ffffffffff, 0x8903, &(0x7f0000000000)=0x0) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0)={r6}, 0xc) 14:26:41 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r0 = socket$inet(0x2, 0x80002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x8020000) socket$key(0xf, 0x3, 0x2) r1 = semget$private(0x0, 0x6, 0x0) r2 = syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/ipc\x00') semop(r1, &(0x7f0000000100)=[{0x0, 0x0, 0x1800}], 0x1) setns(r2, 0x0) ioctl$sock_ifreq(r0, 0x8916, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x27a, 0x200007fd, &(0x7f0000000080)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xb}}, 0x10) r3 = open(0x0, 0x101000, 0x8) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, &(0x7f00000001c0)={0x1, &(0x7f00000000c0)=[{0x0}]}) ioctl$DRM_IOCTL_NEW_CTX(r3, 0x40086425, &(0x7f0000000200)={r4, 0x1}) r5 = fcntl$getown(r2, 0x9) sched_getparam(r5, &(0x7f0000000580)) ioctl$CAPI_MANUFACTURER_CMD(r0, 0xc0104320, &(0x7f0000000400)={0x4, &(0x7f0000000340)="554c6e0be933cfb0d1073c9c3098d69941d5291258dfcf230c9f661439cdb9bb1a6424ee4fc3238460988de4b08b5b1d60e77480d7376cb8697e2a793d5f85267ff89305e406184c417258e6ecf1e253b66e605fcef9e11ab7e631872ff06305282ad2a0bff462f14ab5813de405e8c852143a364a4fa6360b4a60202c6a116555e70e2c4fa9ccda0542efde096b23fedb2b5a25fa415bd46a"}) sendmsg$nl_generic(r3, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c0000001d00000000000000fedbdf250500000008000000ac14140fc485e87c0d8a149cd9469336189df457e00636dba7c8495929a13c9bd83e68976bc3c409450122418436c13023fa391d5570d16cc0ec3cdd81c3e19d2b558bedff7c9fed6be52bd89714c34e0883029fd4a5fc4fc78e9592a9c69f24b4a61b7f94e70a7017b76f0397ddd82395caeb4da345"], 0x1c}, 0x1, 0x0, 0x0, 0x811}, 0x4040000) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r2, 0x40106614, &(0x7f0000000180)={0x0, @speck128}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000000)=0x0) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0)={r6}, 0xc) 14:26:41 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r0 = socket$inet(0x2, 0x80002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x8020000) socket$key(0xf, 0x3, 0x2) r1 = semget$private(0x0, 0x6, 0x0) r2 = syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/ipc\x00') semop(r1, &(0x7f0000000100)=[{0x0, 0x0, 0x1800}], 0x1) setns(r2, 0x0) ioctl$sock_ifreq(r0, 0x8916, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x27a, 0x200007fd, &(0x7f0000000080)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xb}}, 0x10) r3 = open(0x0, 0x101000, 0x8) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, &(0x7f00000001c0)={0x1, &(0x7f00000000c0)=[{0x0}]}) ioctl$DRM_IOCTL_NEW_CTX(r3, 0x40086425, &(0x7f0000000200)={r4, 0x1}) r5 = fcntl$getown(r2, 0x9) sched_getparam(r5, &(0x7f0000000580)) ioctl$CAPI_MANUFACTURER_CMD(r0, 0xc0104320, &(0x7f0000000400)={0x4, &(0x7f0000000340)="554c6e0be933cfb0d1073c9c3098d69941d5291258dfcf230c9f661439cdb9bb1a6424ee4fc3238460988de4b08b5b1d60e77480d7376cb8697e2a793d5f85267ff89305e406184c417258e6ecf1e253b66e605fcef9e11ab7e631872ff06305282ad2a0bff462f14ab5813de405e8c852143a364a4fa6360b4a60202c6a116555e70e2c4fa9ccda0542efde096b23fedb2b5a25fa415bd46a"}) sendmsg$nl_generic(r3, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c0000001d00000000000000fedbdf250500000008000000ac14140fc485e87c0d8a149cd9469336189df457e00636dba7c8495929a13c9bd83e68976bc3c409450122418436c13023fa391d5570d16cc0ec3cdd81c3e19d2b558bedff7c9fed6be52bd89714c34e0883029fd4a5fc4fc78e9592a9c69f24b4a61b7f94e70a7017b76f0397ddd82395caeb4da345"], 0x1c}, 0x1, 0x0, 0x0, 0x811}, 0x4040000) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r2, 0x40106614, &(0x7f0000000180)={0x0, @speck128}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000000)=0x0) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0)={r6}, 0xc) 14:26:41 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r0 = socket$inet(0x2, 0x80002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x8020000) socket$key(0xf, 0x3, 0x2) r1 = semget$private(0x0, 0x6, 0x0) r2 = syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/ipc\x00') semop(r1, &(0x7f0000000100)=[{0x0, 0x0, 0x1800}], 0x1) setns(r2, 0x0) ioctl$sock_ifreq(r0, 0x8916, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x27a, 0x200007fd, &(0x7f0000000080)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xb}}, 0x10) r3 = open(0x0, 0x101000, 0x8) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, &(0x7f00000001c0)={0x1, &(0x7f00000000c0)=[{0x0}]}) ioctl$DRM_IOCTL_NEW_CTX(r3, 0x40086425, &(0x7f0000000200)={r4, 0x1}) r5 = fcntl$getown(r2, 0x9) sched_getparam(r5, &(0x7f0000000580)) ioctl$CAPI_MANUFACTURER_CMD(r0, 0xc0104320, &(0x7f0000000400)={0x4, &(0x7f0000000340)="554c6e0be933cfb0d1073c9c3098d69941d5291258dfcf230c9f661439cdb9bb1a6424ee4fc3238460988de4b08b5b1d60e77480d7376cb8697e2a793d5f85267ff89305e406184c417258e6ecf1e253b66e605fcef9e11ab7e631872ff06305282ad2a0bff462f14ab5813de405e8c852143a364a4fa6360b4a60202c6a116555e70e2c4fa9ccda0542efde096b23fedb2b5a25fa415bd46a"}) sendmsg$nl_generic(r3, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c0000001d00000000000000fedbdf250500000008000000ac14140fc485e87c0d8a149cd9469336189df457e00636dba7c8495929a13c9bd83e68976bc3c409450122418436c13023fa391d5570d16cc0ec3cdd81c3e19d2b558bedff7c9fed6be52bd89714c34e0883029fd4a5fc4fc78e9592a9c69f24b4a61b7f94e70a7017b76f0397ddd82395caeb4da345"], 0x1c}, 0x1, 0x0, 0x0, 0x811}, 0x4040000) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r2, 0x40106614, &(0x7f0000000180)={0x0, @speck128}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000000)=0x0) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0)={r6}, 0xc) 14:26:41 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r0 = socket$inet(0x2, 0x80002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x8020000) socket$key(0xf, 0x3, 0x2) r1 = semget$private(0x0, 0x6, 0x0) r2 = syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/ipc\x00') semop(r1, &(0x7f0000000100)=[{0x0, 0x0, 0x1800}], 0x1) setns(r2, 0x0) ioctl$sock_ifreq(r0, 0x8916, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x27a, 0x200007fd, &(0x7f0000000080)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xb}}, 0x10) r3 = open(0x0, 0x101000, 0x8) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, &(0x7f00000001c0)={0x1, &(0x7f00000000c0)=[{0x0}]}) ioctl$DRM_IOCTL_NEW_CTX(r3, 0x40086425, &(0x7f0000000200)={r4, 0x1}) r5 = fcntl$getown(r2, 0x9) sched_getparam(r5, &(0x7f0000000580)) ioctl$CAPI_MANUFACTURER_CMD(r0, 0xc0104320, &(0x7f0000000400)={0x4, &(0x7f0000000340)="554c6e0be933cfb0d1073c9c3098d69941d5291258dfcf230c9f661439cdb9bb1a6424ee4fc3238460988de4b08b5b1d60e77480d7376cb8697e2a793d5f85267ff89305e406184c417258e6ecf1e253b66e605fcef9e11ab7e631872ff06305282ad2a0bff462f14ab5813de405e8c852143a364a4fa6360b4a60202c6a116555e70e2c4fa9ccda0542efde096b23fedb2b5a25fa415bd46a"}) sendmsg$nl_generic(r3, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c0000001d00000000000000fedbdf250500000008000000ac14140fc485e87c0d8a149cd9469336189df457e00636dba7c8495929a13c9bd83e68976bc3c409450122418436c13023fa391d5570d16cc0ec3cdd81c3e19d2b558bedff7c9fed6be52bd89714c34e0883029fd4a5fc4fc78e9592a9c69f24b4a61b7f94e70a7017b76f0397ddd82395caeb4da345"], 0x1c}, 0x1, 0x0, 0x0, 0x811}, 0x4040000) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r2, 0x40106614, &(0x7f0000000180)={0x0, @speck128}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000000)=0x0) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0)={r6}, 0xc) 14:26:41 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r0 = socket$inet(0x2, 0x80002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x8020000) socket$key(0xf, 0x3, 0x2) r1 = semget$private(0x0, 0x6, 0x0) r2 = syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/ipc\x00') semop(r1, &(0x7f0000000100)=[{0x0, 0x0, 0x1800}], 0x1) setns(r2, 0x0) ioctl$sock_ifreq(r0, 0x8916, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x27a, 0x200007fd, &(0x7f0000000080)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xb}}, 0x10) r3 = open(0x0, 0x101000, 0x8) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, &(0x7f00000001c0)={0x1, &(0x7f00000000c0)=[{0x0}]}) ioctl$DRM_IOCTL_NEW_CTX(r3, 0x40086425, &(0x7f0000000200)={r4, 0x1}) r5 = fcntl$getown(r2, 0x9) sched_getparam(r5, &(0x7f0000000580)) ioctl$CAPI_MANUFACTURER_CMD(r0, 0xc0104320, &(0x7f0000000400)={0x4, &(0x7f0000000340)="554c6e0be933cfb0d1073c9c3098d69941d5291258dfcf230c9f661439cdb9bb1a6424ee4fc3238460988de4b08b5b1d60e77480d7376cb8697e2a793d5f85267ff89305e406184c417258e6ecf1e253b66e605fcef9e11ab7e631872ff06305282ad2a0bff462f14ab5813de405e8c852143a364a4fa6360b4a60202c6a116555e70e2c4fa9ccda0542efde096b23fedb2b5a25fa415bd46a"}) sendmsg$nl_generic(r3, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c0000001d00000000000000fedbdf250500000008000000ac14140fc485e87c0d8a149cd9469336189df457e00636dba7c8495929a13c9bd83e68976bc3c409450122418436c13023fa391d5570d16cc0ec3cdd81c3e19d2b558bedff7c9fed6be52bd89714c34e0883029fd4a5fc4fc78e9592a9c69f24b4a61b7f94e70a7017b76f0397ddd82395caeb4da345"], 0x1c}, 0x1, 0x0, 0x0, 0x811}, 0x4040000) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r2, 0x40106614, &(0x7f0000000180)={0x0, @speck128}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000000)=0x0) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0)={r6}, 0xc) 14:26:42 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r0 = socket$inet(0x2, 0x80002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x8020000) socket$key(0xf, 0x3, 0x2) r1 = semget$private(0x0, 0x6, 0x0) r2 = syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/ipc\x00') semop(r1, &(0x7f0000000100)=[{0x0, 0x0, 0x1800}], 0x1) setns(r2, 0x0) ioctl$sock_ifreq(r0, 0x8916, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x27a, 0x200007fd, &(0x7f0000000080)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xb}}, 0x10) r3 = open(0x0, 0x101000, 0x8) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, &(0x7f00000001c0)={0x1, &(0x7f00000000c0)=[{0x0}]}) ioctl$DRM_IOCTL_NEW_CTX(r3, 0x40086425, &(0x7f0000000200)={r4, 0x1}) r5 = fcntl$getown(r2, 0x9) sched_getparam(r5, &(0x7f0000000580)) ioctl$CAPI_MANUFACTURER_CMD(r0, 0xc0104320, &(0x7f0000000400)={0x4, &(0x7f0000000340)="554c6e0be933cfb0d1073c9c3098d69941d5291258dfcf230c9f661439cdb9bb1a6424ee4fc3238460988de4b08b5b1d60e77480d7376cb8697e2a793d5f85267ff89305e406184c417258e6ecf1e253b66e605fcef9e11ab7e631872ff06305282ad2a0bff462f14ab5813de405e8c852143a364a4fa6360b4a60202c6a116555e70e2c4fa9ccda0542efde096b23fedb2b5a25fa415bd46a"}) sendmsg$nl_generic(r3, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c0000001d00000000000000fedbdf250500000008000000ac14140fc485e87c0d8a149cd9469336189df457e00636dba7c8495929a13c9bd83e68976bc3c409450122418436c13023fa391d5570d16cc0ec3cdd81c3e19d2b558bedff7c9fed6be52bd89714c34e0883029fd4a5fc4fc78e9592a9c69f24b4a61b7f94e70a7017b76f0397ddd82395caeb4da345"], 0x1c}, 0x1, 0x0, 0x0, 0x811}, 0x4040000) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r2, 0x40106614, &(0x7f0000000180)={0x0, @speck128}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000000)=0x0) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0)={r6}, 0xc) 14:26:42 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r0 = socket$inet(0x2, 0x80002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x8020000) socket$key(0xf, 0x3, 0x2) r1 = semget$private(0x0, 0x6, 0x0) r2 = syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/ipc\x00') semop(r1, &(0x7f0000000100)=[{0x0, 0x0, 0x1800}], 0x1) setns(r2, 0x0) ioctl$sock_ifreq(r0, 0x8916, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x27a, 0x200007fd, &(0x7f0000000080)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xb}}, 0x10) r3 = open(0x0, 0x101000, 0x8) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, &(0x7f00000001c0)={0x1, &(0x7f00000000c0)=[{0x0}]}) ioctl$DRM_IOCTL_NEW_CTX(r3, 0x40086425, &(0x7f0000000200)={r4, 0x1}) r5 = fcntl$getown(r2, 0x9) sched_getparam(r5, &(0x7f0000000580)) ioctl$CAPI_MANUFACTURER_CMD(r0, 0xc0104320, &(0x7f0000000400)={0x4, &(0x7f0000000340)="554c6e0be933cfb0d1073c9c3098d69941d5291258dfcf230c9f661439cdb9bb1a6424ee4fc3238460988de4b08b5b1d60e77480d7376cb8697e2a793d5f85267ff89305e406184c417258e6ecf1e253b66e605fcef9e11ab7e631872ff06305282ad2a0bff462f14ab5813de405e8c852143a364a4fa6360b4a60202c6a116555e70e2c4fa9ccda0542efde096b23fedb2b5a25fa415bd46a"}) sendmsg$nl_generic(r3, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c0000001d00000000000000fedbdf250500000008000000ac14140fc485e87c0d8a149cd9469336189df457e00636dba7c8495929a13c9bd83e68976bc3c409450122418436c13023fa391d5570d16cc0ec3cdd81c3e19d2b558bedff7c9fed6be52bd89714c34e0883029fd4a5fc4fc78e9592a9c69f24b4a61b7f94e70a7017b76f0397ddd82395caeb4da345"], 0x1c}, 0x1, 0x0, 0x0, 0x811}, 0x4040000) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r2, 0x40106614, &(0x7f0000000180)={0x0, @speck128}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000000)=0x0) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0)={r6}, 0xc) 14:26:42 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r0 = socket$inet(0x2, 0x80002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x8020000) socket$key(0xf, 0x3, 0x2) r1 = semget$private(0x0, 0x6, 0x0) r2 = syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/ipc\x00') semop(r1, &(0x7f0000000100)=[{0x0, 0x0, 0x1800}], 0x1) setns(r2, 0x0) ioctl$sock_ifreq(r0, 0x8916, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x27a, 0x200007fd, &(0x7f0000000080)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xb}}, 0x10) r3 = open(0x0, 0x101000, 0x8) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, &(0x7f00000001c0)={0x1, &(0x7f00000000c0)=[{0x0}]}) ioctl$DRM_IOCTL_NEW_CTX(r3, 0x40086425, &(0x7f0000000200)={r4, 0x1}) r5 = fcntl$getown(r2, 0x9) sched_getparam(r5, &(0x7f0000000580)) ioctl$CAPI_MANUFACTURER_CMD(r0, 0xc0104320, &(0x7f0000000400)={0x4, &(0x7f0000000340)="554c6e0be933cfb0d1073c9c3098d69941d5291258dfcf230c9f661439cdb9bb1a6424ee4fc3238460988de4b08b5b1d60e77480d7376cb8697e2a793d5f85267ff89305e406184c417258e6ecf1e253b66e605fcef9e11ab7e631872ff06305282ad2a0bff462f14ab5813de405e8c852143a364a4fa6360b4a60202c6a116555e70e2c4fa9ccda0542efde096b23fedb2b5a25fa415bd46a"}) sendmsg$nl_generic(r3, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c0000001d00000000000000fedbdf250500000008000000ac14140fc485e87c0d8a149cd9469336189df457e00636dba7c8495929a13c9bd83e68976bc3c409450122418436c13023fa391d5570d16cc0ec3cdd81c3e19d2b558bedff7c9fed6be52bd89714c34e0883029fd4a5fc4fc78e9592a9c69f24b4a61b7f94e70a7017b76f0397ddd82395caeb4da345"], 0x1c}, 0x1, 0x0, 0x0, 0x811}, 0x4040000) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r2, 0x40106614, &(0x7f0000000180)={0x0, @speck128}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000000)=0x0) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0)={r6}, 0xc) 14:26:42 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r0 = socket$inet(0x2, 0x80002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x8020000) socket$key(0xf, 0x3, 0x2) r1 = semget$private(0x0, 0x6, 0x0) r2 = syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/ipc\x00') semop(r1, &(0x7f0000000100)=[{0x0, 0x0, 0x1800}], 0x1) setns(r2, 0x0) ioctl$sock_ifreq(r0, 0x8916, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x27a, 0x200007fd, &(0x7f0000000080)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xb}}, 0x10) r3 = open(0x0, 0x101000, 0x8) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, &(0x7f00000001c0)={0x1, &(0x7f00000000c0)=[{0x0}]}) ioctl$DRM_IOCTL_NEW_CTX(r3, 0x40086425, &(0x7f0000000200)={r4, 0x1}) r5 = fcntl$getown(r2, 0x9) sched_getparam(r5, &(0x7f0000000580)) ioctl$CAPI_MANUFACTURER_CMD(r0, 0xc0104320, &(0x7f0000000400)={0x4, &(0x7f0000000340)="554c6e0be933cfb0d1073c9c3098d69941d5291258dfcf230c9f661439cdb9bb1a6424ee4fc3238460988de4b08b5b1d60e77480d7376cb8697e2a793d5f85267ff89305e406184c417258e6ecf1e253b66e605fcef9e11ab7e631872ff06305282ad2a0bff462f14ab5813de405e8c852143a364a4fa6360b4a60202c6a116555e70e2c4fa9ccda0542efde096b23fedb2b5a25fa415bd46a"}) sendmsg$nl_generic(r3, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c0000001d00000000000000fedbdf250500000008000000ac14140fc485e87c0d8a149cd9469336189df457e00636dba7c8495929a13c9bd83e68976bc3c409450122418436c13023fa391d5570d16cc0ec3cdd81c3e19d2b558bedff7c9fed6be52bd89714c34e0883029fd4a5fc4fc78e9592a9c69f24b4a61b7f94e70a7017b76f0397ddd82395caeb4da345"], 0x1c}, 0x1, 0x0, 0x0, 0x811}, 0x4040000) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r2, 0x40106614, &(0x7f0000000180)={0x0, @speck128}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000000)=0x0) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0)={r6}, 0xc) 14:26:42 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r0 = socket$inet(0x2, 0x80002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x8020000) socket$key(0xf, 0x3, 0x2) r1 = semget$private(0x0, 0x6, 0x0) r2 = syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/ipc\x00') semop(r1, &(0x7f0000000100)=[{0x0, 0x0, 0x1800}], 0x1) setns(r2, 0x0) ioctl$sock_ifreq(r0, 0x8916, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x27a, 0x200007fd, &(0x7f0000000080)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xb}}, 0x10) r3 = open(0x0, 0x101000, 0x8) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, &(0x7f00000001c0)={0x1, &(0x7f00000000c0)=[{0x0}]}) ioctl$DRM_IOCTL_NEW_CTX(r3, 0x40086425, &(0x7f0000000200)={r4, 0x1}) r5 = fcntl$getown(r2, 0x9) sched_getparam(r5, &(0x7f0000000580)) ioctl$CAPI_MANUFACTURER_CMD(r0, 0xc0104320, &(0x7f0000000400)={0x4, &(0x7f0000000340)="554c6e0be933cfb0d1073c9c3098d69941d5291258dfcf230c9f661439cdb9bb1a6424ee4fc3238460988de4b08b5b1d60e77480d7376cb8697e2a793d5f85267ff89305e406184c417258e6ecf1e253b66e605fcef9e11ab7e631872ff06305282ad2a0bff462f14ab5813de405e8c852143a364a4fa6360b4a60202c6a116555e70e2c4fa9ccda0542efde096b23fedb2b5a25fa415bd46a"}) sendmsg$nl_generic(r3, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c0000001d00000000000000fedbdf250500000008000000ac14140fc485e87c0d8a149cd9469336189df457e00636dba7c8495929a13c9bd83e68976bc3c409450122418436c13023fa391d5570d16cc0ec3cdd81c3e19d2b558bedff7c9fed6be52bd89714c34e0883029fd4a5fc4fc78e9592a9c69f24b4a61b7f94e70a7017b76f0397ddd82395caeb4da345"], 0x1c}, 0x1, 0x0, 0x0, 0x811}, 0x4040000) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r2, 0x40106614, &(0x7f0000000180)={0x0, @speck128}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000000)=0x0) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0)={r6}, 0xc) 14:26:42 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r0 = socket$inet(0x2, 0x80002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x8020000) socket$key(0xf, 0x3, 0x2) r1 = semget$private(0x0, 0x6, 0x0) r2 = syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/ipc\x00') semop(r1, &(0x7f0000000100)=[{0x0, 0x0, 0x1800}], 0x1) setns(r2, 0x0) ioctl$sock_ifreq(r0, 0x8916, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x27a, 0x200007fd, &(0x7f0000000080)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xb}}, 0x10) r3 = open(0x0, 0x101000, 0x8) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, &(0x7f00000001c0)={0x1, &(0x7f00000000c0)=[{0x0}]}) ioctl$DRM_IOCTL_NEW_CTX(r3, 0x40086425, &(0x7f0000000200)={r4, 0x1}) r5 = fcntl$getown(r2, 0x9) sched_getparam(r5, &(0x7f0000000580)) ioctl$CAPI_MANUFACTURER_CMD(r0, 0xc0104320, &(0x7f0000000400)={0x4, &(0x7f0000000340)="554c6e0be933cfb0d1073c9c3098d69941d5291258dfcf230c9f661439cdb9bb1a6424ee4fc3238460988de4b08b5b1d60e77480d7376cb8697e2a793d5f85267ff89305e406184c417258e6ecf1e253b66e605fcef9e11ab7e631872ff06305282ad2a0bff462f14ab5813de405e8c852143a364a4fa6360b4a60202c6a116555e70e2c4fa9ccda0542efde096b23fedb2b5a25fa415bd46a"}) sendmsg$nl_generic(r3, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c0000001d00000000000000fedbdf250500000008000000ac14140fc485e87c0d8a149cd9469336189df457e00636dba7c8495929a13c9bd83e68976bc3c409450122418436c13023fa391d5570d16cc0ec3cdd81c3e19d2b558bedff7c9fed6be52bd89714c34e0883029fd4a5fc4fc78e9592a9c69f24b4a61b7f94e70a7017b76f0397ddd82395caeb4da345"], 0x1c}, 0x1, 0x0, 0x0, 0x811}, 0x4040000) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r2, 0x40106614, &(0x7f0000000180)={0x0, @speck128}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000000)=0x0) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0)={r6}, 0xc) 14:26:42 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r0 = socket$inet(0x2, 0x80002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x8020000) socket$key(0xf, 0x3, 0x2) r1 = semget$private(0x0, 0x6, 0x0) r2 = syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/ipc\x00') semop(r1, &(0x7f0000000100)=[{0x0, 0x0, 0x1800}], 0x1) setns(r2, 0x0) ioctl$sock_ifreq(r0, 0x8916, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x27a, 0x200007fd, &(0x7f0000000080)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xb}}, 0x10) r3 = open(0x0, 0x101000, 0x8) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, &(0x7f00000001c0)={0x1, &(0x7f00000000c0)=[{0x0}]}) ioctl$DRM_IOCTL_NEW_CTX(r3, 0x40086425, &(0x7f0000000200)={r4, 0x1}) r5 = fcntl$getown(r2, 0x9) sched_getparam(r5, &(0x7f0000000580)) ioctl$CAPI_MANUFACTURER_CMD(r0, 0xc0104320, &(0x7f0000000400)={0x4, &(0x7f0000000340)="554c6e0be933cfb0d1073c9c3098d69941d5291258dfcf230c9f661439cdb9bb1a6424ee4fc3238460988de4b08b5b1d60e77480d7376cb8697e2a793d5f85267ff89305e406184c417258e6ecf1e253b66e605fcef9e11ab7e631872ff06305282ad2a0bff462f14ab5813de405e8c852143a364a4fa6360b4a60202c6a116555e70e2c4fa9ccda0542efde096b23fedb2b5a25fa415bd46a"}) sendmsg$nl_generic(r3, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c0000001d00000000000000fedbdf250500000008000000ac14140fc485e87c0d8a149cd9469336189df457e00636dba7c8495929a13c9bd83e68976bc3c409450122418436c13023fa391d5570d16cc0ec3cdd81c3e19d2b558bedff7c9fed6be52bd89714c34e0883029fd4a5fc4fc78e9592a9c69f24b4a61b7f94e70a7017b76f0397ddd82395caeb4da345"], 0x1c}, 0x1, 0x0, 0x0, 0x811}, 0x4040000) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r2, 0x40106614, &(0x7f0000000180)={0x0, @speck128}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000000)=0x0) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0)={r6}, 0xc) 14:26:42 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r0 = socket$inet(0x2, 0x80002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x8020000) socket$key(0xf, 0x3, 0x2) r1 = semget$private(0x0, 0x6, 0x0) r2 = syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/ipc\x00') semop(r1, &(0x7f0000000100)=[{0x0, 0x0, 0x1800}], 0x1) setns(r2, 0x0) ioctl$sock_ifreq(r0, 0x8916, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x27a, 0x200007fd, &(0x7f0000000080)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xb}}, 0x10) r3 = open(0x0, 0x101000, 0x8) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, &(0x7f00000001c0)={0x1, &(0x7f00000000c0)=[{0x0}]}) ioctl$DRM_IOCTL_NEW_CTX(r3, 0x40086425, &(0x7f0000000200)={r4, 0x1}) r5 = fcntl$getown(r2, 0x9) sched_getparam(r5, &(0x7f0000000580)) ioctl$CAPI_MANUFACTURER_CMD(r0, 0xc0104320, &(0x7f0000000400)={0x4, &(0x7f0000000340)="554c6e0be933cfb0d1073c9c3098d69941d5291258dfcf230c9f661439cdb9bb1a6424ee4fc3238460988de4b08b5b1d60e77480d7376cb8697e2a793d5f85267ff89305e406184c417258e6ecf1e253b66e605fcef9e11ab7e631872ff06305282ad2a0bff462f14ab5813de405e8c852143a364a4fa6360b4a60202c6a116555e70e2c4fa9ccda0542efde096b23fedb2b5a25fa415bd46a"}) sendmsg$nl_generic(r3, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c0000001d00000000000000fedbdf250500000008000000ac14140fc485e87c0d8a149cd9469336189df457e00636dba7c8495929a13c9bd83e68976bc3c409450122418436c13023fa391d5570d16cc0ec3cdd81c3e19d2b558bedff7c9fed6be52bd89714c34e0883029fd4a5fc4fc78e9592a9c69f24b4a61b7f94e70a7017b76f0397ddd82395caeb4da345"], 0x1c}, 0x1, 0x0, 0x0, 0x811}, 0x4040000) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r2, 0x40106614, &(0x7f0000000180)={0x0, @speck128}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000000)=0x0) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0)={r6}, 0xc) 14:26:42 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_LAPIC(r3, 0x4400ae8f, &(0x7f0000000580)={"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"}) ioctl$KVM_RUN(r3, 0xae80, 0x0) 14:26:42 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r0 = socket$inet(0x2, 0x80002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x8020000) socket$key(0xf, 0x3, 0x2) r1 = semget$private(0x0, 0x6, 0x0) r2 = syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/ipc\x00') semop(r1, &(0x7f0000000100)=[{0x0, 0x0, 0x1800}], 0x1) setns(r2, 0x0) ioctl$sock_ifreq(r0, 0x8916, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x27a, 0x200007fd, &(0x7f0000000080)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xb}}, 0x10) r3 = open(0x0, 0x101000, 0x8) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, &(0x7f00000001c0)={0x1, &(0x7f00000000c0)=[{0x0}]}) ioctl$DRM_IOCTL_NEW_CTX(r3, 0x40086425, &(0x7f0000000200)={r4, 0x1}) r5 = fcntl$getown(r2, 0x9) sched_getparam(r5, &(0x7f0000000580)) ioctl$CAPI_MANUFACTURER_CMD(r0, 0xc0104320, &(0x7f0000000400)={0x4, &(0x7f0000000340)="554c6e0be933cfb0d1073c9c3098d69941d5291258dfcf230c9f661439cdb9bb1a6424ee4fc3238460988de4b08b5b1d60e77480d7376cb8697e2a793d5f85267ff89305e406184c417258e6ecf1e253b66e605fcef9e11ab7e631872ff06305282ad2a0bff462f14ab5813de405e8c852143a364a4fa6360b4a60202c6a116555e70e2c4fa9ccda0542efde096b23fedb2b5a25fa415bd46a"}) sendmsg$nl_generic(r3, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c0000001d00000000000000fedbdf250500000008000000ac14140fc485e87c0d8a149cd9469336189df457e00636dba7c8495929a13c9bd83e68976bc3c409450122418436c13023fa391d5570d16cc0ec3cdd81c3e19d2b558bedff7c9fed6be52bd89714c34e0883029fd4a5fc4fc78e9592a9c69f24b4a61b7f94e70a7017b76f0397ddd82395caeb4da345"], 0x1c}, 0x1, 0x0, 0x0, 0x811}, 0x4040000) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r2, 0x40106614, &(0x7f0000000180)={0x0, @speck128}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000000)=0x0) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0)={r6}, 0xc) 14:26:42 executing program 5: sendmsg(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x3e0, &(0x7f0000000040), 0x1}, 0x0) r0 = socket(0x1000000010, 0x80002, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000080)="4c0000001200ffd5acae259567a2830007a600800000000000000068354046002c001d000cfa1a1ff2a7a5ff34cb5f39a7f32314c7a4bb5dec30de33a49868c62a2ca63d0000000000000000", 0x4c}], 0x1, 0x0, 0x49}, 0x0) sendmmsg$alg(r0, &(0x7f0000000200), 0x10efe10675dec16, 0x0) 14:26:42 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r0 = socket$inet(0x2, 0x80002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x8020000) socket$key(0xf, 0x3, 0x2) r1 = semget$private(0x0, 0x6, 0x0) r2 = syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/ipc\x00') semop(r1, &(0x7f0000000100)=[{0x0, 0x0, 0x1800}], 0x1) setns(r2, 0x0) ioctl$sock_ifreq(r0, 0x8916, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x27a, 0x200007fd, &(0x7f0000000080)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xb}}, 0x10) r3 = open(0x0, 0x101000, 0x8) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, &(0x7f00000001c0)={0x1, &(0x7f00000000c0)=[{0x0}]}) ioctl$DRM_IOCTL_NEW_CTX(r3, 0x40086425, &(0x7f0000000200)={r4, 0x1}) r5 = fcntl$getown(r2, 0x9) sched_getparam(r5, &(0x7f0000000580)) ioctl$CAPI_MANUFACTURER_CMD(r0, 0xc0104320, &(0x7f0000000400)={0x4, &(0x7f0000000340)="554c6e0be933cfb0d1073c9c3098d69941d5291258dfcf230c9f661439cdb9bb1a6424ee4fc3238460988de4b08b5b1d60e77480d7376cb8697e2a793d5f85267ff89305e406184c417258e6ecf1e253b66e605fcef9e11ab7e631872ff06305282ad2a0bff462f14ab5813de405e8c852143a364a4fa6360b4a60202c6a116555e70e2c4fa9ccda0542efde096b23fedb2b5a25fa415bd46a"}) sendmsg$nl_generic(r3, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c0000001d00000000000000fedbdf250500000008000000ac14140fc485e87c0d8a149cd9469336189df457e00636dba7c8495929a13c9bd83e68976bc3c409450122418436c13023fa391d5570d16cc0ec3cdd81c3e19d2b558bedff7c9fed6be52bd89714c34e0883029fd4a5fc4fc78e9592a9c69f24b4a61b7f94e70a7017b76f0397ddd82395caeb4da345"], 0x1c}, 0x1, 0x0, 0x0, 0x811}, 0x4040000) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r2, 0x40106614, &(0x7f0000000180)={0x0, @speck128}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000000)=0x0) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0)={r6}, 0xc) 14:26:42 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_LAPIC(r3, 0x4400ae8f, &(0x7f0000000580)={"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"}) ioctl$KVM_RUN(r3, 0xae80, 0x0) 14:26:42 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r0 = socket$inet(0x2, 0x80002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x8020000) socket$key(0xf, 0x3, 0x2) r1 = semget$private(0x0, 0x6, 0x0) r2 = syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/ipc\x00') semop(r1, &(0x7f0000000100)=[{0x0, 0x0, 0x1800}], 0x1) setns(r2, 0x0) ioctl$sock_ifreq(r0, 0x8916, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x27a, 0x200007fd, &(0x7f0000000080)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xb}}, 0x10) r3 = open(0x0, 0x101000, 0x8) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, &(0x7f00000001c0)={0x1, &(0x7f00000000c0)=[{0x0}]}) ioctl$DRM_IOCTL_NEW_CTX(r3, 0x40086425, &(0x7f0000000200)={r4, 0x1}) r5 = fcntl$getown(r2, 0x9) sched_getparam(r5, &(0x7f0000000580)) ioctl$CAPI_MANUFACTURER_CMD(r0, 0xc0104320, &(0x7f0000000400)={0x4, &(0x7f0000000340)="554c6e0be933cfb0d1073c9c3098d69941d5291258dfcf230c9f661439cdb9bb1a6424ee4fc3238460988de4b08b5b1d60e77480d7376cb8697e2a793d5f85267ff89305e406184c417258e6ecf1e253b66e605fcef9e11ab7e631872ff06305282ad2a0bff462f14ab5813de405e8c852143a364a4fa6360b4a60202c6a116555e70e2c4fa9ccda0542efde096b23fedb2b5a25fa415bd46a"}) sendmsg$nl_generic(r3, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c0000001d00000000000000fedbdf250500000008000000ac14140fc485e87c0d8a149cd9469336189df457e00636dba7c8495929a13c9bd83e68976bc3c409450122418436c13023fa391d5570d16cc0ec3cdd81c3e19d2b558bedff7c9fed6be52bd89714c34e0883029fd4a5fc4fc78e9592a9c69f24b4a61b7f94e70a7017b76f0397ddd82395caeb4da345"], 0x1c}, 0x1, 0x0, 0x0, 0x811}, 0x4040000) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r2, 0x40106614, &(0x7f0000000180)={0x0, @speck128}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000000)=0x0) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0)={r6}, 0xc) 14:26:42 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r0 = socket$inet(0x2, 0x80002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x8020000) socket$key(0xf, 0x3, 0x2) r1 = semget$private(0x0, 0x6, 0x0) r2 = syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/ipc\x00') semop(r1, &(0x7f0000000100)=[{0x0, 0x0, 0x1800}], 0x1) setns(r2, 0x0) ioctl$sock_ifreq(r0, 0x8916, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x27a, 0x200007fd, &(0x7f0000000080)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xb}}, 0x10) r3 = open(0x0, 0x101000, 0x8) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, &(0x7f00000001c0)={0x1, &(0x7f00000000c0)=[{0x0}]}) ioctl$DRM_IOCTL_NEW_CTX(r3, 0x40086425, &(0x7f0000000200)={r4, 0x1}) r5 = fcntl$getown(r2, 0x9) sched_getparam(r5, &(0x7f0000000580)) ioctl$CAPI_MANUFACTURER_CMD(r0, 0xc0104320, &(0x7f0000000400)={0x4, &(0x7f0000000340)="554c6e0be933cfb0d1073c9c3098d69941d5291258dfcf230c9f661439cdb9bb1a6424ee4fc3238460988de4b08b5b1d60e77480d7376cb8697e2a793d5f85267ff89305e406184c417258e6ecf1e253b66e605fcef9e11ab7e631872ff06305282ad2a0bff462f14ab5813de405e8c852143a364a4fa6360b4a60202c6a116555e70e2c4fa9ccda0542efde096b23fedb2b5a25fa415bd46a"}) sendmsg$nl_generic(r3, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c0000001d00000000000000fedbdf250500000008000000ac14140fc485e87c0d8a149cd9469336189df457e00636dba7c8495929a13c9bd83e68976bc3c409450122418436c13023fa391d5570d16cc0ec3cdd81c3e19d2b558bedff7c9fed6be52bd89714c34e0883029fd4a5fc4fc78e9592a9c69f24b4a61b7f94e70a7017b76f0397ddd82395caeb4da345"], 0x1c}, 0x1, 0x0, 0x0, 0x811}, 0x4040000) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r2, 0x40106614, &(0x7f0000000180)={0x0, @speck128}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000000)=0x0) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0)={r6}, 0xc) [ 344.219774][T28000] netlink: 'syz-executor.5': attribute type 29 has an invalid length. [ 344.248676][T28000] netlink: 'syz-executor.5': attribute type 29 has an invalid length. 14:26:42 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_LAPIC(r3, 0x4400ae8f, &(0x7f0000000580)={"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"}) ioctl$KVM_RUN(r3, 0xae80, 0x0) 14:26:42 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_LAPIC(r3, 0x4400ae8f, &(0x7f0000000580)={"6cdd4237dd245c8404721efdc9c8dc1964125fa96fa42b761c6ec25b2bec0ba4c81036c93a40c8a4d4412a763b00040000000000003c5ca206c047ecee377abaece6b88378e3d63a98fc191f361d264ffa8b46485f02baee1ab6b8154252066178868d1ef4b5365c5dc26ca097ddda7c21a984c2b9ca4bbb7a87165c0c1dbc75d7ea4df10000174a3ac8694525952f44500a1f0db509c32cc7ace842c28f37f06e4ea9f1e5f0c6c379f9cc58bf69fcde318ead4825aa1b6a832d4e48cc41bb5a6baa41d614f6c8941bee805954a62d196a4e8d41f6b21224b57f530d0000c1ff53bf79a1f5c5dc34b2262d66ae793b6304a30b97077f1c131045cbc11c4562d22db88d0edc5daee171cc04d96d9ec2db07478f347edbd6404923ad4a5672b1b285c7988c4ec0922c655ff600000000c00dc290d936d93236051fadfb4b95d02c0bda7ce38dabb7cd103fe4d0c9c963cd717a77f8df8d46099b1f58e068af6afbbc19db161c6df3e7c9c71bc08a282fc2c142856b5e4caff4c0a4f72445ef10dcd2c569319d6e9bb2058d023f669a64fc7d9684b45b00000000364673dcfa9235ea5a2ff23c4bb5c5acb290e8976dcac779ff000000000000003d4e185afe28b774b99d3890bd37428617de4cdd6f53c419ce31054182fd098af7b7f1b1152c691611f897558d4b755cb783978d9859b0537b05b623dcb5c4ca9317471a40fa4998cca80e961efffb4e1aa25d8a17deef0c8694c4395fc99be3c3fe7aeb8af4929ce7d346ca62b25d48fda5d10146702f78b233b5208752726ed9f0c340d494b92d19cc930bb8a5f8b4da8f4603ac0c3b698384e17a570dc8524823ed15af4ecfabb4b2541d3c114b7bba1c21a845c9cf0d1cc24aba47e30f558b2246ad95ccf7d2f80cc0ab26f08336ea1a33b79cf35b898837016eb211a1734c7af076e15451e33519fc978f66df7df4557c91024a8dc130a28ef5f63ad07b39c8d23b85cf434e065e8a29a800655d127de6f6347b4951f97b5703dc78b1ca9d74ea6a9ae12ab367c0de2659cc38d2f33ddd86e0597d33361eada119b5132145fa4525c488c7fffd6ceda6e9a02ebd97ced6b0161f2cc84615ceb8b18883299c636e9e46724a9a0600a8bb02f3e489631d522019a35fe12a33caf9dd8768ddbc02a484c345c3eff254297b1dbb04989c3f9f3c7b3c985c39b1d313018068d3809bac8c657e39f4f692613e28387e955722908dd88b56163be8312ff47c5b6f280472935af74e97a5a8110a4d74496f4c8ec82ddb56d9b962d2fc43fa01a047526865c84f7cff36056cc4ac258021e1581d43badaaec6cc5a2ef989de9801fed6d4be2bfcfe07a69c46bffbe9dd03970800000000000000d372bdd6d89dc1ecf63c23d506114d0fba2bd1c69e8f7e3fccdcda85ce975ec1381b1cec6ddaa76e186719d8191643"}) ioctl$KVM_RUN(r3, 0xae80, 0x0) 14:26:42 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_LAPIC(r3, 0x4400ae8f, &(0x7f0000000580)={"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"}) ioctl$KVM_RUN(r3, 0xae80, 0x0) 14:26:42 executing program 5: sendmsg(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x3e0, &(0x7f0000000040), 0x1}, 0x0) r0 = socket(0x1000000010, 0x80002, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000080)="4c0000001200ffd5acae259567a2830007a600800000000000000068354046002c001d000cfa1a1ff2a7a5ff34cb5f39a7f32314c7a4bb5dec30de33a49868c62a2ca63d0000000000000000", 0x4c}], 0x1, 0x0, 0x49}, 0x0) sendmmsg$alg(r0, &(0x7f0000000200), 0x10efe10675dec16, 0x0) 14:26:42 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x4, 0x31, 0xffffffffffffffff, 0x0) futex(&(0x7f0000000000), 0x8c, 0x1, 0x0, &(0x7f00000000c0), 0x0) 14:26:42 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r0 = socket$inet(0x2, 0x80002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x8020000) socket$key(0xf, 0x3, 0x2) r1 = semget$private(0x0, 0x6, 0x0) r2 = syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/ipc\x00') semop(r1, &(0x7f0000000100)=[{0x0, 0x0, 0x1800}], 0x1) setns(r2, 0x0) ioctl$sock_ifreq(r0, 0x8916, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x27a, 0x200007fd, &(0x7f0000000080)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xb}}, 0x10) r3 = open(0x0, 0x101000, 0x8) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, &(0x7f00000001c0)={0x1, &(0x7f00000000c0)=[{0x0}]}) ioctl$DRM_IOCTL_NEW_CTX(r3, 0x40086425, &(0x7f0000000200)={r4, 0x1}) r5 = fcntl$getown(r2, 0x9) sched_getparam(r5, &(0x7f0000000580)) ioctl$CAPI_MANUFACTURER_CMD(r0, 0xc0104320, &(0x7f0000000400)={0x4, &(0x7f0000000340)="554c6e0be933cfb0d1073c9c3098d69941d5291258dfcf230c9f661439cdb9bb1a6424ee4fc3238460988de4b08b5b1d60e77480d7376cb8697e2a793d5f85267ff89305e406184c417258e6ecf1e253b66e605fcef9e11ab7e631872ff06305282ad2a0bff462f14ab5813de405e8c852143a364a4fa6360b4a60202c6a116555e70e2c4fa9ccda0542efde096b23fedb2b5a25fa415bd46a"}) sendmsg$nl_generic(r3, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c0000001d00000000000000fedbdf250500000008000000ac14140fc485e87c0d8a149cd9469336189df457e00636dba7c8495929a13c9bd83e68976bc3c409450122418436c13023fa391d5570d16cc0ec3cdd81c3e19d2b558bedff7c9fed6be52bd89714c34e0883029fd4a5fc4fc78e9592a9c69f24b4a61b7f94e70a7017b76f0397ddd82395caeb4da345"], 0x1c}, 0x1, 0x0, 0x0, 0x811}, 0x4040000) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r2, 0x40106614, &(0x7f0000000180)={0x0, @speck128}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000000)=0x0) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0)={r6}, 0xc) 14:26:42 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x4, 0x31, 0xffffffffffffffff, 0x0) futex(&(0x7f0000000000), 0x8c, 0x1, 0x0, &(0x7f00000000c0), 0x0) 14:26:42 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_LAPIC(r3, 0x4400ae8f, &(0x7f0000000580)={"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"}) ioctl$KVM_RUN(r3, 0xae80, 0x0) 14:26:42 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_LAPIC(r3, 0x4400ae8f, &(0x7f0000000580)={"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"}) ioctl$KVM_RUN(r3, 0xae80, 0x0) [ 344.616953][T28032] netlink: 'syz-executor.5': attribute type 29 has an invalid length. 14:26:42 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_LAPIC(r3, 0x4400ae8f, &(0x7f0000000580)={"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"}) ioctl$KVM_RUN(r3, 0xae80, 0x0) [ 344.707452][T28032] netlink: 'syz-executor.5': attribute type 29 has an invalid length. 14:26:43 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x4, 0x31, 0xffffffffffffffff, 0x0) futex(&(0x7f0000000000), 0x8c, 0x1, 0x0, &(0x7f00000000c0), 0x0) 14:26:43 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_LAPIC(r3, 0x4400ae8f, &(0x7f0000000580)={"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"}) ioctl$KVM_RUN(r3, 0xae80, 0x0) 14:26:43 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_LAPIC(r3, 0x4400ae8f, &(0x7f0000000580)={"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"}) ioctl$KVM_RUN(r3, 0xae80, 0x0) 14:26:43 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x4, 0x31, 0xffffffffffffffff, 0x0) futex(&(0x7f0000000000), 0x8c, 0x1, 0x0, &(0x7f00000000c0), 0x0) 14:26:43 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x4, 0x31, 0xffffffffffffffff, 0x0) futex(&(0x7f0000000000), 0x8c, 0x1, 0x0, &(0x7f00000000c0), 0x0) 14:26:43 executing program 5: sendmsg(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x3e0, &(0x7f0000000040), 0x1}, 0x0) r0 = socket(0x1000000010, 0x80002, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000080)="4c0000001200ffd5acae259567a2830007a600800000000000000068354046002c001d000cfa1a1ff2a7a5ff34cb5f39a7f32314c7a4bb5dec30de33a49868c62a2ca63d0000000000000000", 0x4c}], 0x1, 0x0, 0x49}, 0x0) sendmmsg$alg(r0, &(0x7f0000000200), 0x10efe10675dec16, 0x0) 14:26:43 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/mnt\x00') 14:26:43 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x4, 0x31, 0xffffffffffffffff, 0x0) futex(&(0x7f0000000000), 0x8c, 0x1, 0x0, &(0x7f00000000c0), 0x0) 14:26:43 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=ANY=[]}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='\x00\x00\x00\x00H') r1 = openat$cgroup_ro(r0, &(0x7f0000000180)='mem\x00\x01y7swaS.cur\x89\xc9B\xab\xe3\xfarent\x00\x1aw\xb7\xc3B\xef\xf0\xd5\xf34|\x98.\x857Y\xab[d\xfa\x83\xdf\xc6\xf3\xb5\xab\xbb\x98y\xe7\xff\x87o\xb2\xfe\xd0\x9d\x9a\x89\xfe\xc4\x1d\x92|z\xbc\nl%\x97,#\xab3aEW\x18A3@\x94\x05%Y\x1d\x90\xf3\xc8\x89\x9a.\x7fm5\xaa\b\xceo\t\xcc\x98\xb7\x18\x90\x1cM\x91\x0fzb\x85\xb5$\x86\xe4\xd9\x1bJ\x1f\xf0>\x18\xed\xb0\r.8\xaa\x92\xc7cw\xd6\xaf\xbe\x1d\x04$\xecAb\b\xcf\xd40\xe8qg\xc5\x18\xd1\x8f\xe6D\xa8\x00\xf6H|y\xa1\x0f\xde\xe3\xbb\'\xb1\x02\x00\xc8p\xbfQh\"\n=\x90\xf9vUo9\x85\xb3\xa9\xec\xda\xc2\x99\xbe8\x9f[*\x80\xb7%\x9d33\xb9\xc3\xf0\x11!\x11\xc3\xa5$<\xcfC\x91|\x05\x1aO\xb4\xf0_\xbd>\xf3[\xbb[\x058\x01\xf4\xca\xf4(\xab8\x87R\xc8\xe0l\xce\x930\xec\xf5\x8f\xb0%I\xb7\x7f[\\i\xfb\x96d\xa1aA\x97j\xc3\xef\xb65\xc0e\xb2%\x1f\xba}\x0e$\x16\xbcw\xff&DRYp\xb8\xdb\x00\x00\x00\x00\x00\x00\x00\x18i\xffHw\xea\x9d\x86\x0e\bl5\x945\xab\xd3\xef\x11\xbd\"\xbcs\x8b\xf2.:\x8c\xe2\xb2\a\xac\x8b\x19\x80\x8b\xa3&\x19\x16\x80\xa1\x88\xbe\xc3\x0f\xf3\xb7V]\x89e\xf2D\xf6T\xc0\xb8/\xa5\x11\x15\x8cqV/', 0x0, 0x0) preadv(r1, &(0x7f00000024c0)=[{0x0}, {&(0x7f0000000340)=""/4096, 0x1000}], 0x1000000000000220, 0x800000) 14:26:43 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @random="cd5f3a8d822a"}, 0x14) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f00000000c0)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f0000000000)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0xacf0) 14:26:43 executing program 0: syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)={[{@fat=@dmask={'dmask', 0x3d, 0xffffffff}}]}) 14:26:43 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x4, 0x31, 0xffffffffffffffff, 0x0) futex(&(0x7f0000000000), 0x8c, 0x1, 0x0, &(0x7f00000000c0), 0x0) 14:26:43 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) close(r0) syz_open_dev$video4linux(&(0x7f0000000080)='/dev/v4l-subdev#\x00', 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r0, r4, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) [ 345.100430][T28082] netlink: 'syz-executor.5': attribute type 29 has an invalid length. 14:26:43 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/mnt\x00') 14:26:43 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=ANY=[]}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='\x00\x00\x00\x00H') r1 = openat$cgroup_ro(r0, &(0x7f0000000180)='mem\x00\x01y7swaS.cur\x89\xc9B\xab\xe3\xfarent\x00\x1aw\xb7\xc3B\xef\xf0\xd5\xf34|\x98.\x857Y\xab[d\xfa\x83\xdf\xc6\xf3\xb5\xab\xbb\x98y\xe7\xff\x87o\xb2\xfe\xd0\x9d\x9a\x89\xfe\xc4\x1d\x92|z\xbc\nl%\x97,#\xab3aEW\x18A3@\x94\x05%Y\x1d\x90\xf3\xc8\x89\x9a.\x7fm5\xaa\b\xceo\t\xcc\x98\xb7\x18\x90\x1cM\x91\x0fzb\x85\xb5$\x86\xe4\xd9\x1bJ\x1f\xf0>\x18\xed\xb0\r.8\xaa\x92\xc7cw\xd6\xaf\xbe\x1d\x04$\xecAb\b\xcf\xd40\xe8qg\xc5\x18\xd1\x8f\xe6D\xa8\x00\xf6H|y\xa1\x0f\xde\xe3\xbb\'\xb1\x02\x00\xc8p\xbfQh\"\n=\x90\xf9vUo9\x85\xb3\xa9\xec\xda\xc2\x99\xbe8\x9f[*\x80\xb7%\x9d33\xb9\xc3\xf0\x11!\x11\xc3\xa5$<\xcfC\x91|\x05\x1aO\xb4\xf0_\xbd>\xf3[\xbb[\x058\x01\xf4\xca\xf4(\xab8\x87R\xc8\xe0l\xce\x930\xec\xf5\x8f\xb0%I\xb7\x7f[\\i\xfb\x96d\xa1aA\x97j\xc3\xef\xb65\xc0e\xb2%\x1f\xba}\x0e$\x16\xbcw\xff&DRYp\xb8\xdb\x00\x00\x00\x00\x00\x00\x00\x18i\xffHw\xea\x9d\x86\x0e\bl5\x945\xab\xd3\xef\x11\xbd\"\xbcs\x8b\xf2.:\x8c\xe2\xb2\a\xac\x8b\x19\x80\x8b\xa3&\x19\x16\x80\xa1\x88\xbe\xc3\x0f\xf3\xb7V]\x89e\xf2D\xf6T\xc0\xb8/\xa5\x11\x15\x8cqV/', 0x0, 0x0) preadv(r1, &(0x7f00000024c0)=[{0x0}, {&(0x7f0000000340)=""/4096, 0x1000}], 0x1000000000000220, 0x800000) [ 345.144647][T28082] netlink: 'syz-executor.5': attribute type 29 has an invalid length. 14:26:43 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/mnt\x00') 14:26:43 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=ANY=[]}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='\x00\x00\x00\x00H') r1 = openat$cgroup_ro(r0, &(0x7f0000000180)='mem\x00\x01y7swaS.cur\x89\xc9B\xab\xe3\xfarent\x00\x1aw\xb7\xc3B\xef\xf0\xd5\xf34|\x98.\x857Y\xab[d\xfa\x83\xdf\xc6\xf3\xb5\xab\xbb\x98y\xe7\xff\x87o\xb2\xfe\xd0\x9d\x9a\x89\xfe\xc4\x1d\x92|z\xbc\nl%\x97,#\xab3aEW\x18A3@\x94\x05%Y\x1d\x90\xf3\xc8\x89\x9a.\x7fm5\xaa\b\xceo\t\xcc\x98\xb7\x18\x90\x1cM\x91\x0fzb\x85\xb5$\x86\xe4\xd9\x1bJ\x1f\xf0>\x18\xed\xb0\r.8\xaa\x92\xc7cw\xd6\xaf\xbe\x1d\x04$\xecAb\b\xcf\xd40\xe8qg\xc5\x18\xd1\x8f\xe6D\xa8\x00\xf6H|y\xa1\x0f\xde\xe3\xbb\'\xb1\x02\x00\xc8p\xbfQh\"\n=\x90\xf9vUo9\x85\xb3\xa9\xec\xda\xc2\x99\xbe8\x9f[*\x80\xb7%\x9d33\xb9\xc3\xf0\x11!\x11\xc3\xa5$<\xcfC\x91|\x05\x1aO\xb4\xf0_\xbd>\xf3[\xbb[\x058\x01\xf4\xca\xf4(\xab8\x87R\xc8\xe0l\xce\x930\xec\xf5\x8f\xb0%I\xb7\x7f[\\i\xfb\x96d\xa1aA\x97j\xc3\xef\xb65\xc0e\xb2%\x1f\xba}\x0e$\x16\xbcw\xff&DRYp\xb8\xdb\x00\x00\x00\x00\x00\x00\x00\x18i\xffHw\xea\x9d\x86\x0e\bl5\x945\xab\xd3\xef\x11\xbd\"\xbcs\x8b\xf2.:\x8c\xe2\xb2\a\xac\x8b\x19\x80\x8b\xa3&\x19\x16\x80\xa1\x88\xbe\xc3\x0f\xf3\xb7V]\x89e\xf2D\xf6T\xc0\xb8/\xa5\x11\x15\x8cqV/', 0x0, 0x0) preadv(r1, &(0x7f00000024c0)=[{0x0}, {&(0x7f0000000340)=""/4096, 0x1000}], 0x1000000000000220, 0x800000) [ 345.319519][T28071] cgroup: fork rejected by pids controller in /syz3 14:26:43 executing program 5: sendmsg(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x3e0, &(0x7f0000000040), 0x1}, 0x0) r0 = socket(0x1000000010, 0x80002, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000080)="4c0000001200ffd5acae259567a2830007a600800000000000000068354046002c001d000cfa1a1ff2a7a5ff34cb5f39a7f32314c7a4bb5dec30de33a49868c62a2ca63d0000000000000000", 0x4c}], 0x1, 0x0, 0x49}, 0x0) sendmmsg$alg(r0, &(0x7f0000000200), 0x10efe10675dec16, 0x0) 14:26:43 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=ANY=[]}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='\x00\x00\x00\x00H') r1 = openat$cgroup_ro(r0, &(0x7f0000000180)='mem\x00\x01y7swaS.cur\x89\xc9B\xab\xe3\xfarent\x00\x1aw\xb7\xc3B\xef\xf0\xd5\xf34|\x98.\x857Y\xab[d\xfa\x83\xdf\xc6\xf3\xb5\xab\xbb\x98y\xe7\xff\x87o\xb2\xfe\xd0\x9d\x9a\x89\xfe\xc4\x1d\x92|z\xbc\nl%\x97,#\xab3aEW\x18A3@\x94\x05%Y\x1d\x90\xf3\xc8\x89\x9a.\x7fm5\xaa\b\xceo\t\xcc\x98\xb7\x18\x90\x1cM\x91\x0fzb\x85\xb5$\x86\xe4\xd9\x1bJ\x1f\xf0>\x18\xed\xb0\r.8\xaa\x92\xc7cw\xd6\xaf\xbe\x1d\x04$\xecAb\b\xcf\xd40\xe8qg\xc5\x18\xd1\x8f\xe6D\xa8\x00\xf6H|y\xa1\x0f\xde\xe3\xbb\'\xb1\x02\x00\xc8p\xbfQh\"\n=\x90\xf9vUo9\x85\xb3\xa9\xec\xda\xc2\x99\xbe8\x9f[*\x80\xb7%\x9d33\xb9\xc3\xf0\x11!\x11\xc3\xa5$<\xcfC\x91|\x05\x1aO\xb4\xf0_\xbd>\xf3[\xbb[\x058\x01\xf4\xca\xf4(\xab8\x87R\xc8\xe0l\xce\x930\xec\xf5\x8f\xb0%I\xb7\x7f[\\i\xfb\x96d\xa1aA\x97j\xc3\xef\xb65\xc0e\xb2%\x1f\xba}\x0e$\x16\xbcw\xff&DRYp\xb8\xdb\x00\x00\x00\x00\x00\x00\x00\x18i\xffHw\xea\x9d\x86\x0e\bl5\x945\xab\xd3\xef\x11\xbd\"\xbcs\x8b\xf2.:\x8c\xe2\xb2\a\xac\x8b\x19\x80\x8b\xa3&\x19\x16\x80\xa1\x88\xbe\xc3\x0f\xf3\xb7V]\x89e\xf2D\xf6T\xc0\xb8/\xa5\x11\x15\x8cqV/', 0x0, 0x0) preadv(r1, &(0x7f00000024c0)=[{0x0}, {&(0x7f0000000340)=""/4096, 0x1000}], 0x1000000000000220, 0x800000) 14:26:43 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=ANY=[]}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='\x00\x00\x00\x00H') r1 = openat$cgroup_ro(r0, &(0x7f0000000180)='mem\x00\x01y7swaS.cur\x89\xc9B\xab\xe3\xfarent\x00\x1aw\xb7\xc3B\xef\xf0\xd5\xf34|\x98.\x857Y\xab[d\xfa\x83\xdf\xc6\xf3\xb5\xab\xbb\x98y\xe7\xff\x87o\xb2\xfe\xd0\x9d\x9a\x89\xfe\xc4\x1d\x92|z\xbc\nl%\x97,#\xab3aEW\x18A3@\x94\x05%Y\x1d\x90\xf3\xc8\x89\x9a.\x7fm5\xaa\b\xceo\t\xcc\x98\xb7\x18\x90\x1cM\x91\x0fzb\x85\xb5$\x86\xe4\xd9\x1bJ\x1f\xf0>\x18\xed\xb0\r.8\xaa\x92\xc7cw\xd6\xaf\xbe\x1d\x04$\xecAb\b\xcf\xd40\xe8qg\xc5\x18\xd1\x8f\xe6D\xa8\x00\xf6H|y\xa1\x0f\xde\xe3\xbb\'\xb1\x02\x00\xc8p\xbfQh\"\n=\x90\xf9vUo9\x85\xb3\xa9\xec\xda\xc2\x99\xbe8\x9f[*\x80\xb7%\x9d33\xb9\xc3\xf0\x11!\x11\xc3\xa5$<\xcfC\x91|\x05\x1aO\xb4\xf0_\xbd>\xf3[\xbb[\x058\x01\xf4\xca\xf4(\xab8\x87R\xc8\xe0l\xce\x930\xec\xf5\x8f\xb0%I\xb7\x7f[\\i\xfb\x96d\xa1aA\x97j\xc3\xef\xb65\xc0e\xb2%\x1f\xba}\x0e$\x16\xbcw\xff&DRYp\xb8\xdb\x00\x00\x00\x00\x00\x00\x00\x18i\xffHw\xea\x9d\x86\x0e\bl5\x945\xab\xd3\xef\x11\xbd\"\xbcs\x8b\xf2.:\x8c\xe2\xb2\a\xac\x8b\x19\x80\x8b\xa3&\x19\x16\x80\xa1\x88\xbe\xc3\x0f\xf3\xb7V]\x89e\xf2D\xf6T\xc0\xb8/\xa5\x11\x15\x8cqV/', 0x0, 0x0) preadv(r1, &(0x7f00000024c0)=[{0x0}, {&(0x7f0000000340)=""/4096, 0x1000}], 0x1000000000000220, 0x800000) 14:26:43 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) close(r0) syz_open_dev$video4linux(&(0x7f0000000080)='/dev/v4l-subdev#\x00', 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r0, r4, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 14:26:43 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @random="cd5f3a8d822a"}, 0x14) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f00000000c0)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f0000000000)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0xacf0) 14:26:43 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/mnt\x00') 14:26:43 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=ANY=[]}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='\x00\x00\x00\x00H') r1 = openat$cgroup_ro(r0, &(0x7f0000000180)='mem\x00\x01y7swaS.cur\x89\xc9B\xab\xe3\xfarent\x00\x1aw\xb7\xc3B\xef\xf0\xd5\xf34|\x98.\x857Y\xab[d\xfa\x83\xdf\xc6\xf3\xb5\xab\xbb\x98y\xe7\xff\x87o\xb2\xfe\xd0\x9d\x9a\x89\xfe\xc4\x1d\x92|z\xbc\nl%\x97,#\xab3aEW\x18A3@\x94\x05%Y\x1d\x90\xf3\xc8\x89\x9a.\x7fm5\xaa\b\xceo\t\xcc\x98\xb7\x18\x90\x1cM\x91\x0fzb\x85\xb5$\x86\xe4\xd9\x1bJ\x1f\xf0>\x18\xed\xb0\r.8\xaa\x92\xc7cw\xd6\xaf\xbe\x1d\x04$\xecAb\b\xcf\xd40\xe8qg\xc5\x18\xd1\x8f\xe6D\xa8\x00\xf6H|y\xa1\x0f\xde\xe3\xbb\'\xb1\x02\x00\xc8p\xbfQh\"\n=\x90\xf9vUo9\x85\xb3\xa9\xec\xda\xc2\x99\xbe8\x9f[*\x80\xb7%\x9d33\xb9\xc3\xf0\x11!\x11\xc3\xa5$<\xcfC\x91|\x05\x1aO\xb4\xf0_\xbd>\xf3[\xbb[\x058\x01\xf4\xca\xf4(\xab8\x87R\xc8\xe0l\xce\x930\xec\xf5\x8f\xb0%I\xb7\x7f[\\i\xfb\x96d\xa1aA\x97j\xc3\xef\xb65\xc0e\xb2%\x1f\xba}\x0e$\x16\xbcw\xff&DRYp\xb8\xdb\x00\x00\x00\x00\x00\x00\x00\x18i\xffHw\xea\x9d\x86\x0e\bl5\x945\xab\xd3\xef\x11\xbd\"\xbcs\x8b\xf2.:\x8c\xe2\xb2\a\xac\x8b\x19\x80\x8b\xa3&\x19\x16\x80\xa1\x88\xbe\xc3\x0f\xf3\xb7V]\x89e\xf2D\xf6T\xc0\xb8/\xa5\x11\x15\x8cqV/', 0x0, 0x0) preadv(r1, &(0x7f00000024c0)=[{0x0}, {&(0x7f0000000340)=""/4096, 0x1000}], 0x1000000000000220, 0x800000) 14:26:43 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=ANY=[]}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='\x00\x00\x00\x00H') r1 = openat$cgroup_ro(r0, &(0x7f0000000180)='mem\x00\x01y7swaS.cur\x89\xc9B\xab\xe3\xfarent\x00\x1aw\xb7\xc3B\xef\xf0\xd5\xf34|\x98.\x857Y\xab[d\xfa\x83\xdf\xc6\xf3\xb5\xab\xbb\x98y\xe7\xff\x87o\xb2\xfe\xd0\x9d\x9a\x89\xfe\xc4\x1d\x92|z\xbc\nl%\x97,#\xab3aEW\x18A3@\x94\x05%Y\x1d\x90\xf3\xc8\x89\x9a.\x7fm5\xaa\b\xceo\t\xcc\x98\xb7\x18\x90\x1cM\x91\x0fzb\x85\xb5$\x86\xe4\xd9\x1bJ\x1f\xf0>\x18\xed\xb0\r.8\xaa\x92\xc7cw\xd6\xaf\xbe\x1d\x04$\xecAb\b\xcf\xd40\xe8qg\xc5\x18\xd1\x8f\xe6D\xa8\x00\xf6H|y\xa1\x0f\xde\xe3\xbb\'\xb1\x02\x00\xc8p\xbfQh\"\n=\x90\xf9vUo9\x85\xb3\xa9\xec\xda\xc2\x99\xbe8\x9f[*\x80\xb7%\x9d33\xb9\xc3\xf0\x11!\x11\xc3\xa5$<\xcfC\x91|\x05\x1aO\xb4\xf0_\xbd>\xf3[\xbb[\x058\x01\xf4\xca\xf4(\xab8\x87R\xc8\xe0l\xce\x930\xec\xf5\x8f\xb0%I\xb7\x7f[\\i\xfb\x96d\xa1aA\x97j\xc3\xef\xb65\xc0e\xb2%\x1f\xba}\x0e$\x16\xbcw\xff&DRYp\xb8\xdb\x00\x00\x00\x00\x00\x00\x00\x18i\xffHw\xea\x9d\x86\x0e\bl5\x945\xab\xd3\xef\x11\xbd\"\xbcs\x8b\xf2.:\x8c\xe2\xb2\a\xac\x8b\x19\x80\x8b\xa3&\x19\x16\x80\xa1\x88\xbe\xc3\x0f\xf3\xb7V]\x89e\xf2D\xf6T\xc0\xb8/\xa5\x11\x15\x8cqV/', 0x0, 0x0) preadv(r1, &(0x7f00000024c0)=[{0x0}, {&(0x7f0000000340)=""/4096, 0x1000}], 0x1000000000000220, 0x800000) 14:26:43 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) close(r0) syz_open_dev$video4linux(&(0x7f0000000080)='/dev/v4l-subdev#\x00', 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r0, r4, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) [ 345.480108][T28209] netlink: 'syz-executor.5': attribute type 29 has an invalid length. [ 345.496557][T28209] netlink: 'syz-executor.5': attribute type 29 has an invalid length. 14:26:43 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @random="cd5f3a8d822a"}, 0x14) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f00000000c0)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f0000000000)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0xacf0) 14:26:43 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) close(r0) syz_open_dev$video4linux(&(0x7f0000000080)='/dev/v4l-subdev#\x00', 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r0, r4, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 14:26:43 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=ANY=[]}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='\x00\x00\x00\x00H') r1 = openat$cgroup_ro(r0, &(0x7f0000000180)='mem\x00\x01y7swaS.cur\x89\xc9B\xab\xe3\xfarent\x00\x1aw\xb7\xc3B\xef\xf0\xd5\xf34|\x98.\x857Y\xab[d\xfa\x83\xdf\xc6\xf3\xb5\xab\xbb\x98y\xe7\xff\x87o\xb2\xfe\xd0\x9d\x9a\x89\xfe\xc4\x1d\x92|z\xbc\nl%\x97,#\xab3aEW\x18A3@\x94\x05%Y\x1d\x90\xf3\xc8\x89\x9a.\x7fm5\xaa\b\xceo\t\xcc\x98\xb7\x18\x90\x1cM\x91\x0fzb\x85\xb5$\x86\xe4\xd9\x1bJ\x1f\xf0>\x18\xed\xb0\r.8\xaa\x92\xc7cw\xd6\xaf\xbe\x1d\x04$\xecAb\b\xcf\xd40\xe8qg\xc5\x18\xd1\x8f\xe6D\xa8\x00\xf6H|y\xa1\x0f\xde\xe3\xbb\'\xb1\x02\x00\xc8p\xbfQh\"\n=\x90\xf9vUo9\x85\xb3\xa9\xec\xda\xc2\x99\xbe8\x9f[*\x80\xb7%\x9d33\xb9\xc3\xf0\x11!\x11\xc3\xa5$<\xcfC\x91|\x05\x1aO\xb4\xf0_\xbd>\xf3[\xbb[\x058\x01\xf4\xca\xf4(\xab8\x87R\xc8\xe0l\xce\x930\xec\xf5\x8f\xb0%I\xb7\x7f[\\i\xfb\x96d\xa1aA\x97j\xc3\xef\xb65\xc0e\xb2%\x1f\xba}\x0e$\x16\xbcw\xff&DRYp\xb8\xdb\x00\x00\x00\x00\x00\x00\x00\x18i\xffHw\xea\x9d\x86\x0e\bl5\x945\xab\xd3\xef\x11\xbd\"\xbcs\x8b\xf2.:\x8c\xe2\xb2\a\xac\x8b\x19\x80\x8b\xa3&\x19\x16\x80\xa1\x88\xbe\xc3\x0f\xf3\xb7V]\x89e\xf2D\xf6T\xc0\xb8/\xa5\x11\x15\x8cqV/', 0x0, 0x0) preadv(r1, &(0x7f00000024c0)=[{0x0}, {&(0x7f0000000340)=""/4096, 0x1000}], 0x1000000000000220, 0x800000) 14:26:43 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) close(r0) syz_open_dev$video4linux(&(0x7f0000000080)='/dev/v4l-subdev#\x00', 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r0, r4, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 14:26:43 executing program 5: unshare(0x8000400) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000400)='/dev/hwrng\x00', 0x200000, 0x0) r1 = dup2(r0, r0) tee(r1, 0xffffffffffffffff, 0x15b5, 0x0) 14:26:44 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=ANY=[]}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='\x00\x00\x00\x00H') r1 = openat$cgroup_ro(r0, &(0x7f0000000180)='mem\x00\x01y7swaS.cur\x89\xc9B\xab\xe3\xfarent\x00\x1aw\xb7\xc3B\xef\xf0\xd5\xf34|\x98.\x857Y\xab[d\xfa\x83\xdf\xc6\xf3\xb5\xab\xbb\x98y\xe7\xff\x87o\xb2\xfe\xd0\x9d\x9a\x89\xfe\xc4\x1d\x92|z\xbc\nl%\x97,#\xab3aEW\x18A3@\x94\x05%Y\x1d\x90\xf3\xc8\x89\x9a.\x7fm5\xaa\b\xceo\t\xcc\x98\xb7\x18\x90\x1cM\x91\x0fzb\x85\xb5$\x86\xe4\xd9\x1bJ\x1f\xf0>\x18\xed\xb0\r.8\xaa\x92\xc7cw\xd6\xaf\xbe\x1d\x04$\xecAb\b\xcf\xd40\xe8qg\xc5\x18\xd1\x8f\xe6D\xa8\x00\xf6H|y\xa1\x0f\xde\xe3\xbb\'\xb1\x02\x00\xc8p\xbfQh\"\n=\x90\xf9vUo9\x85\xb3\xa9\xec\xda\xc2\x99\xbe8\x9f[*\x80\xb7%\x9d33\xb9\xc3\xf0\x11!\x11\xc3\xa5$<\xcfC\x91|\x05\x1aO\xb4\xf0_\xbd>\xf3[\xbb[\x058\x01\xf4\xca\xf4(\xab8\x87R\xc8\xe0l\xce\x930\xec\xf5\x8f\xb0%I\xb7\x7f[\\i\xfb\x96d\xa1aA\x97j\xc3\xef\xb65\xc0e\xb2%\x1f\xba}\x0e$\x16\xbcw\xff&DRYp\xb8\xdb\x00\x00\x00\x00\x00\x00\x00\x18i\xffHw\xea\x9d\x86\x0e\bl5\x945\xab\xd3\xef\x11\xbd\"\xbcs\x8b\xf2.:\x8c\xe2\xb2\a\xac\x8b\x19\x80\x8b\xa3&\x19\x16\x80\xa1\x88\xbe\xc3\x0f\xf3\xb7V]\x89e\xf2D\xf6T\xc0\xb8/\xa5\x11\x15\x8cqV/', 0x0, 0x0) preadv(r1, &(0x7f00000024c0)=[{0x0}, {&(0x7f0000000340)=""/4096, 0x1000}], 0x1000000000000220, 0x800000) 14:26:44 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @random="cd5f3a8d822a"}, 0x14) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f00000000c0)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f0000000000)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0xacf0) 14:26:44 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=ANY=[]}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='\x00\x00\x00\x00H') r1 = openat$cgroup_ro(r0, &(0x7f0000000180)='mem\x00\x01y7swaS.cur\x89\xc9B\xab\xe3\xfarent\x00\x1aw\xb7\xc3B\xef\xf0\xd5\xf34|\x98.\x857Y\xab[d\xfa\x83\xdf\xc6\xf3\xb5\xab\xbb\x98y\xe7\xff\x87o\xb2\xfe\xd0\x9d\x9a\x89\xfe\xc4\x1d\x92|z\xbc\nl%\x97,#\xab3aEW\x18A3@\x94\x05%Y\x1d\x90\xf3\xc8\x89\x9a.\x7fm5\xaa\b\xceo\t\xcc\x98\xb7\x18\x90\x1cM\x91\x0fzb\x85\xb5$\x86\xe4\xd9\x1bJ\x1f\xf0>\x18\xed\xb0\r.8\xaa\x92\xc7cw\xd6\xaf\xbe\x1d\x04$\xecAb\b\xcf\xd40\xe8qg\xc5\x18\xd1\x8f\xe6D\xa8\x00\xf6H|y\xa1\x0f\xde\xe3\xbb\'\xb1\x02\x00\xc8p\xbfQh\"\n=\x90\xf9vUo9\x85\xb3\xa9\xec\xda\xc2\x99\xbe8\x9f[*\x80\xb7%\x9d33\xb9\xc3\xf0\x11!\x11\xc3\xa5$<\xcfC\x91|\x05\x1aO\xb4\xf0_\xbd>\xf3[\xbb[\x058\x01\xf4\xca\xf4(\xab8\x87R\xc8\xe0l\xce\x930\xec\xf5\x8f\xb0%I\xb7\x7f[\\i\xfb\x96d\xa1aA\x97j\xc3\xef\xb65\xc0e\xb2%\x1f\xba}\x0e$\x16\xbcw\xff&DRYp\xb8\xdb\x00\x00\x00\x00\x00\x00\x00\x18i\xffHw\xea\x9d\x86\x0e\bl5\x945\xab\xd3\xef\x11\xbd\"\xbcs\x8b\xf2.:\x8c\xe2\xb2\a\xac\x8b\x19\x80\x8b\xa3&\x19\x16\x80\xa1\x88\xbe\xc3\x0f\xf3\xb7V]\x89e\xf2D\xf6T\xc0\xb8/\xa5\x11\x15\x8cqV/', 0x0, 0x0) preadv(r1, &(0x7f00000024c0)=[{0x0}, {&(0x7f0000000340)=""/4096, 0x1000}], 0x1000000000000220, 0x800000) 14:26:44 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket$inet(0x2, 0x1000000000000003, 0x29) r2 = socket$inet(0x2, 0x3, 0x19) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0xf5) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) setsockopt$inet_msfilter(r2, 0x0, 0x29, &(0x7f0000000140)={@multicast2, @local, 0x0, 0x1, [@local]}, 0x14) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) sendmsg$inet(r1, &(0x7f0000001640)={&(0x7f0000000140)={0x2, 0x0, @multicast2}, 0x10, 0x0}, 0x0) 14:26:44 executing program 5: unshare(0x8000400) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000400)='/dev/hwrng\x00', 0x200000, 0x0) r1 = dup2(r0, r0) tee(r1, 0xffffffffffffffff, 0x15b5, 0x0) 14:26:44 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) close(r0) syz_open_dev$video4linux(&(0x7f0000000080)='/dev/v4l-subdev#\x00', 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r0, r4, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 14:26:44 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @random="cd5f3a8d822a"}, 0x14) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f00000000c0)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f0000000000)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0xacf0) 14:26:44 executing program 1: r0 = socket$vsock_stream(0x28, 0x1, 0x0) sendmsg$TIPC_CMD_SHOW_PORTS(r0, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={0x0}}, 0x0) 14:26:44 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @random="cd5f3a8d822a"}, 0x14) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f00000000c0)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f0000000000)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0xacf0) 14:26:44 executing program 5: unshare(0x8000400) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000400)='/dev/hwrng\x00', 0x200000, 0x0) r1 = dup2(r0, r0) tee(r1, 0xffffffffffffffff, 0x15b5, 0x0) 14:26:44 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket$inet(0x2, 0x1000000000000003, 0x29) r2 = socket$inet(0x2, 0x3, 0x19) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0xf5) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) setsockopt$inet_msfilter(r2, 0x0, 0x29, &(0x7f0000000140)={@multicast2, @local, 0x0, 0x1, [@local]}, 0x14) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) sendmsg$inet(r1, &(0x7f0000001640)={&(0x7f0000000140)={0x2, 0x0, @multicast2}, 0x10, 0x0}, 0x0) 14:26:44 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket$inet(0x2, 0x1000000000000003, 0x29) r2 = socket$inet(0x2, 0x3, 0x19) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0xf5) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) setsockopt$inet_msfilter(r2, 0x0, 0x29, &(0x7f0000000140)={@multicast2, @local, 0x0, 0x1, [@local]}, 0x14) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) sendmsg$inet(r1, &(0x7f0000001640)={&(0x7f0000000140)={0x2, 0x0, @multicast2}, 0x10, 0x0}, 0x0) 14:26:44 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @random="cd5f3a8d822a"}, 0x14) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f00000000c0)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f0000000000)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0xacf0) 14:26:44 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) close(r0) syz_open_dev$video4linux(&(0x7f0000000080)='/dev/v4l-subdev#\x00', 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r0, r4, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 14:26:44 executing program 1: r0 = socket$vsock_stream(0x28, 0x1, 0x0) sendmsg$TIPC_CMD_SHOW_PORTS(r0, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={0x0}}, 0x0) 14:26:44 executing program 5: unshare(0x8000400) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000400)='/dev/hwrng\x00', 0x200000, 0x0) r1 = dup2(r0, r0) tee(r1, 0xffffffffffffffff, 0x15b5, 0x0) 14:26:44 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket$inet(0x2, 0x1000000000000003, 0x29) r2 = socket$inet(0x2, 0x3, 0x19) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0xf5) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) setsockopt$inet_msfilter(r2, 0x0, 0x29, &(0x7f0000000140)={@multicast2, @local, 0x0, 0x1, [@local]}, 0x14) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) sendmsg$inet(r1, &(0x7f0000001640)={&(0x7f0000000140)={0x2, 0x0, @multicast2}, 0x10, 0x0}, 0x0) 14:26:44 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket$inet(0x2, 0x1000000000000003, 0x29) r2 = socket$inet(0x2, 0x3, 0x19) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0xf5) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) setsockopt$inet_msfilter(r2, 0x0, 0x29, &(0x7f0000000140)={@multicast2, @local, 0x0, 0x1, [@local]}, 0x14) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) sendmsg$inet(r1, &(0x7f0000001640)={&(0x7f0000000140)={0x2, 0x0, @multicast2}, 0x10, 0x0}, 0x0) 14:26:44 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket$inet(0x2, 0x1000000000000003, 0x29) r2 = socket$inet(0x2, 0x3, 0x19) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0xf5) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) setsockopt$inet_msfilter(r2, 0x0, 0x29, &(0x7f0000000140)={@multicast2, @local, 0x0, 0x1, [@local]}, 0x14) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) sendmsg$inet(r1, &(0x7f0000001640)={&(0x7f0000000140)={0x2, 0x0, @multicast2}, 0x10, 0x0}, 0x0) 14:26:44 executing program 1: r0 = socket$vsock_stream(0x28, 0x1, 0x0) sendmsg$TIPC_CMD_SHOW_PORTS(r0, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={0x0}}, 0x0) 14:26:44 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket$inet(0x2, 0x1000000000000003, 0x29) r2 = socket$inet(0x2, 0x3, 0x19) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0xf5) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) setsockopt$inet_msfilter(r2, 0x0, 0x29, &(0x7f0000000140)={@multicast2, @local, 0x0, 0x1, [@local]}, 0x14) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) sendmsg$inet(r1, &(0x7f0000001640)={&(0x7f0000000140)={0x2, 0x0, @multicast2}, 0x10, 0x0}, 0x0) 14:26:44 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket$inet(0x2, 0x1000000000000003, 0x29) r2 = socket$inet(0x2, 0x3, 0x19) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0xf5) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) setsockopt$inet_msfilter(r2, 0x0, 0x29, &(0x7f0000000140)={@multicast2, @local, 0x0, 0x1, [@local]}, 0x14) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) sendmsg$inet(r1, &(0x7f0000001640)={&(0x7f0000000140)={0x2, 0x0, @multicast2}, 0x10, 0x0}, 0x0) 14:26:44 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={0x0, 0x6}}, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=ANY=[@ANYBLOB="02020609100000000000004c9e0000000200130002000000000000000000000105000600200000000a00000000000000000500e50008070000001f00000000000009200000000000020001000000000000000002000098a805000500000000000a00000000000000ff1700a51409ac4cb3cbcf00000000000000000000000017"], 0x80}}, 0x0) sendmmsg(r0, &(0x7f0000000180), 0x40000000000002b, 0x0) 14:26:44 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket$inet(0x2, 0x1000000000000003, 0x29) r2 = socket$inet(0x2, 0x3, 0x19) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0xf5) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) setsockopt$inet_msfilter(r2, 0x0, 0x29, &(0x7f0000000140)={@multicast2, @local, 0x0, 0x1, [@local]}, 0x14) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) sendmsg$inet(r1, &(0x7f0000001640)={&(0x7f0000000140)={0x2, 0x0, @multicast2}, 0x10, 0x0}, 0x0) 14:26:44 executing program 4: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0x400000006}, 0x1c) sendto$inet6(r0, 0x0, 0x3d3, 0x0, 0x0, 0x0) 14:26:44 executing program 1: r0 = socket$vsock_stream(0x28, 0x1, 0x0) sendmsg$TIPC_CMD_SHOW_PORTS(r0, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={0x0}}, 0x0) 14:26:44 executing program 4: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0x400000006}, 0x1c) sendto$inet6(r0, 0x0, 0x3d3, 0x0, 0x0, 0x0) 14:26:44 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket$inet(0x2, 0x1000000000000003, 0x29) r2 = socket$inet(0x2, 0x3, 0x19) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0xf5) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) setsockopt$inet_msfilter(r2, 0x0, 0x29, &(0x7f0000000140)={@multicast2, @local, 0x0, 0x1, [@local]}, 0x14) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) sendmsg$inet(r1, &(0x7f0000001640)={&(0x7f0000000140)={0x2, 0x0, @multicast2}, 0x10, 0x0}, 0x0) 14:26:44 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket$inet(0x2, 0x1000000000000003, 0x29) r2 = socket$inet(0x2, 0x3, 0x19) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0xf5) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) setsockopt$inet_msfilter(r2, 0x0, 0x29, &(0x7f0000000140)={@multicast2, @local, 0x0, 0x1, [@local]}, 0x14) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) sendmsg$inet(r1, &(0x7f0000001640)={&(0x7f0000000140)={0x2, 0x0, @multicast2}, 0x10, 0x0}, 0x0) 14:26:44 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket$inet(0x2, 0x1000000000000003, 0x29) r2 = socket$inet(0x2, 0x3, 0x19) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0xf5) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) setsockopt$inet_msfilter(r2, 0x0, 0x29, &(0x7f0000000140)={@multicast2, @local, 0x0, 0x1, [@local]}, 0x14) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) sendmsg$inet(r1, &(0x7f0000001640)={&(0x7f0000000140)={0x2, 0x0, @multicast2}, 0x10, 0x0}, 0x0) 14:26:44 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket$inet(0x2, 0x1000000000000003, 0x29) r2 = socket$inet(0x2, 0x3, 0x19) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0xf5) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) setsockopt$inet_msfilter(r2, 0x0, 0x29, &(0x7f0000000140)={@multicast2, @local, 0x0, 0x1, [@local]}, 0x14) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) sendmsg$inet(r1, &(0x7f0000001640)={&(0x7f0000000140)={0x2, 0x0, @multicast2}, 0x10, 0x0}, 0x0) 14:26:44 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x4, &(0x7f0000000200)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='G\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) 14:26:44 executing program 4: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0x400000006}, 0x1c) sendto$inet6(r0, 0x0, 0x3d3, 0x0, 0x0, 0x0) 14:26:44 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={0x0, 0x6}}, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=ANY=[@ANYBLOB="02020609100000000000004c9e0000000200130002000000000000000000000105000600200000000a00000000000000000500e50008070000001f00000000000009200000000000020001000000000000000002000098a805000500000000000a00000000000000ff1700a51409ac4cb3cbcf00000000000000000000000017"], 0x80}}, 0x0) sendmmsg(r0, &(0x7f0000000180), 0x40000000000002b, 0x0) 14:26:44 executing program 5: mkdir(&(0x7f0000000900)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x0, 0x0) creat(0x0, 0x0) 14:26:44 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x9, 0x0, 0x0, 0x0, 0x1}, 0x3c) 14:26:44 executing program 4: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0x400000006}, 0x1c) sendto$inet6(r0, 0x0, 0x3d3, 0x0, 0x0, 0x0) 14:26:44 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x101002, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000002c0)=""/246) pwritev(r0, &(0x7f00000000c0)=[{&(0x7f0000000080)="80fd", 0x2}], 0x1, 0x0) 14:26:44 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x4, &(0x7f0000000200)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='G\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) 14:26:44 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x9, 0x0, 0x0, 0x0, 0x1}, 0x3c) 14:26:44 executing program 5: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getuid() r0 = socket$nl_netfilter(0x10, 0x3, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={0x0, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000000040)='bond_slave_1\x00'}, 0x30) open(&(0x7f00009e1000)='./file0\x00', 0x8040, 0x0) syz_extract_tcp_res(&(0x7f0000000140), 0xffffffffffff9c94, 0x3) r1 = open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) fcntl$setlease(r1, 0x400, 0x2) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16@\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$SG_GET_NUM_WAITING(0xffffffffffffffff, 0x227d, &(0x7f00000003c0)) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000002c0)={'veth0_to_bond\x00', &(0x7f0000000540)=ANY=[@ANYBLOB="390000000600000006000000050000000800010000000000000000000100010035c6bd9e46c942b73f6ee9b4bc46d02953420c58bcefe0b245bba28c3c4359f5c30855a6515ce3108762a482e6a66744b628607754e86ae6f55953d69645314b507363b50271031724c1dcb679631f002bb3f786f60e79a7799efd67b758298a320851f561d3358e61945909954d86cde32d1b26d25503475b14923e2bdf5c0a1f66c6"]}) socket$inet_udplite(0x2, 0x2, 0x88) 14:26:44 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000400)=@allocspi={0x104, 0x16, 0x317, 0x0, 0x0, {{{@in6=@loopback, @in=@multicast2}, {@in6=@local, 0x0, 0x32}, @in6=@remote}}, [@mark={0xc}]}, 0x2ea}}, 0x0) 14:26:45 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={0x0, 0x6}}, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=ANY=[@ANYBLOB="02020609100000000000004c9e0000000200130002000000000000000000000105000600200000000a00000000000000000500e50008070000001f00000000000009200000000000020001000000000000000002000098a805000500000000000a00000000000000ff1700a51409ac4cb3cbcf00000000000000000000000017"], 0x80}}, 0x0) sendmmsg(r0, &(0x7f0000000180), 0x40000000000002b, 0x0) 14:26:45 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x9, 0x0, 0x0, 0x0, 0x1}, 0x3c) 14:26:45 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x4, &(0x7f0000000200)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='G\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) 14:26:45 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={0x0, 0x6}}, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=ANY=[@ANYBLOB="02020609100000000000004c9e0000000200130002000000000000000000000105000600200000000a00000000000000000500e50008070000001f00000000000009200000000000020001000000000000000002000098a805000500000000000a00000000000000ff1700a51409ac4cb3cbcf00000000000000000000000017"], 0x80}}, 0x0) sendmmsg(r0, &(0x7f0000000180), 0x40000000000002b, 0x0) 14:26:45 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x9, 0x0, 0x0, 0x0, 0x1}, 0x3c) [ 346.783845][T28373] bond0: (slave bond_slave_1): Releasing backup interface 14:26:45 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x4, &(0x7f0000000200)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='G\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) 14:26:45 executing program 3: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/sys/net/ipv4/vs/schedule_icmp\x00', 0x2, 0x0) sendfile(r0, r1, 0x0, 0xff) 14:26:45 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x101002, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000002c0)=""/246) pwritev(r0, &(0x7f00000000c0)=[{&(0x7f0000000080)="80fd", 0x2}], 0x1, 0x0) 14:26:45 executing program 1: r0 = socket$l2tp(0x18, 0x1, 0x1) r1 = fcntl$dupfd(r0, 0x0, r0) readv(r1, &(0x7f00000004c0)=[{&(0x7f00000001c0)=""/115, 0x73}], 0x1) 14:26:45 executing program 2: r0 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x0, 0x0) read$eventfd(r0, 0x0, 0xf0ff7f00000000) 14:26:45 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000400)=@allocspi={0x104, 0x16, 0x317, 0x0, 0x0, {{{@in6=@loopback, @in=@multicast2}, {@in6=@local, 0x0, 0x32}, @in6=@remote}}, [@mark={0xc}]}, 0x2ea}}, 0x0) 14:26:45 executing program 3: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/sys/net/ipv4/vs/schedule_icmp\x00', 0x2, 0x0) sendfile(r0, r1, 0x0, 0xff) 14:26:45 executing program 1: r0 = socket$l2tp(0x18, 0x1, 0x1) r1 = fcntl$dupfd(r0, 0x0, r0) readv(r1, &(0x7f00000004c0)=[{&(0x7f00000001c0)=""/115, 0x73}], 0x1) 14:26:45 executing program 2: r0 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x0, 0x0) read$eventfd(r0, 0x0, 0xf0ff7f00000000) 14:26:45 executing program 5: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getuid() r0 = socket$nl_netfilter(0x10, 0x3, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={0x0, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000000040)='bond_slave_1\x00'}, 0x30) open(&(0x7f00009e1000)='./file0\x00', 0x8040, 0x0) syz_extract_tcp_res(&(0x7f0000000140), 0xffffffffffff9c94, 0x3) r1 = open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) fcntl$setlease(r1, 0x400, 0x2) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16@\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$SG_GET_NUM_WAITING(0xffffffffffffffff, 0x227d, &(0x7f00000003c0)) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000002c0)={'veth0_to_bond\x00', &(0x7f0000000540)=ANY=[@ANYBLOB="390000000600000006000000050000000800010000000000000000000100010035c6bd9e46c942b73f6ee9b4bc46d02953420c58bcefe0b245bba28c3c4359f5c30855a6515ce3108762a482e6a66744b628607754e86ae6f55953d69645314b507363b50271031724c1dcb679631f002bb3f786f60e79a7799efd67b758298a320851f561d3358e61945909954d86cde32d1b26d25503475b14923e2bdf5c0a1f66c6"]}) socket$inet_udplite(0x2, 0x2, 0x88) 14:26:45 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x101002, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000002c0)=""/246) pwritev(r0, &(0x7f00000000c0)=[{&(0x7f0000000080)="80fd", 0x2}], 0x1, 0x0) 14:26:45 executing program 1: r0 = socket$l2tp(0x18, 0x1, 0x1) r1 = fcntl$dupfd(r0, 0x0, r0) readv(r1, &(0x7f00000004c0)=[{&(0x7f00000001c0)=""/115, 0x73}], 0x1) 14:26:45 executing program 3: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/sys/net/ipv4/vs/schedule_icmp\x00', 0x2, 0x0) sendfile(r0, r1, 0x0, 0xff) 14:26:45 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000400)=@allocspi={0x104, 0x16, 0x317, 0x0, 0x0, {{{@in6=@loopback, @in=@multicast2}, {@in6=@local, 0x0, 0x32}, @in6=@remote}}, [@mark={0xc}]}, 0x2ea}}, 0x0) 14:26:45 executing program 2: r0 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x0, 0x0) read$eventfd(r0, 0x0, 0xf0ff7f00000000) 14:26:45 executing program 1: r0 = socket$l2tp(0x18, 0x1, 0x1) r1 = fcntl$dupfd(r0, 0x0, r0) readv(r1, &(0x7f00000004c0)=[{&(0x7f00000001c0)=""/115, 0x73}], 0x1) 14:26:45 executing program 3: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/sys/net/ipv4/vs/schedule_icmp\x00', 0x2, 0x0) sendfile(r0, r1, 0x0, 0xff) 14:26:45 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000400)=@allocspi={0x104, 0x16, 0x317, 0x0, 0x0, {{{@in6=@loopback, @in=@multicast2}, {@in6=@local, 0x0, 0x32}, @in6=@remote}}, [@mark={0xc}]}, 0x2ea}}, 0x0) 14:26:45 executing program 2: r0 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x0, 0x0) read$eventfd(r0, 0x0, 0xf0ff7f00000000) 14:26:45 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getuid() r0 = socket$nl_netfilter(0x10, 0x3, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={0x0, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000000040)='bond_slave_1\x00'}, 0x30) open(&(0x7f00009e1000)='./file0\x00', 0x8040, 0x0) syz_extract_tcp_res(&(0x7f0000000140), 0xffffffffffff9c94, 0x3) r1 = open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) fcntl$setlease(r1, 0x400, 0x2) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16@\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$SG_GET_NUM_WAITING(0xffffffffffffffff, 0x227d, &(0x7f00000003c0)) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000002c0)={'veth0_to_bond\x00', &(0x7f0000000540)=ANY=[@ANYBLOB="390000000600000006000000050000000800010000000000000000000100010035c6bd9e46c942b73f6ee9b4bc46d02953420c58bcefe0b245bba28c3c4359f5c30855a6515ce3108762a482e6a66744b628607754e86ae6f55953d69645314b507363b50271031724c1dcb679631f002bb3f786f60e79a7799efd67b758298a320851f561d3358e61945909954d86cde32d1b26d25503475b14923e2bdf5c0a1f66c6"]}) socket$inet_udplite(0x2, 0x2, 0x88) 14:26:45 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x101002, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000002c0)=""/246) pwritev(r0, &(0x7f00000000c0)=[{&(0x7f0000000080)="80fd", 0x2}], 0x1, 0x0) [ 347.308890][T28437] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 14:26:45 executing program 5: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getuid() r0 = socket$nl_netfilter(0x10, 0x3, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={0x0, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000000040)='bond_slave_1\x00'}, 0x30) open(&(0x7f00009e1000)='./file0\x00', 0x8040, 0x0) syz_extract_tcp_res(&(0x7f0000000140), 0xffffffffffff9c94, 0x3) r1 = open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) fcntl$setlease(r1, 0x400, 0x2) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16@\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$SG_GET_NUM_WAITING(0xffffffffffffffff, 0x227d, &(0x7f00000003c0)) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000002c0)={'veth0_to_bond\x00', &(0x7f0000000540)=ANY=[@ANYBLOB="390000000600000006000000050000000800010000000000000000000100010035c6bd9e46c942b73f6ee9b4bc46d02953420c58bcefe0b245bba28c3c4359f5c30855a6515ce3108762a482e6a66744b628607754e86ae6f55953d69645314b507363b50271031724c1dcb679631f002bb3f786f60e79a7799efd67b758298a320851f561d3358e61945909954d86cde32d1b26d25503475b14923e2bdf5c0a1f66c6"]}) socket$inet_udplite(0x2, 0x2, 0x88) 14:26:45 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getuid() r0 = socket$nl_netfilter(0x10, 0x3, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={0x0, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000000040)='bond_slave_1\x00'}, 0x30) open(&(0x7f00009e1000)='./file0\x00', 0x8040, 0x0) syz_extract_tcp_res(&(0x7f0000000140), 0xffffffffffff9c94, 0x3) r1 = open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) fcntl$setlease(r1, 0x400, 0x2) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16@\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$SG_GET_NUM_WAITING(0xffffffffffffffff, 0x227d, &(0x7f00000003c0)) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000002c0)={'veth0_to_bond\x00', &(0x7f0000000540)=ANY=[@ANYBLOB="390000000600000006000000050000000800010000000000000000000100010035c6bd9e46c942b73f6ee9b4bc46d02953420c58bcefe0b245bba28c3c4359f5c30855a6515ce3108762a482e6a66744b628607754e86ae6f55953d69645314b507363b50271031724c1dcb679631f002bb3f786f60e79a7799efd67b758298a320851f561d3358e61945909954d86cde32d1b26d25503475b14923e2bdf5c0a1f66c6"]}) socket$inet_udplite(0x2, 0x2, 0x88) 14:26:45 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getuid() r0 = socket$nl_netfilter(0x10, 0x3, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={0x0, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000000040)='bond_slave_1\x00'}, 0x30) open(&(0x7f00009e1000)='./file0\x00', 0x8040, 0x0) syz_extract_tcp_res(&(0x7f0000000140), 0xffffffffffff9c94, 0x3) r1 = open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) fcntl$setlease(r1, 0x400, 0x2) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16@\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$SG_GET_NUM_WAITING(0xffffffffffffffff, 0x227d, &(0x7f00000003c0)) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000002c0)={'veth0_to_bond\x00', &(0x7f0000000540)=ANY=[@ANYBLOB="390000000600000006000000050000000800010000000000000000000100010035c6bd9e46c942b73f6ee9b4bc46d02953420c58bcefe0b245bba28c3c4359f5c30855a6515ce3108762a482e6a66744b628607754e86ae6f55953d69645314b507363b50271031724c1dcb679631f002bb3f786f60e79a7799efd67b758298a320851f561d3358e61945909954d86cde32d1b26d25503475b14923e2bdf5c0a1f66c6"]}) socket$inet_udplite(0x2, 0x2, 0x88) 14:26:45 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getuid() r0 = socket$nl_netfilter(0x10, 0x3, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={0x0, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000000040)='bond_slave_1\x00'}, 0x30) open(&(0x7f00009e1000)='./file0\x00', 0x8040, 0x0) syz_extract_tcp_res(&(0x7f0000000140), 0xffffffffffff9c94, 0x3) r1 = open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) fcntl$setlease(r1, 0x400, 0x2) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16@\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$SG_GET_NUM_WAITING(0xffffffffffffffff, 0x227d, &(0x7f00000003c0)) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000002c0)={'veth0_to_bond\x00', &(0x7f0000000540)=ANY=[@ANYBLOB="390000000600000006000000050000000800010000000000000000000100010035c6bd9e46c942b73f6ee9b4bc46d02953420c58bcefe0b245bba28c3c4359f5c30855a6515ce3108762a482e6a66744b628607754e86ae6f55953d69645314b507363b50271031724c1dcb679631f002bb3f786f60e79a7799efd67b758298a320851f561d3358e61945909954d86cde32d1b26d25503475b14923e2bdf5c0a1f66c6"]}) socket$inet_udplite(0x2, 0x2, 0x88) 14:26:45 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x8, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x51}]}, &(0x7f0000000140)='G\xc3$\x05ju\xc3PL\x00\x94\xf7\x1a#\x85x\xa2Br{HS\x00\xd8\x1fl\xfd\vk\xbf\x83\x16m\xca\x0e\xa6\xe2#\x9a\xe5\xc0\x9d\xde\xf2\x01\x00\x00\x00\x00\x00\x00\x00c(\xf2}\x1d', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) [ 347.518132][T28465] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 14:26:45 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getuid() r0 = socket$nl_netfilter(0x10, 0x3, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={0x0, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000000040)='bond_slave_1\x00'}, 0x30) open(&(0x7f00009e1000)='./file0\x00', 0x8040, 0x0) syz_extract_tcp_res(&(0x7f0000000140), 0xffffffffffff9c94, 0x3) r1 = open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) fcntl$setlease(r1, 0x400, 0x2) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16@\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$SG_GET_NUM_WAITING(0xffffffffffffffff, 0x227d, &(0x7f00000003c0)) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000002c0)={'veth0_to_bond\x00', &(0x7f0000000540)=ANY=[@ANYBLOB="390000000600000006000000050000000800010000000000000000000100010035c6bd9e46c942b73f6ee9b4bc46d02953420c58bcefe0b245bba28c3c4359f5c30855a6515ce3108762a482e6a66744b628607754e86ae6f55953d69645314b507363b50271031724c1dcb679631f002bb3f786f60e79a7799efd67b758298a320851f561d3358e61945909954d86cde32d1b26d25503475b14923e2bdf5c0a1f66c6"]}) socket$inet_udplite(0x2, 0x2, 0x88) 14:26:45 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x8, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x51}]}, &(0x7f0000000140)='G\xc3$\x05ju\xc3PL\x00\x94\xf7\x1a#\x85x\xa2Br{HS\x00\xd8\x1fl\xfd\vk\xbf\x83\x16m\xca\x0e\xa6\xe2#\x9a\xe5\xc0\x9d\xde\xf2\x01\x00\x00\x00\x00\x00\x00\x00c(\xf2}\x1d', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) [ 347.559382][T28472] bond0: (slave bond_slave_1): Releasing backup interface 14:26:45 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x8, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x51}]}, &(0x7f0000000140)='G\xc3$\x05ju\xc3PL\x00\x94\xf7\x1a#\x85x\xa2Br{HS\x00\xd8\x1fl\xfd\vk\xbf\x83\x16m\xca\x0e\xa6\xe2#\x9a\xe5\xc0\x9d\xde\xf2\x01\x00\x00\x00\x00\x00\x00\x00c(\xf2}\x1d', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 14:26:45 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x8, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x51}]}, &(0x7f0000000140)='G\xc3$\x05ju\xc3PL\x00\x94\xf7\x1a#\x85x\xa2Br{HS\x00\xd8\x1fl\xfd\vk\xbf\x83\x16m\xca\x0e\xa6\xe2#\x9a\xe5\xc0\x9d\xde\xf2\x01\x00\x00\x00\x00\x00\x00\x00c(\xf2}\x1d', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 14:26:46 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getuid() r0 = socket$nl_netfilter(0x10, 0x3, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={0x0, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000000040)='bond_slave_1\x00'}, 0x30) open(&(0x7f00009e1000)='./file0\x00', 0x8040, 0x0) syz_extract_tcp_res(&(0x7f0000000140), 0xffffffffffff9c94, 0x3) r1 = open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) fcntl$setlease(r1, 0x400, 0x2) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16@\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$SG_GET_NUM_WAITING(0xffffffffffffffff, 0x227d, &(0x7f00000003c0)) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000002c0)={'veth0_to_bond\x00', &(0x7f0000000540)=ANY=[@ANYBLOB="390000000600000006000000050000000800010000000000000000000100010035c6bd9e46c942b73f6ee9b4bc46d02953420c58bcefe0b245bba28c3c4359f5c30855a6515ce3108762a482e6a66744b628607754e86ae6f55953d69645314b507363b50271031724c1dcb679631f002bb3f786f60e79a7799efd67b758298a320851f561d3358e61945909954d86cde32d1b26d25503475b14923e2bdf5c0a1f66c6"]}) socket$inet_udplite(0x2, 0x2, 0x88) 14:26:46 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getuid() r0 = socket$nl_netfilter(0x10, 0x3, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={0x0, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000000040)='bond_slave_1\x00'}, 0x30) open(&(0x7f00009e1000)='./file0\x00', 0x8040, 0x0) syz_extract_tcp_res(&(0x7f0000000140), 0xffffffffffff9c94, 0x3) r1 = open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) fcntl$setlease(r1, 0x400, 0x2) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16@\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$SG_GET_NUM_WAITING(0xffffffffffffffff, 0x227d, &(0x7f00000003c0)) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000002c0)={'veth0_to_bond\x00', &(0x7f0000000540)=ANY=[@ANYBLOB="390000000600000006000000050000000800010000000000000000000100010035c6bd9e46c942b73f6ee9b4bc46d02953420c58bcefe0b245bba28c3c4359f5c30855a6515ce3108762a482e6a66744b628607754e86ae6f55953d69645314b507363b50271031724c1dcb679631f002bb3f786f60e79a7799efd67b758298a320851f561d3358e61945909954d86cde32d1b26d25503475b14923e2bdf5c0a1f66c6"]}) socket$inet_udplite(0x2, 0x2, 0x88) [ 347.722588][T28468] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 347.759923][T28477] bond0: (slave bond_slave_1): Releasing backup interface 14:26:46 executing program 5: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getuid() r0 = socket$nl_netfilter(0x10, 0x3, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={0x0, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000000040)='bond_slave_1\x00'}, 0x30) open(&(0x7f00009e1000)='./file0\x00', 0x8040, 0x0) syz_extract_tcp_res(&(0x7f0000000140), 0xffffffffffff9c94, 0x3) r1 = open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) fcntl$setlease(r1, 0x400, 0x2) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16@\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$SG_GET_NUM_WAITING(0xffffffffffffffff, 0x227d, &(0x7f00000003c0)) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000002c0)={'veth0_to_bond\x00', &(0x7f0000000540)=ANY=[@ANYBLOB="390000000600000006000000050000000800010000000000000000000100010035c6bd9e46c942b73f6ee9b4bc46d02953420c58bcefe0b245bba28c3c4359f5c30855a6515ce3108762a482e6a66744b628607754e86ae6f55953d69645314b507363b50271031724c1dcb679631f002bb3f786f60e79a7799efd67b758298a320851f561d3358e61945909954d86cde32d1b26d25503475b14923e2bdf5c0a1f66c6"]}) socket$inet_udplite(0x2, 0x2, 0x88) 14:26:46 executing program 0: r0 = socket$xdp(0x2c, 0x3, 0x0) mmap$xdp(&(0x7f0000ffe000/0x1000)=nil, 0x100000, 0x0, 0x52, r0, 0x0) r1 = creat(&(0x7f0000000100)='./file0\x00', 0x0) mmap$perf(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x100010, r1, 0x0) 14:26:46 executing program 0: r0 = socket$xdp(0x2c, 0x3, 0x0) mmap$xdp(&(0x7f0000ffe000/0x1000)=nil, 0x100000, 0x0, 0x52, r0, 0x0) r1 = creat(&(0x7f0000000100)='./file0\x00', 0x0) mmap$perf(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x100010, r1, 0x0) 14:26:46 executing program 0: r0 = socket$xdp(0x2c, 0x3, 0x0) mmap$xdp(&(0x7f0000ffe000/0x1000)=nil, 0x100000, 0x0, 0x52, r0, 0x0) r1 = creat(&(0x7f0000000100)='./file0\x00', 0x0) mmap$perf(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x100010, r1, 0x0) 14:26:46 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getuid() r0 = socket$nl_netfilter(0x10, 0x3, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={0x0, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000000040)='bond_slave_1\x00'}, 0x30) open(&(0x7f00009e1000)='./file0\x00', 0x8040, 0x0) syz_extract_tcp_res(&(0x7f0000000140), 0xffffffffffff9c94, 0x3) r1 = open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) fcntl$setlease(r1, 0x400, 0x2) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16@\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$SG_GET_NUM_WAITING(0xffffffffffffffff, 0x227d, &(0x7f00000003c0)) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000002c0)={'veth0_to_bond\x00', &(0x7f0000000540)=ANY=[@ANYBLOB="390000000600000006000000050000000800010000000000000000000100010035c6bd9e46c942b73f6ee9b4bc46d02953420c58bcefe0b245bba28c3c4359f5c30855a6515ce3108762a482e6a66744b628607754e86ae6f55953d69645314b507363b50271031724c1dcb679631f002bb3f786f60e79a7799efd67b758298a320851f561d3358e61945909954d86cde32d1b26d25503475b14923e2bdf5c0a1f66c6"]}) socket$inet_udplite(0x2, 0x2, 0x88) 14:26:46 executing program 0: r0 = socket$xdp(0x2c, 0x3, 0x0) mmap$xdp(&(0x7f0000ffe000/0x1000)=nil, 0x100000, 0x0, 0x52, r0, 0x0) r1 = creat(&(0x7f0000000100)='./file0\x00', 0x0) mmap$perf(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x100010, r1, 0x0) [ 347.995723][T28486] bond0: (slave bond_slave_1): Releasing backup interface 14:26:46 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getuid() r0 = socket$nl_netfilter(0x10, 0x3, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={0x0, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000000040)='bond_slave_1\x00'}, 0x30) open(&(0x7f00009e1000)='./file0\x00', 0x8040, 0x0) syz_extract_tcp_res(&(0x7f0000000140), 0xffffffffffff9c94, 0x3) r1 = open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) fcntl$setlease(r1, 0x400, 0x2) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16@\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$SG_GET_NUM_WAITING(0xffffffffffffffff, 