6, 0x3, 0xefa, 0x1, 0x81, 0x80000000, 0x0, 0x9}, {0x7, 0x2, 0x7ff, 0xfff, 0x1, 0x4, 0x0, 0x800b}], "5ad165d3d87709dd80c73c9fa8b6ef39a345e1b2327e38197c13f3be9248c0f2161632606ce45b5c7d7349c883946ca190a061f77e1020dc808b86b4e3c7b2a6128e2d3b16a4ec69ad8c276d1a038ddc59bd46a7a37061ed24ba41f62de7aaf1c073c43333bee7ed0979404acecab631d46b591f921ec0a584aeb912342ff4f104ff960a3563460c943d11952c88bd0d13a69a425793b6f7d2b09cf17c87cdc331f63c983436cef6888b1a8328e953b0b3bade3aabbfc4818a05af", [[]]}, 0x26b) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_open_procfs(0x0, &(0x7f0000000000)='timers\x00') 00:56:02 executing program 3: r0 = socket$pppoe(0x18, 0x1, 0x0) r1 = open_tree(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x100) fsetxattr$security_evm(r1, &(0x7f0000000100)='security.evm\x00', &(0x7f00000001c0)=@v2={0x3, 0x2, 0x6, 0x4, 0x90, "e9c577a2db82dcab93992d93ae0483767815d926966a4f54ca2f5ceecbdd801c4346dedb162d533c0fec367ce032675483535d2da76818352a7b82d1693de67ffab99759b5293eed04433a14bb055c3f660b23efcb35b36f4fdbdb476eb9c7eeb0d203b9201fbc744519f749dc6eab35463d99ee3f3c1d5017af66aeb5e839142f7ecc4f769320194fc4615b0955e655"}, 0x99, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x2, @link_local, 'team0\x00'}}, 0x1e) r2 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) r3 = socket$inet6(0xa, 0x0, 0x0) ioctl$int_in(r3, 0x5452, &(0x7f0000000040)) connect$inet6(r3, &(0x7f0000419000)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_PKTINFO(r3, 0x29, 0x32, &(0x7f0000000240)={@mcast2}, 0x14) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f0000000140)=0x0) socket$nl_crypto(0x10, 0x3, 0x15) syz_open_procfs(r4, &(0x7f0000000280)='attr/prev\x00') ioctl$FBIOPUT_VSCREENINFO(r2, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {0x0, 0x3}, {0xffffffff}, {0x1}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) 00:56:02 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) pipe(0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=@ipv4_getnetconf={0x3c, 0x52, 0x10, 0x70bd25, 0x25dfdbfd, {}, [@NETCONFA_PROXY_NEIGH={0x8}, @NETCONFA_IFINDEX={0x8}, @NETCONFA_RP_FILTER={0x8}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x3}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0xe9}]}, 0x3c}, 0x1, 0x0, 0x0, 0x3400c080}, 0x40) r1 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/attr/exec\x00', 0x2, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r2, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) ioctl$DRM_IOCTL_SET_MASTER(r2, 0x641e) ioctl$FBIOPUT_VSCREENINFO(r1, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) write$binfmt_elf64(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"/606], 0x26b) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_open_procfs(0x0, &(0x7f0000000000)='timers\x00') 00:56:02 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) pipe(0x0) wait4(0x0, 0x0, 0x40000000, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000265000)=@req={0x0, 0x400}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000740)={{{@in=@multicast2, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@broadcast}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route(r1, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=@ipv4_getnetconf={0x54, 0x52, 0x10, 0x70bd25, 0x25dfdbfd, {}, [@NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x1}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x9}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x5}, @NETCONFA_FORWARDING={0x8, 0x2, 0x8}, @NETCONFA_IFINDEX={0x8, 0x1, r2}, @NETCONFA_RP_FILTER={0x8, 0x3, 0x7fff}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x3}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0xe9}]}, 0x54}, 0x1, 0x0, 0x0, 0x3400c080}, 0x40) read(0xffffffffffffffff, &(0x7f0000000280)=""/152, 0x20000318) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/keys\x00', 0x0, 0x0) r4 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r4, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) write$binfmt_elf64(r4, &(0x7f00000003c0)={{0x7f, 0x45, 0x4c, 0x46, 0x6, 0x81, 0x35, 0x4, 0x1, 0x59ad6aa4a884dd63, 0x3, 0x0, 0x13d, 0x40, 0x26e, 0x8000, 0x1f, 0x38, 0x1, 0x8, 0x8, 0x3}, [{0x6, 0x3, 0xefa, 0x1, 0x81, 0x80000000, 0x0, 0x9}, {0x7, 0x2, 0x7ff, 0xfff, 0x1, 0x4, 0x0, 0x800b}], "5ad165d3d87709dd80c73c9fa8b6ef39a345e1b2327e38197c13f3be9248c0f2161632606ce45b5c7d7349c883946ca190a061f77e1020dc808b86b4e3c7b2a6128e2d3b16a4ec69ad8c276d1a038ddc59bd46a7a37061ed24ba41f62de7", [[]]}, 0x20e) read(r3, &(0x7f0000000280)=""/152, 0x20000318) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x280800, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$DRM_IOCTL_MODE_SETCRTC(0xffffffffffffffff, 0xc06864a2, &(0x7f0000000000)={0x0, 0x0, 0x20}) 00:56:02 executing program 5: socket$pppoe(0x18, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x5, 0x0, 0x0, 0x4, 0x0, {}, {0xffffffff}, {0x1}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}) 00:56:02 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) stat(&(0x7f0000000240)='./file0/file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(0xffffffffffffffff, &(0x7f0000001b80)) socket(0x11, 0x2, 0x5) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r4, 0x1, 0x14, &(0x7f0000000040), 0x50) getsockopt$IP6T_SO_GET_ENTRIES(r4, 0x29, 0x41, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/405], &(0x7f0000000340)=0x1) fsetxattr$trusted_overlay_redirect(r3, &(0x7f0000000200)='trusted.overlay.redirect\x00', 0x0, 0x0, 0x0) getsockname$tipc(0xffffffffffffffff, 0x0, &(0x7f0000000080)) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000001400)={{0x1, 0x0, @identifier="8e0f03f7e12b88d1af81f7c5a6bb175f"}, 0x67, [], "ed760111b8363e2de90692d0bc7e0a89824d3c77730403363ce0521cdcb1973b558cbd01ebf95bd9529fe3c5a95dcf31792e3e463d875b955a13582aeaddf6af34a98934ad6944b87292af67aec51fd37bd761db93cf6623d8683956791c956c97d76a9fd8df5d"}) lstat(&(0x7f0000000000)='./file0/file0\x00', &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000100)=0x0) r7 = getegid() r8 = socket$inet_tcp(0x2, 0x1, 0x0) r9 = fcntl$dupfd(r8, 0x0, r8) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) setresuid(r10, r10, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003ec0)={0x0, 0x0, 0x0}, 0x0) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, r11) r12 = openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$DRM_IOCTL_AGP_INFO(r12, 0x80386433, &(0x7f0000000bc0)=""/4096) getsockopt$sock_cred(r12, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0x194) setresuid(r13, r13, 0x0) r14 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r15 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r15, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) waitid(0x1, r15, &(0x7f0000000100), 0x80000004, &(0x7f0000000180)) r16 = shmget$private(0x0, 0x3000, 0x20, &(0x7f0000ffa000/0x3000)=nil) shmctl$SHM_STAT_ANY(r16, 0xf, &(0x7f0000000540)=""/221) shmctl$IPC_SET(r16, 0x1, &(0x7f0000000180)={{0x3, r10, r11, r13, r7, 0x42, 0x7}, 0x803ff, 0x2, 0xfffffffffffffffd, 0x0, r14, r15, 0x5}) shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000840)={{0x0, r2, r7, 0x0, r5, 0x50}, 0xd7, 0xfffffffffffffffe, 0x1000, 0x8000, r6}) r17 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000280)='/dev/nullb0\x00', 0x4400, 0x0) preadv(r17, &(0x7f0000000040)=[{&(0x7f0000000400)=""/4096, 0x3ffc00}], 0x1, 0x0) 00:56:02 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) pipe(0x0) wait4(0x0, 0x0, 0x40000000, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000265000)=@req={0x0, 0x400}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000740)={{{@in=@multicast2, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@broadcast}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route(r1, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=@ipv4_getnetconf={0x54, 0x52, 0x10, 0x70bd25, 0x25dfdbfd, {}, [@NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x1}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x9}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x5}, @NETCONFA_FORWARDING={0x8, 0x2, 0x8}, @NETCONFA_IFINDEX={0x8, 0x1, r2}, @NETCONFA_RP_FILTER={0x8, 0x3, 0x7fff}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x3}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0xe9}]}, 0x54}, 0x1, 0x0, 0x0, 0x3400c080}, 0x40) read(0xffffffffffffffff, &(0x7f0000000280)=""/152, 0x20000318) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/keys\x00', 0x0, 0x0) r4 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r4, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) write$binfmt_elf64(r4, &(0x7f00000003c0)={{0x7f, 0x45, 0x4c, 0x46, 0x6, 0x81, 0x35, 0x4, 0x1, 0x59ad6aa4a884dd63, 0x3, 0x0, 0x13d, 0x40, 0x26e, 0x8000, 0x1f, 0x38, 0x1, 0x8, 0x8, 0x3}, [{0x6, 0x3, 0xefa, 0x1, 0x81, 0x80000000, 0x0, 0x9}, {0x7, 0x2, 0x7ff, 0xfff, 0x1, 0x4, 0x0, 0x800b}], "5ad165d3d87709dd80c73c9fa8b6ef39a345e1b2327e38197c13f3be9248c0f2161632606ce45b5c7d7349c883946ca190a061f77e1020dc808b86b4e3c7b2a6128e2d3b16a4ec69ad8c276d1a038ddc59bd46a7a37061ed24ba41f62de7", [[]]}, 0x20e) read(r3, &(0x7f0000000280)=""/152, 0x20000318) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x280800, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$DRM_IOCTL_MODE_SETCRTC(0xffffffffffffffff, 0xc06864a2, &(0x7f0000000000)={0x0, 0x0, 0x20}) 00:56:02 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) pipe(0x0) wait4(0x0, 0x0, 0x40000000, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000265000)=@req={0x0, 0x400, 0x2}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000740)={{{@in=@multicast2, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@broadcast}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route(r1, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=@ipv4_getnetconf={0x54, 0x52, 0x10, 0x70bd25, 0x25dfdbfd, {}, [@NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x1}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x9}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x5}, @NETCONFA_FORWARDING={0x8, 0x2, 0x8}, @NETCONFA_IFINDEX={0x8, 0x1, r2}, @NETCONFA_RP_FILTER={0x8, 0x3, 0x7fff}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x3}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0xe9}]}, 0x54}, 0x1, 0x0, 0x0, 0x3400c080}, 0x0) read(0xffffffffffffffff, &(0x7f0000000280)=""/152, 0x20000318) openat$procfs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/keys\x00', 0x0, 0x0) r3 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r3, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) write$binfmt_elf64(r3, &(0x7f00000003c0)={{0x7f, 0x45, 0x4c, 0x46, 0x6, 0x81, 0x35, 0x4, 0x1, 0x59ad6aa4a884dd63, 0x3, 0x0, 0x13d, 0x40, 0x26e, 0x8000, 0x1f, 0x38, 0x1, 0x8, 0x8, 0x3}, [{0x6, 0x3, 0xefa, 0x1, 0x81, 0x80000000, 0x0, 0x9}, {0x7, 0x2, 0x7ff, 0xfff, 0x1, 0x4, 0x0, 0x800b}], "5ad165d3d87709dd80c73c9fa8b6ef39a345e1b2327e38197c13f3be9248c0f2161632606ce45b5c7d7349c883946ca190a061f77e1020dc808b86b4e3c7b2a6128e2d3b16a4ec69ad8c276d1a038ddc59bd46a7a37061ed24ba41f62de7aaf1c073c43333bee7ed0979404acecab631d46b591f921ec0a584aeb912342ff4f104ff960a3563460c943d11952c88bd0d13a69a425793b6f7d2b09cf17c87cdc331f63c983436cef6888b1a8328e953b0b3bade3aabbfc4818a05af", [[]]}, 0x26b) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_open_procfs(0x0, &(0x7f0000000000)='timers\x00') 00:56:03 executing program 5: socket$pppoe(0x18, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x6, 0x0, 0x0, 0x4, 0x0, {}, {0xffffffff}, {0x1}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}) 00:56:03 executing program 3: r0 = socket$pppoe(0x18, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x2, @link_local, 'team0\x00'}}, 0x1e) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vsock\x00', 0x4042, 0x0) write$RDMA_USER_CM_CMD_GET_EVENT(r1, &(0x7f0000000100)={0xc, 0x8, 0xfa00, {&(0x7f00000001c0)}}, 0x10) r2 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) r3 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r3, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) ioctl$KDDISABIO(r3, 0x4b37) ioctl$FBIOPUT_VSCREENINFO(r2, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {0x0, 0x3}, {0xffffffff}, {0x1}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) 00:56:03 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) pipe(0x0) wait4(0x0, 0x0, 0x40000000, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000265000)=@req={0x0, 0x400, 0x2}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000740)={{{@in=@multicast2, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@broadcast}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route(r1, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=@ipv4_getnetconf={0x54, 0x52, 0x10, 0x70bd25, 0x25dfdbfd, {}, [@NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x1}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x9}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x5}, @NETCONFA_FORWARDING={0x8, 0x2, 0x8}, @NETCONFA_IFINDEX={0x8, 0x1, r2}, @NETCONFA_RP_FILTER={0x8, 0x3, 0x7fff}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x3}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0xe9}]}, 0x54}, 0x1, 0x0, 0x0, 0x3400c080}, 0x0) read(0xffffffffffffffff, &(0x7f0000000280)=""/152, 0x20000318) openat$procfs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/keys\x00', 0x0, 0x0) r3 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r3, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) write$binfmt_elf64(r3, &(0x7f00000003c0)={{0x7f, 0x45, 0x4c, 0x46, 0x6, 0x81, 0x35, 0x4, 0x1, 0x59ad6aa4a884dd63, 0x3, 0x0, 0x13d, 0x40, 0x26e, 0x8000, 0x1f, 0x38, 0x1, 0x8, 0x8, 0x3}, [{0x6, 0x3, 0xefa, 0x1, 0x81, 0x80000000, 0x0, 0x9}, {0x7, 0x2, 0x7ff, 0xfff, 0x1, 0x4, 0x0, 0x800b}], "5ad165d3d87709dd80c73c9fa8b6ef39a345e1b2327e38197c13f3be9248c0f2161632606ce45b5c7d7349c883946ca190a061f77e1020dc808b86b4e3c7b2a6128e2d3b16a4ec69ad8c276d1a038ddc59bd46a7a37061ed24ba41f62de7aaf1c073c43333bee7ed0979404acecab631d46b591f921ec0a584aeb912342ff4f104ff960a3563460c943d11952c88bd0d13a69a425793b6f7d2b09cf17c87cdc331f63c983436cef6888b1a8328e953b0b3bade3aabbfc4818a05af", [[]]}, 0x26b) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_open_procfs(0x0, &(0x7f0000000000)='timers\x00') 00:56:03 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) pipe(0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=@ipv4_getnetconf={0x3c, 0x52, 0x10, 0x70bd25, 0x25dfdbfd, {}, [@NETCONFA_PROXY_NEIGH={0x8}, @NETCONFA_IFINDEX={0x8}, @NETCONFA_RP_FILTER={0x8}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x3}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0xe9}]}, 0x3c}, 0x1, 0x0, 0x0, 0x3400c080}, 0x40) r1 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r1, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) sendmmsg(0xffffffffffffffff, &(0x7f0000002280)=[{{&(0x7f0000000280)=@rc={0x1f, @fixed={[], 0x12}, 0x9}, 0x80, &(0x7f0000000b00)=[{&(0x7f0000000640)="773a48a316af6a187ad2dd865670a9e1b31c1d55fba22cf6b666aa95d3311490a088fc1ae7368f91f4d651d0073cf905122743ebbe35aa043657fa7f29e638f95252dc2af9b4aa511a69bd77dd0a77660a8056c1397ba88bb09d2fa9b37cf79a12f31ba22745d2dfb668d5efadb54dc6bdc37f98a5f5703af68458a0d48bd89d326953d26ee92a8507576afe6db5b9ab5b24d1a6a85ea852fc38a498cca84d9de04f058363f00a96312bff3270774911b94219afe0d78d5d66a0f0351598dd1c42fc791e6007490d17d661edc0d0f45aad77b77fdbde0743eed0927e15f9e3c3533e163f32ad97ddf8ab0ee1ca7fdd", 0xef}, {&(0x7f0000000100)="030756dedeb1", 0x6}, {&(0x7f0000000200)="e7df901945b38e4efcc710759619b61031adf32cf0dc94116af6557cf28a405629b462f67cd7", 0x26}, {&(0x7f0000000300)="642a1ad17416e51edc9c052f3d030975d6f4cf394ee9d019a956dedb530d26bbbfcfadebb57e44c0170bed09c68bf74db0a6d73cad7dcb156653a862c48d80a004487ab223b544bca9b5a8f4bfedc86baf5961c03834cf256f6c4776a9aa85d03811ff149c", 0x65}, {&(0x7f0000000740)="e361b87469d03208b83885e3e53e28561f362b10c0ec99986f54db34d0fad16b2d077c1e384e070d4231d8371b75e638d042ae5fa61f5a3e18cb1a9ecc58ed370cd9da468a6651101992b9bb2b9c8fd7125c846c5a4e2133426122914dca2ce2e1b2a366f7d8b532cf", 0x69}, {&(0x7f00000007c0)="b16128e43bd33c6bdb62a7ff1df14fd44fd676776438f7a5bedf905db1209db83bd42b9b0f38587d0c27a86b59f512d28550370a085b134ce414fa8d9f97b6074d055d755237aba52795cdbf3af5be1f5fcf11c562731248e59d9a126ccc722ed36aeaf6d448fa65430e2f0efc1bbe510f8b0422860f345b7ee1e37b43313e3119cd4a18eebd46487dbb07afa13eea56", 0x90}, {&(0x7f0000000880)="d6626972", 0x4}, {&(0x7f00000008c0)="964305e216366c96cd11501c5a0ac645fa2bbd638a9f4ca3b50660979d359117aed31317e08cd100a485e724a18f1254f12e5214118fa0f16493ee1e096b2325b800348906112224f8c1c2e4770dafde39bffa4317c013959bfc8dcb07df912bf4ca91ebb41fc9f163f98b2e5084b5fc5c1923da19d8bbb194985b84e4f6aef41187d6aa4fb575400b8b0f415439a138fdf165fb2db58e9cc2ec6b039306f4c3a78449603801a218ce4d03ec1e668afb532c3b3775aeb35be728f52fcdafab2b9c249d19a7f4bb85b7f0567cb8c6d6339a6123e1628ce4e39c98ea0039d7f955792563780e499165b4b8847d8b", 0xed}, {&(0x7f00000009c0)="4647a55e03b247feeb27b5f3ed844b8631dea47078384066a3ae2d4044c567c4a95613b3cecbb4b056e51c3d262196be92abd195a0381d17b81c5908f961c311b8b21b8eca034216bc4d3b9019617cdabfa088b4d449c36f16d4003595b216a8f6f012349da25f0b8edc237a59e0dde1e6f1f88027fdff3cebbb33b8dcc8cc2ac4631e6d1f85199b5c9000074d89d2bc099e4afc11344da2ea64da0ae48b1608332a", 0xa2}, {&(0x7f0000000a80)="1b0e62781764ea88df9ff34817831eb758511e74d448f070ed5416f7e9e66bf285cbcffbaf00a752153f3f2e22afe2c72610db3f23fb329aa912522aba15ededf7ca31fc1c294e2177", 0x49}], 0xa}}, {{&(0x7f0000000bc0)=@in6={0xa, 0x4e22, 0x2ba8b3b4, @dev={0xfe, 0x80, [], 0x37}, 0x1c}, 0x80, &(0x7f0000001e00)=[{&(0x7f0000000c40)="5c6550b8a5743d5f6098151919466bd46290d708512c05223f88296301d6152285e1a1369fa72a2e17a36a30c5cc8fc690e6afc321393f2b8e647842a68dfbe459c0e3d08c2faa0b81d8971d838a61df720a6bd3c845793d7290339facecfbd3286a09392d1ddef97e852025d70da454831f73a0b4424c52d1ee6ddf7afdd87bfef9f185be2044b5a29760ddc3eb5bb25b8bb125b135d883e47507b1cf0967b359036b4007233afcdcf738bdd9b3435b9bdfcaeeed1b01a04fcf021948e088d59a8bbc772fc886de502b08129b5851fcc8ba83d8a4739ba8e029489e23da01", 0xdf}, {&(0x7f0000000d40)="6338d5bd0c5e7e87c3afa358f647af76283b23fcebaf64487209a6250a335377edac681673a933fe536b73556b1d540b18aca0cd6a6d2d104340b63de4847b564b5dbf428381db065f5dfd63faf78511c685d238912b67ef9cc0a9eb3008d4d9781477dabebcb79a911a89ee3359e70c07e1bcb4e49df806241e4e622ed158ab4ad2767773b98138f8f74802ffafa2f41fb990123a1c209f1cdeb782de39f4bb3d8a59", 0xa3}, {&(0x7f0000000e00)="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", 0x1000}], 0x3, &(0x7f0000001e40)=[{0x90, 0xff, 0x4, "9bd69d45b1f8c3cff35d88b4b4ee4a0778815f8b3c9caf2f76b6ae321cebc3725490134399edcd7e941cf4c0eb272299074738fc791ba071d400fa7da666ea7f9eba54016a2dde2b66be0d4fe91b7477863041b311e8ad0aff2b031b5cad1bccf624bb316fd98a4285ddb56b2197ce98d801816714ef801ed1"}, {0x100, 0x107, 0xd5dd, "d9965d9303cc415a4d98a113840d7d3b7a5b877899667598a719a89c14d3967c40971e5c9cc0f062a5a9c190fa976b938c70772f8fc2f946324d207a9bd42c2f6a3e50515817437ca54e2a7bfdee2a644cc12c54551b04a5170929b2cf74340e8cf50602a3c0d9234091271b5db430d43eb656d88cb51b004ba8a32192a346371e1cda00c084374010a6457b7b1f8ccd48be4bd774a746004c296159a8e395e5b067e1f9ac1f953cafdebc3d6a9cb0915b6fd1907553f2cdafd6b8936d4f831cc4575e2c5c8ac654b019d6ac0dec464df574134dfdbd64ff8d961c04b9ee13aaa5cef679c49b7879626d9078"}], 0x190}}, {{&(0x7f0000002000)=@l2={0x1f, 0xfffe, @none, 0x2, 0x1}, 0x80, &(0x7f0000002100)=[{&(0x7f0000002080)="7bfded4620a0c9ba9cf1cc0fb0faf74f4eba4ed77ba91ff8b76b6c40b6c8e441ac7360e6f43c78eb0d7bcf658b5cc2546d7acaeab3fcec612a25872b7778103abdb3494c7b", 0x45}], 0x1, &(0x7f0000002140)=[{0x78, 0x111, 0xfffffffa, "1605c4014a73f9e7e57c28f99bf1aedda1e7c3421a402cd8ce387a9a83efd58ef8534892a987a473c665940c619190971ecee306167a3719ddb860e5b49fa2d7b762b745e0538b95af785ee3b3e395d166c9fb3d219351423a3afe5d478e7e11c178"}, {0xc0, 0x0, 0x0, "8af391c2e2e87941e19c7bbb96b99a63150f69a56afe4a40ef87b71c5e05b0154052fdc802ec076b780ef5a740559d43205b7d2896b05feacdf381d311fffea4de918f9afecf00a27b545e5405de3a4fdff11ec22164d7c5be5b1ebc071eaa3a16b8059f38d6c34e02d961abc8531a4bb5f4e85c08217bb2eb60331d7d545aa7103978c08f1298838cfe6ec93e14074a49633c293c3ec889864fcbaf54f433cd74efd4778331bd639e6514ce81772260"}], 0x138}}], 0x3, 0x80) write$binfmt_elf64(r1, &(0x7f00000003c0)={{0x7f, 0x45, 0x4c, 0x46, 0x6, 0x81, 0x35, 0x4, 0x1, 0x59ad6aa4a884dd63, 0x3, 0x0, 0x13d, 0x40, 0x26e, 0x8000, 0x1f, 0x38, 0x1, 0x8, 0x8, 0x3}, [{0x6, 0x3, 0xefa, 0x1, 0x81, 0x80000000, 0x0, 0x9}, {0x7, 0x2, 0x7ff, 0xfff, 0x1, 0x4, 0x0, 0x800b}], "5ad165d3d87709dd80c73c9fa8b6ef39a345e1b2327e38197c13f3be9248c0f2161632606ce45b5c7d7349c883946ca190a061f77e1020dc808b86b4e3c7b2a6128e2d3b16a4ec69ad8c276d1a038ddc59bd46a7a37061ed24ba41f62de7aaf1c073c43333bee7ed0979404acecab631d46b591f921ec0a584aeb912342ff4f104ff960a3563460c943d11952c88bd0d13a69a425793b6f7d2b09cf17c87cdc331f63c983436cef6888b1a8328e953b0b3bade3aabbfc4818a05af", [[]]}, 0x26b) syz_open_procfs(0x0, &(0x7f0000000000)='timers\x00') 00:56:03 executing program 3: r0 = socket$pppoe(0x18, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x2, @link_local, 'team0\x00'}}, 0x1e) r1 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r1, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {0x0, 0x3}, {0xffffffff}, {0x1}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r3, 0xc04c5349, &(0x7f0000000280)={0xffff, 0x5, 0xf5a}) openat$cgroup_procs(r2, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) ioctl$DRM_IOCTL_MODE_SETGAMMA(r2, 0xc02064a5, &(0x7f00000001c0)={0x0, 0x2, &(0x7f00000000c0)=[0x1, 0x40], &(0x7f0000000100)=[0xfffc, 0xffc0, 0xff, 0x2, 0x200, 0x4, 0xfffb, 0x795b, 0x4], &(0x7f0000000140)=[0x3, 0x98b3]}) 00:56:03 executing program 5: socket$pppoe(0x18, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x7, 0x0, 0x0, 0x4, 0x0, {}, {0xffffffff}, {0x1}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}) 00:56:03 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) pipe(0x0) wait4(0x0, 0x0, 0x40000000, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000265000)=@req={0x0, 0x400}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000740)={{{@in=@multicast2, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@broadcast}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route(r1, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=@ipv4_getnetconf={0x54, 0x52, 0x10, 0x70bd25, 0x25dfdbfd, {}, [@NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x1}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x9}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x5}, @NETCONFA_FORWARDING={0x8, 0x2, 0x8}, @NETCONFA_IFINDEX={0x8, 0x1, r2}, @NETCONFA_RP_FILTER={0x8, 0x3, 0x7fff}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x3}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0xe9}]}, 0x54}, 0x1, 0x0, 0x0, 0x3400c080}, 0x40) read(0xffffffffffffffff, &(0x7f0000000280)=""/152, 0x20000318) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/keys\x00', 0x0, 0x0) r4 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r4, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) write$binfmt_elf64(r4, &(0x7f00000003c0)={{0x7f, 0x45, 0x4c, 0x46, 0x6, 0x81, 0x35, 0x4, 0x1, 0x59ad6aa4a884dd63, 0x3, 0x0, 0x13d, 0x40, 0x26e, 0x8000, 0x1f, 0x38, 0x1, 0x8, 0x8, 0x3}, [{0x6, 0x3, 0xefa, 0x1, 0x81, 0x80000000, 0x0, 0x9}, {0x7, 0x2, 0x7ff, 0xfff, 0x1, 0x4, 0x0, 0x800b}], "5ad165d3d87709dd80c73c9fa8b6ef39a345e1b2327e38197c13f3be9248c0f2161632606ce45b5c7d7349c883946ca190a061f77e1020dc808b86b4e3c7b2a6128e2d3b16a4ec69ad8c276d1a038ddc59bd46a7a37061ed24ba41f62de7aaf1c073c43333bee7ed0979404acecab631d46b591f921ec0a584aeb912342ff4f104ff960a3563460c943d11952c", [[]]}, 0x23d) read(r3, &(0x7f0000000280)=""/152, 0x20000318) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x280800, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$DRM_IOCTL_MODE_SETCRTC(0xffffffffffffffff, 0xc06864a2, &(0x7f0000000000)={0x0, 0x0, 0x20}) 00:56:04 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) stat(&(0x7f0000000240)='./file0/file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(0xffffffffffffffff, &(0x7f0000001b80)) socket(0x11, 0x2, 0x5) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r4, 0x1, 0x14, &(0x7f0000000040), 0x50) getsockopt$IP6T_SO_GET_ENTRIES(r4, 0x29, 0x41, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/405], &(0x7f0000000340)=0x1) fsetxattr$trusted_overlay_redirect(r3, &(0x7f0000000200)='trusted.overlay.redirect\x00', &(0x7f0000000280)='./file0/file0\x00', 0xe, 0x0) getsockname$tipc(0xffffffffffffffff, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000001400)={{0x1, 0x0, @identifier="8e0f03f7e12b88d1af81f7c5a6bb175f"}, 0x67, [], "ed760111b8363e2de90692d0bc7e0a89824d3c77730403363ce0521cdcb1973b558cbd01ebf95bd9529fe3c5a95dcf31792e3e463d875b955a13582aeaddf6af34a98934ad6944b87292af67aec51fd37bd761db93cf6623d8683956791c956c97d76a9fd8df5d"}) lstat(&(0x7f0000000000)='./file0/file0\x00', &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000100)=0x0) r7 = getegid() r8 = socket$inet_tcp(0x2, 0x1, 0x0) r9 = fcntl$dupfd(r8, 0x0, r8) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) setresuid(r10, r10, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003ec0)={0x0, 0x0, 0x0}, 0x0) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, r11) r12 = openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$DRM_IOCTL_AGP_INFO(r12, 0x80386433, &(0x7f0000000bc0)=""/4096) getsockopt$sock_cred(r12, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0x194) setresuid(r13, r13, 0x0) r14 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r15 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r15, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) waitid(0x1, r15, &(0x7f0000000100), 0x80000004, &(0x7f0000000180)) r16 = shmget$private(0x0, 0x3000, 0x20, &(0x7f0000ffa000/0x3000)=nil) shmctl$SHM_STAT_ANY(r16, 0xf, &(0x7f0000000540)=""/221) shmctl$IPC_SET(r16, 0x1, &(0x7f0000000180)={{0x3, r10, r11, r13, r7, 0x42, 0x7}, 0x803ff, 0x2, 0xfffffffffffffffd, 0x0, r14, r15, 0x5}) shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000840)={{0x0, r2, r7, 0x0, r5, 0x50}, 0xd7, 0xfffffffffffffffe, 0x1000, 0x8000, r6}) r17 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000280)='/dev/nullb0\x00', 0x4400, 0x0) preadv(r17, &(0x7f0000000040)=[{&(0x7f0000000400)=""/4096, 0x3ffc00}], 0x1, 0x0) 00:56:04 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) pipe(0x0) wait4(0x0, 0x0, 0x40000000, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000265000)=@req={0x0, 0x400, 0x2}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000740)={{{@in=@multicast2, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@broadcast}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route(r1, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=@ipv4_getnetconf={0x54, 0x52, 0x10, 0x70bd25, 0x25dfdbfd, {}, [@NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x1}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x9}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x5}, @NETCONFA_FORWARDING={0x8, 0x2, 0x8}, @NETCONFA_IFINDEX={0x8, 0x1, r2}, @NETCONFA_RP_FILTER={0x8, 0x3, 0x7fff}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x3}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0xe9}]}, 0x54}, 0x1, 0x0, 0x0, 0x3400c080}, 0x40) read(0xffffffffffffffff, 0x0, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/keys\x00', 0x0, 0x0) r3 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r3, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) write$binfmt_elf64(r3, &(0x7f00000003c0)={{0x7f, 0x45, 0x4c, 0x46, 0x6, 0x81, 0x35, 0x4, 0x1, 0x59ad6aa4a884dd63, 0x3, 0x0, 0x13d, 0x40, 0x26e, 0x8000, 0x1f, 0x38, 0x1, 0x8, 0x8, 0x3}, [{0x6, 0x3, 0xefa, 0x1, 0x81, 0x80000000, 0x0, 0x9}, {0x7, 0x2, 0x7ff, 0xfff, 0x1, 0x4, 0x0, 0x800b}], "5ad165d3d87709dd80c73c9fa8b6ef39a345e1b2327e38197c13f3be9248c0f2161632606ce45b5c7d7349c883946ca190a061f77e1020dc808b86b4e3c7b2a6128e2d3b16a4ec69ad8c276d1a038ddc59bd46a7a37061ed24ba41f62de7aaf1c073c43333bee7ed0979404acecab631d46b591f921ec0a584aeb912342ff4f104ff960a3563460c943d11952c88bd0d13a69a425793b6f7d2b09cf17c87cdc331f63c983436cef6888b1a8328e953b0b3bade3aabbfc4818a05af", [[]]}, 0x26b) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_open_procfs(0x0, &(0x7f0000000000)='timers\x00') 00:56:04 executing program 3: r0 = socket$pppoe(0x18, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x40, 0x0, 0x0, 0x7f, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2}, 0x20, 0xffffffffffffffff, 0x2, 0x0, 