f0000000380)={r3, 0xe8, &(0x7f00000006c0)=[@in={0x2, 0x4e24, @multicast1}, @in={0x2, 0x4e24, @local}, @in6={0xa, 0x4e23, 0x10001, @mcast2, 0x8}, @in={0x2, 0x4e23, @broadcast}, @in6={0xa, 0x4e22, 0x74cec463, @loopback, 0x7}, @in6={0xa, 0x4e24, 0x0, @loopback, 0xffffffff}, @in6={0xa, 0x4e22, 0x5, @mcast2, 0x101}, @in6={0xa, 0x4e21, 0xe603, @empty, 0x800}, @in={0x2, 0x4e23, @loopback}, @in6={0xa, 0x4e24, 0x7, @loopback, 0x101}]}, &(0x7f00000003c0)=0xc) lsetxattr$security_selinux(&(0x7f0000000880)='./file0\x00', &(0x7f0000000400)='security.selinux\x00', &(0x7f0000000900)='system_u:object_r:auditctl_exec_t:s0\x00', 0x25, 0x1) r4 = getpgrp(0x0) setpriority(0x0, r4, 0xffff) fcntl$setpipe(r0, 0x407, 0x0) r5 = request_key(&(0x7f0000000000)='syzkaller\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000080)='-/{*wlan0(wlan1vmnet1eth1$cpuset\x9e+\x00', 0xfffffffffffffffb) keyctl$get_security(0x11, r5, &(0x7f00000000c0)=""/40, 0x28) semget$private(0x0, 0xfffffffffffffffd, 0x15) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) msgget(0x1, 0x12) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000300)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f00000002c0)='\xba[']) 07:21:06 executing program 0: socket$alg(0x26, 0x5, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) lsetxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) setpriority(0x0, 0x0, 0xffff) semget$private(0x0, 0xfffffffffffffffd, 0x15) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:06 executing program 4: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:06 executing program 1: socket$alg(0x26, 0x5, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x400, 0x0) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r0, 0x84, 0x74, &(0x7f0000000480)=""/72, &(0x7f00000001c0)=0x48) socket$inet(0x2b, 0x1, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x0, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000300)='/dev/autofs\x00', 0x800, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(r1, 0xc02c564a, 0x0) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) lsetxattr$security_selinux(&(0x7f0000000880)='./file0\x00', &(0x7f0000000400)='security.selinux\x00', &(0x7f0000000900)='system_u:object_r:auditctl_exec_t:s0\x00', 0x25, 0x1) r2 = getpgrp(0x0) setpriority(0x0, r2, 0xffff) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) msgget(0x1, 0x208) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:06 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @remote}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @random="e5ac78d4c7fd"}, 0x10) write(r2, &(0x7f0000000080)="2700000014000f3f00000000120f0a00110001001f750800560099ed4f05004000000000000000", 0x138) 07:21:06 executing program 5: socket$alg(0x26, 0x5, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x400, 0x0) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r0, 0x84, 0x74, &(0x7f0000000480)=""/72, &(0x7f00000001c0)=0x48) socket$inet(0x2b, 0x1, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x0, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000300)='/dev/autofs\x00', 0x800, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(r1, 0xc02c564a, 0x0) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) lsetxattr$security_selinux(&(0x7f0000000880)='./file0\x00', &(0x7f0000000400)='security.selinux\x00', &(0x7f0000000900)='system_u:object_r:auditctl_exec_t:s0\x00', 0x25, 0x1) r3 = getpgrp(0x0) setpriority(0x0, r3, 0xffff) fcntl$setpipe(r2, 0x407, 0x30) semget$private(0x0, 0xfffffffffffffffd, 0x15) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) msgget(0x1, 0x208) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:06 executing program 0: socket$alg(0x26, 0x5, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) lsetxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) setpriority(0x0, 0x0, 0xffff) semget$private(0x0, 0xfffffffffffffffd, 0x15) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\xef']) 07:21:06 executing program 4: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:06 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @remote}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @random="e5ac78d4c7fd"}, 0x10) write(r2, &(0x7f0000000080)="2700000014000f3f00000000120f0a00110001001f750800560099ed4f05006000000000000000", 0x138) 07:21:06 executing program 3: socket$alg(0x26, 0x5, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x400, 0x0) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r0, 0x84, 0x74, &(0x7f0000000480)=""/72, &(0x7f00000001c0)=0x48) socket$inet(0x2b, 0x1, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x0, 0x0) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000300)='/dev/autofs\x00', 0x800, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(r2, 0xc02c564a, 0x0) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) lsetxattr$security_selinux(&(0x7f0000000880)='./file0\x00', &(0x7f0000000400)='security.selinux\x00', &(0x7f0000000900)='system_u:object_r:auditctl_exec_t:s0\x00', 0x25, 0x1) r4 = getpgrp(0x0) setpriority(0x0, r4, 0xffff) ioctl$DRM_IOCTL_RES_CTX(r1, 0xc0086426, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{}, {}, {0x0}]}) ioctl$DRM_IOCTL_RM_CTX(r1, 0xc0086421, &(0x7f0000000080)={r5, 0x3}) fcntl$setpipe(r3, 0x407, 0x30) semget$private(0x0, 0xfffffffffffffffd, 0x15) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) msgget(0x1, 0x208) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:06 executing program 1: socket$alg(0x26, 0x5, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x400, 0x0) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r0, 0x84, 0x74, &(0x7f0000000480)=""/72, &(0x7f00000001c0)=0x48) socket$inet(0x2b, 0x1, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x0, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000300)='/dev/autofs\x00', 0x800, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(r1, 0xc02c564a, 0x0) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) lsetxattr$security_selinux(&(0x7f0000000880)='./file0\x00', &(0x7f0000000400)='security.selinux\x00', &(0x7f0000000900)='system_u:object_r:auditctl_exec_t:s0\x00', 0x25, 0x1) r2 = getpgrp(0x0) setpriority(0x0, r2, 0xffff) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) msgget(0x1, 0x208) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\xff']) 07:21:07 executing program 4: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:07 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @remote}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @random="e5ac78d4c7fd"}, 0x10) write(r2, &(0x7f0000000080)="2700000014000f3f00000000120f0a00110001001f750800560099ed4f050ec000000000000000", 0x138) 07:21:07 executing program 5: socket$alg(0x26, 0x5, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x400, 0x0) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r0, 0x84, 0x74, &(0x7f0000000480)=""/72, &(0x7f00000001c0)=0x48) socket$inet(0x2b, 0x1, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x0, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000300)='/dev/autofs\x00', 0x800, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(r1, 0xc02c564a, 0x0) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) lsetxattr$security_selinux(&(0x7f0000000880)='./file0\x00', &(0x7f0000000400)='security.selinux\x00', &(0x7f0000000900)='system_u:object_r:auditctl_exec_t:s0\x00', 0x25, 0x1) r2 = getpgrp(0x0) setpriority(0x0, r2, 0xffff) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) msgget(0x1, 0x208) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:07 executing program 0: socket$alg(0x26, 0x5, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) lsetxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) setpriority(0x0, 0x0, 0xffff) semget$private(0x0, 0xfffffffffffffffd, 0x15) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x7f']) 07:21:07 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @remote}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @random="e5ac78d4c7fd"}, 0x10) write(r2, &(0x7f0000000080)="2700000014000f3f00000000120f0a00110001001f750800560099ed4f050be900000000000000", 0x138) 07:21:07 executing program 4: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:07 executing program 3: socket$alg(0x26, 0x5, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x400, 0x0) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r0, 0x84, 0x74, &(0x7f0000000480)=""/72, &(0x7f00000001c0)=0x48) socket$inet(0x2b, 0x1, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x0, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000300)='/dev/autofs\x00', 0x800, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(r1, 0xc02c564a, 0x0) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) lsetxattr$security_selinux(&(0x7f0000000880)='./file0\x00', &(0x7f0000000400)='security.selinux\x00', &(0x7f0000000900)='system_u:object_r:auditctl_exec_t:s0\x00', 0x25, 0x1) r3 = getpgrp(0x0) setpriority(0x0, r3, 0xffff) fcntl$setpipe(r2, 0x407, 0x30) semget$private(0x0, 0xfffffffffffffffd, 0x13) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) msgget(0x1, 0x208) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:07 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @remote}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @random="e5ac78d4c7fd"}, 0x10) write(r2, &(0x7f0000000080)="2700000014000f3f00000000120f0a00110001001f750800560099ed4f0500f000000000000000", 0x138) 07:21:07 executing program 1: socket$alg(0x26, 0x5, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x400, 0x0) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r0, 0x84, 0x74, &(0x7f0000000480)=""/72, &(0x7f00000001c0)=0x48) socket$inet(0x2b, 0x1, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x0, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000300)='/dev/autofs\x00', 0x800, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(r1, 0xc02c564a, 0x0) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) lsetxattr$security_selinux(&(0x7f0000000880)='./file0\x00', &(0x7f0000000400)='security.selinux\x00', &(0x7f0000000900)='system_u:object_r:auditctl_exec_t:s0\x00', 0x25, 0x1) r2 = getpgrp(0x0) setpriority(0x0, r2, 0xffff) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) msgget(0x1, 0x208) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:07 executing program 4: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:07 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @remote}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @random="e5ac78d4c7fd"}, 0x10) write(r2, &(0x7f0000000080)="2700000014000f3f00000000120f0a00110001001f750800560099ed4f05004003000000000000", 0x138) 07:21:07 executing program 0: socket$alg(0x26, 0x5, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) lsetxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) setpriority(0x0, 0x0, 0xffff) semget$private(0x0, 0xfffffffffffffffd, 0x15) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x8c']) 07:21:07 executing program 3: socket$alg(0x26, 0x5, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x400, 0x0) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r0, 0x84, 0x74, &(0x7f0000000480)=""/72, &(0x7f00000001c0)=0x48) socket$inet(0x2b, 0xb, 0x400000000000006) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_POWER_STATE(r1, 0x800455d1, &(0x7f0000000380)) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000500)={{{@in, @in=@loopback}}, {{@in6=@loopback}, 0x0, @in=@remote}}, &(0x7f0000000000)=0xe8) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000300)='/dev/autofs\x00', 0x800, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(r2, 0xc02c564a, 0x0) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={0x0, r0, 0x0, 0x11, &(0x7f0000000100)='security.selinux\x00', 0xffffffffffffffff}, 0x30) perf_event_open(&(0x7f0000000280)={0x0, 0x70, 0x7, 0x769e, 0x100, 0x1, 0x0, 0x81, 0x40, 0x1, 0x7, 0x9, 0x3, 0x8, 0x1f, 0x7f, 0xcb, 0x9, 0x3f, 0x0, 0xff, 0x8, 0xfffffffffffffffa, 0x3a0, 0xfff, 0x2, 0x7f, 0x1, 0x3, 0x6, 0x9, 0x6, 0x8000, 0x70, 0x9, 0x9, 0x4, 0xff, 0x0, 0x1ff, 0x0, @perf_config_ext={0x3, 0xff}, 0x2, 0x1f, 0x0, 0xf, 0x0, 0xffffffffffffffda, 0x100}, r4, 0x6, r0, 0x0) lsetxattr$security_selinux(&(0x7f0000000880)='./file0\x00', &(0x7f0000000400)='security.selinux\x00', &(0x7f0000000900)='system_u:object_r:auditctl_exec_t:s0\x00', 0x25, 0x1) r5 = getpgrp(r4) setpriority(0x0, r5, 0xffff) fcntl$setpipe(r3, 0x407, 0x30) semget$private(0x0, 0xfffffffffffffffd, 0x15) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) msgget(0x1, 0x208) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000040)='wlan1\x00', &(0x7f0000000080)='/dev/sequencer2\x00'], &(0x7f0000000780)) 07:21:08 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @remote}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @random="e5ac78d4c7fd"}, 0x10) write(r2, &(0x7f0000000080)="2700000014000f3f00000000120f0a00110001001f750800560099ed4f0500f000000000000000", 0x138) 07:21:08 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @remote}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @random="e5ac78d4c7fd"}, 0x10) write(r2, &(0x7f0000000080)="2700000014000f3f00000000120f0a00110001001f750800560099ed4f05000340000000000000", 0x138) 07:21:08 executing program 4: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:08 executing program 5: socket$alg(0x26, 0x5, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x400, 0x0) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r0, 0x84, 0x74, &(0x7f0000000480)=""/72, &(0x7f00000001c0)=0x48) socket$inet(0x2b, 0x1, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x0, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000300)='/dev/autofs\x00', 0x800, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(r1, 0xc02c564a, 0x0) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) lsetxattr$security_selinux(&(0x7f0000000880)='./file0\x00', &(0x7f0000000400)='security.selinux\x00', &(0x7f0000000900)='system_u:object_r:auditctl_exec_t:s0\x00', 0x25, 0x1) r3 = getpgrp(0x0) setpriority(0x0, r3, 0xffff) fcntl$setpipe(r2, 0x407, 0x30) semget$private(0x0, 0xfffffffffffffffd, 0x15) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) msgget(0x1, 0x208) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:08 executing program 1: socket$alg(0x26, 0x5, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x400, 0x0) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r0, 0x84, 0x74, &(0x7f0000000480)=""/72, &(0x7f00000001c0)=0x48) socket$inet(0x2b, 0x1, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x0, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000300)='/dev/autofs\x00', 0x800, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(r1, 0xc02c564a, 0x0) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) lsetxattr$security_selinux(&(0x7f0000000880)='./file0\x00', &(0x7f0000000400)='security.selinux\x00', &(0x7f0000000900)='system_u:object_r:auditctl_exec_t:s0\x00', 0x25, 0x1) r2 = getpgrp(0x0) setpriority(0x0, r2, 0xffff) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) msgget(0x1, 0x208) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:08 executing program 0: socket$alg(0x26, 0x5, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) lsetxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) setpriority(0x0, 0x0, 0xffff) semget$private(0x0, 0xfffffffffffffffd, 0x15) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\xf6']) 07:21:08 executing program 4: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\xfd']) 07:21:08 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x400, 0x0) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r1, 0x84, 0x74, &(0x7f0000000480)=""/72, &(0x7f00000001c0)=0x48) r2 = socket$inet(0x2b, 0x1, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x0, 0x0) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000300)='/dev/autofs\x00', 0x800, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(r3, 0xc02c564a, 0x0) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) lsetxattr$security_selinux(&(0x7f0000000880)='./file0\x00', &(0x7f0000000400)='security.selinux\x00', &(0x7f0000000900)='system_u:object_r:auditctl_exec_t:s0\x00', 0x25, 0x1) fcntl$getownex(r0, 0x10, &(0x7f00000006c0)={0x0, 0x0}) getresuid(&(0x7f0000000700), &(0x7f00000007c0), &(0x7f0000000800)=0x0) ioctl$DRM_IOCTL_GET_CLIENT(r3, 0xc0186405, &(0x7f0000000840)={0x5, 0x2, r5, 0x0, r6, 0x0, 0x6, 0x7}) r7 = getpgrp(0x0) setpriority(0x0, r7, 0xffff) fcntl$setpipe(r4, 0x407, 0x30) execve(&(0x7f0000000080)='./file0\x00', &(0x7f00000002c0)=[&(0x7f00000000c0)='!\x00', &(0x7f0000000100)='proc,,systemHsecurityself\x00', &(0x7f0000000280)='security.capability\x00'], &(0x7f0000000500)=[&(0x7f0000000340)='security.selinux\x00', &(0x7f0000000380)='cgroup]keyring\xe8\x00', &(0x7f00000003c0)='security.selinux\x00']) semget$private(0x0, 0xfffffffffffffffd, 0x15) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) msgget(0x1, 0x208) getsockopt$inet_int(r2, 0x0, 0x3f, &(0x7f0000000000), &(0x7f0000000040)=0x4) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$IPT_SO_GET_REVISION_TARGET(r3, 0x0, 0x43, &(0x7f0000000540)={'TPROXY\x00'}, &(0x7f00000005c0)=0x1e) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:08 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @remote}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @random="e5ac78d4c7fd"}, 0x10) write(r2, &(0x7f0000000080)="2700000014000f3f00000000120f0a00110001001f750800560099ed4f05fffff0000000000000", 0x138) 07:21:08 executing program 0: socket$alg(0x26, 0x5, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) lsetxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) setpriority(0x0, 0x0, 0xffff) semget$private(0x0, 0xfffffffffffffffd, 0x15) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\xfe']) 07:21:08 executing program 4: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x0f']) 07:21:08 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @remote}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @random="e5ac78d4c7fd"}, 0x10) write(r2, &(0x7f0000000080)="2700000014000f3f00000000120f0a00110001001f750800560099ed4f05000000010000000000", 0x138) 07:21:08 executing program 5: socket$alg(0x26, 0x5, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x400, 0x0) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r0, 0x84, 0x74, &(0x7f0000000480)=""/72, &(0x7f00000001c0)=0x48) socket$inet(0x2b, 0x1, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x0, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000300)='/dev/autofs\x00', 0x800, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(r1, 0xc02c564a, 0x0) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) lsetxattr$security_selinux(&(0x7f0000000880)='./file0\x00', &(0x7f0000000400)='security.selinux\x00', &(0x7f0000000900)='system_u:object_r:auditctl_exec_t:s0\x00', 0x25, 0x1) r2 = getpgrp(0x0) setpriority(0x0, r2, 0xffff) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) msgget(0x1, 0x208) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:09 executing program 3: socket$alg(0x26, 0x5, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x400, 0x0) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r0, 0x84, 0x74, &(0x7f0000000480)=""/72, &(0x7f00000001c0)=0x48) socket$inet(0x2b, 0x1, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x0, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000300)='/dev/autofs\x00', 0x800, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(r1, 0xc02c564a, 0x0) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) lsetxattr$security_selinux(&(0x7f0000000880)='./file0\x00', &(0x7f0000000400)='security.selinux\x00', &(0x7f0000000900)='system_u:object_r:auditctl_exec_t:s0\x00', 0x25, 0x1) r3 = getpgrp(0x0) setpriority(0x0, r3, 0xffff) fcntl$setpipe(r2, 0x407, 0x30) semget$private(0x0, 0xfffffffffffffffd, 0x15) msgget(0x1, 0x208) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:09 executing program 1: socket$alg(0x26, 0x5, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x400, 0x0) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r0, 0x84, 0x74, &(0x7f0000000480)=""/72, &(0x7f00000001c0)=0x48) socket$inet(0x2b, 0x1, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x0, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000300)='/dev/autofs\x00', 0x800, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(r1, 0xc02c564a, 0x0) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) lsetxattr$security_selinux(&(0x7f0000000880)='./file0\x00', &(0x7f0000000400)='security.selinux\x00', &(0x7f0000000900)='system_u:object_r:auditctl_exec_t:s0\x00', 0x25, 0x1) r2 = getpgrp(0x0) setpriority(0x0, r2, 0xffff) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) msgget(0x1, 0x208) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:09 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @remote}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @random="e5ac78d4c7fd"}, 0x10) write(r2, &(0x7f0000000080)="2700000014000f3f00000000120f0a00110001001f750800560099ed4f05000000020000000000", 0x138) 07:21:09 executing program 4: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\xef']) 07:21:09 executing program 3: socket$alg(0x26, 0x5, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0xa00, 0x0) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r0, 0x84, 0x74, &(0x7f0000000340)=""/72, &(0x7f00000002c0)=0x48) socket$inet(0x2b, 0x1, 0x0) mkdirat$cgroup(r0, &(0x7f00000001c0)='syz1\x00', 0x1ff) openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x0, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000300)='/dev/autofs\x00', 0x800, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(r1, 0xc02c564a, 0x0) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffd66) lsetxattr$security_selinux(&(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='security.selinux\x00', &(0x7f0000000900)='system_u:r:auditctl_exJc_t:s0\x00\x00\x00\x00\x00\x00\x00\x00', 0xfffffe13, 0x1) r3 = getpgrp(0x0) setpriority(0x0, r3, 0xffff) fcntl$setpipe(r2, 0x407, 0x30) semget$private(0x0, 0xfffffffffffffffd, 0x15) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) msgget(0x1, 0x208) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)=[&(0x7f0000000040)='wlan1\x00', &(0x7f0000000080)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:09 executing program 0: socket$alg(0x26, 0x5, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) lsetxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) setpriority(0x0, 0x0, 0xffff) semget$private(0x0, 0xfffffffffffffffd, 0x15) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:09 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @remote}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @random="e5ac78d4c7fd"}, 0x10) write(r2, &(0x7f0000000080)="2700000014000f3f00000000120f0a00110001001f750800560099ed4f05000000040000000000", 0x138) 07:21:09 executing program 4: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:09 executing program 5: socket$alg(0x26, 0x5, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x400, 0x0) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r0, 0x84, 0x74, &(0x7f0000000480)=""/72, &(0x7f00000001c0)=0x48) socket$inet(0x2b, 0x1, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x0, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000300)='/dev/autofs\x00', 0x800, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(r1, 0xc02c564a, 0x0) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) lsetxattr$security_selinux(&(0x7f0000000880)='./file0\x00', &(0x7f0000000400)='security.selinux\x00', &(0x7f0000000900)='system_u:object_r:auditctl_exec_t:s0\x00', 0x25, 0x1) r3 = getpgrp(0x0) setpriority(0x0, r3, 0xffff) fcntl$setpipe(r2, 0x407, 0x30) semget$private(0x0, 0xfffffffffffffffd, 0x15) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) msgget(0x1, 0x208) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:09 executing program 1: socket$alg(0x26, 0x5, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x400, 0x0) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r0, 0x84, 0x74, &(0x7f0000000480)=""/72, &(0x7f00000001c0)=0x48) socket$inet(0x2b, 0x1, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x0, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000300)='/dev/autofs\x00', 0x800, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(r1, 0xc02c564a, 0x0) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) lsetxattr$security_selinux(&(0x7f0000000880)='./file0\x00', &(0x7f0000000400)='security.selinux\x00', &(0x7f0000000900)='system_u:object_r:auditctl_exec_t:s0\x00', 0x25, 0x1) r2 = getpgrp(0x0) setpriority(0x0, r2, 0xffff) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) msgget(0x1, 0x208) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:09 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @remote}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @random="e5ac78d4c7fd"}, 0x10) write(r2, &(0x7f0000000080)="2700000014000f3f00000000120f0a00110001001f750800560099ed4f050000000a0000000000", 0x138) 07:21:09 executing program 0: socket$alg(0x26, 0x5, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) lsetxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) setpriority(0x0, 0x0, 0xffff) semget$private(0x0, 0xfffffffffffffffd, 0x15) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:09 executing program 4: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:10 executing program 3: socket$alg(0x26, 0x5, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x400, 0x0) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r0, 0x84, 0x74, &(0x7f0000000480)=""/72, &(0x7f00000001c0)=0x48) socket$inet(0x2b, 0x1, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x0, 0x0) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000300)='/dev/autofs\x00', 0x800, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(r2, 0xc02c564a, 0x0) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) lsetxattr$security_selinux(&(0x7f0000000880)='./file0\x00', &(0x7f0000000400)='security.selinux\x00', &(0x7f0000000900)='system_u:object_r:auditctl_exec_t:s0\x00', 0x25, 0x1) r4 = getpgrp(0x0) setpriority(0x0, r4, 0xffff) fcntl$setpipe(r3, 0x407, 0x30) semget$private(0x0, 0xfffffffffffffffd, 0x15) open(&(0x7f0000000180)='./file0\x00', 0x2, 0x10) msgget(0x1, 0x208) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:10 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @remote}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @random="e5ac78d4c7fd"}, 0x10) write(r2, &(0x7f0000000080)="2700000014000f3f00000000120f0a00110001001f750800560099ed4f050000000e0000000000", 0x138) 07:21:10 executing program 1: socket$alg(0x26, 0x5, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x400, 0x0) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r0, 0x84, 0x74, &(0x7f0000000480)=""/72, &(0x7f00000001c0)=0x48) socket$inet(0x2b, 0x1, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x0, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000300)='/dev/autofs\x00', 0x800, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(r1, 0xc02c564a, 0x0) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) lsetxattr$security_selinux(&(0x7f0000000880)='./file0\x00', &(0x7f0000000400)='security.selinux\x00', &(0x7f0000000900)='system_u:object_r:auditctl_exec_t:s0\x00', 0x25, 0x1) r2 = getpgrp(0x0) setpriority(0x0, r2, 0xffff) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) msgget(0x1, 0x208) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\xef']) 07:21:10 executing program 3: socket$alg(0x26, 0x5, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x400, 0x0) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r0, 0x84, 0x74, &(0x7f0000000480)=""/72, &(0x7f00000001c0)=0x48) socket$inet(0x2b, 0x1, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x0, 0x0) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000300)='/dev/autofs\x00', 0x800, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(r2, 0xc02c564a, 0x0) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_dccp_int(r1, 0x21, 0x5, &(0x7f0000000040)=0xfffffffffffffffc, 0x4) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) lsetxattr$security_selinux(&(0x7f0000000880)='./file0\x00', &(0x7f0000000400)='security.selinux\x00', &(0x7f0000000900)='system_u:object_r:auditctl_exec_t:s0\x00', 0x25, 0x1) r4 = getpgrp(0x0) setpriority(0x0, r4, 0xffff) fcntl$setpipe(r3, 0x407, 0x30) ioctl$KVM_SIGNAL_MSI(r1, 0x4020aea5, &(0x7f0000000000)={0x4000, 0x5000, 0x81, 0x80000001, 0x80000001}) semget$private(0x0, 0xfffffffffffffffd, 0x15) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) msgget(0x1, 0x208) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) socket$rxrpc(0x21, 0x2, 0xa) [ 835.911758][ C1] net_ratelimit: 14 callbacks suppressed [ 835.911765][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 835.923221][ C1] protocol 88fb is buggy, dev hsr_slave_1 07:21:10 executing program 4: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:10 executing program 0: socket$alg(0x26, 0x5, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) lsetxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) setpriority(0x0, 0x0, 0xffff) semget$private(0x0, 0xfffffffffffffffd, 0x15) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:10 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @remote}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @random="e5ac78d4c7fd"}, 0x10) write(r2, &(0x7f0000000080)="2700000014000f3f00000000120f0a00110001001f750800560099ed4f050000000f0000000000", 0x138) 07:21:10 executing program 5 (fault-call:5 fault-nth:0): socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video35\x00', 0x2, 0x0) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 07:21:10 executing program 3: socket$alg(0x26, 0x5, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x400, 0x0) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r0, 0x84, 0x74, &(0x7f0000000480)=""/72, &(0x7f00000001c0)=0x48) socket$inet(0x2b, 0x1, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x0, 0x0) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000300)='/dev/autofs\x00', 0x800, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(r2, 0xc02c564a, 0x0) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) lsetxattr$security_selinux(&(0x7f0000000880)='./file0\x00', &(0x7f0000000400)='security.selinux\x00', &(0x7f0000000900)='system_u:object_r:auditctl_exec_t:s0\x00', 0x25, 0x1) r4 = getpgrp(0x0) r5 = syz_genetlink_get_family_id$nbd(&(0x7f0000000080)='nbd\x00') sendmsg$NBD_CMD_RECONFIGURE(r0, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000280)={&(0x7f00000000c0)={0x7c, r5, 0x20, 0x70bd27, 0x25dfdbfe, {}, [@NBD_ATTR_TIMEOUT={0xc, 0x4, 0x65c1}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x2}, @NBD_ATTR_SOCKETS={0x2c, 0x7, [{0x8, 0x1, r1}, {0x8, 0x1, r1}, {0x8, 0x1, r2}, {0x8, 0x1, r1}, {0x8, 0x1, r0}]}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x1}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x7c}, @NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x101}]}, 0x7c}}, 0x4000000) setpriority(0x0, r4, 0xffff) fcntl$setpipe(r3, 0x407, 0x30) semget$private(0x0, 0xfffffffffffffffd, 0x15) fcntl$F_SET_FILE_RW_HINT(r0, 0x40e, &(0x7f0000000000)=0x2) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) msgget(0x1, 0x208) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:10 executing program 4: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:10 executing program 0: socket$alg(0x26, 0x5, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) lsetxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) setpriority(0x0, 0x0, 0xffff) semget$private(0x0, 0xfffffffffffffffd, 0x15) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) [ 836.403126][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 836.409388][ C0] protocol 88fb is buggy, dev hsr_slave_1 07:21:10 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video35\x00', 0x2, 0x0) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 07:21:10 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @remote}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @random="e5ac78d4c7fd"}, 0x10) write(r2, &(0x7f0000000080)="2700000014000f3f00000000120f0a00110001001f750800560099ed4f05000001100000000000", 0x138) 07:21:10 executing program 1: socket$alg(0x26, 0x5, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x400, 0x0) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r0, 0x84, 0x74, &(0x7f0000000480)=""/72, &(0x7f00000001c0)=0x48) r1 = socket$inet(0x2b, 0x1, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x0, 0x0) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000300)='/dev/autofs\x00', 0x800, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(r3, 0xc02c564a, 0x0) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) lsetxattr$security_selinux(&(0x7f0000000880)='./file0\x00', &(0x7f0000000400)='security.selinux\x00', &(0x7f0000000900)='system_u:object_r:auditctl_exec_t:s0\x00', 0x25, 0x1) r4 = getpgrp(0x0) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000100)={0x0, 0xfffffffffffffffa}, &(0x7f0000000280)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000000)={r5, 0xffffffffffffff25, "fbbd50c9c4b7448eeceba3e105e70c948abe34e36aaa3bfb18c6cb5fa938cc9c5497c39846fee8caa3fa79e189c2e8431ef17c7f864ea5e5a8e43d40e97e3dc4797799754c3b6fe11a0129d7248932bad8f67a773ad55b5e2c2a5dd442c69311ab50abffaa7094da360a83e7b76b01ec1d7080033c407543240dbfd697b907d5c36e297f13d2cc952f00aafd559a2a7c1f1bccff20d96ff6c9fac12e7072b8e655bcae4915519a3b4ed2401c"}, &(0x7f00000000c0)=0xb4) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r1, 0x84, 0x5, &(0x7f0000000340)={r6, @in6={{0xa, 0x4e21, 0x8, @loopback, 0x1000}}}, 0x84) getsockname$inet6(r2, &(0x7f00000006c0)={0xa, 0x0, 0x0, @loopback}, &(0x7f0000000700)=0x1c) setpriority(0x0, r4, 0xffff) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) r7 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') sendmsg$TIPC_NL_MON_SET(r3, &(0x7f0000000680)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x2000800}, 0xc, &(0x7f0000000640)={&(0x7f0000000500)={0x138, r7, 0x200, 0x70bd25, 0x25dfdbfc, {}, [@TIPC_NLA_NET={0xc, 0x7, [@TIPC_NLA_NET_ID={0x8, 0x1, 0x7fffffff}]}, @TIPC_NLA_SOCK={0xc, 0x2, [@TIPC_NLA_SOCK_REF={0x8}]}, @TIPC_NLA_LINK={0x10c, 0x4, [@TIPC_NLA_LINK_PROP={0x3c, 0x7, [@TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xfffffffffffffff9}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x18d000000000}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x75}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xa7}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x3c, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6a}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8a05}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8001}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1c}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x4c, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xc}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xfffffffffffffc01}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}]}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}]}]}, 0x138}, 0x1, 0x0, 0x0, 0x200080c4}, 0x8000) msgget(0x1, 0x208) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 07:21:11 executing program 0: socket$alg(0x26, 0x5, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) lsetxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) setpriority(0x0, 0x0, 0xffff) semget$private(0x0, 0xfffffffffffffffd, 0x15) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:11 executing program 4: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:11 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @remote}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @random="e5ac78d4c7fd"}, 0x10) write(r2, &(0x7f0000000080)="2700000014000f3f00000000120f0a00110001001f750800560099ed4f050000003f0000000000", 0x138) 07:21:11 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video35\x00', 0x2, 0x0) write(r0, &(0x7f0000000100)="4b0df95c58433efb89dd8c374b851bf17a9832d79f68dc3cef36bb64ab08b102671d0a57de6073474b629c624375fce2ef5568a99b30a3027a9aac3aaf04e4", 0x19) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, 0x0, 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) bind$rxrpc(r2, &(0x7f0000000040)=@in4={0x21, 0x2, 0x2, 0x10, {0x2, 0x4e20, @broadcast}}, 0x24) 07:21:11 executing program 3: socket$alg(0x26, 0x5, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x400, 0x0) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r0, 0x84, 0x74, &(0x7f0000000480)=""/72, &(0x7f00000001c0)=0x48) socket$inet(0x2b, 0x1, 0x0) syz_open_dev$adsp(&(0x7f0000000280)='/dev/adsp#\x00', 0x3, 0x480880) setsockopt$XDP_RX_RING(r0, 0x11b, 0x2, &(0x7f0000000080)=0x1000000, 0x4) write$apparmor_current(r0, &(0x7f0000000340)=@hat={'changehat ', 0x2, 0x5e, ['vboxnet1$\x00', ')\xdfeth0posix_acl_access\\:@md5sum\x00', 'security.selinux\x00', 'wlan1\x00', ':eth1\x00', '/dev/sequencer2\x00']}, 0x74) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x0, 0x0) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000300)='/dev/autofs\x00', 0x800, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(r2, 0xc02c564a, 0x0) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) lsetxattr$security_selinux(&(0x7f0000000880)='./file0\x00', &(0x7f0000000400)='security.selinux\x00', &(0x7f0000000900)='system_u:object_r:auditctl_exec_t:s0\x00', 0x25, 0x1) r4 = getpgrp(0x0) setpriority(0x0, r4, 0xffff) fcntl$setpipe(r3, 0x407, 0x30) semget$private(0x0, 0xfffffffffffffffd, 0x15) ioctl$VIDIOC_S_EDID(r1, 0xc0245629, &(0x7f0000000100)={0x0, 0xaec, 0x71a0, [], &(0x7f00000000c0)=0xd13}) ioctl$VIDIOC_G_SLICED_VBI_CAP(r2, 0xc0745645, &(0x7f0000000000)={0x80, [0x200, 0x48ab, 0x1, 0x89f, 0xe0, 0x6, 0x4, 0x4, 0x0, 0x5, 0x4, 0x2, 0x20, 0x6, 0x2, 0x0, 0x4, 0xdc37, 0x3f, 0x1812, 0x8, 0xff, 0x100000000, 0xfff, 0x0, 0x5, 0x7f, 0xfffffffffffffff7, 0xa4ce, 0x6, 0x3f, 0x7, 0x58f, 0x3e, 0xea, 0x1, 0x1, 0x0, 0x6, 0x401, 0x6, 0xffffffffffffffe3, 0x46, 0xfffffffffffffd87, 0x0, 0x2, 0x9, 0xffffffffffff0001], 0x7}) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) msgget(0x1, 0x208) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:11 executing program 1: socket$alg(0x26, 0x5, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x400, 0x0) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r0, 0x84, 0x74, &(0x7f0000000480)=""/72, &(0x7f00000001c0)=0x48) ioctl$int_out(r0, 0x5460, &(0x7f0000000000)) socket$inet(0x2b, 0x1, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x0, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/autofs\x00', 0x40080, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(r1, 0xc02c564a, 0x0) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) lsetxattr$security_selinux(&(0x7f0000000880)='./file0\x00', &(0x7f0000000400)='security.selinux\x00', &(0x7f0000000900)='system_u:object_r:auditctl_exec_t:s0\x00', 0x25, 0x1) r2 = getpgrp(0x0) setpriority(0x0, r2, 0xffff) open(&(0x7f0000000040)='./file1\x00', 0x44, 0xa0) msgget(0x1, 0x208) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:11 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @remote}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @random="e5ac78d4c7fd"}, 0x10) write(r2, &(0x7f0000000080)="2700000014000f3f00000000120f0a00110001001f750800560099ed4f05000000400000000000", 0x138) 07:21:11 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)) r0 = openat$md(0xffffffffffffff9c, &(0x7f0000000040)='/dev/md0\x00', 0x2000, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x7, 0x88500) ioctl$sock_inet6_tcp_SIOCINQ(r1, 0x541b, &(0x7f0000000180)) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x20, 0x4, 0x14, 0x10, "23bc5bc0849afea2b976fdc4740a4e4546f93435c78ac418318a7e1e7de137eadc90d627cfbf2ce40fdd36d4eca39c62269aa2fab9112180edcdf42e89c04f10", "38ad3a4e1f1e505433554e9f106aba19e022f292501029818e29ad14e63064a9", [0xffffffffffff8000, 0xef]}) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video35\x00', 0x2, 0x0) write(r3, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, 0x0, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 07:21:11 executing program 1: socket$alg(0x26, 0x5, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x400, 0x0) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r0, 0x84, 0x74, &(0x7f0000000480)=""/72, &(0x7f00000001c0)=0x48) mlock(&(0x7f0000ffe000/0x1000)=nil, 0x1000) socket$inet(0x2b, 0x1, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x0, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000300)='/dev/autofs\x00', 0x800, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(r1, 0xc02c564a, 0x0) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) lsetxattr$security_selinux(&(0x7f0000000880)='./file0\x00', &(0x7f0000000400)='security.selinux\x00', &(0x7f0000000900)='system_u:object_r:auditctl_exec_t:s0\x00', 0x25, 0x1) r2 = getpgrp(0x0) setpriority(0x0, r2, 0xffff) r3 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) msgget(0x1, 0x208) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) accept4$packet(r3, 0x0, &(0x7f0000000000), 0x80000) 07:21:11 executing program 0: socket$alg(0x26, 0x5, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) lsetxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) setpriority(0x0, 0x0, 0xffff) semget$private(0x0, 0xfffffffffffffffd, 0x15) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:11 executing program 4: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:11 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @remote}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @random="e5ac78d4c7fd"}, 0x10) write(r2, &(0x7f0000000080)="2700000014000f3f00000000120f0a00110001001f750800560099ed4f05000000600000000000", 0x138) 07:21:11 executing program 3: socket$alg(0x26, 0x5, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x400, 0x0) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r0, 0x84, 0x74, &(0x7f0000000480)=""/72, &(0x7f00000001c0)=0x48) socket$inet(0x2b, 0x1, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x0, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000300)='/dev/autofs\x00', 0x800, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(r1, 0xc02c564a, 0x0) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x78d29e7d62d22919) lsetxattr$security_selinux(&(0x7f0000000880)='./file0\x00', &(0x7f0000000400)='security.selinux\x00', &(0x7f0000000900)='system_u:object_r:auditctl_exec_t:s0\x00', 0x25, 0x1) r3 = getpgrp(0x0) setpriority(0x0, r3, 0xffff) fcntl$setpipe(r2, 0x407, 0x30) semget$private(0x0, 0xfffffffffffffffd, 0x15) r4 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) msgget(0x1, 0x208) getsockopt$inet_IP_IPSEC_POLICY(r4, 0x0, 0x10, &(0x7f0000000000)={{{@in=@empty, @in6=@initdev}}, {{@in=@multicast1}, 0x0, @in6}}, &(0x7f0000000100)=0xe8) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:11 executing program 5: r0 = syz_open_dev$mouse(&(0x7f0000000100)='/dev/input/mouse#\x00', 0x8000, 0x149080) r1 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000280)={&(0x7f0000000180), 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x24, r1, 0x401, 0x70bd29, 0x25dfdbfc, {}, [@FOU_ATTR_IPPROTO={0x8}, @FOU_ATTR_LOCAL_V4={0x8, 0x6, @multicast2}]}, 0x24}, 0x1, 0x0, 0x0, 0x20004000}, 0x1) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video35\x00', 0x2, 0x0) write(r3, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, 0x0, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 07:21:11 executing program 4: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:12 executing program 1: socket$alg(0x26, 0x5, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x400, 0x0) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r0, 0x84, 0x74, &(0x7f0000000480)=""/72, &(0x7f00000001c0)=0x48) socket$inet(0x2b, 0x800, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x0, 0x0) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000300)='/dev/autofs\x00', 0x800, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(r2, 0xc02c564a, 0x0) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) getsockopt$inet_sctp_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000000080)={0x0, 0x5, 0x6, 0x40, 0xdc1d, 0x0, 0x8, 0x7, {0x0, @in6={{0xa, 0x4e22, 0xab8f, @local, 0x5}}, 0x7fff, 0x3, 0x280000000, 0xa56d, 0x2}}, &(0x7f0000000280)=0xb0) setsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f00000002c0)={r3, 0x72}, 0x8) lsetxattr$security_selinux(&(0x7f0000000880)='./file0\x00', &(0x7f0000000400)='security.selinux\x00', &(0x7f0000000900)='system_u:object_r:auditctl_exec_t:s0\x00', 0x25, 0x1) r4 = getpgrp(0x0) setpriority(0x0, r4, 0xffff) r5 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) renameat2(r5, &(0x7f0000000000)='./file0\x00', r0, &(0x7f0000000040)='./file0\x00', 0x2) msgget(0x1, 0x208) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:12 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @remote}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @random="e5ac78d4c7fd"}, 0x10) write(r2, &(0x7f0000000080)="2700000014000f3f00000000120f0a00110001001f750800560099ed4f05ffffff9e0000000000", 0x138) 07:21:12 executing program 0: socket$alg(0x26, 0x5, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) lsetxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) setpriority(0x0, 0x0, 0xffff) semget$private(0x0, 0xfffffffffffffffd, 0x15) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:12 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video35\x00', 0x2, 0x0) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, 0x0, 0x0) r2 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r3 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$instantiate(0xc, r2, &(0x7f0000000300)=ANY=[@ANYBLOB="6c6f61642065e3b6797074667320747275737465643a2f6465762f766964656f3335002030303047303030303030303030303030303235362036306362653c00"], 0x40, r3) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = getpid() ptrace$setregset(0x4205, r4, 0x205, &(0x7f0000000040)={&(0x7f0000000200)="3ce414b8a3ba4ed46e539b8dd0a51b6ee51735fba7a1d6233f1a287036da5f4ac5fcbe06e704dff5323caaae13c24b8461223762dbe24df360f8379f15ca1612c782fd53ba439dafbffd7cf8b9cd01c16505266095c29742edea37ad2e276a4a0e92838fc556000f031be600bb7c549e85dd0ba59b13083f3966568d6a0b17a853cda77cd5b64748f6d85e198c7467cbf190b8d5309633ad3a4fab8aed7a28219cf3e583407ebab1c505a7e0e6520097f004460e562e837d8ffb6c6b430e93e30129a6c0c92679861e2b073e999e4cd57ab84db8ea955381c500d6aadb2401093acdad8cb5cdd95c", 0xe8}) syz_open_dev$audion(&(0x7f00000003c0)='/dev/audio#\x00', 0x6, 0x60002) 07:21:12 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @remote}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @random="e5ac78d4c7fd"}, 0x10) write(r2, &(0x7f0000000080)="2700000014000f3f00000000120f0a00110001001f750800560099ed4f0500000ec00000000000", 0x138) 07:21:12 executing program 4: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:12 executing program 0: socket$alg(0x26, 0x5, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) lsetxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) setpriority(0x0, 0x0, 0xffff) semget$private(0x0, 0xfffffffffffffffd, 0x15) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:12 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$KVM_X86_SETUP_MCE(r1, 0x4008ae9c, &(0x7f0000000040)={0x18, 0x2, 0x5}) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video35\x00', 0x2, 0x0) write(r1, &(0x7f0000000340), 0x41395527) getsockopt$inet_sctp6_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f0000000100)={0x0, 0x1f}, &(0x7f0000000180)=0x8) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f00000002c0)=ANY=[@ANYRES32=r2, @ANYBLOB="dcea8f3f8c6431c610c49bb23cd9fd4375f86ec62a02c7e32ec70c124c89e67cfd9e2a3620cdac0febf3d910b36ee4cdc986a9626562849c3fca96343685b02a300e52dce2dad1737b2ece458c7fb63499b941ec79454ecde4d16b3531b546ba73f0cefed4ff96ffe9f87992e23ef36b4cac6179d0bf6be67d40d6d51c84dc5e6a024977b781b07630ddfe4a"], 0xa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 07:21:12 executing program 3: socket$alg(0x26, 0x5, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x400, 0x0) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r0, 0x84, 0x74, &(0x7f0000000480)=""/72, &(0x7f00000001c0)=0x48) socket$inet(0x2b, 0x1, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x0, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000300)='/dev/autofs\x00', 0x800, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(r1, 0xc02c564a, 0x0) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) lsetxattr$security_selinux(&(0x7f0000000880)='./file0\x00', &(0x7f0000000400)='security.selinux\x00', &(0x7f0000000900)='system_u:object_r:auditctl_exec_t:s0\x00', 0x25, 0x1) r3 = getpgrp(0x0) setpriority(0x0, r3, 0xffff) fcntl$setpipe(r2, 0x407, 0x30) semget$private(0x0, 0xfffffffffffffffd, 0x15) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) r4 = pkey_alloc(0x0, 0x2) pkey_free(r4) msgget(0x1, 0x208) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:12 executing program 1: socket$alg(0x26, 0x5, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x400, 0x0) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r0, 0x84, 0x74, &(0x7f0000000480)=""/72, &(0x7f00000001c0)=0x48) socket$inet(0x2b, 0x1, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x0, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000300)='/dev/autofs\x00', 0x800, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(r1, 0xc02c564a, 0x0) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) ioctl$TIOCGSERIAL(r0, 0x541e, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=""/137}) lsetxattr$security_selinux(&(0x7f0000000880)='./file0\x00', &(0x7f0000000400)='security.selinux\x00', &(0x7f0000000900)='system_u:object_r:auditctl_exec_t:s0\x00', 0x25, 0x1) r2 = getpgrp(0x0) setpriority(0x0, r2, 0xffff) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) msgget(0x1, 0x208) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:12 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @remote}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @random="e5ac78d4c7fd"}, 0x10) write(r2, &(0x7f0000000080)="2700000014000f3f00000000120f0a00110001001f750800560099ed4f0500000be90000000000", 0x138) 07:21:12 executing program 4: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) [ 838.231752][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 838.231781][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 838.237558][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 838.249022][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 838.254812][ C0] protocol 88fb is buggy, dev hsr_slave_1 07:21:12 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @remote}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @random="e5ac78d4c7fd"}, 0x10) write(r2, &(0x7f0000000080)="2700000014000f3f00000000120f0a00110001001f750800560099ed4f05fffffff00000000000", 0x138) 07:21:12 executing program 0: socket$alg(0x26, 0x5, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) lsetxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) setpriority(0x0, 0x0, 0xffff) semget$private(0x0, 0xfffffffffffffffd, 0x15) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:12 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x406, r0) setsockopt$EBT_SO_SET_COUNTERS(r1, 0x0, 0x81, &(0x7f0000000200)={'broute\x00', 0x0, 0x0, 0x0, [], 0x2, &(0x7f0000000100)=[{}, {}], 0x0, [{}, {}]}, 0x70) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video35\x00', 0x2, 0x0) write(r3, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$pidfd(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self\x00', 0xb4200, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, 0x0, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 07:21:12 executing program 3: socket$alg(0x26, 0x5, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x400, 0x0) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r0, 0x84, 0x74, &(0x7f0000000480)=""/72, &(0x7f00000001c0)=0x48) socket$inet(0x2b, 0x1, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x0, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000300)='/dev/autofs\x00', 0x800, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(r1, 0xc02c564a, 0x0) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) lsetxattr$security_selinux(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='security.selinux\x00', &(0x7f00000000c0)='system_u:object_r:auditctl_exec_t:s0\x00', 0xffffffffffffffcd, 0xffffffffffffffff) r3 = getpgrp(0x0) setpriority(0x0, r3, 0xffff) fcntl$setpipe(r2, 0x407, 0x30) semget$private(0x0, 0xfffffffffffffffd, 0x15) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) msgget(0x1, 0x208) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) [ 838.471761][ C0] protocol 88fb is buggy, dev hsr_slave_0 07:21:13 executing program 4: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:13 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @remote}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @random="e5ac78d4c7fd"}, 0x10) write(r2, &(0x7f0000000080)="2700000014000f3f00000000120f0a00110001001f750800560099ed4f0500f0ffff0000000000", 0x138) 07:21:13 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video35\x00', 0x2, 0x0) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r0, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, 0x0, 0x0) pipe(&(0x7f0000000040)) ioctl$VIDIOC_SUBDEV_G_FMT(r1, 0xc0585604, &(0x7f0000000200)={0x1, 0x0, {0x4, 0x5, 0x303b, 0x0, 0xc, 0x7, 0x1, 0x7}}) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 07:21:13 executing program 1: socket$alg(0x26, 0x5, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x400, 0x0) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r0, 0x84, 0x74, &(0x7f0000000480)=""/72, &(0x7f00000001c0)=0x48) socket$inet(0x2b, 0x1, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x0, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000300)='/dev/autofs\x00', 0x800, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(r1, 0xc02c564a, 0x0) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) lsetxattr$security_selinux(&(0x7f0000000880)='./file0\x00', &(0x7f0000000400)='security.selinux\x00', &(0x7f0000000900)='system_u:object_r:auditctl_exec_t:s0\x00', 0x25, 0x1) r2 = getpgrp(0x0) setpriority(0x0, r2, 0xffff) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) msgget(0x1, 0x208) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000000)='\x1c]\x86\xfb\xb1\x1a\b\x00\xca\xc0\xdb\fG\x87\xd5']) 07:21:13 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @remote}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @random="e5ac78d4c7fd"}, 0x10) write(r2, &(0x7f0000000080)="2700000014000f3f00000000120f0a00110001001f750800560099ed4f059effffff0000000000", 0x138) 07:21:13 executing program 0: socket$alg(0x26, 0x5, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) lsetxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) setpriority(0x0, 0x0, 0xffff) semget$private(0x0, 0xfffffffffffffffd, 0x15) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:13 executing program 4: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:13 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x400, 0x0) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r1, 0x84, 0x74, &(0x7f0000000480)=""/72, &(0x7f00000001c0)=0x48) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000080)=0x0) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x5, 0x7, 0x0, 0xfffffffffffffffa, 0x0, 0x5, 0x4000, 0x4, 0x5, 0x0, 0x7f, 0x1, 0x5, 0x1, 0x2, 0x3, 0x56d1bd19, 0x7, 0x100000000, 0x0, 0x1f, 0x400, 0x8, 0x4, 0x2bcca6b7, 0x2, 0x1, 0x6, 0x8, 0x0, 0x100, 0x6, 0x7, 0x7, 0x1, 0x7fffffff, 0x0, 0x6, 0x7, @perf_config_ext={0x8001, 0xdd3}, 0x0, 0x2a0, 0xf73, 0x9, 0x81, 0x0, 0x200}, r2, 0x0, r1, 0x0) socket$inet(0x2b, 0x1, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x0, 0x0) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000300)='/dev/autofs\x00', 0x800, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(r3, 0xc02c564a, 0x0) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) lsetxattr$security_selinux(&(0x7f0000000880)='./file0\x00', &(0x7f0000000400)='security.selinux\x00', &(0x7f0000000900)='system_u:object_r:auditctl_exec_t:s0\x00', 0x25, 0x1) r5 = getpgrp(0x0) setpriority(0x0, r5, 0xffff) fcntl$setpipe(r4, 0x407, 0x30) semget$private(0x0, 0xfffffffffffffffd, 0x15) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) msgget(0x1, 0x208) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:13 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video35\x00', 0x2, 0x0) write(r0, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, 0x0, 0x0) 07:21:13 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @remote}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @random="e5ac78d4c7fd"}, 0x10) write(r2, &(0x7f0000000080)="2700000014000f3f00000000120f0a00110001001f750800560099ed4f05f0ffffff0000000000", 0x138) 07:21:13 executing program 4: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:13 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video35\x00', 0x2, 0x0) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0xc058534f, &(0x7f0000000200)={{0x7, 0xfffffffffffffff7}, 0x1, 0x1, 0xfc08, {0x4a, 0x6}, 0x7, 0x5c9e}) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) 07:21:13 executing program 0: socket$alg(0x26, 0x5, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) lsetxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) setpriority(0x0, 0x0, 0xffff) semget$private(0x0, 0xfffffffffffffffd, 0x15) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:13 executing program 3: socket$alg(0x26, 0x5, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x400, 0x0) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r0, 0x84, 0x74, &(0x7f0000000480)=""/72, &(0x7f00000001c0)=0x48) socket$inet(0x2b, 0x1, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x0, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000300)='/dev/autofs\x00', 0x800, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000840)=""/148, 0x94}], 0x267, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/snmp\x00') r3 = socket$inet6(0xa, 0x400000000001, 0x0) close(r3) r4 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r4, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r4, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r5 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0xfffffffdfffffffe) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(r5, 0x200004) sendfile(r3, r5, 0x0, 0x80001d00c0d0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r2, 0x0, 0x0, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(r1, 0xc02c564a, 0x0) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) r6 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) lsetxattr$security_selinux(&(0x7f0000000880)='./file0\x00', &(0x7f0000000400)='security.selinux\x00', &(0x7f0000000900)='system_u:object_r:auditctl_exec_t:s0\x00', 0x25, 0x1) r7 = getpgrp(0x0) setpriority(0x0, r7, 0xffff) fcntl$setpipe(r6, 0x407, 0x30) semget$private(0x0, 0xfffffffffffffffd, 0x15) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) msgget(0x1, 0x208) 07:21:13 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @remote}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @random="e5ac78d4c7fd"}, 0x10) write(r2, &(0x7f0000000080)="2700000014000f3f00000000120f0a00110001001f750800560099ed4f05000000000003400000", 0x138) 07:21:14 executing program 4: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:14 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r1 = getpgid(0x0) sched_rr_get_interval(r1, &(0x7f0000000300)) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video35\x00', 0x2, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$sock_SIOCOUTQ(r0, 0x5411, &(0x7f0000000040)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, 0x0, 0x0) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(r3, &(0x7f00000002c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="280328bd7000fbdbdf250100000000000000014100000018001700000007000000066574683a726f736530000000"], 0x34}, 0x1, 0x0, 0x0, 0x1}, 0x20000014) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sendto(r2, &(0x7f0000000080)="30f646db2fa68e3452e5260e1cca47bf911c54aea64ab69a6221ef7db345a7302d88c167da46", 0x26, 0x0, 0x0, 0x0) 07:21:14 executing program 0: socket$alg(0x26, 0x5, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) lsetxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) setpriority(0x0, 0x0, 0xffff) semget$private(0x0, 0xfffffffffffffffd, 0x15) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:14 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @remote}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @random="e5ac78d4c7fd"}, 0x10) write(r2, &(0x7f0000000080)="2700000014000f3f00000000120f0a00110001001f750800560099ed4f05fffffffffffff00000", 0x138) 07:21:14 executing program 1: socket$alg(0x26, 0x5, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x400, 0x0) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r0, 0x84, 0x74, &(0x7f0000000480)=""/72, &(0x7f00000001c0)=0x48) r1 = socket$inet(0x2b, 0x1, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x0, 0x0) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000300)='/dev/autofs\x00', 0x800, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(r2, 0xc02c564a, 0x0) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) lsetxattr$security_selinux(&(0x7f0000000880)='./file0\x00', &(0x7f0000000400)='security.selinux\x00', &(0x7f0000000900)='system_u:object_r:auditctl_exec_t:s0\x00', 0x25, 0x1) r3 = getpgrp(0x0) setpriority(0x0, r3, 0xffff) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) msgget(0x1, 0x208) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) ioctl$sock_inet_tcp_SIOCINQ(r1, 0x541b, &(0x7f0000000000)) 07:21:14 executing program 3: socket$alg(0x26, 0x5, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x400, 0x0) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r0, 0x84, 0x74, &(0x7f0000000480)=""/72, &(0x7f00000001c0)=0x48) socket$inet(0x2b, 0x1, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x0, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000300)='/dev/autofs\x00', 0x800, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(r1, 0xc02c564a, 0x0) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) lsetxattr$security_selinux(&(0x7f0000000880)='./file0\x00', &(0x7f0000000400)='security.selinux\x00', &(0x7f0000000900)='system_u:object_r:auditctl_exec_t:s0\x00', 0x25, 0x1) r3 = getpgrp(0x0) setpriority(0x0, r3, 0xffff) fcntl$setpipe(r2, 0x407, 0x30) semget$private(0x0, 0xfffffffffffffffd, 0x15) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) msgget(0x1, 0x208) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r1, 0x4004240b, &(0x7f0000000040)={0x5, 0x70, 0x4, 0x3db411d3, 0x5, 0x15, 0x0, 0x10001, 0x10400, 0x8, 0x100, 0x7, 0x3, 0xe0cb, 0xfffffffffffffff8, 0xffffffffffffff00, 0x608, 0xc82, 0x0, 0x0, 0x4, 0x1921, 0xfffffffffffffffc, 0x7ff, 0x0, 0x101, 0x4, 0x1, 0x7ee, 0x2, 0x7, 0x57, 0xffff, 0x6, 0x100, 0x649bcc29, 0xf52, 0xfffffffffffffffb, 0x0, 0xff, 0x2, @perf_bp={&(0x7f0000000000), 0x4}, 0x10000, 0x20, 0x4, 0x3, 0x200, 0x4, 0xffffffffffff13d7}) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:14 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video35\x00', 0x2, 0x0) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1}, 0x0, &(0x7f0000000140)={0x1ff}, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000040)=0x6, 0xffffff99) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 07:21:14 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @remote}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @random="e5ac78d4c7fd"}, 0x10) write(r2, &(0x7f0000000080)="2700000014000f3f00000000120f0a00110001001f750800560099ed4f05000000000000000100", 0x138) 07:21:14 executing program 4: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:14 executing program 0: socket$alg(0x26, 0x5, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) lsetxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) setpriority(0x0, 0x0, 0xffff) semget$private(0x0, 0xfffffffffffffffd, 0x15) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:14 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video35\x00', 0x2, 0x0) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000040)={0x1ff}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 07:21:14 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @remote}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @random="e5ac78d4c7fd"}, 0x10) write(r2, &(0x7f0000000080)="2700000014000f3f00000000120f0a00110001001f750800560099ed4f05000000000000000200", 0x138) 07:21:14 executing program 3: r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dlm-control\x00', 0x400000, 0x0) write$P9_RCREATE(r0, &(0x7f0000000040)={0x18, 0x73, 0x2, {{0x32, 0x3, 0x1}, 0xffff}}, 0x18) socket$alg(0x26, 0x5, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x400, 0x0) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r1, 0x84, 0x74, &(0x7f0000000480)=""/72, &(0x7f00000001c0)=0x48) socket$inet(0x2b, 0x1, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x0, 0x0) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000300)='/dev/autofs\x00', 0x800, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(r2, 0xc02c564a, 0x0) ioctl$BLKFLSBUF(r2, 0x1261, &(0x7f0000000000)=0xd7) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x20000000000, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) lsetxattr$security_selinux(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000280)='security.selinux\x00', &(0x7f0000000900)='system_u:object_r:udev_tbl_t:s0\x00', 0xffffffffffffff88, 0x2) r4 = getpgrp(0x0) setpriority(0x0, r4, 0xffff) fcntl$setpipe(r3, 0x407, 0x30) semget$private(0x0, 0xfffffffffffffffd, 0x15) r5 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) msgget(0x1, 0x208) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r6 = shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ff9000/0x4000)=nil) getsockopt$inet_IP_IPSEC_POLICY(r5, 0x0, 0x10, &(0x7f0000000340)={{{@in=@local, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@empty}}, &(0x7f0000000080)=0xe8) r8 = getegid() stat(&(0x7f00000002c0)='.