0x227d, &(0x7f00000003c0)) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000002c0)={'veth0_to_bond\x00', &(0x7f0000000540)=ANY=[@ANYBLOB="390000000600000006000000050000000800010000000000000000000100010035c6bd9e46c942b73f6ee9b4bc46d02953420c58bcefe0b245bba28c3c4359f5c30855a6515ce3108762a482e6a66744b628607754e86ae6f55953d69645314b507363b50271031724c1dcb679631f002bb3f786f60e79a7799efd67b758298a320851f561d3358e61945909954d86cde32d1b26d25503475b14923e2bdf5c0a1f66c6"]}) socket$inet_udplite(0x2, 0x2, 0x88) 14:26:46 executing program 0: r0 = socket$xdp(0x2c, 0x3, 0x0) mmap$xdp(&(0x7f0000ffe000/0x1000)=nil, 0x100000, 0x0, 0x52, r0, 0x0) r1 = creat(&(0x7f0000000100)='./file0\x00', 0x0) mmap$perf(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x100010, r1, 0x0) 14:26:46 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getuid() r0 = socket$nl_netfilter(0x10, 0x3, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={0x0, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000000040)='bond_slave_1\x00'}, 0x30) open(&(0x7f00009e1000)='./file0\x00', 0x8040, 0x0) syz_extract_tcp_res(&(0x7f0000000140), 0xffffffffffff9c94, 0x3) r1 = open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) fcntl$setlease(r1, 0x400, 0x2) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16@\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$SG_GET_NUM_WAITING(0xffffffffffffffff, 0x227d, &(0x7f00000003c0)) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000002c0)={'veth0_to_bond\x00', &(0x7f0000000540)=ANY=[@ANYBLOB="390000000600000006000000050000000800010000000000000000000100010035c6bd9e46c942b73f6ee9b4bc46d02953420c58bcefe0b245bba28c3c4359f5c30855a6515ce3108762a482e6a66744b628607754e86ae6f55953d69645314b507363b50271031724c1dcb679631f002bb3f786f60e79a7799efd67b758298a320851f561d3358e61945909954d86cde32d1b26d25503475b14923e2bdf5c0a1f66c6"]}) socket$inet_udplite(0x2, 0x2, 0x88) [ 348.137110][T28503] bond0: (slave bond_slave_1): Releasing backup interface 14:26:46 executing program 0: r0 = socket$xdp(0x2c, 0x3, 0x0) mmap$xdp(&(0x7f0000ffe000/0x1000)=nil, 0x100000, 0x0, 0x52, r0, 0x0) r1 = creat(&(0x7f0000000100)='./file0\x00', 0x0) mmap$perf(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x100010, r1, 0x0) 14:26:46 executing program 0: r0 = socket$xdp(0x2c, 0x3, 0x0) mmap$xdp(&(0x7f0000ffe000/0x1000)=nil, 0x100000, 0x0, 0x52, r0, 0x0) r1 = creat(&(0x7f0000000100)='./file0\x00', 0x0) mmap$perf(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x100010, r1, 0x0) [ 348.303328][T28530] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 14:26:46 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getuid() r0 = socket$nl_netfilter(0x10, 0x3, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={0x0, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000000040)='bond_slave_1\x00'}, 0x30) open(&(0x7f00009e1000)='./file0\x00', 0x8040, 0x0) syz_extract_tcp_res(&(0x7f0000000140), 0xffffffffffff9c94, 0x3) r1 = open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) fcntl$setlease(r1, 0x400, 0x2) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16@\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$SG_GET_NUM_WAITING(0xffffffffffffffff, 0x227d, &(0x7f00000003c0)) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000002c0)={'veth0_to_bond\x00', &(0x7f0000000540)=ANY=[@ANYBLOB="390000000600000006000000050000000800010000000000000000000100010035c6bd9e46c942b73f6ee9b4bc46d02953420c58bcefe0b245bba28c3c4359f5c30855a6515ce3108762a482e6a66744b628607754e86ae6f55953d69645314b507363b50271031724c1dcb679631f002bb3f786f60e79a7799efd67b758298a320851f561d3358e61945909954d86cde32d1b26d25503475b14923e2bdf5c0a1f66c6"]}) socket$inet_udplite(0x2, 0x2, 0x88) 14:26:46 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet6_IPV6_ADDRFORM(r0, 0x29, 0x3a, 0x0, 0x0) 14:26:46 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getuid() r0 = socket$nl_netfilter(0x10, 0x3, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={0x0, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000000040)='bond_slave_1\x00'}, 0x30) open(&(0x7f00009e1000)='./file0\x00', 0x8040, 0x0) syz_extract_tcp_res(&(0x7f0000000140), 0xffffffffffff9c94, 0x3) r1 = open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) fcntl$setlease(r1, 0x400, 0x2) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16@\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$SG_GET_NUM_WAITING(0xffffffffffffffff, 0x227d, &(0x7f00000003c0)) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000002c0)={'veth0_to_bond\x00', &(0x7f0000000540)=ANY=[@ANYBLOB="390000000600000006000000050000000800010000000000000000000100010035c6bd9e46c942b73f6ee9b4bc46d02953420c58bcefe0b245bba28c3c4359f5c30855a6515ce3108762a482e6a66744b628607754e86ae6f55953d69645314b507363b50271031724c1dcb679631f002bb3f786f60e79a7799efd67b758298a320851f561d3358e61945909954d86cde32d1b26d25503475b14923e2bdf5c0a1f66c6"]}) socket$inet_udplite(0x2, 0x2, 0x88) 14:26:46 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) 14:26:46 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f00000000c0)={0x0, 0x1c, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @rand_addr="6e31bfd72c89323c0c80b5167329292c"}]}, &(0x7f0000000100)=0x10) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x75, &(0x7f0000000140)={r1}, &(0x7f0000000080)=0x8) 14:26:46 executing program 4: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000000), &(0x7f0000000040)=0x20) 14:26:46 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet6_IPV6_ADDRFORM(r0, 0x29, 0x3a, 0x0, 0x0) 14:26:46 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet6_IPV6_ADDRFORM(r0, 0x29, 0x3a, 0x0, 0x0) 14:26:46 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f00000000c0)={0x0, 0x1c, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @rand_addr="6e31bfd72c89323c0c80b5167329292c"}]}, &(0x7f0000000100)=0x10) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x75, &(0x7f0000000140)={r1}, &(0x7f0000000080)=0x8) 14:26:46 executing program 4: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000000), &(0x7f0000000040)=0x20) [ 348.489177][T28547] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 14:26:46 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) [ 348.555344][T28563] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 14:26:46 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f00000000c0)={0x0, 0x1c, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @rand_addr="6e31bfd72c89323c0c80b5167329292c"}]}, &(0x7f0000000100)=0x10) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x75, &(0x7f0000000140)={r1}, &(0x7f0000000080)=0x8) 14:26:46 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/pmtu_disc\x00', 0x2, 0x0) write$9p(r1, &(0x7f0000000c40)="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", 0x1000) 14:26:46 executing program 4: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000000), &(0x7f0000000040)=0x20) 14:26:46 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet6_IPV6_ADDRFORM(r0, 0x29, 0x3a, 0x0, 0x0) 14:26:46 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f00000000c0)={0x0, 0x1c, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @rand_addr="6e31bfd72c89323c0c80b5167329292c"}]}, &(0x7f0000000100)=0x10) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x75, &(0x7f0000000140)={r1}, &(0x7f0000000080)=0x8) 14:26:47 executing program 4: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000000), &(0x7f0000000040)=0x20) 14:26:47 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/pmtu_disc\x00', 0x2, 0x0) write$9p(r1, &(0x7f0000000c40)="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", 0x1000) 14:26:47 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) 14:26:47 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f00000000c0)={0x0, 0x1c, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @rand_addr="6e31bfd72c89323c0c80b5167329292c"}]}, &(0x7f0000000100)=0x10) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x75, &(0x7f0000000140)={r1}, &(0x7f0000000080)=0x8) 14:26:47 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/pmtu_disc\x00', 0x2, 0x0) write$9p(r1, &(0x7f0000000c40)="c73be0bc92c400b134fe0c9125b1c1c7263e1317066205ffa7c6387b1eb7ef10e676935f0f2f626d0a0d6155b596ecdc071a19b302a7fc26cdeb27b5c9d0d56d5ad62670422a11f157c1321d936a515aba0f9f985130e11af88a1f96c344d60b784190a6a54ada3a49b4943ab922c4397ba7cc97b05970a241bae6973a862ade65e77134d9f7e5b47d78780c499847c41907e24d5c8f67608c2b9cde157de1727ca117247d99dbb6d1e3b296861b2b793223bf5364f1c463cc22e5954ef28d95bcd96204b751e1c3397d70b2e16e8112b043eebf973c695468c5c19522d8f574b50d66a25c9bbe14ee97f2b0072659745d56d200954bb9ac2d46b0f1c3f3d01e14446ee8e22d0110888d1da48a96b6335c901a280be900b5dab5aa88ac052ec5726947d140ea5c962dd7c43d4216095cb0f7eda168db73ec8ce80e3ba64a9738581b65e007a329f78aeb2f0809232824a92e42b7bf65da9767daa620a40cc011788f4a2639c6eb41d88f8be32725d777b1ff78517640a6aa1ef452751d377dbd7174bdefafdea1598be6d1fa2a0248314a7b1326a35e51314267f4d14cfaa4e72cbab10182757b5bbf7705c59ef81085a19e48e3c3d5db2e96b1f0f28fec93c26c0a5946dd06fce1609abfbef401972b00c516be3672a58bdba4dcbb56a534f4f518b3abc3661ad2541f1957a69e45069c549c4ef97c646041ddb8db29d467162e02fef7e39ff801cb0dfbce96ada2eb18782f94f68aa4076ad9f495e6163bd8c471310fe01cc9d928c27d94c4352990a15c07d872d8e62786314309c8cc3773d6d51b7697be723ba25834339ace52bd7ee70cd2263b3610ef9754adf97fabef5f8aebd57bc0170e95736ccbd266d4e7508ca751883ec59308100ba99a1735bdee455f8780d8aeb1b77f49080b0a1484d78b27bf97ac056f44b39b9acb006fa20771ec5651b550a8f27485873c9d545ff6cc520231638f73e5de0ec909740488c73244ed2d9d1025e22beca91453260f6a38a10a9f4ea83e9c4731f9441edffc1271f9efb61b26220353b126549d6a4efbd7660f3b2ac7a6fdf1fe2fd48811c1a7b3781ae8d4333643f3743ff7554d9a39ed5563e9a802c424b1a349c023435fc47b7de6e6d74ede84db8bd5036728ec1cb331c94b4a71319fe957a06cbaa9df9e07ff647431edd4be79e14a2f224094caa9d6b1c1516aa082524af8276bed6702eccfee00274bbe9e0c3cde43afb207807ab2f7be7c76f2c440fc18d1012b4650985de73ce5d5f26bcc4e4ebfa473e5b4dce7c762f3c53b99c5bbef52a3426d9f3d6b2f63c0a4905a73bba5bdf42418d14928acbc2b4cb78298952994fcafcdee41f38cc81da4670371c235eee1ecb6873f83ba2ed4482e1935a009e192119884272751e941a734246d425cfb8c4f2a7825989d4e074c6989f825fd21f9859608acd8e885b686861d02b69c28e50db260f0963befc402cae834e6032c8a17b9a49334336ae689635fe36f974b584e4324db39b3588c6329836196e27a385b1d04d05ff42f661cc551b941fe3fb2c045333b56f8e0d9922eb277550b1e97396f97c9a0ba51b95235ae7e20e0a6c95605e03181c679a52eb59792a122f47f887779b18a931488569eb442d5c04dfa91cda35770d0c0230c5b24aed5171af6174abbd0527f85d52f6893cef956bea461c054ac0f926a99d19327af20b42469e384a2bc1fa46cd43ae12bee64688f68e3005996927ccb8db0ad780e1a5d4c249edafbe7c70393dc85ffae633dac14f516e823abe7bffdeeb0ece7c0080d5c6b2f569b657be9539eaf3fdd0f7f629b76597b635baf0a4b142a6c652cccc0102c6ed4e4a5dec4d9ffeae5f5d4defb57539a82f2469dd482132426ab90ddb4b52a5460b51ecbf0cf7fae667d3488eb7fe48757f46adf9a1ff70c1ab64fe81586507468f9ab553fcc140fd52227b64c606c31725dec2c8a62547e76e751c7e103e9281b815d17679ec783b3902367a58a1d6ba52aaa7ad6dd85b9f5880ce2417bf7d930d5a3bbe501adf8cad506f9043a5b8be2f3918213d0f075b2baddc620c1ac0b63ad249a10b9b5586fa0638e6463d77064fe55b4dd20e3c6fe2228073669bbaf3398b77dcf61a0801b79c75cda01c00953b7e3ae29f659171ec56a538f505662b6258edb4a7fa17e0b5fa266c601808301a0c41138159f5531d87338145e4a4348bd56e87827f07c2ddd2861baa1fde2f61367600c98212e041a96debf8d68eb1eaa1a97861529474994ededd9400454cd864dbc19f71ce8385ea331aae4057b8f04cd526450a67e2a1c6deb10fb9303d45990e74503cfdef80a082ae3d77826d50591209770ecb7dd5a56e81339522c4df6bb1170f301f006152705e2dde63b7075899faa3cfa4b0baec90a21f43b3d0d6b2b9b9cbe93dcaa422b12179c73ca22ab944bd3cd22262430dbbe6cea18b2ec952eeb14b5e86bf001418683e4ec4eea1588e8c86676817a40f7e95530fa89538b09873df26dfca5c94edf77d1190bc524096234ff25c1abecbec01134b217b662352045e45035a6ba80568a2fe50426bebf687e0c4f8181203ddbc87c424b9dde50d2b306d89df53cf885aede40d8deddda6af3e91e21dc675743f2b5a4510eca91d99575c6152e099cfa4a44705bf03302370fb7a65cc647de05cd203e81dfebb4d79e797b13e356e82efc3d6968e7793754c145eeb4d4cce803823671fb181ba365a2aa9412626e370a9e3d8eb3e26cc2abe1efa2686e3b9e1385c7643d30db5524bfa14814025a97df907168a436b8c16a68b0ce69fed2f9777284cde6280fd81eae274b990d75f8bcc25513343349ad9689db399cfc1469e710a050917994905ec54d1f6b0a872339644c0a2a5ef647ee89ebeb38d2abc25319d25cfbfe57a61d322575d77c89b3df82be4016c4dafd46dafb3cbfd50a49e5ba62a049037b729d8861d24ea3a9287344842c76e3545b1f345486f317bc98d3866fe8938fc18c04614d003ce646bae79349175a769da5dc5837f4d175d16f63fccac871fcb4453a4caf0dd8343980f2631764863e35d42cff8ff6a8f10bb8a3cff9205f7b4fd943ede373f2cf6aaba891ea2290a533b32a7bccf1dea64f5b104ba3925b393029dba2fdd8dbc7116c48f88a42f442fd2eba75651f73306f45a8da24753cfec6a0066e388fc67306fcdc4febaaa3ecb9306f8e9ade28f3645e0bf51482612aee5a1d8a8bcc40b224194bc4f6dcc10603343b9abf992b1ad491442da08917968a92e3ad1dc7967bfdbddaef8d9d7ea693a279ea554b990858471fc99a702cabf3c511fbc3662dc11790ccc9a7b08b5f8b643a03fee34d8f9b927da43f0d7f02ecdc9912a1502bbd669c0fa49f7aadb89923c104870fac29a507cc1b4660cebdacbeebc0a96c9a8cf528fa93e1cfef2fbc1cc3479c308ff97115496fa66302648e088732d72dece4e991678110d1fe3c56bacd2d0b04505927ae9d5e353c315a370c48a041e220e7434aa555bbfe828f3c67399349599e22a6163a69360c22e0f6d5cd34f07803c9199d41e5448c5db6351a624c5dec63935c0a7f13c1e6c3be8f1ed21923ac41962b6efc4883c764cdec993b0c2df43a7b50379f1229340c9c5b27f3dce3d39b85b2b322b69544c0d057f5fa947c87c5687475305ebd73c58e7eb151a035ef590f00150975ddcea37558894fec355f63412afea06d19382a1ff0ea2988236aeed4b2d4f7caae6a6c7549db6684fdda22d780bab5e2019a79045eb655e6795e8c36dc84898a5b5c25a9baf299e6fd6941a4d5dae25c332ad36ba15aa52519ead43921e45ace9b1c4657bfae3cdcb9cb45a97dbd17d66aa461bfc85b1c1b2e48eb96140e42e67590b2ce00136580941257f157a646701d2dfb37d477b3e8a1218ed8a3997a51cdbc4a57b422d45d2a99690f81bd6d3b05a308ac90790845bf4fbcce3e059b6a35518cf672ba999f0a015391f23cba9fdbdf0195f6c83c39e408bb4ce8992f2a551e7609cb169c58fc56040bcb5a8e462bd24286715e63322343fbcb6551c41b09605f7fbeed40eb7f5ee2bd6e0b0a1ef73ef991d07513dbb97512875b75c39749db3f2d542b85e9214e85c266f7019754c601f6072c89844b945620945baa428080400ca7d8a0ab311267e47dfc4e24fb8707186fcbee5c4d2a2a5934a2a48a0dbe8a5ecfdc5ea309667a6fcc9e8899dc1b1e333459c1de2de588ab458d61b751185cfae3895fa32ada71909de1298847434d5e8debd40fec2e9f4d19513928400c5db85397be5018301bffedec0921b5cf21d9603c54ab8b167d53a0e93f7d0d04e05f675ea6134a10a8e37cdc63d1a666acc303bb5adb812be996dc9891769e5e6e3efc305b8593832a62632202663677ff6cde984a8cd100201ea90d40d2d2888878a1d3abc01f87d758d6e4648502cc1fef9e91066498c1f50e2c6b548ee65c0be62b0b8241cff4f162bffa88edcb55779b54470868bdbdd4377688ad97dc149759eb02c0050c10fcca95c5ba67b6460ebfbef879d69a8a2267f987712bf39efd60a1beb823bcb06b5457d50fbec237de7a49f965810ef73b2c44c36837044890680f9bddbfb94fbc0965fb6f6251cb1dbbb03870d902b7104e15276c85e46ced085127d1d1782ed37528fcae6d531377ff12f8bdd73aed693ce448bba43efb27e1879c180e76d0c0fb10b8bfa9216ec3a8ba8379d45b35a6bdf1bec3d9625835add7693befedd91c403c2208aea49a9543b5b018fca7215bcefbde74d02281cfb48eb2f674253a10a1db16484675da3519f1a9196b10db56155d724e9ad78ec291aa38301166eb52e74ae60a2f6ee8f102af674567498b40d9fbee25de0b425e43b1f0a005bfc2c89f9204ced9691f9a08b74f34e44908dc611b5ae1c3c715c5ccacffe4f8347d48907304a66969ec30cdd6b5997299ce38c6ca1b6d5899026532a6cee387d093baa124465abcfd053e9894982028530f7051640f3defe292d7c49351e4a1eb699b8e4a644b670dec845cd43f841efca2870817cc86bc2cdd7247db709cc73eb55c35db6de197c05d2f5b3a487a46f3ff7b0588726f11c27e68a6321a26a4afcdc6449f1b470a1db0b7c398ab78281e8d263692754b48bb0152e9db7300312dc22149bb04ff299f435a2ff0e35e818ba38eb08b1b94564a56399d7798bd637bb8bed3f2c143f4008452c64d0513b23c4f812e7fdb5da98edd26ee320becd8ea74eda4fcfe545b560bae3ddbfb7d7105dfe071acd3d7a162f2973cdc6210546b2060b34580e0e38fe704635db2637cb92a8b74fbc7938cc675d35cd958f669668a31f7c1530839ad119eb97aae37a044a4cb302ad1dd36d1955e2a9b559e2c394fd905161e76f335f15196bd0c287e2c0ed09516bc8f3e060a4d251a8c6240cf67f7dfde268b49f30b58bb4041f2abbe7ae1a0f843a5e5df51c53ef617083395b008e100f7d4c1dcdf3919dfa3f3295bbf1cdb6c0ba12c760ab809ea6a7df056f1024f3340e39e5c330065e2984b3b1e96fe069176a93d25c724e1cb09f2d5514b9e9e694ac5b6c40efef420f06c18992276b092b59aa64d3631292f89f4018b5890bd51888a01432320db9f4b0894fa4642e88270ce77dc25bf3df0d270a2ac1581bc88f51a4c7c980b89e6f5cd202fc236be25941ab7725279af9b8ec4c9670c11d65b06f70174b87883c31ec03ff4a7632de6e632147b0c544faa1ab3f6620c445e34f8ab47556c9d1579d039e73416b1f560f7e13e09fbbdfe", 0x1000) 14:26:47 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f00000000c0)={0x0, 0x1c, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @rand_addr="6e31bfd72c89323c0c80b5167329292c"}]}, &(0x7f0000000100)=0x10) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x75, &(0x7f0000000140)={r1}, &(0x7f0000000080)=0x8) 14:26:47 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/pmtu_disc\x00', 0x2, 0x0) write$9p(r1, &(0x7f0000000c40)="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", 0x1000) 14:26:47 executing program 4: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10032, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000080)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r1, 0x84, 0xd, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0x8) ioctl$UFFDIO_WAKE(r0, 0x8010aa02, &(0x7f0000000100)={&(0x7f0000004000/0x3000)=nil, 0x3000}) 14:26:47 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) 14:26:47 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f00000000c0)={0x0, 0x1c, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @rand_addr="6e31bfd72c89323c0c80b5167329292c"}]}, &(0x7f0000000100)=0x10) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x75, &(0x7f0000000140)={r1}, &(0x7f0000000080)=0x8) 14:26:47 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/pmtu_disc\x00', 0x2, 0x0) write$9p(r1, &(0x7f0000000c40)="c73be0bc92c400b134fe0c9125b1c1c7263e1317066205ffa7c6387b1eb7ef10e676935f0f2f626d0a0d6155b596ecdc071a19b302a7fc26cdeb27b5c9d0d56d5ad62670422a11f157c1321d936a515aba0f9f985130e11af88a1f96c344d60b784190a6a54ada3a49b4943ab922c4397ba7cc97b05970a241bae6973a862ade65e77134d9f7e5b47d78780c499847c41907e24d5c8f67608c2b9cde157de1727ca117247d99dbb6d1e3b296861b2b793223bf5364f1c463cc22e5954ef28d95bcd96204b751e1c3397d70b2e16e8112b043eebf973c695468c5c19522d8f574b50d66a25c9bbe14ee97f2b0072659745d56d200954bb9ac2d46b0f1c3f3d01e14446ee8e22d0110888d1da48a96b6335c901a280be900b5dab5aa88ac052ec5726947d140ea5c962dd7c43d4216095cb0f7eda168db73ec8ce80e3ba64a9738581b65e007a329f78aeb2f0809232824a92e42b7bf65da9767daa620a40cc011788f4a2639c6eb41d88f8be32725d777b1ff78517640a6aa1ef452751d377dbd7174bdefafdea1598be6d1fa2a0248314a7b1326a35e51314267f4d14cfaa4e72cbab10182757b5bbf7705c59ef81085a19e48e3c3d5db2e96b1f0f28fec93c26c0a5946dd06fce1609abfbef401972b00c516be3672a58bdba4dcbb56a534f4f518b3abc3661ad2541f1957a69e45069c549c4ef97c646041ddb8db29d467162e02fef7e39ff801cb0dfbce96ada2eb18782f94f68aa4076ad9f495e6163bd8c471310fe01cc9d928c27d94c4352990a15c07d872d8e62786314309c8cc3773d6d51b7697be723ba25834339ace52bd7ee70cd2263b3610ef9754adf97fabef5f8aebd57bc0170e95736ccbd266d4e7508ca751883ec59308100ba99a1735bdee455f8780d8aeb1b77f49080b0a1484d78b27bf97ac056f44b39b9acb006fa20771ec5651b550a8f27485873c9d545ff6cc520231638f73e5de0ec909740488c73244ed2d9d1025e22beca91453260f6a38a10a9f4ea83e9c4731f9441edffc1271f9efb61b26220353b126549d6a4efbd7660f3b2ac7a6fdf1fe2fd48811c1a7b3781ae8d4333643f3743ff7554d9a39ed5563e9a802c424b1a349c023435fc47b7de6e6d74ede84db8bd5036728ec1cb331c94b4a71319fe957a06cbaa9df9e07ff647431edd4be79e14a2f224094caa9d6b1c1516aa082524af8276bed6702eccfee00274bbe9e0c3cde43afb207807ab2f7be7c76f2c440fc18d1012b4650985de73ce5d5f26bcc4e4ebfa473e5b4dce7c762f3c53b99c5bbef52a3426d9f3d6b2f63c0a4905a73bba5bdf42418d14928acbc2b4cb78298952994fcafcdee41f38cc81da4670371c235eee1ecb6873f83ba2ed4482e1935a009e192119884272751e941a734246d425cfb8c4f2a7825989d4e074c6989f825fd21f9859608acd8e885b686861d02b69c28e50db260f0963befc402cae834e6032c8a17b9a49334336ae689635fe36f974b584e4324db39b3588c6329836196e27a385b1d04d05ff42f661cc551b941fe3fb2c045333b56f8e0d9922eb277550b1e97396f97c9a0ba51b95235ae7e20e0a6c95605e03181c679a52eb59792a122f47f887779b18a931488569eb442d5c04dfa91cda35770d0c0230c5b24aed5171af6174abbd0527f85d52f6893cef956bea461c054ac0f926a99d19327af20b42469e384a2bc1fa46cd43ae12bee64688f68e3005996927ccb8db0ad780e1a5d4c249edafbe7c70393dc85ffae633dac14f516e823abe7bffdeeb0ece7c0080d5c6b2f569b657be9539eaf3fdd0f7f629b76597b635baf0a4b142a6c652cccc0102c6ed4e4a5dec4d9ffeae5f5d4defb57539a82f2469dd482132426ab90ddb4b52a5460b51ecbf0cf7fae667d3488eb7fe48757f46adf9a1ff70c1ab64fe81586507468f9ab553fcc140fd52227b64c606c31725dec2c8a62547e76e751c7e103e9281b815d17679ec783b3902367a58a1d6ba52aaa7ad6dd85b9f5880ce2417bf7d930d5a3bbe501adf8cad506f9043a5b8be2f3918213d0f075b2baddc620c1ac0b63ad249a10b9b5586fa0638e6463d77064fe55b4dd20e3c6fe2228073669bbaf3398b77dcf61a0801b79c75cda01c00953b7e3ae29f659171ec56a538f505662b6258edb4a7fa17e0b5fa266c601808301a0c41138159f5531d87338145e4a4348bd56e87827f07c2ddd2861baa1fde2f61367600c98212e041a96debf8d68eb1eaa1a97861529474994ededd9400454cd864dbc19f71ce8385ea331aae4057b8f04cd526450a67e2a1c6deb10fb9303d45990e74503cfdef80a082ae3d77826d50591209770ecb7dd5a56e81339522c4df6bb1170f301f006152705e2dde63b7075899faa3cfa4b0baec90a21f43b3d0d6b2b9b9cbe93dcaa422b12179c73ca22ab944bd3cd22262430dbbe6cea18b2ec952eeb14b5e86bf001418683e4ec4eea1588e8c86676817a40f7e95530fa89538b09873df26dfca5c94edf77d1190bc524096234ff25c1abecbec01134b217b662352045e45035a6ba80568a2fe50426bebf687e0c4f8181203ddbc87c424b9dde50d2b306d89df53cf885aede40d8deddda6af3e91e21dc675743f2b5a4510eca91d99575c6152e099cfa4a44705bf03302370fb7a65cc647de05cd203e81dfebb4d79e797b13e356e82efc3d6968e7793754c145eeb4d4cce803823671fb181ba365a2aa9412626e370a9e3d8eb3e26cc2abe1efa2686e3b9e1385c7643d30db5524bfa14814025a97df907168a436b8c16a68b0ce69fed2f9777284cde6280fd81eae274b990d75f8bcc25513343349ad9689db399cfc1469e710a050917994905ec54d1f6b0a872339644c0a2a5ef647ee89ebeb38d2abc25319d25cfbfe57a61d322575d77c89b3df82be4016c4dafd46dafb3cbfd50a49e5ba62a049037b729d8861d24ea3a9287344842c76e3545b1f345486f317bc98d3866fe8938fc18c04614d003ce646bae79349175a769da5dc5837f4d175d16f63fccac871fcb4453a4caf0dd8343980f2631764863e35d42cff8ff6a8f10bb8a3cff9205f7b4fd943ede373f2cf6aaba891ea2290a533b32a7bccf1dea64f5b104ba3925b393029dba2fdd8dbc7116c48f88a42f442fd2eba75651f73306f45a8da24753cfec6a0066e388fc67306fcdc4febaaa3ecb9306f8e9ade28f3645e0bf51482612aee5a1d8a8bcc40b224194bc4f6dcc10603343b9abf992b1ad491442da08917968a92e3ad1dc7967bfdbddaef8d9d7ea693a279ea554b990858471fc99a702cabf3c511fbc3662dc11790ccc9a7b08b5f8b643a03fee34d8f9b927da43f0d7f02ecdc9912a1502bbd669c0fa49f7aadb89923c104870fac29a507cc1b4660cebdacbeebc0a96c9a8cf528fa93e1cfef2fbc1cc3479c308ff97115496fa66302648e088732d72dece4e991678110d1fe3c56bacd2d0b04505927ae9d5e353c315a370c48a041e220e7434aa555bbfe828f3c67399349599e22a6163a69360c22e0f6d5cd34f07803c9199d41e5448c5db6351a624c5dec63935c0a7f13c1e6c3be8f1ed21923ac41962b6efc4883c764cdec993b0c2df43a7b50379f1229340c9c5b27f3dce3d39b85b2b322b69544c0d057f5fa947c87c5687475305ebd73c58e7eb151a035ef590f00150975ddcea37558894fec355f63412afea06d19382a1ff0ea2988236aeed4b2d4f7caae6a6c7549db6684fdda22d780bab5e2019a79045eb655e6795e8c36dc84898a5b5c25a9baf299e6fd6941a4d5dae25c332ad36ba15aa52519ead43921e45ace9b1c4657bfae3cdcb9cb45a97dbd17d66aa461bfc85b1c1b2e48eb96140e42e67590b2ce00136580941257f157a646701d2dfb37d477b3e8a1218ed8a3997a51cdbc4a57b422d45d2a99690f81bd6d3b05a308ac90790845bf4fbcce3e059b6a35518cf672ba999f0a015391f23cba9fdbdf0195f6c83c39e408bb4ce8992f2a551e7609cb169c58fc56040bcb5a8e462bd24286715e63322343fbcb6551c41b09605f7fbeed40eb7f5ee2bd6e0b0a1ef73ef991d07513dbb97512875b75c39749db3f2d542b85e9214e85c266f7019754c601f6072c89844b945620945baa428080400ca7d8a0ab311267e47dfc4e24fb8707186fcbee5c4d2a2a5934a2a48a0dbe8a5ecfdc5ea309667a6fcc9e8899dc1b1e333459c1de2de588ab458d61b751185cfae3895fa32ada71909de1298847434d5e8debd40fec2e9f4d19513928400c5db85397be5018301bffedec0921b5cf21d9603c54ab8b167d53a0e93f7d0d04e05f675ea6134a10a8e37cdc63d1a666acc303bb5adb812be996dc9891769e5e6e3efc305b8593832a62632202663677ff6cde984a8cd100201ea90d40d2d2888878a1d3abc01f87d758d6e4648502cc1fef9e91066498c1f50e2c6b548ee65c0be62b0b8241cff4f162bffa88edcb55779b54470868bdbdd4377688ad97dc149759eb02c0050c10fcca95c5ba67b6460ebfbef879d69a8a2267f987712bf39efd60a1beb823bcb06b5457d50fbec237de7a49f965810ef73b2c44c36837044890680f9bddbfb94fbc0965fb6f6251cb1dbbb03870d902b7104e15276c85e46ced085127d1d1782ed37528fcae6d531377ff12f8bdd73aed693ce448bba43efb27e1879c180e76d0c0fb10b8bfa9216ec3a8ba8379d45b35a6bdf1bec3d9625835add7693befedd91c403c2208aea49a9543b5b018fca7215bcefbde74d02281cfb48eb2f674253a10a1db16484675da3519f1a9196b10db56155d724e9ad78ec291aa38301166eb52e74ae60a2f6ee8f102af674567498b40d9fbee25de0b425e43b1f0a005bfc2c89f9204ced9691f9a08b74f34e44908dc611b5ae1c3c715c5ccacffe4f8347d48907304a66969ec30cdd6b5997299ce38c6ca1b6d5899026532a6cee387d093baa124465abcfd053e9894982028530f7051640f3defe292d7c49351e4a1eb699b8e4a644b670dec845cd43f841efca2870817cc86bc2cdd7247db709cc73eb55c35db6de197c05d2f5b3a487a46f3ff7b0588726f11c27e68a6321a26a4afcdc6449f1b470a1db0b7c398ab78281e8d263692754b48bb0152e9db7300312dc22149bb04ff299f435a2ff0e35e818ba38eb08b1b94564a56399d7798bd637bb8bed3f2c143f4008452c64d0513b23c4f812e7fdb5da98edd26ee320becd8ea74eda4fcfe545b560bae3ddbfb7d7105dfe071acd3d7a162f2973cdc6210546b2060b34580e0e38fe704635db2637cb92a8b74fbc7938cc675d35cd958f669668a31f7c1530839ad119eb97aae37a044a4cb302ad1dd36d1955e2a9b559e2c394fd905161e76f335f15196bd0c287e2c0ed09516bc8f3e060a4d251a8c6240cf67f7dfde268b49f30b58bb4041f2abbe7ae1a0f843a5e5df51c53ef617083395b008e100f7d4c1dcdf3919dfa3f3295bbf1cdb6c0ba12c760ab809ea6a7df056f1024f3340e39e5c330065e2984b3b1e96fe069176a93d25c724e1cb09f2d5514b9e9e694ac5b6c40efef420f06c18992276b092b59aa64d3631292f89f4018b5890bd51888a01432320db9f4b0894fa4642e88270ce77dc25bf3df0d270a2ac1581bc88f51a4c7c980b89e6f5cd202fc236be25941ab7725279af9b8ec4c9670c11d65b06f70174b87883c31ec03ff4a7632de6e632147b0c544faa1ab3f6620c445e34f8ab47556c9d1579d039e73416b1f560f7e13e09fbbdfe", 0x1000) 14:26:47 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r0, &(0x7f0000000040)="cd", 0x1, 0xfc, &(0x7f0000aa9000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x800da0ffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfc00000000000000, 0x0, 0x0, 0xa], 0xffffffffffffffff}, 0x1000000000000002}, 0x1c) 14:26:47 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/pmtu_disc\x00', 0x2, 0x0) write$9p(r1, &(0x7f0000000c40)="c73be0bc92c400b134fe0c9125b1c1c7263e1317066205ffa7c6387b1eb7ef10e676935f0f2f626d0a0d6155b596ecdc071a19b302a7fc26cdeb27b5c9d0d56d5ad62670422a11f157c1321d936a515aba0f9f985130e11af88a1f96c344d60b784190a6a54ada3a49b4943ab922c4397ba7cc97b05970a241bae6973a862ade65e77134d9f7e5b47d78780c499847c41907e24d5c8f67608c2b9cde157de1727ca117247d99dbb6d1e3b296861b2b793223bf5364f1c463cc22e5954ef28d95bcd96204b751e1c3397d70b2e16e8112b043eebf973c695468c5c19522d8f574b50d66a25c9bbe14ee97f2b0072659745d56d200954bb9ac2d46b0f1c3f3d01e14446ee8e22d0110888d1da48a96b6335c901a280be900b5dab5aa88ac052ec5726947d140ea5c962dd7c43d4216095cb0f7eda168db73ec8ce80e3ba64a9738581b65e007a329f78aeb2f0809232824a92e42b7bf65da9767daa620a40cc011788f4a2639c6eb41d88f8be32725d777b1ff78517640a6aa1ef452751d377dbd7174bdefafdea1598be6d1fa2a0248314a7b1326a35e51314267f4d14cfaa4e72cbab10182757b5bbf7705c59ef81085a19e48e3c3d5db2e96b1f0f28fec93c26c0a5946dd06fce1609abfbef401972b00c516be3672a58bdba4dcbb56a534f4f518b3abc3661ad2541f1957a69e45069c549c4ef97c646041ddb8db29d467162e02fef7e39ff801cb0dfbce96ada2eb18782f94f68aa4076ad9f495e6163bd8c471310fe01cc9d928c27d94c4352990a15c07d872d8e62786314309c8cc3773d6d51b7697be723ba25834339ace52bd7ee70cd2263b3610ef9754adf97fabef5f8aebd57bc0170e95736ccbd266d4e7508ca751883ec59308100ba99a1735bdee455f8780d8aeb1b77f49080b0a1484d78b27bf97ac056f44b39b9acb006fa20771ec5651b550a8f27485873c9d545ff6cc520231638f73e5de0ec909740488c73244ed2d9d1025e22beca91453260f6a38a10a9f4ea83e9c4731f9441edffc1271f9efb61b26220353b126549d6a4efbd7660f3b2ac7a6fdf1fe2fd48811c1a7b3781ae8d4333643f3743ff7554d9a39ed5563e9a802c424b1a349c023435fc47b7de6e6d74ede84db8bd5036728ec1cb331c94b4a71319fe957a06cbaa9df9e07ff647431edd4be79e14a2f224094caa9d6b1c1516aa082524af8276bed6702eccfee00274bbe9e0c3cde43afb207807ab2f7be7c76f2c440fc18d1012b4650985de73ce5d5f26bcc4e4ebfa473e5b4dce7c762f3c53b99c5bbef52a3426d9f3d6b2f63c0a4905a73bba5bdf42418d14928acbc2b4cb78298952994fcafcdee41f38cc81da4670371c235eee1ecb6873f83ba2ed4482e1935a009e192119884272751e941a734246d425cfb8c4f2a7825989d4e074c6989f825fd21f9859608acd8e885b686861d02b69c28e50db260f0963befc402cae834e6032c8a17b9a49334336ae689635fe36f974b584e4324db39b3588c6329836196e27a385b1d04d05ff42f661cc551b941fe3fb2c045333b56f8e0d9922eb277550b1e97396f97c9a0ba51b95235ae7e20e0a6c95605e03181c679a52eb59792a122f47f887779b18a931488569eb442d5c04dfa91cda35770d0c0230c5b24aed5171af6174abbd0527f85d52f6893cef956bea461c054ac0f926a99d19327af20b42469e384a2bc1fa46cd43ae12bee64688f68e3005996927ccb8db0ad780e1a5d4c249edafbe7c70393dc85ffae633dac14f516e823abe7bffdeeb0ece7c0080d5c6b2f569b657be9539eaf3fdd0f7f629b76597b635baf0a4b142a6c652cccc0102c6ed4e4a5dec4d9ffeae5f5d4defb57539a82f2469dd482132426ab90ddb4b52a5460b51ecbf0cf7fae667d3488eb7fe48757f46adf9a1ff70c1ab64fe81586507468f9ab553fcc140fd52227b64c606c31725dec2c8a62547e76e751c7e103e9281b815d17679ec783b3902367a58a1d6ba52aaa7ad6dd85b9f5880ce2417bf7d930d5a3bbe501adf8cad506f9043a5b8be2f3918213d0f075b2baddc620c1ac0b63ad249a10b9b5586fa0638e6463d77064fe55b4dd20e3c6fe2228073669bbaf3398b77dcf61a0801b79c75cda01c00953b7e3ae29f659171ec56a538f505662b6258edb4a7fa17e0b5fa266c601808301a0c41138159f5531d87338145e4a4348bd56e87827f07c2ddd2861baa1fde2f61367600c98212e041a96debf8d68eb1eaa1a97861529474994ededd9400454cd864dbc19f71ce8385ea331aae4057b8f04cd526450a67e2a1c6deb10fb9303d45990e74503cfdef80a082ae3d77826d50591209770ecb7dd5a56e81339522c4df6bb1170f301f006152705e2dde63b7075899faa3cfa4b0baec90a21f43b3d0d6b2b9b9cbe93dcaa422b12179c73ca22ab944bd3cd22262430dbbe6cea18b2ec952eeb14b5e86bf001418683e4ec4eea1588e8c86676817a40f7e95530fa89538b09873df26dfca5c94edf77d1190bc524096234ff25c1abecbec01134b217b662352045e45035a6ba80568a2fe50426bebf687e0c4f8181203ddbc87c424b9dde50d2b306d89df53cf885aede40d8deddda6af3e91e21dc675743f2b5a4510eca91d99575c6152e099cfa4a44705bf03302370fb7a65cc647de05cd203e81dfebb4d79e797b13e356e82efc3d6968e7793754c145eeb4d4cce803823671fb181ba365a2aa9412626e370a9e3d8eb3e26cc2abe1efa2686e3b9e1385c7643d30db5524bfa14814025a97df907168a436b8c16a68b0ce69fed2f9777284cde6280fd81eae274b990d75f8bcc25513343349ad9689db399cfc1469e710a050917994905ec54d1f6b0a872339644c0a2a5ef647ee89ebeb38d2abc25319d25cfbfe57a61d322575d77c89b3df82be4016c4dafd46dafb3cbfd50a49e5ba62a049037b729d8861d24ea3a9287344842c76e3545b1f345486f317bc98d3866fe8938fc18c04614d003ce646bae79349175a769da5dc5837f4d175d16f63fccac871fcb4453a4caf0dd8343980f2631764863e35d42cff8ff6a8f10bb8a3cff9205f7b4fd943ede373f2cf6aaba891ea2290a533b32a7bccf1dea64f5b104ba3925b393029dba2fdd8dbc7116c48f88a42f442fd2eba75651f73306f45a8da24753cfec6a0066e388fc67306fcdc4febaaa3ecb9306f8e9ade28f3645e0bf51482612aee5a1d8a8bcc40b224194bc4f6dcc10603343b9abf992b1ad491442da08917968a92e3ad1dc7967bfdbddaef8d9d7ea693a279ea554b990858471fc99a702cabf3c511fbc3662dc11790ccc9a7b08b5f8b643a03fee34d8f9b927da43f0d7f02ecdc9912a1502bbd669c0fa49f7aadb89923c104870fac29a507cc1b4660cebdacbeebc0a96c9a8cf528fa93e1cfef2fbc1cc3479c308ff97115496fa66302648e088732d72dece4e991678110d1fe3c56bacd2d0b04505927ae9d5e353c315a370c48a041e220e7434aa555bbfe828f3c67399349599e22a6163a69360c22e0f6d5cd34f07803c9199d41e5448c5db6351a624c5dec63935c0a7f13c1e6c3be8f1ed21923ac41962b6efc4883c764cdec993b0c2df43a7b50379f1229340c9c5b27f3dce3d39b85b2b322b69544c0d057f5fa947c87c5687475305ebd73c58e7eb151a035ef590f00150975ddcea37558894fec355f63412afea06d19382a1ff0ea2988236aeed4b2d4f7caae6a6c7549db6684fdda22d780bab5e2019a79045eb655e6795e8c36dc84898a5b5c25a9baf299e6fd6941a4d5dae25c332ad36ba15aa52519ead43921e45ace9b1c4657bfae3cdcb9cb45a97dbd17d66aa461bfc85b1c1b2e48eb96140e42e67590b2ce00136580941257f157a646701d2dfb37d477b3e8a1218ed8a3997a51cdbc4a57b422d45d2a99690f81bd6d3b05a308ac90790845bf4fbcce3e059b6a35518cf672ba999f0a015391f23cba9fdbdf0195f6c83c39e408bb4ce8992f2a551e7609cb169c58fc56040bcb5a8e462bd24286715e63322343fbcb6551c41b09605f7fbeed40eb7f5ee2bd6e0b0a1ef73ef991d07513dbb97512875b75c39749db3f2d542b85e9214e85c266f7019754c601f6072c89844b945620945baa428080400ca7d8a0ab311267e47dfc4e24fb8707186fcbee5c4d2a2a5934a2a48a0dbe8a5ecfdc5ea309667a6fcc9e8899dc1b1e333459c1de2de588ab458d61b751185cfae3895fa32ada71909de1298847434d5e8debd40fec2e9f4d19513928400c5db85397be5018301bffedec0921b5cf21d9603c54ab8b167d53a0e93f7d0d04e05f675ea6134a10a8e37cdc63d1a666acc303bb5adb812be996dc9891769e5e6e3efc305b8593832a62632202663677ff6cde984a8cd100201ea90d40d2d2888878a1d3abc01f87d758d6e4648502cc1fef9e91066498c1f50e2c6b548ee65c0be62b0b8241cff4f162bffa88edcb55779b54470868bdbdd4377688ad97dc149759eb02c0050c10fcca95c5ba67b6460ebfbef879d69a8a2267f987712bf39efd60a1beb823bcb06b5457d50fbec237de7a49f965810ef73b2c44c36837044890680f9bddbfb94fbc0965fb6f6251cb1dbbb03870d902b7104e15276c85e46ced085127d1d1782ed37528fcae6d531377ff12f8bdd73aed693ce448bba43efb27e1879c180e76d0c0fb10b8bfa9216ec3a8ba8379d45b35a6bdf1bec3d9625835add7693befedd91c403c2208aea49a9543b5b018fca7215bcefbde74d02281cfb48eb2f674253a10a1db16484675da3519f1a9196b10db56155d724e9ad78ec291aa38301166eb52e74ae60a2f6ee8f102af674567498b40d9fbee25de0b425e43b1f0a005bfc2c89f9204ced9691f9a08b74f34e44908dc611b5ae1c3c715c5ccacffe4f8347d48907304a66969ec30cdd6b5997299ce38c6ca1b6d5899026532a6cee387d093baa124465abcfd053e9894982028530f7051640f3defe292d7c49351e4a1eb699b8e4a644b670dec845cd43f841efca2870817cc86bc2cdd7247db709cc73eb55c35db6de197c05d2f5b3a487a46f3ff7b0588726f11c27e68a6321a26a4afcdc6449f1b470a1db0b7c398ab78281e8d263692754b48bb0152e9db7300312dc22149bb04ff299f435a2ff0e35e818ba38eb08b1b94564a56399d7798bd637bb8bed3f2c143f4008452c64d0513b23c4f812e7fdb5da98edd26ee320becd8ea74eda4fcfe545b560bae3ddbfb7d7105dfe071acd3d7a162f2973cdc6210546b2060b34580e0e38fe704635db2637cb92a8b74fbc7938cc675d35cd958f669668a31f7c1530839ad119eb97aae37a044a4cb302ad1dd36d1955e2a9b559e2c394fd905161e76f335f15196bd0c287e2c0ed09516bc8f3e060a4d251a8c6240cf67f7dfde268b49f30b58bb4041f2abbe7ae1a0f843a5e5df51c53ef617083395b008e100f7d4c1dcdf3919dfa3f3295bbf1cdb6c0ba12c760ab809ea6a7df056f1024f3340e39e5c330065e2984b3b1e96fe069176a93d25c724e1cb09f2d5514b9e9e694ac5b6c40efef420f06c18992276b092b59aa64d3631292f89f4018b5890bd51888a01432320db9f4b0894fa4642e88270ce77dc25bf3df0d270a2ac1581bc88f51a4c7c980b89e6f5cd202fc236be25941ab7725279af9b8ec4c9670c11d65b06f70174b87883c31ec03ff4a7632de6e632147b0c544faa1ab3f6620c445e34f8ab47556c9d1579d039e73416b1f560f7e13e09fbbdfe", 0x1000) 14:26:47 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000140)={0xa, 0x4, 0xfa00, {r1}}, 0xc) 14:26:47 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/pmtu_disc\x00', 0x2, 0x0) write$9p(r1, &(0x7f0000000c40)="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", 0x1000) 14:26:47 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8f1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000001300)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(r1, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x84040001}, 0xc, &(0x7f0000000140)={&(0x7f0000001440)=ANY=[@ANYRES16=r2, @ANYBLOB="1074c43fc5d405ea270d4adb3c75a4d967cbe8365944e301b05f4ecdfa0400000014000300080001000300000008000500000000002c000b0039ca529c8eade452f1583f0934ed212ecfc86c2b92ade79da2279027ab4400"/102], 0x2}}, 0x4) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x10000, 0x0) ioctl$RTC_PIE_OFF(r3, 0x7006) r4 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP_VS_SO_SET_ADD(r4, 0x0, 0x482, &(0x7f00000001c0)={0x11, @remote, 0x4e22, 0x1000000, 'wrr\x00', 0x5, 0x1, 0x55}, 0x2c) setsockopt$inet6_int(r4, 0x29, 0x31, &(0x7f0000000000)=0x5, 0x4) getsockopt$IP6T_SO_GET_REVISION_MATCH(r4, 0x29, 0x44, &(0x7f0000000200)={'HL\x00'}, &(0x7f0000000280)=0x1e) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x40, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0086426, &(0x7f0000001380)={0x2, &(0x7f0000001340)=[{0x0}, {}]}) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) ioctl$DRM_IOCTL_LOCK(0xffffffffffffffff, 0x4008642a, &(0x7f0000001540)={r6, 0x61f5206fbdaf66f6}) ioctl$SCSI_IOCTL_GET_IDLUN(r5, 0x5382, &(0x7f00000000c0)) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$KVM_REGISTER_COALESCED_MMIO(r5, 0x4010ae67, 0x0) getsockopt$packet_buf(r4, 0x107, 0xd, &(0x7f00000002c0)=""/4096, &(0x7f00000012c0)=0x1000) recvmmsg(r4, &(0x7f0000008880), 0x45b, 0x44000102, 0x0) r7 = syz_open_dev$sndseq(0x0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f0000000000)={0x0, 0x0, 0x0, 'queue1\x00'}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r7, 0xc08c5335, &(0x7f00000000c0)={0x0, 0x81, 0x0, 'queue0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x90\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00'}) r8 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000380)='/dev/snapshot\x00', 0x70000, 0x0) r9 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000400)='TIPCv2\x00') syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x9, 0x280002) sendmsg$TIPC_NL_MON_PEER_GET(r8, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x810}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=r9, @ANYBLOB="000c2abd7000fddb0900130000001400060004000200040002000800010001f0ffff"], 0x28}, 0x1, 0x0, 0x0, 0x40000}, 0x80) 14:26:47 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r0, &(0x7f0000000040)="cd", 0x1, 0xfc, &(0x7f0000aa9000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x800da0ffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfc00000000000000, 0x0, 0x0, 0xa], 0xffffffffffffffff}, 0x1000000000000002}, 0x1c) 14:26:47 executing program 3: unshare(0x20400) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_init_net_socket$x25(0x9, 0x5, 0x0) r2 = dup(r1) getsockopt$inet6_opts(r2, 0x29, 0x0, 0x0, 0x0) 14:26:47 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000440)=ANY=[@ANYBLOB="020d0000140000000000000000000000080012000000030000000000000000000600000000000000000000000000000000000000000000000000000000000000ff02000000000000000000000000000105000500008000000a0003000000000002000000000000000000ffffac141400000000000000000005000600007f00000a00000000000000fe8000000000000000000000000000ff00000000000000003e47fd1d5fd510da10f019dba6f51e6420a4ea264696ba173c"], 0xa0}}, 0x0) 14:26:47 executing program 4: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10032, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000080)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r1, 0x84, 0xd, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0x8) ioctl$UFFDIO_WAKE(r0, 0x8010aa02, &(0x7f0000000100)={&(0x7f0000004000/0x3000)=nil, 0x3000}) 14:26:47 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000140)={0xa, 0x4, 0xfa00, {r1}}, 0xc) 14:26:47 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r0, &(0x7f0000000040)="cd", 0x1, 0xfc, &(0x7f0000aa9000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x800da0ffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfc00000000000000, 0x0, 0x0, 0xa], 0xffffffffffffffff}, 0x1000000000000002}, 0x1c) 14:26:47 executing program 3: unshare(0x20400) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_init_net_socket$x25(0x9, 0x5, 0x0) r2 = dup(r1) getsockopt$inet6_opts(r2, 0x29, 0x0, 0x0, 0x0) 14:26:47 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000440)=ANY=[@ANYBLOB="020d0000140000000000000000000000080012000000030000000000000000000600000000000000000000000000000000000000000000000000000000000000ff02000000000000000000000000000105000500008000000a0003000000000002000000000000000000ffffac141400000000000000000005000600007f00000a00000000000000fe8000000000000000000000000000ff00000000000000003e47fd1d5fd510da10f019dba6f51e6420a4ea264696ba173c"], 0xa0}}, 0x0) 14:26:48 executing program 3: unshare(0x20400) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_init_net_socket$x25(0x9, 0x5, 0x0) r2 = dup(r1) getsockopt$inet6_opts(r2, 0x29, 0x0, 0x0, 0x0) 14:26:48 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000140)={0xa, 0x4, 0xfa00, {r1}}, 0xc) 14:26:48 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r0, &(0x7f0000000040)="cd", 0x1, 0xfc, &(0x7f0000aa9000)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x800da0ffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfc00000000000000, 0x0, 0x0, 0xa], 0xffffffffffffffff}, 0x1000000000000002}, 0x1c) 14:26:48 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8f1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000001300)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(r1, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x84040001}, 0xc, &(0x7f0000000140)={&(0x7f0000001440)=ANY=[@ANYRES16=r2, @ANYBLOB="1074c43fc5d405ea270d4adb3c75a4d967cbe8365944e301b05f4ecdfa0400000014000300080001000300000008000500000000002c000b0039ca529c8eade452f1583f0934ed212ecfc86c2b92ade79da2279027ab4400"/102], 0x2}}, 0x4) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x10000, 0x0) ioctl$RTC_PIE_OFF(r3, 0x7006) r4 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP_VS_SO_SET_ADD(r4, 0x0, 0x482, &(0x7f00000001c0)={0x11, @remote, 0x4e22, 0x1000000, 'wrr\x00', 0x5, 0x1, 0x55}, 0x2c) setsockopt$inet6_int(r4, 0x29, 0x31, &(0x7f0000000000)=0x5, 0x4) getsockopt$IP6T_SO_GET_REVISION_MATCH(r4, 0x29, 0x44, &(0x7f0000000200)={'HL\x00'}, &(0x7f0000000280)=0x1e) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x40, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0086426, &(0x7f0000001380)={0x2, &(0x7f0000001340)=[{0x0}, {}]}) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) ioctl$DRM_IOCTL_LOCK(0xffffffffffffffff, 0x4008642a, &(0x7f0000001540)={r6, 0x61f5206fbdaf66f6}) ioctl$SCSI_IOCTL_GET_IDLUN(r5, 0x5382, &(0x7f00000000c0)) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$KVM_REGISTER_COALESCED_MMIO(r5, 0x4010ae67, 0x0) getsockopt$packet_buf(r4, 0x107, 0xd, &(0x7f00000002c0)=""/4096, &(0x7f00000012c0)=0x1000) recvmmsg(r4, &(0x7f0000008880), 0x45b, 0x44000102, 0x0) r7 = syz_open_dev$sndseq(0x0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f0000000000)={0x0, 0x0, 0x0, 'queue1\x00'}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r7, 0xc08c5335, &(0x7f00000000c0)={0x0, 0x81, 0x0, 'queue0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x90\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00'}) r8 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000380)='/dev/snapshot\x00', 0x70000, 0x0) r9 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000400)='TIPCv2\x00') syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x9, 0x280002) sendmsg$TIPC_NL_MON_PEER_GET(r8, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x810}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=r9, @ANYBLOB="000c2abd7000fddb0900130000001400060004000200040002000800010001f0ffff"], 0x28}, 0x1, 0x0, 0x0, 0x40000}, 0x80) 14:26:48 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000440)=ANY=[@ANYBLOB="020d0000140000000000000000000000080012000000030000000000000000000600000000000000000000000000000000000000000000000000000000000000ff02000000000000000000000000000105000500008000000a0003000000000002000000000000000000ffffac141400000000000000000005000600007f00000a00000000000000fe8000000000000000000000000000ff00000000000000003e47fd1d5fd510da10f019dba6f51e6420a4ea264696ba173c"], 0xa0}}, 0x0) 14:26:48 executing program 3: unshare(0x20400) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_init_net_socket$x25(0x9, 0x5, 0x0) r2 = dup(r1) getsockopt$inet6_opts(r2, 0x29, 0x0, 0x0, 0x0) 14:26:48 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000140)={0xa, 0x4, 0xfa00, {r1}}, 0xc) 14:26:48 executing program 4: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10032, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000080)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r1, 0x84, 0xd, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0x8) ioctl$UFFDIO_WAKE(r0, 0x8010aa02, &(0x7f0000000100)={&(0x7f0000004000/0x3000)=nil, 0x3000}) 14:26:48 executing program 0: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000600)='/dev/dsp\x00', 0x0, 0x0) readv(r0, &(0x7f0000000540)=[{&(0x7f00000000c0)=""/213, 0xd5}], 0x15) 14:26:48 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8f1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000001300)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(r1, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x84040001}, 0xc, &(0x7f0000000140)={&(0x7f0000001440)=ANY=[@ANYRES16=r2, @ANYBLOB="1074c43fc5d405ea270d4adb3c75a4d967cbe8365944e301b05f4ecdfa0400000014000300080001000300000008000500000000002c000b0039ca529c8eade452f1583f0934ed212ecfc86c2b92ade79da2279027ab4400"/102], 0x2}}, 0x4) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x10000, 0x0) ioctl$RTC_PIE_OFF(r3, 0x7006) r4 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP_VS_SO_SET_ADD(r4, 0x0, 0x482, &(0x7f00000001c0)={0x11, @remote, 0x4e22, 0x1000000, 'wrr\x00', 0x5, 0x1, 0x55}, 0x2c) setsockopt$inet6_int(r4, 0x29, 0x31, &(0x7f0000000000)=0x5, 0x4) getsockopt$IP6T_SO_GET_REVISION_MATCH(r4, 0x29, 0x44, &(0x7f0000000200)={'HL\x00'}, &(0x7f0000000280)=0x1e) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x40, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0086426, &(0x7f0000001380)={0x2, &(0x7f0000001340)=[{0x0}, {}]}) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) ioctl$DRM_IOCTL_LOCK(0xffffffffffffffff, 0x4008642a, &(0x7f0000001540)={r6, 0x61f5206fbdaf66f6}) ioctl$SCSI_IOCTL_GET_IDLUN(r5, 0x5382, &(0x7f00000000c0)) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$KVM_REGISTER_COALESCED_MMIO(r5, 0x4010ae67, 0x0) getsockopt$packet_buf(r4, 0x107, 0xd, &(0x7f00000002c0)=""/4096, &(0x7f00000012c0)=0x1000) recvmmsg(r4, &(0x7f0000008880), 0x45b, 0x44000102, 0x0) r7 = syz_open_dev$sndseq(0x0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f0000000000)={0x0, 0x0, 0x0, 'queue1\x00'}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r7, 0xc08c5335, &(0x7f00000000c0)={0x0, 0x81, 0x0, 'queue0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x90\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00'}) r8 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000380)='/dev/snapshot\x00', 0x70000, 0x0) r9 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000400)='TIPCv2\x00') syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x9, 0x280002) sendmsg$TIPC_NL_MON_PEER_GET(r8, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x810}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=r9, @ANYBLOB="000c2abd7000fddb0900130000001400060004000200040002000800010001f0ffff"], 0x28}, 0x1, 0x0, 0x0, 0x40000}, 0x80) 14:26:48 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000440)=ANY=[@ANYBLOB="020d0000140000000000000000000000080012000000030000000000000000000600000000000000000000000000000000000000000000000000000000000000ff02000000000000000000000000000105000500008000000a0003000000000002000000000000000000ffffac141400000000000000000005000600007f00000a00000000000000fe8000000000000000000000000000ff00000000000000003e47fd1d5fd510da10f019dba6f51e6420a4ea264696ba173c"], 0xa0}}, 0x0) 14:26:48 executing program 1: r0 = syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8f1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000001300)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(r1, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x84040001}, 0xc, &(0x7f0000000140)={&(0x7f0000001440)=ANY=[@ANYRES16=r2, @ANYBLOB="1074c43fc5d405ea270d4adb3c75a4d967cbe8365944e301b05f4ecdfa0400000014000300080001000300000008000500000000002c000b0039ca529c8eade452f1583f0934ed212ecfc86c2b92ade79da2279027ab4400"/102], 0x2}}, 0x4) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x10000, 0x0) ioctl$RTC_PIE_OFF(r3, 0x7006) r4 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP_VS_SO_SET_ADD(r4, 0x0, 0x482, &(0x7f00000001c0)={0x11, @remote, 0x4e22, 0x1000000, 'wrr\x00', 0x5, 0x1, 0x55}, 0x2c) setsockopt$inet6_int(r4, 0x29, 0x31, &(0x7f0000000000)=0x5, 0x4) getsockopt$IP6T_SO_GET_REVISION_MATCH(r4, 0x29, 0x44, &(0x7f0000000200)={'HL\x00'}, &(0x7f0000000280)=0x1e) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x40, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0086426, &(0x7f0000001380)={0x2, &(0x7f0000001340)=[{0x0}, {}]}) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) ioctl$DRM_IOCTL_LOCK(0xffffffffffffffff, 0x4008642a, &(0x7f0000001540)={r6, 0x61f5206fbdaf66f6}) ioctl$SCSI_IOCTL_GET_IDLUN(r5, 0x5382, &(0x7f00000000c0)) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$KVM_REGISTER_COALESCED_MMIO(r5, 0x4010ae67, 0x0) getsockopt$packet_buf(r4, 0x107, 0xd, &(0x7f00000002c0)=""/4096, &(0x7f00000012c0)=0x1000) recvmmsg(r4, &(0x7f0000008880), 0x45b, 0x44000102, 0x0) r7 = syz_open_dev$sndseq(0x0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f0000000000)={0x0, 0x0, 0x0, 'queue1\x00'}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r7, 0xc08c5335, &(0x7f00000000c0)={0x0, 0x81, 0x0, 'queue0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x90\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00'}) r8 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000380)='/dev/snapshot\x00', 0x70000, 0x0) r9 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000400)='TIPCv2\x00') syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x9, 0x280002) sendmsg$TIPC_NL_MON_PEER_GET(r8, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x810}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=r9, @ANYBLOB="000c2abd7000fddb0900130000001400060004000200040002000800010001f0ffff"], 0x28}, 0x1, 0x0, 0x0, 0x40000}, 0x80) 14:26:48 executing program 0: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000600)='/dev/dsp\x00', 0x0, 0x0) readv(r0, &(0x7f0000000540)=[{&(0x7f00000000c0)=""/213, 0xd5}], 0x15) 14:26:48 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8f1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000001300)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(r1, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x84040001}, 0xc, &(0x7f0000000140)={&(0x7f0000001440)=ANY=[@ANYRES16=r2, @ANYBLOB="1074c43fc5d405ea270d4adb3c75a4d967cbe8365944e301b05f4ecdfa0400000014000300080001000300000008000500000000002c000b0039ca529c8eade452f1583f0934ed212ecfc86c2b92ade79da2279027ab4400"/102], 0x2}}, 0x4) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x10000, 0x0) ioctl$RTC_PIE_OFF(r3, 0x7006) r4 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP_VS_SO_SET_ADD(r4, 0x0, 0x482, &(0x7f00000001c0)={0x11, @remote, 0x4e22, 0x1000000, 'wrr\x00', 0x5, 0x1, 0x55}, 0x2c) setsockopt$inet6_int(r4, 0x29, 0x31, &(0x7f0000000000)=0x5, 0x4) getsockopt$IP6T_SO_GET_REVISION_MATCH(r4, 0x29, 0x44, &(0x7f0000000200)={'HL\x00'}, &(0x7f0000000280)=0x1e) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x40, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0086426, &(0x7f0000001380)={0x2, &(0x7f0000001340)=[{0x0}, {}]}) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) ioctl$DRM_IOCTL_LOCK(0xffffffffffffffff, 0x4008642a, &(0x7f0000001540)={r6, 0x61f5206fbdaf66f6}) ioctl$SCSI_IOCTL_GET_IDLUN(r5, 0x5382, &(0x7f00000000c0)) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$KVM_REGISTER_COALESCED_MMIO(r5, 0x4010ae67, 0x0) getsockopt$packet_buf(r4, 0x107, 0xd, &(0x7f00000002c0)=""/4096, &(0x7f00000012c0)=0x1000) recvmmsg(r4, &(0x7f0000008880), 0x45b, 0x44000102, 0x0) r7 = syz_open_dev$sndseq(0x0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f0000000000)={0x0, 0x0, 0x0, 'queue1\x00'}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r7, 0xc08c5335, &(0x7f00000000c0)={0x0, 0x81, 0x0, 'queue0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x90\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00'}) r8 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000380)='/dev/snapshot\x00', 0x70000, 0x0) r9 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000400)='TIPCv2\x00') syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x9, 0x280002) sendmsg$TIPC_NL_MON_PEER_GET(r8, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x810}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=r9, @ANYBLOB="000c2abd7000fddb0900130000001400060004000200040002000800010001f0ffff"], 0x28}, 0x1, 0x0, 0x0, 0x40000}, 0x80) 14:26:48 executing program 0: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000600)='/dev/dsp\x00', 0x0, 0x0) readv(r0, &(0x7f0000000540)=[{&(0x7f00000000c0)=""/213, 0xd5}], 0x15) 14:26:49 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8f1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000001300)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(r1, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x84040001}, 0xc, &(0x7f0000000140)={&(0x7f0000001440)=ANY=[@ANYRES16=r2, @ANYBLOB="1074c43fc5d405ea270d4adb3c75a4d967cbe8365944e301b05f4ecdfa0400000014000300080001000300000008000500000000002c000b0039ca529c8eade452f1583f0934ed212ecfc86c2b92ade79da2279027ab4400"/102], 0x2}}, 0x4) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x10000, 0x0) ioctl$RTC_PIE_OFF(r3, 0x7006) r4 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP_VS_SO_SET_ADD(r4, 0x0, 0x482, &(0x7f00000001c0)={0x11, @remote, 0x4e22, 0x1000000, 'wrr\x00', 0x5, 0x1, 0x55}, 0x2c) setsockopt$inet6_int(r4, 0x29, 0x31, &(0x7f0000000000)=0x5, 0x4) getsockopt$IP6T_SO_GET_REVISION_MATCH(r4, 0x29, 0x44, &(0x7f0000000200)={'HL\x00'}, &(0x7f0000000280)=0x1e) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x40, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0086426, &(0x7f0000001380)={0x2, &(0x7f0000001340)=[{0x0}, {}]}) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) ioctl$DRM_IOCTL_LOCK(0xffffffffffffffff, 0x4008642a, &(0x7f0000001540)={r6, 0x61f5206fbdaf66f6}) ioctl$SCSI_IOCTL_GET_IDLUN(r5, 0x5382, &(0x7f00000000c0)) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$KVM_REGISTER_COALESCED_MMIO(r5, 0x4010ae67, 0x0) getsockopt$packet_buf(r4, 0x107, 0xd, &(0x7f00000002c0)=""/4096, &(0x7f00000012c0)=0x1000) recvmmsg(r4, &(0x7f0000008880), 0x45b, 0x44000102, 0x0) r7 = syz_open_dev$sndseq(0x0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f0000000000)={0x0, 0x0, 0x0, 'queue1\x00'}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r7, 0xc08c5335, &(0x7f00000000c0)={0x0, 0x81, 0x0, 'queue0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x90\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00'}) r8 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000380)='/dev/snapshot\x00', 0x70000, 0x0) r9 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000400)='TIPCv2\x00') syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x9, 0x280002) sendmsg$TIPC_NL_MON_PEER_GET(r8, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x810}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=r9, @ANYBLOB="000c2abd7000fddb0900130000001400060004000200040002000800010001f0ffff"], 0x28}, 0x1, 0x0, 0x0, 0x40000}, 0x80) 14:26:49 executing program 0: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000600)='/dev/dsp\x00', 0x0, 0x0) readv(r0, &(0x7f0000000540)=[{&(0x7f00000000c0)=""/213, 0xd5}], 0x15) 14:26:49 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8f1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000001300)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(r1, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x84040001}, 0xc, &(0x7f0000000140)={&(0x7f0000001440)=ANY=[@ANYRES16=r2, @ANYBLOB="1074c43fc5d405ea270d4adb3c75a4d967cbe8365944e301b05f4ecdfa0400000014000300080001000300000008000500000000002c000b0039ca529c8eade452f1583f0934ed212ecfc86c2b92ade79da2279027ab4400"/102], 0x2}}, 0x4) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x10000, 0x0) ioctl$RTC_PIE_OFF(r3, 0x7006) r4 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP_VS_SO_SET_ADD(r4, 0x0, 0x482, &(0x7f00000001c0)={0x11, @remote, 0x4e22, 0x1000000, 'wrr\x00', 0x5, 0x1, 0x55}, 0x2c) setsockopt$inet6_int(r4, 0x29, 0x31, &(0x7f0000000000)=0x5, 0x4) getsockopt$IP6T_SO_GET_REVISION_MATCH(r4, 0x29, 0x44, &(0x7f0000000200)={'HL\x00'}, &(0x7f0000000280)=0x1e) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x40, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0086426, &(0x7f0000001380)={0x2, &(0x7f0000001340)=[{0x0}, {}]}) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) ioctl$DRM_IOCTL_LOCK(0xffffffffffffffff, 0x4008642a, &(0x7f0000001540)={r6, 0x61f5206fbdaf66f6}) ioctl$SCSI_IOCTL_GET_IDLUN(r5, 0x5382, &(0x7f00000000c0)) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$KVM_REGISTER_COALESCED_MMIO(r5, 0x4010ae67, 0x0) getsockopt$packet_buf(r4, 0x107, 0xd, &(0x7f00000002c0)=""/4096, &(0x7f00000012c0)=0x1000) recvmmsg(r4, &(0x7f0000008880), 0x45b, 0x44000102, 0x0) r7 = syz_open_dev$sndseq(0x0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f0000000000)={0x0, 0x0, 0x0, 'queue1\x00'}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r7, 0xc08c5335, &(0x7f00000000c0)={0x0, 0x81, 0x0, 'queue0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x90\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00'}) r8 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000380)='/dev/snapshot\x00', 0x70000, 0x0) r9 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000400)='TIPCv2\x00') syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x9, 0x280002) sendmsg$TIPC_NL_MON_PEER_GET(r8, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x810}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=r9, @ANYBLOB="000c2abd7000fddb0900130000001400060004000200040002000800010001f0ffff"], 0x28}, 0x1, 0x0, 0x0, 0x40000}, 0x80) 14:26:49 executing program 1: r0 = syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8f1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000001300)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(r1, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x84040001}, 0xc, &(0x7f0000000140)={&(0x7f0000001440)=ANY=[@ANYRES16=r2, @ANYBLOB="1074c43fc5d405ea270d4adb3c75a4d967cbe8365944e301b05f4ecdfa0400000014000300080001000300000008000500000000002c000b0039ca529c8eade452f1583f0934ed212ecfc86c2b92ade79da2279027ab4400"/102], 0x2}}, 0x4) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x10000, 0x0) ioctl$RTC_PIE_OFF(r3, 0x7006) r4 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP_VS_SO_SET_ADD(r4, 0x0, 0x482, &(0x7f00000001c0)={0x11, @remote, 0x4e22, 0x1000000, 'wrr\x00', 0x5, 0x1, 0x55}, 0x2c) setsockopt$inet6_int(r4, 0x29, 0x31, &(0x7f0000000000)=0x5, 0x4) getsockopt$IP6T_SO_GET_REVISION_MATCH(r4, 0x29, 0x44, &(0x7f0000000200)={'HL\x00'}, &(0x7f0000000280)=0x1e) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x40, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0086426, &(0x7f0000001380)={0x2, &(0x7f0000001340)=[{0x0}, {}]}) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) ioctl$DRM_IOCTL_LOCK(0xffffffffffffffff, 0x4008642a, &(0x7f0000001540)={r6, 0x61f5206fbdaf66f6}) ioctl$SCSI_IOCTL_GET_IDLUN(r5, 0x5382, &(0x7f00000000c0)) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$KVM_REGISTER_COALESCED_MMIO(r5, 0x4010ae67, 0x0) getsockopt$packet_buf(r4, 0x107, 0xd, &(0x7f00000002c0)=""/4096, &(0x7f00000012c0)=0x1000) recvmmsg(r4, &(0x7f0000008880), 0x45b, 0x44000102, 0x0) r7 = syz_open_dev$sndseq(0x0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f0000000000)={0x0, 0x0, 0x0, 'queue1\x00'}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r7, 0xc08c5335, &(0x7f00000000c0)={0x0, 0x81, 0x0, 'queue0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x90\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00'}) r8 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000380)='/dev/snapshot\x00', 0x70000, 0x0) r9 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000400)='TIPCv2\x00') syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x9, 0x280002) sendmsg$TIPC_NL_MON_PEER_GET(r8, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x810}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=r9, @ANYBLOB="000c2abd7000fddb0900130000001400060004000200040002000800010001f0ffff"], 0x28}, 0x1, 0x0, 0x0, 0x40000}, 0x80) 14:26:49 executing program 4: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10032, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000080)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r1, 0x84, 0xd, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0x8) ioctl$UFFDIO_WAKE(r0, 0x8010aa02, &(0x7f0000000100)={&(0x7f0000004000/0x3000)=nil, 0x3000}) 14:26:49 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8f1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000001300)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(r1, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x84040001}, 0xc, &(0x7f0000000140)={&(0x7f0000001440)=ANY=[@ANYRES16=r2, @ANYBLOB="1074c43fc5d405ea270d4adb3c75a4d967cbe8365944e301b05f4ecdfa0400000014000300080001000300000008000500000000002c000b0039ca529c8eade452f1583f0934ed212ecfc86c2b92ade79da2279027ab4400"/102], 0x2}}, 0x4) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x10000, 0x0) ioctl$RTC_PIE_OFF(r3, 0x7006) r4 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP_VS_SO_SET_ADD(r4, 0x0, 0x482, &(0x7f00000001c0)={0x11, @remote, 0x4e22, 0x1000000, 'wrr\x00', 0x5, 0x1, 0x55}, 0x2c) setsockopt$inet6_int(r4, 0x29, 0x31, &(0x7f0000000000)=0x5, 0x4) getsockopt$IP6T_SO_GET_REVISION_MATCH(r4, 0x29, 0x44, &(0x7f0000000200)={'HL\x00'}, &(0x7f0000000280)=0x1e) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x40, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0086426, &(0x7f0000001380)={0x2, &(0x7f0000001340)=[{0x0}, {}]}) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) ioctl$DRM_IOCTL_LOCK(0xffffffffffffffff, 0x4008642a, &(0x7f0000001540)={r6, 0x61f5206fbdaf66f6}) ioctl$SCSI_IOCTL_GET_IDLUN(r5, 0x5382, &(0x7f00000000c0)) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$KVM_REGISTER_COALESCED_MMIO(r5, 0x4010ae67, 0x0) getsockopt$packet_buf(r4, 0x107, 0xd, &(0x7f00000002c0)=""/4096, &(0x7f00000012c0)=0x1000) recvmmsg(r4, &(0x7f0000008880), 0x45b, 0x44000102, 0x0) r7 = syz_open_dev$sndseq(0x0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f0000000000)={0x0, 0x0, 0x0, 'queue1\x00'}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r7, 0xc08c5335, &(0x7f00000000c0)={0x0, 0x81, 0x0, 'queue0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x90\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00'}) r8 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000380)='/dev/snapshot\x00', 0x70000, 0x0) r9 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000400)='TIPCv2\x00') syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x9, 0x280002) sendmsg$TIPC_NL_MON_PEER_GET(r8, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x810}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=r9, @ANYBLOB="000c2abd7000fddb0900130000001400060004000200040002000800010001f0ffff"], 0x28}, 0x1, 0x0, 0x0, 0x40000}, 0x80) 14:26:49 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8f1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000001300)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(r1, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x84040001}, 0xc, &(0x7f0000000140)={&(0x7f0000001440)=ANY=[@ANYRES16=r2, @ANYBLOB="1074c43fc5d405ea270d4adb3c75a4d967cbe8365944e301b05f4ecdfa0400000014000300080001000300000008000500000000002c000b0039ca529c8eade452f1583f0934ed212ecfc86c2b92ade79da2279027ab4400"/102], 0x2}}, 0x4) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x10000, 0x0) ioctl$RTC_PIE_OFF(r3, 0x7006) r4 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP_VS_SO_SET_ADD(r4, 0x0, 0x482, &(0x7f00000001c0)={0x11, @remote, 0x4e22, 0x1000000, 'wrr\x00', 0x5, 0x1, 0x55}, 0x2c) setsockopt$inet6_int(r4, 0x29, 0x31, &(0x7f0000000000)=0x5, 0x4) getsockopt$IP6T_SO_GET_REVISION_MATCH(r4, 0x29, 0x44, &(0x7f0000000200)={'HL\x00'}, &(0x7f0000000280)=0x1e) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x40, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0086426, &(0x7f0000001380)={0x2, &(0x7f0000001340)=[{0x0}, {}]}) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) ioctl$DRM_IOCTL_LOCK(0xffffffffffffffff, 0x4008642a, &(0x7f0000001540)={r6, 0x61f5206fbdaf66f6}) ioctl$SCSI_IOCTL_GET_IDLUN(r5, 0x5382, &(0x7f00000000c0)) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$KVM_REGISTER_COALESCED_MMIO(r5, 0x4010ae67, 0x0) getsockopt$packet_buf(r4, 0x107, 0xd, &(0x7f00000002c0)=""/4096, &(0x7f00000012c0)=0x1000) recvmmsg(r4, &(0x7f0000008880), 0x45b, 0x44000102, 0x0) r7 = syz_open_dev$sndseq(0x0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f0000000000)={0x0, 0x0, 0x0, 'queue1\x00'}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r7, 0xc08c5335, &(0x7f00000000c0)={0x0, 0x81, 0x0, 'queue0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x90\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00'}) r8 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000380)='/dev/snapshot\x00', 0x70000, 0x0) r9 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000400)='TIPCv2\x00') syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x9, 0x280002) sendmsg$TIPC_NL_MON_PEER_GET(r8, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x810}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=r9, @ANYBLOB="000c2abd7000fddb0900130000001400060004000200040002000800010001f0ffff"], 0x28}, 0x1, 0x0, 0x0, 0x40000}, 0x80) 14:26:49 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8f1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000001300)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(r1, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x84040001}, 0xc, &(0x7f0000000140)={&(0x7f0000001440)=ANY=[@ANYRES16=r2, @ANYBLOB="1074c43fc5d405ea270d4adb3c75a4d967cbe8365944e301b05f4ecdfa0400000014000300080001000300000008000500000000002c000b0039ca529c8eade452f1583f0934ed212ecfc86c2b92ade79da2279027ab4400"/102], 0x2}}, 0x4) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x10000, 0x0) ioctl$RTC_PIE_OFF(r3, 0x7006) r4 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP_VS_SO_SET_ADD(r4, 0x0, 0x482, &(0x7f00000001c0)={0x11, @remote, 0x4e22, 0x1000000, 'wrr\x00', 0x5, 0x1, 0x55}, 0x2c) setsockopt$inet6_int(r4, 0x29, 0x31, &(0x7f0000000000)=0x5, 0x4) getsockopt$IP6T_SO_GET_REVISION_MATCH(r4, 0x29, 0x44, &(0x7f0000000200)={'HL\x00'}, &(0x7f0000000280)=0x1e) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x40, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0086426, &(0x7f0000001380)={0x2, &(0x7f0000001340)=[{0x0}, {}]}) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) ioctl$DRM_IOCTL_LOCK(0xffffffffffffffff, 0x4008642a, &(0x7f0000001540)={r6, 0x61f5206fbdaf66f6}) ioctl$SCSI_IOCTL_GET_IDLUN(r5, 0x5382, &(0x7f00000000c0)) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$KVM_REGISTER_COALESCED_MMIO(r5, 0x4010ae67, 0x0) getsockopt$packet_buf(r4, 0x107, 0xd, &(0x7f00000002c0)=""/4096, &(0x7f00000012c0)=0x1000) recvmmsg(r4, &(0x7f0000008880), 0x45b, 0x44000102, 0x0) r7 = syz_open_dev$sndseq(0x0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f0000000000)={0x0, 0x0, 0x0, 'queue1\x00'}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r7, 0xc08c5335, &(0x7f00000000c0)={0x0, 0x81, 0x0, 'queue0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x90\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00'}) r8 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000380)='/dev/snapshot\x00', 0x70000, 0x0) r9 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000400)='TIPCv2\x00') syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x9, 0x280002) sendmsg$TIPC_NL_MON_PEER_GET(r8, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x810}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=r9, @ANYBLOB="000c2abd7000fddb0900130000001400060004000200040002000800010001f0ffff"], 0x28}, 0x1, 0x0, 0x0, 0x40000}, 0x80) 14:26:49 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8f1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000001300)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(r1, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x84040001}, 0xc, &(0x7f0000000140)={&(0x7f0000001440)=ANY=[@ANYRES16=r2, @ANYBLOB="1074c43fc5d405ea270d4adb3c75a4d967cbe8365944e301b05f4ecdfa0400000014000300080001000300000008000500000000002c000b0039ca529c8eade452f1583f0934ed212ecfc86c2b92ade79da2279027ab4400"/102], 0x2}}, 0x4) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x10000, 0x0) ioctl$RTC_PIE_OFF(r3, 0x7006) r4 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP_VS_SO_SET_ADD(r4, 0x0, 0x482, &(0x7f00000001c0)={0x11, @remote, 0x4e22, 0x1000000, 'wrr\x00', 0x5, 0x1, 0x55}, 0x2c) setsockopt$inet6_int(r4, 0x29, 0x31, &(0x7f0000000000)=0x5, 0x4) getsockopt$IP6T_SO_GET_REVISION_MATCH(r4, 0x29, 0x44, &(0x7f0000000200)={'HL\x00'}, &(0x7f0000000280)=0x1e) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x40, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0086426, &(0x7f0000001380)={0x2, &(0x7f0000001340)=[{0x0}, {}]}) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) ioctl$DRM_IOCTL_LOCK(0xffffffffffffffff, 0x4008642a, &(0x7f0000001540)={r6, 0x61f5206fbdaf66f6}) ioctl$SCSI_IOCTL_GET_IDLUN(r5, 0x5382, &(0x7f00000000c0)) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$KVM_REGISTER_COALESCED_MMIO(r5, 0x4010ae67, 0x0) getsockopt$packet_buf(r4, 0x107, 0xd, &(0x7f00000002c0)=""/4096, &(0x7f00000012c0)=0x1000) recvmmsg(r4, &(0x7f0000008880), 0x45b, 0x44000102, 0x0) r7 = syz_open_dev$sndseq(0x0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f0000000000)={0x0, 0x0, 0x0, 'queue1\x00'}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r7, 0xc08c5335, &(0x7f00000000c0)={0x0, 0x81, 0x0, 'queue0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x90\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00'}) r8 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000380)='/dev/snapshot\x00', 0x70000, 0x0) r9 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000400)='TIPCv2\x00') syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x9, 0x280002) sendmsg$TIPC_NL_MON_PEER_GET(r8, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x810}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=r9, @ANYBLOB="000c2abd7000fddb0900130000001400060004000200040002000800010001f0ffff"], 0x28}, 0x1, 0x0, 0x0, 0x40000}, 0x80) 14:26:50 executing program 1: r0 = syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8f1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000001300)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(r1, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x84040001}, 0xc, &(0x7f0000000140)={&(0x7f0000001440)=ANY=[@ANYRES16=r2, @ANYBLOB="1074c43fc5d405ea270d4adb3c75a4d967cbe8365944e301b05f4ecdfa0400000014000300080001000300000008000500000000002c000b0039ca529c8eade452f1583f0934ed212ecfc86c2b92ade79da2279027ab4400"/102], 0x2}}, 0x4) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x10000, 0x0) ioctl$RTC_PIE_OFF(r3, 0x7006) r4 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP_VS_SO_SET_ADD(r4, 0x0, 0x482, &(0x7f00000001c0)={0x11, @remote, 0x4e22, 0x1000000, 'wrr\x00', 0x5, 0x1, 0x55}, 0x2c) setsockopt$inet6_int(r4, 0x29, 0x31, &(0x7f0000000000)=0x5, 0x4) getsockopt$IP6T_SO_GET_REVISION_MATCH(r4, 0x29, 0x44, &(0x7f0000000200)={'HL\x00'}, &(0x7f0000000280)=0x1e) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x40, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0086426, &(0x7f0000001380)={0x2, &(0x7f0000001340)=[{0x0}, {}]}) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) ioctl$DRM_IOCTL_LOCK(0xffffffffffffffff, 0x4008642a, &(0x7f0000001540)={r6, 0x61f5206fbdaf66f6}) ioctl$SCSI_IOCTL_GET_IDLUN(r5, 0x5382, &(0x7f00000000c0)) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$KVM_REGISTER_COALESCED_MMIO(r5, 0x4010ae67, 0x0) getsockopt$packet_buf(r4, 0x107, 0xd, &(0x7f00000002c0)=""/4096, &(0x7f00000012c0)=0x1000) recvmmsg(r4, &(0x7f0000008880), 0x45b, 0x44000102, 0x0) r7 = syz_open_dev$sndseq(0x0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f0000000000)={0x0, 0x0, 0x0, 'queue1\x00'}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r7, 0xc08c5335, &(0x7f00000000c0)={0x0, 0x81, 0x0, 'queue0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x90\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00'}) r8 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000380)='/dev/snapshot\x00', 0x70000, 0x0) r9 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000400)='TIPCv2\x00') syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x9, 0x280002) sendmsg$TIPC_NL_MON_PEER_GET(r8, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x810}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=r9, @ANYBLOB="000c2abd7000fddb0900130000001400060004000200040002000800010001f0ffff"], 0x28}, 0x1, 0x0, 0x0, 0x40000}, 0x80) 14:26:50 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8f1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000001300)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(r1, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x84040001}, 0xc, &(0x7f0000000140)={&(0x7f0000001440)=ANY=[@ANYRES16=r2, @ANYBLOB="1074c43fc5d405ea270d4adb3c75a4d967cbe8365944e301b05f4ecdfa0400000014000300080001000300000008000500000000002c000b0039ca529c8eade452f1583f0934ed212ecfc86c2b92ade79da2279027ab4400"/102], 0x2}}, 0x4) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x10000, 0x0) ioctl$RTC_PIE_OFF(r3, 0x7006) r4 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP_VS_SO_SET_ADD(r4, 0x0, 0x482, &(0x7f00000001c0)={0x11, @remote, 0x4e22, 0x1000000, 'wrr\x00', 0x5, 0x1, 0x55}, 0x2c) setsockopt$inet6_int(r4, 0x29, 0x31, &(0x7f0000000000)=0x5, 0x4) getsockopt$IP6T_SO_GET_REVISION_MATCH(r4, 0x29, 0x44, &(0x7f0000000200)={'HL\x00'}, &(0x7f0000000280)=0x1e) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x40, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0086426, &(0x7f0000001380)={0x2, &(0x7f0000001340)=[{0x0}, {}]}) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) ioctl$DRM_IOCTL_LOCK(0xffffffffffffffff, 0x4008642a, &(0x7f0000001540)={r6, 0x61f5206fbdaf66f6}) ioctl$SCSI_IOCTL_GET_IDLUN(r5, 0x5382, &(0x7f00000000c0)) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$KVM_REGISTER_COALESCED_MMIO(r5, 0x4010ae67, 0x0) getsockopt$packet_buf(r4, 0x107, 0xd, &(0x7f00000002c0)=""/4096, &(0x7f00000012c0)=0x1000) recvmmsg(r4, &(0x7f0000008880), 0x45b, 0x44000102, 0x0) r7 = syz_open_dev$sndseq(0x0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f0000000000)={0x0, 0x0, 0x0, 'queue1\x00'}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r7, 0xc08c5335, &(0x7f00000000c0)={0x0, 0x81, 0x0, 'queue0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x90\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00'}) r8 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000380)='/dev/snapshot\x00', 0x70000, 0x0) r9 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000400)='TIPCv2\x00') syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x9, 0x280002) sendmsg$TIPC_NL_MON_PEER_GET(r8, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x810}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=r9, @ANYBLOB="000c2abd7000fddb0900130000001400060004000200040002000800010001f0ffff"], 0x28}, 0x1, 0x0, 0x0, 0x40000}, 0x80) 14:26:50 executing program 4: r0 = syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8f1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000001300)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(r1, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x84040001}, 0xc, &(0x7f0000000140)={&(0x7f0000001440)=ANY=[@ANYRES16=r2, @ANYBLOB="1074c43fc5d405ea270d4adb3c75a4d967cbe8365944e301b05f4ecdfa0400000014000300080001000300000008000500000000002c000b0039ca529c8eade452f1583f0934ed212ecfc86c2b92ade79da2279027ab4400"/102], 0x2}}, 0x4) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x10000, 0x0) ioctl$RTC_PIE_OFF(r3, 0x7006) r4 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP_VS_SO_SET_ADD(r4, 0x0, 0x482, &(0x7f00000001c0)={0x11, @remote, 0x4e22, 0x1000000, 'wrr\x00', 0x5, 0x1, 0x55}, 0x2c) setsockopt$inet6_int(r4, 0x29, 0x31, &(0x7f0000000000)=0x5, 0x4) getsockopt$IP6T_SO_GET_REVISION_MATCH(r4, 0x29, 0x44, &(0x7f0000000200)={'HL\x00'}, &(0x7f0000000280)=0x1e) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x40, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0086426, &(0x7f0000001380)={0x2, &(0x7f0000001340)=[{0x0}, {}]}) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) ioctl$DRM_IOCTL_LOCK(0xffffffffffffffff, 0x4008642a, &(0x7f0000001540)={r6, 0x61f5206fbdaf66f6}) ioctl$SCSI_IOCTL_GET_IDLUN(r5, 0x5382, &(0x7f00000000c0)) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$KVM_REGISTER_COALESCED_MMIO(r5, 0x4010ae67, 0x0) getsockopt$packet_buf(r4, 0x107, 0xd, &(0x7f00000002c0)=""/4096, &(0x7f00000012c0)=0x1000) recvmmsg(r4, &(0x7f0000008880), 0x45b, 0x44000102, 0x0) r7 = syz_open_dev$sndseq(0x0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f0000000000)={0x0, 0x0, 0x0, 'queue1\x00'}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r7, 0xc08c5335, &(0x7f00000000c0)={0x0, 0x81, 0x0, 'queue0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x90\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00'}) r8 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000380)='/dev/snapshot\x00', 0x70000, 0x0) r9 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000400)='TIPCv2\x00') syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x9, 0x280002) sendmsg$TIPC_NL_MON_PEER_GET(r8, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x810}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=r9, @ANYBLOB="000c2abd7000fddb0900130000001400060004000200040002000800010001f0ffff"], 0x28}, 0x1, 0x0, 0x0, 0x40000}, 0x80) 14:26:50 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8f1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000001300)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(r1, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x84040001}, 0xc, &(0x7f0000000140)={&(0x7f0000001440)=ANY=[@ANYRES16=r2, @ANYBLOB="1074c43fc5d405ea270d4adb3c75a4d967cbe8365944e301b05f4ecdfa0400000014000300080001000300000008000500000000002c000b0039ca529c8eade452f1583f0934ed212ecfc86c2b92ade79da2279027ab4400"/102], 0x2}}, 0x4) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x10000, 0x0) ioctl$RTC_PIE_OFF(r3, 0x7006) r4 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP_VS_SO_SET_ADD(r4, 0x0, 0x482, &(0x7f00000001c0)={0x11, @remote, 0x4e22, 0x1000000, 'wrr\x00', 0x5, 0x1, 0x55}, 0x2c) setsockopt$inet6_int(r4, 0x29, 0x31, &(0x7f0000000000)=0x5, 0x4) getsockopt$IP6T_SO_GET_REVISION_MATCH(r4, 0x29, 0x44, &(0x7f0000000200)={'HL\x00'}, &(0x7f0000000280)=0x1e) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x40, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0086426, &(0x7f0000001380)={0x2, &(0x7f0000001340)=[{0x0}, {}]}) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) ioctl$DRM_IOCTL_LOCK(0xffffffffffffffff, 0x4008642a, &(0x7f0000001540)={r6, 0x61f5206fbdaf66f6}) ioctl$SCSI_IOCTL_GET_IDLUN(r5, 0x5382, &(0x7f00000000c0)) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$KVM_REGISTER_COALESCED_MMIO(r5, 0x4010ae67, 0x0) getsockopt$packet_buf(r4, 0x107, 0xd, &(0x7f00000002c0)=""/4096, &(0x7f00000012c0)=0x1000) recvmmsg(r4, &(0x7f0000008880), 0x45b, 0x44000102, 0x0) r7 = syz_open_dev$sndseq(0x0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f0000000000)={0x0, 0x0, 0x0, 'queue1\x00'}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r7, 0xc08c5335, &(0x7f00000000c0)={0x0, 0x81, 0x0, 'queue0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x90\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00'}) r8 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000380)='/dev/snapshot\x00', 0x70000, 0x0) r9 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000400)='TIPCv2\x00') syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x9, 0x280002) sendmsg$TIPC_NL_MON_PEER_GET(r8, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x810}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=r9, @ANYBLOB="000c2abd7000fddb0900130000001400060004000200040002000800010001f0ffff"], 0x28}, 0x1, 0x0, 0x0, 0x40000}, 0x80) 14:26:50 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8f1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000001300)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(r1, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x84040001}, 0xc, &(0x7f0000000140)={&(0x7f0000001440)=ANY=[@ANYRES16=r2, @ANYBLOB="1074c43fc5d405ea270d4adb3c75a4d967cbe8365944e301b05f4ecdfa0400000014000300080001000300000008000500000000002c000b0039ca529c8eade452f1583f0934ed212ecfc86c2b92ade79da2279027ab4400"/102], 0x2}}, 0x4) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x10000, 0x0) ioctl$RTC_PIE_OFF(r3, 0x7006) r4 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP_VS_SO_SET_ADD(r4, 0x0, 0x482, &(0x7f00000001c0)={0x11, @remote, 0x4e22, 0x1000000, 'wrr\x00', 0x5, 0x1, 0x55}, 0x2c) setsockopt$inet6_int(r4, 0x29, 0x31, &(0x7f0000000000)=0x5, 0x4) getsockopt$IP6T_SO_GET_REVISION_MATCH(r4, 0x29, 0x44, &(0x7f0000000200)={'HL\x00'}, &(0x7f0000000280)=0x1e) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x40, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0086426, &(0x7f0000001380)={0x2, &(0x7f0000001340)=[{0x0}, {}]}) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) ioctl$DRM_IOCTL_LOCK(0xffffffffffffffff, 0x4008642a, &(0x7f0000001540)={r6, 0x61f5206fbdaf66f6}) ioctl$SCSI_IOCTL_GET_IDLUN(r5, 0x5382, &(0x7f00000000c0)) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$KVM_REGISTER_COALESCED_MMIO(r5, 0x4010ae67, 0x0) getsockopt$packet_buf(r4, 0x107, 0xd, &(0x7f00000002c0)=""/4096, &(0x7f00000012c0)=0x1000) recvmmsg(r4, &(0x7f0000008880), 0x45b, 0x44000102, 0x0) r7 = syz_open_dev$sndseq(0x0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f0000000000)={0x0, 0x0, 0x0, 'queue1\x00'}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r7, 0xc08c5335, &(0x7f00000000c0)={0x0, 0x81, 0x0, 'queue0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x90\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00'}) r8 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000380)='/dev/snapshot\x00', 0x70000, 0x0) r9 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000400)='TIPCv2\x00') syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x9, 0x280002) sendmsg$TIPC_NL_MON_PEER_GET(r8, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x810}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=r9, @ANYBLOB="000c2abd7000fddb0900130000001400060004000200040002000800010001f0ffff"], 0x28}, 0x1, 0x0, 0x0, 0x40000}, 0x80) 14:26:50 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8f1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000001300)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(r1, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x84040001}, 0xc, &(0x7f0000000140)={&(0x7f0000001440)=ANY=[@ANYRES16=r2, @ANYBLOB="1074c43fc5d405ea270d4adb3c75a4d967cbe8365944e301b05f4ecdfa0400000014000300080001000300000008000500000000002c000b0039ca529c8eade452f1583f0934ed212ecfc86c2b92ade79da2279027ab4400"/102], 0x2}}, 0x4) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x10000, 0x0) ioctl$RTC_PIE_OFF(r3, 0x7006) r4 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP_VS_SO_SET_ADD(r4, 0x0, 0x482, &(0x7f00000001c0)={0x11, @remote, 0x4e22, 0x1000000, 'wrr\x00', 0x5, 0x1, 0x55}, 0x2c) setsockopt$inet6_int(r4, 0x29, 0x31, &(0x7f0000000000)=0x5, 0x4) getsockopt$IP6T_SO_GET_REVISION_MATCH(r4, 0x29, 0x44, &(0x7f0000000200)={'HL\x00'}, &(0x7f0000000280)=0x1e) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x40, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0086426, &(0x7f0000001380)={0x2, &(0x7f0000001340)=[{0x0}, {}]}) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) ioctl$DRM_IOCTL_LOCK(0xffffffffffffffff, 0x4008642a, &(0x7f0000001540)={r6, 0x61f5206fbdaf66f6}) ioctl$SCSI_IOCTL_GET_IDLUN(r5, 0x5382, &(0x7f00000000c0)) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$KVM_REGISTER_COALESCED_MMIO(r5, 0x4010ae67, 0x0) getsockopt$packet_buf(r4, 0x107, 0xd, &(0x7f00000002c0)=""/4096, &(0x7f00000012c0)=0x1000) recvmmsg(r4, &(0x7f0000008880), 0x45b, 0x44000102, 0x0) r7 = syz_open_dev$sndseq(0x0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f0000000000)={0x0, 0x0, 0x0, 'queue1\x00'}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r7, 0xc08c5335, &(0x7f00000000c0)={0x0, 0x81, 0x0, 'queue0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x90\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00'}) r8 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000380)='/dev/snapshot\x00', 0x70000, 0x0) r9 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000400)='TIPCv2\x00') syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x9, 0x280002) sendmsg$TIPC_NL_MON_PEER_GET(r8, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x810}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=r9, @ANYBLOB="000c2abd7000fddb0900130000001400060004000200040002000800010001f0ffff"], 0x28}, 0x1, 0x0, 0x0, 0x40000}, 0x80) 14:26:51 executing program 1: r0 = syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8f1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000001300)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(r1, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x84040001}, 0xc, &(0x7f0000000140)={&(0x7f0000001440)=ANY=[@ANYRES16=r2, @ANYBLOB="1074c43fc5d405ea270d4adb3c75a4d967cbe8365944e301b05f4ecdfa0400000014000300080001000300000008000500000000002c000b0039ca529c8eade452f1583f0934ed212ecfc86c2b92ade79da2279027ab4400"/102], 0x2}}, 0x4) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x10000, 0x0) ioctl$RTC_PIE_OFF(r3, 0x7006) r4 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP_VS_SO_SET_ADD(r4, 0x0, 0x482, &(0x7f00000001c0)={0x11, @remote, 0x4e22, 0x1000000, 'wrr\x00', 0x5, 0x1, 0x55}, 0x2c) setsockopt$inet6_int(r4, 0x29, 0x31, &(0x7f0000000000)=0x5, 0x4) getsockopt$IP6T_SO_GET_REVISION_MATCH(r4, 0x29, 0x44, &(0x7f0000000200)={'HL\x00'}, &(0x7f0000000280)=0x1e) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x40, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0086426, &(0x7f0000001380)={0x2, &(0x7f0000001340)=[{0x0}, {}]}) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) ioctl$DRM_IOCTL_LOCK(0xffffffffffffffff, 0x4008642a, &(0x7f0000001540)={r6, 0x61f5206fbdaf66f6}) ioctl$SCSI_IOCTL_GET_IDLUN(r5, 0x5382, &(0x7f00000000c0)) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$KVM_REGISTER_COALESCED_MMIO(r5, 0x4010ae67, 0x0) getsockopt$packet_buf(r4, 0x107, 0xd, &(0x7f00000002c0)=""/4096, &(0x7f00000012c0)=0x1000) recvmmsg(r4, &(0x7f0000008880), 0x45b, 0x44000102, 0x0) r7 = syz_open_dev$sndseq(0x0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f0000000000)={0x0, 0x0, 0x0, 'queue1\x00'}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r7, 0xc08c5335, &(0x7f00000000c0)={0x0, 0x81, 0x0, 'queue0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x90\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00'}) r8 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000380)='/dev/snapshot\x00', 0x70000, 0x0) r9 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000400)='TIPCv2\x00') syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x9, 0x280002) sendmsg$TIPC_NL_MON_PEER_GET(r8, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x810}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=r9, @ANYBLOB="000c2abd7000fddb0900130000001400060004000200040002000800010001f0ffff"], 0x28}, 0x1, 0x0, 0x0, 0x40000}, 0x80) 14:26:51 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8f1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000001300)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(r1, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x84040001}, 0xc, &(0x7f0000000140)={&(0x7f0000001440)=ANY=[@ANYRES16=r2, @ANYBLOB="1074c43fc5d405ea270d4adb3c75a4d967cbe8365944e301b05f4ecdfa0400000014000300080001000300000008000500000000002c000b0039ca529c8eade452f1583f0934ed212ecfc86c2b92ade79da2279027ab4400"/102], 0x2}}, 0x4) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x10000, 0x0) ioctl$RTC_PIE_OFF(r3, 0x7006) r4 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP_VS_SO_SET_ADD(r4, 0x0, 0x482, &(0x7f00000001c0)={0x11, @remote, 0x4e22, 0x1000000, 'wrr\x00', 0x5, 0x1, 0x55}, 0x2c) setsockopt$inet6_int(r4, 0x29, 0x31, &(0x7f0000000000)=0x5, 0x4) getsockopt$IP6T_SO_GET_REVISION_MATCH(r4, 0x29, 0x44, &(0x7f0000000200)={'HL\x00'}, &(0x7f0000000280)=0x1e) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x40, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0086426, &(0x7f0000001380)={0x2, &(0x7f0000001340)=[{0x0}, {}]}) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) ioctl$DRM_IOCTL_LOCK(0xffffffffffffffff, 0x4008642a, &(0x7f0000001540)={r6, 0x61f5206fbdaf66f6}) ioctl$SCSI_IOCTL_GET_IDLUN(r5, 0x5382, &(0x7f00000000c0)) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$KVM_REGISTER_COALESCED_MMIO(r5, 0x4010ae67, 0x0) getsockopt$packet_buf(r4, 0x107, 0xd, &(0x7f00000002c0)=""/4096, &(0x7f00000012c0)=0x1000) recvmmsg(r4, &(0x7f0000008880), 0x45b, 0x44000102, 0x0) r7 = syz_open_dev$sndseq(0x0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f0000000000)={0x0, 0x0, 0x0, 'queue1\x00'}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r7, 0xc08c5335, &(0x7f00000000c0)={0x0, 0x81, 0x0, 'queue0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x90\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00'}) r8 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000380)='/dev/snapshot\x00', 0x70000, 0x0) r9 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000400)='TIPCv2\x00') syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x9, 0x280002) sendmsg$TIPC_NL_MON_PEER_GET(r8, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x810}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=r9, @ANYBLOB="000c2abd7000fddb0900130000001400060004000200040002000800010001f0ffff"], 0x28}, 0x1, 0x0, 0x0, 0x40000}, 0x80) 14:26:51 executing program 4: r0 = syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8f1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000001300)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(r1, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x84040001}, 0xc, &(0x7f0000000140)={&(0x7f0000001440)=ANY=[@ANYRES16=r2, @ANYBLOB="1074c43fc5d405ea270d4adb3c75a4d967cbe8365944e301b05f4ecdfa0400000014000300080001000300000008000500000000002c000b0039ca529c8eade452f1583f0934ed212ecfc86c2b92ade79da2279027ab4400"/102], 0x2}}, 0x4) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x10000, 0x0) ioctl$RTC_PIE_OFF(r3, 0x7006) r4 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP_VS_SO_SET_ADD(r4, 0x0, 0x482, &(0x7f00000001c0)={0x11, @remote, 0x4e22, 0x1000000, 'wrr\x00', 0x5, 0x1, 0x55}, 0x2c) setsockopt$inet6_int(r4, 0x29, 0x31, &(0x7f0000000000)=0x5, 0x4) getsockopt$IP6T_SO_GET_REVISION_MATCH(r4, 0x29, 0x44, &(0x7f0000000200)={'HL\x00'}, &(0x7f0000000280)=0x1e) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x40, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0086426, &(0x7f0000001380)={0x2, &(0x7f0000001340)=[{0x0}, {}]}) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) ioctl$DRM_IOCTL_LOCK(0xffffffffffffffff, 