0x0, 0x400000}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x2, @link_local, 'team0\x00'}}, 0x1e) r1 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_IPV6_PKTINFO(r1, 0x29, 0x32, &(0x7f0000000240)={@mcast2}, 0x14) shutdown(r1, 0x0) r2 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) r3 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_IPV6_PKTINFO(r3, 0x29, 0x32, &(0x7f0000000240)={@mcast2}, 0x14) getsockopt$IP_VS_SO_GET_SERVICE(r3, 0x0, 0x483, &(0x7f00000001c0), &(0x7f0000000280)=0x68) r4 = openat$dlm_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-control\x00', 0xc0001, 0x0) ioctl$SNDRV_PCM_IOCTL_UNLINK(r4, 0x4161, 0x0) ioctl$FBIOPUT_VSCREENINFO(r2, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {0x0, 0x3}, {0xffffffff}, {0x1}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) 00:56:04 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) pipe(0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=@ipv4_getnetconf={0x3c, 0x52, 0x10, 0x70bd25, 0x25dfdbfd, {}, [@NETCONFA_PROXY_NEIGH={0x8}, @NETCONFA_IFINDEX={0x8}, @NETCONFA_RP_FILTER={0x8}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x3}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0xe9}]}, 0x3c}, 0x1, 0x0, 0x0, 0x3400c080}, 0x40) r1 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r1, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) write$binfmt_elf64(r1, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x26b) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_open_procfs(0x0, &(0x7f0000000000)='timers\x00') r2 = socket$netlink(0x10, 0x3, 0x11) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r2, &(0x7f00000003c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, 0x0, 0x200, 0x70bd28, 0x25dfdbff, {}, [@BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x4}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x44004) 00:56:04 executing program 5: socket$pppoe(0x18, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x10, 0x0, 0x0, 0x4, 0x0, {}, {0xffffffff}, {0x1}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}) 00:56:05 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) pipe(0x0) wait4(0x0, 0x0, 0x40000000, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000265000)=@req={0x0, 0x400}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000740)={{{@in=@multicast2, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@broadcast}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route(r1, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=@ipv4_getnetconf={0x54, 0x52, 0x10, 0x70bd25, 0x25dfdbfd, {}, [@NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x1}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x9}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x5}, @NETCONFA_FORWARDING={0x8, 0x2, 0x8}, @NETCONFA_IFINDEX={0x8, 0x1, r2}, @NETCONFA_RP_FILTER={0x8, 0x3, 0x7fff}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x3}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0xe9}]}, 0x54}, 0x1, 0x0, 0x0, 0x3400c080}, 0x40) read(0xffffffffffffffff, &(0x7f0000000280)=""/152, 0x20000318) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/keys\x00', 0x0, 0x0) r4 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r4, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) write$binfmt_elf64(r4, &(0x7f00000003c0)={{0x7f, 0x45, 0x4c, 0x46, 0x6, 0x81, 0x35, 0x4, 0x1, 0x59ad6aa4a884dd63, 0x3, 0x0, 0x13d, 0x40, 0x26e, 0x8000, 0x1f, 0x38, 0x1, 0x8, 0x8, 0x3}, [{0x6, 0x3, 0xefa, 0x1, 0x81, 0x80000000, 0x0, 0x9}, {0x7, 0x2, 0x7ff, 0xfff, 0x1, 0x4, 0x0, 0x800b}], "5ad165d3d87709dd80c73c9fa8b6ef39a345e1b2327e38197c13f3be9248c0f2161632606ce45b5c7d7349c883946ca190a061f77e1020dc808b86b4e3c7b2a6128e2d3b16a4ec69ad8c276d1a038ddc59bd46a7a37061ed24ba41f62de7aaf1c073c43333bee7ed0979404acecab631d46b591f921ec0a584aeb912342ff4f104ff960a3563460c943d11952c", [[]]}, 0x23d) read(r3, &(0x7f0000000280)=""/152, 0x20000318) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x280800, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$DRM_IOCTL_MODE_SETCRTC(0xffffffffffffffff, 0xc06864a2, &(0x7f0000000000)={0x0, 0x0, 0x20}) 00:56:05 executing program 5: socket$pppoe(0x18, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x300, 0x0, 0x0, 0x4, 0x0, {}, {0xffffffff}, {0x1}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}) 00:56:05 executing program 3: r0 = socket$pppoe(0x18, 0x1, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x2, @link_local, 'team0\x00'}}, 0x1e) r2 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r2, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {0x0, 0x3}, {0xffffffff}, {0x1}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) r3 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_IPV6_PKTINFO(r3, 0x29, 0x32, &(0x7f0000000240)={@mcast2}, 0x14) r4 = socket$inet6_udp(0xa, 0x2, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000400)=0x14) ioctl$sock_inet6_SIOCADDRT(r4, 0x89a0, &(0x7f0000000440)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @remote, @remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x42, r5}) sendmsg$inet(r3, &(0x7f00000005c0)={&(0x7f00000000c0)={0x2, 0x4e21, @rand_addr=0x6}, 0x10, &(0x7f0000000480)=[{&(0x7f00000001c0)="1a80130177d2f98799cff1fe25982d5dbefce4a4c36f3ad893d4bc7bdad8643971a2b4ee1f34a325b686b2da88471c4a96a843fc06ae0b9cae3c002a74918b5234bab4182e60556780c40314aeb55381e8f4fcb3c186518b76687ccab01092a7541b5e4f3c20f02b8765345116dcaa14dd9017613b660c33183f545efb6218ee6ce88f09e4b15ab437c39c202449a6341dbf13086786669d273eb2df6a5fc3ce51acd69d090e6bca04ef8c177efa42599e17cd73a2504b294b3503d4672c35707ddf676ee923f2f8c57409c5083eaefb36ed6ad235547f0975f652be802436cf6eb6c98f0b394d61f5adee4a29bd521b342702813131f5da82b0c5ce1fcf", 0xfe}, {&(0x7f00000002c0)="c800712139d21d8f617291b58cd1d44f829036672278a5e58bce870ab1f23af017525b6ae1b7cc822ceda51731d56d3b46cb5407d759a5c99175700bca53ccb2cf55c977b1b10aa8c902164d8d9c689b092871d137bdd3e3fd872d3ce46c106a818d85e67c344181afc9d551a802e9150627fbdcf5f71b5662a6870d2ccc4422e0d973015e97bdc854f9203357ddf7", 0x8f}, {&(0x7f0000000100)="0a41ecabb3af948d5004afba", 0xc}, {&(0x7f0000000140)}, {&(0x7f0000000380)="44396161b4d48ce93aa1127cf6dae11259acebbc908764d027aeb55f0741e0ea61948cf9156ca9a1a84b70aa7c5dd01b484d963b2dff1067260bf16f1f9dfbff1ab6675eeadcc5cde621b18451316d92830c37cf129470113a7bef0e9953f92b078dad402be1ca6da8d1ef907e500145a3d18d070164530084dd0b26733352086b12512b06fbe8f3afdcee9a5d41dec674a4c7215f5832009940c254b133c4f36778e9cb00cad55ab49c69cfa264bb1d5b0276a8e148a7a0568bb6e9af0ba043cabe57a2d5", 0xc5}], 0x5, &(0x7f0000000600)=[@ip_tos_u8={{0x11, 0x0, 0x1, 0x3f}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r5, @loopback, @broadcast}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x3}}, @ip_retopts={{0x1c, 0x0, 0x7, {[@generic={0x88, 0xb, "7663ec66dddf220dfb"}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x9}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x80}}, @ip_ttl={{0x14}}], 0xb8}, 0x10) mmap$perf(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x200000e, 0x13, r1, 0x6) 00:56:05 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) pipe(0x0) wait4(0x0, 0x0, 0x40000000, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000265000)=@req={0x0, 0x400, 0x2}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000740)={{{@in=@multicast2, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@broadcast}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route(r1, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=@ipv4_getnetconf={0x54, 0x52, 0x10, 0x70bd25, 0x25dfdbfd, {}, [@NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x1}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x9}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x5}, @NETCONFA_FORWARDING={0x8, 0x2, 0x8}, @NETCONFA_IFINDEX={0x8, 0x1, r2}, @NETCONFA_RP_FILTER={0x8, 0x3, 0x7fff}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x3}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0xe9}]}, 0x54}, 0x1, 0x0, 0x0, 0x3400c080}, 0x40) read(0xffffffffffffffff, 0x0, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/keys\x00', 0x0, 0x0) r3 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r3, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) write$binfmt_elf64(r3, &(0x7f00000003c0)={{0x7f, 0x45, 0x4c, 0x46, 0x6, 0x81, 0x35, 0x4, 0x1, 0x59ad6aa4a884dd63, 0x3, 0x0, 0x13d, 0x40, 0x26e, 0x8000, 0x1f, 0x38, 0x1, 0x8, 0x8, 0x3}, [{0x6, 0x3, 0xefa, 0x1, 0x81, 0x80000000, 0x0, 0x9}, {0x7, 0x2, 0x7ff, 0xfff, 0x1, 0x4, 0x0, 0x800b}], "5ad165d3d87709dd80c73c9fa8b6ef39a345e1b2327e38197c13f3be9248c0f2161632606ce45b5c7d7349c883946ca190a061f77e1020dc808b86b4e3c7b2a6128e2d3b16a4ec69ad8c276d1a038ddc59bd46a7a37061ed24ba41f62de7aaf1c073c43333bee7ed0979404acecab631d46b591f921ec0a584aeb912342ff4f104ff960a3563460c943d11952c88bd0d13a69a425793b6f7d2b09cf17c87cdc331f63c983436cef6888b1a8328e953b0b3bade3aabbfc4818a05af", [[]]}, 0x26b) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_open_procfs(0x0, &(0x7f0000000000)='timers\x00') 00:56:05 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) pipe(0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=@ipv4_getnetconf={0x3c, 0x52, 0x10, 0x70bd25, 0x25dfdbfd, {}, [@NETCONFA_PROXY_NEIGH={0x8}, @NETCONFA_IFINDEX={0x8}, @NETCONFA_RP_FILTER={0x8}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x3}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0xe9}]}, 0x3c}, 0x1, 0x0, 0x0, 0x3400c080}, 0x40) rt_sigqueueinfo(r0, 0x16, &(0x7f0000000280)={0x1b, 0x5b, 0x2}) r1 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r1, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) write$binfmt_elf64(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"/619], 0x26b) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_open_procfs(0x0, &(0x7f0000000000)='timers\x00') 00:56:06 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) stat(&(0x7f0000000240)='./file0/file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(0xffffffffffffffff, &(0x7f0000001b80)) socket(0x11, 0x2, 0x5) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r4, 0x1, 0x14, &(0x7f0000000040), 0x50) getsockopt$IP6T_SO_GET_ENTRIES(r4, 0x29, 0x41, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/405], &(0x7f0000000340)=0x1) fsetxattr$trusted_overlay_redirect(r3, &(0x7f0000000200)='trusted.overlay.redirect\x00', &(0x7f0000000280)='./file0/file0\x00', 0xe, 0x0) getsockname$tipc(0xffffffffffffffff, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000001400)={{0x1, 0x0, @identifier="8e0f03f7e12b88d1af81f7c5a6bb175f"}, 0x67, [], "ed760111b8363e2de90692d0bc7e0a89824d3c77730403363ce0521cdcb1973b558cbd01ebf95bd9529fe3c5a95dcf31792e3e463d875b955a13582aeaddf6af34a98934ad6944b87292af67aec51fd37bd761db93cf6623d8683956791c956c97d76a9fd8df5d"}) lstat(&(0x7f0000000000)='./file0/file0\x00', &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000100)=0x0) r7 = getegid() r8 = socket$inet_tcp(0x2, 0x1, 0x0) r9 = fcntl$dupfd(r8, 0x0, r8) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) setresuid(r10, r10, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003ec0)={0x0, 0x0, 0x0}, 0x0) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, r11) r12 = openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$DRM_IOCTL_AGP_INFO(r12, 0x80386433, &(0x7f0000000bc0)=""/4096) getsockopt$sock_cred(r12, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0x194) setresuid(r13, r13, 0x0) r14 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r15 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r15, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) waitid(0x1, r15, &(0x7f0000000100), 0x80000004, &(0x7f0000000180)) r16 = shmget$private(0x0, 0x3000, 0x20, &(0x7f0000ffa000/0x3000)=nil) shmctl$SHM_STAT_ANY(r16, 0xf, &(0x7f0000000540)=""/221) shmctl$IPC_SET(r16, 0x1, &(0x7f0000000180)={{0x3, r10, r11, r13, r7, 0x42, 0x7}, 0x803ff, 0x2, 0xfffffffffffffffd, 0x0, r14, r15, 0x5}) shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000840)={{0x0, r2, r7, 0x0, r5, 0x50}, 0xd7, 0xfffffffffffffffe, 0x1000, 0x8000, r6}) r17 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000280)='/dev/nullb0\x00', 0x4400, 0x0) preadv(r17, &(0x7f0000000040)=[{&(0x7f0000000400)=""/4096, 0x3ffc00}], 0x1, 0x0) 00:56:06 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) pipe(0x0) wait4(0x0, 0x0, 0x40000000, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000265000)=@req={0x0, 0x400}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000740)={{{@in=@multicast2, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@broadcast}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route(r1, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=@ipv4_getnetconf={0x54, 0x52, 0x10, 0x70bd25, 0x25dfdbfd, {}, [@NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x1}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x9}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x5}, @NETCONFA_FORWARDING={0x8, 0x2, 0x8}, @NETCONFA_IFINDEX={0x8, 0x1, r2}, @NETCONFA_RP_FILTER={0x8, 0x3, 0x7fff}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x3}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0xe9}]}, 0x54}, 0x1, 0x0, 0x0, 0x3400c080}, 0x40) read(0xffffffffffffffff, &(0x7f0000000280)=""/152, 0x20000318) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/keys\x00', 0x0, 0x0) r4 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r4, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) write$binfmt_elf64(r4, &(0x7f00000003c0)={{0x7f, 0x45, 0x4c, 0x46, 0x6, 0x81, 0x35, 0x4, 0x1, 0x59ad6aa4a884dd63, 0x3, 0x0, 0x13d, 0x40, 0x26e, 0x8000, 0x1f, 0x38, 0x1, 0x8, 0x8, 0x3}, [{0x6, 0x3, 0xefa, 0x1, 0x81, 0x80000000, 0x0, 0x9}, {0x7, 0x2, 0x7ff, 0xfff, 0x1, 0x4, 0x0, 0x800b}], "5ad165d3d87709dd80c73c9fa8b6ef39a345e1b2327e38197c13f3be9248c0f2161632606ce45b5c7d7349c883946ca190a061f77e1020dc808b86b4e3c7b2a6128e2d3b16a4ec69ad8c276d1a038ddc59bd46a7a37061ed24ba41f62de7aaf1c073c43333bee7ed0979404acecab631d46b591f921ec0a584aeb912342ff4f104ff960a3563460c943d11952c", [[]]}, 0x23d) read(r3, &(0x7f0000000280)=""/152, 0x20000318) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x280800, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$DRM_IOCTL_MODE_SETCRTC(0xffffffffffffffff, 0xc06864a2, &(0x7f0000000000)={0x0, 0x0, 0x20}) 00:56:06 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) pipe(0x0) wait4(0x0, 0x0, 0x40000000, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000265000)=@req={0x0, 0x400, 0x2}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000740)={{{@in=@multicast2, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@broadcast}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route(r1, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=@ipv4_getnetconf={0x54, 0x52, 0x10, 0x70bd25, 0x25dfdbfd, {}, [@NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x1}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x9}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x5}, @NETCONFA_FORWARDING={0x8, 0x2, 0x8}, @NETCONFA_IFINDEX={0x8, 0x1, r2}, @NETCONFA_RP_FILTER={0x8, 0x3, 0x7fff}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x3}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0xe9}]}, 0x54}, 0x1, 0x0, 0x0, 0x3400c080}, 0x40) read(0xffffffffffffffff, 0x0, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/keys\x00', 0x0, 0x0) r3 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r3, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) write$binfmt_elf64(r3, &(0x7f00000003c0)={{0x7f, 0x45, 0x4c, 0x46, 0x6, 0x81, 0x35, 0x4, 0x1, 0x59ad6aa4a884dd63, 0x3, 0x0, 0x13d, 0x40, 0x26e, 0x8000, 0x1f, 0x38, 0x1, 0x8, 0x8, 0x3}, [{0x6, 0x3, 0xefa, 0x1, 0x81, 0x80000000, 0x0, 0x9}, {0x7, 0x2, 0x7ff, 0xfff, 0x1, 0x4, 0x0, 0x800b}], "5ad165d3d87709dd80c73c9fa8b6ef39a345e1b2327e38197c13f3be9248c0f2161632606ce45b5c7d7349c883946ca190a061f77e1020dc808b86b4e3c7b2a6128e2d3b16a4ec69ad8c276d1a038ddc59bd46a7a37061ed24ba41f62de7aaf1c073c43333bee7ed0979404acecab631d46b591f921ec0a584aeb912342ff4f104ff960a3563460c943d11952c88bd0d13a69a425793b6f7d2b09cf17c87cdc331f63c983436cef6888b1a8328e953b0b3bade3aabbfc4818a05af", [[]]}, 0x26b) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_open_procfs(0x0, &(0x7f0000000000)='timers\x00') 00:56:06 executing program 3: r0 = socket$pppoe(0x18, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x2, @link_local, 'team0\x00'}}, 0x1e) r1 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x2, 0x0) ioctl$FBIOPUT_VSCREENINFO(r1, 0x4601, &(0x7f0000000000)={0x190, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {0x0, 0x4}, {0xffffffff, 0x4}, {0x1}, {}, 0x1, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) 00:56:06 executing program 5: socket$pppoe(0x18, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x500, 0x0, 0x0, 0x4, 0x0, {}, {0xffffffff}, {0x1}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}) 00:56:06 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) stat(&(0x7f0000000240)='./file0/file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(0xffffffffffffffff, &(0x7f0000001b80)) socket(0x11, 0x2, 0x5) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r4, 0x1, 0x14, &(0x7f0000000040), 0x50) getsockopt$IP6T_SO_GET_ENTRIES(r4, 0x29, 0x41, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/405], &(0x7f0000000340)=0x1) fsetxattr$trusted_overlay_redirect(r3, &(0x7f0000000200)='trusted.overlay.redirect\x00', &(0x7f0000000280)='./file0/file0\x00', 0xe, 0x0) getsockname$tipc(0xffffffffffffffff, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000001400)={{0x1, 0x0, @identifier="8e0f03f7e12b88d1af81f7c5a6bb175f"}, 0x67, [], "ed760111b8363e2de90692d0bc7e0a89824d3c77730403363ce0521cdcb1973b558cbd01ebf95bd9529fe3c5a95dcf31792e3e463d875b955a13582aeaddf6af34a98934ad6944b87292af67aec51fd37bd761db93cf6623d8683956791c956c97d76a9fd8df5d"}) lstat(&(0x7f0000000000)='./file0/file0\x00', &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000100)=0x0) r7 = getegid() r8 = socket$inet_tcp(0x2, 0x1, 0x0) r9 = fcntl$dupfd(r8, 0x0, r8) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) setresuid(r10, r10, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003ec0)={0x0, 0x0, 0x0}, 0x0) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, r11) r12 = openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$DRM_IOCTL_AGP_INFO(r12, 0x80386433, &(0x7f0000000bc0)=""/4096) getsockopt$sock_cred(r12, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0x194) setresuid(r13, r13, 0x0) r14 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r15 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r15, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) waitid(0x1, r15, &(0x7f0000000100), 0x80000004, &(0x7f0000000180)) r16 = shmget$private(0x0, 0x3000, 0x20, &(0x7f0000ffa000/0x3000)=nil) shmctl$SHM_STAT_ANY(r16, 0xf, &(0x7f0000000540)=""/221) shmctl$IPC_SET(r16, 0x1, &(0x7f0000000180)={{0x3, r10, r11, r13, r7, 0x42, 0x7}, 0x803ff, 0x2, 0xfffffffffffffffd, 0x0, r14, r15, 0x5}) shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000840)={{0x0, r2, r7, 0x0, r5, 0x50}, 0xd7, 0xfffffffffffffffe, 0x1000, 0x8000, r6}) r17 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000280)='/dev/nullb0\x00', 0x4400, 0x0) preadv(r17, &(0x7f0000000040)=[{&(0x7f0000000400)=""/4096, 0x3ffc00}], 0x1, 0x0) 00:56:06 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) r1 = socket$inet6(0xa, 0x0, 0x0) ioctl$int_in(r1, 0x5452, &(0x7f0000000040)) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_PKTINFO(r1, 0x29, 0x32, &(0x7f0000000240)={@mcast2}, 0x14) r2 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f0000000100)={r3}, &(0x7f0000000140)=0x8) setsockopt$inet_sctp6_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f0000000100)={r3, 0x6}, 0x8) pipe(0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000400)=0x14) connect(r1, &(0x7f00000002c0)=@alg={0x26, 'aead\x00', 0x0, 0x0, 'rfc7539(xts-aes-ce,sha256-avx)\x00'}, 0x80) ioctl$sock_inet6_SIOCADDRT(r4, 0x89a0, &(0x7f0000000440)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @remote, @remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x42, r5}) r6 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r6, 0x10f, 0x87, &(0x7f0000265000)=@req={0x0, 0x0, 0x2}, 0x10) ioctl$SIOCGSTAMPNS(r6, 0x8907, &(0x7f0000000200)) r7 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r7, 0x10f, 0x87, &(0x7f0000265000)=@req={0x0, 0x0, 0x2}, 0x10) getsockname$packet(r7, &(0x7f0000001b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000001b40)=0x14) r8 = socket$inet6(0xa, 0x0, 0x0) ioctl$int_in(r8, 0x5452, &(0x7f0000000040)) connect$inet6(r8, &(0x7f0000419000)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_PKTINFO(r8, 0x29, 0x32, &(0x7f0000000240)={@mcast2}, 0x14) r9 = socket$inet6_udp(0xa, 0x2, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000400)=0x14) ioctl$sock_inet6_SIOCADDRT(r9, 0x89a0, &(0x7f0000000440)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @remote, @remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x42, r10}) ioctl$ifreq_SIOCGIFINDEX_vcan(r8, 0x8933, &(0x7f0000000340)={'vcan0\x00', r10}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000500)={{{@in=@empty, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@initdev}}, &(0x7f0000000600)=0xe8) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=@ipv4_getnetconf={0x3c, 0x52, 0x300, 0x70bd28, 0x25dfdbfd, {}, [@NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x200000}, @NETCONFA_IFINDEX={0x8, 0x1, r12}, @NETCONFA_RP_FILTER={0x8, 0x3, 0xffffffff}, @NETCONFA_IFINDEX={0xfffffffffffffec4, 0x1, r11}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0xe9}]}, 0x3c}, 0x1, 0x0, 0x0, 0x3400c080}, 0x40) r13 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) r14 = open(&(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x0) openat$cgroup_procs(r14, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) write$P9_RREMOVE(r14, &(0x7f0000000280)={0x7, 0x7b, 0x2}, 0x7) ioctl$FBIOPUT_VSCREENINFO(r13, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) write$binfmt_elf64(r13, &(0x7f0000000640)=ANY=[@ANYBLOB="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"/631], 0x26b) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_open_procfs(0x0, &(0x7f0000000000)='timers\x00') 00:56:07 executing program 5: socket$pppoe(0x18, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x600, 0x0, 0x0, 0x4, 0x0, {}, {0xffffffff}, {0x1}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}) 00:56:07 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9798a632b143b2cb}, 0x0, 0x0, 0x678}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) r1 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000265000)=@req={0x0, 0x0, 0x2}, 0x10) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000280)='nl80211\x00') r3 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r3, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) r4 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r4, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) ioctl$VIDIOC_DQBUF(0xffffffffffffffff, 0xc0585611, &(0x7f00000002c0)={0x8, 0x2, 0x4, 0x0, 0x1, {0x77359400}, {0x5, 0xd, 0x1, 0x6, 0xc1, 0x7f, "97038c10"}, 0x939, 0x1, @offset=0x6, 0x80000000, 0x0, r4}) syz_genetlink_get_family_id$net_dm(&(0x7f00000006c0)='NET_DM\x00') r6 = socket$inet6_udp(0xa, 0x2, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000400)=0x14) ioctl$sock_inet6_SIOCADDRT(r6, 0x89a0, &(0x7f0000000440)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @remote, @remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x42, r7}) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(r1, &(0x7f0000000680)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000640)={&(0x7f0000000340)={0x2c, r2, 0x20, 0x70bd25, 0x25dfdbfe, {}, [@NL80211_ATTR_NETNS_FD={0x8, 0xdb, r3}, @NL80211_ATTR_NETNS_FD={0x8, 0xdb, r5}, @NL80211_ATTR_IFINDEX={0x8, 0x3, r7}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000084}, 0x8001) pipe(0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=@ipv4_getnetconf={0x3c, 0x52, 0x10, 0x70bd25, 0x25dfdbfd, {}, [@NETCONFA_PROXY_NEIGH={0x8}, @NETCONFA_IFINDEX={0x8}, @NETCONFA_RP_FILTER={0x8}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x3}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0xe9}]}, 0x3c}, 0x1, 0x0, 0x0, 0x3400c080}, 0x40) r8 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r8, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) write$binfmt_elf64(r8, &(0x7f00000003c0)={{0x7f, 0x45, 0x4c, 0x46, 0x6, 0x81, 0x35, 0x4, 0x1, 0x59ad6aa4a884dd63, 0x3, 0x0, 0x13d, 0x40, 0x26e, 0x8000, 0x1f, 0x38, 0x1, 0x8, 0x8, 0x3}, [{0x6, 0x3, 0xefa, 0x1, 0x81, 0x80000000, 0x0, 0x9}, {0x7, 0x2, 0x7ff, 0xfff, 0x1, 0x4, 0x0, 0x800b}], "5ad165d3d87709dd80c73c9fa8b6ef39a345e1b2327e38197c13f3be9248c0f2161632606ce45b5c7d7349c883946ca190a061f77e1020dc808b86b4e3c7b2a6128e2d3b16a4ec69ad8c276d1a038ddc59bd46a7a37061ed24ba41f62de7aaf1c073c43333bee7ed0979404acecab631d46b591f921ec0a584aeb912342ff4f104ff960a3563460c943d11952c88bd0d13a69a425793b6f7d2b09cf17c87cdc331f63c983436cef6888b1a8328e953b0b3bade3aabbfc4818a05af", [[]]}, 0x26b) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_open_procfs(0x0, &(0x7f0000000100)='mountinfo\x00') 00:56:07 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) pipe(0x0) wait4(0x0, 0x0, 0x40000000, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000265000)=@req={0x0, 0x400, 0x2}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000740)={{{@in=@multicast2, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@broadcast}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route(r1, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=@ipv4_getnetconf={0x54, 0x52, 0x10, 0x70bd25, 0x25dfdbfd, {}, [@NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x1}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x9}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x5}, @NETCONFA_FORWARDING={0x8, 0x2, 0x8}, @NETCONFA_IFINDEX={0x8, 0x1, r2}, @NETCONFA_RP_FILTER={0x8, 0x3, 0x7fff}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x3}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0xe9}]}, 0x54}, 0x1, 0x0, 0x0, 0x3400c080}, 0x40) read(0xffffffffffffffff, &(0x7f0000000280)=""/152, 0x20000318) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r3, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) write$binfmt_elf64(r3, &(0x7f00000003c0)={{0x7f, 0x45, 0x4c, 0x46, 0x6, 0x81, 0x35, 0x4, 0x1, 0x59ad6aa4a884dd63, 0x3, 0x0, 0x13d, 0x40, 0x26e, 0x8000, 0x1f, 0x38, 0x1, 0x8, 0x8, 0x3}, [{0x6, 0x3, 0xefa, 0x1, 0x81, 0x80000000, 0x0, 0x9}, {0x7, 0x2, 0x7ff, 0xfff, 0x1, 0x4, 0x0, 0x800b}], "5ad165d3d87709dd80c73c9fa8b6ef39a345e1b2327e38197c13f3be9248c0f2161632606ce45b5c7d7349c883946ca190a061f77e1020dc808b86b4e3c7b2a6128e2d3b16a4ec69ad8c276d1a038ddc59bd46a7a37061ed24ba41f62de7aaf1c073c43333bee7ed0979404acecab631d46b591f921ec0a584aeb912342ff4f104ff960a3563460c943d11952c88bd0d13a69a425793b6f7d2b09cf17c87cdc331f63c983436cef6888b1a8328e953b0b3bade3aabbfc4818a05af", [[]]}, 0x26b) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_open_procfs(0x0, &(0x7f0000000000)='timers\x00') 00:56:07 executing program 3: r0 = socket$pppoe(0x18, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x2, @link_local, 'team0\x00'}}, 0x1e) r1 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f00000001c0)=@filter={'filter\x00', 0xe, 0x4, 0x440, 0xe8, 0xe8, 0x0, 0x0, 0x0, 0x370, 0x370, 0x370, 0x370, 0x370, 0x4, &(0x7f00000000c0), {[{{@ipv6={@rand_addr="ff2d5917774115045ac62b9c23d069f1", @local, [0xff, 0xffffff00, 0x0, 0xff000000], [0xffffff00, 0xff0000ff, 0x0, 0xffffff00], 'erspan0\x00', 'ip_vti0\x00', {0xff}, {}, 0x3a, 0x1, 0x6}, 0x0, 0xa8, 0xe8}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00', 0x0, {[0x2, 0x5, 0x9, 0x9, 0x0, 0x54ea, 0x3, 0x3acea857]}}}, {{@uncond, 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@set3={{0x50, 'set\x00'}, {{0x2, 0x2}, {0x4, 0x3f}, {0x88, 0x3}}}, @common=@srh={{0x30, 'srh\x00'}, {0xe305df8bc5cc2858, 0x7f, 0x80, 0x9, 0x5, 0x200, 0x100}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x7}}}, {{@ipv6={@dev={0xfe, 0x80, [], 0x21}, @mcast2, [0x0, 0xff, 0xff, 0xff], [0x0, 0xff000000, 0xffffff00, 0xff000000], 'team_slave_0\x00', 'vcan0\x00', {0xff}, {0xab87a0ff697fe9c0}, 0x3b, 0xb9, 0x3, 0x34}, 0x0, 0x100, 0x138, 0x0, {}, [@common=@eui64={{0x28, 'eui64\x00'}}, @common=@frag={{0x30, 'frag\x00'}, {[0x7ff, 0x1], 