\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000005c0)='./file0/file0\x00', &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) shmctl$IPC_SET(r6, 0x1, &(0x7f00000007c0)={{0x9e5, r7, r8, r9, r10, 0x2, 0x1}, 0x0, 0x2, 0x1, 0x5, r4, r4, 0x1f}) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:14 executing program 1: socket$alg(0x26, 0x5, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x400, 0x0) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r0, 0x84, 0x74, &(0x7f0000000480)=""/72, &(0x7f00000001c0)=0x48) socket$inet(0x2b, 0x1, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x0, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000300)='/dev/autofs\x00', 0x800, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(r1, 0xc02c564a, 0x0) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) lsetxattr$security_selinux(&(0x7f0000000080)='./file0\x00', &(0x7f0000000400)='security.selinux\x00', &(0x7f0000000900)='system_u:object_r:auditctl_exec_t:s0\x00', 0x25, 0x3) r2 = getpgrp(0x0) setpriority(0x0, r2, 0xffff) open(&(0x7f0000000180)='./file0\x00', 0x42, 0x1) ioctl$SG_GET_SCSI_ID(r0, 0x2276, &(0x7f0000000000)) msgget(0x1, 0x208) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:14 executing program 0: socket$alg(0x26, 0x5, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) lsetxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) setpriority(0x0, 0x0, 0xffff) semget$private(0x0, 0xfffffffffffffffd, 0x15) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:14 executing program 4: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:15 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video35\x00', 0x2, 0x0) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x7) 07:21:15 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @remote}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @random="e5ac78d4c7fd"}, 0x10) write(r2, &(0x7f0000000080)="2700000014000f3f00000000120f0a00110001001f750800560099ed4f05000000000000000400", 0x138) 07:21:15 executing program 4: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:15 executing program 0: socket$alg(0x26, 0x5, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) lsetxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) setpriority(0x0, 0x0, 0xffff) semget$private(0x0, 0xfffffffffffffffd, 0x15) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:15 executing program 3: r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x80000, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'vcan0\x00', 0x0}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'rose0\x00', r1}) socket$alg(0x26, 0x5, 0x0) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x400, 0x0) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r2, 0x84, 0x74, &(0x7f0000000480)=""/72, &(0x7f00000001c0)=0x48) socket$inet(0x2b, 0x1, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x0, 0x0) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000300)='/dev/autofs\x00', 0x800, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(r3, 0xc02c564a, 0x0) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xffffffffffffff2c) lsetxattr$security_selinux(&(0x7f0000000880)='./file0\x00', &(0x7f0000000400)='security.selinux\x00', &(0x7f0000000900)='system_u:object_r:auditctl_exec_t:s0\x00', 0x25, 0x1) r5 = getpgrp(0x0) setpriority(0x0, r5, 0xffff) fcntl$setpipe(r4, 0x407, 0x30) semget$private(0x0, 0xfffffffffffffffd, 0x15) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) msgget(0x1, 0x208) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:15 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$KVM_SET_NESTED_STATE(r0, 0x4080aebf, &(0x7f0000000480)={0x2, 0x0, 0x2080, {0x3000, 0xf000, 0x1}, [], "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", "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"}) 07:21:15 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @remote}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @random="e5ac78d4c7fd"}, 0x10) write(r2, &(0x7f0000000080)="2700000014000f3f00000000120f0a00110001001f750800560099ed4f05000000000000000a00", 0x138) 07:21:15 executing program 1: socket$alg(0x26, 0x5, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x400, 0x0) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r0, 0x84, 0x74, &(0x7f0000000480)=""/72, &(0x7f00000001c0)=0x48) r1 = socket$inet(0x2b, 0x1, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x0, 0x0) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000300)='/dev/autofs\x00', 0x800, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(r3, 0xc02c564a, 0x0) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) lsetxattr$security_selinux(&(0x7f0000000880)='./file0\x00', &(0x7f0000000400)='security.selinux\x00', &(0x7f0000000900)='system_u:object_r:auditctl_exec_t:s0\x00', 0x25, 0x1) r4 = getpgrp(0x0) setpriority(0x0, r4, 0xffff) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f00000000c0)={&(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffa000/0x1000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffa000/0x1000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000000)="63620f6c9dbe77f2b6c2a5c6497be6b1b2bd0af41fc998a298b5cd9d6e759dc34a8124c4aa5d8a97d1c0a67f76c6feabe7287810486e41df92b8e37e7cc83875568fd9d5d15e144b4b64fd3adf3573515d38d3afcd484993539b11db89ca5aff9d825bb80610e9ed4633769afbe552bb2ddb434088b250af05226da3c38b7cf4b72936be61e73fe6198b0af80e9af3d913ac0af122a5edeb8e5e93cd4cb33155e2a5734336db921daba704c004aa68386869bc1eb0", 0xb5, r1}, 0x68) msgget(0x0, 0x20a) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r2) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:15 executing program 0: socket$alg(0x26, 0x5, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) lsetxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) setpriority(0x0, 0x0, 0xffff) semget$private(0x0, 0xfffffffffffffffd, 0x15) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:15 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video35\x00', 0x2, 0x0) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000000180)={0x3f, 0x2, 0x401, 0x52f}, 0x8) getsockopt$TIPC_SOCK_RECVQ_DEPTH(r0, 0x10f, 0x84, &(0x7f0000000200), &(0x7f0000000240)=0x4) getsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000040), &(0x7f0000000100)=0x4) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 07:21:15 executing program 4: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:15 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @remote}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @random="e5ac78d4c7fd"}, 0x10) write(r2, &(0x7f0000000080)="2700000014000f3f00000000120f0a00110001001f750800560099ed4f05000000000000000e00", 0x138) 07:21:15 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video35\x00', 0x2, 0x0) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, 0x0, 0x0) ioctl$SCSI_IOCTL_TEST_UNIT_READY(r0, 0x2) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 07:21:15 executing program 3: socket$alg(0x26, 0x5, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x400, 0x0) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r0, 0x84, 0x74, &(0x7f0000000480)=""/72, &(0x7f00000001c0)=0x48) socket$inet(0x2b, 0x1, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x0, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000300)='/dev/autofs\x00', 0x800, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(r1, 0xc02c564a, 0x0) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) lsetxattr$security_selinux(&(0x7f0000000880)='./file0\x00', &(0x7f0000000400)='security.selinux\x00', &(0x7f0000000900)='system_u:object_r:auditctl_exec_t:s0\x00', 0x25, 0x1) r3 = getpgrp(0x0) setpriority(0x0, r3, 0xffff) fcntl$setpipe(r2, 0x407, 0x30) semget$private(0x0, 0xfffffffffffffffd, 0x15) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) mkdir(&(0x7f0000000000)='./file0\x00', 0x100) msgget(0x1, 0x208) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:16 executing program 4: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:16 executing program 0: socket$alg(0x26, 0x5, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) lsetxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) setpriority(0x0, 0x0, 0xffff) semget$private(0x0, 0xfffffffffffffffd, 0x15) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:16 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @remote}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @random="e5ac78d4c7fd"}, 0x10) write(r2, &(0x7f0000000080)="2700000014000f3f00000000120f0a00110001001f750800560099ed4f05000000000000000f00", 0x138) 07:21:16 executing program 1: socket$alg(0x26, 0x5, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x400, 0x0) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r0, 0x84, 0x74, &(0x7f0000000480)=""/72, &(0x7f00000001c0)=0x48) socket$inet(0x2b, 0x1, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x0, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000300)='/dev/autofs\x00', 0x800, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(r1, 0xc02c564a, 0x0) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) lsetxattr$security_selinux(&(0x7f0000000880)='./file0\x00', &(0x7f0000000400)='security.selinux\x00', &(0x7f0000000900)='system_u:object_r:auditctl_exec_t:s0\x00', 0x25, 0x1) r2 = getpgrp(0x0) setpriority(0x0, r2, 0xffff) r3 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) msgget(0x1, 0x208) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sync_file_range(r3, 0xffffffffffff8001, 0xfffffffffffffffc, 0x2) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) renameat(r3, &(0x7f0000000000)='./file0\x00', r1, &(0x7f0000000040)='./file0\x00') 07:21:16 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VHOST_SET_VRING_KICK(r2, 0x4008af20, &(0x7f00000005c0)={0x3, r3}) clock_gettime(0x5, &(0x7f0000000340)) write(r3, &(0x7f0000000340), 0x41395527) fsconfig$FSCONFIG_SET_FD(r3, 0x5, &(0x7f0000000180)='/dev/video35\x00', 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x2, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, 0x0, 0x0) getsockopt$inet_int(r2, 0x0, 0x1a, &(0x7f0000000040), &(0x7f0000000100)=0x4) getsockopt$inet_sctp6_SCTP_STATUS(r2, 0x84, 0xe, &(0x7f0000000480)={0x0, 0x6, 0x2, 0x3f, 0x17, 0x800, 0x0, 0xb800000000000000, {0x0, @in={{0x2, 0x4e21, @multicast1}}, 0xffff, 0x80, 0xfffffffffffffffc, 0xd7, 0x394}}, &(0x7f0000000080)=0xb0) setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(r3, 0x84, 0x19, &(0x7f0000000400)={r4, 0x8001}, 0x8) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(r2, 0x84, 0x21, &(0x7f0000000540), &(0x7f0000000580)=0x4) ioctl$sock_SIOCGIFBR(r0, 0x8940, &(0x7f0000000300)=@get={0x1, &(0x7f0000000200)=""/240, 0x20}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl(r1, 0x5, &(0x7f0000000380)="d79708315511c76a0afc3d69c308dc5684b532c5c16370b91fe5a2186b2ae6548ac70189632bb17673fa085ae3016362f77efa80e3e2528fb552f71d12467003afe8915127ad26499434164cbae720653fdb4a3324f00df62a90") 07:21:16 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @remote}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @random="e5ac78d4c7fd"}, 0x10) write(r2, &(0x7f0000000080)="2700000014000f3f00000000120f0a00110001001f750800560099ed4f05000000000000011000", 0x138) 07:21:16 executing program 3: socket$alg(0x26, 0x5, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x400, 0x0) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r0, 0x84, 0x74, &(0x7f0000000480)=""/72, &(0x7f00000001c0)=0x48) socket$inet(0x2b, 0x1, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x0, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000300)='/dev/autofs\x00', 0x800, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(r1, 0xc02c564a, 0x0) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) lsetxattr$security_selinux(&(0x7f0000000880)='./file0\x00', &(0x7f0000000400)='security.selinux\x00', &(0x7f0000000900)='system_u:object_r:auditctl_exec_t:s0\x00', 0x25, 0x1) r3 = getpgrp(0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f0000000000)={{0x120, 0x6}, {0x6a1, 0x400}, 0x1, 0x4, 0x1}) setpriority(0x0, r3, 0xffff) fcntl$setpipe(r2, 0x407, 0x30) semget$private(0x0, 0xfffffffffffffffd, 0x15) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) msgget(0x1, 0x208) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:16 executing program 4: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:16 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r2, 0x40605346, &(0x7f0000000200)={0x3, 0x2, {0x3, 0x3, 0x852, 0x1, 0x20}}) write$input_event(r1, &(0x7f0000000100)={{r3, r4/1000+10000}, 0x3, 0x2, 0x1}, 0x10) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video35\x00', 0x2, 0x0) write(r2, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, 0x0, 0x0) fcntl$getownex(r0, 0x10, &(0x7f0000000180)={0x0, 0x0}) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r2, 0xc1105518, &(0x7f0000000300)={{0x6, 0x6, 0x5, 0xa5b2, 'syz0\x00', 0x100000001}, 0x2, 0x72f2a33c90659f82, 0x7, r5, 0x7, 0x8, 'syz1\x00', &(0x7f0000000280)=['/dev/video35\x00', '/dev/video35\x00', 'vboxnet0posix_acl_access+\x00', '\x00', '\x00', '*.ppp1vmnet1]+-#user,{\x00', '\x00'], 0x4e, [], [0x1, 0x0, 0x9]}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 07:21:16 executing program 0: socket$alg(0x26, 0x5, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) lsetxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) setpriority(0x0, 0x0, 0xffff) semget$private(0x0, 0xfffffffffffffffd, 0x15) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) [ 842.151772][ C1] net_ratelimit: 7 callbacks suppressed [ 842.151786][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 842.163797][ C1] protocol 88fb is buggy, dev hsr_slave_1 07:21:16 executing program 5: r0 = socket$rxrpc(0x21, 0x2, 0x2) getsockopt$sock_int(r0, 0x1, 0x2f, &(0x7f0000000040), &(0x7f0000000100)=0x4) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video35\x00', 0x2, 0x0) write(r3, &(0x7f0000000340), 0x41395527) ioctl$FS_IOC_FIEMAP(r4, 0xc020660b, &(0x7f0000000200)=ANY=[@ANYBLOB="02000000000000000100008000000000010000000800000005000000000000001903000000000000070000000000000052a9ffffffffffff0000000000000000000000000000000001300000000000000000000000000000090000000000000005000000000000000600000000000000000000000000000001000000ffffffff00000000000000000000000000000000ff0f000000000000030f0000000000000004000000000000000000000000000000000000000000000610000000000000000000000000000001000000000000000600000000000000000000000000e000000000000000000000000000000000000000000000000000000000000000000003000000000000000600000000000000000000000000000000000000000000000000000000000000801800"/312]) add_key$user(&(0x7f0000000340)='user\x00', &(0x7f0000000380)={'syz', 0x0}, &(0x7f0000000480)="2b0e917e36204dd924bd6af9075a08e20a7a13fe5592e469988eb764b9216c8ffb49089f1cf13d7e026443c01a4425cdbcf0928b9a8bd38f236049d94f4e884c4350f0c0f9475e200acf22f320918673a897bcca7dc1665462fbc1476ed112c0386a0838bb20834f0b120772bedc7dbf4e2fce0e3f9aa94a24f767c2184caaf711f030f6cd85d337f358fdd131664821b799dc31f348df85ebd5fef8a71fbf4327c96c8b4552501df6714221f4b6fb", 0xaf, 0xffffffffffffffff) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, 0x0, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$DRM_IOCTL_GET_MAP(r1, 0xc0186404, &(0x7f0000000180)={&(0x7f0000ffb000/0x2000)=nil, 0xfe5, 0x4, 0x10, &(0x7f0000ffc000/0x1000)=nil, 0x43da}) 07:21:16 executing program 1: r0 = dup(0xffffffffffffffff) ioctl$PPPOEIOCSFWD(r0, 0x4004b100, &(0x7f0000000000)={0x18, 0x0, {0x2, @random="9e922e62a59b", 'bcsh0\x00'}}) socket$alg(0x26, 0x5, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x400, 0x0) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r1, 0x84, 0x74, &(0x7f0000000480)=""/72, &(0x7f00000001c0)=0x48) socket$inet(0x2b, 0x1, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x0, 0x0) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000300)='/dev/autofs\x00', 0x800, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(r2, 0xc02c564a, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000040)={0x0}, &(0x7f0000000080)=0xc) sched_setaffinity(r3, 0x4023, &(0x7f0000000200)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) lsetxattr$security_selinux(&(0x7f0000000880)='./file0\x00', &(0x7f0000000400)='security.selinux\x00', &(0x7f0000000900)='system_u:object_r:auditctl_exec_t:s0\x00', 0x25, 0x1) r4 = getpgrp(0x0) setpriority(0x0, r4, 0xffff) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) msgget(0x1, 0x208) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:16 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @remote}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @random="e5ac78d4c7fd"}, 0x10) write(r2, &(0x7f0000000080)="2700000014000f3f00000000120f0a00110001001f750800560099ed4f05000000000000003f00", 0x138) 07:21:16 executing program 4: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:17 executing program 3: socket$alg(0x26, 0x5, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x400, 0x0) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r0, 0x84, 0x74, &(0x7f0000000480)=""/72, &(0x7f00000001c0)=0x48) socket$inet(0x2b, 0x1, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x0, 0x0) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000300)='/dev/autofs\x00', 0x800, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(r2, 0xc02c564a, 0x0) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) lsetxattr$security_selinux(&(0x7f0000000880)='./file0\x00', &(0x7f0000000400)='security.selinux\x00', &(0x7f0000000900)='system_u:object_r:auditctl_exec_t:s0\x00', 0x25, 0x1) r4 = getpgrp(0x0) setpriority(0x0, r4, 0xffff) fcntl$setpipe(r3, 0x407, 0x30) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) fcntl$setown(r1, 0x8, r4) msgget(0x1, 0x208) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:17 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @remote}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @random="e5ac78d4c7fd"}, 0x10) write(r2, &(0x7f0000000080)="2700000014000f3f00000000120f0a00110001001f750800560099ed4f05000000000000004000", 0x138) 07:21:17 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video35\x00', 0x2, 0x0) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x200000, 0x0) 07:21:17 executing program 0: socket$alg(0x26, 0x5, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) lsetxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) setpriority(0x0, 0x0, 0xffff) semget$private(0x0, 0xfffffffffffffffd, 0x15) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:17 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @remote}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @random="e5ac78d4c7fd"}, 0x10) write(r2, &(0x7f0000000080)="2700000014000f3f00000000120f0a00110001001f750800560099ed4f05000000000000006000", 0x138) 07:21:17 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video35\x00', 0x2, 0x0) write(r2, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFPFLAGS(r0, 0x8935, &(0x7f0000000040)={'veth0_to_bridge\x00', 0xa2}) ioctl$sock_SIOCOUTQNSD(r1, 0x894b, &(0x7f0000000180)) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, 0x0, 0x0) ioctl$PIO_FONT(r1, 0x4b61, &(0x7f0000000100)="efd8ca9c86947e5efb51d8236415e33aacf57a7f602abaa9cba265be36bb9030df01707442") vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$TCXONC(r2, 0x540a, 0xffff) prctl$PR_SET_DUMPABLE(0x4, 0x2) ioctl$VHOST_GET_VRING_ENDIAN(r1, 0x4008af14, &(0x7f0000000240)={0x0, 0x47e4}) 07:21:17 executing program 4: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:17 executing program 1: socket$alg(0x26, 0x5, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x400, 0x0) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r0, 0x84, 0x74, &(0x7f0000000480)=""/72, &(0x7f00000001c0)=0x48) socket$inet(0x2b, 0x1, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x400000, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000300)='/dev/autofs\x00', 0x800, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(r0, 0xc02c564a, 0x0) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) lsetxattr$security_selinux(&(0x7f0000000880)='./file0\x00', &(0x7f0000000400)='security.selinux\x00', &(0x7f0000000900)='system_u:object_r:auditctl_exec_t:s0\x00', 0x25, 0x1) r1 = getpgrp(0x0) setpriority(0xffffffffffffffff, r1, 0xffff) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) msgget(0x1, 0x208) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:17 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @remote}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @random="e5ac78d4c7fd"}, 0x10) write(r2, &(0x7f0000000080)="2700000014000f3f00000000120f0a00110001001f750800560099ed4f0500000000ffffff9e00", 0x138) 07:21:17 executing program 0: socket$alg(0x26, 0x5, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) lsetxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) setpriority(0x0, 0x0, 0xffff) semget$private(0x0, 0xfffffffffffffffd, 0x15) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:17 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='pids.current\x00', 0x0, 0x0) chmod(&(0x7f0000000240)='./file0\x00', 0x100) ioctl$KDGETLED(r0, 0x4b31, &(0x7f0000000140)) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) openat$vim2m(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/video35\x00', 0x2, 0x0) write(r2, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0)={0x2}, 0x0, &(0x7f0000000100)={0x1fc}, 0x0, 0x0) getsockopt$sock_timeval(r2, 0x1, 0x43, &(0x7f0000000180), &(0x7f0000000200)=0x8) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 07:21:17 executing program 3: socket$alg(0x26, 0x5, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x400, 0x0) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r0, 0x84, 0x74, &(0x7f0000000480)=""/72, &(0x7f00000001c0)=0x48) socket$inet(0x2b, 0x1, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x0, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000300)='/dev/autofs\x00', 0x800, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(r1, 0xc02c564a, 0x0) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xffffffffffffff86) lsetxattr$security_selinux(&(0x7f0000000880)='./file0\x00', &(0x7f0000000400)='security.selinux\x00', &(0x7f0000000900)='system_u:object_r:auditctl_exec_t:s0\x00', 0x25, 0x1) r3 = getpgrp(0x0) setpriority(0x0, r3, 0xffff) fcntl$setpipe(r2, 0x407, 0x30) semget$private(0x0, 0xfffffffffffffffd, 0x15) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) msgget(0x1, 0x208) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) r4 = shmget$private(0x0, 0x2000, 0x78000000, &(0x7f0000ffb000/0x2000)=nil) shmctl$IPC_INFO(r4, 0x3, &(0x7f0000000000)=""/11) 07:21:17 executing program 4: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:17 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @remote}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @random="e5ac78d4c7fd"}, 0x10) write(r2, &(0x7f0000000080)="2700000014000f3f00000000120f0a00110001001f750800560099ed4f050000000000000ec000", 0x138) 07:21:17 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x400, 0x0) socket$inet(0x2b, 0x1, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x0, 0x0) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000300)='/dev/autofs\x00', 0x800, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(r2, 0xc02c564a, 0x0) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000000)=0x0) waitid(0x1, r3, &(0x7f0000000040), 0x1, &(0x7f00000000c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) lsetxattr$security_selinux(&(0x7f0000000880)='./file0\x00', &(0x7f0000000400)='security.selinux\x00', &(0x7f0000000900)='system_u:object_r:auditctl_exec_t:s0\x00', 0x25, 0x1) r4 = getpgrp(0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000280)={&(0x7f00000001c0)='./file0\x00', r1}, 0x10) setpriority(0x0, r4, 0xffff) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) msgget(0x1, 0x208) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:18 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video35\x00', 0x2, 0x0) write(r2, &(0x7f0000000040), 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, 0x0, 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000100)=0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r2, 0xc1105511, &(0x7f0000000200)={{0x5, 0x2, 0x1, 0xf1, '\x00', 0x2}, 0x4, 0x20000000, 0x3f, r3, 0x8, 0x0, 'syz0\x00', &(0x7f0000000180)=['wlan1vmnet1mime_type\x00', '\x00', '/dev/video35\x00', '/dev/video35\x00', '/dev/video35\x00', '\x00', '/dev/video35\x00', '+-\x00'], 0x4e, [], [0x6, 0x7, 0x8, 0x35]}) 07:21:18 executing program 4: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\xff']) 07:21:18 executing program 0: socket$alg(0x26, 0x5, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) lsetxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) setpriority(0x0, 0x0, 0xffff) semget$private(0x0, 0xfffffffffffffffd, 0x15) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:18 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @remote}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @random="e5ac78d4c7fd"}, 0x10) write(r2, &(0x7f0000000080)="2700000014000f3f00000000120f0a00110001001f750800560099ed4f050000000000000be900", 0x138) 07:21:18 executing program 3: socket$alg(0x26, 0x5, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x400, 0x0) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r0, 0x84, 0x74, &(0x7f0000000480)=""/72, &(0x7f00000001c0)=0x48) socket$inet(0x2b, 0x1, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x0, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000300)='/dev/autofs\x00', 0x800, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(r1, 0xc02c564a, 0x0) r2 = getpid() sched_setaffinity(r2, 0x3bb, &(0x7f0000000000)=0xa000000000000005) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) lsetxattr$security_selinux(&(0x7f0000000880)='./file0\x00', &(0x7f0000000400)='security.selinux\x00', &(0x7f0000000900)='system_u:object_r:auditctl_exec_t:s0\x00', 0x25, 0x1) r4 = getpgrp(0x0) setpriority(0x0, r4, 0xffff) fcntl$setpipe(r3, 0x407, 0x30) semget$private(0x0, 0xfffffffffffffffd, 0x15) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) msgget(0x1, 0x208) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:18 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000380)='/dev/video35\x00', 0x2, 0x0) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sync() 07:21:18 executing program 4: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\xff']) 07:21:18 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @remote}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @random="e5ac78d4c7fd"}, 0x10) write(r2, &(0x7f0000000080)="2700000014000f3f00000000120f0a00110001001f750800560099ed4f0500000000fffffff000", 0x138) 07:21:18 executing program 1: socket$alg(0x26, 0x5, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x400, 0x0) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r0, 0x84, 0x74, &(0x7f0000000000)=""/72, &(0x7f00000001c0)=0x48) socket$inet(0x2b, 0x1, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x0, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000300)='/dev/autofs\x00', 0x0, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(r1, 0xc02c564a, 0x0) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) lsetxattr$security_selinux(&(0x7f0000000880)='./file0\x00', &(0x7f0000000400)='security.selinux\x00', &(0x7f0000000900)='system_u:object_r:auditctl_exec_t:s0\x00', 0x25, 0x1) r2 = getpgrp(0x0) setpriority(0x0, r2, 0xffff) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) msgget(0x1, 0x208) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:18 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VIDIOC_ENUMOUTPUT(r0, 0xc0485630, &(0x7f00000002c0)={0x9, "afa350a1807be3301f39d2ced6a79cb4ffbc0b7eac4b10a59c8ac0a55cc65a52", 0x2, 0x3f, 0x80, 0xb700, 0x6}) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video35\x00', 0x2, 0x0) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, 0x0, 0x0) name_to_handle_at(r0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000200)={0x97, 0x0, "4bb2d879ec04a298b78114132f743f8c463bccedf717f71187898cbb6f5450522caf4036c1708152b0f97f7055d553ab54ab7c62f9b6a11bf365940010fbba880f7d19dc84c3122b33f717522a487115fd818f3eab180a07dfa32c8ad946be1bf79508cd67baebca1036f68c9d4c13dda51ceb10014fb5d82c2ca32aa925526c847eff10d7b496e0715c6cf95430ac"}, &(0x7f0000000100), 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 07:21:18 executing program 0: socket$alg(0x26, 0x5, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) lsetxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) setpriority(0x0, 0x0, 0xffff) semget$private(0x0, 0xfffffffffffffffd, 0x15) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) [ 844.231785][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 844.237604][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 844.311273][T10915] ERROR: Domain ' /sbin/init /etc/init.d/rc /sbin/startpar /etc/init.d/ssh /sbin/start-stop-daemon /usr/sbin/sshd /usr/sbin/sshd /bin/bash /root/syz-fuzzer /root/syz-executor.3 /newroot/1495/file0 /newroot/1495/file0' not defined. 07:21:18 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @remote}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @random="e5ac78d4c7fd"}, 0x10) write(r2, &(0x7f0000000080)="2700000014000f3f00000000120f0a00110001001f750800560099ed4f0500000000ffffffff00", 0x138) 07:21:18 executing program 4: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:18 executing program 3: socket$alg(0x26, 0x5, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x400, 0x0) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r0, 0x84, 0x74, &(0x7f0000000480)=""/72, &(0x7f00000001c0)=0x48) socket$inet(0x2b, 0x1, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x0, 0x0) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000300)='/dev/autofs\x00', 0x800, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(r2, 0xc02c564a, 0x0) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) openat(r1, &(0x7f00000002c0)='./file0\x00', 0x200, 0x1d0eef706234da) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r2, 0x84, 0x6c, &(0x7f0000000000)={0x0, 0xf0, "427609484bc98d1bdf88d28dbd604996de79c415f2c706c140340fdb3c95e9c43a2706a9264671d2dbe089841b64dd04afa9062593e88f888f2e265000e37709ef17e78393f0f17dd22ac49017a198a6f1f656c49dadba7357d68cf59b42c6d0f432fc370761435e74f910cb49d9d640af6cb90e42aa726ce81442951944b6516f052ca6cc234e95d46f8f3138b2d4ea8e93f623e866efecb924b589127814304c98a79e6b96a2d290dbc45d6843ced6294b5861a2f57648aa9e6de21fe4e6502bd8a934db1e8dfb96dfe5bf1227643d44ff314079feaf5d6734e7ed0b27ee9b7e398d1d78cfe950685cf57266f96f40"}, &(0x7f0000000100)=0xf8) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000340)={r4, @in6={{0xa, 0x4e20, 0x200, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x40}}, 0x3, 0x200, 0x3ff, 0x7fff, 0x2}, &(0x7f0000000280)=0x98) ioctl$sock_netdev_private(r1, 0x89f4, &(0x7f00000007c0)="3c36e5eb2db7caf5f78ea8cfdecb797b4ca1dd95e3e8427fafa4405d2c02b2309487bdd77cc692b31ea86d85129cd167a72b4c0c1cc976e3abe187f2fff1aa669e65642203febe6f16a64416281f956206f25b981d77049520b4f5d938674bc1b155cef80f55d6d4b91f108eeadaac10b284248f7290685ca5359224693c64609daaadf47fb089917c61c33063e80e3d04d73303029b136d54e80c8a56a896764cb77a16085df591521b17cb5c317f53395e45de") lsetxattr$security_selinux(&(0x7f0000000880)='./file0\x00', &(0x7f0000000400)='security.selinux\x00', &(0x7f0000000900)='system_u:object_r:auditctl_exec_t:s0\x00', 0x25, 0x1) r5 = getpgrp(0x0) setpriority(0x0, r5, 0xffff) fcntl$setpipe(r3, 0x407, 0x30) semget$private(0x0, 0xfffffffffffffffd, 0x15) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) msgget(0x1, 0x208) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:18 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video35\x00', 0x2, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000040), &(0x7f0000000100)=0x8) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 07:21:18 executing program 0: socket$alg(0x26, 0x5, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) lsetxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) setpriority(0x0, 0x0, 0xffff) semget$private(0x0, 0xfffffffffffffffd, 0x15) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:19 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$KDSETLED(r1, 0x4b32, 0x8001) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video35\x00', 0x2, 0x0) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 07:21:19 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @remote}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @random="e5ac78d4c7fd"}, 0x10) write(r2, &(0x7f0000000080)="2700000014000f3f00000000120f0a00110001001f750800560099ed4f0500f0ffffffffffff00", 0x138) 07:21:19 executing program 1: socket$alg(0x26, 0x5, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x400, 0x0) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r0, 0x84, 0x74, &(0x7f0000000480)=""/72, &(0x7f00000001c0)=0x48) socket$inet(0x2b, 0x1, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x0, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x800, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(r1, 0xc02c564a, 0x0) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) lsetxattr$security_selinux(&(0x7f0000000880)='./file0\x00', &(0x7f0000000400)='security.selinux\x00', &(0x7f0000000900)='system_u:object_r:auditctl_exec_t:s0\x00', 0x25, 0x1) r2 = getpgrp(0x0) setpriority(0x0, r2, 0xffff) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) msgget(0x1, 0x208) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:19 executing program 4: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\xff']) 07:21:19 executing program 0: socket$alg(0x26, 0x5, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) lsetxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) setpriority(0x0, 0x0, 0xffff) semget$private(0x0, 0xfffffffffffffffd, 0x15) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:19 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video35\x00', 0x2, 0x0) socket$l2tp(0x18, 0x1, 0x1) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 07:21:19 executing program 3: socket$alg(0x26, 0x5, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x400, 0x0) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r0, 0x84, 0x74, &(0x7f0000000480)=""/72, &(0x7f00000001c0)=0x48) getsockopt$inet_dccp_int(r0, 0x21, 0x7, &(0x7f0000000000), &(0x7f0000000040)=0x4) socket$inet(0x2b, 0x1, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x0, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000300)='/dev/autofs\x00', 0x800, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(r1, 0xc02c564a, 0x0) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) lsetxattr$security_selinux(&(0x7f0000000880)='./file0\x00', &(0x7f0000000400)='security.selinux\x00', &(0x7f0000000900)='system_u:object_r:auditctl_exec_t:s0\x00', 0x25, 0x1) r3 = getpgrp(0x0) setpriority(0x0, r3, 0xffff) fcntl$setpipe(r2, 0x407, 0x30) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r1, 0x800c6613, &(0x7f0000000080)={0x0, @aes128, 0x0, "d1f7a25d9ca68b25"}) semget$private(0x0, 0xfffffffffffffffd, 0x15) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) msgget(0x1, 0x208) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:19 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @remote}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @random="e5ac78d4c7fd"}, 0x10) write(r2, &(0x7f0000000080)="2700000014000f3f00000000120f0a00110001001f750800560099ed4f05000200000000000000", 0x138) 07:21:19 executing program 4: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\xff']) 07:21:19 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video35\x00', 0x2, 0x0) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, &(0x7f0000000140)={0x1ff}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 07:21:19 executing program 0: socket$alg(0x26, 0x5, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) lsetxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) setpriority(0x0, 0x0, 0xffff) semget$private(0x0, 0xfffffffffffffffd, 0x15) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:19 executing program 1: socket$alg(0x26, 0x5, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x400, 0x0) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r0, 0x84, 0x74, &(0x7f0000000480)=""/72, &(0x7f00000001c0)=0x48) socket$inet(0x2b, 0x1, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x0, 0x0) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000300)='/dev/autofs\x00', 0x800, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(r2, 0xc02c564a, 0x0) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000000)=0x0) sched_setaffinity(r3, 0x8, &(0x7f0000000040)=0xa000000000000003) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) lsetxattr$security_selinux(&(0x7f0000000880)='./file0\x00', &(0x7f0000000400)='security.selinux\x00', &(0x7f0000000900)='system_u:object_r:auditctl_exec_t:s0\x00', 0x25, 0x1) r4 = getpgrp(0x0) setpriority(0x0, r4, 0xffff) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) msgget(0x1, 0x208) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:19 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @remote}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @random="e5ac78d4c7fd"}, 0x10) write(r2, &(0x7f0000000080)="2700000014000f3f00000000120f0a00110001001f750800560099ed4f05000400000000000000", 0x138) 07:21:19 executing program 4: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:20 executing program 3: socket$alg(0x26, 0x5, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x400, 0x0) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r0, 0x84, 0x74, &(0x7f0000000480)=""/72, &(0x7f00000001c0)=0x48) socket$inet(0x2b, 0x1, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x0, 0x0) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000300)='/dev/autofs\x00', 0x800, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(r2, 0xc02c564a, 0x0) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) lsetxattr$security_selinux(&(0x7f0000000880)='./file0\x00', &(0x7f0000000400)='security.selinux\x00', &(0x7f0000000900)='system_u:object_r:auditctl_exec_t:s0\x00', 0x25, 0x1) r4 = getpgrp(0x0) setpriority(0x0, r4, 0xffff) fcntl$setpipe(r3, 0x407, 0x30) semget$private(0x0, 0xfffffffffffffffd, 0x15) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) msgget(0x1, 0x208) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(r1, 0xc0305602, &(0x7f0000000000)={0x0, 0x8, 0x3006, 0x1}) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:20 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video35\x00', 0x2, 0x0) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000040)}], 0x1, 0x0) 07:21:20 executing program 0: socket$alg(0x26, 0x5, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) lsetxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) setpriority(0x0, 0x0, 0xffff) semget$private(0x0, 0xfffffffffffffffd, 0x15) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:20 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @remote}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @random="e5ac78d4c7fd"}, 0x10) write(r2, &(0x7f0000000080)="2700000014000f3f00000000120f0a00110001001f750800560099ed4f05000a00000000000000", 0x138) 07:21:20 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @remote}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @random="e5ac78d4c7fd"}, 0x10) write(r2, &(0x7f0000000080)="2700000014000f3f00000000120f0a00110001001f750800560099ed4f05000e00000000000000", 0x138) 07:21:20 executing program 4: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\xef']) 07:21:20 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCGSTAMP(r1, 0x8906, &(0x7f0000000040)) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video35\x00', 0x2, 0x0) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 07:21:20 executing program 3: socket$alg(0x26, 0x5, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x400, 0x0) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r0, 0x84, 0x74, &(0x7f0000000280)=""/72, &(0x7f00000001c0)=0xfffffffffffffe27) socket$inet(0x2b, 0x1, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x0, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000300)='/dev/autofs\x00', 0x800, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(r1, 0xc02c564a, 0x0) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) lsetxattr$security_selinux(&(0x7f0000000880)='./file0\x00', &(0x7f0000000400)='security.selinux\x00', &(0x7f0000000900)='system_u:object_r:auditctl_exec_t:s0\x00', 0x25, 0x1) r3 = getpgrp(0x0) setpriority(0x0, r3, 0xffff) fcntl$setpipe(r2, 0x407, 0x30) semget$private(0x0, 0xfffffffffffffffd, 0x15) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) msgget(0x1, 0x208) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:20 executing program 1: socket$alg(0x26, 0x5, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x400, 0x0) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r0, 0x84, 0x74, &(0x7f0000000480)=""/72, &(0x7f00000001c0)=0x48) socket$inet(0x2b, 0x1, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x0, 0x0) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000300)='/dev/autofs\x00', 0x800, 0x0) ioctl$TCSETAW(r1, 0x5407, &(0x7f0000000000)={0x6, 0x8, 0x100000000, 0x10001, 0x0, 0x68, 0x100, 0x8, 0x3, 0x50f}) ioctl$VIDIOC_ENUM_FRAMESIZES(r2, 0xc02c564a, 0x0) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) lsetxattr$security_selinux(&(0x7f0000000880)='./file0\x00', &(0x7f0000000400)='security.selinux\x00', &(0x7f0000000900)='system_u:object_r:auditctl_exec_t:s0\x00', 0x25, 0x1) r3 = getpgrp(0x0) setpriority(0x0, r3, 0xffff) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) msgget(0x1, 0x208) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:20 executing program 0: socket$alg(0x26, 0x5, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) lsetxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) setpriority(0x0, 0x0, 0xffff) semget$private(0x0, 0xfffffffffffffffd, 0x15) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:20 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @remote}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @random="e5ac78d4c7fd"}, 0x10) write(r2, &(0x7f0000000080)="2700000014000f3f00000000120f0a00110001001f750800560099ed4f05000f00000000000000", 0x138) 07:21:20 executing program 4: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x7f']) 07:21:20 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video35\x00', 0x2, 0x0) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, 0x0, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000200)={0x2, 0x0, @pic={0xbf4, 0x10000, 0x3, 0x3b6fcf16, 0x0, 0x1, 0x6d, 0x9486, 0x4, 0x8001, 0x8, 0x5, 0x1, 0x4, 0x9, 0x80000001}}) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 07:21:20 executing program 1: socket$alg(0x26, 0x5, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x400, 0x0) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r0, 0x84, 0x74, &(0x7f0000000480)=""/72, &(0x7f00000001c0)=0x48) socket$inet(0x2b, 0x1, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0xffffffffffffffff, r0, 0x0, 0x4, &(0x7f00000000c0)='+\xef}\x00', 0xffffffffffffffff}, 0x30) perf_event_open(&(0x7f0000000040)={0x5, 0x70, 0x401, 0xfffffffffffffffe, 0x1e6, 0x10001, 0x0, 0x2, 0x101, 0x4, 0x2, 0x6, 0x4, 0x31, 0x101, 0x5, 0x2, 0x8, 0xfffffffffffffffb, 0x7, 0x40, 0x7, 0x7f, 0xfffffffffffffffc, 0x1, 0x1, 0x3f, 0x6, 0x1ff, 0x2, 0x2, 0x7fff, 0xbebd, 0x80000001, 0x0, 0x3, 0x7, 0x292, 0x0, 0x6, 0x3, @perf_bp={&(0x7f0000000000), 0x8}, 0x1000, 0x5, 0x72f, 0x9, 0x4, 0x1ff, 0xd432}, r1, 0x10, r0, 0x1) openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x0, 0x0) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000300)='/dev/autofs\x00', 0x800, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(r2, 0xc02c564a, 0x0) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) lsetxattr$security_selinux(&(0x7f0000000880)='./file0\x00', &(0x7f0000000400)='security.selinux\x00', &(0x7f0000000900)='system_u:object_r:auditctl_exec_t:s0\x00', 0x25, 0x1) r3 = getpgrp(0x0) setpriority(0x0, r3, 0xffff) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) msgget(0x1, 0x208) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:20 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @remote}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @random="e5ac78d4c7fd"}, 0x10) write(r2, &(0x7f0000000080)="2700000014000f3f00000000120f0a00110001001f750800560099ed4f05006000000000000000", 0x138) 07:21:20 executing program 3: socket$alg(0x26, 0x5, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x400, 0x0) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r0, 0x84, 0x74, &(0x7f0000000480)=""/72, &(0x7f00000001c0)=0x48) socket$inet(0x2b, 0x1, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x0, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000300)='/dev/autofs\x00', 0x800, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(r1, 0xc02c564a, 0x0) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) lsetxattr$security_selinux(&(0x7f0000000880)='./file0\x00', &(0x7f0000000400)='security.selinux\x00', &(0x7f0000000900)='system_u:object_r:auditctl_exec_t:s0\x00', 0x25, 0x1) r3 = getpgrp(0x0) setpriority(0x0, r3, 0xffff) fcntl$setpipe(r2, 0x407, 0x30) recvmsg$kcm(r0, &(0x7f00000002c0)={&(0x7f0000000000)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x80, &(0x7f0000000c40)=[{&(0x7f0000000940)=""/196, 0xc4}, {&(0x7f0000000080)=""/163, 0xa3}, {&(0x7f0000000a40)=""/246, 0xf6}, {&(0x7f0000000340)=""/165, 0xa5}, {&(0x7f0000000280)=""/10, 0xa}, {&(0x7f0000000500)=""/78, 0x4e}, {&(0x7f0000000b40)=""/246, 0xf6}, {&(0x7f00000007c0)=""/159, 0x9f}, {&(0x7f00000006c0)=""/122, 0x7a}], 0x9, &(0x7f0000000cc0)=""/137, 0x89}, 0x20) semget$private(0x0, 0xfffffffffffffffd, 0x15) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) msgget(0x1, 0x208) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:21 executing program 4: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x8c']) 07:21:21 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video35\x00', 0x2, 0x0) write(r2, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, 0x0, 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000040)}], 0x1, 0x0) getsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000100), &(0x7f0000000180)=0x8) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video35\x00', 0x2, 0x0) 07:21:21 executing program 0: socket$alg(0x26, 0x5, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) lsetxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) setpriority(0x0, 0x0, 0xffff) semget$private(0x0, 0xfffffffffffffffd, 0x15) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:21 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @remote}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @random="e5ac78d4c7fd"}, 0x10) write(r2, &(0x7f0000000080)="2700000014000f3f00000000120f0a00110001001f750800560099ed4f0500f000000000000000", 0x138) 07:21:21 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video35\x00', 0x2, 0x0) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, &(0x7f0000000140)={0xecac}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 07:21:21 executing program 4: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\xf6']) 07:21:21 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video35\x00', 0x2, 0x0) fcntl$dupfd(r0, 0x0, r1) write(r2, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, 0x0, 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 07:21:21 executing program 1: socket$alg(0x26, 0x5, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x400, 0x0) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), &(0x7f0000000040)=0x4) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r0, 0x84, 0x74, &(0x7f0000000480)=""/72, &(0x7f00000001c0)=0x48) socket$inet(0x2b, 0x1, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x0, 0x0) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000300)='/dev/autofs\x00', 0x800, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(r2, 0xc02c564a, 0x0) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) lsetxattr$security_selinux(&(0x7f0000000880)='./file0\x00', &(0x7f0000000400)='security.selinux\x00', &(0x7f0000000900)='system_u:object_r:auditctl_exec_t:s0\x00', 0x25, 0x1) r3 = getpgrp(0x0) accept4$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}, &(0x7f00000000c0)=0x1c, 0x80000) setpriority(0x0, r3, 0xffff) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) msgget(0x1, 0x208) ioctl$KVM_CHECK_EXTENSION_VM(r1, 0xae03, 0x8001) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:21 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @remote}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @random="e5ac78d4c7fd"}, 0x10) write(r2, &(0x7f0000000080)="2700000014000f3f00000000120f0a00110001001f750800560099ed4f05001001000000000000", 0x138) 07:21:21 executing program 3: socket$alg(0x26, 0x5, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x400, 0x0) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r0, 0x84, 0x74, &(0x7f0000000480)=""/72, &(0x7f00000001c0)=0x48) socket$inet(0x2b, 0x1, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0xfffffffffffffffe, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/autofs\x00', 0x800, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(r1, 0xc02c564a, 0x0) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) lsetxattr$security_selinux(&(0x7f0000000880)='./file0\x00', &(0x7f0000000400)='security.selinux\x00', &(0x7f0000000900)='system_u:object_r:auditctl_exec_t:s0\x00', 0x25, 0x1) ioctl$CAPI_GET_PROFILE(r1, 0xc0404309, &(0x7f0000000040)) r3 = getpgrp(0x0) setpriority(0x0, r3, 0xffff) fcntl$setpipe(r2, 0x407, 0x30) semget$private(0x0, 0xfffffffffffffffd, 0x15) r4 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) msgget(0x1, 0x208) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x40042406, &(0x7f0000000000)='.+\x00') clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:21 executing program 0: socket$alg(0x26, 0x5, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) lsetxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) setpriority(0x0, 0x0, 0xffff) semget$private(0x0, 0xfffffffffffffffd, 0x15) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:21 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video35\x00', 0x2, 0x0) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 07:21:21 executing program 4: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\xfe']) 07:21:21 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @remote}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @random="e5ac78d4c7fd"}, 0x10) write(r2, &(0x7f0000000080)="2700000014000f3f00000000120f0a00110001001f750800560099ed4f0500000a000000000000", 0x138) 07:21:22 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video35\x00', 0x2, 0x0) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$VIDIOC_S_MODULATOR(r0, 0x40445637, &(0x7f0000000200)={0x90, "75f0e51b44fa78c96131aca0eb12732d43f6c851ad319721f8822df4c1b14e13", 0x20, 0x20, 0xa0c1, 0x58666a4361f368af, 0x7}) 07:21:22 executing program 0: socket$alg(0x26, 0x5, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) lsetxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) setpriority(0x0, 0x0, 0xffff) semget$private(0x0, 0xfffffffffffffffd, 0x15) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:22 executing program 1: socket$alg(0x26, 0x5, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x400, 0x0) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r0, 0x84, 0x74, &(0x7f0000000480)=""/72, &(0x7f00000001c0)=0x48) socket$inet(0x2b, 0x6, 0x8) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x0, 0x0) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000300)='/dev/autofs\x00', 0x800, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(r2, 0xc02c564a, 0x0) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000340)={0x0, @in={{0x2, 0x4e24, @empty}}, 0x0, 0x7fffffff}, &(0x7f0000000500)=0x88) setsockopt$inet_sctp6_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000540)={r3, 0x9, 0x7fff, 0x9}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) lsetxattr$security_selinux(&(0x7f0000000880)='./file0\x00', &(0x7f0000000400)='security.selinux\x00', &(0x7f0000000900)='system_u:object_r:auditctl_exec_t:s0\x00', 0x25, 0x1) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(r2, 0xc0905664, &(0x7f0000000080)={0x0, 0x0, [], @bt={0x7, 0x9, 0x5a15, 0x7, 0x2, 0x3, 0x1}}) prctl$PR_CAPBSET_READ(0x17, 0x1a) getpgrp(0x0) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) ioctl$SNDRV_TIMER_IOCTL_PAUSE(r1, 0x54a3) ioctl$VIDIOC_TRY_FMT(r0, 0xc0cc5640, &(0x7f0000000940)={0x0, @raw_data="d6d34d5b97a359c703622143620eb86f0932ed34a81b2c96c29fa8ce34fb69333df8321b2b31857623c37e4f1da8fab56a3bb839e44e29ef1d7b5ffe46dce18d03aab2a84c87f1521d9f78dbc88bac7f7268e6184ed80826a3fb99a772e8b414d6fb30d22b3965844d07bae933684fef34e89a42be919bb4fee82638e8799b930ebccdf7ca761e4cbb2a51104dd07d1665beec9a2eca0e2bc0966b0c68566abe59ef08e7bc321c1c809f4700563eb84e45c777f09be43d1924d55c912dddb999d57c525afeb023ea"}) msgget(0x1, 0x0) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000280)='\xad\xec*\x1b\xd6Ls-P\x8c\xbf\xd0wlan1\x00\xa4\xb71\xc0\xc9\xe3\xd3%+\xb4H\x87\xf0\xeb\a\xa3\xc2\x84N\xfci\xe9\x1b\xab\x99M\xe4\xf2;\xb7+\xf3\xaf\xbd\x12m\xcbx\x9f\x92\xb1\xb5\xcf\xe5\xf4\x1d\x1d\x8f\rG\xa2\x91\x00\x00\x00\xcd\xbf\x9b\xdd\xc8\x90O\xf4\xb6\xe6\x16\x84\xa9\xeb', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) pivot_root(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00') 07:21:22 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video35\x00', 0x2, 0x0) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 07:21:22 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @remote}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @random="e5ac78d4c7fd"}, 0x10) write(r2, &(0x7f0000000080)="2700000014000f3f00000000120f0a00110001001f750800560099ed4f0500e90b000000000000", 0x138) 07:21:22 executing program 3: socket$alg(0x26, 0x5, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x400, 0x0) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r0, 0x84, 0x74, &(0x7f0000000480)=""/72, &(0x7f00000001c0)=0x48) socket$inet(0x2b, 0x1, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x0, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000300)='/dev/autofs\x00', 0x800, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(r1, 0xc02c564a, 0x0) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) lsetxattr$security_selinux(&(0x7f0000000880)='./file0\x00', &(0x7f0000000400)='security.selinux\x00', &(0x7f0000000900)='system_u:object_r:auditctl_exec_t:s0\x00', 0x25, 0x1) fchmod(0xffffffffffffffff, 0x18a) r2 = getpgrp(0x0) setpriority(0x0, r2, 0xffff) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x30) semget$private(0x0, 0xfffffffffffffffd, 0x15) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) open(&(0x7f0000000000)='./file0\x00', 0x8000, 0x2) msgget(0x1, 0x208) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:22 executing program 4: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:22 executing program 0: socket$alg(0x26, 0x5, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) lsetxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) setpriority(0x0, 0x0, 0xffff) semget$private(0x0, 0xfffffffffffffffd, 0x15) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\xff']) 07:21:22 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video35\x00', 0x2, 0x0) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000100)=0x0) ptrace$setregset(0x4205, r2, 0x7, &(0x7f0000000180)={&(0x7f0000000200)="0993d870673992f30fb695a108474e9d4edb5d1c94cf382283e03928aaa0cd9b3304a63cfe791cb8bfc6d040143dc0606f2d63791f7c70ef094460b91a5056ba20f6269a88878263ca66ff89018d4df0dcc71c0fbe083bb373e27ac65dd74d76a266d5073d6cf937dee464b0403a", 0x6e}) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f0000000040)='/dev/video35\x00', 0x4) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 07:21:22 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @remote}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @random="e5ac78d4c7fd"}, 0x10) write(r2, &(0x7f0000000080)="2700000014000f3f00000000120f0a00110001001f750800560099ed4f0500000e000000000000", 0x138) 07:21:22 executing program 3: socket$alg(0x26, 0x5, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x400, 0x0) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r0, 0x84, 0x74, &(0x7f0000000480)=""/72, &(0x7f00000001c0)=0x48) socket$inet(0x2b, 0x1, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x0, 0x0) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000300)='/dev/autofs\x00', 0x800, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(r2, 0xc02c564a, 0x0) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$F_SET_FILE_RW_HINT(r1, 0x40e, &(0x7f0000000280)) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) lsetxattr$security_selinux(&(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='security.selinux\x00', &(0x7f0000000340)='system_u:object_r:auditctl_exec_t:s0\x00', 0xffffffffffffff98, 0x1) r4 = getpgrp(0x0) setpriority(0x0, r4, 0xffff) fcntl$setpipe(r3, 0x407, 0x30) semget$private(0x0, 0xfffffffffffffffd, 0x15) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) write$binfmt_aout(r3, &(0x7f0000000940)=ANY=[@ANYBLOB="cc000401f6010000ad03000003000000d30300000000000000000000000000000503819764b61685feb6a086f88515a5aac63106187a20ea30bc59eab2d3c96febc1ab45ff8859b661c20c68b2f0eba7d94671d0742ceebe9effd0d70add3e66f108c2dca73901c36499240c90328ff590b8afd5887edd470cd410721b7526588359d7cc8da57b0041710f2e01a3c475df9632387ce7d518cb2748a21853cc90bcd8f567999abedea700cea8a51b793179bd0b5d613318ead5968f04ef80145010706f41dd057d1ffd097c40719eca9b78"], 0xce) io_setup(0x80, &(0x7f0000000000)=0x0) io_pgetevents(r5, 0x10001, 0x7ffffffffffff33, &(0x7f0000000700)=[{}, {}], &(0x7f0000000500)={0x77359400}, &(0x7f00000005c0)={&(0x7f00000006c0), 0x8}) msgget(0x1, 0x208) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:22 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x400, 0x0) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r1, 0x84, 0x74, &(0x7f0000000480)=""/72, &(0x7f00000001c0)=0x48) socket$inet(0x2b, 0x1, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x0, 0x0) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000300)='/dev/autofs\x00', 0x800, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(r3, 0xc02c564a, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000000)={0xffffffffffffffff}, 0x106, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r2, &(0x7f0000000080)={0xf, 0x8, 0xfa00, {r4, 0xa}}, 0x10) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) lsetxattr$security_selinux(&(0x7f0000000880)='./file0\x00', &(0x7f0000000400)='security.selinux\x00', &(0x7f0000000900)='system_u:object_r:auditctl_exec_t:s0\x00', 0x25, 0x1) r5 = getpgrp(0x0) setpriority(0x0, r5, 0xffff) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) msgget(0x1, 0x208) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:22 executing program 4: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:22 executing program 0: socket$alg(0x26, 0x5, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) lsetxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) setpriority(0x0, 0x0, 0xffff) semget$private(0x0, 0xfffffffffffffffd, 0x15) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) [ 848.391765][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 848.397613][ C1] protocol 88fb is buggy, dev hsr_slave_1 07:21:22 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$DRM_IOCTL_VERSION(r0, 0xc0246400, &(0x7f0000000100)={0x6, 0x4, 0x4657a7c, 0xb3, &(0x7f0000000200)=""/179, 0x38, &(0x7f0000000040)=""/56, 0xab, &(0x7f00000002c0)=""/171}) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video35\x00', 0x2, 0x0) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x72, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000}, 0x0, &(0x7f0000000140)={0x1ff, 0x0, 0x8000, 0xfffffffffffffea7}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 07:21:22 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @remote}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @random="e5ac78d4c7fd"}, 0x10) write(r2, &(0x7f0000000080)="2700000014000f3f00000000120f0a00110001001f750800560099ed4f0500c00e000000000000", 0x138) [ 848.631755][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 848.631783][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 848.637573][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 848.643327][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 848.654858][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 848.660630][ C0] protocol 88fb is buggy, dev hsr_slave_1 07:21:23 executing program 4: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:23 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video35\x00', 0x2, 0x0) ioctl$VIDIOC_SUBSCRIBE_EVENT(r1, 0x4020565a, &(0x7f0000000040)={0x8001000, 0x8000, 0x1}) fdatasync(r0) write(r2, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockname(r0, &(0x7f0000000200)=@caif=@dbg, &(0x7f0000000100)=0x80) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, 0x0, 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 07:21:23 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @remote}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @random="e5ac78d4c7fd"}, 0x10) write(r2, &(0x7f0000000080)="2700000014000f3f00000000120f0a00110001001f750800560099ed4f0500000f000000000000", 0x138) 07:21:23 executing program 0: socket$alg(0x26, 0x5, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) lsetxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) setpriority(0x0, 0x0, 0xffff) semget$private(0x0, 0xfffffffffffffffd, 0x15) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:23 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x400, 0x0) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r1, 0x84, 0x74, &(0x7f0000000480)=""/72, &(0x7f00000001c0)=0x48) socket$inet(0x2b, 0x800, 0x0) openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x0, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_version\x00', 0x2, 0x0) r2 = getpgid(0x0) sched_setaffinity(r2, 0x8, &(0x7f0000000100)=0x3f) fcntl$getownex(r0, 0x10, &(0x7f0000000080)={0x0, 0x0}) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x8, 0xffffffffffffffff, 0x7, 0x5, 0x0, 0x4, 0x80000, 0xc, 0x5, 0x800, 0x5, 0x80000000, 0xfffffffffffffff7, 0x6, 0x5, 0x324abda, 0x9, 0x1000, 0x7, 0xffffffff, 0xfff, 0x1, 0x9150, 0x6, 0x1, 0x1, 0x13e0000000000000, 0x3, 0x8001, 0x9f, 0x6, 0x5, 0x401, 0x40, 0x6c5, 0x8, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000040), 0xa}, 0x10, 0xfffffffffffff801, 0x6, 0x8, 0x9, 0x6, 0xa7be}, r3, 0x8, r1, 0x1) r4 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000300)='/dev/autofs\x00', 0x800, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(r4, 0xc02c564a, 0x0) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) lsetxattr$security_selinux(&(0x7f0000000880)='./file0\x00', &(0x7f0000000400)='security.selinux\x00', &(0x7f0000000900)='system_u:object_r:auditctl_exec_t:s0\x00', 0x25, 0x1) r5 = getpgrp(0x0) setpriority(0x0, r5, 0xffff) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) msgget(0x1, 0x208) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:23 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x400, 0x0) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r1, 0x84, 0x74, &(0x7f0000000480)=""/72, &(0x7f00000001c0)=0x48) ioctl$FS_IOC_RESVSP(r0, 0x402c5828, &(0x7f0000000000)={0x0, 0x7, 0x100000000, 0x1f}) socket$inet(0x2b, 0x1, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x0, 0x0) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000300)='/dev/autofs\x00', 0x800, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(r2, 0xc02c564a, 0x0) sched_setaffinity(0x0, 0xffffffcc, &(0x7f0000000080)=0xa000000000000005) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) lsetxattr$security_selinux(&(0x7f0000000880)='./file0\x00', &(0x7f0000000400)='security.selinux\x00', &(0x7f0000000900)='system_u:object_r:auditctl_exec_t:s0\x00', 0x25, 0x1) r4 = getpgrp(0x0) setpriority(0x0, r4, 0xffff) fcntl$setpipe(r3, 0x407, 0x30) semget$private(0x0, 0xfffffffffffffffd, 0x15) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) msgget(0x1, 0x208) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:23 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video35\x00', 0x2, 0x0) write(r2, &(0x7f0000000340), 0xfffffeaa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$RDS_CONG_MONITOR(r1, 0x114, 0x6, &(0x7f0000000040)=0xffffffffffffff00, 0x4) ioctl$SCSI_IOCTL_SYNC(r0, 0x4) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 07:21:23 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @remote}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @random="e5ac78d4c7fd"}, 0x10) write(r2, &(0x7f0000000080)="2700000014000f3f00000000120f0a00110001001f750800560099ed4f05000110000000000000", 0x138) 07:21:23 executing program 1: socket$alg(0x26, 0x5, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x400, 0x0) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r0, 0x84, 0x74, &(0x7f0000000480)=""/72, &(0x7f00000001c0)=0x48) socket$inet(0x2b, 0x1, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x0, 0x0) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000300)='/dev/autofs\x00', 0x800, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(r1, 0xc02c564a, 0x0) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) pwritev(r2, &(0x7f00000005c0)=[{&(0x7f0000000000)="5ce9f710ed8dd82f1a23b5f37479e5ca866d066309d09dd7459b5dc421590edb9286d1ea487c083ef6b16d17fdd921f545145ac36609350a1487d32f5eb8f10f6f32641066181ec40fc92b38f2bf81dccc5269f1c7c82615d8a4b4e2722ae13163b6acbbf2d8a18f3cc843b6bd6a36032796a881555b2a273b11ad344e1ce1bab8dc2b287b8d74724699f1ba270021da0c375b1d6433209418bb1d70358fa2fc2522b5af364d15c96bb3b8fb1ce1600680b5bc6660785c894e1ceeb9d4866951fcf33171fc5711a679c4e3ec07a2e5ab653d07d097eed1051c923a7b1599e35109ea2b477bd0d831fe459c190b9cc995eab5a38e23fb5daf", 0xf8}, {&(0x7f0000000940)="cfe819f15f93b80bc4397243168e2ff43c2e3c4e27e6340b6a54d9474d01c75f2e49811552d289d9b6c4de0b6f1334eacd47a39b55694d311eb1c18f79851539905111d938b9a4fa4496128fa2c24be4890d11bd4226dfff9fd9d1fb6ba7b5e20d79637eeb800f18d780e69fb840af9165d52125a664a530f4c8c79b150321aaf0a72e39279a6cad930f64ba47bfb23681d6349cf6a36944fd6a5f103af3cbe365b4137a56a484245bb7cd8c52e11415f97a5fccb5ac476e1b6811750611f19ef6f8bb84a9a74621e42738c43a4de8284c0af38a4795fe36d76cd30a9cdb65f41997c36261db3191ed21aff12664a02d9b54029345704d141006da7d32faf17ac147f500ffb20916c5adf3fb34d6901e2254fcfcbfbba82435f82652337d28dd9871b5b6db44c74949d70c6d62b03c2188b84b6a03bc1e76f5015b65d8df2b3000e3f3bf9265a13011c37d2656231c86bc1b876c07e4f2386c3bb12b8071ee40b8d5560a192b1df0ec2db201158e5da956865f2e0459867222a71dbde5539d73b2bee3fcb72d36907970d10592c77138a7c9c9237f3cf42f139c456ecfce93e19439c8430c290879ab1589241f041e03d52435ef46a80d76eb24dee264f696f787235c912f6b590361f40aa0b1ce54a85b612fbfac3f4fc876405260004cfa1d7668ebad4223c027b164e1465035cd201c19b89e6e99364ef52041440ae18211622af7feb86725fd4b5e1ba4e8e6b2ec97a2a7fc80b56e70773e0a7c4a50c449f3a9be4ef8b3ed1a208c09cdcbf86014e43a56601c184c98e038a81189f5eab836219b9c73ede765f2c6da8c641d7b453b9cad88aa47092f530c212c74905beb6ed60ce600bff0b772de7ec8bab0652b6ef4237ef04e368744c575ff02ddee8cf2d79cb1018e323d3701b28dd11a3e6abb565a3965055e54423a004a8aa701018ab8a301dd243738c6262ce7311ab31defa6f60a69ec28a7537c10f4cbd4e62c7d38a3217055c1e4f6d2c496221387fccca94903f5d59b4dcb298f1fa4d379454f899b565918ece3d7dbfb9920b2827cf3aa05e251ab67bd9111741c391c1832d42f930e42f3bd9206c3ac94251ef77c8cc2f6acab00d641665cd322b6da84a9e5522751a3c7d65398b00344ca33781154e63305e3f6e9c486f497a5a931ec7aaba89cb73c4daa39b99029cf752923850c38b5e00dc102f86ccd430d8755973d8c319dac3bb45ecfdd4707550204ae7d406bd3cca2a8e325af9831b145e28dfe9c24abffc2b797805e5032d8af3ffe76443e41a06d1f04283f92668b6cfd4a3f4eaf15ec9f06366f18bf60566ea72ebe1c1125aae6d05da3737751ac581f5b6bf246b0103687dc14d5057d2683287e3db2dc67a87af7c8e38b1390a9e9c0873abbb0a501302c6514be9d2f22e7150b200f19ad1a934d48ff7f1c4acb68b49417b5bced110b592512d21b3594205820ed57091fdab74f69a9b7e5a5118abc157fa0e85326180403373570fc85f10b82df0a1411d390f38f4d93ea110391c550ef793f947529a31e9b29683ae8da7651089464460a51739c9f5afbd433b1f73b85b003376e4832bf4d5787712cf33a422edf342d1e61a924d50ee7c452a6c74ea226ffbacb7f90c204b2b966fca9a6f77138f285c7180e5078b80761bcce9af73597e0dab58e5585f7ee191fcaa8e84285dbfb37bf34a836897c3aebd5e6ca939c9528f8256ad687cf82f23f0c5cbe4bca6016c4a05f6d0f20d94a05800371b471144f8e6836ad3500e43ea161c3282a439015e90b068e80a84fbee8b9cae91696d9b21b8b3fca860e26ab037be51bd183bdacc757fe3401788ee30f006907849d26fb2b903078345f7b7b7bc82412b9e228e9ec49fbb352cf60c490a0586a50d269a56b6aec7dd767288f8331b6134144997e22e5219061afac9e847404f3a92538277388fe0f06a262078ff952a873c747a7b0e36e1e7325a92aaa270777e328810785d1e538fcbc86112c8e851ed8a2895a059dc2695549f8495e0f2d9620a31ad5aac115c2480a08e1d6d7e6f11f046e4dc1e876904ef1c43226a61f4025ceb779a87273927813d18390eeda9547d30868f59ace4dfc3767b3a385efeabce8ee0c168758f6ed6e710c23b4bf02e7f9af56effb873bd574924bc90d5f0e6779f2a60288113cfe9967af155661f8a733a8fe5d015b9c6ef98678585c9b4187c4c96ebdfddfda48d67e0c099329e744377a8da3a687f95bc0730b256588ac4d7492ceea1c7561c8106c8fe778b6648b5fec16c0feb8347d5783725aece64a2bf70087902e3e46a333cae233a5cc24e0012f57022ad867b8bd8708181ab6682714b09bcdc8e87256a996a6af9b328956ee3c93da16c5758590a69715bd53d50d51e21dcf2e41e0057fb2333139857f9fb40760e0fc34b162a205dc1487ce2176d008a5bb091a35dda579355f19e0626f0503e497091c976886fb95d636b528376ed3c233752a9152aef0cdb04c2be75bf5db73d32e96a96fa575d3c8f14fb7377fd9890b7d510d32c48eb11572f5a19343742a65363148c67ad35385fb21f4953c5ca024c7d8e26bf0ebc684b51ae60be8db8e0f1c6aeefb2221838c0d05dd58598608f6d953bcf940fe146de98db3efdd8a7bd9f1abf60918cf5449b161cdfa641207a100c93e42a30387ed4007b7cee8a4c7df8e623fbf3216dae39cac50c207fc5ae733a20cc6343903d13d2d6f4a50fd9ce4c97c3a41b76e26470706835cc094a8fdc6939cdcae1f2ac8ccd19519a7d00402f1bfa290b21e36a7352c2fa4d7dc7ae9de0b3b54c5a994d6673042e9be77b9882a288e5b87cf235d6690c48af00c89b57d411954ee9827235b548dcbc0c8d85ff6de7fdb4af74fdddee34c8a75ca8635e8f1deb378864caaafe26fbca5cc9a71820d9ffff6f6b55835b21b704abc1c9dd9c9a95b98fe63415f9168c89da4513af315d41ad3a48f4b749fd7cefaf4f2156713575d6c2f44384c0fedd707af75047e1529318b8bc822cdf7f42de1838c04eb2ea98f70c8e4ababa90800a3637009fd9c3738c91b5be388818f7c985761c4be69aa163d3e206e0c84f1873d95a0006f2cfecc3a405f685ae97ae4dc1ee8b9592a444bae47559efd6b91e348d755a6b6fb10f360207a16af17fc8c192e6132413762d65b9451db735a0d30d32fdfa5c145c4f9dccec2af8dcf585699594581709c7e37f12d7fbf90f0e7b3c784e79f7af2c7aafa85aee5773062dfaede9807a1d6e3fe8d7e2888625d820191d6aa826a9a5381b8559bd378d0593fc54b88a48cb8eb44782b55ce38972220742f5326b9713130572dd499f787c9d79b5fd8c6658467830ba154dc775bfbcca96dc720ac1083fcd33ff8368704476db091bbf3568b47edbf3da03a176f8b38a10be9c23633f52463c34de0cc9f3e455c438838e1df0827248f9f11fe6f8c775827667d2ead64cd38c0cb2e73eadd4a0e468b7a542b253ecb4fae49f60ed9586e58f7da644f335d1b039006ffca66f5f650795570f53db3f6e70eba1e67e5e530e10ef09581f694ed3577ee88c41d152d2e161247ce0cf832df9fffdcfd19a854363e0efeabde36a5187487c5144ca8476f82ad3216cf75c9254e7ab60d4a09b0b3e189c64467961cc3255eb5920259de0cbf888da5ee182b4d2c0203bbb918b77ed3b3cd1b1372149c89bb5ffd22132cfde5d068d3c51fc87f5130ee85538a9f74bfcea5e560b27a5a7e32bfc4e5719630a3b0118ac3fb821feaa718f6c0ec3a4b033d01f58a3de47495d5ed32dfd6f4bea8c38bdf8f8d23c605ac713568dbeaae7e7b4db6fadbccb4db14b1d53e866b4a3dce91860bd1fd7df9183e61c1e4fa844a098f7e5db1c993717b40ea3bbbdcfb5de3080edfa425ffaf3caf08cb0a58665976f1a72e07cf51ca973baee37e3c92a5cc59409733d30ea38472794b5aaacd2f863e459a47389248fae956e2f6c73cef973842f78d7dfab672f356f7957f9d1638a9430a3096433bfd91b399643812e622c0281ac22a6e9f98b8c3c2d688beb281ce529ecae6edfcbad15b125372fcff444f4c5305a0935b19ab47b0e997139c60c32f7dc0a57664c96150650268377b60a589e4ed31a3e3e19041c6774740b20d4b650b7c511ef3627872368538c2f090f6ec3a03693943ce6d0f53540547e56235bd10e6bbf760fc343a0c033ac275e400b539057c2090526faca1e8f4336be9de1482de11f5b3801c85ce7276b577a195d66c1cef6ace88eacc22ddc7c6be9316fe33426872df7bdbed4d284de19e3a56f9cf52966f63c906c7253ca5a210d47abd0dcff49f3c176e50c45aa1364784b264846596e6db3e08c2ae514fbf1654e76ca012900e01b63c594cede5f8f2862ee6f70017a4fe5a647798ca4546027ba3b7bd07f7a25c275cd6d8f0049fd0f94fdb4ad1aa86ecd8b7ea046689b00afdf02e82f91d141a212df8eff85819c1cf7793a447e5f4f11bd6ab5a15b549c141a40c1f01b156019973929ba58407c940b3397d37c97e20f71e318aed030b75bdab095f4e9ff3f5a3cc8f227f51eb184d36fbddd8650c284f8187c5ac78fa911ac96068b460fb534f17541e381897e47d73a21005fefb9dcc77dc7208bd7af37896201450918440bbbbcaa2179c6f894973a58b56096e1e51b144c937d6cc5cecf150d59b067183149e444e9186e270a15a858f0b4cedb77a783035bedeec40d7020f164ef907621c29447d8a4caca21f62c611c5113f4ab0bf0763a5543e6ee42e5cedc652e23b390848f5d55deb135bbb3beb91169b26cfa1a83182bd34250f3fea228363f280d62f9ae1cba379474340e7bcfff4d4870d77258e6e956f516a1381c33b8b21f182ce6f0f92279b6c826abfcf496f51eeba5c356923633689989251046324c638f1523085fde90350c509ff0fffe2fb0ca1ea7c79b993ee4bdb7db3bb834fcad589a0e68a2de3f35b37a3ad4e995743dce391decc6679caa52fe27f1f6223f15e153ead62aacaae0ae965d0237d8ad453adcb0e1ea85f81d2bf07838c474e6a6a528cbd4804fa4bb05da22b5552bc97c4f2c1402c42c5f1cb4fb6dd63a000006ed30046a2ab73558dd5ad6e2c05b8c7904ce84c2144500a40b81d95087a37f1bb269e0c2fb186f379c4defdaf8435b5ab42002d849b776dbf8d18c90bdf3052b3951f6502d2b805b8d874c350b86a3f318899deeb308abacd2fb0e0f94d0ef58bc367c413736788f67f510a81dadf897b56f9673a54d92917103928c7c7eccc784b9034266dc3342fd873dd23afea119ff0dc57970fadf40140f48bf82c14fd1c3a99da75d2d355bec26f22faa17741e5ab34fafc3f76a5350044c2ae00f059dc4f762c83506e430b58695fb6e9e044e87c47c99b66b6406bb6f3c41fc3707f771f3dee8e6f9377cf08bae45cf15376b9ecda516ac0fe8b6579bd0adfb54d0fe7dc47df7844daa96f3ff2c6e2619b9ecce6b0734e602567ce23f6c2bfbd8af9834b168b63bdb4da54b35ea9eb12e855426d6a6843067de2df6a15b399b5f5b8c94a864fbf0b7ee80f1a12a8d458cde7cd2cc55423e1bef9ddbae78a1149bfcc5b5acc176937dd2dda30f5c1a50a8c58a54acbcb6967b2d56c24dc3fd0d3bd1bc2839fef3c9840ec84d34b24b9dd63129b1af4c2b6e4a2e9446fc3956087a26ae7cf8abd223b88f5374227b08bec019b0a946028490a4124bfd143325d86c269c3b31b448d24dbe3279fbf130c1e51de133985df50e786f7db9eaa6ec3dbaf18353badccc6846a", 0x1000}, {&(0x7f0000000280)="b502c401be7d21629cb6a8215edf534cbc7667acbb29ff5ad3647e4eb359c309270ca437f92af378ba1346f20f7fd951bf11280653fab30b93131d190e305033f419404991dda74f5a3433c23f87995c37eaf1397c52a8ce2bb26c3d522e3f81966b06554dbaab8b8ab39184fd4a38c5f77648d5", 0x74}, {&(0x7f0000000340)="cd73680097374bce8b29138fca114f1844a6ee5cb9421de5f8c5fe3bddfb487e4456fb7def5a2c9a4b228bc40689685dc3b1248bb405ff799d9c5704e92f16a8bb7ff7946fea5ac1b832134ecac6d3f380ad75eeadf55624e72320fd99e18c5f7258739cb09337a411dcc40d3c0f3dbfbd1b5699674df2f360c787daf8eaca2aa46dab4d141bb6d04e7bcd1eadec4f09129245db74786b47faffae2fd8fedbb8bb3d11887b771ca1c26eb717deeda1d53455cfa4f5f3e95907cbd5", 0xbb}, {&(0x7f00000007c0)="d67a69a43d64b4351ad843b176fa094a3c76fbd42e79d45a79e743f814dcb1c909fde43de9a4c73a0e90544093db45b0363f832095726bc9b8a7fd8c762154653496f26b03f86c2e6c8a2a8bdad8e47425226c40c2c826fe056fc44de8d019c3959b2ecf0aac119497d043a2b11123323eb5e9ac9a02fbd23a97b0ffbb41b9be53b2e412702f099c151a8c4571afd2d1", 0x90}, {&(0x7f0000000500)="10a3d85368c715a942445d0d96222dc09716adcbdacf871aa8c92b8af187d72b3ec2db4e86005c8151ad98ca58d2c15fad57eed953d2c53e8580643e0b86e41f662490effd5f2593e4db54c018d41e93d0b5806469b0ae6eaa8b9a3073096f18e3861ccaa036eee5f5cb3dda48", 0x6d}, {&(0x7f0000000100)}], 0x7, 0x0) getsockopt$inet_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f00000006c0)={0x0, 0x4, 0x5, 0x5, 0x3, 0x6}, &(0x7f0000000700)=0x14) getsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f00000008c0)=@assoc_value={r3, 0x7fffffff}, &(0x7f0000001940)=0x8) lsetxattr$security_selinux(&(0x7f0000000880)='./file0\x00', &(0x7f0000000400)='security.selinux\x00', &(0x7f0000000900)='system_u:object_r:auditctl_exec_t:s0\x00', 0x25, 0x1) r4 = getpgrp(0x0) setpriority(0x0, r4, 0xffff) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) msgget(0x1, 0x208) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000100)=[@mss={0x2, 0x3}, @sack_perm, @sack_perm], 0x3) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:23 executing program 4: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:23 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video35\x00', 0x2, 0x0) write(r1, &(0x7f0000000340), 0x41395527) getsockopt$netlink(r1, 0x10e, 0xe, &(0x7f0000000480)=""/4096, &(0x7f0000000180)=0x1000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xc, 0xffffffffffffffff, 0x0) fsmount(r0, 0x1, 0x8) r2 = getpid() syz_open_procfs(r2, &(0x7f0000000100)='autogroup\x00') pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, 0x0, 0x0) fsconfig$FSCONFIG_SET_FD(r0, 0x5, &(0x7f0000000040)='bdevsecuritywlan0[\xb0wlan1proceth1bdevkeyring\x00', 0x0, r0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 07:21:23 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @remote}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @random="e5ac78d4c7fd"}, 0x10) write(r2, &(0x7f0000000080)="2700000014000f3f00000000120f0a00110001001f750800560099ed4f0500003f000000000000", 0x138) 07:21:23 executing program 0: socket$alg(0x26, 0x5, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) lsetxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) setpriority(0x0, 0x0, 0xffff) semget$private(0x0, 0xfffffffffffffffd, 0x15) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:23 executing program 3: socket$alg(0x26, 0x5, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x400, 0x0) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r0, 0x84, 0x74, &(0x7f0000000480)=""/72, &(0x7f00000001c0)=0x48) socket$inet(0x2b, 0x1, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x0, 0x0) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000300)='/dev/autofs\x00', 0x800, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(r2, 0xc02c564a, 0x0) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) ioctl$VIDIOC_G_TUNER(r0, 0xc054561d, &(0x7f0000000280)={0x1, "0d37a784b2362ea841e2fb3d4bfb7e1a02f4611b204969f2514ca4c78d39e59d", 0x7, 0x112a, 0x5, 0x6, 0x10, 0x0, 0x3f, 0x1}) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) lsetxattr$security_selinux(&(0x7f0000000880)='./file0\x00', &(0x7f0000000400)='security.selinux\x00', &(0x7f0000000900)='system_u:object_r:auditctl_exec_t:s0\x00', 0x25, 0x1) r4 = getpgrp(0x0) setpriority(0x0, r4, 0xffff) fcntl$setpipe(r3, 0x407, 0x30) semget$private(0x0, 0xfffffffffffffffd, 0x15) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000080)={&(0x7f0000000940)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="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"], 0x22c}, 0x1, 0x0, 0x0, 0x5}, 0x40) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) msgget(0x1, 0x0) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680), &(0x7f0000000780)=[&(0x7f0000000340)='p\xf8\x0fUoc\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xc9\xf3T\xe6\xd5eN\x86\x03\x1e\x96^x\xdc\xe5\xb9a7\xfe\x93\x00\x00Jy\x98\xbc\xb6] \xf5o{\xde\xfd\x7f\x9a\xfa\xf7\x96\xb0\x1d\xc6O\x98\b\xfd\x1af\xe6\x81\x8e\xbc\x90\xee\xc7\xc0\xe7B\xeb\xc6\x9cs\xf9\xec;\xf7\xd2\t\x00\xbe\xd3I\x92\x1ekUV6\x92\x9e+\x82\xd8\x83S\b\xd7pXY\x9e\xb8B\x0f#7\xceWg+[\xa8\xe4\xd1}\\%\xf40\xaf3%\'\"^\x01\b\xabid\x1c\x00\x00\x00\x00\x00\x00\x00\x00', &(0x7f0000000740)='!\x00']) 07:21:24 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video35\x00', 0x2, 0x0) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, 0x0, 0x0) ioctl$RTC_SET_TIME(r1, 0x4024700a, &(0x7f0000000040)={0x34, 0x30, 0x13, 0x13, 0xb, 0x2, 0x3, 0x104, 0xffffffffffffffff}) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 07:21:24 executing program 4: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:24 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @remote}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @random="e5ac78d4c7fd"}, 0x10) write(r2, &(0x7f0000000080)="2700000014000f3f00000000120f0a00110001001f750800560099ed4f05000040000000000000", 0x138) 07:21:24 executing program 3: socket$alg(0x26, 0x5, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x400, 0x0) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r0, 0x84, 0x74, &(0x7f0000000480)=""/72, &(0x7f00000001c0)=0x48) socket$inet(0x2b, 0x1, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x0, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000300)='/dev/autofs\x00', 0x800, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(r1, 0xc02c564a, 0x0) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x800, 0x0) lsetxattr$security_selinux(&(0x7f0000000880)='./file0\x00', &(0x7f0000000400)='security.selinux\x00', &(0x7f0000000900)='system_u:object_r:auditctl_exec_t:s0\x00', 0x25, 0x1) r3 = getpgrp(0x0) setpriority(0x0, r3, 0xffff) fcntl$setpipe(r2, 0x407, 0x30) semget$private(0x0, 0xfffffffffffffffd, 0x15) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) msgget(0x1, 0x208) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:24 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)) pipe(&(0x7f0000000440)={0xffffffffffffffff}) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video35\x00', 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000080)={0x1, [0x0]}, &(0x7f0000000100)=0x8) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000180)={r1, 0x2}, 0x8) 07:21:24 executing program 4: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:24 executing program 0: socket$alg(0x26, 0x5, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) lsetxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) setpriority(0x0, 0x0, 0xffff) semget$private(0x0, 0xfffffffffffffffd, 0x15) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:24 executing program 1: socket$alg(0x26, 0x5, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x400, 0x0) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r0, 0x84, 0x74, &(0x7f0000000480)=""/72, &(0x7f00000001c0)=0x48) socket$inet(0x2b, 0x1, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x0, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000300)='/dev/autofs\x00', 0x800, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(r1, 0xc02c564a, 0x0) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) lsetxattr$security_selinux(&(0x7f0000000880)='./file0\x00', &(0x7f0000000400)='security.selinux\x00', &(0x7f0000000900)='system_u:object_r:auditctl_exec_t:s0\x00', 0x25, 0x1) r2 = getpgrp(0x0) setpriority(0x0, r2, 0xffff) open(&(0x7f0000000040)='./file0\x00', 0x6cf9c05dbc18eb17, 0x1) msgget(0x1, 0x208) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:24 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @remote}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @random="e5ac78d4c7fd"}, 0x10) write(r2, &(0x7f0000000080)="2700000014000f3f00000000120f0a00110001001f750800560099ed4f05000060000000000000", 0x138) 07:21:24 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)) openat$vimc0(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video0\x00', 0x2, 0x0) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000040)=0x234, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$sock_inet_SIOCSARP(r1, 0x8955, &(0x7f0000000200)={{0x2, 0x4e23, @loopback}, {0x306, @random="113045685a03"}, 0x10, {0x2, 0x4e21, @multicast2}, 'ip6erspan0\x00'}) 07:21:24 executing program 4: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:24 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x400, 0x0) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r1, 0x84, 0x74, &(0x7f0000000480)=""/72, &(0x7f00000001c0)=0x48) socket$inet(0x2b, 0x1, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x0, 0x0) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000300)='/dev/autofs\x00', 0x800, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(r2, 0xc02c564a, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000040)=0x0) sched_setaffinity(r3, 0x3c9, &(0x7f0000000200)=0xa000000000000105) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x7, 0x100) epoll_create1(0x80000) lsetxattr$security_selinux(&(0x7f0000000880)='./file0\x00', &(0x7f0000000400)='security.selinux\x00', &(0x7f0000000900)='system_u:object_r:auditctl_exec_t:s0\x00', 0x25, 0x1) r4 = getpgrp(0x0) setpriority(0x1, r4, 0x401) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) msgget(0x1, 0x208) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) sendmsg$sock(r0, &(0x7f00000005c0)={&(0x7f0000000080)=@rc={0x1f, {0x33, 0x7f, 0x5, 0x3, 0x8001, 0x2}, 0x100000001}, 0x80, &(0x7f0000000540)=[{&(0x7f0000000100)="1f948da416c63ef1f9c2518f6a652b", 0xf}, {&(0x7f0000000280)="6ebf36bd2b68552305e5f93235503d933178ba3efc6bf44f22df07ca07f92983349b09d89bc4b65e2d760e84a20cd01049a33c5a77c20b5c49408f112299ddff66ecdb72bb2d32f90b789e", 0x4b}, {&(0x7f0000000340)="0efca0278debd204f9dd35de5a046587b9046afe29", 0x15}, {&(0x7f0000000380)="885978c828b6847011d14a3a4dcf7274e69aa8e2b241a709f35ab6d4455d3c9197215207ee4efc415f685a9d04403c3ec2cbece2b6893e4542a8409aba32160494feba8a67cdbeaf5dc6997742cd611fd9671bc736eb9e14380a01d10434db650cbdaea13b", 0x65}, {&(0x7f00000007c0)="c60f430fa4913b1118be63c0ea0879dcfd910479e6a6081ee5008930c7ed01b90d2d469541bdcfdd8d365cc9d60b6df09838af6598743ae200f90c47b454113bdb46fde410e1dfabdf79eaa099dd0d963edad9ed8e556de6d78eea07ea0a719654764edcdaa0474b55c846cc5934492ecd9f1a7b5156d9d06f5c63fa3697fd2a56273b1acd0751e35de8796953758d894e73db2d5aefe23de8ef4138ab459d93", 0xa0}, {&(0x7f0000000500)="fdeab77eb47269f591a07de0972d3fec504cdc43dc5223314dd6df957ce3045d441b4d6dca5b4df76343feed34949e252cac", 0x32}], 0x6}, 0x4) 07:21:24 executing program 3: socket$alg(0x26, 0x5, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x400, 0x0) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r0, 0x84, 0x74, &(0x7f0000000480)=""/72, &(0x7f00000001c0)=0x48) socket$inet(0x2b, 0x1, 0x0) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000080)) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x402200, 0x0) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000300)='/dev/autofs\x00', 0x800, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(r2, 0xc02c564a, 0x0) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) lsetxattr$security_selinux(&(0x7f0000000880)='./file0\x00', &(0x7f0000000400)='security.selinux\x00', &(0x7f0000000900)='system_u:object_r:auditctl_exec_t:s0\x00', 0x25, 0x1) r4 = getpgrp(0x0) setpriority(0x0, r4, 0xffff) fcntl$setpipe(r3, 0x407, 0x30) ioctl$VIDIOC_CREATE_BUFS(r2, 0xc0f8565c, &(0x7f0000000940)={0x1ff, 0x5, 0x1, {0x5, @sdr={0x38415261, 0x2}}}) semget$private(0x0, 0x3, 0x13) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x8000001) msgget(0x1, 0x208) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) renameat(r0, &(0x7f0000000000)='./file0\x00', r1, &(0x7f0000000040)='./file0\x00') 07:21:24 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @remote}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @random="e5ac78d4c7fd"}, 0x10) write(r2, &(0x7f0000000080)="2700000014000f3f00000000120f0a00110001001f750800560099ed4f05000ec0000000000000", 0x138) [ 850.471760][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 850.477589][ C1] protocol 88fb is buggy, dev hsr_slave_1 07:21:24 executing program 0: socket$alg(0x26, 0x5, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) lsetxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) setpriority(0x0, 0x0, 0xffff) semget$private(0x0, 0xfffffffffffffffd, 0x15) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:24 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)) pipe(&(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video35\x00', 0x2, 0x0) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r0, 0x111, 0x4, 0x0, 0x4) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_SET_DUMPABLE(0x4, 0x2) clock_gettime(0x0, &(0x7f0000000200)={0x0, 0x0}) utimes(&(0x7f0000000180)='./file0\x00', &(0x7f0000000240)={{r2, r3/1000+10000}}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f00000002c0)='IPVS\x00') stat(&(0x7f00000004c0)='.