0x4008642a, &(0x7f0000001540)={r6, 0x61f5206fbdaf66f6}) ioctl$SCSI_IOCTL_GET_IDLUN(r5, 0x5382, &(0x7f00000000c0)) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$KVM_REGISTER_COALESCED_MMIO(r5, 0x4010ae67, 0x0) getsockopt$packet_buf(r4, 0x107, 0xd, &(0x7f00000002c0)=""/4096, &(0x7f00000012c0)=0x1000) recvmmsg(r4, &(0x7f0000008880), 0x45b, 0x44000102, 0x0) r7 = syz_open_dev$sndseq(0x0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f0000000000)={0x0, 0x0, 0x0, 'queue1\x00'}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r7, 0xc08c5335, &(0x7f00000000c0)={0x0, 0x81, 0x0, 'queue0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x90\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00'}) r8 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000380)='/dev/snapshot\x00', 0x70000, 0x0) r9 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000400)='TIPCv2\x00') syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x9, 0x280002) sendmsg$TIPC_NL_MON_PEER_GET(r8, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x810}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=r9, @ANYBLOB="000c2abd7000fddb0900130000001400060004000200040002000800010001f0ffff"], 0x28}, 0x1, 0x0, 0x0, 0x40000}, 0x80) 14:26:51 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8f1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000001300)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(r1, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x84040001}, 0xc, &(0x7f0000000140)={&(0x7f0000001440)=ANY=[@ANYRES16=r2, @ANYBLOB="1074c43fc5d405ea270d4adb3c75a4d967cbe8365944e301b05f4ecdfa0400000014000300080001000300000008000500000000002c000b0039ca529c8eade452f1583f0934ed212ecfc86c2b92ade79da2279027ab4400"/102], 0x2}}, 0x4) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x10000, 0x0) ioctl$RTC_PIE_OFF(r3, 0x7006) r4 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP_VS_SO_SET_ADD(r4, 0x0, 0x482, &(0x7f00000001c0)={0x11, @remote, 0x4e22, 0x1000000, 'wrr\x00', 0x5, 0x1, 0x55}, 0x2c) setsockopt$inet6_int(r4, 0x29, 0x31, &(0x7f0000000000)=0x5, 0x4) getsockopt$IP6T_SO_GET_REVISION_MATCH(r4, 0x29, 0x44, &(0x7f0000000200)={'HL\x00'}, &(0x7f0000000280)=0x1e) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x40, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0086426, &(0x7f0000001380)={0x2, &(0x7f0000001340)=[{0x0}, {}]}) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) ioctl$DRM_IOCTL_LOCK(0xffffffffffffffff, 0x4008642a, &(0x7f0000001540)={r6, 0x61f5206fbdaf66f6}) ioctl$SCSI_IOCTL_GET_IDLUN(r5, 0x5382, &(0x7f00000000c0)) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$KVM_REGISTER_COALESCED_MMIO(r5, 0x4010ae67, 0x0) getsockopt$packet_buf(r4, 0x107, 0xd, &(0x7f00000002c0)=""/4096, &(0x7f00000012c0)=0x1000) recvmmsg(r4, &(0x7f0000008880), 0x45b, 0x44000102, 0x0) r7 = syz_open_dev$sndseq(0x0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f0000000000)={0x0, 0x0, 0x0, 'queue1\x00'}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r7, 0xc08c5335, &(0x7f00000000c0)={0x0, 0x81, 0x0, 'queue0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x90\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00'}) r8 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000380)='/dev/snapshot\x00', 0x70000, 0x0) r9 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000400)='TIPCv2\x00') syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x9, 0x280002) sendmsg$TIPC_NL_MON_PEER_GET(r8, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x810}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=r9, @ANYBLOB="000c2abd7000fddb0900130000001400060004000200040002000800010001f0ffff"], 0x28}, 0x1, 0x0, 0x0, 0x40000}, 0x80) 14:26:51 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8f1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000001300)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(r1, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x84040001}, 0xc, &(0x7f0000000140)={&(0x7f0000001440)=ANY=[@ANYRES16=r2, @ANYBLOB="1074c43fc5d405ea270d4adb3c75a4d967cbe8365944e301b05f4ecdfa0400000014000300080001000300000008000500000000002c000b0039ca529c8eade452f1583f0934ed212ecfc86c2b92ade79da2279027ab4400"/102], 0x2}}, 0x4) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x10000, 0x0) ioctl$RTC_PIE_OFF(r3, 0x7006) r4 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP_VS_SO_SET_ADD(r4, 0x0, 0x482, &(0x7f00000001c0)={0x11, @remote, 0x4e22, 0x1000000, 'wrr\x00', 0x5, 0x1, 0x55}, 0x2c) setsockopt$inet6_int(r4, 0x29, 0x31, &(0x7f0000000000)=0x5, 0x4) getsockopt$IP6T_SO_GET_REVISION_MATCH(r4, 0x29, 0x44, &(0x7f0000000200)={'HL\x00'}, &(0x7f0000000280)=0x1e) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x40, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0086426, &(0x7f0000001380)={0x2, &(0x7f0000001340)=[{0x0}, {}]}) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) ioctl$DRM_IOCTL_LOCK(0xffffffffffffffff, 0x4008642a, &(0x7f0000001540)={r6, 0x61f5206fbdaf66f6}) ioctl$SCSI_IOCTL_GET_IDLUN(r5, 0x5382, &(0x7f00000000c0)) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$KVM_REGISTER_COALESCED_MMIO(r5, 0x4010ae67, 0x0) getsockopt$packet_buf(r4, 0x107, 0xd, &(0x7f00000002c0)=""/4096, &(0x7f00000012c0)=0x1000) recvmmsg(r4, &(0x7f0000008880), 0x45b, 0x44000102, 0x0) r7 = syz_open_dev$sndseq(0x0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f0000000000)={0x0, 0x0, 0x0, 'queue1\x00'}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r7, 0xc08c5335, &(0x7f00000000c0)={0x0, 0x81, 0x0, 'queue0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x90\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00'}) r8 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000380)='/dev/snapshot\x00', 0x70000, 0x0) r9 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000400)='TIPCv2\x00') syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x9, 0x280002) sendmsg$TIPC_NL_MON_PEER_GET(r8, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x810}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=r9, @ANYBLOB="000c2abd7000fddb0900130000001400060004000200040002000800010001f0ffff"], 0x28}, 0x1, 0x0, 0x0, 0x40000}, 0x80) 14:26:51 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8f1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000001300)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(r1, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x84040001}, 0xc, &(0x7f0000000140)={&(0x7f0000001440)=ANY=[@ANYRES16=r2, @ANYBLOB="1074c43fc5d405ea270d4adb3c75a4d967cbe8365944e301b05f4ecdfa0400000014000300080001000300000008000500000000002c000b0039ca529c8eade452f1583f0934ed212ecfc86c2b92ade79da2279027ab4400"/102], 0x2}}, 0x4) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x10000, 0x0) ioctl$RTC_PIE_OFF(r3, 0x7006) r4 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP_VS_SO_SET_ADD(r4, 0x0, 0x482, &(0x7f00000001c0)={0x11, @remote, 0x4e22, 0x1000000, 'wrr\x00', 0x5, 0x1, 0x55}, 0x2c) setsockopt$inet6_int(r4, 0x29, 0x31, &(0x7f0000000000)=0x5, 0x4) getsockopt$IP6T_SO_GET_REVISION_MATCH(r4, 0x29, 0x44, &(0x7f0000000200)={'HL\x00'}, &(0x7f0000000280)=0x1e) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x40, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0086426, &(0x7f0000001380)={0x2, &(0x7f0000001340)=[{0x0}, {}]}) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) ioctl$DRM_IOCTL_LOCK(0xffffffffffffffff, 0x4008642a, &(0x7f0000001540)={r6, 0x61f5206fbdaf66f6}) ioctl$SCSI_IOCTL_GET_IDLUN(r5, 0x5382, &(0x7f00000000c0)) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$KVM_REGISTER_COALESCED_MMIO(r5, 0x4010ae67, 0x0) getsockopt$packet_buf(r4, 0x107, 0xd, &(0x7f00000002c0)=""/4096, &(0x7f00000012c0)=0x1000) recvmmsg(r4, &(0x7f0000008880), 0x45b, 0x44000102, 0x0) r7 = syz_open_dev$sndseq(0x0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f0000000000)={0x0, 0x0, 0x0, 'queue1\x00'}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r7, 0xc08c5335, &(0x7f00000000c0)={0x0, 0x81, 0x0, 'queue0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x90\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00'}) r8 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000380)='/dev/snapshot\x00', 0x70000, 0x0) r9 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000400)='TIPCv2\x00') syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x9, 0x280002) sendmsg$TIPC_NL_MON_PEER_GET(r8, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x810}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=r9, @ANYBLOB="000c2abd7000fddb0900130000001400060004000200040002000800010001f0ffff"], 0x28}, 0x1, 0x0, 0x0, 0x40000}, 0x80) 14:26:52 executing program 1: r0 = syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8f1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000001300)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(r1, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x84040001}, 0xc, &(0x7f0000000140)={&(0x7f0000001440)=ANY=[@ANYRES16=r2, @ANYBLOB="1074c43fc5d405ea270d4adb3c75a4d967cbe8365944e301b05f4ecdfa0400000014000300080001000300000008000500000000002c000b0039ca529c8eade452f1583f0934ed212ecfc86c2b92ade79da2279027ab4400"/102], 0x2}}, 0x4) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x10000, 0x0) ioctl$RTC_PIE_OFF(r3, 0x7006) r4 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP_VS_SO_SET_ADD(r4, 0x0, 0x482, &(0x7f00000001c0)={0x11, @remote, 0x4e22, 0x1000000, 'wrr\x00', 0x5, 0x1, 0x55}, 0x2c) setsockopt$inet6_int(r4, 0x29, 0x31, &(0x7f0000000000)=0x5, 0x4) getsockopt$IP6T_SO_GET_REVISION_MATCH(r4, 0x29, 0x44, &(0x7f0000000200)={'HL\x00'}, &(0x7f0000000280)=0x1e) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x40, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0086426, &(0x7f0000001380)={0x2, &(0x7f0000001340)=[{0x0}, {}]}) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) ioctl$DRM_IOCTL_LOCK(0xffffffffffffffff, 0x4008642a, &(0x7f0000001540)={r6, 0x61f5206fbdaf66f6}) ioctl$SCSI_IOCTL_GET_IDLUN(r5, 0x5382, &(0x7f00000000c0)) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$KVM_REGISTER_COALESCED_MMIO(r5, 0x4010ae67, 0x0) getsockopt$packet_buf(r4, 0x107, 0xd, &(0x7f00000002c0)=""/4096, &(0x7f00000012c0)=0x1000) recvmmsg(r4, &(0x7f0000008880), 0x45b, 0x44000102, 0x0) r7 = syz_open_dev$sndseq(0x0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f0000000000)={0x0, 0x0, 0x0, 'queue1\x00'}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r7, 0xc08c5335, &(0x7f00000000c0)={0x0, 0x81, 0x0, 'queue0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x90\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00'}) r8 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000380)='/dev/snapshot\x00', 0x70000, 0x0) r9 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000400)='TIPCv2\x00') syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x9, 0x280002) sendmsg$TIPC_NL_MON_PEER_GET(r8, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x810}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=r9, @ANYBLOB="000c2abd7000fddb0900130000001400060004000200040002000800010001f0ffff"], 0x28}, 0x1, 0x0, 0x0, 0x40000}, 0x80) 14:26:52 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8f1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000001300)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(r1, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x84040001}, 0xc, &(0x7f0000000140)={&(0x7f0000001440)=ANY=[@ANYRES16=r2, @ANYBLOB="1074c43fc5d405ea270d4adb3c75a4d967cbe8365944e301b05f4ecdfa0400000014000300080001000300000008000500000000002c000b0039ca529c8eade452f1583f0934ed212ecfc86c2b92ade79da2279027ab4400"/102], 0x2}}, 0x4) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x10000, 0x0) ioctl$RTC_PIE_OFF(r3, 0x7006) r4 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP_VS_SO_SET_ADD(r4, 0x0, 0x482, &(0x7f00000001c0)={0x11, @remote, 0x4e22, 0x1000000, 'wrr\x00', 0x5, 0x1, 0x55}, 0x2c) setsockopt$inet6_int(r4, 0x29, 0x31, &(0x7f0000000000)=0x5, 0x4) getsockopt$IP6T_SO_GET_REVISION_MATCH(r4, 0x29, 0x44, &(0x7f0000000200)={'HL\x00'}, &(0x7f0000000280)=0x1e) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x40, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0086426, &(0x7f0000001380)={0x2, &(0x7f0000001340)=[{0x0}, {}]}) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) ioctl$DRM_IOCTL_LOCK(0xffffffffffffffff, 0x4008642a, &(0x7f0000001540)={r6, 0x61f5206fbdaf66f6}) ioctl$SCSI_IOCTL_GET_IDLUN(r5, 0x5382, &(0x7f00000000c0)) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$KVM_REGISTER_COALESCED_MMIO(r5, 0x4010ae67, 0x0) getsockopt$packet_buf(r4, 0x107, 0xd, &(0x7f00000002c0)=""/4096, &(0x7f00000012c0)=0x1000) recvmmsg(r4, &(0x7f0000008880), 0x45b, 0x44000102, 0x0) r7 = syz_open_dev$sndseq(0x0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f0000000000)={0x0, 0x0, 0x0, 'queue1\x00'}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r7, 0xc08c5335, &(0x7f00000000c0)={0x0, 0x81, 0x0, 'queue0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x90\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00'}) r8 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000380)='/dev/snapshot\x00', 0x70000, 0x0) r9 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000400)='TIPCv2\x00') syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x9, 0x280002) sendmsg$TIPC_NL_MON_PEER_GET(r8, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x810}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=r9, @ANYBLOB="000c2abd7000fddb0900130000001400060004000200040002000800010001f0ffff"], 0x28}, 0x1, 0x0, 0x0, 0x40000}, 0x80) 14:26:52 executing program 4: r0 = syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8f1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000001300)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(r1, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x84040001}, 0xc, &(0x7f0000000140)={&(0x7f0000001440)=ANY=[@ANYRES16=r2, @ANYBLOB="1074c43fc5d405ea270d4adb3c75a4d967cbe8365944e301b05f4ecdfa0400000014000300080001000300000008000500000000002c000b0039ca529c8eade452f1583f0934ed212ecfc86c2b92ade79da2279027ab4400"/102], 0x2}}, 0x4) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x10000, 0x0) ioctl$RTC_PIE_OFF(r3, 0x7006) r4 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP_VS_SO_SET_ADD(r4, 0x0, 0x482, &(0x7f00000001c0)={0x11, @remote, 0x4e22, 0x1000000, 'wrr\x00', 0x5, 0x1, 0x55}, 0x2c) setsockopt$inet6_int(r4, 0x29, 0x31, &(0x7f0000000000)=0x5, 0x4) getsockopt$IP6T_SO_GET_REVISION_MATCH(r4, 0x29, 0x44, &(0x7f0000000200)={'HL\x00'}, &(0x7f0000000280)=0x1e) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x40, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0086426, &(0x7f0000001380)={0x2, &(0x7f0000001340)=[{0x0}, {}]}) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) ioctl$DRM_IOCTL_LOCK(0xffffffffffffffff, 0x4008642a, &(0x7f0000001540)={r6, 0x61f5206fbdaf66f6}) ioctl$SCSI_IOCTL_GET_IDLUN(r5, 0x5382, &(0x7f00000000c0)) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$KVM_REGISTER_COALESCED_MMIO(r5, 0x4010ae67, 0x0) getsockopt$packet_buf(r4, 0x107, 0xd, &(0x7f00000002c0)=""/4096, &(0x7f00000012c0)=0x1000) recvmmsg(r4, &(0x7f0000008880), 0x45b, 0x44000102, 0x0) r7 = syz_open_dev$sndseq(0x0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f0000000000)={0x0, 0x0, 0x0, 'queue1\x00'}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r7, 0xc08c5335, &(0x7f00000000c0)={0x0, 0x81, 0x0, 'queue0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x90\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00'}) r8 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000380)='/dev/snapshot\x00', 0x70000, 0x0) r9 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000400)='TIPCv2\x00') syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x9, 0x280002) sendmsg$TIPC_NL_MON_PEER_GET(r8, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x810}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=r9, @ANYBLOB="000c2abd7000fddb0900130000001400060004000200040002000800010001f0ffff"], 0x28}, 0x1, 0x0, 0x0, 0x40000}, 0x80) 14:26:52 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8f1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000001300)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(r1, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x84040001}, 0xc, &(0x7f0000000140)={&(0x7f0000001440)=ANY=[@ANYRES16=r2, @ANYBLOB="1074c43fc5d405ea270d4adb3c75a4d967cbe8365944e301b05f4ecdfa0400000014000300080001000300000008000500000000002c000b0039ca529c8eade452f1583f0934ed212ecfc86c2b92ade79da2279027ab4400"/102], 0x2}}, 0x4) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x10000, 0x0) ioctl$RTC_PIE_OFF(r3, 0x7006) r4 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP_VS_SO_SET_ADD(r4, 0x0, 0x482, &(0x7f00000001c0)={0x11, @remote, 0x4e22, 0x1000000, 'wrr\x00', 0x5, 0x1, 0x55}, 0x2c) setsockopt$inet6_int(r4, 0x29, 0x31, &(0x7f0000000000)=0x5, 0x4) getsockopt$IP6T_SO_GET_REVISION_MATCH(r4, 0x29, 0x44, &(0x7f0000000200)={'HL\x00'}, &(0x7f0000000280)=0x1e) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x40, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0086426, &(0x7f0000001380)={0x2, &(0x7f0000001340)=[{0x0}, {}]}) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) ioctl$DRM_IOCTL_LOCK(0xffffffffffffffff, 0x4008642a, &(0x7f0000001540)={r6, 0x61f5206fbdaf66f6}) ioctl$SCSI_IOCTL_GET_IDLUN(r5, 0x5382, &(0x7f00000000c0)) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$KVM_REGISTER_COALESCED_MMIO(r5, 0x4010ae67, 0x0) getsockopt$packet_buf(r4, 0x107, 0xd, &(0x7f00000002c0)=""/4096, &(0x7f00000012c0)=0x1000) recvmmsg(r4, &(0x7f0000008880), 0x45b, 0x44000102, 0x0) r7 = syz_open_dev$sndseq(0x0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f0000000000)={0x0, 0x0, 0x0, 'queue1\x00'}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r7, 0xc08c5335, &(0x7f00000000c0)={0x0, 0x81, 0x0, 'queue0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x90\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00'}) r8 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000380)='/dev/snapshot\x00', 0x70000, 0x0) r9 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000400)='TIPCv2\x00') syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x9, 0x280002) sendmsg$TIPC_NL_MON_PEER_GET(r8, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x810}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=r9, @ANYBLOB="000c2abd7000fddb0900130000001400060004000200040002000800010001f0ffff"], 0x28}, 0x1, 0x0, 0x0, 0x40000}, 0x80) 14:26:52 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8f1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000001300)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(r1, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x84040001}, 0xc, &(0x7f0000000140)={&(0x7f0000001440)=ANY=[@ANYRES16=r2, @ANYBLOB="1074c43fc5d405ea270d4adb3c75a4d967cbe8365944e301b05f4ecdfa0400000014000300080001000300000008000500000000002c000b0039ca529c8eade452f1583f0934ed212ecfc86c2b92ade79da2279027ab4400"/102], 0x2}}, 0x4) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x10000, 0x0) ioctl$RTC_PIE_OFF(r3, 0x7006) r4 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP_VS_SO_SET_ADD(r4, 0x0, 0x482, &(0x7f00000001c0)={0x11, @remote, 0x4e22, 0x1000000, 'wrr\x00', 0x5, 0x1, 0x55}, 0x2c) setsockopt$inet6_int(r4, 0x29, 0x31, &(0x7f0000000000)=0x5, 0x4) getsockopt$IP6T_SO_GET_REVISION_MATCH(r4, 0x29, 0x44, &(0x7f0000000200)={'HL\x00'}, &(0x7f0000000280)=0x1e) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x40, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0086426, &(0x7f0000001380)={0x2, &(0x7f0000001340)=[{0x0}, {}]}) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) ioctl$DRM_IOCTL_LOCK(0xffffffffffffffff, 0x4008642a, &(0x7f0000001540)={r6, 0x61f5206fbdaf66f6}) ioctl$SCSI_IOCTL_GET_IDLUN(r5, 0x5382, &(0x7f00000000c0)) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$KVM_REGISTER_COALESCED_MMIO(r5, 0x4010ae67, 0x0) getsockopt$packet_buf(r4, 0x107, 0xd, &(0x7f00000002c0)=""/4096, &(0x7f00000012c0)=0x1000) recvmmsg(r4, &(0x7f0000008880), 0x45b, 0x44000102, 0x0) r7 = syz_open_dev$sndseq(0x0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f0000000000)={0x0, 0x0, 0x0, 'queue1\x00'}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r7, 0xc08c5335, &(0x7f00000000c0)={0x0, 0x81, 0x0, 'queue0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x90\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00'}) r8 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000380)='/dev/snapshot\x00', 0x70000, 0x0) r9 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000400)='TIPCv2\x00') syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x9, 0x280002) sendmsg$TIPC_NL_MON_PEER_GET(r8, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x810}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=r9, @ANYBLOB="000c2abd7000fddb0900130000001400060004000200040002000800010001f0ffff"], 0x28}, 0x1, 0x0, 0x0, 0x40000}, 0x80) 14:26:52 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8f1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000001300)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(r1, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x84040001}, 0xc, &(0x7f0000000140)={&(0x7f0000001440)=ANY=[@ANYRES16=r2, @ANYBLOB="1074c43fc5d405ea270d4adb3c75a4d967cbe8365944e301b05f4ecdfa0400000014000300080001000300000008000500000000002c000b0039ca529c8eade452f1583f0934ed212ecfc86c2b92ade79da2279027ab4400"/102], 0x2}}, 0x4) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x10000, 0x0) ioctl$RTC_PIE_OFF(r3, 0x7006) r4 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP_VS_SO_SET_ADD(r4, 0x0, 0x482, &(0x7f00000001c0)={0x11, @remote, 0x4e22, 0x1000000, 'wrr\x00', 0x5, 0x1, 0x55}, 0x2c) setsockopt$inet6_int(r4, 0x29, 0x31, &(0x7f0000000000)=0x5, 0x4) getsockopt$IP6T_SO_GET_REVISION_MATCH(r4, 0x29, 0x44, &(0x7f0000000200)={'HL\x00'}, &(0x7f0000000280)=0x1e) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x40, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0086426, &(0x7f0000001380)={0x2, &(0x7f0000001340)=[{0x0}, {}]}) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) ioctl$DRM_IOCTL_LOCK(0xffffffffffffffff, 0x4008642a, &(0x7f0000001540)={r6, 0x61f5206fbdaf66f6}) ioctl$SCSI_IOCTL_GET_IDLUN(r5, 0x5382, &(0x7f00000000c0)) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$KVM_REGISTER_COALESCED_MMIO(r5, 0x4010ae67, 0x0) getsockopt$packet_buf(r4, 0x107, 0xd, &(0x7f00000002c0)=""/4096, &(0x7f00000012c0)=0x1000) recvmmsg(r4, &(0x7f0000008880), 0x45b, 0x44000102, 0x0) r7 = syz_open_dev$sndseq(0x0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f0000000000)={0x0, 0x0, 0x0, 'queue1\x00'}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r7, 0xc08c5335, &(0x7f00000000c0)={0x0, 0x81, 0x0, 'queue0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x90\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00'}) r8 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000380)='/dev/snapshot\x00', 0x70000, 0x0) r9 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000400)='TIPCv2\x00') syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x9, 0x280002) sendmsg$TIPC_NL_MON_PEER_GET(r8, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x810}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=r9, @ANYBLOB="000c2abd7000fddb0900130000001400060004000200040002000800010001f0ffff"], 0x28}, 0x1, 0x0, 0x0, 0x40000}, 0x80) 14:26:52 executing program 1: r0 = syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8f1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000001300)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(r1, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x84040001}, 0xc, &(0x7f0000000140)={&(0x7f0000001440)=ANY=[@ANYRES16=r2, @ANYBLOB="1074c43fc5d405ea270d4adb3c75a4d967cbe8365944e301b05f4ecdfa0400000014000300080001000300000008000500000000002c000b0039ca529c8eade452f1583f0934ed212ecfc86c2b92ade79da2279027ab4400"/102], 0x2}}, 0x4) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x10000, 0x0) ioctl$RTC_PIE_OFF(r3, 0x7006) r4 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP_VS_SO_SET_ADD(r4, 0x0, 0x482, &(0x7f00000001c0)={0x11, @remote, 0x4e22, 0x1000000, 'wrr\x00', 0x5, 0x1, 0x55}, 0x2c) setsockopt$inet6_int(r4, 0x29, 0x31, &(0x7f0000000000)=0x5, 0x4) getsockopt$IP6T_SO_GET_REVISION_MATCH(r4, 0x29, 0x44, &(0x7f0000000200)={'HL\x00'}, &(0x7f0000000280)=0x1e) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x40, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0086426, &(0x7f0000001380)={0x2, &(0x7f0000001340)=[{0x0}, {}]}) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) ioctl$DRM_IOCTL_LOCK(0xffffffffffffffff, 0x4008642a, &(0x7f0000001540)={r6, 0x61f5206fbdaf66f6}) ioctl$SCSI_IOCTL_GET_IDLUN(r5, 0x5382, &(0x7f00000000c0)) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$KVM_REGISTER_COALESCED_MMIO(r5, 0x4010ae67, 0x0) getsockopt$packet_buf(r4, 0x107, 0xd, &(0x7f00000002c0)=""/4096, &(0x7f00000012c0)=0x1000) recvmmsg(r4, &(0x7f0000008880), 0x45b, 0x44000102, 0x0) r7 = syz_open_dev$sndseq(0x0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f0000000000)={0x0, 0x0, 0x0, 'queue1\x00'}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r7, 0xc08c5335, &(0x7f00000000c0)={0x0, 0x81, 0x0, 'queue0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x90\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00'}) r8 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000380)='/dev/snapshot\x00', 0x70000, 0x0) r9 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000400)='TIPCv2\x00') syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x9, 0x280002) sendmsg$TIPC_NL_MON_PEER_GET(r8, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x810}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=r9, @ANYBLOB="000c2abd7000fddb0900130000001400060004000200040002000800010001f0ffff"], 0x28}, 0x1, 0x0, 0x0, 0x40000}, 0x80) 14:26:53 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8f1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000001300)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(r1, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x84040001}, 0xc, &(0x7f0000000140)={&(0x7f0000001440)=ANY=[@ANYRES16=r2, @ANYBLOB="1074c43fc5d405ea270d4adb3c75a4d967cbe8365944e301b05f4ecdfa0400000014000300080001000300000008000500000000002c000b0039ca529c8eade452f1583f0934ed212ecfc86c2b92ade79da2279027ab4400"/102], 0x2}}, 0x4) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x10000, 0x0) ioctl$RTC_PIE_OFF(r3, 0x7006) r4 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP_VS_SO_SET_ADD(r4, 0x0, 0x482, &(0x7f00000001c0)={0x11, @remote, 0x4e22, 0x1000000, 'wrr\x00', 0x5, 0x1, 0x55}, 0x2c) setsockopt$inet6_int(r4, 0x29, 0x31, &(0x7f0000000000)=0x5, 0x4) getsockopt$IP6T_SO_GET_REVISION_MATCH(r4, 0x29, 0x44, &(0x7f0000000200)={'HL\x00'}, &(0x7f0000000280)=0x1e) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x40, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0086426, &(0x7f0000001380)={0x2, &(0x7f0000001340)=[{0x0}, {}]}) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) ioctl$DRM_IOCTL_LOCK(0xffffffffffffffff, 0x4008642a, &(0x7f0000001540)={r6, 0x61f5206fbdaf66f6}) ioctl$SCSI_IOCTL_GET_IDLUN(r5, 0x5382, &(0x7f00000000c0)) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$KVM_REGISTER_COALESCED_MMIO(r5, 0x4010ae67, 0x0) getsockopt$packet_buf(r4, 0x107, 0xd, &(0x7f00000002c0)=""/4096, &(0x7f00000012c0)=0x1000) recvmmsg(r4, &(0x7f0000008880), 0x45b, 0x44000102, 0x0) r7 = syz_open_dev$sndseq(0x0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f0000000000)={0x0, 0x0, 0x0, 'queue1\x00'}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r7, 0xc08c5335, &(0x7f00000000c0)={0x0, 0x81, 0x0, 'queue0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x90\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00'}) r8 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000380)='/dev/snapshot\x00', 0x70000, 0x0) r9 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000400)='TIPCv2\x00') syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x9, 0x280002) sendmsg$TIPC_NL_MON_PEER_GET(r8, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x810}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=r9, @ANYBLOB="000c2abd7000fddb0900130000001400060004000200040002000800010001f0ffff"], 0x28}, 0x1, 0x0, 0x0, 0x40000}, 0x80) 14:26:53 executing program 4: r0 = syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8f1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000001300)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(r1, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x84040001}, 0xc, &(0x7f0000000140)={&(0x7f0000001440)=ANY=[@ANYRES16=r2, @ANYBLOB="1074c43fc5d405ea270d4adb3c75a4d967cbe8365944e301b05f4ecdfa0400000014000300080001000300000008000500000000002c000b0039ca529c8eade452f1583f0934ed212ecfc86c2b92ade79da2279027ab4400"/102], 0x2}}, 0x4) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x10000, 0x0) ioctl$RTC_PIE_OFF(r3, 0x7006) r4 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP_VS_SO_SET_ADD(r4, 0x0, 0x482, &(0x7f00000001c0)={0x11, @remote, 0x4e22, 0x1000000, 'wrr\x00', 0x5, 0x1, 0x55}, 0x2c) setsockopt$inet6_int(r4, 0x29, 0x31, &(0x7f0000000000)=0x5, 0x4) getsockopt$IP6T_SO_GET_REVISION_MATCH(r4, 0x29, 0x44, &(0x7f0000000200)={'HL\x00'}, &(0x7f0000000280)=0x1e) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x40, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0086426, &(0x7f0000001380)={0x2, &(0x7f0000001340)=[{0x0}, {}]}) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) ioctl$DRM_IOCTL_LOCK(0xffffffffffffffff, 0x4008642a, &(0x7f0000001540)={r6, 0x61f5206fbdaf66f6}) ioctl$SCSI_IOCTL_GET_IDLUN(r5, 0x5382, &(0x7f00000000c0)) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$KVM_REGISTER_COALESCED_MMIO(r5, 0x4010ae67, 0x0) getsockopt$packet_buf(r4, 0x107, 0xd, &(0x7f00000002c0)=""/4096, &(0x7f00000012c0)=0x1000) recvmmsg(r4, &(0x7f0000008880), 0x45b, 0x44000102, 0x0) r7 = syz_open_dev$sndseq(0x0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f0000000000)={0x0, 0x0, 0x0, 'queue1\x00'}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r7, 0xc08c5335, &(0x7f00000000c0)={0x0, 0x81, 0x0, 'queue0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x90\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00'}) r8 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000380)='/dev/snapshot\x00', 0x70000, 0x0) r9 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000400)='TIPCv2\x00') syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x9, 0x280002) sendmsg$TIPC_NL_MON_PEER_GET(r8, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x810}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=r9, @ANYBLOB="000c2abd7000fddb0900130000001400060004000200040002000800010001f0ffff"], 0x28}, 0x1, 0x0, 0x0, 0x40000}, 0x80) 14:26:53 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8f1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000001300)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(r1, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x84040001}, 0xc, &(0x7f0000000140)={&(0x7f0000001440)=ANY=[@ANYRES16=r2, @ANYBLOB="1074c43fc5d405ea270d4adb3c75a4d967cbe8365944e301b05f4ecdfa0400000014000300080001000300000008000500000000002c000b0039ca529c8eade452f1583f0934ed212ecfc86c2b92ade79da2279027ab4400"/102], 0x2}}, 0x4) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x10000, 0x0) ioctl$RTC_PIE_OFF(r3, 0x7006) r4 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP_VS_SO_SET_ADD(r4, 0x0, 0x482, &(0x7f00000001c0)={0x11, @remote, 0x4e22, 0x1000000, 'wrr\x00', 0x5, 0x1, 0x55}, 0x2c) setsockopt$inet6_int(r4, 0x29, 0x31, &(0x7f0000000000)=0x5, 0x4) getsockopt$IP6T_SO_GET_REVISION_MATCH(r4, 0x29, 0x44, &(0x7f0000000200)={'HL\x00'}, &(0x7f0000000280)=0x1e) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x40, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0086426, &(0x7f0000001380)={0x2, &(0x7f0000001340)=[{0x0}, {}]}) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) ioctl$DRM_IOCTL_LOCK(0xffffffffffffffff, 0x4008642a, &(0x7f0000001540)={r6, 0x61f5206fbdaf66f6}) ioctl$SCSI_IOCTL_GET_IDLUN(r5, 0x5382, &(0x7f00000000c0)) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$KVM_REGISTER_COALESCED_MMIO(r5, 0x4010ae67, 0x0) getsockopt$packet_buf(r4, 0x107, 0xd, &(0x7f00000002c0)=""/4096, &(0x7f00000012c0)=0x1000) recvmmsg(r4, &(0x7f0000008880), 0x45b, 0x44000102, 0x0) r7 = syz_open_dev$sndseq(0x0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f0000000000)={0x0, 0x0, 0x0, 'queue1\x00'}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r7, 0xc08c5335, &(0x7f00000000c0)={0x0, 0x81, 0x0, 'queue0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x90\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00'}) r8 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000380)='/dev/snapshot\x00', 0x70000, 0x0) r9 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000400)='TIPCv2\x00') syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x9, 0x280002) sendmsg$TIPC_NL_MON_PEER_GET(r8, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x810}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=r9, @ANYBLOB="000c2abd7000fddb0900130000001400060004000200040002000800010001f0ffff"], 0x28}, 0x1, 0x0, 0x0, 0x40000}, 0x80) 14:26:53 executing program 2: r0 = socket$unix(0x1, 0x2, 0x0) bind$unix(r0, &(0x7f0000000340)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r1 = socket$unix(0x1, 0x2, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) r2 = open$dir(&(0x7f0000000080)='./file1\x00', 0x0, 0x0) fchdir(r2) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e, 0x0}, 0x0) setresuid(0xffffffffffffffff, 0xfffe, 0xffffffffffffffff) sendmmsg(r1, &(0x7f0000000040), 0x40000000000020f, 0x0) 14:26:53 executing program 2: r0 = socket$unix(0x1, 0x2, 0x0) bind$unix(r0, &(0x7f0000000340)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r1 = socket$unix(0x1, 0x2, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) r2 = open$dir(&(0x7f0000000080)='./file1\x00', 0x0, 0x0) fchdir(r2) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e, 0x0}, 0x0) setresuid(0xffffffffffffffff, 0xfffe, 0xffffffffffffffff) sendmmsg(r1, &(0x7f0000000040), 0x40000000000020f, 0x0) 14:26:53 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8f1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000001300)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(r1, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x84040001}, 0xc, &(0x7f0000000140)={&(0x7f0000001440)=ANY=[@ANYRES16=r2, @ANYBLOB="1074c43fc5d405ea270d4adb3c75a4d967cbe8365944e301b05f4ecdfa0400000014000300080001000300000008000500000000002c000b0039ca529c8eade452f1583f0934ed212ecfc86c2b92ade79da2279027ab4400"/102], 0x2}}, 0x4) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x10000, 0x0) ioctl$RTC_PIE_OFF(r3, 0x7006) r4 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP_VS_SO_SET_ADD(r4, 0x0, 0x482, &(0x7f00000001c0)={0x11, @remote, 0x4e22, 0x1000000, 'wrr\x00', 0x5, 0x1, 0x55}, 0x2c) setsockopt$inet6_int(r4, 0x29, 0x31, &(0x7f0000000000)=0x5, 0x4) getsockopt$IP6T_SO_GET_REVISION_MATCH(r4, 0x29, 0x44, &(0x7f0000000200)={'HL\x00'}, &(0x7f0000000280)=0x1e) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x40, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0086426, &(0x7f0000001380)={0x2, &(0x7f0000001340)=[{0x0}, {}]}) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) ioctl$DRM_IOCTL_LOCK(0xffffffffffffffff, 0x4008642a, &(0x7f0000001540)={r6, 0x61f5206fbdaf66f6}) ioctl$SCSI_IOCTL_GET_IDLUN(r5, 0x5382, &(0x7f00000000c0)) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$KVM_REGISTER_COALESCED_MMIO(r5, 0x4010ae67, 0x0) getsockopt$packet_buf(r4, 0x107, 0xd, &(0x7f00000002c0)=""/4096, &(0x7f00000012c0)=0x1000) recvmmsg(r4, &(0x7f0000008880), 0x45b, 0x44000102, 0x0) r7 = syz_open_dev$sndseq(0x0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f0000000000)={0x0, 0x0, 0x0, 'queue1\x00'}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r7, 0xc08c5335, &(0x7f00000000c0)={0x0, 0x81, 0x0, 'queue0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x90\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00'}) r8 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000380)='/dev/snapshot\x00', 0x70000, 0x0) r9 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000400)='TIPCv2\x00') syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x9, 0x280002) sendmsg$TIPC_NL_MON_PEER_GET(r8, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x810}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=r9, @ANYBLOB="000c2abd7000fddb0900130000001400060004000200040002000800010001f0ffff"], 0x28}, 0x1, 0x0, 0x0, 0x40000}, 0x80) 14:26:53 executing program 2: r0 = socket$unix(0x1, 0x2, 0x0) bind$unix(r0, &(0x7f0000000340)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r1 = socket$unix(0x1, 0x2, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) r2 = open$dir(&(0x7f0000000080)='./file1\x00', 0x0, 0x0) fchdir(r2) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e, 0x0}, 0x0) setresuid(0xffffffffffffffff, 0xfffe, 0xffffffffffffffff) sendmmsg(r1, &(0x7f0000000040), 0x40000000000020f, 0x0) 14:26:53 executing program 2: r0 = socket$unix(0x1, 0x2, 0x0) bind$unix(r0, &(0x7f0000000340)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r1 = socket$unix(0x1, 0x2, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) r2 = open$dir(&(0x7f0000000080)='./file1\x00', 0x0, 0x0) fchdir(r2) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e, 0x0}, 0x0) setresuid(0xffffffffffffffff, 0xfffe, 0xffffffffffffffff) sendmmsg(r1, &(0x7f0000000040), 0x40000000000020f, 0x0) 14:26:53 executing program 2: r0 = socket$unix(0x1, 0x2, 0x0) bind$unix(r0, &(0x7f0000000340)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r1 = socket$unix(0x1, 0x2, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) r2 = open$dir(&(0x7f0000000080)='./file1\x00', 0x0, 0x0) fchdir(r2) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e, 0x0}, 0x0) setresuid(0xffffffffffffffff, 0xfffe, 0xffffffffffffffff) sendmmsg(r1, &(0x7f0000000040), 0x40000000000020f, 0x0) 14:26:53 executing program 2: r0 = socket$unix(0x1, 0x2, 0x0) bind$unix(r0, &(0x7f0000000340)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r1 = socket$unix(0x1, 0x2, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) r2 = open$dir(&(0x7f0000000080)='./file1\x00', 0x0, 0x0) fchdir(r2) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e, 0x0}, 0x0) setresuid(0xffffffffffffffff, 0xfffe, 0xffffffffffffffff) sendmmsg(r1, &(0x7f0000000040), 0x40000000000020f, 0x0) 14:26:53 executing program 2: r0 = socket$unix(0x1, 0x2, 0x0) bind$unix(r0, &(0x7f0000000340)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r1 = socket$unix(0x1, 0x2, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) r2 = open$dir(&(0x7f0000000080)='./file1\x00', 0x0, 0x0) fchdir(r2) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e, 0x0}, 0x0) setresuid(0xffffffffffffffff, 0xfffe, 0xffffffffffffffff) sendmmsg(r1, &(0x7f0000000040), 0x40000000000020f, 0x0) 14:26:53 executing program 2: r0 = socket$unix(0x1, 0x2, 0x0) bind$unix(r0, &(0x7f0000000340)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r1 = socket$unix(0x1, 0x2, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) r2 = open$dir(&(0x7f0000000080)='./file1\x00', 0x0, 0x0) fchdir(r2) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e, 0x0}, 0x0) setresuid(0xffffffffffffffff, 0xfffe, 0xffffffffffffffff) sendmmsg(r1, &(0x7f0000000040), 0x40000000000020f, 0x0) 14:26:53 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) unshare(0x400) fcntl$setflags(r0, 0x2, 0x0) 14:26:53 executing program 4: r0 = syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8f1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000001300)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(r1, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x84040001}, 0xc, &(0x7f0000000140)={&(0x7f0000001440)=ANY=[@ANYRES16=r2, @ANYBLOB="1074c43fc5d405ea270d4adb3c75a4d967cbe8365944e301b05f4ecdfa0400000014000300080001000300000008000500000000002c000b0039ca529c8eade452f1583f0934ed212ecfc86c2b92ade79da2279027ab4400"/102], 0x2}}, 0x4) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x10000, 0x0) ioctl$RTC_PIE_OFF(r3, 0x7006) r4 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP_VS_SO_SET_ADD(r4, 0x0, 0x482, &(0x7f00000001c0)={0x11, @remote, 0x4e22, 0x1000000, 'wrr\x00', 0x5, 0x1, 0x55}, 0x2c) setsockopt$inet6_int(r4, 0x29, 0x31, &(0x7f0000000000)=0x5, 0x4) getsockopt$IP6T_SO_GET_REVISION_MATCH(r4, 0x29, 0x44, &(0x7f0000000200)={'HL\x00'}, &(0x7f0000000280)=0x1e) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x40, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0086426, &(0x7f0000001380)={0x2, &(0x7f0000001340)=[{0x0}, {}]}) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) ioctl$DRM_IOCTL_LOCK(0xffffffffffffffff, 0x4008642a, &(0x7f0000001540)={r6, 0x61f5206fbdaf66f6}) ioctl$SCSI_IOCTL_GET_IDLUN(r5, 0x5382, &(0x7f00000000c0)) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$KVM_REGISTER_COALESCED_MMIO(r5, 0x4010ae67, 0x0) getsockopt$packet_buf(r4, 0x107, 0xd, &(0x7f00000002c0)=""/4096, &(0x7f00000012c0)=0x1000) recvmmsg(r4, &(0x7f0000008880), 0x45b, 0x44000102, 0x0) r7 = syz_open_dev$sndseq(0x0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f0000000000)={0x0, 0x0, 0x0, 'queue1\x00'}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r7, 0xc08c5335, &(0x7f00000000c0)={0x0, 0x81, 0x0, 'queue0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x90\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00'}) r8 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000380)='/dev/snapshot\x00', 0x70000, 0x0) r9 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000400)='TIPCv2\x00') syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x9, 0x280002) sendmsg$TIPC_NL_MON_PEER_GET(r8, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x810}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=r9, @ANYBLOB="000c2abd7000fddb0900130000001400060004000200040002000800010001f0ffff"], 0x28}, 0x1, 0x0, 0x0, 0x40000}, 0x80) 14:26:53 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) unshare(0x400) fcntl$setflags(r0, 0x2, 0x0) 14:26:53 executing program 2: r0 = socket$unix(0x1, 0x2, 0x0) bind$unix(r0, &(0x7f0000000340)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r1 = socket$unix(0x1, 0x2, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) r2 = open$dir(&(0x7f0000000080)='./file1\x00', 0x0, 0x0) fchdir(r2) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e, 0x0}, 0x0) setresuid(0xffffffffffffffff, 0xfffe, 0xffffffffffffffff) sendmmsg(r1, &(0x7f0000000040), 0x40000000000020f, 0x0) 14:26:53 executing program 1: r0 = socket$unix(0x1, 0x2, 0x0) bind$unix(r0, &(0x7f0000000340)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r1 = socket$unix(0x1, 0x2, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) r2 = open$dir(&(0x7f0000000080)='./file1\x00', 0x0, 0x0) fchdir(r2) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e, 0x0}, 0x0) setresuid(0xffffffffffffffff, 0xfffe, 0xffffffffffffffff) sendmmsg(r1, &(0x7f0000000040), 0x40000000000020f, 0x0) 14:26:54 executing program 2: r0 = socket$unix(0x1, 0x2, 0x0) bind$unix(r0, &(0x7f0000000340)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r1 = socket$unix(0x1, 0x2, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) r2 = open$dir(&(0x7f0000000080)='./file1\x00', 0x0, 0x0) fchdir(r2) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e, 0x0}, 0x0) setresuid(0xffffffffffffffff, 0xfffe, 0xffffffffffffffff) sendmmsg(r1, &(0x7f0000000040), 0x40000000000020f, 0x0) 14:26:54 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) unshare(0x400) fcntl$setflags(r0, 0x2, 0x0) 14:26:54 executing program 1: r0 = socket$unix(0x1, 0x2, 0x0) bind$unix(r0, &(0x7f0000000340)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r1 = socket$unix(0x1, 0x2, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) r2 = open$dir(&(0x7f0000000080)='./file1\x00', 0x0, 0x0) fchdir(r2) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e, 0x0}, 0x0) setresuid(0xffffffffffffffff, 0xfffe, 0xffffffffffffffff) sendmmsg(r1, &(0x7f0000000040), 0x40000000000020f, 0x0) 14:26:54 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000000)={0x0, 0x9}) 14:26:54 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='loginuid\x00') write$P9_RSYMLINK(r0, 0x0, 0x0) 14:26:54 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) unshare(0x400) fcntl$setflags(r0, 0x2, 0x0) 14:26:54 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='loginuid\x00') write$P9_RSYMLINK(r0, 0x0, 0x0) 14:26:54 executing program 2: r0 = socket(0x40000000015, 0x5, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10) 14:26:54 executing program 4: r0 = syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8f1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000001300)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(r1, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x84040001}, 0xc, &(0x7f0000000140)={&(0x7f0000001440)=ANY=[@ANYRES16=r2, @ANYBLOB="1074c43fc5d405ea270d4adb3c75a4d967cbe8365944e301b05f4ecdfa0400000014000300080001000300000008000500000000002c000b0039ca529c8eade452f1583f0934ed212ecfc86c2b92ade79da2279027ab4400"/102], 0x2}}, 0x4) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x10000, 0x0) ioctl$RTC_PIE_OFF(r3, 0x7006) r4 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP_VS_SO_SET_ADD(r4, 0x0, 0x482, &(0x7f00000001c0)={0x11, @remote, 0x4e22, 0x1000000, 'wrr\x00', 0x5, 0x1, 0x55}, 0x2c) setsockopt$inet6_int(r4, 0x29, 0x31, &(0x7f0000000000)=0x5, 0x4) getsockopt$IP6T_SO_GET_REVISION_MATCH(r4, 0x29, 0x44, &(0x7f0000000200)={'HL\x00'}, &(0x7f0000000280)=0x1e) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x40, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0086426, &(0x7f0000001380)={0x2, &(0x7f0000001340)=[{0x0}, {}]}) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) ioctl$DRM_IOCTL_LOCK(0xffffffffffffffff, 0x4008642a, &(0x7f0000001540)={r6, 0x61f5206fbdaf66f6}) ioctl$SCSI_IOCTL_GET_IDLUN(r5, 0x5382, &(0x7f00000000c0)) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$KVM_REGISTER_COALESCED_MMIO(r5, 0x4010ae67, 0x0) getsockopt$packet_buf(r4, 0x107, 0xd, &(0x7f00000002c0)=""/4096, &(0x7f00000012c0)=0x1000) recvmmsg(r4, &(0x7f0000008880), 0x45b, 0x44000102, 0x0) r7 = syz_open_dev$sndseq(0x0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f0000000000)={0x0, 0x0, 0x0, 'queue1\x00'}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r7, 0xc08c5335, &(0x7f00000000c0)={0x0, 0x81, 0x0, 'queue0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x90\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00'}) r8 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000380)='/dev/snapshot\x00', 0x70000, 0x0) r9 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000400)='TIPCv2\x00') syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x9, 0x280002) sendmsg$TIPC_NL_MON_PEER_GET(r8, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x810}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=r9, @ANYBLOB="000c2abd7000fddb0900130000001400060004000200040002000800010001f0ffff"], 0x28}, 0x1, 0x0, 0x0, 0x40000}, 0x80) 14:26:54 executing program 1: r0 = socket$unix(0x1, 0x2, 0x0) bind$unix(r0, &(0x7f0000000340)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r1 = socket$unix(0x1, 0x2, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) r2 = open$dir(&(0x7f0000000080)='./file1\x00', 0x0, 0x0) fchdir(r2) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e, 0x0}, 0x0) setresuid(0xffffffffffffffff, 0xfffe, 0xffffffffffffffff) sendmmsg(r1, &(0x7f0000000040), 0x40000000000020f, 0x0) 14:26:54 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='loginuid\x00') write$P9_RSYMLINK(r0, 0x0, 0x0) 14:26:54 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000000)={0x0, 0x9}) 14:26:54 executing program 2: r0 = socket(0x40000000015, 0x5, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10) 14:26:54 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10) 14:26:54 executing program 2: r0 = socket(0x40000000015, 0x5, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10) 14:26:54 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='loginuid\x00') write$P9_RSYMLINK(r0, 0x0, 0x0) 14:26:54 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10) 14:26:54 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000000)={0x0, 0x9}) 14:26:54 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10) 14:26:54 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000000)={0x0, 0x9}) 14:26:55 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000000)={0x0, 0x9}) 14:26:55 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x86, 0x0) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) 14:26:55 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000000)=ANY=[@ANYBLOB="6e6e7400000100ce156385b1080f5ca66310f90900563039e444cd7a746fca63c33cb775870020002bed000000000000c75e00800000000000000000ba78030400cc000000ac01000000003f49590000000000fece8580000021f1ffffff9f34096a6a7f8bc9d6db697d2705f9642419515506ed0f365f4bbf007da53e31dbb8b6e6c6e3a731be20553b25c2dd41130b760049608baad68cac676f64ae96bf1d5ed36d21e00046cacc05d337463ecaf20080006d9849de3cbd006814bf9b55c103c99661ee92e5123a0293ff6521fd52d1b05abcae92554a0fbc92441a02230ee9287146db3ee482ac254de6e03851d8"], 0x1) 14:26:55 executing program 2: r0 = socket(0x40000000015, 0x5, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10) 14:26:55 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000000)={0x0, 0x9}) 14:26:55 executing program 3: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000280)="240000001a005f0014f9e407000904000200000000000000000e000008001b0001000000", 0x24) 14:26:55 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) syz_emit_ethernet(0x7a, &(0x7f0000000a40)={@broadcast, @dev, [], {@mpls_mc={0x8848, {[], @ipv6={0x0, 0x6, "a41500", 0x44, 0x0, 0x0, @empty, @dev, {[], @gre}}}}}}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000080c0)=[{{0x0, 0x0, &(0x7f0000003540)=[{&(0x7f0000003000)=""/106, 0x6a}], 0x1}}], 0x1, 0x0, 0x0) recvmmsg(r0, &(0x7f0000003300)=[{{&(0x7f00000003c0)=@can, 0x80, &(0x7f00000002c0)=[{&(0x7f0000000040)=""/253, 0xfd}, {&(0x7f0000000440)=""/230, 0xe6}, {&(0x7f0000000240)=""/125, 0x7d}], 0x3}}], 0x7fffffffffffef1, 0x22, &(0x7f0000000000)={0x0, 0x989680}) [ 357.362554][T29008] netlink: 'syz-executor.3': attribute type 27 has an invalid length. 14:26:55 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f00000000c0)='bcsf0\x00') ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000180)='bcsf0\x00\a\x00\x00\x05\x00\x00\x11\x00\x00\x13') 14:26:55 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000000)={0x0, 0x9}) 14:26:55 executing program 3: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000280)="240000001a005f0014f9e407000904000200000000000000000e000008001b0001000000", 0x24) 14:26:55 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x0) r1 = dup2(r0, r0) r2 = dup2(r0, r1) fcntl$setstatus(r2, 0x4, 0x2000) 14:26:55 executing program 3: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000280)="240000001a005f0014f9e407000904000200000000000000000e000008001b0001000000", 0x24) 14:26:55 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) syz_emit_ethernet(0x7a, &(0x7f0000000a40)={@broadcast, @dev, [], {@mpls_mc={0x8848, {[], @ipv6={0x0, 0x6, "a41500", 0x44, 0x0, 0x0, @empty, @dev, {[], @gre}}}}}}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000080c0)=[{{0x0, 0x0, &(0x7f0000003540)=[{&(0x7f0000003000)=""/106, 0x6a}], 0x1}}], 0x1, 0x0, 0x0) recvmmsg(r0, &(0x7f0000003300)=[{{&(0x7f00000003c0)=@can, 0x80, &(0x7f00000002c0)=[{&(0x7f0000000040)=""/253, 0xfd}, {&(0x7f0000000440)=""/230, 0xe6}, {&(0x7f0000000240)=""/125, 0x7d}], 0x3}}], 0x7fffffffffffef1, 0x22, &(0x7f0000000000)={0x0, 0x989680}) [ 357.505485][T29028] netlink: 'syz-executor.3': attribute type 27 has an invalid length. 14:26:55 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x0) r1 = dup2(r0, r0) r2 = dup2(r0, r1) fcntl$setstatus(r2, 0x4, 0x2000) 14:26:55 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000000)=ANY=[@ANYBLOB="6e6e7400000100ce156385b1080f5ca66310f90900563039e444cd7a746fca63c33cb775870020002bed000000000000c75e00800000000000000000ba78030400cc000000ac01000000003f49590000000000fece8580000021f1ffffff9f34096a6a7f8bc9d6db697d2705f9642419515506ed0f365f4bbf007da53e31dbb8b6e6c6e3a731be20553b25c2dd41130b760049608baad68cac676f64ae96bf1d5ed36d21e00046cacc05d337463ecaf20080006d9849de3cbd006814bf9b55c103c99661ee92e5123a0293ff6521fd52d1b05abcae92554a0fbc92441a02230ee9287146db3ee482ac254de6e03851d8"], 0x1) 14:26:55 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000000)=ANY=[@ANYBLOB="6e6e7400000100ce156385b1080f5ca66310f90900563039e444cd7a746fca63c33cb775870020002bed000000000000c75e00800000000000000000ba78030400cc000000ac01000000003f49590000000000fece8580000021f1ffffff9f34096a6a7f8bc9d6db697d2705f9642419515506ed0f365f4bbf007da53e31dbb8b6e6c6e3a731be20553b25c2dd41130b760049608baad68cac676f64ae96bf1d5ed36d21e00046cacc05d337463ecaf20080006d9849de3cbd006814bf9b55c103c99661ee92e5123a0293ff6521fd52d1b05abcae92554a0fbc92441a02230ee9287146db3ee482ac254de6e03851d8"], 0x1) 14:26:55 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x0) r1 = dup2(r0, r0) r2 = dup2(r0, r1) fcntl$setstatus(r2, 0x4, 0x2000) [ 357.642487][T29044] netlink: 'syz-executor.3': attribute type 27 has an invalid length. 14:26:56 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f00000000c0)='bcsf0\x00') ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000180)='bcsf0\x00\a\x00\x00\x05\x00\x00\x11\x00\x00\x13') 14:26:56 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x0) r1 = dup2(r0, r0) r2 = dup2(r0, r1) fcntl$setstatus(r2, 0x4, 0x2000) 14:26:56 executing program 3: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000280)="240000001a005f0014f9e407000904000200000000000000000e000008001b0001000000", 0x24) 14:26:56 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000000)=ANY=[@ANYBLOB="6e6e7400000100ce156385b1080f5ca66310f90900563039e444cd7a746fca63c33cb775870020002bed000000000000c75e00800000000000000000ba78030400cc000000ac01000000003f49590000000000fece8580000021f1ffffff9f34096a6a7f8bc9d6db697d2705f9642419515506ed0f365f4bbf007da53e31dbb8b6e6c6e3a731be20553b25c2dd41130b760049608baad68cac676f64ae96bf1d5ed36d21e00046cacc05d337463ecaf20080006d9849de3cbd006814bf9b55c103c99661ee92e5123a0293ff6521fd52d1b05abcae92554a0fbc92441a02230ee9287146db3ee482ac254de6e03851d8"], 0x1) 14:26:56 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) syz_emit_ethernet(0x7a, &(0x7f0000000a40)={@broadcast, @dev, [], {@mpls_mc={0x8848, {[], @ipv6={0x0, 0x6, "a41500", 0x44, 0x0, 0x0, @empty, @dev, {[], @gre}}}}}}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000080c0)=[{{0x0, 0x0, &(0x7f0000003540)=[{&(0x7f0000003000)=""/106, 0x6a}], 0x1}}], 0x1, 0x0, 0x0) recvmmsg(r0, &(0x7f0000003300)=[{{&(0x7f00000003c0)=@can, 0x80, &(0x7f00000002c0)=[{&(0x7f0000000040)=""/253, 0xfd}, {&(0x7f0000000440)=""/230, 0xe6}, {&(0x7f0000000240)=""/125, 0x7d}], 0x3}}], 0x7fffffffffffef1, 0x22, &(0x7f0000000000)={0x0, 0x989680}) 14:26:56 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000000)=ANY=[@ANYBLOB="6e6e7400000100ce156385b1080f5ca66310f90900563039e444cd7a746fca63c33cb775870020002bed000000000000c75e00800000000000000000ba78030400cc000000ac01000000003f49590000000000fece8580000021f1ffffff9f34096a6a7f8bc9d6db697d2705f9642419515506ed0f365f4bbf007da53e31dbb8b6e6c6e3a731be20553b25c2dd41130b760049608baad68cac676f64ae96bf1d5ed36d21e00046cacc05d337463ecaf20080006d9849de3cbd006814bf9b55c103c99661ee92e5123a0293ff6521fd52d1b05abcae92554a0fbc92441a02230ee9287146db3ee482ac254de6e03851d8"], 0x1) 14:26:56 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f00000000c0)='bcsf0\x00') ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000180)='bcsf0\x00\a\x00\x00\x05\x00\x00\x11\x00\x00\x13') 14:26:56 executing program 3: r0 = syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x0) r1 = dup2(r0, r0) r2 = dup2(r0, r1) fcntl$setstatus(r2, 0x4, 0x2000) [ 357.847300][T29068] netlink: 'syz-executor.3': attribute type 27 has an invalid length. 14:26:56 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f00000000c0)='bcsf0\x00') ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000180)='bcsf0\x00\a\x00\x00\x05\x00\x00\x11\x00\x00\x13') 14:26:56 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000000)=ANY=[@ANYBLOB="6e6e7400000100ce156385b1080f5ca66310f90900563039e444cd7a746fca63c33cb775870020002bed000000000000c75e00800000000000000000ba78030400cc000000ac01000000003f49590000000000fece8580000021f1ffffff9f34096a6a7f8bc9d6db697d2705f9642419515506ed0f365f4bbf007da53e31dbb8b6e6c6e3a731be20553b25c2dd41130b760049608baad68cac676f64ae96bf1d5ed36d21e00046cacc05d337463ecaf20080006d9849de3cbd006814bf9b55c103c99661ee92e5123a0293ff6521fd52d1b05abcae92554a0fbc92441a02230ee9287146db3ee482ac254de6e03851d8"], 0x1) 14:26:56 executing program 3: r0 = syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x0) r1 = dup2(r0, r0) r2 = dup2(r0, r1) fcntl$setstatus(r2, 0x4, 0x2000) 14:26:56 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) syz_emit_ethernet(0x7a, &(0x7f0000000a40)={@broadcast, @dev, [], {@mpls_mc={0x8848, {[], @ipv6={0x0, 0x6, "a41500", 0x44, 0x0, 0x0, @empty, @dev, {[], @gre}}}}}}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000080c0)=[{{0x0, 0x0, &(0x7f0000003540)=[{&(0x7f0000003000)=""/106, 0x6a}], 0x1}}], 0x1, 0x0, 0x0) recvmmsg(r0, &(0x7f0000003300)=[{{&(0x7f00000003c0)=@can, 0x80, &(0x7f00000002c0)=[{&(0x7f0000000040)=""/253, 0xfd}, {&(0x7f0000000440)=""/230, 0xe6}, {&(0x7f0000000240)=""/125, 0x7d}], 0x3}}], 0x7fffffffffffef1, 0x22, &(0x7f0000000000)={0x0, 0x989680}) 14:26:56 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000000)=ANY=[@ANYBLOB="6e6e7400000100ce156385b1080f5ca66310f90900563039e444cd7a746fca63c33cb775870020002bed000000000000c75e00800000000000000000ba78030400cc000000ac01000000003f49590000000000fece8580000021f1ffffff9f34096a6a7f8bc9d6db697d2705f9642419515506ed0f365f4bbf007da53e31dbb8b6e6c6e3a731be20553b25c2dd41130b760049608baad68cac676f64ae96bf1d5ed36d21e00046cacc05d337463ecaf20080006d9849de3cbd006814bf9b55c103c99661ee92e5123a0293ff6521fd52d1b05abcae92554a0fbc92441a02230ee9287146db3ee482ac254de6e03851d8"], 0x1) 14:26:56 executing program 3: r0 = syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x0) r1 = dup2(r0, r0) r2 = dup2(r0, r1) fcntl$setstatus(r2, 0x4, 0x2000) 14:26:56 executing program 0: r0 = syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x0) r1 = dup2(r0, r0) r2 = dup2(r0, r1) fcntl$setstatus(r2, 0x4, 0x2000) 14:26:56 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) syz_emit_ethernet(0x7a, &(0x7f0000000a40)={@broadcast, @dev, [], {@mpls_mc={0x8848, {[], @ipv6={0x0, 0x6, "a41500", 0x44, 0x0, 0x0, @empty, @dev, {[], @gre}}}}}}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000080c0)=[{{0x0, 0x0, &(0x7f0000003540)=[{&(0x7f0000003000)=""/106, 0x6a}], 0x1}}], 0x1, 0x0, 0x0) recvmmsg(r0, &(0x7f0000003300)=[{{&(0x7f00000003c0)=@can, 0x80, &(0x7f00000002c0)=[{&(0x7f0000000040)=""/253, 0xfd}, {&(0x7f0000000440)=""/230, 0xe6}, {&(0x7f0000000240)=""/125, 0x7d}], 0x3}}], 0x7fffffffffffef1, 0x22, &(0x7f0000000000)={0x0, 0x989680}) 14:26:56 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f00000000c0)='bcsf0\x00') ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000180)='bcsf0\x00\a\x00\x00\x05\x00\x00\x11\x00\x00\x13') 14:26:56 executing program 3: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$KVM_GET_CLOCK(r0, 0x40046104, 0x0) 14:26:56 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000740)=ANY=[@ANYBLOB="740000002400350500000000000000edffffff00", @ANYRES32, @ANYBLOB="00000014f1ffffffffffffff080001007366710048000100000000000080b9a06100000010000000030000000033cc3598c9aa8178bdf1000000000000000000000000de7f4687000000000000000000000001009900007c24f1583940ea0e363002e94564838f54825863fe646c248656cb5d845549c5ceffcfeaab4260fca524afef20c0034fbd32262c964c61f3771603fd386dc70a77e574632bd950e808d63007d6c6251ac28f6b621f863af06767ef3b8444b64c875270810633e2eb7d7a89d0f3cf2074bb2e180708593cd728026dfe7b7bc2cbc705ed95700983ea22eefa47c53252758e28ba5302e15a86aff40a0cb6088e18f3326fa3a5dcd32cb951da688b87961591b4671e40cf37feaa14dd000000000000321e6e4daef23cf875a45a0643142ac688f2a10d2a194d7079ce17e9cbda5da7ecf526f153140e6740200000b3c3c00b656f9021957cb27486eaa0345bdf43b770452e1353b94884160ab1357707dacc631c885e515d18f9e1697a8604cd27f232de351b821c373ad44e60efd73e28c85ce90800002d82680000000000000000cec5268374d0894824e83ff51cae120aae6ad04471171f99ab966cf04f7c6f1ebaf8c8f5d5697899e4005dae1be3c6299feb0c80ed6d93136f2d1fcc20fd1d1e9ab43d253637f48f97061896b83a1aaafb7db5e4ba05edd7dfcfd44be09e170fda5ea11e015a17d1"], 0x74}}, 0x0) sendmmsg$alg(r1, &(0x7f0000000180)=[{0x2, 0x1000000000000, &(0x7f0000000080), 0x0, &(0x7f0000000100)}], 0x492492492492642, 0x0) 14:26:56 executing program 0: r0 = syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x0) r1 = dup2(r0, r0) r2 = dup2(r0, r1) fcntl$setstatus(r2, 0x4, 0x2000) 14:26:56 executing program 3: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$KVM_GET_CLOCK(r0, 0x40046104, 0x0) 14:26:56 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f00000000c0)='bcsf0\x00') ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000180)='bcsf0\x00\a\x00\x00\x05\x00\x00\x11\x00\x00\x13') 14:26:56 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000740)=ANY=[@ANYBLOB="740000002400350500000000000000edffffff00", @ANYRES32, @ANYBLOB="00000014f1ffffffffffffff080001007366710048000100000000000080b9a06100000010000000030000000033cc3598c9aa8178bdf1000000000000000000000000de7f4687000000000000000000000001009900007c24f1583940ea0e363002e94564838f54825863fe646c248656cb5d845549c5ceffcfeaab4260fca524afef20c0034fbd32262c964c61f3771603fd386dc70a77e574632bd950e808d63007d6c6251ac28f6b621f863af06767ef3b8444b64c875270810633e2eb7d7a89d0f3cf2074bb2e180708593cd728026dfe7b7bc2cbc705ed95700983ea22eefa47c53252758e28ba5302e15a86aff40a0cb6088e18f3326fa3a5dcd32cb951da688b87961591b4671e40cf37feaa14dd000000000000321e6e4daef23cf875a45a0643142ac688f2a10d2a194d7079ce17e9cbda5da7ecf526f153140e6740200000b3c3c00b656f9021957cb27486eaa0345bdf43b770452e1353b94884160ab1357707dacc631c885e515d18f9e1697a8604cd27f232de351b821c373ad44e60efd73e28c85ce90800002d82680000000000000000cec5268374d0894824e83ff51cae120aae6ad04471171f99ab966cf04f7c6f1ebaf8c8f5d5697899e4005dae1be3c6299feb0c80ed6d93136f2d1fcc20fd1d1e9ab43d253637f48f97061896b83a1aaafb7db5e4ba05edd7dfcfd44be09e170fda5ea11e015a17d1"], 0x74}}, 0x0) sendmmsg$alg(r1, &(0x7f0000000180)=[{0x2, 0x1000000000000, &(0x7f0000000080), 0x0, &(0x7f0000000100)}], 0x492492492492642, 0x0) 14:26:56 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) syz_emit_ethernet(0x7a, &(0x7f0000000a40)={@broadcast, @dev, [], {@mpls_mc={0x8848, {[], @ipv6={0x0, 0x6, "a41500", 0x44, 0x0, 0x0, @empty, @dev, {[], @gre}}}}}}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000080c0)=[{{0x0, 0x0, &(0x7f0000003540)=[{&(0x7f0000003000)=""/106, 0x6a}], 0x1}}], 0x1, 0x0, 0x0) recvmmsg(r0, &(0x7f0000003300)=[{{&(0x7f00000003c0)=@can, 0x80, &(0x7f00000002c0)=[{&(0x7f0000000040)=""/253, 0xfd}, {&(0x7f0000000440)=""/230, 0xe6}, {&(0x7f0000000240)=""/125, 0x7d}], 0x3}}], 0x7fffffffffffef1, 0x22, &(0x7f0000000000)={0x0, 0x989680}) 14:26:56 executing program 0: r0 = syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x0) r1 = dup2(r0, r0) r2 = dup2(r0, r1) fcntl$setstatus(r2, 0x4, 0x2000) 14:26:56 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000740)=ANY=[@ANYBLOB="740000002400350500000000000000edffffff00", @ANYRES32, @ANYBLOB="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"], 0x74}}, 0x0) sendmmsg$alg(r1, &(0x7f0000000180)=[{0x2, 0x1000000000000, &(0x7f0000000080), 0x0, &(0x7f0000000100)}], 0x492492492492642, 0x0) 14:26:56 executing program 3: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$KVM_GET_CLOCK(r0, 0x40046104, 0x0) 14:26:56 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f00000000c0)='bcsf0\x00') ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000180)='bcsf0\x00\a\x00\x00\x05\x00\x00\x11\x00\x00\x13') 14:26:56 executing program 3: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$KVM_GET_CLOCK(r0, 0x40046104, 0x0) 14:26:56 executing program 0: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$KVM_GET_CLOCK(r0, 0x40046104, 0x0) [ 358.408373][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 358.414264][ C1] protocol 88fb is buggy, dev hsr_slave_1 14:26:56 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) syz_emit_ethernet(0x7a, &(0x7f0000000a40)={@broadcast, @dev, [], {@mpls_mc={0x8848, {[], @ipv6={0x0, 0x6, "a41500", 0x44, 0x0, 0x0, @empty, @dev, {[], @gre}}}}}}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000080c0)=[{{0x0, 0x0, &(0x7f0000003540)=[{&(0x7f0000003000)=""/106, 0x6a}], 0x1}}], 0x1, 0x0, 0x0) recvmmsg(r0, &(0x7f0000003300)=[{{&(0x7f00000003c0)=@can, 0x80, &(0x7f00000002c0)=[{&(0x7f0000000040)=""/253, 0xfd}, {&(0x7f0000000440)=""/230, 0xe6}, {&(0x7f0000000240)=""/125, 0x7d}], 0x3}}], 0x7fffffffffffef1, 0x22, &(0x7f0000000000)={0x0, 0x989680}) 14:26:56 executing program 0: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$KVM_GET_CLOCK(r0, 0x40046104, 0x0) 14:26:56 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000740)=ANY=[@ANYBLOB="740000002400350500000000000000edffffff00", @ANYRES32, @ANYBLOB="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"], 0x74}}, 0x0) sendmmsg$alg(r1, &(0x7f0000000180)=[{0x2, 0x1000000000000, &(0x7f0000000080), 0x0, &(0x7f0000000100)}], 0x492492492492642, 0x0) 14:26:56 executing program 3: r0 = socket$inet6(0xa, 0x802, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x8800, &(0x7f0000000000)={0xa, 0x4e23, 0x0, @ipv4}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}, 0x1c) 14:26:56 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000240)='./file1\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x4005ef0) fallocate(r1, 0x3, 0x2, 0x8001) 14:26:56 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000100)='/dev/vbi#\x00', 0x0, 0x2) ioctl$VIDIOC_QUERYSTD(r0, 0x8008563f, 0x0) 14:26:56 executing program 0: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$KVM_GET_CLOCK(r0, 0x40046104, 0x0) 14:26:56 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000240)='./file1\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x4005ef0) fallocate(r1, 0x3, 0x2, 0x8001) 14:26:56 executing program 3: r0 = socket$inet6(0xa, 0x802, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x8800, &(0x7f0000000000)={0xa, 0x4e23, 0x0, @ipv4}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}, 0x1c) 14:26:56 executing program 5: r0 = socket$inet6(0xa, 0x802, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x8800, &(0x7f0000000000)={0xa, 0x4e23, 0x0, @ipv4}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}, 0x1c) 14:26:56 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000240)='./file1\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x4005ef0) fallocate(r1, 0x3, 0x2, 0x8001) 14:26:57 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000100)='/dev/vbi#\x00', 0x0, 0x2) ioctl$VIDIOC_QUERYSTD(r0, 0x8008563f, 0x0) 14:26:57 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000240)='./file1\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x4005ef0) fallocate(r1, 0x3, 0x2, 0x8001) 14:26:57 executing program 5: r0 = socket$inet6(0xa, 0x802, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x8800, &(0x7f0000000000)={0xa, 0x4e23, 0x0, @ipv4}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}, 0x1c) 14:26:57 executing program 3: r0 = socket$inet6(0xa, 0x802, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x8800, &(0x7f0000000000)={0xa, 0x4e23, 0x0, @ipv4}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}, 0x1c) 14:26:57 executing program 0: bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/icmp\x00') ioctl$RNDZAPENTCNT(r0, 0x5204, 0x0) 14:26:57 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000100)='/dev/vbi#\x00', 0x0, 0x2) ioctl$VIDIOC_QUERYSTD(r0, 0x8008563f, 0x0) 14:26:57 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000240)='./file1\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x4005ef0) fallocate(r1, 0x3, 0x2, 0x8001) 14:26:57 executing program 3: r0 = socket$inet6(0xa, 0x802, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x8800, &(0x7f0000000000)={0xa, 0x4e23, 0x0, @ipv4}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}, 0x1c) 14:26:57 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000240)='./file1\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x4005ef0) fallocate(r1, 0x3, 0x2, 0x8001) 14:26:57 executing program 5: r0 = socket$inet6(0xa, 0x802, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x8800, &(0x7f0000000000)={0xa, 0x4e23, 0x0, @ipv4}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}, 0x1c) 14:26:57 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000100)='/dev/vbi#\x00', 0x0, 0x2) ioctl$VIDIOC_QUERYSTD(r0, 0x8008563f, 0x0) 14:26:57 executing program 0: bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/icmp\x00') ioctl$RNDZAPENTCNT(r0, 0x5204, 0x0) 14:26:57 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000240)='./file1\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x4005ef0) fallocate(r1, 0x3, 0x2, 0x8001) 14:26:57 executing program 4: write(0xffffffffffffffff, &(0x7f0000000040)="0f", 0x1) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_emit_ethernet(0x3e, &(0x7f0000000180)={@link_local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr, @broadcast}, @icmp=@parameter_prob={0x21, 0x0, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}}}}}}, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000000000/0x1000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 14:26:57 executing program 3: openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000100)='veth0_to_team\x00', 0x10) connect$inet6(r0, &(0x7f00000002c0)={0xa, 0xffffffffffffffff, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x1c) sendmmsg(r0, &(0x7f00000002c0), 0x4cc, 0xfff6) 14:26:57 executing program 5: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x4004510f, 0x0) 14:26:57 executing program 2: r0 = socket$inet(0x10, 0x80002, 0x0) recvmsg(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000040)=""/188, 0xbc}, {&(0x7f00000007c0)=""/4096, 0x1000}, {&(0x7f0000000380)=""/124, 0x7c}, {&(0x7f0000000280)=""/227, 0xe3}, {&(0x7f00000017c0)=""/176, 0xb0}, {&(0x7f00000027c0)=""/4096, 0x1000}, {&(0x7f0000000480)=""/146, 0x92}, {&(0x7f0000000540)=""/222, 0xde}], 0x8}, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000200)="4c0000001200ff09fffefd9567a283b724a600800000000000000068354046002c001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca63d89613b6aabf35d4c1cbc882b079881", 0x4c}], 0x1}, 0x0) 14:26:57 executing program 1: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001a80)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001b40)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) getpgid(0x0) getgid() getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, &(0x7f0000002cc0)) unshare(0x20020006) r1 = dup2(r0, 0xffffffffffffffff) read$FUSE(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x44) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000480)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x0, 0x0) mknodat(0xffffffffffffffff, 0x0, 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) setsockopt$sock_void(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f00000000c0)={{0x2, 0x0, @broadcast}, {0x6, @local}, 0x48, {0x2, 0x4e24, @broadcast}, 'veth1_to_bond\x00'}) connect$inet6(r1, 0x0, 0xfffffffffffffedf) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TCSBRK(r1, 0x5409, 0x3f) rmdir(&(0x7f0000002c40)='./file0\x00') socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$sock_inet_udp_SIOCINQ(r1, 0x541b, &(0x7f0000000140)) 14:26:57 executing program 0: bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/icmp\x00') ioctl$RNDZAPENTCNT(r0, 0x5204, 0x0) 14:26:57 executing program 5: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x4004510f, 0x0) [ 359.274304][T29238] netlink: 'syz-executor.2': attribute type 29 has an invalid length. [ 359.294961][T29238] netlink: 'syz-executor.2': attribute type 29 has an invalid length. 14:26:57 executing program 0: bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/icmp\x00') ioctl$RNDZAPENTCNT(r0, 0x5204, 0x0) 14:26:57 executing program 5: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x4004510f, 0x0) 14:26:57 executing program 4: write(0xffffffffffffffff, &(0x7f0000000040)="0f", 0x1) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_emit_ethernet(0x3e, &(0x7f0000000180)={@link_local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr, @broadcast}, @icmp=@parameter_prob={0x21, 0x0, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}}}}}}, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000000000/0x1000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 359.332213][T29232] netlink: 'syz-executor.2': attribute type 29 has an invalid length. [ 359.371080][T29238] netlink: 'syz-executor.2': attribute type 29 has an invalid length. [ 359.408797][T29238] netlink: 'syz-executor.2': attribute type 29 has an invalid length. 14:26:57 executing program 5: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x4004510f, 0x0) 14:26:57 executing program 1: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001a80)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001b40)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) getpgid(0x0) getgid() getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, &(0x7f0000002cc0)) unshare(0x20020006) r1 = dup2(r0, 0xffffffffffffffff) read$FUSE(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x44) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000480)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x0, 0x0) mknodat(0xffffffffffffffff, 0x0, 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) setsockopt$sock_void(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f00000000c0)={{0x2, 0x0, @broadcast}, {0x6, @local}, 0x48, {0x2, 0x4e24, @broadcast}, 'veth1_to_bond\x00'}) connect$inet6(r1, 0x0, 0xfffffffffffffedf) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TCSBRK(r1, 0x5409, 0x3f) rmdir(&(0x7f0000002c40)='./file0\x00') socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$sock_inet_udp_SIOCINQ(r1, 0x541b, &(0x7f0000000140)) 14:26:57 executing program 2: r0 = socket$inet(0x10, 0x80002, 0x0) recvmsg(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000040)=""/188, 0xbc}, {&(0x7f00000007c0)=""/4096, 0x1000}, {&(0x7f0000000380)=""/124, 0x7c}, {&(0x7f0000000280)=""/227, 0xe3}, {&(0x7f00000017c0)=""/176, 0xb0}, {&(0x7f00000027c0)=""/4096, 0x1000}, {&(0x7f0000000480)=""/146, 0x92}, {&(0x7f0000000540)=""/222, 0xde}], 0x8}, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000200)="4c0000001200ff09fffefd9567a283b724a600800000000000000068354046002c001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca63d89613b6aabf35d4c1cbc882b079881", 0x4c}], 0x1}, 0x0) [ 359.665468][T29312] netlink: 'syz-executor.2': attribute type 29 has an invalid length. 14:26:58 executing program 3: openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000100)='veth0_to_team\x00', 0x10) connect$inet6(r0, &(0x7f00000002c0)={0xa, 0xffffffffffffffff, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x1c) sendmmsg(r0, &(0x7f00000002c0), 0x4cc, 0xfff6) 14:26:58 executing program 0: r0 = socket$inet(0x10, 0x80002, 0x0) recvmsg(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000040)=""/188, 0xbc}, {&(0x7f00000007c0)=""/4096, 0x1000}, {&(0x7f0000000380)=""/124, 0x7c}, {&(0x7f0000000280)=""/227, 0xe3}, {&(0x7f00000017c0)=""/176, 0xb0}, {&(0x7f00000027c0)=""/4096, 0x1000}, {&(0x7f0000000480)=""/146, 0x92}, {&(0x7f0000000540)=""/222, 0xde}], 0x8}, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000200)="4c0000001200ff09fffefd9567a283b724a600800000000000000068354046002c001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca63d89613b6aabf35d4c1cbc882b079881", 0x4c}], 0x1}, 0x0) 14:26:58 executing program 4: write(0xffffffffffffffff, &(0x7f0000000040)="0f", 0x1) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_emit_ethernet(0x3e, &(0x7f0000000180)={@link_local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr, @broadcast}, @icmp=@parameter_prob={0x21, 0x0, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}}}}}}, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000000000/0x1000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 14:26:58 executing program 5: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001a80)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001b40)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) getpgid(0x0) getgid() getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, &(0x7f0000002cc0)) unshare(0x20020006) r1 = dup2(r0, 0xffffffffffffffff) read$FUSE(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x44) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000480)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x0, 0x0) mknodat(0xffffffffffffffff, 0x0, 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) setsockopt$sock_void(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f00000000c0)={{0x2, 0x0, @broadcast}, {0x6, @local}, 0x48, {0x2, 0x4e24, @broadcast}, 'veth1_to_bond\x00'}) connect$inet6(r1, 0x0, 0xfffffffffffffedf) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TCSBRK(r1, 0x5409, 0x3f) rmdir(&(0x7f0000002c40)='./file0\x00') socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$sock_inet_udp_SIOCINQ(r1, 0x541b, &(0x7f0000000140)) 14:26:58 executing program 1: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001a80)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001b40)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) getpgid(0x0) getgid() getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, &(0x7f0000002cc0)) unshare(0x20020006) r1 = dup2(r0, 0xffffffffffffffff) read$FUSE(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x44) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000480)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x0, 0x0) mknodat(0xffffffffffffffff, 0x0, 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) setsockopt$sock_void(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f00000000c0)={{0x2, 0x0, @broadcast}, {0x6, @local}, 0x48, {0x2, 0x4e24, @broadcast}, 'veth1_to_bond\x00'}) connect$inet6(r1, 0x0, 0xfffffffffffffedf) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TCSBRK(r1, 0x5409, 0x3f) rmdir(&(0x7f0000002c40)='./file0\x00') socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$sock_inet_udp_SIOCINQ(r1, 0x541b, &(0x7f0000000140)) 14:26:58 executing program 2: r0 = socket$inet(0x10, 0x80002, 0x0) recvmsg(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000040)=""/188, 0xbc}, {&(0x7f00000007c0)=""/4096, 0x1000}, {&(0x7f0000000380)=""/124, 0x7c}, {&(0x7f0000000280)=""/227, 0xe3}, {&(0x7f00000017c0)=""/176, 0xb0}, {&(0x7f00000027c0)=""/4096, 0x1000}, {&(0x7f0000000480)=""/146, 0x92}, {&(0x7f0000000540)=""/222, 0xde}], 0x8}, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000200)="4c0000001200ff09fffefd9567a283b724a600800000000000000068354046002c001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca63d89613b6aabf35d4c1cbc882b079881", 0x4c}], 0x1}, 0x0) 14:26:58 executing program 0: r0 = socket$inet(0x10, 0x80002, 0x0) recvmsg(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000040)=""/188, 0xbc}, {&(0x7f00000007c0)=""/4096, 0x1000}, {&(0x7f0000000380)=""/124, 0x7c}, {&(0x7f0000000280)=""/227, 0xe3}, {&(0x7f00000017c0)=""/176, 0xb0}, {&(0x7f00000027c0)=""/4096, 0x1000}, {&(0x7f0000000480)=""/146, 0x92}, {&(0x7f0000000540)=""/222, 0xde}], 0x8}, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000200)="4c0000001200ff09fffefd9567a283b724a600800000000000000068354046002c001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca63d89613b6aabf35d4c1cbc882b079881", 0x4c}], 0x1}, 0x0) 14:26:58 executing program 2: r0 = socket$inet(0x10, 0x80002, 0x0) recvmsg(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000040)=""/188, 0xbc}, {&(0x7f00000007c0)=""/4096, 0x1000}, {&(0x7f0000000380)=""/124, 0x7c}, {&(0x7f0000000280)=""/227, 0xe3}, {&(0x7f00000017c0)=""/176, 0xb0}, {&(0x7f00000027c0)=""/4096, 0x1000}, {&(0x7f0000000480)=""/146, 0x92}, {&(0x7f0000000540)=""/222, 0xde}], 0x8}, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000200)="4c0000001200ff09fffefd9567a283b724a600800000000000000068354046002c001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca63d89613b6aabf35d4c1cbc882b079881", 0x4c}], 0x1}, 0x0) 14:26:58 executing program 1: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001a80)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001b40)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) getpgid(0x0) getgid() getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, &(0x7f0000002cc0)) unshare(0x20020006) r1 = dup2(r0, 0xffffffffffffffff) read$FUSE(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x44) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000480)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x0, 0x0) mknodat(0xffffffffffffffff, 0x0, 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) setsockopt$sock_void(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f00000000c0)={{0x2, 0x0, @broadcast}, {0x6, @local}, 0x48, {0x2, 0x4e24, @broadcast}, 'veth1_to_bond\x00'}) connect$inet6(r1, 0x0, 0xfffffffffffffedf) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TCSBRK(r1, 0x5409, 0x3f) rmdir(&(0x7f0000002c40)='./file0\x00') socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$sock_inet_udp_SIOCINQ(r1, 0x541b, &(0x7f0000000140)) 14:26:58 executing program 5: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001a80)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001b40)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) getpgid(0x0) getgid() getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, &(0x7f0000002cc0)) unshare(0x20020006) r1 = dup2(r0, 0xffffffffffffffff) read$FUSE(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x44) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000480)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x0, 0x0) mknodat(0xffffffffffffffff, 0x0, 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) setsockopt$sock_void(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f00000000c0)={{0x2, 0x0, @broadcast}, {0x6, @local}, 0x48, {0x2, 0x4e24, @broadcast}, 'veth1_to_bond\x00'}) connect$inet6(r1, 0x0, 0xfffffffffffffedf) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TCSBRK(r1, 0x5409, 0x3f) rmdir(&(0x7f0000002c40)='./file0\x00') socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$sock_inet_udp_SIOCINQ(r1, 0x541b, &(0x7f0000000140)) 14:26:58 executing program 4: write(0xffffffffffffffff, &(0x7f0000000040)="0f", 0x1) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_emit_ethernet(0x3e, &(0x7f0000000180)={@link_local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr, @broadcast}, @icmp=@parameter_prob={0x21, 0x0, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}}}}}}, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000000000/0x1000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 14:26:58 executing program 0: r0 = socket$inet(0x10, 0x80002, 0x0) recvmsg(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000040)=""/188, 0xbc}, {&(0x7f00000007c0)=""/4096, 0x1000}, {&(0x7f0000000380)=""/124, 0x7c}, {&(0x7f0000000280)=""/227, 0xe3}, {&(0x7f00000017c0)=""/176, 0xb0}, {&(0x7f00000027c0)=""/4096, 0x1000}, {&(0x7f0000000480)=""/146, 0x92}, {&(0x7f0000000540)=""/222, 0xde}], 0x8}, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000200)="4c0000001200ff09fffefd9567a283b724a600800000000000000068354046002c001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca63d89613b6aabf35d4c1cbc882b079881", 0x4c}], 0x1}, 0x0) 14:26:58 executing program 3: openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000100)='veth0_to_team\x00', 0x10) connect$inet6(r0, &(0x7f00000002c0)={0xa, 0xffffffffffffffff, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x1c) sendmmsg(r0, &(0x7f00000002c0), 0x4cc, 0xfff6) 14:26:58 executing program 2: openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000100)='veth0_to_team\x00', 0x10) connect$inet6(r0, &(0x7f00000002c0)={0xa, 0xffffffffffffffff, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x1c) sendmmsg(r0, &(0x7f00000002c0), 0x4cc, 0xfff6) 14:26:58 executing program 0: openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000100)='veth0_to_team\x00', 0x10) connect$inet6(r0, &(0x7f00000002c0)={0xa, 0xffffffffffffffff, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x1c) sendmmsg(r0, &(0x7f00000002c0), 0x4cc, 0xfff6) 14:26:58 executing program 5: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001a80)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001b40)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) getpgid(0x0) getgid() getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, &(0x7f0000002cc0)) unshare(0x20020006) r1 = dup2(r0, 0xffffffffffffffff) read$FUSE(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x44) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000480)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x0, 0x0) mknodat(0xffffffffffffffff, 0x0, 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) setsockopt$sock_void(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f00000000c0)={{0x2, 0x0, @broadcast}, {0x6, @local}, 0x48, {0x2, 0x4e24, @broadcast}, 'veth1_to_bond\x00'}) connect$inet6(r1, 0x0, 0xfffffffffffffedf) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TCSBRK(r1, 0x5409, 0x3f) rmdir(&(0x7f0000002c40)='./file0\x00') socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$sock_inet_udp_SIOCINQ(r1, 0x541b, &(0x7f0000000140)) 14:26:58 executing program 4: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001a80)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001b40)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) getpgid(0x0) getgid() getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, &(0x7f0000002cc0)) unshare(0x20020006) r1 = dup2(r0, 0xffffffffffffffff) read$FUSE(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x44) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000480)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x0, 0x0) mknodat(0xffffffffffffffff, 0x0, 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) setsockopt$sock_void(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f00000000c0)={{0x2, 0x0, @broadcast}, {0x6, @local}, 0x48, {0x2, 0x4e24, @broadcast}, 'veth1_to_bond\x00'}) connect$inet6(r1, 0x0, 0xfffffffffffffedf) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TCSBRK(r1, 0x5409, 0x3f) rmdir(&(0x7f0000002c40)='./file0\x00') socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$sock_inet_udp_SIOCINQ(r1, 0x541b, &(0x7f0000000140)) 14:26:58 executing program 1: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001a80)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001b40)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) getpgid(0x0) getgid() getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, &(0x7f0000002cc0)) unshare(0x20020006) r1 = dup2(r0, 0xffffffffffffffff) read$FUSE(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x44) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000480)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x0, 0x0) mknodat(0xffffffffffffffff, 0x0, 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) setsockopt$sock_void(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f00000000c0)={{0x2, 0x0, @broadcast}, {0x6, @local}, 0x48, {0x2, 0x4e24, @broadcast}, 'veth1_to_bond\x00'}) connect$inet6(r1, 0x0, 0xfffffffffffffedf) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TCSBRK(r1, 0x5409, 0x3f) rmdir(&(0x7f0000002c40)='./file0\x00') socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$sock_inet_udp_SIOCINQ(r1, 0x541b, &(0x7f0000000140)) 14:26:58 executing program 1: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001a80)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001b40)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) getpgid(0x0) getgid() getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, &(0x7f0000002cc0)) unshare(0x20020006) r1 = dup2(r0, 0xffffffffffffffff) read$FUSE(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x44) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000480)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x0, 0x0) mknodat(0xffffffffffffffff, 0x0, 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) setsockopt$sock_void(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f00000000c0)={{0x2, 0x0, @broadcast}, {0x6, @local}, 0x48, {0x2, 0x4e24, @broadcast}, 'veth1_to_bond\x00'}) connect$inet6(r1, 0x0, 0xfffffffffffffedf) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TCSBRK(r1, 0x5409, 0x3f) rmdir(&(0x7f0000002c40)='./file0\x00') socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$sock_inet_udp_SIOCINQ(r1, 0x541b, &(0x7f0000000140)) 14:26:58 executing program 5: write(0xffffffffffffffff, &(0x7f0000000040)="0f", 0x1) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_emit_ethernet(0x3e, &(0x7f0000000180)={@link_local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr, @broadcast}, @icmp=@parameter_prob={0x21, 0x0, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}}}}}}, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000000000/0x1000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 14:26:58 executing program 4: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001a80)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001b40)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) getpgid(0x0) getgid() getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, &(0x7f0000002cc0)) unshare(0x20020006) r1 = dup2(r0, 0xffffffffffffffff) read$FUSE(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x44) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000480)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x0, 0x0) mknodat(0xffffffffffffffff, 0x0, 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) setsockopt$sock_void(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f00000000c0)={{0x2, 0x0, @broadcast}, {0x6, @local}, 0x48, {0x2, 0x4e24, @broadcast}, 'veth1_to_bond\x00'}) connect$inet6(r1, 0x0, 0xfffffffffffffedf) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TCSBRK(r1, 0x5409, 0x3f) rmdir(&(0x7f0000002c40)='./file0\x00') socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$sock_inet_udp_SIOCINQ(r1, 0x541b, &(0x7f0000000140)) 14:26:59 executing program 2: openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000100)='veth0_to_team\x00', 0x10) connect$inet6(r0, &(0x7f00000002c0)={0xa, 0xffffffffffffffff, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x1c) sendmmsg(r0, &(0x7f00000002c0), 0x4cc, 0xfff6) 14:26:59 executing program 0: openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000100)='veth0_to_team\x00', 0x10) connect$inet6(r0, &(0x7f00000002c0)={0xa, 0xffffffffffffffff, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x1c) sendmmsg(r0, &(0x7f00000002c0), 0x4cc, 0xfff6) 14:26:59 executing program 4: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001a80)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001b40)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) getpgid(0x0) getgid() getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, &(0x7f0000002cc0)) unshare(0x20020006) r1 = dup2(r0, 0xffffffffffffffff) read$FUSE(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x44) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000480)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x0, 0x0) mknodat(0xffffffffffffffff, 0x0, 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) setsockopt$sock_void(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f00000000c0)={{0x2, 0x0, @broadcast}, {0x6, @local}, 0x48, {0x2, 0x4e24, @broadcast}, 'veth1_to_bond\x00'}) connect$inet6(r1, 0x0, 0xfffffffffffffedf) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TCSBRK(r1, 0x5409, 0x3f) rmdir(&(0x7f0000002c40)='./file0\x00') socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$sock_inet_udp_SIOCINQ(r1, 0x541b, &(0x7f0000000140)) 14:26:59 executing program 3: openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000100)='veth0_to_team\x00', 0x10) connect$inet6(r0, &(0x7f00000002c0)={0xa, 0xffffffffffffffff, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x1c) sendmmsg(r0, &(0x7f00000002c0), 0x4cc, 0xfff6) 14:26:59 executing program 1: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001a80)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001b40)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) getpgid(0x0) getgid() getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, &(0x7f0000002cc0)) unshare(0x20020006) r1 = dup2(r0, 0xffffffffffffffff) read$FUSE(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x44) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000480)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x0, 0x0) mknodat(0xffffffffffffffff, 0x0, 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) setsockopt$sock_void(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f00000000c0)={{0x2, 0x0, @broadcast}, {0x6, @local}, 0x48, {0x2, 0x4e24, @broadcast}, 'veth1_to_bond\x00'}) connect$inet6(r1, 0x0, 0xfffffffffffffedf) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TCSBRK(r1, 0x5409, 0x3f) rmdir(&(0x7f0000002c40)='./file0\x00') socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$sock_inet_udp_SIOCINQ(r1, 0x541b, &(0x7f0000000140)) 14:26:59 executing program 5: write(0xffffffffffffffff, &(0x7f0000000040)="0f", 0x1) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_emit_ethernet(0x3e, &(0x7f0000000180)={@link_local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr, @broadcast}, @icmp=@parameter_prob={0x21, 0x0, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}}}}}}, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000000000/0x1000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 14:26:59 executing program 4: unshare(0x4000400) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) ioctl$PPPIOCGL2TPSTATS(r0, 0x80487436, 0x0) 14:26:59 executing program 5: write(0xffffffffffffffff, &(0x7f0000000040)="0f", 0x1) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_emit_ethernet(0x3e, &(0x7f0000000180)={@link_local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr, @broadcast}, @icmp=@parameter_prob={0x21, 0x0, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}}}}}}, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000000000/0x1000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 14:26:59 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/igmp6\x00\x83\xaf\x1ab\x1e\x9c\xf6\xe9\x9c\xe5\x1a\xb3\x19\x11\x16\xc9O\xac\x10\xecb.G\x7f_\xf3\x149\xb8\xacz\xc7\xee\r\xee\x897\a\x00\x00\x00\x00\x00\x00\x00\x80\xbb\xe9d\xe8\x13^\xc6\xc9\xc5\x8a\"K\xb0\xf2I\xa51e\x9b\x04G5#\x06\xc4\xde\x0f\xb2\x90\xcb\x8f\x8c\x05\xfc\xf4~\x93@') bind$alg(r0, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c\x00'}, 0x58) r2 = accept4$alg(r0, 0x0, 0x0, 0x0) sendfile(r2, r1, 0x0, 0x1) 14:26:59 executing program 0: openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000100)='veth0_to_team\x00', 0x10) connect$inet6(r0, &(0x7f00000002c0)={0xa, 0xffffffffffffffff, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x1c) sendmmsg(r0, &(0x7f00000002c0), 0x4cc, 0xfff6) 14:26:59 executing program 4: unshare(0x4000400) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) ioctl$PPPIOCGL2TPSTATS(r0, 0x80487436, 0x0) 14:26:59 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/igmp6\x00\x83\xaf\x1ab\x1e\x9c\xf6\xe9\x9c\xe5\x1a\xb3\x19\x11\x16\xc9O\xac\x10\xecb.G\x7f_\xf3\x149\xb8\xacz\xc7\xee\r\xee\x897\a\x00\x00\x00\x00\x00\x00\x00\x80\xbb\xe9d\xe8\x13^\xc6\xc9\xc5\x8a\"K\xb0\xf2I\xa51e\x9b\x04G5#\x06\xc4\xde\x0f\xb2\x90\xcb\x8f\x8c\x05\xfc\xf4~\x93@') bind$alg(r0, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c\x00'}, 0x58) r2 = accept4$alg(r0, 0x0, 0x0, 0x0) sendfile(r2, r1, 0x0, 0x1) 14:26:59 executing program 2: openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000100)='veth0_to_team\x00', 0x10) connect$inet6(r0, &(0x7f00000002c0)={0xa, 0xffffffffffffffff, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x1c) sendmmsg(r0, &(0x7f00000002c0), 0x4cc, 0xfff6) 14:26:59 executing program 4: unshare(0x4000400) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) ioctl$PPPIOCGL2TPSTATS(r0, 0x80487436, 0x0) 14:26:59 executing program 4: unshare(0x4000400) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) ioctl$PPPIOCGL2TPSTATS(r0, 0x80487436, 0x0) 14:26:59 executing program 4: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGRAB(r0, 0x40044590, &(0x7f0000000100)) ioctl$EVIOCGRAB(r0, 0x40044590, 0x0) ioctl$EVIOCSABS3F(r0, 0x40044581, 0x0) 14:26:59 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/igmp6\x00\x83\xaf\x1ab\x1e\x9c\xf6\xe9\x9c\xe5\x1a\xb3\x19\x11\x16\xc9O\xac\x10\xecb.G\x7f_\xf3\x149\xb8\xacz\xc7\xee\r\xee\x897\a\x00\x00\x00\x00\x00\x00\x00\x80\xbb\xe9d\xe8\x13^\xc6\xc9\xc5\x8a\"K\xb0\xf2I\xa51e\x9b\x04G5#\x06\xc4\xde\x0f\xb2\x90\xcb\x8f\x8c\x05\xfc\xf4~\x93@') bind$alg(r0, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c\x00'}, 0x58) r2 = accept4$alg(r0, 0x0, 0x0, 0x0) sendfile(r2, r1, 0x0, 0x1) 14:26:59 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/igmp6\x00\x83\xaf\x1ab\x1e\x9c\xf6\xe9\x9c\xe5\x1a\xb3\x19\x11\x16\xc9O\xac\x10\xecb.G\x7f_\xf3\x149\xb8\xacz\xc7\xee\r\xee\x897\a\x00\x00\x00\x00\x00\x00\x00\x80\xbb\xe9d\xe8\x13^\xc6\xc9\xc5\x8a\"K\xb0\xf2I\xa51e\x9b\x04G5#\x06\xc4\xde\x0f\xb2\x90\xcb\x8f\x8c\x05\xfc\xf4~\x93@') bind$alg(r0, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c\x00'}, 0x58) r2 = accept4$alg(r0, 0x0, 0x0, 0x0) sendfile(r2, r1, 0x0, 0x1) 14:26:59 executing program 0: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="550000001e007f5300fe01b2a4a280930a06200000a843fe0f000000080008000a0000000000000000ba5acbf9090c836041726a7735c789b06dca27c43ab8220000060cec4fab91d400"/85, 0x36a}], 0x1}, 0x0) 14:26:59 executing program 3: r0 = syz_open_dev$video(&(0x7f0000000140)='/dev/video#\x00', 0x77ff, 0x0) ioctl$VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f00000004c0)={0x9, @raw_data="1fcb46d02ab6c63c5247424f7b3a75537c49b43893fc974900400000463f0437f7ffd8500d384ced6347be0711b5c9cc1bf51d241901c2c02cf411338e817d388054685cbb344a3e0244c4ef0915c7c51d07d272610817ba58559342ce7918de9a85638015aef9a5e3cd6a7c9367289b69f9d462ebe0785411a26cfb487d7bc2a5456cb92cfdad5d3c088a2861de26cdb810b47f7095d5b1a0cf189b5b2fc861f8104c4c07882c2e8345bea52167e2d4f9e707d8df10dfbc8b3f2de6d19f8cec666e98588ed484ee"}) 14:27:00 executing program 3: r0 = syz_open_dev$video(&(0x7f0000000140)='/dev/video#\x00', 0x77ff, 0x0) ioctl$VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f00000004c0)={0x9, @raw_data="1fcb46d02ab6c63c5247424f7b3a75537c49b43893fc974900400000463f0437f7ffd8500d384ced6347be0711b5c9cc1bf51d241901c2c02cf411338e817d388054685cbb344a3e0244c4ef0915c7c51d07d272610817ba58559342ce7918de9a85638015aef9a5e3cd6a7c9367289b69f9d462ebe0785411a26cfb487d7bc2a5456cb92cfdad5d3c088a2861de26cdb810b47f7095d5b1a0cf189b5b2fc861f8104c4c07882c2e8345bea52167e2d4f9e707d8df10dfbc8b3f2de6d19f8cec666e98588ed484ee"}) 14:27:00 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/igmp6\x00\x83\xaf\x1ab\x1e\x9c\xf6\xe9\x9c\xe5\x1a\xb3\x19\x11\x16\xc9O\xac\x10\xecb.G\x7f_\xf3\x149\xb8\xacz\xc7\xee\r\xee\x897\a\x00\x00\x00\x00\x00\x00\x00\x80\xbb\xe9d\xe8\x13^\xc6\xc9\xc5\x8a\"K\xb0\xf2I\xa51e\x9b\x04G5#\x06\xc4\xde\x0f\xb2\x90\xcb\x8f\x8c\x05\xfc\xf4~\x93@') bind$alg(r0, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c\x00'}, 0x58) r2 = accept4$alg(r0, 0x0, 0x0, 0x0) sendfile(r2, r1, 0x0, 0x1) 14:27:00 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/igmp6\x00\x83\xaf\x1ab\x1e\x9c\xf6\xe9\x9c\xe5\x1a\xb3\x19\x11\x16\xc9O\xac\x10\xecb.G\x7f_\xf3\x149\xb8\xacz\xc7\xee\r\xee\x897\a\x00\x00\x00\x00\x00\x00\x00\x80\xbb\xe9d\xe8\x13^\xc6\xc9\xc5\x8a\"K\xb0\xf2I\xa51e\x9b\x04G5#\x06\xc4\xde\x0f\xb2\x90\xcb\x8f\x8c\x05\xfc\xf4~\x93@') bind$alg(r0, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c\x00'}, 0x58) r2 = accept4$alg(r0, 0x0, 0x0, 0x0) sendfile(r2, r1, 0x0, 0x1) [ 361.750514][T29532] netlink: 49 bytes leftover after parsing attributes in process `syz-executor.0'. 