0x2, 0xc}}]}, @common=@inet=@SET3={0x38, 'SET\x00', 0x3, {{0x0, 0x4, 0x5}, {0x4, 0x4, 0x7}, {0x1, 0x4, 0x4}, 0x1, 0x30250d2f}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4a0) r3 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r3, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) sendfile(r1, r3, 0x0, 0x6) ioctl$FBIOPUT_VSCREENINFO(r1, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {0x0, 0x3}, {0xffffffff}, {0x1}, {0x20000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) [ 602.989824][T12364] x_tables: duplicate underflow at hook 2 00:56:07 executing program 5: socket$pppoe(0x18, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x700, 0x0, 0x0, 0x4, 0x0, {}, {0xffffffff}, {0x1}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}) 00:56:08 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) pipe(0x0) wait4(0x0, 0x0, 0x40000000, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000265000)=@req={0x0, 0x400}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000740)={{{@in=@multicast2, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@broadcast}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route(r1, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=@ipv4_getnetconf={0x54, 0x52, 0x10, 0x70bd25, 0x25dfdbfd, {}, [@NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x1}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x9}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x5}, @NETCONFA_FORWARDING={0x8, 0x2, 0x8}, @NETCONFA_IFINDEX={0x8, 0x1, r2}, @NETCONFA_RP_FILTER={0x8, 0x3, 0x7fff}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x3}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0xe9}]}, 0x54}, 0x1, 0x0, 0x0, 0x3400c080}, 0x40) read(0xffffffffffffffff, &(0x7f0000000280)=""/152, 0x20000318) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/keys\x00', 0x0, 0x0) r4 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r4, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) write$binfmt_elf64(r4, &(0x7f00000003c0)={{0x7f, 0x45, 0x4c, 0x46, 0x6, 0x81, 0x35, 0x4, 0x1, 0x59ad6aa4a884dd63, 0x3, 0x0, 0x13d, 0x40, 0x26e, 0x8000, 0x1f, 0x38, 0x1, 0x8, 0x8, 0x3}, [{0x6, 0x3, 0xefa, 0x1, 0x81, 0x80000000, 0x0, 0x9}, {0x7, 0x2, 0x7ff, 0xfff, 0x1, 0x4, 0x0, 0x800b}], "5ad165d3d87709dd80c73c9fa8b6ef39a345e1b2327e38197c13f3be9248c0f2161632606ce45b5c7d7349c883946ca190a061f77e1020dc808b86b4e3c7b2a6128e2d3b16a4ec69ad8c276d1a038ddc59bd46a7a37061ed24ba41f62de7aaf1c073c43333bee7ed0979404acecab631d46b591f921ec0a584aeb912342ff4f104ff960a3563460c943d11952c88bd0d13a69a425793b6f7d2b09cf17c87cdc331f63c98", [[]]}, 0x254) read(r3, &(0x7f0000000280)=""/152, 0x20000318) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x280800, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$DRM_IOCTL_MODE_SETCRTC(0xffffffffffffffff, 0xc06864a2, &(0x7f0000000000)={0x0, 0x0, 0x20}) 00:56:08 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_open_dev$usbmon(0x0, 0x1, 0x48000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) stat(&(0x7f0000000240)='./file0/file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(0xffffffffffffffff, &(0x7f0000001b80)) socket(0x11, 0x2, 0x5) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r3, 0x1, 0x14, &(0x7f0000000040), 0x50) getsockopt$IP6T_SO_GET_ENTRIES(r3, 0x29, 0x41, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/405], &(0x7f0000000340)=0x1) fsetxattr$trusted_overlay_redirect(r2, &(0x7f0000000200)='trusted.overlay.redirect\x00', &(0x7f0000000280)='./file0/file0\x00', 0xe, 0x0) getsockname$tipc(0xffffffffffffffff, 0x0, &(0x7f0000000080)) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000001400)={{0x1, 0x0, @identifier="8e0f03f7e12b88d1af81f7c5a6bb175f"}, 0x67, [], "ed760111b8363e2de90692d0bc7e0a89824d3c77730403363ce0521cdcb1973b558cbd01ebf95bd9529fe3c5a95dcf31792e3e463d875b955a13582aeaddf6af34a98934ad6944b87292af67aec51fd37bd761db93cf6623d8683956791c956c97d76a9fd8df5d"}) lstat(&(0x7f0000000000)='./file0/file0\x00', &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000100)=0x0) r6 = getegid() r7 = socket$inet_tcp(0x2, 0x1, 0x0) r8 = fcntl$dupfd(r7, 0x0, r7) getsockopt$sock_cred(r8, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) setresuid(r9, r9, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003ec0)={0x0, 0x0, 0x0}, 0x0) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, r10) r11 = openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$DRM_IOCTL_AGP_INFO(r11, 0x80386433, &(0x7f0000000bc0)=""/4096) getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0x194) setresuid(r12, r12, 0x0) r13 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r14 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r14, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) waitid(0x1, r14, &(0x7f0000000100), 0x80000004, &(0x7f0000000180)) r15 = shmget$private(0x0, 0x3000, 0x20, &(0x7f0000ffa000/0x3000)=nil) shmctl$SHM_STAT_ANY(r15, 0xf, &(0x7f0000000540)=""/221) shmctl$IPC_SET(r15, 0x1, &(0x7f0000000180)={{0x3, r9, r10, r12, r6, 0x42, 0x7}, 0x803ff, 0x2, 0xfffffffffffffffd, 0x0, r13, r14, 0x5}) shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000840)={{0x0, r1, r6, 0x0, r4, 0x50}, 0xd7, 0xfffffffffffffffe, 0x1000, 0x8000, r5}) r16 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000280)='/dev/nullb0\x00', 0x4400, 0x0) preadv(r16, &(0x7f0000000040)=[{&(0x7f0000000400)=""/4096, 0x3ffc00}], 0x1, 0x0) 00:56:08 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) pipe(0x0) wait4(0x0, 0x0, 0x40000000, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000265000)=@req={0x0, 0x400, 0x2}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000740)={{{@in=@multicast2, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@broadcast}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route(r1, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=@ipv4_getnetconf={0x54, 0x52, 0x10, 0x70bd25, 0x25dfdbfd, {}, [@NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x1}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x9}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x5}, @NETCONFA_FORWARDING={0x8, 0x2, 0x8}, @NETCONFA_IFINDEX={0x8, 0x1, r2}, @NETCONFA_RP_FILTER={0x8, 0x3, 0x7fff}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x3}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0xe9}]}, 0x54}, 0x1, 0x0, 0x0, 0x3400c080}, 0x40) read(0xffffffffffffffff, &(0x7f0000000280)=""/152, 0x20000318) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r3, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) write$binfmt_elf64(r3, &(0x7f00000003c0)={{0x7f, 0x45, 0x4c, 0x46, 0x6, 0x81, 0x35, 0x4, 0x1, 0x59ad6aa4a884dd63, 0x3, 0x0, 0x13d, 0x40, 0x26e, 0x8000, 0x1f, 0x38, 0x1, 0x8, 0x8, 0x3}, [{0x6, 0x3, 0xefa, 0x1, 0x81, 0x80000000, 0x0, 0x9}, {0x7, 0x2, 0x7ff, 0xfff, 0x1, 0x4, 0x0, 0x800b}], "5ad165d3d87709dd80c73c9fa8b6ef39a345e1b2327e38197c13f3be9248c0f2161632606ce45b5c7d7349c883946ca190a061f77e1020dc808b86b4e3c7b2a6128e2d3b16a4ec69ad8c276d1a038ddc59bd46a7a37061ed24ba41f62de7aaf1c073c43333bee7ed0979404acecab631d46b591f921ec0a584aeb912342ff4f104ff960a3563460c943d11952c88bd0d13a69a425793b6f7d2b09cf17c87cdc331f63c983436cef6888b1a8328e953b0b3bade3aabbfc4818a05af", [[]]}, 0x26b) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_open_procfs(0x0, &(0x7f0000000000)='timers\x00') 00:56:08 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) pipe(0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=@ipv4_getnetconf={0x3c, 0x52, 0x10, 0x70bd25, 0x25dfdbfd, {}, [@NETCONFA_PROXY_NEIGH={0x8}, @NETCONFA_IFINDEX={0x8}, @NETCONFA_RP_FILTER={0x8}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x3}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0xe9}]}, 0x3c}, 0x1, 0x0, 0x0, 0x3400c080}, 0x40) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/capi/capi20ncci\x00', 0x301003, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff}) r3 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f00000002c0)='NLBL_UNLBL\x00') sendmsg$NLBL_UNLABEL_C_LIST(r2, &(0x7f0000000400)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="a5200200", @ANYRES16=r3, @ANYBLOB="00022cbd7000fedbdf250200000014000200fe88000000000000000000000000010114000200fe80000000000000000000000000002e14000200fe8000000000000000000000000000bb2a00070073797374656d5f753a6f626a6563745f723a696e697472635f7661725f72756e5f743a733000000005000100000000000500010001000000"], 0x8c}, 0x1, 0x0, 0x0, 0x4040}, 0x24000080) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r1, &(0x7f0000000680)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000640)={&(0x7f0000000340)={0x38, r3, 0x4, 0x70bd29, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_ACPTFLG={0x5, 0x1, 0x1}, @NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @remote}, @NLBL_UNLABEL_A_ACPTFLG={0x5, 0x1, 0x1}]}, 0x38}, 0x1, 0x0, 0x0, 0x10002004}, 0x4) r4 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r4, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) write$binfmt_elf64(r4, &(0x7f00000003c0)={{0x7f, 0x45, 0x4c, 0x46, 0x6, 0x81, 0x35, 0x4, 0x1, 0x59ad6aa4a884dd63, 0x3, 0x0, 0x13d, 0x40, 0x26e, 0x8000, 0x1f, 0x38, 0x1, 0x8, 0x8, 0x3}, [{0x6, 0x3, 0xefa, 0x1, 0x81, 0x80000000, 0x0, 0x9}, {0x7, 0x2, 0x7ff, 0xfff, 0x1, 0x4, 0x0, 0x800b}], "5ad165d3d87709dd80c73c9fa8b6ef39a345e1b2327e38197c13f3be9248c0f2161632606ce45b5c7d7349c883946ca190a061f77e1020dc808b86b4e3c7b2a6128e2d3b16a4ec69ad8c276d1a038ddc59bd46a7a37061ed24ba41f62de7aaf1c073c43333bee7ed0979404acecab631d46b591f921ec0a584aeb912342ff4f104ff960a3563460c943d11952c88bd0d13a69a425793b6f7d2b09cf17c87cdc331f63c983436cef6888b1a8328e953b0b3bade3aabbfc4818a05af", [[]]}, 0x26b) getsockopt$XDP_STATISTICS(0xffffffffffffffff, 0x11b, 0x7, &(0x7f0000000200), &(0x7f0000000280)=0x18) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = syz_open_procfs(0x0, &(0x7f0000000000)='timers\x00') inotify_add_watch(r5, &(0x7f0000000100)='./file0\x00', 0x2) 00:56:08 executing program 3: r0 = socket$pppoe(0x18, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000265000)=@req={0x0, 0x0, 0x2}, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000100)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_WINDOW(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000140)={&(0x7f00000001c0)={0x68, r2, 0x400, 0x70bd2c, 0x25dfdbfd, {{}, {}, {0x4c, 0x18, {0x6, @media='eth\x00'}}}, ["", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x20000000}, 0x81) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x2, @link_local, 'team0\x00'}}, 0x1e) r3 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r3, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {0x0, 0x3}, {0xffffffff}, {0x1}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) 00:56:08 executing program 5: socket$pppoe(0x18, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x2000, 0x0, 0x0, 0x4, 0x0, {}, {0xffffffff}, {0x1}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}) 00:56:08 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) pipe(0x0) wait4(0x0, 0x0, 0x40000000, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000265000)=@req={0x0, 0x400}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000740)={{{@in=@multicast2, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@broadcast}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route(r1, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=@ipv4_getnetconf={0x54, 0x52, 0x10, 0x70bd25, 0x25dfdbfd, {}, [@NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x1}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x9}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x5}, @NETCONFA_FORWARDING={0x8, 0x2, 0x8}, @NETCONFA_IFINDEX={0x8, 0x1, r2}, @NETCONFA_RP_FILTER={0x8, 0x3, 0x7fff}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x3}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0xe9}]}, 0x54}, 0x1, 0x0, 0x0, 0x3400c080}, 0x40) read(0xffffffffffffffff, &(0x7f0000000280)=""/152, 0x20000318) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/keys\x00', 0x0, 0x0) r4 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r4, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) write$binfmt_elf64(r4, &(0x7f00000003c0)={{0x7f, 0x45, 0x4c, 0x46, 0x6, 0x81, 0x35, 0x4, 0x1, 0x59ad6aa4a884dd63, 0x3, 0x0, 0x13d, 0x40, 0x26e, 0x8000, 0x1f, 0x38, 0x1, 0x8, 0x8, 0x3}, [{0x6, 0x3, 0xefa, 0x1, 0x81, 0x80000000, 0x0, 0x9}, {0x7, 0x2, 0x7ff, 0xfff, 0x1, 0x4, 0x0, 0x800b}], "5ad165d3d87709dd80c73c9fa8b6ef39a345e1b2327e38197c13f3be9248c0f2161632606ce45b5c7d7349c883946ca190a061f77e1020dc808b86b4e3c7b2a6128e2d3b16a4ec69ad8c276d1a038ddc59bd46a7a37061ed24ba41f62de7aaf1c073c43333bee7ed0979404acecab631d46b591f921ec0a584aeb912342ff4f104ff960a3563460c943d11952c88bd0d13a69a425793b6f7d2b09cf17c87cdc331f63c98", [[]]}, 0x254) read(r3, &(0x7f0000000280)=""/152, 0x20000318) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x280800, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$DRM_IOCTL_MODE_SETCRTC(0xffffffffffffffff, 0xc06864a2, &(0x7f0000000000)={0x0, 0x0, 0x20}) 00:56:09 executing program 3: r0 = socket$pppoe(0x18, 0x1, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r1, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) ioctl$CAPI_INSTALLED(r1, 0x80024322) fcntl$setsig(r0, 0xa, 0x32) acct(&(0x7f00000000c0)='./file0\x00') ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, &(0x7f0000000140)={0x40000, 0x7f, 0x5, 0xffffffffffffffff, 0x0, &(0x7f0000000100)={0x9c0908, 0x6, [], @ptr=0x9}}) readlinkat(r2, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)=""/121, 0x79) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x2, @link_local, 'team0\x00'}}, 0x1e) syz_open_dev$vcsu(&(0x7f0000000280)='/dev/vcsu#\x00', 0x27a, 0x8000) r3 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r3, 0x4601, &(0x7f0000000000)={0x0, 0x31d, 0x400, 0x0, 0x0, 0x0, 0x4, 0x0, {0x0, 0x3}, {0xffffffff}, {0x1}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) 00:56:09 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) lsetxattr$security_ima(&(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='security.ima\x00', &(0x7f0000000280)=@md5={0x1, "2fa728ca35a7089f400466cbaae94f3b"}, 0x11, 0x1) pipe(0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=@ipv4_getnetconf={0x3c, 0x52, 0x10, 0x70bd25, 0x25dfdbfd, {}, [@NETCONFA_PROXY_NEIGH={0x8}, @NETCONFA_IFINDEX={0x8}, @NETCONFA_RP_FILTER={0x8}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x3}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0xe9}]}, 0x3c}, 0x1, 0x0, 0x0, 0x3400c080}, 0x40) r1 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r1, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) write$binfmt_elf64(r1, &(0x7f00000003c0)={{0x7f, 0x45, 0x4c, 0x46, 0x6, 0x81, 0x35, 0x4, 0x1, 0x59ad6aa4a884dd63, 0x3, 0x0, 0x13d, 0x40, 0x26e, 0x8000, 0x1f, 0x38, 0x1, 0x8, 0x8, 0x3}, [{0x6, 0x3, 0xefa, 0x1, 0x81, 0x80000000, 0x0, 0x9}, {0x7, 0x2, 0x7ff, 0xfff, 0x1, 0x20000000004, 0x0, 0x800b}], "5ad165d3d87709dd80c73c9fa8b6ef39a345e1b2327e38197c13f3be9248c0f2161632606ce45b5c7d7349c883946ca190a061f77e1020dc808b86b4e3c7b2a6128e2d3b16a4ec69ad8c276d1a038ddc59bd46a7a37061ed24ba41f62de7aaf1c073c43333bee7ed0979404acecab631d46b591f921ec0a584aeb912342ff4f104ff960a3563460c943d11952c88bd0d13a69a425793b6f7d2b09cf17c87cdc331f63c983436cef6888b1a8328e953b0b3bade3aabbfc4818a05af", [[]]}, 0x26b) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_open_procfs(0x0, &(0x7f0000000000)='timers\x00') 00:56:09 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) pipe(0x0) wait4(0x0, 0x0, 0x40000000, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000265000)=@req={0x0, 0x400, 0x2}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000740)={{{@in=@multicast2, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@broadcast}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route(r1, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=@ipv4_getnetconf={0x54, 0x52, 0x10, 0x70bd25, 0x25dfdbfd, {}, [@NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x1}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x9}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x5}, @NETCONFA_FORWARDING={0x8, 0x2, 0x8}, @NETCONFA_IFINDEX={0x8, 0x1, r2}, @NETCONFA_RP_FILTER={0x8, 0x3, 0x7fff}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x3}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0xe9}]}, 0x54}, 0x1, 0x0, 0x0, 0x3400c080}, 0x40) read(0xffffffffffffffff, &(0x7f0000000280)=""/152, 0x20000318) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r3, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) write$binfmt_elf64(r3, &(0x7f00000003c0)={{0x7f, 0x45, 0x4c, 0x46, 0x6, 0x81, 0x35, 0x4, 0x1, 0x59ad6aa4a884dd63, 0x3, 0x0, 0x13d, 0x40, 0x26e, 0x8000, 0x1f, 0x38, 0x1, 0x8, 0x8, 0x3}, [{0x6, 0x3, 0xefa, 0x1, 0x81, 0x80000000, 0x0, 0x9}, {0x7, 0x2, 0x7ff, 0xfff, 0x1, 0x4, 0x0, 0x800b}], "5ad165d3d87709dd80c73c9fa8b6ef39a345e1b2327e38197c13f3be9248c0f2161632606ce45b5c7d7349c883946ca190a061f77e1020dc808b86b4e3c7b2a6128e2d3b16a4ec69ad8c276d1a038ddc59bd46a7a37061ed24ba41f62de7aaf1c073c43333bee7ed0979404acecab631d46b591f921ec0a584aeb912342ff4f104ff960a3563460c943d11952c88bd0d13a69a425793b6f7d2b09cf17c87cdc331f63c983436cef6888b1a8328e953b0b3bade3aabbfc4818a05af", [[]]}, 0x26b) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_open_procfs(0x0, &(0x7f0000000000)='timers\x00') 00:56:09 executing program 5: socket$pppoe(0x18, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x3f00, 0x0, 0x0, 0x4, 0x0, {}, {0xffffffff}, {0x1}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}) 00:56:09 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_open_dev$usbmon(0x0, 0x1, 0x48000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) stat(&(0x7f0000000240)='./file0/file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(0xffffffffffffffff, &(0x7f0000001b80)) socket(0x11, 0x2, 0x5) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r3, 0x1, 0x14, &(0x7f0000000040), 0x50) getsockopt$IP6T_SO_GET_ENTRIES(r3, 0x29, 0x41, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/405], &(0x7f0000000340)=0x1) fsetxattr$trusted_overlay_redirect(r2, &(0x7f0000000200)='trusted.overlay.redirect\x00', &(0x7f0000000280)='./file0/file0\x00', 0xe, 0x0) getsockname$tipc(0xffffffffffffffff, 0x0, &(0x7f0000000080)) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000001400)={{0x1, 0x0, @identifier="8e0f03f7e12b88d1af81f7c5a6bb175f"}, 0x67, [], "ed760111b8363e2de90692d0bc7e0a89824d3c77730403363ce0521cdcb1973b558cbd01ebf95bd9529fe3c5a95dcf31792e3e463d875b955a13582aeaddf6af34a98934ad6944b87292af67aec51fd37bd761db93cf6623d8683956791c956c97d76a9fd8df5d"}) lstat(&(0x7f0000000000)='./file0/file0\x00', &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000100)=0x0) r6 = getegid() r7 = socket$inet_tcp(0x2, 0x1, 0x0) r8 = fcntl$dupfd(r7, 0x0, r7) getsockopt$sock_cred(r8, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) setresuid(r9, r9, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003ec0)={0x0, 0x0, 0x0}, 0x0) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, r10) r11 = openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$DRM_IOCTL_AGP_INFO(r11, 0x80386433, &(0x7f0000000bc0)=""/4096) getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0x194) setresuid(r12, r12, 0x0) r13 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r14 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r14, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) waitid(0x1, r14, &(0x7f0000000100), 0x80000004, &(0x7f0000000180)) r15 = shmget$private(0x0, 0x3000, 0x20, &(0x7f0000ffa000/0x3000)=nil) shmctl$SHM_STAT_ANY(r15, 0xf, &(0x7f0000000540)=""/221) shmctl$IPC_SET(r15, 0x1, &(0x7f0000000180)={{0x3, r9, r10, r12, r6, 0x42, 0x7}, 0x803ff, 0x2, 0xfffffffffffffffd, 0x0, r13, r14, 0x5}) shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000840)={{0x0, r1, r6, 0x0, r4, 0x50}, 0xd7, 0xfffffffffffffffe, 0x1000, 0x8000, r5}) r16 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000280)='/dev/nullb0\x00', 0x4400, 0x0) preadv(r16, &(0x7f0000000040)=[{&(0x7f0000000400)=""/4096, 0x3ffc00}], 0x1, 0x0) 00:56:10 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) pipe(0x0) wait4(0x0, 0x0, 0x40000000, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000265000)=@req={0x0, 0x400}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000740)={{{@in=@multicast2, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@broadcast}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route(r1, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=@ipv4_getnetconf={0x54, 0x52, 0x10, 0x70bd25, 0x25dfdbfd, {}, [@NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x1}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x9}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x5}, @NETCONFA_FORWARDING={0x8, 0x2, 0x8}, @NETCONFA_IFINDEX={0x8, 0x1, r2}, @NETCONFA_RP_FILTER={0x8, 0x3, 0x7fff}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x3}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0xe9}]}, 0x54}, 0x1, 0x0, 0x0, 0x3400c080}, 0x40) read(0xffffffffffffffff, &(0x7f0000000280)=""/152, 0x20000318) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/keys\x00', 0x0, 0x0) r4 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r4, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) write$binfmt_elf64(r4, &(0x7f00000003c0)={{0x7f, 0x45, 0x4c, 0x46, 0x6, 0x81, 0x35, 0x4, 0x1, 0x59ad6aa4a884dd63, 0x3, 0x0, 0x13d, 0x40, 0x26e, 0x8000, 0x1f, 0x38, 0x1, 0x8, 0x8, 0x3}, [{0x6, 0x3, 0xefa, 0x1, 0x81, 0x80000000, 0x0, 0x9}, {0x7, 0x2, 0x7ff, 0xfff, 0x1, 0x4, 0x0, 0x800b}], "5ad165d3d87709dd80c73c9fa8b6ef39a345e1b2327e38197c13f3be9248c0f2161632606ce45b5c7d7349c883946ca190a061f77e1020dc808b86b4e3c7b2a6128e2d3b16a4ec69ad8c276d1a038ddc59bd46a7a37061ed24ba41f62de7aaf1c073c43333bee7ed0979404acecab631d46b591f921ec0a584aeb912342ff4f104ff960a3563460c943d11952c88bd0d13a69a425793b6f7d2b09cf17c87cdc331f63c98", [[]]}, 0x254) read(r3, &(0x7f0000000280)=""/152, 0x20000318) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x280800, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$DRM_IOCTL_MODE_SETCRTC(0xffffffffffffffff, 0xc06864a2, &(0x7f0000000000)={0x0, 0x0, 0x20}) 00:56:10 executing program 3: r0 = socket$pppoe(0x18, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r1, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r1, 0xc04064a0, &(0x7f0000000200)={&(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000140)=[0x0, 0x0], &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7, 0x8, 0x2, 0x9}) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x2, @link_local, 'team0\x00'}}, 0x1e) r2 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r2, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {0x0, 0x3}, {0xffffffff}, {0x1}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) r3 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r3, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) ioctl$TUNSETSTEERINGEBPF(r3, 0x800454e0, &(0x7f0000000280)=r1) 00:56:10 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) pipe(0x0) wait4(0x0, 0x0, 0x40000000, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000265000)=@req={0x0, 0x400, 0x2}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000740)={{{@in=@multicast2, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@broadcast}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route(r1, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=@ipv4_getnetconf={0x54, 0x52, 0x10, 0x70bd25, 0x25dfdbfd, {}, [@NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x1}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x9}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x5}, @NETCONFA_FORWARDING={0x8, 0x2, 0x8}, @NETCONFA_IFINDEX={0x8, 0x1, r2}, @NETCONFA_RP_FILTER={0x8, 0x3, 0x7fff}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x3}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0xe9}]}, 0x54}, 0x1, 0x0, 0x0, 0x3400c080}, 0x40) read(0xffffffffffffffff, &(0x7f0000000280)=""/152, 0x20000318) openat$procfs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/keys\x00', 0x0, 0x0) r3 = openat$fb0(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r3, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) write$binfmt_elf64(r3, &(0x7f00000003c0)={{0x7f, 0x45, 0x4c, 0x46, 0x6, 0x81, 0x35, 0x4, 0x1, 0x59ad6aa4a884dd63, 0x3, 0x0, 0x13d, 0x40, 0x26e, 0x8000, 0x1f, 0x38, 0x1, 0x8, 0x8, 0x3}, [{0x6, 0x3, 0xefa, 0x1, 0x81, 0x80000000, 0x0, 0x9}, {0x7, 0x2, 0x7ff, 0xfff, 0x1, 0x4, 0x0, 0x800b}], "5ad165d3d87709dd80c73c9fa8b6ef39a345e1b2327e38197c13f3be9248c0f2161632606ce45b5c7d7349c883946ca190a061f77e1020dc808b86b4e3c7b2a6128e2d3b16a4ec69ad8c276d1a038ddc59bd46a7a37061ed24ba41f62de7aaf1c073c43333bee7ed0979404acecab631d46b591f921ec0a584aeb912342ff4f104ff960a3563460c943d11952c88bd0d13a69a425793b6f7d2b09cf17c87cdc331f63c983436cef6888b1a8328e953b0b3bade3aabbfc4818a05af", [[]]}, 0x26b) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_open_procfs(0x0, &(0x7f0000000000)='timers\x00') 00:56:10 executing program 5: socket$pppoe(0x18, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x4000, 0x0, 0x0, 0x4, 0x0, {}, {0xffffffff}, {0x1}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}) 00:56:11 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) pipe(0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=@ipv4_getnetconf={0x3c, 0x52, 0x10, 0x70bd25, 0x25dfdbfd, {}, [@NETCONFA_PROXY_NEIGH={0x8}, @NETCONFA_IFINDEX={0x8}, @NETCONFA_RP_FILTER={0x8}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x3}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0xe9}]}, 0x3c}, 0x1, 0x0, 0x0, 0x3400c080}, 0x40) r1 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r1, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x3, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) r2 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x406, 0x200000) write$binfmt_elf64(r2, &(0x7f0000000640)={{0x7f, 0x45, 0x4c, 0x46, 0xc6, 0x3, 0x4, 0x7f, 0x80a, 0x2, 0x3, 0x1f80000, 0x261, 0x40, 0xca, 0x6, 0x6, 0x38, 0x2, 0x9647, 0xd5f, 0x8001}, [{0x7, 0x6, 0x200, 0x63621b5e, 0x7, 0x100, 0xca100000}], "bb15f345c05698490c4d0104bb9bf7546b8ca61b9ebe1fd4253d78801a1045a02e205bf559cb740dd945e0af3c4ad81297657daf2f68416c90a7fe01865f4e0a1500a35e7fe8359340c56b1dd6", [[], [], [], [], [], [], [], [], []]}, 0x9c5) write$binfmt_elf64(r1, &(0x7f00000003c0)={{0x7f, 0x45, 0x4c, 0x46, 0x6, 0x81, 0x35, 0x4, 0x1, 0x59ad6aa4a884dd63, 0x3, 0x0, 0x13d, 0x40, 0x26e, 0x8000, 0x1f, 0x38, 0x1, 0x8, 0x8, 0x3}, [{0x6, 0x3, 0xefa, 0x1, 0x81, 0x80000000, 0x0, 0x9}, {0x7, 0x2, 0x7ff, 0xfff, 0x1, 0x4, 0x0, 0x800b}], "5ad165d3d87709dd80c73c9fa8b6ef39a345e1b2327e38197c13f3be9248c0f2161632606ce45b5c7d7349c883946ca190a061f77e1020dc808b86b4e3c7b2a6128e2d3b16a4ec69ad8c276d1a038ddc59bd46a7a37061ed24ba41f62de7aaf1c073c43333bee7ed0979404acecab631d46b591f921ec0a584aeb912342ff4f104ff960a3563460c943d11952c88bd0d13a69a425793b6f7d2b09cf17c87cdc331f63c983436cef6888b1a8328e953b0b3bade3aabbfc4818a05af", [[]]}, 0x26b) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_open_procfs(0x0, &(0x7f0000000000)='timers\x00') r3 = open(&(0x7f0000000280)='./file0\x00', 0x581880, 0x8) openat$cgroup_procs(r3, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) ioctl$VFIO_SET_IOMMU(r3, 0x3b66, 0x2) 00:56:11 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) pipe(0x0) wait4(0x0, 0x0, 0x40000000, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000265000)=@req={0x0, 0x400, 0x2}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000740)={{{@in=@multicast2, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@broadcast}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route(r1, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=@ipv4_getnetconf={0x54, 0x52, 0x10, 0x70bd25, 0x25dfdbfd, {}, [@NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x1}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x9}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x5}, @NETCONFA_FORWARDING={0x8, 0x2, 0x8}, @NETCONFA_IFINDEX={0x8, 0x1, r2}, @NETCONFA_RP_FILTER={0x8, 0x3, 0x7fff}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x3}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0xe9}]}, 0x54}, 0x1, 0x0, 0x0, 0x3400c080}, 0x40) read(0xffffffffffffffff, &(0x7f0000000280)=""/152, 0x20000318) openat$procfs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/keys\x00', 0x0, 0x0) r3 = openat$fb0(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r3, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) write$binfmt_elf64(r3, &(0x7f00000003c0)={{0x7f, 0x45, 0x4c, 0x46, 0x6, 0x81, 0x35, 0x4, 0x1, 0x59ad6aa4a884dd63, 0x3, 0x0, 0x13d, 0x40, 0x26e, 0x8000, 0x1f, 0x38, 0x1, 0x8, 0x8, 0x3}, [{0x6, 0x3, 0xefa, 0x1, 0x81, 0x80000000, 0x0, 0x9}, {0x7, 0x2, 0x7ff, 0xfff, 0x1, 0x4, 0x0, 0x800b}], "5ad165d3d87709dd80c73c9fa8b6ef39a345e1b2327e38197c13f3be9248c0f2161632606ce45b5c7d7349c883946ca190a061f77e1020dc808b86b4e3c7b2a6128e2d3b16a4ec69ad8c276d1a038ddc59bd46a7a37061ed24ba41f62de7aaf1c073c43333bee7ed0979404acecab631d46b591f921ec0a584aeb912342ff4f104ff960a3563460c943d11952c88bd0d13a69a425793b6f7d2b09cf17c87cdc331f63c983436cef6888b1a8328e953b0b3bade3aabbfc4818a05af", [[]]}, 0x26b) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_open_procfs(0x0, &(0x7f0000000000)='timers\x00') 00:56:11 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_open_dev$usbmon(0x0, 0x1, 0x48000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) stat(&(0x7f0000000240)='./file0/file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(0xffffffffffffffff, &(0x7f0000001b80)) socket(0x11, 0x2, 0x5) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r3, 0x1, 0x14, &(0x7f0000000040), 0x50) getsockopt$IP6T_SO_GET_ENTRIES(r3, 0x29, 0x41, &(0x7f0000000480)=ANY=[@ANYBLOB="6e2f740000edffffffffffffff00000000000000000000000000000000000000ad0000005086f3915e59ad8184af4045c4e742fa881d66411baabaa82dda6d71f825249ec2eb0ad398766b6b870bba11fc00df87700a78319e5f5d955a5eb0f50e2dcd95623e3eba93f21d4733f6d4834e398f5ba4540b18afc3c2a92ff6e4a89dc029fdd87fc0c2ca637f5ead98feb48d1bfe6451a583e519234bd5297e8a8bf569ff90077ba1cef2ea64c8f027947915a33e26b9d8b4fb56ba4d86df286c34e0cd9715e6b39dcccf4eb92a1706ed98b4aafd220eecfac13859aaab4dc07cd467149066f2f637c1e58f02faf49d72752753fe6beceb9d14b1ab3832cab4d59f892cb6f3689b67eaf81e929525a7fe0f2ea0892194387f7d085ea12c8842b8790911042b2a48b65c40087bd66593e0cfc29843b29738147ea75bb6c3d9664dc189fca97c43ed585ebb0c2a03782d916c709f6fdeca72784a8ac21d3ff8c9551290ea0000000000000049d4bb98580f9f7b7da060b127fd66ae6ad3c8753701b37ed619b2ed3efe862100"/405], &(0x7f0000000340)=0x1) fsetxattr$trusted_overlay_redirect(r2, &(0x7f0000000200)='trusted.overlay.redirect\x00', &(0x7f0000000280)='./file0/file0\x00', 0xe, 0x0) getsockname$tipc(0xffffffffffffffff, 0x0, &(0x7f0000000080)) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000001400)={{0x1, 0x0, @identifier="8e0f03f7e12b88d1af81f7c5a6bb175f"}, 0x67, [], "ed760111b8363e2de90692d0bc7e0a89824d3c77730403363ce0521cdcb1973b558cbd01ebf95bd9529fe3c5a95dcf31792e3e463d875b955a13582aeaddf6af34a98934ad6944b87292af67aec51fd37bd761db93cf6623d8683956791c956c97d76a9fd8df5d"}) lstat(&(0x7f0000000000)='./file0/file0\x00', &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000100)=0x0) r6 = getegid() r7 = socket$inet_tcp(0x2, 0x1, 0x0) r8 = fcntl$dupfd(r7, 0x0, r7) getsockopt$sock_cred(r8, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) setresuid(r9, r9, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003ec0)={0x0, 0x0, 0x0}, 0x0) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, r10) r11 = openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$DRM_IOCTL_AGP_INFO(r11, 0x80386433, &(0x7f0000000bc0)=""/4096) getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0x194) setresuid(r12, r12, 0x0) r13 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r14 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r14, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) waitid(0x1, r14, &(0x7f0000000100), 0x80000004, &(0x7f0000000180)) r15 = shmget$private(0x0, 0x3000, 0x20, &(0x7f0000ffa000/0x3000)=nil) shmctl$SHM_STAT_ANY(r15, 0xf, &(0x7f0000000540)=""/221) shmctl$IPC_SET(r15, 0x1, &(0x7f0000000180)={{0x3, r9, r10, r12, r6, 0x42, 0x7}, 0x803ff, 0x2, 0xfffffffffffffffd, 0x0, r13, r14, 0x5}) shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000840)={{0x0, r1, r6, 0x0, r4, 0x50}, 0xd7, 0xfffffffffffffffe, 0x1000, 0x8000, r5}) r16 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000280)='/dev/nullb0\x00', 0x4400, 0x0) preadv(r16, &(0x7f0000000040)=[{&(0x7f0000000400)=""/4096, 0x3ffc00}], 0x1, 0x0) 00:56:11 executing program 5: socket$pppoe(0x18, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0xff01, 0x0, 0x0, 0x4, 0x0, {}, {0xffffffff}, {0x1}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}) 00:56:11 executing program 3: r0 = socket$pppoe(0x18, 0x1, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(0xffffffffffffffff, 0xc028ae92, &(0x7f00000000c0)={0x2, 0x400}) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x2, @link_local, 'team0\x00'}}, 0x1e) r1 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r1, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) r2 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r2, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) pipe(&(0x7f0000000140)) accept$unix(0xffffffffffffffff, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) r3 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r3, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) ioctl$FIGETBSZ(r3, 0x2, &(0x7f0000000100)) ioctl$FBIOPUT_VSCREENINFO(0xffffffffffffffff, 0x4601, &(0x7f0000000000)={0x300, 0x320, 0x0, 0x0, 0x0, 0xfffffffe, 0x4, 0x0, {0x0, 0x3, 0x1}, {0xffffffff, 0x7ff}, {0x1}, {0x0, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, 0x2}) 00:56:11 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) pipe(0x0) wait4(0x0, 0x0, 0x40000000, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000265000)=@req={0x0, 0x400}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000740)={{{@in=@multicast2, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@broadcast}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route(r1, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=@ipv4_getnetconf={0x54, 0x52, 0x10, 0x70bd25, 0x25dfdbfd, {}, [@NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x1}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x9}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x5}, @NETCONFA_FORWARDING={0x8, 0x2, 0x8}, @NETCONFA_IFINDEX={0x8, 0x1, r2}, @NETCONFA_RP_FILTER={0x8, 0x3, 0x7fff}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x3}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0xe9}]}, 0x54}, 0x1, 0x0, 0x0, 0x3400c080}, 0x40) read(0xffffffffffffffff, &(0x7f0000000280)=""/152, 0x20000318) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/keys\x00', 0x0, 0x0) r4 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r4, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) write$binfmt_elf64(r4, &(0x7f00000003c0)={{0x7f, 0x45, 0x4c, 0x46, 0x6, 0x81, 0x35, 0x4, 0x1, 0x59ad6aa4a884dd63, 0x3, 0x0, 0x13d, 0x40, 0x26e, 0x8000, 0x1f, 0x38, 0x1, 0x8, 0x8, 0x3}, [{0x6, 0x3, 0xefa, 0x1, 0x81, 0x80000000, 0x0, 0x9}, {0x7, 0x2, 0x7ff, 0xfff, 0x1, 0x4, 0x0, 0x800b}], "5ad165d3d87709dd80c73c9fa8b6ef39a345e1b2327e38197c13f3be9248c0f2161632606ce45b5c7d7349c883946ca190a061f77e1020dc808b86b4e3c7b2a6128e2d3b16a4ec69ad8c276d1a038ddc59bd46a7a37061ed24ba41f62de7aaf1c073c43333bee7ed0979404acecab631d46b591f921ec0a584aeb912342ff4f104ff960a3563460c943d11952c88bd0d13a69a425793b6f7d2b09cf17c87cdc331f63c983436cef6888b1a8328e953b0", [[]]}, 0x260) read(r3, &(0x7f0000000280)=""/152, 0x20000318) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x280800, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$DRM_IOCTL_MODE_SETCRTC(0xffffffffffffffff, 0xc06864a2, &(0x7f0000000000)={0x0, 0x0, 0x20}) 00:56:12 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) stat(&(0x7f0000000240)='./file0/file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(0xffffffffffffffff, &(0x7f0000001b80)) socket(0x11, 0x2, 0x5) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r4, 0x1, 0x14, &(0x7f0000000040), 0x50) getsockopt$IP6T_SO_GET_ENTRIES(r4, 0x29, 0x41, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/405], &(0x7f0000000340)=0x1) fsetxattr$trusted_overlay_redirect(r3, &(0x7f0000000200)='trusted.overlay.redirect\x00', &(0x7f0000000280)='./file0/file0\x00', 0xe, 0x0) getsockname$tipc(0xffffffffffffffff, 0x0, &(0x7f0000000080)) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, 0x0) lstat(&(0x7f0000000000)='./file0/file0\x00', &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000100)=0x0) r7 = getegid() r8 = socket$inet_tcp(0x2, 0x1, 0x0) r9 = fcntl$dupfd(r8, 0x0, r8) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) setresuid(r10, r10, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003ec0)={0x0, 0x0, 0x0}, 0x0) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, r11) r12 = openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$DRM_IOCTL_AGP_INFO(r12, 0x80386433, &(0x7f0000000bc0)=""/4096) getsockopt$sock_cred(r12, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0x194) setresuid(r13, r13, 0x0) r14 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r15 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r15, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) waitid(0x1, r15, &(0x7f0000000100), 0x80000004, &(0x7f0000000180)) r16 = shmget$private(0x0, 0x3000, 0x20, &(0x7f0000ffa000/0x3000)=nil) shmctl$SHM_STAT_ANY(r16, 0xf, &(0x7f0000000540)=""/221) shmctl$IPC_SET(r16, 0x1, &(0x7f0000000180)={{0x3, r10, r11, r13, r7, 0x42, 0x7}, 0x803ff, 0x2, 0xfffffffffffffffd, 0x0, r14, r15, 0x5}) shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000840)={{0x0, r2, r7, 0x0, r5, 0x50}, 0xd7, 0xfffffffffffffffe, 0x1000, 0x8000, r6}) r17 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000280)='/dev/nullb0\x00', 0x4400, 0x0) preadv(r17, &(0x7f0000000040)=[{&(0x7f0000000400)=""/4096, 0x3ffc00}], 0x1, 0x0) 00:56:12 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) pipe(0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=@ipv4_getnetconf={0x3c, 0x52, 0x10, 0x70bd25, 0x25dfdbfd, {}, [@NETCONFA_PROXY_NEIGH={0x8}, @NETCONFA_IFINDEX={0x8}, @NETCONFA_FORWARDING={0x8, 0x2, 0x2}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x3}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x1f}]}, 0x3c}, 0x1, 0x0, 0x0, 0x801}, 0x24004040) r1 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r1, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) write$binfmt_elf64(r1, &(0x7f0000000780)=ANY=[@ANYBLOB="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"/936], 0x26b) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_open_procfs(0x0, &(0x7f0000000000)='timers\x00') 00:56:12 executing program 3: userfaultfd(0x0) r0 = socket$pppoe(0x18, 0x1, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x82000, 0x130) openat$cgroup_procs(r1, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) ioctl$DRM_IOCTL_AGP_INFO(r2, 0x80386433, &(0x7f0000000280)=""/10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfdffffffffffffff, r1, 0x0) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x2, @link_local, 'team0\x00'}}, 0x1e) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000265000)=@req={0x0, 0x0, 0x2}, 0x10) getsockopt$TIPC_DEST_DROPPABLE(0xffffffffffffffff, 0x10f, 0x81, &(0x7f0000000080), &(0x7f00000001c0)=0x4) r3 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$VIDIOC_S_SELECTION(0xffffffffffffffff, 0xc040565f, &(0x7f0000000040)={0x6, 0x103, 0x1, {0x0, 0xaa39, 0xfffffffb, 0xf67}}) ioctl$FBIOPUT_VSCREENINFO(r3, 0x4601, &(0x7f00000000c0)={0xcb0, 0x480, 0x0, 0x280, 0x0, 0x0, 0x8, 0x0, {0x0, 0x3}, {0x3, 0x1, 0x1}, {0x2000001, 0x7}, {}, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x81, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0xa}) 00:56:12 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) pipe(0x0) wait4(0x0, 0x0, 0x40000000, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000265000)=@req={0x0, 0x400}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000740)={{{@in=@multicast2, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@broadcast}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route(r1, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=@ipv4_getnetconf={0x54, 0x52, 0x10, 0x70bd25, 0x25dfdbfd, {}, [@NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x1}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x9}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x5}, @NETCONFA_FORWARDING={0x8, 0x2, 0x8}, @NETCONFA_IFINDEX={0x8, 0x1, r2}, @NETCONFA_RP_FILTER={0x8, 0x3, 0x7fff}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x3}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0xe9}]}, 0x54}, 0x1, 0x0, 0x0, 0x3400c080}, 0x40) read(0xffffffffffffffff, &(0x7f0000000280)=""/152, 0x20000318) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/keys\x00', 0x0, 0x0) r4 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r4, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) write$binfmt_elf64(r4, &(0x7f00000003c0)={{0x7f, 0x45, 0x4c, 0x46, 0x6, 0x81, 0x35, 0x4, 0x1, 0x59ad6aa4a884dd63, 0x3, 0x0, 0x13d, 0x40, 0x26e, 0x8000, 0x1f, 0x38, 0x1, 0x8, 0x8, 0x3}, [{0x6, 0x3, 0xefa, 0x1, 0x81, 0x80000000, 0x0, 0x9}, {0x7, 0x2, 0x7ff, 0xfff, 0x1, 0x4, 0x0, 0x800b}], "5ad165d3d87709dd80c73c9fa8b6ef39a345e1b2327e38197c13f3be9248c0f2161632606ce45b5c7d7349c883946ca190a061f77e1020dc808b86b4e3c7b2a6128e2d3b16a4ec69ad8c276d1a038ddc59bd46a7a37061ed24ba41f62de7aaf1c073c43333bee7ed0979404acecab631d46b591f921ec0a584aeb912342ff4f104ff960a3563460c943d11952c88bd0d13a69a425793b6f7d2b09cf17c87cdc331f63c983436cef6888b1a8328e953b0", [[]]}, 0x260) read(r3, &(0x7f0000000280)=""/152, 0x20000318) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x280800, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$DRM_IOCTL_MODE_SETCRTC(0xffffffffffffffff, 0xc06864a2, &(0x7f0000000000)={0x0, 0x0, 0x20}) 00:56:12 executing program 5: socket$pppoe(0x18, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x1000000, 0x0, 0x0, 0x4, 0x0, {}, {0xffffffff}, {0x1}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}) 00:56:12 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) pipe(0x0) wait4(0x0, 0x0, 0x40000000, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000265000)=@req={0x0, 0x400}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000740)={{{@in=@multicast2, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@broadcast}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route(r1, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=@ipv4_getnetconf={0x54, 0x52, 0x10, 0x70bd25, 0x25dfdbfd, {}, [@NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x1}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x9}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x5}, @NETCONFA_FORWARDING={0x8, 0x2, 0x8}, @NETCONFA_IFINDEX={0x8, 0x1, r2}, @NETCONFA_RP_FILTER={0x8, 0x3, 0x7fff}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x3}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0xe9}]}, 0x54}, 0x1, 0x0, 0x0, 0x3400c080}, 0x40) read(0xffffffffffffffff, &(0x7f0000000280)=""/152, 0x20000318) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/keys\x00', 0x0, 0x0) r4 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r4, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) write$binfmt_elf64(r4, &(0x7f00000003c0)={{0x7f, 0x45, 0x4c, 0x46, 0x6, 0x81, 0x35, 0x4, 0x1, 0x59ad6aa4a884dd63, 0x3, 0x0, 0x13d, 0x40, 0x26e, 0x8000, 0x1f, 0x38, 0x1, 0x8, 0x8, 0x3}, [{0x6, 0x3, 0xefa, 0x1, 0x81, 0x80000000, 0x0, 0x9}, {0x7, 0x2, 0x7ff, 0xfff, 0x1, 0x4, 0x0, 0x800b}], "5ad165d3d87709dd80c73c9fa8b6ef39a345e1b2327e38197c13f3be9248c0f2161632606ce45b5c7d7349c883946ca190a061f77e1020dc808b86b4e3c7b2a6128e2d3b16a4ec69ad8c276d1a038ddc59bd46a7a37061ed24ba41f62de7aaf1c073c43333bee7ed0979404acecab631d46b591f921ec0a584aeb912342ff4f104ff960a3563460c943d11952c88bd0d13a69a425793b6f7d2b09cf17c87cdc331f63c983436cef6888b1a8328e953b0", [[]]}, 0x260) read(r3, &(0x7f0000000280)=""/152, 0x20000318) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x280800, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$DRM_IOCTL_MODE_SETCRTC(0xffffffffffffffff, 0xc06864a2, &(0x7f0000000000)={0x0, 0x0, 0x20}) 00:56:12 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) pipe(0x0) wait4(0x0, 0x0, 0x40000000, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000265000)=@req={0x0, 0x400, 0x2}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000740)={{{@in=@multicast2, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@broadcast}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route(r1, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=@ipv4_getnetconf={0x54, 0x52, 0x10, 0x70bd25, 0x25dfdbfd, {}, [@NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x1}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x9}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x5}, @NETCONFA_FORWARDING={0x8, 0x2, 0x8}, @NETCONFA_IFINDEX={0x8, 0x1, r2}, @NETCONFA_RP_FILTER={0x8, 0x3, 0x7fff}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x3}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0xe9}]}, 0x54}, 0x1, 0x0, 0x0, 0x3400c080}, 0x40) read(0xffffffffffffffff, &(0x7f0000000280)=""/152, 0x20000318) openat$procfs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/keys\x00', 0x0, 0x0) r3 = openat$fb0(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r3, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) write$binfmt_elf64(r3, &(0x7f00000003c0)={{0x7f, 0x45, 0x4c, 0x46, 0x6, 0x81, 0x35, 0x4, 0x1, 0x59ad6aa4a884dd63, 0x3, 0x0, 0x13d, 0x40, 0x26e, 0x8000, 0x1f, 0x38, 0x1, 0x8, 0x8, 0x3}, [{0x6, 0x3, 0xefa, 0x1, 0x81, 0x80000000, 0x0, 0x9}, {0x7, 0x2, 0x7ff, 0xfff, 0x1, 0x4, 0x0, 0x800b}], "5ad165d3d87709dd80c73c9fa8b6ef39a345e1b2327e38197c13f3be9248c0f2161632606ce45b5c7d7349c883946ca190a061f77e1020dc808b86b4e3c7b2a6128e2d3b16a4ec69ad8c276d1a038ddc59bd46a7a37061ed24ba41f62de7aaf1c073c43333bee7ed0979404acecab631d46b591f921ec0a584aeb912342ff4f104ff960a3563460c943d11952c88bd0d13a69a425793b6f7d2b09cf17c87cdc331f63c983436cef6888b1a8328e953b0b3bade3aabbfc4818a05af", [[]]}, 0x26b) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_open_procfs(0x0, &(0x7f0000000000)='timers\x00') 00:56:13 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) pipe(0x0) wait4(0x0, 0x0, 0x40000000, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000265000)=@req={0x0, 0x400, 0x2}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000740)={{{@in=@multicast2, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@broadcast}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route(r1, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=@ipv4_getnetconf={0x54, 0x52, 0x10, 0x70bd25, 0x25dfdbfd, {}, [@NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x1}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x9}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x5}, @NETCONFA_FORWARDING={0x8, 0x2, 0x8}, @NETCONFA_IFINDEX={0x8, 0x1, r2}, @NETCONFA_RP_FILTER={0x8, 0x3, 0x7fff}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x3}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0xe9}]}, 0x54}, 0x1, 0x0, 0x0, 0x3400c080}, 0x40) read(0xffffffffffffffff, &(0x7f0000000280)=""/152, 0x20000318) openat$procfs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/keys\x00', 0x0, 0x0) r3 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(0xffffffffffffffff, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) write$binfmt_elf64(r3, &(0x7f00000003c0)={{0x7f, 0x45, 0x4c, 0x46, 0x6, 0x81, 0x35, 0x4, 0x1, 0x59ad6aa4a884dd63, 0x3, 0x0, 0x13d, 0x40, 0x26e, 0x8000, 0x1f, 0x38, 0x1, 0x8, 0x8, 0x3}, [{0x6, 0x3, 0xefa, 0x1, 0x81, 0x80000000, 0x0, 0x9}, {0x7, 0x2, 0x7ff, 0xfff, 0x1, 0x4, 0x0, 0x800b}], "5ad165d3d87709dd80c73c9fa8b6ef39a345e1b2327e38197c13f3be9248c0f2161632606ce45b5c7d7349c883946ca190a061f77e1020dc808b86b4e3c7b2a6128e2d3b16a4ec69ad8c276d1a038ddc59bd46a7a37061ed24ba41f62de7aaf1c073c43333bee7ed0979404acecab631d46b591f921ec0a584aeb912342ff4f104ff960a3563460c943d11952c88bd0d13a69a425793b6f7d2b09cf17c87cdc331f63c983436cef6888b1a8328e953b0b3bade3aabbfc4818a05af", [[]]}, 0x26b) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_open_procfs(0x0, &(0x7f0000000000)='timers\x00') 00:56:13 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) stat(&(0x7f0000000240)='./file0/file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(0xffffffffffffffff, &(0x7f0000001b80)) socket(0x11, 0x2, 0x5) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r4, 0x1, 0x14, &(0x7f0000000040), 0x50) getsockopt$IP6T_SO_GET_ENTRIES(r4, 0x29, 0x41, &(0x7f0000000480)=ANY=[@ANYBLOB="6e2f740000edffffffffffffff00000000000000000000000000000000000000ad0000005086f3915e59ad8184af4045c4e742fa881d66411baabaa82dda6d71f825249ec2eb0ad398766b6b870bba11fc00df87700a78319e5f5d955a5eb0f50e2dcd95623e3eba93f21d4733f6d4834e398f5ba4540b18afc3c2a92ff6e4a89dc029fdd87fc0c2ca637f5ead98feb48d1bfe6451a583e519234bd5297e8a8bf569ff90077ba1cef2ea64c8f027947915a33e26b9d8b4fb56ba4d86df286c34e0cd9715e6b39dcccf4eb92a1706ed98b4aafd220eecfac13859aaab4dc07cd467149066f2f637c1e58f02faf49d72752753fe6beceb9d14b1ab3832cab4d59f892cb6f3689b67eaf81e929525a7fe0f2ea0892194387f7d085ea12c8842b8790911042b2a48b65c40087bd66593e0cfc29843b29738147ea75bb6c3d9664dc189fca97c43ed585ebb0c2a03782d916c709f6fdeca72784a8ac21d3ff8c9551290ea0000000000000049d4bb98580f9f7b7da060b127fd66ae6ad3c8753701b37ed619b2ed3efe862100"/405], &(0x7f0000000340)=0x1) fsetxattr$trusted_overlay_redirect(r3, &(0x7f0000000200)='trusted.overlay.redirect\x00', &(0x7f0000000280)='./file0/file0\x00', 0xe, 0x0) getsockname$tipc(0xffffffffffffffff, 0x0, &(0x7f0000000080)) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, 0x0) lstat(&(0x7f0000000000)='./file0/file0\x00', &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000100)=0x0) r7 = getegid() r8 = socket$inet_tcp(0x2, 0x1, 0x0) r9 = fcntl$dupfd(r8, 0x0, r8) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) setresuid(r10, r10, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003ec0)={0x0, 0x0, 0x0}, 0x0) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, r11) r12 = openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$DRM_IOCTL_AGP_INFO(r12, 0x80386433, &(0x7f0000000bc0)=""/4096) getsockopt$sock_cred(r12, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0x194) setresuid(r13, r13, 0x0) r14 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r15 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r15, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) waitid(0x1, r15, &(0x7f0000000100), 0x80000004, &(0x7f0000000180)) r16 = shmget$private(0x0, 0x3000, 0x20, &(0x7f0000ffa000/0x3000)=nil) shmctl$SHM_STAT_ANY(r16, 0xf, &(0x7f0000000540)=""/221) shmctl$IPC_SET(r16, 0x1, &(0x7f0000000180)={{0x3, r10, r11, r13, r7, 0x42, 0x7}, 0x803ff, 0x2, 0xfffffffffffffffd, 0x0, r14, r15, 0x5}) shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000840)={{0x0, r2, r7, 0x0, r5, 0x50}, 0xd7, 0xfffffffffffffffe, 0x1000, 0x8000, r6}) r17 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000280)='/dev/nullb0\x00', 0x4400, 0x0) preadv(r17, &(0x7f0000000040)=[{&(0x7f0000000400)=""/4096, 0x3ffc00}], 0x1, 0x0) 00:56:13 executing program 3: r0 = socket$pppoe(0x18, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x80}, 0x0, 0xfdfffffffffffff7, 0xffffffffffffffff, 0x0) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x2, @link_local, 'team0\x00'}}, 0x1e) r1 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r1, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {0x0, 0x3}, {0xffffffff}, {0x1}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) 00:56:13 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) pipe(0x0) wait4(0x0, 0x0, 0x40000000, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000265000)=@req={0x0, 0x400}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000740)={{{@in=@multicast2, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@broadcast}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route(r1, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=@ipv4_getnetconf={0x54, 0x52, 0x10, 0x70bd25, 0x25dfdbfd, {}, [@NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x1}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x9}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x5}, @NETCONFA_FORWARDING={0x8, 0x2, 0x8}, @NETCONFA_IFINDEX={0x8, 0x1, r2}, @NETCONFA_RP_FILTER={0x8, 0x3, 0x7fff}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x3}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0xe9}]}, 0x54}, 0x1, 0x0, 0x0, 0x3400c080}, 0x40) read(0xffffffffffffffff, &(0x7f0000000280)=""/152, 0x20000318) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/keys\x00', 0x0, 0x0) r4 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r4, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) write$binfmt_elf64(r4, &(0x7f00000003c0)={{0x7f, 0x45, 0x4c, 0x46, 0x6, 0x81, 0x35, 0x4, 0x1, 0x59ad6aa4a884dd63, 0x3, 0x0, 0x13d, 0x40, 0x26e, 0x8000, 0x1f, 0x38, 0x1, 0x8, 0x8, 0x3}, [{0x6, 0x3, 0xefa, 0x1, 0x81, 0x80000000, 0x0, 0x9}, {0x7, 0x2, 0x7ff, 0xfff, 0x1, 0x4, 0x0, 0x800b}], "5ad165d3d87709dd80c73c9fa8b6ef39a345e1b2327e38197c13f3be9248c0f2161632606ce45b5c7d7349c883946ca190a061f77e1020dc808b86b4e3c7b2a6128e2d3b16a4ec69ad8c276d1a038ddc59bd46a7a37061ed24ba41f62de7aaf1c073c43333bee7ed0979404acecab631d46b591f921ec0a584aeb912342ff4f104ff960a3563460c943d11952c88bd0d13a69a425793b6f7d2b09cf17c87cdc331f63c983436cef6888b1a8328e953b0b3bade3aabbf", [[]]}, 0x266) read(r3, &(0x7f0000000280)=""/152, 0x20000318) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x280800, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$DRM_IOCTL_MODE_SETCRTC(0xffffffffffffffff, 0xc06864a2, &(0x7f0000000000)={0x0, 0x0, 0x20}) 00:56:13 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$IP_SET_OP_GET_BYINDEX(r0, 0x1, 0x53, &(0x7f0000000100)={0x7, 0x7, 0x3}, &(0x7f0000000200)=0x28) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) pipe(0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=@ipv4_getnetconf={0x3c, 0x52, 0x10, 0x70bd25, 0x25dfdbfd, {}, [@NETCONFA_PROXY_NEIGH={0x8}, @NETCONFA_IFINDEX={0x8}, @NETCONFA_RP_FILTER={0x8}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x3}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0xe9}]}, 0x3c}, 0x1, 0x0, 0x0, 0x3400c080}, 0x40) r2 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r2, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) write$binfmt_elf64(r2, &(0x7f00000003c0)={{0x7f, 0x45, 0x4c, 0x46, 0x6, 0x81, 0x35, 0x4, 0x1, 0x59ad6aa4a884dd63, 0x3, 0x0, 0x13d, 0x40, 0x26e, 0x8000, 0x1f, 0x38, 0x1, 0x8, 0x8, 0x3}, [{0x6, 0x3, 0xefa, 0x1, 0x81, 0x80000000, 0x0, 0x9}, {0x7, 0x2, 0x7ff, 0xfff, 0x1, 0x4, 0x0, 0x800b}], "5ad165d3d87709dd80c73c9fa8b6ef39a345e1b2327e38197c13f3be9248c0f2161632606ce45b5c7d7349c883946ca190a061f77e1020dc808b86b4e3c7b2a6128e2d3b16a4ec69ad8c276d1a038ddc59bd46a7a37061ed24ba41f62de7aaf1c073c43333bee7ed0979404acecab631d46b591f921ec0a584aeb912342ff4f104ff960a3563460c943d11952c88bd0d13a69a425793b6f7d2b09cf17c87cdc331f63c983436cef6888b1a8328e953b0b3bade3aabbfc4818a05af", [[]]}, 0x26b) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_open_procfs(0x0, &(0x7f0000000000)='timers\x00') 00:56:13 executing program 5: socket$pppoe(0x18, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x2000000, 0x0, 0x0, 0x4, 0x0, {}, {0xffffffff}, {0x1}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}) 00:56:13 executing program 3: r0 = socket$pppoe(0x18, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x2, @link_local, 'team0\x00'}}, 0x1e) r1 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r1, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x1f, 0x4, 0x0, {0x0, 0x3}, {0xffffffff}, {0x1}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}) 00:56:14 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) pipe(0x0) wait4(0x0, 0x0, 0x40000000, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000265000)=@req={0x0, 0x400, 0x2}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000740)={{{@in=@multicast2, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@broadcast}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route(r1, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=@ipv4_getnetconf={0x54, 0x52, 0x10, 0x70bd25, 0x25dfdbfd, {}, [@NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x1}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x9}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x5}, @NETCONFA_FORWARDING={0x8, 0x2, 0x8}, @NETCONFA_IFINDEX={0x8, 0x1, r2}, @NETCONFA_RP_FILTER={0x8, 0x3, 0x7fff}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x3}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0xe9}]}, 