\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) r6 = getgid() mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000480)='fuse\x00', 0x40000, &(0x7f0000000580)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=r5, @ANYBLOB=',group_id=', @ANYRESDEC=r6, @ANYBLOB="2c616c6c6f775f7653e723805a8e926f746865722c616c6c6f775f6f746865722c646566617d6c745f7065726d697373696f6e732c6d61785f643d3078303030303030303030303030303033392c736d61636b6673726f6f743d6d643573756d6b657972696e676574683073797374656d5cfe2873797374656d2773656375726974796e6f646576235e2a2e2c646f6e745f6d6561737572652c66000000"]) sendmsg$IPVS_CMD_DEL_DAEMON(r1, &(0x7f00000003c0)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000380)={&(0x7f0000000880)=ANY=[@ANYBLOB="80000000c9890bb40bb2ab2803eb2c89a3a03e031826528797e44d6e46c2074d874c43a437647303b99ac4a6e7fbca51ab5cb91bc554924a09ed5c6a4d0ee712f908011161b1b49d2fbebd370d8172bc71ca0c249ed619eadd92064a1adb7acbe21f4d66dd510f3db8f71ecad3722a131b45d489859fabccb9353beaf10ff6a7f417d2e2ce33af93bf90bde2054be93647bdace9892b3f05812b521fbe5642baf01eb0629469f23e0c34db35ec95dc94ce813c7f009dc75075ece37e16276a84", @ANYRES16=r4, @ANYBLOB="00042dbd7000ffdbdf250a00000008000400080000005000020008000e004e2400000800050005000000080008000900000008000b000a00000008000b000200000008000b000a00000014000100ac1e010100000000000000000000000008000900ef020000080006006dbf00000c0001000800028ac7b3093d4a64ec383daf93a93058fb658444c6450ad33d947a13856731da89aba37e2976cb631f0ced0444e944661b464d5870ad06fb777326509dfa5c69d0b738e510eaad65252c9357af3955f41cf39da7d90bb102e447c92c596fbf36604cdf71c2e7b704"], 0x80}, 0x1, 0x0, 0x0, 0x4000000}, 0x8040) getpeername$inet(r1, &(0x7f0000000040)={0x2, 0x0, @local}, &(0x7f0000000100)=0x10) 07:21:25 executing program 4: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:25 executing program 1: socket$alg(0x26, 0x5, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x400, 0x0) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r0, 0x84, 0x74, &(0x7f0000000480)=""/72, &(0x7f00000001c0)=0x48) socket$inet(0x2b, 0x1, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x0, 0x0) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000300)='/dev/autofs\x00', 0x800, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(r2, 0xc02c564a, 0x0) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) lsetxattr$security_selinux(&(0x7f0000000880)='./file0\x00', &(0x7f0000000400)='security.selinux\x00', &(0x7f0000000900)='system_u:object_r:auditctl_exec_t:s0\x00', 0x25, 0x1) r3 = getpgrp(0x0) setpriority(0x0, r3, 0xffff) recvmmsg(r0, &(0x7f0000002c40)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f0000000280)=[{&(0x7f0000000080)=""/160, 0xa0}], 0x1}, 0x7f}, {{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000940)=""/198, 0xc6}, {&(0x7f0000000a40)=""/4096, 0x1000}, {&(0x7f0000000340)=""/192, 0xc0}], 0x3, &(0x7f0000001a40)=""/227, 0xe3}, 0x6}, {{&(0x7f0000000500)=@pppoe={0x18, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000000700)=[{&(0x7f00000005c0)}, {&(0x7f00000006c0)=""/8, 0x8}, {&(0x7f0000001b40)=""/4096, 0x1000}, {&(0x7f0000002b40)=""/216, 0xd8}, {&(0x7f00000007c0)=""/157, 0x9d}], 0x5}, 0x9}], 0x3, 0x100, &(0x7f00000008c0)={0x77359400}) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) msgget(0x1, 0x208) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$TCSBRK(r1, 0x5409, 0x7fffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:25 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @remote}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @random="e5ac78d4c7fd"}, 0x10) write(r2, &(0x7f0000000080)="2700000014000f3f00000000120f0a00110001001f750800560099ed4f05000be9000000000000", 0x138) 07:21:25 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video35\x00', 0x2, 0x0) write(r2, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, 0x0, 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000040)) ioctl$KVM_KVMCLOCK_CTRL(r2, 0xaead) 07:21:25 executing program 4: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:25 executing program 0: socket$alg(0x26, 0x5, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) lsetxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) setpriority(0x0, 0x0, 0xffff) semget$private(0x0, 0xfffffffffffffffd, 0x15) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:25 executing program 3: socket$alg(0x26, 0x5, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x400, 0x0) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r0, 0x84, 0x74, &(0x7f0000000480)=""/72, &(0x7f00000001c0)=0x48) r1 = socket$inet(0x2b, 0x1, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/null\x00', 0x1, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, &(0x7f0000000700)) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000300)='/dev/autofs\x00', 0x800, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(r3, 0xc02c564a, 0x0) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) lsetxattr$security_selinux(&(0x7f0000000880)='./file0\x00', &(0x7f0000000400)='security.selinux\x00', &(0x7f0000000900)='system_u:object_r:auditctl_exec_t:s0\x00', 0x25, 0x1) r5 = getpgrp(0x0) ioctl$BLKROGET(r2, 0x125e, &(0x7f00000006c0)) setpriority(0x0, r5, 0xffff) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000000)={{{@in=@dev, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@broadcast}}, &(0x7f0000000100)=0xe8) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0, 0x0}, &(0x7f00000002c0)=0xc) write$FUSE_ATTR(r3, &(0x7f0000000340)={0x78, 0xfffffffffffffffe, 0x6, {0x0, 0x2, 0x0, {0x2, 0x6, 0x1, 0x2, 0xdac, 0x3ff, 0x1, 0x9, 0xfffffffffffffffe, 0x3, 0x100, r6, r7, 0x7, 0x4}}}, 0x78) fcntl$setpipe(r4, 0x407, 0x30) semget$private(0x0, 0xfffffffffffffffd, 0x15) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) msgget(0x1, 0x208) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) vmsplice(r3, &(0x7f00000005c0)=[{&(0x7f00000007c0)="720155bb671c8a94955361e28c7f146b72fb1ad447c5c9f8dcfe04bb7f46c273ce6f22febcf6d2bf3da46c04893d407ecde74a1627303b1cc44e3c81a83fbcf9189d230c28be23be7cfe2898cc2f6e8fa1abcc1cd0e3202eea37f3ae17fb32b15b06c9720885667dfbfdf6addd2057e5645a9905e62a8e2a321b9e03ef4090597c493dcf0f46467b92c3705e8a5fb2e9e4a4748edaf477984fc45e5c33df5ef16e7ece22", 0xa4}, {&(0x7f0000000940)="975db454c6c92c2c77b979b5e19f7cf74e515532735e4964944efe50ae70da80320470773b25870d1e1e4fb1cde84815bce0ab51032ab7aeee64f9e28488d0fd5b83bb6c0af65755abd57e15a413aada84260480d6f1bad7639811f5bc0aba1874178e183e0a9ea1d3497df8ffd8e3761ad2d522ba4371ee94b98736fcf9e1d11867ce0ab4af797854a614c71d9e7d1553d5d907329f2457aeb9c3fc4b3dfc6f9fa1993a570995b2b94f7c74f3d33a37dc83", 0xb2}, {&(0x7f0000000a00)="257a387e8529b45d89e2169065f1fee2780dd5fc191d21d8d72ecd1e7953553fdeab12565bccc7bd47d4a80554e5e1c3c6ef49d893f428420681d56b4a619b4ce6449b10077b9dcf5c915dd03505d57e3b4e2696e87cf85a85e72b51152eacbbbc7792f446f51f3287cd58c9a2dcacb64d5aa5b862a230997551724b0cb26f119d7663b479464224b7c407eb537bf7ee7656f4d2c2c239c4bc9c903eb65d49a165fbdd108d6d", 0xa6}, {&(0x7f00000003c0)="0ca6f924fa37476202b5cdddd62a769e847c79c91be649e4fd6147a146e9e57ad2c86dd9538d78c7ddd2cdf9b2ea13c8a5", 0x31}, {&(0x7f0000000500)="4f655f00afe5934ea12ab423804d010f141be134d2e84374e0f7bc9098f64482d7c0209ff43a24bba537db0f5ecfcd2fe4863e263ae5ab7a9ffdfc2353daf38f69ac7d283a81a46c3c1bddcea9ed0bc2e658de7d1f2ae03da6e3eeee82", 0x5d}], 0x5, 0x2) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:25 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @remote}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @random="e5ac78d4c7fd"}, 0x10) write(r2, &(0x7f0000000080)="2700000014000f3f00000000120f0a00110001001f750800560099ed4f050000f0000000000000", 0x138) 07:21:25 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video35\x00', 0x2, 0x0) write(r1, &(0x7f0000000340), 0x41395527) r3 = geteuid() getresuid(&(0x7f0000000100), &(0x7f0000000180), &(0x7f0000000200)=0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0, 0x0}, &(0x7f0000000280)=0xc) r6 = accept4$tipc(r1, &(0x7f00000003c0), &(0x7f0000000400)=0x10, 0x80000) fstat(r6, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fsetxattr$system_posix_acl(r2, &(0x7f0000000040)='system.posix_acl_default\x00', &(0x7f0000000340)={{}, {0x1, 0x4}, [{0x2, 0x6, r3}, {0x2, 0x0, r4}], {0x4, 0x4}, [{0x8, 0x4, r5}, {0x8, 0x5, r7}], {0x10, 0x2}, {0x20, 0x1}}, 0x44, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x100000000000, 0x0, 0x3, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$EVIOCGVERSION(r1, 0x80044501, &(0x7f0000000480)=""/222) 07:21:25 executing program 0: socket$alg(0x26, 0x5, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) lsetxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) setpriority(0x0, 0x0, 0xffff) semget$private(0x0, 0xfffffffffffffffd, 0x15) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\xef']) 07:21:25 executing program 4: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:25 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @remote}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @random="e5ac78d4c7fd"}, 0x10) write(r2, &(0x7f0000000080)="2700000014000f3f00000000120f0a00110001001f750800560099ed4f05000040030000000000", 0x138) 07:21:25 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video35\x00', 0x2, 0x0) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, 0x0, 0x0) getresgid(&(0x7f0000000040), &(0x7f0000000100), &(0x7f0000000180)) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 07:21:25 executing program 1: socket$alg(0x26, 0x5, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x400, 0x0) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r0, 0x84, 0x74, &(0x7f0000000480)=""/72, &(0x7f00000001c0)=0x48) socket$inet(0x2b, 0x1, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x0, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000300)='/dev/autofs\x00', 0x800, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(r1, 0xc02c564a, 0x0) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) lsetxattr$security_selinux(&(0x7f0000000880)='./file0\x00', &(0x7f0000000400)='security.selinux\x00', &(0x7f0000000900)='system_u:object_r:auditctl_exec_t:s0\x00', 0x25, 0x1) r2 = getpgrp(0x0) setpriority(0x0, r2, 0xffff) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) msgget(0x1, 0x208) clone(0x10000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:25 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) lsetxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) fsetxattr(r0, &(0x7f0000000000)=@random={'osx.', '\x00'}, &(0x7f0000000040)='security.capability\x00', 0x14, 0x2) setpriority(0x0, 0x0, 0xffff) semget$private(0x0, 0xfffffffffffffffd, 0x15) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sysfs$2(0x2, 0x3, &(0x7f0000000080)=""/117) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:26 executing program 4: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:26 executing program 0: socket$alg(0x26, 0x5, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xffffffffffffff0d) lsetxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) setpriority(0x0, 0x0, 0xffff) semget$private(0x0, 0xfffffffffffffffd, 0x15) r0 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) sendmmsg$alg(r0, &(0x7f0000000d00)=[{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="ef340fd1413cad3d6c2535121fa9656b82f7abbf6794e36639dc7a6c58bc6f9eb70a1c33b8ffa1154d6933a7937990beefd5da4964bf09c994b536f58730938a57380f3c82cd6b5424e864ab86ea6fd447db4ddaf2dad5330499596254c826568b830cba3a407f0efcb491fc02445e8914b09b510a3803c58c04ceb22cb245d8e38bc8ba4dfbf12d83dd71d4df8feef69e58e2d510c718646baa38954b6fc30d058cbc000ab724348049f3ddba440da5d1d05cce4389130d5860cd308704e89071853b762110de58", 0xc8}, {&(0x7f00000001c0)="34ca708871c0e5d8325a9cf61b48143ca71d4b96d9b4614bbd0450333bff0f9c759f881af2002513f5300ec204bb913953cb082945f95ec2c2f1be4b16f1b038e34fd3547a037559970d2051dbbb90e5e896c3612da38e7ef24b1ce925da3367a721d43ccc0f222b58ad28a3e883f44dbf4b50968d7a97fc6d2c8b78e571c310456a5e511c32da99f4fd68f2f36d76970c5fa1c8444a5442a6708a5b7c21e21fed818fe2", 0xa4}], 0x2, &(0x7f0000000140)=[@assoc={0x10, 0x117, 0x4, 0x81}, @assoc={0x10, 0x117, 0x4, 0x4}, @op={0x10, 0x117, 0x3, 0x6b66e262623a302f}], 0x30, 0x40000}, {0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000280)="4dad67dd1511bf4da0e427d98cc3c324988a42815180cf7b1516f88efe1b97c2243203853595ba36870ae239aae15e96c4fc0da3a821d9d654e073d92c3325e3b91bc5f4187e31e8159529442838808a65ee2509fee02ba17f50618e4a482b695abc5b8bf77275bc3299e90c0dba7d4b2cca93536f621e616d6bde9340d67e38305017c482e6b5c7a35be14fa230fed74ef6fc27716f4f65d88b27fe229ba388b8df843b8abe2552fe7e002ddd25f6dbe67fef1b34d0e7b201fdfafae6e813ad3436f99f4679a459bea7279704dc32ab02ca27415141", 0xd6}, {&(0x7f0000000380)="aba55e18a389b6b5c50d4a3cf514a93a53f095589b4f77a9f02e9946fee8da2dd09394ea50c24d8d76f859954a08c676", 0x30}, {&(0x7f00000003c0)="a00a0e5606e137be15254e421a0c384cc1f16e4a0e075f8a5c9f5ac256ea4afc28587dec8a4b888e084250f5770618dfee3cdd60db238522534472e40e57a5ffdefae65196fef3a980e0387ee306c2ad219a0d601954e5c361e1b53c6898b4cc3982dd77d91eca6017b472807357ce6955", 0x71}], 0x3, &(0x7f00000004c0)=[@assoc={0x10, 0x117, 0x4, 0x3f}, @op={0x10}, @assoc={0x10, 0x117, 0x4, 0x800}, @iv={0x5c, 0x117, 0x2, 0x4a, "bd5dd6d781b3e1dc4765c847d768bc0d49a1a901cea66f135f42c0d44eb9389cd67b2aa232baff3d7a9b95630072f04048c517c1c301b68b203bdeb55e7cf2fe093c96180abd18483dbf"}], 0x8c, 0x8004}, {0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f00000007c0)="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", 0xfb}], 0x1, &(0x7f00000006c0)}, {0x0, 0x0, &(0x7f0000000a00)=[{&(0x7f0000000700)="0e787b7fb599050fb1452281a9fc928744fffd52", 0x14}, {&(0x7f00000008c0)="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", 0xff}, {&(0x7f00000009c0)="80ec9294083e525b93b936ef53ea29b019", 0x11}], 0x3, &(0x7f0000000a40)=[@op={0x10}, @op={0x10, 0x117, 0x3, 0x1}, @iv={0xb4, 0x117, 0x2, 0xa2, "c28ac153282b04819991cf0097e9dbaa880651f9850085cd7cb15b16d66b89cb86a9fb4488520fa4970810804a9f0cd4ace7c33fbfc3076f081edbaa95cb94003d058f0bf81fce61d8299292d3a0b83012a055a249542d55e4421afb3fad1ba4f9f4c5d21b6a41661c083d985164393dd69db0d6b2c63b1f88d92f2804ecafb863aea0e6583a879d1e6076e6708468859b1e68ce071a5c94597e1fce34cda747f4d3"}, @assoc={0x10, 0x117, 0x4, 0x8}], 0xe4, 0x4000000}, {0x0, 0x0, &(0x7f0000000cc0)=[{&(0x7f0000000b40)="805e4786c350171d5c960b414961ae25f3dee8e175500902f10d9f41644354319b920a5ce762a9f6a92880f5937778c6c9c748d3c5e95ca975dede4ad3d1dad08b6c6ae101e598ed3c596280499654b4f57e447ea0e4063d8472d8416119a8aa", 0x60}, {&(0x7f0000000bc0)="647524081dfddbf9d91614a66256293ea057093746a84e26aded9d1b6b871e0319fa526f31d6f6eef9d01b748f48d59ef566631757063aa71f7790da112cc487f124f76ffc47e89b01faef26e394cb614c9c2c944b7dc1fc8d660bf44113c78394b81b9b897eaedb0f6b584054e243a406ddda50154271fa5fec1fe1264156dcee8a62cb54b5fa00e49de947999e428e4d71514ffff8ecfcc0fffe027af22e26aa136859d16412306e7e278ae792ed0a89cc8cb217c19215c06a5ed42edeb20f45", 0xc1}], 0x2, 0x0, 0x0, 0x20000080}], 0x5, 0x10) 07:21:26 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @remote}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @random="e5ac78d4c7fd"}, 0x10) write(r2, &(0x7f0000000080)="2700000014000f3f00000000120f0a00110001001f750800560099ed4f05000003400000000000", 0x138) 07:21:26 executing program 3: socket$alg(0x26, 0x5, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x400, 0x0) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r0, 0x84, 0x74, &(0x7f0000000480)=""/72, &(0x7f00000001c0)=0x48) socket$inet(0x2b, 0x1, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x0, 0x0) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000300)='/dev/autofs\x00', 0x800, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(r2, 0xc02c564a, 0x0) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) lsetxattr$security_selinux(&(0x7f0000000880)='./file0\x00', &(0x7f0000000400)='security.selinux\x00', &(0x7f0000000900)='system_u:object_r:auditctl_exec_t:s0\x00', 0x25, 0x1) r4 = inotify_add_watch(r0, &(0x7f0000000000)='./file0\x00', 0x0) inotify_rm_watch(r1, r4) r5 = getpgrp(0x0) setpriority(0x0, r5, 0xffff) fcntl$setpipe(r3, 0x407, 0x30) semget$private(0x0, 0xfffffffffffffffd, 0x15) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) msgget(0x1, 0x208) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:26 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu\x00', 0x200002, 0x0) r2 = openat$cgroup_int(r1, &(0x7f00000000c0)='cpuset.cpus\x00', 0x2, 0x0) sendfile(r2, r2, 0x0, 0xff) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video35\x00', 0x2, 0x0) write(r4, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_KVMCLOCK_CTRL(r3, 0xaead) fsconfig$FSCONFIG_CMD_RECONFIGURE(r0, 0x7, 0x0, 0x0, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, 0x0, 0x0) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 07:21:26 executing program 0: socket$alg(0x26, 0x5, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) lsetxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) setpriority(0x0, 0x0, 0xffff) r0 = socket$inet6(0xa, 0x8000000000001, 0x1) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000300)={0x0, @in6={{0xa, 0x0, 0x0, @dev}}}, &(0x7f0000000280)=0x90) semget$private(0x0, 0xfffffffffffffffd, 0x15) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x200, 0x0) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:26 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @remote}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @random="e5ac78d4c7fd"}, 0x10) write(r2, &(0x7f0000000080)="2700000014000f3f00000000120f0a00110001001f750800560099ed4f0500fffff00000000000", 0x138) 07:21:26 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000001540)='/dev/video35\x00', 0x2, 0x0) write(r1, &(0x7f0000000340), 0x41395527) ioctl$SG_SET_RESERVED_SIZE(r0, 0x2275, &(0x7f0000000100)=0xffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$dmmidi(&(0x7f0000000180)='/dev/dmmidi#\x00', 0x3f, 0x21a000) read$FUSE(r3, &(0x7f0000000480), 0x1000) pselect6(0x40, &(0x7f00000000c0)={0x2}, 0x0, &(0x7f0000000140)={0xfff}, 0x0, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r2, 0x6685, &(0x7f00000003c0)={0x1, 0x4, 0x1000, 0xcf, &(0x7f0000000200)="223cdab7cf79a08b00b46fbbbda52e162056870011a2ac090c4b72ba00fd10279d8ecf27aa6e7f95e05819fd71650e56c7453c175c48d90f67e2cc5ba7aef5b371cf19d2c3e5ebb039403064485c0f8a8d9229f35496357a54528d0ab5040529b837af87f504819f311363c4c9a872ecb2cd6d30087e5d627373f706d9210bd5718eadf2c1ff0dcfbd026339b290efa74a73d7221a84f429c6a33912bb4f9f3fcca132a6484edf13b6712268d62c674767ff3b347313e15f0d0fcf856b078c226fe643aa59aa11117e8e83089542fb", 0x95, 0x0, &(0x7f0000000300)="7fcf364c6764c1c8277e73cb52e5da0e2f340a4e244efd1c601385008e436b42ef2db471aa0fee3d0ac8ec4a70f5a67a340eccb68b9f013c20377f3cfda226d17530abec6c3d32d9c020bea2edf8437ac6473672ef8b7bce3329bfd4e120d3dae5cef4f22db8e8ae054c9d144fe2b386ffc4b17db9584eca5902d1fb961933cb5dac32881b161441f223e837797ae405ff2b615a8a"}) ioctl$EVIOCSABS3F(r1, 0x401845ff, &(0x7f0000000040)={0x4fc3, 0x7, 0xffff, 0x2e, 0x5, 0x1}) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 07:21:26 executing program 1: socket$alg(0x26, 0x5, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x400, 0x0) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r0, 0x84, 0x74, &(0x7f0000000480)=""/72, &(0x7f00000001c0)=0x48) socket$inet(0x2b, 0x1, 0x0) memfd_create(&(0x7f0000000000)='%keyring\x00', 0x3) openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x0, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000300)='/dev/autofs\x00', 0x800, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(r1, 0xc02c564a, 0x0) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) lsetxattr$security_selinux(&(0x7f0000000880)='./file0\x00', &(0x7f0000000400)='security.selinux\x00', &(0x7f0000000900)='system_u:object_r:auditctl_exec_t:s0\x00', 0x25, 0x1) r2 = getpgrp(0x0) setpriority(0x0, r2, 0xffff) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) msgget(0x1, 0x208) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:26 executing program 4: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:26 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @remote}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @random="e5ac78d4c7fd"}, 0x10) write(r2, &(0x7f0000000080)="2700000014000f3f00000000120f0a00110001001f750800560099ed4f05000000000100000000", 0x138) 07:21:26 executing program 0: socket$alg(0x26, 0x5, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) lsetxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) setpriority(0x0, 0x0, 0xffff) semget$private(0x0, 0xfffffffffffffffd, 0x15) r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x0, 0x0) ioctl$RTC_EPOCH_SET(r0, 0x4004700e, 0x7) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:26 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x400, 0x0) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r1, 0x84, 0x74, &(0x7f0000000480)=""/72, &(0x7f00000001c0)=0x48) socket$inet(0x2b, 0x1, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x0, 0x0) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000000)='veth0_to_bond\x00') r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/autofs\x00', 0x2000000007fc, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(r2, 0xc02c564a, 0x0) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) lsetxattr$security_selinux(&(0x7f0000000880)='./file0\x00', &(0x7f0000000400)='security.selinux\x00', &(0x7f0000000900)='system_u:object_r:auditctl_exec_t:s0\x00', 0x25, 0x1) r4 = getpgrp(0x0) setpriority(0x0, r4, 0xffff) fcntl$setpipe(r3, 0x407, 0x30) semget$private(0x0, 0x3, 0x15) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) msgget(0x1, 0x208) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:26 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video35\x00', 0x2, 0x0) write(r1, &(0x7f0000000340), 0xffffffffffffff9b) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 07:21:26 executing program 4: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:27 executing program 1: socket$alg(0x26, 0x5, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x400, 0x0) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r0, 0x84, 0x74, &(0x7f0000000480)=""/72, &(0x7f00000001c0)=0x48) socket$inet(0x2b, 0x1, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x0, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000300)='/dev/autofs\x00', 0x800, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(r1, 0xc02c564a, 0x0) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) lsetxattr$security_selinux(&(0x7f0000000880)='./file0\x00', &(0x7f0000000400)='security.selinux\x00', &(0x7f0000000900)='system_u:object_r:auditctl_exec_t:s0\x00', 0x25, 0x1) r2 = getpgrp(0x0) setpriority(0x0, r2, 0xffff) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) getpriority(0x0, r2) msgget(0x1, 0x208) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:27 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @remote}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @random="e5ac78d4c7fd"}, 0x10) write(r2, &(0x7f0000000080)="2700000014000f3f00000000120f0a00110001001f750800560099ed4f05000000000200000000", 0x138) 07:21:27 executing program 0: r0 = getpgrp(0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x40, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={r0, r1, 0x0, 0x2, &(0x7f0000000080)='!\x00', 0xffffffffffffffff}, 0x30) socket$alg(0x26, 0x5, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) lsetxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000000)=0x0) r3 = getpgid(0xffffffffffffffff) ioctl$TIOCSSOFTCAR(r1, 0x541a, &(0x7f0000000200)=0x7) capget(&(0x7f0000000100)={0x200f1526, r2}, &(0x7f0000000140)={0x2, 0x7ff, 0x8, 0x9, 0x7, 0x9}) setpriority(0xfffffffffffffffe, r3, 0x3) semget$private(0x0, 0xfffffffffffffffd, 0x15) r4 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) ioctl$HDIO_GETGEO(r4, 0x301, &(0x7f00000001c0)) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() ioctl$CAPI_GET_ERRCODE(r1, 0x80024321, &(0x7f0000000240)) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:27 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video35\x00', 0x2, 0x0) write(r2, &(0x7f0000000680)="d7496c692c1b65e8e5971898e58ed9e470d3e1cab8550d832d25d2141ccb83fcb0c8174e9ad06c0510ce0d6496a60c43bca3dd96f95fc0b80440437c8ecd5e283d921ccf4e039b8edba12a0b87cd68dfba6796d5b79b21021b6fc81110dd7be9645dc32af031b017c3a433240faa1c5c20d3b4cb024c7b2fe4bd8ff6b4f5f31bae7529a24f08dc612bf99a88ad7529041756e4295d35132901d29548cc82cb0ca04f8398e1bd9a6bd3a540086daeae43cf279da09075345dd22986d283f07ab6d9e430eefed6d675143b58a62215e8dc20738c21b9620fa75074b59c23b89922af1164add183f18acb3e2e19920f46f68ba4bb52b60f911597b33c82bd99df65da36029084fe69d4458eacf66efc653dd2abc651e2fe83d4035f3f595b825a52266ab1b5fdaf0983f8cd34a48bdf2551d09fd19cd71374a491b3d604c5db86177ed0bda00de8b4368df6d391cad165fe7ff810c503ed43340e5005f113074af93b5aef2b222d322af3138ad6018f62db002ae73b24296054ebec18f3067d3d35ff4452ffa895699fd55af3588766482df51f4830510b8ecdc93c5b7cf6b3efab54696f458d18bab0fd3dad5d9b784ff93992f181f2d0e40be94fde724a10af15e52f750c8f34fbb20a96ba712cf9dd9a6a45e51d", 0x841c8d3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc004240a, &(0x7f0000000040)={0x4, 0x0, [0x0, 0x0, 0x0, 0x0]}) getsockopt$inet6_mreq(r1, 0x29, 0x1f, &(0x7f0000000200)={@local}, &(0x7f0000000280)=0x14) fcntl$getownex(r0, 0x10, &(0x7f0000000100)={0x0, 0x0}) syz_open_procfs(r3, &(0x7f0000000180)='sessionid\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, 0x0, 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 07:21:27 executing program 4: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) [ 852.904976][T22673] ERROR: Domain ' /sbin/init /etc/init.d/rc /sbin/startpar /etc/init.d/ssh /sbin/start-stop-daemon /usr/sbin/sshd /usr/sbin/sshd /bin/bash /root/syz-fuzzer /root/syz-executor.3 /newroot/1510/file0 /newroot/1510/file0' not defined. 07:21:27 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @remote}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @random="e5ac78d4c7fd"}, 0x10) write(r2, &(0x7f0000000080)="2700000014000f3f00000000120f0a00110001001f750800560099ed4f05000000000400000000", 0x138) 07:21:27 executing program 3: socket$alg(0x26, 0x5, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x400, 0x0) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r0, 0x84, 0x74, &(0x7f0000000480)=""/72, &(0x7f00000001c0)=0x48) socket$inet(0x2b, 0x1, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x0, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000300)='/dev/autofs\x00', 0x800, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(r1, 0xc02c564a, 0x0) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) lsetxattr$security_selinux(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='security.selinux\x00', &(0x7f0000000080)='unconfined_u:system_r:insmod_t:s0-s0:c0.c1023\x00', 0x2e, 0x1) r3 = getpgrp(0x0) setpriority(0x0, r3, 0xffff) fcntl$setpipe(r2, 0x407, 0x30) semget$private(0x0, 0xfffffffffffffffd, 0x15) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) msgget(0x1, 0x208) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:27 executing program 0: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x40, 0x0) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') ioctl$KVM_GET_XCRS(r0, 0x8188aea6, &(0x7f0000000200)={0x2, 0x1000, [{0x100000001}, {0x6000000000, 0x0, 0x214}]}) sendmsg$IPVS_CMD_SET_SERVICE(r0, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8200000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x50, r1, 0x320, 0x70bd2b, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_SERVICE={0xc, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x2f}]}, @IPVS_CMD_ATTR_SERVICE={0x30, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x800}, @IPVS_SVC_ATTR_FWMARK={0x8}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0xff}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0x2}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x8}}]}]}, 0x50}}, 0x10) socket$alg(0x26, 0x5, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) lsetxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) setpriority(0x0, 0x0, 0xffff) semget$private(0x0, 0xfffffffffffffffd, 0x15) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) ioctl$sock_inet_SIOCGIFADDR(r0, 0x8915, &(0x7f0000000240)={'team0\x00', {0x2, 0x4e20, @broadcast}}) 07:21:27 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video35\x00', 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) futimesat(r0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)={{}, {0x0, 0x2710}}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, 0x0, 0x0) prctl$PR_GET_FPEXC(0xb, &(0x7f0000000180)) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(r1, 0x84, 0x21, &(0x7f0000000200), &(0x7f0000000240)=0x4) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 07:21:27 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @remote}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @random="e5ac78d4c7fd"}, 0x10) write(r2, &(0x7f0000000080)="2700000014000f3f00000000120f0a00110001001f750800560099ed4f05000000000a00000000", 0x138) 07:21:27 executing program 1: socket$alg(0x26, 0x5, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x400, 0x0) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r0, 0x84, 0x74, &(0x7f0000000480)=""/72, &(0x7f00000001c0)=0x48) socket$inet(0x2b, 0x1, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x0, 0x0) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000300)='/dev/autofs\x00', 0x800, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(r2, 0xc02c564a, 0x0) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) lsetxattr$security_selinux(&(0x7f0000000880)='./file0\x00', &(0x7f0000000400)='security.selinux\x00', &(0x7f0000000900)='system_u:object_r:auditctl_exec_t:s0\x00', 0x25, 0x1) r3 = getpgrp(0x0) setpriority(0x0, r3, 0xffff) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) msgget(0x1, 0x208) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r1, 0x800443d3, &(0x7f0000000000)={{0x0, 0x0, 0x5, 0x2, 0x3, 0x80000001}, 0x800, 0x401, 0x81}) 07:21:27 executing program 4: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:27 executing program 0: recvmsg(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000000)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, 0x80, &(0x7f0000000400)=[{&(0x7f0000000080)=""/102, 0x66}, {&(0x7f0000000100)=""/108, 0x6c}, {&(0x7f00000001c0)=""/238, 0xee}, {&(0x7f00000002c0)=""/247, 0xf7}, {&(0x7f00000003c0)=""/20, 0x14}], 0x5, &(0x7f0000000480)=""/110, 0x6e}, 0x40000002) ioctl$sock_TIOCINQ(r0, 0x541b, &(0x7f0000000540)) socket$alg(0x26, 0x5, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) lsetxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) setpriority(0x0, 0x0, 0xffff) semget$private(0x0, 0xfffffffffffffffd, 0x15) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:27 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video35\x00', 0x2, 0x0) write(r1, &(0x7f0000000340), 0xffffffffffffff86) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 07:21:27 executing program 3: socket$alg(0x26, 0x5, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x400, 0x0) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r0, 0x84, 0x74, &(0x7f0000000480)=""/72, &(0x7f00000001c0)=0x48) r1 = socket$inet(0x2b, 0x1, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x0, 0x0) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000300)='/dev/autofs\x00', 0x800, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(r2, 0xc02c564a, 0x0) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) lsetxattr$security_selinux(&(0x7f0000000880)='./file0\x00', &(0x7f0000000400)='security.selinux\x00', &(0x7f0000000900)='system_u:object_r:auditctl_exec_t:s0\x00', 0x25, 0x1) r4 = getpgrp(0x0) setpriority(0x0, r4, 0xffff) shutdown(r1, 0x0) fcntl$setpipe(r3, 0x407, 0x30) semget$private(0x0, 0xfffffffffffffffd, 0x15) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) msgget(0x1, 0x208) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$BINDER_SET_MAX_THREADS(r2, 0x40046205, &(0x7f0000000000)) getpgid(r4) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) socket$inet6_sctp(0xa, 0x1, 0x84) 07:21:28 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @remote}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @random="e5ac78d4c7fd"}, 0x10) write(r2, &(0x7f0000000080)="2700000014000f3f00000000120f0a00110001001f750800560099ed4f05000000000e00000000", 0x138) 07:21:28 executing program 4: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:28 executing program 0: socket$alg(0x26, 0x5, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) lsetxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) setpriority(0x0, 0x0, 0xffff) r0 = semget$private(0x0, 0x4, 0x2) semctl$GETVAL(r0, 0x2, 0xc, &(0x7f00000007c0)=""/4096) semget$private(0x0, 0xfffffffffffffffd, 0x15) r1 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000020c}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB='(\x00 \x00', @ANYRES16=r2, @ANYBLOB="010028bd7000ffdbdf2501000000000000000b000000000c001473797a3100000000"], 0x28}}, 0x20000000) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:28 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SG_GET_NUM_WAITING(r1, 0x227d, &(0x7f0000000180)) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video35\x00', 0x2, 0x0) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, 0x0, 0x0) signalfd4(r1, &(0x7f0000000100)={0xe970}, 0x8, 0x80800) setsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r1, 0x84, 0xc, &(0x7f0000000040)=0x9, 0x4) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 07:21:28 executing program 1: socket$alg(0x26, 0x5, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x400, 0x0) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r0, 0x84, 0x74, &(0x7f0000000480)=""/72, &(0x7f00000001c0)=0x48) socket$inet(0x2b, 0x1, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x0, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000300)='/dev/autofs\x00', 0x800, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(r1, 0xc02c564a, 0x0) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) lsetxattr$security_selinux(&(0x7f0000000880)='./file0\x00', &(0x7f0000000400)='security.selinux\x00', &(0x7f0000000000)='\xdau\xd4\xe5\x17\xfao(\xfe\xf2\x91vy\x00\x00\x00\x00\x00\x00\x00ect_\xf2:a \xaf\xf9x\xc3\xf81\xf70\x81\x00\x00\x00ctl_e', 0x36b, 0x1) r2 = getpgrp(0x0) setpriority(0x0, r2, 0xffff) r3 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) msgget(0x1, 0x208) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_GET_BEARER_NAMES(r3, &(0x7f0000000280)={&(0x7f0000000040), 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, r4, 0x100, 0x70bd27, 0x25dfdbff, {}, ["", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x24000004}, 0x40) 07:21:28 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @remote}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @random="e5ac78d4c7fd"}, 0x10) write(r2, &(0x7f0000000080)="2700000014000f3f00000000120f0a00110001001f750800560099ed4f05000000000f00000000", 0x138) 07:21:28 executing program 4: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:28 executing program 3: socket$alg(0x26, 0x5, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x400, 0x0) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r0, 0x84, 0x74, &(0x7f0000000480)=""/72, &(0x7f00000001c0)=0x48) socket$inet(0x2b, 0x1, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x0, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000300)='/dev/autofs\x00', 0x800, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(r1, 0xc02c564a, 0x0) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) lsetxattr$security_selinux(&(0x7f0000000880)='./file0\x00', &(0x7f0000000400)='security.selinux\x00', &(0x7f0000000900)='system_u:object_r:auditctl_exec_t:s0\x00', 0x25, 0x1) r2 = getpgrp(0x0) setpriority(0x0, r2, 0xffff) fcntl$setpipe(r1, 0x407, 0x9940) semget$private(0x0, 0xfffffffffffffffd, 0x15) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) msgget(0x1, 0x208) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:28 executing program 0: socket$alg(0x26, 0x5, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffecd) lsetxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) setpriority(0x0, 0x0, 0xffff) semget$private(0x0, 0xfffffffffffffffd, 0x15) r0 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) write$P9_ROPEN(r0, &(0x7f0000000000)={0x18, 0x71, 0x2, {{0xfbfac9ef9be75fa3, 0x2, 0x1}, 0x97da}}, 0x18) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) getsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000040)={@initdev, 0x0}, &(0x7f0000000080)=0x14) sendmsg$can_raw(r0, &(0x7f0000000200)={&(0x7f00000000c0)={0x1d, r1}, 0x10, &(0x7f00000001c0)={&(0x7f0000000100)=@canfd={{0x2, 0x100000000, 0x5, 0x401}, 0x16, 0x3, 0x0, 0x0, "b6eb30be99b73fa127b02d25d7c68515380e1246fb1c9e4cc66c9140ef681089e195c9556388899696742598e6a1b86e5e152c6d48e9bfe09b7073706524f6d5"}, 0x48}, 0x1, 0x0, 0x0, 0x20000080}, 0x0) 07:21:28 executing program 5: socketpair$unix(0x1, 0x6, 0x0, &(0x7f00000001c0)) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video35\x00', 0x2, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r1, 0x800443d3, &(0x7f0000000280)={{0x618, 0x73, 0x7, 0x6, 0x501, 0x80000000}, 0x1, 0x3, 0xffe0000000000000}) write(r1, &(0x7f0000000340), 0x41395527) pipe2(&(0x7f0000000040), 0x4000) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0xffffffffffff0001, 0x9, 0x4, 0x100000000, 0x0, 0xe1, 0x40000, 0x8, 0x8, 0xb05, 0x1ff, 0x3870, 0xa0b, 0x4, 0x25, 0xfffffffffffffff9, 0x8000, 0x0, 0xfff, 0x8, 0x4, 0x2, 0x10001, 0x2, 0x1d7, 0xfffffffffffffffb, 0x0, 0x6, 0x1, 0x9, 0xfffffffffffeffff, 0x0, 0xfffffffffffff800, 0x7fffffff, 0x3, 0x4, 0x0, 0x7fffffff, 0x4, @perf_bp={&(0x7f0000000100), 0x3}, 0x2000, 0x101, 0x4000000000, 0x6, 0xa67, 0xffffffffffffff5e, 0xfffffffffffffffb}, 0x0, 0x3, r1, 0x1) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, 0x0, 0x0) rt_sigsuspend(&(0x7f00000003c0)={0xba}, 0x8) ioctl$VIDIOC_SUBDEV_S_DV_TIMINGS(r0, 0xc0845657, &(0x7f0000000300)={0x0, @bt={0x1, 0x0, 0x1, 0x2, 0x6, 0x5, 0xe1e, 0x8bb6, 0x5e1, 0x8, 0x3e7a79f1, 0x400, 0x8000, 0x3, 0x4, 0x696e9df079dfbf43}}) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r3, 0xc028660f, &(0x7f00000002c0)={0x0, r2, 0xfffffffffffffffe, 0x4, 0x3, 0x4}) openat$dsp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dsp\x00', 0x8000, 0x0) 07:21:28 executing program 1: socket$alg(0x26, 0x5, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x400, 0x0) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r0, 0x84, 0x74, &(0x7f0000000480)=""/72, &(0x7f00000001c0)=0x48) socket$inet(0x2b, 0x1, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x0, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000300)='/dev/autofs\x00', 0x800, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(r1, 0xc02c564a, 0x0) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) lsetxattr$security_selinux(&(0x7f0000000880)='./file0\x00', &(0x7f0000000400)='security.selinux\x00', &(0x7f0000000900)='system_u:object_r:auditctl_exec_t:s0\x00', 0x25, 0x1) r2 = getpgrp(0x0) setpriority(0x0, r2, 0xffff) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) ioctl$sock_SIOCSIFBR(r0, 0x8941, &(0x7f0000000100)=@get={0x1, &(0x7f0000000000)=""/228, 0x7fff}) msgget(0x1, 0x208) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:28 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @remote}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @random="e5ac78d4c7fd"}, 0x10) write(r2, &(0x7f0000000080)="2700000014000f3f00000000120f0a00110001001f750800560099ed4f05000000011000000000", 0x138) 07:21:28 executing program 0: socket$alg(0x26, 0x5, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) lsetxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) setpriority(0x0, 0x0, 0x4) semget$private(0x0, 0xfffffffffffffffd, 0x15) r0 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) ioctl$KVM_ENABLE_CAP_CPU(r0, 0x4068aea3, &(0x7f0000000000)={0x7b, 0x0, [0x6, 0x100, 0x3, 0x40]}) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:28 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video35\x00', 0x2, 0x0) prctl$PR_SET_TIMERSLACK(0x1d, 0x8) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000040)='scalable\x00', 0x9) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$DRM_IOCTL_GEM_FLINK(r0, 0xc008640a, &(0x7f00000000c0)) 07:21:28 executing program 4: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:29 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @remote}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @random="e5ac78d4c7fd"}, 0x10) write(r2, &(0x7f0000000080)="2700000014000f3f00000000120f0a00110001001f750800560099ed4f05000000003f00000000", 0x138) 07:21:29 executing program 3: socket$alg(0x26, 0x5, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x400, 0x0) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r0, 0x84, 0x74, &(0x7f0000000480)=""/72, &(0x7f00000001c0)=0x48) r1 = socket$inet(0x2b, 0x1, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x0, 0x0) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000300)='/dev/autofs\x00', 0x800, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(r2, 0xc02c564a, 0x0) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) ioctl$sock_inet_SIOCGIFDSTADDR(r1, 0x8917, &(0x7f0000000000)={'yam0\x00', {0x2, 0x4e24, @rand_addr=0x5}}) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r3, 0x660c) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) socket$isdn(0x22, 0x3, 0x12) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, &(0x7f0000000240)={0xa3d, 0x0, 0x7}) r4 = syz_open_dev$vcsa(0x0, 0x0, 0x200) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, 0x0, &(0x7f00000003c0)) setsockopt$inet_sctp6_SCTP_MAXSEG(r4, 0x84, 0xd, &(0x7f0000000400)=@assoc_value, 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_INFO(r4, 0x80e85411, 0x0) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r5, 0x6, 0x80000000000002, &(0x7f0000000800)=0x2000000000000074, 0x4) bind$inet(r5, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r5, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r5, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) sendmmsg$inet(r5, &(0x7f0000000b40)=[{{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000100)}], 0x1}}], 0x1, 0x0) sendto$inet(r5, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0xfe6a, 0x6, 0x0, 0x27) r6 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x85nG\x13g\xa6\x05', 0x0) pwritev(r6, &(0x7f0000000340)=[{0x0}], 0x1, 0x81805) lsetxattr$security_selinux(&(0x7f0000000880)='./file0\x00', &(0x7f0000000400)='security.selinux\x00', &(0x7f0000000900)='system_u:object_r:auditctl_exec_t:s0\x00', 0x25, 0x1) 07:21:29 executing program 5: r0 = syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x8, 0x101000) ioctl$sock_bt_bnep_BNEPGETSUPPFEAT(r0, 0x800442d4, &(0x7f0000000240)=0x2dc4) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000200)='/dev/hwrng\x00', 0x40000, 0x0) recvmsg(r1, &(0x7f0000000080)={&(0x7f0000000a80)=@rc, 0x80, &(0x7f0000000180)=[{&(0x7f0000000280)=""/189, 0xbd}, {&(0x7f0000000340)=""/160, 0xa0}, {&(0x7f0000000480)=""/244, 0xf4}, {&(0x7f0000000b40)=""/220, 0xdc}, {&(0x7f0000000680)=""/153, 0x99}, {&(0x7f0000000740)=""/85, 0x55}, {&(0x7f00000007c0)=""/168, 0xa8}], 0x7, &(0x7f0000000880)=""/121, 0x79}, 0x100) write$P9_RWRITE(r1, &(0x7f0000000100)={0xb, 0x77, 0x200002, 0x3}, 0x3) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/hwrng\x00', 0x111000, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)) prctl$PR_SET_DUMPABLE(0x4, 0x3) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/video35\x00', 0x2, 0x0) epoll_pwait(r1, &(0x7f0000000900)=[{}, {}, {}, {}, {}, {}, {}], 0x7, 0x4, &(0x7f0000000980)={0xb}, 0x8) write(r2, &(0x7f0000000a40)="82673462337f95c384300e512dba66", 0xf) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, r4, &(0x7f0000000a00)={0x2000}) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 07:21:29 executing program 4: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:29 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @remote}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @random="e5ac78d4c7fd"}, 0x10) write(r2, &(0x7f0000000080)="2700000014000f3f00000000120f0a00110001001f750800560099ed4f05000000004000000000", 0x138) 07:21:29 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) lsetxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) setpriority(0x0, 0x0, 0xffff) semget$private(0x0, 0xfffffffffffffffd, 0x15) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="64cc94816b017a9f506ec7865dfc087cf01d688df1faf3421f72a1844839df5c2216", 0x22) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680), &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) [ 854.871739][ C0] net_ratelimit: 7 callbacks suppressed [ 854.871745][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 854.871768][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 854.877470][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 854.894715][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 854.900479][ C0] protocol 88fb is buggy, dev hsr_slave_1 07:21:29 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000240)='/dev/video35\x00', 0x2, 0x0) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 07:21:29 executing program 1: socket$alg(0x26, 0x5, 0x0) pipe(&(0x7f0000000880)={0xffffffffffffffff, 0xffffffffffffffff}) futimesat(r0, &(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)={{0x0, 0x7530}}) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x400, 0x0) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r1, 0x84, 0x74, &(0x7f0000000940)=""/72, &(0x7f00000001c0)=0xffffffffffffffe8) r2 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000700)='SEG6\x00') sendmsg$SEG6_CMD_SET_TUNSRC(r1, &(0x7f0000000840)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000800)={&(0x7f00000007c0)={0x2c, r2, 0x1, 0x70bd2b, 0x25dfdbfe, {}, [@SEG6_ATTR_ALGID={0x8, 0x6, 0x621}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x10001}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x80) r3 = socket$inet(0x2b, 0x1ffffffffffffffe, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x0, 0x0) r4 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000300)='/dev/autofs\x00', 0x800, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(r4, 0xc02c564a, 0x0) setsockopt$TIPC_DEST_DROPPABLE(r4, 0x10f, 0x81, &(0x7f0000000340)=0x3, 0x4) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) r5 = getpgrp(0x0) setpriority(0x0, r5, 0xffff) r6 = open(&(0x7f00000005c0)='./file0\x00', 0x40, 0x1) msgget(0x1, 0x208) openat$smack_task_current(0xffffffffffffff9c, &(0x7f00000004c0)='/proc/self/attr/current\x00', 0x2, 0x0) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r7 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r8 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000380)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) write$USERIO_CMD_SEND_INTERRUPT(r6, &(0x7f0000000480)={0x2, 0x9}, 0x2) keyctl$search(0xa, r7, &(0x7f0000000280)='user\x00', &(0x7f00000002c0)={'syz', 0x0}, r8) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) io_setup(0xffff, &(0x7f0000000000)=0x0) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r4, 0x84, 0x13, &(0x7f00000003c0)={0x0, 0x6}, &(0x7f0000000400)=0x8) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r3, 0x84, 0x22, &(0x7f0000000500)={0x80000000, 0x200, 0x5, 0xb6, r10}, &(0x7f0000000540)=0x10) io_getevents(r9, 0x81, 0x1, &(0x7f0000000040)=[{}], &(0x7f0000000080)={0x77359400}) 07:21:29 executing program 4: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:29 executing program 0: socket$alg(0x26, 0x5, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) lsetxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) setpriority(0x0, 0x0, 0xffff) semget$private(0x0, 0xfffffffffffffffd, 0x15) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) socket$inet6_udp(0xa, 0x2, 0x0) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:29 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @remote}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @random="e5ac78d4c7fd"}, 0x10) write(r2, &(0x7f0000000080)="2700000014000f3f00000000120f0a00110001001f750800560099ed4f05000000006000000000", 0x138) 07:21:29 executing program 3: socket$alg(0x26, 0x5, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x400, 0x0) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r0, 0x84, 0x74, &(0x7f0000000480)=""/72, &(0x7f00000001c0)=0x48) socket$inet(0x2b, 0x1, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x0, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000300)='/dev/autofs\x00', 0x800, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(r1, 0xc02c564a, 0x0) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) lsetxattr$security_selinux(&(0x7f0000000880)='./file0\x00', &(0x7f0000000400)='security.selinux\x00', &(0x7f0000000900)='system_u:object_r:auditctl_exec_t:s0\x00', 0x25, 0x1) r3 = getpgrp(0x0) getsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000000), &(0x7f0000000040)=0x4) setpriority(0x0, r3, 0xffff) fcntl$setpipe(r2, 0x407, 0x30) semget$private(0x0, 0xfffffffffffffffd, 0x15) open(&(0x7f0000000080)='./file0\x00', 0x40, 0x13) msgget(0x1, 0x208) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:29 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video35\x00', 0x2, 0x0) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$TIOCGPTPEER(r1, 0x5441, 0x5) 07:21:30 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @remote}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @random="e5ac78d4c7fd"}, 0x10) write(r2, &(0x7f0000000080)="2700000014000f3f00000000120f0a00110001001f750800560099ed4f0500ffffff9e00000000", 0x138) 07:21:30 executing program 1: socket$alg(0x26, 0x5, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x400, 0x0) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r0, 0x84, 0x74, &(0x7f0000000480)=""/72, &(0x7f00000001c0)=0x48) socket$inet(0x2b, 0x1, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x0, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000300)='/dev/autofs\x00', 0x800, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(r1, 0xc02c564a, 0x0) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) lsetxattr$security_selinux(&(0x7f0000000880)='./file0\x00', &(0x7f0000000400)='security.selinux\x00', &(0x7f0000000900)='system_u:object_r:auditctl_exec_t:s0\x00', 0x25, 0x1) r3 = getpgrp(0x0) setpriority(0x0, r3, 0xffff) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) msgget(0x1, 0x208) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) perf_event_open(&(0x7f0000000000)={0x3, 0x70, 0x2, 0x6, 0x7, 0x3, 0x0, 0x2, 0x2, 0x4, 0x0, 0x7, 0x4561d225, 0x3, 0x20, 0x8, 0x8, 0x80000000, 0x4, 0x11c, 0x8, 0x20000, 0x5, 0x7fffffff, 0x3, 0x7, 0x0, 0x0, 0x9, 0x4, 0xfffffffffffffca6, 0x3, 0x9, 0x8000, 0x1, 0x8, 0x2, 0xf8, 0x0, 0x3, 0x5, @perf_config_ext={0x8, 0x81}, 0x2011, 0x314, 0x0, 0x3, 0x0, 0xb4a}, r3, 0x7, r2, 0x1) 07:21:30 executing program 4: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:30 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video35\x00', 0x2, 0x0) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, 0x0, 0x0) r2 = socket(0x22, 0x2, 0x4) accept4(r2, 0x0, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) rt_sigaction(0x0, &(0x7f0000000180)={&(0x7f0000000040)="64d8c1c4c17913800f0000000f4abd99000000c4e2791890b5d25546c4c151fbfb8fe878c24bf36ac4e178107c612ed9f48fe978c31ac4c2390bbf00008020", {0x5}, 0x40000002, &(0x7f0000000100)="660f50cbd9f1224dffc4c1f012f1c4c2319ca2feffffffc4e2d9375100c4e1485edec4c271b7f22edcf2c4e178ae97d7000000"}, &(0x7f0000000280)={&(0x7f0000000200)="c4c2fd177426f1c4e24da98cd00b000000660f5dc4c4e17c77da6f868fe9c89a4e6b0fd139c4c201ac5100d222ea7ba30000284e", {}, 0x0, &(0x7f0000000240)="f30fc26d2608f0ff43ffc4c26192743d5ec4c26d8e935e180000c4c221020a0f01c1660f38297f00c4e17850d1c4c11b5df8363664660f173ce4"}, 0x8, &(0x7f00000002c0)) 07:21:30 executing program 0: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x8200, 0x0) ioctl$sock_SIOCINQ(r0, 0x541b, &(0x7f0000000040)) socket$alg(0x26, 0x5, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) lsetxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) setpriority(0x0, 0x0, 0xffff) semget$private(0x0, 0xfffffffffffffffd, 0x15) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:30 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @remote}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @random="e5ac78d4c7fd"}, 0x10) write(r2, &(0x7f0000000080)="2700000014000f3f00000000120f0a00110001001f750800560099ed4f050000000ec000000000", 0x138) 07:21:30 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x400, 0x0) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r1, 0x84, 0x74, &(0x7f0000000480)=""/72, &(0x7f00000001c0)=0x48) socket$inet(0x2b, 0x1, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x0, 0x0) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000300)='/dev/autofs\x00', 0x800, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(r2, 0xc02c564a, 0x0) fstatfs(r0, &(0x7f0000000000)=""/199) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) lsetxattr$security_selinux(&(0x7f0000000880)='./file0\x00', &(0x7f0000000400)='security.selinux\x00', &(0x7f0000000900)='system_u:object_r:auditctl_exec_t:s0\x00', 0x25, 0x1) r4 = getpgrp(0x0) setpriority(0x0, r4, 0xffff) fcntl$setpipe(r3, 0x407, 0x30) semget$private(0x0, 0x6, 0x400) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) msgget(0x1, 0x208) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:30 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video35\x00', 0x2, 0x0) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$RNDZAPENTCNT(r0, 0x5204, &(0x7f0000000040)=0x3ff) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 07:21:30 executing program 1: socket$alg(0x26, 0x5, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x400, 0x0) socket$inet(0x2b, 0x1, 0x0) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x0, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000300)='/dev/autofs\x00', 0x800, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(r1, 0xc02c564a, 0x0) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x7c, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) lsetxattr$security_selinux(&(0x7f0000000880)='./file0\x00', &(0x7f0000000400)='security.selinux\x00', &(0x7f0000000900)='system_u:object_r:auditctl_exec_t:s0\x00', 0x25, 0x1) r2 = getpgrp(0x0) setpriority(0x0, r2, 0xffff) open(&(0x7f0000000180)='./file0\x00', 0x10000101000, 0x1) msgget(0x1, 0x208) listen(r0, 0x3ff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000000)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:30 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @remote}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @random="e5ac78d4c7fd"}, 0x10) write(r2, &(0x7f0000000080)="2700000014000f3f00000000120f0a00110001001f750800560099ed4f050000000be900000000", 0x138) 07:21:30 executing program 4: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:30 executing program 0: socket$alg(0x26, 0x5, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) lsetxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) setpriority(0x0, 0x0, 0xffff) semget$private(0x0, 0xfffffffffffffffd, 0x15) r0 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) ioctl$SNDRV_TIMER_IOCTL_START(r0, 0x54a0) 07:21:30 executing program 1: socket$alg(0x26, 0x5, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x400, 0x0) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r0, 0x84, 0x74, &(0x7f0000000480)=""/72, &(0x7f00000001c0)=0x48) r1 = socket$inet(0x2b, 0x1, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x0, 0x0) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000300)='/dev/autofs\x00', 0x800, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(r3, 0xc02c564a, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000005c0)={'team0\x00', 0x0}) setsockopt$inet6_mreq(r2, 0x29, 0x1d, &(0x7f00000006c0)={@loopback, r4}, 0x14) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) lsetxattr$security_selinux(&(0x7f0000000880)='./file0\x00', &(0x7f0000000400)='security.selinux\x00', &(0x7f0000000900)='system_u:object_r:auditctl_exec_t:s0\x00', 0x25, 0x1) r5 = getpgrp(0x0) setpriority(0x0, r5, 0xffff) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) msgget(0x1, 0x208) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:30 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000180)) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video35\x00', 0x2, 0x0) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$bt_BT_DEFER_SETUP(r1, 0x112, 0x7, &(0x7f0000000040), &(0x7f0000000100)=0x4) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 07:21:31 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @remote}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @random="e5ac78d4c7fd"}, 0x10) write(r2, &(0x7f0000000080)="2700000014000f3f00000000120f0a00110001001f750800560099ed4f0500fffffff000000000", 0x138) 07:21:31 executing program 3: socket$alg(0x26, 0x5, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x400, 0x0) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r0, 0x84, 0x74, &(0x7f0000000480)=""/72, &(0x7f00000001c0)=0x48) socket$inet(0x2b, 0x1, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x0, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000300)='/dev/autofs\x00', 0x800, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(r1, 0xc02c564a, 0x0) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) lsetxattr$security_selinux(&(0x7f0000000880)='./file0\x00', &(0x7f0000000400)='security.selinux\x00', &(0x7f0000000900)='system_u:object_r:auditctl_exec_t:s0\x00', 0x25, 0x1) r3 = getpgrp(0x0) setpriority(0x0, r3, 0xffff) fcntl$setpipe(r2, 0x407, 0x30) socket$inet_icmp_raw(0x2, 0x3, 0x1) semget$private(0x0, 0xfffffffffffffffd, 0x15) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) msgget(0x1, 0x208) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000000)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:31 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) lsetxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x23, &(0x7f00000001c0)={@rand_addr, @multicast2, 0x0}, &(0x7f0000000080)=0xc) bind(r0, &(0x7f00000000c0)=@xdp={0x2c, 0x4, r1, 0x15}, 0x80) setpriority(0x0, 0x0, 0xffff) semget$private(0x0, 0xfffffffffffffffd, 0x15) r2 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) ioctl$VIDIOC_SUBDEV_S_SELECTION(r2, 0xc040563e, &(0x7f0000000140)={0x1, 0x0, 0x102, 0x2, {0x9, 0x7f, 0x200, 0x6}}) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000000), &(0x7f0000000780)=[&(0x7f0000000040)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:31 executing program 4: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:31 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000180)='/dev/video35\x00', 0x2, 0x0) write(r1, &(0x7f0000000280)="781146601816654452da62391011eba81bb791edbdcb5512935594e170aa6b43daba87b5a706088d790fed333d1956a79c3d04a047717ef303818973601200408a2a9f9dfafc8ebc0efd0565d480dc3f4e7b8fe69c5431997d963f9521d0a4d76cce9ed9060b1781751c6450f1a0adbe4db56a3755a69e92910ff13b601897beedfa7e6ce835ef2244d1379365218531179ccdc26aa781fb5ae9bb1870ab140004000000000000752a4df4c58fd323e1379aee4d95abe966d506615ea411482d14b7d8a722fd7a736ddd8f0b0f38d6d0c83113aa55c2dcd48a3b283a16a83ecb978205bf759c0962e9aece4baadde6ab37aef1", 0xf3) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000200)="0b09485f186786e06aab9c8d8c685946be5520ed39ad476e55b7db1c92a0e1a09805d3527fb775ab96965ed53f06806b3794addce0b01252c5458bee4ee1904fb23a4a68ba057f802fc8b59fa4666e8bc02c064f6c80e5644ef22f78e4cd0275f39a0ed58014e5ee08d758", 0xfffffffffffffe20}], 0x1, 0x0) [ 856.951763][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 856.952580][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 856.957604][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 856.963752][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 856.976162][ C0] protocol 88fb is buggy, dev hsr_slave_0 07:21:31 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @remote}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @random="e5ac78d4c7fd"}, 0x10) write(r2, &(0x7f0000000080)="2700000014000f3f00000000120f0a00110001001f750800560099ed4f050000f0ffff00000000", 0x138) 07:21:31 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) getsockopt$IP_VS_SO_GET_VERSION(r0, 0x0, 0x480, &(0x7f0000000040), &(0x7f0000000100)=0x40) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video35\x00', 0x2, 0x0) write(r2, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, 0x0, 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 07:21:31 executing program 4: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:31 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) lsetxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000000)=0x0) setpriority(0x0, r1, 0xffff) semget$private(0x0, 0xfffffffffffffffd, 0x15) r2 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) ioctl$TIOCGPKT(r2, 0x80045438, &(0x7f0000000040)) 07:21:31 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) mq_timedreceive(r0, &(0x7f0000000200)=""/248, 0xf8, 0x1, &(0x7f0000000040)={0x0, 0x1c9c380}) r2 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video35\x00', 0x2, 0x0) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, 0x0, 0x0) bind$isdn(r1, &(0x7f0000000480)={0x22, 0x2, 0x2d6, 0x3, 0x2}, 0x6) ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffffff, 0xc008640a, &(0x7f0000000100)={0x0}) ioctl$DRM_IOCTL_GEM_CLOSE(r2, 0x40086409, &(0x7f0000000180)={r3}) ioctl$MON_IOCX_GET(r0, 0x400c9206, &(0x7f0000000400)={&(0x7f0000000300), &(0x7f0000000340)=""/158, 0x9e}) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 07:21:31 executing program 1: socket$alg(0x26, 0x5, 0x0) r0 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x0, 0x101000) ioctl$TIOCGLCKTRMIOS(r0, 0x5456, &(0x7f0000000080)={0x3f, 0x2, 0x2f93, 0x2, 0x14, 0x100000001, 0x20, 0x7f2a, 0x4, 0x9691, 0x7, 0x20}) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x400, 0x0) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r1, 0x84, 0x74, &(0x7f0000000480)=""/72, &(0x7f00000001c0)=0x48) socket$inet(0x2b, 0x1, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x0, 0x0) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000300)='/dev/autofs\x00', 0x800, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(r2, 0xc02c564a, 0x0) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) acct(&(0x7f0000000000)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) lsetxattr$security_selinux(&(0x7f0000000880)='./file0\x00', &(0x7f0000000400)='security.selinux\x00', &(0x7f0000000900)='system_u:object_r:auditctl_exec_t:s0\x00', 0x25, 0x1) r3 = getpgrp(0x0) setpriority(0x0, r3, 0xffff) open(&(0x7f0000000180)='./file0\x00', 0x400, 0x20) msgget(0x1, 0x208) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:31 executing program 3: socket$alg(0x26, 0x5, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x400, 0x0) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r0, 0x84, 0x74, &(0x7f0000000480)=""/72, &(0x7f00000001c0)=0x48) r1 = socket$inet(0x2b, 0x1, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x0, 0x0) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/autofs\x00', 0x7fe, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(r2, 0xc02c564a, 0x0) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000040)={0x0, 0x100000001, 0xd2}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000340)={r3, @in={{0x2, 0x4e22, @broadcast}}, 0x9, 0x40, 0x4, 0x5, 0x2}, &(0x7f00000000c0)=0x98) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) lsetxattr$security_selinux(&(0x7f0000000880)='./file0\x00', &(0x7f0000000400)='security.selinux\x00', &(0x7f0000000900)='system_u:object_r:auditctl_exec_t:s0\x00', 0x25, 0x1) r5 = getpgrp(0x0) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f0000000100)) setpriority(0x0, r5, 0xffff) fcntl$setpipe(r4, 0x407, 0x80000000) semget$private(0x0, 0xfffffffffffffffd, 0x15) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000280)={0x3, [0xf5, 0x5, 0x1]}, &(0x7f00000002c0)=0xa) msgget(0x1, 0x208) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) uselib(&(0x7f0000000300)='./file0\x00') 07:21:31 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @remote}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @random="e5ac78d4c7fd"}, 0x10) write(r2, &(0x7f0000000080)="2700000014000f3f00000000120f0a00110001001f750800560099ed4f05009effffff00000000", 0x138) 07:21:32 executing program 0: socket$alg(0x26, 0x5, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x7e6a6ce21de6f581) lsetxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) setpriority(0x0, 0x0, 0xffff) semget$private(0x0, 0xfffffffffffffffd, 0x15) r0 = socket(0xc, 0x80004, 0x6) getsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000000)=""/202, &(0x7f0000000100)=0xca) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4087fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:32 executing program 4: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:32 executing program 5: r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000080)='/dev/cachefiles\x00', 0x40000, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r0, 0xae04) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000100)=0xe9, 0x4) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x10000, 0x0) pipe(&(0x7f0000000440)={0xffffffffffffffff}) openat$vim2m(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/video35\x00', 0x2, 0x0) write(r1, &(0x7f0000000180), 0x263) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, 0x0, 0x0) syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 07:21:32 executing program 1: socket$alg(0x26, 0x5, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x400, 0x0) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r0, 0x84, 0x74, &(0x7f0000000480)=""/72, &(0x7f00000001c0)=0x48) socket$inet(0x2b, 0x1, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x0, 0x0) ioctl$RNDZAPENTCNT(r0, 0x5204, &(0x7f0000000000)=0x4) lseek(r0, 0x0, 0x4) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000300)='/dev/autofs\x00', 0x800, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(r1, 0xc02c564a, 0x0) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) lsetxattr$security_selinux(&(0x7f0000000880)='./file0\x00', &(0x7f0000000400)='security.selinux\x00', &(0x7f0000000900)='system_u:object_r:auditctl_exec_t:s0\x00', 0x25, 0x1) r2 = getpgrp(0x0) setpriority(0x0, r2, 0xffff) r3 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) msgget(0x1, 0x208) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$DRM_IOCTL_RES_CTX(r0, 0xc0086426, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x0}]}) ioctl$DRM_IOCTL_SET_SAREA_CTX(r0, 0x4008641c, &(0x7f0000000280)={r4, &(0x7f00000000c0)=""/111}) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x1000002, 0x10030, r3, 0x0) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:32 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @remote}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @random="e5ac78d4c7fd"}, 0x10) write(r2, &(0x7f0000000080)="2700000014000f3f00000000120f0a00110001001f750800560099ed4f0500f0ffffff00000000", 0x138) 07:21:32 executing program 3: socket$alg(0x26, 0x5, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x400, 0x0) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r0, 0x84, 0x74, &(0x7f0000000480)=""/72, &(0x7f00000001c0)=0x48) socket$inet(0x2b, 0x1, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x0, 0x0) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000300)='/dev/autofs\x00', 0x800, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(r2, 0xc02c564a, 0x0) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000040)=0x0) sched_setaffinity(r3, 0xfffffffffffffc98, &(0x7f0000000200)=0xc) write$USERIO_CMD_REGISTER(r2, &(0x7f0000000000)={0x0, 0xe34}, 0x2) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) lsetxattr$security_selinux(&(0x7f0000000080)='./file0\x00', &(0x7f0000000400)='security.selinux\x00', &(0x7f00000000c0)='system_u:object_r:auditd_exec_t:s0\x00', 0xffffffffffffff56, 0x0) r5 = getpgrp(0x0) setpriority(0x0, r5, 0xffff) fcntl$setpipe(r4, 0x407, 0x30) semget$private(0x0, 0xfffffffffffffffd, 0x15) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) msgget(0x1, 0x208) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:32 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) lsetxattr$security_selinux(0x0, 0x0, 0x0, 0x100b4, 0x2) setpriority(0x0, 0x0, 0xffff) semget$private(0x0, 0xfffffffffffffffd, 0x15) ioctl$sock_ifreq(r0, 0x8925, &(0x7f00000002c0)={'bridge0\x00', @ifru_data=&(0x7f0000000280)="5ed7974a40a0222542549f5d8bbf0745d15a4712666ae9f1b33660845e9dc9e0"}) r1 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$VIDIOC_G_AUDOUT(r1, 0x80345631, &(0x7f0000000000)) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f00000000c0)='security.capability\x00'], &(0x7f0000000380)) write$FUSE_STATFS(r1, &(0x7f0000000040)={0x60, 0xfffffffffffffff5, 0x6, {{0xab38, 0x5, 0x7, 0x3, 0x0, 0x5, 0x0, 0x1}}}, 0x60) getsockopt$inet_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000100)={0x0, 0x3, 0x7, 0x800, 0xffff, 0xa1b}, &(0x7f0000000140)=0x14) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f00000001c0)={r2, @in={{0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0xc}}}, 0xc3f, 0x1ff}, 0x88) 07:21:32 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video35\x00', 0x2, 0x0) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 07:21:32 executing program 4: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:32 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @remote}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @random="e5ac78d4c7fd"}, 0x10) write(r2, &(0x7f0000000080)="2700000014000f3f00000000120f0a00110001001f750800560099ed4f05000000000000034000", 0x138) 07:21:32 executing program 0: socket$alg(0x26, 0x5, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) lsetxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) setpriority(0x0, 0x0, 0xffff) setxattr$security_evm(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000040)='security.evm\x00', &(0x7f0000000080)=@md5={0x1, "0458327b23cb08780216c14f372f981d"}, 0x11, 0x3) semget$private(0x0, 0xfffffffffffffffd, 0x15) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:32 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r0, 0x111, 0x4, 0x0, 0x4) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video35\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="fdf7a9e914d5170b6684539805dc178875f174c244bd22114e76ffbab52621a138b26c46374fc0dd0a65d1d656b78d3d38461e12518759b074fa1923c079636e7f8c9b2ff004c7000000000000a757", 0x4f) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) connect$rxrpc(r0, &(0x7f00000002c0)=@in4={0x21, 0x4, 0x2, 0x10, {0x2, 0x4e23, @broadcast}}, 0x24) bind$tipc(r0, &(0x7f0000000200)=@nameseq={0x1e, 0x1, 0x3, {0x43, 0x4, 0x1}}, 0x10) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000100), &(0x7f00000001c0)=0x4) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 07:21:32 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @remote}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @random="e5ac78d4c7fd"}, 0x10) write(r2, &(0x7f0000000080)="2700000014000f3f00000000120f0a00110001001f750800560099ed4f0500fffffffffffff000", 0x138) 07:21:32 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x400, 0x0) ioctl$VIDIOC_DBG_S_REGISTER(r0, 0x4038564f, &(0x7f0000000040)={{0x3, @name="0c7c4ce9fbdc73b9a9a48990a72b9dc27f92ec83af73669747410f20487b3f1b"}, 0x8, 0x5, 0x7fff}) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r1, 0x84, 0x74, &(0x7f0000000480)=""/72, &(0x7f00000001c0)=0x48) r2 = socket$inet(0x2b, 0x1, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x0, 0x0) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000300)='/dev/autofs\x00', 0x800, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(r3, 0xc02c564a, 0x0) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) lsetxattr$security_selinux(&(0x7f0000000880)='./file0\x00', &(0x7f0000000400)='security.selinux\x00', &(0x7f0000000900)='system_u:object_r:auditctl_exec_t:s0\x00', 0x25, 0x1) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8916, &(0x7f0000000000)={'hwsim0\x00', {0x2, 0x4e22, @multicast2}}) r5 = getpgrp(0x0) setpriority(0x0, r5, 0xffff) fcntl$setpipe(r4, 0x407, 0x30) semget$private(0x0, 0xfffffffffffffffd, 0x15) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) msgget(0x1, 0x208) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:32 executing program 1: io_setup(0x3, &(0x7f0000000340)=0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000380)='/dev/snapshot\x00', 0x101302, 0x0) r2 = syz_open_dev$mice(&(0x7f0000000500)='/dev/input/mice\x00', 0x0, 0x80000) r3 = perf_event_open(&(0x7f00000006c0)={0x3, 0x70, 0x7, 0xb9, 0x80000001, 0x2, 0x0, 0x8, 0x200, 0xb, 0x200, 0x1000, 0x1, 0x200, 0x5, 0x7, 0x1f56, 0xca, 0x80000001, 0xffff, 0x4, 0x3, 0x10001, 0x1, 0x2, 0x3, 0xbc, 0x6, 0xfb, 0x8, 0x6, 0x89, 0xfbc, 0x100, 0x3, 0x3, 0x1, 0x77c, 0x0, 0x33, 0x2, @perf_bp={&(0x7f00000005c0), 0x4}, 0x40, 0x5, 0x8, 0x0, 0xdc9b, 0x1c0000000, 0xa80}, 0x0, 0xf, 0xffffffffffffffff, 0x2) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000800)='personality\x00') r5 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f00000008c0)='/proc/thread-self/attr/sockcreate\x00', 0x2, 0x0) r6 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) r7 = timerfd_create(0x9, 0x800) r8 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/dlm-control\x00', 0x40, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, &(0x7f0000000dc0)={0x0, 0x80000, 0xffffffffffffffff}) r10 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000e80)='/dev/autofs\x00', 0x44200, 0x0) r11 = syz_open_dev$usb(&(0x7f0000000f80)='/dev/bus/usb/00#/00#\x00', 0x7, 0x20a901) r12 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f00000010c0)='/dev/ubi_ctrl\x00', 0x1, 0x0) r13 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000012c0)={&(0x7f0000001140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xd5, 0xd5, 0x5, [@func_proto={0x0, 0x9, 0x0, 0xd, 0x0, [{0x5, 0x3}, {0x6, 0x1}, {0x0, 0x3}, {0x9, 0x1}, {0x6, 0x4}, {0x3, 0x4}, {0x0, 0x3}, {0xc, 0x4}, {0x3, 0x2}]}, @const={0x5, 0x0, 0x0, 0xa, 0x2}, @typedef={0x0, 0x0, 0x0, 0x8, 0x4}, @func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{0x7}, {}, {0xc, 0x4}]}, @datasec={0x6, 0x2, 0x0, 0xf, 0x1, [{0x4, 0x9, 0x7}, {0x2, 0x6, 0x3}], 'H'}, @var={0xa, 0x0, 0x0, 0xe, 0x3, 0x1}, @int={0x3, 0x0, 0x0, 0x1, 0x0, 0x5, 0x0, 0x53}]}, {0x0, [0x61, 0x61, 0x2e]}}, &(0x7f0000001240)=""/105, 0xf5, 0x69, 0x1}, 0x20) r14 = openat$autofs(0xffffffffffffff9c, &(0x7f0000001340)='/dev/autofs\x00', 0x8000, 0x0) r15 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000013c0)='/dev/ptmx\x00', 0x28c302, 0x0) r16 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001480)='/proc/self/net/pfkey\x00', 0x40000, 0x0) r17 = openat$md(0xffffffffffffff9c, &(0x7f0000001500)='/dev/md0\x00', 0x117200, 0x0) r18 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001580)='/dev/ubi_ctrl\x00', 0x4000, 0x0) io_submit(r0, 0x9, &(0x7f0000001600)=[&(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f00000003c0)="d2ee0ad7dc8fc7663a838dca1145c6e9fd015a8918dc51a07253517943ba26145d0b88b25a6e4d518952a5dd61ac175d531df18f", 0x34, 0x0, 0x0, 0x0, r2}, &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x5, r3, &(0x7f00000007c0)="0414c1e1fa91b3c789ddf87c58aa66", 0xf, 0x7, 0x0, 0x0, r4}, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x5, 0x2, r5, &(0x7f0000000b00)="12f39e83dabe4f4699f8991e01aa35c4a93a6d13316f34e1f6bbd057b3698fd86c6815c4e42164d09e8dda86c3a043e949fc97249eb0c35538ea38aabb87d1f46c4536c6ed547307f0bc3b3ba8a0e2f0aaa410f2aa8f257b77a4e1aa1bcde4aa7eaf541c657042758aab8dfb1b8b0695cce86843c45d9c193ad7b0390143d0f9b64294669bfa10fa2a63de99beb5d8f39d75e94a0a59329507ea3233fbe770c2205dbcf156591926cb54bc799ea99e1d02e1129600da8f721be1f4d9f668e3f5647ff155a7aabfccdf3a0e867502c9", 0xcf, 0x6, 0x0, 0x2, r6}, &(0x7f0000000d80)={0x0, 0x0, 0x0, 0x0, 0xf06a, r7, &(0x7f0000000c40)="5cc8a71d0127fd7eca0ddb8013e7aa09678ca49a8add2a48abe0a6c6ec6185b76ec3e1097bb332cb4b5fad1db136794d8c4ec8a649fa9c2efaf1923f0d1e7df7ead23634c0d4d5b3f742f33b7c91105116d4ba5568d717bd99220c3ea2bb61585b47b65791444c03131972bb817736fc202abeea8867ddc29954bc3cdfbd7cad7b8db11e75f424b15f973c479ff89ec5dae683bba582171a55c85b29696aa2d319dce7c5732ef86721f63969eb6fbeb0dd8048ccc0aaee864614b8e89d183f2d6774d7fc13deda5ea9c77db48ed22f8f0d9c093cbdd0ec390ee5694ecb9097", 0xdf, 0x8000, 0x0, 0x0, r8}, &(0x7f0000000ec0)={0x0, 0x0, 0x0, 0x8, 0x63b, r9, &(0x7f0000000e00)="7486ed4b7b88fee69d9742c1a2c3bef12f96727b71b5cb002266b20077a89358acaf23f5c5f97e0b74d55e7ea003c876995400b4c6b9c1479ee4f2ef770a144e10212eedeac24e702f932bd52400ef617136bf4457d1e7dc287489ca7b974d4d15a3b67ca84a28e98dfae0418f8f89164263853998", 0x75, 0x200, 0x0, 0x1, r10}, &(0x7f0000001100)={0x0, 0x0, 0x0, 0x7, 0x1f, r11, &(0x7f0000000fc0)="62afa79454549175103f25e2c489c0138408a8c0fa83fbfbef14300322e1125f5a86edb5d0645ae02c1267ff54a2ae5af159136d1d902f4457f1ccb633b72b752a96069bf72bea6541bced6a9526faac990c793111ccda2e0a6efdaaf879961fcf6faedd19a91d17650b43326d9497386bd4f74b7f18600364995a80a1371a49a9e7d88925443c551879a5c503d33f74826011db2c1423116022e5c2c43645396c84c262c31e5775d0344d063565d6dc330093a6891a23bcf5aa5c5b1f97e306d4394b26342dd13e5e0ef90b3033fc10a2", 0xd1, 0x1, 0x0, 0x1, r12}, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x6, 0x4, r13, &(0x7f0000001300)="2b569ec22b203b7d7328f11e27a70958c307a9545d844e7e95b18caf784b9dafaaab7b9e798660bfd7a1fb50385ebae3ebe485", 0x33, 0x10000, 0x0, 0x1, r14}, &(0x7f00000014c0)={0x0, 0x0, 0x0, 0x5, 0x450, r15, &(0x7f0000001400)="a77b0cdf86ae0a3bd0135e945e3b65bd862cc67b4c7ff9cd69cf8877318a0b4a8dcdf11043a711d48abfc6e25a754f17cef91c303539bfc0747d0363200c6eede7a6a5eecb847c", 0x47, 0x1000, 0x0, 0x0, r16}, &(0x7f00000015c0)={0x0, 0x0, 0x0, 0x7, 0x3, r17, &(0x7f0000001540)="c6f90d5671bf2aca06282f4c5165fd64db7ef24a032eae1f26d93a35a1252b625ca8a5232e827e44c58bba34d03c083d6d78899452b9", 0x36, 0x7d, 0x0, 0x2, r18}]) socket$alg(0x26, 0x5, 0x0) r19 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x400, 0x0) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r19, 0x84, 0x74, &(0x7f0000000480)=""/72, &(0x7f00000001c0)=0x48) socket$inet(0x2b, 0x1, 0x0) r20 = openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x0, 0x0) r21 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000300)='/dev/autofs\x00', 0x800, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(r21, 0xc02c564a, 0x0) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) ioctl$VIDIOC_G_FMT(r20, 0xc0cc5604, &(0x7f0000000000)={0xb, @sliced={0x4, [0xfffffffffffffff7, 0x6, 0x0, 0x1, 0x3, 0x7ff, 0x6, 0x4000000000000, 0x7, 0x5, 0x8, 0x2, 0x973d, 0x10000, 0x100000000, 0x5, 0x3, 0xb0e, 0x1, 0x7, 0x7, 0x0, 0xa0a000000, 0x9, 0x5, 0x4, 0x6a, 0x7, 0x0, 0x80, 0x6, 0x0, 0x1, 0x6, 0x0, 0xfd15, 0x5, 0x3, 0x3b5, 0x9, 