14:27:00 executing program 0: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="550000001e007f5300fe01b2a4a280930a06200000a843fe0f000000080008000a0000000000000000ba5acbf9090c836041726a7735c789b06dca27c43ab8220000060cec4fab91d400"/85, 0x36a}], 0x1}, 0x0) [ 361.883501][T29545] netlink: 49 bytes leftover after parsing attributes in process `syz-executor.0'. 14:27:00 executing program 0: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="550000001e007f5300fe01b2a4a280930a06200000a843fe0f000000080008000a0000000000000000ba5acbf9090c836041726a7735c789b06dca27c43ab8220000060cec4fab91d400"/85, 0x36a}], 0x1}, 0x0) 14:27:00 executing program 3: r0 = syz_open_dev$video(&(0x7f0000000140)='/dev/video#\x00', 0x77ff, 0x0) ioctl$VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f00000004c0)={0x9, @raw_data="1fcb46d02ab6c63c5247424f7b3a75537c49b43893fc974900400000463f0437f7ffd8500d384ced6347be0711b5c9cc1bf51d241901c2c02cf411338e817d388054685cbb344a3e0244c4ef0915c7c51d07d272610817ba58559342ce7918de9a85638015aef9a5e3cd6a7c9367289b69f9d462ebe0785411a26cfb487d7bc2a5456cb92cfdad5d3c088a2861de26cdb810b47f7095d5b1a0cf189b5b2fc861f8104c4c07882c2e8345bea52167e2d4f9e707d8df10dfbc8b3f2de6d19f8cec666e98588ed484ee"}) 14:27:00 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xffffffffffffffbe, &(0x7f0000000180)={&(0x7f0000000100)=ANY=[@ANYBLOB="4000000012003b0e00"/20, @ANYRES32=0x0, @ANYBLOB="430200000000000008000a00", @ANYRES32=0x6, @ANYBLOB="0400120005000100767469000c000200080004005825ef50"], 0x40}, 0x1, 0x0, 0x0, 0x4000001}, 0x800) 14:27:00 executing program 4: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGRAB(r0, 0x40044590, &(0x7f0000000100)) ioctl$EVIOCGRAB(r0, 0x40044590, 0x0) ioctl$EVIOCSABS3F(r0, 0x40044581, 0x0) 14:27:00 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/igmp6\x00\x83\xaf\x1ab\x1e\x9c\xf6\xe9\x9c\xe5\x1a\xb3\x19\x11\x16\xc9O\xac\x10\xecb.G\x7f_\xf3\x149\xb8\xacz\xc7\xee\r\xee\x897\a\x00\x00\x00\x00\x00\x00\x00\x80\xbb\xe9d\xe8\x13^\xc6\xc9\xc5\x8a\"K\xb0\xf2I\xa51e\x9b\x04G5#\x06\xc4\xde\x0f\xb2\x90\xcb\x8f\x8c\x05\xfc\xf4~\x93@') bind$alg(r0, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c\x00'}, 0x58) r2 = accept4$alg(r0, 0x0, 0x0, 0x0) sendfile(r2, r1, 0x0, 0x1) 14:27:00 executing program 1: syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0x0, 0x681) 14:27:00 executing program 3: r0 = syz_open_dev$video(&(0x7f0000000140)='/dev/video#\x00', 0x77ff, 0x0) ioctl$VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f00000004c0)={0x9, @raw_data="1fcb46d02ab6c63c5247424f7b3a75537c49b43893fc974900400000463f0437f7ffd8500d384ced6347be0711b5c9cc1bf51d241901c2c02cf411338e817d388054685cbb344a3e0244c4ef0915c7c51d07d272610817ba58559342ce7918de9a85638015aef9a5e3cd6a7c9367289b69f9d462ebe0785411a26cfb487d7bc2a5456cb92cfdad5d3c088a2861de26cdb810b47f7095d5b1a0cf189b5b2fc861f8104c4c07882c2e8345bea52167e2d4f9e707d8df10dfbc8b3f2de6d19f8cec666e98588ed484ee"}) 14:27:00 executing program 1: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGRAB(r0, 0x40044590, &(0x7f0000000100)) ioctl$EVIOCGRAB(r0, 0x40044590, 0x0) ioctl$EVIOCSABS3F(r0, 0x40044581, 0x0) 14:27:00 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) write$binfmt_elf32(r0, &(0x7f0000000b80)=ANY=[@ANYBLOB="7f454c46000000000000000000000000000000000000000000000000380000000000000000000000000020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000be8482d48c3cefb662ca406349d570285ad41d31900f82019739323d494ba4615c6dc497c739e39c00038356ee7674da68b964f425e111854c2b0bf1a00af18e705f3b1d9534408279176538f0ecbdcb43a4c8aa34155f9237d2c6450d2bab0ce132aeab5b67c3ab54503f9ff0a3371b11c1c4e6000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000004000"/417], 0x1a1) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0xc, 0x0, 0x27) [ 362.017348][T29561] netlink: 49 bytes leftover after parsing attributes in process `syz-executor.0'. 14:27:00 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xffffffffffffffbe, &(0x7f0000000180)={&(0x7f0000000100)=ANY=[@ANYBLOB="4000000012003b0e00"/20, @ANYRES32=0x0, @ANYBLOB="430200000000000008000a00", @ANYRES32=0x6, @ANYBLOB="0400120005000100767469000c000200080004005825ef50"], 0x40}, 0x1, 0x0, 0x0, 0x4000001}, 0x800) 14:27:00 executing program 0: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="550000001e007f5300fe01b2a4a280930a06200000a843fe0f000000080008000a0000000000000000ba5acbf9090c836041726a7735c789b06dca27c43ab8220000060cec4fab91d400"/85, 0x36a}], 0x1}, 0x0) 14:27:00 executing program 3: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_PIE_ON(r0, 0x7005) 14:27:00 executing program 3: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_PIE_ON(r0, 0x7005) 14:27:00 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xffffffffffffffbe, &(0x7f0000000180)={&(0x7f0000000100)=ANY=[@ANYBLOB="4000000012003b0e00"/20, @ANYRES32=0x0, @ANYBLOB="430200000000000008000a00", @ANYRES32=0x6, @ANYBLOB="0400120005000100767469000c000200080004005825ef50"], 0x40}, 0x1, 0x0, 0x0, 0x4000001}, 0x800) 14:27:00 executing program 1: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGRAB(r0, 0x40044590, &(0x7f0000000100)) ioctl$EVIOCGRAB(r0, 0x40044590, 0x0) ioctl$EVIOCSABS3F(r0, 0x40044581, 0x0) [ 362.185672][T29583] netlink: 49 bytes leftover after parsing attributes in process `syz-executor.0'. 14:27:00 executing program 4: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGRAB(r0, 0x40044590, &(0x7f0000000100)) ioctl$EVIOCGRAB(r0, 0x40044590, 0x0) ioctl$EVIOCSABS3F(r0, 0x40044581, 0x0) 14:27:00 executing program 3: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_PIE_ON(r0, 0x7005) 14:27:00 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xffffffffffffffbe, &(0x7f0000000180)={&(0x7f0000000100)=ANY=[@ANYBLOB="4000000012003b0e00"/20, @ANYRES32=0x0, @ANYBLOB="430200000000000008000a00", @ANYRES32=0x6, @ANYBLOB="0400120005000100767469000c000200080004005825ef50"], 0x40}, 0x1, 0x0, 0x0, 0x4000001}, 0x800) 14:27:00 executing program 0: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @mcast2}], 0x1c) 14:27:00 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) write$binfmt_elf32(r0, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"/417], 0x1a1) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0xc, 0x0, 0x27) 14:27:00 executing program 1: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGRAB(r0, 0x40044590, &(0x7f0000000100)) ioctl$EVIOCGRAB(r0, 0x40044590, 0x0) ioctl$EVIOCSABS3F(r0, 0x40044581, 0x0) 14:27:00 executing program 0: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @mcast2}], 0x1c) 14:27:00 executing program 3: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_PIE_ON(r0, 0x7005) 14:27:00 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) write$binfmt_elf32(r0, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"/417], 0x1a1) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0xc, 0x0, 0x27) 14:27:00 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) write$binfmt_elf32(r0, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"/417], 0x1a1) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0xc, 0x0, 0x27) 14:27:00 executing program 4: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGRAB(r0, 0x40044590, &(0x7f0000000100)) ioctl$EVIOCGRAB(r0, 0x40044590, 0x0) ioctl$EVIOCSABS3F(r0, 0x40044581, 0x0) 14:27:00 executing program 0: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @mcast2}], 0x1c) 14:27:00 executing program 0: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @mcast2}], 0x1c) 14:27:00 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) write$binfmt_elf32(r0, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"/417], 0x1a1) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0xc, 0x0, 0x27) 14:27:00 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) write$binfmt_elf32(r0, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"/417], 0x1a1) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0xc, 0x0, 0x27) 14:27:00 executing program 1: socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) bind$isdn_base(r0, &(0x7f0000000040), 0x6) 14:27:01 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) write$binfmt_elf32(r0, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"/417], 0x1a1) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0xc, 0x0, 0x27) 14:27:01 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) write$binfmt_elf32(r0, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"/417], 0x1a1) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0xc, 0x0, 0x27) 14:27:01 executing program 4: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) ioctl$DMA_BUF_IOCTL_SYNC(r0, 0x40086200, &(0x7f00000002c0)) 14:27:01 executing program 1: socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) bind$isdn_base(r0, &(0x7f0000000040), 0x6) 14:27:01 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) write$binfmt_elf32(r0, &(0x7f0000000b80)=ANY=[@ANYBLOB="7f454c46000000000000000000000000000000000000000000000000380000000000000000000000000020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000be8482d48c3cefb662ca406349d570285ad41d31900f82019739323d494ba4615c6dc497c739e39c00038356ee7674da68b964f425e111854c2b0bf1a00af18e705f3b1d9534408279176538f0ecbdcb43a4c8aa34155f9237d2c6450d2bab0ce132aeab5b67c3ab54503f9ff0a3371b11c1c4e6000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000004000"/417], 0x1a1) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0xc, 0x0, 0x27) 14:27:01 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) write$binfmt_elf32(r0, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"/417], 0x1a1) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0xc, 0x0, 0x27) 14:27:01 executing program 4: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) ioctl$DMA_BUF_IOCTL_SYNC(r0, 0x40086200, &(0x7f00000002c0)) 14:27:01 executing program 1: socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) bind$isdn_base(r0, &(0x7f0000000040), 0x6) 14:27:01 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) write$binfmt_elf32(r0, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"/417], 0x1a1) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0xc, 0x0, 0x27) 14:27:01 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) write$binfmt_elf32(r0, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"/417], 0x1a1) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0xc, 0x0, 0x27) 14:27:01 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) write$binfmt_elf32(r0, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"/417], 0x1a1) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0xc, 0x0, 0x27) 14:27:01 executing program 4: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) ioctl$DMA_BUF_IOCTL_SYNC(r0, 0x40086200, &(0x7f00000002c0)) 14:27:01 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) bind$bt_l2cap(r0, &(0x7f0000000140), 0xe) 14:27:01 executing program 1: socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) bind$isdn_base(r0, &(0x7f0000000040), 0x6) 14:27:01 executing program 4: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) ioctl$DMA_BUF_IOCTL_SYNC(r0, 0x40086200, &(0x7f00000002c0)) 14:27:01 executing program 2: socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r0, &(0x7f0000000240)=[{&(0x7f0000000140)="a3", 0x1}], 0x1) write(r0, 0x0, 0x0) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000785000), 0x142) writev(r0, &(0x7f000063e000)=[{&(0x7f00000000c0)="da", 0x1}], 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) close(r0) sendmmsg$alg(r1, &(0x7f00000001c0), 0x492492492492557, 0x0) 14:27:01 executing program 1: ioctl$VIDIOC_SUBDEV_G_FRAME_INTERVAL(0xffffffffffffffff, 0xc0305615, &(0x7f0000000040)={0x0, {0x0, 0x4}}) semtimedop(0x0, &(0x7f0000000040), 0x1b9, 0x0) semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000000)) 14:27:01 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") preadv(0xffffffffffffffff, 0x0, 0x0, 0x9400000000000000) 14:27:01 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_GET_PIT2(r1, 0x8048ae66, 0x0) 14:27:01 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) bind$bt_l2cap(r0, &(0x7f0000000140), 0xe) 14:27:01 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") preadv(0xffffffffffffffff, 0x0, 0x0, 0x9400000000000000) 14:27:01 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) bind$bt_l2cap(r0, &(0x7f0000000140), 0xe) 14:27:02 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_GET_PIT2(r1, 0x8048ae66, 0x0) 14:27:02 executing program 2: socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r0, &(0x7f0000000240)=[{&(0x7f0000000140)="a3", 0x1}], 0x1) write(r0, 0x0, 0x0) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000785000), 0x142) writev(r0, &(0x7f000063e000)=[{&(0x7f00000000c0)="da", 0x1}], 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) close(r0) sendmmsg$alg(r1, &(0x7f00000001c0), 0x492492492492557, 0x0) 14:27:02 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") preadv(0xffffffffffffffff, 0x0, 0x0, 0x9400000000000000) 14:27:02 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) bind$bt_l2cap(r0, &(0x7f0000000140), 0xe) 14:27:02 executing program 5: socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r0, &(0x7f0000000240)=[{&(0x7f0000000140)="a3", 0x1}], 0x1) write(r0, 0x0, 0x0) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000785000), 0x142) writev(r0, &(0x7f000063e000)=[{&(0x7f00000000c0)="da", 0x1}], 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) close(r0) sendmmsg$alg(r1, &(0x7f00000001c0), 0x492492492492557, 0x0) 14:27:02 executing program 3: socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r0, &(0x7f0000000240)=[{&(0x7f0000000140)="a3", 0x1}], 0x1) write(r0, 0x0, 0x0) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000785000), 0x142) writev(r0, &(0x7f000063e000)=[{&(0x7f00000000c0)="da", 0x1}], 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) close(r0) sendmmsg$alg(r1, &(0x7f00000001c0), 0x492492492492557, 0x0) 14:27:02 executing program 1: ioctl$VIDIOC_SUBDEV_G_FRAME_INTERVAL(0xffffffffffffffff, 0xc0305615, &(0x7f0000000040)={0x0, {0x0, 0x4}}) semtimedop(0x0, &(0x7f0000000040), 0x1b9, 0x0) semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000000)) 14:27:02 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") preadv(0xffffffffffffffff, 0x0, 0x0, 0x9400000000000000) 14:27:02 executing program 2: socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r0, &(0x7f0000000240)=[{&(0x7f0000000140)="a3", 0x1}], 0x1) write(r0, 0x0, 0x0) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000785000), 0x142) writev(r0, &(0x7f000063e000)=[{&(0x7f00000000c0)="da", 0x1}], 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) close(r0) sendmmsg$alg(r1, &(0x7f00000001c0), 0x492492492492557, 0x0) 14:27:02 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_GET_PIT2(r1, 0x8048ae66, 0x0) 14:27:02 executing program 5: socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r0, &(0x7f0000000240)=[{&(0x7f0000000140)="a3", 0x1}], 0x1) write(r0, 0x0, 0x0) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000785000), 0x142) writev(r0, &(0x7f000063e000)=[{&(0x7f00000000c0)="da", 0x1}], 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) close(r0) sendmmsg$alg(r1, &(0x7f00000001c0), 0x492492492492557, 0x0) 14:27:02 executing program 3: socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r0, &(0x7f0000000240)=[{&(0x7f0000000140)="a3", 0x1}], 0x1) write(r0, 0x0, 0x0) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000785000), 0x142) writev(r0, &(0x7f000063e000)=[{&(0x7f00000000c0)="da", 0x1}], 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) close(r0) sendmmsg$alg(r1, &(0x7f00000001c0), 0x492492492492557, 0x0) 14:27:02 executing program 3: socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r0, &(0x7f0000000240)=[{&(0x7f0000000140)="a3", 0x1}], 0x1) write(r0, 0x0, 0x0) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000785000), 0x142) writev(r0, &(0x7f000063e000)=[{&(0x7f00000000c0)="da", 0x1}], 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) close(r0) sendmmsg$alg(r1, &(0x7f00000001c0), 0x492492492492557, 0x0) 14:27:02 executing program 0: ioctl$VIDIOC_SUBDEV_G_FRAME_INTERVAL(0xffffffffffffffff, 0xc0305615, &(0x7f0000000040)={0x0, {0x0, 0x4}}) semtimedop(0x0, &(0x7f0000000040), 0x1b9, 0x0) semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000000)) 14:27:02 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_GET_PIT2(r1, 0x8048ae66, 0x0) 14:27:02 executing program 2: socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r0, &(0x7f0000000240)=[{&(0x7f0000000140)="a3", 0x1}], 0x1) write(r0, 0x0, 0x0) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000785000), 0x142) writev(r0, &(0x7f000063e000)=[{&(0x7f00000000c0)="da", 0x1}], 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) close(r0) sendmmsg$alg(r1, &(0x7f00000001c0), 0x492492492492557, 0x0) 14:27:02 executing program 5: socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r0, &(0x7f0000000240)=[{&(0x7f0000000140)="a3", 0x1}], 0x1) write(r0, 0x0, 0x0) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000785000), 0x142) writev(r0, &(0x7f000063e000)=[{&(0x7f00000000c0)="da", 0x1}], 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) close(r0) sendmmsg$alg(r1, &(0x7f00000001c0), 0x492492492492557, 0x0) 14:27:02 executing program 3: r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mISDNtimer\x00', 0x0, 0x0) ioctl$IMADDTIMER(r0, 0x80044940, &(0x7f0000000000)=0xffffffffffffffff) ioctl$IMADDTIMER(r0, 0x80044940, &(0x7f0000000080)=0xffffffffffffffff) ioctl$IMDELTIMER(r0, 0x80044941, &(0x7f0000000140)) 14:27:03 executing program 1: ioctl$VIDIOC_SUBDEV_G_FRAME_INTERVAL(0xffffffffffffffff, 0xc0305615, &(0x7f0000000040)={0x0, {0x0, 0x4}}) semtimedop(0x0, &(0x7f0000000040), 0x1b9, 0x0) semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000000)) 14:27:03 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x2, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000100)) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x2, 0x0, "6f85845fe36b7a047a03ae6f811e0b27598d2e"}) syz_open_pts(r0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000c34fff), 0xffffff0b) 14:27:03 executing program 2: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000000)={0x300000000000000, 0x0, &(0x7f0000000040)={&(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x60}}, 0x0) 14:27:03 executing program 4: ioctl$SNDRV_RAWMIDI_IOCTL_PVERSION(0xffffffffffffffff, 0x80045700, 0x0) unshare(0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x31c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setgroups(0x54b, &(0x7f0000000180)) 14:27:03 executing program 3: r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mISDNtimer\x00', 0x0, 0x0) ioctl$IMADDTIMER(r0, 0x80044940, &(0x7f0000000000)=0xffffffffffffffff) ioctl$IMADDTIMER(r0, 0x80044940, &(0x7f0000000080)=0xffffffffffffffff) ioctl$IMDELTIMER(r0, 0x80044941, &(0x7f0000000140)) 14:27:03 executing program 3: r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mISDNtimer\x00', 0x0, 0x0) ioctl$IMADDTIMER(r0, 0x80044940, &(0x7f0000000000)=0xffffffffffffffff) ioctl$IMADDTIMER(r0, 0x80044940, &(0x7f0000000080)=0xffffffffffffffff) ioctl$IMDELTIMER(r0, 0x80044941, &(0x7f0000000140)) 14:27:03 executing program 0: ioctl$VIDIOC_SUBDEV_G_FRAME_INTERVAL(0xffffffffffffffff, 0xc0305615, &(0x7f0000000040)={0x0, {0x0, 0x4}}) semtimedop(0x0, &(0x7f0000000040), 0x1b9, 0x0) semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000000)) 14:27:03 executing program 3: r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mISDNtimer\x00', 0x0, 0x0) ioctl$IMADDTIMER(r0, 0x80044940, &(0x7f0000000000)=0xffffffffffffffff) ioctl$IMADDTIMER(r0, 0x80044940, &(0x7f0000000080)=0xffffffffffffffff) ioctl$IMDELTIMER(r0, 0x80044941, &(0x7f0000000140)) 14:27:03 executing program 4: ioctl$SNDRV_RAWMIDI_IOCTL_PVERSION(0xffffffffffffffff, 0x80045700, 0x0) unshare(0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x31c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setgroups(0x54b, &(0x7f0000000180)) 14:27:03 executing program 3: ioctl$SNDRV_RAWMIDI_IOCTL_PVERSION(0xffffffffffffffff, 0x80045700, 0x0) unshare(0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x31c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setgroups(0x54b, &(0x7f0000000180)) 14:27:03 executing program 4: ioctl$SNDRV_RAWMIDI_IOCTL_PVERSION(0xffffffffffffffff, 0x80045700, 0x0) unshare(0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x31c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setgroups(0x54b, &(0x7f0000000180)) 14:27:03 executing program 2: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000000)={0x300000000000000, 0x0, &(0x7f0000000040)={&(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x60}}, 0x0) 14:27:04 executing program 1: ioctl$VIDIOC_SUBDEV_G_FRAME_INTERVAL(0xffffffffffffffff, 0xc0305615, &(0x7f0000000040)={0x0, {0x0, 0x4}}) semtimedop(0x0, &(0x7f0000000040), 0x1b9, 0x0) semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000000)) 14:27:04 executing program 3: ioctl$SNDRV_RAWMIDI_IOCTL_PVERSION(0xffffffffffffffff, 0x80045700, 0x0) unshare(0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x31c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setgroups(0x54b, &(0x7f0000000180)) 14:27:04 executing program 4: ioctl$SNDRV_RAWMIDI_IOCTL_PVERSION(0xffffffffffffffff, 0x80045700, 0x0) unshare(0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x31c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setgroups(0x54b, &(0x7f0000000180)) 14:27:04 executing program 2: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000000)={0x300000000000000, 0x0, &(0x7f0000000040)={&(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x60}}, 0x0) 14:27:04 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x2, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000100)) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x2, 0x0, "6f85845fe36b7a047a03ae6f811e0b27598d2e"}) syz_open_pts(r0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000c34fff), 0xffffff0b) 14:27:04 executing program 2: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000000)={0x300000000000000, 0x0, &(0x7f0000000040)={&(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x60}}, 0x0) 14:27:04 executing program 0: ioctl$VIDIOC_SUBDEV_G_FRAME_INTERVAL(0xffffffffffffffff, 0xc0305615, &(0x7f0000000040)={0x0, {0x0, 0x4}}) semtimedop(0x0, &(0x7f0000000040), 0x1b9, 0x0) semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000000)) 14:27:04 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x2, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000100)) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x2, 0x0, "6f85845fe36b7a047a03ae6f811e0b27598d2e"}) syz_open_pts(r0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000c34fff), 0xffffff0b) 14:27:04 executing program 3: ioctl$SNDRV_RAWMIDI_IOCTL_PVERSION(0xffffffffffffffff, 0x80045700, 0x0) unshare(0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x31c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setgroups(0x54b, &(0x7f0000000180)) 14:27:04 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x2, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000100)) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x2, 0x0, "6f85845fe36b7a047a03ae6f811e0b27598d2e"}) syz_open_pts(r0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000c34fff), 0xffffff0b) 14:27:04 executing program 3: r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mISDNtimer\x00', 0x0, 0x0) ioctl$IMADDTIMER(r0, 0x80044940, &(0x7f0000000000)=0xffffffffffffffff) ioctl$IMADDTIMER(r0, 0x80044940, &(0x7f0000000080)=0xffffffffffffffff) ioctl$IMDELTIMER(r0, 0x80044941, &(0x7f0000000140)) 14:27:04 executing program 3: r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mISDNtimer\x00', 0x0, 0x0) ioctl$IMADDTIMER(r0, 0x80044940, &(0x7f0000000000)=0xffffffffffffffff) ioctl$IMADDTIMER(r0, 0x80044940, &(0x7f0000000080)=0xffffffffffffffff) ioctl$IMDELTIMER(r0, 0x80044941, &(0x7f0000000140)) 14:27:05 executing program 3: r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mISDNtimer\x00', 0x0, 0x0) ioctl$IMADDTIMER(r0, 0x80044940, &(0x7f0000000000)=0xffffffffffffffff) ioctl$IMADDTIMER(r0, 0x80044940, &(0x7f0000000080)=0xffffffffffffffff) ioctl$IMDELTIMER(r0, 0x80044941, &(0x7f0000000140)) 14:27:05 executing program 1: r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mISDNtimer\x00', 0x0, 0x0) ioctl$IMADDTIMER(r0, 0x80044940, &(0x7f0000000000)=0xffffffffffffffff) ioctl$IMADDTIMER(r0, 0x80044940, &(0x7f0000000080)=0xffffffffffffffff) ioctl$IMDELTIMER(r0, 0x80044941, &(0x7f0000000140)) 14:27:05 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x2, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000100)) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x2, 0x0, "6f85845fe36b7a047a03ae6f811e0b27598d2e"}) syz_open_pts(r0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000c34fff), 0xffffff0b) 14:27:05 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x9, 0xff, 0x6, 0x8000006c00, 0x40}, 0x3c) 14:27:05 executing program 1: r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mISDNtimer\x00', 0x0, 0x0) ioctl$IMADDTIMER(r0, 0x80044940, &(0x7f0000000000)=0xffffffffffffffff) ioctl$IMADDTIMER(r0, 0x80044940, &(0x7f0000000080)=0xffffffffffffffff) ioctl$IMDELTIMER(r0, 0x80044941, &(0x7f0000000140)) 14:27:05 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x0, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x28}}, 0x0) 14:27:05 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x2, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000100)) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x2, 0x0, "6f85845fe36b7a047a03ae6f811e0b27598d2e"}) syz_open_pts(r0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000c34fff), 0xffffff0b) 14:27:05 executing program 1: r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mISDNtimer\x00', 0x0, 0x0) ioctl$IMADDTIMER(r0, 0x80044940, &(0x7f0000000000)=0xffffffffffffffff) ioctl$IMADDTIMER(r0, 0x80044940, &(0x7f0000000080)=0xffffffffffffffff) ioctl$IMDELTIMER(r0, 0x80044941, &(0x7f0000000140)) 14:27:05 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x2, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000100)) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x2, 0x0, "6f85845fe36b7a047a03ae6f811e0b27598d2e"}) syz_open_pts(r0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000c34fff), 0xffffff0b) 14:27:05 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x0, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x28}}, 0x0) 14:27:05 executing program 1: creat(&(0x7f0000008040)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) 14:27:05 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x9, 0xff, 0x6, 0x8000006c00, 0x40}, 0x3c) 14:27:05 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x0, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x28}}, 0x0) 14:27:05 executing program 1: creat(&(0x7f0000008040)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) 14:27:06 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x2, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000100)) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x2, 0x0, "6f85845fe36b7a047a03ae6f811e0b27598d2e"}) syz_open_pts(r0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000c34fff), 0xffffff0b) 14:27:06 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x0, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x28}}, 0x0) 14:27:06 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x9, 0xff, 0x6, 0x8000006c00, 0x40}, 0x3c) 14:27:06 executing program 1: creat(&(0x7f0000008040)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) 14:27:06 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x2, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000100)) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x2, 0x0, "6f85845fe36b7a047a03ae6f811e0b27598d2e"}) syz_open_pts(r0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000c34fff), 0xffffff0b) 14:27:06 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0xf, 0x4, 0x4, 0x690}, 0x3c) close(r0) 14:27:06 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x2, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000100)) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x2, 0x0, "6f85845fe36b7a047a03ae6f811e0b27598d2e"}) syz_open_pts(r0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000c34fff), 0xffffff0b) 14:27:06 executing program 1: creat(&(0x7f0000008040)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) 14:27:06 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x9, 0xff, 0x6, 0x8000006c00, 0x40}, 0x3c) 14:27:06 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0xf, 0x4, 0x4, 0x690}, 0x3c) close(r0) 14:27:06 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0xf, 0x4, 0x4, 0x690}, 0x3c) close(r0) 14:27:06 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0xf, 0x4, 0x4, 0x690}, 0x3c) close(r0) 14:27:07 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0xf, 0x4, 0x4, 0x690}, 0x3c) close(r0) 14:27:07 executing program 0: keyctl$set_reqkey_keyring(0x4, 0xffffffffffffffff) 14:27:07 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0xf, 0x4, 0x4, 0x690}, 0x3c) close(r0) 14:27:07 executing program 5: r0 = socket(0x10, 0x802, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000032c0)={0x0, 0x0, &(0x7f0000003280)={&(0x7f0000001b00)=@newtaction={0x14, 0x32, 0x219}, 0x14}}, 0x0) [ 368.796900][T29958] tc_dump_action: action bad kind 14:27:07 executing program 5: r0 = socket(0x10, 0x802, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000032c0)={0x0, 0x0, &(0x7f0000003280)={&(0x7f0000001b00)=@newtaction={0x14, 0x32, 0x219}, 0x14}}, 0x0) 14:27:07 executing program 0: keyctl$set_reqkey_keyring(0x4, 0xffffffffffffffff) 14:27:07 executing program 0: keyctl$set_reqkey_keyring(0x4, 0xffffffffffffffff) [ 368.907728][T29966] tc_dump_action: action bad kind 14:27:07 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f0000000040)="5ec950172472f0ba97ab3c8f0a0582f97f79feffc1ee4c2daab543", 0x1b) 14:27:07 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0xf, 0x4, 0x4, 0x690}, 0x3c) close(r0) 14:27:07 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000006ffc)=0x3, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r0, &(0x7f0000000300)="0503000108003e0000000140c52cf7c25975e697b02f86dd6b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0x15e, 0x80, 0x0, 0x0) 14:27:07 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000001f40)={0x18, 0x4, 0x3, 0x0, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4], 0x0, 0xffffffffffffffff, 0x3}, 0x3c) 14:27:07 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000001400)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) ioctl$TIOCLINUX5(r0, 0x541c, &(0x7f0000001440)={0x5, 0x4, 0x7, 0x1a, 0xffffffff}) r2 = syz_open_procfs(0x0, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f00000018c0)={@in6={{0xa, 0x4e22, 0xffffffff, @rand_addr="067b4ead43427b60cfd960a90ea6b825", 0x5}}, 0x0, 0x100, 0x0, "74dfddf00e3427a2dfe10be3a64a93c3f716355e8b294625425ea69cd20c41a263b8f456d6ac24acd9bff5118a989696e8d7056236a47ebeb45a99db1f768032d4413b7657d76e38cff450ce30a3318f"}, 0x20f) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000180)={0x6, 0x2, 0x2, 0xf6, 0x2, 0x80000001, 0x3, 0x6fbbfdc3, 0x0}, &(0x7f00000001c0)=0x20) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f00000017c0)={0x1, &(0x7f0000001480)=[{0x8, 0x9e, 0x3f, 0x8}]}) r4 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000001840)='/dev/qat_adf_ctl\x00', 0x100, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_PVERSION(r0, 0x80045700, &(0x7f0000001800)) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000200)={r3, 0x6, 0x2, [0x58b, 0x3]}, 0xc) recvfrom$ax25(0xffffffffffffffff, &(0x7f00000016c0)=""/233, 0xffffffffffffff18, 0x6, 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x13, 0xffffffffffffffff, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000100), 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x0, 0xf8, 0xd7, &(0x7f0000000280)="8f91a271ccd40d914e72153edf7516f0735a7586ca6acf9692c990cd61f8fb363f85ea5e8d191a049a64d2885fbfeaf50b68c20b705c4d4a8627fecadf7f6acff1c4e69bb2baa88e9f4c38f18469e846d1ebd0c1a2b6cb9332a46cada0dbbd7c08315d3b84a70fc2147ea8a77f20f59ddf1712d359433eaed79c40a2de17ffbf6681a40f73615c0f8c1cb92cd3db479117deed3020d95d246f901f9265f855905e8a43ede955619fc5abb9d31ef8d47709d900d460089e15abf4b9f693b2c3a9c96be1cc07dcbca945a10fcf4b432856ce3c85e7f70e5d89f881085b6af4531b9f87eadc2061f9eb2e482ed153a7d2598c6916dfcdb5d951", &(0x7f00000015c0)=""/215, 0xfffffffffffffffc}, 0x28) r5 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000240)='/dev/nullb0\x00', 0x4040, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001880)='./cgroup.net/syz0\x00', 0x1ff) setsockopt$inet_tcp_TCP_REPAIR(r4, 0x6, 0x13, &(0x7f00000014c0), 0x4) setsockopt$inet_sctp_SCTP_AUTH_KEY(r2, 0x84, 0x17, &(0x7f00000019c0)=ANY=[@ANYRES32, @ANYBLOB="0180dc0085756c00ad2a6de83d98bfb6a374263bfa8912d2488dec5d53b2a6ed8eb75a8e1a5d5965dcc32dd76bad5bbc0ae94f9fde8d9903000000bd5a56b108109e8bdeb983abff748ef3e419e710f6d334e5410461779d200de303f3b0f0147277b84484c03f1cd2b7e0b4eb1bcf422d0cb76e13b0adb8ff7f88fcfb9ba520ae6ca46b58e60000005a4919d4ffc8ad67ea97035cb056b56f981dce0c3abee5"], 0x2) setsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000140)=@int=0xeb73, 0x4) preadv(r5, &(0x7f0000000040)=[{&(0x7f0000000400)=""/4096, 0x3ffc00}], 0x1, 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r2, 0x40485404, &(0x7f0000000380)={{0x1, 0x0, 0x7fffffff, 0x1, 0x1001}, 0x800, 0x400000007}) bind$rxrpc(r2, &(0x7f00000000c0)=@in4={0x21, 0x4, 0x2, 0x10, {0x2, 0x4e22, @remote}}, 0x24) syz_init_net_socket$llc(0x1a, 0x1, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x100000073) r6 = syz_genetlink_get_family_id$SEG6(&(0x7f0000001540)='SEG6\x00') sendmsg$SEG6_CMD_GET_TUNSRC(r1, &(0x7f0000001b80)={&(0x7f0000001500)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000001b40)={&(0x7f0000001580)={0x30, r6, 0x300, 0x70bd2c, 0x25dfdbfe, {}, [@SEG6_ATTR_ALGID={0x8, 0x6, 0x5}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, [], 0x1, 0x0}}]}, 0x30}, 0x1, 0x0, 0x0, 0x8880}, 0x8000) 14:27:07 executing program 5: r0 = socket(0x10, 0x802, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000032c0)={0x0, 0x0, &(0x7f0000003280)={&(0x7f0000001b00)=@newtaction={0x14, 0x32, 0x219}, 0x14}}, 0x0) 14:27:07 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f0000000040)="5ec950172472f0ba97ab3c8f0a0582f97f79feffc1ee4c2daab543", 0x1b) 14:27:07 executing program 0: keyctl$set_reqkey_keyring(0x4, 0xffffffffffffffff) 14:27:07 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000001f40)={0x18, 0x4, 0x3, 0x0, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4], 0x0, 0xffffffffffffffff, 0x3}, 0x3c) 14:27:07 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f0000000040)="5ec950172472f0ba97ab3c8f0a0582f97f79feffc1ee4c2daab543", 0x1b) 14:27:07 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000006ffc)=0x3, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r0, &(0x7f0000000300)="0503000108003e0000000140c52cf7c25975e697b02f86dd6b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0x15e, 0x80, 0x0, 0x0) [ 369.085121][T29989] tc_dump_action: action bad kind 14:27:07 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000006ffc)=0x3, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r0, &(0x7f0000000300)="0503000108003e0000000140c52cf7c25975e697b02f86dd6b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0x15e, 0x80, 0x0, 0x0) 14:27:07 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000001f40)={0x18, 0x4, 0x3, 0x0, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4], 0x0, 0xffffffffffffffff, 0x3}, 0x3c) 14:27:07 executing program 5: r0 = socket(0x10, 0x802, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000032c0)={0x0, 0x0, &(0x7f0000003280)={&(0x7f0000001b00)=@newtaction={0x14, 0x32, 0x219}, 0x14}}, 0x0) 14:27:07 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f0000000040)="5ec950172472f0ba97ab3c8f0a0582f97f79feffc1ee4c2daab543", 0x1b) 14:27:07 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000001400)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) ioctl$TIOCLINUX5(r0, 0x541c, &(0x7f0000001440)={0x5, 0x4, 0x7, 0x1a, 0xffffffff}) r2 = syz_open_procfs(0x0, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f00000018c0)={@in6={{0xa, 0x4e22, 0xffffffff, @rand_addr="067b4ead43427b60cfd960a90ea6b825", 0x5}}, 0x0, 0x100, 0x0, "74dfddf00e3427a2dfe10be3a64a93c3f716355e8b294625425ea69cd20c41a263b8f456d6ac24acd9bff5118a989696e8d7056236a47ebeb45a99db1f768032d4413b7657d76e38cff450ce30a3318f"}, 0x20f) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000180)={0x6, 0x2, 0x2, 0xf6, 0x2, 0x80000001, 0x3, 0x6fbbfdc3, 0x0}, &(0x7f00000001c0)=0x20) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f00000017c0)={0x1, &(0x7f0000001480)=[{0x8, 0x9e, 0x3f, 0x8}]}) r4 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000001840)='/dev/qat_adf_ctl\x00', 0x100, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_PVERSION(r0, 0x80045700, &(0x7f0000001800)) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000200)={r3, 0x6, 0x2, [0x58b, 0x3]}, 0xc) recvfrom$ax25(0xffffffffffffffff, &(0x7f00000016c0)=""/233, 0xffffffffffffff18, 0x6, 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x13, 0xffffffffffffffff, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000100), 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x0, 0xf8, 0xd7, &(0x7f0000000280)="8f91a271ccd40d914e72153edf7516f0735a7586ca6acf9692c990cd61f8fb363f85ea5e8d191a049a64d2885fbfeaf50b68c20b705c4d4a8627fecadf7f6acff1c4e69bb2baa88e9f4c38f18469e846d1ebd0c1a2b6cb9332a46cada0dbbd7c08315d3b84a70fc2147ea8a77f20f59ddf1712d359433eaed79c40a2de17ffbf6681a40f73615c0f8c1cb92cd3db479117deed3020d95d246f901f9265f855905e8a43ede955619fc5abb9d31ef8d47709d900d460089e15abf4b9f693b2c3a9c96be1cc07dcbca945a10fcf4b432856ce3c85e7f70e5d89f881085b6af4531b9f87eadc2061f9eb2e482ed153a7d2598c6916dfcdb5d951", &(0x7f00000015c0)=""/215, 0xfffffffffffffffc}, 0x28) r5 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000240)='/dev/nullb0\x00', 0x4040, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001880)='./cgroup.net/syz0\x00', 0x1ff) setsockopt$inet_tcp_TCP_REPAIR(r4, 0x6, 0x13, &(0x7f00000014c0), 0x4) setsockopt$inet_sctp_SCTP_AUTH_KEY(r2, 0x84, 0x17, &(0x7f00000019c0)=ANY=[@ANYRES32, @ANYBLOB="0180dc0085756c00ad2a6de83d98bfb6a374263bfa8912d2488dec5d53b2a6ed8eb75a8e1a5d5965dcc32dd76bad5bbc0ae94f9fde8d9903000000bd5a56b108109e8bdeb983abff748ef3e419e710f6d334e5410461779d200de303f3b0f0147277b84484c03f1cd2b7e0b4eb1bcf422d0cb76e13b0adb8ff7f88fcfb9ba520ae6ca46b58e60000005a4919d4ffc8ad67ea97035cb056b56f981dce0c3abee5"], 0x2) setsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000140)=@int=0xeb73, 0x4) preadv(r5, &(0x7f0000000040)=[{&(0x7f0000000400)=""/4096, 0x3ffc00}], 0x1, 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r2, 0x40485404, &(0x7f0000000380)={{0x1, 0x0, 0x7fffffff, 0x1, 0x1001}, 0x800, 0x400000007}) bind$rxrpc(r2, &(0x7f00000000c0)=@in4={0x21, 0x4, 0x2, 0x10, {0x2, 0x4e22, @remote}}, 0x24) syz_init_net_socket$llc(0x1a, 0x1, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x100000073) r6 = syz_genetlink_get_family_id$SEG6(&(0x7f0000001540)='SEG6\x00') sendmsg$SEG6_CMD_GET_TUNSRC(r1, &(0x7f0000001b80)={&(0x7f0000001500)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000001b40)={&(0x7f0000001580)={0x30, r6, 0x300, 0x70bd2c, 0x25dfdbfe, {}, [@SEG6_ATTR_ALGID={0x8, 0x6, 0x5}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, [], 0x1, 0x0}}]}, 0x30}, 0x1, 0x0, 0x0, 0x8880}, 0x8000) 14:27:07 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000006ffc)=0x3, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r0, &(0x7f0000000300)="0503000108003e0000000140c52cf7c25975e697b02f86dd6b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0x15e, 0x80, 0x0, 0x0) [ 369.247468][T30011] tc_dump_action: action bad kind 14:27:07 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000006ffc)=0x3, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r0, &(0x7f0000000300)="0503000108003e0000000140c52cf7c25975e697b02f86dd6b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0x15e, 0x80, 0x0, 0x0) 14:27:07 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000001f40)={0x18, 0x4, 0x3, 0x0, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4], 0x0, 0xffffffffffffffff, 0x3}, 0x3c) 14:27:07 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000001400)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) ioctl$TIOCLINUX5(r0, 0x541c, &(0x7f0000001440)={0x5, 0x4, 0x7, 0x1a, 0xffffffff}) r2 = syz_open_procfs(0x0, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f00000018c0)={@in6={{0xa, 0x4e22, 0xffffffff, @rand_addr="067b4ead43427b60cfd960a90ea6b825", 0x5}}, 0x0, 0x100, 0x0, "74dfddf00e3427a2dfe10be3a64a93c3f716355e8b294625425ea69cd20c41a263b8f456d6ac24acd9bff5118a989696e8d7056236a47ebeb45a99db1f768032d4413b7657d76e38cff450ce30a3318f"}, 0x20f) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000180)={0x6, 0x2, 0x2, 0xf6, 0x2, 0x80000001, 0x3, 0x6fbbfdc3, 0x0}, &(0x7f00000001c0)=0x20) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f00000017c0)={0x1, &(0x7f0000001480)=[{0x8, 0x9e, 0x3f, 0x8}]}) r4 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000001840)='/dev/qat_adf_ctl\x00', 0x100, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_PVERSION(r0, 0x80045700, &(0x7f0000001800)) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000200)={r3, 0x6, 0x2, [0x58b, 0x3]}, 0xc) recvfrom$ax25(0xffffffffffffffff, &(0x7f00000016c0)=""/233, 0xffffffffffffff18, 0x6, 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x13, 0xffffffffffffffff, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000100), 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x0, 0xf8, 0xd7, &(0x7f0000000280)="8f91a271ccd40d914e72153edf7516f0735a7586ca6acf9692c990cd61f8fb363f85ea5e8d191a049a64d2885fbfeaf50b68c20b705c4d4a8627fecadf7f6acff1c4e69bb2baa88e9f4c38f18469e846d1ebd0c1a2b6cb9332a46cada0dbbd7c08315d3b84a70fc2147ea8a77f20f59ddf1712d359433eaed79c40a2de17ffbf6681a40f73615c0f8c1cb92cd3db479117deed3020d95d246f901f9265f855905e8a43ede955619fc5abb9d31ef8d47709d900d460089e15abf4b9f693b2c3a9c96be1cc07dcbca945a10fcf4b432856ce3c85e7f70e5d89f881085b6af4531b9f87eadc2061f9eb2e482ed153a7d2598c6916dfcdb5d951", &(0x7f00000015c0)=""/215, 0xfffffffffffffffc}, 0x28) r5 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000240)='/dev/nullb0\x00', 0x4040, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001880)='./cgroup.net/syz0\x00', 0x1ff) setsockopt$inet_tcp_TCP_REPAIR(r4, 0x6, 0x13, &(0x7f00000014c0), 0x4) setsockopt$inet_sctp_SCTP_AUTH_KEY(r2, 0x84, 0x17, &(0x7f00000019c0)=ANY=[@ANYRES32, @ANYBLOB="0180dc0085756c00ad2a6de83d98bfb6a374263bfa8912d2488dec5d53b2a6ed8eb75a8e1a5d5965dcc32dd76bad5bbc0ae94f9fde8d9903000000bd5a56b108109e8bdeb983abff748ef3e419e710f6d334e5410461779d200de303f3b0f0147277b84484c03f1cd2b7e0b4eb1bcf422d0cb76e13b0adb8ff7f88fcfb9ba520ae6ca46b58e60000005a4919d4ffc8ad67ea97035cb056b56f981dce0c3abee5"], 0x2) setsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000140)=@int=0xeb73, 0x4) preadv(r5, &(0x7f0000000040)=[{&(0x7f0000000400)=""/4096, 0x3ffc00}], 0x1, 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r2, 0x40485404, &(0x7f0000000380)={{0x1, 0x0, 0x7fffffff, 0x1, 0x1001}, 0x800, 0x400000007}) bind$rxrpc(r2, &(0x7f00000000c0)=@in4={0x21, 0x4, 0x2, 0x10, {0x2, 0x4e22, @remote}}, 0x24) syz_init_net_socket$llc(0x1a, 0x1, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x100000073) r6 = syz_genetlink_get_family_id$SEG6(&(0x7f0000001540)='SEG6\x00') sendmsg$SEG6_CMD_GET_TUNSRC(r1, &(0x7f0000001b80)={&(0x7f0000001500)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000001b40)={&(0x7f0000001580)={0x30, r6, 0x300, 0x70bd2c, 0x25dfdbfe, {}, [@SEG6_ATTR_ALGID={0x8, 0x6, 0x5}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, [], 0x1, 0x0}}]}, 0x30}, 0x1, 0x0, 0x0, 0x8880}, 0x8000) 14:27:07 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000001400)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) ioctl$TIOCLINUX5(r0, 0x541c, &(0x7f0000001440)={0x5, 0x4, 0x7, 0x1a, 0xffffffff}) r2 = syz_open_procfs(0x0, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f00000018c0)={@in6={{0xa, 0x4e22, 0xffffffff, @rand_addr="067b4ead43427b60cfd960a90ea6b825", 0x5}}, 0x0, 0x100, 0x0, "74dfddf00e3427a2dfe10be3a64a93c3f716355e8b294625425ea69cd20c41a263b8f456d6ac24acd9bff5118a989696e8d7056236a47ebeb45a99db1f768032d4413b7657d76e38cff450ce30a3318f"}, 0x20f) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000180)={0x6, 0x2, 0x2, 0xf6, 0x2, 0x80000001, 0x3, 0x6fbbfdc3, 0x0}, &(0x7f00000001c0)=0x20) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f00000017c0)={0x1, &(0x7f0000001480)=[{0x8, 0x9e, 0x3f, 0x8}]}) r4 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000001840)='/dev/qat_adf_ctl\x00', 0x100, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_PVERSION(r0, 0x80045700, &(0x7f0000001800)) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000200)={r3, 0x6, 0x2, [0x58b, 0x3]}, 0xc) recvfrom$ax25(0xffffffffffffffff, &(0x7f00000016c0)=""/233, 0xffffffffffffff18, 0x6, 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x13, 0xffffffffffffffff, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000100), 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x0, 0xf8, 0xd7, &(0x7f0000000280)="8f91a271ccd40d914e72153edf7516f0735a7586ca6acf9692c990cd61f8fb363f85ea5e8d191a049a64d2885fbfeaf50b68c20b705c4d4a8627fecadf7f6acff1c4e69bb2baa88e9f4c38f18469e846d1ebd0c1a2b6cb9332a46cada0dbbd7c08315d3b84a70fc2147ea8a77f20f59ddf1712d359433eaed79c40a2de17ffbf6681a40f73615c0f8c1cb92cd3db479117deed3020d95d246f901f9265f855905e8a43ede955619fc5abb9d31ef8d47709d900d460089e15abf4b9f693b2c3a9c96be1cc07dcbca945a10fcf4b432856ce3c85e7f70e5d89f881085b6af4531b9f87eadc2061f9eb2e482ed153a7d2598c6916dfcdb5d951", &(0x7f00000015c0)=""/215, 0xfffffffffffffffc}, 0x28) r5 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000240)='/dev/nullb0\x00', 0x4040, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001880)='./cgroup.net/syz0\x00', 0x1ff) setsockopt$inet_tcp_TCP_REPAIR(r4, 0x6, 0x13, &(0x7f00000014c0), 0x4) setsockopt$inet_sctp_SCTP_AUTH_KEY(r2, 0x84, 0x17, &(0x7f00000019c0)=ANY=[@ANYRES32, @ANYBLOB="0180dc0085756c00ad2a6de83d98bfb6a374263bfa8912d2488dec5d53b2a6ed8eb75a8e1a5d5965dcc32dd76bad5bbc0ae94f9fde8d9903000000bd5a56b108109e8bdeb983abff748ef3e419e710f6d334e5410461779d200de303f3b0f0147277b84484c03f1cd2b7e0b4eb1bcf422d0cb76e13b0adb8ff7f88fcfb9ba520ae6ca46b58e60000005a4919d4ffc8ad67ea97035cb056b56f981dce0c3abee5"], 0x2) setsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000140)=@int=0xeb73, 0x4) preadv(r5, &(0x7f0000000040)=[{&(0x7f0000000400)=""/4096, 0x3ffc00}], 0x1, 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r2, 0x40485404, &(0x7f0000000380)={{0x1, 0x0, 0x7fffffff, 0x1, 0x1001}, 0x800, 0x400000007}) bind$rxrpc(r2, &(0x7f00000000c0)=@in4={0x21, 0x4, 0x2, 0x10, {0x2, 0x4e22, @remote}}, 0x24) syz_init_net_socket$llc(0x1a, 0x1, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x100000073) r6 = syz_genetlink_get_family_id$SEG6(&(0x7f0000001540)='SEG6\x00') sendmsg$SEG6_CMD_GET_TUNSRC(r1, &(0x7f0000001b80)={&(0x7f0000001500)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000001b40)={&(0x7f0000001580)={0x30, r6, 0x300, 0x70bd2c, 0x25dfdbfe, {}, [@SEG6_ATTR_ALGID={0x8, 0x6, 0x5}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, [], 0x1, 0x0}}]}, 0x30}, 0x1, 0x0, 0x0, 0x8880}, 0x8000) 14:27:07 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000006ffc)=0x3, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r0, &(0x7f0000000300)="0503000108003e0000000140c52cf7c25975e697b02f86dd6b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0x15e, 0x80, 0x0, 0x0) 14:27:07 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000006ffc)=0x3, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r0, &(0x7f0000000300)="0503000108003e0000000140c52cf7c25975e697b02f86dd6b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0x15e, 0x80, 0x0, 0x0) 14:27:07 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000001400)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) ioctl$TIOCLINUX5(r0, 0x541c, &(0x7f0000001440)={0x5, 0x4, 0x7, 0x1a, 0xffffffff}) r2 = syz_open_procfs(0x0, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f00000018c0)={@in6={{0xa, 0x4e22, 0xffffffff, @rand_addr="067b4ead43427b60cfd960a90ea6b825", 0x5}}, 0x0, 0x100, 0x0, "74dfddf00e3427a2dfe10be3a64a93c3f716355e8b294625425ea69cd20c41a263b8f456d6ac24acd9bff5118a989696e8d7056236a47ebeb45a99db1f768032d4413b7657d76e38cff450ce30a3318f"}, 0x20f) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000180)={0x6, 0x2, 0x2, 0xf6, 0x2, 0x80000001, 0x3, 0x6fbbfdc3, 0x0}, &(0x7f00000001c0)=0x20) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f00000017c0)={0x1, &(0x7f0000001480)=[{0x8, 0x9e, 0x3f, 0x8}]}) r4 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000001840)='/dev/qat_adf_ctl\x00', 0x100, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_PVERSION(r0, 0x80045700, &(0x7f0000001800)) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000200)={r3, 0x6, 0x2, [0x58b, 0x3]}, 0xc) recvfrom$ax25(0xffffffffffffffff, &(0x7f00000016c0)=""/233, 0xffffffffffffff18, 0x6, 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x13, 0xffffffffffffffff, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000100), 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x0, 0xf8, 0xd7, &(0x7f0000000280)="8f91a271ccd40d914e72153edf7516f0735a7586ca6acf9692c990cd61f8fb363f85ea5e8d191a049a64d2885fbfeaf50b68c20b705c4d4a8627fecadf7f6acff1c4e69bb2baa88e9f4c38f18469e846d1ebd0c1a2b6cb9332a46cada0dbbd7c08315d3b84a70fc2147ea8a77f20f59ddf1712d359433eaed79c40a2de17ffbf6681a40f73615c0f8c1cb92cd3db479117deed3020d95d246f901f9265f855905e8a43ede955619fc5abb9d31ef8d47709d900d460089e15abf4b9f693b2c3a9c96be1cc07dcbca945a10fcf4b432856ce3c85e7f70e5d89f881085b6af4531b9f87eadc2061f9eb2e482ed153a7d2598c6916dfcdb5d951", &(0x7f00000015c0)=""/215, 0xfffffffffffffffc}, 0x28) r5 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000240)='/dev/nullb0\x00', 0x4040, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001880)='./cgroup.net/syz0\x00', 0x1ff) setsockopt$inet_tcp_TCP_REPAIR(r4, 0x6, 0x13, &(0x7f00000014c0), 0x4) setsockopt$inet_sctp_SCTP_AUTH_KEY(r2, 0x84, 0x17, &(0x7f00000019c0)=ANY=[@ANYRES32, @ANYBLOB="0180dc0085756c00ad2a6de83d98bfb6a374263bfa8912d2488dec5d53b2a6ed8eb75a8e1a5d5965dcc32dd76bad5bbc0ae94f9fde8d9903000000bd5a56b108109e8bdeb983abff748ef3e419e710f6d334e5410461779d200de303f3b0f0147277b84484c03f1cd2b7e0b4eb1bcf422d0cb76e13b0adb8ff7f88fcfb9ba520ae6ca46b58e60000005a4919d4ffc8ad67ea97035cb056b56f981dce0c3abee5"], 0x2) setsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000140)=@int=0xeb73, 0x4) preadv(r5, &(0x7f0000000040)=[{&(0x7f0000000400)=""/4096, 0x3ffc00}], 0x1, 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r2, 0x40485404, &(0x7f0000000380)={{0x1, 0x0, 0x7fffffff, 0x1, 0x1001}, 0x800, 0x400000007}) bind$rxrpc(r2, &(0x7f00000000c0)=@in4={0x21, 0x4, 0x2, 0x10, {0x2, 0x4e22, @remote}}, 0x24) syz_init_net_socket$llc(0x1a, 0x1, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x100000073) r6 = syz_genetlink_get_family_id$SEG6(&(0x7f0000001540)='SEG6\x00') sendmsg$SEG6_CMD_GET_TUNSRC(r1, &(0x7f0000001b80)={&(0x7f0000001500)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000001b40)={&(0x7f0000001580)={0x30, r6, 0x300, 0x70bd2c, 0x25dfdbfe, {}, [@SEG6_ATTR_ALGID={0x8, 0x6, 0x5}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, [], 0x1, 0x0}}]}, 0x30}, 0x1, 0x0, 0x0, 0x8880}, 0x8000) 14:27:07 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000001400)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) ioctl$TIOCLINUX5(r0, 0x541c, &(0x7f0000001440)={0x5, 0x4, 0x7, 0x1a, 0xffffffff}) r2 = syz_open_procfs(0x0, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f00000018c0)={@in6={{0xa, 0x4e22, 0xffffffff, @rand_addr="067b4ead43427b60cfd960a90ea6b825", 0x5}}, 0x0, 0x100, 0x0, "74dfddf00e3427a2dfe10be3a64a93c3f716355e8b294625425ea69cd20c41a263b8f456d6ac24acd9bff5118a989696e8d7056236a47ebeb45a99db1f768032d4413b7657d76e38cff450ce30a3318f"}, 0x20f) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000180)={0x6, 0x2, 0x2, 0xf6, 0x2, 0x80000001, 0x3, 0x6fbbfdc3, 0x0}, &(0x7f00000001c0)=0x20) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f00000017c0)={0x1, &(0x7f0000001480)=[{0x8, 0x9e, 0x3f, 0x8}]}) r4 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000001840)='/dev/qat_adf_ctl\x00', 0x100, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_PVERSION(r0, 0x80045700, &(0x7f0000001800)) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000200)={r3, 0x6, 0x2, [0x58b, 0x3]}, 0xc) recvfrom$ax25(0xffffffffffffffff, &(0x7f00000016c0)=""/233, 0xffffffffffffff18, 0x6, 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x13, 0xffffffffffffffff, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000100), 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x0, 0xf8, 0xd7, &(0x7f0000000280)="8f91a271ccd40d914e72153edf7516f0735a7586ca6acf9692c990cd61f8fb363f85ea5e8d191a049a64d2885fbfeaf50b68c20b705c4d4a8627fecadf7f6acff1c4e69bb2baa88e9f4c38f18469e846d1ebd0c1a2b6cb9332a46cada0dbbd7c08315d3b84a70fc2147ea8a77f20f59ddf1712d359433eaed79c40a2de17ffbf6681a40f73615c0f8c1cb92cd3db479117deed3020d95d246f901f9265f855905e8a43ede955619fc5abb9d31ef8d47709d900d460089e15abf4b9f693b2c3a9c96be1cc07dcbca945a10fcf4b432856ce3c85e7f70e5d89f881085b6af4531b9f87eadc2061f9eb2e482ed153a7d2598c6916dfcdb5d951", &(0x7f00000015c0)=""/215, 0xfffffffffffffffc}, 0x28) r5 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000240)='/dev/nullb0\x00', 0x4040, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001880)='./cgroup.net/syz0\x00', 0x1ff) setsockopt$inet_tcp_TCP_REPAIR(r4, 0x6, 0x13, &(0x7f00000014c0), 0x4) setsockopt$inet_sctp_SCTP_AUTH_KEY(r2, 0x84, 0x17, &(0x7f00000019c0)=ANY=[@ANYRES32, @ANYBLOB="0180dc0085756c00ad2a6de83d98bfb6a374263bfa8912d2488dec5d53b2a6ed8eb75a8e1a5d5965dcc32dd76bad5bbc0ae94f9fde8d9903000000bd5a56b108109e8bdeb983abff748ef3e419e710f6d334e5410461779d200de303f3b0f0147277b84484c03f1cd2b7e0b4eb1bcf422d0cb76e13b0adb8ff7f88fcfb9ba520ae6ca46b58e60000005a4919d4ffc8ad67ea97035cb056b56f981dce0c3abee5"], 0x2) setsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000140)=@int=0xeb73, 0x4) preadv(r5, &(0x7f0000000040)=[{&(0x7f0000000400)=""/4096, 0x3ffc00}], 0x1, 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r2, 0x40485404, &(0x7f0000000380)={{0x1, 0x0, 0x7fffffff, 0x1, 0x1001}, 0x800, 0x400000007}) bind$rxrpc(r2, &(0x7f00000000c0)=@in4={0x21, 0x4, 0x2, 0x10, {0x2, 0x4e22, @remote}}, 0x24) syz_init_net_socket$llc(0x1a, 0x1, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x100000073) r6 = syz_genetlink_get_family_id$SEG6(&(0x7f0000001540)='SEG6\x00') sendmsg$SEG6_CMD_GET_TUNSRC(r1, &(0x7f0000001b80)={&(0x7f0000001500)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000001b40)={&(0x7f0000001580)={0x30, r6, 0x300, 0x70bd2c, 0x25dfdbfe, {}, [@SEG6_ATTR_ALGID={0x8, 0x6, 0x5}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, [], 0x1, 0x0}}]}, 0x30}, 0x1, 0x0, 0x0, 0x8880}, 0x8000) 14:27:07 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000001400)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) ioctl$TIOCLINUX5(r0, 0x541c, &(0x7f0000001440)={0x5, 0x4, 0x7, 0x1a, 0xffffffff}) r2 = syz_open_procfs(0x0, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f00000018c0)={@in6={{0xa, 0x4e22, 0xffffffff, @rand_addr="067b4ead43427b60cfd960a90ea6b825", 0x5}}, 0x0, 0x100, 0x0, "74dfddf00e3427a2dfe10be3a64a93c3f716355e8b294625425ea69cd20c41a263b8f456d6ac24acd9bff5118a989696e8d7056236a47ebeb45a99db1f768032d4413b7657d76e38cff450ce30a3318f"}, 0x20f) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000180)={0x6, 0x2, 0x2, 0xf6, 0x2, 0x80000001, 0x3, 0x6fbbfdc3, 0x0}, &(0x7f00000001c0)=0x20) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f00000017c0)={0x1, &(0x7f0000001480)=[{0x8, 0x9e, 0x3f, 0x8}]}) r4 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000001840)='/dev/qat_adf_ctl\x00', 0x100, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_PVERSION(r0, 0x80045700, &(0x7f0000001800)) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000200)={r3, 0x6, 0x2, [0x58b, 0x3]}, 0xc) recvfrom$ax25(0xffffffffffffffff, &(0x7f00000016c0)=""/233, 0xffffffffffffff18, 0x6, 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x13, 0xffffffffffffffff, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000100), 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x0, 0xf8, 0xd7, &(0x7f0000000280)="8f91a271ccd40d914e72153edf7516f0735a7586ca6acf9692c990cd61f8fb363f85ea5e8d191a049a64d2885fbfeaf50b68c20b705c4d4a8627fecadf7f6acff1c4e69bb2baa88e9f4c38f18469e846d1ebd0c1a2b6cb9332a46cada0dbbd7c08315d3b84a70fc2147ea8a77f20f59ddf1712d359433eaed79c40a2de17ffbf6681a40f73615c0f8c1cb92cd3db479117deed3020d95d246f901f9265f855905e8a43ede955619fc5abb9d31ef8d47709d900d460089e15abf4b9f693b2c3a9c96be1cc07dcbca945a10fcf4b432856ce3c85e7f70e5d89f881085b6af4531b9f87eadc2061f9eb2e482ed153a7d2598c6916dfcdb5d951", &(0x7f00000015c0)=""/215, 0xfffffffffffffffc}, 0x28) r5 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000240)='/dev/nullb0\x00', 0x4040, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001880)='./cgroup.net/syz0\x00', 0x1ff) setsockopt$inet_tcp_TCP_REPAIR(r4, 0x6, 0x13, &(0x7f00000014c0), 0x4) setsockopt$inet_sctp_SCTP_AUTH_KEY(r2, 0x84, 0x17, &(0x7f00000019c0)=ANY=[@ANYRES32, @ANYBLOB="0180dc0085756c00ad2a6de83d98bfb6a374263bfa8912d2488dec5d53b2a6ed8eb75a8e1a5d5965dcc32dd76bad5bbc0ae94f9fde8d9903000000bd5a56b108109e8bdeb983abff748ef3e419e710f6d334e5410461779d200de303f3b0f0147277b84484c03f1cd2b7e0b4eb1bcf422d0cb76e13b0adb8ff7f88fcfb9ba520ae6ca46b58e60000005a4919d4ffc8ad67ea97035cb056b56f981dce0c3abee5"], 0x2) setsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000140)=@int=0xeb73, 0x4) preadv(r5, &(0x7f0000000040)=[{&(0x7f0000000400)=""/4096, 0x3ffc00}], 0x1, 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r2, 0x40485404, &(0x7f0000000380)={{0x1, 0x0, 0x7fffffff, 0x1, 0x1001}, 0x800, 0x400000007}) bind$rxrpc(r2, &(0x7f00000000c0)=@in4={0x21, 0x4, 0x2, 0x10, {0x2, 0x4e22, @remote}}, 0x24) syz_init_net_socket$llc(0x1a, 0x1, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x100000073) r6 = syz_genetlink_get_family_id$SEG6(&(0x7f0000001540)='SEG6\x00') sendmsg$SEG6_CMD_GET_TUNSRC(r1, &(0x7f0000001b80)={&(0x7f0000001500)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000001b40)={&(0x7f0000001580)={0x30, r6, 0x300, 0x70bd2c, 0x25dfdbfe, {}, [@SEG6_ATTR_ALGID={0x8, 0x6, 0x5}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, [], 0x1, 0x0}}]}, 0x30}, 0x1, 0x0, 0x0, 0x8880}, 0x8000) 14:27:07 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000001400)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) ioctl$TIOCLINUX5(r0, 0x541c, &(0x7f0000001440)={0x5, 0x4, 0x7, 0x1a, 0xffffffff}) r2 = syz_open_procfs(0x0, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f00000018c0)={@in6={{0xa, 0x4e22, 0xffffffff, @rand_addr="067b4ead43427b60cfd960a90ea6b825", 0x5}}, 0x0, 0x100, 0x0, "74dfddf00e3427a2dfe10be3a64a93c3f716355e8b294625425ea69cd20c41a263b8f456d6ac24acd9bff5118a989696e8d7056236a47ebeb45a99db1f768032d4413b7657d76e38cff450ce30a3318f"}, 0x20f) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000180)={0x6, 0x2, 0x2, 0xf6, 0x2, 0x80000001, 0x3, 0x6fbbfdc3, 0x0}, &(0x7f00000001c0)=0x20) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f00000017c0)={0x1, &(0x7f0000001480)=[{0x8, 0x9e, 0x3f, 0x8}]}) r4 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000001840)='/dev/qat_adf_ctl\x00', 0x100, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_PVERSION(r0, 0x80045700, &(0x7f0000001800)) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000200)={r3, 0x6, 0x2, [0x58b, 0x3]}, 0xc) recvfrom$ax25(0xffffffffffffffff, &(0x7f00000016c0)=""/233, 0xffffffffffffff18, 0x6, 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x13, 0xffffffffffffffff, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000100), 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x0, 0xf8, 0xd7, &(0x7f0000000280)="8f91a271ccd40d914e72153edf7516f0735a7586ca6acf9692c990cd61f8fb363f85ea5e8d191a049a64d2885fbfeaf50b68c20b705c4d4a8627fecadf7f6acff1c4e69bb2baa88e9f4c38f18469e846d1ebd0c1a2b6cb9332a46cada0dbbd7c08315d3b84a70fc2147ea8a77f20f59ddf1712d359433eaed79c40a2de17ffbf6681a40f73615c0f8c1cb92cd3db479117deed3020d95d246f901f9265f855905e8a43ede955619fc5abb9d31ef8d47709d900d460089e15abf4b9f693b2c3a9c96be1cc07dcbca945a10fcf4b432856ce3c85e7f70e5d89f881085b6af4531b9f87eadc2061f9eb2e482ed153a7d2598c6916dfcdb5d951", &(0x7f00000015c0)=""/215, 0xfffffffffffffffc}, 0x28) r5 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000240)='/dev/nullb0\x00', 0x4040, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001880)='./cgroup.net/syz0\x00', 0x1ff) setsockopt$inet_tcp_TCP_REPAIR(r4, 0x6, 0x13, &(0x7f00000014c0), 0x4) setsockopt$inet_sctp_SCTP_AUTH_KEY(r2, 0x84, 0x17, &(0x7f00000019c0)=ANY=[@ANYRES32, @ANYBLOB="0180dc0085756c00ad2a6de83d98bfb6a374263bfa8912d2488dec5d53b2a6ed8eb75a8e1a5d5965dcc32dd76bad5bbc0ae94f9fde8d9903000000bd5a56b108109e8bdeb983abff748ef3e419e710f6d334e5410461779d200de303f3b0f0147277b84484c03f1cd2b7e0b4eb1bcf422d0cb76e13b0adb8ff7f88fcfb9ba520ae6ca46b58e60000005a4919d4ffc8ad67ea97035cb056b56f981dce0c3abee5"], 0x2) setsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000140)=@int=0xeb73, 0x4) preadv(r5, &(0x7f0000000040)=[{&(0x7f0000000400)=""/4096, 0x3ffc00}], 0x1, 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r2, 0x40485404, &(0x7f0000000380)={{0x1, 0x0, 0x7fffffff, 0x1, 0x1001}, 0x800, 0x400000007}) bind$rxrpc(r2, &(0x7f00000000c0)=@in4={0x21, 0x4, 0x2, 0x10, {0x2, 0x4e22, @remote}}, 0x24) syz_init_net_socket$llc(0x1a, 0x1, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x100000073) r6 = syz_genetlink_get_family_id$SEG6(&(0x7f0000001540)='SEG6\x00') sendmsg$SEG6_CMD_GET_TUNSRC(r1, &(0x7f0000001b80)={&(0x7f0000001500)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000001b40)={&(0x7f0000001580)={0x30, r6, 0x300, 0x70bd2c, 0x25dfdbfe, {}, [@SEG6_ATTR_ALGID={0x8, 0x6, 0x5}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, [], 0x1, 0x0}}]}, 0x30}, 0x1, 0x0, 0x0, 0x8880}, 0x8000) 14:27:07 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000001400)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) ioctl$TIOCLINUX5(r0, 0x541c, &(0x7f0000001440)={0x5, 0x4, 0x7, 0x1a, 0xffffffff}) r2 = syz_open_procfs(0x0, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f00000018c0)={@in6={{0xa, 0x4e22, 0xffffffff, @rand_addr="067b4ead43427b60cfd960a90ea6b825", 0x5}}, 0x0, 0x100, 0x0, "74dfddf00e3427a2dfe10be3a64a93c3f716355e8b294625425ea69cd20c41a263b8f456d6ac24acd9bff5118a989696e8d7056236a47ebeb45a99db1f768032d4413b7657d76e38cff450ce30a3318f"}, 0x20f) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000180)={0x6, 0x2, 0x2, 0xf6, 0x2, 0x80000001, 0x3, 0x6fbbfdc3, 0x0}, &(0x7f00000001c0)=0x20) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f00000017c0)={0x1, &(0x7f0000001480)=[{0x8, 0x9e, 0x3f, 0x8}]}) r4 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000001840)='/dev/qat_adf_ctl\x00', 0x100, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_PVERSION(r0, 0x80045700, &(0x7f0000001800)) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000200)={r3, 0x6, 0x2, [0x58b, 0x3]}, 0xc) recvfrom$ax25(0xffffffffffffffff, &(0x7f00000016c0)=""/233, 0xffffffffffffff18, 0x6, 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x13, 0xffffffffffffffff, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000100), 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x0, 0xf8, 0xd7, &(0x7f0000000280)="8f91a271ccd40d914e72153edf7516f0735a7586ca6acf9692c990cd61f8fb363f85ea5e8d191a049a64d2885fbfeaf50b68c20b705c4d4a8627fecadf7f6acff1c4e69bb2baa88e9f4c38f18469e846d1ebd0c1a2b6cb9332a46cada0dbbd7c08315d3b84a70fc2147ea8a77f20f59ddf1712d359433eaed79c40a2de17ffbf6681a40f73615c0f8c1cb92cd3db479117deed3020d95d246f901f9265f855905e8a43ede955619fc5abb9d31ef8d47709d900d460089e15abf4b9f693b2c3a9c96be1cc07dcbca945a10fcf4b432856ce3c85e7f70e5d89f881085b6af4531b9f87eadc2061f9eb2e482ed153a7d2598c6916dfcdb5d951", &(0x7f00000015c0)=""/215, 0xfffffffffffffffc}, 0x28) r5 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000240)='/dev/nullb0\x00', 0x4040, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001880)='./cgroup.net/syz0\x00', 0x1ff) setsockopt$inet_tcp_TCP_REPAIR(r4, 0x6, 0x13, &(0x7f00000014c0), 0x4) setsockopt$inet_sctp_SCTP_AUTH_KEY(r2, 0x84, 0x17, &(0x7f00000019c0)=ANY=[@ANYRES32, @ANYBLOB="0180dc0085756c00ad2a6de83d98bfb6a374263bfa8912d2488dec5d53b2a6ed8eb75a8e1a5d5965dcc32dd76bad5bbc0ae94f9fde8d9903000000bd5a56b108109e8bdeb983abff748ef3e419e710f6d334e5410461779d200de303f3b0f0147277b84484c03f1cd2b7e0b4eb1bcf422d0cb76e13b0adb8ff7f88fcfb9ba520ae6ca46b58e60000005a4919d4ffc8ad67ea97035cb056b56f981dce0c3abee5"], 0x2) setsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000140)=@int=0xeb73, 0x4) preadv(r5, &(0x7f0000000040)=[{&(0x7f0000000400)=""/4096, 0x3ffc00}], 0x1, 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r2, 0x40485404, &(0x7f0000000380)={{0x1, 0x0, 0x7fffffff, 0x1, 0x1001}, 0x800, 0x400000007}) bind$rxrpc(r2, &(0x7f00000000c0)=@in4={0x21, 0x4, 0x2, 0x10, {0x2, 0x4e22, @remote}}, 0x24) syz_init_net_socket$llc(0x1a, 0x1, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x100000073) r6 = syz_genetlink_get_family_id$SEG6(&(0x7f0000001540)='SEG6\x00') sendmsg$SEG6_CMD_GET_TUNSRC(r1, &(0x7f0000001b80)={&(0x7f0000001500)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000001b40)={&(0x7f0000001580)={0x30, r6, 0x300, 0x70bd2c, 0x25dfdbfe, {}, [@SEG6_ATTR_ALGID={0x8, 0x6, 0x5}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, [], 0x1, 0x0}}]}, 0x30}, 0x1, 0x0, 0x0, 0x8880}, 0x8000) 14:27:07 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000001400)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) ioctl$TIOCLINUX5(r0, 0x541c, &(0x7f0000001440)={0x5, 0x4, 0x7, 0x1a, 0xffffffff}) r2 = syz_open_procfs(0x0, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f00000018c0)={@in6={{0xa, 0x4e22, 0xffffffff, @rand_addr="067b4ead43427b60cfd960a90ea6b825", 0x5}}, 0x0, 0x100, 0x0, "74dfddf00e3427a2dfe10be3a64a93c3f716355e8b294625425ea69cd20c41a263b8f456d6ac24acd9bff5118a989696e8d7056236a47ebeb45a99db1f768032d4413b7657d76e38cff450ce30a3318f"}, 0x20f) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000180)={0x6, 0x2, 0x2, 0xf6, 0x2, 0x80000001, 0x3, 0x6fbbfdc3, 0x0}, &(0x7f00000001c0)=0x20) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f00000017c0)={0x1, &(0x7f0000001480)=[{0x8, 0x9e, 0x3f, 0x8}]}) r4 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000001840)='/dev/qat_adf_ctl\x00', 0x100, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_PVERSION(r0, 0x80045700, &(0x7f0000001800)) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000200)={r3, 0x6, 0x2, [0x58b, 0x3]}, 0xc) recvfrom$ax25(0xffffffffffffffff, &(0x7f00000016c0)=""/233, 0xffffffffffffff18, 0x6, 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x13, 0xffffffffffffffff, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000100), 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x0, 0xf8, 0xd7, &(0x7f0000000280)="8f91a271ccd40d914e72153edf7516f0735a7586ca6acf9692c990cd61f8fb363f85ea5e8d191a049a64d2885fbfeaf50b68c20b705c4d4a8627fecadf7f6acff1c4e69bb2baa88e9f4c38f18469e846d1ebd0c1a2b6cb9332a46cada0dbbd7c08315d3b84a70fc2147ea8a77f20f59ddf1712d359433eaed79c40a2de17ffbf6681a40f73615c0f8c1cb92cd3db479117deed3020d95d246f901f9265f855905e8a43ede955619fc5abb9d31ef8d47709d900d460089e15abf4b9f693b2c3a9c96be1cc07dcbca945a10fcf4b432856ce3c85e7f70e5d89f881085b6af4531b9f87eadc2061f9eb2e482ed153a7d2598c6916dfcdb5d951", &(0x7f00000015c0)=""/215, 0xfffffffffffffffc}, 0x28) r5 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000240)='/dev/nullb0\x00', 0x4040, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001880)='./cgroup.net/syz0\x00', 0x1ff) setsockopt$inet_tcp_TCP_REPAIR(r4, 0x6, 0x13, &(0x7f00000014c0), 0x4) setsockopt$inet_sctp_SCTP_AUTH_KEY(r2, 0x84, 0x17, &(0x7f00000019c0)=ANY=[@ANYRES32, @ANYBLOB="0180dc0085756c00ad2a6de83d98bfb6a374263bfa8912d2488dec5d53b2a6ed8eb75a8e1a5d5965dcc32dd76bad5bbc0ae94f9fde8d9903000000bd5a56b108109e8bdeb983abff748ef3e419e710f6d334e5410461779d200de303f3b0f0147277b84484c03f1cd2b7e0b4eb1bcf422d0cb76e13b0adb8ff7f88fcfb9ba520ae6ca46b58e60000005a4919d4ffc8ad67ea97035cb056b56f981dce0c3abee5"], 0x2) setsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000140)=@int=0xeb73, 0x4) preadv(r5, &(0x7f0000000040)=[{&(0x7f0000000400)=""/4096, 0x3ffc00}], 0x1, 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r2, 0x40485404, &(0x7f0000000380)={{0x1, 0x0, 0x7fffffff, 0x1, 0x1001}, 0x800, 0x400000007}) bind$rxrpc(r2, &(0x7f00000000c0)=@in4={0x21, 0x4, 0x2, 0x10, {0x2, 0x4e22, @remote}}, 0x24) syz_init_net_socket$llc(0x1a, 0x1, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x100000073) r6 = syz_genetlink_get_family_id$SEG6(&(0x7f0000001540)='SEG6\x00') sendmsg$SEG6_CMD_GET_TUNSRC(r1, &(0x7f0000001b80)={&(0x7f0000001500)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000001b40)={&(0x7f0000001580)={0x30, r6, 0x300, 0x70bd2c, 0x25dfdbfe, {}, [@SEG6_ATTR_ALGID={0x8, 0x6, 0x5}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, [], 0x1, 0x0}}]}, 0x30}, 0x1, 0x0, 0x0, 0x8880}, 0x8000) 14:27:07 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000001400)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) ioctl$TIOCLINUX5(r0, 0x541c, &(0x7f0000001440)={0x5, 0x4, 0x7, 0x1a, 0xffffffff}) r2 = syz_open_procfs(0x0, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f00000018c0)={@in6={{0xa, 0x4e22, 0xffffffff, @rand_addr="067b4ead43427b60cfd960a90ea6b825", 0x5}}, 0x0, 0x100, 0x0, "74dfddf00e3427a2dfe10be3a64a93c3f716355e8b294625425ea69cd20c41a263b8f456d6ac24acd9bff5118a989696e8d7056236a47ebeb45a99db1f768032d4413b7657d76e38cff450ce30a3318f"}, 0x20f) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000180)={0x6, 0x2, 0x2, 0xf6, 0x2, 0x80000001, 0x3, 0x6fbbfdc3, 0x0}, &(0x7f00000001c0)=0x20) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f00000017c0)={0x1, &(0x7f0000001480)=[{0x8, 0x9e, 0x3f, 0x8}]}) r4 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000001840)='/dev/qat_adf_ctl\x00', 0x100, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_PVERSION(r0, 0x80045700, &(0x7f0000001800)) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000200)={r3, 0x6, 0x2, [0x58b, 0x3]}, 0xc) recvfrom$ax25(0xffffffffffffffff, &(0x7f00000016c0)=""/233, 0xffffffffffffff18, 0x6, 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x13, 0xffffffffffffffff, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000100), 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x0, 0xf8, 0xd7, &(0x7f0000000280)="8f91a271ccd40d914e72153edf7516f0735a7586ca6acf9692c990cd61f8fb363f85ea5e8d191a049a64d2885fbfeaf50b68c20b705c4d4a8627fecadf7f6acff1c4e69bb2baa88e9f4c38f18469e846d1ebd0c1a2b6cb9332a46cada0dbbd7c08315d3b84a70fc2147ea8a77f20f59ddf1712d359433eaed79c40a2de17ffbf6681a40f73615c0f8c1cb92cd3db479117deed3020d95d246f901f9265f855905e8a43ede955619fc5abb9d31ef8d47709d900d460089e15abf4b9f693b2c3a9c96be1cc07dcbca945a10fcf4b432856ce3c85e7f70e5d89f881085b6af4531b9f87eadc2061f9eb2e482ed153a7d2598c6916dfcdb5d951", &(0x7f00000015c0)=""/215, 0xfffffffffffffffc}, 0x28) r5 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000240)='/dev/nullb0\x00', 0x4040, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001880)='./cgroup.net/syz0\x00', 0x1ff) setsockopt$inet_tcp_TCP_REPAIR(r4, 0x6, 0x13, &(0x7f00000014c0), 0x4) setsockopt$inet_sctp_SCTP_AUTH_KEY(r2, 0x84, 0x17, &(0x7f00000019c0)=ANY=[@ANYRES32, @ANYBLOB="0180dc0085756c00ad2a6de83d98bfb6a374263bfa8912d2488dec5d53b2a6ed8eb75a8e1a5d5965dcc32dd76bad5bbc0ae94f9fde8d9903000000bd5a56b108109e8bdeb983abff748ef3e419e710f6d334e5410461779d200de303f3b0f0147277b84484c03f1cd2b7e0b4eb1bcf422d0cb76e13b0adb8ff7f88fcfb9ba520ae6ca46b58e60000005a4919d4ffc8ad67ea97035cb056b56f981dce0c3abee5"], 0x2) setsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000140)=@int=0xeb73, 0x4) preadv(r5, &(0x7f0000000040)=[{&(0x7f0000000400)=""/4096, 0x3ffc00}], 0x1, 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r2, 0x40485404, &(0x7f0000000380)={{0x1, 0x0, 0x7fffffff, 0x1, 0x1001}, 0x800, 0x400000007}) bind$rxrpc(r2, &(0x7f00000000c0)=@in4={0x21, 0x4, 0x2, 0x10, {0x2, 0x4e22, @remote}}, 0x24) syz_init_net_socket$llc(0x1a, 0x1, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x100000073) r6 = syz_genetlink_get_family_id$SEG6(&(0x7f0000001540)='SEG6\x00') sendmsg$SEG6_CMD_GET_TUNSRC(r1, &(0x7f0000001b80)={&(0x7f0000001500)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000001b40)={&(0x7f0000001580)={0x30, r6, 0x300, 0x70bd2c, 0x25dfdbfe, {}, [@SEG6_ATTR_ALGID={0x8, 0x6, 0x5}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, [], 0x1, 0x0}}]}, 0x30}, 0x1, 0x0, 0x0, 0x8880}, 0x8000) 14:27:08 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000001400)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) ioctl$TIOCLINUX5(r0, 0x541c, &(0x7f0000001440)={0x5, 0x4, 0x7, 0x1a, 0xffffffff}) r2 = syz_open_procfs(0x0, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f00000018c0)={@in6={{0xa, 0x4e22, 0xffffffff, @rand_addr="067b4ead43427b60cfd960a90ea6b825", 0x5}}, 0x0, 0x100, 0x0, "74dfddf00e3427a2dfe10be3a64a93c3f716355e8b294625425ea69cd20c41a263b8f456d6ac24acd9bff5118a989696e8d7056236a47ebeb45a99db1f768032d4413b7657d76e38cff450ce30a3318f"}, 0x20f) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000180)={0x6, 0x2, 0x2, 0xf6, 0x2, 0x80000001, 0x3, 0x6fbbfdc3, 0x0}, &(0x7f00000001c0)=0x20) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f00000017c0)={0x1, &(0x7f0000001480)=[{0x8, 0x9e, 0x3f, 0x8}]}) r4 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000001840)='/dev/qat_adf_ctl\x00', 0x100, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_PVERSION(r0, 0x80045700, &(0x7f0000001800)) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000200)={r3, 0x6, 0x2, [0x58b, 0x3]}, 0xc) recvfrom$ax25(0xffffffffffffffff, &(0x7f00000016c0)=""/233, 0xffffffffffffff18, 0x6, 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x13, 0xffffffffffffffff, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000100), 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x0, 0xf8, 0xd7, &(0x7f0000000280)="8f91a271ccd40d914e72153edf7516f0735a7586ca6acf9692c990cd61f8fb363f85ea5e8d191a049a64d2885fbfeaf50b68c20b705c4d4a8627fecadf7f6acff1c4e69bb2baa88e9f4c38f18469e846d1ebd0c1a2b6cb9332a46cada0dbbd7c08315d3b84a70fc2147ea8a77f20f59ddf1712d359433eaed79c40a2de17ffbf6681a40f73615c0f8c1cb92cd3db479117deed3020d95d246f901f9265f855905e8a43ede955619fc5abb9d31ef8d47709d900d460089e15abf4b9f693b2c3a9c96be1cc07dcbca945a10fcf4b432856ce3c85e7f70e5d89f881085b6af4531b9f87eadc2061f9eb2e482ed153a7d2598c6916dfcdb5d951", &(0x7f00000015c0)=""/215, 0xfffffffffffffffc}, 0x28) r5 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000240)='/dev/nullb0\x00', 0x4040, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001880)='./cgroup.net/syz0\x00', 0x1ff) setsockopt$inet_tcp_TCP_REPAIR(r4, 0x6, 0x13, &(0x7f00000014c0), 0x4) setsockopt$inet_sctp_SCTP_AUTH_KEY(r2, 0x84, 0x17, &(0x7f00000019c0)=ANY=[@ANYRES32, @ANYBLOB="0180dc0085756c00ad2a6de83d98bfb6a374263bfa8912d2488dec5d53b2a6ed8eb75a8e1a5d5965dcc32dd76bad5bbc0ae94f9fde8d9903000000bd5a56b108109e8bdeb983abff748ef3e419e710f6d334e5410461779d200de303f3b0f0147277b84484c03f1cd2b7e0b4eb1bcf422d0cb76e13b0adb8ff7f88fcfb9ba520ae6ca46b58e60000005a4919d4ffc8ad67ea97035cb056b56f981dce0c3abee5"], 0x2) setsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000140)=@int=0xeb73, 0x4) preadv(r5, &(0x7f0000000040)=[{&(0x7f0000000400)=""/4096, 0x3ffc00}], 0x1, 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r2, 0x40485404, &(0x7f0000000380)={{0x1, 0x0, 0x7fffffff, 0x1, 0x1001}, 0x800, 0x400000007}) bind$rxrpc(r2, &(0x7f00000000c0)=@in4={0x21, 0x4, 0x2, 0x10, {0x2, 0x4e22, @remote}}, 0x24) syz_init_net_socket$llc(0x1a, 0x1, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x100000073) r6 = syz_genetlink_get_family_id$SEG6(&(0x7f0000001540)='SEG6\x00') sendmsg$SEG6_CMD_GET_TUNSRC(r1, &(0x7f0000001b80)={&(0x7f0000001500)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000001b40)={&(0x7f0000001580)={0x30, r6, 0x300, 0x70bd2c, 0x25dfdbfe, {}, [@SEG6_ATTR_ALGID={0x8, 0x6, 0x5}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, [], 0x1, 0x0}}]}, 0x30}, 0x1, 0x0, 0x0, 0x8880}, 0x8000) 14:27:08 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000001400)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) ioctl$TIOCLINUX5(r0, 0x541c, &(0x7f0000001440)={0x5, 0x4, 0x7, 0x1a, 0xffffffff}) r2 = syz_open_procfs(0x0, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f00000018c0)={@in6={{0xa, 0x4e22, 0xffffffff, @rand_addr="067b4ead43427b60cfd960a90ea6b825", 0x5}}, 0x0, 0x100, 0x0, "74dfddf00e3427a2dfe10be3a64a93c3f716355e8b294625425ea69cd20c41a263b8f456d6ac24acd9bff5118a989696e8d7056236a47ebeb45a99db1f768032d4413b7657d76e38cff450ce30a3318f"}, 0x20f) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000180)={0x6, 0x2, 0x2, 0xf6, 0x2, 0x80000001, 0x3, 0x6fbbfdc3, 0x0}, &(0x7f00000001c0)=0x20) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f00000017c0)={0x1, &(0x7f0000001480)=[{0x8, 0x9e, 0x3f, 0x8}]}) r4 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000001840)='/dev/qat_adf_ctl\x00', 0x100, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_PVERSION(r0, 0x80045700, &(0x7f0000001800)) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000200)={r3, 0x6, 0x2, [0x58b, 0x3]}, 0xc) recvfrom$ax25(0xffffffffffffffff, &(0x7f00000016c0)=""/233, 0xffffffffffffff18, 0x6, 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x13, 0xffffffffffffffff, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000100), 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x0, 0xf8, 0xd7, &(0x7f0000000280)="8f91a271ccd40d914e72153edf7516f0735a7586ca6acf9692c990cd61f8fb363f85ea5e8d191a049a64d2885fbfeaf50b68c20b705c4d4a8627fecadf7f6acff1c4e69bb2baa88e9f4c38f18469e846d1ebd0c1a2b6cb9332a46cada0dbbd7c08315d3b84a70fc2147ea8a77f20f59ddf1712d359433eaed79c40a2de17ffbf6681a40f73615c0f8c1cb92cd3db479117deed3020d95d246f901f9265f855905e8a43ede955619fc5abb9d31ef8d47709d900d460089e15abf4b9f693b2c3a9c96be1cc07dcbca945a10fcf4b432856ce3c85e7f70e5d89f881085b6af4531b9f87eadc2061f9eb2e482ed153a7d2598c6916dfcdb5d951", &(0x7f00000015c0)=""/215, 0xfffffffffffffffc}, 0x28) r5 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000240)='/dev/nullb0\x00', 0x4040, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001880)='./cgroup.net/syz0\x00', 0x1ff) setsockopt$inet_tcp_TCP_REPAIR(r4, 0x6, 0x13, &(0x7f00000014c0), 0x4) setsockopt$inet_sctp_SCTP_AUTH_KEY(r2, 0x84, 0x17, &(0x7f00000019c0)=ANY=[@ANYRES32, @ANYBLOB="0180dc0085756c00ad2a6de83d98bfb6a374263bfa8912d2488dec5d53b2a6ed8eb75a8e1a5d5965dcc32dd76bad5bbc0ae94f9fde8d9903000000bd5a56b108109e8bdeb983abff748ef3e419e710f6d334e5410461779d200de303f3b0f0147277b84484c03f1cd2b7e0b4eb1bcf422d0cb76e13b0adb8ff7f88fcfb9ba520ae6ca46b58e60000005a4919d4ffc8ad67ea97035cb056b56f981dce0c3abee5"], 0x2) setsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000140)=@int=0xeb73, 0x4) preadv(r5, &(0x7f0000000040)=[{&(0x7f0000000400)=""/4096, 0x3ffc00}], 0x1, 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r2, 0x40485404, &(0x7f0000000380)={{0x1, 0x0, 0x7fffffff, 0x1, 0x1001}, 0x800, 0x400000007}) bind$rxrpc(r2, &(0x7f00000000c0)=@in4={0x21, 0x4, 0x2, 0x10, {0x2, 0x4e22, @remote}}, 0x24) syz_init_net_socket$llc(0x1a, 0x1, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x100000073) r6 = syz_genetlink_get_family_id$SEG6(&(0x7f0000001540)='SEG6\x00') sendmsg$SEG6_CMD_GET_TUNSRC(r1, &(0x7f0000001b80)={&(0x7f0000001500)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000001b40)={&(0x7f0000001580)={0x30, r6, 0x300, 0x70bd2c, 0x25dfdbfe, {}, [@SEG6_ATTR_ALGID={0x8, 0x6, 0x5}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, [], 0x1, 0x0}}]}, 0x30}, 0x1, 0x0, 0x0, 0x8880}, 0x8000) 14:27:08 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000001400)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) ioctl$TIOCLINUX5(r0, 0x541c, &(0x7f0000001440)={0x5, 0x4, 0x7, 0x1a, 0xffffffff}) r2 = syz_open_procfs(0x0, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f00000018c0)={@in6={{0xa, 0x4e22, 0xffffffff, @rand_addr="067b4ead43427b60cfd960a90ea6b825", 0x5}}, 0x0, 0x100, 0x0, "74dfddf00e3427a2dfe10be3a64a93c3f716355e8b294625425ea69cd20c41a263b8f456d6ac24acd9bff5118a989696e8d7056236a47ebeb45a99db1f768032d4413b7657d76e38cff450ce30a3318f"}, 0x20f) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000180)={0x6, 0x2, 0x2, 0xf6, 0x2, 0x80000001, 0x3, 0x6fbbfdc3, 0x0}, &(0x7f00000001c0)=0x20) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f00000017c0)={0x1, &(0x7f0000001480)=[{0x8, 0x9e, 0x3f, 0x8}]}) r4 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000001840)='/dev/qat_adf_ctl\x00', 0x100, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_PVERSION(r0, 0x80045700, &(0x7f0000001800)) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000200)={r3, 0x6, 0x2, [0x58b, 0x3]}, 0xc) recvfrom$ax25(0xffffffffffffffff, &(0x7f00000016c0)=""/233, 0xffffffffffffff18, 0x6, 