0x54}, 0x1, 0x0, 0x0, 0x3400c080}, 0x40) read(0xffffffffffffffff, &(0x7f0000000280)=""/152, 0x20000318) openat$procfs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/keys\x00', 0x0, 0x0) r3 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(0xffffffffffffffff, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) write$binfmt_elf64(r3, &(0x7f00000003c0)={{0x7f, 0x45, 0x4c, 0x46, 0x6, 0x81, 0x35, 0x4, 0x1, 0x59ad6aa4a884dd63, 0x3, 0x0, 0x13d, 0x40, 0x26e, 0x8000, 0x1f, 0x38, 0x1, 0x8, 0x8, 0x3}, [{0x6, 0x3, 0xefa, 0x1, 0x81, 0x80000000, 0x0, 0x9}, {0x7, 0x2, 0x7ff, 0xfff, 0x1, 0x4, 0x0, 0x800b}], "5ad165d3d87709dd80c73c9fa8b6ef39a345e1b2327e38197c13f3be9248c0f2161632606ce45b5c7d7349c883946ca190a061f77e1020dc808b86b4e3c7b2a6128e2d3b16a4ec69ad8c276d1a038ddc59bd46a7a37061ed24ba41f62de7aaf1c073c43333bee7ed0979404acecab631d46b591f921ec0a584aeb912342ff4f104ff960a3563460c943d11952c88bd0d13a69a425793b6f7d2b09cf17c87cdc331f63c983436cef6888b1a8328e953b0b3bade3aabbfc4818a05af", [[]]}, 0x26b) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_open_procfs(0x0, &(0x7f0000000000)='timers\x00') 00:56:14 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) pipe(0x0) wait4(0x0, 0x0, 0x40000000, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000265000)=@req={0x0, 0x400}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000740)={{{@in=@multicast2, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@broadcast}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route(r1, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=@ipv4_getnetconf={0x54, 0x52, 0x10, 0x70bd25, 0x25dfdbfd, {}, [@NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x1}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x9}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x5}, @NETCONFA_FORWARDING={0x8, 0x2, 0x8}, @NETCONFA_IFINDEX={0x8, 0x1, r2}, @NETCONFA_RP_FILTER={0x8, 0x3, 0x7fff}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x3}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0xe9}]}, 0x54}, 0x1, 0x0, 0x0, 0x3400c080}, 0x40) read(0xffffffffffffffff, &(0x7f0000000280)=""/152, 0x20000318) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/keys\x00', 0x0, 0x0) r4 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r4, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) write$binfmt_elf64(r4, &(0x7f00000003c0)={{0x7f, 0x45, 0x4c, 0x46, 0x6, 0x81, 0x35, 0x4, 0x1, 0x59ad6aa4a884dd63, 0x3, 0x0, 0x13d, 0x40, 0x26e, 0x8000, 0x1f, 0x38, 0x1, 0x8, 0x8, 0x3}, [{0x6, 0x3, 0xefa, 0x1, 0x81, 0x80000000, 0x0, 0x9}, {0x7, 0x2, 0x7ff, 0xfff, 0x1, 0x4, 0x0, 0x800b}], "5ad165d3d87709dd80c73c9fa8b6ef39a345e1b2327e38197c13f3be9248c0f2161632606ce45b5c7d7349c883946ca190a061f77e1020dc808b86b4e3c7b2a6128e2d3b16a4ec69ad8c276d1a038ddc59bd46a7a37061ed24ba41f62de7aaf1c073c43333bee7ed0979404acecab631d46b591f921ec0a584aeb912342ff4f104ff960a3563460c943d11952c88bd0d13a69a425793b6f7d2b09cf17c87cdc331f63c983436cef6888b1a8328e953b0b3bade3aabbf", [[]]}, 0x266) read(r3, &(0x7f0000000280)=""/152, 0x20000318) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x280800, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$DRM_IOCTL_MODE_SETCRTC(0xffffffffffffffff, 0xc06864a2, &(0x7f0000000000)={0x0, 0x0, 0x20}) 00:56:14 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) pipe(0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=@ipv4_getnetconf={0x3c, 0x52, 0x10, 0x70bd24, 0x25dfdbfd, {}, [@NETCONFA_PROXY_NEIGH={0x8}, @NETCONFA_IFINDEX={0x8}, @NETCONFA_RP_FILTER={0x8}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x5}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0xe6}]}, 0x3c}, 0x1, 0x0, 0x0, 0x3400c080}, 0xd4) r2 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r2, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) write$binfmt_elf64(r2, &(0x7f00000003c0)={{0x7f, 0x45, 0x4c, 0x46, 0x6, 0x81, 0x35, 0x4, 0x1, 0x59ad6aa4a884dd63, 0x3, 0x0, 0x13d, 0x40, 0x26e, 0x8000, 0x1f, 0x38, 0x1, 0x8, 0x8, 0x3}, [{0x6, 0x3, 0xefa, 0x1, 0x81, 0x80000000, 0x0, 0x9}, {0x7, 0x2, 0x7ff, 0xfff, 0x1, 0x4, 0x0, 0x800b}], "5ad165d3d87709dd80c73c9fa8b6ef39a345e1b2327e38197c13f3be9248c0f2161632606ce45b5c7d7349c883946ca190a061f77e1020dc808b86b4e3c7b2a6128e2d3b16a4ec69ad8c276d1a038ddc59bd46a7a37061ed24ba41f62de7aaf1c073c43333bee7ed0979404acecab631d46b591f921ec0a584aeb912342ff4f104ff960a3563460c943d11952c88bd0d13a69a425793b6f7d2b09cf17c87cdc331f63c983436cef6888b1a8328e953b0b3bade3aabbfc4818a05af", [[]]}, 0x26b) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) fsetxattr$security_capability(r0, &(0x7f0000000100)='security.capability\x00', &(0x7f0000000200)=@v2={0x2000000, [{0x2, 0xcf}, {0x0, 0x7fff}]}, 0x14, 0x1) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='timers\x00') openat$cgroup_subtree(r3, &(0x7f0000000280)='cgroup.subtree_control\x00', 0x2, 0x0) 00:56:14 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) stat(&(0x7f0000000240)='./file0/file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(0xffffffffffffffff, &(0x7f0000001b80)) socket(0x11, 0x2, 0x5) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r4, 0x1, 0x14, &(0x7f0000000040), 0x50) getsockopt$IP6T_SO_GET_ENTRIES(r4, 0x29, 0x41, &(0x7f0000000480)=ANY=[@ANYBLOB="6e2f740000edffffffffffffff00000000000000000000000000000000000000ad0000005086f3915e59ad8184af4045c4e742fa881d66411baabaa82dda6d71f825249ec2eb0ad398766b6b870bba11fc00df87700a78319e5f5d955a5eb0f50e2dcd95623e3eba93f21d4733f6d4834e398f5ba4540b18afc3c2a92ff6e4a89dc029fdd87fc0c2ca637f5ead98feb48d1bfe6451a583e519234bd5297e8a8bf569ff90077ba1cef2ea64c8f027947915a33e26b9d8b4fb56ba4d86df286c34e0cd9715e6b39dcccf4eb92a1706ed98b4aafd220eecfac13859aaab4dc07cd467149066f2f637c1e58f02faf49d72752753fe6beceb9d14b1ab3832cab4d59f892cb6f3689b67eaf81e929525a7fe0f2ea0892194387f7d085ea12c8842b8790911042b2a48b65c40087bd66593e0cfc29843b29738147ea75bb6c3d9664dc189fca97c43ed585ebb0c2a03782d916c709f6fdeca72784a8ac21d3ff8c9551290ea0000000000000049d4bb98580f9f7b7da060b127fd66ae6ad3c8753701b37ed619b2ed3efe862100"/405], &(0x7f0000000340)=0x1) fsetxattr$trusted_overlay_redirect(r3, &(0x7f0000000200)='trusted.overlay.redirect\x00', &(0x7f0000000280)='./file0/file0\x00', 0xe, 0x0) getsockname$tipc(0xffffffffffffffff, 0x0, &(0x7f0000000080)) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, 0x0) lstat(&(0x7f0000000000)='./file0/file0\x00', &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000100)=0x0) r7 = getegid() r8 = socket$inet_tcp(0x2, 0x1, 0x0) r9 = fcntl$dupfd(r8, 0x0, r8) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) setresuid(r10, r10, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003ec0)={0x0, 0x0, 0x0}, 0x0) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, r11) r12 = openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$DRM_IOCTL_AGP_INFO(r12, 0x80386433, &(0x7f0000000bc0)=""/4096) getsockopt$sock_cred(r12, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0x194) setresuid(r13, r13, 0x0) r14 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r15 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r15, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) waitid(0x1, r15, &(0x7f0000000100), 0x80000004, &(0x7f0000000180)) r16 = shmget$private(0x0, 0x3000, 0x20, &(0x7f0000ffa000/0x3000)=nil) shmctl$SHM_STAT_ANY(r16, 0xf, &(0x7f0000000540)=""/221) shmctl$IPC_SET(r16, 0x1, &(0x7f0000000180)={{0x3, r10, r11, r13, r7, 0x42, 0x7}, 0x803ff, 0x2, 0xfffffffffffffffd, 0x0, r14, r15, 0x5}) shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000840)={{0x0, r2, r7, 0x0, r5, 0x50}, 0xd7, 0xfffffffffffffffe, 0x1000, 0x8000, r6}) r17 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000280)='/dev/nullb0\x00', 0x4400, 0x0) preadv(r17, &(0x7f0000000040)=[{&(0x7f0000000400)=""/4096, 0x3ffc00}], 0x1, 0x0) 00:56:14 executing program 3: r0 = socket$pppoe(0x18, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x2, @link_local, 'team0\x00'}}, 0x1e) r1 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r1, 0x4601, &(0x7f0000000000)={0x0, 0x25e0, 0x356, 0x0, 0x0, 0x81, 0x4, 0x0, {0x0, 0x3}, {0xffffffff}, {0x1}, {}, 0x0, 0x0, 0x0, 0x7, 0x0, 0xffffffff}) r2 = syz_open_dev$media(&(0x7f00000000c0)='/dev/media#\x00', 0x7, 0x288000) r3 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r3, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r3, 0x40605346, &(0x7f00000001c0)={0x100, 0x0, {0x3, 0x0, 0x2, 0x1}, 0x3}) r4 = socket(0x1e, 0x4, 0x0) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000300)={0xa, 0x0, 0x0, @mcast2}, &(0x7f0000000340)=0x1c) r5 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r5, 0x10f, 0x87, &(0x7f0000265000)=@req={0x0, 0x0, 0x2}, 0x10) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r5, 0x28, 0x2, &(0x7f00000002c0)=0x20, 0x8) setsockopt$packet_tx_ring(r4, 0x10f, 0x87, &(0x7f0000265000)=@req={0x0, 0x0, 0x2}, 0x10) accept$inet(r4, &(0x7f0000000140)={0x2, 0x0, @local}, &(0x7f0000000280)=0x10) ioctl$PPPIOCGCHAN(r2, 0x80047437, &(0x7f0000000100)) 00:56:15 executing program 5: socket$pppoe(0x18, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x3000000, 0x0, 0x0, 0x4, 0x0, {}, {0xffffffff}, {0x1}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}) 00:56:15 executing program 3: r0 = socket$pppoe(0x18, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="30000000180001ad84927300000000000a00000000000000000000001400050000000000000000000000000000000001"], 0x30}}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r3, &(0x7f0000000140), 0x492492492492670, 0x0) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x2, @link_local, 'team0\x00'}}, 0x1e) r4 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r4, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {0x0, 0x3}, {0xffffffff}, {0x1}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) 00:56:15 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) pipe(0x0) wait4(0x0, 0x0, 0x40000000, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000265000)=@req={0x0, 0x400}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000740)={{{@in=@multicast2, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@broadcast}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route(r1, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=@ipv4_getnetconf={0x54, 0x52, 0x10, 0x70bd25, 0x25dfdbfd, {}, [@NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x1}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x9}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x5}, @NETCONFA_FORWARDING={0x8, 0x2, 0x8}, @NETCONFA_IFINDEX={0x8, 0x1, r2}, @NETCONFA_RP_FILTER={0x8, 0x3, 0x7fff}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x3}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0xe9}]}, 0x54}, 0x1, 0x0, 0x0, 0x3400c080}, 0x40) read(0xffffffffffffffff, &(0x7f0000000280)=""/152, 0x20000318) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/keys\x00', 0x0, 0x0) r4 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r4, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) write$binfmt_elf64(r4, &(0x7f00000003c0)={{0x7f, 0x45, 0x4c, 0x46, 0x6, 0x81, 0x35, 0x4, 0x1, 0x59ad6aa4a884dd63, 0x3, 0x0, 0x13d, 0x40, 0x26e, 0x8000, 0x1f, 0x38, 0x1, 0x8, 0x8, 0x3}, [{0x6, 0x3, 0xefa, 0x1, 0x81, 0x80000000, 0x0, 0x9}, {0x7, 0x2, 0x7ff, 0xfff, 0x1, 0x4, 0x0, 0x800b}], "5ad165d3d87709dd80c73c9fa8b6ef39a345e1b2327e38197c13f3be9248c0f2161632606ce45b5c7d7349c883946ca190a061f77e1020dc808b86b4e3c7b2a6128e2d3b16a4ec69ad8c276d1a038ddc59bd46a7a37061ed24ba41f62de7aaf1c073c43333bee7ed0979404acecab631d46b591f921ec0a584aeb912342ff4f104ff960a3563460c943d11952c88bd0d13a69a425793b6f7d2b09cf17c87cdc331f63c983436cef6888b1a8328e953b0b3bade3aabbf", [[]]}, 0x266) read(r3, &(0x7f0000000280)=""/152, 0x20000318) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x280800, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$DRM_IOCTL_MODE_SETCRTC(0xffffffffffffffff, 0xc06864a2, &(0x7f0000000000)={0x0, 0x0, 0x20}) 00:56:15 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) pipe(0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=@ipv4_getnetconf={0x3c, 0x52, 0x10, 0x70bd25, 0x25dfdbfd, {}, [@NETCONFA_PROXY_NEIGH={0x8}, @NETCONFA_IFINDEX={0x8}, @NETCONFA_RP_FILTER={0x8}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x3}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0xe9}]}, 0x3c}, 0x1, 0x0, 0x0, 0x3400c080}, 0x40) r1 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r1, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) write$binfmt_elf64(r1, &(0x7f00000003c0)={{0x7f, 0x45, 0x4c, 0x46, 0x6, 0x81, 0x35, 0x4, 0x1, 0x59ad6aa4a884dd63, 0x3, 0x0, 0x13d, 0x40, 0x26e, 0x8000, 0x1f, 0x38, 0x1, 0x8, 0x8, 0x3}, [{0x6, 0x3, 0xefa, 0x1, 0x81, 0x80000000, 0x0, 0x9}, {0x7, 0x2, 0x7ff, 0xfff, 0x1, 0x4, 0x0, 0x800b}], "5ad165d3d87709dd80c73c9fa8b6ef39a345e1b2327e38197c13f3be9248c0f2161632606ce45b5c7d7349c883946ca190a061f77e1020dc808b86b4e3c7b2a6128e2d3b16a4ec69ad8c276d1a038ddc59bd46a7a37061ed24ba41f62de7aaf1c073c43333bee7ed0979404acecab631d46b591f921ec0a584aeb912342ff4f104ff960a3563460c943d11952c88bd0d13a69a425793b6f7d2b09cf17c87cdc331f63c983436cef6888b1a8328e953b0b3bade3aabbfc4818a05af", [[]]}, 0x26b) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r2, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) ioctl$SNDCTL_DSP_GETFMTS(r2, 0x8004500b, &(0x7f0000000100)=0x1) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_open_procfs(0x0, &(0x7f0000000000)='timers\x00') 00:56:15 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) pipe(0x0) wait4(0x0, 0x0, 0x40000000, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000265000)=@req={0x0, 0x400, 0x2}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000740)={{{@in=@multicast2, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@broadcast}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route(r1, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=@ipv4_getnetconf={0x54, 0x52, 0x10, 0x70bd25, 0x25dfdbfd, {}, [@NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x1}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x9}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x5}, @NETCONFA_FORWARDING={0x8, 0x2, 0x8}, @NETCONFA_IFINDEX={0x8, 0x1, r2}, @NETCONFA_RP_FILTER={0x8, 0x3, 0x7fff}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x3}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0xe9}]}, 0x54}, 0x1, 0x0, 0x0, 0x3400c080}, 0x40) read(0xffffffffffffffff, &(0x7f0000000280)=""/152, 0x20000318) openat$procfs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/keys\x00', 0x0, 0x0) r3 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(0xffffffffffffffff, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) write$binfmt_elf64(r3, &(0x7f00000003c0)={{0x7f, 0x45, 0x4c, 0x46, 0x6, 0x81, 0x35, 0x4, 0x1, 0x59ad6aa4a884dd63, 0x3, 0x0, 0x13d, 0x40, 0x26e, 0x8000, 0x1f, 0x38, 0x1, 0x8, 0x8, 0x3}, [{0x6, 0x3, 0xefa, 0x1, 0x81, 0x80000000, 0x0, 0x9}, {0x7, 0x2, 0x7ff, 0xfff, 0x1, 0x4, 0x0, 0x800b}], "5ad165d3d87709dd80c73c9fa8b6ef39a345e1b2327e38197c13f3be9248c0f2161632606ce45b5c7d7349c883946ca190a061f77e1020dc808b86b4e3c7b2a6128e2d3b16a4ec69ad8c276d1a038ddc59bd46a7a37061ed24ba41f62de7aaf1c073c43333bee7ed0979404acecab631d46b591f921ec0a584aeb912342ff4f104ff960a3563460c943d11952c88bd0d13a69a425793b6f7d2b09cf17c87cdc331f63c983436cef6888b1a8328e953b0b3bade3aabbfc4818a05af", [[]]}, 0x26b) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_open_procfs(0x0, &(0x7f0000000000)='timers\x00') 00:56:15 executing program 5: socket$pppoe(0x18, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x4000000, 0x0, 0x0, 0x4, 0x0, {}, {0xffffffff}, {0x1}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}) 00:56:16 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) pipe(0x0) wait4(0x0, 0x0, 0x40000000, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000265000)=@req={0x0, 0x400}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000740)={{{@in=@multicast2, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@broadcast}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route(r1, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=@ipv4_getnetconf={0x54, 0x52, 0x10, 0x70bd25, 0x25dfdbfd, {}, [@NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x1}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x9}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x5}, @NETCONFA_FORWARDING={0x8, 0x2, 0x8}, @NETCONFA_IFINDEX={0x8, 0x1, r2}, @NETCONFA_RP_FILTER={0x8, 0x3, 0x7fff}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x3}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0xe9}]}, 0x54}, 0x1, 0x0, 0x0, 0x3400c080}, 0x40) read(0xffffffffffffffff, &(0x7f0000000280)=""/152, 0x20000318) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/keys\x00', 0x0, 0x0) r4 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r4, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) write$binfmt_elf64(r4, &(0x7f00000003c0)={{0x7f, 0x45, 0x4c, 0x46, 0x6, 0x81, 0x35, 0x4, 0x1, 0x59ad6aa4a884dd63, 0x3, 0x0, 0x13d, 0x40, 0x26e, 0x8000, 0x1f, 0x38, 0x1, 0x8, 0x8, 0x3}, [{0x6, 0x3, 0xefa, 0x1, 0x81, 0x80000000, 0x0, 0x9}, {0x7, 0x2, 0x7ff, 0xfff, 0x1, 0x4, 0x0, 0x800b}], "5ad165d3d87709dd80c73c9fa8b6ef39a345e1b2327e38197c13f3be9248c0f2161632606ce45b5c7d7349c883946ca190a061f77e1020dc808b86b4e3c7b2a6128e2d3b16a4ec69ad8c276d1a038ddc59bd46a7a37061ed24ba41f62de7aaf1c073c43333bee7ed0979404acecab631d46b591f921ec0a584aeb912342ff4f104ff960a3563460c943d11952c88bd0d13a69a425793b6f7d2b09cf17c87cdc331f63c983436cef6888b1a8328e953b0b3bade3aabbfc4818a", [[]]}, 0x269) read(r3, &(0x7f0000000280)=""/152, 0x20000318) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x280800, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$DRM_IOCTL_MODE_SETCRTC(0xffffffffffffffff, 0xc06864a2, &(0x7f0000000000)={0x0, 0x0, 0x20}) 00:56:16 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) stat(&(0x7f0000000240)='./file0/file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(0xffffffffffffffff, &(0x7f0000001b80)) socket(0x11, 0x2, 0x5) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r4, 0x1, 0x14, &(0x7f0000000040), 0x50) getsockopt$IP6T_SO_GET_ENTRIES(r4, 0x29, 0x41, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/405], &(0x7f0000000340)=0x1) fsetxattr$trusted_overlay_redirect(r3, &(0x7f0000000200)='trusted.overlay.redirect\x00', &(0x7f0000000280)='./file0/file0\x00', 0xe, 0x0) getsockname$tipc(0xffffffffffffffff, 0x0, &(0x7f0000000080)) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000001400)={{0x0, 0x0, @identifier="8e0f03f7e12b88d1af81f7c5a6bb175f"}, 0x67, [], "ed760111b8363e2de90692d0bc7e0a89824d3c77730403363ce0521cdcb1973b558cbd01ebf95bd9529fe3c5a95dcf31792e3e463d875b955a13582aeaddf6af34a98934ad6944b87292af67aec51fd37bd761db93cf6623d8683956791c956c97d76a9fd8df5d"}) lstat(&(0x7f0000000000)='./file0/file0\x00', &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000100)=0x0) r7 = getegid() r8 = socket$inet_tcp(0x2, 0x1, 0x0) r9 = fcntl$dupfd(r8, 0x0, r8) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) setresuid(r10, r10, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003ec0)={0x0, 0x0, 0x0}, 0x0) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, r11) r12 = openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$DRM_IOCTL_AGP_INFO(r12, 0x80386433, &(0x7f0000000bc0)=""/4096) getsockopt$sock_cred(r12, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0x194) setresuid(r13, r13, 0x0) r14 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r15 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r15, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) waitid(0x1, r15, &(0x7f0000000100), 0x80000004, &(0x7f0000000180)) r16 = shmget$private(0x0, 0x3000, 0x20, &(0x7f0000ffa000/0x3000)=nil) shmctl$SHM_STAT_ANY(r16, 0xf, &(0x7f0000000540)=""/221) shmctl$IPC_SET(r16, 0x1, &(0x7f0000000180)={{0x3, r10, r11, r13, r7, 0x42, 0x7}, 0x803ff, 0x2, 0xfffffffffffffffd, 0x0, r14, r15, 0x5}) shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000840)={{0x0, r2, r7, 0x0, r5, 0x50}, 0xd7, 0xfffffffffffffffe, 0x1000, 0x8000, r6}) r17 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000280)='/dev/nullb0\x00', 0x4400, 0x0) preadv(r17, &(0x7f0000000040)=[{&(0x7f0000000400)=""/4096, 0x3ffc00}], 0x1, 0x0) 00:56:16 executing program 5: socket$pppoe(0x18, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x5000000, 0x0, 0x0, 0x4, 0x0, {}, {0xffffffff}, {0x1}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}) 00:56:16 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) stat(&(0x7f0000000240)='./file0/file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(0xffffffffffffffff, &(0x7f0000001b80)) socket(0x11, 0x2, 0x5) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r4, 0x1, 0x14, &(0x7f0000000040), 0x50) getsockopt$IP6T_SO_GET_ENTRIES(r4, 0x29, 0x41, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/405], &(0x7f0000000340)=0x1) fsetxattr$trusted_overlay_redirect(r3, &(0x7f0000000200)='trusted.overlay.redirect\x00', &(0x7f0000000280)='./file0/file0\x00', 0xe, 0x0) getsockname$tipc(0xffffffffffffffff, 0x0, &(0x7f0000000080)) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000001400)={{0x0, 0x0, @identifier="8e0f03f7e12b88d1af81f7c5a6bb175f"}, 0x67, [], "ed760111b8363e2de90692d0bc7e0a89824d3c77730403363ce0521cdcb1973b558cbd01ebf95bd9529fe3c5a95dcf31792e3e463d875b955a13582aeaddf6af34a98934ad6944b87292af67aec51fd37bd761db93cf6623d8683956791c956c97d76a9fd8df5d"}) lstat(&(0x7f0000000000)='./file0/file0\x00', &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000100)=0x0) r7 = getegid() r8 = socket$inet_tcp(0x2, 0x1, 0x0) r9 = fcntl$dupfd(r8, 0x0, r8) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) setresuid(r10, r10, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003ec0)={0x0, 0x0, 0x0}, 0x0) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, r11) r12 = openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$DRM_IOCTL_AGP_INFO(r12, 0x80386433, &(0x7f0000000bc0)=""/4096) getsockopt$sock_cred(r12, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0x194) setresuid(r13, r13, 0x0) r14 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r15 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r15, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) waitid(0x1, r15, &(0x7f0000000100), 0x80000004, &(0x7f0000000180)) r16 = shmget$private(0x0, 0x3000, 0x20, &(0x7f0000ffa000/0x3000)=nil) shmctl$SHM_STAT_ANY(r16, 0xf, &(0x7f0000000540)=""/221) shmctl$IPC_SET(r16, 0x1, &(0x7f0000000180)={{0x3, r10, r11, r13, r7, 0x42, 0x7}, 0x803ff, 0x2, 0xfffffffffffffffd, 0x0, r14, r15, 0x5}) shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000840)={{0x0, r2, r7, 0x0, r5, 0x50}, 0xd7, 0xfffffffffffffffe, 0x1000, 0x8000, r6}) r17 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000280)='/dev/nullb0\x00', 0x4400, 0x0) preadv(r17, &(0x7f0000000040)=[{&(0x7f0000000400)=""/4096, 0x3ffc00}], 0x1, 0x0) 00:56:16 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) pipe(0x0) wait4(0x0, 0x0, 0x40000000, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000265000)=@req={0x0, 0x400, 0x2}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000740)={{{@in=@multicast2, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@broadcast}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route(r1, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=@ipv4_getnetconf={0x54, 0x52, 0x10, 0x70bd25, 0x25dfdbfd, {}, [@NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x1}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x9}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x5}, @NETCONFA_FORWARDING={0x8, 0x2, 0x8}, @NETCONFA_IFINDEX={0x8, 0x1, r2}, @NETCONFA_RP_FILTER={0x8, 0x3, 0x7fff}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x3}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0xe9}]}, 0x54}, 0x1, 0x0, 0x0, 0x3400c080}, 0x40) read(0xffffffffffffffff, &(0x7f0000000280)=""/152, 0x20000318) openat$procfs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/keys\x00', 0x0, 0x0) r3 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r3, 0x4601, 0x0) write$binfmt_elf64(r3, &(0x7f00000003c0)={{0x7f, 0x45, 0x4c, 0x46, 0x6, 0x81, 0x35, 0x4, 0x1, 0x59ad6aa4a884dd63, 0x3, 0x0, 0x13d, 0x40, 0x26e, 0x8000, 0x1f, 0x38, 0x1, 0x8, 0x8, 0x3}, [{0x6, 0x3, 0xefa, 0x1, 0x81, 0x80000000, 0x0, 0x9}, {0x7, 0x2, 0x7ff, 0xfff, 0x1, 0x4, 0x0, 0x800b}], "5ad165d3d87709dd80c73c9fa8b6ef39a345e1b2327e38197c13f3be9248c0f2161632606ce45b5c7d7349c883946ca190a061f77e1020dc808b86b4e3c7b2a6128e2d3b16a4ec69ad8c276d1a038ddc59bd46a7a37061ed24ba41f62de7aaf1c073c43333bee7ed0979404acecab631d46b591f921ec0a584aeb912342ff4f104ff960a3563460c943d11952c88bd0d13a69a425793b6f7d2b09cf17c87cdc331f63c983436cef6888b1a8328e953b0b3bade3aabbfc4818a05af", [[]]}, 0x26b) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_open_procfs(0x0, &(0x7f0000000000)='timers\x00') 00:56:17 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) pipe(0x0) wait4(0x0, 0x0, 0x40000000, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000265000)=@req={0x0, 0x400}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000740)={{{@in=@multicast2, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@broadcast}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route(r1, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=@ipv4_getnetconf={0x54, 0x52, 0x10, 0x70bd25, 0x25dfdbfd, {}, [@NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x1}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x9}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x5}, @NETCONFA_FORWARDING={0x8, 0x2, 0x8}, @NETCONFA_IFINDEX={0x8, 0x1, r2}, @NETCONFA_RP_FILTER={0x8, 0x3, 0x7fff}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x3}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0xe9}]}, 0x54}, 0x1, 0x0, 0x0, 0x3400c080}, 0x40) read(0xffffffffffffffff, &(0x7f0000000280)=""/152, 0x20000318) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/keys\x00', 0x0, 0x0) r4 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r4, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) write$binfmt_elf64(r4, &(0x7f00000003c0)={{0x7f, 0x45, 0x4c, 0x46, 0x6, 0x81, 0x35, 0x4, 0x1, 0x59ad6aa4a884dd63, 0x3, 0x0, 0x13d, 0x40, 0x26e, 0x8000, 0x1f, 0x38, 0x1, 0x8, 0x8, 0x3}, [{0x6, 0x3, 0xefa, 0x1, 0x81, 0x80000000, 0x0, 0x9}, {0x7, 0x2, 0x7ff, 0xfff, 0x1, 0x4, 0x0, 0x800b}], "5ad165d3d87709dd80c73c9fa8b6ef39a345e1b2327e38197c13f3be9248c0f2161632606ce45b5c7d7349c883946ca190a061f77e1020dc808b86b4e3c7b2a6128e2d3b16a4ec69ad8c276d1a038ddc59bd46a7a37061ed24ba41f62de7aaf1c073c43333bee7ed0979404acecab631d46b591f921ec0a584aeb912342ff4f104ff960a3563460c943d11952c88bd0d13a69a425793b6f7d2b09cf17c87cdc331f63c983436cef6888b1a8328e953b0b3bade3aabbfc4818a", [[]]}, 0x269) read(r3, &(0x7f0000000280)=""/152, 0x20000318) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x280800, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$DRM_IOCTL_MODE_SETCRTC(0xffffffffffffffff, 0xc06864a2, &(0x7f0000000000)={0x0, 0x0, 0x20}) 00:56:17 executing program 0: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x400, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0), 0x8}, 0x0, 0x0, 0x0, 0x0, 0x800000000000, 0x0, 0x3}, r0, 0x0, 0xffffffffffffffff, 0xa) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) pipe(0x0) r3 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r3, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) r4 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r4, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) ioctl$SNDCTL_DSP_SETTRIGGER(r4, 0x40045010, &(0x7f0000000100)=0x40) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f0000000280)=ANY=[@ANYBLOB="3c0000005200100025bd7000fddbfffffffffffffff900000008000100", @ANYRES32=0x0, @ANYBLOB="0800030000000000080006000300000008000500e9000000000000", @ANYRES16, @ANYPTR=&(0x7f0000000640)=ANY=[@ANYBLOB="73b4a8fad9f44480fd8acc08c0bd8988c149b8c886d2324b8fb0f2cf5b6b9ada438970d18e0f0fb96598fec1e3ab7e1d2e9e694e871d7cdbcbafdab1285db4e0de937e9e0e1c4d85f4c7397f5c36392d6782986605a41a23ccebadbdf1d65433e3e7184f7402a8469e0c719912f76c33b4edd7186571b619063007737dd44626088f3a89ae625bf01b20d488a6a14237e7c466651b50c7203937f5374ec3c0", @ANYRES32=0x0, @ANYPTR64, @ANYBLOB="cc437c6f04643324c6dc18d356ad2a47f4dfec20155fc0e5cecfb186822fefc05b81e0ed8e2ea83f9a955bf0af9abb8dfb2f43259ed84ed9e8ca313f90e7fcaae50e9f3ff62f1a49a8adc841e7e4af0d8c49cab1df3ca6fe4d63d267cfea7896ca42916692a456c6603ecffc99c2f61d03cbc59a6d56759b9d523e12072c28104868525925a16910442cb1b8ae0197e1e1cf949c1ce9a0a3bed98a9df02de8afdcebdb"]], 