0x7a, 0x4, 0x0, 0x7, 0x4, 0x80000001, 0x3, 0x4], 0x35d}}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) lsetxattr$security_selinux(&(0x7f0000000880)='./file0\x00', &(0x7f0000000400)='security.selinux\x00', &(0x7f0000000900)='system_u:object_r:auditctl_exec_t:s0\x00', 0x25, 0x1) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r21, 0x84, 0x22, &(0x7f0000000100)={0x7f, 0x2, 0x80, 0xfffffffffffffd87, 0x0}, &(0x7f0000000280)=0x10) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r21, 0x84, 0x1b, &(0x7f0000000940)=ANY=[@ANYRES32=r22, @ANYBLOB="81000000a1b068bf67d72bcafceab5b60f7b61bca37f4a6059694b85120380b6b06dab22dba54275b81a99d2866be2b776ec8d7deb8de45ce3caee55519ca2ddbf1677b3e92262527f0000000000000087507a4b67839989d2e302f5d318bf661434e694c9414ef3245d8e52f7b933e1d7d304a2cd9aaa51e22c4b6668652508b9b9944dd9eb254af07e0d9908c98af051f434e4c2446a58c3cdef1e3045540fb38c8c16f96b7df1ac4bf3689e5624910d55482dbadbdabdce6be95d24057c900218ef952640482f5e50ad37df4f2b7bc7559d4874b9309a6958e26f4a33feb3f63a5c90bbaeb1360f985f4801dfcedf41799903c9f8000aff9c247aa25c7c24ded52f4f078354361f817ecb480b975557782347e89ac74f0df502a33174d99d796877125cc0e1d873b8677537de6a0ff41f2e27b34df12ab453351399ed4c5f949d0a6248b99fde216cfc33a67e134eb483170409d8ea016b7c008e9cf82cce475a1853437b848ee2716996b79b8bdeca999865da8cbfb479ff51730d2e8a"], &(0x7f00000002c0)=0x89) r23 = getpgrp(0x0) setpriority(0x0, r23, 0xffff) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) msgget(0x1, 0x208) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:32 executing program 4: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:32 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @remote}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @random="e5ac78d4c7fd"}, 0x10) write(r2, &(0x7f0000000080)="2700000014000f3f00000000120f0a00110001001f750800560099ed4f05000000000000000001", 0x138) 07:21:33 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40246608, &(0x7f0000000040)={0x7, 0x3, 0x80000000, 0x4000000000, 0x3ff, 0xfffffffffffffffd}) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video35\x00', 0x2, 0x0) write(r2, &(0x7f0000000340), 0x41395527) setsockopt$inet6_mtu(r1, 0x29, 0x17, &(0x7f0000000100)=0x1, 0x4) prctl$PR_GET_KEEPCAPS(0x7) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$FUSE_INIT(r2, &(0x7f0000000200)={0x50, 0x0, 0x2, {0x7, 0x1f, 0xfffffffffffffff9, 0x20001, 0x9, 0xba, 0x9, 0x5}}, 0x50) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, 0x0, 0x0) socket$inet6(0xa, 0x3, 0xbc) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) recvfrom$inet6(r4, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) shutdown(r4, 0x1) r5 = accept4(r3, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(r5, 0x541b, &(0x7f0000000000)) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) socket$inet_udp(0x2, 0x2, 0x0) 07:21:33 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @remote}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @random="e5ac78d4c7fd"}, 0x10) write(r2, &(0x7f0000000080)="2700000014000f3f00000000120f0a00110001001f750800560099ed4f05000000000000000002", 0x138) 07:21:33 executing program 4: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\xff']) 07:21:33 executing program 0: socket$alg(0x26, 0x5, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) lsetxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) setpriority(0x0, 0x0, 0xffff) semget$private(0x0, 0xfffffffffffffffd, 0x15) r0 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) ioctl$DRM_IOCTL_GET_STATS(r0, 0x807c6406, &(0x7f0000000000)=""/87) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:33 executing program 3: socket$alg(0x26, 0x5, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x400, 0x0) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r0, 0x84, 0x74, &(0x7f0000000480)=""/72, &(0x7f00000001c0)=0x48) socket$inet(0x2b, 0x1, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x0, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000300)='/dev/autofs\x00', 0x800, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(r1, 0xc02c564a, 0x0) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) lsetxattr$security_selinux(&(0x7f0000000880)='./file0\x00', &(0x7f0000000400)='security.selinux\x00', &(0x7f0000000900)='system_u:object_r:auditctl_exec_t:s0\x00', 0x25, 0x1) r3 = getpgrp(0x0) setpriority(0x0, r3, 0xffff) fcntl$setpipe(r2, 0x407, 0x1) semget$private(0x0, 0xfffffffffffffffd, 0x15) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) msgget(0x1, 0x208) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:33 executing program 5: socketpair$unix(0x1, 0x6, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) flock(r0, 0x1) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video35\x00', 0x2, 0x0) write(r2, &(0x7f0000000340), 0x41395527) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000200)={0x0, @in={{0x2, 0x4e22, @broadcast}}, [0x5, 0x64b, 0xff, 0x665, 0x5, 0x5, 0x3, 0x5, 0x6bb, 0xffff, 0x7, 0xfffffffffffffffd, 0x0, 0xffffffffffff7fff, 0x200]}, &(0x7f0000000300)=0x100) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r2, 0x84, 0x18, &(0x7f0000000340)={r3, 0x100}, &(0x7f0000000380)=0x8) r4 = getpid() ioprio_get$pid(0x2, r4) faccessat(r2, &(0x7f00000003c0)='./file0\x00', 0x5, 0x1000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r2, 0x84, 0x7b, &(0x7f0000000100)={0x0, 0x6}, &(0x7f0000000180)=0x8) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r0, 0x84, 0x23, &(0x7f00000001c0)={r5, 0x4}, 0x8) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 07:21:33 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @remote}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @random="e5ac78d4c7fd"}, 0x10) write(r2, &(0x7f0000000080)="2700000014000f3f00000000120f0a00110001001f750800560099ed4f05000000000000000004", 0x138) 07:21:33 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x400, 0x0) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r1, 0x84, 0x74, &(0x7f0000000480)=""/72, &(0x7f00000001c0)=0x48) socket$inet(0x2b, 0x1, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x0, 0x0) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000300)='/dev/autofs\x00', 0x800, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(r2, 0xc02c564a, 0x0) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) futimesat(r1, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={{0x0, 0x7530}, {0x77359400}}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) lsetxattr$security_selinux(&(0x7f0000000880)='./file0\x00', &(0x7f0000000400)='security.selinux\x00', &(0x7f0000000900)='system_u:object_r:auditctl_exec_t:s0\x00', 0x25, 0x1) r3 = getpgrp(0x0) setpriority(0x0, r3, 0xffff) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) msgget(0x1, 0x208) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000040)=0xc) 07:21:33 executing program 4: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:33 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TCFLSH(r1, 0x540b, 0xf0) r2 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video35\x00', 0x2, 0x0) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff50, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x6, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffc) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, 0x0, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2b, &(0x7f0000000200)={0x80, {{0xa, 0x4e20, 0x6, @mcast1, 0x5}}, {{0xa, 0x4e23, 0x100000000, @empty, 0x1}}}, 0x104) iopl(0x7) setsockopt$sock_int(r0, 0x1, 0x2f, &(0x7f0000000000)=0x86, 0x4) ioctl$BLKBSZSET(r2, 0x40041271, &(0x7f0000000180)=0x4) 07:21:33 executing program 0: socket$alg(0x26, 0x5, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) lsetxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x2) setpriority(0x0, 0x0, 0xffff) semget$private(0x0, 0x5, 0x17) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:33 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @remote}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @random="e5ac78d4c7fd"}, 0x10) write(r2, &(0x7f0000000080)="2700000014000f3f00000000120f0a00110001001f750800560099ed4f0500000000000000000a", 0x138) 07:21:33 executing program 3: socket$alg(0x26, 0x5, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x400, 0x0) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r0, 0x84, 0x74, &(0x7f0000000480)=""/72, &(0x7f00000001c0)=0x48) socket$inet(0x2b, 0x1, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x0, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000300)='/dev/autofs\x00', 0x800, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(r1, 0xc02c564a, 0x0) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) lsetxattr$security_selinux(&(0x7f0000000880)='./file0\x00', &(0x7f0000000400)='security.selinux\x00', &(0x7f0000000900)='system_u:object_r:auditctl_exec_t:s0\x00', 0x25, 0x1) r2 = getpgrp(0x0) setpriority(0x0, r2, 0xffff) semget$private(0x0, 0xfffffffffffffffd, 0x15) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) msgget(0x1, 0x208) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:33 executing program 4: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:34 executing program 0: r0 = creat(&(0x7f0000000240)='./file0\x00', 0x8) ioctl$sock_inet_SIOCGIFPFLAGS(r0, 0x8935, &(0x7f0000000280)={'ip6erspan0\x00', 0x4}) socket$alg(0x26, 0x5, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) lsetxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) setpriority(0x0, 0x0, 0xffff) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x24200, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000300)={0x0, 0xffffffff}, &(0x7f0000000340)=0x8) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f0000000380)={r2, 0xba}, &(0x7f00000003c0)=0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000040)={{{@in6=@mcast2, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000000140)=0xe8) setsockopt$RDS_GET_MR_FOR_DEST(r1, 0x114, 0x7, &(0x7f00000007c0)={@can={0x1d, r3}, {&(0x7f00000001c0)=""/51, 0x33}, &(0x7f0000000200), 0x6}, 0x9c) semget$private(0x0, 0xfffffffffffffffd, 0x15) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:34 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VIDIOC_OVERLAY(r0, 0x4004560e, &(0x7f0000000040)=0x4) socket$unix(0x1, 0x0, 0x0) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video35\x00', 0x2, 0x0) write(r2, &(0x7f0000000340), 0x41395527) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) signalfd4(r3, &(0x7f0000000180)={0x101}, 0x8, 0x800) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 07:21:34 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @remote}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @random="e5ac78d4c7fd"}, 0x10) write(r2, &(0x7f0000000080)="2700000014000f3f00000000120f0a00110001001f750800560099ed4f0500000000000000000e", 0x138) 07:21:34 executing program 0: socket$alg(0x26, 0x5, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) lsetxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) setpriority(0x0, 0x0, 0xffff) semget$private(0x0, 0xfffffffffffffffd, 0x15) r0 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet6_buf(r0, 0x29, 0x15, &(0x7f0000000000)=""/65, &(0x7f0000000080)=0x41) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:34 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video35\x00', 0x2, 0x0) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, 0x0, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_SIZE(r1, 0xc040564a, &(0x7f0000000180)={0x7, 0x0, 0x4001, 0x20, 0x1, 0x0, 0x100, 0x1}) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r2, &(0x7f0000000280)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000200)={&(0x7f00000002c0)=ANY=[@ANYBLOB="15000002e341347b39d5aabab669d2474f1c4d5b0ec247a0c8339f22c2abe92659b139d5910ebe242650f8873f8b5dc6f1fe92179244ae56be0a4a70b0ea4ab7d03de9630a511a97e98b92eeacfc85d69841fde03738af0550b3ecd7b5d4dd2d512d5db529abef4969d94d827e4977b4c73b69c3d0f6a8941990c3819e3d3fc43d66af9c58ebee74045f522fe4b3182c696c0f51e91fa1e2d8a724c491a3ab6e4b2a8b31acdcfc8349c113a533526317c805a5f3b595ab0d88ef17de2d651f5e88f57fb9d6644718b4171da40e8c492d78007d4fe000d42d765fa515d230b96b377e2d7226114712", @ANYRES16=r3, @ANYBLOB="20002bbd7000fddbdf250c000000"], 0x14}, 0x1, 0x0, 0x0, 0x800}, 0x20004000) 07:21:34 executing program 1: socket$alg(0x26, 0x5, 0x0) r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x200000, 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000040)={0x1, [0x3]}, &(0x7f00000002c0)=0x6) write$apparmor_exec(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="6578656320657468312f5e7d776c616e3123009d594dbbe08a9422cf81e45b03c4d628f5f31803c228fd67e79c99117e0933d72ee6769ca5e69af04e15d1c504b39126ff747ba470eaa1c0e90db6b0c0ce32368978a83b2e8c3e4f56f063813671c8b98ea69e42d5d9d2cd3d1564391c41724514d98e7c8b15cc0a974a84fd372f89c63159d31e097be5890f6df7"], 0x13) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x400, 0x0) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r1, 0x84, 0x74, &(0x7f0000000480)=""/72, &(0x7f00000001c0)=0x48) socket$inet(0x2b, 0x1, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x0, 0x0) remap_file_pages(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x2000000, 0x20, 0x10020) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000300)='/dev/autofs\x00', 0x800, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(r3, 0xc02c564a, 0x0) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_GET(r2, &(0x7f0000000280)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000100)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8e2cf77e", @ANYRES16=r4, @ANYBLOB="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"], 0x108}}, 0x800) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) lsetxattr$security_selinux(&(0x7f0000000880)='./file0\x00', &(0x7f0000000400)='security.selinux\x00', &(0x7f0000000900)='system_u:object_r:auditctl_exec_t:s0\x00', 0x25, 0x1) r5 = getpgrp(0x0) setpriority(0x0, r5, 0xffff) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) msgget(0x1, 0x208) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)) 07:21:34 executing program 4: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:34 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @remote}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @random="e5ac78d4c7fd"}, 0x10) write(r2, &(0x7f0000000080)="2700000014000f3f00000000120f0a00110001001f750800560099ed4f0500000000000000000f", 0x138) 07:21:34 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)) r0 = getpgrp(0x0) syz_open_procfs(r0, &(0x7f0000000040)='net/llc\x00') pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video35\x00', 0x2, 0x0) write(r2, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, 0x0, 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 07:21:34 executing program 3: socket$alg(0x26, 0x5, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x400, 0x0) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000)=0x4, 0x4) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r0, 0x84, 0x74, &(0x7f0000000480)=""/72, &(0x7f00000001c0)=0x48) socket$inet(0x2b, 0x1, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x0, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000300)='/dev/autofs\x00', 0x800, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(r1, 0xc02c564a, 0x0) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) lsetxattr$security_selinux(&(0x7f0000000880)='./file0\x00', &(0x7f0000000400)='security.selinux\x00', &(0x7f0000000900)='system_u:object_r:auditctl_exec_t:s0\x00', 0x25, 0x1) r3 = getpgrp(0x0) setpriority(0x0, r3, 0xffff) fcntl$setpipe(r2, 0x407, 0x30) semget$private(0x0, 0xfffffffffffffffd, 0x15) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) msgget(0x1, 0x208) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:34 executing program 0: socket$alg(0x26, 0x5, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) lsetxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) setpriority(0x0, 0x0, 0xffff) semget$private(0x0, 0xfffffffffffffffd, 0x15) r0 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) ioctl$KVM_INTERRUPT(r0, 0x4004ae86, &(0x7f0000000000)=0x7fffffff) write$P9_RAUTH(r0, &(0x7f0000000040)={0x14, 0x67, 0x1, {0x80, 0x2, 0x1}}, 0x14) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000080)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:34 executing program 4: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:34 executing program 1: socket$alg(0x26, 0x5, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x400, 0x0) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r0, 0x84, 0x74, &(0x7f0000000480)=""/72, &(0x7f00000001c0)=0x48) socket$inet(0x2b, 0x1, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x0, 0x0) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000300)='/dev/autofs\x00', 0x800, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(r2, 0xc02c564a, 0x0) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_G_AUDIO(r1, 0x80345621, &(0x7f0000000000)) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) lsetxattr$security_selinux(&(0x7f0000000880)='./file0\x00', &(0x7f0000000400)='security.selinux\x00', &(0x7f0000000900)='system_u:object_r:auditctl_exec_t:s0\x00', 0x25, 0x1) r3 = getpgrp(0x0) setpriority(0x0, r3, 0xffff) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) msgget(0x1, 0x208) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:34 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video35\x00', 0x2, 0x0) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unlinkat(r1, &(0x7f0000000040)='./file0\x00', 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, 0x0, 0x0) setsockopt$sock_void(r1, 0x1, 0x24, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 07:21:34 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @remote}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @random="e5ac78d4c7fd"}, 0x10) write(r2, &(0x7f0000000080)="2700000014000f3f00000000120f0a00110001001f750800560099ed4f05000000000000000110", 0x138) 07:21:35 executing program 3: socket$alg(0x26, 0x5, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x400, 0x0) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r0, 0x84, 0x74, &(0x7f0000000800)=""/72, &(0x7f00000007c0)=0xfffffffffffffdf7) socket$inet(0x2b, 0x80007, 0xc6) openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x0, 0x0) rt_sigprocmask(0x0, &(0x7f0000000000)={0xfffffffffffffffd}, 0x0, 0x8) r1 = gettid() timer_create(0x0, &(0x7f0000000200)={0x0, 0x32, 0x4, @tid=r1}, &(0x7f0000000240)) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x1}, {0x0, 0xe4c}}, 0x0) r2 = signalfd4(0xffffffffffffffff, &(0x7f00000001c0)={0xfffffffffffffdb0}, 0x8, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_REGS(0xffffffffffffffff, 0x4090ae82, 0x0) read(r2, &(0x7f0000000080)=""/128, 0xae3f1a6) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000300)='/dev/autofs\x00', 0x800, 0x0) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000100)={0x0, 0x2}, &(0x7f0000000280)=0x8) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f00000002c0)={r4, 0x5e, 0x9, 0x100, 0x1, 0x4}, &(0x7f0000000340)=0x14) ioctl$VIDIOC_ENUM_FRAMESIZES(r3, 0xc02c564a, 0x0) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) r5 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) lsetxattr$security_selinux(&(0x7f0000000880)='./file0\x00', &(0x7f0000000400)='security.selinux\x00', &(0x7f00000003c0)='system_u:object_r:auditctl_exec_t:s0\x00', 0x25, 0x1) r6 = getpgrp(0x0) setpriority(0x0, r6, 0xffff) fcntl$setpipe(r5, 0x407, 0x30) semget$private(0x0, 0xfffffffffffffffd, 0x15) r7 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) renameat(r3, &(0x7f0000000000)='./file0\x00', r7, &(0x7f0000000040)='./file0\x00') msgget(0x1, 0x208) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz1\x00', 0x1ff) 07:21:35 executing program 4: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:35 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @remote}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @random="e5ac78d4c7fd"}, 0x10) write(r2, &(0x7f0000000080)="2700000014000f3f00000000120f0a00110001001f750800560099ed4f0500000000000000003f", 0x138) 07:21:35 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video35\x00', 0x2, 0x0) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 07:21:35 executing program 0: socket$alg(0x26, 0x5, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) lsetxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) setpriority(0x0, 0x0, 0xffff) semget$private(0x0, 0xfffffffffffffffd, 0x15) r0 = syz_open_dev$swradio(&(0x7f0000000200)='/dev/swradio#\x00', 0x0, 0x2) getsockopt$IP6T_SO_GET_INFO(r0, 0x29, 0x40, &(0x7f0000000240)={'mangle\x00'}, &(0x7f00000002c0)=0x54) r1 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) recvmsg$kcm(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000000)=""/39, 0x27}], 0x1, &(0x7f0000000080)=""/223, 0xdf}, 0x40) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:35 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x400, 0x0) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r1, 0x84, 0x74, &(0x7f0000000480)=""/72, &(0x7f00000001c0)=0x48) socket$inet(0x2b, 0x1, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x0, 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') sendmsg$IPVS_CMD_DEL_SERVICE(r1, &(0x7f00000002c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000280)={&(0x7f0000001940)=ANY=[@ANYBLOB="940000e430a9ef9e416f360794af81886fb5b8f501a09d9fb7d7f52e31a514eaada2e4225468b2e93347b80c1a1779f1f77a59020a9cbaf90b90", @ANYRES16=r2, @ANYBLOB="200128bd7000fddbdf2503000000080004000180000024000100080006006c630000080004004e2200000800020021000000080002003200000008000500a8000000540001000c0007000500000045db3f86080004004e24000008000800040000000800090078000000080009006800000008000b007369700008000900200000000c0007002c000000000000000800080006000000"], 0x9c}, 0x1, 0x0, 0x0, 0x8080}, 0x8044) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000300)='/dev/autofs\x00', 0x800, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(r3, 0xc02c564a, 0x0) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) lsetxattr$security_selinux(&(0x7f0000000880)='./file0\x00', &(0x7f0000000400)='security.selinux\x00', &(0x7f0000000900)='system_u:object_r:auditctl_exec_t:s0\x00', 0x25, 0x1) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000100)={0x0}, &(0x7f00000003c0)=0xc) perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x802a, 0x6, 0x3, 0xad6, 0x0, 0x430, 0x30120, 0x1, 0x401, 0xbb57, 0x4, 0x1, 0x642, 0x5d78, 0x25, 0x7ff, 0x2, 0x6, 0x3, 0x0, 0xc115, 0x1, 0x4, 0x3, 0x3, 0x3, 0xa59f, 0xd37, 0x6, 0x0, 0x7, 0x2, 0x3f, 0x8000, 0x3000000, 0x1000, 0x0, 0x400, 0x6, @perf_config_ext={0x1, 0x8}, 0x1204, 0xad, 0x3a, 0x7, 0x0, 0x1, 0x200}, r4, 0xe, r3, 0x8) r5 = getpgrp(0x0) setpriority(0x0, r5, 0xffff) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) msgget(0x2, 0x100000000000208) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getxattr(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)=@random={'osx.', 'sip\x00'}, &(0x7f0000000940)=""/4096, 0x1000) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:35 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video35\x00', 0x2, 0x0) write(r1, &(0x7f0000000340), 0x41395750) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 07:21:35 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @remote}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @random="e5ac78d4c7fd"}, 0x10) write(r2, &(0x7f0000000080)="2700000014000f3f00000000120f0a00110001001f750800560099ed4f05000000000000000040", 0x138) 07:21:35 executing program 4: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:35 executing program 0: socket$alg(0x26, 0x5, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) lsetxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) setpriority(0x0, 0x0, 0xffff) semget$private(0x0, 0xfffffffffffffffd, 0x15) r0 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) r1 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') sendmsg$NET_DM_CMD_START(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x9ac5b62928adf3b1}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, r1, 0x4, 0x70bd26, 0x25dfdbfb, {}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x20000000) [ 861.352520][ C0] net_ratelimit: 9 callbacks suppressed [ 861.352544][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 861.365640][ C0] protocol 88fb is buggy, dev hsr_slave_1 07:21:35 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @remote}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @random="e5ac78d4c7fd"}, 0x10) write(r2, &(0x7f0000000080)="2700000014000f3f00000000120f0a00110001001f750800560099ed4f05000000000000000060", 0x138) 07:21:35 executing program 3: socket$alg(0x26, 0x5, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x400, 0x0) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r0, 0x84, 0x74, &(0x7f0000000480)=""/72, &(0x7f00000001c0)=0x48) socket$inet(0x2b, 0x1, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x0, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000300)='/dev/autofs\x00', 0x800, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(r1, 0xc02c564a, 0x0) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) lsetxattr$security_selinux(&(0x7f0000000880)='./file0\x00', &(0x7f0000000400)='security.selinux\x00', &(0x7f0000000900)='system_u:object_r:auditctl_exec_t:s0\x00', 0x25, 0x1) r3 = getpgrp(0x0) setpriority(0x0, r3, 0xffff) fcntl$setpipe(r2, 0x407, 0x30) syz_open_procfs(r3, &(0x7f0000000000)='statm\x00') semget$private(0x0, 0xfffffffffffffffd, 0x15) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) msgget(0x1, 0x208) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:35 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video35\x00', 0x2, 0x0) write(r1, &(0x7f0000000340), 0x41395527) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000680)={0x6, 0x0, [{0xf000, 0xc4, &(0x7f0000000280)=""/196}, {0x0, 0x8c, &(0x7f0000000380)=""/140}, {0x0, 0x6c, &(0x7f0000000480)=""/108}, {0x10000, 0xe4, &(0x7f0000000500)=""/228}, {0x5002, 0x36, &(0x7f0000000040)=""/54}, {0x0, 0x57, &(0x7f0000000600)=""/87}]}) openat$nullb(0xffffffffffffff9c, &(0x7f0000000240)='/dev/nullb0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 07:21:35 executing program 0: socket$alg(0x26, 0x5, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xa3d) lsetxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) setpriority(0x0, 0x0, 0xffff) semget$private(0x0, 0xfffffffffffffffd, 0x15) r0 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) ioctl$PPPIOCDISCONN(r0, 0x7439) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000000c0)={r0, &(0x7f0000000000)="f1b5452985809712b3d7a4bebda36ef9b51bb6096c66126993291d8373b3eea31ad9fd0af85199e96f3927c388b9b1cf22bf71ed54d7f90bf9432d293d5ef0384e5d8e0a1e096bf4a9e23f77f85f967abc5444e5f20a80eee4d1d62f5faf1c9ca6735cf87dcef6c576535b39b0229cbbcfb72c7b0cc2c6ba5ad384770f0da5c2601bfcd770b0531a9e5e2c8c0f61df0f415497f086f2aa854eb63298ee188e7dd981b63a9009ef40cdb968184c37c259b6ae53530d952b81"}, 0x10) setsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f0000000100)={0x2}, 0x4) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) splice(r0, &(0x7f0000000140), r0, &(0x7f00000001c0), 0xa1, 0x9) io_setup(0x5, &(0x7f0000000200)) ioctl$PIO_FONTX(r0, 0x4b6c, &(0x7f0000000240)="21e6f2b6d6386f973f76a6cf94f30ec9c359f51c667b211b0403b8aff05ed5d0e0a3d9fe6abbb57057c8913f904f877e95bee2033311ec02a8c6c1cbed4a48e99d555ab8dfadc2007ddf5755f09a74c95a03068d5f80446dd2eaaea071aa787e56a8ccf0e7db67798560fa0619f8d524511627f65b76ae7a5137c8870af9e32a170567ba79f23c27238cf4fa0efa9e5b063fcff6fc56fd43a586b68e52612b2e7944db72ca880a34b775c20d4c124b29793956b1f8cbb8") 07:21:36 executing program 4: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\xef']) 07:21:36 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video35\x00', 0x2, 0x0) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000040)={0x1ff}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 07:21:36 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000280)={&(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000000940)="616ebc318187f076d0936deef39746ee3160794e512985cdee38e3d75736af89e1c06316fc5029edf63dec84d110dd5381e9d7271f899d57bd48da026e1cb1992b3a55e6297990195be62db86c8b673e25884e3a8ae84c267df31b6675bcdf0766ea66990db561aaf78f0fd864e535725160313d6997b4e037149c2b0e1d4291a5c4d8ddc06b7a8765dcb50b3e4cae5cc0abb50ee102ad776f5ba2a19dd50c15d9ab845f4682c5556565edf7cfea8aed6bf314a45356ea5efcd65e686ec90b1fce2739a133ab07e57c5718a24cddcfec1f9b0e4f", 0xd4, r0}, 0x68) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x400, 0x0) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r1, 0x84, 0x74, &(0x7f0000000480)=""/72, &(0x7f00000001c0)=0x48) socket$inet(0x2b, 0x1, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x0, 0x0) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000300)='/dev/autofs\x00', 0x800, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(r3, 0xc02c564a, 0x0) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) setsockopt$netlink_NETLINK_NO_ENOBUFS(r1, 0x10e, 0x5, &(0x7f0000000000)=0x3, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x8) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) lsetxattr$security_selinux(&(0x7f0000000880)='./file0\x00', &(0x7f0000000400)='security.selinux\x00', &(0x7f0000000900)='system_u:object_r:auditctl_exec_t:s0\x00', 0x25, 0x1) r4 = getpgrp(0x0) setpriority(0x0, r4, 0xffff) ioctl$DRM_IOCTL_GET_MAP(r2, 0xc0186404, &(0x7f0000000080)={&(0x7f0000ffd000/0x3000)=nil, 0x406a, 0x4, 0x2d, &(0x7f0000ffe000/0x2000)=nil, 0x5}) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clock_gettime(0x3, &(0x7f0000000040)) msgget(0x1, 0x208) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:36 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @remote}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @random="e5ac78d4c7fd"}, 0x10) write(r2, &(0x7f0000000080)="2700000014000f3f00000000120f0a00110001001f750800560099ed4f050000000000ffffff9e", 0x138) 07:21:36 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'sha384-ssse3\x00'}, 0x58) lsetxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) setpriority(0x0, 0x0, 0xffff) semget$private(0x0, 0xfffffffffffffffd, 0x15) r1 = syz_open_dev$sndpcmp(&(0x7f0000000100)='/dev/snd/pcmC#D#p\x00', 0x3ff, 0x105600) ioctl$TUNSETTXFILTER(r1, 0x400454d1, &(0x7f0000000140)={0x1, 0x1, [@empty]}) poll(&(0x7f00000000c0)=[{r0, 0x2}, {r0, 0x4020}, {r0, 0x1200}, {r0, 0x1c0}, {r0, 0x20}, {r0, 0x100}], 0x6, 0x5) r2 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) ioctl$KVM_HYPERV_EVENTFD(r2, 0x4018aebd, &(0x7f0000000080)={0x4, r2}) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:36 executing program 4: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r0 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x2, 0x301480) ioctl$SIOCGETLINKNAME(r0, 0x89e0, &(0x7f0000000040)={0x0, 0x2}) r1 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) setsockopt$SO_VM_SOCKETS_CONNECT_TIMEOUT(r1, 0x28, 0x6, &(0x7f00000000c0), 0x8) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:36 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video35\x00', 0x2, 0x0) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, 0x0, 0x0) syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x5, 0x230000) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 07:21:36 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @remote}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @random="e5ac78d4c7fd"}, 0x10) write(r2, &(0x7f0000000080)="2700000014000f3f00000000120f0a00110001001f750800560099ed4f05000000000000000ec0", 0x138) 07:21:36 executing program 3: socket$alg(0x26, 0x5, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x400, 0x0) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r0, 0x84, 0x74, &(0x7f0000000480)=""/72, &(0x7f00000001c0)=0x48) socket$inet(0x2b, 0x1, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x0, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000300)='/dev/autofs\x00', 0x800, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(r1, 0xc02c564a, 0x0) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RREAD(r0, &(0x7f0000000940)={0x100b, 0x75, 0x2, {0x1000, "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"}}, 0x100b) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) lsetxattr$security_selinux(&(0x7f0000000880)='./file0\x00', &(0x7f0000000400)='security.selinux\x00', &(0x7f0000000900)='system_u:object_r:auditctl_exec_t:s0\x00', 0x25, 0x1) r3 = getpgrp(0x0) setpriority(0x0, r3, 0xffff) fcntl$setpipe(r2, 0x407, 0x30) semget$private(0x0, 0xfffffffffffffffd, 0x15) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) msgget(0x1, 0x208) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:36 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video35\x00', 0x2, 0x0) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500)}], 0x1, 0x8) 07:21:36 executing program 0: r0 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x7e, 0x8440) setsockopt$ALG_SET_AEAD_AUTHSIZE(r0, 0x117, 0x5, 0x0, 0x4) r1 = socket$alg(0x26, 0x5, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) lsetxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) setpriority(0x0, 0x0, 0xffff) semget$private(0x0, 0xfffffffffffffffd, 0x15) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891b, &(0x7f0000000040)={'ipddp0\x00', {0x2, 0x4e21, @multicast2}}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000200)={{{@in6=@remote, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f0000000300)=0xe8) getresgid(&(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)=0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in=@dev, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@initdev}}, &(0x7f0000000400)=0xe8) lstat(&(0x7f00000005c0)='./file0\x00', &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000007c0)={{{@in=@dev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f00000008c0)=0xe8) stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='fuse\x00', 0x800, &(0x7f00000009c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xb000}, 0x2c, {'user_id', 0x3d, r2}, 0x2c, {'group_id', 0x3d, r3}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x1800}}, {@blksize={'blksize', 0x3d, 0x200}}], [{@fowner_lt={'fowner<', r4}}, {@euid_gt={'euid>', r5}}, {@context={'context', 0x3d, 'user_u'}}, {@fowner_eq={'fowner', 0x3d, r6}}, {@dont_appraise='dont_appraise'}, {@euid_eq={'euid', 0x3d, r7}}, {@smackfstransmute={'smackfstransmute', 0x3d, '!\x00'}}, {@smackfsroot={'smackfsroot'}}]}}) r8 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) ioctl$VIDIOC_S_CTRL(r8, 0xc008561c, &(0x7f00000000c0)={0xffffffff, 0x3f}) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet_sctp_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000080)={0x2, 0x8, 0x4, 0x1ff, 0x5, 0x0, 0x2, 0x1, 0x2, 0x1, 0x7}, 0xb) setsockopt$inet_sctp_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000000100)=@int=0x10b8, 0x4) dup2(r8, r0) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:36 executing program 4: r0 = dup(0xffffffffffffffff) ioctl$KVM_ASSIGN_DEV_IRQ(r0, 0x4040ae70, &(0x7f00000000c0)={0xc2, 0x800, 0x6, 0x400}) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r1 = shmget(0x0, 0x1000, 0x10, &(0x7f0000ffc000/0x1000)=nil) shmctl$SHM_STAT(r1, 0xd, &(0x7f0000000000)=""/150) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:36 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @remote}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @random="e5ac78d4c7fd"}, 0x10) write(r2, &(0x7f0000000080)="2700000014000f3f00000000120f0a00110001001f750800560099ed4f05000000000000000be9", 0x138) 07:21:36 executing program 5: r0 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x9e68, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000100)='/dev/null\x00', 0xd0c40, 0x0) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_CTL_IOCTL_TLV_READ(r0, 0xc008551a, &(0x7f0000000200)=ANY=[@ANYBLOB="06000000100000000800000002000000ffffff7f00000000"]) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40042406, &(0x7f0000000180)='\x00') openat$vim2m(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video35\x00', 0x2, 0x0) write(r4, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, 0x0, 0x0) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 07:21:37 executing program 1: socket$alg(0x26, 0x5, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x400, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f00000000c0)={0x0, 0x68, &(0x7f0000000040)=[@in={0x2, 0x4e21, @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6={0xa, 0x4e23, 0x7ff, @mcast2, 0x3f}, @in6={0xa, 0x4e23, 0xb3, @local, 0x4}, @in={0x2, 0x4e24, @remote}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x16}}]}, &(0x7f0000000100)=0xc) getsockopt$inet_sctp_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000000280)={r1, 0x2, 0xfffffffffffffffc, 0x80000000}, &(0x7f00000002c0)=0x10) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r0, 0x84, 0x74, &(0x7f0000000480)=""/72, &(0x7f00000001c0)=0x48) socket$inet(0x2b, 0x1, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x0, 0x0) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000300)='/dev/autofs\x00', 0x800, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(r3, 0xc02c564a, 0x0) sched_setaffinity(0x0, 0x3d65, &(0x7f0000000200)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) ioctl$TIOCGLCKTRMIOS(r0, 0x5456, &(0x7f0000000000)={0xfffffffffffffffe, 0x2, 0x7, 0x7, 0x14, 0x6, 0x81, 0x8, 0x1, 0x2, 0x5c4, 0x5}) lsetxattr$security_selinux(&(0x7f0000000880)='./file0\x00', &(0x7f0000000400)='security.selinux\x00', &(0x7f0000000900)='system_u:object_r:auditctl_exec_t:s0\x00', 0x25, 0x1) r4 = getpgrp(0x0) setpriority(0x0, r4, 0x3) getsockopt$TIPC_SRC_DROPPABLE(r2, 0x10f, 0x80, &(0x7f0000000500), &(0x7f0000000540)=0x4) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) r5 = syz_open_dev$swradio(&(0x7f0000000340)='/dev/swradio#\x00', 0x1, 0x2) getsockopt$inet6_buf(r5, 0x29, 0x2e, &(0x7f00000007c0)=""/174, &(0x7f0000000380)=0x300) msgget(0x1, 0x208) clone(0x40004007fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) setsockopt$IP_VS_SO_SET_EDIT(r3, 0x0, 0x483, &(0x7f00000003c0)={0x0, @multicast2, 0x4e23, 0x0, 'dh\x00', 0x4, 0x8001, 0x3a}, 0x2c) 07:21:37 executing program 0: socket$alg(0x26, 0x5, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) lsetxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) setpriority(0x0, 0x0, 0xffff) semget$private(0x0, 0xfffffffffffffffd, 0x15) r0 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000000)={0x0, 0x200, 0x1, [0x101]}, &(0x7f0000000040)=0xa) setsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000080)={r1, 0x2}, 0x8) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:37 executing program 4: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x80000, 0x0) syslog(0x4, &(0x7f00000003c0)=""/217, 0xd9) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000000040)={0x80000000, 0x102, "df0858c53453c81d1ffd15aba1623cc4ede2d7bc08fc03e4fb13dc607d6dc743", 0x0, 0x1, 0xffffffffffff8000, 0x4, 0x3, 0x7, 0xcf, 0x52, [0x11ee, 0x3, 0x4, 0x400]}) r1 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) dup3(r1, r0, 0x80000) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000280)={'erspan0\x00', &(0x7f00000001c0)=ANY=[@ANYBLOB="3500000000000000060000007f000001000000034e234e208100000000000000000000000000000000000000000000000000000000000000000000000000000000000000340000ac1414aaac1414bb4e204e24000000000000000000000000000000000000000000000000000000000032e8c2153d5b35000000000000000000000000000087e60000000000000000000000000000000000050009002911000000000000bd9477c100000000ff"]}) 07:21:37 executing program 3: socket$alg(0x26, 0x5, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x400, 0x0) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r0, 0x84, 0x74, &(0x7f0000000480)=""/72, &(0x7f00000001c0)=0x48) socket$inet(0x2b, 0x1, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x0, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000300)='/dev/autofs\x00', 0x800, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(r1, 0xc02c564a, 0x0) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$NBD_SET_TIMEOUT(r0, 0xab09, 0xffffffffffff0000) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) lsetxattr$security_selinux(&(0x7f0000000880)='./file0\x00', &(0x7f0000000400)='security.selinux\x00', &(0x7f0000000900)='system_u:object_r:auditctl_exec_t:s0\x00', 0x25, 0x1) r3 = getpgrp(0x0) setpriority(0x0, r3, 0xffff) openat$mixer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/mixer\x00', 0x80000, 0x0) fcntl$setpipe(r2, 0x407, 0x30) semget$private(0x0, 0xfffffffffffffffd, 0x15) open(&(0x7f0000000180)='./file0\x00', 0x94000, 0x1) msgget(0x1, 0x208) clone(0x1500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000000)={0x0, 0x8001, 0x1, 0x4d, 0x4, 0x4}, &(0x7f0000000040)=0x14) ioctl$sock_inet_SIOCRTMSG(r0, 0x890d, &(0x7f0000000280)={0x0, {0x2, 0x4e23, @remote}, {0x2, 0x4e22, @broadcast}, {0x2, 0x4e24, @empty}, 0x4, 0x0, 0x0, 0x0, 0x80000000, &(0x7f00000000c0)='team_slave_1\x00', 0xfff, 0x1, 0x4}) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r2, 0x84, 0x79, &(0x7f0000000080)={r4, 0x81, 0x200}, 0x8) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) socket$inet_sctp(0x2, 0x1, 0x84) 07:21:37 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @remote}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @random="e5ac78d4c7fd"}, 0x10) write(r2, &(0x7f0000000080)="2700000014000f3f00000000120f0a00110001001f750800560099ed4f050000000000fffffff0", 0x138) 07:21:37 executing program 5: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/sockstat6\x00') write$P9_RWALK(r0, &(0x7f0000000100)={0x23, 0x6f, 0x2, {0x2, [{0x84, 0x1, 0x2}, {0x81, 0x3, 0x2}]}}, 0x23) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video35\x00', 0x2, 0x0) write(r2, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, 0x0, 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) [ 862.951777][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 862.957939][ C1] protocol 88fb is buggy, dev hsr_slave_1 07:21:37 executing program 4: r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x7, 0x1) ioctl$RNDGETENTCNT(r0, 0x80045200, &(0x7f0000000040)) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000080)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='seurit\x00\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:37 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @remote}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @random="e5ac78d4c7fd"}, 0x10) write(r2, &(0x7f0000000080)="2700000014000f3f00000000120f0a00110001001f750800560099ed4f050000000000ffffffff", 0x138) 07:21:37 executing program 3: socket$alg(0x26, 0x5, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x400, 0x0) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r0, 0x84, 0x74, &(0x7f0000000480)=""/72, &(0x7f00000001c0)=0x48) socket$inet(0x2b, 0x1, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x0, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000300)='/dev/autofs\x00', 0x800, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(r1, 0xc02c564a, 0x0) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xffffffffffffff90) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r0, 0x800443d3, &(0x7f0000000000)={{0xfb7f, 0x4, 0x4, 0x6, 0xfffffffffffffffd, 0x9}, 0xfffffffffffffffe, 0x1, 0x101}) lsetxattr$security_selinux(&(0x7f0000000880)='./file0\x00', &(0x7f0000000400)='security.selinux\x00', &(0x7f0000000900)='system_u:object_r:auditctl_exec_t:s0\x00', 0x25, 0x1) r3 = getpgrp(0x0) setpriority(0x0, r3, 0xffff) fcntl$setpipe(r2, 0x407, 0x30) semget$private(0x0, 0xfffffffffffffffd, 0x15) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) msgget(0x1, 0x208) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:37 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x20001, 0x81) write$cgroup_type(r0, &(0x7f0000000040)='threaded\x00', 0x9) socket$alg(0x26, 0x5, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x400, 0x0) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r1, 0x84, 0x74, &(0x7f0000000480)=""/72, &(0x7f00000001c0)=0x48) socket$inet(0x2b, 0x1, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x0, 0x0) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000300)='/dev/autofs\x00', 0x800, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(r2, 0xc02c564a, 0x0) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) lsetxattr$security_selinux(&(0x7f0000000880)='./file0\x00', &(0x7f0000000400)='security.selinux\x00', &(0x7f0000000900)='system_u:object_r:auditctl_exec_t:s0\x00', 0x25, 0x1) r3 = getpgrp(0x0) setpriority(0x0, r3, 0xffff) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) msgget(0x1, 0x208) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) [ 863.191753][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 863.191770][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 863.197844][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 863.203817][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 863.216044][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 863.222722][ C0] protocol 88fb is buggy, dev hsr_slave_1 07:21:37 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84800) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcs\x00', 0x0, 0x0) ioctl$UDMABUF_CREATE_LIST(r1, 0x40087543, &(0x7f0000000200)={0x0, 0x5, [{r2, 0x0, 0x8000, 0x10000}, {r1, 0x0, 0x1000, 0xfffffffffffff000}, {r3, 0x0, 0xfffffffffffff000, 0xfffffffffffff000}, {r1, 0x0, 0x4000, 0x1000001000000}, {r2, 0x0, 0x101018000}]}) ioctl$TCSBRKP(r1, 0x5425, 0x81) pipe2$9p(&(0x7f0000000100), 0x4000) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video35\x00', 0x2, 0x0) write$P9_RMKNOD(r2, &(0x7f0000000280)={0x14, 0x13, 0x1, {0x8c, 0x0, 0x8}}, 0x14) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 07:21:37 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @remote}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @random="e5ac78d4c7fd"}, 0x10) write(r2, &(0x7f0000000080)="2700000014000f3f00000000120f0a00110001001f750800560099ed4f050000f0ffffffffffff", 0x138) 07:21:37 executing program 0: socket$alg(0x26, 0x5, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) lsetxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x0, 0x0) r1 = syz_open_dev$swradio(&(0x7f0000000040)='/dev/swradio#\x00', 0x0, 0x2) ioctl$VHOST_SET_VRING_CALL(r0, 0x4008af21, &(0x7f0000000080)={0x2, r1}) setpriority(0x0, 0x0, 0xffff) semget$private(0x0, 0xfffffffffffffffd, 0x15) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:37 executing program 4: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcs\x00', 0x40000, 0x0) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f00000001c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000280)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="1c0000007afc184d561cab0c72df4fe9878ae3d8da91d33e6073a65163eec021625c5fc2befd23359d523d95993bf3a5bb656fa6d9352c050afd2350fff37a1b6a3082dfc23f5e58dc61d3be9eb7187c8c2d532cebb761ac0719c288acbe5dc938ad8dec8d85b9a66e7ff0d50c874a41461391b016b452", @ANYRES16=r1, @ANYBLOB="00022abd7000fbdbdf25010000000800050005000000"], 0x1c}, 0x1, 0x0, 0x0, 0x8000}, 0x800) r2 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xcc, &(0x7f0000000000)={{0xa, 0x4e23, 0x2, @dev={0xfe, 0x80, [], 0x1f}, 0x4}, {0xa, 0x4e22, 0x5266, @loopback, 0xdd1}, 0x3, [0x4, 0x5, 0x2, 0x8, 0xe2, 0x7, 0x2, 0x8]}, 0x5c) clone(0x1000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$VIDIOC_S_TUNER(r2, 0x4054561e, &(0x7f0000000080)={0x40, "3617fa51d5e5b54d2bdaba46d0d9a56ca7ab036099d1fbe3ad93b2e03114ada9", 0x5, 0x1881, 0x8001, 0x9, 0x0, 0x2, 0x2, 0x4}) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) r3 = shmget$private(0x0, 0x2000, 0x78000082, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_STAT(r3, 0x2, &(0x7f0000000380)=""/153) 07:21:38 executing program 3: socket$alg(0x26, 0x5, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x400, 0x0) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r0, 0x84, 0x74, &(0x7f0000000480)=""/72, &(0x7f00000001c0)=0x337) socket$inet(0x2b, 0x1, 0x0) r1 = getpgrp(0x0) sched_setaffinity(r1, 0x8, &(0x7f0000000180)=0x9) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x0, 0x0) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000300)='/dev/autofs\x00', 0x800, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(r3, 0xc02c564a, 0x0) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext, 0x20000, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) lsetxattr$security_selinux(&(0x7f0000000880)='./file0\x00', &(0x7f0000000400)='security.selinux\x00', &(0x7f0000000900)='system_u:object_r:auditctl_exec_t:s0\x00', 0x25, 0x1) r5 = getpgrp(0x0) setpriority(0x0, r5, 0xffff) fcntl$setpipe(r4, 0x407, 0x30) ioctl$DRM_IOCTL_GET_MAGIC(r2, 0x80046402, &(0x7f00000000c0)=0x7fff) semget$private(0x0, 0xfffffffffffffffd, 0x15) r6 = open(&(0x7f0000000000)='./file0\x00', 0x40, 0x1) openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x802, 0x0) msgget(0x1, 0x208) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) ioctl$IMGETDEVINFO(r6, 0x80044944, &(0x7f0000000040)={0xff}) 07:21:38 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000400)='/dev/video35\x00', 0x2, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(&(0x7f0000000180)='/dev/midi#\x00', 0x5, 0x1) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000200)={0x3, 0x6, 0x1, 0x8, 0x28, 0x5, 0xffff, 0x7, 0x0}, &(0x7f0000000240)=0x20) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000280)={r1, 0xff, "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"}, &(0x7f00000003c0)=0x107) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, 0x0, 0x0) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000480)='/dev/zero\x00', 0x40800, 0x0) ioctl$IMHOLD_L1(r2, 0x80044948, &(0x7f0000000100)=0x5) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 07:21:38 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @remote}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @random="e5ac78d4c7fd"}, 0x10) write(r2, &(0x7f0000000080)="2700000014000f3f00000000120f0a00110001001f750800560099ed4f05000002000000000000", 0x138) 07:21:38 executing program 4: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) r0 = perf_event_open(&(0x7f00000000c0)={0x4, 0x70, 0x800, 0x5, 0x0, 0xd96, 0x0, 0x3f8, 0x8000, 0x0, 0xfffffffffffffff7, 0x3, 0xb16, 0x9, 0xffffffffffffffe0, 0x7f, 0x9, 0xffff, 0x1, 0x101, 0xbfb, 0x2, 0x40, 0x3ff, 0x8000, 0x400, 0x1, 0x100, 0x3, 0x4, 0x3, 0x2, 0x5, 0x2, 0x800000, 0x20, 0x1000, 0x5, 0x0, 0x5, 0x4, @perf_bp={&(0x7f0000000080)}, 0x10480, 0x5, 0x8, 0x7, 0x3, 0x10000, 0x4}, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x8) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f00000001c0)={&(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000c00000/0x400000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000e63000/0x2000)=nil, &(0x7f0000ec7000/0x1000)=nil, &(0x7f0000000000)="3ad4886594240e399c1dbc6be5077f9bda3851830a329ba0e7ef6579b14d6b8635e4cb95bab38f556e733f55bc38aad4bc803a1e2486fb0957682ae90e903d9f859d19da77c51eac99fc1f1c74939594caed69b9601414af019b3213d90846e6728f5e6bf49d1623", 0x68, r0}, 0x68) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000140)={0x9, 0x7, 0xb000}, 0x4) getresgid(&(0x7f0000000240), &(0x7f0000000280)=0x0, &(0x7f00000002c0)) lstat(&(0x7f0000000300)='\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f00000003c0)={0x0, 0x0, 0x0}, &(0x7f0000000400)=0xc) setresgid(r2, r3, r4) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:38 executing program 1: socket$alg(0x26, 0x5, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x400, 0x0) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r0, 0x84, 0x74, &(0x7f0000000480)=""/72, &(0x7f00000001c0)=0x48) socket$inet(0x2b, 0x1, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x0, 0x0) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000300)='/dev/autofs\x00', 0x800, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(r2, 0xc02c564a, 0x0) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') sendmsg$TIPC_NL_NET_SET(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000080)={&(0x7f0000000940)={0x1c0, r3, 0x400, 0x1, 0x25dfdbfe, {}, [@TIPC_NLA_SOCK={0x2c, 0x2, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x100}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x91e8}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x101}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_SOCK={0x2c, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x7fff}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x10001}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x2}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x1}]}, @TIPC_NLA_BEARER={0xe4, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0xfffffffffffeffff}, @TIPC_NLA_BEARER_PROP={0x14, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0xd4}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x11}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e20, 0x400, @rand_addr="6b51ebb8028e73dbd82de8621502c1b4", 0xab}}, {0x20, 0x2, @in6={0xa, 0x4e21, 0x8, @dev={0xfe, 0x80, [], 0x10}, 0x8001}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e24, @empty}}, {0x14, 0x2, @in={0x2, 0x4e20, @loopback}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e21, 0x9, @local, 0x7}}, {0x20, 0x2, @in6={0xa, 0x4e23, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x7}}}}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz2\x00'}]}, @TIPC_NLA_BEARER={0x70, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e21, @loopback}}, {0x20, 0x2, @in6={0xa, 0x4e23, 0xfcc, @rand_addr="6e487ba45dc866c01ae400a9b05a002b"}}}}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'ib', 0x3a, 'erspan0\x00'}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x10001}, @TIPC_NLA_BEARER_PROP={0xc, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}]}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz1\x00'}]}]}, 0x1c0}, 0x1, 0x0, 0x0, 0x80}, 0x4004001) lsetxattr$security_selinux(&(0x7f0000000880)='./file0\x00', &(0x7f0000000400)='security.selinux\x00', &(0x7f0000000900)='system_u:object_r:auditctl_exec_t:s0\x00', 0x25, 0x1) r4 = getpgrp(0x0) setpriority(0x0, r4, 0xffff) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) msgget(0x1, 0x208) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:38 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000180)='/dev/video35\x00', 0x2, 0x0) write(r1, &(0x7f0000000340), 0x41395527) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000000}, 0x0, 0x0) ioctl$KDGKBTYPE(r2, 0x4b33, &(0x7f0000000040)) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 07:21:38 executing program 0: socket$alg(0x26, 0x5, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) lsetxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) setpriority(0x0, 0x0, 0xffff) semget$private(0x0, 0xfffffffffffffffd, 0x15) r0 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) ioctl$CAPI_REGISTER(r0, 0x400c4301, &(0x7f0000000000)={0x3, 0x7f, 0xe0}) 07:21:38 executing program 3: socket$alg(0x26, 0x5, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x400, 0x0) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r0, 0x84, 0x74, &(0x7f0000000480)=""/72, &(0x7f00000001c0)=0x48) socket$inet(0x2b, 0x1, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x0, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000300)='/dev/autofs\x00', 0x800, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(r1, 0xc02c564a, 0x0) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xffffffffffffff96) lsetxattr$security_selinux(&(0x7f0000000880)='./file0\x00', &(0x7f0000000400)='security.selinux\x00', &(0x7f0000000900)='system_u:object_r:auditctl_exec_t:s0\x00', 0x25, 0x1) r3 = getpgrp(0x0) setpriority(0x0, r3, 0xffff) fcntl$setpipe(r2, 0x407, 0x30) semget$private(0x0, 0xfffffffffffffffd, 0x15) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) msgget(0x1, 0x208) ioctl$LOOP_SET_DIRECT_IO(r1, 0x4c08, 0x80000000) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:38 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @remote}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @random="e5ac78d4c7fd"}, 0x10) write(r2, &(0x7f0000000080)="2700000014000f3f00000000120f0a00110001001f750800560099ed4f05000004000000000000", 0x138) 07:21:38 executing program 4: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x105000, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000000, 0x30, r0, 0x10000000) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) r1 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000080)="8a915609126506f960d07770105667d229b72f7788383329398e3e6895e50a1d0d10e508733214a30298d74c5259e89d6fcad1c38e025aa5e95d01ca6ca7a85b84aed204381387bcb15f188287845cc6ac748bdfd642aaa9b571aafec0f6f04c1425539293ee2e49f610ea8f9472796f8d9898564e52f89a7374f4daa6ed83c7511ccd88872b5d7afe1df005856a0933e80795520f72e344401a1fa8c75d2ea139c0accab4fd1c15775f236aee740b072de4ab9ebffebde34d7051f0f284c8d2b017c79693fee2e0d1fd394aa05ea89680d91972dfce4b6eca092ea474657ad70a963bcae704af62bb3b7c00d6167dc954", 0xf1, 0xffffffffffffffff) keyctl$setperm(0x5, r1, 0x110000) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:38 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video35\x00', 0x2, 0x0) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r0) 07:21:38 executing program 0: socket$alg(0x26, 0x5, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) lsetxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f00000001c0)={0x8, &(0x7f0000000140)=[{0xcd6b, 0x8db, 0x1, 0x81}, {0x43, 0x3f, 0x0, 0x5}, {0x1, 0xff, 0xe3, 0x9}, {0x338, 0xa44, 0x1}, {0x8, 0x1000, 0x80000001, 0xd3}, {0x9, 0x65, 0x7, 0x1}, {0x7, 0x80000000, 0x3, 0x80000001}, {0x1, 0x4, 0x9, 0x3}]}, 0x8) setpriority(0x0, 0x0, 0xffff) semget$private(0x0, 0xfffffffffffffffd, 0x15) r1 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) fsetxattr$security_smack_entry(r1, &(0x7f0000000000)='security.SMACK64IPIN\x00', &(0x7f0000000040)='wlan1\x00', 0x6, 0x3) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) r2 = getpgrp(0x0) ptrace(0x10, r2) setxattr$trusted_overlay_redirect(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='trusted.overlay.redirect\x00', &(0x7f0000000100)='./file0\x00', 0x8, 0x2) 07:21:38 executing program 4: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x200, 0x0) fcntl$setpipe(r0, 0x407, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) dup(r1) 07:21:38 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @remote}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @random="e5ac78d4c7fd"}, 0x10) write(r2, &(0x7f0000000080)="2700000014000f3f00000000120f0a00110001001f750800560099ed4f0500000a000000000000", 0x138) 07:21:38 executing program 1: socket$alg(0x26, 0x5, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x400, 0x0) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r0, 0x84, 0x74, &(0x7f0000000480)=""/72, &(0x7f00000001c0)=0x48) socket$inet(0x2b, 0x1, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x0, 0x0) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000300)='/dev/autofs\x00', 0x800, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(r2, 0xc02c564a, 0x0) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETVERSION(r3, 0x40047602, &(0x7f0000000000)=0x100) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) lsetxattr$security_selinux(&(0x7f0000000880)='./file0\x00', &(0x7f0000000400)='security.selinux\x00', &(0x7f0000000900)='system_u:object_r:auditctl_exec_t:s0\x00', 0x25, 0x1) r4 = getpgrp(0x0) ioctl$VIDIOC_DBG_G_REGISTER(r0, 0xc0385650, &(0x7f0000000040)={{0x0, @name="34e0d1da1ec2f2ee75d1bc3f8a019d62fa965dd931941c85d2bdb282ef179fe0"}, 0x8, 0x3, 0x9}) setpriority(0x0, r4, 0xffff) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) msgget(0x1, 0x208) ioctl$SG_SET_RESERVED_SIZE(r1, 0x2275, &(0x7f0000000080)) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:39 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)) pipe(&(0x7f0000000440)={0xffffffffffffffff}) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video35\x00', 0x2, 0x0) write(r0, &(0x7f0000000040), 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) pipe(&(0x7f0000000040)) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000000200)={0xc0000000, 0x10d, "4705ddfa5e65a6fce7ed7e941aa2c57b33ac0dda444be410f0a7e9568d13bfec", 0x7, 0xd4, 0x6, 0x1ff, 0x9, 0x5, 0x5, 0x20, [0x4, 0x10000, 0x7, 0x1]}) 07:21:39 executing program 4: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) r0 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0xc07, 0x40000) fcntl$setpipe(r0, 0x407, 0x13) r1 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x65, &(0x7f0000000000)=0x400, 0x4) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000080)=[&(0x7f0000000640)='\x00', &(0x7f0000000740)='!\x00']) 07:21:39 executing program 0: socket$alg(0x26, 0x5, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) lsetxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) setpriority(0x0, 0x0, 0xffff) semget$private(0x0, 0xfffffffffffffffd, 0x15) r0 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$KVM_SET_USER_MEMORY_REGION(r0, 0x4020ae46, &(0x7f0000000000)={0x1ff, 0x2, 0x0, 0x2000, &(0x7f0000ffe000/0x2000)=nil}) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:39 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @remote}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @random="e5ac78d4c7fd"}, 0x10) write(r2, &(0x7f0000000080)="2700000014000f3f00000000120f0a00110001001f750800560099ed4f0500000e000000000000", 0x138) 07:21:39 executing program 3: socket$alg(0x26, 0x5, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x400, 0x0) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r0, 0x84, 0x74, &(0x7f0000000480)=""/72, &(0x7f00000001c0)=0x48) socket$inet(0x2b, 0x1, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x0, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000300)='/dev/autofs\x00', 0x800, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(r1, 0xc02c564a, 0x0) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) lsetxattr$security_selinux(&(0x7f0000000880)='./file0\x00', &(0x7f0000000400)='security.selinux\x00', &(0x7f0000000900)='system_u:object_r:auditctl_exec_t:s0\x00', 0x25, 0x1) r3 = getpgrp(0x0) setpriority(0x0, r3, 0xffff) fcntl$setpipe(r2, 0x407, 0x30) semget$private(0x0, 0xfffffffffffffffd, 0x15) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) msgget(0x1, 0x208) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000080), &(0x7f0000000780)=[&(0x7f0000000040)='\x00'/12, &(0x7f0000000740)='!\x00']) 07:21:39 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @remote}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @random="e5ac78d4c7fd"}, 0x10) write(r2, &(0x7f0000000080)="2700000014000f3f00000000120f0a00110001001f750800560099ed4f0500000f000000000000", 0x138) 07:21:39 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video35\x00', 0x2, 0x0) statx(r1, &(0x7f0000000200)='./file0\x00', 0x400, 0x0, &(0x7f0000000240)) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDSKBMETA(r0, 0x4b63, &(0x7f0000000380)=0x4) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) getsockname$packet(r1, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000100)=0x14) setsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000000180)={r2, @empty, @broadcast}, 0xc) setsockopt$inet6_tcp_TLS_RX(r1, 0x6, 0x2, &(0x7f0000000340)=@gcm_256={{0x303}, "38d38126ea4ee263", "c23ee51d8231455cb9a6b813709a668f03a5e0723ca706f20f71d44cd57508ea", "55ca2d6f", "081826112b07cb15"}, 0x38) 07:21:39 executing program 1: socket$alg(0x26, 0x5, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x400, 0x0) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r0, 0x84, 0x74, &(0x7f0000000480)=""/72, &(0x7f00000001c0)=0x48) socket$inet(0x2b, 0xaba2a35996307ff2, 0x8000) openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x0, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000300)='/dev/autofs\x00', 0x800, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(r1, 0xc02c564a, 0x0) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) lsetxattr$security_selinux(&(0x7f0000000880)='./file0\x00', &(0x7f0000000400)='security.selinux\x00', &(0x7f0000000000)='system_u:object_r:auditctl_exec_t:s0\x00', 0x25, 0x1) r2 = getpgrp(0x0) setpriority(0x0, r2, 0xffff) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) msgget(0x1, 0x208) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:39 executing program 4: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xa7c537c34bf53d4f) openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x200a00, 0x12) fcntl$setpipe(r0, 0x407, 0xffffffffffffffec) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:39 executing program 0: socket$alg(0x26, 0x5, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) lsetxattr$security_selinux(0x0, 0x0, 0x0, 0x3c5, 0x3) setpriority(0x0, 0x0, 0xffff) semget$private(0x0, 0xfffffffffffffffd, 0x15) r0 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) getsockopt$IP6T_SO_GET_ENTRIES(r0, 0x29, 0x41, &(0x7f0000000000)={'nat\x00', 0xb0, "b6c2d5ebd49ad38382fb52a790ecdc53d4e814c2d2e2e2c8b353a2062a9af290dc1ccbbbf33c190fcd18dc12cfc57a3fca1046f78f4d488b093025a4c41de5a3e16a5139f7e99161c85210f3e5eded6f717cf20fb983c2ac72386b5855821d01caf29792649bc91b35fadb29e18eb7accd277ccc80c4cc4e745fbba5f020a28384c72f9f4147f813764e8a1d8c4623ed7ffd7476056d23b6a36ba161fb7159e3dc00e33baee1e11e8077b3c18deace92"}, &(0x7f0000000100)=0xd4) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:39 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @remote}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @random="e5ac78d4c7fd"}, 0x10) write(r2, &(0x7f0000000080)="2700000014000f3f00000000120f0a00110001001f750800560099ed4f05000060000000000000", 0x138) 07:21:39 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video35\x00', 0x2, 0x0) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, 0x0, 0x0) syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0xfffffffffffffff9, 0x141080) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 07:21:39 executing program 4: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0xc0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:39 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x400, 0x0) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r0, 0x84, 0x74, &(0x7f0000000280)=""/72, &(0x7f00000001c0)=0xfe69) ioctl$UFFDIO_WAKE(r1, 0x8010aa02, &(0x7f0000000100)={&(0x7f0000ffc000/0x1000)=nil, 0x1000}) socket$inet(0x2b, 0x1, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x0, 0x0) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000300)='/dev/autofs\x00', 0x800, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(r3, 0xc02c564a, 0x0) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x200, 0x0) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) lsetxattr$security_selinux(&(0x7f0000000880)='./file0\x00', &(0x7f0000000400)='security.selinux\x00', &(0x7f0000000900)='system_u:object_r:auditctl_exec_t:s0\x00', 0x25, 0x1) r5 = gettid() write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000040)={0xffffffffffffffff}, 0x117, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r2, &(0x7f00000000c0)={0x4, 0x8, 0xfa00, {r6, 0x5}}, 0x10) r7 = getpgrp(r5) setpriority(0x0, r7, 0xffff) fcntl$setpipe(r4, 0x407, 0x30) semget$private(0x0, 0xfffffffffffffffd, 0x15) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) msgget(0x0, 0x100) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:39 executing program 1: socket$alg(0x26, 0x5, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x400, 0x0) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r0, 0x84, 0x74, &(0x7f0000000480)=""/72, &(0x7f00000001c0)=0x48) socket$inet(0x2b, 0x1, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x0, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000300)='/dev/autofs\x00', 0x800, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(r1, 0xc02c564a, 0x0) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) lsetxattr$security_selinux(&(0x7f0000000880)='./file0\x00', &(0x7f0000000400)='security.selinux\x00', &(0x7f0000000900)='system_u:object_r:auditctl_exec_t:s0\x00', 0x25, 0x1) r2 = getpgrp(0x0) setpriority(0x0, r2, 0xffff) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) msgget(0x1, 0x208) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000000)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:40 executing program 0: socket$alg(0x26, 0x5, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) lsetxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) setpriority(0x0, 0x0, 0xffff) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/ip_mr_vif\x00') accept4$inet(r0, &(0x7f0000000040)={0x2, 0x0, @multicast2}, &(0x7f0000000080)=0x10, 0x80800) semget$private(0x0, 0xfffffffffffffffd, 0x15) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:40 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @remote}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @random="e5ac78d4c7fd"}, 0x10) write(r2, &(0x7f0000000080)="2700000014000f3f00000000120f0a00110001001f750800560099ed4f050000f0000000000000", 0x138) 07:21:40 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video35\x00', 0x2, 0x0) write(r1, &(0x7f0000000480)="213f75ad6f7ae39016096dc51d2ea709fc54f7de9aa75c9409296dff3287dd949968325b454f64dddb644d3dafbe7e3079e6c1963f815c5d5a9bf9500371131413d4fed24972f9238724ff554efa56cd872fa88936834c40", 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={r1, 0xc0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=0x27d0, 0x0, 0x0, 0x0, &(0x7f0000000200)={0x4, 0x4}, 0x0, 0x0, &(0x7f0000000240)={0x4, 0xe, 0x6, 0x100000000}, &(0x7f0000000280)=0x3f, 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=0x4}}, 0x10) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000000040), &(0x7f0000000100)=0x4) prctl$PR_GET_SPECULATION_CTRL(0x34, 0x0, 0x2) 07:21:40 executing program 4: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000000)={0xffffffffffffffff}, 0x106, 0xe}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000080)={0x13, 0x10, 0xfa00, {&(0x7f00000001c0), r1, 0x2}}, 0x18) fchmod(r0, 0x0) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:40 executing program 3: socket$alg(0x26, 0x5, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x400, 0x0) openat$vimc2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video2\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r0, 0x84, 0x74, &(0x7f0000000480)=""/72, &(0x7f00000001c0)=0x48) socket$inet(0x2b, 0x1, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x0, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000300)='/dev/autofs\x00', 0x800, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(r0, 0xc02c564a, 0x0) semget$private(0x0, 0x4, 0x2) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) lsetxattr$security_selinux(&(0x7f0000000880)='./file0\x00', &(0x7f0000000400)='security.selinux\x00', &(0x7f0000000900)='system_u:object_r:auditctl_exec_t:s0\x00', 0x25, 0x1) r2 = getpgrp(0x0) setpriority(0x0, r2, 0xffff) fcntl$setpipe(r1, 0x407, 0x30) semget$private(0x0, 0xfffffffffffffffd, 0x15) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) msgget(0x1, 0x208) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$alg(0x26, 0x5, 0x0) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:40 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video35\x00', 0x2, 0x0) write(r1, &(0x7f0000000340), 0x41395527) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) vmsplice(r2, &(0x7f0000000100)=[{&(0x7f0000000040)="f90b67ebe905d0bc616a38778b2f4256787128ab19208fa179", 0x19}], 0x1, 0x4) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 07:21:40 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @remote}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @random="e5ac78d4c7fd"}, 0x10) write(r2, &(0x7f0000000080)="2700000014000f3f00000000120f0a00110001001f750800560099ed4f05000010010000000000", 0x138) 07:21:40 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video35\x00', 0x2, 0x0) write(r1, &(0x7f0000000040)="f67c18348b40ff035de96f3e8efd70bc31b2132d9e150c44db70c05a31c41b422cd8ea645982cdafcce968edf4de6ea16c70f1c12e63e437", 0x38) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 07:21:40 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) lsetxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) setpriority(0x0, 0x0, 0xffff) semget$private(0x0, 0xfffffffffffffffd, 0x15) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000040)=0xc) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/btrfs-control\x00', 0x101000, 0x0) write$evdev(r2, &(0x7f0000000100)=[{{0x0, 0x7530}, 0x3, 0x45f0c4b, 0x80000000}, {{}, 0x0, 0x1, 0x6}, {{0x0, 0x7530}, 0x17, 0x7fffffff, 0x6}], 0x30) sched_getparam(r1, &(0x7f0000000080)) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) ioctl$KVM_SET_MP_STATE(r2, 0x4004ae99, &(0x7f0000000140)=0x3) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:40 executing program 4: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) llistxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=""/126, 0x7e) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:40 executing program 1: socket$alg(0x26, 0x5, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x400, 0x0) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r0, 0x84, 0x74, &(0x7f0000000480)=""/72, &(0x7f00000001c0)=0x48) socket$inet(0x2b, 0x1, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x0, 0x0) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000300)='/dev/autofs\x00', 0x800, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(r2, 0xc02c564a, 0x0) r3 = fcntl$getown(r1, 0x9) sched_setaffinity(r3, 0x8, &(0x7f0000000000)=0x7) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) lsetxattr$security_selinux(&(0x7f0000000880)='./file0\x00', &(0x7f0000000400)='security.selinux\x00', &(0x7f0000000900)='system_u:object_r:auditctl_exec_t:s0\x00', 0x25, 0x1) r4 = getpgrp(0x0) setpriority(0x0, r4, 0xffff) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) msgget(0x1, 0x208) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:40 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @remote}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @random="e5ac78d4c7fd"}, 0x10) write(r2, &(0x7f0000000080)="2700000014000f3f00000000120f0a00110001001f750800560099ed4f050000000a0000000000", 0x138) 07:21:40 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video35\x00', 0x2, 0x0) r2 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r2, &(0x7f0000000040), 0x10) setsockopt$inet_tcp_TLS_TX(r2, 0x6, 0x1, &(0x7f0000000680)=@gcm_256={{}, "26ea4efffaca7e36", "aa2d4550a9d8bbfa74e4f109732083fea3b80f29afcc8de93de4f6b01a7ce9e5", "42eac279", "26d90593e59bef3b"}, 0x38) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x100000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffc) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) getsockopt$inet_sctp_SCTP_RECVNXTINFO(r0, 0x84, 0x21, &(0x7f0000000080), &(0x7f0000000100)=0x4) ioctl$NBD_SET_BLKSIZE(r0, 0xab01, 0x270) 07:21:40 executing program 1: socket$alg(0x26, 0x5, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x400, 0x0) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r0, 0x84, 0x74, &(0x7f0000000480)=""/72, &(0x7f00000001c0)=0x48) socket$inet(0x2b, 0x1, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x0, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000300)='/dev/autofs\x00', 0x800, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(r1, 0xc02c564a, 0x0) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) lsetxattr$security_selinux(&(0x7f0000000880)='./file0\x00', &(0x7f0000000400)='security.selinux\x00', &(0x7f0000000900)='system_u:object_r:auditctl_exec_t:s0\x00', 0x25, 0x1) r2 = getpgrp(0x0) setpriority(0x0, r2, 0xffff) r3 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) ioctl$VIDIOC_G_FBUF(r3, 0x802c560a, &(0x7f0000000080)={0x0, 0x23, &(0x7f0000000000)="9097e014a37b0b183694943dafe49572a30730b1ed8724566b840ed9d2c6441d4e9620e43dfef799429431b383ab935aee72d45d3ceb7dc89e8613a76783c59e6d5e5c646f2fbbc5dfb03ecc56f24dd36465282d5e1d602a1a8abbf9208e96d2868f827be0a6d06e96405aa7e53aee45ca9c83382e4a9c941b203ded368577", {0x4, 0x3, 0x59455247, 0x6, 0x10000, 0x7, 0xf}}) msgget(0x1, 0x208) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:40 executing program 3: socket$alg(0x26, 0x5, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x400, 0x0) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r0, 0x84, 0x74, &(0x7f0000000480)=""/72, &(0x7f00000001c0)=0x48) socket$inet(0x2b, 0x1, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x0, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000300)='/dev/autofs\x00', 0x800, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(r1, 0xc02c564a, 0x0) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) lsetxattr$security_selinux(&(0x7f0000000880)='./file0\x00', &(0x7f0000000400)='security.selinux\x00', &(0x7f0000000900)='system_u:object_r:auditctl_exec_t:s0\x00', 0x25, 0x1) r3 = getpgrp(0x0) setpriority(0x0, r3, 0xffff) fcntl$setpipe(r2, 0x407, 0x30) semget$private(0x0, 0xfffffffffffffffd, 0x15) r4 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) msgget(0x1, 0x208) ioctl$TIOCSTI(r4, 0x5412, 0x3) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:40 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) lsetxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000000)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x2, &(0x7f0000000040)='!