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x13, 0xffffffffffffffff, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000100), 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x0, 0xf8, 0xd7, &(0x7f0000000280)="8f91a271ccd40d914e72153edf7516f0735a7586ca6acf9692c990cd61f8fb363f85ea5e8d191a049a64d2885fbfeaf50b68c20b705c4d4a8627fecadf7f6acff1c4e69bb2baa88e9f4c38f18469e846d1ebd0c1a2b6cb9332a46cada0dbbd7c08315d3b84a70fc2147ea8a77f20f59ddf1712d359433eaed79c40a2de17ffbf6681a40f73615c0f8c1cb92cd3db479117deed3020d95d246f901f9265f855905e8a43ede955619fc5abb9d31ef8d47709d900d460089e15abf4b9f693b2c3a9c96be1cc07dcbca945a10fcf4b432856ce3c85e7f70e5d89f881085b6af4531b9f87eadc2061f9eb2e482ed153a7d2598c6916dfcdb5d951", &(0x7f00000015c0)=""/215, 0xfffffffffffffffc}, 0x28) r5 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000240)='/dev/nullb0\x00', 0x4040, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001880)='./cgroup.net/syz0\x00', 0x1ff) setsockopt$inet_tcp_TCP_REPAIR(r4, 0x6, 0x13, &(0x7f00000014c0), 0x4) setsockopt$inet_sctp_SCTP_AUTH_KEY(r2, 0x84, 0x17, &(0x7f00000019c0)=ANY=[@ANYRES32, @ANYBLOB="0180dc0085756c00ad2a6de83d98bfb6a374263bfa8912d2488dec5d53b2a6ed8eb75a8e1a5d5965dcc32dd76bad5bbc0ae94f9fde8d9903000000bd5a56b108109e8bdeb983abff748ef3e419e710f6d334e5410461779d200de303f3b0f0147277b84484c03f1cd2b7e0b4eb1bcf422d0cb76e13b0adb8ff7f88fcfb9ba520ae6ca46b58e60000005a4919d4ffc8ad67ea97035cb056b56f981dce0c3abee5"], 0x2) setsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000140)=@int=0xeb73, 0x4) preadv(r5, &(0x7f0000000040)=[{&(0x7f0000000400)=""/4096, 0x3ffc00}], 0x1, 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r2, 0x40485404, &(0x7f0000000380)={{0x1, 0x0, 0x7fffffff, 0x1, 0x1001}, 0x800, 0x400000007}) bind$rxrpc(r2, &(0x7f00000000c0)=@in4={0x21, 0x4, 0x2, 0x10, {0x2, 0x4e22, @remote}}, 0x24) syz_init_net_socket$llc(0x1a, 0x1, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x100000073) r6 = syz_genetlink_get_family_id$SEG6(&(0x7f0000001540)='SEG6\x00') sendmsg$SEG6_CMD_GET_TUNSRC(r1, &(0x7f0000001b80)={&(0x7f0000001500)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000001b40)={&(0x7f0000001580)={0x30, r6, 0x300, 0x70bd2c, 0x25dfdbfe, {}, [@SEG6_ATTR_ALGID={0x8, 0x6, 0x5}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, [], 0x1, 0x0}}]}, 0x30}, 0x1, 0x0, 0x0, 0x8880}, 0x8000) 14:27:08 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000001400)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) ioctl$TIOCLINUX5(r0, 0x541c, &(0x7f0000001440)={0x5, 0x4, 0x7, 0x1a, 0xffffffff}) r2 = syz_open_procfs(0x0, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f00000018c0)={@in6={{0xa, 0x4e22, 0xffffffff, @rand_addr="067b4ead43427b60cfd960a90ea6b825", 0x5}}, 0x0, 0x100, 0x0, "74dfddf00e3427a2dfe10be3a64a93c3f716355e8b294625425ea69cd20c41a263b8f456d6ac24acd9bff5118a989696e8d7056236a47ebeb45a99db1f768032d4413b7657d76e38cff450ce30a3318f"}, 0x20f) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000180)={0x6, 0x2, 0x2, 0xf6, 0x2, 0x80000001, 0x3, 0x6fbbfdc3, 0x0}, &(0x7f00000001c0)=0x20) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f00000017c0)={0x1, &(0x7f0000001480)=[{0x8, 0x9e, 0x3f, 0x8}]}) r4 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000001840)='/dev/qat_adf_ctl\x00', 0x100, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_PVERSION(r0, 0x80045700, &(0x7f0000001800)) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000200)={r3, 0x6, 0x2, [0x58b, 0x3]}, 0xc) recvfrom$ax25(0xffffffffffffffff, &(0x7f00000016c0)=""/233, 0xffffffffffffff18, 0x6, 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x13, 0xffffffffffffffff, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000100), 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x0, 0xf8, 0xd7, &(0x7f0000000280)="8f91a271ccd40d914e72153edf7516f0735a7586ca6acf9692c990cd61f8fb363f85ea5e8d191a049a64d2885fbfeaf50b68c20b705c4d4a8627fecadf7f6acff1c4e69bb2baa88e9f4c38f18469e846d1ebd0c1a2b6cb9332a46cada0dbbd7c08315d3b84a70fc2147ea8a77f20f59ddf1712d359433eaed79c40a2de17ffbf6681a40f73615c0f8c1cb92cd3db479117deed3020d95d246f901f9265f855905e8a43ede955619fc5abb9d31ef8d47709d900d460089e15abf4b9f693b2c3a9c96be1cc07dcbca945a10fcf4b432856ce3c85e7f70e5d89f881085b6af4531b9f87eadc2061f9eb2e482ed153a7d2598c6916dfcdb5d951", &(0x7f00000015c0)=""/215, 0xfffffffffffffffc}, 0x28) r5 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000240)='/dev/nullb0\x00', 0x4040, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001880)='./cgroup.net/syz0\x00', 0x1ff) setsockopt$inet_tcp_TCP_REPAIR(r4, 0x6, 0x13, &(0x7f00000014c0), 0x4) setsockopt$inet_sctp_SCTP_AUTH_KEY(r2, 0x84, 0x17, &(0x7f00000019c0)=ANY=[@ANYRES32, @ANYBLOB="0180dc0085756c00ad2a6de83d98bfb6a374263bfa8912d2488dec5d53b2a6ed8eb75a8e1a5d5965dcc32dd76bad5bbc0ae94f9fde8d9903000000bd5a56b108109e8bdeb983abff748ef3e419e710f6d334e5410461779d200de303f3b0f0147277b84484c03f1cd2b7e0b4eb1bcf422d0cb76e13b0adb8ff7f88fcfb9ba520ae6ca46b58e60000005a4919d4ffc8ad67ea97035cb056b56f981dce0c3abee5"], 0x2) setsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000140)=@int=0xeb73, 0x4) preadv(r5, &(0x7f0000000040)=[{&(0x7f0000000400)=""/4096, 0x3ffc00}], 0x1, 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r2, 0x40485404, &(0x7f0000000380)={{0x1, 0x0, 0x7fffffff, 0x1, 0x1001}, 0x800, 0x400000007}) bind$rxrpc(r2, &(0x7f00000000c0)=@in4={0x21, 0x4, 0x2, 0x10, {0x2, 0x4e22, @remote}}, 0x24) syz_init_net_socket$llc(0x1a, 0x1, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x100000073) r6 = syz_genetlink_get_family_id$SEG6(&(0x7f0000001540)='SEG6\x00') sendmsg$SEG6_CMD_GET_TUNSRC(r1, &(0x7f0000001b80)={&(0x7f0000001500)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000001b40)={&(0x7f0000001580)={0x30, r6, 0x300, 0x70bd2c, 0x25dfdbfe, {}, [@SEG6_ATTR_ALGID={0x8, 0x6, 0x5}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, [], 0x1, 0x0}}]}, 0x30}, 0x1, 0x0, 0x0, 0x8880}, 0x8000) 14:27:08 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000001400)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) ioctl$TIOCLINUX5(r0, 0x541c, &(0x7f0000001440)={0x5, 0x4, 0x7, 0x1a, 0xffffffff}) r2 = syz_open_procfs(0x0, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f00000018c0)={@in6={{0xa, 0x4e22, 0xffffffff, @rand_addr="067b4ead43427b60cfd960a90ea6b825", 0x5}}, 0x0, 0x100, 0x0, "74dfddf00e3427a2dfe10be3a64a93c3f716355e8b294625425ea69cd20c41a263b8f456d6ac24acd9bff5118a989696e8d7056236a47ebeb45a99db1f768032d4413b7657d76e38cff450ce30a3318f"}, 0x20f) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000180)={0x6, 0x2, 0x2, 0xf6, 0x2, 0x80000001, 0x3, 0x6fbbfdc3, 0x0}, &(0x7f00000001c0)=0x20) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f00000017c0)={0x1, &(0x7f0000001480)=[{0x8, 0x9e, 0x3f, 0x8}]}) r4 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000001840)='/dev/qat_adf_ctl\x00', 0x100, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_PVERSION(r0, 0x80045700, &(0x7f0000001800)) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000200)={r3, 0x6, 0x2, [0x58b, 0x3]}, 0xc) recvfrom$ax25(0xffffffffffffffff, &(0x7f00000016c0)=""/233, 0xffffffffffffff18, 0x6, 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x13, 0xffffffffffffffff, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000100), 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x0, 0xf8, 0xd7, &(0x7f0000000280)="8f91a271ccd40d914e72153edf7516f0735a7586ca6acf9692c990cd61f8fb363f85ea5e8d191a049a64d2885fbfeaf50b68c20b705c4d4a8627fecadf7f6acff1c4e69bb2baa88e9f4c38f18469e846d1ebd0c1a2b6cb9332a46cada0dbbd7c08315d3b84a70fc2147ea8a77f20f59ddf1712d359433eaed79c40a2de17ffbf6681a40f73615c0f8c1cb92cd3db479117deed3020d95d246f901f9265f855905e8a43ede955619fc5abb9d31ef8d47709d900d460089e15abf4b9f693b2c3a9c96be1cc07dcbca945a10fcf4b432856ce3c85e7f70e5d89f881085b6af4531b9f87eadc2061f9eb2e482ed153a7d2598c6916dfcdb5d951", &(0x7f00000015c0)=""/215, 0xfffffffffffffffc}, 0x28) r5 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000240)='/dev/nullb0\x00', 0x4040, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001880)='./cgroup.net/syz0\x00', 0x1ff) setsockopt$inet_tcp_TCP_REPAIR(r4, 0x6, 0x13, &(0x7f00000014c0), 0x4) setsockopt$inet_sctp_SCTP_AUTH_KEY(r2, 0x84, 0x17, &(0x7f00000019c0)=ANY=[@ANYRES32, @ANYBLOB="0180dc0085756c00ad2a6de83d98bfb6a374263bfa8912d2488dec5d53b2a6ed8eb75a8e1a5d5965dcc32dd76bad5bbc0ae94f9fde8d9903000000bd5a56b108109e8bdeb983abff748ef3e419e710f6d334e5410461779d200de303f3b0f0147277b84484c03f1cd2b7e0b4eb1bcf422d0cb76e13b0adb8ff7f88fcfb9ba520ae6ca46b58e60000005a4919d4ffc8ad67ea97035cb056b56f981dce0c3abee5"], 0x2) setsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000140)=@int=0xeb73, 0x4) preadv(r5, &(0x7f0000000040)=[{&(0x7f0000000400)=""/4096, 0x3ffc00}], 0x1, 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r2, 0x40485404, &(0x7f0000000380)={{0x1, 0x0, 0x7fffffff, 0x1, 0x1001}, 0x800, 0x400000007}) bind$rxrpc(r2, &(0x7f00000000c0)=@in4={0x21, 0x4, 0x2, 0x10, {0x2, 0x4e22, @remote}}, 0x24) syz_init_net_socket$llc(0x1a, 0x1, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x100000073) r6 = syz_genetlink_get_family_id$SEG6(&(0x7f0000001540)='SEG6\x00') sendmsg$SEG6_CMD_GET_TUNSRC(r1, &(0x7f0000001b80)={&(0x7f0000001500)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000001b40)={&(0x7f0000001580)={0x30, r6, 0x300, 0x70bd2c, 0x25dfdbfe, {}, [@SEG6_ATTR_ALGID={0x8, 0x6, 0x5}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, [], 0x1, 0x0}}]}, 0x30}, 0x1, 0x0, 0x0, 0x8880}, 0x8000) 14:27:08 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000001400)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) ioctl$TIOCLINUX5(r0, 0x541c, &(0x7f0000001440)={0x5, 0x4, 0x7, 0x1a, 0xffffffff}) r2 = syz_open_procfs(0x0, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f00000018c0)={@in6={{0xa, 0x4e22, 0xffffffff, @rand_addr="067b4ead43427b60cfd960a90ea6b825", 0x5}}, 0x0, 0x100, 0x0, "74dfddf00e3427a2dfe10be3a64a93c3f716355e8b294625425ea69cd20c41a263b8f456d6ac24acd9bff5118a989696e8d7056236a47ebeb45a99db1f768032d4413b7657d76e38cff450ce30a3318f"}, 0x20f) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000180)={0x6, 0x2, 0x2, 0xf6, 0x2, 0x80000001, 0x3, 0x6fbbfdc3, 0x0}, &(0x7f00000001c0)=0x20) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f00000017c0)={0x1, &(0x7f0000001480)=[{0x8, 0x9e, 0x3f, 0x8}]}) r4 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000001840)='/dev/qat_adf_ctl\x00', 0x100, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_PVERSION(r0, 0x80045700, &(0x7f0000001800)) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000200)={r3, 0x6, 0x2, [0x58b, 0x3]}, 0xc) recvfrom$ax25(0xffffffffffffffff, &(0x7f00000016c0)=""/233, 0xffffffffffffff18, 0x6, 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x13, 0xffffffffffffffff, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000100), 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x0, 0xf8, 0xd7, &(0x7f0000000280)="8f91a271ccd40d914e72153edf7516f0735a7586ca6acf9692c990cd61f8fb363f85ea5e8d191a049a64d2885fbfeaf50b68c20b705c4d4a8627fecadf7f6acff1c4e69bb2baa88e9f4c38f18469e846d1ebd0c1a2b6cb9332a46cada0dbbd7c08315d3b84a70fc2147ea8a77f20f59ddf1712d359433eaed79c40a2de17ffbf6681a40f73615c0f8c1cb92cd3db479117deed3020d95d246f901f9265f855905e8a43ede955619fc5abb9d31ef8d47709d900d460089e15abf4b9f693b2c3a9c96be1cc07dcbca945a10fcf4b432856ce3c85e7f70e5d89f881085b6af4531b9f87eadc2061f9eb2e482ed153a7d2598c6916dfcdb5d951", &(0x7f00000015c0)=""/215, 0xfffffffffffffffc}, 0x28) r5 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000240)='/dev/nullb0\x00', 0x4040, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001880)='./cgroup.net/syz0\x00', 0x1ff) setsockopt$inet_tcp_TCP_REPAIR(r4, 0x6, 0x13, &(0x7f00000014c0), 0x4) setsockopt$inet_sctp_SCTP_AUTH_KEY(r2, 0x84, 0x17, &(0x7f00000019c0)=ANY=[@ANYRES32, @ANYBLOB="0180dc0085756c00ad2a6de83d98bfb6a374263bfa8912d2488dec5d53b2a6ed8eb75a8e1a5d5965dcc32dd76bad5bbc0ae94f9fde8d9903000000bd5a56b108109e8bdeb983abff748ef3e419e710f6d334e5410461779d200de303f3b0f0147277b84484c03f1cd2b7e0b4eb1bcf422d0cb76e13b0adb8ff7f88fcfb9ba520ae6ca46b58e60000005a4919d4ffc8ad67ea97035cb056b56f981dce0c3abee5"], 0x2) setsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000140)=@int=0xeb73, 0x4) preadv(r5, &(0x7f0000000040)=[{&(0x7f0000000400)=""/4096, 0x3ffc00}], 0x1, 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r2, 0x40485404, &(0x7f0000000380)={{0x1, 0x0, 0x7fffffff, 0x1, 0x1001}, 0x800, 0x400000007}) bind$rxrpc(r2, &(0x7f00000000c0)=@in4={0x21, 0x4, 0x2, 0x10, {0x2, 0x4e22, @remote}}, 0x24) syz_init_net_socket$llc(0x1a, 0x1, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x100000073) r6 = syz_genetlink_get_family_id$SEG6(&(0x7f0000001540)='SEG6\x00') sendmsg$SEG6_CMD_GET_TUNSRC(r1, &(0x7f0000001b80)={&(0x7f0000001500)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000001b40)={&(0x7f0000001580)={0x30, r6, 0x300, 0x70bd2c, 0x25dfdbfe, {}, [@SEG6_ATTR_ALGID={0x8, 0x6, 0x5}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, [], 0x1, 0x0}}]}, 0x30}, 0x1, 0x0, 0x0, 0x8880}, 0x8000) 14:27:08 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000001400)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) ioctl$TIOCLINUX5(r0, 0x541c, &(0x7f0000001440)={0x5, 0x4, 0x7, 0x1a, 0xffffffff}) r2 = syz_open_procfs(0x0, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f00000018c0)={@in6={{0xa, 0x4e22, 0xffffffff, @rand_addr="067b4ead43427b60cfd960a90ea6b825", 0x5}}, 0x0, 0x100, 0x0, "74dfddf00e3427a2dfe10be3a64a93c3f716355e8b294625425ea69cd20c41a263b8f456d6ac24acd9bff5118a989696e8d7056236a47ebeb45a99db1f768032d4413b7657d76e38cff450ce30a3318f"}, 0x20f) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000180)={0x6, 0x2, 0x2, 0xf6, 0x2, 0x80000001, 0x3, 0x6fbbfdc3, 0x0}, &(0x7f00000001c0)=0x20) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f00000017c0)={0x1, &(0x7f0000001480)=[{0x8, 0x9e, 0x3f, 0x8}]}) r4 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000001840)='/dev/qat_adf_ctl\x00', 0x100, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_PVERSION(r0, 0x80045700, &(0x7f0000001800)) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000200)={r3, 0x6, 0x2, [0x58b, 0x3]}, 0xc) recvfrom$ax25(0xffffffffffffffff, &(0x7f00000016c0)=""/233, 0xffffffffffffff18, 0x6, 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x13, 0xffffffffffffffff, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000100), 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x0, 0xf8, 0xd7, &(0x7f0000000280)="8f91a271ccd40d914e72153edf7516f0735a7586ca6acf9692c990cd61f8fb363f85ea5e8d191a049a64d2885fbfeaf50b68c20b705c4d4a8627fecadf7f6acff1c4e69bb2baa88e9f4c38f18469e846d1ebd0c1a2b6cb9332a46cada0dbbd7c08315d3b84a70fc2147ea8a77f20f59ddf1712d359433eaed79c40a2de17ffbf6681a40f73615c0f8c1cb92cd3db479117deed3020d95d246f901f9265f855905e8a43ede955619fc5abb9d31ef8d47709d900d460089e15abf4b9f693b2c3a9c96be1cc07dcbca945a10fcf4b432856ce3c85e7f70e5d89f881085b6af4531b9f87eadc2061f9eb2e482ed153a7d2598c6916dfcdb5d951", &(0x7f00000015c0)=""/215, 0xfffffffffffffffc}, 0x28) r5 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000240)='/dev/nullb0\x00', 0x4040, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001880)='./cgroup.net/syz0\x00', 0x1ff) setsockopt$inet_tcp_TCP_REPAIR(r4, 0x6, 0x13, &(0x7f00000014c0), 0x4) setsockopt$inet_sctp_SCTP_AUTH_KEY(r2, 0x84, 0x17, &(0x7f00000019c0)=ANY=[@ANYRES32, @ANYBLOB="0180dc0085756c00ad2a6de83d98bfb6a374263bfa8912d2488dec5d53b2a6ed8eb75a8e1a5d5965dcc32dd76bad5bbc0ae94f9fde8d9903000000bd5a56b108109e8bdeb983abff748ef3e419e710f6d334e5410461779d200de303f3b0f0147277b84484c03f1cd2b7e0b4eb1bcf422d0cb76e13b0adb8ff7f88fcfb9ba520ae6ca46b58e60000005a4919d4ffc8ad67ea97035cb056b56f981dce0c3abee5"], 0x2) setsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000140)=@int=0xeb73, 0x4) preadv(r5, &(0x7f0000000040)=[{&(0x7f0000000400)=""/4096, 0x3ffc00}], 0x1, 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r2, 0x40485404, &(0x7f0000000380)={{0x1, 0x0, 0x7fffffff, 0x1, 0x1001}, 0x800, 0x400000007}) bind$rxrpc(r2, &(0x7f00000000c0)=@in4={0x21, 0x4, 0x2, 0x10, {0x2, 0x4e22, @remote}}, 0x24) syz_init_net_socket$llc(0x1a, 0x1, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x100000073) r6 = syz_genetlink_get_family_id$SEG6(&(0x7f0000001540)='SEG6\x00') sendmsg$SEG6_CMD_GET_TUNSRC(r1, &(0x7f0000001b80)={&(0x7f0000001500)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000001b40)={&(0x7f0000001580)={0x30, r6, 0x300, 0x70bd2c, 0x25dfdbfe, {}, [@SEG6_ATTR_ALGID={0x8, 0x6, 0x5}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, [], 0x1, 0x0}}]}, 0x30}, 0x1, 0x0, 0x0, 0x8880}, 0x8000) 14:27:08 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000001400)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) ioctl$TIOCLINUX5(r0, 0x541c, &(0x7f0000001440)={0x5, 0x4, 0x7, 0x1a, 0xffffffff}) r2 = syz_open_procfs(0x0, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f00000018c0)={@in6={{0xa, 0x4e22, 0xffffffff, @rand_addr="067b4ead43427b60cfd960a90ea6b825", 0x5}}, 0x0, 0x100, 0x0, "74dfddf00e3427a2dfe10be3a64a93c3f716355e8b294625425ea69cd20c41a263b8f456d6ac24acd9bff5118a989696e8d7056236a47ebeb45a99db1f768032d4413b7657d76e38cff450ce30a3318f"}, 0x20f) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000180)={0x6, 0x2, 0x2, 0xf6, 0x2, 0x80000001, 0x3, 0x6fbbfdc3, 0x0}, &(0x7f00000001c0)=0x20) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f00000017c0)={0x1, &(0x7f0000001480)=[{0x8, 0x9e, 0x3f, 0x8}]}) r4 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000001840)='/dev/qat_adf_ctl\x00', 0x100, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_PVERSION(r0, 0x80045700, &(0x7f0000001800)) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000200)={r3, 0x6, 0x2, [0x58b, 0x3]}, 0xc) recvfrom$ax25(0xffffffffffffffff, &(0x7f00000016c0)=""/233, 0xffffffffffffff18, 0x6, 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x13, 0xffffffffffffffff, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000100), 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x0, 0xf8, 0xd7, &(0x7f0000000280)="8f91a271ccd40d914e72153edf7516f0735a7586ca6acf9692c990cd61f8fb363f85ea5e8d191a049a64d2885fbfeaf50b68c20b705c4d4a8627fecadf7f6acff1c4e69bb2baa88e9f4c38f18469e846d1ebd0c1a2b6cb9332a46cada0dbbd7c08315d3b84a70fc2147ea8a77f20f59ddf1712d359433eaed79c40a2de17ffbf6681a40f73615c0f8c1cb92cd3db479117deed3020d95d246f901f9265f855905e8a43ede955619fc5abb9d31ef8d47709d900d460089e15abf4b9f693b2c3a9c96be1cc07dcbca945a10fcf4b432856ce3c85e7f70e5d89f881085b6af4531b9f87eadc2061f9eb2e482ed153a7d2598c6916dfcdb5d951", &(0x7f00000015c0)=""/215, 0xfffffffffffffffc}, 0x28) r5 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000240)='/dev/nullb0\x00', 0x4040, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001880)='./cgroup.net/syz0\x00', 0x1ff) setsockopt$inet_tcp_TCP_REPAIR(r4, 0x6, 0x13, &(0x7f00000014c0), 0x4) setsockopt$inet_sctp_SCTP_AUTH_KEY(r2, 0x84, 0x17, &(0x7f00000019c0)=ANY=[@ANYRES32, @ANYBLOB="0180dc0085756c00ad2a6de83d98bfb6a374263bfa8912d2488dec5d53b2a6ed8eb75a8e1a5d5965dcc32dd76bad5bbc0ae94f9fde8d9903000000bd5a56b108109e8bdeb983abff748ef3e419e710f6d334e5410461779d200de303f3b0f0147277b84484c03f1cd2b7e0b4eb1bcf422d0cb76e13b0adb8ff7f88fcfb9ba520ae6ca46b58e60000005a4919d4ffc8ad67ea97035cb056b56f981dce0c3abee5"], 0x2) setsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000140)=@int=0xeb73, 0x4) preadv(r5, &(0x7f0000000040)=[{&(0x7f0000000400)=""/4096, 0x3ffc00}], 0x1, 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r2, 0x40485404, &(0x7f0000000380)={{0x1, 0x0, 0x7fffffff, 0x1, 0x1001}, 0x800, 0x400000007}) bind$rxrpc(r2, &(0x7f00000000c0)=@in4={0x21, 0x4, 0x2, 0x10, {0x2, 0x4e22, @remote}}, 0x24) syz_init_net_socket$llc(0x1a, 0x1, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x100000073) r6 = syz_genetlink_get_family_id$SEG6(&(0x7f0000001540)='SEG6\x00') sendmsg$SEG6_CMD_GET_TUNSRC(r1, &(0x7f0000001b80)={&(0x7f0000001500)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000001b40)={&(0x7f0000001580)={0x30, r6, 0x300, 0x70bd2c, 0x25dfdbfe, {}, [@SEG6_ATTR_ALGID={0x8, 0x6, 0x5}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, [], 0x1, 0x0}}]}, 0x30}, 0x1, 0x0, 0x0, 0x8880}, 0x8000) 14:27:08 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000006ffc)=0x3, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r0, &(0x7f0000000300)="0503000108003e0000000140c52cf7c25975e697b02f86dd6b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0x15e, 0x80, 0x0, 0x0) 14:27:08 executing program 3: clone(0x40000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x3593c3e4fde2e535, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 14:27:08 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000001400)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) ioctl$TIOCLINUX5(r0, 0x541c, &(0x7f0000001440)={0x5, 0x4, 0x7, 0x1a, 0xffffffff}) r2 = syz_open_procfs(0x0, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f00000018c0)={@in6={{0xa, 0x4e22, 0xffffffff, @rand_addr="067b4ead43427b60cfd960a90ea6b825", 0x5}}, 0x0, 0x100, 0x0, "74dfddf00e3427a2dfe10be3a64a93c3f716355e8b294625425ea69cd20c41a263b8f456d6ac24acd9bff5118a989696e8d7056236a47ebeb45a99db1f768032d4413b7657d76e38cff450ce30a3318f"}, 0x20f) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000180)={0x6, 0x2, 0x2, 0xf6, 0x2, 0x80000001, 0x3, 0x6fbbfdc3, 0x0}, &(0x7f00000001c0)=0x20) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f00000017c0)={0x1, &(0x7f0000001480)=[{0x8, 0x9e, 0x3f, 0x8}]}) r4 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000001840)='/dev/qat_adf_ctl\x00', 0x100, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_PVERSION(r0, 0x80045700, &(0x7f0000001800)) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000200)={r3, 0x6, 0x2, [0x58b, 0x3]}, 0xc) recvfrom$ax25(0xffffffffffffffff, &(0x7f00000016c0)=""/233, 0xffffffffffffff18, 0x6, 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x13, 0xffffffffffffffff, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000100), 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x0, 0xf8, 0xd7, &(0x7f0000000280)="8f91a271ccd40d914e72153edf7516f0735a7586ca6acf9692c990cd61f8fb363f85ea5e8d191a049a64d2885fbfeaf50b68c20b705c4d4a8627fecadf7f6acff1c4e69bb2baa88e9f4c38f18469e846d1ebd0c1a2b6cb9332a46cada0dbbd7c08315d3b84a70fc2147ea8a77f20f59ddf1712d359433eaed79c40a2de17ffbf6681a40f73615c0f8c1cb92cd3db479117deed3020d95d246f901f9265f855905e8a43ede955619fc5abb9d31ef8d47709d900d460089e15abf4b9f693b2c3a9c96be1cc07dcbca945a10fcf4b432856ce3c85e7f70e5d89f881085b6af4531b9f87eadc2061f9eb2e482ed153a7d2598c6916dfcdb5d951", &(0x7f00000015c0)=""/215, 0xfffffffffffffffc}, 0x28) r5 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000240)='/dev/nullb0\x00', 0x4040, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001880)='./cgroup.net/syz0\x00', 0x1ff) setsockopt$inet_tcp_TCP_REPAIR(r4, 0x6, 0x13, &(0x7f00000014c0), 0x4) setsockopt$inet_sctp_SCTP_AUTH_KEY(r2, 0x84, 0x17, &(0x7f00000019c0)=ANY=[@ANYRES32, @ANYBLOB="0180dc0085756c00ad2a6de83d98bfb6a374263bfa8912d2488dec5d53b2a6ed8eb75a8e1a5d5965dcc32dd76bad5bbc0ae94f9fde8d9903000000bd5a56b108109e8bdeb983abff748ef3e419e710f6d334e5410461779d200de303f3b0f0147277b84484c03f1cd2b7e0b4eb1bcf422d0cb76e13b0adb8ff7f88fcfb9ba520ae6ca46b58e60000005a4919d4ffc8ad67ea97035cb056b56f981dce0c3abee5"], 0x2) setsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000140)=@int=0xeb73, 0x4) preadv(r5, &(0x7f0000000040)=[{&(0x7f0000000400)=""/4096, 0x3ffc00}], 0x1, 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r2, 0x40485404, &(0x7f0000000380)={{0x1, 0x0, 0x7fffffff, 0x1, 0x1001}, 0x800, 0x400000007}) bind$rxrpc(r2, &(0x7f00000000c0)=@in4={0x21, 0x4, 0x2, 0x10, {0x2, 0x4e22, @remote}}, 0x24) syz_init_net_socket$llc(0x1a, 0x1, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x100000073) r6 = syz_genetlink_get_family_id$SEG6(&(0x7f0000001540)='SEG6\x00') sendmsg$SEG6_CMD_GET_TUNSRC(r1, &(0x7f0000001b80)={&(0x7f0000001500)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000001b40)={&(0x7f0000001580)={0x30, r6, 0x300, 0x70bd2c, 0x25dfdbfe, {}, [@SEG6_ATTR_ALGID={0x8, 0x6, 0x5}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, [], 0x1, 0x0}}]}, 0x30}, 0x1, 0x0, 0x0, 0x8880}, 0x8000) 14:27:08 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000006ffc)=0x3, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r0, &(0x7f0000000300)="0503000108003e0000000140c52cf7c25975e697b02f86dd6b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0x15e, 0x80, 0x0, 0x0) [ 370.437731][T30104] IPVS: ftp: loaded support on port[0] = 21 14:27:08 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000001400)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) ioctl$TIOCLINUX5(r0, 0x541c, &(0x7f0000001440)={0x5, 0x4, 0x7, 0x1a, 0xffffffff}) r2 = syz_open_procfs(0x0, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f00000018c0)={@in6={{0xa, 0x4e22, 0xffffffff, @rand_addr="067b4ead43427b60cfd960a90ea6b825", 0x5}}, 0x0, 0x100, 0x0, "74dfddf00e3427a2dfe10be3a64a93c3f716355e8b294625425ea69cd20c41a263b8f456d6ac24acd9bff5118a989696e8d7056236a47ebeb45a99db1f768032d4413b7657d76e38cff450ce30a3318f"}, 0x20f) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000180)={0x6, 0x2, 0x2, 0xf6, 0x2, 0x80000001, 0x3, 0x6fbbfdc3, 0x0}, &(0x7f00000001c0)=0x20) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f00000017c0)={0x1, &(0x7f0000001480)=[{0x8, 0x9e, 0x3f, 0x8}]}) r4 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000001840)='/dev/qat_adf_ctl\x00', 0x100, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_PVERSION(r0, 0x80045700, &(0x7f0000001800)) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000200)={r3, 0x6, 0x2, [0x58b, 0x3]}, 0xc) recvfrom$ax25(0xffffffffffffffff, &(0x7f00000016c0)=""/233, 0xffffffffffffff18, 0x6, 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x13, 0xffffffffffffffff, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000100), 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x0, 0xf8, 0xd7, &(0x7f0000000280)="8f91a271ccd40d914e72153edf7516f0735a7586ca6acf9692c990cd61f8fb363f85ea5e8d191a049a64d2885fbfeaf50b68c20b705c4d4a8627fecadf7f6acff1c4e69bb2baa88e9f4c38f18469e846d1ebd0c1a2b6cb9332a46cada0dbbd7c08315d3b84a70fc2147ea8a77f20f59ddf1712d359433eaed79c40a2de17ffbf6681a40f73615c0f8c1cb92cd3db479117deed3020d95d246f901f9265f855905e8a43ede955619fc5abb9d31ef8d47709d900d460089e15abf4b9f693b2c3a9c96be1cc07dcbca945a10fcf4b432856ce3c85e7f70e5d89f881085b6af4531b9f87eadc2061f9eb2e482ed153a7d2598c6916dfcdb5d951", &(0x7f00000015c0)=""/215, 0xfffffffffffffffc}, 0x28) r5 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000240)='/dev/nullb0\x00', 0x4040, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001880)='./cgroup.net/syz0\x00', 0x1ff) setsockopt$inet_tcp_TCP_REPAIR(r4, 0x6, 0x13, &(0x7f00000014c0), 0x4) setsockopt$inet_sctp_SCTP_AUTH_KEY(r2, 0x84, 0x17, &(0x7f00000019c0)=ANY=[@ANYRES32, @ANYBLOB="0180dc0085756c00ad2a6de83d98bfb6a374263bfa8912d2488dec5d53b2a6ed8eb75a8e1a5d5965dcc32dd76bad5bbc0ae94f9fde8d9903000000bd5a56b108109e8bdeb983abff748ef3e419e710f6d334e5410461779d200de303f3b0f0147277b84484c03f1cd2b7e0b4eb1bcf422d0cb76e13b0adb8ff7f88fcfb9ba520ae6ca46b58e60000005a4919d4ffc8ad67ea97035cb056b56f981dce0c3abee5"], 0x2) setsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000140)=@int=0xeb73, 0x4) preadv(r5, &(0x7f0000000040)=[{&(0x7f0000000400)=""/4096, 0x3ffc00}], 0x1, 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r2, 0x40485404, &(0x7f0000000380)={{0x1, 0x0, 0x7fffffff, 0x1, 0x1001}, 0x800, 0x400000007}) bind$rxrpc(r2, &(0x7f00000000c0)=@in4={0x21, 0x4, 0x2, 0x10, {0x2, 0x4e22, @remote}}, 0x24) syz_init_net_socket$llc(0x1a, 0x1, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x100000073) r6 = syz_genetlink_get_family_id$SEG6(&(0x7f0000001540)='SEG6\x00') sendmsg$SEG6_CMD_GET_TUNSRC(r1, &(0x7f0000001b80)={&(0x7f0000001500)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000001b40)={&(0x7f0000001580)={0x30, r6, 0x300, 0x70bd2c, 0x25dfdbfe, {}, [@SEG6_ATTR_ALGID={0x8, 0x6, 0x5}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, [], 0x1, 0x0}}]}, 0x30}, 0x1, 0x0, 0x0, 0x8880}, 0x8000) [ 370.483462][T30108] IPVS: ftp: loaded support on port[0] = 21 14:27:08 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000001400)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) ioctl$TIOCLINUX5(r0, 0x541c, &(0x7f0000001440)={0x5, 0x4, 0x7, 0x1a, 0xffffffff}) r2 = syz_open_procfs(0x0, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f00000018c0)={@in6={{0xa, 0x4e22, 0xffffffff, @rand_addr="067b4ead43427b60cfd960a90ea6b825", 0x5}}, 0x0, 0x100, 0x0, "74dfddf00e3427a2dfe10be3a64a93c3f716355e8b294625425ea69cd20c41a263b8f456d6ac24acd9bff5118a989696e8d7056236a47ebeb45a99db1f768032d4413b7657d76e38cff450ce30a3318f"}, 0x20f) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000180)={0x6, 0x2, 0x2, 0xf6, 0x2, 0x80000001, 0x3, 0x6fbbfdc3, 0x0}, &(0x7f00000001c0)=0x20) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f00000017c0)={0x1, &(0x7f0000001480)=[{0x8, 0x9e, 0x3f, 0x8}]}) r4 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000001840)='/dev/qat_adf_ctl\x00', 0x100, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_PVERSION(r0, 0x80045700, &(0x7f0000001800)) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000200)={r3, 0x6, 0x2, [0x58b, 0x3]}, 0xc) recvfrom$ax25(0xffffffffffffffff, &(0x7f00000016c0)=""/233, 0xffffffffffffff18, 0x6, 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x13, 0xffffffffffffffff, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000100), 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x0, 0xf8, 0xd7, &(0x7f0000000280)="8f91a271ccd40d914e72153edf7516f0735a7586ca6acf9692c990cd61f8fb363f85ea5e8d191a049a64d2885fbfeaf50b68c20b705c4d4a8627fecadf7f6acff1c4e69bb2baa88e9f4c38f18469e846d1ebd0c1a2b6cb9332a46cada0dbbd7c08315d3b84a70fc2147ea8a77f20f59ddf1712d359433eaed79c40a2de17ffbf6681a40f73615c0f8c1cb92cd3db479117deed3020d95d246f901f9265f855905e8a43ede955619fc5abb9d31ef8d47709d900d460089e15abf4b9f693b2c3a9c96be1cc07dcbca945a10fcf4b432856ce3c85e7f70e5d89f881085b6af4531b9f87eadc2061f9eb2e482ed153a7d2598c6916dfcdb5d951", &(0x7f00000015c0)=""/215, 0xfffffffffffffffc}, 0x28) r5 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000240)='/dev/nullb0\x00', 0x4040, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001880)='./cgroup.net/syz0\x00', 0x1ff) setsockopt$inet_tcp_TCP_REPAIR(r4, 0x6, 0x13, &(0x7f00000014c0), 0x4) setsockopt$inet_sctp_SCTP_AUTH_KEY(r2, 0x84, 0x17, &(0x7f00000019c0)=ANY=[@ANYRES32, @ANYBLOB="0180dc0085756c00ad2a6de83d98bfb6a374263bfa8912d2488dec5d53b2a6ed8eb75a8e1a5d5965dcc32dd76bad5bbc0ae94f9fde8d9903000000bd5a56b108109e8bdeb983abff748ef3e419e710f6d334e5410461779d200de303f3b0f0147277b84484c03f1cd2b7e0b4eb1bcf422d0cb76e13b0adb8ff7f88fcfb9ba520ae6ca46b58e60000005a4919d4ffc8ad67ea97035cb056b56f981dce0c3abee5"], 0x2) setsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000140)=@int=0xeb73, 0x4) preadv(r5, &(0x7f0000000040)=[{&(0x7f0000000400)=""/4096, 0x3ffc00}], 0x1, 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r2, 0x40485404, &(0x7f0000000380)={{0x1, 0x0, 0x7fffffff, 0x1, 0x1001}, 0x800, 0x400000007}) bind$rxrpc(r2, &(0x7f00000000c0)=@in4={0x21, 0x4, 0x2, 0x10, {0x2, 0x4e22, @remote}}, 0x24) syz_init_net_socket$llc(0x1a, 0x1, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x100000073) r6 = syz_genetlink_get_family_id$SEG6(&(0x7f0000001540)='SEG6\x00') sendmsg$SEG6_CMD_GET_TUNSRC(r1, &(0x7f0000001b80)={&(0x7f0000001500)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000001b40)={&(0x7f0000001580)={0x30, r6, 0x300, 0x70bd2c, 0x25dfdbfe, {}, [@SEG6_ATTR_ALGID={0x8, 0x6, 0x5}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, [], 0x1, 0x0}}]}, 0x30}, 0x1, 0x0, 0x0, 0x8880}, 0x8000) 14:27:08 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000006ffc)=0x3, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r0, &(0x7f0000000300)="0503000108003e0000000140c52cf7c25975e697b02f86dd6b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0x15e, 0x80, 0x0, 0x0) 14:27:08 executing program 2: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='sysfs\x00', 0x0, 0x0) r0 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r0) rename(&(0x7f0000000140)='./bus\x00', &(0x7f0000000180)='./file0\x00') 14:27:08 executing program 2: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='sysfs\x00', 0x0, 0x0) r0 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r0) rename(&(0x7f0000000140)='./bus\x00', &(0x7f0000000180)='./file0\x00') 14:27:09 executing program 0: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='sysfs\x00', 0x0, 0x0) r0 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r0) rename(&(0x7f0000000140)='./bus\x00', &(0x7f0000000180)='./file0\x00') 14:27:09 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) sendmmsg$inet(r0, &(0x7f0000006100)=[{{&(0x7f00000005c0)={0x2, 0x4e23, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, 0x0, 0x0, &(0x7f00000009c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @loopback, @multicast2}}}, @ip_tos_int={{0x18}}], 0x38}}], 0x1, 0x0) 14:27:09 executing program 5: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='fd/3\x02') 14:27:09 executing program 2: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='sysfs\x00', 0x0, 0x0) r0 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r0) rename(&(0x7f0000000140)='./bus\x00', &(0x7f0000000180)='./file0\x00') [ 370.882269][T30104] IPVS: ftp: loaded support on port[0] = 21 14:27:09 executing program 3: clone(0x40000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x3593c3e4fde2e535, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 14:27:09 executing program 5: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='fd/3\x02') 14:27:09 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) sendmmsg$inet(r0, &(0x7f0000006100)=[{{&(0x7f00000005c0)={0x2, 0x4e23, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, 0x0, 0x0, &(0x7f00000009c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @loopback, @multicast2}}}, @ip_tos_int={{0x18}}], 0x38}}], 0x1, 0x0) 14:27:09 executing program 0: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='sysfs\x00', 0x0, 0x0) r0 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r0) rename(&(0x7f0000000140)='./bus\x00', &(0x7f0000000180)='./file0\x00') 14:27:09 executing program 2: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='sysfs\x00', 0x0, 0x0) r0 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r0) rename(&(0x7f0000000140)='./bus\x00', &(0x7f0000000180)='./file0\x00') 14:27:09 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000000)={0xffffffffffffffff}, 0x409) close(r0) 14:27:09 executing program 5: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='fd/3\x02') 14:27:09 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000000)={0xffffffffffffffff}, 0x409) close(r0) 14:27:09 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) sendmmsg$inet(r0, &(0x7f0000006100)=[{{&(0x7f00000005c0)={0x2, 0x4e23, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, 0x0, 0x0, &(0x7f00000009c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @loopback, @multicast2}}}, @ip_tos_int={{0x18}}], 0x38}}], 0x1, 0x0) 14:27:09 executing program 2: clone(0x40000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x3593c3e4fde2e535, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 14:27:09 executing program 0: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='sysfs\x00', 0x0, 0x0) r0 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r0) rename(&(0x7f0000000140)='./bus\x00', &(0x7f0000000180)='./file0\x00') 14:27:09 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000000)={0xffffffffffffffff}, 0x409) close(r0) [ 371.047390][T30166] IPVS: ftp: loaded support on port[0] = 21 [ 371.147354][T30179] IPVS: ftp: loaded support on port[0] = 21 [ 371.177608][T30176] IPVS: ftp: loaded support on port[0] = 21 [ 371.178254][T30186] IPVS: ftp: loaded support on port[0] = 21 14:27:09 executing program 3: clone(0x40000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x3593c3e4fde2e535, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 14:27:09 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) sendmmsg$inet(r0, &(0x7f0000006100)=[{{&(0x7f00000005c0)={0x2, 0x4e23, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, 0x0, 0x0, &(0x7f00000009c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @loopback, @multicast2}}}, @ip_tos_int={{0x18}}], 0x38}}], 0x1, 0x0) 14:27:09 executing program 0: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xd, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(r0, 0xc02c564a, &(0x7f0000000080)={0x2, 0x32314752}) 14:27:09 executing program 5: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='fd/3\x02') 14:27:09 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000000)={0xffffffffffffffff}, 0x409) close(r0) 14:27:09 executing program 2: clone(0x40000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x3593c3e4fde2e535, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 14:27:09 executing program 0: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xd, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(r0, 0xc02c564a, &(0x7f0000000080)={0x2, 0x32314752}) 14:27:09 executing program 4: socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x200) sendfile(r1, r2, 0x0, 0x7fffffff) r3 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r3, r1, 0x0, 0xffffffff) 14:27:09 executing program 5: mmap(&(0x7f0000ee5000/0x1000)=nil, 0x1000, 0x5, 0x2aeb4800bb21a972, 0xffffffffffffffff, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000ee5000)={{0xa, 0x0, 0x0, @mcast1}, {0xa, 0x0, 0x0, @initdev}}, 0x5c) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000001a80)={{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, 0x6}, 0x5c) 14:27:09 executing program 1: r0 = mq_open(&(0x7f0000000100)='trusted.syz\x00', 0xc0, 0x0, &(0x7f0000000240)={0x8, 0x1000000000000000, 0x1, 0x80000000, 0x8, 0x5, 0x0, 0x101}) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, 0x0) syz_open_dev$dri(0x0, 0x0, 0x1fffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) lgetxattr(&(0x7f0000000380)='./file0\x00', 0x0, &(0x7f0000000700)=""/48, 0x30) r1 = creat(&(0x7f0000000040)='./file1\x00', 0x0) fallocate(r1, 0x0, 0x2000000, 0x3) fallocate(r1, 0x8, 0x100000, 0x8000) [ 371.530085][T30206] IPVS: ftp: loaded support on port[0] = 21 [ 371.565802][T30215] IPVS: ftp: loaded support on port[0] = 21 14:27:09 executing program 0: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xd, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(r0, 0xc02c564a, &(0x7f0000000080)={0x2, 0x32314752}) [ 371.595332][ T26] kauditd_printk_skb: 9 callbacks suppressed [ 371.595339][ T26] audit: type=1800 audit(1566138429.863:96): pid=30221 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.4" name="file0" dev="sda1" ino=17862 res=0 14:27:09 executing program 5: mmap(&(0x7f0000ee5000/0x1000)=nil, 0x1000, 0x5, 0x2aeb4800bb21a972, 0xffffffffffffffff, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000ee5000)={{0xa, 0x0, 0x0, @mcast1}, {0xa, 0x0, 0x0, @initdev}}, 0x5c) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000001a80)={{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, 0x6}, 0x5c) [ 371.643718][T30208] IPVS: ftp: loaded support on port[0] = 21 [ 371.666781][T30223] IPVS: ftp: loaded support on port[0] = 21 [ 371.684891][ T26] audit: type=1804 audit(1566138429.903:97): pid=30221 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir120371458/syzkaller.rvVAiw/937/file0" dev="sda1" ino=17862 res=1 [ 371.781899][ T26] audit: type=1804 audit(1566138429.983:98): pid=30231 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir120371458/syzkaller.rvVAiw/937/file0" dev="sda1" ino=17862 res=1 14:27:10 executing program 3: clone(0x40000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x3593c3e4fde2e535, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 14:27:10 executing program 0: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xd, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(r0, 0xc02c564a, &(0x7f0000000080)={0x2, 0x32314752}) 14:27:10 executing program 1: r0 = mq_open(&(0x7f0000000100)='trusted.syz\x00', 0xc0, 0x0, &(0x7f0000000240)={0x8, 0x1000000000000000, 0x1, 0x80000000, 0x8, 0x5, 0x0, 0x101}) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, 0x0) syz_open_dev$dri(0x0, 0x0, 0x1fffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) lgetxattr(&(0x7f0000000380)='./file0\x00', 0x0, &(0x7f0000000700)=""/48, 0x30) r1 = creat(&(0x7f0000000040)='./file1\x00', 0x0) fallocate(r1, 0x0, 0x2000000, 0x3) fallocate(r1, 0x8, 0x100000, 0x8000) 14:27:10 executing program 5: mmap(&(0x7f0000ee5000/0x1000)=nil, 0x1000, 0x5, 0x2aeb4800bb21a972, 0xffffffffffffffff, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000ee5000)={{0xa, 0x0, 0x0, @mcast1}, {0xa, 0x0, 0x0, @initdev}}, 0x5c) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000001a80)={{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, 0x6}, 0x5c) 14:27:10 executing program 2: clone(0x40000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x3593c3e4fde2e535, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 14:27:10 executing program 0: r0 = mq_open(&(0x7f0000000100)='trusted.syz\x00', 0xc0, 0x0, &(0x7f0000000240)={0x8, 0x1000000000000000, 0x1, 0x80000000, 0x8, 0x5, 0x0, 0x101}) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, 0x0) syz_open_dev$dri(0x0, 0x0, 0x1fffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) lgetxattr(&(0x7f0000000380)='./file0\x00', 0x0, &(0x7f0000000700)=""/48, 0x30) r1 = creat(&(0x7f0000000040)='./file1\x00', 0x0) fallocate(r1, 0x0, 0x2000000, 0x3) fallocate(r1, 0x8, 0x100000, 0x8000) 14:27:10 executing program 5: mmap(&(0x7f0000ee5000/0x1000)=nil, 0x1000, 0x5, 0x2aeb4800bb21a972, 0xffffffffffffffff, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000ee5000)={{0xa, 0x0, 0x0, @mcast1}, {0xa, 0x0, 0x0, @initdev}}, 0x5c) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000001a80)={{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, 0x6}, 0x5c) [ 372.082351][T30247] IPVS: ftp: loaded support on port[0] = 21 [ 372.111092][T30250] IPVS: ftp: loaded support on port[0] = 21 [ 372.181855][T30255] IPVS: ftp: loaded support on port[0] = 21 [ 372.199517][T30256] IPVS: ftp: loaded support on port[0] = 21 [ 372.377953][ T26] audit: type=1804 audit(1566138430.643:99): pid=30231 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir120371458/syzkaller.rvVAiw/937/file0" dev="sda1" ino=17862 res=1 14:27:10 executing program 4: socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x200) sendfile(r1, r2, 0x0, 0x7fffffff) r3 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r3, r1, 0x0, 0xffffffff) 14:27:10 executing program 0: r0 = mq_open(&(0x7f0000000100)='trusted.syz\x00', 0xc0, 0x0, &(0x7f0000000240)={0x8, 0x1000000000000000, 0x1, 0x80000000, 0x8, 0x5, 0x0, 0x101}) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, 0x0) syz_open_dev$dri(0x0, 0x0, 0x1fffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) lgetxattr(&(0x7f0000000380)='./file0\x00', 0x0, &(0x7f0000000700)=""/48, 0x30) r1 = creat(&(0x7f0000000040)='./file1\x00', 0x0) fallocate(r1, 0x0, 0x2000000, 0x3) fallocate(r1, 0x8, 0x100000, 0x8000) 14:27:10 executing program 1: r0 = mq_open(&(0x7f0000000100)='trusted.syz\x00', 0xc0, 0x0, &(0x7f0000000240)={0x8, 0x1000000000000000, 0x1, 0x80000000, 0x8, 0x5, 0x0, 0x101}) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, 0x0) syz_open_dev$dri(0x0, 0x0, 0x1fffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) lgetxattr(&(0x7f0000000380)='./file0\x00', 0x0, &(0x7f0000000700)=""/48, 0x30) r1 = creat(&(0x7f0000000040)='./file1\x00', 0x0) fallocate(r1, 0x0, 0x2000000, 0x3) fallocate(r1, 0x8, 0x100000, 0x8000) 14:27:10 executing program 5: r0 = mq_open(&(0x7f0000000100)='trusted.syz\x00', 0xc0, 0x0, &(0x7f0000000240)={0x8, 0x1000000000000000, 0x1, 0x80000000, 0x8, 0x5, 0x0, 0x101}) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, 0x0) syz_open_dev$dri(0x0, 0x0, 0x1fffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) lgetxattr(&(0x7f0000000380)='./file0\x00', 0x0, &(0x7f0000000700)=""/48, 0x30) r1 = creat(&(0x7f0000000040)='./file1\x00', 0x0) fallocate(r1, 0x0, 0x2000000, 0x3) fallocate(r1, 0x8, 0x100000, 0x8000) 14:27:10 executing program 2: mmap(&(0x7f0000ee5000/0x1000)=nil, 0x1000, 0x5, 0x2aeb4800bb21a972, 0xffffffffffffffff, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000ee5000)={{0xa, 0x0, 0x0, @mcast1}, {0xa, 0x0, 0x0, @initdev}}, 0x5c) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000001a80)={{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, 0x6}, 0x5c) 14:27:10 executing program 3: socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) sendfile(r1, r2, 0x0, 0x7fffffff) r3 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r3, r1, 0x0, 0xffffffff) [ 372.417368][ T26] audit: type=1804 audit(1566138430.683:100): pid=30269 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir120371458/syzkaller.rvVAiw/937/file0" dev="sda1" ino=17862 res=1 [ 372.446087][ T26] audit: type=1804 audit(1566138430.683:101): pid=30231 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir120371458/syzkaller.rvVAiw/937/file0" dev="sda1" ino=17862 res=1 [ 372.561574][ T26] audit: type=1800 audit(1566138430.833:102): pid=30284 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.4" name="file0" dev="sda1" ino=17905 res=0 14:27:10 executing program 2: mmap(&(0x7f0000ee5000/0x1000)=nil, 0x1000, 0x5, 0x2aeb4800bb21a972, 0xffffffffffffffff, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000ee5000)={{0xa, 0x0, 0x0, @mcast1}, {0xa, 0x0, 0x0, @initdev}}, 0x5c) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000001a80)={{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, 0x6}, 0x5c) 14:27:10 executing program 5: r0 = mq_open(&(0x7f0000000100)='trusted.syz\x00', 0xc0, 0x0, &(0x7f0000000240)={0x8, 0x1000000000000000, 0x1, 0x80000000, 0x8, 0x5, 0x0, 0x101}) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, 0x0) syz_open_dev$dri(0x0, 0x0, 0x1fffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) lgetxattr(&(0x7f0000000380)='./file0\x00', 0x0, &(0x7f0000000700)=""/48, 0x30) r1 = creat(&(0x7f0000000040)='./file1\x00', 0x0) fallocate(r1, 0x0, 0x2000000, 0x3) fallocate(r1, 0x8, 0x100000, 0x8000) 14:27:10 executing program 0: r0 = mq_open(&(0x7f0000000100)='trusted.syz\x00', 0xc0, 0x0, &(0x7f0000000240)={0x8, 0x1000000000000000, 0x1, 0x80000000, 0x8, 0x5, 0x0, 0x101}) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, 0x0) syz_open_dev$dri(0x0, 0x0, 0x1fffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) lgetxattr(&(0x7f0000000380)='./file0\x00', 0x0, &(0x7f0000000700)=""/48, 0x30) r1 = creat(&(0x7f0000000040)='./file1\x00', 0x0) fallocate(r1, 0x0, 0x2000000, 0x3) fallocate(r1, 0x8, 0x100000, 0x8000) 14:27:11 executing program 1: r0 = mq_open(&(0x7f0000000100)='trusted.syz\x00', 0xc0, 0x0, &(0x7f0000000240)={0x8, 0x1000000000000000, 0x1, 0x80000000, 0x8, 0x5, 0x0, 0x101}) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, 0x0) syz_open_dev$dri(0x0, 0x0, 0x1fffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) lgetxattr(&(0x7f0000000380)='./file0\x00', 0x0, &(0x7f0000000700)=""/48, 0x30) r1 = creat(&(0x7f0000000040)='./file1\x00', 0x0) fallocate(r1, 0x0, 0x2000000, 0x3) fallocate(r1, 0x8, 0x100000, 0x8000) [ 372.678417][ T26] audit: type=1804 audit(1566138430.853:103): pid=30290 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir120371458/syzkaller.rvVAiw/938/file0" dev="sda1" ino=17905 res=1 14:27:11 executing program 2: mmap(&(0x7f0000ee5000/0x1000)=nil, 0x1000, 0x5, 0x2aeb4800bb21a972, 0xffffffffffffffff, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000ee5000)={{0xa, 0x0, 0x0, @mcast1}, {0xa, 0x0, 0x0, @initdev}}, 0x5c) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000001a80)={{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, 0x6}, 0x5c) [ 372.772850][ T26] audit: type=1800 audit(1566138430.883:104): pid=30286 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=17939 res=0 14:27:11 executing program 2: socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x200) sendfile(r1, r2, 0x0, 0x7fffffff) r3 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r3, r1, 0x0, 0xffffffff) [ 372.885490][ T26] audit: type=1804 audit(1566138430.893:105): pid=30286 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir685524085/syzkaller.O0eDzk/1028/file0/file0" dev="sda1" ino=17939 res=1 14:27:11 executing program 4: socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) sendfile(r1, r2, 0x0, 0x7fffffff) r3 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r3, r1, 0x0, 0xffffffff) 14:27:11 executing program 5: r0 = mq_open(&(0x7f0000000100)='trusted.syz\x00', 0xc0, 0x0, &(0x7f0000000240)={0x8, 0x1000000000000000, 0x1, 0x80000000, 0x8, 0x5, 0x0, 0x101}) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, 0x0) syz_open_dev$dri(0x0, 0x0, 0x1fffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) lgetxattr(&(0x7f0000000380)='./file0\x00', 0x0, &(0x7f0000000700)=""/48, 0x30) r1 = creat(&(0x7f0000000040)='./file1\x00', 0x0) fallocate(r1, 0x0, 0x2000000, 0x3) fallocate(r1, 0x8, 0x100000, 0x8000) 14:27:11 executing program 0: socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) sendfile(r1, r2, 0x0, 0x7fffffff) r3 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r3, r1, 0x0, 0xffffffff) 14:27:11 executing program 1: socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x200) sendfile(r1, r2, 0x0, 0x7fffffff) r3 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r3, r1, 0x0, 0xffffffff) 14:27:11 executing program 3: socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x200) sendfile(r1, r2, 0x0, 0x7fffffff) r3 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r3, r1, 0x0, 0xffffffff) [ 373.570332][T30332] FAT-fs (loop3): error, fat_get_cluster: invalid cluster chain (i_pos 17) [ 373.581327][T30332] FAT-fs (loop3): Filesystem has been set read-only 14:27:11 executing program 5: mmap(&(0x7f0000ee5000/0x1000)=nil, 0x1000, 0x5, 0x2aeb4800bb21a972, 0xffffffffffffffff, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000ee5000)={{0xa, 0x0, 0x0, @mcast1}, {0xa, 0x0, 0x0, @initdev}}, 0x5c) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000001a80)={{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, 0x6}, 0x5c) [ 373.622417][T30332] FAT-fs (loop3): error, fat_get_cluster: invalid cluster chain (i_pos 17) 14:27:11 executing program 3: socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x200) sendfile(r1, r2, 0x0, 0x7fffffff) r3 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r3, r1, 0x0, 0xffffffff) 14:27:12 executing program 5: mmap(&(0x7f0000ee5000/0x1000)=nil, 0x1000, 0x5, 0x2aeb4800bb21a972, 0xffffffffffffffff, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000ee5000)={{0xa, 0x0, 0x0, @mcast1}, {0xa, 0x0, 0x0, @initdev}}, 0x5c) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000001a80)={{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, 0x6}, 0x5c) 14:27:12 executing program 5: mmap(&(0x7f0000ee5000/0x1000)=nil, 0x1000, 0x5, 0x2aeb4800bb21a972, 0xffffffffffffffff, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000ee5000)={{0xa, 0x0, 0x0, @mcast1}, {0xa, 0x0, 0x0, @initdev}}, 0x5c) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000001a80)={{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, 0x6}, 0x5c) 14:27:12 executing program 2: socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x200) sendfile(r1, r2, 0x0, 0x7fffffff) r3 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r3, r1, 0x0, 0xffffffff) 14:27:12 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000080)={0x8f, 0x0, [0x4]}) [ 373.963417][T30349] FAT-fs (loop3): error, fat_get_cluster: invalid cluster chain (i_pos 17) [ 373.994708][T30349] FAT-fs (loop3): Filesystem has been set read-only [ 374.039096][T30349] FAT-fs (loop3): error, fat_get_cluster: invalid cluster chain (i_pos 17) 14:27:12 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000080)={0x8f, 0x0, [0x4]}) [ 374.120805][T30356] FAT-fs (loop3): error, fat_get_cluster: invalid cluster chain (i_pos 17) 14:27:12 executing program 4: socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x200) sendfile(r1, r2, 0x0, 0x7fffffff) r3 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r3, r1, 0x0, 0xffffffff) 14:27:12 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000080)={0x8f, 0x0, [0x4]}) 14:27:12 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x10, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f0000000580)=0x5, 0xe6baca0b19da5856) socket$netlink(0x10, 0x3, 0x7) syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000002c0)={{{@in6=@mcast1, @in=@local}}, {{@in=@local}, 0x0, @in6=@dev}}, &(0x7f0000000080)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000029c0)={{{@in=@initdev, @in6=@loopback}}, {{@in=@empty}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) r1 = add_key$user(&(0x7f0000000100)='user\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000640)="b09a042773b19868a06a1ec92ce750278d3660ea80de4281165ee116ba2841576e1fa2250f5722973312d5d5e4b3cf7fe03b096e34aa7d59bd0729450ecaa2e105eeb065c6036316d9aacc01877e0eded35d2119cdbec3f1f86ad185052abc7643a34f733a09116b979f36f274002b0799f322e1fd201583c8f63567ca42e896", 0x80, 0xfffffffffffffff8) keyctl$invalidate(0x15, r1) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000002ac0)={{{@in, @in=@local}}, {{@in6=@loopback}, 0x0, @in6=@loopback}}, 0x0) gettid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004180)={0x0, 0xffffffffffffffff, 0x0, 0x13, &(0x7f0000004140)='trustedem1vboxnet1\x00'}, 0x30) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f00000043c0)) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000400)=@allocspi={0x104, 0x16, 0x317, 0x0, 0x0, {{{@in6=@loopback, @in=@multicast2}, {@in6=@local, 0x0, 0x32}, @in6=@remote}, 0x0, 0x8}, [@mark={0xc, 0x15, {0x0, 0xaf}}]}, 0x104}}, 0x0) openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x20881, 0x0) syz_open_dev$media(0x0, 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/sequencer\x00', 0x0, 0x0) io_submit(0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc0000f, 0x0, 0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_mr_cache\x00') 14:27:12 executing program 1: socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x200) sendfile(r1, r2, 0x0, 0x7fffffff) r3 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r3, r1, 0x0, 0xffffffff) 14:27:12 executing program 0: socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x200) sendfile(r1, r2, 0x0, 0x7fffffff) r3 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r3, r1, 0x0, 0xffffffff) 14:27:12 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000080)={0x8f, 0x0, [0x4]}) 14:27:12 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x10, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f0000000580)=0x5, 0xe6baca0b19da5856) socket$netlink(0x10, 0x3, 0x7) syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000002c0)={{{@in6=@mcast1, @in=@local}}, {{@in=@local}, 0x0, @in6=@dev}}, &(0x7f0000000080)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000029c0)={{{@in=@initdev, @in6=@loopback}}, {{@in=@empty}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) r1 = add_key$user(&(0x7f0000000100)='user\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000640)="b09a042773b19868a06a1ec92ce750278d3660ea80de4281165ee116ba2841576e1fa2250f5722973312d5d5e4b3cf7fe03b096e34aa7d59bd0729450ecaa2e105eeb065c6036316d9aacc01877e0eded35d2119cdbec3f1f86ad185052abc7643a34f733a09116b979f36f274002b0799f322e1fd201583c8f63567ca42e896", 0x80, 0xfffffffffffffff8) keyctl$invalidate(0x15, r1) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000002ac0)={{{@in, @in=@local}}, {{@in6=@loopback}, 0x0, @in6=@loopback}}, 0x0) gettid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004180)={0x0, 0xffffffffffffffff, 0x0, 0x13, &(0x7f0000004140)='trustedem1vboxnet1\x00'}, 0x30) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f00000043c0)) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000400)=@allocspi={0x104, 0x16, 0x317, 0x0, 0x0, {{{@in6=@loopback, @in=@multicast2}, {@in6=@local, 0x0, 0x32}, @in6=@remote}, 0x0, 0x8}, [@mark={0xc, 0x15, {0x0, 0xaf}}]}, 0x104}}, 0x0) openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x20881, 0x0) syz_open_dev$media(0x0, 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/sequencer\x00', 0x0, 0x0) io_submit(0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc0000f, 0x0, 0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_mr_cache\x00') 14:27:13 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x10, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f0000000580)=0x5, 0xe6baca0b19da5856) socket$netlink(0x10, 0x3, 0x7) syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000002c0)={{{@in6=@mcast1, @in=@local}}, {{@in=@local}, 0x0, @in6=@dev}}, &(0x7f0000000080)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000029c0)={{{@in=@initdev, @in6=@loopback}}, {{@in=@empty}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) r1 = add_key$user(&(0x7f0000000100)='user\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000640)="b09a042773b19868a06a1ec92ce750278d3660ea80de4281165ee116ba2841576e1fa2250f5722973312d5d5e4b3cf7fe03b096e34aa7d59bd0729450ecaa2e105eeb065c6036316d9aacc01877e0eded35d2119cdbec3f1f86ad185052abc7643a34f733a09116b979f36f274002b0799f322e1fd201583c8f63567ca42e896", 0x80, 0xfffffffffffffff8) keyctl$invalidate(0x15, r1) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000002ac0)={{{@in, @in=@local}}, {{@in6=@loopback}, 0x0, @in6=@loopback}}, 0x0) gettid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004180)={0x0, 0xffffffffffffffff, 0x0, 0x13, &(0x7f0000004140)='trustedem1vboxnet1\x00'}, 0x30) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f00000043c0)) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000400)=@allocspi={0x104, 0x16, 0x317, 0x0, 0x0, {{{@in6=@loopback, @in=@multicast2}, {@in6=@local, 0x0, 0x32}, @in6=@remote}, 0x0, 0x8}, [@mark={0xc, 0x15, {0x0, 0xaf}}]}, 0x104}}, 0x0) openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x20881, 0x0) syz_open_dev$media(0x0, 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/sequencer\x00', 0x0, 0x0) io_submit(0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc0000f, 0x0, 0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_mr_cache\x00') 14:27:13 executing program 2: socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x200) sendfile(r1, r2, 0x0, 0x7fffffff) r3 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r3, r1, 0x0, 0xffffffff) 14:27:13 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x10, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f0000000580)=0x5, 0xe6baca0b19da5856) socket$netlink(0x10, 0x3, 0x7) syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000002c0)={{{@in6=@mcast1, @in=@local}}, {{@in=@local}, 0x0, @in6=@dev}}, &(0x7f0000000080)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000029c0)={{{@in=@initdev, @in6=@loopback}}, {{@in=@empty}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) r1 = add_key$user(&(0x7f0000000100)='user\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000640)="b09a042773b19868a06a1ec92ce750278d3660ea80de4281165ee116ba2841576e1fa2250f5722973312d5d5e4b3cf7fe03b096e34aa7d59bd0729450ecaa2e105eeb065c6036316d9aacc01877e0eded35d2119cdbec3f1f86ad185052abc7643a34f733a09116b979f36f274002b0799f322e1fd201583c8f63567ca42e896", 0x80, 0xfffffffffffffff8) keyctl$invalidate(0x15, r1) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000002ac0)={{{@in, @in=@local}}, {{@in6=@loopback}, 0x0, @in6=@loopback}}, 0x0) gettid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004180)={0x0, 0xffffffffffffffff, 0x0, 0x13, &(0x7f0000004140)='trustedem1vboxnet1\x00'}, 0x30) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f00000043c0)) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000400)=@allocspi={0x104, 0x16, 0x317, 0x0, 0x0, {{{@in6=@loopback, @in=@multicast2}, {@in6=@local, 0x0, 0x32}, @in6=@remote}, 0x0, 0x8}, [@mark={0xc, 0x15, {0x0, 0xaf}}]}, 0x104}}, 0x0) openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x20881, 0x0) syz_open_dev$media(0x0, 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/sequencer\x00', 0x0, 0x0) io_submit(0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc0000f, 0x0, 0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_mr_cache\x00') 14:27:13 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x10, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f0000000580)=0x5, 0xe6baca0b19da5856) socket$netlink(0x10, 0x3, 0x7) syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000002c0)={{{@in6=@mcast1, @in=@local}}, {{@in=@local}, 0x0, @in6=@dev}}, &(0x7f0000000080)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000029c0)={{{@in=@initdev, @in6=@loopback}}, {{@in=@empty}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) r1 = add_key$user(&(0x7f0000000100)='user\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000640)="b09a042773b19868a06a1ec92ce750278d3660ea80de4281165ee116ba2841576e1fa2250f5722973312d5d5e4b3cf7fe03b096e34aa7d59bd0729450ecaa2e105eeb065c6036316d9aacc01877e0eded35d2119cdbec3f1f86ad185052abc7643a34f733a09116b979f36f274002b0799f322e1fd201583c8f63567ca42e896", 0x80, 0xfffffffffffffff8) keyctl$invalidate(0x15, r1) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000002ac0)={{{@in, @in=@local}}, {{@in6=@loopback}, 0x0, @in6=@loopback}}, 0x0) gettid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004180)={0x0, 0xffffffffffffffff, 0x0, 0x13, &(0x7f0000004140)='trustedem1vboxnet1\x00'}, 0x30) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f00000043c0)) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000400)=@allocspi={0x104, 0x16, 0x317, 0x0, 0x0, {{{@in6=@loopback, @in=@multicast2}, {@in6=@local, 0x0, 0x32}, @in6=@remote}, 0x0, 0x8}, [@mark={0xc, 0x15, {0x0, 0xaf}}]}, 0x104}}, 0x0) openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x20881, 0x0) syz_open_dev$media(0x0, 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/sequencer\x00', 0x0, 0x0) io_submit(0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc0000f, 0x0, 0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_mr_cache\x00') 14:27:13 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x10, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f0000000580)=0x5, 0xe6baca0b19da5856) socket$netlink(0x10, 0x3, 0x7) syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000002c0)={{{@in6=@mcast1, @in=@local}}, {{@in=@local}, 0x0, @in6=@dev}}, &(0x7f0000000080)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000029c0)={{{@in=@initdev, @in6=@loopback}}, {{@in=@empty}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) r1 = add_key$user(&(0x7f0000000100)='user\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000640)="b09a042773b19868a06a1ec92ce750278d3660ea80de4281165ee116ba2841576e1fa2250f5722973312d5d5e4b3cf7fe03b096e34aa7d59bd0729450ecaa2e105eeb065c6036316d9aacc01877e0eded35d2119cdbec3f1f86ad185052abc7643a34f733a09116b979f36f274002b0799f322e1fd201583c8f63567ca42e896", 0x80, 0xfffffffffffffff8) keyctl$invalidate(0x15, r1) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000002ac0)={{{@in, @in=@local}}, {{@in6=@loopback}, 0x0, @in6=@loopback}}, 0x0) gettid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004180)={0x0, 0xffffffffffffffff, 0x0, 0x13, &(0x7f0000004140)='trustedem1vboxnet1\x00'}, 0x30) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f00000043c0)) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000400)=@allocspi={0x104, 0x16, 0x317, 0x0, 0x0, {{{@in6=@loopback, @in=@multicast2}, {@in6=@local, 0x0, 0x32}, @in6=@remote}, 0x0, 0x8}, [@mark={0xc, 0x15, {0x0, 0xaf}}]}, 0x104}}, 0x0) openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x20881, 0x0) syz_open_dev$media(0x0, 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/sequencer\x00', 0x0, 0x0) io_submit(0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc0000f, 0x0, 0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_mr_cache\x00') 14:27:13 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x10, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f0000000580)=0x5, 0xe6baca0b19da5856) socket$netlink(0x10, 0x3, 0x7) syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000002c0)={{{@in6=@mcast1, @in=@local}}, {{@in=@local}, 0x0, @in6=@dev}}, &(0x7f0000000080)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000029c0)={{{@in=@initdev, @in6=@loopback}}, {{@in=@empty}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) r1 = add_key$user(&(0x7f0000000100)='user\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000640)="b09a042773b19868a06a1ec92ce750278d3660ea80de4281165ee116ba2841576e1fa2250f5722973312d5d5e4b3cf7fe03b096e34aa7d59bd0729450ecaa2e105eeb065c6036316d9aacc01877e0eded35d2119cdbec3f1f86ad185052abc7643a34f733a09116b979f36f274002b0799f322e1fd201583c8f63567ca42e896", 0x80, 0xfffffffffffffff8) keyctl$invalidate(0x15, r1) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000002ac0)={{{@in, @in=@local}}, {{@in6=@loopback}, 0x0, @in6=@loopback}}, 0x0) gettid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004180)={0x0, 0xffffffffffffffff, 0x0, 0x13, &(0x7f0000004140)='trustedem1vboxnet1\x00'}, 0x30) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f00000043c0)) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000400)=@allocspi={0x104, 0x16, 0x317, 0x0, 0x0, {{{@in6=@loopback, @in=@multicast2}, {@in6=@local, 0x0, 0x32}, @in6=@remote}, 0x0, 0x8}, [@mark={0xc, 0x15, {0x0, 0xaf}}]}, 0x104}}, 0x0) openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x20881, 0x0) syz_open_dev$media(0x0, 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/sequencer\x00', 0x0, 0x0) io_submit(0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc0000f, 0x0, 0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_mr_cache\x00') 14:27:13 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x10, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f0000000580)=0x5, 0xe6baca0b19da5856) socket$netlink(0x10, 0x3, 0x7) syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000002c0)={{{@in6=@mcast1, @in=@local}}, {{@in=@local}, 0x0, @in6=@dev}}, &(0x7f0000000080)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000029c0)={{{@in=@initdev, @in6=@loopback}}, {{@in=@empty}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) r1 = add_key$user(&(0x7f0000000100)='user\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000640)="b09a042773b19868a06a1ec92ce750278d3660ea80de4281165ee116ba2841576e1fa2250f5722973312d5d5e4b3cf7fe03b096e34aa7d59bd0729450ecaa2e105eeb065c6036316d9aacc01877e0eded35d2119cdbec3f1f86ad185052abc7643a34f733a09116b979f36f274002b0799f322e1fd201583c8f63567ca42e896", 0x80, 0xfffffffffffffff8) keyctl$invalidate(0x15, r1) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000002ac0)={{{@in, @in=@local}}, {{@in6=@loopback}, 0x0, @in6=@loopback}}, 0x0) gettid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004180)={0x0, 0xffffffffffffffff, 0x0, 0x13, &(0x7f0000004140)='trustedem1vboxnet1\x00'}, 0x30) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f00000043c0)) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000400)=@allocspi={0x104, 0x16, 0x317, 0x0, 0x0, {{{@in6=@loopback, @in=@multicast2}, {@in6=@local, 0x0, 0x32}, @in6=@remote}, 0x0, 0x8}, [@mark={0xc, 0x15, {0x0, 0xaf}}]}, 0x104}}, 0x0) openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x20881, 0x0) syz_open_dev$media(0x0, 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/sequencer\x00', 0x0, 0x0) io_submit(0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc0000f, 0x0, 0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_mr_cache\x00') 14:27:13 executing program 0: socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x200) sendfile(r1, r2, 0x0, 0x7fffffff) r3 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r3, r1, 0x0, 0xffffffff) 14:27:13 executing program 1: socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) sendfile(r1, r2, 0x0, 0x7fffffff) r3 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r3, r1, 0x0, 0xffffffff) 14:27:13 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x10, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f0000000580)=0x5, 0xe6baca0b19da5856) socket$netlink(0x10, 0x3, 0x7) syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000002c0)={{{@in6=@mcast1, @in=@local}}, {{@in=@local}, 0x0, @in6=@dev}}, &(0x7f0000000080)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000029c0)={{{@in=@initdev, @in6=@loopback}}, {{@in=@empty}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) r1 = add_key$user(&(0x7f0000000100)='user\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000640)="b09a042773b19868a06a1ec92ce750278d3660ea80de4281165ee116ba2841576e1fa2250f5722973312d5d5e4b3cf7fe03b096e34aa7d59bd0729450ecaa2e105eeb065c6036316d9aacc01877e0eded35d2119cdbec3f1f86ad185052abc7643a34f733a09116b979f36f274002b0799f322e1fd201583c8f63567ca42e896", 0x80, 0xfffffffffffffff8) keyctl$invalidate(0x15, r1) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000002ac0)={{{@in, @in=@local}}, {{@in6=@loopback}, 0x0, @in6=@loopback}}, 0x0) gettid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004180)={0x0, 0xffffffffffffffff, 0x0, 0x13, &(0x7f0000004140)='trustedem1vboxnet1\x00'}, 0x30) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f00000043c0)) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000400)=@allocspi={0x104, 0x16, 0x317, 0x0, 0x0, {{{@in6=@loopback, @in=@multicast2}, {@in6=@local, 0x0, 0x32}, @in6=@remote}, 0x0, 0x8}, [@mark={0xc, 0x15, {0x0, 0xaf}}]}, 0x104}}, 0x0) openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x20881, 0x0) syz_open_dev$media(0x0, 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/sequencer\x00', 0x0, 0x0) io_submit(0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc0000f, 0x0, 0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_mr_cache\x00') 14:27:14 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x10, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f0000000580)=0x5, 0xe6baca0b19da5856) socket$netlink(0x10, 0x3, 0x7) syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000002c0)={{{@in6=@mcast1, @in=@local}}, {{@in=@local}, 0x0, @in6=@dev}}, &(0x7f0000000080)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000029c0)={{{@in=@initdev, @in6=@loopback}}, {{@in=@empty}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) r1 = add_key$user(&(0x7f0000000100)='user\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000640)="b09a042773b19868a06a1ec92ce750278d3660ea80de4281165ee116ba2841576e1fa2250f5722973312d5d5e4b3cf7fe03b096e34aa7d59bd0729450ecaa2e105eeb065c6036316d9aacc01877e0eded35d2119cdbec3f1f86ad185052abc7643a34f733a09116b979f36f274002b0799f322e1fd201583c8f63567ca42e896", 0x80, 0xfffffffffffffff8) keyctl$invalidate(0x15, r1) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000002ac0)={{{@in, @in=@local}}, {{@in6=@loopback}, 0x0, @in6=@loopback}}, 0x0) gettid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004180)={0x0, 0xffffffffffffffff, 0x0, 0x13, &(0x7f0000004140)='trustedem1vboxnet1\x00'}, 0x30) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f00000043c0)) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000400)=@allocspi={0x104, 0x16, 0x317, 0x0, 0x0, {{{@in6=@loopback, @in=@multicast2}, {@in6=@local, 0x0, 0x32}, @in6=@remote}, 0x0, 0x8}, [@mark={0xc, 0x15, {0x0, 0xaf}}]}, 0x104}}, 0x0) openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x20881, 0x0) syz_open_dev$media(0x0, 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/sequencer\x00', 0x0, 0x0) io_submit(0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc0000f, 0x0, 0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_mr_cache\x00') 14:27:14 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x10, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f0000000580)=0x5, 0xe6baca0b19da5856) socket$netlink(0x10, 0x3, 0x7) syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000002c0)={{{@in6=@mcast1, @in=@local}}, {{@in=@local}, 0x0, @in6=@dev}}, &(0x7f0000000080)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000029c0)={{{@in=@initdev, @in6=@loopback}}, {{@in=@empty}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) r1 = add_key$user(&(0x7f0000000100)='user\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000640)="b09a042773b19868a06a1ec92ce750278d3660ea80de4281165ee116ba2841576e1fa2250f5722973312d5d5e4b3cf7fe03b096e34aa7d59bd0729450ecaa2e105eeb065c6036316d9aacc01877e0eded35d2119cdbec3f1f86ad185052abc7643a34f733a09116b979f36f274002b0799f322e1fd201583c8f63567ca42e896", 0x80, 0xfffffffffffffff8) keyctl$invalidate(0x15, r1) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000002ac0)={{{@in, @in=@local}}, {{@in6=@loopback}, 0x0, @in6=@loopback}}, 0x0) gettid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004180)={0x0, 0xffffffffffffffff, 0x0, 0x13, &(0x7f0000004140)='trustedem1vboxnet1\x00'}, 0x30) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f00000043c0)) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000400)=@allocspi={0x104, 0x16, 0x317, 0x0, 0x0, {{{@in6=@loopback, @in=@multicast2}, {@in6=@local, 0x0, 0x32}, @in6=@remote}, 0x0, 0x8}, [@mark={0xc, 0x15, {0x0, 0xaf}}]}, 0x104}}, 0x0) openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x20881, 0x0) syz_open_dev$media(0x0, 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/sequencer\x00', 0x0, 0x0) io_submit(0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc0000f, 0x0, 0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_mr_cache\x00') 14:27:14 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x10, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f0000000580)=0x5, 0xe6baca0b19da5856) socket$netlink(0x10, 0x3, 0x7) syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000002c0)={{{@in6=@mcast1, @in=@local}}, {{@in=@local}, 0x0, @in6=@dev}}, &(0x7f0000000080)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000029c0)={{{@in=@initdev, @in6=@loopback}}, {{@in=@empty}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) r1 = add_key$user(&(0x7f0000000100)='user\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000640)="b09a042773b19868a06a1ec92ce750278d3660ea80de4281165ee116ba2841576e1fa2250f5722973312d5d5e4b3cf7fe03b096e34aa7d59bd0729450ecaa2e105eeb065c6036316d9aacc01877e0eded35d2119cdbec3f1f86ad185052abc7643a34f733a09116b979f36f274002b0799f322e1fd201583c8f63567ca42e896", 0x80, 0xfffffffffffffff8) keyctl$invalidate(0x15, r1) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000002ac0)={{{@in, @in=@local}}, {{@in6=@loopback}, 0x0, @in6=@loopback}}, 0x0) gettid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004180)={0x0, 0xffffffffffffffff, 0x0, 0x13, &(0x7f0000004140)='trustedem1vboxnet1\x00'}, 0x30) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f00000043c0)) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000400)=@allocspi={0x104, 0x16, 0x317, 0x0, 0x0, {{{@in6=@loopback, @in=@multicast2}, {@in6=@local, 0x0, 0x32}, @in6=@remote}, 0x0, 0x8}, [@mark={0xc, 0x15, {0x0, 0xaf}}]}, 0x104}}, 0x0) openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x20881, 0x0) syz_open_dev$media(0x0, 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/sequencer\x00', 0x0, 0x0) io_submit(0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc0000f, 0x0, 0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_mr_cache\x00') [ 375.825033][T30532] FAT-fs (loop1): error, fat_get_cluster: invalid cluster chain (i_pos 17) [ 375.868491][T30532] FAT-fs (loop1): Filesystem has been set read-only [ 375.875414][T30532] FAT-fs (loop1): error, fat_get_cluster: invalid cluster chain (i_pos 17) 14:27:14 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x10, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f0000000580)=0x5, 0xe6baca0b19da5856) socket$netlink(0x10, 0x3, 0x7) syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000002c0)={{{@in6=@mcast1, @in=@local}}, {{@in=@local}, 0x0, @in6=@dev}}, &(0x7f0000000080)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000029c0)={{{@in=@initdev, @in6=@loopback}}, {{@in=@empty}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) r1 = add_key$user(&(0x7f0000000100)='user\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000640)="b09a042773b19868a06a1ec92ce750278d3660ea80de4281165ee116ba2841576e1fa2250f5722973312d5d5e4b3cf7fe03b096e34aa7d59bd0729450ecaa2e105eeb065c6036316d9aacc01877e0eded35d2119cdbec3f1f86ad185052abc7643a34f733a09116b979f36f274002b0799f322e1fd201583c8f63567ca42e896", 0x80, 0xfffffffffffffff8) keyctl$invalidate(0x15, r1) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000002ac0)={{{@in, @in=@local}}, {{@in6=@loopback}, 0x0, @in6=@loopback}}, 0x0) gettid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004180)={0x0, 0xffffffffffffffff, 0x0, 0x13, &(0x7f0000004140)='trustedem1vboxnet1\x00'}, 0x30) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f00000043c0)) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000400)=@allocspi={0x104, 0x16, 0x317, 0x0, 0x0, {{{@in6=@loopback, @in=@multicast2}, {@in6=@local, 0x0, 0x32}, @in6=@remote}, 0x0, 0x8}, [@mark={0xc, 0x15, {0x0, 0xaf}}]}, 0x104}}, 0x0) openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x20881, 0x0) syz_open_dev$media(0x0, 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/sequencer\x00', 0x0, 0x0) io_submit(0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc0000f, 0x0, 0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_mr_cache\x00') 14:27:14 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x10, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f0000000580)=0x5, 0xe6baca0b19da5856) socket$netlink(0x10, 0x3, 0x7) syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000002c0)={{{@in6=@mcast1, @in=@local}}, {{@in=@local}, 0x0, @in6=@dev}}, &(0x7f0000000080)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000029c0)={{{@in=@initdev, @in6=@loopback}}, {{@in=@empty}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) r1 = add_key$user(&(0x7f0000000100)='user\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000640)="b09a042773b19868a06a1ec92ce750278d3660ea80de4281165ee116ba2841576e1fa2250f5722973312d5d5e4b3cf7fe03b096e34aa7d59bd0729450ecaa2e105eeb065c6036316d9aacc01877e0eded35d2119cdbec3f1f86ad185052abc7643a34f733a09116b979f36f274002b0799f322e1fd201583c8f63567ca42e896", 0x80, 0xfffffffffffffff8) keyctl$invalidate(0x15, r1) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000002ac0)={{{@in, @in=@local}}, {{@in6=@loopback}, 0x0, @in6=@loopback}}, 0x0) gettid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004180)={0x0, 0xffffffffffffffff, 0x0, 0x13, &(0x7f0000004140)='trustedem1vboxnet1\x00'}, 0x30) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f00000043c0)) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000400)=@allocspi={0x104, 0x16, 0x317, 0x0, 0x0, {{{@in6=@loopback, @in=@multicast2}, {@in6=@local, 0x0, 0x32}, @in6=@remote}, 0x0, 0x8}, [@mark={0xc, 0x15, {0x0, 0xaf}}]}, 0x104}}, 0x0) openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x20881, 0x0) syz_open_dev$media(0x0, 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/sequencer\x00', 0x0, 0x0) io_submit(0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc0000f, 0x0, 0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_mr_cache\x00') 14:27:14 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x10, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f0000000580)=0x5, 0xe6baca0b19da5856) socket$netlink(0x10, 0x3, 0x7) syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000002c0)={{{@in6=@mcast1, @in=@local}}, {{@in=@local}, 0x0, @in6=@dev}}, &(0x7f0000000080)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000029c0)={{{@in=@initdev, @in6=@loopback}}, {{@in=@empty}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) r1 = add_key$user(&(0x7f0000000100)='user\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000640)="b09a042773b19868a06a1ec92ce750278d3660ea80de4281165ee116ba2841576e1fa2250f5722973312d5d5e4b3cf7fe03b096e34aa7d59bd0729450ecaa2e105eeb065c6036316d9aacc01877e0eded35d2119cdbec3f1f86ad185052abc7643a34f733a09116b979f36f274002b0799f322e1fd201583c8f63567ca42e896", 0x80, 0xfffffffffffffff8) keyctl$invalidate(0x15, r1) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000002ac0)={{{@in, @in=@local}}, {{@in6=@loopback}, 0x0, @in6=@loopback}}, 0x0) gettid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004180)={0x0, 0xffffffffffffffff, 0x0, 0x13, &(0x7f0000004140)='trustedem1vboxnet1\x00'}, 0x30) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f00000043c0)) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000400)=@allocspi={0x104, 0x16, 0x317, 0x0, 0x0, {{{@in6=@loopback, @in=@multicast2}, {@in6=@local, 0x0, 0x32}, @in6=@remote}, 0x0, 0x8}, [@mark={0xc, 0x15, {0x0, 0xaf}}]}, 0x104}}, 0x0) openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x20881, 0x0) syz_open_dev$media(0x0, 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/sequencer\x00', 0x0, 0x0) io_submit(0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc0000f, 0x0, 0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_mr_cache\x00') 14:27:14 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x10, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f0000000580)=0x5, 0xe6baca0b19da5856) socket$netlink(0x10, 0x3, 0x7) syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000002c0)={{{@in6=@mcast1, @in=@local}}, {{@in=@local}, 0x0, @in6=@dev}}, &(0x7f0000000080)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000029c0)={{{@in=@initdev, @in6=@loopback}}, {{@in=@empty}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) r1 = add_key$user(&(0x7f0000000100)='user\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000640)="b09a042773b19868a06a1ec92ce750278d3660ea80de4281165ee116ba2841576e1fa2250f5722973312d5d5e4b3cf7fe03b096e34aa7d59bd0729450ecaa2e105eeb065c6036316d9aacc01877e0eded35d2119cdbec3f1f86ad185052abc7643a34f733a09116b979f36f274002b0799f322e1fd201583c8f63567ca42e896", 0x80, 0xfffffffffffffff8) keyctl$invalidate(0x15, r1) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000002ac0)={{{@in, @in=@local}}, {{@in6=@loopback}, 0x0, @in6=@loopback}}, 0x0) gettid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004180)={0x0, 0xffffffffffffffff, 0x0, 0x13, &(0x7f0000004140)='trustedem1vboxnet1\x00'}, 0x30) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f00000043c0)) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000400)=@allocspi={0x104, 0x16, 0x317, 0x0, 0x0, {{{@in6=@loopback, @in=@multicast2}, {@in6=@local, 0x0, 0x32}, @in6=@remote}, 0x0, 0x8}, [@mark={0xc, 0x15, {0x0, 0xaf}}]}, 0x104}}, 0x0) openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x20881, 0x0) syz_open_dev$media(0x0, 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/sequencer\x00', 0x0, 0x0) io_submit(0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc0000f, 0x0, 0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_mr_cache\x00') 14:27:14 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x10, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f0000000580)=0x5, 0xe6baca0b19da5856) socket$netlink(0x10, 0x3, 0x7) syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000002c0)={{{@in6=@mcast1, @in=@local}}, {{@in=@local}, 0x0, @in6=@dev}}, &(0x7f0000000080)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000029c0)={{{@in=@initdev, @in6=@loopback}}, {{@in=@empty}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) r1 = add_key$user(&(0x7f0000000100)='user\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000640)="b09a042773b19868a06a1ec92ce750278d3660ea80de4281165ee116ba2841576e1fa2250f5722973312d5d5e4b3cf7fe03b096e34aa7d59bd0729450ecaa2e105eeb065c6036316d9aacc01877e0eded35d2119cdbec3f1f86ad185052abc7643a34f733a09116b979f36f274002b0799f322e1fd201583c8f63567ca42e896", 0x80, 0xfffffffffffffff8) keyctl$invalidate(0x15, r1) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000002ac0)={{{@in, @in=@local}}, {{@in6=@loopback}, 0x0, @in6=@loopback}}, 0x0) gettid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004180)={0x0, 0xffffffffffffffff, 0x0, 0x13, &(0x7f0000004140)='trustedem1vboxnet1\x00'}, 0x30) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f00000043c0)) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000400)=@allocspi={0x104, 0x16, 0x317, 0x0, 0x0, {{{@in6=@loopback, @in=@multicast2}, {@in6=@local, 0x0, 0x32}, @in6=@remote}, 0x0, 0x8}, [@mark={0xc, 0x15, {0x0, 0xaf}}]}, 0x104}}, 0x0) openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x20881, 0x0) syz_open_dev$media(0x0, 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/sequencer\x00', 0x0, 0x0) io_submit(0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc0000f, 0x0, 0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_mr_cache\x00') 14:27:14 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x10, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f0000000580)=0x5, 0xe6baca0b19da5856) socket$netlink(0x10, 0x3, 0x7) syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000002c0)={{{@in6=@mcast1, @in=@local}}, {{@in=@local}, 0x0, @in6=@dev}}, &(0x7f0000000080)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000029c0)={{{@in=@initdev, @in6=@loopback}}, {{@in=@empty}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) r1 = add_key$user(&(0x7f0000000100)='user\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000640)="b09a042773b19868a06a1ec92ce750278d3660ea80de4281165ee116ba2841576e1fa2250f5722973312d5d5e4b3cf7fe03b096e34aa7d59bd0729450ecaa2e105eeb065c6036316d9aacc01877e0eded35d2119cdbec3f1f86ad185052abc7643a34f733a09116b979f36f274002b0799f322e1fd201583c8f63567ca42e896", 0x80, 0xfffffffffffffff8) keyctl$invalidate(0x15, r1) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000002ac0)={{{@in, @in=@local}}, {{@in6=@loopback}, 0x0, @in6=@loopback}}, 0x0) gettid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004180)={0x0, 0xffffffffffffffff, 0x0, 0x13, &(0x7f0000004140)='trustedem1vboxnet1\x00'}, 0x30) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f00000043c0)) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000400)=@allocspi={0x104, 0x16, 0x317, 0x0, 0x0, {{{@in6=@loopback, @in=@multicast2}, {@in6=@local, 0x0, 0x32}, @in6=@remote}, 0x0, 0x8}, [@mark={0xc, 0x15, {0x0, 0xaf}}]}, 0x104}}, 0x0) openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x20881, 0x0) syz_open_dev$media(0x0, 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/sequencer\x00', 0x0, 0x0) io_submit(0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc0000f, 0x0, 0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_mr_cache\x00') 14:27:14 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x10, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f0000000580)=0x5, 0xe6baca0b19da5856) socket$netlink(0x10, 0x3, 0x7) syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000002c0)={{{@in6=@mcast1, @in=@local}}, {{@in=@local}, 0x0, @in6=@dev}}, &(0x7f0000000080)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000029c0)={{{@in=@initdev, @in6=@loopback}}, {{@in=@empty}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) r1 = add_key$user(&(0x7f0000000100)='user\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000640)="b09a042773b19868a06a1ec92ce750278d3660ea80de4281165ee116ba2841576e1fa2250f5722973312d5d5e4b3cf7fe03b096e34aa7d59bd0729450ecaa2e105eeb065c6036316d9aacc01877e0eded35d2119cdbec3f1f86ad185052abc7643a34f733a09116b979f36f274002b0799f322e1fd201583c8f63567ca42e896", 0x80, 0xfffffffffffffff8) keyctl$invalidate(0x15, r1) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000002ac0)={{{@in, @in=@local}}, {{@in6=@loopback}, 0x0, @in6=@loopback}}, 0x0) gettid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004180)={0x0, 0xffffffffffffffff, 0x0, 0x13, &(0x7f0000004140)='trustedem1vboxnet1\x00'}, 0x30) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f00000043c0)) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000400)=@allocspi={0x104, 0x16, 0x317, 0x0, 0x0, {{{@in6=@loopback, @in=@multicast2}, {@in6=@local, 0x0, 0x32}, @in6=@remote}, 0x0, 0x8}, [@mark={0xc, 0x15, {0x0, 0xaf}}]}, 0x104}}, 0x0) openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x20881, 0x0) syz_open_dev$media(0x0, 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/sequencer\x00', 0x0, 0x0) io_submit(0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc0000f, 0x0, 0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_mr_cache\x00') 14:27:14 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x10, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f0000000580)=0x5, 0xe6baca0b19da5856) socket$netlink(0x10, 0x3, 0x7) syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000002c0)={{{@in6=@mcast1, @in=@local}}, {{@in=@local}, 0x0, @in6=@dev}}, &(0x7f0000000080)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000029c0)={{{@in=@initdev, @in6=@loopback}}, {{@in=@empty}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) r1 = add_key$user(&(0x7f0000000100)='user\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000640)="b09a042773b19868a06a1ec92ce750278d3660ea80de4281165ee116ba2841576e1fa2250f5722973312d5d5e4b3cf7fe03b096e34aa7d59bd0729450ecaa2e105eeb065c6036316d9aacc01877e0eded35d2119cdbec3f1f86ad185052abc7643a34f733a09116b979f36f274002b0799f322e1fd201583c8f63567ca42e896", 0x80, 0xfffffffffffffff8) keyctl$invalidate(0x15, r1) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000002ac0)={{{@in, @in=@local}}, {{@in6=@loopback}, 0x0, @in6=@loopback}}, 0x0) gettid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004180)={0x0, 0xffffffffffffffff, 0x0, 0x13, &(0x7f0000004140)='trustedem1vboxnet1\x00'}, 0x30) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f00000043c0)) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000400)=@allocspi={0x104, 0x16, 0x317, 0x0, 0x0, {{{@in6=@loopback, @in=@multicast2}, {@in6=@local, 0x0, 0x32}, @in6=@remote}, 0x0, 0x8}, [@mark={0xc, 0x15, {0x0, 0xaf}}]}, 0x104}}, 0x0) openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x20881, 0x0) syz_open_dev$media(0x0, 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/sequencer\x00', 0x0, 0x0) io_submit(0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc0000f, 0x0, 0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_mr_cache\x00') 14:27:14 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x10, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f0000000580)=0x5, 0xe6baca0b19da5856) socket$netlink(0x10, 0x3, 0x7) syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000002c0)={{{@in6=@mcast1, @in=@local}}, {{@in=@local}, 0x0, @in6=@dev}}, &(0x7f0000000080)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000029c0)={{{@in=@initdev, @in6=@loopback}}, {{@in=@empty}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) r1 = add_key$user(&(0x7f0000000100)='user\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000640)="b09a042773b19868a06a1ec92ce750278d3660ea80de4281165ee116ba2841576e1fa2250f5722973312d5d5e4b3cf7fe03b096e34aa7d59bd0729450ecaa2e105eeb065c6036316d9aacc01877e0eded35d2119cdbec3f1f86ad185052abc7643a34f733a09116b979f36f274002b0799f322e1fd201583c8f63567ca42e896", 0x80, 0xfffffffffffffff8) keyctl$invalidate(0x15, r1) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000002ac0)={{{@in, @in=@local}}, {{@in6=@loopback}, 0x0, @in6=@loopback}}, 0x0) gettid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004180)={0x0, 0xffffffffffffffff, 0x0, 0x13, &(0x7f0000004140)='trustedem1vboxnet1\x00'}, 0x30) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f00000043c0)) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000400)=@allocspi={0x104, 0x16, 0x317, 0x0, 0x0, {{{@in6=@loopback, @in=@multicast2}, {@in6=@local, 0x0, 0x32}, @in6=@remote}, 0x0, 0x8}, [@mark={0xc, 0x15, {0x0, 0xaf}}]}, 0x104}}, 0x0) openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x20881, 0x0) syz_open_dev$media(0x0, 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/sequencer\x00', 0x0, 0x0) io_submit(0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc0000f, 0x0, 0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_mr_cache\x00') 14:27:14 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x10, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f0000000580)=0x5, 0xe6baca0b19da5856) socket$netlink(0x10, 0x3, 0x7) syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000002c0)={{{@in6=@mcast1, @in=@local}}, {{@in=@local}, 0x0, @in6=@dev}}, &(0x7f0000000080)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000029c0)={{{@in=@initdev, @in6=@loopback}}, {{@in=@empty}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) r1 = add_key$user(&(0x7f0000000100)='user\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000640)="b09a042773b19868a06a1ec92ce750278d3660ea80de4281165ee116ba2841576e1fa2250f5722973312d5d5e4b3cf7fe03b096e34aa7d59bd0729450ecaa2e105eeb065c6036316d9aacc01877e0eded35d2119cdbec3f1f86ad185052abc7643a34f733a09116b979f36f274002b0799f322e1fd201583c8f63567ca42e896", 0x80, 0xfffffffffffffff8) keyctl$invalidate(0x15, r1) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000002ac0)={{{@in, @in=@local}}, {{@in6=@loopback}, 0x0, @in6=@loopback}}, 0x0) gettid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004180)={0x0, 0xffffffffffffffff, 0x0, 0x13, &(0x7f0000004140)='trustedem1vboxnet1\x00'}, 0x30) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f00000043c0)) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000400)=@allocspi={0x104, 0x16, 0x317, 0x0, 0x0, {{{@in6=@loopback, @in=@multicast2}, {@in6=@local, 0x0, 0x32}, @in6=@remote}, 0x0, 0x8}, [@mark={0xc, 0x15, {0x0, 0xaf}}]}, 0x104}}, 0x0) openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x20881, 0x0) syz_open_dev$media(0x0, 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/sequencer\x00', 0x0, 0x0) io_submit(0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc0000f, 0x0, 0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_mr_cache\x00') 14:27:14 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x10, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f0000000580)=0x5, 0xe6baca0b19da5856) socket$netlink(0x10, 0x3, 0x7) syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000002c0)={{{@in6=@mcast1, @in=@local}}, {{@in=@local}, 0x0, @in6=@dev}}, &(0x7f0000000080)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000029c0)={{{@in=@initdev, @in6=@loopback}}, {{@in=@empty}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) r1 = add_key$user(&(0x7f0000000100)='user\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000640)="b09a042773b19868a06a1ec92ce750278d3660ea80de4281165ee116ba2841576e1fa2250f5722973312d5d5e4b3cf7fe03b096e34aa7d59bd0729450ecaa2e105eeb065c6036316d9aacc01877e0eded35d2119cdbec3f1f86ad185052abc7643a34f733a09116b979f36f274002b0799f322e1fd201583c8f63567ca42e896", 0x80, 0xfffffffffffffff8) keyctl$invalidate(0x15, r1) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000002ac0)={{{@in, @in=@local}}, {{@in6=@loopback}, 0x0, @in6=@loopback}}, 0x0) gettid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004180)={0x0, 0xffffffffffffffff, 0x0, 0x13, &(0x7f0000004140)='trustedem1vboxnet1\x00'}, 0x30) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f00000043c0)) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000400)=@allocspi={0x104, 0x16, 0x317, 0x0, 0x0, {{{@in6=@loopback, @in=@multicast2}, {@in6=@local, 0x0, 0x32}, @in6=@remote}, 0x0, 0x8}, [@mark={0xc, 0x15, {0x0, 0xaf}}]}, 0x104}}, 0x0) openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x20881, 0x0) syz_open_dev$media(0x0, 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/sequencer\x00', 0x0, 0x0) io_submit(0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc0000f, 0x0, 0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_mr_cache\x00') 14:27:15 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x10, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f0000000580)=0x5, 0xe6baca0b19da5856) socket$netlink(0x10, 0x3, 0x7) syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000002c0)={{{@in6=@mcast1, @in=@local}}, {{@in=@local}, 0x0, @in6=@dev}}, &(0x7f0000000080)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000029c0)={{{@in=@initdev, @in6=@loopback}}, {{@in=@empty}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) r1 = add_key$user(&(0x7f0000000100)='user\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000640)="b09a042773b19868a06a1ec92ce750278d3660ea80de4281165ee116ba2841576e1fa2250f5722973312d5d5e4b3cf7fe03b096e34aa7d59bd0729450ecaa2e105eeb065c6036316d9aacc01877e0eded35d2119cdbec3f1f86ad185052abc7643a34f733a09116b979f36f274002b0799f322e1fd201583c8f63567ca42e896", 0x80, 0xfffffffffffffff8) keyctl$invalidate(0x15, r1) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000002ac0)={{{@in, @in=@local}}, {{@in6=@loopback}, 0x0, @in6=@loopback}}, 0x0) gettid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004180)={0x0, 0xffffffffffffffff, 0x0, 0x13, &(0x7f0000004140)='trustedem1vboxnet1\x00'}, 0x30) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f00000043c0)) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000400)=@allocspi={0x104, 0x16, 0x317, 0x0, 0x0, {{{@in6=@loopback, @in=@multicast2}, {@in6=@local, 0x0, 0x32}, @in6=@remote}, 0x0, 0x8}, [@mark={0xc, 0x15, {0x0, 0xaf}}]}, 0x104}}, 0x0) openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x20881, 0x0) syz_open_dev$media(0x0, 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/sequencer\x00', 0x0, 0x0) io_submit(0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc0000f, 0x0, 0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_mr_cache\x00') 14:27:15 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x10, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f0000000580)=0x5, 0xe6baca0b19da5856) socket$netlink(0x10, 0x3, 0x7) syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000002c0)={{{@in6=@mcast1, @in=@local}}, {{@in=@local}, 0x0, @in6=@dev}}, &(0x7f0000000080)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000029c0)={{{@in=@initdev, @in6=@loopback}}, {{@in=@empty}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) r1 = add_key$user(&(0x7f0000000100)='user\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000640)="b09a042773b19868a06a1ec92ce750278d3660ea80de4281165ee116ba2841576e1fa2250f5722973312d5d5e4b3cf7fe03b096e34aa7d59bd0729450ecaa2e105eeb065c6036316d9aacc01877e0eded35d2119cdbec3f1f86ad185052abc7643a34f733a09116b979f36f274002b0799f322e1fd201583c8f63567ca42e896", 0x80, 0xfffffffffffffff8) keyctl$invalidate(0x15, r1) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000002ac0)={{{@in, @in=@local}}, {{@in6=@loopback}, 0x0, @in6=@loopback}}, 0x0) gettid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004180)={0x0, 0xffffffffffffffff, 0x0, 0x13, &(0x7f0000004140)='trustedem1vboxnet1\x00'}, 0x30) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f00000043c0)) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000400)=@allocspi={0x104, 0x16, 0x317, 0x0, 0x0, {{{@in6=@loopback, @in=@multicast2}, {@in6=@local, 0x0, 0x32}, @in6=@remote}, 0x0, 0x8}, [@mark={0xc, 0x15, {0x0, 0xaf}}]}, 0x104}}, 0x0) openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x20881, 0x0) syz_open_dev$media(0x0, 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/sequencer\x00', 0x0, 0x0) io_submit(0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc0000f, 0x0, 0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_mr_cache\x00') 14:27:15 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x10, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f0000000580)=0x5, 0xe6baca0b19da5856) socket$netlink(0x10, 0x3, 0x7) syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000002c0)={{{@in6=@mcast1, @in=@local}}, {{@in=@local}, 0x0, @in6=@dev}}, &(0x7f0000000080)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000029c0)={{{@in=@initdev, @in6=@loopback}}, {{@in=@empty}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) r1 = add_key$user(&(0x7f0000000100)='user\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000640)="b09a042773b19868a06a1ec92ce750278d3660ea80de4281165ee116ba2841576e1fa2250f5722973312d5d5e4b3cf7fe03b096e34aa7d59bd0729450ecaa2e105eeb065c6036316d9aacc01877e0eded35d2119cdbec3f1f86ad185052abc7643a34f733a09116b979f36f274002b0799f322e1fd201583c8f63567ca42e896", 0x80, 0xfffffffffffffff8) keyctl$invalidate(0x15, r1) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000002ac0)={{{@in, @in=@local}}, {{@in6=@loopback}, 0x0, @in6=@loopback}}, 0x0) gettid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004180)={0x0, 0xffffffffffffffff, 0x0, 0x13, &(0x7f0000004140)='trustedem1vboxnet1\x00'}, 0x30) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f00000043c0)) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000400)=@allocspi={0x104, 0x16, 0x317, 0x0, 0x0, {{{@in6=@loopback, @in=@multicast2}, {@in6=@local, 0x0, 0x32}, @in6=@remote}, 0x0, 0x8}, [@mark={0xc, 0x15, {0x0, 0xaf}}]}, 0x104}}, 0x0) openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x20881, 0x0) syz_open_dev$media(0x0, 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/sequencer\x00', 0x0, 0x0) io_submit(0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc0000f, 0x0, 0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_mr_cache\x00') 14:27:15 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x10, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f0000000580)=0x5, 0xe6baca0b19da5856) socket$netlink(0x10, 0x3, 0x7) syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000002c0)={{{@in6=@mcast1, @in=@local}}, {{@in=@local}, 0x0, @in6=@dev}}, &(0x7f0000000080)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000029c0)={{{@in=@initdev, @in6=@loopback}}, {{@in=@empty}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) r1 = add_key$user(&(0x7f0000000100)='user\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000640)="b09a042773b19868a06a1ec92ce750278d3660ea80de4281165ee116ba2841576e1fa2250f5722973312d5d5e4b3cf7fe03b096e34aa7d59bd0729450ecaa2e105eeb065c6036316d9aacc01877e0eded35d2119cdbec3f1f86ad185052abc7643a34f733a09116b979f36f274002b0799f322e1fd201583c8f63567ca42e896", 0x80, 0xfffffffffffffff8) keyctl$invalidate(0x15, r1) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000002ac0)={{{@in, @in=@local}}, {{@in6=@loopback}, 0x0, @in6=@loopback}}, 0x0) gettid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004180)={0x0, 0xffffffffffffffff, 0x0, 0x13, &(0x7f0000004140)='trustedem1vboxnet1\x00'}, 0x30) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f00000043c0)) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000400)=@allocspi={0x104, 0x16, 0x317, 0x0, 0x0, {{{@in6=@loopback, @in=@multicast2}, {@in6=@local, 0x0, 0x32}, @in6=@remote}, 0x0, 0x8}, [@mark={0xc, 0x15, {0x0, 0xaf}}]}, 0x104}}, 0x0) openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x20881, 0x0) syz_open_dev$media(0x0, 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/sequencer\x00', 0x0, 0x0) io_submit(0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc0000f, 0x0, 0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_mr_cache\x00') 14:27:15 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x10, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f0000000580)=0x5, 0xe6baca0b19da5856) socket$netlink(0x10, 0x3, 0x7) syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000002c0)={{{@in6=@mcast1, @in=@local}}, {{@in=@local}, 0x0, @in6=@dev}}, &(0x7f0000000080)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000029c0)={{{@in=@initdev, @in6=@loopback}}, {{@in=@empty}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) r1 = add_key$user(&(0x7f0000000100)='user\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000640)="b09a042773b19868a06a1ec92ce750278d3660ea80de4281165ee116ba2841576e1fa2250f5722973312d5d5e4b3cf7fe03b096e34aa7d59bd0729450ecaa2e105eeb065c6036316d9aacc01877e0eded35d2119cdbec3f1f86ad185052abc7643a34f733a09116b979f36f274002b0799f322e1fd201583c8f63567ca42e896", 0x80, 0xfffffffffffffff8) keyctl$invalidate(0x15, r1) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000002ac0)={{{@in, @in=@local}}, {{@in6=@loopback}, 0x0, @in6=@loopback}}, 0x0) gettid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004180)={0x0, 0xffffffffffffffff, 0x0, 0x13, &(0x7f0000004140)='trustedem1vboxnet1\x00'}, 0x30) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f00000043c0)) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000400)=@allocspi={0x104, 0x16, 0x317, 0x0, 0x0, {{{@in6=@loopback, @in=@multicast2}, {@in6=@local, 0x0, 0x32}, @in6=@remote}, 0x0, 0x8}, [@mark={0xc, 0x15, {0x0, 0xaf}}]}, 0x104}}, 0x0) openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x20881, 0x0) syz_open_dev$media(0x0, 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/sequencer\x00', 0x0, 0x0) io_submit(0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc0000f, 0x0, 0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_mr_cache\x00') 14:27:15 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x10, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f0000000580)=0x5, 0xe6baca0b19da5856) socket$netlink(0x10, 0x3, 0x7) syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000002c0)={{{@in6=@mcast1, @in=@local}}, {{@in=@local}, 0x0, @in6=@dev}}, &(0x7f0000000080)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000029c0)={{{@in=@initdev, @in6=@loopback}}, {{@in=@empty}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) r1 = add_key$user(&(0x7f0000000100)='user\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000640)="b09a042773b19868a06a1ec92ce750278d3660ea80de4281165ee116ba2841576e1fa2250f5722973312d5d5e4b3cf7fe03b096e34aa7d59bd0729450ecaa2e105eeb065c6036316d9aacc01877e0eded35d2119cdbec3f1f86ad185052abc7643a34f733a09116b979f36f274002b0799f322e1fd201583c8f63567ca42e896", 0x80, 0xfffffffffffffff8) keyctl$invalidate(0x15, r1) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000002ac0)={{{@in, @in=@local}}, {{@in6=@loopback}, 0x0, @in6=@loopback}}, 0x0) gettid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004180)={0x0, 0xffffffffffffffff, 0x0, 0x13, &(0x7f0000004140)='trustedem1vboxnet1\x00'}, 0x30) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f00000043c0)) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000400)=@allocspi={0x104, 0x16, 0x317, 0x0, 0x0, {{{@in6=@loopback, @in=@multicast2}, {@in6=@local, 0x0, 0x32}, @in6=@remote}, 0x0, 0x8}, [@mark={0xc, 0x15, {0x0, 0xaf}}]}, 0x104}}, 0x0) openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x20881, 0x0) syz_open_dev$media(0x0, 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/sequencer\x00', 0x0, 0x0) io_submit(0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc0000f, 0x0, 0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_mr_cache\x00') 14:27:15 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x10, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f0000000580)=0x5, 0xe6baca0b19da5856) socket$netlink(0x10, 0x3, 0x7) syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000002c0)={{{@in6=@mcast1, @in=@local}}, {{@in=@local}, 0x0, @in6=@dev}}, &(0x7f0000000080)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000029c0)={{{@in=@initdev, @in6=@loopback}}, {{@in=@empty}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) r1 = add_key$user(&(0x7f0000000100)='user\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000640)="b09a042773b19868a06a1ec92ce750278d3660ea80de4281165ee116ba2841576e1fa2250f5722973312d5d5e4b3cf7fe03b096e34aa7d59bd0729450ecaa2e105eeb065c6036316d9aacc01877e0eded35d2119cdbec3f1f86ad185052abc7643a34f733a09116b979f36f274002b0799f322e1fd201583c8f63567ca42e896", 0x80, 0xfffffffffffffff8) keyctl$invalidate(0x15, r1) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000002ac0)={{{@in, @in=@local}}, {{@in6=@loopback}, 0x0, @in6=@loopback}}, 0x0) gettid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004180)={0x0, 0xffffffffffffffff, 0x0, 0x13, &(0x7f0000004140)='trustedem1vboxnet1\x00'}, 0x30) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f00000043c0)) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000400)=@allocspi={0x104, 0x16, 0x317, 0x0, 0x0, {{{@in6=@loopback, @in=@multicast2}, {@in6=@local, 0x0, 0x32}, @in6=@remote}, 0x0, 0x8}, [@mark={0xc, 0x15, {0x0, 0xaf}}]}, 0x104}}, 0x0) openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x20881, 0x0) syz_open_dev$media(0x0, 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/sequencer\x00', 0x0, 0x0) io_submit(0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc0000f, 0x0, 0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_mr_cache\x00') 14:27:15 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x10, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f0000000580)=0x5, 0xe6baca0b19da5856) socket$netlink(0x10, 0x3, 0x7) syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000002c0)={{{@in6=@mcast1, @in=@local}}, {{@in=@local}, 0x0, @in6=@dev}}, &(0x7f0000000080)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000029c0)={{{@in=@initdev, @in6=@loopback}}, {{@in=@empty}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) r1 = add_key$user(&(0x7f0000000100)='user\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000640)="b09a042773b19868a06a1ec92ce750278d3660ea80de4281165ee116ba2841576e1fa2250f5722973312d5d5e4b3cf7fe03b096e34aa7d59bd0729450ecaa2e105eeb065c6036316d9aacc01877e0eded35d2119cdbec3f1f86ad185052abc7643a34f733a09116b979f36f274002b0799f322e1fd201583c8f63567ca42e896", 0x80, 0xfffffffffffffff8) keyctl$invalidate(0x15, r1) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000002ac0)={{{@in, @in=@local}}, {{@in6=@loopback}, 0x0, @in6=@loopback}}, 0x0) gettid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004180)={0x0, 0xffffffffffffffff, 0x0, 0x13, &(0x7f0000004140)='trustedem1vboxnet1\x00'}, 0x30) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f00000043c0)) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000400)=@allocspi={0x104, 0x16, 0x317, 0x0, 0x0, {{{@in6=@loopback, @in=@multicast2}, {@in6=@local, 0x0, 0x32}, @in6=@remote}, 0x0, 0x8}, [@mark={0xc, 0x15, {0x0, 0xaf}}]}, 0x104}}, 0x0) openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x20881, 0x0) syz_open_dev$media(0x0, 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/sequencer\x00', 0x0, 0x0) io_submit(0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc0000f, 0x0, 0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_mr_cache\x00') 14:27:15 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x10, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f0000000580)=0x5, 0xe6baca0b19da5856) socket$netlink(0x10, 0x3, 0x7) syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000002c0)={{{@in6=@mcast1, @in=@local}}, {{@in=@local}, 0x0, @in6=@dev}}, &(0x7f0000000080)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000029c0)={{{@in=@initdev, @in6=@loopback}}, {{@in=@empty}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) r1 = add_key$user(&(0x7f0000000100)='user\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000640)="b09a042773b19868a06a1ec92ce750278d3660ea80de4281165ee116ba2841576e1fa2250f5722973312d5d5e4b3cf7fe03b096e34aa7d59bd0729450ecaa2e105eeb065c6036316d9aacc01877e0eded35d2119cdbec3f1f86ad185052abc7643a34f733a09116b979f36f274002b0799f322e1fd201583c8f63567ca42e896", 0x80, 0xfffffffffffffff8) keyctl$invalidate(0x15, r1) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000002ac0)={{{@in, @in=@local}}, {{@in6=@loopback}, 0x0, @in6=@loopback}}, 0x0) gettid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004180)={0x0, 0xffffffffffffffff, 0x0, 0x13, &(0x7f0000004140)='trustedem1vboxnet1\x00'}, 0x30) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f00000043c0)) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000400)=@allocspi={0x104, 0x16, 0x317, 0x0, 0x0, {{{@in6=@loopback, @in=@multicast2}, {@in6=@local, 0x0, 0x32}, @in6=@remote}, 0x0, 0x8}, [@mark={0xc, 0x15, {0x0, 0xaf}}]}, 0x104}}, 0x0) openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x20881, 0x0) syz_open_dev$media(0x0, 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/sequencer\x00', 0x0, 0x0) io_submit(0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc0000f, 0x0, 0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_mr_cache\x00') 14:27:15 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x10, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f0000000580)=0x5, 0xe6baca0b19da5856) socket$netlink(0x10, 0x3, 0x7) syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000002c0)={{{@in6=@mcast1, @in=@local}}, {{@in=@local}, 0x0, @in6=@dev}}, &(0x7f0000000080)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000029c0)={{{@in=@initdev, @in6=@loopback}}, {{@in=@empty}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) r1 = add_key$user(&(0x7f0000000100)='user\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000640)="b09a042773b19868a06a1ec92ce750278d3660ea80de4281165ee116ba2841576e1fa2250f5722973312d5d5e4b3cf7fe03b096e34aa7d59bd0729450ecaa2e105eeb065c6036316d9aacc01877e0eded35d2119cdbec3f1f86ad185052abc7643a34f733a09116b979f36f274002b0799f322e1fd201583c8f63567ca42e896", 0x80, 0xfffffffffffffff8) keyctl$invalidate(0x15, r1) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000002ac0)={{{@in, @in=@local}}, {{@in6=@loopback}, 0x0, @in6=@loopback}}, 0x0) gettid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004180)={0x0, 0xffffffffffffffff, 0x0, 0x13, &(0x7f0000004140)='trustedem1vboxnet1\x00'}, 0x30) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f00000043c0)) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000400)=@allocspi={0x104, 0x16, 0x317, 0x0, 0x0, {{{@in6=@loopback, @in=@multicast2}, {@in6=@local, 0x0, 0x32}, @in6=@remote}, 0x0, 0x8}, [@mark={0xc, 0x15, {0x0, 0xaf}}]}, 0x104}}, 0x0) openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x20881, 0x0) syz_open_dev$media(0x0, 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/sequencer\x00', 0x0, 0x0) io_submit(0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc0000f, 0x0, 0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_mr_cache\x00') 14:27:15 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") futex(0x0, 0xc, 0x0, 0x0, 0x0, 0x0) 14:27:15 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") futex(0x0, 0xc, 0x0, 0x0, 0x0, 0x0) 14:27:15 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x2, 0x71, 0x11, 0x1a001000000}, [@ldst={0x6, 0x5, 0x2}]}, &(0x7f0000000080)='GPL\x00', 0x4, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 14:27:15 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x10, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f0000000580)=0x5, 0xe6baca0b19da5856) socket$netlink(0x10, 0x3, 0x7) syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000002c0)={{{@in6=@mcast1, @in=@local}}, {{@in=@local}, 0x0, @in6=@dev}}, &(0x7f0000000080)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000029c0)={{{@in=@initdev, @in6=@loopback}}, {{@in=@empty}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) r1 = add_key$user(&(0x7f0000000100)='user\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000640)="b09a042773b19868a06a1ec92ce750278d3660ea80de4281165ee116ba2841576e1fa2250f5722973312d5d5e4b3cf7fe03b096e34aa7d59bd0729450ecaa2e105eeb065c6036316d9aacc01877e0eded35d2119cdbec3f1f86ad185052abc7643a34f733a09116b979f36f274002b0799f322e1fd201583c8f63567ca42e896", 0x80, 0xfffffffffffffff8) keyctl$invalidate(0x15, r1) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000002ac0)={{{@in, @in=@local}}, {{@in6=@loopback}, 0x0, @in6=@loopback}}, 0x0) gettid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004180)={0x0, 0xffffffffffffffff, 0x0, 0x13, &(0x7f0000004140)='trustedem1vboxnet1\x00'}, 0x30) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f00000043c0)) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000400)=@allocspi={0x104, 0x16, 0x317, 0x0, 0x0, {{{@in6=@loopback, @in=@multicast2}, {@in6=@local, 0x0, 0x32}, @in6=@remote}, 0x0, 0x8}, [@mark={0xc, 0x15, {0x0, 0xaf}}]}, 0x104}}, 0x0) openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x20881, 0x0) syz_open_dev$media(0x0, 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/sequencer\x00', 0x0, 0x0) io_submit(0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc0000f, 0x0, 0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_mr_cache\x00') 14:27:15 executing program 0: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) read(r0, 0x0, 0xe4) 14:27:15 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0xf, 0x3, &(0x7f0000000600)=@framed={{0xffffffbc, 0x0, 0x0, 0x0, 0x0, 0x54}}, &(0x7f0000000040)='GPL\x00', 0x1, 0x1fe, &(0x7f0000000340)=""/153, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xffffff7f}, 0x48) 14:27:15 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") futex(0x0, 0xc, 0x0, 0x0, 0x0, 0x0) 14:27:15 executing program 0: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) read(r0, 0x0, 0xe4) 14:27:15 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0xf, 0x3, &(0x7f0000000600)=@framed={{0xffffffbc, 0x0, 0x0, 0x0, 0x0, 0x54}}, &(0x7f0000000040)='GPL\x00', 0x1, 0x1fe, &(0x7f0000000340)=""/153, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xffffff7f}, 0x48) 14:27:15 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000052c0)={&(0x7f00000000c0)=@newsa={0x104, 0x1a, 0x1, 0x0, 0x0, {{@in=@multicast1, @in=@local}, {@in=@multicast1=0xe0000008, 0x0, 0x2b}, @in, {}, {}, {}, 0x0, 0x0, 0xa}, [@coaddr={0x14}]}, 0x104}}, 0x0) 14:27:16 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x2, 0x71, 0x11, 0x1a001000000}, [@ldst={0x6, 0x5, 0x2}]}, &(0x7f0000000080)='GPL\x00', 0x4, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 14:27:16 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") futex(0x0, 0xc, 0x0, 0x0, 0x0, 0x0) [ 377.761030][T30642] mip6: mip6_rthdr_init_state: state's mode is not 2: 0 14:27:16 executing program 0: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) read(r0, 0x0, 0xe4) 14:27:16 executing program 3: syz_open_dev$swradio(0x0, 0x1, 0x2) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_type(r0, &(0x7f0000000380)='cgroup.type\x00', 0x2, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000049c0)=[{{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f00000015c0)=""/248, 0xf8}], 0x1}}], 0x1, 0x0, 0x0) readv(r1, &(0x7f0000000540), 0x10000000000002f4) 14:27:16 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0xf, 0x3, &(0x7f0000000600)=@framed={{0xffffffbc, 0x0, 0x0, 0x0, 0x0, 0x54}}, &(0x7f0000000040)='GPL\x00', 0x1, 0x1fe, &(0x7f0000000340)=""/153, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xffffff7f}, 0x48) 14:27:16 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) 14:27:16 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000052c0)={&(0x7f00000000c0)=@newsa={0x104, 0x1a, 0x1, 0x0, 0x0, {{@in=@multicast1, @in=@local}, {@in=@multicast1=0xe0000008, 0x0, 0x2b}, @in, {}, {}, {}, 0x0, 0x0, 0xa}, [@coaddr={0x14}]}, 0x104}}, 0x0) 14:27:16 executing program 0: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) read(r0, 0x0, 0xe4) 14:27:16 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x2, 0x71, 0x11, 0x1a001000000}, [@ldst={0x6, 0x5, 0x2}]}, &(0x7f0000000080)='GPL\x00', 0x4, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 14:27:16 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) [ 377.925096][T30658] mip6: mip6_rthdr_init_state: state's mode is not 2: 0 14:27:16 executing program 3: syz_open_dev$swradio(0x0, 0x1, 0x2) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_type(r0, &(0x7f0000000380)='cgroup.type\x00', 0x2, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000049c0)=[{{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f00000015c0)=""/248, 0xf8}], 0x1}}], 0x1, 0x0, 0x0) readv(r1, &(0x7f0000000540), 0x10000000000002f4) 14:27:16 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0xf, 0x3, &(0x7f0000000600)=@framed={{0xffffffbc, 0x0, 0x0, 0x0, 0x0, 0x54}}, &(0x7f0000000040)='GPL\x00', 0x1, 0x1fe, &(0x7f0000000340)=""/153, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xffffff7f}, 0x48) 14:27:16 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000052c0)={&(0x7f00000000c0)=@newsa={0x104, 0x1a, 0x1, 0x0, 0x0, {{@in=@multicast1, @in=@local}, {@in=@multicast1=0xe0000008, 0x0, 0x2b}, @in, {}, {}, {}, 0x0, 0x0, 0xa}, [@coaddr={0x14}]}, 0x104}}, 0x0) 14:27:16 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x2, 0x71, 0x11, 0x1a001000000}, [@ldst={0x6, 0x5, 0x2}]}, &(0x7f0000000080)='GPL\x00', 0x4, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 14:27:16 executing program 0: syz_open_dev$swradio(0x0, 0x1, 0x2) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_type(r0, &(0x7f0000000380)='cgroup.type\x00', 0x2, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000049c0)=[{{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f00000015c0)=""/248, 0xf8}], 0x1}}], 0x1, 0x0, 0x0) readv(r1, &(0x7f0000000540), 0x10000000000002f4) 14:27:16 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) [ 378.031736][T30681] mip6: mip6_rthdr_init_state: state's mode is not 2: 0 14:27:16 executing program 3: syz_open_dev$swradio(0x0, 0x1, 0x2) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_type(r0, &(0x7f0000000380)='cgroup.type\x00', 0x2, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000049c0)=[{{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f00000015c0)=""/248, 0xf8}], 0x1}}], 0x1, 0x0, 0x0) readv(r1, &(0x7f0000000540), 0x10000000000002f4) 14:27:16 executing program 4: syz_open_dev$swradio(0x0, 0x1, 0x2) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_type(r0, &(0x7f0000000380)='cgroup.type\x00', 0x2, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000049c0)=[{{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f00000015c0)=""/248, 0xf8}], 0x1}}], 0x1, 0x0, 0x0) readv(r1, &(0x7f0000000540), 0x10000000000002f4) 14:27:16 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='my\x00\x00\xff\x0f\x00\x00\x00\x00\x00\x00\x00\x00', 0x26e1, 0x0) 14:27:16 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) 14:27:16 executing program 0: syz_open_dev$swradio(0x0, 0x1, 0x2) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_type(r0, &(0x7f0000000380)='cgroup.type\x00', 0x2, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000049c0)=[{{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f00000015c0)=""/248, 0xf8}], 0x1}}], 0x1, 0x0, 0x0) readv(r1, &(0x7f0000000540), 0x10000000000002f4) 14:27:16 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000052c0)={&(0x7f00000000c0)=@newsa={0x104, 0x1a, 0x1, 0x0, 0x0, {{@in=@multicast1, @in=@local}, {@in=@multicast1=0xe0000008, 0x0, 0x2b}, @in, {}, {}, {}, 0x0, 0x0, 0xa}, [@coaddr={0x14}]}, 0x104}}, 0x0) 14:27:16 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='my\x00\x00\xff\x0f\x00\x00\x00\x00\x00\x00\x00\x00', 0x26e1, 0x0) 14:27:16 executing program 3: syz_open_dev$swradio(0x0, 0x1, 0x2) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_type(r0, &(0x7f0000000380)='cgroup.type\x00', 0x2, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000049c0)=[{{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f00000015c0)=""/248, 0xf8}], 0x1}}], 0x1, 0x0, 0x0) readv(r1, &(0x7f0000000540), 0x10000000000002f4) 14:27:16 executing program 4: syz_open_dev$swradio(0x0, 0x1, 0x2) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_type(r0, &(0x7f0000000380)='cgroup.type\x00', 0x2, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000049c0)=[{{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f00000015c0)=""/248, 0xf8}], 0x1}}], 0x1, 0x0, 0x0) readv(r1, &(0x7f0000000540), 0x10000000000002f4) 14:27:16 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='my\x00\x00\xff\x0f\x00\x00\x00\x00\x00\x00\x00\x00', 0x26e1, 0x0) [ 378.274432][T30714] mip6: mip6_rthdr_init_state: state's mode is not 2: 0 14:27:16 executing program 0: syz_open_dev$swradio(0x0, 0x1, 0x2) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_type(r0, &(0x7f0000000380)='cgroup.type\x00', 0x2, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000049c0)=[{{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f00000015c0)=""/248, 0xf8}], 0x1}}], 0x1, 0x0, 0x0) readv(r1, &(0x7f0000000540), 0x10000000000002f4) 14:27:16 executing program 1: r0 = openat$usbmon(0xffffffffffffff9c, &(0x7f0000000400)='/dev/usbmon0\x00', 0x0, 0x0) ioctl$MON_IOCH_MFLUSH(r0, 0x9208, 0x0) 14:27:16 executing program 5: prctl$PR_GET_FPEXC(0xb, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x0) fallocate(r0, 0x20, 0x0, 0xfffffeff000) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) fallocate(r1, 0x0, 0x0, 0x10000104) 14:27:16 executing program 4: syz_open_dev$swradio(0x0, 0x1, 0x2) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_type(r0, &(0x7f0000000380)='cgroup.type\x00', 0x2, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000049c0)=[{{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f00000015c0)=""/248, 0xf8}], 0x1}}], 0x1, 0x0, 0x0) readv(r1, &(0x7f0000000540), 0x10000000000002f4) 14:27:16 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xedX#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VIDIOC_QUERYSTD(0xffffffffffffffff, 0x8008563f, 0x0) ioctl$VIDIOC_S_STD(r0, 0x40085618, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000b80)={0x0, {0x2, 0x4e22, @loopback}, {0x2, 0x0, @local}, {0x2, 0x0, @remote}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) r2 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup3(r2, r1, 0x0) 14:27:16 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="11dca50d5e0bcfe47bf070") connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) r2 = socket(0x400000000000010, 0x802, 0x0) write(r2, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) setsockopt$inet_mreq(r0, 0x0, 0x4, 0x0, 0x0) 14:27:16 executing program 1: r0 = openat$usbmon(0xffffffffffffff9c, &(0x7f0000000400)='/dev/usbmon0\x00', 0x0, 0x0) ioctl$MON_IOCH_MFLUSH(r0, 0x9208, 0x0) 14:27:16 executing program 0: mkdir(&(0x7f0000000580)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') mount$bpf(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)='bpf\x00', 0x0, &(0x7f0000000440)={[{@mode={'mode'}}]}) preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000200)=""/42, 0xb2}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xfbf3}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x3c, 0x0) 14:27:16 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='my\x00\x00\xff\x0f\x00\x00\x00\x00\x00\x00\x00\x00', 0x26e1, 0x0) 14:27:16 executing program 1: r0 = openat$usbmon(0xffffffffffffff9c, &(0x7f0000000400)='/dev/usbmon0\x00', 0x0, 0x0) ioctl$MON_IOCH_MFLUSH(r0, 0x9208, 0x0) 14:27:16 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket(0x11, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000001c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r1, &(0x7f0000000380)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000000140)=0x1, 0x2e2) creat(&(0x7f0000000080)='./file0\x00', 0x0) io_setup(0x1, &(0x7f0000000100)=0x0) io_submit(r3, 0x1, &(0x7f0000000180)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x100000000001, 0x0, r1, &(0x7f0000000080), 0xfdef}]) [ 378.559445][ T26] kauditd_printk_skb: 41 callbacks suppressed [ 378.559452][ T26] audit: type=1800 audit(1566138436.833:147): pid=30735 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed comm="syz-executor.5" name="bus" dev="sda1" ino=17233 res=0 14:27:16 executing program 1: r0 = openat$usbmon(0xffffffffffffff9c, &(0x7f0000000400)='/dev/usbmon0\x00', 0x0, 0x0) ioctl$MON_IOCH_MFLUSH(r0, 0x9208, 0x0) 14:27:16 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="11dca50d5e0bcfe47bf070") connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) r2 = socket(0x400000000000010, 0x802, 0x0) write(r2, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) setsockopt$inet_mreq(r0, 0x0, 0x4, 0x0, 0x0) 14:27:16 executing program 5: prctl$PR_GET_FPEXC(0xb, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x0) fallocate(r0, 0x20, 0x0, 0xfffffeff000) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) fallocate(r1, 0x0, 0x0, 0x10000104) 14:27:16 executing program 0: mkdir(&(0x7f0000000580)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') mount$bpf(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)='bpf\x00', 0x0, &(0x7f0000000440)={[{@mode={'mode'}}]}) preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000200)=""/42, 0xb2}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xfbf3}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x3c, 0x0) 14:27:16 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xedX#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VIDIOC_QUERYSTD(0xffffffffffffffff, 0x8008563f, 0x0) ioctl$VIDIOC_S_STD(r0, 0x40085618, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000b80)={0x0, {0x2, 0x4e22, @loopback}, {0x2, 0x0, @local}, {0x2, 0x0, @remote}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) r2 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup3(r2, r1, 0x0) [ 378.662272][ T26] audit: type=1800 audit(1566138436.863:148): pid=30751 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed comm="syz-executor.5" name="bus" dev="sda1" ino=17233 res=0 14:27:17 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="11dca50d5e0bcfe47bf070") connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) r2 = socket(0x400000000000010, 0x802, 0x0) write(r2, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) setsockopt$inet_mreq(r0, 0x0, 0x4, 0x0, 0x0) 14:27:17 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xedX#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VIDIOC_QUERYSTD(0xffffffffffffffff, 0x8008563f, 0x0) ioctl$VIDIOC_S_STD(r0, 0x40085618, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000b80)={0x0, {0x2, 0x4e22, @loopback}, {0x2, 0x0, @local}, {0x2, 0x0, @remote}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) r2 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup3(r2, r1, 0x0) 14:27:17 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket(0x11, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000001c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r1, &(0x7f0000000380)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000000140)=0x1, 0x2e2) creat(&(0x7f0000000080)='./file0\x00', 0x0) io_setup(0x1, &(0x7f0000000100)=0x0) io_submit(r3, 0x1, &(0x7f0000000180)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x100000000001, 0x0, r1, &(0x7f0000000080), 0xfdef}]) 14:27:17 executing program 0: mkdir(&(0x7f0000000580)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') mount$bpf(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)='bpf\x00', 0x0, &(0x7f0000000440)={[{@mode={'mode'}}]}) preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000200)=""/42, 0xb2}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xfbf3}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x3c, 0x0) 14:27:17 executing program 5: prctl$PR_GET_FPEXC(0xb, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x0) fallocate(r0, 0x20, 0x0, 0xfffffeff000) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) fallocate(r1, 0x0, 0x0, 0x10000104) 14:27:17 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="11dca50d5e0bcfe47bf070") connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) r2 = socket(0x400000000000010, 0x802, 0x0) write(r2, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) setsockopt$inet_mreq(r0, 0x0, 0x4, 0x0, 0x0) 14:27:17 executing program 0: mkdir(&(0x7f0000000580)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') mount$bpf(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)='bpf\x00', 0x0, &(0x7f0000000440)={[{@mode={'mode'}}]}) preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000200)=""/42, 0xb2}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xfbf3}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x3c, 0x0) 14:27:17 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xedX#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VIDIOC_QUERYSTD(0xffffffffffffffff, 0x8008563f, 0x0) ioctl$VIDIOC_S_STD(r0, 0x40085618, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000b80)={0x0, {0x2, 0x4e22, @loopback}, {0x2, 0x0, @local}, {0x2, 0x0, @remote}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) r2 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup3(r2, r1, 0x0) 14:27:17 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xedX#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VIDIOC_QUERYSTD(0xffffffffffffffff, 0x8008563f, 0x0) ioctl$VIDIOC_S_STD(r0, 0x40085618, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000b80)={0x0, {0x2, 0x4e22, @loopback}, {0x2, 0x0, @local}, {0x2, 0x0, @remote}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) r2 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup3(r2, r1, 0x0) 14:27:17 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket(0x11, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000001c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r1, &(0x7f0000000380)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000000140)=0x1, 0x2e2) creat(&(0x7f0000000080)='./file0\x00', 0x0) io_setup(0x1, &(0x7f0000000100)=0x0) io_submit(r3, 0x1, &(0x7f0000000180)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x100000000001, 0x0, r1, &(0x7f0000000080), 0xfdef}]) 14:27:17 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket(0x11, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000001c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r1, &(0x7f0000000380)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000000140)=0x1, 0x2e2) creat(&(0x7f0000000080)='./file0\x00', 0x0) io_setup(0x1, &(0x7f0000000100)=0x0) io_submit(r3, 0x1, &(0x7f0000000180)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x100000000001, 0x0, r1, &(0x7f0000000080), 0xfdef}]) 14:27:17 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket(0x11, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000001c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r1, &(0x7f0000000380)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000000140)=0x1, 0x2e2) creat(&(0x7f0000000080)='./file0\x00', 0x0) io_setup(0x1, &(0x7f0000000100)=0x0) io_submit(r3, 0x1, &(0x7f0000000180)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x100000000001, 0x0, r1, &(0x7f0000000080), 0xfdef}]) 14:27:17 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xedX#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VIDIOC_QUERYSTD(0xffffffffffffffff, 0x8008563f, 0x0) ioctl$VIDIOC_S_STD(r0, 0x40085618, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000b80)={0x0, {0x2, 0x4e22, @loopback}, {0x2, 0x0, @local}, {0x2, 0x0, @remote}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) r2 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup3(r2, r1, 0x0) 14:27:17 executing program 5: prctl$PR_GET_FPEXC(0xb, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x0) fallocate(r0, 0x20, 0x0, 0xfffffeff000) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) fallocate(r1, 0x0, 0x0, 0x10000104) 14:27:17 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xedX#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VIDIOC_QUERYSTD(0xffffffffffffffff, 0x8008563f, 0x0) ioctl$VIDIOC_S_STD(r0, 0x40085618, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000b80)={0x0, {0x2, 0x4e22, @loopback}, {0x2, 0x0, @local}, {0x2, 0x0, @remote}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) r2 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup3(r2, r1, 0x0) 14:27:17 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket(0x11, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000001c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r1, &(0x7f0000000380)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000000140)=0x1, 0x2e2) creat(&(0x7f0000000080)='./file0\x00', 0x0) io_setup(0x1, &(0x7f0000000100)=0x0) io_submit(r3, 0x1, &(0x7f0000000180)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x100000000001, 0x0, r1, &(0x7f0000000080), 0xfdef}]) 14:27:17 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket(0x11, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000001c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r1, &(0x7f0000000380)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000000140)=0x1, 0x2e2) creat(&(0x7f0000000080)='./file0\x00', 0x0) io_setup(0x1, &(0x7f0000000100)=0x0) io_submit(r3, 0x1, &(0x7f0000000180)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x100000000001, 0x0, r1, &(0x7f0000000080), 0xfdef}]) 14:27:17 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket(0x11, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000001c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r1, &(0x7f0000000380)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000000140)=0x1, 0x2e2) creat(&(0x7f0000000080)='./file0\x00', 0x0) io_setup(0x1, &(0x7f0000000100)=0x0) io_submit(r3, 0x1, &(0x7f0000000180)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x100000000001, 0x0, r1, &(0x7f0000000080), 0xfdef}]) 14:27:17 executing program 3: mkdir(&(0x7f0000000580)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') mount$bpf(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)='bpf\x00', 0x0, &(0x7f0000000440)={[{@mode={'mode'}}]}) preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000200)=""/42, 0xb2}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xfbf3}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x3c, 0x0) 14:27:17 executing program 5: prctl$PR_GET_FPEXC(0xb, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x0) fallocate(r0, 0x20, 0x0, 0xfffffeff000) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) fallocate(r1, 0x0, 0x0, 0x10000104) 14:27:17 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket(0x11, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000001c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r1, &(0x7f0000000380)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000000140)=0x1, 0x2e2) creat(&(0x7f0000000080)='./file0\x00', 0x0) io_setup(0x1, &(0x7f0000000100)=0x0) io_submit(r3, 0x1, &(0x7f0000000180)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x100000000001, 0x0, r1, &(0x7f0000000080), 0xfdef}]) 14:27:17 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="11dca50d5e0bcfe47bf070") connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) r2 = socket(0x400000000000010, 0x802, 0x0) write(r2, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) setsockopt$inet_mreq(r0, 0x0, 0x4, 0x0, 0x0) 14:27:17 executing program 3: mkdir(&(0x7f0000000580)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') mount$bpf(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)='bpf\x00', 0x0, &(0x7f0000000440)={[{@mode={'mode'}}]}) preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000200)=""/42, 0xb2}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xfbf3}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x3c, 0x0) 14:27:17 executing program 3: mkdir(&(0x7f0000000580)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') mount$bpf(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)='bpf\x00', 0x0, &(0x7f0000000440)={[{@mode={'mode'}}]}) preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000200)=""/42, 0xb2}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xfbf3}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x3c, 0x0) 14:27:17 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket(0x11, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000001c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r1, &(0x7f0000000380)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000000140)=0x1, 0x2e2) creat(&(0x7f0000000080)='./file0\x00', 0x0) io_setup(0x1, &(0x7f0000000100)=0x0) io_submit(r3, 0x1, &(0x7f0000000180)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x100000000001, 0x0, r1, &(0x7f0000000080), 0xfdef}]) 14:27:17 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) timer_create(0x200000003, 0x0, &(0x7f0000000000)) exit(0x0) timer_delete(0x0) 14:27:17 executing program 5: prctl$PR_GET_FPEXC(0xb, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x0) fallocate(r0, 0x20, 0x0, 0xfffffeff000) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) fallocate(r1, 0x0, 0x0, 0x10000104) 14:27:17 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}}], 0x1c) 14:27:17 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="11dca50d5e0bcfe47bf070") connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) r2 = socket(0x400000000000010, 0x802, 0x0) write(r2, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) setsockopt$inet_mreq(r0, 0x0, 0x4, 0x0, 0x0) 14:27:17 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_emit_ethernet(0x2a, &(0x7f0000000040)={@local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local={0x1, 0x80, 0xc2, 0x21000000, 0x3a}, @local}}}}, 0x0) 14:27:17 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="11dca50d5e0bcfe47bf070") connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) r2 = socket(0x400000000000010, 0x802, 0x0) write(r2, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) setsockopt$inet_mreq(r0, 0x0, 0x4, 0x0, 0x0) 14:27:17 executing program 1: socketpair$unix(0x1, 0x80000000000002, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) creat(&(0x7f0000000040)='./file0\x00', 0x0) mount(&(0x7f0000000440)=ANY=[@ANYBLOB='0'], &(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='ceph\x00', 0x0, 0x0) 14:27:17 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) write(r0, &(0x7f0000000400)="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", 0xfc) 14:27:17 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_emit_ethernet(0x2a, &(0x7f0000000040)={@local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local={0x1, 0x80, 0xc2, 0x21000000, 0x3a}, @local}}}}, 0x0) 14:27:17 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}}], 0x1c) 14:27:18 executing program 1: socketpair$unix(0x1, 0x80000000000002, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) creat(&(0x7f0000000040)='./file0\x00', 0x0) mount(&(0x7f0000000440)=ANY=[@ANYBLOB='0'], &(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='ceph\x00', 0x0, 0x0) 14:27:18 executing program 5: prctl$PR_GET_FPEXC(0xb, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x0) fallocate(r0, 0x20, 0x0, 0xfffffeff000) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) fallocate(r1, 0x0, 0x0, 0x10000104) [ 379.653712][T30978] ceph: device name is missing path (no : separator in 0) [ 379.690115][T30982] netlink: 176 bytes leftover after parsing attributes in process `syz-executor.0'. [ 379.778732][T30982] device ip6gretap0 entered promiscuous mode [ 379.806320][T30993] ceph: device name is missing path (no : separator in 0) 14:27:18 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) timer_create(0x200000003, 0x0, &(0x7f0000000000)) exit(0x0) timer_delete(0x0) 14:27:18 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) write(r0, &(0x7f0000000400)="fc0000001c00071bab0925000900070007ab08000c00000000007e93210001c000000000000000000000000000039915fa2c1ec28670e9889bb94b46fe0000000a000200b09db1020000000089fd5a444e8526475ef8b29d3ef3d9a48a170e91cf190241ded815018000e5f995ed94e2ad91bd1d3f2eeb57d47689cd3dd16b17e583df150c3b880f41b258a17c732229d655870271777aa9f70b3ac880ac8035e4af3d00534668f26348ded5b70e33620000000000000000000000000000000800c7d301fb849b3269000000000000000047f87e39a9fe32662c35266f41136d5f0bc4d8010000000000000000000029e39aa4000000000000000000", 0xfc) 14:27:18 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}}], 0x1c) 14:27:18 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_emit_ethernet(0x2a, &(0x7f0000000040)={@local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local={0x1, 0x80, 0xc2, 0x21000000, 0x3a}, @local}}}}, 0x0) 14:27:18 executing program 5: r0 = socket$inet(0x2, 0x6, 0x0) getsockopt$inet_buf(r0, 0x0, 0x18, 0x0, &(0x7f0000000040)) 14:27:18 executing program 1: socketpair$unix(0x1, 0x80000000000002, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) creat(&(0x7f0000000040)='./file0\x00', 0x0) mount(&(0x7f0000000440)=ANY=[@ANYBLOB='0'], &(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='ceph\x00', 0x0, 0x0) 14:27:18 executing program 5: r0 = socket$inet(0x2, 0x6, 0x0) getsockopt$inet_buf(r0, 0x0, 0x18, 0x0, &(0x7f0000000040)) 14:27:18 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}}], 0x1c) 14:27:18 executing program 1: socketpair$unix(0x1, 0x80000000000002, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) creat(&(0x7f0000000040)='./file0\x00', 0x0) mount(&(0x7f0000000440)=ANY=[@ANYBLOB='0'], &(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='ceph\x00', 0x0, 0x0) [ 380.343751][T31012] netlink: 176 bytes leftover after parsing attributes in process `syz-executor.0'. [ 380.354912][T31008] ceph: device name is missing path (no : separator in 0) 14:27:18 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_emit_ethernet(0x2a, &(0x7f0000000040)={@local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="20a98e1fc212", @rand_addr, @link_local={0x1, 0x80, 0xc2, 0x21000000, 0x3a}, @local}}}}, 0x0) 14:27:18 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) write(r0, &(0x7f0000000400)="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", 0xfc) 14:27:18 executing program 3: stat(&(0x7f0000000240)='./file0\x00', 0x0) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f00000029c0)='/dev/ppp\x00', 0x2, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000140)=""/246) ioctl$EVIOCGREP(r0, 0x40047459, &(0x7f0000000240)=""/174) pread64(r1, 0x0, 0x75, 0x0) write$evdev(r1, &(0x7f0000000000)=[{{0x0, 0x2710}}], 0xc8) [ 380.442526][T31019] ceph: device name is missing path (no : separator in 0) [ 380.480588][T31029] netlink: 176 bytes leftover after parsing attributes in process `syz-executor.0'. 14:27:19 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) timer_create(0x200000003, 0x0, &(0x7f0000000000)) exit(0x0) timer_delete(0x0) 14:27:19 executing program 5: r0 = socket$inet(0x2, 0x6, 0x0) getsockopt$inet_buf(r0, 0x0, 0x18, 0x0, &(0x7f0000000040)) 14:27:19 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000380)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_sha512\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ae", 0x1) 14:27:19 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) write(r0, &(0x7f0000000400)="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", 0xfc) 14:27:19 executing program 1: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000011c0)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x41007701, &(0x7f0000000040)='\\#\x00') ioctl$ASHMEM_GET_NAME(r0, 0x81007702, &(0x7f0000000000)=""/29) 14:27:19 executing program 3: stat(&(0x7f0000000240)='./file0\x00', 0x0) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f00000029c0)='/dev/ppp\x00', 0x2, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000140)=""/246) ioctl$EVIOCGREP(r0, 0x40047459, &(0x7f0000000240)=""/174) pread64(r1, 0x0, 0x75, 0x0) write$evdev(r1, &(0x7f0000000000)=[{{0x0, 0x2710}}], 0xc8) 14:27:19 executing program 1: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000011c0)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x41007701, &(0x7f0000000040)='\\#\x00') ioctl$ASHMEM_GET_NAME(r0, 0x81007702, &(0x7f0000000000)=""/29) 14:27:19 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000380)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_sha512\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ae", 0x1) 14:27:19 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000380)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_sha512\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ae", 0x1) 14:27:19 executing program 5: r0 = socket$inet(0x2, 0x6, 0x0) getsockopt$inet_buf(r0, 0x0, 0x18, 0x0, &(0x7f0000000040)) [ 381.205173][T31146] netlink: 176 bytes leftover after parsing attributes in process `syz-executor.0'. 14:27:19 executing program 1: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000011c0)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x41007701, &(0x7f0000000040)='\\#\x00') ioctl$ASHMEM_GET_NAME(r0, 0x81007702, &(0x7f0000000000)=""/29) 14:27:19 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000380)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_sha512\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ae", 0x1) 14:27:20 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) timer_create(0x200000003, 0x0, &(0x7f0000000000)) exit(0x0) timer_delete(0x0) 14:27:20 executing program 3: stat(&(0x7f0000000240)='./file0\x00', 0x0) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f00000029c0)='/dev/ppp\x00', 0x2, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000140)=""/246) ioctl$EVIOCGREP(r0, 0x40047459, &(0x7f0000000240)=""/174) pread64(r1, 0x0, 0x75, 0x0) write$evdev(r1, &(0x7f0000000000)=[{{0x0, 0x2710}}], 0xc8) 14:27:20 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000380)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_sha512\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ae", 0x1) 14:27:20 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000380)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_sha512\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ae", 0x1) 14:27:20 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000011c0)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x41007701, &(0x7f0000000040)='\\#\x00') ioctl$ASHMEM_GET_NAME(r0, 0x81007702, &(0x7f0000000000)=""/29) 14:27:20 executing program 1: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000011c0)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x41007701, &(0x7f0000000040)='\\#\x00') ioctl$ASHMEM_GET_NAME(r0, 0x81007702, &(0x7f0000000000)=""/29) 14:27:20 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000011c0)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x41007701, &(0x7f0000000040)='\\#\x00') ioctl$ASHMEM_GET_NAME(r0, 0x81007702, &(0x7f0000000000)=""/29) 14:27:20 executing program 0: stat(&(0x7f0000000240)='./file0\x00', 0x0) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f00000029c0)='/dev/ppp\x00', 0x2, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000140)=""/246) ioctl$EVIOCGREP(r0, 0x40047459, &(0x7f0000000240)=""/174) pread64(r1, 0x0, 0x75, 0x0) write$evdev(r1, &(0x7f0000000000)=[{{0x0, 0x2710}}], 0xc8) 14:27:20 executing program 1: stat(&(0x7f0000000240)='./file0\x00', 0x0) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f00000029c0)='/dev/ppp\x00', 0x2, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000140)=""/246) ioctl$EVIOCGREP(r0, 0x40047459, &(0x7f0000000240)=""/174) pread64(r1, 0x0, 0x75, 0x0) write$evdev(r1, &(0x7f0000000000)=[{{0x0, 0x2710}}], 0xc8) 14:27:20 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000011c0)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x41007701, &(0x7f0000000040)='\\#\x00') ioctl$ASHMEM_GET_NAME(r0, 0x81007702, &(0x7f0000000000)=""/29) 14:27:20 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000380)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_sha512\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="ae", 0x1) 14:27:20 executing program 3: stat(&(0x7f0000000240)='./file0\x00', 0x0) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f00000029c0)='/dev/ppp\x00', 0x2, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000140)=""/246) ioctl$EVIOCGREP(r0, 0x40047459, &(0x7f0000000240)=""/174) pread64(r1, 0x0, 0x75, 0x0) write$evdev(r1, &(0x7f0000000000)=[{{0x0, 0x2710}}], 0xc8) 14:27:21 executing program 3: socketpair$unix(0x1, 0x8000000000002, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$invalidate(0x15, r1) keyctl$invalidate(0x15, r1) 14:27:21 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x3ed) pwritev(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="314ecf", 0x3}], 0x1, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) 14:27:21 executing program 5: syz_mount_image$vfat(&(0x7f0000000500)='vfat\x00', &(0x7f0000000540)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000880)={[{@iocharset={'iocharset', 0x3d, 'koi8-r'}}, {@iocharset={'iocharset', 0x3d, 'cp950'}}]}) 14:27:21 executing program 0: stat(&(0x7f0000000240)='./file0\x00', 0x0) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f00000029c0)='/dev/ppp\x00', 0x2, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000140)=""/246) ioctl$EVIOCGREP(r0, 0x40047459, &(0x7f0000000240)=""/174) pread64(r1, 0x0, 0x75, 0x0) write$evdev(r1, &(0x7f0000000000)=[{{0x0, 0x2710}}], 0xc8) 14:27:21 executing program 1: stat(&(0x7f0000000240)='./file0\x00', 0x0) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f00000029c0)='/dev/ppp\x00', 0x2, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000140)=""/246) ioctl$EVIOCGREP(r0, 0x40047459, &(0x7f0000000240)=""/174) pread64(r1, 0x0, 0x75, 0x0) write$evdev(r1, &(0x7f0000000000)=[{{0x0, 0x2710}}], 0xc8) 14:27:21 executing program 2: socket$nl_generic(0x10, 0x3, 0x10) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000080)=0x0) getpgrp(r1) r2 = socket$nl_generic(0x10, 0x3, 0x10) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x2100, 0x0, 0x0) dup2(r2, r0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x20000800) socket$inet(0x2, 0x4000000000000001, 0x3) 14:27:21 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) write(0xffffffffffffffff, 0x0, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, 0x0, 0x0) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8004000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78)}], 0x4924924924926c8, 0x101d0) 14:27:21 executing program 2: socket$nl_generic(0x10, 0x3, 0x10) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000080)=0x0) getpgrp(r1) r2 = socket$nl_generic(0x10, 0x3, 0x10) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x2100, 0x0, 0x0) dup2(r2, r0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x20000800) socket$inet(0x2, 0x4000000000000001, 0x3) 14:27:21 executing program 3: socketpair$unix(0x1, 0x8000000000002, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$invalidate(0x15, r1) keyctl$invalidate(0x15, r1) 14:27:21 executing program 1: stat(&(0x7f0000000240)='./file0\x00', 0x0) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f00000029c0)='/dev/ppp\x00', 0x2, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000140)=""/246) ioctl$EVIOCGREP(r0, 0x40047459, &(0x7f0000000240)=""/174) pread64(r1, 0x0, 0x75, 0x0) write$evdev(r1, &(0x7f0000000000)=[{{0x0, 0x2710}}], 0xc8) 14:27:21 executing program 2: socket$nl_generic(0x10, 0x3, 0x10) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000080)=0x0) getpgrp(r1) r2 = socket$nl_generic(0x10, 0x3, 0x10) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x2100, 0x0, 0x0) dup2(r2, r0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x20000800) socket$inet(0x2, 0x4000000000000001, 0x3) 14:27:21 executing program 0: stat(&(0x7f0000000240)='./file0\x00', 0x0) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f00000029c0)='/dev/ppp\x00', 0x2, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000140)=""/246) ioctl$EVIOCGREP(r0, 0x40047459, &(0x7f0000000240)=""/174) pread64(r1, 0x0, 0x75, 0x0) write$evdev(r1, &(0x7f0000000000)=[{{0x0, 0x2710}}], 0xc8) 14:27:21 executing program 3: socketpair$unix(0x1, 0x8000000000002, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$invalidate(0x15, r1) keyctl$invalidate(0x15, r1) 14:27:21 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x3ed) pwritev(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="314ecf", 0x3}], 0x1, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) 14:27:21 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) write(0xffffffffffffffff, 0x0, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, 0x0, 0x0) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8004000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78)}], 0x4924924924926c8, 0x101d0) 14:27:21 executing program 2: socket$nl_generic(0x10, 0x3, 0x10) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000080)=0x0) getpgrp(r1) r2 = socket$nl_generic(0x10, 0x3, 0x10) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x2100, 0x0, 0x0) dup2(r2, r0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x20000800) socket$inet(0x2, 0x4000000000000001, 0x3) 14:27:21 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) write(0xffffffffffffffff, 0x0, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, 0x0, 0x0) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8004000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78)}], 0x4924924924926c8, 0x101d0) 14:27:21 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x3ed) pwritev(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="314ecf", 0x3}], 0x1, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) 14:27:21 executing program 3: socketpair$unix(0x1, 0x8000000000002, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$invalidate(0x15, r1) keyctl$invalidate(0x15, r1) 14:27:21 executing program 2: socketpair$unix(0x1, 0x8000000000002, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$invalidate(0x15, r1) keyctl$invalidate(0x15, r1) 14:27:21 executing program 3: socketpair$unix(0x1, 0x8000000000002, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$invalidate(0x15, r1) keyctl$invalidate(0x15, r1) 14:27:21 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) write(0xffffffffffffffff, 0x0, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, 0x0, 0x0) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8004000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78)}], 0x4924924924926c8, 0x101d0) 14:27:21 executing program 2: socketpair$unix(0x1, 0x8000000000002, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$invalidate(0x15, r1) keyctl$invalidate(0x15, r1) 14:27:21 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) write(0xffffffffffffffff, 0x0, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, 0x0, 0x0) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8004000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78)}], 0x4924924924926c8, 0x101d0) 14:27:21 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x3ed) pwritev(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="314ecf", 0x3}], 0x1, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) 14:27:21 executing program 3: socketpair$unix(0x1, 0x8000000000002, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$invalidate(0x15, r1) keyctl$invalidate(0x15, r1) 14:27:21 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x3ed) pwritev(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="314ecf", 0x3}], 0x1, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) 14:27:21 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) write(0xffffffffffffffff, 0x0, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, 0x0, 0x0) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8004000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78)}], 0x4924924924926c8, 0x101d0) 14:27:22 executing program 2: socketpair$unix(0x1, 0x8000000000002, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$invalidate(0x15, r1) keyctl$invalidate(0x15, r1) 14:27:22 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) write(0xffffffffffffffff, 0x0, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, 0x0, 0x0) sendmmsg$alg(r0, &(0x7f0000236fc8)=[{0x8004000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78)}], 0x4924924924926c8, 0x101d0) 14:27:22 executing program 3: socketpair$unix(0x1, 0x8000000000002, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$invalidate(0x15, r1) keyctl$invalidate(0x15, r1) 14:27:22 executing program 3: socket$nl_generic(0x10, 0x3, 0x10) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000080)=0x0) getpgrp(r1) r2 = socket$nl_generic(0x10, 0x3, 0x10) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x2100, 0x0, 0x0) dup2(r2, r0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x20000800) socket$inet(0x2, 0x4000000000000001, 0x3) 14:27:22 executing program 2: socket$nl_generic(0x10, 0x3, 0x10) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000080)=0x0) getpgrp(r1) r2 = socket$nl_generic(0x10, 0x3, 0x10) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x2100, 0x0, 0x0) dup2(r2, r0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x20000800) socket$inet(0x2, 0x4000000000000001, 0x3) 14:27:22 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) writev(r1, &(0x7f00000002c0)=[{&(0x7f0000000140)="16ea96b50b265797802c3e0c146da6e6", 0x10}], 0x1) 14:27:22 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x3ed) pwritev(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="314ecf", 0x3}], 0x1, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) 14:27:22 executing program 2: socket$nl_generic(0x10, 0x3, 0x10) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000080)=0x0) getpgrp(r1) r2 = socket$nl_generic(0x10, 0x3, 0x10) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x2100, 0x0, 0x0) dup2(r2, r0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x20000800) socket$inet(0x2, 0x4000000000000001, 0x3) 14:27:22 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x3ed) pwritev(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="314ecf", 0x3}], 0x1, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) 14:27:22 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x1ff, 0x0) read$eventfd(r0, &(0x7f00000000c0), 0x8) 14:27:22 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) writev(r1, &(0x7f00000002c0)=[{&(0x7f0000000140)="16ea96b50b265797802c3e0c146da6e6", 0x10}], 0x1) 14:27:22 executing program 3: socket$nl_generic(0x10, 0x3, 0x10) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000080)=0x0) getpgrp(r1) r2 = socket$nl_generic(0x10, 0x3, 0x10) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x2100, 0x0, 0x0) dup2(r2, r0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x20000800) socket$inet(0x2, 0x4000000000000001, 0x3) 14:27:22 executing program 2: socket$nl_generic(0x10, 0x3, 0x10) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000080)=0x0) getpgrp(r1) r2 = socket$nl_generic(0x10, 0x3, 0x10) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x2100, 0x0, 0x0) dup2(r2, r0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x20000800) socket$inet(0x2, 0x4000000000000001, 0x3) 14:27:22 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) writev(r1, &(0x7f00000002c0)=[{&(0x7f0000000140)="16ea96b50b265797802c3e0c146da6e6", 0x10}], 0x1) [ 384.169759][T31481] cgroup: fork rejected by pids controller in /syz2 14:27:22 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) writev(r1, &(0x7f00000002c0)=[{&(0x7f0000000140)="16ea96b50b265797802c3e0c146da6e6", 0x10}], 0x1) 14:27:22 executing program 3: socket$nl_generic(0x10, 0x3, 0x10) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000080)=0x0) getpgrp(r1) r2 = socket$nl_generic(0x10, 0x3, 0x10) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x2100, 0x0, 0x0) dup2(r2, r0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x20000800) socket$inet(0x2, 0x4000000000000001, 0x3) 14:27:22 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) connect$inet(r0, &(0x7f0000000040), 0x10) 14:27:22 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="400000001400090d00000000008100000a000000", @ANYRES32=r2, @ANYBLOB="14000100fe8000000000000000000000000000aa140006000000ffffffffffffffe000000000000097f9781e11a0ef1f0b5d8584a1c188450d8c0b3a8fb8b9c6fdfd8e69d8fb45557f180776aea701ef1f0344536d38218028f6e497907d27bf1f84a00f"], 0x40}}, 0x0) 14:27:22 executing program 4: r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(0xffffffffffffffff, 0xc0505510, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) fallocate(r0, 0x0, 0x0, 0x1000f4) r2 = open(&(0x7f0000000140)='./bus\x00', 0x4000, 0x100000000) sendfile(r0, r2, 0x0, 0x8000fffffffe) 14:27:22 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) connect$inet(r0, &(0x7f0000000040), 0x10) [ 384.352342][ T26] audit: type=1804 audit(1566138442.623:149): pid=31503 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir120371458/syzkaller.rvVAiw/973/bus" dev="sda1" ino=18294 res=1 14:27:22 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) connect$inet(r0, &(0x7f0000000040), 0x10) [ 384.426607][ T26] audit: type=1800 audit(1566138442.623:150): pid=31503 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.4" name="bus" dev="sda1" ino=18294 res=0 [ 384.493456][ T26] audit: type=1800 audit(1566138442.693:151): pid=31578 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.4" name="bus" dev="sda1" ino=18294 res=0 14:27:22 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x1ff, 0x0) read$eventfd(r0, &(0x7f00000000c0), 0x8) 14:27:22 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @broadcast}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x2af) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) close(r0) 14:27:22 executing program 4: r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(0xffffffffffffffff, 0xc0505510, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) fallocate(r0, 0x0, 0x0, 0x1000f4) r2 = open(&(0x7f0000000140)='./bus\x00', 0x4000, 0x100000000) sendfile(r0, r2, 0x0, 0x8000fffffffe) 14:27:22 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="400000001400090d00000000008100000a000000", @ANYRES32=r2, @ANYBLOB="14000100fe8000000000000000000000000000aa140006000000ffffffffffffffe000000000000097f9781e11a0ef1f0b5d8584a1c188450d8c0b3a8fb8b9c6fdfd8e69d8fb45557f180776aea701ef1f0344536d38218028f6e497907d27bf1f84a00f"], 0x40}}, 0x0) 14:27:22 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) connect$inet(r0, &(0x7f0000000040), 0x10) 14:27:22 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) connect$inet(r0, &(0x7f0000000040), 0x10) [ 384.742883][ T26] audit: type=1804 audit(1566138443.013:152): pid=31629 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir120371458/syzkaller.rvVAiw/974/bus" dev="sda1" ino=16571 res=1 14:27:23 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) connect$inet(r0, &(0x7f0000000040), 0x10) 14:27:23 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="400000001400090d00000000008100000a000000", @ANYRES32=r2, @ANYBLOB="14000100fe8000000000000000000000000000aa140006000000ffffffffffffffe000000000000097f9781e11a0ef1f0b5d8584a1c188450d8c0b3a8fb8b9c6fdfd8e69d8fb45557f180776aea701ef1f0344536d38218028f6e497907d27bf1f84a00f"], 0x40}}, 0x0) [ 384.775449][ T26] audit: type=1800 audit(1566138443.043:153): pid=31629 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.4" name="bus" dev="sda1" ino=16571 res=0 14:27:23 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) connect$inet(r0, &(0x7f0000000040), 0x10) 14:27:23 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x1ff, 0x0) read$eventfd(r0, &(0x7f00000000c0), 0x8) 14:27:23 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @broadcast}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x2af) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) close(r0) 14:27:23 executing program 4: r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(0xffffffffffffffff, 0xc0505510, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) fallocate(r0, 0x0, 0x0, 0x1000f4) r2 = open(&(0x7f0000000140)='./bus\x00', 0x4000, 0x100000000) sendfile(r0, r2, 0x0, 0x8000fffffffe) [ 385.001545][ T26] audit: type=1804 audit(1566138443.273:154): pid=31750 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir120371458/syzkaller.rvVAiw/975/bus" dev="sda1" ino=18274 res=1 [ 385.037648][ T26] audit: type=1800 audit(1566138443.303:155): pid=31750 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.4" name="bus" dev="sda1" ino=18274 res=0 14:27:23 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x1ff, 0x0) read$eventfd(r0, &(0x7f00000000c0), 0x8) 14:27:23 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="400000001400090d00000000008100000a000000", @ANYRES32=r2, @ANYBLOB="14000100fe8000000000000000000000000000aa140006000000ffffffffffffffe000000000000097f9781e11a0ef1f0b5d8584a1c188450d8c0b3a8fb8b9c6fdfd8e69d8fb45557f180776aea701ef1f0344536d38218028f6e497907d27bf1f84a00f"], 0x40}}, 0x0) 14:27:23 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @broadcast}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x2af) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) close(r0) 14:27:23 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @broadcast}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x2af) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) close(r0) 14:27:23 executing program 4: r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(0xffffffffffffffff, 0xc0505510, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) fallocate(r0, 0x0, 0x0, 0x1000f4) r2 = open(&(0x7f0000000140)='./bus\x00', 0x4000, 0x100000000) sendfile(r0, r2, 0x0, 0x8000fffffffe) 14:27:23 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @broadcast}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x2af) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) close(r0) [ 385.385545][T31755] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. [ 385.413325][ T26] audit: type=1804 audit(1566138443.683:156): pid=31762 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir120371458/syzkaller.rvVAiw/976/bus" dev="sda1" ino=18288 res=1 14:27:23 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @broadcast}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x2af) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) close(r0) 14:27:23 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @broadcast}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x2af) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) close(r0) [ 385.472183][ T26] audit: type=1800 audit(1566138443.713:157): pid=31762 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.4" name="bus" dev="sda1" ino=18288 res=0 14:27:23 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @broadcast}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x2af) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) close(r0) 14:27:23 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x1ff, 0x0) read$eventfd(r0, &(0x7f00000000c0), 0x8) 14:27:23 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @broadcast}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x2af) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) close(r0) 14:27:23 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="400000001400090d00000000008100000a000000", @ANYRES32=r2, @ANYBLOB="14000100fe8000000000000000000000000000aa140006000000ffffffffffffffe000000000000097f9781e11a0ef1f0b5d8584a1c188450d8c0b3a8fb8b9c6fdfd8e69d8fb45557f180776aea701ef1f0344536d38218028f6e497907d27bf1f84a00f"], 0x40}}, 0x0) 14:27:24 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x1ff, 0x0) read$eventfd(r0, &(0x7f00000000c0), 0x8) 14:27:24 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @broadcast}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x2af) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) close(r0) 14:27:24 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @broadcast}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x2af) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) close(r0) 14:27:24 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="400000001400090d00000000008100000a000000", @ANYRES32=r2, @ANYBLOB="14000100fe8000000000000000000000000000aa140006000000ffffffffffffffe000000000000097f9781e11a0ef1f0b5d8584a1c188450d8c0b3a8fb8b9c6fdfd8e69d8fb45557f180776aea701ef1f0344536d38218028f6e497907d27bf1f84a00f"], 0x40}}, 0x0) 14:27:24 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="400000001400090d00000000008100000a000000", @ANYRES32=r2, @ANYBLOB="14000100fe8000000000000000000000000000aa140006000000ffffffffffffffe000000000000097f9781e11a0ef1f0b5d8584a1c188450d8c0b3a8fb8b9c6fdfd8e69d8fb45557f180776aea701ef1f0344536d38218028f6e497907d27bf1f84a00f"], 0x40}}, 0x0) 14:27:24 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @broadcast}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x2af) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) close(r0) 14:27:24 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @broadcast}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x2af) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) close(r0) 14:27:24 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="400000001400090d00000000008100000a000000", @ANYRES32=r2, @ANYBLOB="14000100fe8000000000000000000000000000aa140006000000ffffffffffffffe000000000000097f9781e11a0ef1f0b5d8584a1c188450d8c0b3a8fb8b9c6fdfd8e69d8fb45557f180776aea701ef1f0344536d38218028f6e497907d27bf1f84a00f"], 0x40}}, 0x0) 14:27:24 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="400000001400090d00000000008100000a000000", @ANYRES32=r2, @ANYBLOB="14000100fe8000000000000000000000000000aa140006000000ffffffffffffffe000000000000097f9781e11a0ef1f0b5d8584a1c188450d8c0b3a8fb8b9c6fdfd8e69d8fb45557f180776aea701ef1f0344536d38218028f6e497907d27bf1f84a00f"], 0x40}}, 0x0) 14:27:24 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x1ff, 0x0) read$eventfd(r0, &(0x7f00000000c0), 0x8) 14:27:24 executing program 3: r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(0xffffffffffffffff, 0xc0505510, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) fallocate(r0, 0x0, 0x0, 0x1000f4) r2 = open(&(0x7f0000000140)='./bus\x00', 0x4000, 0x100000000) sendfile(r0, r2, 0x0, 0x8000fffffffe) 14:27:24 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xa, 0x9, 0x100000000000913, 0x6}, 0x3c) bpf$MAP_LOOKUP_ELEM(0x3, &(0x7f0000000340)={r0, 0x0, 0x0}, 0x18) [ 386.253871][ T26] audit: type=1804 audit(1566138444.523:158): pid=31818 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir685524085/syzkaller.O0eDzk/1077/bus" dev="sda1" ino=18297 res=1 14:27:24 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="400000001400090d00000000008100000a000000", @ANYRES32=r2, @ANYBLOB="14000100fe8000000000000000000000000000aa140006000000ffffffffffffffe000000000000097f9781e11a0ef1f0b5d8584a1c188450d8c0b3a8fb8b9c6fdfd8e69d8fb45557f180776aea701ef1f0344536d38218028f6e497907d27bf1f84a00f"], 0x40}}, 0x0) 14:27:24 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) pread64(r0, 0x0, 0x0, 0x0) 14:27:24 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xa, 0x9, 0x100000000000913, 0x6}, 0x3c) bpf$MAP_LOOKUP_ELEM(0x3, &(0x7f0000000340)={r0, 0x0, 0x0}, 0x18) 14:27:24 executing program 3: r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(0xffffffffffffffff, 0xc0505510, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) fallocate(r0, 0x0, 0x0, 0x1000f4) r2 = open(&(0x7f0000000140)='./bus\x00', 0x4000, 0x100000000) sendfile(r0, r2, 0x0, 0x8000fffffffe) 14:27:24 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xa, 0x9, 0x100000000000913, 0x6}, 0x3c) bpf$MAP_LOOKUP_ELEM(0x3, &(0x7f0000000340)={r0, 0x0, 0x0}, 0x18) 14:27:24 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xa, 0x9, 0x100000000000913, 0x6}, 0x3c) bpf$MAP_LOOKUP_ELEM(0x3, &(0x7f0000000340)={r0, 0x0, 0x0}, 0x18) 14:27:24 executing program 5: socket$isdn(0x22, 0x3, 0x11) 14:27:24 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xa, 0x9, 0x100000000000913, 0x6}, 0x3c) bpf$MAP_LOOKUP_ELEM(0x3, &(0x7f0000000340)={r0, 0x0, 0x0}, 0x18) 14:27:24 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) pread64(r0, 0x0, 0x0, 0x0) 14:27:25 executing program 3: r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(0xffffffffffffffff, 0xc0505510, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) fallocate(r0, 0x0, 0x0, 0x1000f4) r2 = open(&(0x7f0000000140)='./bus\x00', 0x4000, 0x100000000) sendfile(r0, r2, 0x0, 0x8000fffffffe) 14:27:25 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xa, 0x9, 0x100000000000913, 0x6}, 0x3c) bpf$MAP_LOOKUP_ELEM(0x3, &(0x7f0000000340)={r0, 0x0, 0x0}, 0x18) 14:27:25 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) pread64(r0, 0x0, 0x0, 0x0) 14:27:25 executing program 5: socket$isdn(0x22, 0x3, 0x11) 14:27:25 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xa, 0x9, 0x100000000000913, 0x6}, 0x3c) bpf$MAP_LOOKUP_ELEM(0x3, &(0x7f0000000340)={r0, 0x0, 0x0}, 0x18) 14:27:25 executing program 0: mkdir(0x0, 0x0) getresuid(0x0, &(0x7f0000000740), &(0x7f0000000780)) stat(&(0x7f0000000b40)='./file0\x00', 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x2, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) chdir(&(0x7f0000000340)='./file0\x00') symlink(&(0x7f0000000800)='./file0/file0\x00', &(0x7f00000007c0)='./file0\x00') bpf$PROG_LOAD(0x5, 0x0, 0x0) clone(0x2102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lstat(&(0x7f0000000600)='./file0/file0\x00', 0x0) 14:27:25 executing program 5: socket$isdn(0x22, 0x3, 0x11) 14:27:25 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) pread64(r0, 0x0, 0x0, 0x0) 14:27:25 executing program 1: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) request_key(&(0x7f0000000000)='encrypted\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000080)='syz', 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000140)='keyring\x00', 0x0, 0x0, 0x0, 0x0) syz_open_dev$vbi(&(0x7f0000000100)='/dev/vbi#\x00', 0x1, 0x2) perf_event_open(&(0x7f000001d000)={0x7, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() write$P9_RLOPEN(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r0, 0x89a0, &(0x7f0000000500)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @empty, @loopback, 0x0, 0x0, 0x8000, 0x0, 0x1}) 14:27:25 executing program 2: socketpair(0x1, 0x5, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$TEAM_CMD_OPTIONS_SET(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) dup2(r0, r1) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) 14:27:25 executing program 4: r0 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl(r0, 0x10000081204101, &(0x7f0000000040)) 14:27:25 executing program 0: mkdir(0x0, 0x0) getresuid(0x0, &(0x7f0000000740), &(0x7f0000000780)) stat(&(0x7f0000000b40)='./file0\x00', 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x2, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) chdir(&(0x7f0000000340)='./file0\x00') symlink(&(0x7f0000000800)='./file0/file0\x00', &(0x7f00000007c0)='./file0\x00') bpf$PROG_LOAD(0x5, 0x0, 0x0) clone(0x2102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lstat(&(0x7f0000000600)='./file0/file0\x00', 0x0) 14:27:25 executing program 3: mkdir(0x0, 0x0) getresuid(0x0, &(0x7f0000000740), &(0x7f0000000780)) stat(&(0x7f0000000b40)='./file0\x00', 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x2, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) chdir(&(0x7f0000000340)='./file0\x00') symlink(&(0x7f0000000800)='./file0/file0\x00', &(0x7f00000007c0)='./file0\x00') bpf$PROG_LOAD(0x5, 0x0, 0x0) clone(0x2102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lstat(&(0x7f0000000600)='./file0/file0\x00', 0x0) 14:27:25 executing program 5: socket$isdn(0x22, 0x3, 0x11) 14:27:25 executing program 2: socketpair(0x1, 0x5, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$TEAM_CMD_OPTIONS_SET(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) dup2(r0, r1) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) 14:27:25 executing program 5: socketpair(0x1, 0x5, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$TEAM_CMD_OPTIONS_SET(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) dup2(r0, r1) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) 14:27:25 executing program 4: r0 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl(r0, 0x10000081204101, &(0x7f0000000040)) 14:27:25 executing program 2: socketpair(0x1, 0x5, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$TEAM_CMD_OPTIONS_SET(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) dup2(r0, r1) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) 14:27:25 executing program 3: mkdir(0x0, 0x0) getresuid(0x0, &(0x7f0000000740), &(0x7f0000000780)) stat(&(0x7f0000000b40)='./file0\x00', 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x2, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) chdir(&(0x7f0000000340)='./file0\x00') symlink(&(0x7f0000000800)='./file0/file0\x00', &(0x7f00000007c0)='./file0\x00') bpf$PROG_LOAD(0x5, 0x0, 0x0) clone(0x2102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lstat(&(0x7f0000000600)='./file0/file0\x00', 0x0) 14:27:25 executing program 4: r0 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl(r0, 0x10000081204101, &(0x7f0000000040)) 14:27:25 executing program 1: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) request_key(&(0x7f0000000000)='encrypted\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000080)='syz', 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000140)='keyring\x00', 0x0, 0x0, 0x0, 0x0) syz_open_dev$vbi(&(0x7f0000000100)='/dev/vbi#\x00', 0x1, 0x2) perf_event_open(&(0x7f000001d000)={0x7, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() write$P9_RLOPEN(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r0, 0x89a0, &(0x7f0000000500)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @empty, @loopback, 0x0, 0x0, 0x8000, 0x0, 0x1}) 14:27:25 executing program 2: socketpair(0x1, 0x5, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$TEAM_CMD_OPTIONS_SET(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) dup2(r0, r1) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) 14:27:25 executing program 0: mkdir(0x0, 0x0) getresuid(0x0, &(0x7f0000000740), &(0x7f0000000780)) stat(&(0x7f0000000b40)='./file0\x00', 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x2, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) chdir(&(0x7f0000000340)='./file0\x00') symlink(&(0x7f0000000800)='./file0/file0\x00', &(0x7f00000007c0)='./file0\x00') bpf$PROG_LOAD(0x5, 0x0, 0x0) clone(0x2102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lstat(&(0x7f0000000600)='./file0/file0\x00', 0x0) 14:27:25 executing program 4: r0 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl(r0, 0x10000081204101, &(0x7f0000000040)) 14:27:25 executing program 5: socketpair(0x1, 0x5, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$TEAM_CMD_OPTIONS_SET(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) dup2(r0, r1) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) 14:27:25 executing