0x5}, 0x1, 0x0, 0x0, 0x3400c080}, 0x40) r5 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r5, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) write$binfmt_elf64(r1, &(0x7f00000003c0)={{0x7f, 0x45, 0x4c, 0x46, 0x6, 0x81, 0x35, 0x4, 0x1, 0x59ad6aa4a884dd63, 0x3, 0x0, 0x13d, 0x40, 0x26e, 0x8000, 0x1f, 0x38, 0x1, 0x8, 0x8, 0x3}, [{0x6, 0x3, 0xefa, 0x1, 0x81, 0x80000003, 0x0, 0x9}, {0x7, 0x2, 0x7ff, 0xfff, 0x1, 0x4, 0x0, 0x800b}], "5ad165d3d87709dd80c73c9fa8b6ef39a345e1b2327e38197c13f3be9248c0f2161632606ce45b5c7d7349c883946ca190a061f77e1020dc808b86b4e3c7b2a6128e2d3b16a4ec69ad8c276d1a038ddc59bd46a7a37061ed24ba41f62de7aaf1c073c43333bee7ed0979404acecab631d46b591f921ec0a584aeb912342ff4f104ff960a3563460c943d11952c88bd0d13a69a425793b6f7d2b09cf17c87cdc331f63c983436cef6888b1a8328e953b0b3bade3aabbfc4818a05af", [[]]}, 0x26b) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_open_procfs(0x0, &(0x7f0000000000)='timers\x00') 00:56:18 executing program 3: r0 = socket$pppoe(0x18, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x2, @link_local, 'team0\x00'}}, 0x1e) r1 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) r2 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r2, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {0x2000}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) r3 = dup(r2) ioctl$USBDEVFS_DISCONNECT_CLAIM(r3, 0x8108551b, &(0x7f00000001c0)={0xdd, 0x3, "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"}) ioctl$FBIOPUT_VSCREENINFO(r1, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {0x0, 0x3}, {0xffffffff}, {0x1}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) 00:56:18 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) pipe(0x0) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f00000002c0)={&(0x7f0000000280)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}) ioctl$DRM_IOCTL_MODE_SETPLANE(0xffffffffffffffff, 0xc03064b7, &(0x7f0000000300)={r1, 0x9, 0x6, 0x7f, 0x8, 0x5, 0x1, 0x10000, 0xfff, 0x3f, 0xa1, 0x2}) r2 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r2, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000a40)={&(0x7f0000000940)=ANY=[@ANYBLOB="3c0000005200100025bd7000fddbdf2502080005000000000008000100", @ANYRES64=r2, @ANYBLOB="0800030000000001080006000300000008000500e90000000000000400e5a5c683582bd8d565e2146511e2a1fa7ae585b51412c0f8c52ac7ada1fc8ac2f7f80b482960b77935260e9ab4e5ba15120104191224864a1cf64ae0557d022f1e6f1e89ff62be7547114da1f38add5431bf1633fa45a6b8464b7b282e19d16ba7943bd93838dbe2eb8f05ae3049765d9ffa9444344746bf3c52592725b78ba2740603c0566ced10287c46aae7c4", @ANYBLOB, @ANYRES32], 0x5}, 0x1, 0x0, 0x0, 0x3400c090}, 0x40) r3 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) getsockname$unix(0xffffffffffffffff, &(0x7f00000007c0)=@abs, &(0x7f0000000340)=0x6e) chroot(&(0x7f00000001c0)='./file0/file0\x00') ioctl$FBIOPUT_VSCREENINFO(r3, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) r4 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r4, 0x10f, 0x87, &(0x7f0000265000)=@req={0x0, 0x0, 0x2}, 0x10) setsockopt$IP_VS_SO_SET_EDITDEST(r4, 0x0, 0x489, &(0x7f0000000740)={{0x32, @multicast2, 0x4e24, 0x1, 'rr\x00', 0x3a, 0x7, 0x5a}, {@remote, 0x4e21, 0x10000, 0x58f, 0x1, 0x3ff}}, 0x44) write$binfmt_elf64(r3, &(0x7f00000003c0)={{0x7f, 0x45, 0x4c, 0x46, 0x6, 0x81, 0x35, 0x4, 0x1, 0x59ad6aa4a884dd63, 0x3, 0x0, 0x13d, 0x40, 0x26e, 0x8000, 0x1f, 0x38, 0x1, 0x8, 0x8, 0x3}, [{0x6, 0x3, 0xefa, 0x1, 0x81, 0x80000000, 0x0, 0x9}, {0x7, 0x2, 0x7ff, 0xfff, 0x1, 0x4, 0x0, 0x800b}], "5ad165d3d87709dd80c73c9fa8b6ef39a345e1b2327e38197c13f3be9248c0f2161632606ce45b5c7d7349c883946ca190a061f77e1020dc808b86b4e3c7b2a6128e2d3b16a4ec69ad8c276d1a038ddc59bd46a7a37061ed24ba41f62de7aaf1c073c43333bee7ed0979404acecab631d46b591f921ec0a584aeb912342ff4f104ff960a3563460c943d11952c88bd0d13a69a425793b6f7d2b09cf17c87cdc331f63c983436cef6888b1a8328e953b0b3bade3aabbfc4818a05af", [[]]}, 0x26b) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r5, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) r6 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r6, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r6, 0xc0086420, &(0x7f0000000100)={0x0}) ioctl$DRM_IOCTL_UNLOCK(r5, 0x4008642b, &(0x7f0000000200)={r7, 0x1b}) syz_open_procfs(0x0, &(0x7f0000000000)='timers\x00') 00:56:18 executing program 5: socket$pppoe(0x18, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x6000000, 0x0, 0x0, 0x4, 0x0, {}, {0xffffffff}, {0x1}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}) 00:56:18 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) pipe(0x0) wait4(0x0, 0x0, 0x40000000, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000265000)=@req={0x0, 0x400}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000740)={{{@in=@multicast2, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@broadcast}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route(r1, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=@ipv4_getnetconf={0x54, 0x52, 0x10, 0x70bd25, 0x25dfdbfd, {}, [@NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x1}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x9}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x5}, @NETCONFA_FORWARDING={0x8, 0x2, 0x8}, @NETCONFA_IFINDEX={0x8, 0x1, r2}, @NETCONFA_RP_FILTER={0x8, 0x3, 0x7fff}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x3}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0xe9}]}, 0x54}, 0x1, 0x0, 0x0, 0x3400c080}, 0x40) read(0xffffffffffffffff, &(0x7f0000000280)=""/152, 0x20000318) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/keys\x00', 0x0, 0x0) r4 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r4, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) write$binfmt_elf64(r4, &(0x7f00000003c0)={{0x7f, 0x45, 0x4c, 0x46, 0x6, 0x81, 0x35, 0x4, 0x1, 0x59ad6aa4a884dd63, 0x3, 0x0, 0x13d, 0x40, 0x26e, 0x8000, 0x1f, 0x38, 0x1, 0x8, 0x8, 0x3}, [{0x6, 0x3, 0xefa, 0x1, 0x81, 0x80000000, 0x0, 0x9}, {0x7, 0x2, 0x7ff, 0xfff, 0x1, 0x4, 0x0, 0x800b}], "5ad165d3d87709dd80c73c9fa8b6ef39a345e1b2327e38197c13f3be9248c0f2161632606ce45b5c7d7349c883946ca190a061f77e1020dc808b86b4e3c7b2a6128e2d3b16a4ec69ad8c276d1a038ddc59bd46a7a37061ed24ba41f62de7aaf1c073c43333bee7ed0979404acecab631d46b591f921ec0a584aeb912342ff4f104ff960a3563460c943d11952c88bd0d13a69a425793b6f7d2b09cf17c87cdc331f63c983436cef6888b1a8328e953b0b3bade3aabbfc4818a", [[]]}, 0x269) read(r3, &(0x7f0000000280)=""/152, 0x20000318) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x280800, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$DRM_IOCTL_MODE_SETCRTC(0xffffffffffffffff, 0xc06864a2, &(0x7f0000000000)={0x0, 0x0, 0x20}) 00:56:18 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) pipe(0x0) wait4(0x0, 0x0, 0x40000000, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000265000)=@req={0x0, 0x400, 0x2}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000740)={{{@in=@multicast2, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@broadcast}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route(r1, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=@ipv4_getnetconf={0x54, 0x52, 0x10, 0x70bd25, 0x25dfdbfd, {}, [@NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x1}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x9}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x5}, @NETCONFA_FORWARDING={0x8, 0x2, 0x8}, @NETCONFA_IFINDEX={0x8, 0x1, r2}, @NETCONFA_RP_FILTER={0x8, 0x3, 0x7fff}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x3}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0xe9}]}, 0x54}, 0x1, 0x0, 0x0, 0x3400c080}, 0x40) read(0xffffffffffffffff, &(0x7f0000000280)=""/152, 0x20000318) openat$procfs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/keys\x00', 0x0, 0x0) r3 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r3, 0x4601, 0x0) write$binfmt_elf64(r3, &(0x7f00000003c0)={{0x7f, 0x45, 0x4c, 0x46, 0x6, 0x81, 0x35, 0x4, 0x1, 0x59ad6aa4a884dd63, 0x3, 0x0, 0x13d, 0x40, 0x26e, 0x8000, 0x1f, 0x38, 0x1, 0x8, 0x8, 0x3}, [{0x6, 0x3, 0xefa, 0x1, 0x81, 0x80000000, 0x0, 0x9}, {0x7, 0x2, 0x7ff, 0xfff, 0x1, 0x4, 0x0, 0x800b}], "5ad165d3d87709dd80c73c9fa8b6ef39a345e1b2327e38197c13f3be9248c0f2161632606ce45b5c7d7349c883946ca190a061f77e1020dc808b86b4e3c7b2a6128e2d3b16a4ec69ad8c276d1a038ddc59bd46a7a37061ed24ba41f62de7aaf1c073c43333bee7ed0979404acecab631d46b591f921ec0a584aeb912342ff4f104ff960a3563460c943d11952c88bd0d13a69a425793b6f7d2b09cf17c87cdc331f63c983436cef6888b1a8328e953b0b3bade3aabbfc4818a05af", [[]]}, 0x26b) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_open_procfs(0x0, &(0x7f0000000000)='timers\x00') 00:56:18 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) stat(&(0x7f0000000240)='./file0/file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(0xffffffffffffffff, &(0x7f0000001b80)) socket(0x11, 0x2, 0x5) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r4, 0x1, 0x14, &(0x7f0000000040), 0x50) getsockopt$IP6T_SO_GET_ENTRIES(r4, 0x29, 0x41, &(0x7f0000000480)=ANY=[@ANYBLOB="6e2f740000edffffffffffffff00000000000000000000000000000000000000ad0000005086f3915e59ad8184af4045c4e742fa881d66411baabaa82dda6d71f825249ec2eb0ad398766b6b870bba11fc00df87700a78319e5f5d955a5eb0f50e2dcd95623e3eba93f21d4733f6d4834e398f5ba4540b18afc3c2a92ff6e4a89dc029fdd87fc0c2ca637f5ead98feb48d1bfe6451a583e519234bd5297e8a8bf569ff90077ba1cef2ea64c8f027947915a33e26b9d8b4fb56ba4d86df286c34e0cd9715e6b39dcccf4eb92a1706ed98b4aafd220eecfac13859aaab4dc07cd467149066f2f637c1e58f02faf49d72752753fe6beceb9d14b1ab3832cab4d59f892cb6f3689b67eaf81e929525a7fe0f2ea0892194387f7d085ea12c8842b8790911042b2a48b65c40087bd66593e0cfc29843b29738147ea75bb6c3d9664dc189fca97c43ed585ebb0c2a03782d916c709f6fdeca72784a8ac21d3ff8c9551290ea0000000000000049d4bb98580f9f7b7da060b127fd66ae6ad3c8753701b37ed619b2ed3efe862100"/405], &(0x7f0000000340)=0x1) fsetxattr$trusted_overlay_redirect(r3, &(0x7f0000000200)='trusted.overlay.redirect\x00', &(0x7f0000000280)='./file0/file0\x00', 0xe, 0x0) getsockname$tipc(0xffffffffffffffff, 0x0, &(0x7f0000000080)) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000001400)={{0x0, 0x0, @identifier="8e0f03f7e12b88d1af81f7c5a6bb175f"}, 0x67, [], "ed760111b8363e2de90692d0bc7e0a89824d3c77730403363ce0521cdcb1973b558cbd01ebf95bd9529fe3c5a95dcf31792e3e463d875b955a13582aeaddf6af34a98934ad6944b87292af67aec51fd37bd761db93cf6623d8683956791c956c97d76a9fd8df5d"}) lstat(&(0x7f0000000000)='./file0/file0\x00', &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000100)=0x0) r7 = getegid() r8 = socket$inet_tcp(0x2, 0x1, 0x0) r9 = fcntl$dupfd(r8, 0x0, r8) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) setresuid(r10, r10, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003ec0)={0x0, 0x0, 0x0}, 0x0) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, r11) r12 = openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$DRM_IOCTL_AGP_INFO(r12, 0x80386433, &(0x7f0000000bc0)=""/4096) getsockopt$sock_cred(r12, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0x194) setresuid(r13, r13, 0x0) r14 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r15 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r15, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) waitid(0x1, r15, &(0x7f0000000100), 0x80000004, &(0x7f0000000180)) r16 = shmget$private(0x0, 0x3000, 0x20, &(0x7f0000ffa000/0x3000)=nil) shmctl$SHM_STAT_ANY(r16, 0xf, &(0x7f0000000540)=""/221) shmctl$IPC_SET(r16, 0x1, &(0x7f0000000180)={{0x3, r10, r11, r13, r7, 0x42, 0x7}, 0x803ff, 0x2, 0xfffffffffffffffd, 0x0, r14, r15, 0x5}) shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000840)={{0x0, r2, r7, 0x0, r5, 0x50}, 0xd7, 0xfffffffffffffffe, 0x1000, 0x8000, r6}) r17 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000280)='/dev/nullb0\x00', 0x4400, 0x0) preadv(r17, &(0x7f0000000040)=[{&(0x7f0000000400)=""/4096, 0x3ffc00}], 0x1, 0x0) 00:56:19 executing program 3: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x201, 0x0) ioctl$SNDCTL_DSP_SPEED(r0, 0xc0045002, &(0x7f0000000080)) ioctl$SNDCTL_DSP_RESET(r0, 0x5000, 0x0) 00:56:19 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) pipe(0x0) wait4(0x0, 0x0, 0x40000000, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000265000)=@req={0x0, 0x400, 0x2}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000740)={{{@in=@multicast2, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@broadcast}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route(r1, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=@ipv4_getnetconf={0x54, 0x52, 0x10, 0x70bd25, 0x25dfdbfd, {}, [@NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x1}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x9}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x5}, @NETCONFA_FORWARDING={0x8, 0x2, 0x8}, @NETCONFA_IFINDEX={0x8, 0x1, r2}, @NETCONFA_RP_FILTER={0x8, 0x3, 0x7fff}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x3}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0xe9}]}, 0x54}, 0x1, 0x0, 0x0, 0x3400c080}, 0x40) read(0xffffffffffffffff, &(0x7f0000000280)=""/152, 0x20000318) openat$procfs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/keys\x00', 0x0, 0x0) r3 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r3, 0x4601, 0x0) write$binfmt_elf64(r3, &(0x7f00000003c0)={{0x7f, 0x45, 0x4c, 0x46, 0x6, 0x81, 0x35, 0x4, 0x1, 0x59ad6aa4a884dd63, 0x3, 0x0, 0x13d, 0x40, 0x26e, 0x8000, 0x1f, 0x38, 0x1, 0x8, 0x8, 0x3}, [{0x6, 0x3, 0xefa, 0x1, 0x81, 0x80000000, 0x0, 0x9}, {0x7, 0x2, 0x7ff, 0xfff, 0x1, 0x4, 0x0, 0x800b}], "5ad165d3d87709dd80c73c9fa8b6ef39a345e1b2327e38197c13f3be9248c0f2161632606ce45b5c7d7349c883946ca190a061f77e1020dc808b86b4e3c7b2a6128e2d3b16a4ec69ad8c276d1a038ddc59bd46a7a37061ed24ba41f62de7aaf1c073c43333bee7ed0979404acecab631d46b591f921ec0a584aeb912342ff4f104ff960a3563460c943d11952c88bd0d13a69a425793b6f7d2b09cf17c87cdc331f63c983436cef6888b1a8328e953b0b3bade3aabbfc4818a05af", [[]]}, 0x26b) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_open_procfs(0x0, &(0x7f0000000000)='timers\x00') 00:56:19 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) pipe(0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f0000000280)=ANY=[@ANYBLOB="3c0000005200100025bd7000fddbdf2502080005000000000008000100", @ANYRES32=0x0, @ANYBLOB="0800030000000000080006000300000008000500e900abc8106fa939dce52283f81003dde5200000000000"], 0x3c}, 0x1, 0x0, 0x0, 0x3400c080}, 0x40) r1 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r1, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) write$binfmt_elf64(r1, &(0x7f00000003c0)={{0x7f, 0x45, 0x4c, 0x46, 0x6, 0x81, 0x35, 0x4, 0x1, 0x59ad6aa4a884dd63, 0x3, 0x0, 0x13d, 0x40, 0x26e, 0x8000, 0x1f, 0x38, 0x1, 0x8, 0x8, 0x3}, [{0x6, 0x3, 0xefa, 0x1, 0x81, 0x80000000, 0x0, 0x9}, {0x7, 0x2, 0x7ff, 0xfff, 0x1, 0x4, 0x0, 0x800b}], "5ad165d3d87709dd80c73c9fa8b6ef39a345e1b2327e38197c13f3be9248c0f2161632606ce45b5c7d7349c883946ca190a061f77e1020dc808b86b4e3c7b2a6128e2d3b16a4ec69ad8c276d1a038ddc59bd46a7a37061ed24ba41f62de7aaf1c073c43333bee7ed0979404acecab631d46b591f921ec0a584aeb912342ff4f104ff960a3563460c943d11952c88bd0d13a69a425793b6f7d2b09cf17c87cdc331f63c983436cef6888b1a8328e953b0b3bade3aabbfc4818a05af", [[]]}, 0x26b) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_open_procfs(0x0, &(0x7f0000000000)='timers\x00') 00:56:19 executing program 5: socket$pppoe(0x18, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x7000000, 0x0, 0x0, 0x4, 0x0, {}, {0xffffffff}, {0x1}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}) 00:56:19 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) pipe(0x0) wait4(0x0, 0x0, 0x40000000, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000265000)=@req={0x0, 0x400}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000740)={{{@in=@multicast2, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@broadcast}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route(r1, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=@ipv4_getnetconf={0x54, 0x52, 0x10, 0x70bd25, 0x25dfdbfd, {}, [@NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x1}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x9}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x5}, @NETCONFA_FORWARDING={0x8, 0x2, 0x8}, @NETCONFA_IFINDEX={0x8, 0x1, r2}, @NETCONFA_RP_FILTER={0x8, 0x3, 0x7fff}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x3}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0xe9}]}, 0x54}, 0x1, 0x0, 0x0, 0x3400c080}, 0x40) read(0xffffffffffffffff, &(0x7f0000000280)=""/152, 0x20000318) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/keys\x00', 0x0, 0x0) r4 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r4, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) write$binfmt_elf64(r4, &(0x7f00000003c0)={{0x7f, 0x45, 0x4c, 0x46, 0x6, 0x81, 0x35, 0x4, 0x1, 0x59ad6aa4a884dd63, 0x3, 0x0, 0x13d, 0x40, 0x26e, 0x8000, 0x1f, 0x38, 0x1, 0x8, 0x8, 0x3}, [{0x6, 0x3, 0xefa, 0x1, 0x81, 0x80000000, 0x0, 0x9}, {0x7, 0x2, 0x7ff, 0xfff, 0x1, 0x4, 0x0, 0x800b}], "5ad165d3d87709dd80c73c9fa8b6ef39a345e1b2327e38197c13f3be9248c0f2161632606ce45b5c7d7349c883946ca190a061f77e1020dc808b86b4e3c7b2a6128e2d3b16a4ec69ad8c276d1a038ddc59bd46a7a37061ed24ba41f62de7aaf1c073c43333bee7ed0979404acecab631d46b591f921ec0a584aeb912342ff4f104ff960a3563460c943d11952c88bd0d13a69a425793b6f7d2b09cf17c87cdc331f63c983436cef6888b1a8328e953b0b3bade3aabbfc4818a05", [[]]}, 0x26a) read(r3, &(0x7f0000000280)=""/152, 0x20000318) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x280800, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$DRM_IOCTL_MODE_SETCRTC(0xffffffffffffffff, 0xc06864a2, &(0x7f0000000000)={0x0, 0x0, 0x20}) 00:56:19 executing program 3: getpid() r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000016000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, 0x0) 00:56:19 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) pipe(0x0) wait4(0x0, 0x0, 0x40000000, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000265000)=@req={0x0, 0x400, 0x2}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000740)={{{@in=@multicast2, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@broadcast}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route(r1, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=@ipv4_getnetconf={0x54, 0x52, 0x10, 0x70bd25, 0x25dfdbfd, {}, [@NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x1}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x9}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x5}, @NETCONFA_FORWARDING={0x8, 0x2, 0x8}, @NETCONFA_IFINDEX={0x8, 0x1, r2}, @NETCONFA_RP_FILTER={0x8, 0x3, 0x7fff}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x3}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0xe9}]}, 0x54}, 0x1, 0x0, 0x0, 0x3400c080}, 0x40) read(0xffffffffffffffff, &(0x7f0000000280)=""/152, 0x20000318) openat$procfs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/keys\x00', 0x0, 0x0) r3 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r3, 0x4601, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) write$binfmt_elf64(r3, &(0x7f00000003c0)={{0x7f, 0x45, 0x4c, 0x46, 0x6, 0x81, 0x35, 0x4, 0x1, 0x59ad6aa4a884dd63, 0x3, 0x0, 0x13d, 0x40, 0x26e, 0x8000, 0x1f, 0x38, 0x1, 0x8, 0x8, 0x3}, [{0x6, 0x3, 0xefa, 0x1, 0x81, 0x80000000, 0x0, 0x9}, {0x7, 0x2, 0x7ff, 0xfff, 0x1, 0x4, 0x0, 0x800b}], "5ad165d3d87709dd80c73c9fa8b6ef39a345e1b2327e38197c13f3be9248c0f2161632606ce45b5c7d7349c883946ca190a061f77e1020dc808b86b4e3c7b2a6128e2d3b16a4ec69ad8c276d1a038ddc59bd46a7a37061ed24ba41f62de7aaf1c073c43333bee7ed0979404acecab631d46b591f921ec0a584aeb912342ff4f104ff960a3563460c943d11952c88bd0d13a69a425793b6f7d2b09cf17c87cdc331f63c983436cef6888b1a8328e953b0b3bade3aabbfc4818a05af", [[]]}, 0x26b) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_open_procfs(0x0, &(0x7f0000000000)='timers\x00') 00:56:19 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) pipe(0x0) wait4(0x0, 0x0, 0x40000000, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000265000)=@req={0x0, 0x400}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000740)={{{@in=@multicast2, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@broadcast}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route(r1, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=@ipv4_getnetconf={0x54, 0x52, 0x10, 0x70bd25, 0x25dfdbfd, {}, [@NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x1}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x9}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x5}, @NETCONFA_FORWARDING={0x8, 0x2, 0x8}, @NETCONFA_IFINDEX={0x8, 0x1, r2}, @NETCONFA_RP_FILTER={0x8, 0x3, 0x7fff}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x3}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0xe9}]}, 0x54}, 0x1, 0x0, 0x0, 0x3400c080}, 0x40) read(0xffffffffffffffff, &(0x7f0000000280)=""/152, 0x20000318) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/keys\x00', 0x0, 0x0) r4 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r4, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) write$binfmt_elf64(r4, &(0x7f00000003c0)={{0x7f, 0x45, 0x4c, 0x46, 0x6, 0x81, 0x35, 0x4, 0x1, 0x59ad6aa4a884dd63, 0x3, 0x0, 0x13d, 0x40, 0x26e, 0x8000, 0x1f, 0x38, 0x1, 0x8, 0x8, 0x3}, [{0x6, 0x3, 0xefa, 0x1, 0x81, 0x80000000, 0x0, 0x9}, {0x7, 0x2, 0x7ff, 0xfff, 0x1, 0x4, 0x0, 0x800b}], "5ad165d3d87709dd80c73c9fa8b6ef39a345e1b2327e38197c13f3be9248c0f2161632606ce45b5c7d7349c883946ca190a061f77e1020dc808b86b4e3c7b2a6128e2d3b16a4ec69ad8c276d1a038ddc59bd46a7a37061ed24ba41f62de7aaf1c073c43333bee7ed0979404acecab631d46b591f921ec0a584aeb912342ff4f104ff960a3563460c943d11952c88bd0d13a69a425793b6f7d2b09cf17c87cdc331f63c983436cef6888b1a8328e953b0b3bade3aabbfc4818a05", [[]]}, 0x26a) read(r3, &(0x7f0000000280)=""/152, 0x20000318) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x280800, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$DRM_IOCTL_MODE_SETCRTC(0xffffffffffffffff, 0xc06864a2, &(0x7f0000000000)={0x0, 0x0, 0x20}) 00:56:20 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) stat(&(0x7f0000000240)='./file0/file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(0xffffffffffffffff, &(0x7f0000001b80)) socket(0x11, 0x2, 0x5) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r4, 0x1, 0x14, &(0x7f0000000040), 0x50) getsockopt$IP6T_SO_GET_ENTRIES(r4, 0x29, 0x41, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/405], &(0x7f0000000340)=0x1) fsetxattr$trusted_overlay_redirect(r3, &(0x7f0000000200)='trusted.overlay.redirect\x00', &(0x7f0000000280)='./file0/file0\x00', 0xe, 0x0) getsockname$tipc(0xffffffffffffffff, 0x0, &(0x7f0000000080)) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000001400)={{0x1, 0x0, @identifier="8e0f03f7e12b88d1af81f7c5a6bb175f"}}) lstat(&(0x7f0000000000)='./file0/file0\x00', &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000100)=0x0) r7 = getegid() r8 = socket$inet_tcp(0x2, 0x1, 0x0) r9 = fcntl$dupfd(r8, 0x0, r8) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) setresuid(r10, r10, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003ec0)={0x0, 0x0, 0x0}, 0x0) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, r11) r12 = openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$DRM_IOCTL_AGP_INFO(r12, 0x80386433, &(0x7f0000000bc0)=""/4096) getsockopt$sock_cred(r12, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0x194) setresuid(r13, r13, 0x0) r14 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r15 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r15, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) waitid(0x1, r15, &(0x7f0000000100), 0x80000004, &(0x7f0000000180)) r16 = shmget$private(0x0, 0x3000, 0x20, &(0x7f0000ffa000/0x3000)=nil) shmctl$SHM_STAT_ANY(r16, 0xf, &(0x7f0000000540)=""/221) shmctl$IPC_SET(r16, 0x1, &(0x7f0000000180)={{0x3, r10, r11, r13, r7, 0x42, 0x7}, 0x803ff, 0x2, 0xfffffffffffffffd, 0x0, r14, r15, 0x5}) shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000840)={{0x0, r2, r7, 0x0, r5, 0x50}, 0xd7, 0xfffffffffffffffe, 0x1000, 0x8000, r6}) r17 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000280)='/dev/nullb0\x00', 0x4400, 0x0) preadv(r17, &(0x7f0000000040)=[{&(0x7f0000000400)=""/4096, 0x3ffc00}], 0x1, 0x0) 00:56:20 executing program 3: gettid() perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000fe1000)={0x5, 0x83, 0x80, 0xf}, 0x1c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x1, 0x80, 0x400}, 0x3c) close(r0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0x9, 0x1, 0x4, 0x100000001}, 0x3c) bpf$PROG_LOAD(0x5, &(0x7f0000fed000)={0x7, 0x9, &(0x7f00000000c0)=@framed={{}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @map={0x18, 0x0, 0x1, 0x0, r1}, @map={0x18, 0x0, 0x1, 0x0, r2}]}, &(0x7f0000919ff6)='syzkaller\x00', 0x0, 0xe1, &(0x7f0000000000)=""/225}, 0x14) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x0, 0x0, 0x0, &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0x0, 0x4}, 0x8, 0x10, 0x0}, 0x78) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x0, 0x3, &(0x7f0000000600)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7f}}, 0x0, 0x56, 0x0, 0x0, 0x41100, 0x3, [], 0x0, 0xa, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x1f}, 0x10}, 0x78) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000040)) ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454c8, 0x0) 00:56:20 executing program 5: socket$pppoe(0x18, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x10000000, 0x0, 0x0, 0x4, 0x0, {}, {0xffffffff}, {0x1}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}) 00:56:20 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x4, 0x1) getpid() pipe(0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=@ipv4_getnetconf={0x3c, 0x52, 0x10, 0x70bd25, 0x25dfdbfd, {}, [@NETCONFA_PROXY_NEIGH={0x8}, @NETCONFA_IFINDEX={0x8}, @NETCONFA_RP_FILTER={0x8}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x3}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0xe9}]}, 0x3c}, 0x1, 0x0, 0x0, 0x3400c080}, 0x40) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000200)='/dev/nvram\x00', 0x14083, 0x0) ioctl$SNDRV_CTL_IOCTL_CARD_INFO(r1, 0x81785501, &(0x7f0000000280)=""/254) r2 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r2, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {0x9119}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) write$binfmt_elf64(r2, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x26b) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_open_procfs(0x0, &(0x7f0000000000)='timers\x00') ioctl$DRM_IOCTL_SET_CLIENT_CAP(0xffffffffffffffff, 0x4010640d, &(0x7f0000000100)={0x2}) 00:56:20 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) pipe(0x0) wait4(0x0, 0x0, 0x40000000, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000265000)=@req={0x0, 0x400}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000740)={{{@in=@multicast2, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@broadcast}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route(r1, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=@ipv4_getnetconf={0x54, 0x52, 0x10, 0x70bd25, 0x25dfdbfd, {}, [@NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x1}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x9}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x5}, @NETCONFA_FORWARDING={0x8, 0x2, 0x8}, @NETCONFA_IFINDEX={0x8, 0x1, r2}, @NETCONFA_RP_FILTER={0x8, 0x3, 0x7fff}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x3}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0xe9}]}, 0x54}, 0x1, 0x0, 0x0, 0x3400c080}, 0x40) read(0xffffffffffffffff, &(0x7f0000000280)=""/152, 0x20000318) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/keys\x00', 0x0, 0x0) r4 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r4, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) write$binfmt_elf64(r4, &(0x7f00000003c0)={{0x7f, 0x45, 0x4c, 0x46, 0x6, 0x81, 0x35, 0x4, 0x1, 0x59ad6aa4a884dd63, 0x3, 0x0, 0x13d, 0x40, 0x26e, 0x8000, 0x1f, 0x38, 0x1, 0x8, 0x8, 0x3}, [{0x6, 0x3, 0xefa, 0x1, 0x81, 0x80000000, 0x0, 0x9}, {0x7, 0x2, 0x7ff, 0xfff, 0x1, 0x4, 0x0, 0x800b}], "5ad165d3d87709dd80c73c9fa8b6ef39a345e1b2327e38197c13f3be9248c0f2161632606ce45b5c7d7349c883946ca190a061f77e1020dc808b86b4e3c7b2a6128e2d3b16a4ec69ad8c276d1a038ddc59bd46a7a37061ed24ba41f62de7aaf1c073c43333bee7ed0979404acecab631d46b591f921ec0a584aeb912342ff4f104ff960a3563460c943d11952c88bd0d13a69a425793b6f7d2b09cf17c87cdc331f63c983436cef6888b1a8328e953b0b3bade3aabbfc4818a05", [[]]}, 