\x00', 0xffffffffffffffff}, 0x30) setpriority(0xfffffffffffffffc, r1, 0x9) semget$private(0x0, 0xfffffffffffffffd, 0x15) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:41 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @remote}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @random="e5ac78d4c7fd"}, 0x10) write(r2, &(0x7f0000000080)="2700000014000f3f00000000120f0a00110001001f750800560099ed4f050000e90b0000000000", 0x138) 07:21:41 executing program 4: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) setsockopt$inet_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000000)=0xef6, 0x4) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:41 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video35\x00', 0x2, 0x0) write(r1, &(0x7f0000000040), 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x203}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 07:21:41 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @remote}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @random="e5ac78d4c7fd"}, 0x10) write(r2, &(0x7f0000000080)="2700000014000f3f00000000120f0a00110001001f750800560099ed4f050000000e0000000000", 0x138) 07:21:41 executing program 4: fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r0 = add_key(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vsock\x00', 0x204080, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') sendmsg$TIPC_CMD_GET_REMOTE_MNG(r1, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x1c, r2, 0x200, 0x70bd25, 0x25dfdbfd, {}, ["", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000814}, 0x4000000) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, r0) r3 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x141300, 0x0) ioctl$PIO_UNISCRNMAP(r3, 0x4b6a, &(0x7f00000001c0)="c01695ebdd44aa34edef8554f4386a94be44987603abe42e333db7dc5757a778122b57d8f0e5faf435990534894392f6ca76d16eeee6340c735cf933dff2aa45589ff8501e35ceda301112b7e9d8567dd4153f0f638a4c755110a17b373b69d82f6869d49d6ffc04c57fa83ff3dd017d2370afda6c2d3088725b35713fa552f4c3a1a57bfd72f25e03ab5dc83ac1dc5762ad52dfb1a4eb71e88a7959aa3bdd770b84cb2f3c52f636ebeaf90b8a2da495b75b5347ad0ed82eb3fbf5cd46fe7b7b1e52a5b52430b809226229a9efe0a7554c44") open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:41 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) lsetxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) setpriority(0x0, 0x0, 0xffff) semget$private(0x0, 0xfffffffffffffffd, 0x15) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) syncfs(r0) [ 867.111750][ C1] net_ratelimit: 7 callbacks suppressed [ 867.111758][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 867.124246][ C1] protocol 88fb is buggy, dev hsr_slave_1 07:21:41 executing program 1: socket$alg(0x26, 0x5, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x400, 0x0) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r0, 0x84, 0x74, &(0x7f0000000480)=""/72, &(0x7f00000001c0)=0x48) socket$inet(0x2b, 0x1, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x0, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000300)='/dev/autofs\x00', 0x800, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(r1, 0xc02c564a, 0x0) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) lsetxattr$security_selinux(&(0x7f0000000880)='./file0\x00', &(0x7f0000000400)='security.selinux\x00', &(0x7f0000000900)='system_u:object_r:auditctl_exec_t:s0\x00', 0x25, 0x1) r2 = getpgrp(0x0) setpriority(0x0, r2, 0xffff) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) msgget(0x1, 0x414) clone(0x40000004, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:41 executing program 4: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$MON_IOCT_RING_SIZE(r0, 0x9204, 0xe73d3) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000000)={{{@in=@loopback, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) getresgid(&(0x7f0000000140)=0x0, &(0x7f00000001c0), &(0x7f0000000200)) fchown(r0, r1, r2) 07:21:41 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @remote}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @random="e5ac78d4c7fd"}, 0x10) write(r2, &(0x7f0000000080)="2700000014000f3f00000000120f0a00110001001f750800560099ed4f050000c00e0000000000", 0x138) 07:21:41 executing program 3: socket$alg(0x26, 0x5, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x400, 0x0) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r0, 0x84, 0x74, &(0x7f0000000480)=""/72, &(0x7f00000001c0)=0x48) socket$inet(0x2b, 0x1, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x0, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000300)='/dev/autofs\x00', 0x800, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(r1, 0xc02c564a, 0x0) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000880)='./file0\x00', &(0x7f0000000400)='security.selinux\x00', &(0x7f0000000900)='system_u:object_r:auditctl_exec_t:s0\x00', 0x25, 0x1) r3 = getpgrp(0x0) setpriority(0x0, r3, 0xffff) fcntl$setpipe(r2, 0x407, 0x30) semget$private(0x0, 0xfffffffffffffffd, 0x15) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) msgget(0x1, 0x208) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:41 executing program 0: socket$alg(0x26, 0x5, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VIDIOC_ENUM_DV_TIMINGS(r1, 0xc0945662, &(0x7f0000000080)={0x80, 0x0, [], {0x0, @bt={0x83, 0x8, 0x1, 0x2, 0x1, 0x400, 0x1, 0x100000001, 0xffff, 0x590, 0xe3e, 0x7f, 0x1000, 0x4, 0x4, 0x2}}}) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xb3) lsetxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_group_source_req(r2, 0x0, 0x2e, &(0x7f0000000140)={0x2, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @remote}}}, 0x108) setsockopt$inet_group_source_req(r2, 0x0, 0x2e, &(0x7f0000000000)={0x1, {{0x2, 0x0, @multicast1}}}, 0x108) setsockopt$inet_group_source_req(r2, 0x0, 0x2f, &(0x7f0000000400)={0x100000002, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @remote}}}, 0x108) setpriority(0x0, 0x0, 0xffff) r3 = msgget$private(0x0, 0x4) msgctl$MSG_STAT(r3, 0xb, &(0x7f00000001c0)=""/74) truncate(&(0x7f0000000000)='./file0\x00', 0x3) semget$private(0x0, 0xfffffffffffffffd, 0x15) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) setsockopt$inet_tcp_buf(r0, 0x6, 0x1f, &(0x7f0000000240)="61afa5d47f1396336ad6df6d1fff73f5b6ff26b8067f5855d700066fa882bc8d1545e476c19d2288621a421ae0b5f43145ae3cc7f551b342161f23ac3cba7ca2bf6f2781d3c4abb59adb7d3d50faf08246b75f37e06274aff2246b705daa93d0127aadb3062450793603e0f2835e70a38e8e02dd04ab6c45f8b98badc7d9954d4bc35f9edb3f38244db83e5c8072b79e3fe39b66ad2894d874d2a56949dc52b982f9b82315a5c07ddaca373b4d19cf59ed3f458f83f7f7f01337ae21415048130547e73e82ba270d831bce9d52916ff9be512c4214008654ba6faa7378319098240193596b75465afb2b40e3fbbde4bbd748", 0xf2) 07:21:41 executing program 4: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) r0 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000000000), 0x80000) getsockopt$TIPC_DEST_DROPPABLE(r0, 0x10f, 0x81, &(0x7f0000000040), &(0x7f0000000080)=0x4) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:42 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @remote}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @random="e5ac78d4c7fd"}, 0x10) write(r2, &(0x7f0000000080)="2700000014000f3f00000000120f0a00110001001f750800560099ed4f050000000f0000000000", 0x138) 07:21:42 executing program 0: socket$alg(0x26, 0x5, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) lsetxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) setpriority(0x0, 0x0, 0xffff) semget$private(0x0, 0xfffffffffffffffd, 0x15) r0 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmmsg$alg(r0, &(0x7f0000004580)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="177742ffd06d8660c9e1980463a9406f235cc984841e4da06ae1600202b49bcdaad3dc2bce185b93fa3709b1f3a060369814b856858976bb466bfd628e06f84194bccf48", 0x44}], 0x1, &(0x7f00000000c0)=[@op={0x10}, @assoc={0x10, 0x117, 0x4, 0xaba3}, @assoc={0x10, 0x117, 0x4, 0xb3b6}, @op={0x10}, @assoc={0x10, 0x117, 0x4, 0x9}], 0x50, 0x10}, {0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000140)="198259fa0585ec510eec71976720d545995aea72837df860981c7713", 0x1c}], 0x1, 0x0, 0x0, 0x4c081}, {0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000200)="f23d77656b83aea58f11c145df3bef0a1494be8c069e987b5ad33e3ffecd0f49f23d04bb9163ffec306a11a8b1cd94ca07fd1031ba5f36715a9fd397148644b61f495dead62c2a029999491ec5c77c0073f6a208382703aa611f1eecfd6e20c6cb33cb313edc35897305f62cafcfc814a52bde1593417a45161917ac807c9be49a6c7fb6c085356bf308fa7c4394a278", 0x90}, {&(0x7f00000002c0)="51b7c04b7026b114029a86a19cdd6673d0a3a90316ad594bedd8149a51fba35203e53d5eac6c2b38e63ed45b1e5c7d8db881de64156d4f12bee8fee2a9bf002fc54227285d6ea6f9f63bde0255357f34c573dabb791d96bd29398db9d3175cb87d96ae3ef99a1f0743f9e6cbf37b81588d64be69224f064a33cd14a9a33fe462e3d6c92e4276a28b6ef9e65f40834a979f7f89fc081fe861401c03797c8feaf68f68583c943a7c2d71468c0dcdee54b54f8d3ad2ee", 0xb5}, {&(0x7f0000000380)="6ffdc2aed98e941c03531f097cbb1b930241db6d3c7d4ec1da438641d3034f5f637c806618b6df6a7a52802d7d9c794cde6b3289f0222947adb3e6d3e93ed56b43ee947d213855dc292a38b7c50317098dd5af09e8d39367f635b37e2f2cfdfaf9419a22a9b3ef8993cb8a0e5c1ed46cf60e071a9c7440bbc945e50dcb33cdf41a7f42", 0x83}, {&(0x7f0000000480)="cca0e982066282630dbaf41eea0096448daa03a26df541b802a030ffecd2a3b56b17487eca6045f0d9dd28269c1bc0cc58f0754dde290782dc885c8c8110dda9559617f206360236e63542971e7fd3d2feb7e18977aabef58766a9d42c927c", 0x5f}, {&(0x7f00000007c0)="92a404754e170b5af9a73dd8bf15e9d46913e5509d2d56f441778e52f44afe7b23bfbf089181e42fb7b52c52a11706fa888702c5998e7d61733d31e581d13bdbc778db019ba6428e5d318bca5855ba9afcde526d5ee8ae21fdacfffc90ee335a010ce9572d89126c80c9334a9c6b963fb356543b505f4c36cf5452af7ddf759b9f1d385ddf4f4aeaf7686261eddc7f20c86f0113816215011cc5d71cbfc853554e0bc0", 0xa3}, {&(0x7f0000000880)="4b7a75961b26d371df82606fb771558a5d8afd88c06398d2fade62c3edde1bf2cd043bb7a189b00a283bbbf281e10d9e3bc6b53dc1ed17641e5cd6b2ab8b9633bbc3c731e7a06c5b370d18f5561ba35148a41e4179c73fd302c4f908b1d41964ef7ea188d781c8fb8ecb176c607e93e4d43593866010ef1bce676b1851dfebbd349aee274281ce76a28cdfe128e25797cc18fdcc5fcf928579e9d151b5443b3b19ec5b599d7169cb68db5a5075e420840883aa60aa0759424c4a02541be6a7da151f6789b9cceae5a382e83cded768c70c816943780dd931879a92d360d1f76cf34f77aac2", 0xe5}], 0x6, &(0x7f0000000540)=[@assoc={0x10, 0x117, 0x4, 0xffff}], 0x10, 0x20000000}, {0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f00000005c0)="cc47f973499d7fb0faaef46c4e4fc73ee90f000935dfaa", 0x17}], 0x1, &(0x7f0000000980)=ANY=[@ANYBLOB="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"], 0x2144, 0x4}, {0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000002b00)="aec802d59bba0d15d8ea5d26a7cfaad141f84c375da2f02d8c4f43bbcca7c2c50ee68a4c725bc19a2c605a7969efb73d9cb9b2e3d5c122cd70bad8b7efb8219891ea0ea6027d03c6822823659588a1091057fc4ea783f24ab359eb6af13f69fa2f9d2fa9ce0180ef0682ca325d4016f35a6b7ae54a164847d63c768582b9beb4203d1d69738635a52ba0a73c71e49b921a26666fb7e2ed615937f48f945250c8c227b1f4f061938a7a375d1e70e99ff165b2980ef56f1e13863907d2e2befa95d86b869eb39f8dbeff2810624b8e0f42d88ac99547ec1dfb28f430451d6f", 0xde}, {&(0x7f0000002c00)="37a9573696dd972574c342647deabd739cc18de71775d9b798759df09422d42010309393f7e07c0eeedb8bf7208feaac98561958fb6ae5d6519d7b9f6d28ded10f12a0e82072834491790f6eec57a327d35a94d17fb29f00b140deff240ac8ef5265b597e168debe30a4a9b9f651bc9859e7879be0e43e44a5e127afac0eb9183f7f00d951e64a9d30823d0d3ddbc7095cbdbccb055ee17de923539cb9777b42d57f88be56719cec3763069bb8fbe8e889cbf70adc1a7165029987c73ce8c5e647311c75e860f858bc4e982b521b87d386362128b291900edd548aae4a13375e5ce92a9fa64cbbaf0efaae5cc68260f008276637f4406b", 0xf7}, {&(0x7f0000002d00)="3dff3d29518119f6195c4f4e8c55d005c9695ac26c52d522046c58f35c4d95d1a77ea985cc98a2ad7bbef801a3693922cda63b8375d8857b078d98e90e7fda59b7250e2041f65d13c9d2745af287cb158e2f6189dc54439c49cbec839ef9c479c55aa493e4160f95fb300db329a0db86ac172bea0f956624d4092def99510141e74862d400849a2e8242a9f6bd28a2cb89f7597e50b16476dda3c97e739ae0ec4fe4d003e9ad93a830188c9f8b42d8628c4353f61435f4b8554ae124e156c4ee52bebc508dd3f730ce750da39d9988672e106946f91ce396d9a068331351442640d7944d4a2402300522a9a19812d80fb2cbc43e6ea2d9", 0xf7}, {&(0x7f0000002e00)="e8ee23f826937c681b7aa39e0e719bec6d9a6c0c288e68219bcf4477e788adfc4ab0a7c349609a1cb922859303ca126600e36e93aab442911e9aea7f31b1a2ebdd", 0x41}, {&(0x7f0000002e80)="710b058ca0d15be15f242fa71b56e9368f3da5453551f8ccbff35bb6ef6f82e6b81132fdbd848014fe9bd2e0a983a813bc07de4345620780d79d7c12a6e66bc2167876413a000a1fc6fab8cce9a9fd872c8c3807d84c8198dab3877dac8ecc0ec61d6af620374f60c4055efd164dc30414ef5b3b3c742abd082779afca2ba03d83b662b14d1ce6679ba94f36b3bfe212fb6da8491079e8e6ba7fcbae5a4ce7427ab017db1f225e389ce46f2a87b2d044d481347eb25c56a6e2bffb0a818b1f82352cab6b434080432262008ab384da5a5c2c2f356404632d69067c7807", 0xdd}, {&(0x7f0000002f80)="a5b055a40a61b68ba804fd955c43096312e18bec3741f50cca24f2c5f790f14be835638da456f947685c50493799bb96d72068cb0f01c16409c55b24e886d73a2ecd3de26f86d211c2d850ab047bc552ec827a8cc02ad6553602072bd405d13ee5648587c812faaa2e535b741449", 0x6e}, {&(0x7f0000003000)="e31fb1c4afd9909acd8750b6f829d8e0e4b247281a43deaca486fbd89e169823544dcc7ffc8c93fc0dd04a80b446877ed94a00cf218b395203588663f4cc7cc330ce8e9b5db24d8c70b37c264c10e353e3b60a1d10fd83143dc175a517748a0e03a870596fd4c3ae798739a9fb4db131236604819c0ae94f12d787aa0ccdf7e5c26fff61577675fb77ade2ae94db9f49aeebec85f1d75a5d387c8a1ba57888d6d4c0bfea047d992281a565c970944d8a52b920398165f83ccf479c6790a2ca5a9a0127cb13f8d3899c9d38385a91e12a54898445b29fd0d5a5b2c8be549200c996efd9b1", 0xe4}], 0x7, &(0x7f0000003100)=[@assoc={0x10, 0x117, 0x4, 0x5}, @op={0x10, 0x117, 0x3, 0x1}, @op={0x10}, @assoc={0x10, 0x117, 0x4, 0x5}, @assoc={0x10, 0x117, 0x4, 0x1000}, @assoc={0x10, 0x117, 0x4, 0x3}, @assoc={0x10, 0x117, 0x4, 0x7}, @assoc={0x10, 0x117, 0x4, 0x1f}, @assoc={0x10, 0x117, 0x4, 0x1}], 0x90, 0x40800}, {0x0, 0x0, &(0x7f0000004540)=[{&(0x7f00000031c0)="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", 0x1000}, {&(0x7f00000041c0)="b6a0145f2e287c997462cd73a163dd416db1bb81b0bfd3cda7ac41c345c046357257ac6d8fc242a0f2c1c6c649fe3b98655b8fca17c5039ffbb0c071ca314107778732c6c6eca8287f6cc72e3f8b49180331cf90cfc651373ba7609df976c462fb56a03f5fe7ee3daef84f482a90385f8dc056e4c105777e5611a83ccb953f6e8eafdc397bf62323b98bd2c88b53c7c4fe7b5a8d11ea1a8d7f2d02", 0x9b}, {&(0x7f0000004280)="40a818a8d52961aacf6f0e346c4b9003cf325789bdd74587759c57fa3f01971f523300de9ccec6197037ab75ef34bf126ec680115f4351b9a446bac751ef9db552b48aeec2f8c8b51674a8b3600702d6f82d48fcb7b03416e8539745e256c08e6f60ec8c65debadc9cddd642f3e0f4c45175f03365", 0x75}, {&(0x7f0000004300)="33b3dd8fb72cc5acb7552f29f3eef1d31b9c4e966a7eca849927726ef0721d36d664f06f6e8a065b3971ae4962ac8f1c7f98f5a5a7017b2411376a63ce9202b8801ccc2e0353c5f53d5e558c46d3da6242ecc23563772542eae7ddbd529b6d3f11ce42208f8f", 0x66}, {&(0x7f0000004380)="59f5eabc300dcd6f343e7d98ffc429207bb693e5d40d364b89dcf36297935ff8b57c7ceec9c98c1eb7f8c3222cf287f90b2171b85922b4ebbdaafbde68131ba79c7efee71bb7dc367ab747b3d93b2035de05ca86d8dc52b34d59a29be096f2b2bdbcd6b0255a279253552db94c422110519d58627acce3d4", 0x78}, {&(0x7f0000004400)="23a60b42d7fdc7abf835f467c10ca786603cb200ad1875e971793dfdd65e", 0x1e}, {&(0x7f0000004440)="f220e7b7df4e1f8eb51dfedd1777d5b5bb13b0a98f6a30f6df59edcb803e005e5b26a6cce124711195e1c1d411800d8f74098c5272f06c4134b43f186f724f87900973c0c7d77ec3fdba7e51f47f9aa2a4b7a336aa0f110df793ae30ea9803f8a9386b785c3f892be15dafdf048f08e7d88d03b2deb485b5d3f6106c6ae4ffef623006319702e959acc1b65fcbf6a322a223dd78fce74b0cbe8f1ac45a5e58601ba2b7e9f462c1b0184111f299b5fa4308f84c7a355cd4e3a8202f5a8c8c5f837f6e7b8ec48ee20401ce00756dd92c6b27345db7b1391663c20f75b51280572271c182ca28fa7381c3249c52e360b869b4a9db752e878482", 0xf8}], 0x7, 0x0, 0x0, 0x4040000}], 0x6, 0x800) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) utimensat(r0, &(0x7f0000004640)='./file1\x00', &(0x7f0000004680)={{}, {0x77359400}}, 0x100) write$P9_RUNLINKAT(r0, &(0x7f00000046c0)={0x7, 0x4d, 0x2}, 0x7) [ 867.718880][ T9151] IPVS: ftp: loaded support on port[0] = 21 07:21:42 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video35\x00', 0x2, 0x0) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffe}, 0x0, &(0x7f0000000140)={0x1ff, 0x2}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 07:21:42 executing program 3: socket$alg(0x26, 0x5, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x400, 0x0) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r0, 0x84, 0x74, &(0x7f0000000480)=""/72, &(0x7f00000001c0)=0x48) socket$inet(0x2b, 0x1, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x0, 0x0) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000300)='/dev/autofs\x00', 0x800, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(r2, 0xc02c564a, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000040)=0x0) sched_setaffinity(r3, 0x1c42, &(0x7f0000000200)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) lsetxattr$security_selinux(&(0x7f0000000880)='./file0\x00', &(0x7f0000000400)='security.selinux\x00', &(0x7f0000000900)='system_u:object_r:auditctl_exec_t:s0\x00', 0x25, 0x1) r4 = getpgrp(0x0) setpriority(0x0, r4, 0xffff) fcntl$setpipe(r0, 0x407, 0x30) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r1, 0x10e, 0x8, &(0x7f0000000080)=0x9, 0x4) ioctl$SG_GET_VERSION_NUM(r1, 0x2282, &(0x7f0000000000)) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) msgget(0x1, 0x208) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:42 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @remote}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @random="e5ac78d4c7fd"}, 0x10) write(r2, &(0x7f0000000080)="2700000014000f3f00000000120f0a00110001001f750800560099ed4f05000001100000000000", 0x138) 07:21:42 executing program 0: socket$alg(0x26, 0x5, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) r0 = syz_open_dev$swradio(&(0x7f0000000080)='/dev/swradio#\x00', 0x0, 0x2) ioctl$TIOCLINUX7(r0, 0x541c, &(0x7f00000000c0)={0x7, 0x401}) lsetxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) setpriority(0x0, 0x0, 0xffff) semget$private(0x0, 0xfffffffffffffffd, 0x15) r1 = gettid() capget(&(0x7f0000000000)={0x19980330, r1}, &(0x7f0000000040)={0xfffffffffffffc01, 0x100000001, 0x6e, 0x9, 0x3, 0xff}) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) [ 868.176302][ T9813] capability: warning: `syz-executor.0' uses 32-bit capabilities (legacy support in use) 07:21:42 executing program 1: socket$alg(0x26, 0x5, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x400, 0x0) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r0, 0x84, 0x74, &(0x7f0000000480)=""/72, &(0x7f00000001c0)=0x48) socket$inet(0x2b, 0x1, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x0, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000300)='/dev/autofs\x00', 0x800, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(r1, 0xc02c564a, 0x0) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) lsetxattr$security_selinux(&(0x7f0000000880)='./file0\x00', &(0x7f0000000400)='security.selinux\x00', &(0x7f0000000900)='system_u:object_r:auditctl_exec_t:s0\x00', 0x25, 0x1) r2 = getpgrp(0x0) setpriority(0x0, r2, 0xffff) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) msgget(0x1, 0x208) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:42 executing program 4: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='memory.swap.current\x00', 0x0, 0x0) r1 = openat$vimc2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video2\x00', 0x2, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) getsockopt$inet_int(r0, 0x0, 0x3f, &(0x7f0000000080), &(0x7f00000000c0)=0x4) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ADD(r0, &(0x7f0000000240)={&(0x7f0000000100), 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x34, r2, 0x100, 0x70bd25, 0x25dfdbfd, {}, [@TIPC_NLA_MON={0x14, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x5}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x5}]}, @TIPC_NLA_MON={0xc, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x8}]}]}, 0x34}, 0x1, 0x0, 0x0, 0x8000}, 0x40000) 07:21:42 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video35\x00', 0x2, 0x0) ioctl$GIO_UNISCRNMAP(r0, 0x4b69, &(0x7f0000000200)=""/89) write(r1, &(0x7f0000000340), 0x41395527) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000280)="8027b03f679556ce8a296d885de85da6744c7d1b1b6bbae79ff16cbb24ad821a53d39dcecb304f1df9ebefa4f1c6a2b555a00215c040b08f90d7977a50baa9a28907b08e07dbb794e8a3a55505fe9e031f", 0x51}, {&(0x7f0000000100)="e5dd0a03f73a4924767d7a04e6051900d40c5bc0dc924f44", 0x18}, {&(0x7f0000000180)="67504d111c3ede00a375", 0xa}, {&(0x7f0000000480)="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", 0x1000}, {&(0x7f0000001480)="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", 0x1000}, {&(0x7f0000000300)="c78b", 0x2}], 0x6, 0x0) ioctl$TIOCGPKT(r0, 0x80045438, &(0x7f0000000040)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf5b0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat(r0, &(0x7f0000000380)='./file0\x00', 0x200000, 0x1) ioctl$KVM_PPC_GET_PVINFO(r1, 0x4080aea1, &(0x7f0000002480)=""/183) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000003c0)={0x30, 0x5, 0x0, {0x0, 0x6, 0x8, 0x1}}, 0x30) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 07:21:42 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @remote}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @random="e5ac78d4c7fd"}, 0x10) write(r2, &(0x7f0000000080)="2700000014000f3f00000000120f0a00110001001f750800560099ed4f050000003f0000000000", 0x138) 07:21:42 executing program 0: socket$alg(0x26, 0x5, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) lsetxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) setpriority(0x0, 0x0, 0xffff) semget$private(0x0, 0xfffffffffffffffd, 0x15) r0 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$TIPC_IMPORTANCE(r0, 0x10f, 0x7f, &(0x7f0000000040)=0x4, 0xfffffffffffffd9f) ioctl$TIOCSERGETLSR(r0, 0x5459, &(0x7f0000000100)) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000140)=':&posix_acl_access(\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) setxattr$security_capability(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v1={0x1000000, [{0x5, 0x100000001}]}, 0xc, 0x3) 07:21:42 executing program 3: socket$alg(0x26, 0x5, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x400, 0x0) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r0, 0x84, 0x74, &(0x7f0000000480)=""/72, &(0x7f00000001c0)=0x48) socket$inet(0x2b, 0x1, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x0, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000300)='/dev/autofs\x00', 0x800, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(r1, 0xc02c564a, 0x0) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) lsetxattr$security_selinux(&(0x7f0000000880)='./file0\x00', &(0x7f0000000400)='security.selinux\x00', &(0x7f0000000900)='system_u:object_r:auditctl_exec_t:s0\x00', 0x25, 0x1) r3 = getpgrp(0x0) setpriority(0x0, r3, 0xffff) fcntl$setpipe(r2, 0x407, 0x30) semget$private(0x0, 0xfffffffffffffffd, 0x15) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) msgget(0x1, 0x208) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000000)='wlan1\x00', &(0x7f0000000040)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000080)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:43 executing program 4: syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x200, 0x800) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) r0 = syz_open_dev$cec(&(0x7f0000000200)='/dev/cec#\x00', 0x3, 0x2) mkdirat(r0, &(0x7f0000000040)='./file0\x00', 0x4) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x40, 0xfffffffffffffffe) bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)={&(0x7f0000000080)='./file0\x00', 0x0, 0x18}, 0x10) clone(0x88000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:43 executing program 5: socket$alg(0x26, 0x5, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x400, 0x0) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r0, 0x84, 0x74, &(0x7f0000000480)=""/72, &(0x7f00000001c0)=0x48) socket$inet(0x2b, 0x1, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x0, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000300)='/dev/autofs\x00', 0x800, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(r1, 0xc02c564a, 0x0) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) lsetxattr$security_selinux(&(0x7f0000000880)='./file0\x00', &(0x7f0000000400)='security.selinux\x00', &(0x7f0000000900)='system_u:object_r:auditctl_exec_t:s0\x00', 0x25, 0x1) r2 = getpgrp(0x0) setpriority(0x0, r2, 0xffff) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) msgget(0x1, 0x414) clone(0x40000004, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:43 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @remote}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @random="e5ac78d4c7fd"}, 0x10) write(r2, &(0x7f0000000080)="2700000014000f3f00000000120f0a00110001001f750800560099ed4f05000000400000000000", 0x138) 07:21:43 executing program 0: socket$alg(0x26, 0x5, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) lsetxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) setpriority(0x0, 0x0, 0xffff) semget$private(0x0, 0xfffffffffffffffd, 0x15) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:43 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @remote}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @random="e5ac78d4c7fd"}, 0x10) write(r2, &(0x7f0000000080)="2700000014000f3f00000000120f0a00110001001f750800560099ed4f05000000600000000000", 0x138) 07:21:43 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x400, 0x0) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r1, 0x84, 0x74, &(0x7f0000000480)=""/72, &(0x7f00000001c0)=0x48) socket$inet(0x2b, 0x1, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x0, 0x0) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000300)='/dev/autofs\x00', 0x800, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(r3, 0xc02c564a, 0x0) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) getsockopt$IP_VS_SO_GET_TIMEOUT(r0, 0x0, 0x486, &(0x7f00000000c0), &(0x7f0000000100)=0xc) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x3) lsetxattr$security_selinux(&(0x7f0000000880)='./file0\x00', &(0x7f0000000400)='security.selinux\x00', &(0x7f0000000900)='system_u:object_r:auditctl_exec_t:s0\x00', 0x25, 0x1) r5 = getpgrp(0x0) setpriority(0x0, r5, 0xffff) fcntl$setpipe(r4, 0x407, 0x30) semget$private(0x0, 0xfffffffffffffffd, 0x15) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) msgget(0x1, 0x208) ioctl$VHOST_RESET_OWNER(r2, 0xaf02, 0x0) clone(0xa000003, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r6 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000340)='NET_DM\x00') sendmsg$NET_DM_CMD_STOP(r1, &(0x7f0000000500)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x14, r6, 0x28, 0x70bd27, 0x25dfdbfd, {}, ["", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x20000000}, 0x80) ioctl$UI_END_FF_UPLOAD(r3, 0x406055c9, &(0x7f00000006c0)={0x9, 0x0, {0x56, 0x101, 0x7, {0x4, 0x3}, {0x5, 0x100000001}, @ramp={0x3f, 0x1, {0x8, 0xe, 0x0, 0x8}}}, {0x56, 0x7, 0xfff, {0x4, 0x5}, {0x2, 0x1f}, @cond=[{0x8, 0x3, 0x0, 0x2, 0x9, 0x3}, {0x5, 0x5, 0x19e78897, 0x4, 0xceff, 0x2}]}}) ioctl$KDGETKEYCODE(r2, 0x4b4c, &(0x7f0000000280)={0x5, 0x8}) getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:43 executing program 1: socket$alg(0x26, 0x5, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x400, 0x0) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r0, 0x84, 0x74, &(0x7f0000000480)=""/72, &(0x7f00000001c0)=0x48) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r1, &(0x7f0000005840)=[{{0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000001780)=[{0xc, 0x11}], 0xc}}], 0x2, 0x0) socket$inet(0x2b, 0x1, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x0, 0x0) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000300)='/dev/autofs\x00', 0x800, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(r2, 0xc02c564a, 0x0) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) lsetxattr$security_selinux(&(0x7f0000000880)='./file0\x00', &(0x7f0000000400)='security.selinux\x00', &(0x7f0000000900)='system_u:object_r:auditctl_exec_t:s0\x00', 0x25, 0x1) r3 = getpgrp(0x0) setpriority(0x0, r3, 0xffff) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) msgget(0x1, 0x208) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:43 executing program 4: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xffdb) openat$cgroup(0xffffffffffffffff, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) r0 = socket$isdn_base(0x22, 0x3, 0x0) fcntl$setpipe(r0, 0x407, 0x1) open(&(0x7f0000000000)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) prctl$PR_SET_SPECULATION_CTRL(0x35, 0x0) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680), &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000080)='syz0\x00']) 07:21:43 executing program 0: socket$alg(0x26, 0x5, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) lsetxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) setpriority(0x0, 0x0, 0xffff) r0 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x9, 0x1) ioctl$PPPIOCGFLAGS(r0, 0x8004745a, &(0x7f0000000040)) semget$private(0x0, 0xfffffffffffffffd, 0x15) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:43 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @remote}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @random="e5ac78d4c7fd"}, 0x10) write(r2, &(0x7f0000000080)="2700000014000f3f00000000120f0a00110001001f750800560099ed4f0500000ec00000000000", 0x138) 07:21:43 executing program 4: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r0 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0xffffffff, 0x480001) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f0000000080)={0x0, @aes256, 0x0, "77d1d20568d50710"}) r1 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) ioctl$KVM_SET_IDENTITY_MAP_ADDR(r1, 0x4008ae48, &(0x7f0000000000)=0x100000) [ 869.605700][T10471] IPVS: ftp: loaded support on port[0] = 21 07:21:44 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @remote}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @random="e5ac78d4c7fd"}, 0x10) write(r2, &(0x7f0000000080)="2700000014000f3f00000000120f0a00110001001f750800560099ed4f0500000be90000000000", 0x138) [ 869.682857][ C0] protocol 88fb is buggy, dev hsr_slave_0 07:21:44 executing program 1: socket$alg(0x26, 0x5, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x400, 0x0) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r0, 0x84, 0x74, &(0x7f0000000480)=""/72, &(0x7f00000001c0)=0x48) socket$inet(0x2b, 0x1, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x1000, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000300)='/dev/autofs\x00', 0x800, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(r1, 0xc02c564a, 0x0) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) lsetxattr$security_selinux(&(0x7f0000000880)='./file0\x00', &(0x7f0000000400)='security.selinux\x00', &(0x7f0000000900)='system_u:object_r:auditctl_exec_t:s0\x00', 0x25, 0x1) r2 = getpgrp(0x0) alarm(0x5) setpriority(0x0, r2, 0xffff) sysfs$1(0x1, &(0x7f0000000000)='system_u:object_r:auditctl_exec_t:s0\x00') open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) msgget(0x1, 0x208) prctl$PR_SET_FP_MODE(0x2d, 0x2) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) chdir(&(0x7f0000000040)='./file0\x00') execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:44 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00\xaa\xc9\x06\xf9\x96\xa1\x81\xea\xe7\xceX\x92Mh21\xaf\xdf\x84q\xe5\xfctg\x13o7@c', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0xda00) 07:21:44 executing program 4: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x0, 0x0) setsockopt$TIPC_DEST_DROPPABLE(r0, 0x10f, 0x81, &(0x7f0000000040)=0x4, 0x4) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) rmdir(&(0x7f0000000080)='./file0\x00') clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:44 executing program 3: socket$alg(0x26, 0x5, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x400, 0x0) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r0, 0x84, 0x74, &(0x7f0000000480)=""/72, &(0x7f00000001c0)=0x48) socket$inet(0x2b, 0x1, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x0, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000300)='/dev/autofs\x00', 0x800, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(r1, 0xc02c564a, 0x0) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) lsetxattr$security_selinux(&(0x7f0000000880)='./file0\x00', &(0x7f0000000400)='security.selinux\x00', &(0x7f0000000900)='system_u:object_r:auditctl_exec_t:s0\x00', 0x25, 0x1) r3 = getpgrp(0x0) setpriority(0x0, r3, 0xffff) fcntl$setpipe(r2, 0x407, 0x30) semget$private(0x0, 0xfffffffffffffffd, 0x15) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) socket$alg(0x26, 0x5, 0x0) msgget(0x1, 0x208) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:44 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) lsetxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) setpriority(0x0, 0x0, 0xffff) semget$private(0x0, 0xfffffffffffffffd, 0x15) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clock_gettime(0x0, &(0x7f00000049c0)={0x0, 0x0}) recvmmsg(r0, &(0x7f0000004900)=[{{&(0x7f0000000000)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast1}}}, 0x80, &(0x7f00000005c0)=[{&(0x7f0000000080)=""/151, 0x97}, {&(0x7f00000001c0)=""/169, 0xa9}, {&(0x7f0000000280)=""/241, 0xf1}, {&(0x7f0000000480)=""/250, 0xfa}, {&(0x7f0000000380)=""/150, 0x96}, {&(0x7f00000006c0)=""/88, 0x58}, {&(0x7f0000000140)=""/47, 0x2f}, {&(0x7f00000007c0)=""/223, 0xdf}], 0x8, &(0x7f00000008c0)=""/251, 0xfb}, 0x80}, {{&(0x7f00000009c0)=@in6={0xa, 0x0, 0x0, @dev}, 0x80, &(0x7f0000000c00)=[{&(0x7f0000000a40)=""/134, 0x86}, {&(0x7f0000000b00)=""/205, 0xcd}], 0x2, &(0x7f0000000c40)=""/133, 0x85}, 0x92f1}, {{&(0x7f0000000d00)=@caif=@dgm, 0x80, &(0x7f0000001e40)=[{&(0x7f0000000d80)=""/182, 0xb6}, {&(0x7f0000000e40)=""/4096, 0x1000}], 0x2, &(0x7f0000001e80)=""/138, 0x8a}, 0x14e3fc7800000}, {{0x0, 0x0, &(0x7f0000002040)=[{&(0x7f0000001f40)=""/241, 0xf1}], 0x1, &(0x7f0000002080)=""/4096, 0x1000}, 0x6}, {{0x0, 0x0, &(0x7f0000004540)=[{&(0x7f0000003080)=""/29, 0x1d}, {&(0x7f00000030c0)=""/4096, 0x1000}, {&(0x7f00000040c0)=""/246, 0xf6}, {&(0x7f00000041c0)=""/251, 0xfb}, {&(0x7f00000042c0)=""/250, 0xfa}, {&(0x7f00000043c0)=""/248, 0xf8}, {&(0x7f00000044c0)=""/78, 0x4e}], 0x7, &(0x7f0000004580)=""/46, 0x2e}, 0x81}, {{0x0, 0x0, &(0x7f00000048c0)=[{&(0x7f00000045c0)=""/220, 0xdc}, {&(0x7f00000046c0)=""/251, 0xfb}, {&(0x7f00000047c0)=""/229, 0xe5}], 0x3}, 0x40}], 0x6, 0x40012141, &(0x7f0000004a00)={r1, r2+10000000}) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:44 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @remote}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @random="e5ac78d4c7fd"}, 0x10) write(r2, &(0x7f0000000080)="2700000014000f3f00000000120f0a00110001001f750800560099ed4f05000000f00000000000", 0x138) 07:21:44 executing program 1: socket$alg(0x26, 0x5, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x400, 0x0) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r0, 0x84, 0x74, &(0x7f0000000480)=""/72, &(0x7f00000001c0)=0x48) socket$inet(0x2b, 0x1, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x0, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000300)='/dev/autofs\x00', 0x800, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(r1, 0xc02c564a, 0x0) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000880)='./file0\x00', &(0x7f0000000400)='security.selinux\x00', &(0x7f0000000900)='system_u:object_r:auditctl_exec_t:s0\x00', 0x25, 0x1) r2 = getpgrp(0x0) setpriority(0x0, r2, 0x400000000000005) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) msgget(0x1, 0x208) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:45 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @remote}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @random="e5ac78d4c7fd"}, 0x10) write(r2, &(0x7f0000000080)="2700000014000f3f00000000120f0a00110001001f750800560099ed4f05000000400300000000", 0x138) 07:21:45 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) r1 = dup2(r0, r0) ioctl$KDSETKEYCODE(r1, 0x4b4d, &(0x7f0000000240)={0x58, 0xffffffff00000000}) lsetxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) setpriority(0x0, 0x0, 0xffff) semget$private(0x0, 0x5, 0x9) r2 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) getresuid(&(0x7f0000000140), &(0x7f00000001c0), &(0x7f0000000200)) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000000000)={0x0, 0x0}) capset(&(0x7f0000000040)={0x20080522, r3}, &(0x7f00000000c0)={0xc4, 0x5, 0x626, 0x3, 0x41, 0x7}) ioctl$VIDIOC_ENUM_FRAMESIZES(r2, 0xc02c564a, &(0x7f0000000100)={0x7, 0x34325258, 0x3, @discrete={0xe098, 0x7fffffff}}) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000080)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:45 executing program 4: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x101c8) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) readlinkat(r0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=""/194, 0xc2) 07:21:45 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f0000000240)={@multicast2, @remote, @empty}, 0xc) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/mcfilter\x00') preadv(r1, &(0x7f0000000040)=[{&(0x7f00000001c0)=""/124, 0x7c}], 0x1, 0x1) 07:21:45 executing program 3: socket$alg(0x26, 0x5, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x400, 0x0) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r0, 0x84, 0x74, &(0x7f0000000480)=""/72, &(0x7f00000001c0)=0x48) r1 = socket$inet(0x2b, 0x1, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x0, 0x0) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000300)='/dev/autofs\x00', 0x800, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(r0, 0xc02c564a, 0x0) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) lsetxattr$security_selinux(&(0x7f0000000880)='./file0\x00', &(0x7f0000000400)='security.selinux\x00', &(0x7f0000000900)='system_u:object_r:auditctl_exec_t:s0\x00', 0x25, 0x1) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000000)=0x0) r6 = getpgrp(r5) getsockname$packet(r0, &(0x7f0000000b80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000bc0)=0x14) ioctl$VIDIOC_S_TUNER(r3, 0x4054561e, &(0x7f0000000040)={0x3, "cc8a22e84fef7bbd0e71d61d1b8ced959dadfccbcc770010956382f8758605f0", 0x1, 0x10, 0x1, 0x8001, 0x11, 0x3, 0x9, 0x9}) ioctl$sock_inet6_SIOCSIFDSTADDR(r2, 0x8918, &(0x7f0000000c00)={@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x52, r7}) setsockopt$inet6_buf(r0, 0x29, 0x3b, &(0x7f0000000340)="38b0a9d0dcad3dd9569318b9d05756c3dacb3194a274e08915f99f2231592bdc53c39d748af98dd81019d5e8f7ee88016f7d5cb22a8000e69e49b0d2f4ac423975091f5f05ac7021924db37ae3113deb2537a3170600e2bc61bce60c61714d0ca6032a376dd46950bd060a93cf2519758b438983a2a0693f5d87a33426952e70a15522e47a923393a4ccf23d366a7d9f59a8dcea838541e812aed5f0448229100cabfd5bbfc31f0d53c0f4e638537f42e6e8c5c59d", 0xb5) setpriority(0x0, r6, 0xffff) fcntl$setpipe(r4, 0x407, 0x30) semget$private(0x0, 0xfffffffffffffffd, 0x15) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) msgget(0x1, 0x208) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:45 executing program 1: socket$alg(0x26, 0x5, 0x0) r0 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x3, 0x2) sendmsg$alg(r0, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="94dbbb47ce1816a7505368d4275d45c4344955f17493c975d4013e6cdb9811d7d63b0be3f5865aeabd5ee5609c4c370921b3f23387d675c36650b73cbf1ad79fce7bb8fb1bbbf3b697d76fe1a8c1c4b07c59c4bafb1dd3535f53bdc6bfb820ac1cc5b41858891637703dd2d9ba48e6c43daead5544685b96d56292fa215033dc674023a0fb5af0b9d14e80b59251759be09219393e6a3e3d121bab3a4c3d22cf9038293f079b2060217912104cfa99a1bfae999c9a6102ef42b641f8e04a5e58110ca08e80bad69f22c28fa36b2a2eddf5a24e79191539c9e486f3a9f0012f9781567197c219daef0fe67a78a05037f63d2e3b50121812c890", 0xf9}, {&(0x7f0000000340)="7040129c20764ec8c23aff78f7004932158b96daad18864ea2bc8beb058d3fe69dc5e3586b9bcc1b90e2f125d94431fa31ba484fa32c2d58b75aeb83181c7b458bb7d7f303414189060e66f83e46f687ab565a3246b3b6a640e55876eec6220c75c3e1029db3de3cc832f1ebb47eb5ffa446d953cdfc6a79da4efbf3dc4e7055a0e88a9fb552d559beece3", 0x8b}], 0x2, &(0x7f00000002c0)=[@assoc={0x10, 0x117, 0x4, 0xffffffff}], 0x10, 0x4000}, 0x20000800) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x400, 0x0) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r1, 0x84, 0x74, &(0x7f0000000480)=""/72, &(0x7f00000001c0)=0x48) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000005c0)={0x0, r1, 0x0, 0x25, &(0x7f0000000540)='system_u:object_r:auditctl_exec_t:s0\x00'}, 0x30) fcntl$getownex(r1, 0x10, &(0x7f00000006c0)={0x0, 0x0}) tgkill(r2, r3, 0x39) socket$inet(0x2b, 0x1, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x0, 0x0) r4 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000300)='/dev/autofs\x00', 0x800, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(r4, 0xc02c564a, 0x0) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r5, 0x1, 0xf, &(0x7f0000000000)=0xb4, 0x4) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x33, &(0x7f0000000300)={0x1, &(0x7f00000001c0)=[{0x6}]}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xffffffffffffff5d) lsetxattr$security_selinux(&(0x7f0000000880)='./file0\x00', &(0x7f0000000400)='security.selinux\x00', &(0x7f0000000900)='system_u:object_r:auditctl_exec_t:s0\x00', 0x25, 0x1) r6 = getpgrp(0x0) setpriority(0x0, r6, 0xffff) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) msgget(0x1, 0x208) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:45 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @remote}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @random="e5ac78d4c7fd"}, 0x10) write(r2, &(0x7f0000000080)="2700000014000f3f00000000120f0a00110001001f750800560099ed4f05000000034000000000", 0x138) 07:21:45 executing program 5: socket$key(0xf, 0x3, 0x2) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000000)=[{&(0x7f00000003c0)=""/228, 0xe4}], 0x1, 0x0) 07:21:45 executing program 4: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x20000, 0x8) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:45 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r0, &(0x7f0000000040), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() setsockopt$inet6_buf(r0, 0x29, 0x21, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x1a) fstat(0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x80000000002c00) 07:21:45 executing program 0: socket$alg(0x26, 0x5, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) lsetxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) setpriority(0x0, 0x0, 0xffff) semget$private(0x0, 0xfffffffffffffffd, 0x15) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) timer_create(0x1, &(0x7f0000000100)={0x0, 0x1e, 0x1, @thr={&(0x7f00000007c0)="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", &(0x7f0000000000)="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"}}, &(0x7f0000000140)=0x0) timer_gettime(r0, &(0x7f00000001c0)) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:45 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @remote}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @random="e5ac78d4c7fd"}, 0x10) write(r2, &(0x7f0000000080)="2700000014000f3f00000000120f0a00110001001f750800560099ed4f050000fffff000000000", 0x138) 07:21:46 executing program 4: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffe7d) socket$key(0xf, 0x3, 0x2) r0 = socket$pptp(0x18, 0x1, 0x2) ioctl$RNDZAPENTCNT(r0, 0x5204, &(0x7f0000000000)=0xfffffffffffffffa) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000080)='/dev/capi20\x00', 0x0, 0x0) fcntl$setpipe(r1, 0x407, 0x3) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 07:21:46 executing program 3: socket$alg(0x26, 0x5, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x400, 0x0) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r0, 0x84, 0x74, &(0x7f0000000480)=""/72, &(0x7f00000001c0)=0x48) socket$inet(0x2b, 0x1, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x0, 0x0) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000300)='/dev/autofs\x00', 0x800, 0x0) ioctl$SG_SET_RESERVED_SIZE(r1, 0x2275, &(0x7f0000000000)=0x6) ioctl$VIDIOC_ENUM_FRAMESIZES(r2, 0xc02c564a, 0x0) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r1) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) lsetxattr$security_selinux(&(0x7f0000000880)='./file0\x00', &(0x7f0000000400)='security.selinux\x00', &(0x7f0000000900)='system_u:object_r:auditctl_exec_t:s0\x00', 0x25, 0x1) r4 = getpgrp(0x0) setpriority(0x0, r4, 0xffff) fcntl$setpipe(r3, 0x407, 0x30) semget$private(0x0, 0xfffffffffffffffd, 0x15) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) msgget(0x1, 0x208) write$FUSE_POLL(r2, &(0x7f0000000040)={0x18, 0x0, 0x6, {0x1ff}}, 0x18) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) [ 871.751748][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 871.757605][ C0] protocol 88fb is buggy, dev hsr_slave_1 07:21:46 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @remote}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @random="e5ac78d4c7fd"}, 0x10) write(r2, &(0x7f0000000080)="2700000014000f3f00000000120f0a00110001001f750800560099ed4f05000000000001000000", 0x138) 07:21:46 executing program 0: socket$alg(0x26, 0x5, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) lsetxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) setpriority(0x0, 0x0, 0xffff) semget$private(0x0, 0xfffffffffffffffd, 0x15) r0 = open(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$TCGETA(r0, 0x5405, &(0x7f0000000080)) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x40000, 0x0) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:46 executing program 4: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) ioctl$LOOP_GET_STATUS(r0, 0x4c03, &(0x7f0000000000)) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$LOOP_GET_STATUS(r0, 0x4c03, &(0x7f00000000c0)) 07:21:46 executing program 1: socket$alg(0x26, 0x5, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x400, 0x0) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r0, 0x84, 0x74, &(0x7f0000000480)=""/72, &(0x7f00000001c0)=0x48) socket$inet(0x2b, 0x1, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x0, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000300)='/dev/autofs\x00', 0x800, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(r1, 0xc02c564a, 0x0) clock_gettime(0x7, &(0x7f0000000100)) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) lsetxattr$security_selinux(&(0x7f0000000880)='./file0\x00', &(0x7f0000000400)='security.selinux\x00', &(0x7f0000000900)='system_u:object_r:auditctl_exec_t:s0\x00', 0x25, 0x1) r2 = getpgrp(0x0) setpriority(0x0, r2, 0xffff) r3 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) msgget(0x1, 0x208) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_GET(r3, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000080)={&(0x7f0000000940)={0x18c, r4, 0x800, 0x70bd2d, 0x25dfdbfc, {}, [@TIPC_NLA_NET={0x30, 0x7, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0x13e}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x2}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0xa7a}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x81}]}, @TIPC_NLA_MEDIA={0x68, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x4c, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xfffffffffffffffe}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3f}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x100000001}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}]}]}, @TIPC_NLA_NODE={0x38, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x9}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x3}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x1}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x6}]}, @TIPC_NLA_BEARER={0xa8, 0x1, [@TIPC_NLA_BEARER_PROP={0x14, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x800}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}]}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_PROP={0x4c, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3734}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x40}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x88}]}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x1}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e23, @local}}, {0x14, 0x2, @in={0x2, 0x4e20, @remote}}}}]}]}, 0x18c}, 0x1, 0x0, 0x0, 0x48010}, 0x10) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:46 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000d00)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) ioctl$TIOCPKT(r0, 0x5420, &(0x7f00000001c0)=0xfffffffffffffffd) read(r0, &(0x7f0000000600)=""/11, 0xb) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)) r1 = syz_open_pts(r0, 0x0) ioctl$TCXONC(r1, 0x540a, 0x0) 07:21:46 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @remote}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @random="e5ac78d4c7fd"}, 0x10) write(r2, &(0x7f0000000080)="2700000014000f3f00000000120f0a00110001001f750800560099ed4f05000000000002000000", 0x138) 07:21:46 executing program 3: socket$alg(0x26, 0x5, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x400, 0x0) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r0, 0x84, 0x74, &(0x7f0000000480)=""/72, &(0x7f00000001c0)=0x48) socket$inet(0x2b, 0x1, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x0, 0x0) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000300)='/dev/autofs\x00', 0x800, 0x0) ioctl$KVM_S390_UCAS_UNMAP(r1, 0x4018ae51, &(0x7f0000000000)={0x1000, 0x51, 0x5}) ioctl$VIDIOC_ENUM_FRAMESIZES(r2, 0xc02c564a, 0x0) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) lsetxattr$security_selinux(&(0x7f0000000880)='./file0\x00', &(0x7f0000000400)='security.selinux\x00', &(0x7f0000000900)='system_u:object_r:auditctl_exec_t:s0\x00', 0x25, 0x1) r4 = getpgrp(0x0) setpriority(0x0, r4, 0xffff) fcntl$setpipe(r3, 0x407, 0x30) semget$private(0x0, 0xfffffffffffffffd, 0x15) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) msgget(0x1, 0x208) ioctl$BLKPG(r0, 0x1269, &(0x7f0000000040)={0x100, 0x3}) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:46 executing program 0: socket$alg(0x26, 0x5, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) lsetxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) setpriority(0x0, 0x0, 0xffff) semget$private(0x0, 0xfffffffffffffffd, 0x15) r0 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) getsockopt$netlink(r0, 0x10e, 0x6, &(0x7f00000007c0)=""/4096, &(0x7f0000000000)=0x1000) clone(0x4000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000040)='secu\x00ity.capability\x00-$s\xe3\x98\x88o\xc6\x7fZ^\xc1A\xae\x1e\x9d\x89/'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:46 executing program 4: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x648d3bc20ac77787) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000040)=0x10, 0x80800) fdatasync(r0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000080)={{{@in6, @in6=@ipv4={[], [], @empty}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in=@local}}, &(0x7f00000001c0)=0xe8) setsockopt$inet6_IPV6_PKTINFO(r1, 0x29, 0x32, &(0x7f0000000200)={@remote, r2}, 0x14) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000240)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:47 executing program 5: r0 = socket$inet6(0xa, 0x400200000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000600)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) setsockopt$inet_tcp_int(r1, 0x6, 0x13, &(0x7f0000000100)=0x4, 0x4) setsockopt$inet_tcp_int(r1, 0x6, 0x18, &(0x7f00000001c0), 0x4) bind$unix(r1, 0x0, 0x249) ftruncate(0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') sendmsg$IPVS_CMD_SET_DEST(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8040000}, 0xc, &(0x7f0000000180)={&(0x7f0000000280)=ANY=[@ANYBLOB="00ab8be3e2fc73c18991d5de0884ac1b3eab53670ddc0933b6599a593ea5ec3c6e29a37d52abe0cd40b086d350ba4ab952132a"], 0x1}}, 0x0) r2 = open(&(0x7f0000000300)='./bus\x00', 0x100000141042, 0x0) getpid() ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) ftruncate(r2, 0x10099b7) ioctl$IOC_PR_PREEMPT_ABORT(0xffffffffffffffff, 0x401870cc, 0x0) ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, 0x0) getsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5}]}, 0x10) semget$private(0x0, 0x0, 0x0) sendfile(r0, r2, 0x0, 0x8000fffffffe) seccomp(0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SHOW_STATS(0xffffffffffffffff, 0x0, 0x0) connect$unix(r1, &(0x7f0000006780)=@file={0x0, './bus\x00'}, 0x6e) 07:21:47 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @remote}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @random="e5ac78d4c7fd"}, 0x10) write(r2, &(0x7f0000000080)="2700000014000f3f00000000120f0a00110001001f750800560099ed4f05000000000004000000", 0x138) 07:21:47 executing program 0: socket$alg(0x26, 0x5, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) lsetxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) setpriority(0x0, 0x0, 0xffff) semget$private(0x0, 0xfffffffffffffffd, 0x15) open(&(0x7f0000000180)='./file0\x00', 0x2, 0xfffffffffffffffe) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:47 executing program 4: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) r0 = gettid() sched_getparam(r0, &(0x7f0000000000)) 07:21:47 executing program 1: socket$alg(0x26, 0x5, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x400, 0x0) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r0, 0x84, 0x74, &(0x7f0000000480)=""/72, &(0x7f00000001c0)=0x48) socket$inet(0x2b, 0x1, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x0, 0x0) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000300)='/dev/autofs\x00', 0x800, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(r1, 0xc02c564a, 0x0) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_bt_cmtp_CMTPCONNADD(r1, 0x400443c8, &(0x7f0000000000)={r2, 0x40}) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) lsetxattr$security_selinux(&(0x7f0000000880)='./file0\x00', &(0x7f0000000400)='security.selinux\x00', &(0x7f0000000900)='system_u:object_r:auditctl_exec_t:s0\x00', 0x25, 0x1) r3 = getpgrp(0x0) setpriority(0x0, r3, 0xffff) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) ioctl$sock_SIOCOUTQNSD(r2, 0x894b, &(0x7f0000000040)) msgget(0x1, 0x208) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) modify_ldt$read(0x0, &(0x7f0000000940)=""/245, 0xf5) 07:21:47 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @remote}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @random="e5ac78d4c7fd"}, 0x10) write(r2, &(0x7f0000000080)="2700000014000f3f00000000120f0a00110001001f750800560099ed4f0500000000000a000000", 0x138) 07:21:47 executing program 3: socket$alg(0x26, 0x5, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x400, 0x0) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r0, 0x84, 0x74, &(0x7f0000000480)=""/72, &(0x7f00000001c0)=0x48) socket$inet(0x2b, 0x1, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x0, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000300)='/dev/autofs\x00', 0x800, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(r1, 0xc02c564a, 0x0) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffeeb) lsetxattr$security_selinux(&(0x7f0000000880)='./file0\x00', &(0x7f0000000400)='security.selinux\x00', &(0x7f0000000900)='system_u:object_r:auditctl_exec_t:s0\x00', 0x25, 0x1) r3 = getpgrp(0x0) setpriority(0x0, r3, 0x8ffff) ptrace$getregset(0x4204, r3, 0x6, &(0x7f0000000080)={&(0x7f0000000000)=""/72, 0x48}) fcntl$setpipe(r2, 0x407, 0x30) semget$private(0x0, 0xfffffffffffffffd, 0x15) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) msgget(0x1, 0x208) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:47 executing program 4: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xffffffffffffff05) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$FUSE_POLL(r0, &(0x7f0000000000)={0x18, 0xffffffffffffffda, 0x7, {0x1}}, 0x18) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) getgid() ioctl(r0, 0x2, &(0x7f0000000040)="ab5dd34fb71fdbad80bdfb4c1bc2fbe38c46715fca480058cbaa76d05e8afe668423e1ac5db4eed4c867cd88") 07:21:47 executing program 0: socket$alg(0x26, 0x5, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffc46) lsetxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) setpriority(0x0, 0x0, 0xffff) semget$private(0x0, 0xfffffffffffffffd, 0x1000000011) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:47 executing program 5: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuacct.usage_percpu\x00', 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.\x00\x00\x00\x00\x00', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086607, 0x20000001) 07:21:47 executing program 1: socket$alg(0x26, 0x5, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x400, 0x0) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r0, 0x84, 0x74, &(0x7f0000000480)=""/72, &(0x7f00000001c0)=0x48) socket$inet(0x2b, 0x1, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x0, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000300)='/dev/autofs\x00', 0x800, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(r1, 0xc02c564a, 0x0) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) lsetxattr$security_selinux(&(0x7f0000000880)='./file0\x00', &(0x7f0000000400)='security.selinux\x00', &(0x7f0000000900)='system_u:object_r:auditctl_exec_t:s0\x00', 0x25, 0x1) r2 = getpgrp(0x0) setpriority(0x0, r2, 0xffff) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) ioctl$EVIOCGID(r0, 0x80084502, &(0x7f0000000940)=""/4096) msgget(0x1, 0x208) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:dpkg_lock_t:s0\x00', 0x21, 0x1) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:47 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @remote}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @random="e5ac78d4c7fd"}, 0x10) write(r2, &(0x7f0000000080)="2700000014000f3f00000000120f0a00110001001f750800560099ed4f0500000000000e000000", 0x138) 07:21:47 executing program 4: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) r0 = getpid() tkill(r0, 0x27) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:48 executing program 0: r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x0, 0x400001) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) socket$alg(0x26, 0x5, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) lsetxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) setpriority(0x0, 0x0, 0xffff) semget$private(0x0, 0xfffffffffffffffd, 0x15) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:48 executing program 5: [ 873.591743][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 873.591773][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 873.597528][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 873.603354][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 873.614752][ C0] protocol 88fb is buggy, dev hsr_slave_1 07:21:48 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x400, 0x0) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r1, 0x84, 0x74, &(0x7f0000000480)=""/72, &(0x7f00000001c0)=0x48) socket$inet(0x2b, 0x1, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x0, 0x0) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000300)='/dev/autofs\x00', 0x800, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(r3, 0xc02c564a, 0x0) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) write$binfmt_elf32(r0, &(0x7f0000000940)=ANY=[@ANYBLOB="7f454c46050800050900000000000000020007000400000091030000380000007802000009000000372a200001000600090054070000000000000000740000000700000001000000070000000000000009000000060000000500006001000080000000009d0b000000000000230d00000200000002000000090a8099e263903f59be065d03d466ac2a3bafcb81afbc9603d183c76313a89251eb686cd43a071348d73aa72cf0d7bf4c6b2dc9eaaa68d0ca696478d70889f9ee6b6de83cea8b53d4abe339438034516d504418c50000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fd00"/2765], 0xacd) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) lsetxattr$security_selinux(&(0x7f0000000880)='./file0\x00', &(0x7f0000000400)='security.selinux\x00', &(0x7f0000000900)='system_u:object_r:auditctl_exec_t:s0\x00', 0x25, 0x1) r5 = getpgrp(0x0) setpriority(0x0, r5, 0xffff) ioctl$DRM_IOCTL_MARK_BUFS(r3, 0x40186417, &(0x7f0000000540)={0x95a, 0x800, 0x6, 0x5, 0x1, 0x81}) fcntl$setpipe(r4, 0x407, 0x30) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f0000000340)={0x1, [0x0]}, &(0x7f0000000380)=0x8) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r3, 0x84, 0x10, &(0x7f00000003c0)=@assoc_value={r6, 0x10000}, &(0x7f0000000500)=0x8) ioctl$FS_IOC_ENABLE_VERITY(r2, 0x6685, &(0x7f0000000280)={0x1, 0xd37, 0x1000, 0xc1, &(0x7f0000000000)="69ba6a6259e658078c179d649e2f523cc9f4584405a752c47a3a382ed50504736750f9e6673614346b00e8538ec9a11b497a462af40f95a0898bba85764eef62ebb97378feda8c1954fe8fe0bf061a5d20a113f0d2b9aebcfe7a21e018f7e21b3862705bbb35e1b1660dc15be300ddd5ee64bc640c7c4886540005a3a25bbcfcfa4daf07c39fe103fd9339066c4445e2af323e0a2349e37a89d27ba03bd532d6668766f3e3d843ed03c74d322131b94a3368e3c47d12da0cf9067b71ef1ea7a1aa", 0x2, 0x0, &(0x7f0000000100)="8bdb"}) semget$private(0x0, 0xfffffffffffffffd, 0x15) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) msgget(0x1, 0x208) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:48 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @remote}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @random="e5ac78d4c7fd"}, 0x10) write(r2, &(0x7f0000000080)="2700000014000f3f00000000120f0a00110001001f750800560099ed4f0500000000000f000000", 0x138) 07:21:48 executing program 4: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x602, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f00000000c0)=ANY=[@ANYBLOB="0008009d", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000000100)=0x10) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000140)={r1, 0xffff}, &(0x7f00000001c0)=0x8) r2 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000040)=0xffffffffffffffff, 0x4) fcntl$setpipe(r2, 0x407, 0x200000000400006) r3 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x65, &(0x7f0000000000)=0x2, 0x4) sendmmsg$alg(r0, &(0x7f0000000940)=[{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000200)="5b56056eb92e2f4c4c46115c94bdabebf55a6ee1eedaf790e2b5f99b70caffb2187031933be3fc1bbaae1f", 0x2b}, {&(0x7f0000000240)="7de81290c2d14879e723e86bc947e45e15d88f20", 0x14}, {&(0x7f0000000280)="2f97ce1a6cc3ac82ebd92d8cf33762a560a383a8a9da121ae91083c708e25c254446fbf5d9adfb5a013e26a8c9c957f355ce568d2df56e154ddcb8de8c45dc5d", 0x40}, {&(0x7f00000002c0)="14cef0d91a5a1bb2facdb92fe6797d2a35adb7ba846309ee90458a7988108a75f04f", 0x22}, {&(0x7f0000000300)="e33f56ab37ca6c19627afff5d9b2d161da5b249afa81ff77dbd287f88ffac13afa876134a43d6d045afe5c6f53c8d3012230395a88a14df0971af3421b62144724f732552d8bb402346fc7e86aa147d4405a74aaaf4e49cfda2e430fdee2762bf33ce35468a9777494f7d6b67dbcd262b3cefe75c860c63ded442839e7b7813f7eab07c8fbad7b8d27a6652cad29563b0b398a709e99beadc46f68878395fe414ede7f1cf8ef201957f3a343571c73e944b6294ce0f5930aacf527dc4707", 0xbe}, {&(0x7f00000003c0)="0367690a025f4d9ee0edbd349533e51d863241d4f9be11", 0x17}, {&(0x7f0000000480)="6543f8b237c0adaf448baf5be10226e626426103cf6986c70fcd1c704ec227fde731fad27d7f47953401a554c28868561f66209712bc49c4798de3282008374367c2615b264c99dca29010a519155d97788380091a1b0aebc61b9b2300a59ffbeda064d1fac1f06313bb9db91c8d109c33a08121b24a7ab9540f8fe0e7c2046c0e97233bffeebab56ec0255632a5357ea726aa801a108037b2019ec3e114db4a9756df45f77e3d15ff4877426d4c18f9ae88f26bba11e697ceb1c34dbf376fd63f965eb5537fb1ae171c4b4420dcbfd1c2ea68a1be587a39d52166a94e", 0xdd}, {&(0x7f0000000400)="e955b3b130942fab84bbc2e36d023dd7dcd6e37851b0ca1bd79b9e3e424ab99b9cdca12f47620699c304a64137f817b1482e8bdd114c983dcf0a77f08b78d041", 0x40}], 0x8, &(0x7f00000006c0)=[@assoc={0x10, 0x117, 0x4, 0x6}, @op={0x10}], 0x20, 0x8090}, {0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000700)="9d165ecb9908845e30cd627b9951e3", 0xf}, {&(0x7f00000007c0)="e4d77def5ec4705c3177a903047869e76d6d44a6377265695c9b6436ce05b87f4a819d7ed0d5a9a45ae83403af81a99e3526c9a60200ec6c293f04f2a025f01f7ba842", 0x43}], 0x2, &(0x7f0000000880)=[@assoc={0x10, 0x117, 0x4, 0x6}, @iv={0x64, 0x117, 0x2, 0x54, "aff0c09c31052d2d0ea1e7e57ba271b5dbef6fa31edf704a9d5f2ae06728b7979da09668d988405b15109d3a8fb2433cc55a66c5812efe5841e0dd33f5adf35c5d66651b1e4f1fcfb0a4609394fb3ccfa27f98da"}, @assoc={0x10, 0x117, 0x4, 0x4}], 0x84}], 0x2, 0x80) alarm(0x100) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:48 executing program 5: 07:21:48 executing program 5: 07:21:48 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @remote}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @random="e5ac78d4c7fd"}, 0x10) write(r2, &(0x7f0000000080)="2700000014000f3f00000000120f0a00110001001f750800560099ed4f05000000000110000000", 0x138) 07:21:48 executing program 5: 07:21:48 executing program 1: socket$alg(0x26, 0x5, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x400, 0x0) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r0, 0x84, 0x74, &(0x7f0000000480)=""/72, &(0x7f00000001c0)=0x48) socket$inet(0x2b, 0x1, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x0, 0x0) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000300)='/dev/autofs\x00', 0x800, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(r2, 0xc02c564a, 0x0) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) write$P9_RFSYNC(r0, &(0x7f0000000000)={0x7, 0x33, 0x1}, 0x7) lsetxattr$security_selinux(&(0x7f0000000880)='./file0\x00', &(0x7f0000000400)='security.selinux\x00', &(0x7f0000000900)='system_u:object_r:auditctl_exec_t:s0\x00', 0x25, 0x1) r3 = getpgrp(0x0) setpriority(0x0, r3, 0xffff) r4 = inotify_add_watch(r1, &(0x7f0000000040)='./file1\x00', 0x20000200) inotify_rm_watch(r2, r4) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) msgget(0x1, 0x208) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:48 executing program 4: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x502, 0x0) r1 = openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/attr/current\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:48 executing program 5: 07:21:48 executing program 0: socket$alg(0x26, 0x5, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) lsetxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) setpriority(0x0, 0x0, 0xffff) semget$private(0x0, 0xfffffffffffffffd, 0x15) r0 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$VHOST_SET_VRING_ERR(r0, 0x4008af22, &(0x7f0000000140)={0x0, r0}) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) timer_create(0x6, &(0x7f00000000c0)={0x0, 0x14, 0x2, @thr={&(0x7f0000000000)="376399af5964cbf352c1b21fcf3a9780828fc7bec24b7bdc0db5358f2c5a1350fe75119001c8d51c66eee1b625a66778244a40644e321b6aca6c15dd067f4e704d5ba76eabcfbb576ae0622c2803ac2f29644ef0356dbe8dc1e91b", &(0x7f0000000080)="13fa0b75f69e080e959571d766965b40482883d1d6dc8aaf08628cd9"}}, &(0x7f0000000100)) 07:21:48 executing program 3: socket$alg(0x26, 0x5, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x400, 0x0) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r0, 0x84, 0x74, &(0x7f0000000480)=""/72, &(0x7f00000001c0)=0x48) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f00000003c0)) r1 = msgget(0x0, 0x5be) lstat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0}) r3 = getegid() getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000940)={{{@in6=@empty, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) r5 = getgid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={0xffffffffffffffff, r0, 0x0, 0x5, &(0x7f0000000100)='p\xf2oc\x00'}, 0x30) ioctl$TIOCGSID(r0, 0x5429, &(0x7f00000002c0)=0x0) msgctl$IPC_SET(r1, 0x1, &(0x7f0000000340)={{0x7, r2, r3, r4, r5, 0x8, 0xffffffff}, 0xbd, 0x9a7e, 0x4, 0x7, 0x8, 0x0, r6, r7}) socket$inet(0x2b, 0x1, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x0, 0x0) r8 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000300)='/dev/autofs\x00', 0x800, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(r8, 0xc02c564a, 0x0) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) r9 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) lsetxattr$security_selinux(&(0x7f0000000880)='./file0\x00', &(0x7f0000000400)='security.selinux\x00', &(0x7f0000000900)='system_u:object_r:auditctl_exec_t:s0\x00', 0x25, 0x1) r10 = getpgrp(0x0) setpriority(0x0, r10, 0xffff) fcntl$setpipe(r9, 0x407, 0x30) semget$private(0x0, 0xfffffffffffffffd, 0x15) open(&(0x7f0000000180)='./file0\x00', 0x100, 0x1) msgget(0x1, 0x208) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:48 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @remote}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @random="e5ac78d4c7fd"}, 0x10) write(r2, &(0x7f0000000080)="2700000014000f3f00000000120f0a00110001001f750800560099ed4f0500000000003f000000", 0x138) 07:21:48 executing program 5: 07:21:48 executing program 3: socket$alg(0x26, 0x5, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x400, 0x0) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r0, 0x84, 0x74, &(0x7f0000000480)=""/72, &(0x7f00000001c0)=0x48) socket$inet(0x2b, 0x1, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x0, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000300)='/dev/autofs\x00', 0x800, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(r1, 0xc02c564a, 0x0) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) lsetxattr$security_selinux(&(0x7f0000000880)='./file0\x00', &(0x7f0000000400)='security.selinux\x00', &(0x7f0000000900)='system_u:object_r:auditctl_exec_t:s0\x00', 0x25, 0x1) r3 = getpgrp(0x0) setpriority(0x0, r3, 0xffff) mlockall(0x5) fcntl$setpipe(r2, 0x407, 0x30) semget$private(0x0, 0xfffffffffffffffd, 0x15) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) msgget(0x1, 0x208) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:48 executing program 5: 07:21:49 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @remote}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @random="e5ac78d4c7fd"}, 0x10) write(r2, &(0x7f0000000080)="2700000014000f3f00000000120f0a00110001001f750800560099ed4f05000000000040000000", 0x138) 07:21:49 executing program 4: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = getuid() lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchown(r0, r1, r2) execve(&(0x7f0000000040)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000000)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000080)='!