program 3: mkdir(0x0, 0x0) getresuid(0x0, &(0x7f0000000740), &(0x7f0000000780)) stat(&(0x7f0000000b40)='./file0\x00', 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x2, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) chdir(&(0x7f0000000340)='./file0\x00') symlink(&(0x7f0000000800)='./file0/file0\x00', &(0x7f00000007c0)='./file0\x00') bpf$PROG_LOAD(0x5, 0x0, 0x0) clone(0x2102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lstat(&(0x7f0000000600)='./file0/file0\x00', 0x0) 14:27:25 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) request_key(&(0x7f0000000000)='encrypted\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000080)='syz', 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000140)='keyring\x00', 0x0, 0x0, 0x0, 0x0) syz_open_dev$vbi(&(0x7f0000000100)='/dev/vbi#\x00', 0x1, 0x2) perf_event_open(&(0x7f000001d000)={0x7, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() write$P9_RLOPEN(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r0, 0x89a0, &(0x7f0000000500)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @empty, @loopback, 0x0, 0x0, 0x8000, 0x0, 0x1}) 14:27:25 executing program 4: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) request_key(&(0x7f0000000000)='encrypted\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000080)='syz', 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000140)='keyring\x00', 0x0, 0x0, 0x0, 0x0) syz_open_dev$vbi(&(0x7f0000000100)='/dev/vbi#\x00', 0x1, 0x2) perf_event_open(&(0x7f000001d000)={0x7, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() write$P9_RLOPEN(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r0, 0x89a0, &(0x7f0000000500)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @empty, @loopback, 0x0, 0x0, 0x8000, 0x0, 0x1}) 14:27:25 executing program 5: socketpair(0x1, 0x5, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$TEAM_CMD_OPTIONS_SET(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) dup2(r0, r1) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) 14:27:25 executing program 0: mkdir(0x0, 0x0) getresuid(0x0, &(0x7f0000000740), &(0x7f0000000780)) stat(&(0x7f0000000b40)='./file0\x00', 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x2, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) chdir(&(0x7f0000000340)='./file0\x00') symlink(&(0x7f0000000800)='./file0/file0\x00', &(0x7f00000007c0)='./file0\x00') bpf$PROG_LOAD(0x5, 0x0, 0x0) clone(0x2102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lstat(&(0x7f0000000600)='./file0/file0\x00', 0x0) 14:27:25 executing program 3: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) request_key(&(0x7f0000000000)='encrypted\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000080)='syz', 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000140)='keyring\x00', 0x0, 0x0, 0x0, 0x0) syz_open_dev$vbi(&(0x7f0000000100)='/dev/vbi#\x00', 0x1, 0x2) perf_event_open(&(0x7f000001d000)={0x7, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() write$P9_RLOPEN(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r0, 0x89a0, &(0x7f0000000500)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @empty, @loopback, 0x0, 0x0, 0x8000, 0x0, 0x1}) 14:27:25 executing program 5: mkdir(0x0, 0x0) getresuid(0x0, &(0x7f0000000740), &(0x7f0000000780)) stat(&(0x7f0000000b40)='./file0\x00', 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x2, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) chdir(&(0x7f0000000340)='./file0\x00') symlink(&(0x7f0000000800)='./file0/file0\x00', &(0x7f00000007c0)='./file0\x00') bpf$PROG_LOAD(0x5, 0x0, 0x0) clone(0x2102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lstat(&(0x7f0000000600)='./file0/file0\x00', 0x0) 14:27:26 executing program 1: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) request_key(&(0x7f0000000000)='encrypted\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000080)='syz', 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000140)='keyring\x00', 0x0, 0x0, 0x0, 0x0) syz_open_dev$vbi(&(0x7f0000000100)='/dev/vbi#\x00', 0x1, 0x2) perf_event_open(&(0x7f000001d000)={0x7, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() write$P9_RLOPEN(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r0, 0x89a0, &(0x7f0000000500)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @empty, @loopback, 0x0, 0x0, 0x8000, 0x0, 0x1}) 14:27:26 executing program 0: mkdir(0x0, 0x0) getresuid(0x0, &(0x7f0000000740), &(0x7f0000000780)) stat(&(0x7f0000000b40)='./file0\x00', 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x2, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) chdir(&(0x7f0000000340)='./file0\x00') symlink(&(0x7f0000000800)='./file0/file0\x00', &(0x7f00000007c0)='./file0\x00') bpf$PROG_LOAD(0x5, 0x0, 0x0) clone(0x2102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lstat(&(0x7f0000000600)='./file0/file0\x00', 0x0) 14:27:26 executing program 5: mkdir(0x0, 0x0) getresuid(0x0, &(0x7f0000000740), &(0x7f0000000780)) stat(&(0x7f0000000b40)='./file0\x00', 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x2, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) chdir(&(0x7f0000000340)='./file0\x00') symlink(&(0x7f0000000800)='./file0/file0\x00', &(0x7f00000007c0)='./file0\x00') bpf$PROG_LOAD(0x5, 0x0, 0x0) clone(0x2102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lstat(&(0x7f0000000600)='./file0/file0\x00', 0x0) 14:27:26 executing program 4: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) request_key(&(0x7f0000000000)='encrypted\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000080)='syz', 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000140)='keyring\x00', 0x0, 0x0, 0x0, 0x0) syz_open_dev$vbi(&(0x7f0000000100)='/dev/vbi#\x00', 0x1, 0x2) perf_event_open(&(0x7f000001d000)={0x7, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() write$P9_RLOPEN(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r0, 0x89a0, &(0x7f0000000500)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @empty, @loopback, 0x0, 0x0, 0x8000, 0x0, 0x1}) 14:27:26 executing program 3: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) request_key(&(0x7f0000000000)='encrypted\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000080)='syz', 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000140)='keyring\x00', 0x0, 0x0, 0x0, 0x0) syz_open_dev$vbi(&(0x7f0000000100)='/dev/vbi#\x00', 0x1, 0x2) perf_event_open(&(0x7f000001d000)={0x7, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() write$P9_RLOPEN(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r0, 0x89a0, &(0x7f0000000500)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @empty, @loopback, 0x0, 0x0, 0x8000, 0x0, 0x1}) 14:27:26 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) request_key(&(0x7f0000000000)='encrypted\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000080)='syz', 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000140)='keyring\x00', 0x0, 0x0, 0x0, 0x0) syz_open_dev$vbi(&(0x7f0000000100)='/dev/vbi#\x00', 0x1, 0x2) perf_event_open(&(0x7f000001d000)={0x7, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() write$P9_RLOPEN(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r0, 0x89a0, &(0x7f0000000500)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @empty, @loopback, 0x0, 0x0, 0x8000, 0x0, 0x1}) 14:27:26 executing program 5: mkdir(0x0, 0x0) getresuid(0x0, &(0x7f0000000740), &(0x7f0000000780)) stat(&(0x7f0000000b40)='./file0\x00', 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x2, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) chdir(&(0x7f0000000340)='./file0\x00') symlink(&(0x7f0000000800)='./file0/file0\x00', &(0x7f00000007c0)='./file0\x00') bpf$PROG_LOAD(0x5, 0x0, 0x0) clone(0x2102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lstat(&(0x7f0000000600)='./file0/file0\x00', 0x0) 14:27:26 executing program 0: mkdir(0x0, 0x0) getresuid(0x0, &(0x7f0000000740), &(0x7f0000000780)) stat(&(0x7f0000000b40)='./file0\x00', 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x2, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) chdir(&(0x7f0000000340)='./file0\x00') symlink(&(0x7f0000000800)='./file0/file0\x00', &(0x7f00000007c0)='./file0\x00') bpf$PROG_LOAD(0x5, 0x0, 0x0) clone(0x2102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lstat(&(0x7f0000000600)='./file0/file0\x00', 0x0) 14:27:26 executing program 4: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) request_key(&(0x7f0000000000)='encrypted\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000080)='syz', 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000140)='keyring\x00', 0x0, 0x0, 0x0, 0x0) syz_open_dev$vbi(&(0x7f0000000100)='/dev/vbi#\x00', 0x1, 0x2) perf_event_open(&(0x7f000001d000)={0x7, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() write$P9_RLOPEN(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r0, 0x89a0, &(0x7f0000000500)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @empty, @loopback, 0x0, 0x0, 0x8000, 0x0, 0x1}) 14:27:26 executing program 0: mkdir(0x0, 0x0) getresuid(0x0, &(0x7f0000000740), &(0x7f0000000780)) stat(&(0x7f0000000b40)='./file0\x00', 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x2, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) chdir(&(0x7f0000000340)='./file0\x00') symlink(&(0x7f0000000800)='./file0/file0\x00', &(0x7f00000007c0)='./file0\x00') bpf$PROG_LOAD(0x5, 0x0, 0x0) clone(0x2102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lstat(&(0x7f0000000600)='./file0/file0\x00', 0x0) 14:27:26 executing program 5: mkdir(0x0, 0x0) getresuid(0x0, &(0x7f0000000740), &(0x7f0000000780)) stat(&(0x7f0000000b40)='./file0\x00', 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x2, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) chdir(&(0x7f0000000340)='./file0\x00') symlink(&(0x7f0000000800)='./file0/file0\x00', &(0x7f00000007c0)='./file0\x00') bpf$PROG_LOAD(0x5, 0x0, 0x0) clone(0x2102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lstat(&(0x7f0000000600)='./file0/file0\x00', 0x0) 14:27:26 executing program 1: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) request_key(&(0x7f0000000000)='encrypted\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000080)='syz', 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000140)='keyring\x00', 0x0, 0x0, 0x0, 0x0) syz_open_dev$vbi(&(0x7f0000000100)='/dev/vbi#\x00', 0x1, 0x2) perf_event_open(&(0x7f000001d000)={0x7, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() write$P9_RLOPEN(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r0, 0x89a0, &(0x7f0000000500)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @empty, @loopback, 0x0, 0x0, 0x8000, 0x0, 0x1}) 14:27:26 executing program 5: mkdir(0x0, 0x0) getresuid(0x0, &(0x7f0000000740), &(0x7f0000000780)) stat(&(0x7f0000000b40)='./file0\x00', 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x2, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) chdir(&(0x7f0000000340)='./file0\x00') symlink(&(0x7f0000000800)='./file0/file0\x00', &(0x7f00000007c0)='./file0\x00') bpf$PROG_LOAD(0x5, 0x0, 0x0) clone(0x2102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lstat(&(0x7f0000000600)='./file0/file0\x00', 0x0) 14:27:26 executing program 3: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) request_key(&(0x7f0000000000)='encrypted\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000080)='syz', 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000140)='keyring\x00', 0x0, 0x0, 0x0, 0x0) syz_open_dev$vbi(&(0x7f0000000100)='/dev/vbi#\x00', 0x1, 0x2) perf_event_open(&(0x7f000001d000)={0x7, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() write$P9_RLOPEN(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r0, 0x89a0, &(0x7f0000000500)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @empty, @loopback, 0x0, 0x0, 0x8000, 0x0, 0x1}) 14:27:26 executing program 0: mkdir(0x0, 0x0) getresuid(0x0, &(0x7f0000000740), &(0x7f0000000780)) stat(&(0x7f0000000b40)='./file0\x00', 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x2, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) chdir(&(0x7f0000000340)='./file0\x00') symlink(&(0x7f0000000800)='./file0/file0\x00', &(0x7f00000007c0)='./file0\x00') bpf$PROG_LOAD(0x5, 0x0, 0x0) clone(0x2102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lstat(&(0x7f0000000600)='./file0/file0\x00', 0x0) 14:27:26 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) request_key(&(0x7f0000000000)='encrypted\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000080)='syz', 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000140)='keyring\x00', 0x0, 0x0, 0x0, 0x0) syz_open_dev$vbi(&(0x7f0000000100)='/dev/vbi#\x00', 0x1, 0x2) perf_event_open(&(0x7f000001d000)={0x7, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() write$P9_RLOPEN(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r0, 0x89a0, &(0x7f0000000500)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @empty, @loopback, 0x0, 0x0, 0x8000, 0x0, 0x1}) 14:27:26 executing program 4: mkdir(0x0, 0x0) getresuid(0x0, &(0x7f0000000740), &(0x7f0000000780)) stat(&(0x7f0000000b40)='./file0\x00', 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x2, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) chdir(&(0x7f0000000340)='./file0\x00') symlink(&(0x7f0000000800)='./file0/file0\x00', &(0x7f00000007c0)='./file0\x00') bpf$PROG_LOAD(0x5, 0x0, 0x0) clone(0x2102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lstat(&(0x7f0000000600)='./file0/file0\x00', 0x0) 14:27:26 executing program 0: mkdir(0x0, 0x0) getresuid(0x0, &(0x7f0000000740), &(0x7f0000000780)) stat(&(0x7f0000000b40)='./file0\x00', 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x2, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) chdir(&(0x7f0000000340)='./file0\x00') symlink(&(0x7f0000000800)='./file0/file0\x00', &(0x7f00000007c0)='./file0\x00') bpf$PROG_LOAD(0x5, 0x0, 0x0) clone(0x2102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lstat(&(0x7f0000000600)='./file0/file0\x00', 0x0) 14:27:26 executing program 5: mkdir(0x0, 0x0) getresuid(0x0, &(0x7f0000000740), &(0x7f0000000780)) stat(&(0x7f0000000b40)='./file0\x00', 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x2, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) chdir(&(0x7f0000000340)='./file0\x00') symlink(&(0x7f0000000800)='./file0/file0\x00', &(0x7f00000007c0)='./file0\x00') bpf$PROG_LOAD(0x5, 0x0, 0x0) clone(0x2102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lstat(&(0x7f0000000600)='./file0/file0\x00', 0x0) 14:27:27 executing program 0: mkdir(0x0, 0x0) getresuid(0x0, &(0x7f0000000740), &(0x7f0000000780)) stat(&(0x7f0000000b40)='./file0\x00', 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x2, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) chdir(&(0x7f0000000340)='./file0\x00') symlink(&(0x7f0000000800)='./file0/file0\x00', &(0x7f00000007c0)='./file0\x00') bpf$PROG_LOAD(0x5, 0x0, 0x0) clone(0x2102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lstat(&(0x7f0000000600)='./file0/file0\x00', 0x0) 14:27:27 executing program 4: mkdir(0x0, 0x0) getresuid(0x0, &(0x7f0000000740), &(0x7f0000000780)) stat(&(0x7f0000000b40)='./file0\x00', 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x2, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) chdir(&(0x7f0000000340)='./file0\x00') symlink(&(0x7f0000000800)='./file0/file0\x00', &(0x7f00000007c0)='./file0\x00') bpf$PROG_LOAD(0x5, 0x0, 0x0) clone(0x2102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lstat(&(0x7f0000000600)='./file0/file0\x00', 0x0) 14:27:27 executing program 5: r0 = openat$vimc2(0xffffffffffffff9c, &(0x7f0000000280)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYBUF(r0, 0xc058560f, &(0x7f0000000040)={0x0, 0x9, 0x4, 0x0, {0x77359400}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "f0113262"}, 0x0, 0x0, @userptr, 0x4}) 14:27:27 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000040)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x61, 0x10, 0x5b}}, &(0x7f0000000400)='GPL\x04\x9c5\x14\xbfw-\xa0z\xe8.vY\n6\xf6I>\xc1\xab\x91\xb3\x97\xe4*\xbf\x1e\xa6\xcd\x8c\xd7t\'\xfc\x9a\x9e+qe\xf5+A\a\xbf\bP\xd8\x99\xdcR\xd0\"\xe3>Uo\xb2\xe3\xf3\x9a<\xde\x1f\xcaSd\x037\xec\x95aF\xbd\xbf\xcb\x11Pp\x19V1\xde]!\xa5\xea\x9ec\x8c+\xdbx\xa5\x01\xcaKn\xa3\x13\xd8%h\xf98,,?o\xab\xa6\xb4\xeeTy;N\xd2m\xae>R\"P)\xbb*\xc0\x00\x7fwuL?#\xce\xda\x98\t\xb9\xa9hJ\x94\n\xbc\xaa\x8c\xfc\xc7\x13>\xc4\"\xe9\xc88\x881\x8dA\xe9\xa4\x93\xf0\x19_\xe2Y\x96Q\xb8\x95\x04\xf5\xdb\xa1F%\xce#f\xf3=\x95\xdb\xa9/\x86ry\xca\xbfJ\xce\xdd\xc8Z\x8a\xf7\xa0\xfah\xd7g\xceQ6\xb9\xd0\xd1D\x90Cy\xb6\xbf4\xc2\x98\x86f\x97\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00qV\xf5\x9d~\v\xd0\x01\xddnDc\x81\xce\x98pay\xfeE!W\xc6\x9e\x8d~\x98\xd1\x11\xee\xf9\x87\x15\x04\xd4\a\x05\x8dr\xdb\x06\xc4\\\x10\xb5PQ\xdb\xa8^\x13[\x15y^\xd1\xffq\xaaO!\xe1IB\x16\x94\xd7\xe7(<}r\x97\xc3,=\xf2\x7f\xe9F\xd6\b!\xb8H\x90c-\x9c\xa57\xc0\xb2vm\x18\xb5\xf9>\x10\xfb\xf3\xa3\xe9\xcd\xca\xc2\xfe\xcfh\x86\x99}\xeen\x1f\xaf\x9c\xf4_\f\x91\xc0\x89\x82<\x8bS|\\t\x16\xda.\x85\x88\xaf\xfe\x8a\'-\xdc\xcaZ\xc4\xd2\xc6\x12\x98\xa5\xdc\xcb\xdc\xe4\x84\xd7\xe9i_\xeb\xa0|\xda@e\xcd\xb8\x12s\xe59z\x81P0\xab\xf4$4\xb4\xc1yI\xc6eU\x92L\x94\xbdG_+\t\xcfp\x11\xa8\xabt\xad\x89\xef\xa9y\xe0\x89', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8}, 0x14) 14:27:27 executing program 2: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)='devtmpfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r0, 0x0, 0x0) 14:27:27 executing program 5: r0 = openat$vimc2(0xffffffffffffff9c, &(0x7f0000000280)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYBUF(r0, 0xc058560f, &(0x7f0000000040)={0x0, 0x9, 0x4, 0x0, {0x77359400}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "f0113262"}, 0x0, 0x0, @userptr, 0x4}) 14:27:27 executing program 4: mkdir(0x0, 0x0) getresuid(0x0, &(0x7f0000000740), &(0x7f0000000780)) stat(&(0x7f0000000b40)='./file0\x00', 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x2, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) chdir(&(0x7f0000000340)='./file0\x00') symlink(&(0x7f0000000800)='./file0/file0\x00', &(0x7f00000007c0)='./file0\x00') bpf$PROG_LOAD(0x5, 0x0, 0x0) clone(0x2102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lstat(&(0x7f0000000600)='./file0/file0\x00', 0x0) 14:27:27 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000040)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x61, 0x10, 0x5b}}, &(0x7f0000000400)='GPL\x04\x9c5\x14\xbfw-\xa0z\xe8.vY\n6\xf6I>\xc1\xab\x91\xb3\x97\xe4*\xbf\x1e\xa6\xcd\x8c\xd7t\'\xfc\x9a\x9e+qe\xf5+A\a\xbf\bP\xd8\x99\xdcR\xd0\"\xe3>Uo\xb2\xe3\xf3\x9a<\xde\x1f\xcaSd\x037\xec\x95aF\xbd\xbf\xcb\x11Pp\x19V1\xde]!\xa5\xea\x9ec\x8c+\xdbx\xa5\x01\xcaKn\xa3\x13\xd8%h\xf98,,?o\xab\xa6\xb4\xeeTy;N\xd2m\xae>R\"P)\xbb*\xc0\x00\x7fwuL?#\xce\xda\x98\t\xb9\xa9hJ\x94\n\xbc\xaa\x8c\xfc\xc7\x13>\xc4\"\xe9\xc88\x881\x8dA\xe9\xa4\x93\xf0\x19_\xe2Y\x96Q\xb8\x95\x04\xf5\xdb\xa1F%\xce#f\xf3=\x95\xdb\xa9/\x86ry\xca\xbfJ\xce\xdd\xc8Z\x8a\xf7\xa0\xfah\xd7g\xceQ6\xb9\xd0\xd1D\x90Cy\xb6\xbf4\xc2\x98\x86f\x97\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00qV\xf5\x9d~\v\xd0\x01\xddnDc\x81\xce\x98pay\xfeE!W\xc6\x9e\x8d~\x98\xd1\x11\xee\xf9\x87\x15\x04\xd4\a\x05\x8dr\xdb\x06\xc4\\\x10\xb5PQ\xdb\xa8^\x13[\x15y^\xd1\xffq\xaaO!\xe1IB\x16\x94\xd7\xe7(<}r\x97\xc3,=\xf2\x7f\xe9F\xd6\b!\xb8H\x90c-\x9c\xa57\xc0\xb2vm\x18\xb5\xf9>\x10\xfb\xf3\xa3\xe9\xcd\xca\xc2\xfe\xcfh\x86\x99}\xeen\x1f\xaf\x9c\xf4_\f\x91\xc0\x89\x82<\x8bS|\\t\x16\xda.\x85\x88\xaf\xfe\x8a\'-\xdc\xcaZ\xc4\xd2\xc6\x12\x98\xa5\xdc\xcb\xdc\xe4\x84\xd7\xe9i_\xeb\xa0|\xda@e\xcd\xb8\x12s\xe59z\x81P0\xab\xf4$4\xb4\xc1yI\xc6eU\x92L\x94\xbdG_+\t\xcfp\x11\xa8\xabt\xad\x89\xef\xa9y\xe0\x89', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8}, 0x14) 14:27:27 executing program 2: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)='devtmpfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r0, 0x0, 0x0) 14:27:27 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ipv6_route\x00') preadv(r0, &(0x7f0000000480), 0x10000000000002a1, 0x0) 14:27:27 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xfffffd1e, 0x0, 0x229}}], 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip6_mr_cache\x00') preadv(r0, &(0x7f00000017c0), 0x333, 0x2) 14:27:27 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000040)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x61, 0x10, 0x5b}}, &(0x7f0000000400)='GPL\x04\x9c5\x14\xbfw-\xa0z\xe8.vY\n6\xf6I>\xc1\xab\x91\xb3\x97\xe4*\xbf\x1e\xa6\xcd\x8c\xd7t\'\xfc\x9a\x9e+qe\xf5+A\a\xbf\bP\xd8\x99\xdcR\xd0\"\xe3>Uo\xb2\xe3\xf3\x9a<\xde\x1f\xcaSd\x037\xec\x95aF\xbd\xbf\xcb\x11Pp\x19V1\xde]!\xa5\xea\x9ec\x8c+\xdbx\xa5\x01\xcaKn\xa3\x13\xd8%h\xf98,,?o\xab\xa6\xb4\xeeTy;N\xd2m\xae>R\"P)\xbb*\xc0\x00\x7fwuL?#\xce\xda\x98\t\xb9\xa9hJ\x94\n\xbc\xaa\x8c\xfc\xc7\x13>\xc4\"\xe9\xc88\x881\x8dA\xe9\xa4\x93\xf0\x19_\xe2Y\x96Q\xb8\x95\x04\xf5\xdb\xa1F%\xce#f\xf3=\x95\xdb\xa9/\x86ry\xca\xbfJ\xce\xdd\xc8Z\x8a\xf7\xa0\xfah\xd7g\xceQ6\xb9\xd0\xd1D\x90Cy\xb6\xbf4\xc2\x98\x86f\x97\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00qV\xf5\x9d~\v\xd0\x01\xddnDc\x81\xce\x98pay\xfeE!W\xc6\x9e\x8d~\x98\xd1\x11\xee\xf9\x87\x15\x04\xd4\a\x05\x8dr\xdb\x06\xc4\\\x10\xb5PQ\xdb\xa8^\x13[\x15y^\xd1\xffq\xaaO!\xe1IB\x16\x94\xd7\xe7(<}r\x97\xc3,=\xf2\x7f\xe9F\xd6\b!\xb8H\x90c-\x9c\xa57\xc0\xb2vm\x18\xb5\xf9>\x10\xfb\xf3\xa3\xe9\xcd\xca\xc2\xfe\xcfh\x86\x99}\xeen\x1f\xaf\x9c\xf4_\f\x91\xc0\x89\x82<\x8bS|\\t\x16\xda.\x85\x88\xaf\xfe\x8a\'-\xdc\xcaZ\xc4\xd2\xc6\x12\x98\xa5\xdc\xcb\xdc\xe4\x84\xd7\xe9i_\xeb\xa0|\xda@e\xcd\xb8\x12s\xe59z\x81P0\xab\xf4$4\xb4\xc1yI\xc6eU\x92L\x94\xbdG_+\t\xcfp\x11\xa8\xabt\xad\x89\xef\xa9y\xe0\x89', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8}, 0x14) 14:27:27 executing program 5: r0 = openat$vimc2(0xffffffffffffff9c, &(0x7f0000000280)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYBUF(r0, 0xc058560f, &(0x7f0000000040)={0x0, 0x9, 0x4, 0x0, {0x77359400}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "f0113262"}, 0x0, 0x0, @userptr, 0x4}) 14:27:27 executing program 2: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)='devtmpfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r0, 0x0, 0x0) 14:27:27 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xfffffd1e, 0x0, 0x229}}], 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip6_mr_cache\x00') preadv(r0, &(0x7f00000017c0), 0x333, 0x2) 14:27:27 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000040)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x61, 0x10, 0x5b}}, &(0x7f0000000400)='GPL\x04\x9c5\x14\xbfw-\xa0z\xe8.vY\n6\xf6I>\xc1\xab\x91\xb3\x97\xe4*\xbf\x1e\xa6\xcd\x8c\xd7t\'\xfc\x9a\x9e+qe\xf5+A\a\xbf\bP\xd8\x99\xdcR\xd0\"\xe3>Uo\xb2\xe3\xf3\x9a<\xde\x1f\xcaSd\x037\xec\x95aF\xbd\xbf\xcb\x11Pp\x19V1\xde]!\xa5\xea\x9ec\x8c+\xdbx\xa5\x01\xcaKn\xa3\x13\xd8%h\xf98,,?o\xab\xa6\xb4\xeeTy;N\xd2m\xae>R\"P)\xbb*\xc0\x00\x7fwuL?#\xce\xda\x98\t\xb9\xa9hJ\x94\n\xbc\xaa\x8c\xfc\xc7\x13>\xc4\"\xe9\xc88\x881\x8dA\xe9\xa4\x93\xf0\x19_\xe2Y\x96Q\xb8\x95\x04\xf5\xdb\xa1F%\xce#f\xf3=\x95\xdb\xa9/\x86ry\xca\xbfJ\xce\xdd\xc8Z\x8a\xf7\xa0\xfah\xd7g\xceQ6\xb9\xd0\xd1D\x90Cy\xb6\xbf4\xc2\x98\x86f\x97\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00qV\xf5\x9d~\v\xd0\x01\xddnDc\x81\xce\x98pay\xfeE!W\xc6\x9e\x8d~\x98\xd1\x11\xee\xf9\x87\x15\x04\xd4\a\x05\x8dr\xdb\x06\xc4\\\x10\xb5PQ\xdb\xa8^\x13[\x15y^\xd1\xffq\xaaO!\xe1IB\x16\x94\xd7\xe7(<}r\x97\xc3,=\xf2\x7f\xe9F\xd6\b!\xb8H\x90c-\x9c\xa57\xc0\xb2vm\x18\xb5\xf9>\x10\xfb\xf3\xa3\xe9\xcd\xca\xc2\xfe\xcfh\x86\x99}\xeen\x1f\xaf\x9c\xf4_\f\x91\xc0\x89\x82<\x8bS|\\t\x16\xda.\x85\x88\xaf\xfe\x8a\'-\xdc\xcaZ\xc4\xd2\xc6\x12\x98\xa5\xdc\xcb\xdc\xe4\x84\xd7\xe9i_\xeb\xa0|\xda@e\xcd\xb8\x12s\xe59z\x81P0\xab\xf4$4\xb4\xc1yI\xc6eU\x92L\x94\xbdG_+\t\xcfp\x11\xa8\xabt\xad\x89\xef\xa9y\xe0\x89', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8}, 0x14) 14:27:27 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ipv6_route\x00') preadv(r0, &(0x7f0000000480), 0x10000000000002a1, 0x0) 14:27:27 executing program 5: r0 = openat$vimc2(0xffffffffffffff9c, &(0x7f0000000280)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYBUF(r0, 0xc058560f, &(0x7f0000000040)={0x0, 0x9, 0x4, 0x0, {0x77359400}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "f0113262"}, 0x0, 0x0, @userptr, 0x4}) 14:27:27 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00', 0x0, 0x0) 14:27:27 executing program 1: r0 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x40000fffffd, 0x200800000000042) ioctl$FS_IOC_FSGETXATTR(r0, 0x8038550a, 0x0) 14:27:27 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xfffffd1e, 0x0, 0x229}}], 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip6_mr_cache\x00') preadv(r0, &(0x7f00000017c0), 0x333, 0x2) 14:27:27 executing program 2: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)='devtmpfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r0, 0x0, 0x0) 14:27:27 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ipv6_route\x00') preadv(r0, &(0x7f0000000480), 0x10000000000002a1, 0x0) 14:27:27 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001300290a000000a80000000007000000", @ANYRES32, @ANYBLOB="000000000000000008000c0004000000"], 0x288}}, 0x0) 14:27:27 executing program 5: openat$ppp(0xffffffffffffff9c, &(0x7f00000029c0)='/dev/ppp\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x8) 14:27:27 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xfffffd1e, 0x0, 0x229}}], 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip6_mr_cache\x00') preadv(r0, &(0x7f00000017c0), 0x333, 0x2) 14:27:27 executing program 1: r0 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x40000fffffd, 0x200800000000042) ioctl$FS_IOC_FSGETXATTR(r0, 0x8038550a, 0x0) 14:27:27 executing program 2: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net\x00\x00\x00\x00\x00\x00\x00\a/expire_nodest_conn\x00', 0x2, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) getdents64(r0, 0x0, 0x0) 14:27:27 executing program 0: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r0, 0x800000800c5012, 0x0) 14:27:27 executing program 1: r0 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x40000fffffd, 0x200800000000042) ioctl$FS_IOC_FSGETXATTR(r0, 0x8038550a, 0x0) 14:27:27 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001300290a000000a80000000007000000", @ANYRES32, @ANYBLOB="000000000000000008000c0004000000"], 0x288}}, 0x0) 14:27:27 executing program 5: openat$ppp(0xffffffffffffff9c, &(0x7f00000029c0)='/dev/ppp\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x8) 14:27:27 executing program 0: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r0, 0x800000800c5012, 0x0) 14:27:27 executing program 2: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net\x00\x00\x00\x00\x00\x00\x00\a/expire_nodest_conn\x00', 0x2, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) getdents64(r0, 0x0, 0x0) 14:27:28 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ipv6_route\x00') preadv(r0, &(0x7f0000000480), 0x10000000000002a1, 0x0) 14:27:28 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001300290a000000a80000000007000000", @ANYRES32, @ANYBLOB="000000000000000008000c0004000000"], 0x288}}, 0x0) 14:27:28 executing program 1: r0 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x40000fffffd, 0x200800000000042) ioctl$FS_IOC_FSGETXATTR(r0, 0x8038550a, 0x0) 14:27:28 executing program 0: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r0, 0x800000800c5012, 0x0) 14:27:28 executing program 2: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net\x00\x00\x00\x00\x00\x00\x00\a/expire_nodest_conn\x00', 0x2, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) getdents64(r0, 0x0, 0x0) 14:27:28 executing program 1: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net\x00\x00\x00\x00\x00\x00\x00\a/expire_nodest_conn\x00', 0x2, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) getdents64(r0, 0x0, 0x0) 14:27:28 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000001300290a000000a80000000007000000", @ANYRES32, @ANYBLOB="000000000000000008000c0004000000"], 0x288}}, 0x0) 14:27:28 executing program 0: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r0, 0x800000800c5012, 0x0) 14:27:28 executing program 2: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net\x00\x00\x00\x00\x00\x00\x00\a/expire_nodest_conn\x00', 0x2, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) getdents64(r0, 0x0, 0x0) 14:27:28 executing program 5: openat$ppp(0xffffffffffffff9c, &(0x7f00000029c0)='/dev/ppp\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x8) 14:27:28 executing program 1: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net\x00\x00\x00\x00\x00\x00\x00\a/expire_nodest_conn\x00', 0x2, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) getdents64(r0, 0x0, 0x0) 14:27:28 executing program 4: openat$ppp(0xffffffffffffff9c, &(0x7f00000029c0)='/dev/ppp\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x8) 14:27:28 executing program 3: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0xc0446, 0x0) mmap$binder(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, 0x11, r0, 0x0) 14:27:28 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_SNDBIT(r0, 0xc06855c8, 0x0) 14:27:28 executing program 0: r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f0000000080)={0x18, 0x0, {0x3, @remote, 'erspan0\x00'}}, 0x1e) ioctl$PPPOEIOCSFWD(r0, 0x4008b100, &(0x7f0000000380)={0x18, 0x0, {0x3, @local, 'ip6_vti0\x00'}}) 14:27:28 executing program 1: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net\x00\x00\x00\x00\x00\x00\x00\a/expire_nodest_conn\x00', 0x2, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) getdents64(r0, 0x0, 0x0) 14:27:28 executing program 3: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0xc0446, 0x0) mmap$binder(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, 0x11, r0, 0x0) 14:27:28 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0xc0446, 0x0) mmap$binder(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, 0x11, r0, 0x0) 14:27:28 executing program 0: r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f0000000080)={0x18, 0x0, {0x3, @remote, 'erspan0\x00'}}, 0x1e) ioctl$PPPOEIOCSFWD(r0, 0x4008b100, &(0x7f0000000380)={0x18, 0x0, {0x3, @local, 'ip6_vti0\x00'}}) 14:27:28 executing program 3: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0xc0446, 0x0) mmap$binder(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, 0x11, r0, 0x0) 14:27:28 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_SNDBIT(r0, 0xc06855c8, 0x0) 14:27:28 executing program 5: openat$ppp(0xffffffffffffff9c, &(0x7f00000029c0)='/dev/ppp\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x8) 14:27:28 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0xc0446, 0x0) mmap$binder(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, 0x11, r0, 0x0) 14:27:28 executing program 4: openat$ppp(0xffffffffffffff9c, &(0x7f00000029c0)='/dev/ppp\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x8) 14:27:28 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_SNDBIT(r0, 0xc06855c8, 0x0) 14:27:28 executing program 3: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0xc0446, 0x0) mmap$binder(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, 0x11, r0, 0x0) 14:27:28 executing program 0: r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f0000000080)={0x18, 0x0, {0x3, @remote, 'erspan0\x00'}}, 0x1e) ioctl$PPPOEIOCSFWD(r0, 0x4008b100, &(0x7f0000000380)={0x18, 0x0, {0x3, @local, 'ip6_vti0\x00'}}) 14:27:28 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0xc0446, 0x0) mmap$binder(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, 0x11, r0, 0x0) 14:27:28 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_SNDBIT(r0, 0xc06855c8, 0x0) 14:27:28 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000100)={'syz', 0x1}, &(0x7f00000000c0)='N', 0x1, 0xfffffffffffffffe) keyctl$invalidate(0xf, r0) 14:27:28 executing program 0: r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f0000000080)={0x18, 0x0, {0x3, @remote, 'erspan0\x00'}}, 0x1e) ioctl$PPPOEIOCSFWD(r0, 0x4008b100, &(0x7f0000000380)={0x18, 0x0, {0x3, @local, 'ip6_vti0\x00'}}) 14:27:28 executing program 5: mremap(&(0x7f00001c9000/0x3000)=nil, 0x3000, 0x2000, 0x0, &(0x7f000028c000/0x2000)=nil) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0xd) 14:27:28 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x2007, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003300050ad25a80648c6394fb0300fc0010000b400c000208053582c137153e370900018004081700d1bd", 0x2e}], 0x1}, 0x0) 14:27:28 executing program 1: r0 = socket(0x10, 0x2, 0xc) write(r0, &(0x7f0000000080)="1f0000000107fffffd3b54c007110069c8e1ff0010d1bbd10200cf00000000", 0x1f) 14:27:28 executing program 0: r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x4, 0x8000000024011, r0, 0x0) ioctl$SG_SET_TIMEOUT(r0, 0x2201, &(0x7f0000000140)) 14:27:28 executing program 4: openat$ppp(0xffffffffffffff9c, &(0x7f00000029c0)='/dev/ppp\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x8) 14:27:28 executing program 5: mremap(&(0x7f00001c9000/0x3000)=nil, 0x3000, 0x2000, 0x0, &(0x7f000028c000/0x2000)=nil) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0xd) 14:27:28 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x2007, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003300050ad25a80648c6394fb0300fc0010000b400c000208053582c137153e370900018004081700d1bd", 0x2e}], 0x1}, 0x0) 14:27:28 executing program 0: r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x4, 0x8000000024011, r0, 0x0) ioctl$SG_SET_TIMEOUT(r0, 0x2201, &(0x7f0000000140)) [ 390.542538][ T1097] openvswitch: netlink: Message has 5 unknown bytes. [ 390.580191][ T1130] netlink: 11 bytes leftover after parsing attributes in process `syz-executor.1'. 14:27:28 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000100)={'syz', 0x1}, &(0x7f00000000c0)='N', 0x1, 0xfffffffffffffffe) keyctl$invalidate(0xf, r0) 14:27:28 executing program 5: mremap(&(0x7f00001c9000/0x3000)=nil, 0x3000, 0x2000, 0x0, &(0x7f000028c000/0x2000)=nil) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0xd) 14:27:28 executing program 1: r0 = socket(0x10, 0x2, 0xc) write(r0, &(0x7f0000000080)="1f0000000107fffffd3b54c007110069c8e1ff0010d1bbd10200cf00000000", 0x1f) 14:27:28 executing program 0: r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x4, 0x8000000024011, r0, 0x0) ioctl$SG_SET_TIMEOUT(r0, 0x2201, &(0x7f0000000140)) 14:27:28 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x2007, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003300050ad25a80648c6394fb0300fc0010000b400c000208053582c137153e370900018004081700d1bd", 0x2e}], 0x1}, 0x0) [ 390.648530][ T1137] openvswitch: netlink: Message has 5 unknown bytes. 14:27:29 executing program 5: mremap(&(0x7f00001c9000/0x3000)=nil, 0x3000, 0x2000, 0x0, &(0x7f000028c000/0x2000)=nil) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0xd) 14:27:29 executing program 0: r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x4, 0x8000000024011, r0, 0x0) ioctl$SG_SET_TIMEOUT(r0, 0x2201, &(0x7f0000000140)) [ 390.766283][ T1157] netlink: 11 bytes leftover after parsing attributes in process `syz-executor.1'. 14:27:29 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000100)={'syz', 0x1}, &(0x7f00000000c0)='N', 0x1, 0xfffffffffffffffe) keyctl$invalidate(0xf, r0) [ 390.814828][ T1161] openvswitch: netlink: Message has 5 unknown bytes. 14:27:29 executing program 1: r0 = socket(0x10, 0x2, 0xc) write(r0, &(0x7f0000000080)="1f0000000107fffffd3b54c007110069c8e1ff0010d1bbd10200cf00000000", 0x1f) 14:27:29 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000100)={'syz', 0x1}, &(0x7f00000000c0)='N', 0x1, 0xfffffffffffffffe) keyctl$invalidate(0xf, r0) 14:27:29 executing program 0: r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x4, 0x8000000024011, r0, 0x0) ioctl$SG_SET_TIMEOUT(r0, 0x2201, &(0x7f0000000140)) 14:27:29 executing program 4: mremap(&(0x7f00001c9000/0x3000)=nil, 0x3000, 0x2000, 0x0, &(0x7f000028c000/0x2000)=nil) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0xd) 14:27:29 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x2007, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003300050ad25a80648c6394fb0300fc0010000b400c000208053582c137153e370900018004081700d1bd", 0x2e}], 0x1}, 0x0) 14:27:29 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000100)={'syz', 0x1}, &(0x7f00000000c0)='N', 0x1, 0xfffffffffffffffe) keyctl$invalidate(0xf, r0) 14:27:29 executing program 1: r0 = socket(0x10, 0x2, 0xc) write(r0, &(0x7f0000000080)="1f0000000107fffffd3b54c007110069c8e1ff0010d1bbd10200cf00000000", 0x1f) [ 390.953193][ T1181] netlink: 11 bytes leftover after parsing attributes in process `syz-executor.1'. 14:27:29 executing program 0: r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x4, 0x8000000024011, r0, 0x0) ioctl$SG_SET_TIMEOUT(r0, 0x2201, &(0x7f0000000140)) 14:27:29 executing program 4: mremap(&(0x7f00001c9000/0x3000)=nil, 0x3000, 0x2000, 0x0, &(0x7f000028c000/0x2000)=nil) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0xd) 14:27:29 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000100)={'syz', 0x1}, &(0x7f00000000c0)='N', 0x1, 0xfffffffffffffffe) keyctl$invalidate(0xf, r0) [ 390.998664][ T1184] netlink: 11 bytes leftover after parsing attributes in process `syz-executor.1'. [ 391.025306][ T1189] openvswitch: netlink: Message has 5 unknown bytes. 14:27:29 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x7f, 0x7, 0x5, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000000040), &(0x7f0000000080)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000000)={r0, 0x0, 0x0}, 0x18) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r0, &(0x7f0000000000), &(0x7f0000000080)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r0, &(0x7f0000000080)='b', &(0x7f0000000200)=""/229}, 0x18) 14:27:29 executing program 2: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)='devtmpfs\x00', 0x0, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) mount$overlay(0x400000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000140)=""/121, 0x71) 14:27:29 executing program 4: mremap(&(0x7f00001c9000/0x3000)=nil, 0x3000, 0x2000, 0x0, &(0x7f000028c000/0x2000)=nil) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0xd) 14:27:29 executing program 0: r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x4, 0x8000000024011, r0, 0x0) ioctl$SG_SET_TIMEOUT(r0, 0x2201, &(0x7f0000000140)) 14:27:29 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000100)={'syz', 0x1}, &(0x7f00000000c0)='N', 0x1, 0xfffffffffffffffe) keyctl$invalidate(0xf, r0) 14:27:29 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x7f, 0x7, 0x5, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000000040), &(0x7f0000000080)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000000)={r0, 0x0, 0x0}, 0x18) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r0, &(0x7f0000000000), &(0x7f0000000080)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r0, &(0x7f0000000080)='b', &(0x7f0000000200)=""/229}, 0x18) 14:27:29 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x7f, 0x7, 0x5, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000000040), &(0x7f0000000080)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000000)={r0, 0x0, 0x0}, 0x18) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r0, &(0x7f0000000000), &(0x7f0000000080)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r0, &(0x7f0000000080)='b', &(0x7f0000000200)=""/229}, 0x18) 14:27:29 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x7f, 0x7, 0x5, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000000040), &(0x7f0000000080)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000000)={r0, 0x0, 0x0}, 0x18) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r0, &(0x7f0000000000), &(0x7f0000000080)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r0, &(0x7f0000000080)='b', &(0x7f0000000200)=""/229}, 0x18) 14:27:29 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x7f, 0x7, 0x5, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000000040), &(0x7f0000000080)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000000)={r0, 0x0, 0x0}, 0x18) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r0, &(0x7f0000000000), &(0x7f0000000080)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r0, &(0x7f0000000080)='b', &(0x7f0000000200)=""/229}, 0x18) 14:27:29 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x7f, 0x7, 0x5, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000000040), &(0x7f0000000080)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000000)={r0, 0x0, 0x0}, 0x18) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r0, &(0x7f0000000000), &(0x7f0000000080)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r0, &(0x7f0000000080)='b', &(0x7f0000000200)=""/229}, 0x18) 14:27:29 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x7f, 0x7, 0x5, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000000040), &(0x7f0000000080)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000000)={r0, 0x0, 0x0}, 0x18) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r0, &(0x7f0000000000), &(0x7f0000000080)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r0, &(0x7f0000000080)='b', &(0x7f0000000200)=""/229}, 0x18) 14:27:29 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x7f, 0x7, 0x5, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000000040), &(0x7f0000000080)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000000)={r0, 0x0, 0x0}, 0x18) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r0, &(0x7f0000000000), &(0x7f0000000080)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r0, &(0x7f0000000080)='b', &(0x7f0000000200)=""/229}, 0x18) 14:27:29 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x7f, 0x7, 0x5, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000000040), &(0x7f0000000080)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000000)={r0, 0x0, 0x0}, 0x18) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r0, &(0x7f0000000000), &(0x7f0000000080)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r0, &(0x7f0000000080)='b', &(0x7f0000000200)=""/229}, 0x18) 14:27:29 executing program 2: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)='devtmpfs\x00', 0x0, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) mount$overlay(0x400000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000140)=""/121, 0x71) 14:27:29 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x7f, 0x7, 0x5, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000000040), &(0x7f0000000080)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000000)={r0, 0x0, 0x0}, 0x18) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r0, &(0x7f0000000000), &(0x7f0000000080)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r0, &(0x7f0000000080)='b', &(0x7f0000000200)=""/229}, 0x18) 14:27:29 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x7f, 0x7, 0x5, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000000040), &(0x7f0000000080)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000000)={r0, 0x0, 0x0}, 0x18) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r0, &(0x7f0000000000), &(0x7f0000000080)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r0, &(0x7f0000000080)='b', &(0x7f0000000200)=""/229}, 0x18) 14:27:29 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x7f, 0x7, 0x5, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000000040), &(0x7f0000000080)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000000)={r0, 0x0, 0x0}, 0x18) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r0, &(0x7f0000000000), &(0x7f0000000080)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r0, &(0x7f0000000080)='b', &(0x7f0000000200)=""/229}, 0x18) 14:27:29 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x7f, 0x7, 0x5, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000000040), &(0x7f0000000080)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000000)={r0, 0x0, 0x0}, 0x18) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r0, &(0x7f0000000000), &(0x7f0000000080)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r0, &(0x7f0000000080)='b', &(0x7f0000000200)=""/229}, 0x18) 14:27:29 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x7f, 0x7, 0x5, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000000040), &(0x7f0000000080)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000000)={r0, 0x0, 0x0}, 0x18) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r0, &(0x7f0000000000), &(0x7f0000000080)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r0, &(0x7f0000000080)='b', &(0x7f0000000200)=""/229}, 0x18) 14:27:29 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x7f, 0x7, 0x5, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000000040), &(0x7f0000000080)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000000)={r0, 0x0, 0x0}, 0x18) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r0, &(0x7f0000000000), &(0x7f0000000080)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r0, &(0x7f0000000080)='b', &(0x7f0000000200)=""/229}, 0x18) 14:27:29 executing program 3: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)='devtmpfs\x00', 0x0, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) mount$overlay(0x400000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000140)=""/121, 0x71) 14:27:29 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x7f, 0x7, 0x5, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000000040), &(0x7f0000000080)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000000)={r0, 0x0, 0x0}, 0x18) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r0, &(0x7f0000000000), &(0x7f0000000080)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r0, &(0x7f0000000080)='b', &(0x7f0000000200)=""/229}, 0x18) 14:27:29 executing program 4: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)='devtmpfs\x00', 0x0, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) mount$overlay(0x400000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000140)=""/121, 0x71) 14:27:29 executing program 1: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)='devtmpfs\x00', 0x0, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) mount$overlay(0x400000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000140)=""/121, 0x71) 14:27:29 executing program 0: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)='devtmpfs\x00', 0x0, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) mount$overlay(0x400000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000140)=""/121, 0x71) 14:27:30 executing program 2: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)='devtmpfs\x00', 0x0, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) mount$overlay(0x400000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000140)=""/121, 0x71) 14:27:30 executing program 5: r0 = socket(0x40000000015, 0x805, 0x0) getsockopt(r0, 0x114, 0x2720, &(0x7f0000af0fe7)=""/13, &(0x7f000033bffc)=0xc08) 14:27:30 executing program 4: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)='devtmpfs\x00', 0x0, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) mount$overlay(0x400000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000140)=""/121, 0x71) 14:27:30 executing program 1: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)='devtmpfs\x00', 0x0, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) mount$overlay(0x400000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000140)=""/121, 0x71) 14:27:30 executing program 0: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)='devtmpfs\x00', 0x0, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) mount$overlay(0x400000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000140)=""/121, 0x71) 14:27:30 executing program 3: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)='devtmpfs\x00', 0x0, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) mount$overlay(0x400000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000140)=""/121, 0x71) 14:27:30 executing program 5: r0 = socket(0x40000000015, 0x805, 0x0) getsockopt(r0, 0x114, 0x2720, &(0x7f0000af0fe7)=""/13, &(0x7f000033bffc)=0xc08) 14:27:30 executing program 5: r0 = socket(0x40000000015, 0x805, 0x0) getsockopt(r0, 0x114, 0x2720, &(0x7f0000af0fe7)=""/13, &(0x7f000033bffc)=0xc08) 14:27:30 executing program 5: r0 = socket(0x40000000015, 0x805, 0x0) getsockopt(r0, 0x114, 0x2720, &(0x7f0000af0fe7)=""/13, &(0x7f000033bffc)=0xc08) 14:27:30 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x31c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) readlink(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)=""/59, 0x3b) 14:27:30 executing program 0: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)='devtmpfs\x00', 0x0, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) mount$overlay(0x400000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000140)=""/121, 0x71) 14:27:30 executing program 3: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)='devtmpfs\x00', 0x0, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) mount$overlay(0x400000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000140)=""/121, 0x71) 14:27:30 executing program 2: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)='devtmpfs\x00', 0x0, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) mount$overlay(0x400000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000140)=""/121, 0x71) 14:27:30 executing program 1: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)='devtmpfs\x00', 0x0, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) mount$overlay(0x400000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000140)=""/121, 0x71) 14:27:30 executing program 4: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)='devtmpfs\x00', 0x0, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) mount$overlay(0x400000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000140)=""/121, 0x71) 14:27:30 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x31c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) readlink(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)=""/59, 0x3b) 14:27:30 executing program 3: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x1, &(0x7f0000000500)=[{&(0x7f0000000100)="495267db689442c19c73e8cfb6bdcb829f", 0x11}], 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_mount_image$minix(0x0, 0x0, 0x0, 0x1, &(0x7f00000002c0)=[{&(0x7f0000000200)="e41c1cf7d55ab422ce4bfc0c8571282d2395b5da09e116817d49102c97674ac25f65afefcdba1921ebf24e736dc722295e7ab7b9c0f8d7528234fd6a2a697349f3697e8d09a1642205fd34338196780d5c68dadbfeb8c50be82fc36226bd1855c29d8c178ec3f8b01df570d7fcd008905e", 0x71}], 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="5fb88c750196077aa3214bebc13f7d74ad4d9320611cf5a33f2a3f09e1c926359dcfe20001c781cb67f79cb0c6f5f4bf8ed60dce2176c22a20b22b9b24172b5569ec67906e7df93b05b19ba5360f2eab62812070fc181a2483366595113b240804d882a7dcd7ac4ba53e06d02558968b978122716d1823dcc7d40155c1bc1e8433f5ba15f5ee48c0ca941fce872e497d1377e2a5bde956f003caaf58c7520f82d7346c266e8ea70dab3bb7af6d78602a31ab8d232b07f6e3ef524b552ed88a1b1c02bc89f4f671855d40a2c1c173d4bb121bc86270c32d39c4c0d09a29b8983169914d8df86417a802b772bb638f72ccdcbb", 0xf2, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fd7000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r2, 0x4400ae8f, &(0x7f0000000000)) ioctl$KVM_SET_VAPIC_ADDR(r2, 0x4008ae93, &(0x7f0000000140)=0x7006) ioctl$KVM_RUN(r2, 0xae80, 0x0) 14:27:30 executing program 0: ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380), 0x0, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000180)=ANY=[@ANYBLOB]) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0), 0x0, 0x0) accept$inet6(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$key(0xf, 0x3, 0x2) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet(0x2, 0x0, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x23, &(0x7f0000000740)={@multicast2, @loopback}, 0xc) setsockopt$inet_msfilter(r1, 0x0, 0x29, &(0x7f00000003c0)=ANY=[@ANYBLOB="e00000027f00000100000000030000006f000001e0000001ffffffff1846fbf609f5bcd33aafc2b5754e936ef6c7f0edec2c1c0f3823f279025b8c38070b169aa81c36b8ea2f430158af2e3bc7032024d102ba2bc3e2eb453586b2233dfdab297cd8f846a0e4b927d6e254bf4317070850f2ba0513230fa8b4f4715c8cab9a1969c89f3cc58321ca7d1af8076badc6dd7f927a1b02f93a62727d6a2c53f629cd9341edb0e6ab7b1f83d4cac43bfac98b6430fb7011aa018e6cbd087becb3d34b3e8110d099cdf303107bc21971b37ff013e060c8e21c2a10039aff4e0f3d1f993c499a2d845bf26787af4df2e286832dfb30dea285adc2715c6eb9e72f6f44a6cfee85c770bb6fe82a4128b504f7c2094544b90000000000000007ef58b4c031f7975a71615f6f8c4306eb3d79960000000000000000"], 0x1) setsockopt$inet_msfilter(r1, 0x0, 0x29, &(0x7f0000000000)={@multicast2, @loopback}, 0x10) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 14:27:30 executing program 2: r0 = socket$caif_stream(0x25, 0x1, 0x0) setsockopt$CAIFSO_LINK_SELECT(r0, 0x116, 0x7f, 0x0, 0x0) 14:27:30 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x31c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) readlink(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)=""/59, 0x3b) 14:27:30 executing program 2: r0 = socket$caif_stream(0x25, 0x1, 0x0) setsockopt$CAIFSO_LINK_SELECT(r0, 0x116, 0x7f, 0x0, 0x0) [ 392.538660][ T1758] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready [ 392.640970][ T1833] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready 14:27:30 executing program 4: r0 = openat$pidfd(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self\x00', 0x0, 0x0) pidfd_send_signal(r0, 0x0, &(0x7f00000000c0)={0x3b, 0x0, 0x6}, 0x0) 14:27:30 executing program 2: r0 = socket$caif_stream(0x25, 0x1, 0x0) setsockopt$CAIFSO_LINK_SELECT(r0, 0x116, 0x7f, 0x0, 0x0) 14:27:31 executing program 0: ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380), 0x0, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000180)=ANY=[@ANYBLOB]) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0), 0x0, 0x0) accept$inet6(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$key(0xf, 0x3, 0x2) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet(0x2, 0x0, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x23, &(0x7f0000000740)={@multicast2, @loopback}, 0xc) setsockopt$inet_msfilter(r1, 0x0, 0x29, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x1) setsockopt$inet_msfilter(r1, 0x0, 0x29, &(0x7f0000000000)={@multicast2, @loopback}, 0x10) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 14:27:31 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x31c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) readlink(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)=""/59, 0x3b) 14:27:31 executing program 1: ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380), 0x0, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000180)=ANY=[@ANYBLOB]) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0), 0x0, 0x0) accept$inet6(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$key(0xf, 0x3, 0x2) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet(0x2, 0x0, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x23, &(0x7f0000000740)={@multicast2, @loopback}, 0xc) setsockopt$inet_msfilter(r1, 0x0, 0x29, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x1) setsockopt$inet_msfilter(r1, 0x0, 0x29, &(0x7f0000000000)={@multicast2, @loopback}, 0x10) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 14:27:31 executing program 2: r0 = socket$caif_stream(0x25, 0x1, 0x0) setsockopt$CAIFSO_LINK_SELECT(r0, 0x116, 0x7f, 0x0, 0x0) 14:27:31 executing program 4: r0 = openat$pidfd(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self\x00', 0x0, 0x0) pidfd_send_signal(r0, 0x0, &(0x7f00000000c0)={0x3b, 0x0, 0x6}, 0x0) 14:27:31 executing program 3: ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380), 0x0, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000180)=ANY=[@ANYBLOB]) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0), 0x0, 0x0) accept$inet6(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$key(0xf, 0x3, 0x2) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet(0x2, 0x0, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x23, &(0x7f0000000740)={@multicast2, @loopback}, 0xc) setsockopt$inet_msfilter(r1, 0x0, 0x29, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x1) setsockopt$inet_msfilter(r1, 0x0, 0x29, &(0x7f0000000000)={@multicast2, @loopback}, 0x10) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 14:27:31 executing program 4: r0 = openat$pidfd(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self\x00', 0x0, 0x0) pidfd_send_signal(r0, 0x0, &(0x7f00000000c0)={0x3b, 0x0, 0x6}, 0x0) 14:27:31 executing program 4: r0 = openat$pidfd(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self\x00', 0x0, 0x0) pidfd_send_signal(r0, 0x0, &(0x7f00000000c0)={0x3b, 0x0, 0x6}, 0x0) 14:27:31 executing program 2: ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380), 0x0, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000180)=ANY=[@ANYBLOB]) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0), 0x0, 0x0) accept$inet6(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$key(0xf, 0x3, 0x2) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet(0x2, 0x0, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x23, &(0x7f0000000740)={@multicast2, @loopback}, 0xc) setsockopt$inet_msfilter(r1, 0x0, 0x29, &(0x7f00000003c0)=ANY=[@ANYBLOB="e00000027f00000100000000030000006f000001e0000001ffffffff1846fbf609f5bcd33aafc2b5754e936ef6c7f0edec2c1c0f3823f279025b8c38070b169aa81c36b8ea2f430158af2e3bc7032024d102ba2bc3e2eb453586b2233dfdab297cd8f846a0e4b927d6e254bf4317070850f2ba0513230fa8b4f4715c8cab9a1969c89f3cc58321ca7d1af8076badc6dd7f927a1b02f93a62727d6a2c53f629cd9341edb0e6ab7b1f83d4cac43bfac98b6430fb7011aa018e6cbd087becb3d34b3e8110d099cdf303107bc21971b37ff013e060c8e21c2a10039aff4e0f3d1f993c499a2d845bf26787af4df2e286832dfb30dea285adc2715c6eb9e72f6f44a6cfee85c770bb6fe82a4128b504f7c2094544b90000000000000007ef58b4c031f7975a71615f6f8c4306eb3d79960000000000000000"], 0x1) setsockopt$inet_msfilter(r1, 0x0, 0x29, &(0x7f0000000000)={@multicast2, @loopback}, 0x10) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 14:27:31 executing program 5: ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380), 0x0, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000180)=ANY=[@ANYBLOB]) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0), 0x0, 0x0) accept$inet6(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$key(0xf, 0x3, 0x2) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet(0x2, 0x0, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x23, &(0x7f0000000740)={@multicast2, @loopback}, 0xc) setsockopt$inet_msfilter(r1, 0x0, 0x29, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x1) setsockopt$inet_msfilter(r1, 0x0, 0x29, &(0x7f0000000000)={@multicast2, @loopback}, 0x10) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 14:27:31 executing program 4: ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380), 0x0, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000180)=ANY=[@ANYBLOB]) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0), 0x0, 0x0) accept$inet6(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$key(0xf, 0x3, 0x2) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet(0x2, 0x0, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x23, &(0x7f0000000740)={@multicast2, @loopback}, 0xc) setsockopt$inet_msfilter(r1, 0x0, 0x29, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x1) setsockopt$inet_msfilter(r1, 0x0, 0x29, &(0x7f0000000000)={@multicast2, @loopback}, 0x10) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 14:27:31 executing program 3: ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380), 0x0, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000180)=ANY=[@ANYBLOB]) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0), 0x0, 0x0) accept$inet6(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$key(0xf, 0x3, 0x2) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet(0x2, 0x0, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x23, &(0x7f0000000740)={@multicast2, @loopback}, 0xc) setsockopt$inet_msfilter(r1, 0x0, 0x29, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x1) setsockopt$inet_msfilter(r1, 0x0, 0x29, &(0x7f0000000000)={@multicast2, @loopback}, 0x10) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') [ 393.477984][ T2131] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready [ 393.501421][ T2133] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready [ 393.532313][ T2145] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready 14:27:31 executing program 0: ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380), 0x0, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000180)=ANY=[@ANYBLOB]) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0), 0x0, 0x0) accept$inet6(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$key(0xf, 0x3, 0x2) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet(0x2, 0x0, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x23, &(0x7f0000000740)={@multicast2, @loopback}, 0xc) setsockopt$inet_msfilter(r1, 0x0, 0x29, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x1) setsockopt$inet_msfilter(r1, 0x0, 0x29, &(0x7f0000000000)={@multicast2, @loopback}, 0x10) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 14:27:31 executing program 2: ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380), 0x0, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000180)=ANY=[@ANYBLOB]) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0), 0x0, 0x0) accept$inet6(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$key(0xf, 0x3, 0x2) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet(0x2, 0x0, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x23, &(0x7f0000000740)={@multicast2, @loopback}, 0xc) setsockopt$inet_msfilter(r1, 0x0, 0x29, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x1) setsockopt$inet_msfilter(r1, 0x0, 0x29, &(0x7f0000000000)={@multicast2, @loopback}, 0x10) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 14:27:31 executing program 5: ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380), 0x0, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000180)=ANY=[@ANYBLOB]) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0), 0x0, 0x0) accept$inet6(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$key(0xf, 0x3, 0x2) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet(0x2, 0x0, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x23, &(0x7f0000000740)={@multicast2, @loopback}, 0xc) setsockopt$inet_msfilter(r1, 0x0, 0x29, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x1) setsockopt$inet_msfilter(r1, 0x0, 0x29, &(0x7f0000000000)={@multicast2, @loopback}, 0x10) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 14:27:31 executing program 1: ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380), 0x0, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000180)=ANY=[@ANYBLOB]) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0), 0x0, 0x0) accept$inet6(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$key(0xf, 0x3, 0x2) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet(0x2, 0x0, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x23, &(0x7f0000000740)={@multicast2, @loopback}, 0xc) setsockopt$inet_msfilter(r1, 0x0, 0x29, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x1) setsockopt$inet_msfilter(r1, 0x0, 0x29, &(0x7f0000000000)={@multicast2, @loopback}, 0x10) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 14:27:32 executing program 3: ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380), 0x0, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000180)=ANY=[@ANYBLOB]) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0), 0x0, 0x0) accept$inet6(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$key(0xf, 0x3, 0x2) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet(0x2, 0x0, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x23, &(0x7f0000000740)={@multicast2, @loopback}, 0xc) setsockopt$inet_msfilter(r1, 0x0, 0x29, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x1) setsockopt$inet_msfilter(r1, 0x0, 0x29, &(0x7f0000000000)={@multicast2, @loopback}, 0x10) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 14:27:32 executing program 0: ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380), 0x0, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000180)=ANY=[@ANYBLOB]) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0), 0x0, 0x0) accept$inet6(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$key(0xf, 0x3, 0x2) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet(0x2, 0x0, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x23, &(0x7f0000000740)={@multicast2, @loopback}, 0xc) setsockopt$inet_msfilter(r1, 0x0, 0x29, &(0x7f00000003c0)=ANY=[@ANYBLOB="e00000027f00000100000000030000006f000001e0000001ffffffff1846fbf609f5bcd33aafc2b5754e936ef6c7f0edec2c1c0f3823f279025b8c38070b169aa81c36b8ea2f430158af2e3bc7032024d102ba2bc3e2eb453586b2233dfdab297cd8f846a0e4b927d6e254bf4317070850f2ba0513230fa8b4f4715c8cab9a1969c89f3cc58321ca7d1af8076badc6dd7f927a1b02f93a62727d6a2c53f629cd9341edb0e6ab7b1f83d4cac43bfac98b6430fb7011aa018e6cbd087becb3d34b3e8110d099cdf303107bc21971b37ff013e060c8e21c2a10039aff4e0f3d1f993c499a2d845bf26787af4df2e286832dfb30dea285adc2715c6eb9e72f6f44a6cfee85c770bb6fe82a4128b504f7c2094544b90000000000000007ef58b4c031f7975a71615f6f8c4306eb3d79960000000000000000"], 0x1) setsockopt$inet_msfilter(r1, 0x0, 0x29, &(0x7f0000000000)={@multicast2, @loopback}, 0x10) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 14:27:32 executing program 4: ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380), 0x0, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000180)=ANY=[@ANYBLOB]) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0), 0x0, 0x0) accept$inet6(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$key(0xf, 0x3, 0x2) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet(0x2, 0x0, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x23, &(0x7f0000000740)={@multicast2, @loopback}, 0xc) setsockopt$inet_msfilter(r1, 0x0, 0x29, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x1) setsockopt$inet_msfilter(r1, 0x0, 0x29, &(0x7f0000000000)={@multicast2, @loopback}, 0x10) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 14:27:32 executing program 2: ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380), 0x0, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000180)=ANY=[@ANYBLOB]) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0), 0x0, 0x0) accept$inet6(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$key(0xf, 0x3, 0x2) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet(0x2, 0x0, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x23, &(0x7f0000000740)={@multicast2, @loopback}, 0xc) setsockopt$inet_msfilter(r1, 0x0, 0x29, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x1) setsockopt$inet_msfilter(r1, 0x0, 0x29, &(0x7f0000000000)={@multicast2, @loopback}, 0x10) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 14:27:32 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) 14:27:32 executing program 2: r0 = socket(0x10, 0x80002, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'syz_tun\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000580)=ANY=[@ANYBLOB="7400000024000b0500000000000000edffffff00", @ANYRES32=r2, @ANYBLOB="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"], 0x74}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000180)=[{0x2, 0x1000000000000, &(0x7f0000000080), 0x0, &(0x7f0000000100)}], 0x492492492492642, 0x0) [ 394.607231][ T26] kauditd_printk_skb: 5 callbacks suppressed [ 394.607238][ T26] audit: type=1800 audit(1566138452.873:164): pid=2588 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=16523 res=0 14:27:33 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) [ 394.705449][ T26] audit: type=1800 audit(1566138452.973:165): pid=2588 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=16523 res=0 14:27:33 executing program 5: ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380), 0x0, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000180)=ANY=[@ANYBLOB]) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0), 0x0, 0x0) accept$inet6(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$key(0xf, 0x3, 0x2) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet(0x2, 0x0, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x23, &(0x7f0000000740)={@multicast2, @loopback}, 0xc) setsockopt$inet_msfilter(r1, 0x0, 0x29, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x1) setsockopt$inet_msfilter(r1, 0x0, 0x29, &(0x7f0000000000)={@multicast2, @loopback}, 0x10) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 14:27:33 executing program 1: ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380), 0x0, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000180)=ANY=[@ANYBLOB]) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0), 0x0, 0x0) accept$inet6(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$key(0xf, 0x3, 0x2) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet(0x2, 0x0, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x23, &(0x7f0000000740)={@multicast2, @loopback}, 0xc) setsockopt$inet_msfilter(r1, 0x0, 0x29, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x1) setsockopt$inet_msfilter(r1, 0x0, 0x29, &(0x7f0000000000)={@multicast2, @loopback}, 0x10) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') [ 394.773414][ T26] audit: type=1800 audit(1566138453.043:166): pid=2696 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=16523 res=0 14:27:33 executing program 4: ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380), 0x0, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000180)=ANY=[@ANYBLOB]) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0), 0x0, 0x0) accept$inet6(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$key(0xf, 0x3, 0x2) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet(0x2, 0x0, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x23, &(0x7f0000000740)={@multicast2, @loopback}, 0xc) setsockopt$inet_msfilter(r1, 0x0, 0x29, &(0x7f00000003c0)=ANY=[@ANYBLOB="e00000027f00000100000000030000006f000001e0000001ffffffff1846fbf609f5bcd33aafc2b5754e936ef6c7f0edec2c1c0f3823f279025b8c38070b169aa81c36b8ea2f430158af2e3bc7032024d102ba2bc3e2eb453586b2233dfdab297cd8f846a0e4b927d6e254bf4317070850f2ba0513230fa8b4f4715c8cab9a1969c89f3cc58321ca7d1af8076badc6dd7f927a1b02f93a62727d6a2c53f629cd9341edb0e6ab7b1f83d4cac43bfac98b6430fb7011aa018e6cbd087becb3d34b3e8110d099cdf303107bc21971b37ff013e060c8e21c2a10039aff4e0f3d1f993c499a2d845bf26787af4df2e286832dfb30dea285adc2715c6eb9e72f6f44a6cfee85c770bb6fe82a4128b504f7c2094544b90000000000000007ef58b4c031f7975a71615f6f8c4306eb3d79960000000000000000"], 0x1) setsockopt$inet_msfilter(r1, 0x0, 0x29, &(0x7f0000000000)={@multicast2, @loopback}, 0x10) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 14:27:33 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) 14:27:33 executing program 2: r0 = socket(0x10, 0x80002, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'syz_tun\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000580)=ANY=[@ANYBLOB="7400000024000b0500000000000000edffffff00", @ANYRES32=r2, @ANYBLOB="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"], 0x74}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000180)=[{0x2, 0x1000000000000, &(0x7f0000000080), 0x0, &(0x7f0000000100)}], 0x492492492492642, 0x0) 14:27:33 executing program 5: r0 = gettid() ptrace$setopts(0x4206, r0, 0x3237, 0x0) [ 394.925848][ T26] audit: type=1800 audit(1566138453.193:167): pid=2808 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=16493 res=0 [ 395.122302][ T2817] IPVS: ftp: loaded support on port[0] = 21 [ 395.167716][ T2817] chnl_net:caif_netlink_parms(): no params data found [ 395.187891][ T2817] bridge0: port 1(bridge_slave_0) entered blocking state [ 395.195441][ T2817] bridge0: port 1(bridge_slave_0) entered disabled state [ 395.202997][ T2817] device bridge_slave_0 entered promiscuous mode [ 395.210242][ T2817] bridge0: port 2(bridge_slave_1) entered blocking state [ 395.217298][ T2817] bridge0: port 2(bridge_slave_1) entered disabled state [ 395.224855][ T2817] device bridge_slave_1 entered promiscuous mode [ 395.237016][ T2817] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 395.247264][ T2817] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 395.262932][ T2817] team0: Port device team_slave_0 added [ 395.269346][ T2817] team0: Port device team_slave_1 added [ 395.320402][ T2817] device hsr_slave_0 entered promiscuous mode [ 395.368815][ T2817] device hsr_slave_1 entered promiscuous mode [ 395.428393][ T2817] debugfs: Directory 'hsr0' with parent '/' already present! [ 395.442183][ T2817] bridge0: port 2(bridge_slave_1) entered blocking state [ 395.449314][ T2817] bridge0: port 2(bridge_slave_1) entered forwarding state [ 395.456531][ T2817] bridge0: port 1(bridge_slave_0) entered blocking state [ 395.463586][ T2817] bridge0: port 1(bridge_slave_0) entered forwarding state [ 395.486987][ T2817] 8021q: adding VLAN 0 to HW filter on device bond0 [ 395.496486][T16811] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 395.504621][T16811] bridge0: port 1(bridge_slave_0) entered disabled state [ 395.512499][T16811] bridge0: port 2(bridge_slave_1) entered disabled state [ 395.522098][ T2817] 8021q: adding VLAN 0 to HW filter on device team0 [ 395.531649][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 395.539909][ T22] bridge0: port 1(bridge_slave_0) entered blocking state [ 395.546919][ T22] bridge0: port 1(bridge_slave_0) entered forwarding state [ 395.564664][ T2817] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 395.575120][ T2817] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 395.587125][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 395.595734][ T22] bridge0: port 2(bridge_slave_1) entered blocking state [ 395.602786][ T22] bridge0: port 2(bridge_slave_1) entered forwarding state [ 395.610804][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 395.619582][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 395.627701][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 395.635830][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 395.644901][T16712] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 395.652404][T16712] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 395.666962][ T2817] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 395.780838][ T2825] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready 14:27:34 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) 14:27:34 executing program 4: times(&(0x7f0000000000)) 14:27:34 executing program 2: r0 = socket(0x10, 0x80002, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'syz_tun\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000580)=ANY=[@ANYBLOB="7400000024000b0500000000000000edffffff00", @ANYRES32=r2, @ANYBLOB="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"], 0x74}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000180)=[{0x2, 0x1000000000000, &(0x7f0000000080), 0x0, &(0x7f0000000100)}], 0x492492492492642, 0x0) 14:27:34 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(r0, &(0x7f0000000140), 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x17, &(0x7f0000000040), 0x4) 14:27:34 executing program 2: r0 = socket(0x10, 0x80002, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'syz_tun\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000580)=ANY=[@ANYBLOB="7400000024000b0500000000000000edffffff00", @ANYRES32=r2, @ANYBLOB="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"], 0x74}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000180)=[{0x2, 0x1000000000000, &(0x7f0000000080), 0x0, &(0x7f0000000100)}], 0x492492492492642, 0x0) [ 395.916276][ T26] audit: type=1800 audit(1566138454.183:168): pid=2835 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=16517 res=0 14:27:34 executing program 2: openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x2000000000002) mremap(&(0x7f0000057000/0x4000)=nil, 0x4000, 0x4000, 0x3, &(0x7f0000aed000/0x4000)=nil) 14:27:34 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={0x0, 0xffc7}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000200)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="02030609100000000000004c9e0000000200140002000000000000000010000105000600200000000a00000000000000000500e50000070000001f0000000000000300000000000002000100f5000000000000020000000005000500000000000a00000000f48d000000000000000000001700"/128], 0x80}}, 0x0) sendmmsg(r0, &(0x7f0000000180), 0x400000000000002, 0x0) [ 396.184437][ T2950] IPVS: ftp: loaded support on port[0] = 21 [ 396.185026][ T2951] IPVS: ftp: loaded support on port[0] = 21 [ 396.334649][ T2951] chnl_net:caif_netlink_parms(): no params data found [ 396.346053][ T2950] chnl_net:caif_netlink_parms(): no params data found [ 396.400088][ T2951] bridge0: port 1(bridge_slave_0) entered blocking state [ 396.407154][ T2951] bridge0: port 1(bridge_slave_0) entered disabled state [ 396.414900][ T2951] device bridge_slave_0 entered promiscuous mode [ 396.422232][ T2950] bridge0: port 1(bridge_slave_0) entered blocking state [ 396.429298][ T2950] bridge0: port 1(bridge_slave_0) entered disabled state [ 396.436618][ T2950] device bridge_slave_0 entered promiscuous mode [ 396.443633][ T2951] bridge0: port 2(bridge_slave_1) entered blocking state [ 396.450722][ T2951] bridge0: port 2(bridge_slave_1) entered disabled state [ 396.458007][ T2951] device bridge_slave_1 entered promiscuous mode [ 396.492884][ T2950] bridge0: port 2(bridge_slave_1) entered blocking state [ 396.500725][ T2950] bridge0: port 2(bridge_slave_1) entered disabled state [ 396.508106][ T2950] device bridge_slave_1 entered promiscuous mode [ 396.516158][ T2951] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 396.526426][ T2951] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 396.569516][ T2951] team0: Port device team_slave_0 added [ 396.576030][ T2951] team0: Port device team_slave_1 added [ 396.584357][ T2950] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 396.594774][ T2950] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 396.689833][ T2951] device hsr_slave_0 entered promiscuous mode [ 396.729131][ T2951] device hsr_slave_1 entered promiscuous mode [ 396.788550][ T2951] debugfs: Directory 'hsr0' with parent '/' already present! [ 396.796658][ T2950] team0: Port device team_slave_0 added [ 396.804956][ T2950] team0: Port device team_slave_1 added [ 396.835352][ T2951] bridge0: port 2(bridge_slave_1) entered blocking state [ 396.842396][ T2951] bridge0: port 2(bridge_slave_1) entered forwarding state [ 396.849721][ T2951] bridge0: port 1(bridge_slave_0) entered blocking state [ 396.859632][ T2951] bridge0: port 1(bridge_slave_0) entered forwarding state [ 396.910558][ T2950] device hsr_slave_0 entered promiscuous mode [ 396.958591][ T2950] device hsr_slave_1 entered promiscuous mode [ 397.008387][ T2950] debugfs: Directory 'hsr0' with parent '/' already present! [ 397.018047][ T17] bridge0: port 1(bridge_slave_0) entered disabled state [ 397.025797][ T17] bridge0: port 2(bridge_slave_1) entered disabled state [ 397.062746][ T3059] IPVS: ftp: loaded support on port[0] = 21 [ 397.115135][ T2951] 8021q: adding VLAN 0 to HW filter on device bond0 [ 397.128147][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 397.137785][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 397.147673][ T2951] 8021q: adding VLAN 0 to HW filter on device team0 [ 397.157569][T16811] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 397.166310][T16811] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 397.174617][T16811] bridge0: port 1(bridge_slave_0) entered blocking state [ 397.181675][T16811] bridge0: port 1(bridge_slave_0) entered forwarding state [ 397.245697][ T994] device bridge_slave_1 left promiscuous mode [ 397.252310][ T994] bridge0: port 2(bridge_slave_1) entered disabled state [ 397.309021][ T994] device bridge_slave_0 left promiscuous mode [ 397.315152][ T994] bridge0: port 1(bridge_slave_0) entered disabled state [ 397.928825][ T994] device hsr_slave_0 left promiscuous mode [ 397.998473][ T994] device hsr_slave_1 left promiscuous mode [ 398.053398][ T994] team0 (unregistering): Port device team_slave_1 removed [ 398.062420][ T994] team0 (unregistering): Port device team_slave_0 removed [ 398.071218][ T994] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 398.131231][ T994] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 398.183602][ T994] bond0 (unregistering): Released all slaves [ 398.276511][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 398.285748][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 398.294185][ T17] bridge0: port 2(bridge_slave_1) entered blocking state [ 398.301223][ T17] bridge0: port 2(bridge_slave_1) entered forwarding state [ 398.309387][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 398.318388][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 398.327147][ T3059] chnl_net:caif_netlink_parms(): no params data found [ 398.344081][T16811] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 398.352391][T16811] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 398.360813][T16811] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 398.383907][T16814] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 398.392678][T16814] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 398.405747][ T2950] 8021q: adding VLAN 0 to HW filter on device bond0 [ 398.413003][ T3059] bridge0: port 1(bridge_slave_0) entered blocking state [ 398.422863][ T3059] bridge0: port 1(bridge_slave_0) entered disabled state [ 398.430438][ T3059] device bridge_slave_0 entered promiscuous mode [ 398.437481][ T3059] bridge0: port 2(bridge_slave_1) entered blocking state [ 398.444583][ T3059] bridge0: port 2(bridge_slave_1) entered disabled state [ 398.452008][ T3059] device bridge_slave_1 entered promiscuous mode [ 398.460665][T16814] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 398.468861][T16814] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 398.483314][ T2951] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 398.494281][ T2951] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 398.506000][T16811] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 398.513792][T16811] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 398.521824][T16811] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 398.530181][T16811] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 398.539631][ T2950] 8021q: adding VLAN 0 to HW filter on device team0 [ 398.551502][ T3059] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 398.562911][ T3059] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 398.618027][ T2950] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 398.632578][ T2950] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 398.644284][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 398.656406][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 398.665530][ T22] bridge0: port 1(bridge_slave_0) entered blocking state [ 398.672588][ T22] bridge0: port 1(bridge_slave_0) entered forwarding state [ 398.683775][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 398.692391][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 398.704323][ T22] bridge0: port 2(bridge_slave_1) entered blocking state [ 398.711375][ T22] bridge0: port 2(bridge_slave_1) entered forwarding state [ 398.722949][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 398.731448][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 398.743346][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 398.751795][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 398.763538][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 398.772176][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 398.784131][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 398.792496][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 398.804127][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 398.812621][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 398.842677][ T3059] team0: Port device team_slave_0 added [ 398.850316][ T2951] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 398.858256][ T2950] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 398.868097][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 398.876341][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 398.892181][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 398.903164][ T3059] team0: Port device team_slave_1 added [ 398.960759][ T3059] device hsr_slave_0 entered promiscuous mode [ 398.998705][ T3059] device hsr_slave_1 entered promiscuous mode [ 399.038395][ T3059] debugfs: Directory 'hsr0' with parent '/' already present! [ 399.074554][ T3059] bridge0: port 2(bridge_slave_1) entered blocking state [ 399.081657][ T3059] bridge0: port 2(bridge_slave_1) entered forwarding state [ 399.089406][ T3059] bridge0: port 1(bridge_slave_0) entered blocking state [ 399.096438][ T3059] bridge0: port 1(bridge_slave_0) entered forwarding state [ 399.162334][ T3059] 8021q: adding VLAN 0 to HW filter on device bond0 [ 399.202469][ T3073] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready [ 399.248732][ T3059] 8021q: adding VLAN 0 to HW filter on device team0 [ 399.257791][T16712] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 399.268772][T16712] bridge0: port 1(bridge_slave_0) entered disabled state [ 399.276245][T16712] bridge0: port 2(bridge_slave_1) entered disabled state [ 399.286073][T16712] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready 14:27:37 executing program 5: r0 = gettid() ptrace$setopts(0x4206, r0, 0x3237, 0x0) 14:27:37 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={0x0, 0xffc7}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000200)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="02030609100000000000004c9e0000000200140002000000000000000010000105000600200000000a00000000000000000500e50000070000001f0000000000000300000000000002000100f5000000000000020000000005000500000000000a00000000f48d000000000000000000001700"/128], 0x80}}, 0x0) sendmmsg(r0, &(0x7f0000000180), 0x400000000000002, 0x0) 14:27:37 executing program 2: openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x2000000000002) mremap(&(0x7f0000057000/0x4000)=nil, 0x4000, 0x4000, 0x3, &(0x7f0000aed000/0x4000)=nil) 14:27:37 executing program 0: openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x2000000000002) mremap(&(0x7f0000057000/0x4000)=nil, 0x4000, 0x4000, 0x3, &(0x7f0000aed000/0x4000)=nil) [ 399.293978][ T3073] syz-executor.1 (3073) used greatest stack depth: 23320 bytes left 14:27:37 executing program 1: r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) writev(r0, &(0x7f0000001800)=[{&(0x7f0000000140)='A', 0x1}, {0x0}, {&(0x7f0000000740)="ed", 0x1}], 0x3) [ 399.336791][T16712] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 399.360535][T16712] bridge0: port 1(bridge_slave_0) entered blocking state [ 399.367596][T16712] bridge0: port 1(bridge_slave_0) entered forwarding state [ 399.375674][T16712] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready 14:27:37 executing program 5: r0 = gettid() ptrace$setopts(0x4206, r0, 0x3237, 0x0) [ 399.384207][T16712] bridge0: port 2(bridge_slave_1) entered blocking state [ 399.391261][T16712] bridge0: port 2(bridge_slave_1) entered forwarding state [ 399.408906][T16712] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 399.429046][T16712] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 399.445055][T16712] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 399.454803][T16712] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 399.478038][T16793] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 399.487129][T16793] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 399.496335][ T3059] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 14:27:37 executing program 4: times(&(0x7f0000000000)) 14:27:37 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={0x0, 0xffc7}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000200)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="02030609100000000000004c9e0000000200140002000000000000000010000105000600200000000a00000000000000000500e50000070000001f0000000000000300000000000002000100f5000000000000020000000005000500000000000a00000000f48d000000000000000000001700"/128], 0x80}}, 0x0) sendmmsg(r0, &(0x7f0000000180), 0x400000000000002, 0x0) 14:27:37 executing program 5: r0 = gettid() ptrace$setopts(0x4206, r0, 0x3237, 0x0) 14:27:37 executing program 2: openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x2000000000002) mremap(&(0x7f0000057000/0x4000)=nil, 0x4000, 0x4000, 0x3, &(0x7f0000aed000/0x4000)=nil) 14:27:37 executing program 1: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video36\x00', 0x2, 0x0) flistxattr(r0, 0x0, 0x0) [ 399.585348][ T3059] 8021q: adding VLAN 0 to HW filter on device batadv0 14:27:37 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000017c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="baa100b000eef36cba2100ec66b9800000c00f326635001000000f30bad104ecc80080d267d9f8f30f1bb429000f20c06635200000000f22c067f3af", 0x3c}], 0x1, 0x0, 0x0, 0xfffffffffffffd70) ioctl$DRM_IOCTL_MODE_GETCRTC(0xffffffffffffffff, 0xc06864a1, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "0c9a4e7eb2faf017a20853e1a15c6368dc756b73f05458293c785a18c6e5388d"}}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000000000/0x1000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 14:27:38 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={0x0, 0xffc7}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000200)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="02030609100000000000004c9e0000000200140002000000000000000010000105000600200000000a00000000000000000500e50000070000001f0000000000000300000000000002000100f5000000000000020000000005000500000000000a00000000f48d000000000000000000001700"/128], 0x80}}, 0x0) sendmmsg(r0, &(0x7f0000000180), 0x400000000000002, 0x0) 14:27:38 executing program 4: times(&(0x7f0000000000)) 14:27:38 executing program 4: times(&(0x7f0000000000)) [ 400.552372][ T3391] IPVS: ftp: loaded support on port[0] = 21 [ 400.664316][ T9383] device bridge_slave_1 left promiscuous mode [ 400.670806][ T9383] bridge0: port 2(bridge_slave_1) entered disabled state [ 400.708975][ T9383] device bridge_slave_0 left promiscuous mode [ 400.715182][ T9383] bridge0: port 1(bridge_slave_0) entered disabled state [ 401.338862][ T9383] device hsr_slave_0 left promiscuous mode [ 401.418585][ T9383] device hsr_slave_1 left promiscuous mode [ 401.474032][ T9383] team0 (unregistering): Port device team_slave_1 removed [ 401.484190][ T9383] team0 (unregistering): Port device team_slave_0 removed [ 401.493268][ T9383] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 401.551590][ T9383] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 401.615999][ T9383] bond0 (unregistering): Released all slaves [ 401.713081][ T3391] chnl_net:caif_netlink_parms(): no params data found [ 401.736042][ T3391] bridge0: port 1(bridge_slave_0) entered blocking state [ 401.740361][ T3395] IPVS: ftp: loaded support on port[0] = 21 [ 401.743172][ T3391] bridge0: port 1(bridge_slave_0) entered disabled state [ 401.756416][ T3391] device bridge_slave_0 entered promiscuous mode [ 401.763953][ T3391] bridge0: port 2(bridge_slave_1) entered blocking state [ 401.771301][ T3391] bridge0: port 2(bridge_slave_1) entered disabled state [ 401.778873][ T3391] device bridge_slave_1 entered promiscuous mode [ 401.794859][ T3391] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 401.805653][ T3391] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 401.821885][ T3391] team0: Port device team_slave_0 added [ 401.829141][ T3391] team0: Port device team_slave_1 added [ 401.890236][ T3391] device hsr_slave_0 entered promiscuous mode [ 401.928674][ T3391] device hsr_slave_1 entered promiscuous mode [ 401.968427][ T3391] debugfs: Directory 'hsr0' with parent '/' already present! [ 402.002763][ T3391] bridge0: port 2(bridge_slave_1) entered blocking state [ 402.009824][ T3391] bridge0: port 2(bridge_slave_1) entered forwarding state [ 402.017051][ T3391] bridge0: port 1(bridge_slave_0) entered blocking state [ 402.024098][ T3391] bridge0: port 1(bridge_slave_0) entered forwarding state [ 402.045382][ T3395] chnl_net:caif_netlink_parms(): no params data found [ 402.116345][ T3395] bridge0: port 1(bridge_slave_0) entered blocking state [ 402.123554][ T3395] bridge0: port 1(bridge_slave_0) entered disabled state [ 402.134914][ T3395] device bridge_slave_0 entered promiscuous mode [ 402.142465][ T3395] bridge0: port 2(bridge_slave_1) entered blocking state [ 402.153236][ T3395] bridge0: port 2(bridge_slave_1) entered disabled state [ 402.161193][ T3395] device bridge_slave_1 entered promiscuous mode [ 402.182304][ T3395] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 402.196708][ T3395] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 402.218184][ T3395] team0: Port device team_slave_0 added [ 402.225969][ T3395] team0: Port device team_slave_1 added [ 402.279626][ T3395] device hsr_slave_0 entered promiscuous mode [ 402.321368][ T3395] device hsr_slave_1 entered promiscuous mode [ 402.358533][ T3395] debugfs: Directory 'hsr0' with parent '/' already present! [ 402.372635][ T3391] 8021q: adding VLAN 0 to HW filter on device bond0 [ 402.384017][T16712] bridge0: port 1(bridge_slave_0) entered disabled state [ 402.391441][T16712] bridge0: port 2(bridge_slave_1) entered disabled state [ 402.399182][T16712] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 402.408226][T16712] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 402.416161][T16712] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 402.427132][ T3391] 8021q: adding VLAN 0 to HW filter on device team0 [ 402.442575][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 402.451119][ T17] bridge0: port 1(bridge_slave_0) entered blocking state [ 402.458127][ T17] bridge0: port 1(bridge_slave_0) entered forwarding state [ 402.480861][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 402.490387][ T22] bridge0: port 2(bridge_slave_1) entered blocking state [ 402.497411][ T22] bridge0: port 2(bridge_slave_1) entered forwarding state [ 402.506549][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 402.515033][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 402.523435][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 402.531595][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 402.539887][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 402.553639][ T3391] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 402.577614][ T3391] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 402.591911][ T3395] 8021q: adding VLAN 0 to HW filter on device bond0 [ 402.604476][T16712] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 402.614166][ T3395] 8021q: adding VLAN 0 to HW filter on device team0 [ 402.625681][T16814] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 402.634494][T16814] bridge0: port 1(bridge_slave_0) entered blocking state [ 402.641609][T16814] bridge0: port 1(bridge_slave_0) entered forwarding state 14:27:41 executing program 0: openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x2000000000002) mremap(&(0x7f0000057000/0x4000)=nil, 0x4000, 0x4000, 0x3, &(0x7f0000aed000/0x4000)=nil) 14:27:41 executing program 2: openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x2000000000002) mremap(&(0x7f0000057000/0x4000)=nil, 0x4000, 0x4000, 0x3, &(0x7f0000aed000/0x4000)=nil) 14:27:41 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x3, &(0x7f0000000040)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0xad}}, &(0x7f0000000080)='GPL\x04\x9c5\x14\xbfw-\xa0z\xe8.vY\n6\xf6I>\xc1\xab\x91\xb3\x97\xe4*\xbf\x1e\xa6\xcd\x8c\xd7t\'\xfc\x9a\x9e+qe\xf5+A\a\xbf\bP\xd8\x99\xdcR\xd0\x13\x17]\xdb\x1b/F <*\x05\xb7\"\xe3>Uo\xb2\xe3\xf3\x9a<\xde\x1f\xcaSd\x037\xec\x95aF\xbd\xbf\xcb\x11Pp\x19V1\xde]!