0x26a) read(r3, &(0x7f0000000280)=""/152, 0x20000318) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x280800, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$DRM_IOCTL_MODE_SETCRTC(0xffffffffffffffff, 0xc06864a2, &(0x7f0000000000)={0x0, 0x0, 0x20}) 00:56:20 executing program 3: unshare(0x200) gettid() r0 = creat(&(0x7f0000000100)='./file0\x00', 0x10003) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) 00:56:21 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) pipe(0x0) wait4(0x0, 0x0, 0x40000000, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000265000)=@req={0x0, 0x400, 0x2}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000740)={{{@in=@multicast2, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@broadcast}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route(r1, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=@ipv4_getnetconf={0x54, 0x52, 0x10, 0x70bd25, 0x25dfdbfd, {}, [@NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x1}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x9}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x5}, @NETCONFA_FORWARDING={0x8, 0x2, 0x8}, @NETCONFA_IFINDEX={0x8, 0x1, r2}, @NETCONFA_RP_FILTER={0x8, 0x3, 0x7fff}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x3}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0xe9}]}, 0x54}, 0x1, 0x0, 0x0, 0x3400c080}, 0x40) read(0xffffffffffffffff, &(0x7f0000000280)=""/152, 0x20000318) openat$procfs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/keys\x00', 0x0, 0x0) r3 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r3, 0x4601, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) write$binfmt_elf64(r3, &(0x7f00000003c0)={{0x7f, 0x45, 0x4c, 0x46, 0x6, 0x81, 0x35, 0x4, 0x1, 0x59ad6aa4a884dd63, 0x3, 0x0, 0x13d, 0x40, 0x26e, 0x8000, 0x1f, 0x38, 0x1, 0x8, 0x8, 0x3}, [{0x6, 0x3, 0xefa, 0x1, 0x81, 0x80000000, 0x0, 0x9}, {0x7, 0x2, 0x7ff, 0xfff, 0x1, 0x4, 0x0, 0x800b}], "5ad165d3d87709dd80c73c9fa8b6ef39a345e1b2327e38197c13f3be9248c0f2161632606ce45b5c7d7349c883946ca190a061f77e1020dc808b86b4e3c7b2a6128e2d3b16a4ec69ad8c276d1a038ddc59bd46a7a37061ed24ba41f62de7aaf1c073c43333bee7ed0979404acecab631d46b591f921ec0a584aeb912342ff4f104ff960a3563460c943d11952c88bd0d13a69a425793b6f7d2b09cf17c87cdc331f63c983436cef6888b1a8328e953b0b3bade3aabbfc4818a05af", [[]]}, 0x26b) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_open_procfs(0x0, &(0x7f0000000000)='timers\x00') 00:56:21 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, 0x0) syz_open_dev$evdev(0x0, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 00:56:21 executing program 3: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000000b000/0x18000)=nil, &(0x7f00000008c0)=[@textreal={0x8, &(0x7f00000000c0)="ffb10c10ba4300b0c8ee660f38826f3cf30f01e80f69e866f20f38f015650f01c883dd000f0131baf80c66b87aa1cc8b66efbafc0ced", 0x36}], 0x1, 0x0, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_CREATE_PIT2(r2, 0x4040ae77, &(0x7f0000000000)) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000140)={[0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x4ca]}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 00:56:21 executing program 5: socket$pppoe(0x18, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x20000000, 0x0, 0x0, 0x4, 0x0, {}, {0xffffffff}, {0x1}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}) 00:56:21 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) stat(&(0x7f0000000240)='./file0/file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(0xffffffffffffffff, &(0x7f0000001b80)) socket(0x11, 0x2, 0x5) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r4, 0x1, 0x14, &(0x7f0000000040), 0x50) getsockopt$IP6T_SO_GET_ENTRIES(r4, 0x29, 0x41, &(0x7f0000000480)=ANY=[@ANYBLOB="6e2f740000edffffffffffffff00000000000000000000000000000000000000ad0000005086f3915e59ad8184af4045c4e742fa881d66411baabaa82dda6d71f825249ec2eb0ad398766b6b870bba11fc00df87700a78319e5f5d955a5eb0f50e2dcd95623e3eba93f21d4733f6d4834e398f5ba4540b18afc3c2a92ff6e4a89dc029fdd87fc0c2ca637f5ead98feb48d1bfe6451a583e519234bd5297e8a8bf569ff90077ba1cef2ea64c8f027947915a33e26b9d8b4fb56ba4d86df286c34e0cd9715e6b39dcccf4eb92a1706ed98b4aafd220eecfac13859aaab4dc07cd467149066f2f637c1e58f02faf49d72752753fe6beceb9d14b1ab3832cab4d59f892cb6f3689b67eaf81e929525a7fe0f2ea0892194387f7d085ea12c8842b8790911042b2a48b65c40087bd66593e0cfc29843b29738147ea75bb6c3d9664dc189fca97c43ed585ebb0c2a03782d916c709f6fdeca72784a8ac21d3ff8c9551290ea0000000000000049d4bb98580f9f7b7da060b127fd66ae6ad3c8753701b37ed619b2ed3efe862100"/405], &(0x7f0000000340)=0x1) fsetxattr$trusted_overlay_redirect(r3, &(0x7f0000000200)='trusted.overlay.redirect\x00', &(0x7f0000000280)='./file0/file0\x00', 0xe, 0x0) getsockname$tipc(0xffffffffffffffff, 0x0, &(0x7f0000000080)) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000001400)={{0x1, 0x0, @identifier="8e0f03f7e12b88d1af81f7c5a6bb175f"}}) lstat(&(0x7f0000000000)='./file0/file0\x00', &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000100)=0x0) r7 = getegid() r8 = socket$inet_tcp(0x2, 0x1, 0x0) r9 = fcntl$dupfd(r8, 0x0, r8) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) setresuid(r10, r10, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003ec0)={0x0, 0x0, 0x0}, 0x0) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, r11) r12 = openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$DRM_IOCTL_AGP_INFO(r12, 0x80386433, &(0x7f0000000bc0)=""/4096) getsockopt$sock_cred(r12, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0x194) setresuid(r13, r13, 0x0) r14 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r15 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r15, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) waitid(0x1, r15, &(0x7f0000000100), 0x80000004, &(0x7f0000000180)) r16 = shmget$private(0x0, 0x3000, 0x20, &(0x7f0000ffa000/0x3000)=nil) shmctl$SHM_STAT_ANY(r16, 0xf, &(0x7f0000000540)=""/221) shmctl$IPC_SET(r16, 0x1, &(0x7f0000000180)={{0x3, r10, r11, r13, r7, 0x42, 0x7}, 0x803ff, 0x2, 0xfffffffffffffffd, 0x0, r14, r15, 0x5}) shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000840)={{0x0, r2, r7, 0x0, r5, 0x50}, 0xd7, 0xfffffffffffffffe, 0x1000, 0x8000, r6}) r17 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000280)='/dev/nullb0\x00', 0x4400, 0x0) preadv(r17, &(0x7f0000000040)=[{&(0x7f0000000400)=""/4096, 0x3ffc00}], 0x1, 0x0) 00:56:22 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) pipe(0x0) wait4(0x0, 0x0, 0x40000000, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000265000)=@req={0x0, 0x400, 0x2}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000740)={{{@in=@multicast2, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@broadcast}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route(r1, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=@ipv4_getnetconf={0x54, 0x52, 0x10, 0x70bd25, 0x25dfdbfd, {}, [@NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x1}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x9}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x5}, @NETCONFA_FORWARDING={0x8, 0x2, 0x8}, @NETCONFA_IFINDEX={0x8, 0x1, r2}, @NETCONFA_RP_FILTER={0x8, 0x3, 0x7fff}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x3}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0xe9}]}, 0x54}, 0x1, 0x0, 0x0, 0x3400c080}, 0x40) read(0xffffffffffffffff, &(0x7f0000000280)=""/152, 0x20000318) openat$procfs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/keys\x00', 0x0, 0x0) r3 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r3, 0x4601, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) write$binfmt_elf64(r3, &(0x7f00000003c0)={{0x7f, 0x45, 0x4c, 0x46, 0x6, 0x81, 0x35, 0x4, 0x1, 0x59ad6aa4a884dd63, 0x3, 0x0, 0x13d, 0x40, 0x26e, 0x8000, 0x1f, 0x38, 0x1, 0x8, 0x8, 0x3}, [{0x6, 0x3, 0xefa, 0x1, 0x81, 0x80000000, 0x0, 0x9}, {0x7, 0x2, 0x7ff, 0xfff, 0x1, 0x4, 0x0, 0x800b}], "5ad165d3d87709dd80c73c9fa8b6ef39a345e1b2327e38197c13f3be9248c0f2161632606ce45b5c7d7349c883946ca190a061f77e1020dc808b86b4e3c7b2a6128e2d3b16a4ec69ad8c276d1a038ddc59bd46a7a37061ed24ba41f62de7aaf1c073c43333bee7ed0979404acecab631d46b591f921ec0a584aeb912342ff4f104ff960a3563460c943d11952c88bd0d13a69a425793b6f7d2b09cf17c87cdc331f63c983436cef6888b1a8328e953b0b3bade3aabbfc4818a05af", [[]]}, 0x26b) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_open_procfs(0x0, &(0x7f0000000000)='timers\x00') 00:56:22 executing program 0: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"]) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001140)=ANY=[]) 00:56:22 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) pipe(0x0) wait4(0x0, 0x0, 0x40000000, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000265000)=@req={0x0, 0x400}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000740)={{{@in=@multicast2, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@broadcast}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route(r1, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=@ipv4_getnetconf={0x54, 0x52, 0x10, 0x70bd25, 0x25dfdbfd, {}, [@NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x1}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x9}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x5}, @NETCONFA_FORWARDING={0x8, 0x2, 0x8}, @NETCONFA_IFINDEX={0x8, 0x1, r2}, @NETCONFA_RP_FILTER={0x8, 0x3, 0x7fff}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x3}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0xe9}]}, 0x54}, 0x1, 0x0, 0x0, 0x3400c080}, 0x40) read(0xffffffffffffffff, &(0x7f0000000280)=""/152, 0x20000318) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/keys\x00', 0x0, 0x0) r4 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r4, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) write$binfmt_elf64(r4, &(0x7f00000003c0)={{0x7f, 0x45, 0x4c, 0x46, 0x6, 0x81, 0x35, 0x4, 0x1, 0x59ad6aa4a884dd63, 0x3, 0x0, 0x13d, 0x40, 0x26e, 0x8000, 0x1f, 0x38, 0x1, 0x8, 0x8, 0x3}, [{0x6, 0x3, 0xefa, 0x1, 0x81, 0x80000000, 0x0, 0x9}, {0x7, 0x2, 0x7ff, 0xfff, 0x1, 0x4, 0x0, 0x800b}], "5ad165d3d87709dd80c73c9fa8b6ef39a345e1b2327e38197c13f3be9248c0f2161632606ce45b5c7d7349c883946ca190a061f77e1020dc808b86b4e3c7b2a6128e2d3b16a4ec69ad8c276d1a038ddc59bd46a7a37061ed24ba41f62de7aaf1c073c43333bee7ed0979404acecab631d46b591f921ec0a584aeb912342ff4f104ff960a3563460c943d11952c88bd0d13a69a425793b6f7d2b09cf17c87cdc331f63c983436cef6888b1a8328e953b0b3bade3aabbfc4818a05af"}, 0x16b) read(r3, &(0x7f0000000280)=""/152, 0x20000318) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x280800, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$DRM_IOCTL_MODE_SETCRTC(0xffffffffffffffff, 0xc06864a2, &(0x7f0000000000)={0x0, 0x0, 0x20}) 00:56:22 executing program 5: socket$pppoe(0x18, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x3f000000, 0x0, 0x0, 0x4, 0x0, {}, {0xffffffff}, {0x1}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}) 00:56:22 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000180)={@void, @val={0x3}, @mpls={[], @ipv4=@udp={{0x5, 0x4, 0x0, 0x0, 0x61, 0x0, 0x0, 0x0, 0x11, 0x0, @rand_addr=0x6, @dev}, {0x0, 0x4e22, 0x4d, 0x0, @opaque="61f933df2af147389b0375973fe1785c23c8376e2338ed3cbbbb60f7fbe7a5dbee4b492781050f97bf9f1605c29e5b42b182cbdb96afa1887d1eaeef9df73a83a0213d730b"}}}}, 0x6b) 00:56:22 executing program 3: move_pages(0x0, 0x2, &(0x7f00000005c0)=[&(0x7f0000ffc000/0x4000)=nil], &(0x7f0000000600), &(0x7f0000000640), 0x0) 00:56:22 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000034c0)=ANY=[@ANYBLOB="4800000010000507000000001000000000000040", @ANYRES32=r4, @ANYBLOB="0000000000000010280012000c0001007665746800c36ab5d6a42e6f4611d460713eaa9813000000180002001400010020000000", @ANYRES32=0x0, @ANYBLOB="0020a9b6000000000000751dc23d8e008672391e51823799a0837eb904c9cedb383db4eff9d3f961ea48af33fb086dd809e74b05008b925b759fb97b84434f357bf55290ae2254db822b9f4b0a0256facb44521fa875669dd65b11c470252c5c3d9f4636bd897ff950e796e68a63ff88ba4600f241c913de3520493f7aa263989ac3f7d250dba5e5bc918809c9ee4a16e2703708f0dd2edb3783000000001036ccfb8ff6364146ed27c6293f550510d96a5f9046ac5dfd29ec9f4addaf501f5d0516b2ad082197b2092b3bafe6d0da1a4fb8857fb3442e1a81d7a35114b55ea7a7fbaa8cd09e220dce5b7fda6f686d17259e173a8e583433ac842dcc740fa0d9f669e81c6b2c9bde45cff10efcad5bef640d1ddccc2a14f5db4711c9cca325fa4e4ff1d2fd07f84fcc6d1da8fd1835db0c36205453461ed66fb4968882dde340afacbc2d3a1ba612ecb8a357"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r4, @ANYBLOB="00000000ffffffff00000000080001007166710048000229c6090032d0ed64f3c3545aaf6e000085a4e4ebb5ef670000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a010c3"], 0x74}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000740)=@newtfilter={0x3c, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@TCA_RATE={0x6}, @filter_kind_options=@f_flower={{0xb, 0x1, 'flower\x00'}, {0x4}}]}, 0x3c}}, 0x0) [ 618.310625][T21615] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 00:56:23 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) pipe(0x0) wait4(0x0, 0x0, 0x40000000, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000265000)=@req={0x0, 0x400}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000740)={{{@in=@multicast2, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@broadcast}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route(r1, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=@ipv4_getnetconf={0x54, 0x52, 0x10, 0x70bd25, 0x25dfdbfd, {}, [@NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x1}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x9}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x5}, @NETCONFA_FORWARDING={0x8, 0x2, 0x8}, @NETCONFA_IFINDEX={0x8, 0x1, r2}, @NETCONFA_RP_FILTER={0x8, 0x3, 0x7fff}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x3}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0xe9}]}, 0x54}, 0x1, 0x0, 0x0, 0x3400c080}, 0x40) read(0xffffffffffffffff, &(0x7f0000000280)=""/152, 0x20000318) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/keys\x00', 0x0, 0x0) r4 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r4, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) write$binfmt_elf64(r4, &(0x7f00000003c0)={{0x7f, 0x45, 0x4c, 0x46, 0x6, 0x81, 0x35, 0x4, 0x1, 0x59ad6aa4a884dd63, 0x3, 0x0, 0x13d, 0x40, 0x26e, 0x8000, 0x1f, 0x38, 0x1, 0x8, 0x8, 0x3}, [{0x6, 0x3, 0xefa, 0x1, 0x81, 0x80000000, 0x0, 0x9}, {0x7, 0x2, 0x7ff, 0xfff, 0x1, 0x4, 0x0, 0x800b}], "5ad165d3d87709dd80c73c9fa8b6ef39a345e1b2327e38197c13f3be9248c0f2161632606ce45b5c7d7349c883946ca190a061f77e1020dc808b86b4e3c7b2a6128e2d3b16a4ec69ad8c276d1a038ddc59bd46a7a37061ed24ba41f62de7aaf1c073c43333bee7ed0979404acecab631d46b591f921ec0a584aeb912342ff4f104ff960a3563460c943d11952c88bd0d13a69a425793b6f7d2b09cf17c87cdc331f63c983436cef6888b1a8328e953b0b3bade3aabbfc4818a05af"}, 0x16b) read(r3, &(0x7f0000000280)=""/152, 0x20000318) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x280800, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$DRM_IOCTL_MODE_SETCRTC(0xffffffffffffffff, 0xc06864a2, &(0x7f0000000000)={0x0, 0x0, 0x20}) 00:56:23 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) stat(&(0x7f0000000240)='./file0/file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(0xffffffffffffffff, &(0x7f0000001b80)) socket(0x11, 0x2, 0x5) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r4, 0x1, 0x14, &(0x7f0000000040), 0x50) getsockopt$IP6T_SO_GET_ENTRIES(r4, 0x29, 0x41, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/405], &(0x7f0000000340)=0x1) fsetxattr$trusted_overlay_redirect(r3, &(0x7f0000000200)='trusted.overlay.redirect\x00', &(0x7f0000000280)='./file0/file0\x00', 0xe, 0x0) getsockname$tipc(0xffffffffffffffff, 0x0, &(0x7f0000000080)) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000001400)={{0x1, 0x0, @identifier="8e0f03f7e12b88d1af81f7c5a6bb175f"}}) lstat(&(0x7f0000000000)='./file0/file0\x00', &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000100)=0x0) r7 = getegid() r8 = socket$inet_tcp(0x2, 0x1, 0x0) r9 = fcntl$dupfd(r8, 0x0, r8) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) setresuid(r10, r10, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003ec0)={0x0, 0x0, 0x0}, 0x0) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, r11) r12 = openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$DRM_IOCTL_AGP_INFO(r12, 0x80386433, &(0x7f0000000bc0)=""/4096) getsockopt$sock_cred(r12, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0x194) setresuid(r13, r13, 0x0) r14 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r15 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r15, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) waitid(0x1, r15, &(0x7f0000000100), 0x80000004, &(0x7f0000000180)) r16 = shmget$private(0x0, 0x3000, 0x20, &(0x7f0000ffa000/0x3000)=nil) shmctl$SHM_STAT_ANY(r16, 0xf, &(0x7f0000000540)=""/221) shmctl$IPC_SET(r16, 0x1, &(0x7f0000000180)={{0x3, r10, r11, r13, r7, 0x42, 0x7}, 0x803ff, 0x2, 0xfffffffffffffffd, 0x0, r14, r15, 0x5}) shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000840)={{0x0, r2, r7, 0x0, r5, 0x50}, 0xd7, 0xfffffffffffffffe, 0x1000, 0x8000, r6}) r17 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000280)='/dev/nullb0\x00', 0x4400, 0x0) preadv(r17, &(0x7f0000000040)=[{&(0x7f0000000400)=""/4096, 0x3ffc00}], 0x1, 0x0) 00:56:23 executing program 3: openat$audio1(0xffffffffffffff9c, 0x0, 0x0, 0x0) io_submit(0x0, 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, 0x0, 0x0) syz_open_procfs(0x0, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) getpid() sched_setscheduler(0x0, 0x5, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cpuacct.usage_sys\x00', 0x275a, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(0xffffffffffffffff, 0x660c) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f00000000c0)) socket$inet6(0xa, 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) openat$vim2m(0xffffffffffffff9c, 0x0, 0x2, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7fff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socketpair$unix(0x1, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) openat$vcs(0xffffffffffffff9c, &(0x7f0000000400)='/dev/vcs\x00', 0x0, 0x0) close(r0) 00:56:23 executing program 5: socket$pppoe(0x18, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x40000000, 0x0, 0x0, 0x4, 0x0, {}, {0xffffffff}, {0x1}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}) 00:56:23 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) pipe(0x0) wait4(0x0, 0x0, 0x40000000, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000265000)=@req={0x0, 0x400, 0x2}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000740)={{{@in=@multicast2, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@broadcast}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route(r1, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=@ipv4_getnetconf={0x54, 0x52, 0x10, 0x70bd25, 0x25dfdbfd, {}, [@NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x1}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x9}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x5}, @NETCONFA_FORWARDING={0x8, 0x2, 0x8}, @NETCONFA_IFINDEX={0x8, 0x1, r2}, @NETCONFA_RP_FILTER={0x8, 0x3, 0x7fff}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x3}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0xe9}]}, 0x54}, 0x1, 0x0, 0x0, 0x3400c080}, 0x40) read(0xffffffffffffffff, &(0x7f0000000280)=""/152, 0x20000318) openat$procfs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/keys\x00', 0x0, 0x0) r3 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r3, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) write$binfmt_elf64(r3, &(0x7f00000003c0)={{0x7f, 0x45, 0x4c, 0x46, 0x6, 0x81, 0x35, 0x4, 0x1, 0x59ad6aa4a884dd63, 0x3, 0x0, 0x13d, 0x40, 0x26e, 0x8000, 0x1f, 0x38, 0x1, 0x8, 0x8, 0x3}, [{0x6, 0x3, 0xefa, 0x1, 0x81, 0x80000000, 0x0, 0x9}, {0x7, 0x2, 0x7ff, 0xfff, 0x1, 0x4, 0x0, 0x800b}], "5ad165d3d87709dd80c73c9fa8b6ef39a345e1b2327e38197c13f3be9248c0f2161632606ce45b5c7d7349c883946ca190a061f77e1020dc808b86b4e3c7b2a6128e2d3b16a4ec69ad8c276d1a038ddc59bd46a7a37061ed24ba41f62de7aaf1c073c43333bee7ed0979404acecab631d46b591f921ec0a584aeb912342ff4f104ff960a3563460c943d11952c88bd0d13a69a425793b6f7d2b09cf17c87cdc331f63c983436cef6888b1a8328e953b0b3bade3aabbfc4818a05af", [[]]}, 0x26b) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_open_procfs(0x0, &(0x7f0000000000)='timers\x00') 00:56:23 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x80000001}, 0x1c) [ 619.399356][T22136] RDS: rds_bind could not find a transport for fe80::bb, load rds_tcp or rds_rdma? 00:56:24 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) stat(&(0x7f0000000240)='./file0/file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(0xffffffffffffffff, &(0x7f0000001b80)) socket(0x11, 0x2, 0x5) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r4, 0x1, 0x14, &(0x7f0000000040), 0x50) getsockopt$IP6T_SO_GET_ENTRIES(r4, 0x29, 0x41, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/405], &(0x7f0000000340)=0x1) fsetxattr$trusted_overlay_redirect(r3, &(0x7f0000000200)='trusted.overlay.redirect\x00', &(0x7f0000000280)='./file0/file0\x00', 0xe, 0x0) getsockname$tipc(0xffffffffffffffff, 0x0, &(0x7f0000000080)) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000001400)={{0x1, 0x0, @identifier="8e0f03f7e12b88d1af81f7c5a6bb175f"}, 0x34, [], "ed760111b8363e2de90692d0bc7e0a89824d3c77730403363ce0521cdcb1973b558cbd01ebf95bd9529fe3c5a95dcf31792e3e46"}) lstat(&(0x7f0000000000)='./file0/file0\x00', &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000100)=0x0) r7 = getegid() r8 = socket$inet_tcp(0x2, 0x1, 0x0) r9 = fcntl$dupfd(r8, 0x0, r8) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) setresuid(r10, r10, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003ec0)={0x0, 0x0, 0x0}, 0x0) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, r11) r12 = openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$DRM_IOCTL_AGP_INFO(r12, 0x80386433, &(0x7f0000000bc0)=""/4096) getsockopt$sock_cred(r12, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0x194) setresuid(r13, r13, 0x0) r14 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r15 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r15, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) waitid(0x1, r15, &(0x7f0000000100), 0x80000004, &(0x7f0000000180)) r16 = shmget$private(0x0, 0x3000, 0x20, &(0x7f0000ffa000/0x3000)=nil) shmctl$SHM_STAT_ANY(r16, 0xf, &(0x7f0000000540)=""/221) shmctl$IPC_SET(r16, 0x1, &(0x7f0000000180)={{0x3, r10, r11, r13, r7, 0x42, 0x7}, 0x803ff, 0x2, 0xfffffffffffffffd, 0x0, r14, r15, 0x5}) shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000840)={{0x0, r2, r7, 0x0, r5, 0x50}, 0xd7, 0xfffffffffffffffe, 0x1000, 0x8000, r6}) r17 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000280)='/dev/nullb0\x00', 0x4400, 0x0) preadv(r17, &(0x7f0000000040)=[{&(0x7f0000000400)=""/4096, 0x3ffc00}], 0x1, 0x0) 00:56:24 executing program 5: socket$pppoe(0x18, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0xff010000, 0x0, 0x0, 0x4, 0x0, {}, {0xffffffff}, {0x1}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}) 00:56:24 executing program 3: gettid() perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000fe1000)={0x5, 0x83, 0x80, 0xf}, 0x1c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x1, 0x80, 0x400}, 0x3c) r2 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0x9, 0x1, 0x4, 0x100000001}, 0x3c) bpf$PROG_LOAD(0x5, &(0x7f0000fed000)={0x7, 0x9, &(0x7f00000000c0)=@framed={{}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @map={0x18, 0x0, 0x1, 0x0, r1}, @map={0x18, 0x0, 0x1, 0x0, r2}]}, &(0x7f0000919ff6)='syzkaller\x00', 0x0, 0xe1, &(0x7f0000000000)=""/225}, 0x14) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x0, 0x3, &(0x7f0000000600)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7f}}, 0x0, 0x56, 0x0, 0x0, 0x41100, 0x3, [], 0x0, 0xa, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x1f}, 0x10}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000040)) ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454c8, 0x0) 00:56:24 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000004780)='batadv\x00') sendmsg$BATADV_CMD_SET_HARDIF(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000480)={0x1c, r1, 0x205, 0x0, 0x0, {0x5}, [@BATADV_ATTR_MESH_IFINDEX={0x8}]}, 0x1c}}, 0x0) 00:56:24 executing program 0: r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x2}, &(0x7f00000002c0), 0x0, 0xfffffffffffffffe) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b65329509626699071a860088261af3fd5f91a922ac7", 0xb2) r1 = add_key$user(&(0x7f00000003c0)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={0x0, r1}, &(0x7f00000000c0)=""/83, 0x10, 0x0) keyctl$instantiate_iov(0x14, r0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1, 0x8101, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_setup(0x2003, &(0x7f00000004c0)=0x0) io_submit(0x0, 0x0, 0x0) io_getevents(r2, 0xfff, 0x80000000000016b, &(0x7f0000000100)=[{}], &(0x7f0000000080)={0x0, 0x1c9c380}) writev(0xffffffffffffffff, &(0x7f0000000040), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x80900, 0x0) ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, 0x0, 0x0) gettid() syz_open_procfs(0x0, &(0x7f00000001c0)='net/ipv6_route\x00') r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) write$P9_RWRITE(r3, 0x0, 0x0) close(r3) 00:56:25 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_TIMEOUT_NEW(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2400000004080500000000000000000000000000050003003a0000000600024000000000"], 0x24}}, 0x0) 00:57:25 executing program 0: r0 = socket$pppl2tp(0x18, 0x1, 0x1) r1 = socket$inet6_udp(0xa, 0x2, 0x0) connect$pppl2tp(r0, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x3, r1, {0x2, 0x0, @dev}, 0x800002}}, 0x2e) r2 = socket$pppl2tp(0x18, 0x1, 0x1) r3 = socket$inet6_udp(0xa, 0x2, 0x0) connect$pppl2tp(r2, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x3, r3, {0x2, 0x0, @dev}, 0x3}}, 0x2e) r4 = socket$pppl2tp(0x18, 0x1, 0x1) r5 = socket$inet6_udp(0xa, 0x2, 0x0) connect$pppl2tp(r4, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x3, r5, {0x2, 0x0, @dev}, 0x2}}, 0x2e) 00:57:25 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) pipe(0x0) wait4(0x0, 0x0, 0x40000000, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000265000)=@req={0x0, 0x400}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000740)={{{@in=@multicast2, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@broadcast}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route(r1, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=@ipv4_getnetconf={0x54, 0x52, 0x10, 0x70bd25, 0x25dfdbfd, {}, [@NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x1}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x9}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x5}, @NETCONFA_FORWARDING={0x8, 0x2, 0x8}, @NETCONFA_IFINDEX={0x8, 0x1, r2}, @NETCONFA_RP_FILTER={0x8, 0x3, 0x7fff}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x3}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0xe9}]}, 0x54}, 0x1, 0x0, 0x0, 0x3400c080}, 0x40) read(0xffffffffffffffff, &(0x7f0000000280)=""/152, 0x20000318) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/keys\x00', 0x0, 0x0) r4 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r4, 0x4601, &(0x7f0000000000)={0x0, 0x320, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) write$binfmt_elf64(r4, &(0x7f00000003c0)={{0x7f, 0x45, 0x4c, 0x46, 0x6, 0x81, 0x35, 0x4, 0x1, 0x59ad6aa4a884dd63, 0x3, 0x0, 0x13d, 0x40, 0x26e, 0x8000, 0x1f, 0x38, 0x1, 0x8, 0x8, 0x3}, [{0x6, 0x3, 0xefa, 0x1, 0x81, 0x80000000, 0x0, 0x9}, {0x7, 0x2, 0x7ff, 0xfff, 0x1, 0x4, 0x0, 0x800b}], "5ad165d3d87709dd80c73c9fa8b6ef39a345e1b2327e38197c13f3be9248c0f2161632606ce45b5c7d7349c883946ca190a061f77e1020dc808b86b4e3c7b2a6128e2d3b16a4ec69ad8c276d1a038ddc59bd46a7a37061ed24ba41f62de7aaf1c073c43333bee7ed0979404acecab631d46b591f921ec0a584aeb912342ff4f104ff960a3563460c943d11952c88bd0d13a69a425793b6f7d2b09cf17c87cdc331f63c983436cef6888b1a8328e953b0b3bade3aabbfc4818a05af"}, 0x16b) read(r3, &(0x7f0000000280)=""/152, 0x20000318) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x280800, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$DRM_IOCTL_MODE_SETCRTC(0xffffffffffffffff, 0xc06864a2, &(0x7f0000000000)={0x0, 