\x00']) 07:21:49 executing program 5: 07:21:49 executing program 1: socket$alg(0x26, 0x5, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer2\x00', 0x400, 0x0) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r0, 0x84, 0x74, &(0x7f0000000480)=""/72, &(0x7f00000001c0)=0x48) socket$inet(0x2b, 0x1, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x0, 0x0) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000300)='/dev/autofs\x00', 0x800, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(r2, 0xc02c564a, 0x0) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) fcntl$getownex(r3, 0x10, &(0x7f0000000040)={0x0, 0x0}) ptrace$setopts(0x4200, r4, 0xfc, 0x1e) lsetxattr$security_selinux(&(0x7f0000000880)='./file0\x00', &(0x7f0000000400)='security.selinux\x00', &(0x7f0000000900)='system_u:object_r:auditctl_exec_t:s0\x00', 0x25, 0x1) r5 = getpgrp(0x0) setpriority(0x0, r5, 0xffff) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) msgget(0x1, 0x208) ioctl$DRM_IOCTL_RES_CTX(r2, 0xc0086426, &(0x7f0000000100)={0x9, &(0x7f0000000080)=[{}, {}, {}, {}, {}, {}, {}, {0x0}, {}]}) ioctl$DRM_IOCTL_LOCK(r2, 0x4008642a, &(0x7f0000000280)={r6, 0x2}) ioctl$SCSI_IOCTL_GET_PCI(r1, 0x5387, &(0x7f0000000000)) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:49 executing program 0: socket$alg(0x26, 0x5, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) lsetxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) setpriority(0x0, 0x0, 0xffff) semget$private(0x0, 0xfffffffffffffffd, 0x15) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x800, 0x0) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, &(0x7f0000000080)=0x4) r1 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) ioctl$FS_IOC_FSGETXATTR(r1, 0x801c581f, &(0x7f0000000000)={0xa215, 0x6, 0x5, 0x7, 0x9}) 07:21:49 executing program 5: 07:21:49 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @remote}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @random="e5ac78d4c7fd"}, 0x10) write(r2, &(0x7f0000000080)="2700000014000f3f00000000120f0a00110001001f750800560099ed4f05000000000060000000", 0x138) 07:21:49 executing program 3: socket$alg(0x26, 0x5, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x400, 0x0) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r0, 0x84, 0x74, &(0x7f0000000480)=""/72, &(0x7f00000001c0)=0x48) socket$inet(0x2b, 0x1, 0x2000000000) openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x0, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000300)='/dev/autofs\x00', 0x800, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(r1, 0xc02c564a, 0x0) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) lsetxattr$security_selinux(&(0x7f0000000880)='./file0\x00', &(0x7f0000000400)='security.selinux\x00', &(0x7f0000000900)='system_u:object_r:auditctl_exec_t:s0\x00', 0x25, 0x1) r3 = getpgrp(0x0) setpriority(0x0, r3, 0xffff) fcntl$setpipe(r2, 0x407, 0x30) semget$private(0x0, 0xfffffffffffffffd, 0x15) r4 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) msgget(0x1, 0x208) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) ioctl$VT_GETSTATE(r2, 0x5603, &(0x7f0000000000)={0x1ff, 0x9, 0xfffffffffffffff8}) ioctl$KDSETMODE(r4, 0x4b3a, 0x4) 07:21:49 executing program 4: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x100001081ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) ioctl$KVM_SET_DEBUGREGS(r1, 0x4080aea2, &(0x7f00000001c0)={[0x10000, 0x2, 0x6000, 0x100000], 0x8001, 0x6, 0x400}) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000000)={{0x2, 0x4e20, @multicast1}, {0x306, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}}, 0x8, {0x2, 0x4e20, @multicast2}, 'ip_vti0\x00'}) ioctl$sock_inet_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000080)) syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0xfffffffffffffffc, 0x20000) 07:21:49 executing program 5: 07:21:49 executing program 5: 07:21:49 executing program 5: 07:21:49 executing program 0: socket$alg(0x26, 0x5, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) lsetxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) setpriority(0x0, 0x0, 0xffff) semget$private(0x0, 0xfffffffffffffffd, 0x15) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x800, 0x0) ioctl$EVIOCSCLOCKID(r0, 0x400445a0, &(0x7f0000000040)=0x1245a86f) 07:21:49 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @remote}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @random="e5ac78d4c7fd"}, 0x10) write(r2, &(0x7f0000000080)="2700000014000f3f00000000120f0a00110001001f750800560099ed4f050000ffffff9e000000", 0x138) 07:21:49 executing program 4: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r0, 0x28, 0x0, &(0x7f0000000040)=0x7, 0x8) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) [ 875.431762][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 875.437596][ C1] protocol 88fb is buggy, dev hsr_slave_1 07:21:50 executing program 1: socket$alg(0x26, 0x5, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x400, 0x0) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r0, 0x84, 0x74, &(0x7f0000000480)=""/72, &(0x7f00000001c0)=0x48) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@mcast1, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000100)=0xe8) sendto$packet(r0, &(0x7f0000000000)="3be43db8c82006fbdcd4d78669a2e2b16b9b17ddb022cc0fa5e360657752c0840e9ad53e67b9e04a5b3aa1b76fcdfadd36d0b62ecd1a96d6a1513a7f660c74201d68f831f43195a0ab250817395c94818e8e511dfda6e8af120fad3f4a1168b51a18a24623107f318f6d6cd413f5dbc8d76989b006a6ac21a85d94e6f53b39cf0c1edc53c3f4457dd4c223e98dc0706753c7c1ace5ba4bab1db4ce6c7366e7dd0fed4bd2fc86bac863ce2d130113232fb9fabadd7ad49e98d2889c31909ee94ce527e8ea7fc3c9ea2b28edb366078b4ddad4682934a69a502ffa5782f875", 0xde, 0x4000080, &(0x7f0000000280)={0x11, 0x1f, r1, 0x1, 0x83}, 0x14) socket$inet(0x2b, 0x1, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x0, 0x0) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000300)='/dev/autofs\x00', 0x800, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(r3, 0xc02c564a, 0x0) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) lsetxattr$security_selinux(&(0x7f0000000880)='./file0\x00', &(0x7f0000000400)='security.selinux\x00', &(0x7f0000000900)='system_u:object_r:auditctl_exec_t:s0\x00', 0x25, 0x1) r4 = getpgrp(0x0) setpriority(0x0, r4, 0xffff) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) msgget(0x1, 0x208) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) ioctl$TIOCLINUX2(r2, 0x541c, &(0x7f00000002c0)={0x2, 0x80, 0x3f, 0xd1, 0x80000001}) 07:21:50 executing program 5: syz_emit_ethernet(0x14c, &(0x7f0000000100)={@local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x4c, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x5}}}}}}}, 0x0) 07:21:50 executing program 3: socket$alg(0x26, 0x5, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x400, 0x0) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r0, 0x84, 0x74, &(0x7f0000000480)=""/72, &(0x7f00000001c0)=0x48) socket$inet(0x2b, 0x1, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x0, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(0xffffffffffffffff, 0xc02c564a, 0x0) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) lsetxattr$security_selinux(&(0x7f0000000880)='./file0\x00', &(0x7f0000000400)='security.selinux\x00', &(0x7f0000000900)='system_u:object_r:auditctl_exec_t:s0\x00', 0x25, 0x1) r2 = getpgrp(0x0) setpriority(0x2, r2, 0xffff) fcntl$setpipe(r1, 0x407, 0x30) semget$private(0x0, 0xfffffffffffffffd, 0x15) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) msgget(0x1, 0x208) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:50 executing program 0: socket$alg(0x26, 0x5, 0x0) r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x2, &(0x7f0000000080)={0x0, 0x0, 0x0}, &(0x7f0000000100)=0xc) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000000)={r1}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) lsetxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) setpriority(0x0, 0x0, 0xffff) semget$private(0x0, 0xfffffffffffffffd, 0x15) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:50 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @remote}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @random="e5ac78d4c7fd"}, 0x10) write(r2, &(0x7f0000000080)="2700000014000f3f00000000120f0a00110001001f750800560099ed4f05000000000ec0000000", 0x138) 07:21:50 executing program 4: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$KVM_SIGNAL_MSI(r0, 0x4020aea5, &(0x7f0000000000)={0x2000, 0x4, 0x7b, 0x2, 0x49}) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:50 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x2000000005, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) write$P9_RSTATu(0xffffffffffffffff, 0x0, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r0, 0x0, 0x1600bd74, 0x0, &(0x7f0000000000)) 07:21:50 executing program 5: socketpair$unix(0x1, 0x400000000003, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000400)={'eql\x00', 0xd102}) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000080)={'eql\x00i\x0e\xa9[\x00\xce\x00', @ifru_mtu=0x1}) 07:21:50 executing program 3: socket$alg(0x26, 0x5, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x400, 0x0) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r0, 0x84, 0x74, &(0x7f0000000480)=""/72, &(0x7f00000001c0)=0x48) socket$inet(0x2b, 0x1, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x0, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000300)='/dev/autofs\x00', 0x800, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(r1, 0xc02c564a, 0x0) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) lsetxattr$security_selinux(&(0x7f0000000880)='./file0\x00', &(0x7f0000000400)='security.selinux\x00', &(0x7f0000000900)='system_u:object_r:auditctl_exec_t:s0\x00', 0x25, 0x1) r3 = getpgrp(0x0) setpriority(0x0, r3, 0xffff) fcntl$setpipe(r2, 0x407, 0x30) semget$private(0x0, 0xfffffffffffffffd, 0x15) r4 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) msgget(0x1, 0x208) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(r4, 0x40bc5311, &(0x7f0000000000)={0x2, 0x0, 'client1\x00', 0xffffffff80000004, "21deebe1b9c18ae4", "332226c50dbc2f3b6aa6d7d2f14dc1b3f5ca489b098864730356fa1da6ab7904", 0x200, 0x7}) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) [ 875.911747][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 875.917607][ C0] protocol 88fb is buggy, dev hsr_slave_1 07:21:50 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @remote}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @random="e5ac78d4c7fd"}, 0x10) write(r2, &(0x7f0000000080)="2700000014000f3f00000000120f0a00110001001f750800560099ed4f05000000000be9000000", 0x138) 07:21:50 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) getsockname(r0, &(0x7f0000000040)=@nfc_llcp, &(0x7f00000000c0)=0x80) r1 = accept4$unix(0xffffffffffffffff, &(0x7f0000000100)=@abs, &(0x7f00000001c0)=0x6e, 0x80800) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000200)) lsetxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x40000, 0x0) write$UHID_INPUT(r2, &(0x7f00000007c0)={0x8, "e25024bf479d7d3564c3c1ae5be34cdf2cda98bb70284c22434e1033b4c49f81b65d47df01cf41bed7d8280d8b0eb78356f41817e37bfabd38707a907928002238d5a67c0068513708bdcae694eea5e67cba3982ebccfae99a5fba77b4086e13973a6f310ab5decb476af027a5143bc4dafe4de6e8f4c6e5226059d637814a8ba1bd3a39bc345a45d905371c8f15d07e6b7c632ea052e9ec0958b1ea20ddc14966f89fb111bf8dd123a10b3744e2aa8621bcc23f4c972a2b04e9c3a63c8d02e49830151a5628527c36e3fe2951b0b77e3b1b48ed133889242717a70e81b308aa3c4b86e2fff798f931828ac28c85c3e243c02dab71706befbee6900986a5f3665f1a29daaa7eacc543e3b684f72e307800760bee3aebead0d96246f7b3d233ae1f5055ea64ecded1b336fe13b9bb88b49507b165876455b63fa019d6e89e8dd343e216734f4615a9169d3b6de23bda1ff1726d26ff903010f95439a7f34a243513d7ce898161de8aea6334d6dda2ea24393da1e75654f5431a7a855af2112a19cb594dbd33449b3591f21cb14018e377b4a569696220834b7b46c4c5dd7930bf7d88905d3a164888f518ee475bf74357a5a641c734e396695cd3aa6dc31e18a0544c081c4f9a24d7c560cdfd75baf168642e33d1076414a02e7d31c7575b47d4d5fc3e3aedc5243aa11f3850563e3d8bf7e313a1491e7de9f1d9f67790f60974ebc4f88e47e547303e808a959ca4bec91cb82fa20e892b6055cb83f260ca25f072badae5cdc90ebe02669891ceb3a5864f2f245a774419cf521d885418ef9fc4253d20c784c28be3054c7f9b5e978cc80679e341b241a5e4762098a546af48bd6f1632b4c47dc594d3bb02948a402a500fab923fb2cd8422d8fa96e99a7d23a081801ca3b69713cd1b42871069aa95800de37130392d01d4a50c8296d9403a1c4c5a216ad2b4578c09452c59b4825fad7ab60b7c2934ffe3e7af8fa24fc90bdb9214d84c7d13aeddd34cfb4f82ffe2f39fa233f010158046381f36057fbf4692259f68f00662aaeda66699c1dc28d9b350392bde8cd6b12e935209582d1788a38397942561d6f0a18afc113a593a7c2b30ae04452672104c1a0226c6229f8856f931d386ca6106614453f4d5a21749610bbaa7ed1d57ed36d5a9741944d65de2d1d51224510f3e4b51dde014d9dbd2e38452e89238f0b14ac99656064152fdebe22f548dbf5f07e8c82ca590d4772749337b046da0ae4d9ff61ab2b666bdee49a16595f72b909e3758d70e4fa42331b9a732e6a4070c4e526e351970aef67dd8632357c0774ed71871e07965d1b4602c8eb98121fa02c451e142ed20a3d8b8728449408cdd08bfe9461b866d453aee441834fb2ea17356c95758a7ed60ad18ae4cec5f6735ac4a113954d0771d6336fa378f08ca118aad25346a2c763a0de8573ce09666f4d55fa747819a6550716f2d4ac55ec908f73f4c743569d55972dbd17838ca53df4a4ad6ace8ff9b811307ed852d03daebdf0235de751b4b30eaeb1f5d49f495b341918e550efacb57816255c5e5775b42cff82f244854700ae350bea87de130778021f0ca532bf3abff1b19a412d26317ebc05cb44b1e055af96899040e60d236ae6d50058fab81690c443d78c5bf0c3c4560f054e12b263f43e856f6c8fa6a6693f0539fedd077073abe835246650a011d334d380986c0151a72d043c16e459ec096970ce4d77760cd29c81d1789f259612a97e4dc0421ea69da70c535d7b2c6b440720cdf691097f62d2692be1d98953680f01dbceaa9b7577f835459f9da7f6917b66b60c4e0f99aba620e475dc09bf4b84757d724e92e5c4d02412211dcddb7d412996f84ecd53c657a73ac29db69609183f5e3ed7f5bc7a62d8ced1d0a3d95cda99c7836f8740a9e3c588928816b647025e15e6728e3df24e6ec5a0ad8313270832c3683adaa870f806dacc207a388cd3cf2f11a4e923355154b77989dc51e4c04b0a820c11da45a7354abfc7d2924e442fa7aa8ef58c7ee16128be9111c7a90b2ce35f6050212266ca9df5b335b18ddb9eaf5f412ca0426a1b3a6d425690905fb79de995a383c63a64b472e0ef4eb608db14e17ca2db30eb483f799836ff22ca9441c2282a2abdadfbe1407aea7254f170715cf9149e97e94e76c4ef1d19722bc5e17840e3dd67af4dc43baf8f9588167b9b10d3fac4ed43ac85addfe62dd4469231da065363c51b24f33802c6b415de599edeab267d2135e88b471cad7c55a0be292c1ddbc95b82e95eaba0114c8ee71055c62db1defef1d56cb0cb7a67bc3b79a530d6fab4b2412cf717fe4b8960cdc20855887b93800a252ed5f7a24f28d9b629a21db434f52837dc7542a7accf451ab08c3b8bd4940afbfbbb23951f5460071ba1cb3fb89e62ce014aab5fa22a500e852d0cee98a10d3b47d09a80d16e99f11e51ecab48609ec102965b94798e3f454a0d667b4ab1a64bd613c661d5d40034a7a8c908fecc04bfae3e8ed649a196bec2c73184b9d154073ae68a69c789d5652c59921d7aff380b21bb987fb575837d6d0e7c7cfac1b18b573dbc6dcd0d0e235e27a2a5735402d9cf2f2c1da67fe2fd2fe8d669b0eee17668fa58c0cd451f5dbc7137c71846ba89508a48f87c26f126362151636b66f3797aca12562d8a9e80bc0be70227aaf8a110e12638eca65f213e7554e92bd2701c9a48418543d82e1188600cc34e3136a02e470545d1172e96308c7aec8615a8f194a71f0a2b1c4685c4a451c41e6caac142fe09498b81d29df96a0090d0661185f5198d6ec7dd05088f7d33d7bac92b35b81b9fb9a28647bd367fb69424c24ce0b5c2e166268590098af142a13b0294489a1a436e0c54d98ca38909e1b79fedcc68b95b7235a9f1c7d13991cf8a6d171595068529c918a675b78674dc8acd45d89b817336594b291733a76330ffebb100415018d85760d05314caca7de65eac325357561b40711434bf580301175eead2c6e3e4cb25bec590aaa585d66f0195315e4fa7527a97fcd2ae77053ecb1aa4c7b52a49a7de340629a18006bbef7b578e4ef0d7541d2348910b44d8c8be36f77344ad1ef5ab1221ccf0239679f47429b1e73af481ab81d547b24e584438090ef79d34b85b89122cac4be25620b3104217820e787105c70b87ced054c5531193189de35516cf85af1d6e17f8d757b4ee5a0bbfbddee28c3c615f5423eb994d0a1965f87a8e257ba04095c68d1745460e9ff3cdbf52b27c5be52e7ec8c2801a5dff1704090d9c85b886f4ee283a7087985ee62f9756885309c4d79431bd3d199e486ef725ecb498807314aa22bdf29637871407b1eeac57a5780bddd3c949fb1e4a70e23dafbce72fd70be0dcbce27b6615c9414dbc54fb23e1fa4cb300c5a70cb6ecf6bf5cd7fe0559e11ae40ff08c95fbf5618816a4dc57645144357a0ff24516bd7b1e8dd3f0207879d1ae89b7afad607dad6ddc4aba6fde3e27faaeb0befd7a4c303360b8aca80b7913b1c3bb2b8279b1bf9ad5d627a2e8b832e48ddbbbb15308a837552754f849fd23b97097d33e3d50ef78a8eefda7277d6adb37089e650c9110f59ef601126cedda30b9f1324eaeb07502959a7bf164f4f78a9b83f017419e0d073ad4950a555f3f1fa938a19043089472d0ea918e37f428b5e2f39bbd506a75d939ecd01040348e38668f7a0a441b505d4c7244a21b64675b5dc096dec1a16775ce4375d4590105cf8b5927b776f3dc546349beaf0110adb06719f980fb2c4e7b16c4fb70db786f194dde1b7fa838502d18a801154901545be3eba19cd75c1e39df87853f6c3f2bb22bd8ac34a87e13865efee834dfc08ce2c5e8927274445278839b104b1a83c40e59b045e05bb9f382adf8a58f46727e428cee5fe337940b577909ec414478beeed3f9234a0053e00c44886ff5f39ed5fc67b79f4672da6fe513bb00ba975b13d4dfbb22404c4785a2a110cb58c4bb462e68c2f039ebd368d09bb7c7184d574b284dabc6079940068e0d01e01cd925b40472cacbba3e266dab426689beec5ffcf01d97d1f5c9002854cbb629416f946869c1a39993704c85de82b8129547d1e18e90a3cf26d28f50ba283a9f6b02d7c9d84fa5a726ce8b0cd9f0e90235a3ff48d820eeb248771ab3a50369ceb0487fba1c46676c63eeaf5e4ce1b1387429e324024e7a1328b0ef0dfcd6373d0d3b3a02e50c16e6f6b59aabb343462ecf40c0ad39c5314eb83bc5920ecd8ebf02455736d4d400cd0cdd4279506aac0e0f6061668e3319745be8992c21fc5561409298be28eed64e49f77b626dd044a8e86fd53d6fa407650fb420384c2fde2adef8cf45b2958ea8ac9c7c7ae65b4dc8c6c1e87d19d9944579fb9b7e4ea6b35abfd0704bd8f4096d291041876ba561fa2a19fcef34ac45f8f91b1daf068a300db12c573b3408abfcee86ea05b74accd8863f49c5126b03e23843f54f2b78feb9878a3f6c8d0280bb00c4ef869b9ebd34f4ba41f76300f145fa2f62fdddc492774a39cca52bdbccac02b2ecf3fd81d37a1ef4d6a810abc061a07f3f0caacf266343e8913e71c2e558d4ca1854dc305c0b860e40f98e4e23de5dfa81ff1f0cf1f53fdfee710453beb239d48a30a8c3b8ff9a7aa46084a2ff7065353d6f81f87bb14700b4cd4a69e4a65ba7f6d2fba97184cd7fbe4ad9f19b1af6b80b01c15cb88988a8ecb803484689d9541698cbd730294552cccdaf62eb7ef456800f28ef00cd1f49402b09f839878d1e06e2e75882f4af288f6f1fc227437d7cf04ddbe41567edb8efe956ec4b9c7bc38af2b2c19afaa50c302c0aef2afc49261c8cb6c81615ad4185683dd55b4dde1bbcc5dae34016f6ded557ba38c8985450db6d939d7eda1e2a6e466a2dccbb74108d1e30345e41639a26ccc2c3bdb27512db41bfb3ab24e9a36d4079c43563e1fd051d8f52d1cbab25da1fdf25821c2b542ac28d06dfb71e6dc8194933f55aacd8f76be0080f37992f18c691e306072954982f44129279480a34c0b6ec1f536f14938a414330ffeb3a24c71bc47d1d574ab5e3a932d68ec00772a356f0e881c08163ce45078b87ca5956267d3486fec59ef625564a96426e9c99a1a1b02fe84c46cfd079d4ed103d80afce6e137c8560263a28ef3cb9d39737d6b85df600713ae8df5e2e109cfdd7c2f64f9d6e414b509c0bc72290ec69f36451f2c19997c798c5a102e7f490dcd785ce9f31d22ad539698a0b7c9e3dffe7771aae5bb3a5e1b8a5d83713058798e40b1992e2a016c5c691cf939870420f7dbac55ac57ec09c495f28828c8c9c315423788fab8db66db7e73c30868e1c6955ea9267126fd092d11aeab6613a4bd46150553b2a4a79ef7a0fd6d530827f496165d444926e9f18ca165895a1278ca17e1eb2456c875dcfd29e113e4977a674d87c78a689f12d51d76f9f8223f53e6c8d110100e17acf367c527072cb46fcbb67b8ca5a7a3bf6c0d34fdfaef91f4a30cd030d2e449120952d79a651d8e5863410e24dfa2842c9d83d66f935c260c187434582b0b9e910f73945faa0bae6aa15a6c47af997d3e82aaf6724c7ae62ba31ccc0320165ad089c2e18c4d9e1f8c1a02627b0c8977b69a7e3404c61540f82ed2876d63a7082f7136ea8f3a41b286d7541d3f4608f2e4c928951848255337ae71bbdd6d049f07b09c255ebdf5a92923982d99bb65506cb847974bd1713d69503382b424c9feaf834e3ac788e53d0145a0edf96bf68f6f5ee00072e07198ec3d2d398229708400", 0x1000}, 0x1006) setpriority(0x0, 0x0, 0xffff) semget$private(0x0, 0x3, 0x40000000015) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x200200, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:50 executing program 4: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x40000, 0x0) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:50 executing program 1: socket$alg(0x26, 0x5, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x400, 0x0) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r0, 0x84, 0x74, &(0x7f0000000480)=""/72, &(0x7f00000001c0)=0x48) socket$inet(0x2b, 0x1, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x0, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000300)='/dev/autofs\x00', 0x800, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(r1, 0xc02c564a, 0x0) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f0000000400)='security.selinux\x00', &(0x7f0000000900)='system_u:object_r:auditctl_exec_t:s0\x00', 0x25, 0x1) r2 = getpgrp(0x0) setpriority(0x0, r2, 0xffff) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) msgget(0x1, 0x208) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:50 executing program 0: socket$alg(0x26, 0x5, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) lsetxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) setpriority(0x0, 0x0, 0xffff) semget$private(0x0, 0xfffffffffffffffd, 0x15) prctl$PR_SET_TSC(0x1a, 0x2) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:50 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @remote}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @random="e5ac78d4c7fd"}, 0x10) write(r2, &(0x7f0000000080)="2700000014000f3f00000000120f0a00110001001f750800560099ed4f050000fffffff0000000", 0x138) 07:21:50 executing program 3: socket$alg(0x26, 0x5, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x400, 0x0) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r0, 0x84, 0x74, &(0x7f0000000480)=""/72, &(0x7f00000001c0)=0x48) socket$inet(0x2b, 0x1, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x0, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000300)='/dev/autofs\x00', 0x800, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(r1, 0xc02c564a, 0x0) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) lsetxattr$security_selinux(&(0x7f0000000880)='./file0\x00', &(0x7f0000000400)='security.selinux\x00', &(0x7f0000000900)='system_u:object_r:auditctl_exec_t:s0\x00', 0x25, 0x1) r3 = getpgrp(0x0) setpriority(0x0, r3, 0xffff) fcntl$setpipe(r2, 0x407, 0x30) semget$private(0x0, 0xfffffffffffffffd, 0x15) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) msgget(0x1, 0x208) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) getsockopt$TIPC_SOCK_RECVQ_DEPTH(r0, 0x10f, 0x84, &(0x7f0000000000), &(0x7f0000000040)=0x4) 07:21:50 executing program 4: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xd494c3df31a3c63) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000000)='TIPC\x00') open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:51 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @remote}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @random="e5ac78d4c7fd"}, 0x10) write(r2, &(0x7f0000000080)="2700000014000f3f00000000120f0a00110001001f750800560099ed4f05000000f0ffff000000", 0x138) 07:21:51 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) r1 = syz_open_dev$midi(&(0x7f00000000c0)='/dev/midi#\x00', 0x2, 0x200400) ioctl$CAPI_SET_FLAGS(r1, 0x80044324, &(0x7f0000000100)=0x1) r2 = creat(&(0x7f0000000080)='./file0\x00', 0x20) ioctl$KVM_SET_CPUID2(r2, 0x4008ae90, &(0x7f00000001c0)=ANY=[@ANYBLOB="0700000000000000070000c00300000006000000030000000000000001010000860000000000000000000000000000000400000033020000010000000100005282ffff01000000000000000000000000000000070000000800000000000000c602000000000000580000000000000000000000000000000000000001000040010001000000000009000000030000007f000000010000000000000000000000000000000f00000001000080010000000101000001000000000200000100010000000000000000000000000019000080050000000500000004000000090000000002000000000100000000000000000000000000010000c002000000020000000900000001000100050000000200"/283]) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) lsetxattr$security_selinux(0x0, 0x0, 0x0, 0x20, 0x0) setpriority(0x0, 0x0, 0xffff) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000000)={r0}) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000040)={@local, 0x80, 0x1, 0x0, 0x1, 0x8, 0x368}, 0x20) semget$private(0x0, 0xfffffffffffffffd, 0x15) r4 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r4, 0x40000000af01, 0x0) r5 = eventfd2(0x0, 0x0) ioctl$VHOST_SET_VRING_ERR(r4, 0x4008af22, &(0x7f0000000180)={0x0, r5}) ioctl$VHOST_SET_VRING_ERR(r4, 0x4008af22, &(0x7f0000000240)) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) readv(r5, &(0x7f0000000500)=[{&(0x7f0000000140)=""/57, 0x39}, {&(0x7f0000000300)=""/113, 0x71}, {&(0x7f00000007c0)=""/4096, 0x1000}, {&(0x7f0000000380)}, {&(0x7f00000003c0)=""/72, 0x48}, {&(0x7f0000000480)=""/65, 0x41}], 0x6) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:51 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000240)={0xa, 0x0, 0x0, @mcast1, 0x100000000004}, 0x1c) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000180)=0x57e, 0x4) connect(r1, &(0x7f00000001c0)=@in={0x2, 0x4e20, @local}, 0x80) sendmmsg(r1, &(0x7f00000002c0), 0x4000000000000d7, 0x0) 07:21:51 executing program 3: socket$alg(0x26, 0x5, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x400, 0x0) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r0, 0x84, 0x74, &(0x7f0000000480)=""/72, &(0x7f00000001c0)=0x48) socket$inet(0x2b, 0x1, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x0, 0x0) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000300)='/dev/autofs\x00', 0x800, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(r2, 0xc02c564a, 0x0) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) lsetxattr$security_selinux(&(0x7f0000000880)='./file0\x00', &(0x7f0000000400)='security.selinux\x00', &(0x7f0000000900)='system_u:object_r:auditctl_exec_t:s0\x00', 0x25, 0x1) r4 = getpgrp(0x0) setpriority(0x0, r4, 0xffff) fcntl$setpipe(r3, 0x407, 0x30) semget$private(0x0, 0xfffffffffffffffd, 0x15) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) ioctl$VIDIOC_G_OUTPUT(r1, 0x8004562e, &(0x7f0000000000)) msgget(0x1, 0x208) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:51 executing program 4: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000300)='/dev/cachefiles\x00', 0xa002, 0x0) ioctl$PPPIOCSMRU1(r0, 0x40047452, &(0x7f0000000040)=0x2) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x200000040, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = open(&(0x7f0000000080)='./file0\x00', 0x20000, 0xc) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000100)=0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r2, 0xc1105517, &(0x7f0000000180)={{0x7, 0x6, 0x9, 0x4, '\x00', 0x8}, 0x6, 0x10000004, 0x2, r3, 0x3, 0x80, 'syz1\x00', &(0x7f0000000140)=['security.capability\x00', '\x00', 'cgroup\x00'], 0x1c, [], [0x6, 0x5, 0x1ff, 0x1]}) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:51 executing program 1: socket$alg(0x26, 0x5, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x400, 0x0) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r0, 0x84, 0x74, &(0x7f0000000480)=""/72, &(0x7f00000001c0)=0x48) r1 = socket$inet(0x2b, 0x1, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x0, 0x0) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000300)='/dev/autofs\x00', 0x800, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(r2, 0xc02c564a, 0x0) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) lsetxattr$security_selinux(&(0x7f0000000880)='./file0\x00', &(0x7f0000000400)='security.selinux\x00', &(0x7f0000000900)='system_u:object_r:auditctl_exec_t:s0\x00', 0x25, 0x1) r3 = getpgrp(0x0) setpriority(0x3, r3, 0x10003) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000040)={0x81, 0x8, 0x1, 0x8, 0x0}, &(0x7f0000000080)=0x10) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f00000000c0)={r4, 0xaa6b}, 0x8) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) msgget(0x1, 0x208) write$FUSE_GETXATTR(r0, &(0x7f0000000000)={0x18, 0x0, 0x3, {0x5}}, 0x18) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) ptrace$setopts(0xffffffffffffffff, r3, 0x6c1b89f4, 0x100008) 07:21:51 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @remote}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @random="e5ac78d4c7fd"}, 0x10) write(r2, &(0x7f0000000080)="2700000014000f3f00000000120f0a00110001001f750800560099ed4f0500009effffff000000", 0x138) 07:21:51 executing program 0: socket$alg(0x26, 0x5, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) lsetxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) setpriority(0xfffffffffffffffd, 0x0, 0x6) semget$private(0x0, 0xfffffffffffffffd, 0x15) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:51 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000001a00)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000040)="24000000210007041dfffd946f61050002000000fd00000000000800050016000400ff7e", 0x24}], 0x1}, 0x0) 07:21:51 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @remote}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @random="e5ac78d4c7fd"}, 0x10) write(r2, &(0x7f0000000080)="2700000014000f3f00000000120f0a00110001001f750800560099ed4f050000f0ffffff000000", 0x138) 07:21:51 executing program 5: socket$alg(0x26, 0x5, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x400, 0x0) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r0, 0x84, 0x74, &(0x7f0000000480)=""/72, &(0x7f00000001c0)=0x48) socket$inet(0x2b, 0x1, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x0, 0x0) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000300)='/dev/autofs\x00', 0x800, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(r2, 0xc02c564a, 0x0) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) write$P9_RFSYNC(r0, &(0x7f0000000000)={0x7, 0x33, 0x1}, 0x7) lsetxattr$security_selinux(&(0x7f0000000880)='./file0\x00', &(0x7f0000000400)='security.selinux\x00', &(0x7f0000000900)='system_u:object_r:auditctl_exec_t:s0\x00', 0x25, 0x1) r3 = getpgrp(0x0) setpriority(0x0, r3, 0xffff) r4 = inotify_add_watch(r1, &(0x7f0000000040)='./file1\x00', 0x20000200) inotify_rm_watch(r2, r4) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) msgget(0x1, 0x208) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:52 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) lsetxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) setpriority(0x0, 0x0, 0xffff) r1 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x2040) pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) ioctl$UI_DEV_DESTROY(r3, 0x5502) ioctl$VT_DISALLOCATE(r1, 0x5608) fcntl$setflags(r0, 0x2, 0x1) ioctl$KVM_HYPERV_EVENTFD(r1, 0x4018aebd, &(0x7f0000000100)={0x4, r2}) semget$private(0x0, 0xfffffffffffffffd, 0x15) r4 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000680)=[&(0x7f00000001c0)='wlan1\x00', &(0x7f0000000000)='wlan1\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) ioctl$RTC_UIE_OFF(r4, 0x7004) 07:21:52 executing program 4: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x3160a11a) r0 = syz_open_dev$amidi(&(0x7f0000000140)='/dev/amidi#\x00', 0x0, 0x20000) ioctl$EVIOCGPROP(r0, 0x80404509, &(0x7f00000001c0)=""/54) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x1, 0x0) syz_open_dev$sndmidi(&(0x7f0000000040)='/dev/snd/midiC#D#\x00', 0x8000, 0x20000) r1 = open_tree(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x1000) fcntl$setpipe(r1, 0x407, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) ioctl$VIDIOC_SUBDEV_S_FMT(r1, 0xc0585605, &(0x7f00000000c0)={0x1, 0x0, {0xffffffff, 0x8, 0x3011, 0x0, 0xa, 0x0, 0x1, 0x6}}) 07:21:52 executing program 3: socket$alg(0x26, 0x5, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x400, 0x0) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r0, 0x84, 0x74, &(0x7f0000000480)=""/72, &(0x7f00000001c0)=0x48) socket$inet(0x2b, 0x1, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x0, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000300)='/dev/autofs\x00', 0x800, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(r1, 0xc02c564a, 0x0) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffeeb) lsetxattr$security_selinux(&(0x7f0000000880)='./file0\x00', &(0x7f0000000400)='security.selinux\x00', &(0x7f0000000900)='system_u:object_r:auditctl_exec_t:s0\x00', 0x25, 0x1) r3 = getpgrp(0x0) setpriority(0x0, r3, 0x8ffff) ptrace$getregset(0x4204, r3, 0x6, &(0x7f0000000080)={&(0x7f0000000000)=""/72, 0x48}) fcntl$setpipe(r2, 0x407, 0x30) semget$private(0x0, 0xfffffffffffffffd, 0x15) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) msgget(0x1, 0x208) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:52 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @remote}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @random="e5ac78d4c7fd"}, 0x10) write(r2, &(0x7f0000000080)="2700000014000f3f00000000120f0a00110001001f750800560099ed4f05000000000000000340", 0x138) 07:21:52 executing program 1: socket$alg(0x26, 0x5, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x400, 0x0) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r0, 0x84, 0x74, &(0x7f0000000480)=""/72, &(0x7f00000001c0)=0x48) socket$inet(0x2b, 0x1, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x0, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000300)='/dev/autofs\x00', 0x800, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(r1, 0xc02c564a, 0x0) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) lsetxattr$security_selinux(&(0x7f0000000880)='./file0\x00', &(0x7f0000000400)='security.selinux\x00', &(0x7f0000000900)='system_u:object_r:auditctl_exec_t:s0\x00', 0x25, 0x1) r2 = getpgrp(0x0) setpriority(0x0, r2, 0xffff) r3 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) getresuid(&(0x7f0000000040), &(0x7f0000000080)=0x0, &(0x7f00000000c0)) fstat(r3, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$DRM_IOCTL_SWITCH_CTX(r0, 0x40086424, 0xffffffffffffffff) lchown(&(0x7f0000000000)='./file0\x00', r4, r5) msgget(0x1, 0x208) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:52 executing program 4: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x44000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) [ 877.992506][ C0] protocol 88fb is buggy, dev hsr_slave_0 07:21:52 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @remote}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @random="e5ac78d4c7fd"}, 0x10) write(r2, &(0x7f0000000080)="2700000014000f3f00000000120f0a00110001001f750800560099ed4f050000fffffffffffff0", 0x138) [ 878.075689][T18934] IPVS: ftp: loaded support on port[0] = 21 07:21:52 executing program 0: socket$alg(0x26, 0x5, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) lsetxattr$security_selinux(0x0, 0x0, 0x0, 0xfffffffffffffee2, 0x0) setpriority(0x0, 0x0, 0xffff) semget$private(0x0, 0xfffffffffffffffd, 0x15) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x280100, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000080)={0x0, 0x8e, "6650e26984e026625f36a61a0ef52218eaa677968deb3f16c94bdf5267b1bae60619e947b73128cf8344e597fadab3fdae73e309faf530fe0304aa7a4585bce136acaf94791a70a0162e9d883d3a332d5e2446f6709da5bcd3bfa4d00662159ff74b9de525e02f678bb8121221d6536d612d68d75ba23d7f7112cff763b2b95e08be087fccd3ff9e2528722d1fba"}, &(0x7f0000000140)=0x96) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f00000001c0)={r1, 0x1000}, &(0x7f0000000200)=0x8) r2 = open(&(0x7f0000000180)='./file0\x00', 0x280400, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$TIOCGETD(r2, 0x5424, &(0x7f0000000000)) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:52 executing program 5: socket$alg(0x26, 0x5, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffc46) lsetxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) setpriority(0x0, 0x0, 0xffff) semget$private(0x0, 0xfffffffffffffffd, 0x1000000011) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:52 executing program 3: socket$alg(0x26, 0x5, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x400, 0x0) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r0, 0x84, 0x74, &(0x7f0000000480)=""/72, &(0x7f00000001c0)=0x48) socket$inet(0x2b, 0x1, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x0, 0x0) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000300)='/dev/autofs\x00', 0x800, 0x0) ioctl$KVM_S390_UCAS_UNMAP(r1, 0x4018ae51, &(0x7f0000000000)={0x1000, 0x51, 0x5}) ioctl$VIDIOC_ENUM_FRAMESIZES(r2, 0xc02c564a, 0x0) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) lsetxattr$security_selinux(&(0x7f0000000880)='./file0\x00', &(0x7f0000000400)='security.selinux\x00', &(0x7f0000000900)='system_u:object_r:auditctl_exec_t:s0\x00', 0x25, 0x1) r4 = getpgrp(0x0) setpriority(0x0, r4, 0xffff) fcntl$setpipe(r3, 0x407, 0x30) semget$private(0x0, 0xfffffffffffffffd, 0x15) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) msgget(0x1, 0x208) ioctl$BLKPG(r0, 0x1269, &(0x7f0000000040)={0x100, 0x3}) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:52 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @remote}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @random="e5ac78d4c7fd"}, 0x10) write(r2, &(0x7f0000000080)="2700000014000f3f00000000120f0a00110001001f750800560099ed4f05000000000000000000", 0x138) 07:21:52 executing program 4: getpeername(0xffffffffffffffff, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, &(0x7f0000000080)=0x80) write$binfmt_elf64(r0, &(0x7f0000001640)=ANY=[@ANYBLOB="7f454c46e8f903099bf400000000000002003f0000000100650000000000000040000000000000009b02000000000000000000fe060038000100080006000100000000000500000001000000000000000500000000000000020000000000000008000000000000000100000000000000050000000000000006000000001000000010000000000000f8ffffffffffffffff03000000000000070000000000000000feffffffffffff0300000000000000f6e63e0ee9bd927133e82d52fe20abfc467db5239aa6a6fa5fe5ddcd29dd5cb72983a61a8a9457e838bcbf75592e7493997a59046ec7d9c5b60c28b1c873a7c4af69dff1ec8e5975d80ecafaeed163b4673fc60a8d4ee4e0ad84bc6cf9303e9de88243e5830b1ba781edb2c53e9f79dec4f0bd356cfa28a9b07c91090f873d01c036b97f3ca34094221912b2f004b67da1a047b1b8c29319ae2770830781154daf9042d5b0e1662c520000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e6930b265f0bfddd1b0f7cebfbfe9469e1c849904908b52c378fad1d391ce4778571ac12d3b7"], 0x659) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) write$binfmt_elf32(r1, &(0x7f0000000e40)={{0x7f, 0x45, 0x4c, 0x46, 0x7, 0xfff, 0x0, 0x100000000, 0x80000001, 0x3, 0x3, 0x1, 0x39, 0x38, 0x327, 0x7, 0x5, 0x20, 0x1, 0x1, 0x2, 0x8}, [{0x60000003, 0x7ff, 0x0, 0x9, 0x1, 0xffffffffffffffff, 0x7, 0x3}], "e2e669190054d565fe1b36617ac9db3262e83936c68eae7b08f1b316fe4d34373d33d54ad9b64bee57cfa3bdede373b5601324c69fe09212d2a1cc21ee79b90876fb2cc83efeb7cd09ff0555d048917ceb907e01cec3b134c967dfa00542003506207ac31d4fbf120dab6aba170a1a4adf3cb16c8fe9a5", [[], [], [], [], [], [], []]}, 0x7cf) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000000c0)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:52 executing program 1: socket$alg(0x26, 0x5, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x400, 0x0) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r0, 0x84, 0x74, &(0x7f0000000480)=""/72, &(0x7f00000001c0)=0x48) socket$inet(0x2b, 0x1, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x0, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000300)='/dev/autofs\x00', 0x800, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(r1, 0xc02c564a, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, &(0x7f0000000000)={&(0x7f0000ffc000/0x3000)=nil, 0x3000}, &(0x7f0000000080)=0x10) sched_setaffinity(0x0, 0xfffffffffffffdf8, &(0x7f0000000040)=0x40) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) lsetxattr$security_selinux(&(0x7f0000000880)='./file0\x00', &(0x7f0000000400)='security.selinux\x00', &(0x7f0000000900)='system_u:object_r:auditctl_exec_t:s0\x00', 0x25, 0x1) r2 = getpgrp(0x0) setpriority(0x0, r2, 0xffff) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) msgget(0x1, 0x208) openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x80000, 0x0) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:53 executing program 0: socket$alg(0x26, 0x5, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) lsetxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) setpriority(0x0, 0x0, 0x1b) semget$private(0x0, 0xfffffffffffffffd, 0x15) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:53 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @remote}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @random="e5ac78d4c7fd"}, 0x10) write(r2, &(0x7f0000000080)="2700000014000f3f00000000120f0a00110001001f750800560099ed4f05000000000000000000", 0x138) 07:21:53 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @remote}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @random="e5ac78d4c7fd"}, 0x10) write(r2, &(0x7f0000000080)="2700000014000f3f00000000120f0a00110001001f750800560099ed4f05000000000001000000", 0x138) 07:21:53 executing program 4: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) openat$vcs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vcs\x00', 0x0, 0x0) r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000300)='/dev/rfkill\x00', 0x0, 0x0) fcntl$setpipe(r0, 0x407, 0x40000000000) r1 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) prctl$PR_SET_FP_MODE(0x2d, 0x3) fcntl$setstatus(r1, 0x4, 0x4000) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) ioctl$EVIOCSABS20(r1, 0x401845e0, &(0x7f0000000000)={0x8c14713, 0x8, 0x100000001, 0x0, 0x8, 0x1}) socket$inet_udplite(0x2, 0x2, 0x88) sendmsg$nl_route_sched(r1, &(0x7f0000000100)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000000c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x140}, 0x1, 0x0, 0x0, 0x80}, 0x810) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x8000, 0x2) 07:21:53 executing program 3: socket$alg(0x26, 0x5, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x400, 0x0) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r0, 0x84, 0x74, &(0x7f0000000480)=""/72, &(0x7f00000001c0)=0x48) socket$inet(0x2b, 0x1, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x0, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000300)='/dev/autofs\x00', 0x800, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(r1, 0xc02c564a, 0x0) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) lsetxattr$security_selinux(&(0x7f0000000880)='./file0\x00', &(0x7f0000000400)='security.selinux\x00', &(0x7f0000000900)='system_u:object_r:auditctl_exec_t:s0\x00', 0x25, 0x1) r2 = getpgrp(0x0) setpriority(0x0, r2, 0xffff) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) msgget(0x1, 0x208) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:53 executing program 5: socket$alg(0x26, 0x5, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) r0 = syz_open_dev$swradio(&(0x7f0000000080)='/dev/swradio#\x00', 0x0, 0x2) ioctl$TIOCLINUX7(r0, 0x541c, &(0x7f00000000c0)={0x7, 0x401}) lsetxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) setpriority(0x0, 0x0, 0xffff) semget$private(0x0, 0xfffffffffffffffd, 0x15) r1 = gettid() capget(&(0x7f0000000000)={0x19980330, r1}, &(0x7f0000000040)={0xfffffffffffffc01, 0x100000001, 0x6e, 0x9, 0x3, 0xff}) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:53 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @remote}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @random="e5ac78d4c7fd"}, 0x10) write(r2, &(0x7f0000000080)="2700000014000f3f00000000120f0a00110001001f750800560099ed4f05000000000000000000", 0x138) 07:21:53 executing program 4: r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x0, 0x2) ioctl$KVM_GET_CLOCK(r0, 0x8030ae7c, &(0x7f0000000240)) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') sendmsg$IPVS_CMD_ZERO(r1, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000090}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x58, r2, 0x0, 0x70bd2b, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x5}, @IPVS_CMD_ATTR_DEST={0x3c, 0x2, [@IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x4c}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0xffffffffffff7fff}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0x2}, @IPVS_DEST_ATTR_TUN_TYPE={0x8}, @IPVS_DEST_ATTR_TUN_TYPE={0x8, 0xd, 0x1}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0xe58}]}]}, 0x58}, 0x1, 0x0, 0x0, 0x40011}, 0x840) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:53 executing program 1: socket$alg(0x26, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(0xffffffffffffffff, 0x84, 0x74, &(0x7f0000000480)=""/72, &(0x7f00000001c0)=0x48) socket$inet(0x2b, 0x1, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x0, 0x0) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000300)='/dev/autofs\x00', 0x800, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(r0, 0xc02c564a, 0x0) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) lsetxattr$security_selinux(&(0x7f0000000880)='./file0\x00', &(0x7f0000000400)='security.selinux\x00', &(0x7f0000000900)='system_u:object_r:auditctl_exec_t:s0\x00', 0x25, 0x1) r1 = getpgrp(0x0) setpriority(0x0, r1, 0xffff) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) msgget(0x1, 0x208) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:53 executing program 0: socket$alg(0x26, 0x5, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) lsetxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) setpriority(0x0, 0x0, 0xffff) semget$private(0x0, 0xfffffffffffffffd, 0x15) r0 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) acct(&(0x7f0000000000)='./file0/file0\x00') fchmodat(r0, &(0x7f0000000040)='./file0\x00', 0x4) 07:21:53 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video35\x00', 0x2, 0x0) r2 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r2, &(0x7f0000000040), 0x10) setsockopt$inet_tcp_TLS_TX(r2, 0x6, 0x1, &(0x7f0000000680)=@gcm_256={{}, "26ea4efffaca7e36", "aa2d4550a9d8bbfa74e4f109732083fea3b80f29afcc8de93de4f6b01a7ce9e5", "42eac279", "26d90593e59bef3b"}, 0x38) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x100000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffc) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) getsockopt$inet_sctp_SCTP_RECVNXTINFO(r0, 0x84, 0x21, &(0x7f0000000080), &(0x7f0000000100)=0x4) ioctl$NBD_SET_BLKSIZE(r0, 0xab01, 0x270) 07:21:53 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @remote}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @random="e5ac78d4c7fd"}, 0x10) write(r2, &(0x7f0000000080)="2700000014000f3f00000000120f0a00110001001f750800560099ed4f05000000000000000000", 0x138) 07:21:53 executing program 4: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x6f69aa15) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r0 = syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x0, 0x2000) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r0, 0xc0145401, &(0x7f0000000400)={0xffffffffffffffff, 0x2, 0x10000, 0x2, 0x9}) ioctl$DRM_IOCTL_SET_VERSION(r0, 0xc0106407, &(0x7f0000000380)={0x0, 0xdf8, 0xe6, 0x2c}) clone(0x800000002000001, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$PPPIOCSDEBUG(r0, 0x40047440, &(0x7f0000000480)=0x8) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f00000001c0)=""/128, 0x80}, {&(0x7f0000000240)=""/214, 0xd6}, {&(0x7f0000000080)=""/47, 0x2f}], 0x3) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000080), &(0x7f00000000c0)=[&(0x7f0000000100)='^+\xf5 *}?B<\x13\xbd\x95\xa9S?\x97X\xc79\vP\xac\x0e\x13\xaa\xa42\x82\x01\x97\b\xba\xc4\xdf&*r\x17E\"t\x9d\xa9\xa3F\xd8)\x9d\v0\xe7\xf1l\xf0\xec\xfbZg\xf7{\xe6\x10\xcfn\xedZL\xc8\xa3\x16\x86\x82\xaf\x8e\xed\x89Y\x8c \x83\xb8\x9bJR\xf6\xc2N\xc8\x87\xcf\xfb\xd9O\x16\xc0pS\xc8\xe7G\f@u', &(0x7f0000000040)='!\x00']) ioctl$IOC_PR_CLEAR(r0, 0x401070cd, &(0x7f00000003c0)={0x5}) r1 = msgget$private(0x0, 0x1) msgctl$IPC_STAT(r1, 0x2, &(0x7f00000004c0)=""/4) openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0xa0000, 0x0) 07:21:53 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @remote}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @random="e5ac78d4c7fd"}, 0x10) write(r2, &(0x7f0000000080)="2700000014000f3f00000000120f0a00110001001f750800560099ed4f0500000a000000000000", 0x138) 07:21:53 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) lsetxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000000)=0x0) setpriority(0x0, r1, 0xfffc) semget$private(0x0, 0xfffffffffffffffd, 0x15) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:53 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video35\x00', 0x2, 0x0) r2 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r2, &(0x7f0000000040), 0x10) setsockopt$inet_tcp_TLS_TX(r2, 0x6, 0x1, &(0x7f0000000680)=@gcm_256={{}, "26ea4efffaca7e36", "aa2d4550a9d8bbfa74e4f109732083fea3b80f29afcc8de93de4f6b01a7ce9e5", "42eac279", "26d90593e59bef3b"}, 0x38) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x100000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffc) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) getsockopt$inet_sctp_SCTP_RECVNXTINFO(r0, 0x84, 0x21, &(0x7f0000000080), &(0x7f0000000100)=0x4) ioctl$NBD_SET_BLKSIZE(r0, 0xab01, 0x270) 07:21:53 executing program 1: socket$alg(0x26, 0x5, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x400, 0x0) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r0, 0x84, 0x74, &(0x7f0000000480)=""/72, &(0x7f00000001c0)=0x48) socket$inet(0x2b, 0x1, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x0, 0x0) syz_open_dev$sndmidi(&(0x7f0000000000)='/dev/snd/midiC#D#\x00', 0xff, 0x402000) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000300)='/dev/autofs\x00', 0x800, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(r1, 0xc02c564a, 0x0) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) lsetxattr$security_selinux(&(0x7f0000000880)='./file0\x00', &(0x7f0000000400)='security.selinux\x00', &(0x7f0000000900)='system_u:object_r:auditctl_exec_t:s0\x00', 0x25, 0x1) r2 = getpgrp(0x0) setpriority(0x0, r2, 0xffff) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) msgget(0x1, 0x208) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:54 executing program 3: socket$alg(0x26, 0x5, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x400, 0x0) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r0, 0x84, 0x74, &(0x7f0000000480)=""/72, &(0x7f00000001c0)=0x48) r1 = socket$inet(0x2b, 0x1, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x0, 0x0) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000300)='/dev/autofs\x00', 0x800, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(r2, 0xc02c564a, 0x0) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) lsetxattr$security_selinux(&(0x7f0000000880)='./file0\x00', &(0x7f0000000400)='security.selinux\x00', &(0x7f0000000900)='system_u:object_r:auditctl_exec_t:s0\x00', 0x25, 0x1) r4 = getpgrp(0x0) setpriority(0x0, r4, 0xffff) shutdown(r1, 0x0) fcntl$setpipe(r3, 0x407, 0x30) semget$private(0x0, 0xfffffffffffffffd, 0x15) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) msgget(0x1, 0x208) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$BINDER_SET_MAX_THREADS(r2, 0x40046205, &(0x7f0000000000)) getpgid(r4) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) socket$inet6_sctp(0xa, 0x1, 0x84) [ 879.591749][ C1] net_ratelimit: 1 callbacks suppressed [ 879.591758][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 879.603171][ C1] protocol 88fb is buggy, dev hsr_slave_1 07:21:54 executing program 4: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) ioctl$VIDIOC_QUERYMENU(r0, 0xc02c5625, &(0x7f0000000000)={0x5, 0x0, @value=0x8000}) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$alg(0x26, 0x5, 0x0) execve(&(0x7f0000000440)='./file1\x00', &(0x7f0000000080)=[&(0x7f0000000100)='selinux{\'\xe5selfkeyringmime_type^mime_typemd5sum\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f00000000c0)) 07:21:54 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @remote}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @random="e5ac78d4c7fd"}, 0x10) write(r2, &(0x7f0000000080)="2700000014000f3f00000000120f0a00110001001f750800560099ed4f05000000000000000000", 0x138) [ 879.831742][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 879.831759][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 879.837573][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 879.843293][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 879.854812][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 879.860583][ C0] protocol 88fb is buggy, dev hsr_slave_1 07:21:54 executing program 0: socket$alg(0x26, 0x5, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) lsetxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) setpriority(0x0, 0x0, 0xffff) semget$private(0x0, 0xfffffffffffffffd, 0x400) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:54 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video35\x00', 0x2, 0x0) r2 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r2, &(0x7f0000000040), 0x10) setsockopt$inet_tcp_TLS_TX(r2, 0x6, 0x1, &(0x7f0000000680)=@gcm_256={{}, "26ea4efffaca7e36", "aa2d4550a9d8bbfa74e4f109732083fea3b80f29afcc8de93de4f6b01a7ce9e5", "42eac279", "26d90593e59bef3b"}, 0x38) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x100000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffc) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) getsockopt$inet_sctp_SCTP_RECVNXTINFO(r0, 0x84, 0x21, &(0x7f0000000080), &(0x7f0000000100)=0x4) ioctl$NBD_SET_BLKSIZE(r0, 0xab01, 0x270) 07:21:54 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @remote}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @random="e5ac78d4c7fd"}, 0x10) write(r2, &(0x7f0000000080)="2700000014000f3f00000000120f0a00110001001f750800560099ed4f05000000000000000000", 0x138) 07:21:54 executing program 4: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) r0 = open_tree(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x9101) write$binfmt_script(r0, &(0x7f0000000080)={'#! ', './file0', [{0x20, '!\x00'}, {0x20, 'nodev:'}, {0x20, 'p\xf2oc\x00'}, {0x20, 'em0\x97($'}], 0xa, "5070fbfe07096d8ac2008e8953e61e77d8cbef656196f1393818d1bd67f8c6ff44ff3fc303117a9e3f8a787427d5aa99ff0585cfe25cd6f7cf2c315e2d6c3e508c7045425d0cf46902c650c282ed2540d9bd5c40e3f4d79334a854532643785523ecea1eed8610f7a2e8fcfa6e1cdf82c34ff5880167577311486714dfcd6e37413b11865e0ccee6da7cca4e7fcbcf8eca77a9b2017b16fe47adbd1775adbc"}, 0xc1) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:54 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) ioctl$FS_IOC_RESVSP(r0, 0x402c5828, &(0x7f0000000000)={0x0, 0x4, 0x7fffffff, 0x6}) lsetxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) setpriority(0x0, 0x0, 0xffff) semget$private(0x0, 0xfffffffffffffffd, 0x15) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:54 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video35\x00', 0x2, 0x0) r2 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r2, &(0x7f0000000040), 0x10) setsockopt$inet_tcp_TLS_TX(r2, 0x6, 0x1, &(0x7f0000000680)=@gcm_256={{}, "26ea4efffaca7e36", "aa2d4550a9d8bbfa74e4f109732083fea3b80f29afcc8de93de4f6b01a7ce9e5", "42eac279", "26d90593e59bef3b"}, 0x38) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x100000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffc) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) getsockopt$inet_sctp_SCTP_RECVNXTINFO(r0, 0x84, 0x21, &(0x7f0000000080), &(0x7f0000000100)=0x4) 07:21:54 executing program 1: socket$alg(0x26, 0x5, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x400, 0x0) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r0, 0x84, 0x74, &(0x7f0000000480)=""/72, &(0x7f00000001c0)=0x48) socket$inet(0x2b, 0x1, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x0, 0x0) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000300)='/dev/autofs\x00', 0x800, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(r2, 0xc02c564a, 0x0) ioctl$EVIOCGABS3F(r0, 0x8018457f, &(0x7f0000000a80)=""/194) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) lsetxattr$security_selinux(&(0x7f0000000880)='./file0\x00', &(0x7f0000000400)='security.selinux\x00', &(0x7f0000000900)='system_u:object_r:auditctl_exec_t:s0\x00', 0x25, 0x1) ioctl$EVIOCGRAB(r0, 0x40044590, &(0x7f00000000c0)=0x4) r3 = getpgrp(0x0) ioctl$SNDRV_CTL_IOCTL_PCM_INFO(r0, 0xc1205531, &(0x7f0000000940)={0x4, 0x325, 0xffffffffffffffe0, 0x4, [], [], [], 0xfffffffffffffffd, 0xffffffffffffff81, 0xff, 0x8001, "66c0254f60b618e384c2aa1152581c29"}) setpriority(0x0, r3, 0xffff) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) ioctl$VIDIOC_DV_TIMINGS_CAP(r0, 0xc0905664, &(0x7f0000000000)={0x0, 0x0, [], @bt={0x4, 0x8, 0x6, 0x0, 0x1ff, 0x1000, 0x8, 0x4}}) msgget(0x1, 0x208) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='wlan1\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:54 executing program 3: socket$alg(0x26, 0x5, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x400, 0x0) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r0, 0x84, 0x74, &(0x7f0000000480)=""/72, &(0x7f00000001c0)=0x48) socket$inet(0x2b, 0x1, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x0, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000300)='/dev/autofs\x00', 0x800, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(r1, 0xc02c564a, 0x0) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) lsetxattr$security_selinux(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='security.selinux\x00', &(0x7f0000000080)='unconfined_u:system_r:insmod_t:s0-s0:c0.c1023\x00', 0x2e, 0x1) r3 = getpgrp(0x0) setpriority(0x0, r3, 0xffff) fcntl$setpipe(r2, 0x407, 0x30) semget$private(0x0, 0xfffffffffffffffd, 0x15) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) msgget(0x1, 0x208) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:54 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @remote}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @random="e5ac78d4c7fd"}, 0x10) write(r2, &(0x7f0000000080)="2700000014000f3f00000000120f0a00110001001f750800560099ed4f05000000000000000001", 0x138) 07:21:54 executing program 4: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x2) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x30, r1, 0x301, 0x70bd27, 0x25dfdbfc, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x8000, 0x70a, 0x9, 0x1f}}}, [""]}, 0xfffffffffffffe13}, 0x1, 0x0, 0x0, 0x4044010}, 0x20004010) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f0000000000)="4ebb702a6cd1e9cfff40f6db23160a20", 0x10) syz_open_dev$video(&(0x7f00000001c0)='/dev/video#\x00', 0x3, 0x200000) r2 = syz_genetlink_get_family_id$team(&(0x7f0000000240)='team\x00') accept4$packet(r0, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000380)=0x14, 0x80000) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f00000003c0)={'team0\x00', 0x0}) getpeername$packet(r0, &(0x7f0000000400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000480)=0x14) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000940)='/dev/hwrng\x00', 0x200, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000007c0)={{{@in6=@remote, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in=@initdev}}, &(0x7f00000004c0)=0xe8) getsockname$packet(r0, &(0x7f00000006c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000700)=0x14) getsockname$packet(r0, &(0x7f0000000a00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000a40)=0x14) sendmsg$TEAM_CMD_PORT_LIST_GET(r0, &(0x7f0000000c40)={&(0x7f0000000200), 0xc, &(0x7f0000000c00)={&(0x7f0000000c80)=ANY=[@ANYBLOB="80010000", @ANYRES16=r2, @ANYBLOB="000126bd7000ffdbdf250300000008000100", @ANYRES32=r3, @ANYBLOB="640102003800010024000100616374697665706f727400000000000000000000000000000000000000000000080003000300000008000400", @ANYRES32=r4, @ANYBLOB="3800010024005d0b41a4be0cf22bc6c7197a1a3196f70100616374697665706f727400000000000000000000000000000000000000000000080003c7caf3c037a432c600", @ANYRES32=r5, @ANYBLOB="3800010024000100616374697665706f727400000000000000000000000000000000000000000000080003000300000008000400", @ANYRES32=r6, @ANYBLOB="3c00010024000100757365725f6c696e6b75705f656e61626c65640000000000000000000000000008000300060000000400040008000600", @ANYRES32=r7, @ANYBLOB="3c000100240001006d6f64650000000000000000000000000000000000000000000000000000000008000300050000000c00040072616e646f6d000040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32=r8, @ANYBLOB='\b\x00\a\x00\x00\x00\x00\x00'], 0x180}, 0x1, 0x0, 0x0, 0x40}, 0x20000080) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000300)={0x0, 0x18, 0xfa00, {0x3, &(0x7f00000002c0)={0xffffffffffffffff}, 0x111, 0x3}}, 0x20) sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f0000000900)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000008c0)={&(0x7f00000005c0)={0x24, r1, 0x20, 0x70bd25, 0x25dfdbfc, {{}, 0x0, 0x8001, 0x0, {0x8, 0x11, 0x80}}, [""]}, 0x24}, 0x1, 0x0, 0x0, 0x240000c0}, 0x40801) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000500)={0x1, 0x10, 0xfa00, {&(0x7f0000000280), r9}}, 0x18) 07:21:55 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video35\x00', 0x2, 0x0) r2 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r2, &(0x7f0000000040), 0x10) setsockopt$inet_tcp_TLS_TX(r2, 0x6, 0x1, &(0x7f0000000680)=@gcm_256={{}, "26ea4efffaca7e36", "aa2d4550a9d8bbfa74e4f109732083fea3b80f29afcc8de93de4f6b01a7ce9e5", "42eac279", "26d90593e59bef3b"}, 0x38) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x100000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffc) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 07:21:55 executing program 0: socket$alg(0x26, 0x5, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffffd) lsetxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) setpriority(0x0, 0x0, 0xffff) semget$private(0x0, 0xfffffffffffffffd, 0x15) r0 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmmsg$sock(r0, &(0x7f00000005c0)=[{{&(0x7f0000000000)=@nfc_llcp={0x27, 0x0, 0x2, 0x1, 0x986, 0x5, "17f1edf691ae37882dd74082e87142d5baf78331a60b59c5566c9aa50cdaef3ffdf2cca69737505d266b6939d0bb64f76b9beffcf0af8f7cb9a3185219cf44", 0x3a}, 0x80, &(0x7f00000002c0)=[{&(0x7f0000000080)="0f3ba49a242dfb988370bde5e43cb0f3a7d1f96fa12441d1d82ff2b7f7691911517948589538228be62a7199438f6e21f8ca7622d0cbd7ab7192b7dc531e607c9dd41f7a5ba8d798db2e44e335000ac85e02aa3728a9e1b2bab030415caf1ba3fe8a033c633bc299bec3d32e1d7bead97ec0cb6bf710adf0fd6740b01033d5c75a6df7ce9c2a8075980af50e3be09a98e845a0328f7131f1febf026c5f4d630deb20cb4755053a3d17341047b3bdc45e86b2c7f2e8296bc319d14bcf3a8472fb87a9a2cf3cb2de88664b51155ceb6da82676d892b8237b6457086b8f6c707a8fc724c595b7947fb8e6ae009b3d79d31a", 0xf0}, {&(0x7f00000001c0)="7ee0b2522025c033d361509ef205177eb8f70147a44481b58fe986bf6badf071504ab9a615092486ec836c79eb27d4301db69795df779502b25bc76f7c26f07193f67b5d02bb4db629ab55b04474652ba38aa82679e9f004caab4a811336fbdddd82db75ab987a546c556220c5aa16219e6c51bea735ea3a678ecfb4dfeeb499f0110714051a9c18fe7f366da245e3e62235622412e63d61114ad457bc868f2ddf4869204f8b5a7ad1da201852666e1bb4bbab1cded7d17947f7d34d3a93046f74fb", 0xc2}], 0x2, &(0x7f0000000300)=[@timestamping={{0x10, 0x1, 0x25, 0x40}}, @timestamping={{0x10, 0x1, 0x25, 0x3f}}, @txtime={{0x14, 0x1, 0x3d, 0x81}}, @timestamping={{0x10, 0x1, 0x25, 0x100}}, @txtime={{0x14, 0x1, 0x3d, 0x6}}, @mark={{0x10, 0x1, 0x24, 0x401}}, @txtime={{0x14, 0x1, 0x3d, 0x3}}, @txtime={{0x14, 0x1, 0x3d, 0x4}}, @mark={{0x10, 0x1, 0x24, 0x9}}], 0xa0}}, {{&(0x7f00000003c0)=@ipx={0x4, 0x7, 0x4, "944e1f2884bb", 0x8}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000480)="6067089b63c63796a9e4f7d8537b0ae3662a09a8ddefc62b48cdeb4d2162eadd581d1285c616142d10833e2d16c7f2291dc4", 0x32}], 0x1, &(0x7f0000000500)=[@timestamping={{0x10, 0x1, 0x25, 0xfffffffffffffff8}}, @txtime={{0x14, 0x1, 0x3d, 0x3}}, @mark={{0x10, 0x1, 0x24, 0x2}}, @mark={{0x10, 0x1, 0x24, 0x4}}, @timestamping={{0x10, 0x1, 0x25, 0x7}}, @timestamping={{0x10, 0x1, 0x25, 0x80000001}}, @timestamping={{0x10, 0x1, 0x25, 0x6}}], 0x74}}], 0x2, 0x20004000) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(r0, 0x40bc5311, &(0x7f00000007c0)={0xffff, 0x0, 'client0\x00', 0xffffffff80000001, "5b8eed57656dbb05", "0e95a59d19b42faa51f490a50988882002fc7ecf3eafd2e5e9775510a5435e9c", 0x4, 0xfffffffffffffffe}) 07:21:55 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @remote}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @random="e5ac78d4c7fd"}, 0x10) write(r2, &(0x7f0000000080)="2700000014000f3f00000000120f0a00110001001f750800560099ed4f05000000000000000000", 0x138) 07:21:55 executing program 4: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xffffffffffffff79) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x40, 0x0) ioctl$VIDIOC_SUBDEV_S_SELECTION(r0, 0xc040563e, &(0x7f0000000080)={0x1, 0x0, 0x103, 0x1, {0x200, 0x6, 0x2, 0xff}}) r1 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x0) clone(0x200000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x0, 0x2) ioctl$VIDIOC_S_HW_FREQ_SEEK(r2, 0x40305652, &(0x7f0000000300)={0x2, 0x1}) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000000)={0x86, 0x7fffffff, 0x3ff, 0xfffffffffffffff8, 0x6}) 07:21:55 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video35\x00', 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) futimesat(r0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)={{}, {0x0, 0x2710}}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, 0x0, 0x0) prctl$PR_GET_FPEXC(0xb, &(0x7f0000000180)) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(r1, 0x84, 0x21, &(0x7f0000000200), &(0x7f0000000240)=0x4) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 07:21:55 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video35\x00', 0x2, 0x0) r1 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r1, &(0x7f0000000040), 0x10) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000680)=@gcm_256={{}, "26ea4efffaca7e36", "aa2d4550a9d8bbfa74e4f109732083fea3b80f29afcc8de93de4f6b01a7ce9e5", "42eac279", "26d90593e59bef3b"}, 0x38) write(r0, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x100000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffc) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, 0x0, 0x0) 07:21:55 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @remote}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @random="e5ac78d4c7fd"}, 0x10) write(r2, &(0x7f0000000080)="2700000014000f3f00000000120f0a00110001001f750800560099ed4f05000000000000000000", 0x138) 07:21:55 executing program 0: socket$alg(0x26, 0x5, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) lsetxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) setpriority(0x0, 0x0, 0xffff) r0 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x40, 0x40000) connect$unix(r0, &(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e) semget$private(0x0, 0xfffffffffffffffd, 0x15) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:55 executing program 1: socket$alg(0x26, 0x5, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x400, 0x0) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r0, 0x84, 0x74, &(0x7f0000000480)=""/72, &(0x7f00000001c0)=0x48) socket$inet(0x2b, 0x1, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x0, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000300)='/dev/autofs\x00', 0x800, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(r1, 0xc02c564a, 0x0) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) lsetxattr$security_selinux(&(0x7f0000000880)='./file0\x00', &(0x7f0000000400)='security.selinux\x00', &(0x7f0000000900)='system_u:object_r:auditctl_exec_t:s0\x00', 0x25, 0x1) r2 = getpgrp(0x0) setpriority(0x0, r2, 0xffff) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) syz_open_procfs(r2, &(0x7f0000000000)='net/ip_mr_vif\x00') msgget(0x1, 0x208) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:55 executing program 4: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x10000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:55 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @remote}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @random="e5ac78d4c7fd"}, 0x10) write(r2, &(0x7f0000000080)="2700000014000f3f00000000120f0a00110001001f750800560099ed4f05000000000000000000", 0x138) 07:21:55 executing program 3: socket$alg(0x26, 0x5, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x400, 0x0) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r0, 0x84, 0x74, &(0x7f0000000480)=""/72, &(0x7f00000001c0)=0x48) socket$inet(0x2b, 0x1, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x0, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000300)='/dev/autofs\x00', 0x800, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(r1, 0xc02c564a, 0x0) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) lsetxattr$security_selinux(&(0x7f0000000880)='./file0\x00', &(0x7f0000000400)='security.selinux\x00', &(0x7f0000000900)='system_u:object_r:auditctl_exec_t:s0\x00', 0x25, 0x1) r2 = getpgrp(0x0) setpriority(0x0, r2, 0xffff) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) getpriority(0x0, r2) msgget(0x1, 0x208) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:55 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video35\x00', 0x2, 0x0) r1 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r1, &(0x7f0000000040), 0x10) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000680)=@gcm_256={{}, "26ea4efffaca7e36", "aa2d4550a9d8bbfa74e4f109732083fea3b80f29afcc8de93de4f6b01a7ce9e5", "42eac279", "26d90593e59bef3b"}, 0x38) write(r0, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x100000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffc) 07:21:55 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) lsetxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) setpriority(0x0, 0x0, 0xffff) semget$private(0x0, 0xfffffffffffffffd, 0x15) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) acct(0x0) sendmsg(r0, &(0x7f0000000480)={&(0x7f0000000000)=@nl=@kern={0x10, 0x0, 0x0, 0x40000}, 0x80, &(0x7f0000000280)=[{&(0x7f0000000080)="904505967448876d5e24a49166cfd3d32f1fb6817f4fc33243558cf1574dd3addaaa8bacccc2903c24db17632fa3f1def6f6f909c88f81069d0ee61f2bc06bb7ade19371712537de022be102199703fde781c02ce0bcb1937c1da242e2a522f17d9cc7", 0x63}, {&(0x7f0000000100)="578c9a2cd8dafdfa412407f6cac903aa85364e48e6b4e1b03e32cccb995f905f1486f786a968c5feb1bd88f06e838c63fdcc9a76d23c9412f2ab948d77ae11951c4393c1ca70a2a4acf265005e8752dac3c3f0b22490da306cdf", 0x5a}, {&(0x7f00000007c0)="e6a8fac33f8ece6adde45bfb5231964b056f7474f6ebbe91ed81ec27edfb494c004fdbcb0d8c0bfa80aad41850234f57b4c187b88b91d8bd0fe6683030ecdb737cf75b44b3652639738676638391e8b32fbe5e149494f6b5d39163c1be7e91bff37f438a856889f60aa4daac9a21599fe6b462573db8717d4f1ac4f111067ab280afdeb273bd9366188093c8061a7418291a561d10327e35c46944a0abdbd648ec74aea7feb4df077f9a00b7a8b793b1f5d2bf9985a2621e02f8c2fc815b91dda7f8e822d3e99a115581a55808478646bc4fca1cbeb26ab6b9ac5739420c6387708d09d7f6e8f0d60be59a68ba4238143a71beb8b319bc63fc414a85b24b9b0d8daf866dbef37be87f1ec788d24ceda213d3b40959e42be81e0d8fadefe3d7a0d38e90777075bafc40bf67d69e430cee905eec39a29c951fd077bd4a6515ba902b647f5dcf972234b80e2355e9a7b04d0c1b2403d5bc31c0c0171c216aa1b80fbe8266be77abb19d81e22cf89cefca25eea3adf8c407a13bf6d6bb6af782621feb46f735031e4506d24494b7c5e3f6f25630c0b7ef37c059f9ce53f6584c1f0b8c72a2c47b34d60f9c933c17cfca9158c73b38e1ea5341d05ecc6ead915243407db762fbbe61bac54ea5e9a1f277559ba53679eebfe1cfb93d15ed5c05eadaf7b7e286a91eea936dd050b05421c4cc8f682c3f9c54148a33b9b0088ce55709f95195c94b52dff29761f7836e8ca81665103734bdbc06d930c9305df9549ee54c3373e83b00df8e94ae1dbe4d35e0515a2c378b5c12e747f69152b2126a2cbabb00257a2fcd636605c17523b0b0657442e30528434d82bbb30ee87b0287860496f507de6491a4260fa51b126f5301ecbd7f32f75da9353c9f1f6e0a1af4e53bca75c96fba85d00222e5cbef0c8d47da16e072fe82c6dcdc55ed3a74c5a4a05773e9b274741d157034df6f31d78841ff4fc9ea86365872e9a9a1ff54fb96618a85d70bc6bd4a734a4c75387908ceeaf229f4df0ea0b430de09df1396fba86d2ad54a84e8edac5348e739d0def477790204120eff96db9c1f58d615f15b30f80db80317d43e51331b0acdb967b0447908fecb112e4eedb4fdf58f23f304ca1e85bd5df85908a656182fb26f886540dae4a29bfd90a6ed6a964840055701599867c2e8360f824502be53dc2cba6d54a241f42dbede2d4989c763470bfad5fc4b7302f16973e636c96a3ad2d6704d4f7428186aaa103749bd8c451d34c802522aa1c04c10aa67d264327d5f8644a95d00d4cc29610311571aefd299a315542248d7057b60cfce19e9109464108f5e6c54ee638e0db64a304fd5304bfc909c784050bdd12fa9fee20a106a8bcef8f1eb6087782885038ac5ebaf412230a2708a3009de6feb1512bff936b04d74cb5cdf9e5f80060b3bd8246dac41b58dc6374096858f76b5d27bcab2acbceb132dc126c151d5f43bf8bf9292037ad73c66f90388b986b62e0decafa87a4c9a79c5e57c1fb92bf4d7e719ea761055449fcb8e501bd29c8422a7af9081d86799f05a79c52527cfee27d36397d0367703e4b8a0c45d9c9289f70a300d3b20285bca7a877e12b08339262730ec10fa346b2fcfc5eb35c15c8c52e61017d7513a63db82fde3a484cef7d86dbc4f195bc3cf1198aed517bcd4f1a490d075bd1fb148bd53c5ba968bbb0ba4a31d50d49d1e7ddf1317e471eae46b6d7247ef575f7b4c5e6be39d64fed0f0c88c52331ea92fd896e8ecd6272afc429840885ac70e950c113d30b76447ea506e6ddcee9b4f24ebc2396ffd361148327b7f59ed95a18cb0e7644f7840e64e7afdec2beeb45b4ebc400fc322b04729e0baf94232dcde78b3504435e3f6b1ad66c4cfc11c8eb1595f31746d52a6f504afddc5946c325e492623934208531fe5aa84b9834cb0d9ae7c8a4c8a71d2de2be7c3662496b2da03306b95fd19cd5c67a3b845f7e50b31b04c4ecf44a504d00e7c932fcd87043faca3f39510a0d0d75c591cf9d47bae209240badddb964a666c05075ab2bf0d6c37ef8a7eec50170ce993cfd2da593c2166bd429350112d987c257e8bd9e6bb0f6ff5ed2c628c0d89558f7ba5bb057b9d7caf1461be0e3f244ae09a305eb7669b08b61c3f46edabf3535d45a997a34a9aa83822665f798f6ac34a203c86c6ff30b3347b21a6c3eb9aa056e8c5b0a9c3c6ed884183dc8fc9feb77e23fbce35fe1fe71cb531fa23a92970aee345bf2ee21d01a955c1cf65edd421997cd78ebb533effce2a8e530cb227fb0febb5e901197414d7ed5ad4d98de2969b7cff8435f96dc5c2a94b734cc3a7d266df82f8b79a2db23f97649985d3541296b1a5f59f6057cb2911344b635f30c5e664ac1944975a844c6f82e52c736c5c7f01cc8a555315b9839a34a201bd1a5594d86af182f584701ca82b434aecaa96e09d00df167a657c3137ca1162c2b1d2a34caf77e9e1ef7a9ec5b318974d6915a7758cbc9357b6005831124462920e1c224d567f7812296b194ecb155eaa7fe5f8ee161f55c2fbe2658ce820f6044b7567ee3d8d5b631dad9248920618aed0050dc830b408083e124cf42521418d99ee800a762fedde2ef77d05a108214da56c08ef6ca0863c772912e6867934add824900658c5290a772ac207998b8a1dfa59768f45a27fa3a525fb3b3cd214bfdb5d9387a7ed3890472905d16c6d2493ec888d6021b5d49513e00384cc488f3781bad76572c28451b9b7fd9e7f87f25863e0a2abf8194ca2e181a7e0b28a384c5817e03884183a2f029243cf25a575dfe90118fafd01a45df9b5dbb2a54510a6544d4e2695e6ea472bb1cb007b6f1633d02d65d21a367c298d926e34d553e86fa9c332a149076bb3eaf7bb350da98fc9ff13237d00168ce54918f6983b1c2c6a9412b5cac9705c7729b925f9dcf94d8f8170f4f2c824486ad3129bbeaa1e14a1035f81b2843630a584ee27adb3336065d87a89b1692d9588e6e414bd4c8fb315a103b2b2860feb20e4b04b784600099e702345cd8d1fc45abdaca5e3ae5d7724bd50423c40ee6645912e667f18cc9b12775a818f56dcec577864de37cc8f164e049b6bd21f4f97f296bd35c454323664591a36aef42d15c35088e28cf28b39195473cb5795f933c1b6b86e02b48c181be2f493e0bcba12a7f4c53b8e4371691db14fe19af2b49bd10f394c404b2a1864b9ebfef31c3546411354c3ff4cdfcf46f9b69112ec5eced7adda01f01902c655cb28c5fe2b9f5b816d6d92efd80e67aa1e94eb8d6f820b115666c022dc8509d60074b0b5a9dfeac1f35bf0ef0b3fbcff6124bca36ab20537e572d74ed7426b7db7abd40d6f188de7a5dc203af116c66f81fac7e030e23fbef40032e0d2aa3933fa99f2c8d1dcd2e7034a3d34993c055414d811825ae982e2074ff537e9c60b472acb1873f148f7a457dd238ba059593501f865f8be43bb1a4ff56a8040edddbcba0c8ad772a68c0f1ba9a3bc3e89df0e89e9218f741d388ded12907c177ca93373ca0311fa149cd8e6b1f4abd4c94bf478767b3bcef44a59d1fa96a8fc670555a53eb0024fc74aafb112bd1889db629a1f905171b6a18600f911f342873e3833269b62892b3800b05854bab37b524e1f6cac61491765ce5e13b03db7954eed50ac378fe98f14df04c632196667ec2c5e244f9b459c93261573bf5b6c5f21738c2cc7f6d6dae6db93c953a6ada1c0b11541ea4c1e15dacc78de60122de381dfc582a577c8f6bdc889d7eb996efcff14ce46af64bb382e53fca028431a2de7cb86c408cad9a7a25456f5a20ea055fd680fa6ab7d9da921ed7b937f8bd6be01be31af8aaace2553cca1fe64b2b610f4027fc06dbe11e75dc770c06722e9bd47285031ceb6afae3978f53a92f63ed98fa16783b606440061592e074c310c7770dbc34efa05d218ba4cc2beaf31623813b50af11111d052e7b9e06ce7d7124bc03fbbb4563f459fcb64d788db9de5cdc0588ca6f2f3f7835ff9b668c6566f3f936e3113008c1d032a0dc3234e3e8029fe6b9f9f8dd1829d2ae5ef3d127264918051e54a2343b87ae3d5396a36bfa74b2e686c43bed9e335a8be886dcb44c0b068167d3e06e977be705b39e5704fea3c4a2bfe5a6e33e74a02ce1ef0980d75f406d51542f6650d9a23f0475790174f59e9e62daa81ab348bacda39c8cdf1e5e2c17b20bb7bb8edb537099358b4b97ded8470402c776bdbb16512c1a2314485604a27fd18b23590edb944cabafd9bbb26c29b3c2843511199311c7f452fc9e005e5d6cb329c29f78cf706b10b2bd8d265d0a5ddbcb3f2c415d3d49bb82830715015cf70167be98476def6d58a10a4159b2bcec9a5d6e6b463d75951ea1957b56177f3cb56aa03ee0b2037e0685d722b388b87e7a88f3c5a114e84debdbaf73be82f5311de50902149e7d99701fb2bfc40f31a71759b95f95901e4ce4a5e7846e683618e08a648051b365916dd277fbf13ff8782299f5001dd8dcf6fe92328e5382a9ad735e957c2fb2a06955009fe74622064fa64de3c01a1c0396306b3fc7771cd7612f4a158851b673fa48c6e7b93a694d6bd0a089acdc881afe8f36ae29cfecc4af3e6a43f62987aefe9ac3ba0418475186eac7d6d6ebf40b5e5f2fe18c9a2f1486044f31df8b4ed87122253d01fde6ef57d76b03ad3197a729931960297d42402556866821818e175d3ff6bde406653948fddd58dd0e23d4fb73dacfa615cc37b00975c8595eddccd94e3e057314402de77815dee044f654e3f2c9a6ae99c134fd6e1ae6154145d11428eee1d2f4e9e394422f020e20803c8467fd80d77bc80aecfc8b5e134c5bdd96caae84346063e100880fc9dcb6415edc2dd3396bf5381309a83b6bc542bea50f3be28a351e3a4ca3a65066bf4ede11944a8c36e8ff5b405ae1ea797b7e576faa39ac55b48a6d93abad1ce848d2edaefad6fd02f2cfbbc1214c3f37f593e23bb955943541ee629cba461198b8a646798e082b9b194475a8a5b65118a0891af880d750a4d72b3891ef3e1ef28a8a48e264fe01339b3e05a8eb0f92e9def0a220dcb4dea13ef1c44652eccd341347e2aa2170543f03f8a8d50ad4213667a8a270709b5d8682023f800a443e86d1ec70a5b12c4adc15d161bce1014ab557afb5517596a056ccfba42f00c89d3727628e9f9ca6bbe606d451d0e50c00b7497c1ffd8525624eea9a28b4953a5ae69450c1e0fc385019da5bdfa0a66b284eaa9eb9cf5551f4f5fcf4adb68d92abf11cea2afc90dadb5638c8136b5a88af528b5dcc7781b40d4c0af830f257b4ab3a1f0b9c9454501120c41cc0867436019d4a0c387f0ccd5ef90422b823f3cb414f45de60d93a4b881288d498001008eb8db86b46bfce9e9802e13b4ab54ef39a1122bc9ca128ec07282be3f2a9c13953975440fe433b3be5ca6e047b71799b894fc6571b90b01352f8712bc66374cd30c35daae6d144e53a58575b4a3fbfc2ab08125bb400cfa07cda20b116c58449760e1220c4e1c7e6694cd9fcc0b9944c04e7e6ef56eef48f06c9c40f4bd9759720cec8a589dbdf8354affc6c1d9adec264ddc56d410b615ff50854a6d1e8ce0af2b435621d9b3f2a4dd33e1a89c728bc4a0893a0f39dc22f08939fbe29ab149878b14262bb4f257fccae4b12aba7bd799abd830b8a40df8f44e4b7d2f31deed302be766ae9236ef2d4559127fdc10e83ffee438b5b049ce006caee3c35c1dc2f370682048370051cd5cd30b3113bb6607f9adc967ceafa5ad571023c7ba597297d1", 0x1000}, {&(0x7f00000001c0)="c36eac541bbb28977ae46de11ac7a41eff91a383ed88a29c5accdb8d38ed3a892c4f6445894e6d3b870b99655e969a42464d9608043acccf3efe610eb5b813d4434d8204553f5594305f3934c00986b1329efd919f47adf95bbc93735e3e889102393d33045cb9855aeb642cb4406ab5fab5c33c26898a541287f0008cc8667edb1a6bee6870a9426dc2cfc91d4a0a617deb77a0653b49fd76ad8737191b84902793", 0xa2}], 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="100000003a000000010000003c100000480000000000000001010000e30d42992f91f7631ce2f7ed087985849c9971f485bd56bbf1caea170d8943c36d2aa8d0d5ab06691e603bf9bf2c354782043e0acf1244ad0631e854f80000000201000000100000f0796d079333ed35a42638c112c1e80970bf605c8830ffbd4586b5ba8b2c0fcb66921330b424db9680ef8195d4481cd107e66e1797ee3d87995241e54b053f3037173718ee77242d370220e082dde7d20ef486137f803043f473aa04196ae4e55d59387f8f6510f474276fc3b0429c046e6cba16181fbda7bf71628eeed7c9490969c19b3d2d500eb2a082b284a78ad621392a6abfc2907382159ab15a30aa3f56597efb520c6d05075596ba6dd6b58710f27f6f84b3c49d4eb0d62d194709845adacd1eb3a71623f9037d25318ac06416aae6a6f7b4a22c650c945a35afe0f093cd38b0fa9924ac92b48015"], 0x150}, 0x0) 07:21:55 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video35\x00', 0x2, 0x0) r1 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r1, &(0x7f0000000040), 0x10) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000680)=@gcm_256={{}, "26ea4efffaca7e36", "aa2d4550a9d8bbfa74e4f109732083fea3b80f29afcc8de93de4f6b01a7ce9e5", "42eac279", "26d90593e59bef3b"}, 0x38) write(r0, &(0x7f0000000340), 0x41395527) 07:21:55 executing program 0: socket$alg(0x26, 0x5, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) lsetxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) setpriority(0x0, 0x0, 0xffff) semget$private(0x0, 0xfffffffffffffffd, 0x15) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x1fffffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:55 executing program 4: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x80000, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000040)={@in6={{0xa, 0x4e20, 0x5, @local, 0x8}}, 0x0, 0x800, 0x0, "7ea1d6788f82170c2c59a5697c86555cbaaf21ea9604219a8a4e421bd895e2a08d7802f7766cd58834f674df368f53937b7b1cb6b63e85c120d81118921da41f4aba65eae73ac0a13ba75d39fdd405c7"}, 0xd8) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:55 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @remote}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @random="e5ac78d4c7fd"}, 0x10) write(r2, &(0x7f0000000080)="2700000014000f3f00000000120f0a00110001001f750800560099ed4f05000000000000ffffff", 0x138) 07:21:56 executing program 0: socket$alg(0x26, 0x5, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x80) lsetxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) setpriority(0x0, 0x0, 0xffff) syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x9, 0x50400) semget$private(0x0, 0xfffffffffffffffd, 0x15) r0 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) ioctl$GIO_SCRNMAP(r0, 0x4b40, &(0x7f0000000040)) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:56 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x400, 0x0) r2 = syz_genetlink_get_family_id$team(&(0x7f0000000040)='team\x00') ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000540)={'lapb0\x00', 0x0}) getsockopt$inet6_mreq(r1, 0x29, 0x1c, &(0x7f00000005c0)={@empty, 0x0}, &(0x7f00000006c0)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@remote, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6=@ipv4={[], [], @empty}}}, &(0x7f0000000840)=0xe8) clock_gettime(0x0, &(0x7f00000026c0)={0x0, 0x0}) recvmmsg(r0, &(0x7f0000002600)=[{{&(0x7f0000000a80)=@generic, 0x80, &(0x7f0000000c40)=[{&(0x7f0000000b00)=""/44, 0x2c}, {&(0x7f0000000b40)=""/91, 0x5b}, {&(0x7f0000000bc0)=""/51, 0x33}, {&(0x7f0000000c00)=""/30, 0x1e}], 0x4, &(0x7f0000000c80)=""/29, 0x1d}, 0xb92}, {{&(0x7f0000000cc0)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000000e00)=[{&(0x7f0000000d40)=""/138, 0x8a}], 0x1, &(0x7f0000000e40)=""/32, 0x20}}, {{&(0x7f0000000e80)=@pptp={0x18, 0x2, {0x0, @initdev}}, 0x80, &(0x7f0000000f40)=[{&(0x7f0000000f00)=""/47, 0x2f}], 0x1, &(0x7f0000000f80)=""/126, 0x7e}, 0x6}, {{&(0x7f0000001000)=@hci, 0x80, &(0x7f0000002080)=[{&(0x7f0000001080)=""/4096, 0x1000}], 0x1, &(0x7f00000020c0)=""/203, 0xcb}, 0xffffffffffffff01}, {{&(0x7f00000021c0)=@pppol2tpv3in6, 0x80, &(0x7f0000002580)=[{&(0x7f0000002240)=""/60, 0x3c}, {&(0x7f0000002280)}, {&(0x7f00000022c0)=""/209, 0xd1}, {&(0x7f00000023c0)=""/134, 0x86}, {&(0x7f0000002480)=""/7, 0x7}, {&(0x7f00000024c0)=""/175, 0xaf}], 0x6, &(0x7f00000025c0)=""/31, 0x1f}, 0xfffffffffffffc00}], 0x5, 0x10000, &(0x7f0000002700)={r6, r7+30000000}) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000002740)={'team0\x00', 0x0}) getsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000002bc0)={@dev, 0x0}, &(0x7f0000002c00)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000002c40)={'team0\x00', 0x0}) getsockname$packet(r1, &(0x7f00000051c0)={0x11, 0x0, 0x0}, &(0x7f0000005200)=0x14) getsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000005240)={@rand_addr, @empty, 0x0}, &(0x7f0000005280)=0xc) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000052c0)={{{@in6=@local, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}}}, &(0x7f00000053c0)=0xe8) sendmsg$TEAM_CMD_OPTIONS_GET(r1, &(0x7f0000005700)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000056c0)={&(0x7f0000005400)={0x29c, r2, 0x400, 0x70bd2c, 0x25dfdbfb, {}, [{{0x8, 0x1, r3}, {0x84, 0x2, [{0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x20}}, {0x8, 0x6, r4}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x4}}, {0x8, 0x6, r5}}}]}}, {{0x8, 0x1, r8}, {0xc0, 0x2, [{0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x80000000}}, {0x8, 0x6, r9}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r10}}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r11}}}]}}, {{0x8, 0x1, r12}, {0xe8, 0x2, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x2}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x800}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x6}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r13}}}]}}, {{0x8, 0x1, r14}, {0x3c, 0x2, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x19}}}]}}]}, 0x29c}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r1, 0x84, 0x74, &(0x7f0000000480)=""/72, &(0x7f00000001c0)=0x48) socket$inet(0x2b, 0x1, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x0, 0x0) r15 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000300)='/dev/autofs\x00', 0x800, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(r15, 0xc02c564a, 0x0) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) lsetxattr$security_selinux(&(0x7f0000000880)='./file0\x00', &(0x7f0000000400)='security.selinux\x00', &(0x7f0000000900)='system_u:object_r:auditctl_exec_t:s0\x00', 0x25, 0x1) r16 = getpgrp(0x0) setpriority(0x0, r16, 0xffff) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) msgget(0x1, 0x208) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:56 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x400, 0x0) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r1, 0x84, 0x74, &(0x7f0000000480)=""/72, &(0x7f00000001c0)=0x48) socket$inet(0x2b, 0x1, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x0, 0x0) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000000)='veth0_to_bond\x00') r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/autofs\x00', 0x2000000007fc, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(r2, 0xc02c564a, 0x0) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) lsetxattr$security_selinux(&(0x7f0000000880)='./file0\x00', &(0x7f0000000400)='security.selinux\x00', &(0x7f0000000900)='system_u:object_r:auditctl_exec_t:s0\x00', 0x25, 0x1) r4 = getpgrp(0x0) setpriority(0x0, r4, 0xffff) fcntl$setpipe(r3, 0x407, 0x30) semget$private(0x0, 0x3, 0x15) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) msgget(0x1, 0x208) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:56 executing program 4: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x10000, 0x0) fcntl$setpipe(r0, 0x407, 0x1000000000000) r1 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x22000) ioctl$HDIO_GETGEO(r1, 0x301, &(0x7f0000000040)) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:56 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @remote}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @random="e5ac78d4c7fd"}, 0x10) write(r2, &(0x7f0000000080)="2700000014000f3f00000000120f0a00110001001f750800560099ed4f0500000000000000000e", 0x138) 07:21:56 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @remote}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @random="e5ac78d4c7fd"}, 0x10) write(r2, &(0x7f0000000080)="2700000014000f3f00000000120f0a00110001001f750800560099ed4f0500000000000000000b", 0x138) 07:21:56 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x400000, 0x0) getsockopt$inet_tcp_int(r1, 0x6, 0x1f, &(0x7f0000000140), &(0x7f00000003c0)=0x4) lsetxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) r2 = fcntl$getown(r0, 0x9) setpriority(0x0, r2, 0x6) semget$private(0x0, 0xfffffffffffffffd, 0x15) r3 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$NBD_SET_SIZE_BLOCKS(r3, 0xab07, 0x5) write$UHID_CREATE2(r3, &(0x7f0000000200)={0xb, 'syz1\x00', 'syz0\x00', 'syz1\x00', 0x9e, 0x35, 0x9, 0x7fffffff, 0x6, 0x8ad, "b015b24b19faa26333cd8ff92501f5bf35b2f3af4b9577ff4102242dfab3c900a0318166a8045527ec3bc31b42dffc2c0d3ab61f4689218e2f6271f050f674d04b0dbc2e66efffbe42899b2d02a55d4b96bb8eccde75bdfdca6eda6b4fbc53878638dfaab7ab24dac9c67b31e463197d7b95fff880b2db0342e9f169af99e7b70f52168f27c5a94e02520210655c778a2691058fa963b43d48db726d9a03"}, 0x1b6) execve(&(0x7f0000000100)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f00000001c0)='!