\xa5\xea\x9ec\x8c+\xdbx\xa5\x01\xcaKn\xa3\x13\xd8%h\xf98,,?o\xab\xa6\xb4\xeeTy;N\xd2m\xae>R\"P)\xbb*\xc0\x00\x7fwuL?#\xce\xda\x98\t\xb9\xa9hJ\x94\n\xbc\xaa\x8c\xfc\xc7\x13>\xc4\"\xe9\xc88\x881\x8dA\xe9\xa4\x93\xf0\x19_\xe2Y\x96Q\xb8\x95\x04\xf5\xdb\xa1F%\xce#f\xf3=\x95\xdb\xa9/\x86ry\xca\xbfJ\xce\xdd\xc8Z\x8a\xf7\xa0\xfah\xd7g\xceQ6\xb9\xd0\xd1\x96lI\x9c\xb6\xbf4\xc2\x98\x86f\x97\x00'/248, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x14) 14:27:41 executing program 4: r0 = open(&(0x7f0000000140)='./file0\x00', 0x147b0b20d41e94d0, 0x0) read$eventfd(r0, 0x0, 0xffffffa5) 14:27:41 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000017c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="baa100b000eef36cba2100ec66b9800000c00f326635001000000f30bad104ecc80080d267d9f8f30f1bb429000f20c06635200000000f22c067f3af", 0x3c}], 0x1, 0x0, 0x0, 0xfffffffffffffd70) ioctl$DRM_IOCTL_MODE_GETCRTC(0xffffffffffffffff, 0xc06864a1, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "0c9a4e7eb2faf017a20853e1a15c6368dc756b73f05458293c785a18c6e5388d"}}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000000000/0x1000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 402.676132][T16811] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 402.685016][T16811] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 402.697966][T16811] bridge0: port 2(bridge_slave_1) entered blocking state [ 402.705036][T16811] bridge0: port 2(bridge_slave_1) entered forwarding state [ 402.713294][T16811] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready 14:27:41 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x3, &(0x7f0000000040)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0xad}}, &(0x7f0000000080)='GPL\x04\x9c5\x14\xbfw-\xa0z\xe8.vY\n6\xf6I>\xc1\xab\x91\xb3\x97\xe4*\xbf\x1e\xa6\xcd\x8c\xd7t\'\xfc\x9a\x9e+qe\xf5+A\a\xbf\bP\xd8\x99\xdcR\xd0\x13\x17]\xdb\x1b/F <*\x05\xb7\"\xe3>Uo\xb2\xe3\xf3\x9a<\xde\x1f\xcaSd\x037\xec\x95aF\xbd\xbf\xcb\x11Pp\x19V1\xde]!\xa5\xea\x9ec\x8c+\xdbx\xa5\x01\xcaKn\xa3\x13\xd8%h\xf98,,?o\xab\xa6\xb4\xeeTy;N\xd2m\xae>R\"P)\xbb*\xc0\x00\x7fwuL?#\xce\xda\x98\t\xb9\xa9hJ\x94\n\xbc\xaa\x8c\xfc\xc7\x13>\xc4\"\xe9\xc88\x881\x8dA\xe9\xa4\x93\xf0\x19_\xe2Y\x96Q\xb8\x95\x04\xf5\xdb\xa1F%\xce#f\xf3=\x95\xdb\xa9/\x86ry\xca\xbfJ\xce\xdd\xc8Z\x8a\xf7\xa0\xfah\xd7g\xceQ6\xb9\xd0\xd1\x96lI\x9c\xb6\xbf4\xc2\x98\x86f\x97\x00'/248, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x14) 14:27:41 executing program 4: r0 = open(&(0x7f0000000140)='./file0\x00', 0x147b0b20d41e94d0, 0x0) read$eventfd(r0, 0x0, 0xffffffa5) [ 402.757041][T16811] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 402.790739][ T3395] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 402.825657][ T3395] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 402.857425][T16811] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 402.872071][T16811] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 402.889543][T16811] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 402.906289][ T3395] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 402.927316][T16811] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 14:27:41 executing program 1: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video36\x00', 0x2, 0x0) flistxattr(r0, 0x0, 0x0) 14:27:41 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000017c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="baa100b000eef36cba2100ec66b9800000c00f326635001000000f30bad104ecc80080d267d9f8f30f1bb429000f20c06635200000000f22c067f3af", 0x3c}], 0x1, 0x0, 0x0, 0xfffffffffffffd70) ioctl$DRM_IOCTL_MODE_GETCRTC(0xffffffffffffffff, 0xc06864a1, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "0c9a4e7eb2faf017a20853e1a15c6368dc756b73f05458293c785a18c6e5388d"}}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000000000/0x1000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 14:27:41 executing program 0: openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x2000000000002) mremap(&(0x7f0000057000/0x4000)=nil, 0x4000, 0x4000, 0x3, &(0x7f0000aed000/0x4000)=nil) 14:27:41 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x3, &(0x7f0000000040)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0xad}}, &(0x7f0000000080)='GPL\x04\x9c5\x14\xbfw-\xa0z\xe8.vY\n6\xf6I>\xc1\xab\x91\xb3\x97\xe4*\xbf\x1e\xa6\xcd\x8c\xd7t\'\xfc\x9a\x9e+qe\xf5+A\a\xbf\bP\xd8\x99\xdcR\xd0\x13\x17]\xdb\x1b/F <*\x05\xb7\"\xe3>Uo\xb2\xe3\xf3\x9a<\xde\x1f\xcaSd\x037\xec\x95aF\xbd\xbf\xcb\x11Pp\x19V1\xde]!\xa5\xea\x9ec\x8c+\xdbx\xa5\x01\xcaKn\xa3\x13\xd8%h\xf98,,?o\xab\xa6\xb4\xeeTy;N\xd2m\xae>R\"P)\xbb*\xc0\x00\x7fwuL?#\xce\xda\x98\t\xb9\xa9hJ\x94\n\xbc\xaa\x8c\xfc\xc7\x13>\xc4\"\xe9\xc88\x881\x8dA\xe9\xa4\x93\xf0\x19_\xe2Y\x96Q\xb8\x95\x04\xf5\xdb\xa1F%\xce#f\xf3=\x95\xdb\xa9/\x86ry\xca\xbfJ\xce\xdd\xc8Z\x8a\xf7\xa0\xfah\xd7g\xceQ6\xb9\xd0\xd1\x96lI\x9c\xb6\xbf4\xc2\x98\x86f\x97\x00'/248, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x14) 14:27:41 executing program 4: r0 = open(&(0x7f0000000140)='./file0\x00', 0x147b0b20d41e94d0, 0x0) read$eventfd(r0, 0x0, 0xffffffa5) 14:27:41 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)={0x2, 0x15, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, [@sadb_x_filter={0x5, 0x1a, @in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, @in6=@local}, @sadb_x_filter={0x5, 0x1a, @in6=@loopback, @in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}}]}, 0x60}}, 0x0) 14:27:41 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x3, &(0x7f0000000040)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0xad}}, &(0x7f0000000080)='GPL\x04\x9c5\x14\xbfw-\xa0z\xe8.vY\n6\xf6I>\xc1\xab\x91\xb3\x97\xe4*\xbf\x1e\xa6\xcd\x8c\xd7t\'\xfc\x9a\x9e+qe\xf5+A\a\xbf\bP\xd8\x99\xdcR\xd0\x13\x17]\xdb\x1b/F <*\x05\xb7\"\xe3>Uo\xb2\xe3\xf3\x9a<\xde\x1f\xcaSd\x037\xec\x95aF\xbd\xbf\xcb\x11Pp\x19V1\xde]!\xa5\xea\x9ec\x8c+\xdbx\xa5\x01\xcaKn\xa3\x13\xd8%h\xf98,,?o\xab\xa6\xb4\xeeTy;N\xd2m\xae>R\"P)\xbb*\xc0\x00\x7fwuL?#\xce\xda\x98\t\xb9\xa9hJ\x94\n\xbc\xaa\x8c\xfc\xc7\x13>\xc4\"\xe9\xc88\x881\x8dA\xe9\xa4\x93\xf0\x19_\xe2Y\x96Q\xb8\x95\x04\xf5\xdb\xa1F%\xce#f\xf3=\x95\xdb\xa9/\x86ry\xca\xbfJ\xce\xdd\xc8Z\x8a\xf7\xa0\xfah\xd7g\xceQ6\xb9\xd0\xd1\x96lI\x9c\xb6\xbf4\xc2\x98\x86f\x97\x00'/248, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x14) 14:27:41 executing program 4: r0 = open(&(0x7f0000000140)='./file0\x00', 0x147b0b20d41e94d0, 0x0) read$eventfd(r0, 0x0, 0xffffffa5) 14:27:41 executing program 1: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video36\x00', 0x2, 0x0) flistxattr(r0, 0x0, 0x0) 14:27:41 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000017c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="baa100b000eef36cba2100ec66b9800000c00f326635001000000f30bad104ecc80080d267d9f8f30f1bb429000f20c06635200000000f22c067f3af", 0x3c}], 0x1, 0x0, 0x0, 0xfffffffffffffd70) ioctl$DRM_IOCTL_MODE_GETCRTC(0xffffffffffffffff, 0xc06864a1, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "0c9a4e7eb2faf017a20853e1a15c6368dc756b73f05458293c785a18c6e5388d"}}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000000000/0x1000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 14:27:41 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)={0x2, 0x15, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, [@sadb_x_filter={0x5, 0x1a, @in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, @in6=@local}, @sadb_x_filter={0x5, 0x1a, @in6=@loopback, @in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}}]}, 0x60}}, 0x0) 14:27:41 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(r0, &(0x7f00000010c0)=[{{}, 0x0, 0x100000001}], 0xab) 14:27:41 executing program 1: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video36\x00', 0x2, 0x0) flistxattr(r0, 0x0, 0x0) 14:27:42 executing program 1: openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='fd/3\x00') 14:27:42 executing program 4: syz_emit_ethernet(0x66, &(0x7f0000000080)={@link_local, @link_local={0x1, 0x80, 0xc2, 0x689, 0x3}, [], {@ipv6={0x86dd, {0x0, 0x6, 'v`Q', 0x30, 0x0, 0x0, @remote={0xfe, 0x80, [0x3, 0x543, 0x700, 0x5, 0x50000000000000d, 0x8848000000f0ffff], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [0x0, 0xfffffffffffff000]}, {[], @icmpv6=@dest_unreach={0xffffff86, 0x0, 0x0, 0x0, [0x7, 0xffffca88], {0x0, 0x6, "c5961e", 0x0, 0x0, 0x0, @mcast1={0x5, 0x4, [0x0, 0x80ffffff, 0x28, 0x0, 0x0, 0x0, 0x18, 0x3, 0x0, 0x0, 0x5]}, @mcast2={0x11, 0x5}}}}}}}}, 0x0) 14:27:42 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000017c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="baa100b000eef36cba2100ec66b9800000c00f326635001000000f30bad104ecc80080d267d9f8f30f1bb429000f20c06635200000000f22c067f3af", 0x3c}], 0x1, 0x0, 0x0, 0xfffffffffffffd70) ioctl$DRM_IOCTL_MODE_GETCRTC(0xffffffffffffffff, 0xc06864a1, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "0c9a4e7eb2faf017a20853e1a15c6368dc756b73f05458293c785a18c6e5388d"}}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000000000/0x1000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 14:27:42 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)={0x2, 0x15, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, [@sadb_x_filter={0x5, 0x1a, @in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, @in6=@local}, @sadb_x_filter={0x5, 0x1a, @in6=@loopback, @in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}}]}, 0x60}}, 0x0) 14:27:42 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(r0, &(0x7f00000010c0)=[{{}, 0x0, 0x100000001}], 0xab) 14:27:42 executing program 4: syz_emit_ethernet(0x66, &(0x7f0000000080)={@link_local, @link_local={0x1, 0x80, 0xc2, 0x689, 0x3}, [], {@ipv6={0x86dd, {0x0, 0x6, 'v`Q', 0x30, 0x0, 0x0, @remote={0xfe, 0x80, [0x3, 0x543, 0x700, 0x5, 0x50000000000000d, 0x8848000000f0ffff], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [0x0, 0xfffffffffffff000]}, {[], @icmpv6=@dest_unreach={0xffffff86, 0x0, 0x0, 0x0, [0x7, 0xffffca88], {0x0, 0x6, "c5961e", 0x0, 0x0, 0x0, @mcast1={0x5, 0x4, [0x0, 0x80ffffff, 0x28, 0x0, 0x0, 0x0, 0x18, 0x3, 0x0, 0x0, 0x5]}, @mcast2={0x11, 0x5}}}}}}}}, 0x0) 14:27:42 executing program 1: openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='fd/3\x00') 14:27:42 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(r0, &(0x7f00000010c0)=[{{}, 0x0, 0x100000001}], 0xab) 14:27:42 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000017c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="baa100b000eef36cba2100ec66b9800000c00f326635001000000f30bad104ecc80080d267d9f8f30f1bb429000f20c06635200000000f22c067f3af", 0x3c}], 0x1, 0x0, 0x0, 0xfffffffffffffd70) ioctl$DRM_IOCTL_MODE_GETCRTC(0xffffffffffffffff, 0xc06864a1, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "0c9a4e7eb2faf017a20853e1a15c6368dc756b73f05458293c785a18c6e5388d"}}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000000000/0x1000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 14:27:42 executing program 4: syz_emit_ethernet(0x66, &(0x7f0000000080)={@link_local, @link_local={0x1, 0x80, 0xc2, 0x689, 0x3}, [], {@ipv6={0x86dd, {0x0, 0x6, 'v`Q', 0x30, 0x0, 0x0, @remote={0xfe, 0x80, [0x3, 0x543, 0x700, 0x5, 0x50000000000000d, 0x8848000000f0ffff], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [0x0, 0xfffffffffffff000]}, {[], @icmpv6=@dest_unreach={0xffffff86, 0x0, 0x0, 0x0, [0x7, 0xffffca88], {0x0, 0x6, "c5961e", 0x0, 0x0, 0x0, @mcast1={0x5, 0x4, [0x0, 0x80ffffff, 0x28, 0x0, 0x0, 0x0, 0x18, 0x3, 0x0, 0x0, 0x5]}, @mcast2={0x11, 0x5}}}}}}}}, 0x0) 14:27:42 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)={0x2, 0x15, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, [@sadb_x_filter={0x5, 0x1a, @in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, @in6=@local}, @sadb_x_filter={0x5, 0x1a, @in6=@loopback, @in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}}]}, 0x60}}, 0x0) 14:27:42 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(r0, &(0x7f00000010c0)=[{{}, 0x0, 0x100000001}], 0xab) 14:27:42 executing program 1: openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='fd/3\x00') 14:27:42 executing program 4: syz_emit_ethernet(0x66, &(0x7f0000000080)={@link_local, @link_local={0x1, 0x80, 0xc2, 0x689, 0x3}, [], {@ipv6={0x86dd, {0x0, 0x6, 'v`Q', 0x30, 0x0, 0x0, @remote={0xfe, 0x80, [0x3, 0x543, 0x700, 0x5, 0x50000000000000d, 0x8848000000f0ffff], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [0x0, 0xfffffffffffff000]}, {[], @icmpv6=@dest_unreach={0xffffff86, 0x0, 0x0, 0x0, [0x7, 0xffffca88], {0x0, 0x6, "c5961e", 0x0, 0x0, 0x0, @mcast1={0x5, 0x4, [0x0, 0x80ffffff, 0x28, 0x0, 0x0, 0x0, 0x18, 0x3, 0x0, 0x0, 0x5]}, @mcast2={0x11, 0x5}}}}}}}}, 0x0) 14:27:43 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000017c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="baa100b000eef36cba2100ec66b9800000c00f326635001000000f30bad104ecc80080d267d9f8f30f1bb429000f20c06635200000000f22c067f3af", 0x3c}], 0x1, 0x0, 0x0, 0xfffffffffffffd70) ioctl$DRM_IOCTL_MODE_GETCRTC(0xffffffffffffffff, 0xc06864a1, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "0c9a4e7eb2faf017a20853e1a15c6368dc756b73f05458293c785a18c6e5388d"}}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000000000/0x1000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 14:27:43 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_NET_SET_BACKEND(r0, 0x8008af26, &(0x7f0000000080)) 14:27:43 executing program 1: openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='fd/3\x00') 14:27:43 executing program 3: r0 = socket$can_raw(0x1d, 0x3, 0x1) setsockopt(r0, 0x65, 0x10000000005, &(0x7f0000000000)="e1affde3", 0x4) 14:27:43 executing program 4: clock_gettime(0x2, &(0x7f0000000080)) 14:27:43 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_group_source_req(r0, 0x0, 0x13, &(0x7f0000000000)={0x0, {{0x2, 0x0, @multicast2}}, {{0x2, 0x0, @multicast2}}}, 0x108) 14:27:43 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_group_source_req(r0, 0x0, 0x13, &(0x7f0000000000)={0x0, {{0x2, 0x0, @multicast2}}, {{0x2, 0x0, @multicast2}}}, 0x108) 14:27:43 executing program 4: clock_gettime(0x2, &(0x7f0000000080)) 14:27:43 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_NET_SET_BACKEND(r0, 0x8008af26, &(0x7f0000000080)) 14:27:43 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0xfffffcbe) 14:27:43 executing program 4: clock_gettime(0x2, &(0x7f0000000080)) 14:27:43 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_NET_SET_BACKEND(r0, 0x8008af26, &(0x7f0000000080)) [ 405.588915][ T994] device bridge_slave_1 left promiscuous mode [ 405.596995][ T994] bridge0: port 2(bridge_slave_1) entered disabled state [ 405.629725][ T994] device bridge_slave_0 left promiscuous mode [ 405.635999][ T994] bridge0: port 1(bridge_slave_0) entered disabled state 14:27:44 executing program 4: clock_gettime(0x2, &(0x7f0000000080)) 14:27:44 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_group_source_req(r0, 0x0, 0x13, &(0x7f0000000000)={0x0, {{0x2, 0x0, @multicast2}}, {{0x2, 0x0, @multicast2}}}, 0x108) 14:27:44 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_NET_SET_BACKEND(r0, 0x8008af26, &(0x7f0000000080)) [ 406.538713][ T994] device hsr_slave_0 left promiscuous mode [ 406.598559][ T994] device hsr_slave_1 left promiscuous mode [ 406.663787][ T994] team0 (unregistering): Port device team_slave_1 removed [ 406.673841][ T994] team0 (unregistering): Port device team_slave_0 removed [ 406.683442][ T994] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 406.731333][ T994] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 406.805895][ T994] bond0 (unregistering): Released all slaves 14:27:45 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000280)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x3f, 0x0, "9f11ebcd0bf1474bb0954572c05b609c9d1c109d76a2c8d72747b2efce0db5948594ddd4a3b3dffbc73aedc4e460f3d4d0b4b164473122804ccc4a017a3d5bf06d81ee4c7aae0ce430974dc836f33bc4"}, 0xd8) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000000)={@in6={{0xa, 0x0, 0x0, @local}}, 0x0, 0x1, 0x0, "af4a74343e8863b752699f0c2fa03b07f287fb3459b9a5a0c1787e92c3960017da997cbbf2df1acb18647e36cf2654d62af975f467a4302aae97f1d95cbb3ad1689aea5ba230bbfdc4abdb7453021fcc"}, 0xd8) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000180)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x0, "177f19352f6e4a025dc11b548c3a8fc085992b5bb8119c632b9c2d2a1d6d235105c53bd02065fd18715ada8437d4cc16f82a8bd54f0487ababab8b64afe95d93ddca5eb9b005755c8b2552d6b022d6c7"}, 0xd8) 14:27:45 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0xfffffcbe) 14:27:45 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$inet6_udp_int(r0, 0x11, 0x1, 0x0, &(0x7f0000000040)) 14:27:45 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x3, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61128c000000000061134c0000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000560600000fff07004506000002000000170600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) 14:27:45 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_group_source_req(r0, 0x0, 0x13, &(0x7f0000000000)={0x0, {{0x2, 0x0, @multicast2}}, {{0x2, 0x0, @multicast2}}}, 0x108) 14:27:45 executing program 0: socket(0x28, 0x0, 0x800000028) 14:27:45 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$inet6_udp_int(r0, 0x11, 0x1, 0x0, &(0x7f0000000040)) 14:27:45 executing program 1: r0 = socket(0x10, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) recvmsg(r0, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) sendmsg$nl_route(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f00000002c0)=ANY=[@ANYBLOB="200000001e00210f000000000000000007000000", @ANYRES32=0x0, @ANYBLOB="5b79f4e3f72a7474"], 0x20}}, 0x0) 14:27:45 executing program 0: socket(0x28, 0x0, 0x800000028) 14:27:46 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$inet6_udp_int(r0, 0x11, 0x1, 0x0, &(0x7f0000000040)) 14:27:46 executing program 0: socket(0x28, 0x0, 0x800000028) [ 407.739250][T16811] WARNING: CPU: 0 PID: 16811 at kernel/bpf/core.c:851 bpf_jit_free+0x1a8/0x1f0 [ 407.739800][ T3906] kobject: 'loop2' (0000000088a45b15): kobject_uevent_env [ 407.748336][T16811] Kernel panic - not syncing: panic_on_warn set ... [ 407.748347][T16811] CPU: 0 PID: 16811 Comm: kworker/0:16 Not tainted 5.3.0-rc4+ #80 [ 407.748351][T16811] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 407.748361][T16811] Workqueue: events bpf_prog_free_deferred [ 407.748366][T16811] Call Trace: 14:27:46 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x3, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61128c000000000061134c0000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000560600000fff07004506000002000000170600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) [ 407.748436][T16811] dump_stack+0x1d8/0x2f8 [ 407.748467][T16811] panic+0x25c/0x799 [ 407.764901][ T3906] kobject: 'loop2' (0000000088a45b15): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 407.770091][T16811] ? __warn+0x126/0x230 [ 407.770102][T16811] __warn+0x22f/0x230 [ 407.770110][T16811] ? bpf_jit_free+0x1a8/0x1f0 [ 407.770120][T16811] report_bug+0x190/0x290 [ 407.770135][T16811] BUG: unable to handle page fault for address: fffffbfff4002000 [ 407.770139][T16811] #PF: supervisor read access in kernel mode [ 407.770144][T16811] #PF: error_code(0x0000) - not-present page [ 407.770147][T16811] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD 8ff88067 PTE 0 [ 407.770164][T16811] Oops: 0000 [#1] PREEMPT SMP KASAN [ 407.770172][T16811] CPU: 0 PID: 16811 Comm: kworker/0:16 Not tainted 5.3.0-rc4+ #80 [ 407.770176][T16811] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 407.770187][T16811] Workqueue: events bpf_prog_free_deferred [ 407.789545][ T3906] kobject: 'loop0' (000000005b46ecad): kobject_uevent_env [ 407.789570][ T3906] kobject: 'loop0' (000000005b46ecad): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 407.793915][T16811] RIP: 0010:is_bpf_text_address+0x201/0x3b0 [ 407.793924][T16811] Code: 85 c4 f5 ff 4d 39 f4 76 10 e8 7b c2 f5 ff 49 83 c7 10 eb 46 0f 1f 44 00 00 4c 89 e0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <0f> b6 04 08 84 c0 75 7d 41 8b 1c 24 48 c1 e3 0c 4c 01 e3 48 89 df [ 407.793929][T16811] RSP: 0018:ffff88805f9ff828 EFLAGS: 00010806 [ 407.793936][T16811] RAX: 1ffffffff4002000 RBX: 0000000000000001 RCX: dffffc0000000000 [ 407.793941][T16811] RDX: ffff8880965b4380 RSI: ffffffffff7a5700 RDI: ffffffffa0010000 [ 407.793948][T16811] RBP: ffff88805f9ff860 R08: ffffffff817dc0cb R09: 0000000000000001 [ 407.818322][ T3906] kobject: 'loop4' (000000004aaf7628): kobject_uevent_env [ 407.821003][T16811] R10: fffffbfff117be5d R11: 0000000000000000 R12: ffffffffa0010000 [ 407.821007][T16811] R13: 0000000000000000 R14: ffffffffff7a5700 R15: ffff88808aa18578 [ 407.821014][T16811] FS: 0000000000000000(0000) GS:ffff8880aea00000(0000) knlGS:0000000000000000 [ 407.821019][T16811] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 407.821023][T16811] CR2: fffffbfff4002000 CR3: 0000000091caa000 CR4: 00000000001406f0 [ 407.821031][T16811] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 407.821035][T16811] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 407.821038][T16811] Call Trace: [ 407.821057][T16811] BUG: unable to handle page fault for address: fffffbfff4002000 [ 407.821061][T16811] #PF: supervisor read access in kernel mode [ 407.821064][T16811] #PF: error_code(0x0000) - not-present page [ 407.821070][T16811] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD 8ff88067 PTE 0 [ 407.825559][ T3906] kobject: 'loop4' (000000004aaf7628): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 407.833177][T16811] Oops: 0000 [#2] PREEMPT SMP KASAN [ 407.833186][T16811] CPU: 0 PID: 16811 Comm: kworker/0:16 Not tainted 5.3.0-rc4+ #80 [ 407.833190][T16811] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 407.833202][T16811] Workqueue: events bpf_prog_free_deferred [ 407.833215][T16811] RIP: 0010:is_bpf_text_address+0x201/0x3b0 [ 407.833222][T16811] Code: 85 c4 f5 ff 4d 39 f4 76 10 e8 7b c2 f5 ff 49 83 c7 10 eb 46 0f 1f 44 00 00 4c 89 e0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <0f> b6 04 08 84 c0 75 7d 41 8b 1c 24 48 c1 e3 0c 4c 01 e3 48 89 df [ 407.833226][T16811] RSP: 0018:ffff88805f9ff450 EFLAGS: 00010806 [ 407.833233][T16811] RAX: 1ffffffff4002000 RBX: 0000000000000001 RCX: dffffc0000000000 [ 407.833237][T16811] RDX: ffff8880965b4380 RSI: ffffffffff7a5700 RDI: ffffffffa0010000 [ 407.833242][T16811] RBP: ffff88805f9ff488 R08: ffffffff817dc0cb R09: 0000000000000001 [ 407.833246][T16811] R10: fffffbfff117be5d R11: 0000000000000000 R12: ffffffffa0010000 [ 407.833251][T16811] R13: 0000000000000000 R14: ffffffffff7a5700 R15: ffff88808aa18578 [ 407.833258][T16811] FS: 0000000000000000(0000) GS:ffff8880aea00000(0000) knlGS:0000000000000000 [ 407.833263][T16811] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 407.833271][T16811] CR2: fffffbfff4002000 CR3: 0000000091caa000 CR4: 00000000001406f0 [ 407.901661][ T3906] kobject: 'loop5' (0000000026336fc4): kobject_uevent_env [ 407.904774][T16811] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 407.917149][ T3906] kobject: 'loop5' (0000000026336fc4): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 407.931131][T16811] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 407.931135][T16811] Call Trace: [ 407.931160][T16811] BUG: unable to handle page fault for address: fffffbfff4002000 [ 407.931163][T16811] #PF: supervisor read access in kernel mode [ 407.931167][T16811] #PF: error_code(0x0000) - not-present page [ 407.931170][T16811] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD 8ff88067 PTE 0 [ 407.931185][T16811] Oops: 0000 [#3] PREEMPT SMP KASAN [ 407.931196][T16811] CPU: 0 PID: 16811 Comm: kworker/0:16 Not tainted 5.3.0-rc4+ #80 [ 407.949584][ T3906] kobject: 'loop2' (0000000088a45b15): kobject_uevent_env [ 407.953632][T16811] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 407.953646][T16811] Workqueue: events bpf_prog_free_deferred [ 407.953661][T16811] RIP: 0010:is_bpf_text_address+0x201/0x3b0 [ 407.953668][T16811] Code: 85 c4 f5 ff 4d 39 f4 76 10 e8 7b c2 f5 ff 49 83 c7 10 eb 46 0f 1f 44 00 00 4c 89 e0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <0f> b6 04 08 84 c0 75 7d 41 8b 1c 24 48 c1 e3 0c 4c 01 e3 48 89 df [ 407.953676][T16811] RSP: 0018:ffff88805f9ff080 EFLAGS: 00010806 [ 407.972622][ T3906] kobject: 'loop2' (0000000088a45b15): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 407.976919][T16811] RAX: 1ffffffff4002000 RBX: 0000000000000001 RCX: dffffc0000000000 [ 407.976924][T16811] RDX: ffff8880965b4380 RSI: ffffffffff7a5700 RDI: ffffffffa0010000 [ 407.976929][T16811] RBP: ffff88805f9ff0b8 R08: ffffffff817dc0cb R09: 0000000000000001 [ 407.976934][T16811] R10: fffffbfff117be5d R11: 0000000000000000 R12: ffffffffa0010000 [ 407.976939][T16811] R13: 0000000000000000 R14: ffffffffff7a5700 R15: ffff88808aa18578 [ 407.976946][T16811] FS: 0000000000000000(0000) GS:ffff8880aea00000(0000) knlGS:0000000000000000 [ 407.976952][T16811] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 407.976956][T16811] CR2: fffffbfff4002000 CR3: 0000000091caa000 CR4: 00000000001406f0 [ 407.976965][T16811] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 408.402362][T16811] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 408.410315][T16811] Call Trace: [ 408.413603][T16811] BUG: unable to handle page fault for address: fffffbfff4002000 [ 408.421383][T16811] #PF: supervisor read access in kernel mode [ 408.427422][T16811] #PF: error_code(0x0000) - not-present page [ 408.433467][T16811] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD 8ff88067 PTE 0 [ 408.440998][T16811] Oops: 0000 [#4] PREEMPT SMP KASAN [ 408.446186][T16811] CPU: 0 PID: 16811 Comm: kworker/0:16 Not tainted 5.3.0-rc4+ #80 [ 408.453960][T16811] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 408.464003][T16811] Workqueue: events bpf_prog_free_deferred [ 408.469789][T16811] RIP: 0010:is_bpf_text_address+0x201/0x3b0 [ 408.475835][T16811] Code: 85 c4 f5 ff 4d 39 f4 76 10 e8 7b c2 f5 ff 49 83 c7 10 eb 46 0f 1f 44 00 00 4c 89 e0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <0f> b6 04 08 84 c0 75 7d 41 8b 1c 24 48 c1 e3 0c 4c 01 e3 48 89 df [ 408.495507][T16811] RSP: 0018:ffff88805f9fecb0 EFLAGS: 00010806 [ 408.501552][T16811] RAX: 1ffffffff4002000 RBX: 0000000000000001 RCX: dffffc0000000000 [ 408.509503][T16811] RDX: ffff8880965b4380 RSI: ffffffffff7a5700 RDI: ffffffffa0010000 [ 408.517474][T16811] RBP: ffff88805f9fece8 R08: ffffffff817dc0cb R09: 0000000000000001 [ 408.525512][T16811] R10: fffffbfff117be5d R11: 0000000000000000 R12: ffffffffa0010000 [ 408.533487][T16811] R13: 0000000000000000 R14: ffffffffff7a5700 R15: ffff88808aa18578 [ 408.541648][T16811] FS: 0000000000000000(0000) GS:ffff8880aea00000(0000) knlGS:0000000000000000 [ 408.550555][T16811] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 408.557114][T16811] CR2: fffffbfff4002000 CR3: 0000000091caa000 CR4: 00000000001406f0 [ 408.565065][T16811] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 408.573015][T16811] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 408.580971][T16811] Call Trace: [ 408.584294][T16811] BUG: unable to handle page fault for address: fffffbfff4002000 [ 408.591988][T16811] #PF: supervisor read access in kernel mode [ 408.597946][T16811] #PF: error_code(0x0000) - not-present page [ 408.604000][T16811] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD 8ff88067 PTE 0 [ 408.611612][T16811] Oops: 0000 [#5] PREEMPT SMP KASAN [ 408.616875][T16811] CPU: 0 PID: 16811 Comm: kworker/0:16 Not tainted 5.3.0-rc4+ #80 [ 408.624653][T16811] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 408.634784][T16811] Workqueue: events bpf_prog_free_deferred [ 408.640571][T16811] RIP: 0010:is_bpf_text_address+0x201/0x3b0 [ 408.646438][T16811] Code: 85 c4 f5 ff 4d 39 f4 76 10 e8 7b c2 f5 ff 49 83 c7 10 eb 46 0f 1f 44 00 00 4c 89 e0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <0f> b6 04 08 84 c0 75 7d 41 8b 1c 24 48 c1 e3 0c 4c 01 e3 48 89 df [ 408.666021][T16811] RSP: 0018:ffff88805f9fe8e0 EFLAGS: 00010806 [ 408.672080][T16811] RAX: 1ffffffff4002000 RBX: 0000000000000001 RCX: dffffc0000000000 [ 408.680048][T16811] RDX: ffff8880965b4380 RSI: ffffffffff7a5700 RDI: ffffffffa0010000 [ 408.688012][T16811] RBP: ffff88805f9fe918 R08: ffffffff817dc0cb R09: 0000000000000001 [ 408.695963][T16811] R10: fffffbfff117be5d R11: 0000000000000000 R12: ffffffffa0010000 [ 408.703911][T16811] R13: 0000000000000000 R14: ffffffffff7a5700 R15: ffff88808aa18578 [ 408.711869][T16811] FS: 0000000000000000(0000) GS:ffff8880aea00000(0000) knlGS:0000000000000000 [ 408.720833][T16811] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 408.727408][T16811] CR2: fffffbfff4002000 CR3: 0000000091caa000 CR4: 00000000001406f0 [ 408.735535][T16811] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 408.743576][T16811] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 408.751589][T16811] Call Trace: [ 408.754868][T16811] BUG: unable to handle page fault for address: fffffbfff4002000 [ 408.762557][T16811] #PF: supervisor read access in kernel mode [ 408.768511][T16811] #PF: error_code(0x0000) - not-present page [ 408.774477][T16811] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD 8ff88067 PTE 0 [ 408.782002][T16811] Oops: 0000 [#6] PREEMPT SMP KASAN [ 408.787180][T16811] CPU: 0 PID: 16811 Comm: kworker/0:16 Not tainted 5.3.0-rc4+ #80 [ 408.794951][T16811] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 408.805168][T16811] Workqueue: events bpf_prog_free_deferred [ 408.810957][T16811] RIP: 0010:is_bpf_text_address+0x201/0x3b0 [ 408.816912][T16811] Code: 85 c4 f5 ff 4d 39 f4 76 10 e8 7b c2 f5 ff 49 83 c7 10 eb 46 0f 1f 44 00 00 4c 89 e0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <0f> b6 04 08 84 c0 75 7d 41 8b 1c 24 48 c1 e3 0c 4c 01 e3 48 89 df [ 408.836681][T16811] RSP: 0018:ffff88805f9fe510 EFLAGS: 00010806 [ 408.842726][T16811] RAX: 1ffffffff4002000 RBX: 0000000000000001 RCX: dffffc0000000000 [ 408.850674][T16811] RDX: ffff8880965b4380 RSI: ffffffffff7a5700 RDI: ffffffffa0010000 [ 408.858719][T16811] RBP: ffff88805f9fe548 R08: ffffffff817dc0cb R09: 0000000000000001 [ 408.866669][T16811] R10: fffffbfff117be5d R11: 0000000000000000 R12: ffffffffa0010000 [ 408.874617][T16811] R13: 0000000000000000 R14: ffffffffff7a5700 R15: ffff88808aa18578 [ 408.882746][T16811] FS: 0000000000000000(0000) GS:ffff8880aea00000(0000) knlGS:0000000000000000 [ 408.891736][T16811] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 408.898298][T16811] CR2: fffffbfff4002000 CR3: 0000000091caa000 CR4: 00000000001406f0 [ 408.906358][T16811] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 408.914397][T16811] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 408.922396][T16811] Call Trace: [ 408.925767][T16811] BUG: unable to handle page fault for address: fffffbfff4002000 [ 408.933489][T16811] #PF: supervisor read access in kernel mode [ 408.939447][T16811] #PF: error_code(0x0000) - not-present page [ 408.945399][T16811] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD 8ff88067 PTE 0 [ 408.952924][T16811] Oops: 0000 [#7] PREEMPT SMP KASAN [ 408.958099][T16811] CPU: 0 PID: 16811 Comm: kworker/0:16 Not tainted 5.3.0-rc4+ #80 [ 408.965870][T16811] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 408.976201][T16811] Workqueue: events bpf_prog_free_deferred [ 408.981990][T16811] RIP: 0010:is_bpf_text_address+0x201/0x3b0 [ 408.987875][T16811] Code: 85 c4 f5 ff 4d 39 f4 76 10 e8 7b c2 f5 ff 49 83 c7 10 eb 46 0f 1f 44 00 00 4c 89 e0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <0f> b6 04 08 84 c0 75 7d 41 8b 1c 24 48 c1 e3 0c 4c 01 e3 48 89 df [ 409.007679][T16811] RSP: 0018:ffff88805f9fe140 EFLAGS: 00010806 [ 409.013734][T16811] RAX: 1ffffffff4002000 RBX: 0000000000000001 RCX: dffffc0000000000 [ 409.021690][T16811] RDX: ffff8880965b4380 RSI: ffffffffff7a5700 RDI: ffffffffa0010000 [ 409.029725][T16811] RBP: ffff88805f9fe178 R08: ffffffff817dc0cb R09: 0000000000000001 [ 409.037678][T16811] R10: fffffbfff117be5d R11: 0000000000000000 R12: ffffffffa0010000 [ 409.045713][T16811] R13: 0000000000000000 R14: ffffffffff7a5700 R15: ffff88808aa18578 [ 409.053715][T16811] FS: 0000000000000000(0000) GS:ffff8880aea00000(0000) knlGS:0000000000000000 [ 409.062646][T16811] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 409.069217][T16811] CR2: fffffbfff4002000 CR3: 0000000091caa000 CR4: 00000000001406f0 [ 409.077324][T16811] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 409.085830][T16811] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 409.093778][T16811] Call Trace: [ 409.097146][T16811] BUG: unable to handle page fault for address: fffffbfff4002000 [ 409.104961][T16811] #PF: supervisor read access in kernel mode [ 409.110925][T16811] #PF: error_code(0x0000) - not-present page [ 409.116877][T16811] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD 8ff88067 PTE 0 [ 409.124488][T16811] Oops: 0000 [#8] PREEMPT SMP KASAN [ 409.129662][T16811] CPU: 0 PID: 16811 Comm: kworker/0:16 Not tainted 5.3.0-rc4+ #80 [ 409.137457][T16811] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 409.147501][T16811] Workqueue: events bpf_prog_free_deferred [ 409.153287][T16811] RIP: 0010:is_bpf_text_address+0x201/0x3b0 [ 409.159154][T16811] Code: 85 c4 f5 ff 4d 39 f4 76 10 e8 7b c2 f5 ff 49 83 c7 10 eb 46 0f 1f 44 00 00 4c 89 e0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <0f> b6 04 08 84 c0 75 7d 41 8b 1c 24 48 c1 e3 0c 4c 01 e3 48 89 df [ 409.178734][T16811] RSP: 0018:ffff88805f9fdd70 EFLAGS: 00010806 [ 409.184774][T16811] RAX: 1ffffffff4002000 RBX: 0000000000000001 RCX: dffffc0000000000 [ 409.192721][T16811] RDX: ffff8880965b4380 RSI: ffffffffff7a5700 RDI: ffffffffa0010000 [ 409.200829][T16811] RBP: ffff88805f9fdda8 R08: ffffffff817dc0cb R09: 0000000000000001 [ 409.208867][T16811] R10: fffffbfff117be5d R11: 0000000000000000 R12: ffffffffa0010000 [ 409.216817][T16811] R13: 0000000000000000 R14: ffffffffff7a5700 R15: ffff88808aa18578 [ 409.224769][T16811] FS: 0000000000000000(0000) GS:ffff8880aea00000(0000) knlGS:0000000000000000 [ 409.233949][T16811] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 409.240598][T16811] CR2: fffffbfff4002000 CR3: 0000000091caa000 CR4: 00000000001406f0 [ 409.248548][T16811] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 409.256494][T16811] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 409.264444][T16811] Call Trace: [ 409.267721][T16811] BUG: unable to handle page fault for address: fffffbfff4002000 [ 409.275407][T16811] #PF: supervisor read access in kernel mode [ 409.281364][T16811] #PF: error_code(0x0000) - not-present page [ 409.287315][T16811] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD 8ff88067 PTE 0 [ 409.294832][T16811] Oops: 0000 [#9] PREEMPT SMP KASAN [ 409.300051][T16811] CPU: 0 PID: 16811 Comm: kworker/0:16 Not tainted 5.3.0-rc4+ #80 [ 409.307825][T16811] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 409.317875][T16811] Workqueue: events bpf_prog_free_deferred [ 409.323671][T16811] RIP: 0010:is_bpf_text_address+0x201/0x3b0 [ 409.329635][T16811] Code: 85 c4 f5 ff 4d 39 f4 76 10 e8 7b c2 f5 ff 49 83 c7 10 eb 46 0f 1f 44 00 00 4c 89 e0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <0f> b6 04 08 84 c0 75 7d 41 8b 1c 24 48 c1 e3 0c 4c 01 e3 48 89 df [ 409.349487][T16811] RSP: 0018:ffff88805f9fd9a0 EFLAGS: 00010806 [ 409.355616][T16811] RAX: 1ffffffff4002000 RBX: 0000000000000001 RCX: dffffc0000000000 [ 409.363743][T16811] RDX: ffff8880965b4380 RSI: ffffffffff7a5700 RDI: ffffffffa0010000 [ 409.371781][T16811] RBP: ffff88805f9fd9d8 R08: ffffffff817dc0cb R09: 0000000000000001 [ 409.379819][T16811] R10: fffffbfff117be5d R11: 0000000000000000 R12: ffffffffa0010000 [ 409.387771][T16811] R13: 0000000000000000 R14: ffffffffff7a5700 R15: ffff88808aa18578 [ 409.395864][T16811] FS: 0000000000000000(0000) GS:ffff8880aea00000(0000) knlGS:0000000000000000 [ 409.404770][T16811] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 409.411332][T16811] CR2: fffffbfff4002000 CR3: 0000000091caa000 CR4: 00000000001406f0 [ 409.419283][T16811] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 409.427232][T16811] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 409.435181][T16811] Call Trace: [ 409.438548][T16811] BUG: unable to handle page fault for address: fffffbfff4002000 [ 409.446238][T16811] #PF: supervisor read access in kernel mode [ 409.452191][T16811] #PF: error_code(0x0000) - not-present page [ 409.458145][T16811] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD 8ff88067 PTE 0 [ 409.465682][T16811] Oops: 0000 [#10] PREEMPT SMP KASAN [ 409.470945][T16811] CPU: 0 PID: 16811 Comm: kworker/0:16 Not tainted 5.3.0-rc4+ #80 [ 409.478717][T16811] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 409.488763][T16811] Workqueue: events bpf_prog_free_deferred [ 409.494721][T16811] RIP: 0010:is_bpf_text_address+0x201/0x3b0 [ 409.500589][T16811] Code: 85 c4 f5 ff 4d 39 f4 76 10 e8 7b c2 f5 ff 49 83 c7 10 eb 46 0f 1f 44 00 00 4c 89 e0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <0f> b6 04 08 84 c0 75 7d 41 8b 1c 24 48 c1 e3 0c 4c 01 e3 48 89 df [ 409.520370][T16811] RSP: 0018:ffff88805f9fd5d0 EFLAGS: 00010806 [ 409.526526][T16811] RAX: 1ffffffff4002000 RBX: 0000000000000001 RCX: dffffc0000000000 [ 409.534478][T16811] RDX: ffff8880965b4380 RSI: ffffffffff7a5700 RDI: ffffffffa0010000 [ 409.542434][T16811] RBP: ffff88805f9fd608 R08: ffffffff817dc0cb R09: 0000000000000001 [ 409.550484][T16811] R10: fffffbfff117be5d R11: 0000000000000000 R12: ffffffffa0010000 [ 409.558696][T16811] R13: 0000000000000000 R14: ffffffffff7a5700 R15: ffff88808aa18578 [ 409.566733][T16811] FS: 0000000000000000(0000) GS:ffff8880aea00000(0000) knlGS:0000000000000000 [ 409.575650][T16811] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 409.582300][T16811] CR2: fffffbfff4002000 CR3: 0000000091caa000 CR4: 00000000001406f0 [ 409.590261][T16811] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 409.598220][T16811] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 409.606185][T16811] Call Trace: [ 409.609463][T16811] BUG: unable to handle page fault for address: fffffbfff4002000 [ 409.617237][T16811] #PF: supervisor read access in kernel mode [ 409.623192][T16811] #PF: error_code(0x0000) - not-present page [ 409.629145][T16811] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD 8ff88067 PTE 0 [ 409.636676][T16811] Oops: 0000 [#11] PREEMPT SMP KASAN [ 409.641940][T16811] CPU: 0 PID: 16811 Comm: kworker/0:16 Not tainted 5.3.0-rc4+ #80 [ 409.649721][T16811] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 409.659852][T16811] Workqueue: events bpf_prog_free_deferred [ 409.665635][T16811] RIP: 0010:is_bpf_text_address+0x201/0x3b0 [ 409.671503][T16811] Code: 85 c4 f5 ff 4d 39 f4 76 10 e8 7b c2 f5 ff 49 83 c7 10 eb 46 0f 1f 44 00 00 4c 89 e0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <0f> b6 04 08 84 c0 75 7d 41 8b 1c 24 48 c1 e3 0c 4c 01 e3 48 89 df [ 409.691254][T16811] RSP: 0018:ffff88805f9fd200 EFLAGS: 00010806 [ 409.697292][T16811] RAX: 1ffffffff4002000 RBX: 0000000000000001 RCX: dffffc0000000000 [ 409.705240][T16811] RDX: ffff8880965b4380 RSI: ffffffffff7a5700 RDI: ffffffffa0010000 [ 409.713187][T16811] RBP: ffff88805f9fd238 R08: ffffffff817dc0cb R09: 0000000000000001 [ 409.721134][T16811] R10: fffffbfff117be5d R11: 0000000000000000 R12: ffffffffa0010000 [ 409.729086][T16811] R13: 0000000000000000 R14: ffffffffff7a5700 R15: ffff88808aa18578 [ 409.737036][T16811] FS: 0000000000000000(0000) GS:ffff8880aea00000(0000) knlGS:0000000000000000 [ 409.745942][T16811] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 409.752526][T16811] CR2: fffffbfff4002000 CR3: 0000000091caa000 CR4: 00000000001406f0 [ 409.760786][T16811] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 409.768736][T16811] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 409.776682][T16811] Call Trace: [ 409.779971][T16811] BUG: unable to handle page fault for address: fffffbfff4002000 [ 409.787722][T16811] #PF: supervisor read access in kernel mode [ 409.793674][T16811] #PF: error_code(0x0000) - not-present page [ 409.799627][T16811] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD 8ff88067 PTE 0 [ 409.807238][T16811] Oops: 0000 [#12] PREEMPT SMP KASAN [ 409.812500][T16811] CPU: 0 PID: 16811 Comm: kworker/0:16 Not tainted 5.3.0-rc4+ #80 [ 409.820278][T16811] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 409.830834][T16811] Workqueue: events bpf_prog_free_deferred [ 409.836761][T16811] RIP: 0010:is_bpf_text_address+0x201/0x3b0 [ 409.842633][T16811] Code: 85 c4 f5 ff 4d 39 f4 76 10 e8 7b c2 f5 ff 49 83 c7 10 eb 46 0f 1f 44 00 00 4c 89 e0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <0f> b6 04 08 84 c0 75 7d 41 8b 1c 24 48 c1 e3 0c 4c 01 e3 48 89 df [ 409.862217][T16811] RSP: 0018:ffff88805f9fce30 EFLAGS: 00010806 [ 409.868258][T16811] RAX: 1ffffffff4002000 RBX: 0000000000000001 RCX: dffffc0000000000 [ 409.876205][T16811] RDX: ffff8880965b4380 RSI: ffffffffff7a5700 RDI: ffffffffa0010000 [ 409.884329][T16811] RBP: ffff88805f9fce68 R08: ffffffff817dc0cb R09: 0000000000000001 [ 409.892372][T16811] R10: fffffbfff117be5d R11: 0000000000000000 R12: ffffffffa0010000 [ 409.900331][T16811] R13: 0000000000000000 R14: ffffffffff7a5700 R15: ffff88808aa18578 [ 409.908285][T16811] FS: 0000000000000000(0000) GS:ffff8880aea00000(0000) knlGS:0000000000000000 [ 409.917775][T16811] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 409.924340][T16811] CR2: fffffbfff4002000 CR3: 0000000091caa000 CR4: 00000000001406f0 [ 409.932294][T16811] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 409.940330][T16811] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 409.948278][T16811] Call Trace: [ 409.951564][T16811] BUG: unable to handle page fault for address: fffffbfff4002000 [ 409.959254][T16811] #PF: supervisor read access in kernel mode [ 409.965306][T16811] #PF: error_code(0x0000) - not-present page [ 409.971348][T16811] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD 8ff88067 PTE 0 [ 409.979058][T16811] Oops: 0000 [#13] PREEMPT SMP KASAN [ 409.984321][T16811] CPU: 0 PID: 16811 Comm: kworker/0:16 Not tainted 5.3.0-rc4+ #80 [ 409.992098][T16811] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 410.002229][T16811] Workqueue: events bpf_prog_free_deferred [ 410.008016][T16811] RIP: 0010:is_bpf_text_address+0x201/0x3b0 [ 410.014002][T16811] Code: 85 c4 f5 ff 4d 39 f4 76 10 e8 7b c2 f5 ff 49 83 c7 10 eb 46 0f 1f 44 00 00 4c 89 e0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <0f> b6 04 08 84 c0 75 7d 41 8b 1c 24 48 c1 e3 0c 4c 01 e3 48 89 df [ 410.033582][T16811] RSP: 0018:ffff88805f9fca60 EFLAGS: 00010806 [ 410.039623][T16811] RAX: 1ffffffff4002000 RBX: 0000000000000001 RCX: dffffc0000000000 [ 410.047754][T16811] RDX: ffff8880965b4380 RSI: ffffffffff7a5700 RDI: ffffffffa0010000 [ 410.055882][T16811] RBP: ffff88805f9fca98 R08: ffffffff817dc0cb R09: 0000000000000001 [ 410.063834][T16811] R10: fffffbfff117be5d R11: 0000000000000000 R12: ffffffffa0010000 [ 410.071783][T16811] R13: 0000000000000000 R14: ffffffffff7a5700 R15: ffff88808aa18578 [ 410.079732][T16811] FS: 0000000000000000(0000) GS:ffff8880aea00000(0000) knlGS:0000000000000000 [ 410.088637][T16811] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 410.095348][T16811] CR2: fffffbfff4002000 CR3: 0000000091caa000 CR4: 00000000001406f0 [ 410.103305][T16811] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 410.111430][T16811] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 410.119389][T16811] Call Trace: [ 410.122669][T16811] BUG: unable to handle page fault for address: fffffbfff4002000 [ 410.130369][T16811] #PF: supervisor read access in kernel mode [ 410.136494][T16811] #PF: error_code(0x0000) - not-present page [ 410.142445][T16811] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD 8ff88067 PTE 0 [ 410.149970][T16811] Oops: 0000 [#14] PREEMPT SMP KASAN [ 410.155232][T16811] CPU: 0 PID: 16811 Comm: kworker/0:16 Not tainted 5.3.0-rc4+ #80 [ 410.163155][T16811] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 410.173281][T16811] Workqueue: events bpf_prog_free_deferred [ 410.179064][T16811] RIP: 0010:is_bpf_text_address+0x201/0x3b0 [ 410.184932][T16811] Code: 85 c4 f5 ff 4d 39 f4 76 10 e8 7b c2 f5 ff 49 83 c7 10 eb 46 0f 1f 44 00 00 4c 89 e0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <0f> b6 04 08 84 c0 75 7d 41 8b 1c 24 48 c1 e3 0c 4c 01 e3 48 89 df [ 410.204530][T16811] RSP: 0018:ffff88805f9fc690 EFLAGS: 00010806 [ 410.210569][T16811] RAX: 1ffffffff4002000 RBX: 0000000000000001 RCX: dffffc0000000000 [ 410.218605][T16811] RDX: ffff8880965b4380 RSI: ffffffffff7a5700 RDI: ffffffffa0010000 [ 410.226643][T16811] RBP: ffff88805f9fc6c8 R08: ffffffff817dc0cb R09: 0000000000000001 [ 410.234692][T16811] R10: fffffbfff117be5d R11: 0000000000000000 R12: ffffffffa0010000 [ 410.242770][T16811] R13: 0000000000000000 R14: ffffffffff7a5700 R15: ffff88808aa18578 [ 410.250905][T16811] FS: 0000000000000000(0000) GS:ffff8880aea00000(0000) knlGS:0000000000000000 [ 410.259830][T16811] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 410.266395][T16811] CR2: fffffbfff4002000 CR3: 0000000091caa000 CR4: 00000000001406f0 [ 410.274352][T16811] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 410.282304][T16811] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 410.290254][T16811] Call Trace: [ 410.293532][T16811] BUG: unable to handle page fault for address: fffffbfff4002000 [ 410.301310][T16811] #PF: supervisor read access in kernel mode [ 410.307296][T16811] #PF: error_code(0x0000) - not-present page [ 410.313250][T16811] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD 8ff88067 PTE 0 [ 410.320772][T16811] Oops: 0000 [#15] PREEMPT SMP KASAN [ 410.326121][T16811] CPU: 0 PID: 16811 Comm: kworker/0:16 Not tainted 5.3.0-rc4+ #80 [ 410.333945][T16811] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 410.343985][T16811] Workqueue: events bpf_prog_free_deferred [ 410.349773][T16811] RIP: 0010:is_bpf_text_address+0x201/0x3b0 [ 410.355640][T16811] Code: 85 c4 f5 ff 4d 39 f4 76 10 e8 7b c2 f5 ff 49 83 c7 10 eb 46 0f 1f 44 00 00 4c 89 e0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <0f> b6 04 08 84 c0 75 7d 41 8b 1c 24 48 c1 e3 0c 4c 01 e3 48 89 df [ 410.375229][T16811] RSP: 0018:ffff88805f9fc2c0 EFLAGS: 00010806 [ 410.381268][T16811] RAX: 1ffffffff4002000 RBX: 0000000000000001 RCX: dffffc0000000000 [ 410.389218][T16811] RDX: ffff8880965b4380 RSI: ffffffffff7a5700 RDI: ffffffffa0010000 [ 410.397168][T16811] RBP: ffff88805f9fc2f8 R08: ffffffff817dc0cb R09: 0000000000000001 [ 410.405119][T16811] R10: fffffbfff117be5d R11: 0000000000000000 R12: ffffffffa0010000 [ 410.413069][T16811] R13: 0000000000000000 R14: ffffffffff7a5700 R15: ffff88808aa18578 [ 410.421063][T16811] FS: 0000000000000000(0000) GS:ffff8880aea00000(0000) knlGS:0000000000000000 [ 410.430058][T16811] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 410.436623][T16811] CR2: fffffbfff4002000 CR3: 0000000091caa000 CR4: 00000000001406f0 [ 410.444576][T16811] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 410.452529][T16811] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 410.460479][T16811] Call Trace: [ 410.463780][T16811] BUG: unable to handle page fault for address: fffffbfff4002000 [ 410.471473][T16811] #PF: supervisor read access in kernel mode [ 410.477426][T16811] #PF: error_code(0x0000) - not-present page [ 410.483382][T16811] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD 8ff88067 PTE 0 [ 410.490907][T16811] Oops: 0000 [#16] PREEMPT SMP KASAN [ 410.496167][T16811] CPU: 0 PID: 16811 Comm: kworker/0:16 Not tainted 5.3.0-rc4+ #80 [ 410.504031][T16811] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 410.514091][T16811] Workqueue: events bpf_prog_free_deferred [ 410.519876][T16811] RIP: 0010:is_bpf_text_address+0x201/0x3b0 [ 410.525747][T16811] Code: 85 c4 f5 ff 4d 39 f4 76 10 e8 7b c2 f5 ff 49 83 c7 10 eb 46 0f 1f 44 00 00 4c 89 e0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <0f> b6 04 08 84 c0 75 7d 41 8b 1c 24 48 c1 e3 0c 4c 01 e3 48 89 df [ 410.545350][T16811] RSP: 0018:ffff88805f9fbef0 EFLAGS: 00010806 [ 410.551392][T16811] RAX: 1ffffffff4002000 RBX: 0000000000000001 RCX: dffffc0000000000 [ 410.559347][T16811] RDX: ffff8880965b4380 RSI: ffffffffff7a5700 RDI: ffffffffa0010000 [ 410.567385][T16811] RBP: ffff88805f9fbf28 R08: ffffffff817dc0cb R09: 0000000000000001 [ 410.575337][T16811] R10: fffffbfff117be5d R11: 0000000000000000 R12: ffffffffa0010000 [ 410.583290][T16811] R13: 0000000000000000 R14: ffffffffff7a5700 R15: ffff88808aa18578 [ 410.591245][T16811] FS: 0000000000000000(0000) GS:ffff8880aea00000(0000) knlGS:0000000000000000 [ 410.600153][T16811] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 410.606714][T16811] CR2: fffffbfff4002000 CR3: 0000000091caa000 CR4: 00000000001406f0 [ 410.614667][T16811] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 410.622791][T16811] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 410.630871][T16811] Call Trace: [ 410.634148][T16811] BUG: unable to handle page fault for address: fffffbfff4002000 [ 410.641846][T16811] #PF: supervisor read access in kernel mode [ 410.647819][T16811] #PF: error_code(0x0000) - not-present page [ 410.653812][T16811] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD 8ff88067 PTE 0 [ 410.661423][T16811] Oops: 0000 [#17] PREEMPT SMP KASAN [ 410.666685][T16811] CPU: 0 PID: 16811 Comm: kworker/0:16 Not tainted 5.3.0-rc4+ #80 [ 410.674462][T16811] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 410.684586][T16811] Workqueue: events bpf_prog_free_deferred [ 410.690376][T16811] RIP: 0010:is_bpf_text_address+0x201/0x3b0 [ 410.696420][T16811] Code: 85 c4 f5 ff 4d 39 f4 76 10 e8 7b c2 f5 ff 49 83 c7 10 eb 46 0f 1f 44 00 00 4c 89 e0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <0f> b6 04 08 84 c0 75 7d 41 8b 1c 24 48 c1 e3 0c 4c 01 e3 48 89 df [ 410.716000][T16811] RSP: 0018:ffff88805f9fbb20 EFLAGS: 00010806 [ 410.722088][T16811] RAX: 1ffffffff4002000 RBX: 0000000000000001 RCX: dffffc0000000000 [ 410.730042][T16811] RDX: ffff8880965b4380 RSI: ffffffffff7a5700 RDI: ffffffffa0010000 [ 410.737991][T16811] RBP: ffff88805f9fbb58 R08: ffffffff817dc0cb R09: 0000000000000001 [ 410.745937][T16811] R10: fffffbfff117be5d R11: 0000000000000000 R12: ffffffffa0010000 [ 410.753891][T16811] R13: 0000000000000000 R14: ffffffffff7a5700 R15: ffff88808aa18578 [ 410.761845][T16811] FS: 0000000000000000(0000) GS:ffff8880aea00000(0000) knlGS:0000000000000000 [ 410.770752][T16811] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 410.777487][T16811] CR2: fffffbfff4002000 CR3: 0000000091caa000 CR4: 00000000001406f0 [ 410.785439][T16811] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 410.793398][T16811] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 410.801521][T16811] Call Trace: [ 410.804798][T16811] BUG: unable to handle page fault for address: fffffbfff4002000 [ 410.812575][T16811] #PF: supervisor read access in kernel mode [ 410.818525][T16811] #PF: error_code(0x0000) - not-present page [ 410.824478][T16811] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD 8ff88067 PTE 0 [ 410.832140][T16811] Oops: 0000 [#18] PREEMPT SMP KASAN [ 410.837399][T16811] CPU: 0 PID: 16811 Comm: kworker/0:16 Not tainted 5.3.0-rc4+ #80 [ 410.845204][T16811] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 410.855345][T16811] Workqueue: events bpf_prog_free_deferred [ 410.861130][T16811] RIP: 0010:is_bpf_text_address+0x201/0x3b0 [ 410.866998][T16811] Code: 85 c4 f5 ff 4d 39 f4 76 10 e8 7b c2 f5 ff 49 83 c7 10 eb 46 0f 1f 44 00 00 4c 89 e0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <0f> b6 04 08 84 c0 75 7d 41 8b 1c 24 48 c1 e3 0c 4c 01 e3 48 89 df [ 410.886783][T16811] RSP: 0018:ffff88805f9fb750 EFLAGS: 00010806 [ 410.892821][T16811] RAX: 1ffffffff4002000 RBX: 0000000000000001 RCX: dffffc0000000000 [ 410.900768][T16811] RDX: ffff8880965b4380 RSI: ffffffffff7a5700 RDI: ffffffffa0010000 [ 410.908718][T16811] RBP: ffff88805f9fb788 R08: ffffffff817dc0cb R09: 0000000000000001 [ 410.916756][T16811] R10: fffffbfff117be5d R11: 0000000000000000 R12: ffffffffa0010000 [ 410.924714][T16811] R13: 0000000000000000 R14: ffffffffff7a5700 R15: ffff88808aa18578 [ 410.932661][T16811] FS: 0000000000000000(0000) GS:ffff8880aea00000(0000) knlGS:0000000000000000 [ 410.941568][T16811] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 410.948138][T16811] CR2: fffffbfff4002000 CR3: 0000000091caa000 CR4: 00000000001406f0 [ 410.956088][T16811] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 410.964129][T16811] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 410.972077][T16811] Call Trace: [ 410.975356][T16811] BUG: unable to handle page fault for address: fffffbfff4002000 [ 410.983046][T16811] #PF: supervisor read access in kernel mode [ 410.988998][T16811] #PF: error_code(0x0000) - not-present page [ 410.994966][T16811] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD 8ff88067 PTE 0 [ 411.002491][T16811] Oops: 0000 [#19] PREEMPT SMP KASAN [ 411.007768][T16811] CPU: 0 PID: 16811 Comm: kworker/0:16 Not tainted 5.3.0-rc4+ #80 [ 411.015540][T16811] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 411.025583][T16811] Workqueue: events bpf_prog_free_deferred [ 411.031366][T16811] RIP: 0010:is_bpf_text_address+0x201/0x3b0 [ 411.037323][T16811] Code: 85 c4 f5 ff 4d 39 f4 76 10 e8 7b c2 f5 ff 49 83 c7 10 eb 46 0f 1f 44 00 00 4c 89 e0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <0f> b6 04 08 84 c0 75 7d 41 8b 1c 24 48 c1 e3 0c 4c 01 e3 48 89 df [ 411.057081][T16811] RSP: 0018:ffff88805f9fb380 EFLAGS: 00010806 [ 411.063129][T16811] RAX: 1ffffffff4002000 RBX: 0000000000000001 RCX: dffffc0000000000 [ 411.071168][T16811] RDX: ffff8880965b4380 RSI: ffffffffff7a5700 RDI: ffffffffa0010000 [ 411.079118][T16811] RBP: ffff88805f9fb3b8 R08: ffffffff817dc0cb R09: 0000000000000001 [ 411.087568][T16811] R10: fffffbfff117be5d R11: 0000000000000000 R12: ffffffffa0010000 [ 411.095520][T16811] R13: 0000000000000000 R14: ffffffffff7a5700 R15: ffff88808aa18578 [ 411.103476][T16811] FS: 0000000000000000(0000) GS:ffff8880aea00000(0000) knlGS:0000000000000000 [ 411.112469][T16811] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 411.119032][T16811] CR2: fffffbfff4002000 CR3: 0000000091caa000 CR4: 00000000001406f0 [ 411.126991][T16811] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 411.135030][T16811] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 411.142982][T16811] Call Trace: [ 411.146266][T16811] BUG: unable to handle page fault for address: fffffbfff4002000 [ 411.153955][T16811] #PF: supervisor read access in kernel mode [ 411.159905][T16811] #PF: error_code(0x0000) - not-present page [ 411.165953][T16811] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD 8ff88067 PTE 0 [ 411.173480][T16811] Oops: 0000 [#20] PREEMPT SMP KASAN [ 411.178746][T16811] CPU: 0 PID: 16811 Comm: kworker/0:16 Not tainted 5.3.0-rc4+ #80 [ 411.186524][T16811] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 411.196565][T16811] Workqueue: events bpf_prog_free_deferred [ 411.202356][T16811] RIP: 0010:is_bpf_text_address+0x201/0x3b0 [ 411.208315][T16811] Code: 85 c4 f5 ff 4d 39 f4 76 10 e8 7b c2 f5 ff 49 83 c7 10 eb 46 0f 1f 44 00 00 4c 89 e0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <0f> b6 04 08 84 c0 75 7d 41 8b 1c 24 48 c1 e3 0c 4c 01 e3 48 89 df [ 411.227899][T16811] RSP: 0018:ffff88805f9fafb0 EFLAGS: 00010806 [ 411.233943][T16811] RAX: 1ffffffff4002000 RBX: 0000000000000001 RCX: dffffc0000000000 [ 411.241893][T16811] RDX: ffff8880965b4380 RSI: ffffffffff7a5700 RDI: ffffffffa0010000 [ 411.249933][T16811] RBP: ffff88805f9fafe8 R08: ffffffff817dc0cb R09: 0000000000000001 [ 411.257886][T16811] R10: fffffbfff117be5d R11: 0000000000000000 R12: ffffffffa0010000 [ 411.265924][T16811] R13: 0000000000000000 R14: ffffffffff7a5700 R15: ffff88808aa18578 [ 411.273931][T16811] FS: 0000000000000000(0000) GS:ffff8880aea00000(0000) knlGS:0000000000000000 [ 411.282985][T16811] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 411.289592][T16811] CR2: fffffbfff4002000 CR3: 0000000091caa000 CR4: 00000000001406f0 [ 411.297546][T16811] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 411.305499][T16811] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 411.313450][T16811] Call Trace: [ 411.316732][T16811] BUG: unable to handle page fault for address: fffffbfff4002000 [ 411.324521][T16811] #PF: supervisor read access in kernel mode [ 411.330475][T16811] #PF: error_code(0x0000) - not-present page [ 411.336516][T16811] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD 8ff88067 PTE 0 [ 411.344041][T16811] Oops: 0000 [#21] PREEMPT SMP KASAN [ 411.349425][T16811] CPU: 0 PID: 16811 Comm: kworker/0:16 Not tainted 5.3.0-rc4+ #80 [ 411.357200][T16811] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 411.367379][T16811] Workqueue: events bpf_prog_free_deferred [ 411.373213][T16811] RIP: 0010:is_bpf_text_address+0x201/0x3b0 [ 411.379080][T16811] Code: 85 c4 f5 ff 4d 39 f4 76 10 e8 7b c2 f5 ff 49 83 c7 10 eb 46 0f 1f 44 00 00 4c 89 e0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <0f> b6 04 08 84 c0 75 7d 41 8b 1c 24 48 c1 e3 0c 4c 01 e3 48 89 df [ 411.398660][T16811] RSP: 0018:ffff88805f9fabe0 EFLAGS: 00010806 [ 411.404705][T16811] RAX: 1ffffffff4002000 RBX: 0000000000000001 RCX: dffffc0000000000 [ 411.412656][T16811] RDX: ffff8880965b4380 RSI: ffffffffff7a5700 RDI: ffffffffa0010000 [ 411.420611][T16811] RBP: ffff88805f9fac18 R08: ffffffff817dc0cb R09: 0000000000000001 [ 411.428613][T16811] R10: fffffbfff117be5d R11: 0000000000000000 R12: ffffffffa0010000 [ 411.436584][T16811] R13: 0000000000000000 R14: ffffffffff7a5700 R15: ffff88808aa18578 [ 411.444627][T16811] FS: 0000000000000000(0000) GS:ffff8880aea00000(0000) knlGS:0000000000000000 [ 411.453623][T16811] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 411.460183][T16811] CR2: fffffbfff4002000 CR3: 0000000091caa000 CR4: 00000000001406f0 [ 411.468277][T16811] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 411.476328][T16811] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 411.484415][T16811] Call Trace: [ 411.487695][T16811] BUG: unable to handle page fault for address: fffffbfff4002000 [ 411.495381][T16811] #PF: supervisor read access in kernel mode [ 411.501349][T16811] #PF: error_code(0x0000) - not-present page [ 411.507304][T16811] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD 8ff88067 PTE 0 [ 411.514912][T16811] Oops: 0000 [#22] PREEMPT SMP KASAN [ 411.520174][T16811] CPU: 0 PID: 16811 Comm: kworker/0:16 Not tainted 5.3.0-rc4+ #80 [ 411.528052][T16811] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 411.538265][T16811] Workqueue: events bpf_prog_free_deferred [ 411.544050][T16811] RIP: 0010:is_bpf_text_address+0x201/0x3b0 [ 411.549939][T16811] Code: 85 c4 f5 ff 4d 39 f4 76 10 e8 7b c2 f5 ff 49 83 c7 10 eb 46 0f 1f 44 00 00 4c 89 e0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <0f> b6 04 08 84 c0 75 7d 41 8b 1c 24 48 c1 e3 0c 4c 01 e3 48 89 df [ 411.569609][T16811] RSP: 0018:ffff88805f9fa810 EFLAGS: 00010806 [ 411.575650][T16811] RAX: 1ffffffff4002000 RBX: 0000000000000001 RCX: dffffc0000000000 [ 411.583616][T16811] RDX: ffff8880965b4380 RSI: ffffffffff7a5700 RDI: ffffffffa0010000 [ 411.591584][T16811] RBP: ffff88805f9fa848 R08: ffffffff817dc0cb R09: 0000000000000001 [ 411.599735][T16811] R10: fffffbfff117be5d R11: 0000000000000000 R12: ffffffffa0010000 [ 411.607687][T16811] R13: 0000000000000000 R14: ffffffffff7a5700 R15: ffff88808aa18578 [ 411.615639][T16811] FS: 0000000000000000(0000) GS:ffff8880aea00000(0000) knlGS:0000000000000000 [ 411.624671][T16811] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 411.631244][T16811] CR2: fffffbfff4002000 CR3: 0000000091caa000 CR4: 00000000001406f0 [ 411.639200][T16811] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 411.647235][T16811] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 411.655274][T16811] Call Trace: [ 411.658575][T16811] BUG: unable to handle page fault for address: fffffbfff4002000 [ 411.666269][T16811] #PF: supervisor read access in kernel mode [ 411.672222][T16811] #PF: error_code(0x0000) - not-present page [ 411.678173][T16811] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD 8ff88067 PTE 0 [ 411.685694][T16811] Oops: 0000 [#23] PREEMPT SMP KASAN [ 411.690952][T16811] CPU: 0 PID: 16811 Comm: kworker/0:16 Not tainted 5.3.0-rc4+ #80 [ 411.698781][T16811] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 411.708822][T16811] Workqueue: events bpf_prog_free_deferred [ 411.714607][T16811] RIP: 0010:is_bpf_text_address+0x201/0x3b0 [ 411.720473][T16811] Code: 85 c4 f5 ff 4d 39 f4 76 10 e8 7b c2 f5 ff 49 83 c7 10 eb 46 0f 1f 44 00 00 4c 89 e0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <0f> b6 04 08 84 c0 75 7d 41 8b 1c 24 48 c1 e3 0c 4c 01 e3 48 89 df [ 411.740054][T16811] RSP: 0018:ffff88805f9fa440 EFLAGS: 00010806 [ 411.746093][T16811] RAX: 1ffffffff4002000 RBX: 0000000000000001 RCX: dffffc0000000000 [ 411.754040][T16811] RDX: ffff8880965b4380 RSI: ffffffffff7a5700 RDI: ffffffffa0010000 [ 411.762032][T16811] RBP: ffff88805f9fa478 R08: ffffffff817dc0cb R09: 0000000000000001 [ 411.770071][T16811] R10: fffffbfff117be5d R11: 0000000000000000 R12: ffffffffa0010000 [ 411.778196][T16811] R13: 0000000000000000 R14: ffffffffff7a5700 R15: ffff88808aa18578 [ 411.786231][T16811] FS: 0000000000000000(0000) GS:ffff8880aea00000(0000) knlGS:0000000000000000 [ 411.795137][T16811] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 411.801827][T16811] CR2: fffffbfff4002000 CR3: 0000000091caa000 CR4: 00000000001406f0 [ 411.809787][T16811] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 411.817749][T16811] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 411.825703][T16811] Call Trace: [ 411.828980][T16811] BUG: unable to handle page fault for address: fffffbfff4002000 [ 411.836869][T16811] #PF: supervisor read access in kernel mode [ 411.842907][T16811] #PF: error_code(0x0000) - not-present page [ 411.848899][T16811] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD 8ff88067 PTE 0 [ 411.859895][T16811] Oops: 0000 [#24] PREEMPT SMP KASAN [ 411.865155][T16811] CPU: 0 PID: 16811 Comm: kworker/0:16 Not tainted 5.3.0-rc4+ #80 [ 411.872935][T16811] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 411.883194][T16811] Workqueue: events bpf_prog_free_deferred [ 411.888979][T16811] RIP: 0010:is_bpf_text_address+0x201/0x3b0 [ 411.894846][T16811] Code: 85 c4 f5 ff 4d 39 f4 76 10 e8 7b c2 f5 ff 49 83 c7 10 eb 46 0f 1f 44 00 00 4c 89 e0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <0f> b6 04 08 84 c0 75 7d 41 8b 1c 24 48 c1 e3 0c 4c 01 e3 48 89 df [ 411.915032][T16811] RSP: 0018:ffff88805f9fa070 EFLAGS: 00010806 [ 411.921077][T16811] RAX: 1ffffffff4002000 RBX: 0000000000000001 RCX: dffffc0000000000 [ 411.929070][T16811] RDX: ffff8880965b4380 RSI: ffffffffff7a5700 RDI: ffffffffa0010000 [ 411.937022][T16811] RBP: ffff88805f9fa0a8 R08: ffffffff817dc0cb R09: 0000000000000001 [ 411.944980][T16811] R10: fffffbfff117be5d R11: 0000000000000000 R12: ffffffffa0010000 [ 411.953025][T16811] R13: 0000000000000000 R14: ffffffffff7a5700 R15: ffff88808aa18578 [ 411.961070][T16811] FS: 0000000000000000(0000) GS:ffff8880aea00000(0000) knlGS:0000000000000000 [ 411.970008][T16811] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 411.976571][T16811] CR2: fffffbfff4002000 CR3: 0000000091caa000 CR4: 00000000001406f0 [ 411.984613][T16811] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 411.992652][T16811] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 412.000601][T16811] Call Trace: [ 412.003888][T16811] BUG: unable to handle page fault for address: fffffbfff4002000 [ 412.011583][T16811] #PF: supervisor read access in kernel mode [ 412.017536][T16811] #PF: error_code(0x0000) - not-present page [ 412.023531][T16811] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD 8ff88067 PTE 0 [ 412.031146][T16811] Oops: 0000 [#25] PREEMPT SMP KASAN [ 412.036409][T16811] CPU: 0 PID: 16811 Comm: kworker/0:16 Not tainted 5.3.0-rc4+ #80 [ 412.044275][T16811] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 412.054360][T16811] Workqueue: events bpf_prog_free_deferred [ 412.060151][T16811] RIP: 0010:is_bpf_text_address+0x201/0x3b0 [ 412.066022][T16811] Code: 85 c4 f5 ff 4d 39 f4 76 10 e8 7b c2 f5 ff 49 83 c7 10 eb 46 0f 1f 44 00 00 4c 89 e0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <0f> b6 04 08 84 c0 75 7d 41 8b 1c 24 48 c1 e3 0c 4c 01 e3 48 89 df [ 412.085603][T16811] RSP: 0018:ffff88805f9f9ca0 EFLAGS: 00010806 [ 412.091645][T16811] RAX: 1ffffffff4002000 RBX: 0000000000000001 RCX: dffffc0000000000 [ 412.099597][T16811] RDX: ffff8880965b4380 RSI: ffffffffff7a5700 RDI: ffffffffa0010000 [ 412.107606][T16811] RBP: ffff88805f9f9cd8 R08: ffffffff817dc0cb R09: 0000000000000001 [ 412.115556][T16811] R10: fffffbfff117be5d R11: 0000000000000000 R12: ffffffffa0010000 [ 412.123507][T16811] R13: 0000000000000000 R14: ffffffffff7a5700 R15: ffff88808aa18578 [ 412.131462][T16811] FS: 0000000000000000(0000) GS:ffff8880aea00000(0000) knlGS:0000000000000000 [ 412.140367][T16811] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 412.146925][T16811] CR2: fffffbfff4002000 CR3: 0000000091caa000 CR4: 00000000001406f0 [ 412.154895][T16811] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 412.162905][T16811] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 412.170941][T16811] Call Trace: [ 412.174312][T16811] BUG: unable to handle page fault for address: fffffbfff4002000 [ 412.182091][T16811] #PF: supervisor read access in kernel mode [ 412.188043][T16811] #PF: error_code(0x0000) - not-present page [ 412.194081][T16811] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD 8ff88067 PTE 0 [ 412.201789][T16811] Oops: 0000 [#26] PREEMPT SMP KASAN [ 412.207069][T16811] CPU: 0 PID: 16811 Comm: kworker/0:16 Not tainted 5.3.0-rc4+ #80 [ 412.214845][T16811] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 412.224884][T16811] Workqueue: events bpf_prog_free_deferred [ 412.230670][T16811] RIP: 0010:is_bpf_text_address+0x201/0x3b0 [ 412.236535][T16811] Code: 85 c4 f5 ff 4d 39 f4 76 10 e8 7b c2 f5 ff 49 83 c7 10 eb 46 0f 1f 44 00 00 4c 89 e0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <0f> b6 04 08 84 c0 75 7d 41 8b 1c 24 48 c1 e3 0c 4c 01 e3 48 89 df [ 412.256215][T16811] RSP: 0018:ffff88805f9f98d0 EFLAGS: 00010806 [ 412.262260][T16811] RAX: 1ffffffff4002000 RBX: 0000000000000001 RCX: dffffc0000000000 [ 412.270213][T16811] RDX: ffff8880965b4380 RSI: ffffffffff7a5700 RDI: ffffffffa0010000 [ 412.278160][T16811] RBP: ffff88805f9f9908 R08: ffffffff817dc0cb R09: 0000000000000001 [ 412.286107][T16811] R10: fffffbfff117be5d R11: 0000000000000000 R12: ffffffffa0010000 [ 412.294141][T16811] R13: 0000000000000000 R14: ffffffffff7a5700 R15: ffff88808aa18578 [ 412.302093][T16811] FS: 0000000000000000(0000) GS:ffff8880aea00000(0000) knlGS:0000000000000000 [ 412.310997][T16811] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 412.317731][T16811] CR2: fffffbfff4002000 CR3: 0000000091caa000 CR4: 00000000001406f0 [ 412.325681][T16811] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 412.333724][T16811] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 412.341674][T16811] Call Trace: [ 412.344954][T16811] BUG: unable to handle page fault for address: fffffbfff4002000 [ 412.352643][T16811] #PF: supervisor read access in kernel mode [ 412.358832][T16811] #PF: error_code(0x0000) - not-present page [ 412.364780][T16811] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD 8ff88067 PTE 0 [ 412.372300][T16811] Oops: 0000 [#27] PREEMPT SMP KASAN [ 412.377560][T16811] CPU: 0 PID: 16811 Comm: kworker/0:16 Not tainted 5.3.0-rc4+ #80 [ 412.385337][T16811] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 412.395501][T16811] Workqueue: events bpf_prog_free_deferred [ 412.401375][T16811] RIP: 0010:is_bpf_text_address+0x201/0x3b0 [ 412.407383][T16811] Code: 85 c4 f5 ff 4d 39 f4 76 10 e8 7b c2 f5 ff 49 83 c7 10 eb 46 0f 1f 44 00 00 4c 89 e0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <0f> b6 04 08 84 c0 75 7d 41 8b 1c 24 48 c1 e3 0c 4c 01 e3 48 89 df [ 412.426964][T16811] RSP: 0018:ffff88805f9f9500 EFLAGS: 00010806 [ 412.433006][T16811] RAX: 1ffffffff4002000 RBX: 0000000000000001 RCX: dffffc0000000000 [ 412.440950][T16811] RDX: ffff8880965b4380 RSI: ffffffffff7a5700 RDI: ffffffffa0010000 [ 412.448897][T16811] RBP: ffff88805f9f9538 R08: ffffffff817dc0cb R09: 0000000000000001 [ 412.456867][T16811] R10: fffffbfff117be5d R11: 0000000000000000 R12: ffffffffa0010000 [ 412.465019][T16811] R13: 0000000000000000 R14: ffffffffff7a5700 R15: ffff88808aa18578 [ 412.472969][T16811] FS: 0000000000000000(0000) GS:ffff8880aea00000(0000) knlGS:0000000000000000 [ 412.481964][T16811] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 412.488601][T16811] CR2: fffffbfff4002000 CR3: 0000000091caa000 CR4: 00000000001406f0 [ 412.496555][T16811] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 412.504510][T16811] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 412.512475][T16811] Call Trace: [ 412.515862][T16811] BUG: unable to handle page fault for address: fffffbfff4002000 [ 412.523638][T16811] #PF: supervisor read access in kernel mode [ 412.529589][T16811] #PF: error_code(0x0000) - not-present page [ 412.535599][T16811] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD 8ff88067 PTE 0 [ 412.543298][T16811] Oops: 0000 [#28] PREEMPT SMP KASAN [ 412.548561][T16811] CPU: 0 PID: 16811 Comm: kworker/0:16 Not tainted 5.3.0-rc4+ #80 [ 412.556335][T16811] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 412.566439][T16811] Workqueue: events bpf_prog_free_deferred [ 412.572226][T16811] RIP: 0010:is_bpf_text_address+0x201/0x3b0 [ 412.578191][T16811] Code: 85 c4 f5 ff 4d 39 f4 76 10 e8 7b c2 f5 ff 49 83 c7 10 eb 46 0f 1f 44 00 00 4c 89 e0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <0f> b6 04 08 84 c0 75 7d 41 8b 1c 24 48 c1 e3 0c 4c 01 e3 48 89 df [ 412.597778][T16811] RSP: 0018:ffff88805f9f9130 EFLAGS: 00010806 [ 412.603821][T16811] RAX: 1ffffffff4002000 RBX: 0000000000000001 RCX: dffffc0000000000 [ 412.611875][T16811] RDX: ffff8880965b4380 RSI: ffffffffff7a5700 RDI: ffffffffa0010000 [ 412.619824][T16811] RBP: ffff88805f9f9168 R08: ffffffff817dc0cb R09: 0000000000000001 [ 412.627872][T16811] R10: fffffbfff117be5d R11: 0000000000000000 R12: ffffffffa0010000 [ 412.635815][T16811] R13: 0000000000000000 R14: ffffffffff7a5700 R15: ffff88808aa18578 [ 412.643766][T16811] FS: 0000000000000000(0000) GS:ffff8880aea00000(0000) knlGS:0000000000000000 [ 412.652675][T16811] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 412.659236][T16811] CR2: fffffbfff4002000 CR3: 0000000091caa000 CR4: 00000000001406f0 [ 412.667190][T16811] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 412.675139][T16811] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 412.683087][T16811] Call Trace: [ 412.686362][T16811] BUG: unable to handle page fault for address: fffffbfff4002000 [ 412.694155][T16811] #PF: supervisor read access in kernel mode [ 412.700245][T16811] #PF: error_code(0x0000) - not-present page [ 412.706202][T16811] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD 8ff88067 PTE 0 [ 412.713724][T16811] Oops: 0000 [#29] PREEMPT SMP KASAN [ 412.718988][T16811] CPU: 0 PID: 16811 Comm: kworker/0:16 Not tainted 5.3.0-rc4+ #80 [ 412.726761][T16811] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 412.736888][T16811] Workqueue: events bpf_prog_free_deferred [ 412.742679][T16811] RIP: 0010:is_bpf_text_address+0x201/0x3b0 [ 412.748550][T16811] Code: 85 c4 f5 ff 4d 39 f4 76 10 e8 7b c2 f5 ff 49 83 c7 10 eb 46 0f 1f 44 00 00 4c 89 e0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <0f> b6 04 08 84 c0 75 7d 41 8b 1c 24 48 c1 e3 0c 4c 01 e3 48 89 df [ 412.768130][T16811] RSP: 0018:ffff88805f9f8d60 EFLAGS: 00010806 [ 412.774172][T16811] RAX: 1ffffffff4002000 RBX: 0000000000000001 RCX: dffffc0000000000 [ 412.782122][T16811] RDX: ffff8880965b4380 RSI: ffffffffff7a5700 RDI: ffffffffa0010000 [ 412.790071][T16811] RBP: ffff88805f9f8d98 R08: ffffffff817dc0cb R09: 0000000000000001 [ 412.798023][T16811] R10: fffffbfff117be5d R11: 0000000000000000 R12: ffffffffa0010000 [ 412.805972][T16811] R13: 0000000000000000 R14: ffffffffff7a5700 R15: ffff88808aa18578 [ 412.814094][T16811] FS: 0000000000000000(0000) GS:ffff8880aea00000(0000) knlGS:0000000000000000 [ 412.823105][T16811] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 412.829665][T16811] CR2: fffffbfff4002000 CR3: 0000000091caa000 CR4: 00000000001406f0 [ 412.837710][T16811] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 412.849915][T16811] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 412.857916][T16811] Call Trace: [ 412.861222][T16811] BUG: unable to handle page fault for address: fffffbfff4002000 [ 412.868912][T16811] #PF: supervisor read access in kernel mode [ 412.874871][T16811] #PF: error_code(0x0000) - not-present page [ 412.880823][T16811] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD 8ff88067 PTE 0 [ 412.888461][T16811] Oops: 0000 [#30] PREEMPT SMP KASAN [ 412.893720][T16811] CPU: 0 PID: 16811 Comm: kworker/0:16 Not tainted 5.3.0-rc4+ #80 [ 412.901626][T16811] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 412.911726][T16811] Workqueue: events bpf_prog_free_deferred [ 412.917509][T16811] RIP: 0010:is_bpf_text_address+0x201/0x3b0 [ 412.923464][T16811] Code: 85 c4 f5 ff 4d 39 f4 76 10 e8 7b c2 f5 ff 49 83 c7 10 eb 46 0f 1f 44 00 00 4c 89 e0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <0f> b6 04 08 84 c0 75 7d 41 8b 1c 24 48 c1 e3 0c 4c 01 e3 48 89 df [ 412.943284][T16811] RSP: 0018:ffff88805f9f8990 EFLAGS: 00010806 [ 412.949414][T16811] RAX: 1ffffffff4002000 RBX: 0000000000000001 RCX: dffffc0000000000 [ 412.957361][T16811] RDX: ffff8880965b4380 RSI: ffffffffff7a5700 RDI: ffffffffa0010000 [ 412.965398][T16811] RBP: ffff88805f9f89c8 R08: ffffffff817dc0cb R09: 0000000000000001 [ 412.973348][T16811] R10: fffffbfff117be5d R11: 0000000000000000 R12: ffffffffa0010000 [ 412.981387][T16811] R13: 0000000000000000 R14: ffffffffff7a5700 R15: ffff88808aa18578 [ 412.989384][T16811] FS: 0000000000000000(0000) GS:ffff8880aea00000(0000) knlGS:0000000000000000 [ 412.998286][T16811] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 413.004849][T16811] CR2: fffffbfff4002000 CR3: 0000000091caa000 CR4: 00000000001406f0 [ 413.012837][T16811] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 413.020914][T16811] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 413.028863][T16811] Call Trace: [ 413.032143][T16811] BUG: unable to handle page fault for address: fffffbfff4002000 [ 413.035098][T16811] ================================================================== [ 413.035101][T16811] BUG: KASAN: slab-out-of-bounds in format_decode+0x52/0x1850 [ 413.035104][T16811] Write of size 8 at addr ffff88805f9f7f88 by task kworker/0:16/16811 [ 413.035105][T16811] [ 413.035107][T16811] CPU: 0 PID: 16811 Comm: kworker/0:16 Not tainted 5.3.0-rc4+ #80 [ 413.035110][T16811] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 413.035112][T16811] Workqueue: events bpf_prog_free_deferred [ 413.035115][T16811] Call Trace: [ 413.035116][T16811] ? sprintf+0x71/0x90 [ 413.035118][T16811] ? msg_print_text+0x16e/0x4a0 [ 413.035120][T16811] ? __kasan_check_write+0x14/0x20 [ 413.035121][T16811] ? do_raw_spin_lock+0xea/0x2d0 [ 413.035123][T16811] ? console_unlock+0x4e4/0xef0 [ 413.035125][T16811] ? __down_trylock_console_sem+0x180/0x1b0 [ 413.035126][T16811] ? vprintk_emit+0x21c/0x3a0 [ 413.035128][T16811] ? vprintk_emit+0x239/0x3a0 [ 413.035130][T16811] ? vprintk_default+0x28/0x30 [ 413.035131][T16811] ? vprintk_func+0x158/0x170 [ 413.035133][T16811] ? printk+0x62/0x8d [ 413.035135][T16811] ? no_context+0x66d/0xc80 [ 413.035136][T16811] ? no_context+0x6e3/0xc80 [ 413.035138][T16811] ? __bad_area_nosemaphore+0x108/0x470 [ 413.035140][T16811] ? vprintk_emit+0x239/0x3a0 [ 413.035142][T16811] ? bad_area_nosemaphore+0x2d/0x40 [ 413.035143][T16811] ? __do_page_fault+0x1a4/0x1f0 [ 413.035145][T16811] ? do_page_fault+0x99/0xb0 [ 413.035146][T16811] ? page_fault+0x39/0x40 [ 413.035149][T16811] BUG: unable to handle page fault for address: fffffbfff4002000 [ 413.035171][T16811] #PF: supervisor read access in kernel mode [ 413.035173][T16811] #PF: error_code(0x0000) - not-present page [ 413.035175][T16811] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD 8ff88067 PTE 0 [ 413.035183][T16811] Thread overran stack, or stack corrupted [ 413.035185][T16811] Oops: 0000 [#31] PREEMPT SMP KASAN [ 413.035187][T16811] CPU: 0 PID: 16811 Comm: kworker/0:16 Not tainted 5.3.0-rc4+ #80 [ 413.035190][T16811] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 413.035191][T16811] Workqueue: events bpf_prog_free_deferred [ 413.035194][T16811] RIP: 0010:is_bpf_text_address+0x201/0x3b0 [ 413.035199][T16811] Code: 85 c4 f5 ff 4d 39 f4 76 10 e8 7b c2 f5 ff 49 83 c7 10 eb 46 0f 1f 44 00 00 4c 89 e0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <0f> b6 04 08 84 c0 75 7d 41 8b 1c 24 48 c1 e3 0c 4c 01 e3 48 89 df [ 413.035201][T16811] RSP: 0018:ffff88805f9f7c28 EFLAGS: 00010806 [ 413.035204][T16811] RAX: 1ffffffff4002000 RBX: 0000000000000001 RCX: dffffc0000000000 [ 413.035207][T16811] RDX: ffff8880965b4380 RSI: ffffffffff7a5700 RDI: ffffffffa0010000 [ 413.035209][T16811] RBP: ffff88805f9f7c60 R08: ffffffff817dc0cb R09: 0000000000000001 [ 413.035211][T16811] R10: fffffbfff117be5d R11: 0000000000000000 R12: ffffffffa0010000 [ 413.035213][T16811] R13: 0000000000000000 R14: ffffffffff7a5700 R15: ffff88808aa18578 [ 413.035216][T16811] FS: 0000000000000000(0000) GS:ffff8880aea00000(0000) knlGS:0000000000000000 [ 413.035218][T16811] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 413.035220][T16811] CR2: fffffbfff4002000 CR3: 0000000091caa000 CR4: 00000000001406f0 [ 413.035222][T16811] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 413.035225][T16811] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 413.035226][T16811] Call Trace: [ 413.035228][T16811] ? sprintf+0x71/0x90 [ 413.035229][T16811] ? msg_print_text+0x16e/0x4a0 [ 413.035231][T16811] ? __kasan_check_write+0x14/0x20 [ 413.035233][T16811] ? do_raw_spin_lock+0xea/0x2d0 [ 413.035234][T16811] ? console_unlock+0x4e4/0xef0 [ 413.035236][T16811] ? __down_trylock_console_sem+0x180/0x1b0 [ 413.035238][T16811] ? vprintk_emit+0x21c/0x3a0 [ 413.035239][T16811] ? vprintk_emit+0x239/0x3a0 [ 413.035241][T16811] ? vprintk_default+0x28/0x30 [ 413.035243][T16811] ? vprintk_func+0x158/0x170 [ 413.035244][T16811] ? printk+0x62/0x8d [ 413.035246][T16811] ? no_context+0x66d/0xc80 [ 413.035247][T16811] ? no_context+0x6e3/0xc80 [ 413.035249][T16811] ? __bad_area_nosemaphore+0x108/0x470 [ 413.035251][T16811] ? vprintk_emit+0x239/0x3a0 [ 413.035252][T16811] ? bad_area_nosemaphore+0x2d/0x40 [ 413.035254][T16811] ? __do_page_fault+0x1a4/0x1f0 [ 413.035256][T16811] ? do_page_fault+0x99/0xb0 [ 413.035257][T16811] ? page_fault+0x39/0x40 [ 413.035260][T16811] BUG: unable to handle page fault for address: fffffbfff4002000 [ 413.035261][T16811] #PF: supervisor read access in kernel mode [ 413.035263][T16811] #PF: error_code(0x0000) - not-present page [ 413.035265][T16811] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD 8ff88067 PTE 0 [ 413.035273][T16811] Thread overran stack, or stack corrupted [ 413.035275][T16811] Oops: 0000 [#32] PREEMPT SMP KASAN [ 413.035277][T16811] CPU: 0 PID: 16811 Comm: kworker/0:16 Not tainted 5.3.0-rc4+ #80 [ 413.035280][T16811] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 413.035281][T16811] Workqueue: events bpf_prog_free_deferred [ 413.035284][T16811] RIP: 0010:is_bpf_text_address+0x201/0x3b0 [ 413.035289][T16811] Code: 85 c4 f5 ff 4d 39 f4 76 10 e8 7b c2 f5 ff 49 83 c7 10 eb 46 0f 1f 44 00 00 4c 89 e0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <0f> b6 04 08 84 c0 75 7d 41 8b 1c 24 48 c1 e3 0c 4c 01 e3 48 89 df [ 413.035291][T16811] RSP: 0018:ffff88805f9f7850 EFLAGS: 00010806 [ 413.035294][T16811] RAX: 1ffffffff4002000 RBX: 0000000000000001 RCX: dffffc0000000000 [ 413.035296][T16811] RDX: ffff8880965b4380 RSI: ffffffffff7a5700 RDI: ffffffffa0010000 [ 413.035299][T16811] RBP: ffff88805f9f7888 R08: ffffffff817dc0cb R09: 0000000000000001 [ 413.035301][T16811] R10: fffffbfff117be5d R11: 0000000000000000 R12: ffffffffa0010000 [ 413.035303][T16811] R13: 0000000000000000 R14: ffffffffff7a5700 R15: ffff88808aa18578 [ 413.035305][T16811] FS: 0000000000000000(0000) GS:ffff8880aea00000(0000) knlGS:0000000000000000 [ 413.035307][T16811] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 413.035310][T16811] CR2: fffffbfff4002000 CR3: 0000000091caa000 CR4: 00000000001406f0 [ 413.035312][T16811] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 413.035314][T16811] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 413.035315][T16811] Call Trace: [ 413.035317][T16811] ? sprintf+0x71/0x90 [ 413.035319][T16811] ? msg_print_text+0x16e/0x4a0 [ 413.035320][T16811] ? __kasan_check_write+0x14/0x20 [ 413.035322][T16811] ? do_raw_spin_lock+0xea/0x2d0 [ 413.035324][T16811] ? console_unlock+0x4e4/0xef0 [ 413.035325][T16811] ? __down_trylock_console_sem+0x180/0x1b0 [ 413.035327][T16811] ? vprintk_emit+0x21c/0x3a0 [ 413.035329][T16811] ? vprintk_emit+0x239/0x3a0 [ 413.035330][T16811] ? vprintk_default+0x28/0x30 [ 413.035332][T16811] ? vprintk_func+0x158/0x170 [ 413.035333][T16811] ? printk+0x62/0x8d [ 413.035335][T16811] ? no_context+0x66d/0xc80 [ 413.035337][T16811] ? no_context+0x6e3/0xc80 [ 413.035338][T16811] ? __bad_area_nosemaphore+0x108/0x470 [ 413.035340][T16811] ? vprintk_emit+0x239/0x3a0 [ 413.035342][T16811] ? bad_area_nosemaphore+0x2d/0x40 [ 413.035343][T16811] ? __do_page_fault+0x1a4/0x1f0 [ 413.035345][T16811] ? do_page_fault+0x99/0xb0 [ 413.035346][T16811] ? page_fault+0x39/0x40 [ 413.035349][T16811] usercopy: Kernel memory overwrite attempt detected to SLAB object 'kmalloc-1k' (offset 1134, size 1)! [ 413.035351][T16811] ------------[ cut here ]------------ [ 413.035353][T16811] kernel BUG at mm/usercopy.c:98! [ 413.035355][T16811] invalid opcode: 0000 [#33] PREEMPT SMP KASAN [ 413.035357][T16811] CPU: 0 PID: 16811 Comm: kworker/0:16 Not tainted 5.3.0-rc4+ #80 [ 413.035360][T16811] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 413.035361][T16811] Workqueue: events bpf_prog_free_deferred [ 413.035364][T16811] RIP: 0010:usercopy_abort+0x8d/0x90 [ 413.035369][T16811] Code: 4f 3f 88 48 0f 44 de 48 c7 c7 e7 a7 3e 88 4c 89 ce 4c 89 d1 4d 89 d8 49 89 c1 31 c0 41 57 41 56 53 e8 7a 40 a9 ff 48 83 c4 18 <0f> 0b 90 55 48 89 e5 41 57 41 56 41 55 41 54 53 48 83 ec 20 41 89 [ 413.035370][T16811] RSP: 0018:ffff88805f9f70b8 EFLAGS: 00010086 [ 413.035374][T16811] RAX: 0000000000000068 RBX: ffffffff883f4f3f RCX: 8157faa10bd20b00 [ 413.035376][T16811] RDX: 0000000000000000 RSI: 0000000000000001 RDI: 0000000000000000 [ 413.035378][T16811] RBP: ffff88805f9f70d0 R08: ffffffff817d7a69 R09: ffffed1015d444d6 [ 413.035380][T16811] R10: ffffed1015d444d6 R11: 0000000000000000 R12: 01fffc0000010200 [ 413.035383][T16811] R13: 0000000000000001 R14: 000000000000046e R15: 0000000000000001 [ 413.035385][T16811] FS: 0000000000000000(0000) GS:ffff8880aea00000(0000) knlGS:0000000000000000 [ 413.035387][T16811] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 413.035389][T16811] CR2: fffffbfff4002000 CR3: 0000000091caa000 CR4: 00000000001406f0 [ 413.035391][T16811] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 413.035394][T16811] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 413.035395][T16811] Call Trace: [ 413.035397][T16811] ? sprintf+0x71/0x90 [ 413.035398][T16811] ? msg_print_text+0x16e/0x4a0 [ 413.035400][T16811] ? __kasan_check_write+0x14/0x20 [ 413.035402][T16811] ? do_raw_spin_lock+0xea/0x2d0 [ 413.035403][T16811] ? console_unlock+0x4e4/0xef0 [ 413.035405][T16811] ? __down_trylock_console_sem+0x180/0x1b0 [ 413.035407][T16811] ? vprintk_emit+0x21c/0x3a0 [ 413.035408][T16811] ? vprintk_emit+0x239/0x3a0 [ 413.035410][T16811] ? vprintk_default+0x28/0x30 [ 413.035412][T16811] ? vprintk_func+0x158/0x170 [ 413.035413][T16811] ? printk+0x62/0x8d [ 413.035415][T16811] ? no_context+0x66d/0xc80 [ 413.035417][T16811] ? no_context+0x6e3/0xc80 [ 413.035418][T16811] ? __bad_area_nosemaphore+0x108/0x470 [ 413.035420][T16811] ? vprintk_emit+0x239/0x3a0 [ 413.035422][T16811] ? bad_area_nosemaphore+0x2d/0x40 [ 413.035424][T16811] ? __do_page_fault+0x1a4/0x1f0 [ 413.035425][T16811] ? do_page_fault+0x99/0xb0 [ 413.035427][T16811] ? page_fault+0x39/0x40 [ 413.035429][T16811] BUG: unable to handle page fault for address: fffffbfff4002000 [ 413.035431][T16811] #PF: supervisor read access in kernel mode [ 413.035433][T16811] #PF: error_code(0x0000) - not-present page [ 413.035434][T16811] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD 8ff88067 PTE 0 [ 413.035442][T16811] Thread overran stack, or stack corrupted [ 413.035444][T16811] Oops: 0000 [#34] PREEMPT SMP KASAN [ 413.035446][T16811] CPU: 0 PID: 16811 Comm: kworker/0:16 Not tainted 5.3.0-rc4+ #80 [ 413.035449][T16811] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 413.035451][T16811] Workqueue: events bpf_prog_free_deferred [ 413.035454][T16811] RIP: 0010:is_bpf_text_address+0x201/0x3b0 [ 413.035458][T16811] Code: 85 c4 f5 ff 4d 39 f4 76 10 e8 7b c2 f5 ff 49 83 c7 10 eb 46 0f 1f 44 00 00 4c 89 e0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <0f> b6 04 08 84 c0 75 7d 41 8b 1c 24 48 c1 e3 0c 4c 01 e3 48 89 df [ 413.035460][T16811] RSP: 0018:ffff88805f9f6dc8 EFLAGS: 00010806 [ 413.035463][T16811] RAX: 1ffffffff4002000 RBX: 0000000000000001 RCX: dffffc0000000000 [ 413.035465][T16811] RDX: ffff8880965b4380 RSI: ffffffffff7a5700 RDI: ffffffffa0010000 [ 413.035468][T16811] RBP: ffff88805f9f6e00 R08: ffffffff817dc0cb R09: 0000000000000001 [ 413.035470][T16811] R10: fffffbfff117be5d R11: 0000000000000000 R12: ffffffffa0010000 [ 413.035472][T16811] R13: 0000000000000000 R14: ffffffffff7a5700 R15: ffff88808aa18578 [ 413.035474][T16811] FS: 0000000000000000(0000) GS:ffff8880aea00000(0000) knlGS:0000000000000000 [ 413.035476][T16811] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 413.035478][T16811] C [ 413.035482][T16811] Lost 23 message(s)!