0x0, 0x20}) 00:57:25 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r1, 0x0, 0x61, &(0x7f0000000000)={'filter\x00', 0x4}, 0x68) 00:57:25 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) stat(&(0x7f0000000240)='./file0/file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(0xffffffffffffffff, &(0x7f0000001b80)) socket(0x11, 0x2, 0x5) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r4, 0x1, 0x14, &(0x7f0000000040), 0x50) getsockopt$IP6T_SO_GET_ENTRIES(r4, 0x29, 0x41, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/405], &(0x7f0000000340)=0x1) fsetxattr$trusted_overlay_redirect(r3, &(0x7f0000000200)='trusted.overlay.redirect\x00', &(0x7f0000000280)='./file0/file0\x00', 0xe, 0x0) getsockname$tipc(0xffffffffffffffff, 0x0, &(0x7f0000000080)) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000001400)={{0x1, 0x0, @identifier="8e0f03f7e12b88d1af81f7c5a6bb175f"}, 0x34, [], "ed760111b8363e2de90692d0bc7e0a89824d3c77730403363ce0521cdcb1973b558cbd01ebf95bd9529fe3c5a95dcf31792e3e46"}) lstat(&(0x7f0000000000)='./file0/file0\x00', &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000100)=0x0) r7 = getegid() r8 = socket$inet_tcp(0x2, 0x1, 0x0) r9 = fcntl$dupfd(r8, 0x0, r8) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) setresuid(r10, r10, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003ec0)={0x0, 0x0, 0x0}, 0x0) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, r11) r12 = openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$DRM_IOCTL_AGP_INFO(r12, 0x80386433, &(0x7f0000000bc0)=""/4096) getsockopt$sock_cred(r12, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0x194) setresuid(r13, r13, 0x0) r14 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r15 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r15, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) waitid(0x1, r15, &(0x7f0000000100), 0x80000004, &(0x7f0000000180)) r16 = shmget$private(0x0, 0x3000, 0x20, &(0x7f0000ffa000/0x3000)=nil) shmctl$SHM_STAT_ANY(r16, 0xf, &(0x7f0000000540)=""/221) shmctl$IPC_SET(r16, 0x1, &(0x7f0000000180)={{0x3, r10, r11, r13, r7, 0x42, 0x7}, 0x803ff, 0x2, 0xfffffffffffffffd, 0x0, r14, r15, 0x5}) shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000840)={{0x0, r2, r7, 0x0, r5, 0x50}, 0xd7, 0xfffffffffffffffe, 0x1000, 0x8000, r6}) r17 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000280)='/dev/nullb0\x00', 0x4400, 0x0) preadv(r17, &(0x7f0000000040)=[{&(0x7f0000000400)=""/4096, 0x3ffc00}], 0x1, 0x0) [ 620.320223][T22451] PM: hibernation: Marking nosave pages: [mem 0x00000000-0x00000fff] [ 620.320237][T22451] PM: hibernation: Marking nosave pages: [mem 0x0009f000-0x000fffff] [ 620.320266][T22451] PM: hibernation: Marking nosave pages: [mem 0xbfffd000-0xffffffff] [ 620.494279][T22451] PM: hibernation: Basic memory bitmaps created [ 620.729036][T22451] PM: hibernation: Basic memory bitmaps freed [ 684.295258][T23076] IPVS: ftp: loaded support on port[0] = 21 [ 684.452132][T23076] chnl_net:caif_netlink_parms(): no params data found [ 684.551971][T23076] bridge0: port 1(bridge_slave_0) entered blocking state [ 684.552081][T23076] bridge0: port 1(bridge_slave_0) entered disabled state [ 684.553892][T23076] device bridge_slave_0 entered promiscuous mode [ 684.557205][T23076] bridge0: port 2(bridge_slave_1) entered blocking state [ 684.557299][T23076] bridge0: port 2(bridge_slave_1) entered disabled state [ 684.558346][T23076] device bridge_slave_1 entered promiscuous mode [ 684.589323][T23076] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 684.593405][T23076] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 684.612466][T23076] team0: Port device team_slave_0 added [ 684.615546][T23076] team0: Port device team_slave_1 added [ 684.633137][T23076] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 684.633157][T23076] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 684.633166][T23076] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 684.635907][T23076] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 684.635926][T23076] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 684.635935][T23076] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 684.701743][T23076] device hsr_slave_0 entered promiscuous mode [ 684.739095][T23076] device hsr_slave_1 entered promiscuous mode [ 684.778607][T23076] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 684.778670][T23076] Cannot create hsr debugfs directory [ 684.944775][T23076] bridge0: port 2(bridge_slave_1) entered blocking state [ 684.944854][T23076] bridge0: port 2(bridge_slave_1) entered forwarding state [ 684.945268][T23076] bridge0: port 1(bridge_slave_0) entered blocking state [ 684.945317][T23076] bridge0: port 1(bridge_slave_0) entered forwarding state [ 685.071312][T23076] 8021q: adding VLAN 0 to HW filter on device bond0 [ 685.083536][ T2767] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 685.084873][ T2767] bridge0: port 1(bridge_slave_0) entered disabled state [ 685.097460][ T2767] bridge0: port 2(bridge_slave_1) entered disabled state [ 685.100465][ T2767] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 685.110557][T23076] 8021q: adding VLAN 0 to HW filter on device team0 [ 685.119285][T23081] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 685.119971][T23081] bridge0: port 1(bridge_slave_0) entered blocking state [ 685.120004][T23081] bridge0: port 1(bridge_slave_0) entered forwarding state [ 685.128391][T23081] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 685.129211][T23081] bridge0: port 2(bridge_slave_1) entered blocking state [ 685.129244][T23081] bridge0: port 2(bridge_slave_1) entered forwarding state [ 685.152950][ T2767] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 685.153674][ T2767] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 685.164234][ T2767] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 685.172830][ T2686] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 685.181967][ T2767] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 685.188019][T23076] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 685.210992][ T2686] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 685.211116][ T2686] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 685.223256][T23076] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 685.244738][ T2686] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 685.266280][ T2767] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 685.267053][ T2767] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 685.267643][ T2767] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 685.275955][T23076] device veth0_vlan entered promiscuous mode [ 685.286802][T23076] device veth1_vlan entered promiscuous mode [ 685.319885][ T2767] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 685.320488][ T2767] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 685.321231][ T2767] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 685.326951][T23076] device veth0_macvtap entered promiscuous mode [ 685.333803][T23076] device veth1_macvtap entered promiscuous mode [ 685.355367][T23076] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 685.355385][T23076] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 685.355396][T23076] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 685.355403][T23076] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 685.355414][T23076] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 685.355421][T23076] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 685.355431][T23076] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 685.355438][T23076] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 685.355449][T23076] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 685.355456][T23076] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 685.355466][T23076] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 685.355473][T23076] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 685.357858][T23076] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 685.357975][ T2686] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 685.361146][ T2686] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 685.366683][T23076] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 685.366692][T23076] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 685.366705][T23076] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 685.366711][T23076] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 685.366723][T23076] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 685.366729][T23076] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 685.366739][T23076] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 685.366746][T23076] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 685.366758][T23076] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 685.366764][T23076] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 685.366775][T23076] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 685.366781][T23076] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 685.369733][T23076] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 685.370082][ T2686] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 775.298765][ T1128] INFO: task syz-executor.1:21722 blocked for more than 143 seconds. [ 775.298791][ T1128] Not tainted 5.6.0-rc2-syzkaller #0 [ 775.298797][ T1128] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 775.298805][ T1128] syz-executor.1 D26808 21722 9977 0x80004002 [ 775.298829][ T1128] Call Trace: [ 775.298861][ T1128] __schedule+0x934/0x1f90 [ 775.298889][ T1128] ? __sched_text_start+0x8/0x8 [ 775.298903][ T1128] ? lock_downgrade+0x920/0x920 [ 775.298918][ T1128] ? rwlock_bug.part.0+0x90/0x90 [ 775.298942][ T1128] schedule+0xdc/0x2b0 [ 775.298963][ T1128] schedule_preempt_disabled+0x13/0x20 [ 775.298978][ T1128] __mutex_lock+0x7ab/0x13c0 [ 775.299094][ T1128] ? fb_release+0x55/0x150 [ 775.299119][ T1128] ? mutex_trylock+0x2d0/0x2d0 [ 775.299161][ T1128] ? __fput+0x1e7/0x890 [ 775.299180][ T1128] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 775.299216][ T1128] ? fsnotify+0x7fd/0xbb0 [ 775.299245][ T1128] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 775.299299][ T1128] ? locks_remove_file+0x32f/0x580 [ 775.299315][ T1128] ? fsnotify_first_mark+0x210/0x210 [ 775.299340][ T1128] mutex_lock_nested+0x16/0x20 [ 775.299355][ T1128] ? mutex_lock_nested+0x16/0x20 [ 775.299369][ T1128] fb_release+0x55/0x150 [ 775.299390][ T1128] __fput+0x2ff/0x890 [ 775.299419][ T1128] ? unregister_framebuffer+0x40/0x40 [ 775.299440][ T1128] ____fput+0x16/0x20 [ 775.299503][ T1128] task_work_run+0x145/0x1c0 [ 775.299551][ T1128] do_exit+0xba9/0x2f50 [ 775.299575][ T1128] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 775.299604][ T1128] ? mm_update_next_owner+0x7c0/0x7c0 [ 775.299619][ T1128] ? retint_kernel+0x2b/0x2b [ 775.299662][ T1128] ? do_group_exit+0x128/0x360 [ 775.299689][ T1128] do_group_exit+0x135/0x360 [ 775.299736][ T1128] get_signal+0x47c/0x24f0 [ 775.299759][ T1128] ? lock_downgrade+0x920/0x920 [ 775.299841][ T1128] do_signal+0x87/0x1700 [ 775.299862][ T1128] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 775.299879][ T1128] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 775.299896][ T1128] ? lockdep_hardirqs_on+0x421/0x5e0 [ 775.299913][ T1128] ? setup_sigcontext+0x7d0/0x7d0 [ 775.299949][ T1128] ? exit_to_usermode_loop+0x43/0x380 [ 775.299965][ T1128] ? do_syscall_64+0x676/0x790 [ 775.299980][ T1128] ? exit_to_usermode_loop+0x43/0x380 [ 775.299997][ T1128] ? lockdep_hardirqs_on+0x421/0x5e0 [ 775.300044][ T1128] ? trace_hardirqs_on+0x67/0x240 [ 775.300070][ T1128] exit_to_usermode_loop+0x286/0x380 [ 775.300096][ T1128] do_syscall_64+0x676/0x790 [ 775.300120][ T1128] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 775.300132][ T1128] RIP: 0033:0x45c449 [ 775.300149][ T1128] Code: 44 00 00 eb 42 90 c7 04 24 02 00 00 00 48 8d 44 24 30 48 89 44 24 08 48 c7 44 24 10 00 00 00 00 c7 44 24 18 08 00 00 00 e8 74 <44> 00 00 48 8b 05 95 47 be 01 48 89 04 24 48 8d 44 24 28 48 89 44 [ 775.300158][ T1128] RSP: 002b:00007f2cdc686cf8 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 775.300173][ T1128] RAX: fffffffffffffe00 RBX: 000000000076bf28 RCX: 000000000045c449 [ 775.300183][ T1128] RDX: 0000000000000000 RSI: 0000000000000080 RDI: 000000000076bf28 [ 775.300192][ T1128] RBP: 000000000076bf20 R08: 0000000000000000 R09: 0000000000000000 [ 775.300202][ T1128] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000076bf2c [ 775.300211][ T1128] R13: 0000000000c7fb7f R14: 00007f2cdc6879c0 R15: 000000000076bf2c [ 775.300253][ T1128] INFO: task syz-executor.2:22132 blocked for more than 143 seconds. [ 775.300262][ T1128] Not tainted 5.6.0-rc2-syzkaller #0 [ 775.300268][ T1128] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 775.300275][ T1128] syz-executor.2 D28072 22132 9983 0x80004002 [ 775.300298][ T1128] Call Trace: [ 775.300320][ T1128] __schedule+0x934/0x1f90 [ 775.300347][ T1128] ? __sched_text_start+0x8/0x8 [ 775.300361][ T1128] ? lock_downgrade+0x920/0x920 [ 775.300378][ T1128] ? rwlock_bug.part.0+0x90/0x90 [ 775.300411][ T1128] schedule+0xdc/0x2b0 [ 775.300432][ T1128] schedule_preempt_disabled+0x13/0x20 [ 775.300447][ T1128] __mutex_lock+0x7ab/0x13c0 [ 775.300468][ T1128] ? fb_release+0x55/0x150 [ 775.300492][ T1128] ? mutex_trylock+0x2d0/0x2d0 [ 775.300510][ T1128] ? __kasan_check_read+0x11/0x20 [ 775.300528][ T1128] ? __lock_acquire+0x16f2/0x4a00 [ 775.300544][ T1128] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 775.300559][ T1128] ? fsnotify+0x7fd/0xbb0 [ 775.300588][ T1128] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 775.300603][ T1128] ? locks_remove_file+0x32f/0x580 [ 775.300619][ T1128] ? fsnotify_first_mark+0x210/0x210 [ 775.300645][ T1128] mutex_lock_nested+0x16/0x20 [ 775.300659][ T1128] ? mutex_lock_nested+0x16/0x20 [ 775.300673][ T1128] fb_release+0x55/0x150 [ 775.300694][ T1128] __fput+0x2ff/0x890 [ 775.300718][ T1128] ? unregister_framebuffer+0x40/0x40 [ 775.300739][ T1128] ____fput+0x16/0x20 [ 775.300756][ T1128] task_work_run+0x145/0x1c0 [ 775.300785][ T1128] do_exit+0xba9/0x2f50 [ 775.300805][ T1128] ? do_group_exit+0x2e2/0x360 [ 775.300835][ T1128] ? mm_update_next_owner+0x7c0/0x7c0 [ 775.300848][ T1128] ? preempt_schedule_common+0x63/0xe0 [ 775.300870][ T1128] ? preempt_schedule+0x4b/0x60 [ 775.300887][ T1128] ? ___preempt_schedule+0x16/0x18 [ 775.300921][ T1128] do_group_exit+0x135/0x360 [ 775.300947][ T1128] __x64_sys_exit_group+0x44/0x50 [ 775.300965][ T1128] do_syscall_64+0xfa/0x790 [ 775.300989][ T1128] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 775.300999][ T1128] RIP: 0033:0x45c449 [ 775.301014][ T1128] Code: 44 00 00 eb 42 90 c7 04 24 02 00 00 00 48 8d 44 24 30 48 89 44 24 08 48 c7 44 24 10 00 00 00 00 c7 44 24 18 08 00 00 00 e8 74 <44> 00 00 48 8b 05 95 47 be 01 48 89 04 24 48 8d 44 24 28 48 89 44 [ 775.301023][ T1128] RSP: 002b:0000000000c7fae8 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7 [ 775.301037][ T1128] RAX: ffffffffffffffda RBX: 000000000000000b RCX: 000000000045c449 [ 775.301046][ T1128] RDX: 0000000000415f21 RSI: 0000000000c870d0 RDI: 0000000000000000 [ 775.301055][ T1128] RBP: 00000000004c1e6b R08: 000000000000000c R09: 0000000000c7fbf0 [ 775.301064][ T1128] R10: 00000000027b8940 R11: 0000000000000246 R12: 000000000076bfc0 [ 775.301074][ T1128] R13: 0000000000000002 R14: 0000000000000001 R15: 000000000076bfcc [ 775.301116][ T1128] [ 775.301116][ T1128] Showing all locks held in the system: [ 775.301131][ T1128] 1 lock held by khungtaskd/1128: [ 775.301136][ T1128] #0: ffffffff89bac240 (rcu_read_lock){....}, at: debug_show_all_locks+0x5f/0x279 [ 775.301202][ T1128] 1 lock held by rsyslogd/9841: [ 775.301208][ T1128] #0: ffff88809a922ba0 (&f->f_pos_lock){+.+.}, at: __fdget_pos+0xee/0x110 [ 775.301248][ T1128] 2 locks held by getty/9931: [ 775.301252][ T1128] #0: ffff888098ae8090 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 775.301279][ T1128] #1: ffffc9000170f2e0 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x220/0x1bf0 [ 775.301336][ T1128] 2 locks held by getty/9932: [ 775.301341][ T1128] #0: ffff88808d796090 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 775.301369][ T1128] #1: ffffc900016fb2e0 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x220/0x1bf0 [ 775.301447][ T1128] 2 locks held by getty/9933: [ 775.301458][ T1128] #0: ffff8880a7f00090 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 775.301499][ T1128] #1: ffffc900017172e0 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x220/0x1bf0 [ 775.301536][ T1128] 2 locks held by getty/9934: [ 775.301541][ T1128] #0: ffff88808ce33090 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 775.301569][ T1128] #1: ffffc9000173b2e0 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x220/0x1bf0 [ 775.301601][ T1128] 2 locks held by getty/9935: [ 775.301606][ T1128] #0: ffff88809ded5090 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 775.301632][ T1128] #1: ffffc9000175b2e0 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x220/0x1bf0 [ 775.301664][ T1128] 2 locks held by getty/9936: [ 775.301669][ T1128] #0: ffff8880a6a5a090 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 775.301696][ T1128] #1: ffffc9000177b2e0 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x220/0x1bf0 [ 775.301729][ T1128] 2 locks held by getty/9937: [ 775.301734][ T1128] #0: ffff88809e423090 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 775.301761][ T1128] #1: ffffc900016cb2e0 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x220/0x1bf0 [ 775.301804][ T1128] 1 lock held by syz-executor.1/10915: [ 775.301809][ T1128] #0: ffff8880a3ef1070 (&fb_info->lock){+.+.}, at: fb_release+0x55/0x150 [ 775.301844][ T1128] 1 lock held by syz-executor.1/11214: [ 775.301849][ T1128] #0: ffff8880a3ef1070 (&fb_info->lock){+.+.}, at: fb_release+0x55/0x150 [ 775.301882][ T1128] 1 lock held by syz-executor.1/11852: [ 775.301887][ T1128] #0: ffff8880a3ef1070 (&fb_info->lock){+.+.}, at: fb_release+0x55/0x150 [ 775.301919][ T1128] 1 lock held by syz-executor.1/12233: [ 775.301924][ T1128] #0: ffff8880a3ef1070 (&fb_info->lock){+.+.}, at: fb_release+0x55/0x150 [ 775.301957][ T1128] 1 lock held by syz-executor.1/12879: [ 775.301962][ T1128] #0: ffff8880a3ef1070 (&fb_info->lock){+.+.}, at: fb_release+0x55/0x150 [ 775.301994][ T1128] 1 lock held by syz-executor.1/13123: [ 775.301999][ T1128] #0: ffff8880a3ef1070 (&fb_info->lock){+.+.}, at: fb_release+0x55/0x150 [ 775.302030][ T1128] 1 lock held by syz-executor.1/13368: [ 775.302035][ T1128] #0: ffff8880a3ef1070 (&fb_info->lock){+.+.}, at: fb_release+0x55/0x150 [ 775.302067][ T1128] 1 lock held by syz-executor.1/13619: [ 775.302072][ T1128] #0: ffff8880a3ef1070 (&fb_info->lock){+.+.}, at: fb_release+0x55/0x150 [ 775.302144][ T1128] 1 lock held by syz-executor.1/13754: [ 775.302150][ T1128] #0: ffff8880a3ef1070 (&fb_info->lock){+.+.}, at: fb_release+0x55/0x150 [ 775.302182][ T1128] 1 lock held by syz-executor.1/15032: [ 775.302187][ T1128] #0: ffff8880a3ef1070 (&fb_info->lock){+.+.}, at: fb_release+0x55/0x150 [ 775.302218][ T1128] 1 lock held by syz-executor.1/15383: [ 775.302223][ T1128] #0: ffff8880a3ef1070 (&fb_info->lock){+.+.}, at: fb_release+0x55/0x150 [ 775.302255][ T1128] 1 lock held by syz-executor.1/15746: [ 775.302260][ T1128] #0: ffff8880a3ef1070 (&fb_info->lock){+.+.}, at: fb_release+0x55/0x150 [ 775.302291][ T1128] 1 lock held by syz-executor.1/16486: [ 775.302296][ T1128] #0: ffff8880a3ef1070 (&fb_info->lock){+.+.}, at: fb_release+0x55/0x150 [ 775.302329][ T1128] 1 lock held by syz-executor.2/23642: [ 775.302334][ T1128] #0: ffff8880a3ef1070 (&fb_info->lock){+.+.}, at: fb_release+0x55/0x150 [ 775.302365][ T1128] 1 lock held by syz-executor.2/24309: [ 775.302370][ T1128] #0: ffff8880a3ef1070 (&fb_info->lock){+.+.}, at: fb_release+0x55/0x150 [ 775.302405][ T1128] 1 lock held by syz-executor.2/15520: [ 775.302410][ T1128] #0: ffff8880a3ef1070 (&fb_info->lock){+.+.}, at: fb_release+0x55/0x150 [ 775.302442][ T1128] 1 lock held by syz-executor.2/16442: [ 775.302447][ T1128] #0: ffff8880a3ef1070 (&fb_info->lock){+.+.}, at: fb_release+0x55/0x150 [ 775.302479][ T1128] 1 lock held by syz-executor.2/17192: [ 775.302484][ T1128] #0: ffff8880a3ef1070 (&fb_info->lock){+.+.}, at: fb_release+0x55/0x150 [ 775.302515][ T1128] 1 lock held by syz-executor.2/17908: [ 775.302520][ T1128] #0: ffff8880a3ef1070 (&fb_info->lock){+.+.}, at: fb_release+0x55/0x150 [ 775.302550][ T1128] 1 lock held by syz-executor.2/18777: [ 775.302556][ T1128] #0: ffff8880a3ef1070 (&fb_info->lock){+.+.}, at: fb_release+0x55/0x150 [ 775.302587][ T1128] 1 lock held by syz-executor.1/19184: [ 775.302592][ T1128] #0: ffff8880a3ef1070 (&fb_info->lock){+.+.}, at: fb_release+0x55/0x150 [ 775.302619][ T1128] 1 lock held by syz-executor.2/19340: [ 775.302624][ T1128] #0: ffff8880a3ef1070 (&fb_info->lock){+.+.}, at: fb_release+0x55/0x150 [ 775.302651][ T1128] 1 lock held by syz-executor.2/20192: [ 775.302656][ T1128] #0: ffff8880a3ef1070 (&fb_info->lock){+.+.}, at: fb_release+0x55/0x150 [ 775.302688][ T1128] 1 lock held by syz-executor.2/21090: [ 775.302693][ T1128] #0: ffff8880a3ef1070 (&fb_info->lock){+.+.}, at: fb_release+0x55/0x150 [ 775.302724][ T1128] 1 lock held by syz-executor.2/21850: [ 775.302729][ T1128] #0: ffff8880a3ef1070 (&fb_info->lock){+.+.}, at: fb_release+0x55/0x150 [ 775.302761][ T1128] 1 lock held by syz-executor.2/22538: [ 775.302766][ T1128] #0: ffff8880a3ef1070 (&fb_info->lock){+.+.}, at: fb_release+0x55/0x150 [ 775.302797][ T1128] 1 lock held by syz-executor.2/32268: [ 775.302802][ T1128] #0: ffff8880a3ef1070 (&fb_info->lock){+.+.}, at: fb_release+0x55/0x150 [ 775.302836][ T1128] 1 lock held by syz-executor.1/21722: [ 775.302841][ T1128] #0: ffff8880a3ef1070 (&fb_info->lock){+.+.}, at: fb_release+0x55/0x150 [ 775.302872][ T1128] 1 lock held by syz-executor.2/22132: [ 775.302877][ T1128] #0: ffff8880a3ef1070 (&fb_info->lock){+.+.}, at: fb_release+0x55/0x150 [ 775.302913][ T1128] 2 locks held by syz-executor.5/22144: [ 775.302924][ T1128] 1 lock held by syz-executor.1/23084: [ 775.302929][ T1128] #0: ffff8880a3ef1070 (&fb_info->lock){+.+.}, at: fb_open+0xd7/0x450 [ 775.302957][ T1128] [ 775.302963][ T1128] ============================================= [ 775.302963][ T1128] [ 775.302971][ T1128] NMI backtrace for cpu 1 [ 775.302987][ T1128] CPU: 1 PID: 1128 Comm: khungtaskd Not tainted 5.6.0-rc2-syzkaller #0 [ 775.302996][ T1128] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 775.303002][ T1128] Call Trace: [ 775.303023][ T1128] dump_stack+0x197/0x210 [ 775.303077][ T1128] nmi_cpu_backtrace.cold+0x70/0xb2 [ 775.303134][ T1128] ? vprintk_func+0x86/0x189 [ 775.303178][ T1128] ? lapic_can_unplug_cpu.cold+0x3a/0x3a [ 775.303195][ T1128] nmi_trigger_cpumask_backtrace+0x23b/0x28b [ 775.303243][ T1128] arch_trigger_cpumask_backtrace+0x14/0x20 [ 775.303259][ T1128] watchdog+0xb11/0x10c0 [ 775.303292][ T1128] kthread+0x361/0x430 [ 775.303309][ T1128] ? reset_hung_task_detector+0x30/0x30 [ 775.303324][ T1128] ? kthread_mod_delayed_work+0x1f0/0x1f0 [ 775.303345][ T1128] ret_from_fork+0x24/0x30 [ 775.303383][ T1128] Sending NMI from CPU 1 to CPUs 0: [ 775.304071][ C0] NMI backtrace for cpu 0 [ 775.304077][ C0] CPU: 0 PID: 22144 Comm: syz-executor.5 Not tainted 5.6.0-rc2-syzkaller #0 [ 775.304082][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 775.304087][ C0] RIP: 0010:__sanitizer_cov_trace_pc+0x2b/0x50 [ 775.304097][ C0] Code: 48 89 e5 65 48 8b 04 25 c0 1e 02 00 65 8b 15 e4 8b 8c 7e 81 e2 00 01 1f 00 48 8b 75 08 75 2b 8b 90 80 13 00 00 83 fa 02 75 20 <48> 8b 88 88 13 00 00 8b 80 84 13 00 00 48 8b 11 48 83 c2 01 48 39 [ 775.304101][ C0] RSP: 0018:ffffc90001b5f528 EFLAGS: 00000246 [ 775.304109][ C0] RAX: ffff88804f098400 RBX: 000000000000003c RCX: ffffffff83cbf230 [ 775.304113][ C0] RDX: 0000000000000002 RSI: ffffffff83cbf21a RDI: 0000000000000004 [ 775.304118][ C0] RBP: ffffc90001b5f528 R08: ffff88804f098400 R09: ffffed10147d0b34 [ 775.304123][ C0] R10: ffffed10147d0b33 R11: ffff8880a3e8599f R12: 000000000000001a [ 775.304127][ C0] R13: ffff8880000a001a R14: ffff8880000a0000 R15: 0000000000000000 [ 775.304133][ C0] FS: 00007fd69e352700(0000) GS:ffff8880ae800000(0000) knlGS:0000000000000000 [ 775.304137][ C0] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 775.304142][ C0] CR2: 000000000076c000 CR3: 000000009f654000 CR4: 00000000001406f0 [ 775.304146][ C0] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 775.304151][ C0] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 775.304153][ C0] Call Trace: [ 775.304156][ C0] vga16fb_fillrect+0xa0a/0x19b0 [ 775.304160][ C0] bit_clear_margins+0x30b/0x530 [ 775.304163][ C0] ? bit_bmove+0x270/0x270 [ 775.304166][ C0] ? vesafb_probe.cold+0x1279/0x1279 [ 775.304169][ C0] fbcon_clear_margins+0x1e9/0x250 [ 775.304172][ C0] fbcon_switch+0xd7f/0x17f0 [ 775.304176][ C0] ? fbcon_set_def_font+0x360/0x360 [ 775.304179][ C0] ? kcov_common_handle+0x20/0x20 [ 775.304183][ C0] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 775.304186][ C0] ? fbcon_set_origin+0x2b/0x50 [ 775.304189][ C0] ? fbcon_scrolldelta+0x1220/0x1220 [ 775.304193][ C0] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 775.304196][ C0] redraw_screen+0x2b6/0x7d0 [ 775.304199][ C0] ? vesafb_probe.cold+0x1279/0x1279 [ 775.304203][ C0] ? respond_string+0x2c0/0x2c0 [ 775.304206][ C0] ? fbcon_set_palette+0x3c4/0x4a0 [ 775.304209][ C0] fbcon_modechanged+0x5c3/0x790 [ 775.304212][ C0] fbcon_update_vcs+0x42/0x50 [ 775.304215][ C0] fb_set_var+0xb32/0xdd0 [ 775.304218][ C0] ? fb_blank+0x1a0/0x1a0 [ 775.304221][ C0] ? lock_acquire+0x190/0x410 [ 775.304224][ C0] ? __mutex_lock+0x458/0x13c0 [ 775.304227][ C0] ? down+0x50/0x90 [ 775.304230][ C0] ? do_fb_ioctl+0x335/0x7d0 [ 775.304233][ C0] do_fb_ioctl+0x390/0x7d0 [ 775.304236][ C0] ? fb_mmap+0x560/0x560 [ 775.304240][ C0] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 775.304243][ C0] ? __this_cpu_preempt_check+0x35/0x190 [ 775.304246][ C0] ? retint_kernel+0x2b/0x2b [ 775.304250][ C0] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 775.304254][ C0] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 775.304257][ C0] ? do_vfs_ioctl+0x568/0x13b0 [ 775.304261][ C0] ? ns_to_kernel_old_timeval+0x100/0x100 [ 775.304264][ C0] fb_ioctl+0xe6/0x130 [ 775.304267][ C0] ? do_fb_ioctl+0x7d0/0x7d0 [ 775.304270][ C0] ksys_ioctl+0x123/0x180 [ 775.304273][ C0] __x64_sys_ioctl+0x73/0xb0 [ 775.304276][ C0] do_syscall_64+0xfa/0x790 [ 775.304280][ C0] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 775.304282][ C0] RIP: 0033:0x45c449 [ 775.304292][ C0] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 775.304296][ C0] RSP: 002b:00007fd69e351c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 775.304304][ C0] RAX: ffffffffffffffda RBX: 00007fd69e3526d4 RCX: 000000000045c449 [ 775.304309][ C0] RDX: 0000000020000000 RSI: 0000000000004601 RDI: 0000000000000005 [ 775.304313][ C0] RBP: 000000000076bf20 R08: 0000000000000000 R09: 0000000000000000 [ 775.304318][ C0] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 775.304323][ C0] R13: 00000000000002ef R14: 00000000004c5076 R15: 000000000076bf2c [ 775.328523][ T1128] Kernel panic - not syncing: hung_task: blocked tasks [ 775.328542][ T1128] CPU: 1 PID: 1128 Comm: khungtaskd Not tainted 5.6.0-rc2-syzkaller #0 [ 775.328551][ T1128] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 775.328556][ T1128] Call Trace: [ 775.328580][ T1128] dump_stack+0x197/0x210 [ 775.328605][ T1128] panic+0x2e3/0x75c [ 775.328621][ T1128] ? add_taint.cold+0x16/0x16 [ 775.328639][ T1128] ? lapic_can_unplug_cpu.cold+0x3a/0x3a [ 775.328661][ T1128] ? ___preempt_schedule+0x16/0x18 [ 775.328683][ T1128] ? nmi_trigger_cpumask_backtrace+0x21b/0x28b [ 775.328698][ T1128] ? nmi_trigger_cpumask_backtrace+0x24c/0x28b [ 775.328713][ T1128] ? nmi_trigger_cpumask_backtrace+0x256/0x28b [ 775.328728][ T1128] ? nmi_trigger_cpumask_backtrace+0x21b/0x28b [ 775.328754][ T1128] watchdog+0xb22/0x10c0 [ 775.328787][ T1128] kthread+0x361/0x430 [ 775.328804][ T1128] ? reset_hung_task_detector+0x30/0x30 [ 775.328817][ T1128] ? kthread_mod_delayed_work+0x1f0/0x1f0 [ 775.328839][ T1128] ret_from_fork+0x24/0x30 [ 775.330771][ T1128] Kernel Offset: disabled [ 777.943869][ T1128] Rebooting in 86400 seconds..