\x00']) ustat(0xff, &(0x7f0000000000)) getsockopt$IP_VS_SO_GET_SERVICES(r3, 0x0, 0x482, &(0x7f00000000c0)=""/12, &(0x7f0000000080)=0xad2a72955144a6bc) 07:21:56 executing program 4: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) execveat(r0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)=[&(0x7f0000000040)='\x00', &(0x7f0000000080)='&vmnet1em1!*proc\x02^selinuxwlan1\x00'], &(0x7f0000000240)=[&(0x7f0000000100)='p\xf2oc\x00', &(0x7f0000000140)='security.capability\x00', &(0x7f00000001c0)='security.capability\x00', &(0x7f0000000200)='wlan1\x00'], 0x400) 07:21:56 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)) pipe(&(0x7f0000000440)) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video35\x00', 0x2, 0x0) r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000040), 0x10) setsockopt$inet_tcp_TLS_TX(r0, 0x6, 0x1, &(0x7f0000000680)=@gcm_256={{}, "26ea4efffaca7e36", "aa2d4550a9d8bbfa74e4f109732083fea3b80f29afcc8de93de4f6b01a7ce9e5", "42eac279", "26d90593e59bef3b"}, 0x38) 07:21:56 executing program 3: socket$alg(0x26, 0x5, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x400, 0x0) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r0, 0x84, 0x74, &(0x7f0000000480)=""/72, &(0x7f00000001c0)=0x48) socket$inet(0x2b, 0x1, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x0, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000300)='/dev/autofs\x00', 0x800, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(r1, 0xc02c564a, 0x0) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) lsetxattr$security_selinux(&(0x7f0000000880)='./file0\x00', &(0x7f0000000400)='security.selinux\x00', &(0x7f0000000900)='system_u:object_r:auditctl_exec_t:s0\x00', 0x25, 0x1) r2 = getpgrp(0x0) setpriority(0x0, r2, 0xffff) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) msgget(0x1, 0x208) clone(0x10000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:56 executing program 1: socket$alg(0x26, 0x5, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x400, 0x0) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r0, 0x84, 0x74, &(0x7f0000000480)=""/72, &(0x7f00000001c0)=0x48) socket$inet(0x2b, 0x1, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x0, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000300)='/dev/autofs\x00', 0x800, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(r1, 0xc02c564a, 0x0) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) ioctl$KVM_ASSIGN_SET_INTX_MASK(r0, 0x4040aea4, &(0x7f0000000080)={0x568, 0x3, 0x1, 0x2, 0x6}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) lsetxattr$security_selinux(&(0x7f0000000880)='./file0\x00', &(0x7f0000000400)='security.selinux\x00', &(0x7f0000000900)='system_u:object_r:auditctl_exec_t:s0\x00', 0x25, 0x1) r2 = getpgrp(0x0) setpriority(0x0, r2, 0xffff) r3 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) msgget(0x1, 0x208) ioctl$sock_inet_SIOCDARP(r3, 0x8953, &(0x7f0000000000)={{0x2, 0x4e20, @local}, {0x306}, 0x8, {0x2, 0x4e21, @loopback}, 'ip6_vti0\x00'}) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:56 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @remote}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @random="e5ac78d4c7fd"}, 0x10) write(r2, &(0x7f0000000080)="2700000014000f3f00000000120f0a00110001001f750800560099ed4f05000000000000ffffff", 0x138) 07:21:56 executing program 4: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) getsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000000)={0x0, 0x31}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f00000000c0)={r1, 0x400000000000001}, 0x8) 07:21:56 executing program 0: socket$alg(0x26, 0x5, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) lsetxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x800, 0x0) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x0, 0x0) syz_open_dev$sndpcmp(&(0x7f00000000c0)='/dev/snd/pcmC#D#p\x00', 0xfffffffffffff56b, 0x800) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/zero\x00', 0x400000, 0x0) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000140)=0x0) setpriority(0x1, r1, 0xfffe) semget$private(0x0, 0xfffffffffffffffd, 0x15) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:57 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)) pipe(&(0x7f0000000440)) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video35\x00', 0x2, 0x0) r0 = socket$inet(0x2b, 0x801, 0x0) setsockopt$inet_tcp_TLS_TX(r0, 0x6, 0x1, &(0x7f0000000680)=@gcm_256={{}, "26ea4efffaca7e36", "aa2d4550a9d8bbfa74e4f109732083fea3b80f29afcc8de93de4f6b01a7ce9e5", "42eac279", "26d90593e59bef3b"}, 0x38) 07:21:57 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @remote}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @random="e5ac78d4c7fd"}, 0x10) write(r2, &(0x7f0000000080)="2700000014000f3f00000000120f0a00110001001f750800560099ed4f05000000000000ffffff", 0x138) 07:21:57 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)) pipe(&(0x7f0000000440)) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video35\x00', 0x2, 0x0) r0 = socket$inet(0x2b, 0x801, 0x0) setsockopt$inet_tcp_TLS_TX(r0, 0x6, 0x1, &(0x7f0000000680)=@gcm_256={{}, "26ea4efffaca7e36", "aa2d4550a9d8bbfa74e4f109732083fea3b80f29afcc8de93de4f6b01a7ce9e5", "42eac279", "26d90593e59bef3b"}, 0x38) 07:21:57 executing program 4: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38b9d) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:57 executing program 1: socket$alg(0x26, 0x5, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x400, 0x0) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r0, 0x84, 0x74, &(0x7f0000000480)=""/72, &(0x7f00000001c0)=0x48) socket$inet(0x2b, 0x1, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x0, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000300)='/dev/autofs\x00', 0x800, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(r1, 0xc02c564a, 0x0) gettid() getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000040)={0x0}, &(0x7f0000000080)=0xc) sched_setaffinity(r2, 0x3b1a, &(0x7f0000000000)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) lsetxattr$security_selinux(&(0x7f0000000880)='./file0\x00', &(0x7f0000000400)='security.selinux\x00', &(0x7f0000000900)='system_u:object_r:auditctl_exec_t:s0\x00', 0x25, 0x1) r3 = getpgrp(0x0) setpriority(0x0, r3, 0xffff) ioctl$VIDIOC_ENUMAUDIO(r1, 0xc0345641, &(0x7f0000000280)={0x100, "415374db4fad79bd40a8dd0129ba3e1d0ae33cdd4e25afefb9ebff9c596d2686", 0x2, 0x1}) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x1, &(0x7f00000000c0)={0xffffffffffffffff}, 0x13f, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f0000000200)={0x5, 0x10, 0xfa00, {&(0x7f0000000940), r4, 0x2}}, 0x18) msgget(0x1, 0x208) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:57 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)) pipe(&(0x7f0000000440)) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video35\x00', 0x2, 0x0) r0 = socket$inet(0x2b, 0x801, 0x0) setsockopt$inet_tcp_TLS_TX(r0, 0x6, 0x1, &(0x7f0000000680)=@gcm_256={{}, "26ea4efffaca7e36", "aa2d4550a9d8bbfa74e4f109732083fea3b80f29afcc8de93de4f6b01a7ce9e5", "42eac279", "26d90593e59bef3b"}, 0x38) 07:21:57 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @remote}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @random="e5ac78d4c7fd"}, 0x10) write(r2, &(0x7f0000000080)="2700000014000f3f00000000120f0a00110001001f750800560099ed4f05000000f0ffffffffff", 0x138) 07:21:57 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) lsetxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) fsetxattr(r0, &(0x7f0000000000)=@random={'osx.', '\x00'}, &(0x7f0000000040)='security.capability\x00', 0x14, 0x2) setpriority(0x0, 0x0, 0xffff) semget$private(0x0, 0xfffffffffffffffd, 0x15) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sysfs$2(0x2, 0x3, &(0x7f0000000080)=""/117) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:57 executing program 0: socket$alg(0x26, 0x5, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) lsetxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/qat_adf_ctl\x00', 0x10200, 0x0) getsockopt$TIPC_NODE_RECVQ_DEPTH(r0, 0x10f, 0x83, &(0x7f0000000100), &(0x7f0000000140)=0x4) setpriority(0x0, 0x0, 0xffff) semget$private(0x0, 0xfffffffffffffffd, 0x15) r1 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4008000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl(r1, 0x9, &(0x7f0000000000)="b73906e0e32236cd81a0a84445cb9c3b13d14385726dfb639d2092b3ef8fc83902f20fb1365a746fa641960aa333a521f43ad64efca13158fdc033b658a8594f6bb8f443ec9fe5053ad7266e6c1056cb21bf02c12db11136f2ccd71b7883df416d985cd8a0b6a18dcdb2fcd9336646dca213b76093e485f2c7c8365d78b3b92eab7164f0a69daae1e9fa7937a4683df69fc379a35e040cdb5bd7de6b44d0ff83d93d4b99fd10d86440d66a") execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:57 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)) pipe(&(0x7f0000000440)) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video35\x00', 0x2, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000040), 0x10) setsockopt$inet_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000680)=@gcm_256={{}, "26ea4efffaca7e36", "aa2d4550a9d8bbfa74e4f109732083fea3b80f29afcc8de93de4f6b01a7ce9e5", "42eac279", "26d90593e59bef3b"}, 0x38) 07:21:57 executing program 4: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x80) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f00000005c0), &(0x7f00000006c0)=0x4) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) io_setup(0x2, &(0x7f0000000000)=0x0) io_submit(r1, 0x6, &(0x7f0000000540)=[&(0x7f0000000140)={0x0, 0x0, 0x0, 0x3, 0x81, r0, &(0x7f0000000040)="eee04b589b6a590aca8069764a244b803e5bbc3bfcd760f38ea839fff769632fd61018e1145f474af84c3fde7912b851157684195fa3801920c8cac8a21eed6f3b4dc218228f1410bdce0988a142c487111af1905d7f0f29764c41067759a1d7adb9c2686fa2ea583d260685943f45fd18544b929cdffa6d2990b6a81d879fda8ceecdde336bd3bb2d38da4d582ba1ea05e2ecc7943ee4231c01887ff20503cd1b0bd5e2c6177f48608da0391930bc1be1e5115f26db861b695f93677e04d8147d66acb4b027ec6ba609f3cd06d50e7475626e97b29f8b99e6655cc36fd08ac5b62a7ef250d8fcf358fb566f", 0xec, 0x0, 0x0, 0x1, r0}, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x3, 0x4, r0, &(0x7f00000001c0)="914cc25ba8cf50f193926f06ed77b141d4d69020dd23266c0ee2855ff5478a3ef339897048c678fa60da9cab984dd8883f7dd94be0bb5a95c86f909a37a4f271bb1236c4e715830809d4aafbeffec07fc812e5c2954da8578d170c3d3b2a67f30276beb737b83ee1679875739b8cb8fd09f6b0c7d10a54f1b1ee4db62392c3a62228685c680488751335990d78b77f95787edefea0cf3e91b81fd039bf8e9ced63e3a9d49a89be47f93d", 0xaa, 0x8, 0x0, 0x3, r0}, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x3, 0x2, r0, &(0x7f00000002c0)="da4e5d11df8186736aa62bbf18c49fc17e56ceaa1ab798d924602dfcfa9933cb503552ab09a929705090379401510abf701814ddf19dc61f8d8ea73262286cf828f7b84cd834c53c12a7", 0x4a, 0x0, 0x0, 0x2, r0}, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x7, 0x9, r0, &(0x7f0000000380)="94878e3662a2df0e9a84a4ad07b8b5be4dec0bd7bd8433faf5c3445dabe43b8774023086f5f7b5f5548b691a8992924e39e071f4d8cb73c9793701c8e7901ef7b72f21a2113ea88e55afebff480143efa64a1d0c43c664d1d0833543c042f032240b2375e44e825c259a4694a6364de88742120219c93ac2ca1d0eac16d92febdb11e260", 0x84, 0xc34, 0x0, 0x2}, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x5, 0x6, r0, &(0x7f00000007c0)="c8807f086c342fe017b882c8e49aafbf4db7ff566003ca82ad46ea0c8f3dd39962a45233ffc8b53fa132fc6a2b510ab7118aa967501c32efd0d03fef630c0726b3f40dac0b77a5d2a5dda7e03843dbcf2fe0aeb0a74017559b89f527eaa50356ecdc7f8c26d9e7b331975dd018dc6cb714f4a887d6634341f3215176a7b81c745eb10c3a075b7378fd01596dd5a96e3fe457c5f4c41965fea26d06cc3df01ab370715f4c80d75d2b68100376f401710067bd2f29827dadea40db2d382b7c214c23aa01e0e57bd3619b75c3f4f156f607d848a8132c4a8f4a715ae61a", 0xdc, 0xfffffffffffffff7, 0x0, 0x1, r0}, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x6, 0x8, r0, &(0x7f00000008c0)="941a91c6719883933859f0db10ca5a24457b3459a11ecfd4c93f45cd09f41ca1ce3c59cf3818416379ad601df5900f80d303413be2d87073e6a833ec629a2c3c40056b79e52abe251b40fa7a7aa3130d997eca9e8133a9b01edf8834c1674ffdc17f2102ee8661bfb645765a9fc675460196ac69340fde827f28b61ad87a255aa537e98443667a424cbc474b88aad8e022b35a08fe42136ed7a90305e46f6373539b70b64d31a29be580e7bfef9196b74657402acc12e92d8033c22b0d737e098a0238602bec8ab1bef595ef4c668c245cbb84c580db3fe332df9a0fb6d89e6aafce565eba209fd5927e7bdb792f092400849ffdc300a3a1", 0xf8, 0xfffffffffffffff8, 0x0, 0x1, r0}]) 07:21:57 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @remote}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @random="e5ac78d4c7fd"}, 0x10) write(r2, &(0x7f0000000080)="2700000014000f3f00000000120f0a00110001001f750800560099ed4f05000000020000000000", 0x138) 07:21:57 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)) pipe(&(0x7f0000000440)) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video35\x00', 0x2, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000040), 0x10) setsockopt$inet_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000680)=@gcm_256={{}, "26ea4efffaca7e36", "aa2d4550a9d8bbfa74e4f109732083fea3b80f29afcc8de93de4f6b01a7ce9e5", "42eac279", "26d90593e59bef3b"}, 0x38) 07:21:57 executing program 3: socket$alg(0x26, 0x5, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x400, 0x0) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r0, 0x84, 0x74, &(0x7f0000000480)=""/72, &(0x7f00000001c0)=0x48) socket$inet(0x2b, 0x1, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x0, 0x0) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000300)='/dev/autofs\x00', 0x800, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(r2, 0xc02c564a, 0x0) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) lsetxattr$security_selinux(&(0x7f0000000880)='./file0\x00', &(0x7f0000000400)='security.selinux\x00', &(0x7f0000000900)='system_u:object_r:auditctl_exec_t:s0\x00', 0x25, 0x1) r3 = getpgrp(0x0) setpriority(0x0, r3, 0xffff) recvmmsg(r0, &(0x7f0000002c40)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f0000000280)=[{&(0x7f0000000080)=""/160, 0xa0}], 0x1}, 0x7f}, {{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000940)=""/198, 0xc6}, {&(0x7f0000000a40)=""/4096, 0x1000}, {&(0x7f0000000340)=""/192, 0xc0}], 0x3, &(0x7f0000001a40)=""/227, 0xe3}, 0x6}, {{&(0x7f0000000500)=@pppoe={0x18, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000000700)=[{&(0x7f00000005c0)}, {&(0x7f00000006c0)=""/8, 0x8}, {&(0x7f0000001b40)=""/4096, 0x1000}, {&(0x7f0000002b40)=""/216, 0xd8}, {&(0x7f00000007c0)=""/157, 0x9d}], 0x5}, 0x9}], 0x3, 0x100, &(0x7f00000008c0)={0x77359400}) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) msgget(0x1, 0x208) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$TCSBRK(r1, 0x5409, 0x7fffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:57 executing program 1: socket$alg(0x26, 0x5, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x400, 0x0) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r0, 0x84, 0x74, &(0x7f0000000480)=""/72, &(0x7f00000001c0)=0x48) socket$inet(0x2b, 0x1, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x0, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000300)='/dev/autofs\x00', 0x800, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(r1, 0xc02c564a, 0x0) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) r2 = getpgrp(0x0) setpriority(0x0, r2, 0xffff) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) msgget(0x1, 0x208) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:57 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)) pipe(&(0x7f0000000440)) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video35\x00', 0x2, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000040), 0x10) setsockopt$inet_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000680)=@gcm_256={{}, "26ea4efffaca7e36", "aa2d4550a9d8bbfa74e4f109732083fea3b80f29afcc8de93de4f6b01a7ce9e5", "42eac279", "26d90593e59bef3b"}, 0x38) 07:21:57 executing program 4: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x40000, 0x0) write$capi20(r0, &(0x7f00000000c0)={0x10, 0x2, 0xdc3de0f4563790b4, 0x83, 0x7, 0x6}, 0x10) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) eventfd(0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0086426, &(0x7f0000000080)={0x8, &(0x7f0000000040)=[{}, {}, {}, {}, {}, {}, {}, {}]}) 07:21:57 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)) pipe(&(0x7f0000000440)) r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000040), 0x10) setsockopt$inet_tcp_TLS_TX(r0, 0x6, 0x1, &(0x7f0000000680)=@gcm_256={{}, "26ea4efffaca7e36", "aa2d4550a9d8bbfa74e4f109732083fea3b80f29afcc8de93de4f6b01a7ce9e5", "42eac279", "26d90593e59bef3b"}, 0x38) 07:21:58 executing program 0: r0 = socket(0x11, 0xa, 0xfff) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="ec2dd43f4342e48a0d2e55225d573c4609c9d1e8c68282e36ede8d1e9f221d09d329ba318bf3295f53db301f7565a936758f1f1401aea4dd3afba019d52a7ccc361f4487cdc0690d840d86139e7cc94624e7dbdbcb8c5545d20bdd44942b8feccbb899d296171144314b1f48aeee8763b032759b32f57c6e5e528e825b74d2194de46b377e3137717c5549b4e9", 0x8d) socket$alg(0x26, 0x5, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) lsetxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) setpriority(0x0, 0x0, 0xffff) semget$private(0x0, 0xfffffffffffffffd, 0x15) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:58 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @remote}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @random="e5ac78d4c7fd"}, 0x10) write(r2, &(0x7f0000000080)="2700000014000f3f00000000120f0a00110001001f750800560099ed4f05000000040000000000", 0x138) 07:21:58 executing program 4: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x19fb94757048ee15) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000000)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:58 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)) pipe(&(0x7f0000000440)) r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000040), 0x10) setsockopt$inet_tcp_TLS_TX(r0, 0x6, 0x1, &(0x7f0000000680)=@gcm_256={{}, "26ea4efffaca7e36", "aa2d4550a9d8bbfa74e4f109732083fea3b80f29afcc8de93de4f6b01a7ce9e5", "42eac279", "26d90593e59bef3b"}, 0x38) 07:21:58 executing program 3: socket$alg(0x26, 0x5, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x400, 0x0) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r0, 0x84, 0x74, &(0x7f0000000480)=""/72, &(0x7f00000001c0)=0x48) socket$inet(0x2b, 0x1, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x0, 0x0) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000300)='/dev/autofs\x00', 0x800, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(r2, 0xc02c564a, 0x0) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) lsetxattr$security_selinux(&(0x7f0000000880)='./file0\x00', &(0x7f0000000400)='security.selinux\x00', &(0x7f0000000900)='system_u:object_r:auditctl_exec_t:s0\x00', 0x25, 0x1) r3 = getpgrp(0x0) setpriority(0x0, r3, 0xffff) recvmmsg(r0, &(0x7f0000002c40)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f0000000280)=[{&(0x7f0000000080)=""/160, 0xa0}], 0x1}, 0x7f}, {{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000940)=""/198, 0xc6}, {&(0x7f0000000a40)=""/4096, 0x1000}, {&(0x7f0000000340)=""/192, 0xc0}], 0x3, &(0x7f0000001a40)=""/227, 0xe3}, 0x6}, {{&(0x7f0000000500)=@pppoe={0x18, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000000700)=[{&(0x7f00000005c0)}, {&(0x7f00000006c0)=""/8, 0x8}, {&(0x7f0000001b40)=""/4096, 0x1000}, {&(0x7f0000002b40)=""/216, 0xd8}, {&(0x7f00000007c0)=""/157, 0x9d}], 0x5}, 0x9}], 0x3, 0x100, &(0x7f00000008c0)={0x77359400}) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) msgget(0x1, 0x208) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$TCSBRK(r1, 0x5409, 0x7fffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:58 executing program 1: unshare(0x8000400) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x1) ioctl$KVM_SET_CPUID(r0, 0x4008ae8a, &(0x7f0000000040)={0x3, 0x0, [{0xc000001b, 0x81, 0x0, 0x7, 0x9}, {0x0, 0x9, 0x9, 0x7}, {0xc0000007, 0xff, 0x8001, 0x81, 0x9}]}) syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) pselect6(0x40, &(0x7f0000000100)={0xb}, 0x0, 0x0, 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x400, 0x0) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r1, 0x84, 0x74, &(0x7f0000000480)=""/72, &(0x7f00000001c0)=0x48) socket$inet(0x2b, 0x1, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x0, 0x0) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000300)='/dev/autofs\x00', 0x800, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(r2, 0xc02c564a, 0x0) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) lsetxattr$security_selinux(&(0x7f0000000880)='./file0\x00', &(0x7f0000000400)='security.selinux\x00', &(0x7f0000000900)='system_u:object_r:auditctl_exec_t:s0\x00', 0x25, 0x1) r3 = getpgrp(0x0) setpriority(0x0, r3, 0xffff) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) msgget(0x1, 0x208) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:58 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)) r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000040), 0x10) setsockopt$inet_tcp_TLS_TX(r0, 0x6, 0x1, &(0x7f0000000680)=@gcm_256={{}, "26ea4efffaca7e36", "aa2d4550a9d8bbfa74e4f109732083fea3b80f29afcc8de93de4f6b01a7ce9e5", "42eac279", "26d90593e59bef3b"}, 0x38) 07:21:58 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @remote}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @random="e5ac78d4c7fd"}, 0x10) write(r2, &(0x7f0000000080)="2700000014000f3f00000000120f0a00110001001f750800560099ed4f050000000a0000000000", 0x138) 07:21:58 executing program 5: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000040), 0x10) setsockopt$inet_tcp_TLS_TX(r0, 0x6, 0x1, &(0x7f0000000680)=@gcm_256={{}, "26ea4efffaca7e36", "aa2d4550a9d8bbfa74e4f109732083fea3b80f29afcc8de93de4f6b01a7ce9e5", "42eac279", "26d90593e59bef3b"}, 0x38) 07:21:58 executing program 0: socket$alg(0x26, 0x5, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) lsetxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) setpriority(0x0, 0x0, 0xffff) semget$private(0x0, 0xfffffffffffffffd, 0x15) r0 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) ioctl$VIDIOC_STREAMOFF(r0, 0x40045613, &(0x7f0000000000)=0x3f) ioctl$DRM_IOCTL_AGP_ENABLE(r0, 0x40046432, &(0x7f0000000040)=0x8000) 07:21:58 executing program 4: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000380)={0x7fff, 0x2, 0x0, "f9452bc4e070005be5ddd344b94c1445303a38153a86e7bbdd8df29da540ddfc", 0x35735743}) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r0, &(0x7f0000000340)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2801050}, 0x7, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[@ANYBLOB="68010000", @ANYRES16=r1, @ANYBLOB="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"], 0x168}, 0x1, 0x0, 0x0, 0x4}, 0x10) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000000)={0x8000, 0x8000, 0x8, 0x0, 0x0}, &(0x7f0000000040)=0x10) r3 = semget(0x1, 0x4, 0x201) semctl$GETPID(r3, 0x0, 0xb, &(0x7f0000000480)=""/214) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000080)={0x3, 0x1, 0x7ff, 0x80, r2}, 0x10) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(r0, 0x4020565b, &(0x7f00000003c0)={0x800100f, 0x2, 0x1}) 07:21:58 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @remote}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @random="e5ac78d4c7fd"}, 0x10) write(r2, &(0x7f0000000080)="2700000014000f3f00000000120f0a00110001001f750800560099ed4f050000000e0000000000", 0x138) 07:21:58 executing program 5: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000040), 0x10) setsockopt$inet_tcp_TLS_TX(r0, 0x6, 0x1, &(0x7f0000000680)=@gcm_256={{}, "26ea4efffaca7e36", "aa2d4550a9d8bbfa74e4f109732083fea3b80f29afcc8de93de4f6b01a7ce9e5", "42eac279", "26d90593e59bef3b"}, 0x38) [ 884.231770][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 884.237614][ C0] protocol 88fb is buggy, dev hsr_slave_1 07:21:58 executing program 0: socket$alg(0x26, 0x5, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) lsetxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) setpriority(0x0, 0x0, 0xffff) semget$private(0x0, 0xfffffffffffffffd, 0x15) r0 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) setsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f0000000000)=0x7, 0x4) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) r1 = shmget(0x1, 0x2000, 0x800, &(0x7f0000ffb000/0x2000)=nil) shmat(r1, &(0x7f0000ffc000/0x3000)=nil, 0x3000) 07:21:58 executing program 5: r0 = socket$inet(0x2b, 0x0, 0x0) connect$inet(r0, &(0x7f0000000040), 0x10) setsockopt$inet_tcp_TLS_TX(r0, 0x6, 0x1, &(0x7f0000000680)=@gcm_256={{}, "26ea4efffaca7e36", "aa2d4550a9d8bbfa74e4f109732083fea3b80f29afcc8de93de4f6b01a7ce9e5", "42eac279", "26d90593e59bef3b"}, 0x38) 07:21:58 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)) pipe(&(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video35\x00', 0x2, 0x0) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r0, 0x111, 0x4, 0x0, 0x4) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_SET_DUMPABLE(0x4, 0x2) clock_gettime(0x0, &(0x7f0000000200)={0x0, 0x0}) utimes(&(0x7f0000000180)='./file0\x00', &(0x7f0000000240)={{r2, r3/1000+10000}}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f00000002c0)='IPVS\x00') stat(&(0x7f00000004c0)='.\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) r6 = getgid() mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000480)='fuse\x00', 0x40000, &(0x7f0000000580)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=r5, @ANYBLOB=',group_id=', @ANYRESDEC=r6, @ANYBLOB="2c616c6c6f775f7653e723805a8e926f746865722c616c6c6f775f6f746865722c646566617d6c745f7065726d697373696f6e732c6d61785f643d3078303030303030303030303030303033392c736d61636b6673726f6f743d6d643573756d6b657972696e676574683073797374656d5cfe2873797374656d2773656375726974796e6f646576235e2a2e2c646f6e745f6d6561737572652c66000000"]) sendmsg$IPVS_CMD_DEL_DAEMON(r1, &(0x7f00000003c0)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000380)={&(0x7f0000000880)=ANY=[@ANYBLOB="80000000c9890bb40bb2ab2803eb2c89a3a03e031826528797e44d6e46c2074d874c43a437647303b99ac4a6e7fbca51ab5cb91bc554924a09ed5c6a4d0ee712f908011161b1b49d2fbebd370d8172bc71ca0c249ed619eadd92064a1adb7acbe21f4d66dd510f3db8f71ecad3722a131b45d489859fabccb9353beaf10ff6a7f417d2e2ce33af93bf90bde2054be93647bdace9892b3f05812b521fbe5642baf01eb0629469f23e0c34db35ec95dc94ce813c7f009dc75075ece37e16276a84", @ANYRES16=r4, @ANYBLOB="00042dbd7000ffdbdf250a00000008000400080000005000020008000e004e2400000800050005000000080008000900000008000b000a00000008000b000200000008000b000a00000014000100ac1e010100000000000000000000000008000900ef020000080006006dbf00000c0001000800028ac7b3093d4a64ec383daf93a93058fb658444c6450ad33d947a13856731da89aba37e2976cb631f0ced0444e944661b464d5870ad06fb777326509dfa5c69d0b738e510eaad65252c9357af3955f41cf39da7d90bb102e447c92c596fbf36604cdf71c2e7b704"], 0x80}, 0x1, 0x0, 0x0, 0x4000000}, 0x8040) getpeername$inet(r1, &(0x7f0000000040)={0x2, 0x0, @local}, &(0x7f0000000100)=0x10) 07:21:58 executing program 4: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x6) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:59 executing program 1: socket$alg(0x26, 0x5, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x402, 0x0) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r0, 0x84, 0x74, &(0x7f0000000480)=""/72, &(0x7f00000001c0)=0x48) socket$inet(0x2b, 0x1, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000300)='/dev/autofs\x00', 0x800, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(r2, 0xc02c564a, 0x0) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) lsetxattr$security_selinux(&(0x7f0000000880)='./file0\x00', &(0x7f0000000400)='security.selinux\x00', &(0x7f0000000900)='system_u:object_r:auditctl_exec_t:s0\x00', 0x25, 0x1) r3 = getpgrp(0x0) getsockopt$inet_sctp6_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000000040)={0x0, 0x9, 0x100}, &(0x7f0000000080)=0x10) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, &(0x7f00000000c0)={r4, 0x7fff, 0x20, 0x0, 0x9}, &(0x7f0000000100)=0x18) setpriority(0x0, r3, 0x401) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) msgget(0x1, 0x208) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:59 executing program 5: r0 = socket$inet(0x2b, 0x0, 0x0) connect$inet(r0, &(0x7f0000000040), 0x10) setsockopt$inet_tcp_TLS_TX(r0, 0x6, 0x1, &(0x7f0000000680)=@gcm_256={{}, "26ea4efffaca7e36", "aa2d4550a9d8bbfa74e4f109732083fea3b80f29afcc8de93de4f6b01a7ce9e5", "42eac279", "26d90593e59bef3b"}, 0x38) 07:21:59 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @remote}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @random="e5ac78d4c7fd"}, 0x10) write(r2, &(0x7f0000000080)="2700000014000f3f00000000120f0a00110001001f750800560099ed4f050000000f0000000000", 0x138) 07:21:59 executing program 4: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x8000, 0x0) r1 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000080)='NET_DM\x00') sendmsg$NET_DM_CMD_STOP(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, r1, 0x8, 0x70bd27, 0x25dfdbfc, {}, ["", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000050}, 0x80) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000200)='TIPCv2\x00') sendmsg$TIPC_NL_SOCK_GET(r0, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x14, r2, 0x400, 0x70bd2b, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x40}, 0x80) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x1000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:59 executing program 0: socket$alg(0x26, 0x5, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) lsetxattr$security_selinux(0x0, 0x0, 0x0, 0x1c3, 0x0) setpriority(0x0, 0x0, 0xffff) semget$private(0x0, 0xfffffffffffffffd, 0x15) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:59 executing program 3: socket$alg(0x26, 0x5, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x400, 0x0) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r0, 0x84, 0x74, &(0x7f0000000480)=""/72, &(0x7f00000001c0)=0x48) socket$inet(0x2b, 0x1, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x0, 0x0) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000300)='/dev/autofs\x00', 0x800, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(r2, 0xc02c564a, 0x0) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$F_SET_FILE_RW_HINT(r1, 0x40e, &(0x7f0000000280)) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) lsetxattr$security_selinux(&(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='security.selinux\x00', &(0x7f0000000340)='system_u:object_r:auditctl_exec_t:s0\x00', 0xffffffffffffff98, 0x1) r4 = getpgrp(0x0) setpriority(0x0, r4, 0xffff) fcntl$setpipe(r3, 0x407, 0x30) semget$private(0x0, 0xfffffffffffffffd, 0x15) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) write$binfmt_aout(r3, &(0x7f0000000940)=ANY=[@ANYBLOB="cc000401f6010000ad03000003000000d30300000000000000000000000000000503819764b61685feb6a086f88515a5aac63106187a20ea30bc59eab2d3c96febc1ab45ff8859b661c20c68b2f0eba7d94671d0742ceebe9effd0d70add3e66f108c2dca73901c36499240c90328ff590b8afd5887edd470cd410721b7526588359d7cc8da57b0041710f2e01a3c475df9632387ce7d518cb2748a21853cc90bcd8f567999abedea700cea8a51b793179bd0b5d613318ead5968f04ef80145010706f41dd057d1ffd097c40719eca9b78"], 0xce) io_setup(0x80, &(0x7f0000000000)=0x0) io_pgetevents(r5, 0x10001, 0x7ffffffffffff33, &(0x7f0000000700)=[{}, {}], &(0x7f0000000500)={0x77359400}, &(0x7f00000005c0)={&(0x7f00000006c0), 0x8}) msgget(0x1, 0x208) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:59 executing program 5: r0 = socket$inet(0x2b, 0x0, 0x0) connect$inet(r0, &(0x7f0000000040), 0x10) setsockopt$inet_tcp_TLS_TX(r0, 0x6, 0x1, &(0x7f0000000680)=@gcm_256={{}, "26ea4efffaca7e36", "aa2d4550a9d8bbfa74e4f109732083fea3b80f29afcc8de93de4f6b01a7ce9e5", "42eac279", "26d90593e59bef3b"}, 0x38) 07:21:59 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @remote}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @random="e5ac78d4c7fd"}, 0x10) write(r2, &(0x7f0000000080)="2700000014000f3f00000000120f0a00110001001f750800560099ed4f05000000600000000000", 0x138) 07:21:59 executing program 5: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000040), 0x10) setsockopt$inet_tcp_TLS_TX(r0, 0x6, 0x1, &(0x7f0000000680)=@gcm_256={{}, "26ea4efffaca7e36", "aa2d4550a9d8bbfa74e4f109732083fea3b80f29afcc8de93de4f6b01a7ce9e5", "42eac279", "26d90593e59bef3b"}, 0x38) 07:21:59 executing program 4: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) socket$unix(0x1, 0x5, 0x0) 07:21:59 executing program 1: socket$alg(0x26, 0x5, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x400, 0x0) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r0, 0x84, 0x74, &(0x7f0000000480)=""/72, &(0x7f00000001c0)=0x48) socket$inet(0x2b, 0x1, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x0, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000300)='/dev/autofs\x00', 0x800, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(r1, 0xc02c564a, 0x0) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$IPT_SO_GET_REVISION_MATCH(r1, 0x0, 0x42, &(0x7f0000000000)={'NETMAP\x00'}, &(0x7f0000000040)=0x1e) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) lsetxattr$security_selinux(&(0x7f0000000880)='./file0\x00', &(0x7f0000000400)='security.selinux\x00', &(0x7f0000000900)='system_u:object_r:auditctl_exec_t:s0\x00', 0x25, 0x1) r2 = getpgrp(0x0) setpriority(0x0, r2, 0xffff) r3 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000100)={0x0, 0xb0, 0xfa00, {0x80, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106, 0x7}}, 0x7) write$RDMA_USER_CM_CMD_SET_OPTION(r1, &(0x7f0000000280)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f0000000080)=0x1, r4, 0x0, 0x1, 0x4}}, 0x20) msgget(0x1, 0x208) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000003c0)='./file0/file0\x00', &(0x7f00000002c0), &(0x7f0000000340)) 07:21:59 executing program 0: socket$alg(0x26, 0x5, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) lsetxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) setpriority(0x0, 0x0, 0xffff) semget$private(0x0, 0xfffffffffffffffd, 0x15) r0 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) ioctl$KVM_GET_SUPPORTED_CPUID(r0, 0xc008ae05, &(0x7f0000000000)=""/36) ioctl$VHOST_VSOCK_SET_GUEST_CID(r0, 0x4008af60, &(0x7f0000000040)={@my=0x0}) 07:21:59 executing program 5: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000040), 0x10) setsockopt$inet_tcp_TLS_TX(r0, 0x6, 0x1, &(0x7f0000000680)=@gcm_256={{}, "26ea4efffaca7e36", "aa2d4550a9d8bbfa74e4f109732083fea3b80f29afcc8de93de4f6b01a7ce9e5", "42eac279", "26d90593e59bef3b"}, 0x38) 07:21:59 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @remote}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @random="e5ac78d4c7fd"}, 0x10) write(r2, &(0x7f0000000080)="2700000014000f3f00000000120f0a00110001001f750800560099ed4f05000000f00000000000", 0x138) 07:21:59 executing program 4: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000000000), 0x4) openat$cgroup_procs(r0, &(0x7f0000000040)='cgroup.threads\x00', 0x2, 0x0) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000240)=[&(0x7f0000000100)=')eth1md5sum/cgroupem1\\md5sum\x00', &(0x7f0000000140)='security.capability\x00', &(0x7f00000001c0)='vmnet1\x00', &(0x7f0000000200)=',:\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:59 executing program 5: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000040), 0x10) setsockopt$inet_tcp_TLS_TX(r0, 0x6, 0x1, &(0x7f0000000680)=@gcm_256={{}, "26ea4efffaca7e36", "aa2d4550a9d8bbfa74e4f109732083fea3b80f29afcc8de93de4f6b01a7ce9e5", "42eac279", "26d90593e59bef3b"}, 0x38) 07:21:59 executing program 3: socket$alg(0x26, 0x5, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x400, 0x0) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r0, 0x84, 0x74, &(0x7f0000000480)=""/72, &(0x7f00000001c0)=0x48) socket$inet(0x2b, 0x1, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x0, 0x0) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000300)='/dev/autofs\x00', 0x800, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(r2, 0xc02c564a, 0x0) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$F_SET_FILE_RW_HINT(r1, 0x40e, &(0x7f0000000280)) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) lsetxattr$security_selinux(&(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='security.selinux\x00', &(0x7f0000000340)='system_u:object_r:auditctl_exec_t:s0\x00', 0xffffffffffffff98, 0x1) r4 = getpgrp(0x0) setpriority(0x0, r4, 0xffff) fcntl$setpipe(r3, 0x407, 0x30) semget$private(0x0, 0xfffffffffffffffd, 0x15) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) write$binfmt_aout(r3, &(0x7f0000000940)=ANY=[@ANYBLOB="cc000401f6010000ad03000003000000d30300000000000000000000000000000503819764b61685feb6a086f88515a5aac63106187a20ea30bc59eab2d3c96febc1ab45ff8859b661c20c68b2f0eba7d94671d0742ceebe9effd0d70add3e66f108c2dca73901c36499240c90328ff590b8afd5887edd470cd410721b7526588359d7cc8da57b0041710f2e01a3c475df9632387ce7d518cb2748a21853cc90bcd8f567999abedea700cea8a51b793179bd0b5d613318ead5968f04ef80145010706f41dd057d1ffd097c40719eca9b78"], 0xce) io_setup(0x80, &(0x7f0000000000)=0x0) io_pgetevents(r5, 0x10001, 0x7ffffffffffff33, &(0x7f0000000700)=[{}, {}], &(0x7f0000000500)={0x77359400}, &(0x7f00000005c0)={&(0x7f00000006c0), 0x8}) msgget(0x1, 0x208) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:21:59 executing program 0: socket$alg(0x26, 0x5, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) lsetxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) setpriority(0x0, 0x0, 0xffff) semget$private(0x0, 0xfffffffffffffffd, 0x15) r0 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x400, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$FIONREAD(r0, 0x541b, &(0x7f0000000280)) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) rt_sigaction(0x1c, &(0x7f00000000c0)={&(0x7f0000000040)="3e660fdc38260fd2abfeefffff660fea4ab50f0f3df4ffffff0d3666f08254bf006f2e660f7fa06c6300002ed500c4c3155f6fceddc4c19df23fc4c3754cdd03", {0x7fffffff}, 0xc0000004, &(0x7f0000000080)="660f6541f5660f73da04670ff878cac4e299b9f766f00fba69a421ff4375f0802e00c4c1575fedc4c30549b9000000201af30fbc1e"}, &(0x7f0000000140)={&(0x7f0000000100)="64660f686d79c4c2819374ee02660f66560026658dbb02000000530fbeb483ad0f2d26d0c8f2c6f8000f9ee9c4e2e1b9f9", {}, 0x0, &(0x7f00000001c0)="f30faea200000080660f163826f30f533d00000100c4e17c2b849a09000000c4e3056c6d3800c4c171d05299c4c241288500000100c4c1e9c6edd5c4c1d9fb278fe978c35cff54"}, 0x8, &(0x7f0000000240)) 07:21:59 executing program 5: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, 0x0, 0x0) setsockopt$inet_tcp_TLS_TX(r0, 0x6, 0x1, &(0x7f0000000680)=@gcm_256={{}, "26ea4efffaca7e36", "aa2d4550a9d8bbfa74e4f109732083fea3b80f29afcc8de93de4f6b01a7ce9e5", "42eac279", "26d90593e59bef3b"}, 0x38) 07:22:00 executing program 1: socket$alg(0x26, 0x5, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x400, 0x0) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r0, 0x84, 0x74, &(0x7f0000000480)=""/72, &(0x7f00000001c0)=0x48) socket$inet(0x2b, 0x400001, 0x3) openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x0, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000300)='/dev/autofs\x00', 0x802, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(r1, 0xc02c564a, 0x0) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) lsetxattr$security_selinux(&(0x7f0000000880)='./file0\x00', &(0x7f0000000400)='security.selinux\x00', &(0x7f0000000900)='system_u:object_r:auditctl_exec_t:s0\x00', 0x25, 0x1) r2 = getpgrp(0x0) setpriority(0x0, r2, 0xffff) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) msgget(0x1, 0x208) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000000)={0x1, 0x3, 0x9, 0x1, 0x3, 0x8000, 0x8000, 0x9, 0x9, 0x4}) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:22:00 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @remote}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @random="e5ac78d4c7fd"}, 0x10) write(r2, &(0x7f0000000080)="2700000014000f3f00000000120f0a00110001001f750800560099ed4f05000000100100000000", 0x138) 07:22:00 executing program 0: socket$alg(0x26, 0x5, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000280)='/dev/audio\x00', 0x101000, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f00000002c0)=ANY=[@ANYRES32=0x0, @ANYBLOB="0500060002020000000000000000b809"], &(0x7f0000000300)=0x14) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000340)={r1, 0x8, 0x3}, &(0x7f0000000380)=0x8) socketpair$unix(0x1, 0x10000000002, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) r4 = openat$cgroup_ro(r3, &(0x7f0000000240)='io.stat\x00', 0x0, 0x0) sendfile(r2, r4, 0x0, 0x80000000000004) lsetxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) setpriority(0x0, 0x0, 0xffff) semget$private(0x0, 0xfffffffffffffffd, 0x15) r5 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x4, 0x90100) ioctl$CAPI_GET_MANUFACTURER(r5, 0xc0044306, &(0x7f0000000140)=0x8) lsetxattr$security_selinux(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='security.selinux\x00', &(0x7f0000000240)='system_u:object_r:lirc_device_t:s0\x00', 0x23, 0x2) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) utimensat(r5, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)={{r6, r7/1000+30000}, {0x0, 0x2710}}, 0x0) r8 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) ioctl$TIOCGPGRP(r8, 0x540f, &(0x7f0000000100)) 07:22:00 executing program 5: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, 0x0, 0x0) setsockopt$inet_tcp_TLS_TX(r0, 0x6, 0x1, &(0x7f0000000680)=@gcm_256={{}, "26ea4efffaca7e36", "aa2d4550a9d8bbfa74e4f109732083fea3b80f29afcc8de93de4f6b01a7ce9e5", "42eac279", "26d90593e59bef3b"}, 0x38) 07:22:00 executing program 4: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') sendmsg$IPVS_CMD_ZERO(r0, &(0x7f00000001c0)={&(0x7f0000000000), 0xc, &(0x7f0000000140)={&(0x7f0000000080)={0xa4, r1, 0x1, 0x70bd2a, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xbdfc}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x4}, @IPVS_CMD_ATTR_SERVICE={0x40, 0x1, [@IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x29}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x1db}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e20}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x44}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@local}, @IPVS_SVC_ATTR_PROTOCOL={0x8}]}, @IPVS_CMD_ATTR_DEST={0x30, 0x2, [@IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@dev={0xfe, 0x80, [], 0x22}}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x10000}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x40}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xff}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xffffffffffff8000}]}, 0xa4}, 0x1, 0x0, 0x0, 0x4}, 0x4094) [ 885.831815][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 885.837629][ C1] protocol 88fb is buggy, dev hsr_slave_1 07:22:00 executing program 5: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, 0x0, 0x0) setsockopt$inet_tcp_TLS_TX(r0, 0x6, 0x1, &(0x7f0000000680)=@gcm_256={{}, "26ea4efffaca7e36", "aa2d4550a9d8bbfa74e4f109732083fea3b80f29afcc8de93de4f6b01a7ce9e5", "42eac279", "26d90593e59bef3b"}, 0x38) 07:22:00 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @remote}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @random="e5ac78d4c7fd"}, 0x10) write(r2, &(0x7f0000000080)="2700000014000f3f00000000120f0a00110001001f750800560099ed4f05000000000a00000000", 0x138) 07:22:00 executing program 4: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r0 = socket$l2tp(0x18, 0x1, 0x1) getsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080), 0x10) r1 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000040)=0xc) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:22:00 executing program 0: r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) fcntl$setflags(r1, 0x2, 0x1) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_INITMSG(r2, 0x84, 0xc, 0x0, 0x0) lsetxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) setpriority(0x0, 0x0, 0xffff) semget$private(0x0, 0xfffffffffffffffd, 0x15) r3 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$VIDIOC_QUERYCAP(r0, 0x80685600, &(0x7f0000000080)) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000000000)=[@in6={0xa, 0x4e20, 0x6, @empty, 0x16f}, @in={0x2, 0x4e24, @loopback}, @in6={0xa, 0x4e22, 0xfffffffffffffffc, @remote, 0x73a}, @in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x21}}, @in6={0xa, 0x4e22, 0x7fffffff, @dev={0xfe, 0x80, [], 0x27}, 0x9}], 0x74) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:22:00 executing program 3: socket$alg(0x26, 0x5, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) lsetxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) setpriority(0x0, 0x0, 0xffff) semget$private(0x0, 0xfffffffffffffffd, 0x15) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:22:00 executing program 5: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000040), 0x10) setsockopt$inet_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000680)=@gcm_256={{}, "26ea4efffaca7e36", "aa2d4550a9d8bbfa74e4f109732083fea3b80f29afcc8de93de4f6b01a7ce9e5", "42eac279", "26d90593e59bef3b"}, 0x38) [ 886.071746][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 886.071774][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 886.077576][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 886.089069][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 886.094856][ C0] protocol 88fb is buggy, dev hsr_slave_1 07:22:00 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @remote}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @random="e5ac78d4c7fd"}, 0x10) write(r2, &(0x7f0000000080)="2700000014000f3f00000000120f0a00110001001f750800560099ed4f05000000e90b00000000", 0x138) 07:22:00 executing program 1: socket$alg(0x26, 0x5, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x400, 0x0) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r0, 0x84, 0x74, &(0x7f0000000480)=""/72, &(0x7f00000001c0)=0x48) socket$inet(0x2b, 0x1, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x0, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000300)='/dev/autofs\x00', 0x800, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(r1, 0xc02c564a, 0x0) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) lsetxattr$security_selinux(&(0x7f0000000880)='./file0\x00', &(0x7f0000000400)='security.selinux\x00', &(0x7f0000000900)='system_u:object_r:auditctl_exec_t:s0\x00', 0x25, 0x1) r2 = getpgrp(0x0) setpriority(0x0, r2, 0xffff) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc004240a, &(0x7f0000000000)={0x2, 0x0, [0x0, 0x0]}) msgget(0x1, 0x208) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:22:00 executing program 3: socket$alg(0x26, 0x5, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x400, 0x0) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r0, 0x84, 0x74, &(0x7f0000000480)=""/72, &(0x7f00000001c0)=0x48) socket$inet(0x2b, 0x1, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x0, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000300)='/dev/autofs\x00', 0x800, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(r1, 0xc02c564a, 0x0) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) lsetxattr$security_selinux(&(0x7f0000000880)='./file0\x00', &(0x7f0000000400)='security.selinux\x00', &(0x7f0000000900)='system_u:object_r:auditctl_exec_t:s0\x00', 0x25, 0x1) r3 = getpgrp(0x0) setpriority(0x0, r3, 0xffff) fcntl$setpipe(r2, 0x407, 0x30) semget$private(0x0, 0xfffffffffffffffd, 0x15) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) msgget(0x1, 0x208) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r1, 0x4004240b, &(0x7f0000000040)={0x5, 0x70, 0x4, 0x3db411d3, 0x5, 0x15, 0x0, 0x10001, 0x10400, 0x8, 0x100, 0x7, 0x3, 0xe0cb, 0xfffffffffffffff8, 0xffffffffffffff00, 0x608, 0xc82, 0x0, 0x0, 0x4, 0x1921, 0xfffffffffffffffc, 0x7ff, 0x0, 0x101, 0x4, 0x1, 0x7ee, 0x2, 0x7, 0x57, 0xffff, 0x6, 0x100, 0x649bcc29, 0xf52, 0xfffffffffffffffb, 0x0, 0xff, 0x2, @perf_bp={&(0x7f0000000000), 0x4}, 0x10000, 0x20, 0x4, 0x3, 0x200, 0x4, 0xffffffffffff13d7}) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:22:00 executing program 0: socket$alg(0x26, 0x5, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) lsetxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) setpriority(0x0, 0x0, 0xffff) semget$private(0x0, 0x5, 0xbe) r0 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:22:00 executing program 5: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000040), 0x10) setsockopt$inet_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000680)=@gcm_256={{}, "26ea4efffaca7e36", "aa2d4550a9d8bbfa74e4f109732083fea3b80f29afcc8de93de4f6b01a7ce9e5", "42eac279", "26d90593e59bef3b"}, 0x38) 07:22:00 executing program 4: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x1d5a1e797ebb6162) r0 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x0, 0x2) connect$vsock_stream(r0, &(0x7f0000000040)={0x28, 0x0, 0x0, @reserved}, 0x10) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$KVM_ASSIGN_DEV_IRQ(r0, 0x4040ae70, &(0x7f0000000080)={0xfffffffffffffff8, 0x4, 0x0, 0x200}) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) fcntl$setflags(r0, 0x2, 0x1) prctl$PR_GET_TIMERSLACK(0x1e) 07:22:00 executing program 5: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000040), 0x10) setsockopt$inet_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000680)=@gcm_256={{}, "26ea4efffaca7e36", "aa2d4550a9d8bbfa74e4f109732083fea3b80f29afcc8de93de4f6b01a7ce9e5", "42eac279", "26d90593e59bef3b"}, 0x38) 07:22:01 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @remote}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @random="e5ac78d4c7fd"}, 0x10) write(r2, &(0x7f0000000080)="2700000014000f3f00000000120f0a00110001001f750800560099ed4f05000000000e00000000", 0x138) 07:22:01 executing program 4: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xffffffffffffff00) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000240)=[&(0x7f0000000200)='pW\xa1\xda\\\x901\x8f\xb3(V\xfd\xcfj\xe9\r\xf2og\x00'], &(0x7f00000001c0)=[&(0x7f0000000280)='pW\xa1\xda\\\x901\x8f\xb3(V\xfd\xcfj\xe9\xa9j(\xd1\xa1\xe3\x98`\x19\x91iX\xee(\xa29m\xad\xaf\xaa\x16\x87z\x94\xbanw\xf2\xbb\x8cw\x9eX\xeb\x0f\r\x87\x16+\x1e\x9f8\xea\xb1\x15\x80\xb8%\x00\xaf$\xbf\xf8U\xcfl\xfa\xb3(\x1e', &(0x7f00000003c0)='!\xa5']) getsockopt$inet_sctp_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000000040)={0x0, 0x6, 0x80}, &(0x7f0000000080)=0x10) getsockopt$sock_int(r0, 0x1, 0x15, &(0x7f0000000000), &(0x7f0000000140)=0xffffffffffffffb8) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f00000000c0)={r1, 0xbb, 0x7}, 0x8) 07:22:01 executing program 0: socket$alg(0x26, 0x5, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) lsetxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) setpriority(0x0, 0x0, 0xffff) semget$private(0x0, 0xfffffffffffffffd, 0x15) r0 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) accept4$unix(r0, &(0x7f0000000000), &(0x7f0000000080)=0x6e, 0x800) ioctl$VIDIOC_S_FMT(r0, 0xc0cc5605, &(0x7f00000001c0)={0xf, @vbi={0x401, 0x7fffffff, 0x0, 0x41414270, [0x4, 0x2e], [0x1, 0xe44], 0x108}}) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f00000000c0)={0x0, 0x0, {0xe, 0x23, 0x7, 0xe, 0x3, 0x3f, 0x5, 0x94, 0x1}}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0xffffffffffffffff, r0, 0x0, 0xb, &(0x7f0000000100)='&?vboxnet0\x00', 0xffffffffffffffff}, 0x30) process_vm_readv(r1, &(0x7f0000000540)=[{&(0x7f00000002c0)=""/73, 0x49}, {&(0x7f0000000340)=""/5, 0x5}, {&(0x7f0000000380)=""/62, 0x3e}, {&(0x7f0000000480)=""/163, 0xa3}, {&(0x7f00000003c0)=""/117, 0x75}, {&(0x7f00000007c0)=""/4096, 0x1000}, {&(0x7f00000006c0)=""/95, 0x5f}, {&(0x7f00000017c0)=""/4096, 0x1000}], 0x8, &(0x7f0000002840)=[{&(0x7f00000005c0)=""/29, 0x1d}, {&(0x7f00000027c0)=""/88, 0x58}], 0x2, 0x0) bind$alg(r0, &(0x7f0000002880)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(serpent)\x00'}, 0x58) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:22:01 executing program 5: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000040), 0x10) setsockopt$inet_tcp_TLS_TX(r0, 0x6, 0x1, 0x0, 0x0) 07:22:01 executing program 5: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000040), 0x10) setsockopt$inet_tcp_TLS_TX(r0, 0x6, 0x1, 0x0, 0x0) 07:22:01 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @remote}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @random="e5ac78d4c7fd"}, 0x10) write(r2, &(0x7f0000000080)="2700000014000f3f00000000120f0a00110001001f750800560099ed4f05000000c00e00000000", 0x138) 07:22:01 executing program 1: socket$alg(0x26, 0x5, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x400, 0x0) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r0, 0x84, 0x74, &(0x7f0000000480)=""/72, &(0x7f00000001c0)=0x48) socket$inet(0x2b, 0x1, 0xffffffffffffffff) getsockopt$inet_dccp_buf(r0, 0x21, 0x8f, &(0x7f0000000040)=""/109, &(0x7f00000000c0)=0x6d) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x0, 0x0) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000300)='/dev/autofs\x00', 0x800, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(r2, 0xc02c564a, 0x0) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0xfffffffffffffff9, 0x80000) lsetxattr$security_selinux(&(0x7f0000000100)='./file1\x00', &(0x7f0000000400)='security.selinux\x00', &(0x7f0000000280)='system_u:object_xec_t:s0\x00K\xeb\x10\xa3=Fm&R\x1b\xe40x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @remote}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @random="e5ac78d4c7fd"}, 0x10) write(r2, &(0x7f0000000080)="2700000014000f3f00000000120f0a00110001001f750800560099ed4f050000003f0000000000", 0x138) 07:22:01 executing program 5 (fault-call:2 fault-nth:0): r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000040), 0x10) setsockopt$inet_tcp_TLS_TX(r0, 0x6, 0x1, &(0x7f0000000680)=@gcm_256={{}, "26ea4efffaca7e36", "aa2d4550a9d8bbfa74e4f109732083fea3b80f29afcc8de93de4f6b01a7ce9e5", "42eac279", "26d90593e59bef3b"}, 0x38) 07:22:01 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) lsetxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x406, r0) ioctl$VIDIOC_S_MODULATOR(r1, 0x40445637, &(0x7f0000000280)={0x0, "982d836040913b3b213e08397fdaa37ac15531385ffc4d130239f20bb23cefbb", 0x800, 0x3, 0x2, 0xe, 0x7}) setpriority(0x0, 0x0, 0xffff) r2 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000000)=0x0) clock_gettime(0x0, &(0x7f00000001c0)={0x0, 0x0}) clock_gettime(0x0, &(0x7f0000000200)={0x0, 0x0}) utimes(&(0x7f0000000300)='./file0\x00', &(0x7f0000000240)={{r4, r5/1000+30000}, {r6, r7/1000+30000}}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r2, 0x0, 0x5, &(0x7f0000000080)='eth1\x00', 0xffffffffffffffff}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r3, r2, 0x0, 0x14, &(0x7f0000000040)='security.capability\x00', r8}, 0x30) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) write$P9_RSYMLINK(r1, &(0x7f0000000140)={0x14, 0x11, 0x2, {0x1, 0x2, 0x4}}, 0x14) tee(r9, r1, 0x4, 0x4) 07:22:01 executing program 3 (fault-call:2 fault-nth:0): r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f00000001c0), 0x20) sendmsg$can_raw(r0, &(0x7f0000001fc8)={0x0, 0x74, &(0x7f0000000140)={&(0x7f000000a000)=@canfd={{0x5}, 0x0, 0x0, 0x0, 0x0, "0327e1b22b5fcef700580f02000000003f420f000000000000580f02000000003f420f0000000000856b76b5ee00000000000000004e2f9663a918fa1efd9b0b"}, 0x2000a048}}, 0x0) 07:22:01 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @remote}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @random="e5ac78d4c7fd"}, 0x10) write(r2, &(0x7f0000000080)="2700000014000f3f00000000120f0a00110001001f750800560099ed4f05000000000f00000000", 0x138) 07:22:01 executing program 1: socket$alg(0x26, 0x5, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x400100, 0x0) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r0, 0x84, 0x74, &(0x7f0000000480)=""/72, &(0x7f00000001c0)=0x48) socket$inet(0x2b, 0x1, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x0, 0x0) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000300)='/dev/autofs\x00', 0x800, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(r2, 0xc02c564a, 0x0) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x57) lsetxattr$security_selinux(&(0x7f0000000880)='./file0\x00', &(0x7f0000000400)='security.selinux\x00', &(0x7f0000000900)='system_u:object_r:auditctl_exec_t:s0\x00', 0x25, 0x1) r3 = getpgrp(0x0) setpriority(0x0, r3, 0xffff) r4 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r3, r1, 0x0, 0x2, &(0x7f0000000000)=':\x00', 0xffffffffffffffff}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)=r5, 0x4) remap_file_pages(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x2000000, 0x3f, 0x4820) sendto$inet(r4, &(0x7f0000000940)="2e036d4223ae1ceff4d83f0073ded44514937ee948df1ef2526a3f56bde6ab9c9586a8506a46a189d4bce9eb2023ec185bd0e85adf95cf6583e76346ccd460fc460932ca1a0f5519f6957d499ca42727df663822af8089e90f4c21710a27c8baf05347163edca7cded7e95e77a152e59040addd5b6533feef578955c1a09c0a924f60a73feab84585cb24a40208294584fb760ce97e32b0dfa93f05a79165f3cb384f7f098f1f246416f37a07d4949a369eab62944324f0dc15d323b9df2702dfb23c8bc1a674cde014d6d1854ddb15ce5d0f8800173eadf1f73124c087f0db718d90f263350b6b2c4ec0e9e7d5c4ec75263", 0xf2, 0x24000880, &(0x7f00000000c0)={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) msgget(0x1, 0x208) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) [ 887.395943][T28305] FAULT_INJECTION: forcing a failure. [ 887.395943][T28305] name failslab, interval 1, probability 0, space 0, times 0 [ 887.443564][T28305] CPU: 0 PID: 28305 Comm: syz-executor.3 Not tainted 5.3.0-rc2+ #87 [ 887.451588][T28305] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 887.461656][T28305] Call Trace: [ 887.464974][T28305] dump_stack+0x172/0x1f0 [ 887.469342][T28305] should_fail.cold+0xa/0x15 [ 887.473953][T28305] ? __kasan_check_read+0x11/0x20 [ 887.478994][T28305] ? fault_create_debugfs_attr+0x180/0x180 [ 887.484843][T28305] ? page_to_nid.part.0+0x20/0x20 07:22:01 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) lsetxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) setpriority(0x2, 0x0, 0x22) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000340)='TIPC\x00') sendmsg$TIPC_CMD_GET_MAX_PORTS(r0, &(0x7f0000000400)={&(0x7f0000000200), 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x1c, r1, 0x100, 0x70bd26, 0x25dfdbff, {}, ["", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x810}, 0x40001) r2 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0xa4a00, 0x40) getsockopt$inet_tcp_buf(r2, 0x6, 0xb, &(0x7f00000004c0)=""/82, &(0x7f0000000540)=0x52) semget$private(0x0, 0xfffffffffffffff9, 0x4000000015) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000002c0)='yeah\x00', 0x5) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000300)) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000000)={0x0, 0x5, 0xff, 0x200, 0x0, 0xfffffffffffffff8}, &(0x7f0000000040)=0x14) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000480)=0xffffffffffff8000, 0x4) ioctl$SIOCSIFMTU(r2, 0x8922, &(0x7f00000005c0)={'vcan0\x00', 0x40cd}) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000080)={r3, @in={{0x2, 0x4e22, @rand_addr=0x4}}, [0x0, 0xffff, 0x4, 0x200, 0x1, 0xfb, 0x7ff, 0x8, 0x9, 0x800, 0x4, 0x5, 0x5, 0x8, 0x6a]}, &(0x7f00000001c0)=0x100) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000240)={{0x2, 0x4e20, @loopback}, {0x6, @remote}, 0x48, {0x2, 0x4e22, @rand_addr=0xaa}, 'bcsh0\x00'}) [ 887.489900][T28305] ? ___might_sleep+0x163/0x280 [ 887.494775][T28305] __should_failslab+0x121/0x190 [ 887.499729][T28305] should_failslab+0x9/0x14 [ 887.504373][T28305] kmem_cache_alloc_trace+0x2d3/0x790 [ 887.509757][T28305] ? __local_bh_enable_ip+0x15a/0x270 [ 887.515370][T28305] bcm_sendmsg+0x2580/0x3e10 [ 887.519978][T28305] ? bcm_proc_show+0xae0/0xae0 [ 887.524767][T28305] ? apparmor_socket_sendmsg+0x2a/0x30 [ 887.530239][T28305] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 887.536491][T28305] ? bcm_proc_show+0xae0/0xae0 [ 887.536508][T28305] sock_sendmsg+0xd7/0x130 [ 887.536522][T28305] ___sys_sendmsg+0x803/0x920 [ 887.536537][T28305] ? copy_msghdr_from_user+0x440/0x440 [ 887.536552][T28305] ? __fget+0xa3/0x560 [ 887.536574][T28305] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 887.536587][T28305] ? __fget+0x384/0x560 [ 887.536617][T28305] ? ksys_dup3+0x3e0/0x3e0 [ 887.556461][T28305] ? __fget_light+0x1a9/0x230 [ 887.566749][T28305] ? __fdget+0x1b/0x20 [ 887.566767][T28305] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 887.566784][T28305] __sys_sendmsg+0x105/0x1d0 [ 887.566799][T28305] ? __sys_sendmsg_sock+0xd0/0xd0 [ 887.566820][T28305] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 887.566834][T28305] ? entry_SYSENTER_compat+0x68/0x7f [ 887.566850][T28305] __ia32_compat_sys_sendmsg+0x7a/0xb0 [ 887.566868][T28305] do_fast_syscall_32+0x27b/0xdb3 [ 887.566883][T28305] entry_SYSENTER_compat+0x70/0x7f [ 887.566894][T28305] RIP: 0023:0xf7f649c9 07:22:02 executing program 0: socket$alg(0x26, 0x5, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) lsetxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) setpriority(0x0, 0x0, 0xffff) semget$private(0x0, 0xfffffffffffffffd, 0x15) open(&(0x7f0000000000)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) [ 887.566909][T28305] Code: d3 83 c4 10 5b 5e 5d c3 ba 80 96 98 00 eb a9 8b 04 24 c3 8b 34 24 c3 8b 3c 24 c3 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 887.566916][T28305] RSP: 002b:00000000f5d600cc EFLAGS: 00000296 ORIG_RAX: 0000000000000172 [ 887.659171][T28305] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000020001fc8 [ 887.667151][T28305] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 887.675213][T28305] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 887.683194][T28305] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 07:22:02 executing program 5: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000040), 0x10) setsockopt$inet_tcp_TLS_TX(r0, 0x6, 0x1, &(0x7f0000000680)=@gcm_256={{}, "26ea4efffaca7e36", "aa2d4550a9d8bbfa74e4f109732083fea3b80f29afcc8de93de4f6b01a7ce9e5", "42eac279", "26d90593e59bef3b"}, 0x38) [ 887.691201][T28305] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 07:22:02 executing program 1: socket$alg(0x26, 0x5, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x400, 0x0) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r0, 0x84, 0x74, &(0x7f0000000480)=""/72, &(0x7f00000001c0)=0x48) socket$inet(0x2b, 0x1, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x0, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000300)='/dev/autofs\x00', 0x800, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(r1, 0xc02c564a, 0x0) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) lsetxattr$security_selinux(&(0x7f0000000880)='./file0\x00', &(0x7f0000000400)='security.selinux\x00', &(0x7f0000000900)='system_u:object_r:auditctl_exec_t:s0\x00', 0x25, 0x1) r2 = getpgrp(0x0) setpriority(0x0, r2, 0xffff) open(&(0x7f0000000000)='./file0\x00', 0x40, 0x3) msgget(0x1, 0x208) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:22:02 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000080)={{{@in=@loopback, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@empty}}, &(0x7f00000001c0)=0xe8) fsetxattr$security_capability(r0, &(0x7f0000000040)='security.capability\x00', &(0x7f0000000200)=@v3={0x3000000, [{0x0, 0x2}, {0x1ff, 0x9}], r1}, 0x18, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) syz_open_dev$usbmon(&(0x7f0000000240)='/dev/usbmon#\x00', 0x3, 0x4000) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:22:02 executing program 5: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000040), 0x10) setsockopt$inet_tcp_TLS_TX(r0, 0x6, 0x2, &(0x7f0000000680)=@gcm_256={{}, "26ea4efffaca7e36", "aa2d4550a9d8bbfa74e4f109732083fea3b80f29afcc8de93de4f6b01a7ce9e5", "42eac279", "26d90593e59bef3b"}, 0x38) 07:22:02 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @remote}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @random="e5ac78d4c7fd"}, 0x10) write(r2, &(0x7f0000000080)="2700000014000f3f00000000120f0a00110001001f750800560099ed4f05000000011000000000", 0x138) [ 887.911753][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 887.917596][ C1] protocol 88fb is buggy, dev hsr_slave_1 07:22:02 executing program 0: socket$alg(0x26, 0x5, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x6, 0x101000) setsockopt$inet_tcp_int(r0, 0x6, 0x11, &(0x7f0000000040)=0x1, 0x4) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) lsetxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) setpriority(0x0, 0x0, 0xffff) semget$private(0x0, 0xfffffffffffffffd, 0x15) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:22:02 executing program 5: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000040), 0x10) setsockopt$inet_tcp_TLS_TX(r0, 0x6, 0x3, &(0x7f0000000680)=@gcm_256={{}, "26ea4efffaca7e36", "aa2d4550a9d8bbfa74e4f109732083fea3b80f29afcc8de93de4f6b01a7ce9e5", "42eac279", "26d90593e59bef3b"}, 0x38) 07:22:02 executing program 3 (fault-call:2 fault-nth:1): r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f00000001c0), 0x20) sendmsg$can_raw(r0, &(0x7f0000001fc8)={0x0, 0x74, &(0x7f0000000140)={&(0x7f000000a000)=@canfd={{0x5}, 0x0, 0x0, 0x0, 0x0, "0327e1b22b5fcef700580f02000000003f420f000000000000580f02000000003f420f0000000000856b76b5ee00000000000000004e2f9663a918fa1efd9b0b"}, 0x2000a048}}, 0x0) 07:22:02 executing program 4: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) stat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) [ 888.151745][ C1] protocol 88fb is buggy, dev hsr_slave_0 07:22:02 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @remote}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @random="e5ac78d4c7fd"}, 0x10) write(r2, &(0x7f0000000080)="2700000014000f3f00000000120f0a00110001001f750800560099ed4f05000000003f00000000", 0x138) [ 888.239171][T29390] FAULT_INJECTION: forcing a failure. [ 888.239171][T29390] name failslab, interval 1, probability 0, space 0, times 0 07:22:02 executing program 5: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000040), 0x10) setsockopt$inet_tcp_TLS_TX(r0, 0x6, 0x4, &(0x7f0000000680)=@gcm_256={{}, "26ea4efffaca7e36", "aa2d4550a9d8bbfa74e4f109732083fea3b80f29afcc8de93de4f6b01a7ce9e5", "42eac279", "26d90593e59bef3b"}, 0x38) [ 888.337521][T29390] CPU: 0 PID: 29390 Comm: syz-executor.3 Not tainted 5.3.0-rc2+ #87 [ 888.345529][T29390] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 888.355683][T29390] Call Trace: [ 888.358991][T29390] dump_stack+0x172/0x1f0 [ 888.363344][T29390] should_fail.cold+0xa/0x15 [ 888.367950][T29390] ? should_fail+0x1de/0x852 [ 888.372554][T29390] ? fault_create_debugfs_attr+0x180/0x180 [ 888.378367][T29390] ? page_to_nid.part.0+0x20/0x20 [ 888.383425][T29390] ? ___might_sleep+0x163/0x280 [ 888.388287][T29390] __should_failslab+0x121/0x190 [ 888.393256][T29390] should_failslab+0x9/0x14 [ 888.397773][T29390] __kmalloc+0x2e0/0x770 [ 888.402117][T29390] ? kmem_cache_alloc_trace+0x346/0x790 [ 888.407695][T29390] ? __local_bh_enable_ip+0x15a/0x270 [ 888.413082][T29390] ? bcm_sendmsg+0x2e95/0x3e10 [ 888.417873][T29390] bcm_sendmsg+0x2e95/0x3e10 [ 888.422473][T29390] ? bcm_proc_show+0xae0/0xae0 [ 888.427270][T29390] ? apparmor_socket_sendmsg+0x2a/0x30 07:22:02 executing program 5: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000040), 0x10) setsockopt$inet_tcp_TLS_TX(r0, 0x6, 0x5, &(0x7f0000000680)=@gcm_256={{}, "26ea4efffaca7e36", "aa2d4550a9d8bbfa74e4f109732083fea3b80f29afcc8de93de4f6b01a7ce9e5", "42eac279", "26d90593e59bef3b"}, 0x38) [ 888.432766][T29390] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 888.439014][T29390] ? bcm_proc_show+0xae0/0xae0 [ 888.443790][T29390] sock_sendmsg+0xd7/0x130 [ 888.448214][T29390] ___sys_sendmsg+0x803/0x920 [ 888.452899][T29390] ? copy_msghdr_from_user+0x440/0x440 [ 888.458360][T29390] ? __fget+0xa3/0x560 [ 888.462445][T29390] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 888.468693][T29390] ? __fget+0x384/0x560 [ 888.472872][T29390] ? ksys_dup3+0x3e0/0x3e0 [ 888.477294][T29390] ? __fget_light+0x1a9/0x230 [ 888.481984][T29390] ? __fdget+0x1b/0x20 [ 888.486056][T29390] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 888.492299][T29390] __sys_sendmsg+0x105/0x1d0 [ 888.492313][T29390] ? __sys_sendmsg_sock+0xd0/0xd0 [ 888.492336][T29390] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 888.492351][T29390] ? entry_SYSENTER_compat+0x68/0x7f [ 888.492367][T29390] __ia32_compat_sys_sendmsg+0x7a/0xb0 [ 888.492383][T29390] do_fast_syscall_32+0x27b/0xdb3 [ 888.492399][T29390] entry_SYSENTER_compat+0x70/0x7f [ 888.492416][T29390] RIP: 0023:0xf7f649c9 [ 888.533124][T29390] Code: d3 83 c4 10 5b 5e 5d c3 ba 80 96 98 00 eb a9 8b 04 24 c3 8b 34 24 c3 8b 3c 24 c3 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 888.552753][T29390] RSP: 002b:00000000f5d600cc EFLAGS: 00000296 ORIG_RAX: 0000000000000172 [ 888.561175][T29390] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000020001fc8 [ 888.569182][T29390] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 888.577182][T29390] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 07:22:03 executing program 4: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) ioctl$PPPIOCGNPMODE(r0, 0xc008744c, &(0x7f0000000040)={0xc0fb, 0x3}) ioctl$int_in(r0, 0x5452, &(0x7f0000000000)=0x2) 07:22:03 executing program 1: socket$alg(0x26, 0x5, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x400, 0x0) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r0, 0x84, 0x74, &(0x7f0000000480)=""/72, &(0x7f00000001c0)=0x48) socket$inet(0x2b, 0x1, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x0, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000300)='/dev/autofs\x00', 0x800, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(r1, 0xc02c564a, 0x0) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) lsetxattr$security_selinux(&(0x7f0000000880)='./file0\x00', &(0x7f0000000400)='security.selinux\x00', &(0x7f0000000900)='system_u:object_r:auditctl_exec_t:s0\x00', 0x25, 0x1) r2 = getpgrp(0x0) setpriority(0x0, r2, 0xffff) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) msgget(0x1, 0x208) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) [ 888.585192][T29390] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 888.593164][T29390] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 07:22:03 executing program 3 (fault-call:2 fault-nth:2): r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f00000001c0), 0x20) sendmsg$can_raw(r0, &(0x7f0000001fc8)={0x0, 0x74, &(0x7f0000000140)={&(0x7f000000a000)=@canfd={{0x5}, 0x0, 0x0, 0x0, 0x0, "0327e1b22b5fcef700580f02000000003f420f000000000000580f02000000003f420f0000000000856b76b5ee00000000000000004e2f9663a918fa1efd9b0b"}, 0x2000a048}}, 0x0) 07:22:03 executing program 0: socket$alg(0x26, 0x5, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) lsetxattr$security_selinux(0x0, 0x0, 0x0, 0xeb, 0x3) setpriority(0x0, 0x0, 0xffff) semget$private(0x0, 0xfffffffffffffffd, 0x15) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:22:03 executing program 4: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-monitor\x00', 0x2000, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000080)={0x0, @initdev}, &(0x7f00000000c0)=0xc) setsockopt$inet_mreqn(r0, 0x0, 0x24, &(0x7f0000000100)={@empty, @multicast1, r1}, 0xc) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x688800, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:22:03 executing program 5: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000040), 0x10) setsockopt$inet_tcp_TLS_TX(r0, 0x6, 0x6, &(0x7f0000000680)=@gcm_256={{}, "26ea4efffaca7e36", "aa2d4550a9d8bbfa74e4f109732083fea3b80f29afcc8de93de4f6b01a7ce9e5", "42eac279", "26d90593e59bef3b"}, 0x38) [ 888.803859][T29989] FAULT_INJECTION: forcing a failure. [ 888.803859][T29989] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 888.817129][T29989] CPU: 0 PID: 29989 Comm: syz-executor.3 Not tainted 5.3.0-rc2+ #87 [ 888.825192][T29989] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 888.835343][T29989] Call Trace: [ 888.838660][T29989] dump_stack+0x172/0x1f0 [ 888.843016][T29989] should_fail.cold+0xa/0x15 [ 888.847636][T29989] ? sock_sendmsg+0xd7/0x130 07:22:03 executing program 5: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000040), 0x10) setsockopt$inet_tcp_TLS_TX(r0, 0x6, 0x7, &(0x7f0000000680)=@gcm_256={{}, "26ea4efffaca7e36", "aa2d4550a9d8bbfa74e4f109732083fea3b80f29afcc8de93de4f6b01a7ce9e5", "42eac279", "26d90593e59bef3b"}, 0x38) [ 888.852253][T29989] ? fault_create_debugfs_attr+0x180/0x180 [ 888.858081][T29989] should_fail_alloc_page+0x50/0x60 [ 888.863292][T29989] __alloc_pages_nodemask+0x1a1/0x8f0 [ 888.868676][T29989] ? refcount_dec_not_one+0x1f0/0x1f0 [ 888.874152][T29989] ? __alloc_pages_slowpath+0x2520/0x2520 [ 888.879886][T29989] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 888.885537][T29989] ? __kasan_check_read+0x11/0x20 [ 888.890667][T29989] ? fault_create_debugfs_attr+0x180/0x180 [ 888.896487][T29989] cache_grow_begin+0x90/0xd20 [ 888.901266][T29989] ? bcm_sendmsg+0x2e95/0x3e10 [ 888.906132][T29989] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 888.912396][T29989] __kmalloc+0x6b2/0x770 [ 888.916654][T29989] ? kmem_cache_alloc_trace+0x346/0x790 [ 888.922213][T29989] ? __local_bh_enable_ip+0x15a/0x270 [ 888.927600][T29989] ? bcm_sendmsg+0x2e95/0x3e10 [ 888.932387][T29989] bcm_sendmsg+0x2e95/0x3e10 [ 888.937000][T29989] ? bcm_proc_show+0xae0/0xae0 [ 888.941790][T29989] ? apparmor_socket_sendmsg+0x2a/0x30 [ 888.947283][T29989] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 07:22:03 executing program 5: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000040), 0x10) setsockopt$inet_tcp_TLS_TX(r0, 0x6, 0x8, &(0x7f0000000680)=@gcm_256={{}, "26ea4efffaca7e36", "aa2d4550a9d8bbfa74e4f109732083fea3b80f29afcc8de93de4f6b01a7ce9e5", "42eac279", "26d90593e59bef3b"}, 0x38) [ 888.953542][T29989] ? bcm_proc_show+0xae0/0xae0 [ 888.958327][T29989] sock_sendmsg+0xd7/0x130 [ 888.962759][T29989] ___sys_sendmsg+0x803/0x920 [ 888.967454][T29989] ? copy_msghdr_from_user+0x440/0x440 [ 888.972930][T29989] ? __fget+0xa3/0x560 [ 888.977016][T29989] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 888.983268][T29989] ? __fget+0x384/0x560 [ 888.987453][T29989] ? ksys_dup3+0x3e0/0x3e0 [ 888.991882][T29989] ? __fget_light+0x1a9/0x230 [ 888.996568][T29989] ? __fdget+0x1b/0x20 [ 889.000658][T29989] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 889.006920][T29989] __sys_sendmsg+0x105/0x1d0 [ 889.011524][T29989] ? __sys_sendmsg_sock+0xd0/0xd0 [ 889.016665][T29989] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 889.022917][T29989] ? entry_SYSENTER_compat+0x68/0x7f [ 889.028208][T29989] __ia32_compat_sys_sendmsg+0x7a/0xb0 [ 889.033681][T29989] do_fast_syscall_32+0x27b/0xdb3 [ 889.038724][T29989] entry_SYSENTER_compat+0x70/0x7f [ 889.043841][T29989] RIP: 0023:0xf7f649c9 [ 889.047916][T29989] Code: d3 83 c4 10 5b 5e 5d c3 ba 80 96 98 00 eb a9 8b 04 24 c3 8b 34 24 c3 8b 3c 24 c3 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 889.067617][T29989] RSP: 002b:00000000f5d600cc EFLAGS: 00000296 ORIG_RAX: 0000000000000172 [ 889.076034][T29989] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000020001fc8 [ 889.084012][T29989] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 889.091991][T29989] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 07:22:03 executing program 5: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000040), 0x10) setsockopt$inet_tcp_TLS_TX(r0, 0x6, 0x9, &(0x7f0000000680)=@gcm_256={{}, "26ea4efffaca7e36", "aa2d4550a9d8bbfa74e4f109732083fea3b80f29afcc8de93de4f6b01a7ce9e5", "42eac279", "26d90593e59bef3b"}, 0x38) [ 889.099970][T29989] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 889.107949][T29989] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 07:22:03 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @remote}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @random="e5ac78d4c7fd"}, 0x10) write(r2, &(0x7f0000000080)="2700000014000f3f00000000120f0a00110001001f750800560099ed4f05000000004000000000", 0x138) 07:22:03 executing program 3 (fault-call:2 fault-nth:3): r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f00000001c0), 0x20) sendmsg$can_raw(r0, &(0x7f0000001fc8)={0x0, 0x74, &(0x7f0000000140)={&(0x7f000000a000)=@canfd={{0x5}, 0x0, 0x0, 0x0, 0x0, "0327e1b22b5fcef700580f02000000003f420f000000000000580f02000000003f420f0000000000856b76b5ee00000000000000004e2f9663a918fa1efd9b0b"}, 0x2000a048}}, 0x0) 07:22:03 executing program 4: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) socket$inet_dccp(0x2, 0x6, 0x0) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:22:03 executing program 1: socket$alg(0x26, 0x5, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x400, 0x0) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r0, 0x84, 0x74, &(0x7f0000000480)=""/72, &(0x7f00000001c0)=0x48) socket$inet(0x2b, 0x1, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x0, 0x0) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000300)='/dev/autofs\x00', 0x800, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(r2, 0xc02c564a, 0x0) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) lsetxattr$security_selinux(&(0x7f0000000880)='./file0\x00', &(0x7f0000000400)='security.selinux\x00', &(0x7f0000000900)='system_u:object_r:auditctl_exec_t:s0\x00', 0x25, 0x1) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000000)) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000040)) fcntl$getownex(r3, 0x10, &(0x7f0000000080)) getpid() fcntl$getown(r3, 0x9) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000000c0), &(0x7f0000000100)=0xc) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000280)=0x0) r5 = getpgrp(r4) setpriority(0x0, r5, 0xffff) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) msgget(0x1, 0x208) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:22:03 executing program 5: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000040), 0x10) setsockopt$inet_tcp_TLS_TX(r0, 0x6, 0xa, &(0x7f0000000680)=@gcm_256={{}, "26ea4efffaca7e36", "aa2d4550a9d8bbfa74e4f109732083fea3b80f29afcc8de93de4f6b01a7ce9e5", "42eac279", "26d90593e59bef3b"}, 0x38) [ 889.280249][T30610] FAULT_INJECTION: forcing a failure. [ 889.280249][T30610] name failslab, interval 1, probability 0, space 0, times 0 [ 889.331933][T30610] CPU: 0 PID: 30610 Comm: syz-executor.3 Not tainted 5.3.0-rc2+ #87 [ 889.339952][T30610] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 889.350044][T30610] Call Trace: [ 889.353353][T30610] dump_stack+0x172/0x1f0 [ 889.357801][T30610] should_fail.cold+0xa/0x15 [ 889.362416][T30610] ? fault_create_debugfs_attr+0x180/0x180 [ 889.368235][T30610] ? page_to_nid.part.0+0x20/0x20 [ 889.373270][T30610] ? ___might_sleep+0x163/0x280 07:22:03 executing program 0: socket$alg(0x26, 0x5, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) lsetxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) setpriority(0x0, 0x0, 0xffff) semget$private(0x0, 0xfffffffffffffffd, 0x15) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) [ 889.378129][T30610] __should_failslab+0x121/0x190 [ 889.383083][T30610] should_failslab+0x9/0x14 [ 889.387682][T30610] __kmalloc+0x2e0/0x770 [ 889.391926][T30610] ? kmem_cache_alloc_trace+0x346/0x790 [ 889.397482][T30610] ? __local_bh_enable_ip+0x15a/0x270 [ 889.402865][T30610] ? bcm_sendmsg+0x2f33/0x3e10 [ 889.407648][T30610] bcm_sendmsg+0x2f33/0x3e10 [ 889.412252][T30610] ? bcm_proc_show+0xae0/0xae0 [ 889.417028][T30610] ? apparmor_socket_sendmsg+0x2a/0x30 [ 889.422757][T30610] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 889.429114][T30610] ? bcm_proc_show+0xae0/0xae0 [ 889.433937][T30610] sock_sendmsg+0xd7/0x130 [ 889.438380][T30610] ___sys_sendmsg+0x803/0x920 [ 889.443073][T30610] ? copy_msghdr_from_user+0x440/0x440 [ 889.448542][T30610] ? __fget+0xa3/0x560 [ 889.452633][T30610] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 889.458913][T30610] ? __fget+0x384/0x560 [ 889.463083][T30610] ? ksys_dup3+0x3e0/0x3e0 [ 889.467524][T30610] ? __fget_light+0x1a9/0x230 [ 889.472210][T30610] ? __fdget+0x1b/0x20 [ 889.476284][T30610] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 889.482542][T30610] __sys_sendmsg+0x105/0x1d0 [ 889.487142][T30610] ? __sys_sendmsg_sock+0xd0/0xd0 [ 889.492191][T30610] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 889.498440][T30610] ? entry_SYSENTER_compat+0x68/0x7f [ 889.503738][T30610] __ia32_compat_sys_sendmsg+0x7a/0xb0 [ 889.509213][T30610] do_fast_syscall_32+0x27b/0xdb3 [ 889.514253][T30610] entry_SYSENTER_compat+0x70/0x7f [ 889.519454][T30610] RIP: 0023:0xf7f649c9 07:22:03 executing program 4: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000040)={{{@in=@loopback, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@mcast1}}, &(0x7f0000000140)=0xe8) ioctl$TUNSETOWNER(r0, 0x400454cc, r1) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) [ 889.523541][T30610] Code: d3 83 c4 10 5b 5e 5d c3 ba 80 96 98 00 eb a9 8b 04 24 c3 8b 34 24 c3 8b 3c 24 c3 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 889.543166][T30610] RSP: 002b:00000000f5d600cc EFLAGS: 00000296 ORIG_RAX: 0000000000000172 [ 889.551586][T30610] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000020001fc8 [ 889.559571][T30610] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 889.567558][T30610] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 07:22:04 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @remote}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @random="e5ac78d4c7fd"}, 0x10) write(r2, &(0x7f0000000080)="2700000014000f3f00000000120f0a00110001001f750800560099ed4f05000000006000000000", 0x138) [ 889.575535][T30610] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 889.583605][T30610] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 07:22:04 executing program 1: socket$alg(0x26, 0x5, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x400, 0x0) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r0, 0x84, 0x74, &(0x7f0000000480)=""/72, &(0x7f00000001c0)=0x48) socket$inet(0x2b, 0x1, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x0, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000300)='/dev/autofs\x00', 0x800, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(r1, 0xc02c564a, 0x0) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) lsetxattr$security_selinux(&(0x7f0000000880)='./file0\x00', &(0x7f0000000400)='security.selinux\x00', &(0x7f0000000900)='system_u:object_r:auditctl_exec_t:s0\x00', 0x25, 0x1) r2 = getpgrp(0x0) setpriority(0x0, r2, 0xffff) r3 = open(&(0x7f0000000180)='./file0\x00', 0xffffffffffffffff, 0x10) msgget(0x1, 0x208) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(r3, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000940)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="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"/261], 0x2c}}, 0x4000000) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:22:04 executing program 0: socket$alg(0x26, 0x5, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) lsetxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) setpriority(0x0, 0x0, 0xffff) semget$private(0x0, 0xfffffffffffffffd, 0x15) r0 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$KDSETKEYCODE(r0, 0x4b4d, &(0x7f0000000000)={0xfff, 0x100000000}) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:22:04 executing program 5: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000040), 0x10) setsockopt$inet_tcp_TLS_TX(r0, 0x6, 0xc, &(0x7f0000000680)=@gcm_256={{}, "26ea4efffaca7e36", "aa2d4550a9d8bbfa74e4f109732083fea3b80f29afcc8de93de4f6b01a7ce9e5", "42eac279", "26d90593e59bef3b"}, 0x38) 07:22:04 executing program 3 (fault-call:2 fault-nth:4): r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f00000001c0), 0x20) sendmsg$can_raw(r0, &(0x7f0000001fc8)={0x0, 0x74, &(0x7f0000000140)={&(0x7f000000a000)=@canfd={{0x5}, 0x0, 0x0, 0x0, 0x0, "0327e1b22b5fcef700580f02000000003f420f000000000000580f02000000003f420f0000000000856b76b5ee00000000000000004e2f9663a918fa1efd9b0b"}, 0x2000a048}}, 0x0) 07:22:04 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @remote}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @random="e5ac78d4c7fd"}, 0x10) write(r2, &(0x7f0000000080)="2700000014000f3f00000000120f0a00110001001f750800560099ed4f050000000ec000000000", 0x138) 07:22:04 executing program 4: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x7fffffff, 0x0) setrlimit(0xc, &(0x7f0000000140)={0x7, 0x40}) ioctl$VIDIOC_ENUMINPUT(r0, 0xc04c561a, &(0x7f00000000c0)={0x8001, "2f4d184b10fc11a35e8bdedb1ea6145c90c0bd16af1dbbfbc905b8626a945e71", 0x0, 0x48, 0x5, 0x10083, 0x4, 0x8}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r1 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000000)={0x0, 0x9, 0xffffffffffffca89}) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x80000, 0x0) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) [ 889.949743][T31610] FAULT_INJECTION: forcing a failure. [ 889.949743][T31610] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 889.962979][T31610] CPU: 0 PID: 31610 Comm: syz-executor.3 Not tainted 5.3.0-rc2+ #87 [ 889.970966][T31610] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 889.981120][T31610] Call Trace: [ 889.984436][T31610] dump_stack+0x172/0x1f0 [ 889.988810][T31610] should_fail.cold+0xa/0x15 [ 889.993411][T31610] ? ___sys_sendmsg+0x803/0x920 [ 889.998275][T31610] ? fault_create_debugfs_attr+0x180/0x180 [ 890.004096][T31610] ? __isolate_free_page+0x4c0/0x4c0 [ 890.009393][T31610] should_fail_alloc_page+0x50/0x60 [ 890.014593][T31610] __alloc_pages_nodemask+0x1a1/0x8f0 [ 890.014611][T31610] ? cache_grow_end+0xa4/0x190 [ 890.014623][T31610] ? __alloc_pages_slowpath+0x2520/0x2520 [ 890.014637][T31610] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 890.014648][T31610] ? __kasan_check_read+0x11/0x20 [ 890.014667][T31610] ? fault_create_debugfs_attr+0x180/0x180 [ 890.014680][T31610] cache_grow_begin+0x90/0xd20 [ 890.014693][T31610] ? bcm_sendmsg+0x2f33/0x3e10 [ 890.014709][T31610] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 890.014721][T31610] __kmalloc+0x6b2/0x770 [ 890.014732][T31610] ? kmem_cache_alloc_trace+0x346/0x790 [ 890.014754][T31610] ? __local_bh_enable_ip+0x15a/0x270 [ 890.078044][T31610] ? bcm_sendmsg+0x2f33/0x3e10 [ 890.082820][T31610] bcm_sendmsg+0x2f33/0x3e10 [ 890.087425][T31610] ? bcm_proc_show+0xae0/0xae0 [ 890.092204][T31610] ? apparmor_socket_sendmsg+0x2a/0x30 [ 890.097672][T31610] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 890.103935][T31610] ? bcm_proc_show+0xae0/0xae0 [ 890.108715][T31610] sock_sendmsg+0xd7/0x130 [ 890.113151][T31610] ___sys_sendmsg+0x803/0x920 [ 890.117849][T31610] ? copy_msghdr_from_user+0x440/0x440 [ 890.123632][T31610] ? __fget+0xa3/0x560 [ 890.127725][T31610] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 890.133993][T31610] ? __fget+0x384/0x560 [ 890.138172][T31610] ? ksys_dup3+0x3e0/0x3e0 [ 890.142604][T31610] ? __fget_light+0x1a9/0x230 07:22:04 executing program 5: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000040), 0x10) setsockopt$inet_tcp_TLS_TX(r0, 0x6, 0xd, &(0x7f0000000680)=@gcm_256={{}, "26ea4efffaca7e36", "aa2d4550a9d8bbfa74e4f109732083fea3b80f29afcc8de93de4f6b01a7ce9e5", "42eac279", "26d90593e59bef3b"}, 0x38) [ 890.147303][T31610] ? __fdget+0x1b/0x20 [ 890.151396][T31610] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 890.159261][T31610] __sys_sendmsg+0x105/0x1d0 [ 890.163872][T31610] ? __sys_sendmsg_sock+0xd0/0xd0 [ 890.168947][T31610] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 890.175287][T31610] ? entry_SYSENTER_compat+0x68/0x7f [ 890.175302][T31610] __ia32_compat_sys_sendmsg+0x7a/0xb0 [ 890.175320][T31610] do_fast_syscall_32+0x27b/0xdb3 [ 890.175333][T31610] entry_SYSENTER_compat+0x70/0x7f [ 890.175343][T31610] RIP: 0023:0xf7f649c9 [ 890.175358][T31610] Code: d3 83 c4 10 5b 5e 5d c3 ba 80 96 98 00 eb a9 8b 04 24 c3 8b 34 24 c3 8b 3c 24 c3 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 890.175366][T31610] RSP: 002b:00000000f5d600cc EFLAGS: 00000296 ORIG_RAX: 0000000000000172 [ 890.175378][T31610] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000020001fc8 [ 890.175386][T31610] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 07:22:04 executing program 0: socket$alg(0x26, 0x5, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) lsetxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) setpriority(0x0, 0x0, 0xffff) semget$private(0x0, 0xfffffffffffffffd, 0x15) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000040)='wla1\x00\x1b([\x1d\xb9\xb2\xf2\xf0\xf4\x90\x16\xfc;\xac\x95\x84O3w\xab\xebs\xe8\xcd\xf1\x96M ?\xd8\xad\x7f\xee\x8c\xf0\xd6&\xd9\x18$\xa3\xf6i\xb5N9\xb8\xf1\xae\x80l\xb0gB\x908\x03\xab\xb8\xe2OY\xad\xc6{\xf5\xe3R\x04\x00\xdf7', &(0x7f00000000c0)='security.capability\x00'], &(0x7f00000001c0)) [ 890.175392][T31610] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 890.175399][T31610] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 890.175406][T31610] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 07:22:04 executing program 4: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) ioctl$KVM_SET_DEBUGREGS(r0, 0x4080aea2, &(0x7f0000000000)={[0x5000, 0x16006, 0x3000, 0x13000], 0x3, 0x20, 0xda}) 07:22:04 executing program 5: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000040), 0x10) setsockopt$inet_tcp_TLS_TX(r0, 0x6, 0xe, &(0x7f0000000680)=@gcm_256={{}, "26ea4efffaca7e36", "aa2d4550a9d8bbfa74e4f109732083fea3b80f29afcc8de93de4f6b01a7ce9e5", "42eac279", "26d90593e59bef3b"}, 0x38) 07:22:04 executing program 1: socket$alg(0x26, 0x5, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x400, 0x0) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r0, 0x84, 0x74, &(0x7f0000000480)=""/72, &(0x7f00000001c0)=0x48) socket$inet(0x2b, 0x1, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x0, 0x0) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000300)='/dev/autofs\x00', 0x800, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(r2, 0xc02c564a, 0x0) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) ioctl$VIDIOC_S_PARM(r1, 0xc0cc5616, &(0x7f0000000000)={0x2, @capture={0x1000, 0x1, {0x7ff, 0xca06}, 0x8, 0x7}}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) lsetxattr$security_selinux(&(0x7f0000000880)='./file0\x00', &(0x7f0000000400)='security.selinux\x00', &(0x7f0000000900)='system_u:object_r:auditctl_exec_t:s0\x00', 0x25, 0x1) r3 = getpgrp(0x0) setpriority(0x0, r3, 0xffff) ioctl$KVM_GET_NR_MMU_PAGES(r0, 0xae45, 0x6) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) msgget(0x1, 0x208) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) bind$isdn(r0, &(0x7f0000000100)={0x22, 0x7fff, 0x401, 0x8, 0x7}, 0x6) 07:22:04 executing program 3 (fault-call:2 fault-nth:5): r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f00000001c0), 0x20) sendmsg$can_raw(r0, &(0x7f0000001fc8)={0x0, 0x74, &(0x7f0000000140)={&(0x7f000000a000)=@canfd={{0x5}, 0x0, 0x0, 0x0, 0x0, "0327e1b22b5fcef700580f02000000003f420f000000000000580f02000000003f420f0000000000856b76b5ee00000000000000004e2f9663a918fa1efd9b0b"}, 0x2000a048}}, 0x0) 07:22:04 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) fcntl$getownex(r0, 0x10, &(0x7f00000001c0)) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) lsetxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) setpriority(0x0, 0x0, 0xffff) r1 = semget$private(0x0, 0xfffffffffffffffd, 0x15) fstat(r0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000080)=0x0, &(0x7f00000000c0), &(0x7f0000000100)) r4 = geteuid() r5 = getgid() semctl$IPC_SET(r1, 0x0, 0x1, &(0x7f0000000140)={{0x476248ab, r2, r3, r4, r5, 0x80, 0x7}, 0x7fff, 0x7f, 0x6}) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:22:04 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @remote}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @random="e5ac78d4c7fd"}, 0x10) write(r2, &(0x7f0000000080)="2700000014000f3f00000000120f0a00110001001f750800560099ed4f050000000be900000000", 0x138) 07:22:04 executing program 5: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000040), 0x10) setsockopt$inet_tcp_TLS_TX(r0, 0x6, 0x10, &(0x7f0000000680)=@gcm_256={{}, "26ea4efffaca7e36", "aa2d4550a9d8bbfa74e4f109732083fea3b80f29afcc8de93de4f6b01a7ce9e5", "42eac279", "26d90593e59bef3b"}, 0x38) [ 890.595813][T32362] FAULT_INJECTION: forcing a failure. [ 890.595813][T32362] name failslab, interval 1, probability 0, space 0, times 0 07:22:05 executing program 4: r0 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x0, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) ioctl$DRM_IOCTL_SET_VERSION(r0, 0xc0106407, &(0x7f0000000040)={0x4704, 0xe5d, 0x8001, 0x2}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0xa00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)) [ 890.688071][T32362] CPU: 0 PID: 32362 Comm: syz-executor.3 Not tainted 5.3.0-rc2+ #87 [ 890.696084][T32362] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 890.706148][T32362] Call Trace: [ 890.709458][T32362] dump_stack+0x172/0x1f0 [ 890.713807][T32362] should_fail.cold+0xa/0x15 [ 890.718449][T32362] ? fault_create_debugfs_attr+0x180/0x180 [ 890.724276][T32362] ? page_to_nid.part.0+0x20/0x20 [ 890.729309][T32362] ? ___might_sleep+0x163/0x280 [ 890.734172][T32362] __should_failslab+0x121/0x190 [ 890.739146][T32362] should_failslab+0x9/0x14 [ 890.743754][T32362] kmem_cache_alloc+0x2aa/0x710 [ 890.748680][T32362] ? __debug_object_init+0x4e6/0xee0 [ 890.753984][T32362] ? lock_downgrade+0x920/0x920 [ 890.758861][T32362] can_rx_register+0x50a/0x6f0 [ 890.763661][T32362] ? bcm_rx_cmp_to_index+0x380/0x380 [ 890.768970][T32362] ? can_send+0x7f0/0x7f0 [ 890.773322][T32362] ? memset+0x32/0x40 [ 890.777328][T32362] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 890.783583][T32362] ? __hrtimer_init+0xe1/0x250 [ 890.788462][T32362] bcm_sendmsg+0xf5f/0x3e10 [ 890.792975][T32362] ? bcm_proc_show+0xae0/0xae0 [ 890.797747][T32362] ? apparmor_socket_sendmsg+0x2a/0x30 [ 890.803249][T32362] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 890.809502][T32362] ? bcm_proc_show+0xae0/0xae0 [ 890.814286][T32362] sock_sendmsg+0xd7/0x130 [ 890.818734][T32362] ___sys_sendmsg+0x803/0x920 [ 890.823425][T32362] ? copy_msghdr_from_user+0x440/0x440 [ 890.828945][T32362] ? __fget+0xa3/0x560 07:22:05 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x20001, 0x0) sendto$unix(r0, &(0x7f0000000040)="823bbe6d6e5d942408088c9b33d4335e8c3cabccf0274f7e681d2e573280281f338424d66d26220d3d8a126c4af69e063087b594af8576ce53b5d5fedd22fea2558b0218154769f3ca789f0925f1ab42d4087bf7d6eb33fd4d9101f4e251f9046f74320c78b10e316dd97b51bb5d8fa6acc935ed62a307a1387274eec4f2cc627a5ab9d0015ef3c1", 0x88, 0x8000, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000340), &(0x7f0000000300)) [ 890.833045][T32362] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 890.839301][T32362] ? __fget+0x384/0x560 [ 890.843471][T32362] ? ksys_dup3+0x3e0/0x3e0 [ 890.847900][T32362] ? __fget_light+0x1a9/0x230 [ 890.852592][T32362] ? __fdget+0x1b/0x20 [ 890.856675][T32362] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 890.862929][T32362] __sys_sendmsg+0x105/0x1d0 [ 890.867534][T32362] ? __sys_sendmsg_sock+0xd0/0xd0 [ 890.872589][T32362] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 890.878843][T32362] ? entry_SYSENTER_compat+0x68/0x7f [ 890.884130][T32362] __ia32_compat_sys_sendmsg+0x7a/0xb0 [ 890.884148][T32362] do_fast_syscall_32+0x27b/0xdb3 [ 890.884163][T32362] entry_SYSENTER_compat+0x70/0x7f [ 890.884173][T32362] RIP: 0023:0xf7f649c9 [ 890.884188][T32362] Code: d3 83 c4 10 5b 5e 5d c3 ba 80 96 98 00 eb a9 8b 04 24 c3 8b 34 24 c3 8b 3c 24 c3 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 890.884194][T32362] RSP: 002b:00000000f5d600cc EFLAGS: 00000296 ORIG_RAX: 0000000000000172 07:22:05 executing program 5: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000040), 0x10) setsockopt$inet_tcp_TLS_TX(r0, 0x6, 0x11, &(0x7f0000000680)=@gcm_256={{}, "26ea4efffaca7e36", "aa2d4550a9d8bbfa74e4f109732083fea3b80f29afcc8de93de4f6b01a7ce9e5", "42eac279", "26d90593e59bef3b"}, 0x38) 07:22:05 executing program 1: socket$alg(0x26, 0x5, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x400, 0x0) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r0, 0x84, 0x74, &(0x7f0000000480)=""/72, &(0x7f00000001c0)=0x48) ioctl$SNDRV_TIMER_IOCTL_INFO(r0, 0x80e05411, &(0x7f0000000000)=""/119) socket$inet(0x2b, 0x1, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x0, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000300)='/dev/autofs\x00', 0x800, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(r1, 0xc02c564a, 0x0) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) lsetxattr$security_selinux(&(0x7f0000000880)='./file0\x00', &(0x7f0000000400)='security.selinux\x00', &(0x7f0000000900)='system_u:object_r:auditctl_exec_t:s0\x00', 0x25, 0x1) r2 = getpgrp(0x0) setpriority(0x0, r2, 0xffff) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) msgget(0x1, 0x208) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:22:05 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @remote}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @random="e5ac78d4c7fd"}, 0x10) write(r2, &(0x7f0000000080)="2700000014000f3f00000000120f0a00110001001f750800560099ed4f0500000000f000000000", 0x138) [ 890.884206][T32362] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000020001fc8 [ 890.884213][T32362] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 890.884220][T32362] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 890.884226][T32362] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 890.884234][T32362] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 07:22:05 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/qat_adf_ctl\x00', 0x141000, 0x0) setsockopt$inet6_IPV6_ADDRFORM(r1, 0x29, 0x1, &(0x7f0000000400), 0x4) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) lsetxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) r2 = syz_open_dev$midi(&(0x7f0000000200)='/dev/midi#\x00', 0x3, 0x408080) connect$bt_rfcomm(r2, &(0x7f0000000240)={0x1f, {0x5, 0x7, 0x4, 0x8000, 0x7ff, 0x197f1cf3}, 0x5}, 0xa) setpriority(0x0, 0x0, 0xffff) semget$private(0x0, 0x5, 0x15) ftruncate(r0, 0x1ff) r3 = dup(r0) listen(r3, 0x7ff) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r3, 0x6, 0x14, &(0x7f0000000140)=0x2, 0x4) ioctl$VIDIOC_G_FMT(r3, 0xc0cc5604, &(0x7f0000000000)={0x8, @pix_mp={0x20f3, 0x80000001, 0x0, 0x8, 0xa, [{0x7, 0xc826}, {0x1b, 0x59}, {0x1, 0x1000}, {0x100, 0x7}, {0x5, 0xfff}, {0x5, 0x6}, {0x0, 0x6}, {0x0, 0x4}], 0x4dc2, 0x5, 0x7, 0x0, 0xf7ec74b919ef1be5}}) r4 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) connect$inet(r4, &(0x7f00000001c0)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x21}}, 0x10) stat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) utimensat(r4, &(0x7f0000000340)='./file0\x00', &(0x7f0000000380)={{0x0, 0x7530}}, 0x100) setsockopt$inet_tcp_TLS_RX(r4, 0x6, 0x2, &(0x7f0000000100)=@ccm_128={{0x303}, "d95a7c470d4ccabe", "5ffa9012fb7d3b82a08ee0ad26695bcf", "44ef83b0", "eb6c9faf87c7605e"}, 0x28) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:22:05 executing program 4: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x349f9ee5c770419b) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:22:05 executing program 5: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000040), 0x10) setsockopt$inet_tcp_TLS_TX(r0, 0x6, 0x12, &(0x7f0000000680)=@gcm_256={{}, "26ea4efffaca7e36", "aa2d4550a9d8bbfa74e4f109732083fea3b80f29afcc8de93de4f6b01a7ce9e5", "42eac279", "26d90593e59bef3b"}, 0x38) 07:22:05 executing program 3 (fault-call:2 fault-nth:6): r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f00000001c0), 0x20) sendmsg$can_raw(r0, &(0x7f0000001fc8)={0x0, 0x74, &(0x7f0000000140)={&(0x7f000000a000)=@canfd={{0x5}, 0x0, 0x0, 0x0, 0x0, "0327e1b22b5fcef700580f02000000003f420f000000000000580f02000000003f420f0000000000856b76b5ee00000000000000004e2f9663a918fa1efd9b0b"}, 0x2000a048}}, 0x0) 07:22:05 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @remote}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @random="e5ac78d4c7fd"}, 0x10) write(r2, &(0x7f0000000080)="2700000014000f3f00000000120f0a00110001001f750800560099ed4f05000000004003000000", 0x138) 07:22:05 executing program 5: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000040), 0x10) setsockopt$inet_tcp_TLS_TX(r0, 0x6, 0x13, &(0x7f0000000680)=@gcm_256={{}, "26ea4efffaca7e36", "aa2d4550a9d8bbfa74e4f109732083fea3b80f29afcc8de93de4f6b01a7ce9e5", "42eac279", "26d90593e59bef3b"}, 0x38) 07:22:05 executing program 4: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x7647b6e5cfd23a1) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:22:05 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f00000001c0), 0x20) sendmsg$can_raw(r0, &(0x7f0000001fc8)={0x0, 0x74, &(0x7f0000000140)={&(0x7f000000a000)=@canfd={{0x5}, 0x0, 0x0, 0x0, 0x0, "0327e1b22b5fcef700580f02000000003f420f000000000000580f02000000003f420f0000000000856b76b5ee00000000000000004e2f9663a918fa1efd9b0b"}, 0x2000a048}}, 0x0) 07:22:05 executing program 0: socket$alg(0x26, 0x5, 0x0) creat(&(0x7f0000000200)='./file0\x00', 0xb) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$EVIOCRMFF(r0, 0x40044581, &(0x7f00000001c0)=0x4df06706) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) lsetxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) setpriority(0x0, 0x0, 0x400ffff) semget$private(0x0, 0xfffffffffffffffd, 0x15) r1 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername$tipc(r1, &(0x7f0000000000), &(0x7f0000000040)=0x10) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000100)=[&(0x7f0000000080)='wlan1\x00\x11 <\x8d\xc1\x11\xda\x80\x9a\xcf\x89\x19\xaad\x92\xde#\xe1\x19W\x8a\xb2sK%`\xd6\'\xdc\xe71\"\x13\xd31\xb7\xd7\xd8\xa3\xe0kE\xd3\xcb?\x8f\xf0E\x1f\x7f\xf2\xd3{6\xa7\xf5\x84+\xbb\x9f\xefD\xed\xb4*\x01\xdf\xf7\ajH\x1b^\x11\xf3\xcf\x91\xbfB\xbf\xc8\x00\xf8\x10\x9b\x9b\b', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:22:05 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @remote}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @random="e5ac78d4c7fd"}, 0x10) write(r2, &(0x7f0000000080)="2700000014000f3f00000000120f0a00110001001f750800560099ed4f05000000000340000000", 0x138) 07:22:06 executing program 1: socket$alg(0x26, 0x5, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x400, 0x0) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r0, 0x84, 0x74, &(0x7f0000000480)=""/72, &(0x7f00000001c0)=0x48) socket$inet(0x2b, 0x1, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x0, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000300)='/dev/autofs\x00', 0x800, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(r1, 0xc02c564a, 0x0) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) truncate(&(0x7f0000000000)='./file0\x00', 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffff000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) lsetxattr$security_selinux(&(0x7f0000000880)='./file0\x00', &(0x7f0000000400)='security.selinux\x00', &(0x7f0000000900)='system_u:object_r:auditctl_exec_t:s0\x00', 0x25, 0x1) r2 = getpgrp(0x0) setpriority(0x0, r2, 0xffff) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) msgget(0x1, 0x208) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) lsetxattr$security_selinux(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='security.selinux\x00', &(0x7f00000000c0)='system_u:object_r:tzdata_exec_t:s0\x00', 0x23, 0x2) 07:22:06 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f00000001c0), 0x20) sendmsg$can_raw(r0, &(0x7f0000001fc8)={0x0, 0x74, &(0x7f0000000140)={&(0x7f000000a000)=@canfd={{0x2}, 0x0, 0x0, 0x0, 0x0, "0327e1b22b5fcef700580f02000000003f420f000000000000580f02000000003f420f0000000000856b76b5ee00000000000000004e2f9663a918fa1efd9b0b"}, 0x2000a048}}, 0x0) 07:22:06 executing program 5: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000040), 0x10) setsockopt$inet_tcp_TLS_TX(r0, 0x6, 0x14, &(0x7f0000000680)=@gcm_256={{}, "26ea4efffaca7e36", "aa2d4550a9d8bbfa74e4f109732083fea3b80f29afcc8de93de4f6b01a7ce9e5", "42eac279", "26d90593e59bef3b"}, 0x38) 07:22:06 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) lsetxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) setpriority(0x0, 0x0, 0xffff) semget$private(0x0, 0xfffffffffffffffd, 0x15) alarm(0x8) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) recvmmsg(r0, &(0x7f0000005740)=[{{&(0x7f0000000000)=@ethernet={0x0, @link_local}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000080)=""/222, 0xde}, {&(0x7f00000001c0)=""/143, 0x8f}, {&(0x7f0000000280)=""/130, 0x82}, {&(0x7f0000000340)=""/197, 0xc5}, {&(0x7f0000000480)=""/36, 0x24}, {&(0x7f00000007c0)=""/205, 0xcd}, {&(0x7f00000004c0)=""/10, 0xa}], 0x7}, 0x9}, {{&(0x7f00000006c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, 0x80, &(0x7f00000005c0)=[{&(0x7f00000008c0)=""/207, 0xcf}, {&(0x7f00000009c0)=""/95, 0x5f}, {&(0x7f0000000540)=""/44, 0x2c}, {&(0x7f0000000a40)=""/229, 0xe5}], 0x4, &(0x7f0000000b40)=""/116, 0x74}, 0x64394879}, {{0x0, 0x0, &(0x7f0000001d00)=[{&(0x7f0000000bc0)=""/6, 0x6}, {&(0x7f0000000c00)=""/211, 0xd3}, {&(0x7f0000000d00)=""/4096, 0x1000}], 0x3, &(0x7f0000001d40)=""/93, 0x5d}, 0x1f}, {{&(0x7f0000001dc0)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, 0x80, &(0x7f0000001fc0)=[{&(0x7f0000001e40)=""/81, 0x51}, {&(0x7f0000001ec0)=""/254, 0xfe}], 0x2, &(0x7f0000002000)=""/209, 0xd1}, 0x5}, {{&(0x7f0000002100)=@hci, 0x80, &(0x7f0000002240)=[{&(0x7f0000002180)=""/148, 0x94}], 0x1, &(0x7f0000002280)=""/124, 0x7c}, 0x1}, {{&(0x7f0000002300)=@alg, 0x80, &(0x7f0000002680)=[{&(0x7f0000002380)=""/69, 0x45}, {&(0x7f0000002400)=""/91, 0x5b}, {&(0x7f0000002480)=""/244, 0xf4}, {&(0x7f0000002580)=""/97, 0x61}, {&(0x7f0000002600)=""/78, 0x4e}], 0x5, &(0x7f00000026c0)=""/174, 0xae}, 0x40}, {{&(0x7f0000002780)=@in, 0x80, &(0x7f0000002900)=[{&(0x7f0000002800)=""/186, 0xba}, {&(0x7f00000028c0)=""/10, 0xa}], 0x2, &(0x7f0000002940)=""/238, 0xee}, 0xfffffffffffffff8}, {{&(0x7f0000002a40)=@vsock, 0x80, &(0x7f00000040c0)=[{&(0x7f0000002ac0)=""/4096, 0x1000}, {&(0x7f0000003ac0)=""/152, 0x98}, {&(0x7f0000003b80)=""/239, 0xef}, {&(0x7f0000003c80)=""/151, 0x97}, {&(0x7f0000003d40)=""/237, 0xed}, {&(0x7f0000003e40)=""/161, 0xa1}, {&(0x7f0000003f00)=""/252, 0xfc}, {&(0x7f0000004000)=""/135, 0x87}], 0x8, &(0x7f0000004100)=""/58, 0x3a}, 0x5}, {{&(0x7f0000004140)=@nl, 0x80, &(0x7f0000004200)=[{&(0x7f00000041c0)=""/46, 0x2e}], 0x1}, 0x7fff}, {{&(0x7f0000004240)=@ax25={{0x3, @null}, [@remote, @default, @remote, @netrom, @netrom, @rose, @bcast, @default]}, 0x80, &(0x7f0000005680)=[{&(0x7f00000042c0)=""/86, 0x56}, {&(0x7f0000004340)=""/36, 0x24}, {&(0x7f0000004380)=""/255, 0xff}, {&(0x7f0000004480)=""/234, 0xea}, {&(0x7f0000004580)=""/237, 0xed}, {&(0x7f0000004680)=""/4096, 0x1000}], 0x6, &(0x7f00000056c0)=""/70, 0x46}, 0xa7f4}], 0xa, 0x20, &(0x7f0000005880)={0x77359400}) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:22:06 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @remote}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @random="e5ac78d4c7fd"}, 0x10) write(r2, &(0x7f0000000080)="2700000014000f3f00000000120f0a00110001001f750800560099ed4f05000000fffff0000000", 0x138) 07:22:06 executing program 4: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) open(&(0x7f0000000100)='./file0\x00', 0x40, 0x0) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:22:06 executing program 4: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680), &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:22:06 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f00000001c0), 0x20) sendmsg$can_raw(r0, &(0x7f0000001fc8)={0x0, 0x74, &(0x7f0000000140)={&(0x7f000000a000)=@canfd={{0x3}, 0x0, 0x0, 0x0, 0x0, "0327e1b22b5fcef700580f02000000003f420f000000000000580f02000000003f420f0000000000856b76b5ee00000000000000004e2f9663a918fa1efd9b0b"}, 0x2000a048}}, 0x0) 07:22:06 executing program 5: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000040), 0x10) setsockopt$inet_tcp_TLS_TX(r0, 0x6, 0x15, &(0x7f0000000680)=@gcm_256={{}, "26ea4efffaca7e36", "aa2d4550a9d8bbfa74e4f109732083fea3b80f29afcc8de93de4f6b01a7ce9e5", "42eac279", "26d90593e59bef3b"}, 0x38) 07:22:06 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @remote}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @random="e5ac78d4c7fd"}, 0x10) write(r2, &(0x7f0000000080)="2700000014000f3f00000000120f0a00110001001f750800560099ed4f05000000000000010000", 0x138) 07:22:06 executing program 0: socket$alg(0x26, 0x5, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) lsetxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) setpriority(0x0, 0x0, 0xffff) r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x2, 0x0) write$UHID_CREATE2(r0, &(0x7f00000001c0)={0xb, 'syz1\x00', 'syz0\x00', 'syz1\x00', 0xea, 0x4ff, 0x0, 0x3f, 0x2, 0x4, "60757ddb95c27185ced67e1a7dca18a7402db9166c65a84e3a6b512b29fe2e8cd838de0c748a71f6d49c0b9bb261e9dba4f8efe5dcfb7b7005c393c55c2a3070a8a765a449510cd94aeadd946d468bc7c6ac017e642f1ac7427d0e997be018947ce10ccfb6f3372b8d898b33fa41177603f87bdc527351df3b735c02ccf0844327431fc2ce99f2b1b2fc9f286cc7ef2424a9f8b863f5716cb08660f931bf5a7f7ec08c9e7326d2f882caf6aa6a7f0d98674b8470240fcac63d30ea708ab46d61f4d7534237b0ea5d1b89c31e3e190299999fb5df94320ff2178d6485663ad961ec45ad14c35468f86fc2"}, 0x202) semget$private(0x0, 0xfffffffffffffffd, 0x15) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) fcntl$setlease(r0, 0x400, 0x0) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:22:06 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f00000001c0), 0x20) sendmsg$can_raw(r0, &(0x7f0000001fc8)={0x0, 0x74, &(0x7f0000000140)={&(0x7f000000a000)=@canfd={{0x4}, 0x0, 0x0, 0x0, 0x0, "0327e1b22b5fcef700580f02000000003f420f000000000000580f02000000003f420f0000000000856b76b5ee00000000000000004e2f9663a918fa1efd9b0b"}, 0x2000a048}}, 0x0) [ 892.311755][ C1] net_ratelimit: 13 callbacks suppressed [ 892.311763][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 892.312632][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 892.317533][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 892.323829][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 892.341883][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 892.348050][ C0] protocol 88fb is buggy, dev hsr_slave_1 07:22:06 executing program 1: socket$alg(0x26, 0x5, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x400, 0x0) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r0, 0x84, 0x74, &(0x7f0000000480)=""/72, &(0x7f00000001c0)=0x48) bind$pptp(r0, &(0x7f0000000000)={0x18, 0x2, {0x3, @multicast2}}, 0x1e) socket$inet(0x2b, 0x1, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x0, 0x0) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000300)='/dev/autofs\x00', 0x800, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(r2, 0xc02c564a, 0x0) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) lsetxattr$security_selinux(&(0x7f0000000880)='./file0\x00', &(0x7f0000000400)='security.selinux\x00', &(0x7f0000000900)='system_u:object_r:auditctl_exec_t:s0\x00', 0x25, 0x1) r4 = syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') getsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000280)={@ipv4={[], [], @initdev}, 0x0}, &(0x7f00000002c0)=0x14) accept4$packet(r1, &(0x7f0000000340)={0x11, 0x0, 0x0}, &(0x7f0000000380)=0x14, 0x80000) sendmsg$FOU_CMD_GET(r0, &(0x7f00000005c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000500)={0x54, r4, 0x300, 0x70bd27, 0x25dfdbfd, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PEER_V6={0x14, 0x9, @dev={0xfe, 0x80, [], 0x11}}, @FOU_ATTR_IFINDEX={0x8, 0xb, r5}, @FOU_ATTR_IFINDEX={0x8, 0xb, r6}, @FOU_ATTR_PEER_V4={0x8, 0x8, @empty}, @FOU_ATTR_AF={0x8, 0x2, 0xa}, @FOU_ATTR_PEER_V4={0x8, 0x8, @initdev={0xac, 0x1e, 0x0, 0x0}}]}, 0x54}, 0x1, 0x0, 0x0, 0x40}, 0x81) r7 = getpgrp(0x0) setpriority(0x0, r7, 0xffff) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) ioctl$PPPIOCSFLAGS1(r1, 0x40047459, &(0x7f0000000080)=0x2000608) msgget(0x1, 0x208) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet_tcp_TLS_TX(r3, 0x6, 0x1, &(0x7f0000000040)=@gcm_256={{0x304}, "54759a39da8b4a76", "9cc1c5d09cf8065c783d9be51e8e8908b18360a32ab271674208cd5d36cb8ba7", "39a49375", "9450985bd22925d6"}, 0x38) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:22:06 executing program 5: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000040), 0x10) setsockopt$inet_tcp_TLS_TX(r0, 0x6, 0x16, &(0x7f0000000680)=@gcm_256={{}, "26ea4efffaca7e36", "aa2d4550a9d8bbfa74e4f109732083fea3b80f29afcc8de93de4f6b01a7ce9e5", "42eac279", "26d90593e59bef3b"}, 0x38) 07:22:06 executing program 4: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r0 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x48000000000, 0x1) ioctl$PPPIOCSMRRU(r0, 0x4004743b, &(0x7f0000000080)=0x7) r1 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) fspick(r1, &(0x7f0000000000)='./file0\x00', 0x0) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 07:22:06 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @remote}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @random="e5ac78d4c7fd"}, 0x10) write(r2, &(0x7f0000000080)="2700000014000f3f00000000120f0a00110001001f750800560099ed4f05000000000000020000", 0x138) 07:22:06 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f00000001c0), 0x20) sendmsg$can_raw(r0, &(0x7f0000001fc8)={0x0, 0x74, &(0x7f0000000140)={&(0x7f000000a000)=@canfd={{0x6}, 0x0, 0x0, 0x0, 0x0, "0327e1b22b5fcef700580f02000000003f420f000000000000580f02000000003f420f0000000000856b76b5ee00000000000000004e2f9663a918fa1efd9b0b"}, 0x2000a048}}, 0x0) 07:22:07 executing program 5: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000040), 0x10) setsockopt$inet_tcp_TLS_TX(r0, 0x6, 0x17, &(0x7f0000000680)=@gcm_256={{}, "26ea4efffaca7e36", "aa2d4550a9d8bbfa74e4f109732083fea3b80f29afcc8de93de4f6b01a7ce9e5", "42eac279", "26d90593e59bef3b"}, 0x38) 07:22:07 executing program 0: socket$alg(0x26, 0x5, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) lsetxattr$security_selinux(0x0, 0x0, 0x0, 0xfe21, 0x0) setpriority(0x0, 0x0, 0xffff) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/am_droprate\x00', 0x2, 0x0) ioctl$KVM_SET_FPU(r0, 0x41a0ae8d, &(0x7f00000001c0)={[], 0x4, 0x9, 0x7, 0x0, 0x5e, 0x1f003, 0x3000, [], 0x4}) r1 = semget$private(0x0, 0xfffffffffffffffd, 0x15) semctl$GETVAL(r1, 0x0, 0xc, &(0x7f0000000100)=""/5) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0x3d2, 0x4001) ioctl$BLKREPORTZONE(r2, 0xc0101282, &(0x7f0000000080)=ANY=[@ANYBLOB="0700000000000000010000000000000005000000000000009851270a00000000ff010000000000000401040800000000000000000000000000000000000100"/80]) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000140)='$%,![:cgroupwlan0[\xfa\x00']) [ 892.721747][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 892.727560][ C0] protocol 88fb is buggy, dev hsr_slave_1 07:22:07 executing program 4: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet_sctp_SCTP_NODELAY(r0, 0x84, 0x3, &(0x7f0000000100)=0x4, 0x4) execve(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)=[&(0x7f0000000580)='wla+\x03\x01', &(0x7f0000000080)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000000)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:22:07 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @remote}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @random="e5ac78d4c7fd"}, 0x10) write(r2, &(0x7f0000000080)="2700000014000f3f00000000120f0a00110001001f750800560099ed4f05000000000000040000", 0x138) 07:22:07 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f00000001c0), 0x20) sendmsg$can_raw(r0, &(0x7f0000001fc8)={0x0, 0x74, &(0x7f0000000140)={&(0x7f000000a000)=@canfd={{0x7}, 0x0, 0x0, 0x0, 0x0, "0327e1b22b5fcef700580f02000000003f420f000000000000580f02000000003f420f0000000000856b76b5ee00000000000000004e2f9663a918fa1efd9b0b"}, 0x2000a048}}, 0x0) 07:22:07 executing program 5: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000040), 0x10) setsockopt$inet_tcp_TLS_TX(r0, 0x6, 0x18, &(0x7f0000000680)=@gcm_256={{}, "26ea4efffaca7e36", "aa2d4550a9d8bbfa74e4f109732083fea3b80f29afcc8de93de4f6b01a7ce9e5", "42eac279", "26d90593e59bef3b"}, 0x38) 07:22:07 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @remote}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @random="e5ac78d4c7fd"}, 0x10) write(r2, &(0x7f0000000080)="2700000014000f3f00000000120f0a00110001001f750800560099ed4f050000000000000a0000", 0x138) 07:22:07 executing program 1: socket$alg(0x26, 0x5, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x400, 0x0) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r0, 0x84, 0x74, &(0x7f0000000480)=""/72, &(0x7f00000001c0)=0x48) socket$inet(0x2b, 0x1, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x0, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000300)='/dev/autofs\x00', 0x800, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(r1, 0xc02c564a, 0x0) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(r1, 0x84, 0x20, &(0x7f0000000000), &(0x7f0000000040)=0x4) lsetxattr$security_smack_entry(&(0x7f0000000080)='./file0/file0\x00', &(0x7f00000000c0)='security.SMACK64IPIN\x00', &(0x7f0000000100)='$keyringem0*\x00', 0xd, 0x1) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) lsetxattr$security_selinux(&(0x7f0000000880)='./file0\x00', &(0x7f0000000400)='security.selinux\x00', &(0x7f0000000900)='system_u:object_r:auditctl_exec_t:s0\x00', 0x25, 0x1) r2 = getpgrp(0x0) setpriority(0x0, r2, 0xffff) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) msgget(0x1, 0x208) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:22:07 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f00000001c0), 0x20) sendmsg$can_raw(r0, &(0x7f0000001fc8)={0x0, 0x74, &(0x7f0000000140)={&(0x7f000000a000)=@canfd={{0x5, 0x2}, 0x0, 0x0, 0x0, 0x0, "0327e1b22b5fcef700580f02000000003f420f000000000000580f02000000003f420f0000000000856b76b5ee00000000000000004e2f9663a918fa1efd9b0b"}, 0x2000a048}}, 0x0) 07:22:07 executing program 4: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x80080, 0x0) fcntl$setpipe(r0, 0x407, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000000)) open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x81) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0xffffffffffffffff, r1, 0x0, 0x2, &(0x7f0000000080)='!\x00'}, 0x30) 07:22:07 executing program 5: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000040), 0x10) setsockopt$inet_tcp_TLS_TX(r0, 0x6, 0x19, &(0x7f0000000680)=@gcm_256={{}, "26ea4efffaca7e36", "aa2d4550a9d8bbfa74e4f109732083fea3b80f29afcc8de93de4f6b01a7ce9e5", "42eac279", "26d90593e59bef3b"}, 0x38) 07:22:07 executing program 0: r0 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$VIDIOC_QUERYSTD(r1, 0x8008563f, 0x0) 07:22:07 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @remote}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @random="e5ac78d4c7fd"}, 0x10) write(r2, &(0x7f0000000080)="2700000014000f3f00000000120f0a00110001001f750800560099ed4f050000000000000e0000", 0x138) 07:22:07 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f00000001c0), 0x20) sendmsg$can_raw(r0, &(0x7f0000001fc8)={0x0, 0x74, &(0x7f0000000140)={&(0x7f000000a000)=@canfd={{0x5, 0x8}, 0x0, 0x0, 0x0, 0x0, "0327e1b22b5fcef700580f02000000003f420f000000000000580f02000000003f420f0000000000856b76b5ee00000000000000004e2f9663a918fa1efd9b0b"}, 0x2000a048}}, 0x0) 07:22:07 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x3}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x5}, 0x1c) 07:22:08 executing program 5: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000040), 0x10) setsockopt$inet_tcp_TLS_TX(r0, 0x6, 0x1b, &(0x7f0000000680)=@gcm_256={{}, "26ea4efffaca7e36", "aa2d4550a9d8bbfa74e4f109732083fea3b80f29afcc8de93de4f6b01a7ce9e5", "42eac279", "26d90593e59bef3b"}, 0x38) 07:22:08 executing program 4: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) open(&(0x7f0000000080)='./file0\x00', 0x3d, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:22:08 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000140)) write$cgroup_int(r0, &(0x7f0000000080), 0x15d4b87) ioctl$FIBMAP(r0, 0x1, &(0x7f0000000040)) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000200)=ANY=[@ANYBLOB="000000000000000010b770"]) 07:22:08 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @remote}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @random="e5ac78d4c7fd"}, 0x10) write(r2, &(0x7f0000000080)="2700000014000f3f00000000120f0a00110001001f750800560099ed4f050000000000000f0000", 0x138) 07:22:08 executing program 1: socket$alg(0x26, 0x5, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x400, 0x0) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r0, 0x84, 0x74, &(0x7f0000000480)=""/72, &(0x7f00000001c0)=0x48) socket$inet(0x2b, 0x1, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x0, 0x0) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000300)='/dev/autofs\x00', 0x800, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(r2, 0xc02c564a, 0x0) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000040)=0xc) getpgrp(r3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) lsetxattr$security_selinux(&(0x7f0000000880)='./file0\x00', &(0x7f0000000400)='security.selinux\x00', &(0x7f0000000900)='system_u:object_r:auditctl_exec_t:s0\x00', 0x25, 0x1) r4 = getpgrp(0x0) setpriority(0x0, r4, 0xffff) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) msgget(0x1, 0x208) clone(0x4007ff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:22:08 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f00000001c0), 0x20) sendmsg$can_raw(r0, &(0x7f0000001fc8)={0x0, 0x74, &(0x7f0000000140)={&(0x7f000000a000)=@canfd={{0x5, 0x3f00}, 0x0, 0x0, 0x0, 0x0, "0327e1b22b5fcef700580f02000000003f420f000000000000580f02000000003f420f0000000000856b76b5ee00000000000000004e2f9663a918fa1efd9b0b"}, 0x2000a048}}, 0x0) 07:22:08 executing program 5: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000040), 0x10) setsockopt$inet_tcp_TLS_TX(r0, 0x6, 0x1d, &(0x7f0000000680)=@gcm_256={{}, "26ea4efffaca7e36", "aa2d4550a9d8bbfa74e4f109732083fea3b80f29afcc8de93de4f6b01a7ce9e5", "42eac279", "26d90593e59bef3b"}, 0x38) 07:22:08 executing program 4: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) r0 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x1, 0x0) ioctl$EVIOCGBITSW(r0, 0x80404525, &(0x7f0000000040)=""/78) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) ioctl$NBD_DISCONNECT(r0, 0xab08) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:22:08 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @remote}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @random="e5ac78d4c7fd"}, 0x10) write(r2, &(0x7f0000000080)="2700000014000f3f00000000120f0a00110001001f750800560099ed4f05000000000001100000", 0x138) 07:22:08 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f00000001c0), 0x20) sendmsg$can_raw(r0, &(0x7f0000001fc8)={0x0, 0x74, &(0x7f0000000140)={&(0x7f000000a000)=@canfd={{0x5, 0x4000}, 0x0, 0x0, 0x0, 0x0, "0327e1b22b5fcef700580f02000000003f420f000000000000580f02000000003f420f0000000000856b76b5ee00000000000000004e2f9663a918fa1efd9b0b"}, 0x2000a048}}, 0x0) 07:22:08 executing program 5: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000040), 0x10) setsockopt$inet_tcp_TLS_TX(r0, 0x6, 0x1e, &(0x7f0000000680)=@gcm_256={{}, "26ea4efffaca7e36", "aa2d4550a9d8bbfa74e4f109732083fea3b80f29afcc8de93de4f6b01a7ce9e5", "42eac279", "26d90593e59bef3b"}, 0x38) 07:22:08 executing program 0: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f000000dfaa)="5500000018007f5300fe01b2a4a280930a600000ffa84302910000003900050035000c00060000001900150005000000000000dc1338d54400009b84136ef75afb83de4411000500c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 07:22:08 executing program 4: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x4000000020040, 0x1) clone(0x1000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:22:08 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000140)) write$cgroup_int(r0, &(0x7f0000000080), 0x15d4b87) ioctl$FIBMAP(r0, 0x1, &(0x7f0000000040)) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000200)=ANY=[@ANYBLOB="000000000000000010"]) 07:22:08 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @remote}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @random="e5ac78d4c7fd"}, 0x10) write(r2, &(0x7f0000000080)="2700000014000f3f00000000120f0a00110001001f750800560099ed4f050000000000003f0000", 0x138) 07:22:08 executing program 5: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000040), 0x10) setsockopt$inet_tcp_TLS_TX(r0, 0x6, 0x21, &(0x7f0000000680)=@gcm_256={{}, "26ea4efffaca7e36", "aa2d4550a9d8bbfa74e4f109732083fea3b80f29afcc8de93de4f6b01a7ce9e5", "42eac279", "26d90593e59bef3b"}, 0x38) 07:22:09 executing program 1: socket$alg(0x26, 0x5, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x400, 0x0) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r0, 0x84, 0x74, &(0x7f0000000480)=""/72, &(0x7f00000001c0)=0x48) socket$inet(0x2b, 0x1, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x0, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000300)='/dev/autofs\x00', 0x800, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(r1, 0xc02c564a, 0x0) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) lsetxattr$security_selinux(&(0x7f0000000880)='./file0\x00', &(0x7f0000000400)='security.selinux\x00', &(0x7f0000000900)='system_u:object_r:auditctl_exec_t:s0\x00', 0x25, 0x1) r2 = getpgrp(0x0) setpriority(0x0, r2, 0xffff) r3 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) getsockopt$bt_BT_DEFER_SETUP(r3, 0x112, 0x7, &(0x7f0000000040), &(0x7f0000000080)=0x4) msgget(0x1, 0x208) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS(r0, 0xc0245720, &(0x7f0000000000)={0x1, {}, 0x7, 0x600000000000}) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:22:09 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f00000001c0), 0x20) sendmsg$can_raw(r0, &(0x7f0000001fc8)={0x0, 0x74, &(0x7f0000000140)={&(0x7f000000a000)=@canfd={{0x5, 0x1000000}, 0x0, 0x0, 0x0, 0x0, "0327e1b22b5fcef700580f02000000003f420f000000000000580f02000000003f420f0000000000856b76b5ee00000000000000004e2f9663a918fa1efd9b0b"}, 0x2000a048}}, 0x0) 07:22:09 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @remote}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @random="e5ac78d4c7fd"}, 0x10) write(r2, &(0x7f0000000080)="2700000014000f3f00000000120f0a00110001001f750800560099ed4f05000000000000400000", 0x138) 07:22:09 executing program 4: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) fcntl$F_GET_RW_HINT(r0, 0x40b, &(0x7f0000000080)) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f00000000c0)={0x5, 0x206, 0xfffffffffffffc01, 0x2, 0x0}, &(0x7f0000000100)=0x10) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000140)={r1, 0xffffffffffffff81}, &(0x7f00000001c0)=0x8) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$VIDIOC_S_CROP(r0, 0x4014563c, &(0x7f0000000200)={0x8, {0x3, 0x5, 0x8000, 0x86d4}}) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) mkdir(&(0x7f0000000000)='./file0\x00', 0x1) setsockopt$IP_VS_SO_SET_TIMEOUT(r0, 0x0, 0x48a, &(0x7f0000000040)={0x0, 0x0, 0x7}, 0xc) 07:22:09 executing program 5: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000040), 0x10) setsockopt$inet_tcp_TLS_TX(r0, 0x6, 0x22, &(0x7f0000000680)=@gcm_256={{}, "26ea4efffaca7e36", "aa2d4550a9d8bbfa74e4f109732083fea3b80f29afcc8de93de4f6b01a7ce9e5", "42eac279", "26d90593e59bef3b"}, 0x38) 07:22:09 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) write$cgroup_int(r0, &(0x7f0000000080), 0x15d4b87) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000200)=ANY=[@ANYBLOB="000000000000000010"]) [ 894.791757][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 894.797560][ C0] protocol 88fb is buggy, dev hsr_slave_1 07:22:09 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f00000001c0), 0x20) sendmsg$can_raw(r0, &(0x7f0000001fc8)={0x0, 0x74, &(0x7f0000000140)={&(0x7f000000a000)=@canfd={{0x5, 0x2000000}, 0x0, 0x0, 0x0, 0x0, "0327e1b22b5fcef700580f02000000003f420f000000000000580f02000000003f420f0000000000856b76b5ee00000000000000004e2f9663a918fa1efd9b0b"}, 0x2000a048}}, 0x0) 07:22:09 executing program 5: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000040), 0x10) setsockopt$inet_tcp_TLS_TX(r0, 0x6, 0x24, &(0x7f0000000680)=@gcm_256={{}, "26ea4efffaca7e36", "aa2d4550a9d8bbfa74e4f109732083fea3b80f29afcc8de93de4f6b01a7ce9e5", "42eac279", "26d90593e59bef3b"}, 0x38) 07:22:09 executing program 1: socket$alg(0x26, 0x5, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x400, 0x0) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r0, 0x84, 0x74, &(0x7f0000000480)=""/72, &(0x7f00000001c0)=0x48) socket$inet(0x2b, 0x1, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x0, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000300)='/dev/autofs\x00', 0x800, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(r1, 0xc02c564a, 0x0) getsockopt$SO_TIMESTAMP(r0, 0x1, 0x3f, &(0x7f0000000000), &(0x7f0000000040)=0x4) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffe5a) lsetxattr$security_selinux(&(0x7f0000000880)='./file0\x00', &(0x7f0000000400)='security.selinux\x00', &(0x7f0000000900)='system_u:object_r:auditctl_exec_t:s0\x00', 0x25, 0x1) setpriority(0x0, 0x0, 0xffff) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) msgget(0x1, 0x208) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:22:09 executing program 4: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x6) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$TIOCGLCKTRMIOS(r0, 0x5456, &(0x7f0000000000)={0x0, 0x200, 0x3, 0x5, 0x1b, 0x1, 0x2, 0xfff, 0x0, 0x6, 0x1, 0xd4}) ioctl$SG_SET_COMMAND_Q(r0, 0x2271, &(0x7f0000000040)=0x1) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000000c0)={&(0x7f0000000080)='./file0\x00', r0}, 0x10) 07:22:09 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @remote}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @random="e5ac78d4c7fd"}, 0x10) write(r2, &(0x7f0000000080)="2700000014000f3f00000000120f0a00110001001f750800560099ed4f05000000000000600000", 0x138) 07:22:09 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f00000001c0), 0x20) sendmsg$can_raw(r0, &(0x7f0000001fc8)={0x0, 0x74, &(0x7f0000000140)={&(0x7f000000a000)=@canfd={{0x5, 0x8000000}, 0x0, 0x0, 0x0, 0x0, "0327e1b22b5fcef700580f02000000003f420f000000000000580f02000000003f420f0000000000856b76b5ee00000000000000004e2f9663a918fa1efd9b0b"}, 0x2000a048}}, 0x0) 07:22:09 executing program 4: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x266b) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) r1 = syz_genetlink_get_family_id$nbd(&(0x7f0000000040)='nbd\x00') sendfile64(r0, r0, &(0x7f00000001c0), 0x0) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x82400008}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x5c, r1, 0x904, 0x70bd2d, 0x25dfdbfc, {}, [@NBD_ATTR_TIMEOUT={0xc, 0x4, 0x1}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0x3}, @NBD_ATTR_CLIENT_FLAGS={0xc}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x2c5b491ecb2376c8}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0x1}, @NBD_ATTR_SIZE_BYTES={0xc}]}, 0x5c}, 0x1, 0x0, 0x0, 0x20040004}, 0x40080) 07:22:09 executing program 5: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000040), 0x10) setsockopt$inet_tcp_TLS_TX(r0, 0x6, 0x25, &(0x7f0000000680)=@gcm_256={{}, "26ea4efffaca7e36", "aa2d4550a9d8bbfa74e4f109732083fea3b80f29afcc8de93de4f6b01a7ce9e5", "42eac279", "26d90593e59bef3b"}, 0x38) [ 895.349963][ T7523] TCP: TCP_TX_DELAY enabled 07:22:09 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @remote}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @random="e5ac78d4c7fd"}, 0x10) write(r2, &(0x7f0000000080)="2700000014000f3f00000000120f0a00110001001f750800560099ed4f05000000ffffff9e0000", 0x138) 07:22:09 executing program 5: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000040), 0x10) setsockopt$inet_tcp_TLS_TX(r0, 0x6, 0x300, &(0x7f0000000680)=@gcm_256={{}, "26ea4efffaca7e36", "aa2d4550a9d8bbfa74e4f109732083fea3b80f29afcc8de93de4f6b01a7ce9e5", "42eac279", "26d90593e59bef3b"}, 0x38) 07:22:09 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f00000001c0), 0x20) sendmsg$can_raw(r0, &(0x7f0000001fc8)={0x0, 0x74, &(0x7f0000000140)={&(0x7f000000a000)=@canfd={{0x5, 0x3f000000}, 0x0, 0x0, 0x0, 0x0, "0327e1b22b5fcef700580f02000000003f420f000000000000580f02000000003f420f0000000000856b76b5ee00000000000000004e2f9663a918fa1efd9b0b"}, 0x2000a048}}, 0x0) 07:22:09 executing program 0: r0 = socket$inet6(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f000000dfaa)="5500000018007f5300fe01b2a4a280930a600000ffa84302910000003900050035000c00060000001900150005000000000000dc1338d54400009b84136ef75afb83de4411000500c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 07:22:09 executing program 4: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xa5) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:22:10 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @remote}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @random="e5ac78d4c7fd"}, 0x10) write(r2, &(0x7f0000000080)="2700000014000f3f00000000120f0a00110001001f750800560099ed4f0500000000000ec00000", 0x138) 07:22:10 executing program 1: socket$alg(0x26, 0x5, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x400, 0x0) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r0, 0x84, 0x74, &(0x7f0000000480)=""/72, &(0x7f00000001c0)=0x48) socket$inet(0x2b, 0x1, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x0, 0x0) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000300)='/dev/autofs\x00', 0x800, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(r2, 0xc02c564a, 0x0) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') sendmsg$IPVS_CMD_GET_SERVICE(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000080)={&(0x7f0000000940)={0x10c, r3, 0x4, 0x70bd2a, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_SERVICE={0x28, 0x1, [@IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x3c}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@local}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'wlc\x00'}]}, @IPVS_CMD_ATTR_DEST={0xc, 0x2, [@IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x7fff}]}, @IPVS_CMD_ATTR_DAEMON={0x20, 0x3, [@IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x4}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @local}]}, @IPVS_CMD_ATTR_SERVICE={0x60, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x5c}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x800}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x8000}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_FWMARK={0x8}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x5e}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0xff}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@multicast2}]}, @IPVS_CMD_ATTR_DAEMON={0x30, 0x3, [@IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x4}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @remote}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x531376d}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8}]}, @IPVS_CMD_ATTR_DEST={0x14, 0x2, [@IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x4}, @IPVS_DEST_ATTR_TUN_PORT={0x8, 0xe, 0x4e23}]}]}, 0x10c}, 0x1, 0x0, 0x0, 0x20000000}, 0x4000) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) lsetxattr$security_selinux(&(0x7f0000000880)='./file0\x00', &(0x7f0000000400)='security.selinux\x00', &(0x7f0000000900)='system_u:object_r:auditctl_exec_t:s0\x00', 0x25, 0x1) r4 = getpgrp(0x0) setpriority(0xffffffffffffffff, r4, 0x5) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) msgget(0x1, 0x208) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:22:10 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f00000001c0), 0x20) sendmsg$can_raw(r0, &(0x7f0000001fc8)={0x0, 0x74, &(0x7f0000000140)={&(0x7f000000a000)=@canfd={{0x5, 0x40000000}, 0x0, 0x0, 0x0, 0x0, "0327e1b22b5fcef700580f02000000003f420f000000000000580f02000000003f420f0000000000856b76b5ee00000000000000004e2f9663a918fa1efd9b0b"}, 0x2000a048}}, 0x0) 07:22:10 executing program 5: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000040), 0x10) setsockopt$inet_tcp_TLS_TX(r0, 0x6, 0x1, &(0x7f0000000680)=@gcm_256={{0x3f00}, "26ea4efffaca7e36", "aa2d4550a9d8bbfa74e4f109732083fea3b80f29afcc8de93de4f6b01a7ce9e5", "42eac279", "26d90593e59bef3b"}, 0x38) 07:22:10 executing program 4: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x42400, 0x0) connect$netlink(r0, &(0x7f0000000040)=@proc={0x10, 0x0, 0x25dfdbfb, 0x200042}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:22:10 executing program 0: 07:22:10 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @remote}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @random="e5ac78d4c7fd"}, 0x10) write(r2, &(0x7f0000000080)="2700000014000f3f00000000120f0a00110001001f750800560099ed4f0500000000000be90000", 0x138) 07:22:10 executing program 5: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000040), 0x10) setsockopt$inet_tcp_TLS_TX(r0, 0x6, 0x1, &(0x7f0000000680)=@gcm_256={{0x3f000000}, "26ea4efffaca7e36", "aa2d4550a9d8bbfa74e4f109732083fea3b80f29afcc8de93de4f6b01a7ce9e5", "42eac279", "26d90593e59bef3b"}, 0x38) 07:22:10 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f00000001c0), 0x20) sendmsg$can_raw(r0, &(0x7f0000001fc8)={0x0, 0x74, &(0x7f0000000140)={&(0x7f000000a000)=@canfd={{0x5, 0xffffff7f}, 0x0, 0x0, 0x0, 0x0, "0327e1b22b5fcef700580f02000000003f420f000000000000580f02000000003f420f0000000000856b76b5ee00000000000000004e2f9663a918fa1efd9b0b"}, 0x2000a048}}, 0x0) 07:22:10 executing program 0: 07:22:10 executing program 0: 07:22:10 executing program 4: r0 = syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x3, 0x1) r1 = openat$vimc1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video1\x00', 0x2, 0x0) ioctl$FICLONE(r0, 0x40049409, r1) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) connect$rds(r2, &(0x7f0000000000)={0x2, 0x4e23, @empty}, 0x10) 07:22:10 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f00000001c0), 0x20) sendmsg$can_raw(r0, &(0x7f0000001fc8)={0x0, 0x74, &(0x7f0000000140)={&(0x7f000000a000)=@canfd={{0x5, 0x100000000000000}, 0x0, 0x0, 0x0, 0x0, "0327e1b22b5fcef700580f02000000003f420f000000000000580f02000000003f420f0000000000856b76b5ee00000000000000004e2f9663a918fa1efd9b0b"}, 0x2000a048}}, 0x0) 07:22:10 executing program 1: socket$alg(0x26, 0x5, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x400, 0x0) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r0, 0x84, 0x74, &(0x7f0000000480)=""/72, &(0x7f00000001c0)=0x48) socket$inet(0x2b, 0x1, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x0, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/autofs\x00', 0x800, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(r1, 0xc02c564a, 0x0) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) lsetxattr$security_selinux(&(0x7f0000000280)='./file0\x00', &(0x7f0000000400)='security.selinux\x00', &(0x7f0000000900)='system_u:object_r:auditctl_exec_t:s0\x00', 0x25, 0x1) r2 = getpgrp(0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, 0x0, &(0x7f00000000c0)) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000480)={@ipv4={[], [], @dev}, @initdev={0xfe, 0x88, [], 0x1}, @dev={0xfe, 0x80, [], 0x10}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x108}) prctl$PR_MCE_KILL_GET(0x22) ioctl$sock_inet_SIOCSIFADDR(r3, 0x8916, 0x0) getpgid(0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) setpriority(0x0, r2, 0xffff) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) msgget(0x1, 0x208) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000080)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000000)=[&(0x7f0000000040)='wlan1\x00', &(0x7f0000000740)='!\x00']) 07:22:10 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @remote}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @random="e5ac78d4c7fd"}, 0x10) write(r2, &(0x7f0000000080)="2700000014000f3f00000000120f0a00110001001f750800560099ed4f05000000fffffff00000", 0x138) 07:22:10 executing program 0: 07:22:10 executing program 5: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000040), 0x10) setsockopt$inet_tcp_TLS_TX(r0, 0x6, 0x1, &(0x7f0000000680)=@gcm_256={{0xf5ffffff}, "26ea4efffaca7e36", "aa2d4550a9d8bbfa74e4f109732083fea3b80f29afcc8de93de4f6b01a7ce9e5", "42eac279", "26d90593e59bef3b"}, 0x38) 07:22:10 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f00000001c0), 0x20) sendmsg$can_raw(r0, &(0x7f0000001fc8)={0x0, 0x74, &(0x7f0000000140)={&(0x7f000000a000)=@canfd={{0x5, 0x200000000000000}, 0x0, 0x0, 0x0, 0x0, "0327e1b22b5fcef700580f02000000003f420f000000000000580f02000000003f420f0000000000856b76b5ee00000000000000004e2f9663a918fa1efd9b0b"}, 0x2000a048}}, 0x0) 07:22:10 executing program 0: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x103b0e93b836670b, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f0000000040)=0x4, 0x0, 0x4, 0x0, 0x0, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000080)) clock_gettime(0x0, &(0x7f00000001c0)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, r1+30000000}}, 0x0) tkill(r0, 0x20000000014) futex(&(0x7f0000000280), 0x800000000005, 0x0, 0x0, &(0x7f0000000040), 0x0) 07:22:11 executing program 4: r0 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='team_slave_1\x00', 0x10) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e21, @multicast1}, 0x10) syz_emit_ethernet(0xfffffffffffffea3, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaabb08004500191c000000000011907800000000e000000100004e2100089078"], 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) r1 = pkey_alloc(0x0, 0x2) pkey_free(r1) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x4, r1) clone(0x4110000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) ioctl$VHOST_GET_VRING_BASE(r2, 0xc008af12, &(0x7f0000000040)) 07:22:11 executing program 5: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000040), 0x10) setsockopt$inet_tcp_TLS_TX(r0, 0x6, 0x1, &(0x7f0000000680)=@gcm_256={{0xfffffff5}, "26ea4efffaca7e36", "aa2d4550a9d8bbfa74e4f109732083fea3b80f29afcc8de93de4f6b01a7ce9e5", "42eac279", "26d90593e59bef3b"}, 0x38) 07:22:11 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f00000001c0), 0x20) sendmsg$can_raw(r0, &(0x7f0000001fc8)={0x0, 0x74, &(0x7f0000000140)={&(0x7f000000a000)=@canfd={{0x5, 0x800000000000000}, 0x0, 0x0, 0x0, 0x0, "0327e1b22b5fcef700580f02000000003f420f000000000000580f02000000003f420f0000000000856b76b5ee00000000000000004e2f9663a918fa1efd9b0b"}, 0x2000a048}}, 0x0) 07:22:11 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @remote}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @random="e5ac78d4c7fd"}, 0x10) write(r2, &(0x7f0000000080)="2700000014000f3f00000000120f0a00110001001f750800560099ed4f0500000000f0ffff0000", 0x138) 07:22:11 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000100)='/dev/null\x00', 0x404040, 0x0) perf_event_open(&(0x7f0000000080)={0x3, 0x70, 0x3, 0x3, 0x0, 0xbb7, 0x0, 0x2, 0x1, 0x8, 0x9, 0x3ff, 0x7fffffff, 0x800, 0x86cf, 0x1, 0xffffffffffffffd7, 0x3ff, 0xb46, 0x2, 0xcf11, 0x80000001, 0xfffffffffffffbff, 0x1000, 0x1, 0x10001, 0x3, 0x2, 0x6, 0x3, 0x10001, 0x40, 0x2, 0x0, 0x1, 0xfffffffffffffffd, 0x45, 0x81, 0x0, 0xfffffffffffffffa, 0x0, @perf_config_ext={0x7, 0x100000001}, 0x2, 0x100, 0x5, 0x4, 0xfffffffffffff662, 0x9, 0x7}, 0xffffffffffffffff, 0x10, r1, 0x9) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000340)='trusted.overlay.redirect\x00', &(0x7f0000000380)='./file0\x00', 0x8, 0x2) fcntl$setpipe(r0, 0x407, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_INTERVAL(r1, 0xc040564b, &(0x7f0000000300)={0x8000, 0x0, 0x701f, 0x10000, 0x200000000000, {0x8, 0x1}}) r2 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r2, 0x84, 0x1f, &(0x7f00000001c0)={0x0, @in6={{0xa, 0x4e23, 0x9, @mcast2, 0x5}}, 0x1d, 0x1000}, &(0x7f0000000140)=0x88) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000280)={r3, 0x100000001}, &(0x7f00000002c0)=0x8) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(r2, 0xc0045540, &(0x7f0000000000)=0x427) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000040)='!\x00']) 07:22:11 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @remote}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @random="e5ac78d4c7fd"}, 0x10) write(r2, &(0x7f0000000080)="2700000014000f3f00000000120f0a00110001001f750800560099ed4f050000009effffff0000", 0x138) 07:22:11 executing program 5: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000040), 0x10) setsockopt$inet_tcp_TLS_TX(r0, 0x6, 0x1, &(0x7f0000000680)=@gcm_256={{0x1000000000000}, "26ea4efffaca7e36", "aa2d4550a9d8bbfa74e4f109732083fea3b80f29afcc8de93de4f6b01a7ce9e5", "42eac279", "26d90593e59bef3b"}, 0x38) 07:22:11 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f00000001c0), 0x20) sendmsg$can_raw(r0, &(0x7f0000001fc8)={0x0, 0x74, &(0x7f0000000140)={&(0x7f000000a000)=@canfd={{0x5, 0x3f00000000000000}, 0x0, 0x0, 0x0, 0x0, "0327e1b22b5fcef700580f02000000003f420f000000000000580f02000000003f420f0000000000856b76b5ee00000000000000004e2f9663a918fa1efd9b0b"}, 0x2000a048}}, 0x0) 07:22:11 executing program 4: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) r0 = open(&(0x7f0000000200)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000000)=0x0) prlimit64(r1, 0x9, 0x0, &(0x7f0000000040)) getsockopt$sock_int(r0, 0x1, 0x3e, &(0x7f00000000c0), &(0x7f0000000100)=0x4) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) fcntl$F_GET_RW_HINT(r0, 0x40b, &(0x7f00000001c0)) ioctl$RFKILL_IOCTL_NOINPUT(r0, 0x5201) write$FUSE_NOTIFY_INVAL_INODE(r0, &(0x7f0000000080)={0x28, 0x2, 0x0, {0x3, 0x9, 0x1}}, 0x28) ioctl$sock_TIOCOUTQ(r0, 0x5411, &(0x7f0000000140)) 07:22:11 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) socket$tipc(0x1e, 0x2, 0x0) write(r1, &(0x7f0000000340), 0x41395527) memfd_create(0x0, 0x0) write$sndseq(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000100)) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 07:22:11 executing program 1: socket$alg(0x26, 0x5, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x400, 0x0) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r0, 0x84, 0x74, &(0x7f0000000480)=""/72, &(0x7f00000001c0)=0x48) socket$inet(0x2b, 0x1, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x0, 0x0) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000300)='/dev/autofs\x00', 0x800, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(r2, 0xc02c564a, 0x0) ioctl$SCSI_IOCTL_GET_IDLUN(r1, 0x5382, &(0x7f0000000000)) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) lsetxattr$security_selinux(&(0x7f0000000880)='./file0\x00', &(0x7f0000000400)='security.selinux\x00', &(0x7f0000000900)='system_u:object_r:auditctl_exec_t:s0\x00', 0x25, 0x1) ioctl$DRM_IOCTL_DROP_MASTER(r2, 0x641f) ioctl$UFFDIO_COPY(r0, 0xc028aa03, &(0x7f0000000040)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x3000)=nil, 0x1000, 0x1}) r3 = getpgrp(0x0) setpriority(0x0, r3, 0xffff) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) msgget(0x1, 0x208) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:22:11 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @remote}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @random="e5ac78d4c7fd"}, 0x10) write(r2, &(0x7f0000000080)="2700000014000f3f00000000120f0a00110001001f750800560099ed4f05000000f0ffffff0000", 0x138) 07:22:11 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f00000001c0), 0x20) sendmsg$can_raw(r0, &(0x7f0000001fc8)={0x0, 0x74, &(0x7f0000000140)={&(0x7f000000a000)=@canfd={{0x5, 0x4000000000000000}, 0x0, 0x0, 0x0, 0x0, "0327e1b22b5fcef700580f02000000003f420f000000000000580f02000000003f420f0000000000856b76b5ee00000000000000004e2f9663a918fa1efd9b0b"}, 0x2000a048}}, 0x0) 07:22:12 executing program 5: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000040), 0x10) setsockopt$inet_tcp_TLS_TX(r0, 0x6, 0x1, &(0x7f0000000680)=@gcm_256={{0x3f00000000000000}, "26ea4efffaca7e36", "aa2d4550a9d8bbfa74e4f109732083fea3b80f29afcc8de93de4f6b01a7ce9e5", "42eac279", "26d90593e59bef3b"}, 0x38) 07:22:12 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @remote}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @random="e5ac78d4c7fd"}, 0x10) write(r2, &(0x7f0000000080)="2700000014000f3f00000000120f0a00110001001f750800560099ed4f05000000000000000003", 0x138) 07:22:12 executing program 0: 07:22:12 executing program 4: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) [ 897.704393][T10809] ------------[ cut here ]------------ [ 897.709948][T10809] ODEBUG: free active (active state 0) object type: work_struct hint: smc_tx_work+0x0/0x1d0 [ 897.720547][T10809] WARNING: CPU: 0 PID: 10809 at lib/debugobjects.c:481 debug_print_object+0x168/0x250 [ 897.730101][T10809] Kernel panic - not syncing: panic_on_warn set ... [ 897.736694][T10809] CPU: 0 PID: 10809 Comm: syz-executor.5 Not tainted 5.3.0-rc2+ #87 [ 897.744671][T10809] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 897.754729][T10809] Call Trace: [ 897.757431][ T3907] kobject: 'loop4' (00000000d0db6c2f): kobject_uevent_env [ 897.758118][T10809] dump_stack+0x172/0x1f0 [ 897.769574][T10809] ? debug_print_object+0x130/0x250 [ 897.774785][T10809] panic+0x2dc/0x755 [ 897.778716][T10809] ? add_taint.cold+0x16/0x16 [ 897.783405][T10809] ? __kasan_check_write+0x14/0x20 [ 897.788523][T10809] ? __warn.cold+0x5/0x4c [ 897.793034][T10809] ? __warn+0xe7/0x1e0 [ 897.797109][T10809] ? debug_print_object+0x168/0x250 07:22:12 executing program 0: [ 897.802320][T10809] __warn.cold+0x20/0x4c [ 897.806566][T10809] ? debug_print_object+0x168/0x250 [ 897.811803][T10809] report_bug+0x263/0x2b0 [ 897.814078][ T3907] kobject: 'loop4' (00000000d0db6c2f): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 897.816158][T10809] do_error_trap+0x11b/0x200 [ 897.830870][T10809] do_invalid_op+0x37/0x50 [ 897.835309][T10809] ? debug_print_object+0x168/0x250 [ 897.840529][T10809] invalid_op+0x23/0x30 [ 897.844698][T10809] RIP: 0010:debug_print_object+0x168/0x250 [ 897.850513][T10809] Code: dd a0 31 c6 87 48 89 fa 48 c1 ea 03 80 3c 02 00 0f 85 b5 00 00 00 48 8b 14 dd a0 31 c6 87 48 c7 c7 a0 26 c6 87 e8 00 c3 05 fe <0f> 0b 83 05 d3 55 67 06 01 48 83 c4 20 5b 41 5c 41 5d 41 5e 5d c3 [ 897.870118][T10809] RSP: 0018:ffff88805ddffba8 EFLAGS: 00010086 [ 897.876190][T10809] RAX: 0000000000000000 RBX: 0000000000000003 RCX: 0000000000000000 [ 897.884172][T10809] RDX: 0000000000000000 RSI: ffffffff815c5216 RDI: ffffed100bbbff67 [ 897.892152][T10809] RBP: ffff88805ddffbe8 R08: ffff88805705e600 R09: ffffed1015d04101 [ 897.900130][T10809] R10: ffffed1015d04100 R11: ffff8880ae820807 R12: 0000000000000001 [ 897.908110][T10809] R13: ffffffff88d798c0 R14: ffffffff814ab100 R15: ffff888091fb8dc8 [ 897.916097][T10809] ? __exit_umh+0x2e0/0x2e0 [ 897.920630][T10809] ? vprintk_func+0x86/0x189 [ 897.925237][T10809] ? debug_print_object+0x168/0x250 [ 897.930452][T10809] debug_check_no_obj_freed+0x2d4/0x43f [ 897.936050][T10809] kmem_cache_free+0x18f/0x320 [ 897.940827][T10809] __sk_destruct+0x4bc/0x6e0 [ 897.945430][T10809] sk_destruct+0x86/0xa0 [ 897.949680][T10809] __sk_free+0xfb/0x360 07:22:12 executing program 4: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r0 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x4000000000000, 0x20001) ioctl$KDGKBMETA(r0, 0x4b62, &(0x7f0000000040)) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='p\xf2oc\x00', &(0x7f0000000740)='!\x00']) 07:22:12 executing program 0: [ 897.953846][T10809] sk_free+0x42/0x50 [ 897.957759][T10809] smc_release+0x2f6/0x380 [ 897.962184][T10809] __sock_release+0xce/0x280 [ 897.966781][T10809] sock_close+0x1e/0x30 [ 897.970939][T10809] __fput+0x2ff/0x890 [ 897.974927][T10809] ? __sock_release+0x280/0x280 [ 897.979787][T10809] ____fput+0x16/0x20 [ 897.983780][T10809] task_work_run+0x145/0x1c0 [ 897.985774][ T3907] kobject: 'loop4' (00000000d0db6c2f): kobject_uevent_env [ 897.988387][T10809] exit_to_usermode_loop+0x316/0x380 [ 898.000801][T10809] do_fast_syscall_32+0xb87/0xdb3 [ 898.005839][T10809] entry_SYSENTER_compat+0x70/0x7f [ 898.007121][ T3907] kobject: 'loop4' (00000000d0db6c2f): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 898.010970][T10809] RIP: 0023:0xf7f7b9c9 [ 898.010984][T10809] Code: d3 83 c4 10 5b 5e 5d c3 ba 80 96 98 00 eb a9 8b 04 24 c3 8b 34 24 c3 8b 3c 24 c3 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 898.010999][T10809] RSP: 002b:000000000847fbfc EFLAGS: 00000212 ORIG_RAX: 0000000000000006 [ 898.053201][T10809] RAX: 0000000000000000 RBX: 0000000000000003 RCX: 0000000000000000 [ 898.061290][T10809] RDX: 0000000000000004 RSI: 000000000816b680 RDI: 0000000008170300 [ 898.063786][ T3907] kobject: 'loop0' (000000003d2d3888): kobject_uevent_env [ 898.069262][T10809] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 898.069269][T10809] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 898.069276][T10809] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 898.077465][T10809] Kernel Offset: disabled [ 898.105671][T10809] Rebooting in 86400 seconds..